SAFER A byte-oriented block-ciphering algorithm.- A new approach to block cipher design.- Fast block cipher proposal.- A fast software stream cipher.- The Shrinking some practical considerations.- A modern rotor machine.- Two stream ciphers.- A software-optimized encryption algorithm.- Encrypting network traffic.- Design principles for dedicated hash functions.- Performance of symmetric ciphers and one-way hash functions.- On the security of shift register based keystream generators.- The differential cryptanalysis and design of natural stream ciphers.- On modes of operation.- Cryptanalysis of clock controlled shift registers.- A bulk data encryption algorithm.- On finite automaton one-key cryptosystems.- Parallel FFT-hashing.- Attacks on double block length hash functions.- On quadratic m-sequences.- 2-Adic shift registers.- New bent mappings suitable for fast implementation.- Cryptographic pseudo-random numbers in simulation.- Description of a new variable-length key, 64-bit block cipher (Blowfish).- A block cipher including variable permutations.- Practically secure Feistel ciphers.