• Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
  • Sedat Akleylek, Murat Cenk and Ferruh Ozbudak

  • Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
  • Gregory Bard, Nicolas Courtois, Jorge Nakahara Jr, Pouyan Sepehrdad and Bingsheng Zhang

  • ECC2K-130 on NVIDIA GPUs
  • Daniel Bernstein, Hsi-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe and Bo-Yin Yang

  • Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
  • Stanislav Bulygin, Albrecht Petzoldt and Johannes Buchmann

  • Combined Security Analysis of the One- and Three-pass Unified Model Key Agreement Protocols
  • Sanjit Chatterjee, Alfred Menezes and Berkant Ustaoglu

  • New Boomerang Attacks on ARIA
  • Ewan Fleischmann, Christian Forler, Michael Gorski and Stefan Lucks

  • Random Euclidean Addition Chain Generation and Its Apllication to Point Multiplication
  • Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Meloni, Yannick Teglia and Pascal Veron

  • One Byte per Clock: A Novel RC4 Hardware
  • Sourav Sen Gupta, Koushik Sinha, Subhamoy Maitra and Bhabani P. Sinha

  • Cryptanalysis of Tav-128 Hash function
  • Ashish Kumar, Somitra Sanadhya, Praveen Gauravaram, Masoumeh Safkhani and Majid Naderi

  • Impossible Differential Cryptanalysis of AES-128
  • Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen and Mahmood Modarres-Hashemi

  • Indifferentiability Beyond the Birthday Bound for the Xor of Two Public Random Permutations
  • Avradip Mandal, Jacques Patarin and Valerie Nachef

  • A Program Generator for Intel AES-NI Instructions
  • Raymond Manley and David Gregg

  • Cryptanalysis of a Perturbated White-Box AES Implementation
  • Yoni De Mulder, Brecht Wyseur and Bart Preneel

  • The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
  • Mridul Nandi

  • Speeding Up The Wide-pipe: Secure and Fast Hashing
  • Mridul Nandi and Souradyuti Paul

  • CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
  • Albrecht Petzoldt, Stanislav Bulygin and Johannes Buchmann

  • Attack on a Higher-Order Masking of the AES Based on Homographic Functions
  • Thomas Roche and Emmanuel Prouff

  • Partial Key Exposure Attack on RSA -- Improvements for Limited Lattice Dimensions
  • Santanu Sarkar, Sourav Sen Gupta and Subhamoy Maitra

  • Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions using Hill Climbing
  • Meltem Sonmez Turan and Erdener Uyan

  • Greedy Distinguishers and Nonrandomness Detectors
  • Paul Stankovski

  • The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
  • Cihangir Tezcan

  • Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface
  • Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Ryan, Steve Schneider and Sriramkrishnan Srinivasan