Index of /2001/
../
001-EfficientAlgorithmsforComputingDifferential..> 22-Dec-2014 07:52 205K
001-EfficientAlgorithmsforComputingDifferential..> 22-Dec-2014 07:52 209K
002-TheOneMoreRSAInversionProblemsandtheSecurit..> 20-Jan-2023 08:42 273K
002-TheOneMoreRSAInversionProblemsandtheSecurit..> 22-Dec-2014 07:52 375K
002-TheOneMoreRSAInversionProblemsandtheSecurit..> 22-Dec-2014 07:52 361K
003-SeparatingDecisionDiffieHellmanfromDiffieHe..> 22-Dec-2014 07:51 168K
003-SeparatingDecisionDiffieHellmanfromDiffieHe..> 22-Dec-2014 07:51 131K
004-MinRankproblemandZeroknowledgeauthenticatio..> 20-Jan-2023 14:22 207
005-ANoteonCryptanalysisofthePreliminaryVersion..> 22-Dec-2014 07:51 152K
005-ANoteonCryptanalysisofthePreliminaryVersion..> 22-Dec-2014 07:51 144K
006-SecureandEfficientAsynchronousBroadcastProt..> 22-Dec-2014 07:51 430K
006-SecureandEfficientAsynchronousBroadcastProt..> 22-Dec-2014 07:51 453K
007-Are39Strong39PrimesNeededforRSA.pdf 20-Jan-2023 14:22 207
007-AreStrongPrimesNeededforRSA.pdf 22-Dec-2014 07:51 245K
007-AreStrongPrimesNeededforRSA.ps 22-Dec-2014 07:51 1M
008-FullyDistributedThresholdRSAunderStandardAs..> 22-Dec-2014 07:51 269K
008-FullyDistributedThresholdRSAunderStandardAs..> 22-Dec-2014 07:51 248K
009-Robustkeyevolvingpublickeyencryptionschemes..> 22-Dec-2014 07:51 246K
009-Robustkeyevolvingpublickeyencryptionschemes.ps 22-Dec-2014 07:51 229K
010-HowtoachieveaMcEliecebasedDigitalSignatureS..> 22-Dec-2014 07:51 298K
010-HowtoachieveaMcEliecebasedDigitalSignatureS..> 22-Dec-2014 07:51 294K
011-NewZeroknowledgeUndeniableSignaturesForgery..> 22-Dec-2014 07:51 251K
011-NewZeroknowledgeUndeniableSignaturesForgery..> 22-Dec-2014 07:51 237K
012-CipherswithArbitraryFiniteDomains.pdf 22-Dec-2014 07:51 289K
012-CipherswithArbitraryFiniteDomains.ps 22-Dec-2014 07:51 284K
013-DigitallyWatermarkingRSAModuli.pdf 22-Dec-2014 07:51 115K
013-DigitallyWatermarkingRSAModuli.ps 22-Dec-2014 07:51 279K
014-TimedReleaseCryptography.pdf 22-Dec-2014 07:51 282K
014-TimedReleaseCryptography.ps 22-Dec-2014 07:51 264K
015-AnobservationregardingJutla39smodesofoperat..> 20-Jan-2023 08:41 263K
015-AnobservationregardingJutlasmodesofoperatio..> 22-Dec-2014 07:51 279K
015-AnobservationregardingJutlasmodesofoperatio..> 22-Dec-2014 07:51 269K
016-EfficientTraitorTracingAlgorithmsusingListD..> 22-Dec-2014 07:51 246K
016-EfficientTraitorTracingAlgorithmsusingListD..> 22-Dec-2014 07:51 380K
017-Onadaptivevsnonadaptivesecurityofmultiparty..> 22-Dec-2014 07:51 352K
017-Onadaptivevsnonadaptivesecurityofmultiparty..> 22-Dec-2014 07:51 566K
018-AnalysisofaSubsetSumRandomizer.pdf 22-Dec-2014 07:51 113K
018-AnalysisofaSubsetSumRandomizer.ps 22-Dec-2014 07:51 276K
019-AnEfficientSystemforNontransferableAnonymou..> 22-Dec-2014 07:51 372K
019-AnEfficientSystemforNontransferableAnonymou..> 22-Dec-2014 07:51 387K
020-Someobservationsonthetheoryofcryptographich..> 22-Dec-2014 07:51 232K
020-Someobservationsonthetheoryofcryptographich..> 22-Dec-2014 07:51 158K
021-TheRectangleAttackRectanglingtheSerpent.pdf 22-Dec-2014 07:51 207K
021-TheRectangleAttackRectanglingtheSerpent.ps 22-Dec-2014 07:51 618K
022-OptimisticAsynchronousAtomicBroadcast.pdf 22-Dec-2014 07:51 306K
022-OptimisticAsynchronousAtomicBroadcast.ps 22-Dec-2014 07:51 303K
023-RobustnessforFreeinUnconditionalMultiPartyC..> 22-Dec-2014 07:50 219K
023-RobustnessforFreeinUnconditionalMultiPartyC..> 22-Dec-2014 07:50 218K
024-SecureMultipartyComputationofApproximations..> 22-Dec-2014 07:50 403K
024-SecureMultipartyComputationofApproximations.ps 22-Dec-2014 07:50 401K
025-Cryptanalysisofsomeellipticcurvebasedcrypto..> 20-Jan-2023 14:22 207
026-OCBMode.pdf 22-Dec-2014 07:50 486K
026-OCBMode.ps 22-Dec-2014 07:50 520K
027-ABlockCipherModeofOperationforParallelizabl..> 22-Dec-2014 07:50 185K
027-ABlockCipherModeofOperationforParallelizabl..> 22-Dec-2014 07:50 466K
028-EfficientEncryptionforRichMessageSpacesUnde..> 22-Dec-2014 07:50 156K
028-EfficientEncryptionforRichMessageSpacesUnde..> 22-Dec-2014 07:50 167K
029-Onmultivariatesignatureonlypublickeycryptos..> 22-Dec-2014 07:50 220K
029-Onmultivariatesignatureonlypublickeycryptos..> 22-Dec-2014 07:50 561K
030-OnthePowerofNonlinearSecretSharing.pdf 22-Dec-2014 07:50 238K
030-OnthePowerofNonlinearSecretSharing.ps 22-Dec-2014 07:50 227K
031-EfficientPasswordAuthenticatedKeyExchangeUs..> 22-Dec-2014 07:50 296K
031-EfficientPasswordAuthenticatedKeyExchangeUs..> 22-Dec-2014 07:50 200K
032-EfficientandNonInteractiveNonMalleableCommi..> 22-Dec-2014 07:50 268K
032-EfficientandNonInteractiveNonMalleableCommi..> 22-Dec-2014 07:50 198K
033-DualofNewMethodforUpperBoundingtheMaximumAv..> 22-Dec-2014 07:50 110K
033-DualofNewMethodforUpperBoundingtheMaximumAv..> 22-Dec-2014 07:50 67K
034-CompositionandEfficiencyTradeoffsforForward..> 22-Dec-2014 07:50 316K
034-CompositionandEfficiencyTradeoffsforForward..> 22-Dec-2014 07:50 312K
035-ForwardSecurityinPrivateKeyCryptography.pdf 22-Dec-2014 07:50 362K
035-ForwardSecurityinPrivateKeyCryptography.ps 22-Dec-2014 07:50 362K
036-AntipersistenceHistoryIndependentDataStruct..> 22-Dec-2014 07:50 317K
036-AntipersistenceHistoryIndependentDataStruct..> 22-Dec-2014 07:50 288K
037-EMpoweringSideChannelAttacks.pdf 22-Dec-2014 07:50 631K
037-EMpoweringSideChannelAttacks.ps 22-Dec-2014 07:50 858K
038-FlawsindifferentialcryptanalysisofSkipjack.pdf 22-Dec-2014 07:50 201K
038-FlawsindifferentialcryptanalysisofSkipjack.ps 22-Dec-2014 07:50 168K
039-RobustSoftwareTokensTowardsSecuringaDigital..> 22-Dec-2014 07:50 270K
040-AnalysisofKeyExchangeProtocolsandTheirUsefo..> 22-Dec-2014 07:50 554K
040-AnalysisofKeyExchangeProtocolsandTheirUsefo..> 22-Dec-2014 07:50 556K
041-SolvingEllipticCurveDiscreteLogarithmProble..> 22-Dec-2014 07:50 312K
041-SolvingEllipticCurveDiscreteLogarithmProble..> 22-Dec-2014 07:50 305K
042-SimpleForwardSecureSignaturesFromAnySignatu..> 22-Dec-2014 07:50 239K
042-SimpleForwardSecureSignaturesFromAnySignatu..> 22-Dec-2014 07:49 212K
043-CryptanalysisoftheVesta2MStreamCipher.pdf 22-Dec-2014 07:49 57K
043-CryptanalysisoftheVesta2MStreamCipher.ps 22-Dec-2014 07:49 203K
044-OptimisticAsynchronousMultiPartyContractSig..> 22-Dec-2014 07:49 209K
044-OptimisticAsynchronousMultiPartyContractSig..> 22-Dec-2014 07:49 188K
045-Theorderofencryptionandauthenticationforpro..> 22-Dec-2014 07:49 412K
045-Theorderofencryptionandauthenticationforpro..> 22-Dec-2014 07:49 399K
046-Thesimpleidealciphersystem.pdf 22-Dec-2014 07:49 111K
046-Thesimpleidealciphersystem.ps 22-Dec-2014 07:49 224K
047-ONTHEMETHODOF34XL34ANDITSINEFFICIENCYTOTTM.pdf 20-Jan-2023 14:22 207
047-ONTHEMETHODOFXLANDITSINEFFICIENCYTOTTM.pdf 22-Dec-2014 07:49 185K
047-ONTHEMETHODOFXLANDITSINEFFICIENCYTOTTM.ps 22-Dec-2014 07:49 176K
048-ForwardSecureSignatureswithOptimalSigningan..> 22-Dec-2014 07:49 347K
048-ForwardSecureSignatureswithOptimalSigningan..> 22-Dec-2014 07:49 572K
049-AknownplaintextattackontheISAACkeystreamgen..> 22-Dec-2014 07:49 67K
049-AknownplaintextattackontheISAACkeystreamgen..> 22-Dec-2014 07:49 295K
050-EllipticcurvePaillierschemes.pdf 22-Dec-2014 07:49 177K
050-EllipticcurvePaillierschemes.ps 22-Dec-2014 07:49 157K
051-BlackBoxConcurrentZeroKnowledgeRequirestild..> 22-Dec-2014 07:49 524K
051-BlackBoxConcurrentZeroKnowledgeRequirestild..> 22-Dec-2014 07:49 911K
052-DifferentialProbabilityofModularAdditionwit..> 22-Dec-2014 07:49 51K
053-SecurityProofsfortheRSAPSSSignatureSchemean..> 22-Dec-2014 07:49 370K
053-SecurityProofsfortheRSAPSSSignatureSchemean..> 22-Dec-2014 07:49 358K
054-ExtendingtheGHSWeilDescentAttack.pdf 22-Dec-2014 07:49 247K
054-ExtendingtheGHSWeilDescentAttack.ps 22-Dec-2014 07:49 219K
055-UniversallyComposableCommitments.pdf 22-Dec-2014 07:49 431K
055-UniversallyComposableCommitments.ps 22-Dec-2014 07:49 330K
056-OntheComplexityofMatsui39sAttack.pdf 20-Jan-2023 08:41 251K
056-OntheComplexityofMatsuisAttack.pdf 22-Dec-2014 07:49 249K
056-OntheComplexityofMatsuisAttack.ps 22-Dec-2014 07:49 218K
057-OntheSecurityoftheSPEKEPasswordAuthenticate..> 22-Dec-2014 07:49 284K
057-OntheSecurityoftheSPEKEPasswordAuthenticate..> 22-Dec-2014 07:49 538K
058-EfficientZeroknowledgeAuthenticationBasedon..> 22-Dec-2014 07:49 210K
058-EfficientZeroknowledgeAuthenticationBasedon..> 22-Dec-2014 07:49 533K
059-RevocationandTracingSchemesforStatelessRece..> 22-Dec-2014 07:49 274K
060-TheSecurityofPracticalTwoPartyRSASignatureS..> 22-Dec-2014 07:49 362K
060-TheSecurityofPracticalTwoPartyRSASignatureS..> 22-Dec-2014 07:49 373K
061-ClockControlledShiftRegistersforKeyStreamGe..> 22-Dec-2014 07:49 233K
061-ClockControlledShiftRegistersforKeyStreamGe..> 22-Dec-2014 07:49 497K
062-OptimalsecurityproofsforPSSandothersignatur..> 22-Dec-2014 07:48 364K
062-OptimalsecurityproofsforPSSandothersignatur..> 22-Dec-2014 07:48 405K
063-ResettablySoundZeroKnowledgeanditsApplicati..> 22-Dec-2014 07:48 491K
063-ResettablySoundZeroKnowledgeanditsApplicati..> 22-Dec-2014 07:48 791K
064-AnIntegerCommitmentSchemebasedonGroupswithH..> 22-Dec-2014 07:48 147K
064-AnIntegerCommitmentSchemebasedonGroupswithH..> 22-Dec-2014 07:48 287K
065-AnalysisofchosenplaintextattacksontheWAKESt..> 22-Dec-2014 07:48 54K
065-AnalysisofchosenplaintextattacksontheWAKESt..> 22-Dec-2014 07:48 207K
066-IMPROVEDPUBLICKEYCRYPTOSYSTEMUSINGFINITENON..> 22-Dec-2014 07:48 172K
066-IMPROVEDPUBLICKEYCRYPTOSYSTEMUSINGFINITENON..> 22-Dec-2014 07:48 167K
067-AnAttackonATraitorTracingScheme.pdf 22-Dec-2014 07:48 177K
068-SQUAREAttacksonReducedRoundPESandIDEABlockC..> 22-Dec-2014 07:48 233K
068-SQUAREAttacksonReducedRoundPESandIDEABlockC..> 22-Dec-2014 07:48 286K
069-OntheImpossibilityofObfuscatingPrograms.pdf 22-Dec-2014 07:48 498K
069-OntheImpossibilityofObfuscatingPrograms.ps 22-Dec-2014 07:48 566K
070-SecurityAssessmentofHierocryptandRijndaelag..> 22-Dec-2014 07:48 242K
070-SecurityAssessmentofHierocryptandRijndaelag..> 22-Dec-2014 07:48 617K
071-MultiRecipientPublicKeyEncryptionwithShorte..> 22-Dec-2014 07:48 280K
071-MultiRecipientPublicKeyEncryptionwithShorte..> 22-Dec-2014 07:48 334K
072-OntheGoubinCourtoisAttackonTTM.pdf 22-Dec-2014 07:48 212K
072-OntheGoubinCourtoisAttackonTTM.ps 22-Dec-2014 07:48 231K
073-Efficientoblivioustransferschemes.pdf 22-Dec-2014 07:48 173K
073-Efficientoblivioustransferschemes.ps 22-Dec-2014 07:48 462K
074-OntheSecurityofRandomizedCBCMACBeyondtheBir..> 22-Dec-2014 07:48 323K
074-OntheSecurityofRandomizedCBCMACBeyondtheBir..> 22-Dec-2014 07:48 353K
075-PseudoRandomFunctionsandFactoring.pdf 22-Dec-2014 07:48 357K
075-PseudoRandomFunctionsandFactoring.ps 22-Dec-2014 07:48 664K
076-CommunicationComplexityandSecureFunctionEva..> 22-Dec-2014 07:48 488K
076-CommunicationComplexityandSecureFunctionEva..> 22-Dec-2014 07:48 998K
077-ATimeMemoryTradeoffAttackAgainstLILI128.pdf 22-Dec-2014 07:48 150K
077-ATimeMemoryTradeoffAttackAgainstLILI128.ps 22-Dec-2014 07:48 121K
078-TheCOSStreamCiphersareExtremelyWeak.pdf 22-Dec-2014 07:48 18K
078-TheCOSStreamCiphersareExtremelyWeak.ps 22-Dec-2014 07:48 113K
079-AuthenticatedEncryptioninthePublicKeySettin..> 22-Dec-2014 07:48 502K
079-AuthenticatedEncryptioninthePublicKeySettin..> 22-Dec-2014 07:47 582K
080-COSCiphersarenot34extremelyweak34TheDesignR..> 20-Jan-2023 14:22 207
080-COSCiphersarenotextremelyweakTheDesignRatio..> 22-Dec-2014 07:47 110K
080-COSCiphersarenotextremelyweakTheDesignRatio..> 22-Dec-2014 07:47 88K
081-ASufficientConditionforSecurePingPongProtoc..> 22-Dec-2014 07:47 100K
081-ASufficientConditionforSecurePingPongProtoc..> 22-Dec-2014 07:47 302K
082-ADescriptionofProtocolsforPrivateCredential..> 22-Dec-2014 07:47 82K
083-OntheConstructingofHighlyNonlinearResilient..> 22-Dec-2014 07:47 230K
083-OntheConstructingofHighlyNonlinearResilient..> 22-Dec-2014 07:47 218K
084-AnalysisoftheGHSWeilDescentAttackontheECDLP..> 22-Dec-2014 07:47 473K
084-AnalysisoftheGHSWeilDescentAttackontheECDLP..> 22-Dec-2014 07:47 592K
085-UniversalHashProofsandaParadigmforAdaptiveC..> 22-Dec-2014 07:47 420K
085-UniversalHashProofsandaParadigmforAdaptiveC..> 22-Dec-2014 07:47 475K
086-StatisticalZeroKnowledgeProofsfromDiophanti..> 22-Dec-2014 07:47 201K
086-StatisticalZeroKnowledgeProofsfromDiophanti..> 22-Dec-2014 07:47 205K
087-ALinearAlgebraicApproachtoMeteringSchemes.pdf 22-Dec-2014 07:47 227K
087-ALinearAlgebraicApproachtoMeteringSchemes.ps 22-Dec-2014 07:47 211K
088-Improvingthetradeoffbetweenstorageandcommun..> 22-Dec-2014 07:47 197K
088-Improvingthetradeoffbetweenstorageandcommun..> 22-Dec-2014 07:47 202K
089-Linearbroadcastencryptionschemes.pdf 22-Dec-2014 07:47 230K
089-Linearbroadcastencryptionschemes.ps 22-Dec-2014 07:47 235K
090-IdentityBasedEncryptionFromtheWeilPairing.pdf 22-Dec-2014 07:47 345K
090-IdentityBasedEncryptionFromtheWeilPairing.ps 22-Dec-2014 07:47 367K
091-PerfectHidingandPerfectBindingUniversallyCo..> 22-Dec-2014 07:47 396K
091-PerfectHidingandPerfectBindingUniversallyCo..> 22-Dec-2014 07:47 501K
092-BDDbasedCryptanalysisofKeystreamGenerators.pdf 22-Dec-2014 07:47 256K
092-BDDbasedCryptanalysisofKeystreamGenerators.ps 22-Dec-2014 07:47 249K
093-ThresholdCryptosystemsBasedonFactoring.pdf 22-Dec-2014 07:47 165K
093-ThresholdCryptosystemsBasedonFactoring.ps 22-Dec-2014 07:47 300K
094-Slopepackingsandcoveringsandgenericalgorith..> 22-Dec-2014 07:47 200K
094-Slopepackingsandcoveringsandgenericalgorith..> 22-Dec-2014 07:47 158K
095-SecureVickreyAuctionswithoutThresholdTrust.pdf 22-Dec-2014 07:47 202K
095-SecureVickreyAuctionswithoutThresholdTrust.ps 22-Dec-2014 07:47 171K
096-Constructingellipticcurveswithagivennumbero..> 22-Dec-2014 07:47 257K
096-Constructingellipticcurveswithagivennumbero..> 22-Dec-2014 07:47 248K
097-AnEfficientMACforShortMessages.pdf 22-Dec-2014 07:47 201K
097-AnEfficientMACforShortMessages.ps 22-Dec-2014 07:47 201K
098-Fasthashingontoellipticcurvesoverfieldsofch..> 22-Dec-2014 07:47 209K
098-Fasthashingontoellipticcurvesoverfieldsofch..> 22-Dec-2014 07:47 178K
099-LinearCodeImpliesPublicKeyTraitorTracing.pdf 22-Dec-2014 07:47 145K
099-LinearCodeImpliesPublicKeyTraitorTracing.ps 22-Dec-2014 07:46 421K
100-ANoteonGirault39sSelfCertifiedModel.pdf 20-Jan-2023 14:22 207
100-ANoteonGiraultsSelfCertifiedModel.pdf 22-Dec-2014 07:46 124K
100-ANoteonGiraultsSelfCertifiedModel.ps 22-Dec-2014 07:46 211K
101-QuasiEfficientRevocationofGroupSignatures.pdf 22-Dec-2014 07:46 110K
102-AnExtendedQuadraticFrobeniusPrimalityTestwi..> 22-Dec-2014 07:46 310K
102-AnExtendedQuadraticFrobeniusPrimalityTestwi..> 22-Dec-2014 07:46 560K
103-CountermeasuresagainstSideChannelAttacksfor..> 22-Dec-2014 07:46 196K
103-CountermeasuresagainstSideChannelAttacksfor..> 22-Dec-2014 07:46 193K
104-ConcurrentZeroKnowledgeWithTimingRevisited.pdf 22-Dec-2014 07:46 468K
104-ConcurrentZeroKnowledgeWithTimingRevisited.ps 22-Dec-2014 07:46 818K
105-UniversalArgumentsandtheirApplications.pdf 22-Dec-2014 07:46 364K
105-UniversalArgumentsandtheirApplications.ps 22-Dec-2014 07:46 650K
106-CryptanalysisoftheCOS2128StreamCiphers.pdf 22-Dec-2014 07:46 50K
106-CryptanalysisoftheCOS2128StreamCiphers.ps 22-Dec-2014 07:46 386K
107-ParallelCoinTossingandConstantRoundSecureTw..> 22-Dec-2014 07:46 396K
107-ParallelCoinTossingandConstantRoundSecureTw..> 22-Dec-2014 07:46 591K
108-DesignandAnalysisofPracticalPublicKeyEncryp..> 22-Dec-2014 07:46 560K
108-DesignandAnalysisofPracticalPublicKeyEncryp..> 22-Dec-2014 07:46 631K
109-NewNotionsofSoundnessandSimultaneousResetta..> 22-Dec-2014 07:46 486K
110-RSAhybridencryptionschemes.pdf 22-Dec-2014 07:46 221K
110-RSAhybridencryptionschemes.ps 22-Dec-2014 07:46 187K
111-AnIdentityBasedAuthenticatedKeyAgreementPro..> 22-Dec-2014 07:46 149K
111-AnIdentityBasedAuthenticatedKeyAgreementPro..> 22-Dec-2014 07:46 114K
112-AProposalforanISOStandardforPublicKeyEncryp..> 22-Dec-2014 07:46 473K
112-AProposalforanISOStandardforPublicKeyEncryp..> 22-Dec-2014 07:46 506K
113-EfficientRevocationofAnonymousGroupMembersh..> 22-Dec-2014 07:46 244K