Markku-Juhani Olavi Saarinen. Related-key Attacks Against Full Hummingbird-2 Pawel Morawiecki, Josef Pieprzyk and Marian Srebrny. Rotational cryptanalysis of round-reduced Keccak Hadi Soleimany, Celine Blondeau and Kaisa Nyberg. Feed-Forward Cryptanalysis of PRINCE-like Ciphers Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks and Jakob Wenzel. A Framework for Automated Independent-Biclique Cryptanalysis Christina Boura and Anne Canteaut. A new criterion for avoiding the propagation of linear relations through an Sbox Pouyan Sepehrdad, Petr Susil, Serge Vaudenay and Martin Vuagnoux. Smashing WEP in A Passive Attack David Mcgrew. Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes Michael Tunstall, Carolyn Whitnall and Elisabeth Oswald. Masking Tables---An Underestimated Security Risk Mitsuru Matsui and Yumiko Murakami. Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe and Masakatu Morii. Full Plaintext Recovery Attack on Broadcast RC4 Alex Biryukov and Ivica Nikolic. Complementing Feistel Ciphers Bin Zhang and Zhenqi Li. Near Collision Attack on the Grain v1 Stream Cipher Andrey Bogdanov and Elmar Tischhauser. On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2 Hongbo Yu, Jiazhe Chen and Xiaoyun Wang. Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 Rishiraj Bhattacharyya and Arnab Roy. Secure Message Authentication against Related-Key Attack Jeremy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang and Shuang Wu. Security Analysis of PRINCE Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen and Elmar Tischhauser. ALE: AES-Based Lightweight Authenticated Encryption Itai Dinur, Orr Dunkelman and Adi Shamir. Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials Patrick Derbez and Pierre-Alain Fouque. Exhausting Demirci-Selcuk Meet-in-the-Middle Attacks against Reduced-Round AES Pierre-Alain Fouque and Thomas Vannet. Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks Alexandra Boldyreva, Jean Paul Degabriele, Kenny Paterson and Martijn Stam. On Symmetric Encryption with Distinguishable Decryption Failures Rodolphe Lampe and Yannick Seurin. Tweakable Blockciphers with Asymptotically Optimal Security Gordon Procter and Carlos Cid. On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes Ivica Nikolic, Lei Wang and Shuang Wu. Cryptanalysis of Round-Reduced LED Jean-Sebastien Coron, Emmanuel Prouff, Matthieu Rivain and Thomas Roche. Higher-Order Side Channel Security and Mask Refreshing Gaetan Leurent. Time-memory Trade-offs for Near-collisions Gaetan Leurent. Cryptanalysis of WIDEA Xiaoli Yu, Wenling Wu, Huiling Zhang, Lei Zhang and Yanfeng Wang. Chosen-Constant Cryptanalysis of Full-Round PRINCE under Single-Key Model Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita and Tetsu Iwata. Attacks and Security Proofs of EAX-Prime Elena Andreeva, Andrey Bogdanov and Bart Mennink. Towards Understanding the Known-Key Security of Block Ciphers Ruilin Li, Heng Li, Chao Li and Bing Sun. A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones