List of accepted papers
-
"Implementing Quartz in Java",
Christopher Wolf (University College Cork, Dept. of Mathematics and University of Ulm, Faculty of Computer Science)
-
"Amplified Boomerang Attack Against Reduced-Round SHACAL",
Jongsung Kim and Dukjae Moon and Wonil Lee and Seokhie Hong and Sangjin Lee and Seokwon Jung (Center for Information Security Technology (CIST) in Korea University)
-
"Compact Hardware Architecture for 128-bit Block Cipher Camellia",
Akashi Satoh and Sumio Morioka (IBM Research, Tokyo Research Laboratory, IBM Japan Lt)
-
"Essential Algebraic Structure within the AES",
Sean Murphy and M.J.B. Robshaw (Information Security Group, Royal Holloway, University of London, U.K.)
-
"On the Security of HFE, HFEv- and Quartz",
Nicolas T. Courtois (CP8 Crypto Lab, SchlumbergerSema),
Magnus Daum and Patrick Felke (Ruhr-University Bochum, Germany)
-
"Revealing 441 Key Bits of SFLASH^v2",
Willi Geiselmann and Rainer Steinwandt and Thomas Beth (Universität Karlsruhe, Germany)
-
"Differential, Linear, Boomerang and Rectangle Cryptanalysis of Reduced-Round Camellia",
Taizo Shirai (Sony Corporation)
-
"On the Applicability of Distinguishing Attacks Against Stream Ciphers",
Greg Rose and Philip Hawkes (QUALCOMM Australia)
-
"A Fast and Secure Implementation of Sflash",
Mehdi-Laurent Akkar and Nicolas T. Courtois and Romain Duteuil and Louis Goubin (CP8 Crypto Lab SchlumbergerSema)
-
"Probabilistic Factors in the SOBER-t Stream Ciphers",
Steve Babbage (Vodafone Ltd., Newbury, UK) and Joseph Lano (K.U.Leuven, ESAT-SCD, Leuven, Belgium)
-
"On Hardware Implementation of Block Ciphers Selected at the NESSIE Project Phase 1",
Tetsuya Ichikawa (Mitsubishi Electric Engineering Company Limited)
and Toru Sorimachi and Tomomi Kasuya (Mitsubishi Electric Corporation)
-
"Distinguishing Attacks on Sober-t32",
Christophe De Cannière and Joseph Lano and Bart Preneel and Joos Vandewalle (K.U.Leuven, ESAT/SCD-COSIC)
-
"Observations on the Relations Between the Bit-Functions of Many S Boxes",
Eli Biham (Computer Science, Technion)
-
"Optimization of IDEA",
Eli Biham (Computer Science, Technion)
-
"How to repair ESIGN",
Louis Granboulan (École Normale Supérieure, Paris, France)
-
"Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1",
F.-X. Standaert and G. Rouvroy and J.-J. Quisquater and J.-D. Legat (UCL Crypto Group)
-
"In How Many Ways Can You Write Rijndael?",
Elad Barkan and Eli Biham (Computer Science, Technion)
-
"Some modes of use of the GPS identification scheme",
Marc Girault (France Telecom R&D) and Guillaume Poupard (DCSSI Crypto Lab) and Jacques Stern (École Normale Supérieure)
-
"New-Weak Key Classes of IDEA",
Alex Biryukov and Jorge Nakahara and Bart Preneel and Joos Vandewalle (Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Belgium)
-
"Observations on Khazad",
Alex Biryukov and Bart Preneel (Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Belgium)
-
"Block Ciphers and Systems of Quadratic Equations",
Alex Biryukov and Christophe De Canniere (Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Belgium)