Index of /2001/


../
001-EfficientAlgorithmsforComputingDifferential..> 22-Dec-2014 07:52    205K
001-EfficientAlgorithmsforComputingDifferential..> 22-Dec-2014 07:52    209K
002-TheOneMoreRSAInversionProblemsandtheSecurit..> 20-Jan-2023 08:42    273K
002-TheOneMoreRSAInversionProblemsandtheSecurit..> 22-Dec-2014 07:52    375K
002-TheOneMoreRSAInversionProblemsandtheSecurit..> 22-Dec-2014 07:52    361K
003-SeparatingDecisionDiffieHellmanfromDiffieHe..> 22-Dec-2014 07:51    168K
003-SeparatingDecisionDiffieHellmanfromDiffieHe..> 22-Dec-2014 07:51    131K
004-MinRankproblemandZeroknowledgeauthenticatio..> 20-Jan-2023 14:22     207
005-ANoteonCryptanalysisofthePreliminaryVersion..> 22-Dec-2014 07:51    152K
005-ANoteonCryptanalysisofthePreliminaryVersion..> 22-Dec-2014 07:51    144K
006-SecureandEfficientAsynchronousBroadcastProt..> 22-Dec-2014 07:51    430K
006-SecureandEfficientAsynchronousBroadcastProt..> 22-Dec-2014 07:51    453K
007-Are39Strong39PrimesNeededforRSA.pdf            20-Jan-2023 14:22     207
007-AreStrongPrimesNeededforRSA.pdf                22-Dec-2014 07:51    245K
007-AreStrongPrimesNeededforRSA.ps                 22-Dec-2014 07:51      1M
008-FullyDistributedThresholdRSAunderStandardAs..> 22-Dec-2014 07:51    269K
008-FullyDistributedThresholdRSAunderStandardAs..> 22-Dec-2014 07:51    248K
009-Robustkeyevolvingpublickeyencryptionschemes..> 22-Dec-2014 07:51    246K
009-Robustkeyevolvingpublickeyencryptionschemes.ps 22-Dec-2014 07:51    229K
010-HowtoachieveaMcEliecebasedDigitalSignatureS..> 22-Dec-2014 07:51    298K
010-HowtoachieveaMcEliecebasedDigitalSignatureS..> 22-Dec-2014 07:51    294K
011-NewZeroknowledgeUndeniableSignaturesForgery..> 22-Dec-2014 07:51    251K
011-NewZeroknowledgeUndeniableSignaturesForgery..> 22-Dec-2014 07:51    237K
012-CipherswithArbitraryFiniteDomains.pdf          22-Dec-2014 07:51    289K
012-CipherswithArbitraryFiniteDomains.ps           22-Dec-2014 07:51    284K
013-DigitallyWatermarkingRSAModuli.pdf             22-Dec-2014 07:51    115K
013-DigitallyWatermarkingRSAModuli.ps              22-Dec-2014 07:51    279K
014-TimedReleaseCryptography.pdf                   22-Dec-2014 07:51    282K
014-TimedReleaseCryptography.ps                    22-Dec-2014 07:51    264K
015-AnobservationregardingJutla39smodesofoperat..> 20-Jan-2023 08:41    263K
015-AnobservationregardingJutlasmodesofoperatio..> 22-Dec-2014 07:51    279K
015-AnobservationregardingJutlasmodesofoperatio..> 22-Dec-2014 07:51    269K
016-EfficientTraitorTracingAlgorithmsusingListD..> 22-Dec-2014 07:51    246K
016-EfficientTraitorTracingAlgorithmsusingListD..> 22-Dec-2014 07:51    380K
017-Onadaptivevsnonadaptivesecurityofmultiparty..> 22-Dec-2014 07:51    352K
017-Onadaptivevsnonadaptivesecurityofmultiparty..> 22-Dec-2014 07:51    566K
018-AnalysisofaSubsetSumRandomizer.pdf             22-Dec-2014 07:51    113K
018-AnalysisofaSubsetSumRandomizer.ps              22-Dec-2014 07:51    276K
019-AnEfficientSystemforNontransferableAnonymou..> 22-Dec-2014 07:51    372K
019-AnEfficientSystemforNontransferableAnonymou..> 22-Dec-2014 07:51    387K
020-Someobservationsonthetheoryofcryptographich..> 22-Dec-2014 07:51    232K
020-Someobservationsonthetheoryofcryptographich..> 22-Dec-2014 07:51    158K
021-TheRectangleAttackRectanglingtheSerpent.pdf    22-Dec-2014 07:51    207K
021-TheRectangleAttackRectanglingtheSerpent.ps     22-Dec-2014 07:51    618K
022-OptimisticAsynchronousAtomicBroadcast.pdf      22-Dec-2014 07:51    306K
022-OptimisticAsynchronousAtomicBroadcast.ps       22-Dec-2014 07:51    303K
023-RobustnessforFreeinUnconditionalMultiPartyC..> 22-Dec-2014 07:50    219K
023-RobustnessforFreeinUnconditionalMultiPartyC..> 22-Dec-2014 07:50    218K
024-SecureMultipartyComputationofApproximations..> 22-Dec-2014 07:50    403K
024-SecureMultipartyComputationofApproximations.ps 22-Dec-2014 07:50    401K
025-Cryptanalysisofsomeellipticcurvebasedcrypto..> 20-Jan-2023 14:22     207
026-OCBMode.pdf                                    22-Dec-2014 07:50    486K
026-OCBMode.ps                                     22-Dec-2014 07:50    520K
027-ABlockCipherModeofOperationforParallelizabl..> 22-Dec-2014 07:50    185K
027-ABlockCipherModeofOperationforParallelizabl..> 22-Dec-2014 07:50    466K
028-EfficientEncryptionforRichMessageSpacesUnde..> 22-Dec-2014 07:50    156K
028-EfficientEncryptionforRichMessageSpacesUnde..> 22-Dec-2014 07:50    167K
029-Onmultivariatesignatureonlypublickeycryptos..> 22-Dec-2014 07:50    220K
029-Onmultivariatesignatureonlypublickeycryptos..> 22-Dec-2014 07:50    561K
030-OnthePowerofNonlinearSecretSharing.pdf         22-Dec-2014 07:50    238K
030-OnthePowerofNonlinearSecretSharing.ps          22-Dec-2014 07:50    227K
031-EfficientPasswordAuthenticatedKeyExchangeUs..> 22-Dec-2014 07:50    296K
031-EfficientPasswordAuthenticatedKeyExchangeUs..> 22-Dec-2014 07:50    200K
032-EfficientandNonInteractiveNonMalleableCommi..> 22-Dec-2014 07:50    268K
032-EfficientandNonInteractiveNonMalleableCommi..> 22-Dec-2014 07:50    198K
033-DualofNewMethodforUpperBoundingtheMaximumAv..> 22-Dec-2014 07:50    110K
033-DualofNewMethodforUpperBoundingtheMaximumAv..> 22-Dec-2014 07:50     67K
034-CompositionandEfficiencyTradeoffsforForward..> 22-Dec-2014 07:50    316K
034-CompositionandEfficiencyTradeoffsforForward..> 22-Dec-2014 07:50    312K
035-ForwardSecurityinPrivateKeyCryptography.pdf    22-Dec-2014 07:50    362K
035-ForwardSecurityinPrivateKeyCryptography.ps     22-Dec-2014 07:50    362K
036-AntipersistenceHistoryIndependentDataStruct..> 22-Dec-2014 07:50    317K
036-AntipersistenceHistoryIndependentDataStruct..> 22-Dec-2014 07:50    288K
037-EMpoweringSideChannelAttacks.pdf               22-Dec-2014 07:50    631K
037-EMpoweringSideChannelAttacks.ps                22-Dec-2014 07:50    858K
038-FlawsindifferentialcryptanalysisofSkipjack.pdf 22-Dec-2014 07:50    201K
038-FlawsindifferentialcryptanalysisofSkipjack.ps  22-Dec-2014 07:50    168K
039-RobustSoftwareTokensTowardsSecuringaDigital..> 22-Dec-2014 07:50    270K
040-AnalysisofKeyExchangeProtocolsandTheirUsefo..> 22-Dec-2014 07:50    554K
040-AnalysisofKeyExchangeProtocolsandTheirUsefo..> 22-Dec-2014 07:50    556K
041-SolvingEllipticCurveDiscreteLogarithmProble..> 22-Dec-2014 07:50    312K
041-SolvingEllipticCurveDiscreteLogarithmProble..> 22-Dec-2014 07:50    305K
042-SimpleForwardSecureSignaturesFromAnySignatu..> 22-Dec-2014 07:50    239K
042-SimpleForwardSecureSignaturesFromAnySignatu..> 22-Dec-2014 07:49    212K
043-CryptanalysisoftheVesta2MStreamCipher.pdf      22-Dec-2014 07:49     57K
043-CryptanalysisoftheVesta2MStreamCipher.ps       22-Dec-2014 07:49    203K
044-OptimisticAsynchronousMultiPartyContractSig..> 22-Dec-2014 07:49    209K
044-OptimisticAsynchronousMultiPartyContractSig..> 22-Dec-2014 07:49    188K
045-Theorderofencryptionandauthenticationforpro..> 22-Dec-2014 07:49    412K
045-Theorderofencryptionandauthenticationforpro..> 22-Dec-2014 07:49    399K
046-Thesimpleidealciphersystem.pdf                 22-Dec-2014 07:49    111K
046-Thesimpleidealciphersystem.ps                  22-Dec-2014 07:49    224K
047-ONTHEMETHODOF34XL34ANDITSINEFFICIENCYTOTTM.pdf 20-Jan-2023 14:22     207
047-ONTHEMETHODOFXLANDITSINEFFICIENCYTOTTM.pdf     22-Dec-2014 07:49    185K
047-ONTHEMETHODOFXLANDITSINEFFICIENCYTOTTM.ps      22-Dec-2014 07:49    176K
048-ForwardSecureSignatureswithOptimalSigningan..> 22-Dec-2014 07:49    347K
048-ForwardSecureSignatureswithOptimalSigningan..> 22-Dec-2014 07:49    572K
049-AknownplaintextattackontheISAACkeystreamgen..> 22-Dec-2014 07:49     67K
049-AknownplaintextattackontheISAACkeystreamgen..> 22-Dec-2014 07:49    295K
050-EllipticcurvePaillierschemes.pdf               22-Dec-2014 07:49    177K
050-EllipticcurvePaillierschemes.ps                22-Dec-2014 07:49    157K
051-BlackBoxConcurrentZeroKnowledgeRequirestild..> 22-Dec-2014 07:49    524K
051-BlackBoxConcurrentZeroKnowledgeRequirestild..> 22-Dec-2014 07:49    911K
052-DifferentialProbabilityofModularAdditionwit..> 22-Dec-2014 07:49     51K
053-SecurityProofsfortheRSAPSSSignatureSchemean..> 22-Dec-2014 07:49    370K
053-SecurityProofsfortheRSAPSSSignatureSchemean..> 22-Dec-2014 07:49    358K
054-ExtendingtheGHSWeilDescentAttack.pdf           22-Dec-2014 07:49    247K
054-ExtendingtheGHSWeilDescentAttack.ps            22-Dec-2014 07:49    219K
055-UniversallyComposableCommitments.pdf           22-Dec-2014 07:49    431K
055-UniversallyComposableCommitments.ps            22-Dec-2014 07:49    330K
056-OntheComplexityofMatsui39sAttack.pdf           20-Jan-2023 08:41    251K
056-OntheComplexityofMatsuisAttack.pdf             22-Dec-2014 07:49    249K
056-OntheComplexityofMatsuisAttack.ps              22-Dec-2014 07:49    218K
057-OntheSecurityoftheSPEKEPasswordAuthenticate..> 22-Dec-2014 07:49    284K
057-OntheSecurityoftheSPEKEPasswordAuthenticate..> 22-Dec-2014 07:49    538K
058-EfficientZeroknowledgeAuthenticationBasedon..> 22-Dec-2014 07:49    210K
058-EfficientZeroknowledgeAuthenticationBasedon..> 22-Dec-2014 07:49    533K
059-RevocationandTracingSchemesforStatelessRece..> 22-Dec-2014 07:49    274K
060-TheSecurityofPracticalTwoPartyRSASignatureS..> 22-Dec-2014 07:49    362K
060-TheSecurityofPracticalTwoPartyRSASignatureS..> 22-Dec-2014 07:49    373K
061-ClockControlledShiftRegistersforKeyStreamGe..> 22-Dec-2014 07:49    233K
061-ClockControlledShiftRegistersforKeyStreamGe..> 22-Dec-2014 07:49    497K
062-OptimalsecurityproofsforPSSandothersignatur..> 22-Dec-2014 07:48    364K
062-OptimalsecurityproofsforPSSandothersignatur..> 22-Dec-2014 07:48    405K
063-ResettablySoundZeroKnowledgeanditsApplicati..> 22-Dec-2014 07:48    491K
063-ResettablySoundZeroKnowledgeanditsApplicati..> 22-Dec-2014 07:48    791K
064-AnIntegerCommitmentSchemebasedonGroupswithH..> 22-Dec-2014 07:48    147K
064-AnIntegerCommitmentSchemebasedonGroupswithH..> 22-Dec-2014 07:48    287K
065-AnalysisofchosenplaintextattacksontheWAKESt..> 22-Dec-2014 07:48     54K
065-AnalysisofchosenplaintextattacksontheWAKESt..> 22-Dec-2014 07:48    207K
066-IMPROVEDPUBLICKEYCRYPTOSYSTEMUSINGFINITENON..> 22-Dec-2014 07:48    172K
066-IMPROVEDPUBLICKEYCRYPTOSYSTEMUSINGFINITENON..> 22-Dec-2014 07:48    167K
067-AnAttackonATraitorTracingScheme.pdf            22-Dec-2014 07:48    177K
068-SQUAREAttacksonReducedRoundPESandIDEABlockC..> 22-Dec-2014 07:48    233K
068-SQUAREAttacksonReducedRoundPESandIDEABlockC..> 22-Dec-2014 07:48    286K
069-OntheImpossibilityofObfuscatingPrograms.pdf    22-Dec-2014 07:48    498K
069-OntheImpossibilityofObfuscatingPrograms.ps     22-Dec-2014 07:48    566K
070-SecurityAssessmentofHierocryptandRijndaelag..> 22-Dec-2014 07:48    242K
070-SecurityAssessmentofHierocryptandRijndaelag..> 22-Dec-2014 07:48    617K
071-MultiRecipientPublicKeyEncryptionwithShorte..> 22-Dec-2014 07:48    280K
071-MultiRecipientPublicKeyEncryptionwithShorte..> 22-Dec-2014 07:48    334K
072-OntheGoubinCourtoisAttackonTTM.pdf             22-Dec-2014 07:48    212K
072-OntheGoubinCourtoisAttackonTTM.ps              22-Dec-2014 07:48    231K
073-Efficientoblivioustransferschemes.pdf          22-Dec-2014 07:48    173K
073-Efficientoblivioustransferschemes.ps           22-Dec-2014 07:48    462K
074-OntheSecurityofRandomizedCBCMACBeyondtheBir..> 22-Dec-2014 07:48    323K
074-OntheSecurityofRandomizedCBCMACBeyondtheBir..> 22-Dec-2014 07:48    353K
075-PseudoRandomFunctionsandFactoring.pdf          22-Dec-2014 07:48    357K
075-PseudoRandomFunctionsandFactoring.ps           22-Dec-2014 07:48    664K
076-CommunicationComplexityandSecureFunctionEva..> 22-Dec-2014 07:48    488K
076-CommunicationComplexityandSecureFunctionEva..> 22-Dec-2014 07:48    998K
077-ATimeMemoryTradeoffAttackAgainstLILI128.pdf    22-Dec-2014 07:48    150K
077-ATimeMemoryTradeoffAttackAgainstLILI128.ps     22-Dec-2014 07:48    121K
078-TheCOSStreamCiphersareExtremelyWeak.pdf        22-Dec-2014 07:48     18K
078-TheCOSStreamCiphersareExtremelyWeak.ps         22-Dec-2014 07:48    113K
079-AuthenticatedEncryptioninthePublicKeySettin..> 22-Dec-2014 07:48    502K
079-AuthenticatedEncryptioninthePublicKeySettin..> 22-Dec-2014 07:47    582K
080-COSCiphersarenot34extremelyweak34TheDesignR..> 20-Jan-2023 14:22     207
080-COSCiphersarenotextremelyweakTheDesignRatio..> 22-Dec-2014 07:47    110K
080-COSCiphersarenotextremelyweakTheDesignRatio..> 22-Dec-2014 07:47     88K
081-ASufficientConditionforSecurePingPongProtoc..> 22-Dec-2014 07:47    100K
081-ASufficientConditionforSecurePingPongProtoc..> 22-Dec-2014 07:47    302K
082-ADescriptionofProtocolsforPrivateCredential..> 22-Dec-2014 07:47     82K
083-OntheConstructingofHighlyNonlinearResilient..> 22-Dec-2014 07:47    230K
083-OntheConstructingofHighlyNonlinearResilient..> 22-Dec-2014 07:47    218K
084-AnalysisoftheGHSWeilDescentAttackontheECDLP..> 22-Dec-2014 07:47    473K
084-AnalysisoftheGHSWeilDescentAttackontheECDLP..> 22-Dec-2014 07:47    592K
085-UniversalHashProofsandaParadigmforAdaptiveC..> 22-Dec-2014 07:47    420K
085-UniversalHashProofsandaParadigmforAdaptiveC..> 22-Dec-2014 07:47    475K
086-StatisticalZeroKnowledgeProofsfromDiophanti..> 22-Dec-2014 07:47    201K
086-StatisticalZeroKnowledgeProofsfromDiophanti..> 22-Dec-2014 07:47    205K
087-ALinearAlgebraicApproachtoMeteringSchemes.pdf  22-Dec-2014 07:47    227K
087-ALinearAlgebraicApproachtoMeteringSchemes.ps   22-Dec-2014 07:47    211K
088-Improvingthetradeoffbetweenstorageandcommun..> 22-Dec-2014 07:47    197K
088-Improvingthetradeoffbetweenstorageandcommun..> 22-Dec-2014 07:47    202K
089-Linearbroadcastencryptionschemes.pdf           22-Dec-2014 07:47    230K
089-Linearbroadcastencryptionschemes.ps            22-Dec-2014 07:47    235K
090-IdentityBasedEncryptionFromtheWeilPairing.pdf  22-Dec-2014 07:47    345K
090-IdentityBasedEncryptionFromtheWeilPairing.ps   22-Dec-2014 07:47    367K
091-PerfectHidingandPerfectBindingUniversallyCo..> 22-Dec-2014 07:47    396K
091-PerfectHidingandPerfectBindingUniversallyCo..> 22-Dec-2014 07:47    501K
092-BDDbasedCryptanalysisofKeystreamGenerators.pdf 22-Dec-2014 07:47    256K
092-BDDbasedCryptanalysisofKeystreamGenerators.ps  22-Dec-2014 07:47    249K
093-ThresholdCryptosystemsBasedonFactoring.pdf     22-Dec-2014 07:47    165K
093-ThresholdCryptosystemsBasedonFactoring.ps      22-Dec-2014 07:47    300K
094-Slopepackingsandcoveringsandgenericalgorith..> 22-Dec-2014 07:47    200K
094-Slopepackingsandcoveringsandgenericalgorith..> 22-Dec-2014 07:47    158K
095-SecureVickreyAuctionswithoutThresholdTrust.pdf 22-Dec-2014 07:47    202K
095-SecureVickreyAuctionswithoutThresholdTrust.ps  22-Dec-2014 07:47    171K
096-Constructingellipticcurveswithagivennumbero..> 22-Dec-2014 07:47    257K
096-Constructingellipticcurveswithagivennumbero..> 22-Dec-2014 07:47    248K
097-AnEfficientMACforShortMessages.pdf             22-Dec-2014 07:47    201K
097-AnEfficientMACforShortMessages.ps              22-Dec-2014 07:47    201K
098-Fasthashingontoellipticcurvesoverfieldsofch..> 22-Dec-2014 07:47    209K
098-Fasthashingontoellipticcurvesoverfieldsofch..> 22-Dec-2014 07:47    178K
099-LinearCodeImpliesPublicKeyTraitorTracing.pdf   22-Dec-2014 07:47    145K
099-LinearCodeImpliesPublicKeyTraitorTracing.ps    22-Dec-2014 07:46    421K
100-ANoteonGirault39sSelfCertifiedModel.pdf        20-Jan-2023 14:22     207
100-ANoteonGiraultsSelfCertifiedModel.pdf          22-Dec-2014 07:46    124K
100-ANoteonGiraultsSelfCertifiedModel.ps           22-Dec-2014 07:46    211K
101-QuasiEfficientRevocationofGroupSignatures.pdf  22-Dec-2014 07:46    110K
102-AnExtendedQuadraticFrobeniusPrimalityTestwi..> 22-Dec-2014 07:46    310K
102-AnExtendedQuadraticFrobeniusPrimalityTestwi..> 22-Dec-2014 07:46    560K
103-CountermeasuresagainstSideChannelAttacksfor..> 22-Dec-2014 07:46    196K
103-CountermeasuresagainstSideChannelAttacksfor..> 22-Dec-2014 07:46    193K
104-ConcurrentZeroKnowledgeWithTimingRevisited.pdf 22-Dec-2014 07:46    468K
104-ConcurrentZeroKnowledgeWithTimingRevisited.ps  22-Dec-2014 07:46    818K
105-UniversalArgumentsandtheirApplications.pdf     22-Dec-2014 07:46    364K
105-UniversalArgumentsandtheirApplications.ps      22-Dec-2014 07:46    650K
106-CryptanalysisoftheCOS2128StreamCiphers.pdf     22-Dec-2014 07:46     50K
106-CryptanalysisoftheCOS2128StreamCiphers.ps      22-Dec-2014 07:46    386K
107-ParallelCoinTossingandConstantRoundSecureTw..> 22-Dec-2014 07:46    396K
107-ParallelCoinTossingandConstantRoundSecureTw..> 22-Dec-2014 07:46    591K
108-DesignandAnalysisofPracticalPublicKeyEncryp..> 22-Dec-2014 07:46    560K
108-DesignandAnalysisofPracticalPublicKeyEncryp..> 22-Dec-2014 07:46    631K
109-NewNotionsofSoundnessandSimultaneousResetta..> 22-Dec-2014 07:46    486K
110-RSAhybridencryptionschemes.pdf                 22-Dec-2014 07:46    221K
110-RSAhybridencryptionschemes.ps                  22-Dec-2014 07:46    187K
111-AnIdentityBasedAuthenticatedKeyAgreementPro..> 22-Dec-2014 07:46    149K
111-AnIdentityBasedAuthenticatedKeyAgreementPro..> 22-Dec-2014 07:46    114K
112-AProposalforanISOStandardforPublicKeyEncryp..> 22-Dec-2014 07:46    473K
112-AProposalforanISOStandardforPublicKeyEncryp..> 22-Dec-2014 07:46    506K
113-EfficientRevocationofAnonymousGroupMembersh..> 22-Dec-2014 07:46    244K