$\chi^{2}$ Cryptanalysis of the SEAL Encryption Algorithm, Helena Handschuh, Henri Gilbert
Partitioning Cryptanalysis, C. Harpes, J.L. Massey
The Interpolation Attack on Block Ciphers, Thomas Jakobsen, Lars R. Knudsen
Best Differential Characteristic Search of FEAL, Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
New Block Encryption Algorithm MISTY, Mitsuru Matsui
The Design of the ICE Encryption Algorithm, Matthew Kwan
Discussion Session: Requirements for the Advanced Encryption Standard (AES)
TWOPRIME: A Fast Stream Ciphering Algorithm, Cunsheng Ding, Valtteri Niemi, Ari Renvall, Arto Salomaa
On Nonlinear Filter Generators, Markus Dichtl
Chameleon --- A New Kind of Stream Cipher, Ross Anderson, Charalampos Manifavas
Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method, Kouichi Sakurai, Souichi Furuya
Cryptanalysis of Ladder-DES, Eli Biham
A Family of Trapdoor Ciphers, Vincent Rijmen, Bart Preneel
The Block Cipher Square, Joan Daemen, Lars Knudsen, Vincent Rijmen
xmx, a Firmware-Oriented Block Cipher Based on Modular Multiplications, David M'Raihi, David Naccache, Jacques Stern, Serge Vaudenay
Short contributions on recent results.
MMH: Software Message Authentication in the Gbit/second Rates, Shai Halevi, Hugo Krawczyk
Fast Message Authentication using Efficient Polynomial Evaluation, Valentine Afanassiev, Christian Gehrmann, Ben Smeets
Reinventing the \overstrike{Wheel} Travois: Encryption/MAC in 30 ROM Bytes, Gideon Yuval
All-Or-Nothing Encryption and The Package Transform, Ronald L. Rivest
On the Security of Remotely Keyed Encryption, Stefan Lucks
Sliding Encryption: A Cryptographic Tool for Mobile Agents, Adam Young, Moti Yung
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor, Bruce Schneier, Doug Whiting
A Fast New DES Implementation in Software, Eli Biham
Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors, Craig S.K. Clapp
Discussion Session: Security of Cryptosystems: From theory to practice
Optimal Galois Field Bases which are not Normal, Preda Mihailescu
Speeding Up with Chinese Remaindering can be Dangerous, Marc Joye, Jean-Jacques Quisqater
An Algorithm to Calculate a Precise Differential Probability of DES F-Function, Kazumaro Aoki, Kazuo Ohta, Takashi Hyodo
On the Security of BEAR and LION, and Ladder-DES, Lars Knudsen
The RSA Data Security Secret Key Challenge, Matt Robshaw
Differential Fault Analysis Revisited, Eli Biham, Adi Shamir
The Guy Fawkes Protocol, Ross Anderson, Bruno Cryspo, Jong-Hyeon Lee, Charalampos Manifavas, Roger Needham