Table of contents : Attacks on the HKM / HFX cryptosystem....Pages 1-14 Truncated differentials of SAFER....Pages 15-26 On the weak keys of blowfish....Pages 27-32 High-bandwidth encryption with low-bandwidth smartcards....Pages 33-40 ISAAC....Pages 41-49 A note on the hash function of Tillich and zémor....Pages 51-52 Cryptanalysis of MD4....Pages 53-69 RIPEMD-160: A strengthened version of RIPEMD....Pages 71-82 Fast accumulated hashing....Pages 83-87 Tiger: A fast new hash function....Pages 89-97 The cipher SHARK....Pages 99-111 Two practical and provably secure block ciphers: BEAR and LION....Pages 113-120 Unbalanced Feistel networks and block cipher design....Pages 121-144 A comparison of fast correlation attacks....Pages 145-157 Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes....Pages 159-172 On the security of nonlinear filter generators....Pages 173-188 Faster Luby-Rackoff ciphers....Pages 189-203 New structure of block ciphers with provable security against differential and linear cryptanalysis....Pages 205-218