Table of contents : Front Matter....Pages - An Improved Correlation Attack on A5/1....Pages 1-18 Extending the Resynchronization Attack....Pages 19-38 A New Simple Technique to Attack Filter Generators and Related Ciphers....Pages 39-53 On XTR and Side-Channel Analysis....Pages 54-68 Provably Secure Masking of AES....Pages 69-83 Perfect Diffusion Primitives for Block Ciphers....Pages 84-99 Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results....Pages 100-113 FOX : A New Family of Block Ciphers....Pages 114-129 A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue....Pages 130-143 Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity....Pages 144-158 Modular Number Systems: Beyond the Mersenne Family....Pages 159-169 Efficient Doubling on Genus Two Curves over Binary Fields....Pages 170-181 About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)....Pages 182-197 A Subliminal Channel in Secret Block Ciphers....Pages 198-211 Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes....Pages 212-226 Cryptanalysis of a White Box AES Implementation....Pages 227-240 Predicting Subset Sum Pseudorandom Generators....Pages 241-251 Collision Attack and Pseudorandomness of Reduced-Round Camellia....Pages 252-266 Password Based Key Exchange with Mutual Authentication....Pages 267-279 Product Construction of Key Distribution Schemes for Sensor Networks....Pages 280-293 Deterministic Key Predistribution Schemes for Distributed Sensor Networks....Pages 294-307 On Proactive Secret Sharing Schemes....Pages 308-325 Efficient Constructions of Variable-Input-Length Block Ciphers....Pages 326-340 A Sufficient Condition for Optimal Domain Extension of UOWHFs....Pages 341-353 Back Matter....Pages -