Index of /2000/
../
001-OnSecurityPreservingReductionsRevisedTermin..> 22-Dec-2014 07:46 190K
001-OnSecurityPreservingReductionsRevisedTermin..> 22-Dec-2014 07:46 361K
002-ANewForwardSecureDigitalSignatureScheme.pdf 22-Dec-2014 07:46 338K
002-ANewForwardSecureDigitalSignatureScheme.ps 22-Dec-2014 07:46 302K
003-ImplicationsoftheNontrivialityofEntropyAppr..> 20-Jan-2023 14:22 207
004-CombinatorialPropertiesofFrameproofandTrace..> 22-Dec-2014 07:46 209K
004-CombinatorialPropertiesofFrameproofandTrace..> 22-Dec-2014 07:46 194K
005-OnResilientBooleanFunctionswithMaximalPossi..> 22-Dec-2014 07:46 250K
005-OnResilientBooleanFunctionswithMaximalPossi..> 22-Dec-2014 07:46 549K
006-AnEncryptionAlgorithmandKeystreamGeneratorf..> 22-Dec-2014 07:45 335K
006-AnEncryptionAlgorithmandKeystreamGeneratorf..> 22-Dec-2014 07:45 3M
007-PublicElectronicContractProtocol.pdf 22-Dec-2014 07:45 295K
007-PublicElectronicContractProtocol.ps 22-Dec-2014 07:45 3M
008-EfficientProtocolsbasedonProbabilisticEncry..> 22-Dec-2014 07:45 164K
008-EfficientProtocolsbasedonProbabilisticEncry..> 22-Dec-2014 07:45 319K
009-NewDirectionsinDesignofResilientBooleanFunc..> 22-Dec-2014 07:45 247K
009-NewDirectionsinDesignofResilientBooleanFunc..> 22-Dec-2014 07:45 262K
010-TheSecurityofChaffingandWinnowing.pdf 22-Dec-2014 07:45 368K
010-TheSecurityofChaffingandWinnowing.ps 22-Dec-2014 07:45 705K
011-TailoredKeyEncryptionTaKETailoringakeyforag..> 22-Dec-2014 07:45 51K
012-ChosenMessageAttackAgainstGoldreichGoldwass..> 20-Jan-2023 14:22 207
013-ConcurrentZeroKnowledgeinPolylogarithmicRou..> 22-Dec-2014 07:45 282K
013-ConcurrentZeroKnowledgeinPolylogarithmicRou..> 22-Dec-2014 07:45 282K
014-AuthenticatedKeyExchangeSecureAgainstDictio..> 22-Dec-2014 07:45 338K
014-AuthenticatedKeyExchangeSecureAgainstDictio..> 22-Dec-2014 07:45 627K
015-IdentificationProtocolsSecureAgainstResetAt..> 22-Dec-2014 07:45 487K
015-IdentificationProtocolsSecureAgainstResetAt..> 22-Dec-2014 07:45 513K
016-CryptanalysisofRSAwithsmallprimedifference.pdf 20-Jan-2023 14:22 207
017-LowerBoundsontheEfficiencyofGenericCryptogr..> 22-Dec-2014 07:45 234K
017-LowerBoundsontheEfficiencyofGenericCryptogr..> 22-Dec-2014 07:45 201K
018-FastVerificationofAnyRemoteProcedureCallSho..> 20-Jan-2023 14:22 207
019-ThresholdCryptographySecureAgainsttheAdapti..> 22-Dec-2014 07:45 345K
019-ThresholdCryptographySecureAgainsttheAdapti..> 22-Dec-2014 07:45 650K
020-OntheSecurityofDiffieHellmanBits.pdf 22-Dec-2014 07:45 137K
020-OntheSecurityofDiffieHellmanBits.ps 22-Dec-2014 07:45 1M
021-AnEfficientIdentificationSchemeBasedonPermu..> 22-Dec-2014 07:44 188K
021-AnEfficientIdentificationSchemeBasedonPermu..> 22-Dec-2014 07:44 322K
022-ACETheAdvancedCryptographicEngine.pdf 22-Dec-2014 07:44 446K
022-ACETheAdvancedCryptographicEngine.ps 22-Dec-2014 07:44 462K
023-SecurityofPolynomialTransformationsoftheDif..> 22-Dec-2014 07:44 205K
023-SecurityofPolynomialTransformationsoftheDif..> 22-Dec-2014 07:44 262K
024-SecurityoftheMostSignificantBitsoftheShamir..> 22-Dec-2014 07:44 128K
024-SecurityoftheMostSignificantBitsoftheShamir..> 22-Dec-2014 07:44 1M
025-AuthenticatedEncryptionRelationsamongnotion..> 22-Dec-2014 07:44 235K
025-AuthenticatedEncryptionRelationsamongnotion..> 22-Dec-2014 07:44 451K
026-AuthenticationandKeyAgreementviaMemorablePa..> 22-Dec-2014 07:44 374K
026-AuthenticationandKeyAgreementviaMemorablePa..> 22-Dec-2014 07:44 867K
027-AccountableCertificateManagementusingUndeni..> 22-Dec-2014 07:44 200K
027-AccountableCertificateManagementusingUndeni..> 22-Dec-2014 07:44 224K
028-AnInformationTheoreticModelforSteganography..> 22-Dec-2014 07:44 244K
028-AnInformationTheoreticModelforSteganography.ps 22-Dec-2014 07:44 235K
029-ConcreteSecurityCharacterizationsofPRFsandP..> 22-Dec-2014 07:44 255K
029-ConcreteSecurityCharacterizationsofPRFsandP..> 22-Dec-2014 07:44 239K
030-SecureMultipartyComputationofApproximations..> 20-Jan-2023 14:22 207
031-ForwardSecurityinThresholdSignatureSchemes.pdf 22-Dec-2014 07:44 192K
031-ForwardSecurityinThresholdSignatureSchemes.ps 22-Dec-2014 07:44 196K
032-AnonymousFingerprintingwithDirectNonRepudia..> 22-Dec-2014 07:44 192K
032-AnonymousFingerprintingwithDirectNonRepudia..> 22-Dec-2014 07:44 253K
033-TheCompleteDistributionofLinearProbabilitie..> 20-Jan-2023 08:42 49K
033-TheCompleteDistributionofLinearProbabilitie..> 22-Dec-2014 07:44 49K
033-TheCompleteDistributionofLinearProbabilitie..> 22-Dec-2014 07:44 153K
034-RandomOraclesinConstantinoplePracticalAsync..> 22-Dec-2014 07:44 320K
034-RandomOraclesinConstantinoplePracticalAsync..> 22-Dec-2014 07:44 311K
035-ElectronicJuryVotingProtocols.pdf 22-Dec-2014 07:44 305K
035-ElectronicJuryVotingProtocols.ps 22-Dec-2014 07:44 593K
036-UsingfewerQubitsinShor39sFactorizationAlgor..> 20-Jan-2023 14:22 207
036-UsingfewerQubitsinShorsFactorizationAlgorit..> 22-Dec-2014 07:44 177K
036-UsingfewerQubitsinShorsFactorizationAlgorit..> 22-Dec-2014 07:44 146K
037-GeneralSecureMultiPartyComputationfromanyLi..> 22-Dec-2014 07:44 265K
037-GeneralSecureMultiPartyComputationfromanyLi..> 22-Dec-2014 07:44 446K
038-OntheComplexityofVerifiableSecretSharingand..> 22-Dec-2014 07:44 163K
038-OntheComplexityofVerifiableSecretSharingand..> 22-Dec-2014 07:44 242K
039-EncryptionModeswithAlmostFreeMessageIntegri..> 22-Dec-2014 07:43 181K
039-EncryptionModeswithAlmostFreeMessageIntegri..> 22-Dec-2014 07:43 227K
040-DecimationAttackofStreamCiphers.pdf 22-Dec-2014 07:43 238K
040-DecimationAttackofStreamCiphers.ps 22-Dec-2014 07:43 204K
041-OnSymmetricallyPrivateInformationRetrieval.pdf 22-Dec-2014 07:43 573K
041-OnSymmetricallyPrivateInformationRetrieval.ps 22-Dec-2014 07:43 689K
042-ConstructingPseudoRandomPermutationswithaPr..> 22-Dec-2014 07:43 159K
042-ConstructingPseudoRandomPermutationswithaPr..> 22-Dec-2014 07:43 130K
043-ConstructionsandBoundsforUnconditionallySec..> 22-Dec-2014 07:43 194K
043-ConstructionsandBoundsforUnconditionallySec..> 22-Dec-2014 07:43 133K
044-ProvablySecurePasswordAuthenticatedKeyExcha..> 22-Dec-2014 07:43 472K
044-ProvablySecurePasswordAuthenticatedKeyExcha..> 22-Dec-2014 07:43 843K
045-EfficientZeroKnowledgeProofsofKnowledgeWith..> 22-Dec-2014 07:43 281K
045-EfficientZeroKnowledgeProofsofKnowledgeWith..> 22-Dec-2014 07:43 513K
046-TheSaturationAttackaBaitforTwofish.pdf 22-Dec-2014 07:43 229K
046-TheSaturationAttackaBaitforTwofish.ps 22-Dec-2014 07:43 217K
047-HighlyNonlinearBalancedBooleanFunctionswith..> 22-Dec-2014 07:43 271K
047-HighlyNonlinearBalancedBooleanFunctionswith..> 22-Dec-2014 07:43 308K
048-NewConstructionsofResilentandCorrelationImm..> 22-Dec-2014 07:43 226K
048-NewConstructionsofResilentandCorrelationImm..> 22-Dec-2014 07:43 231K
049-SpectralDomainAnalysisofCorrelationImmunean..> 22-Dec-2014 07:43 195K
049-SpectralDomainAnalysisofCorrelationImmunean..> 22-Dec-2014 07:43 156K
050-SpectralAnalysisofHighOrderCorrelationImmun..> 22-Dec-2014 07:43 156K
050-SpectralAnalysisofHighOrderCorrelationImmun..> 22-Dec-2014 07:43 317K
051-ReducingtheGateCountofBitsliceDES.pdf 22-Dec-2014 07:43 208K
051-ReducingtheGateCountofBitsliceDES.ps 22-Dec-2014 07:43 566K
052-CRYPTANALYSISOFTHEA52ALGORITHM.pdf 22-Dec-2014 07:43 138K
053-AConstructionofResilientFunctionswithHighNo..> 22-Dec-2014 07:43 239K
053-AConstructionofResilientFunctionswithHighNo..> 22-Dec-2014 07:43 257K
054-CorrelationImmuneBooleanFunctionswithVeryHi..> 22-Dec-2014 07:43 193K
054-CorrelationImmuneBooleanFunctionswithVeryHi..> 22-Dec-2014 07:43 199K
055-MultipartyComputationfromThresholdHomomorph..> 22-Dec-2014 07:43 380K
055-MultipartyComputationfromThresholdHomomorph..> 22-Dec-2014 07:43 591K
056-ACompleteProblemforStatisticalZeroKnowledge..> 22-Dec-2014 07:43 557K
056-ACompleteProblemforStatisticalZeroKnowledge.ps 22-Dec-2014 07:43 1M
057-SessionKeyGenerationusingHumanPasswordsOnly..> 22-Dec-2014 07:43 907K
057-SessionKeyGenerationusingHumanPasswordsOnly.ps 22-Dec-2014 07:42 1M
058-GraphBasedAuthenticationofDigitalStreams.pdf 22-Dec-2014 07:42 220K
058-GraphBasedAuthenticationofDigitalStreams.ps 22-Dec-2014 07:42 222K
059-EssentialShannonSecuritywithKeysSmallerThan..> 22-Dec-2014 07:42 58K
060-OAEPReconsidered.pdf 22-Dec-2014 07:42 311K
060-OAEPReconsidered.ps 22-Dec-2014 07:42 325K
061-RSAOAEPisSecureundertheRSAAssumption.pdf 22-Dec-2014 07:42 223K
061-RSAOAEPisSecureundertheRSAAssumption.ps 22-Dec-2014 07:42 496K
062-NonDeformingDigitalWatermarks.pdf 20-Jan-2023 14:22 207
063-CandidateOneWayFunctionsBasedonExpanderGrap..> 22-Dec-2014 07:42 244K
063-CandidateOneWayFunctionsBasedonExpanderGrap..> 22-Dec-2014 07:42 476K
064-OntheSecurityofModularExponentiationwithApp..> 22-Dec-2014 07:42 426K
064-OntheSecurityofModularExponentiationwithApp..> 22-Dec-2014 07:42 802K
065-HowtoEncryptLongMessageswithoutLargeSizeSym..> 22-Dec-2014 07:42 184K
065-HowtoEncryptLongMessageswithoutLargeSizeSym..> 22-Dec-2014 07:42 387K
066-AModelforAsynchronousReactiveSystemsanditsA..> 22-Dec-2014 07:42 456K
066-AModelforAsynchronousReactiveSystemsanditsA..> 22-Dec-2014 07:42 754K
067-UniversallyComposableSecurityANewParadigmfo..> 22-Dec-2014 07:42 781K
068-AContentCertifiedEmailProtocolwithaPublicMa..> 22-Dec-2014 07:42 492K
069-NewconstructionsofresilientBooleanfunctions..> 22-Dec-2014 07:42 186K
069-NewconstructionsofresilientBooleanfunctions..> 22-Dec-2014 07:42 180K