| 2004 | A MAC Forgery Attack on SOBER-128. Dai Watanabe, Soichi Furuya |
| 2004 | A New Stream Cipher HC-256. Hongjun Wu |
| 2004 | A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. Souradyuti Paul, Bart Preneel |
| 2004 | A Weakness of the Linear Part of Stream Cipher MUGI. Jovan Dj. Golic |
| 2004 | Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. Joo Yeon Cho, Josef Pieprzyk |
| 2004 | Algebraic Attacks on Summation Generators. Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon |
| 2004 | CWC: A High-Performance Conventional Authenticated Encryption Mode. Tadayoshi Kohno, John Viega, Doug Whiting |
| 2004 | Ciphers Secure against Related-Key Attacks. Stefan Lucks |
| 2004 | Correlation Attacks Using a New Class of Weak Feedback Polynomials. Håkan Englund, Martin Hell, Thomas Johansson |
| 2004 | Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. Simon R. Blackburn, Kenneth G. Paterson |
| 2004 | Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Phillip Rogaway, Thomas Shrimpton |
| 2004 | Differential Attacks against the Helix Stream Cipher. Frédéric Muller |
| 2004 | Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers Bimal K. Roy, Willi Meier |
| 2004 | Fast Software-Based Attacks on SecurID. Scott Contini, Yiqun Lisa Yin |
| 2004 | ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
| 2004 | Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. Håvard Molland |
| 2004 | Improving Fast Algebraic Attacks. Frederik Armknecht |
| 2004 | Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. Taizo Shirai, Kyoji Shibutani |
| 2004 | Minimum Distance between Bent and 1-Resilient Boolean Functions. Soumen Maity, Subhamoy Maitra |
| 2004 | New Cryptographic Primitives Based on Multiword T-Functions. Alexander Klimov, Adi Shamir |
| 2004 | New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. Tetsu Iwata, Tadayoshi Kohno |
| 2004 | Nonce-Based Symmetric Encryption. Phillip Rogaway |
| 2004 | On Linear Approximation of Modulo Sum. Alexander Maximov |
| 2004 | On the Additive Differential Probability of Exclusive-Or. Helger Lipmaa, Johan Wallén, Philippe Dumas |
| 2004 | Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang |
| 2004 | Resistance of S-Boxes against Algebraic Attacks. Jung Hee Cheon, Dong Hoon Lee |
| 2004 | Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. Pantelimon Stanica, Subhamoy Maitra, John A. Clark |
| 2004 | The EAX Mode of Operation. Mihir Bellare, Phillip Rogaway, David A. Wagner |
| 2004 | Towards a Unifying View of Block Cipher Cryptanalysis. David A. Wagner |
| 2004 | Two Power Analysis Attacks against One-Mask Methods. Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin |
| 2004 | VMPC One-Way Function and Stream Cipher. Bartosz Zoltak |
| 2004 | Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar |