Index of /2002/


../
001-FractalHashSequenceRepresentationandTravers..> 22-Dec-2014 08:02     95K
001-FractalHashSequenceRepresentationandTravers..> 22-Dec-2014 08:02    229K
002-EvaluatingSecurityofVotingSchemesintheUnive..> 22-Dec-2014 08:02    261K
002-EvaluatingSecurityofVotingSchemesintheUnive..> 22-Dec-2014 08:02    257K
003-SquareAttacksonReducedRoundVariantsoftheSki..> 22-Dec-2014 08:02    2217
003-SquareAttacksonReducedRoundVariantsoftheSki..> 22-Dec-2014 08:02    215K
004-IDbasedSignaturesfromPairingsonEllipticCurv..> 22-Dec-2014 08:02    120K
004-IDbasedSignaturesfromPairingsonEllipticCurv..> 22-Dec-2014 08:02     95K
005-CryptanalysisofStreamCipherCOS2128ModeI.pdf    22-Dec-2014 08:02    166K
005-CryptanalysisofStreamCipherCOS2128ModeI.ps     22-Dec-2014 08:02    145K
006-Thebestandworstofsupersingularabelianvariet..> 22-Dec-2014 08:02    274K
007-Parallelscalarmultiplicationongeneralellipt..> 22-Dec-2014 08:02    175K
007-Parallelscalarmultiplicationongeneralellipt..> 22-Dec-2014 08:02    156K
008-EfficientAlgorithmsforPairingBasedCryptosys..> 22-Dec-2014 08:02    256K
008-EfficientAlgorithmsforPairingBasedCryptosys..> 22-Dec-2014 08:02    234K
009-TreebasedGroupKeyAgreement.pdf                 22-Dec-2014 08:02    334K
009-TreebasedGroupKeyAgreement.ps                  22-Dec-2014 08:02    668K
010-CutandPasteAttackswithJava.pdf                 22-Dec-2014 08:02    413K
010-CutandPasteAttackswithJava.ps                  22-Dec-2014 08:02      5M
011-OptimalChosenCiphertextSecureEncryptionofAr..> 22-Dec-2014 08:02    345K
011-OptimalChosenCiphertextSecureEncryptionofAr..> 22-Dec-2014 08:01    351K
012-ExponentGroupSignatureSchemesandEfficientId..> 22-Dec-2014 08:01    212K
012-ExponentGroupSignatureSchemesandEfficientId..> 22-Dec-2014 08:01    189K
013-GenericLowerBoundsforRootExtractionandSigna..> 22-Dec-2014 08:01    294K
013-GenericLowerBoundsforRootExtractionandSigna..> 22-Dec-2014 08:01    291K
014-BetterthanBiBaShortOnetimeSignatureswithFas..> 22-Dec-2014 08:01    137K
014-BetterthanBiBaShortOnetimeSignatureswithFas..> 22-Dec-2014 08:01    309K
015-Securityproofsofcryptographicprotocols.pdf     22-Dec-2014 08:01    203K
016-ContentExtractionSignatures.pdf                22-Dec-2014 08:01    397K
017-TheCramerShoupStrongRSASignatureSchemeRevis..> 22-Dec-2014 08:01    213K
017-TheCramerShoupStrongRSASignatureSchemeRevis..> 22-Dec-2014 08:01    245K
018-AnIdentityBasedSignaturefromGapDiffieHellma..> 22-Dec-2014 08:01    159K
018-AnIdentityBasedSignaturefromGapDiffieHellma..> 22-Dec-2014 08:01    335K
019-Screamasoftwareefficientstreamcipher.pdf       22-Dec-2014 08:01    357K
019-Screamasoftwareefficientstreamcipher.ps        22-Dec-2014 08:01    424K
020-Cryptanalysisofstreamcipherswithlinearmaski..> 22-Dec-2014 08:01    374K
020-Cryptanalysisofstreamcipherswithlinearmaski..> 22-Dec-2014 08:01    420K
021-SpectralAnalysisofBooleanFunctionsunderNonu..> 22-Dec-2014 08:01    226K
021-SpectralAnalysisofBooleanFunctionsunderNonu..> 22-Dec-2014 08:01    220K
022-FromIdentificationtoSignaturesviatheFiatSha..> 22-Dec-2014 08:01    339K
022-FromIdentificationtoSignaturesviatheFiatSha..> 22-Dec-2014 08:01    608K
023-AlmostOptimalHashSequenceTraversal.pdf         22-Dec-2014 08:01    189K
023-AlmostOptimalHashSequenceTraversal.ps          22-Dec-2014 08:01    860K
024-TimedReleaseofStandardDigitalSignatures.pdf    20-Jan-2023 14:22     207
025-MakingMixNetsRobustForElectronicVotingByRan..> 22-Dec-2014 08:01    146K
025-MakingMixNetsRobustForElectronicVotingByRan..> 22-Dec-2014 08:01    411K
026-GenericGroupsCollisionResistanceandECDSA.pdf   22-Dec-2014 08:01    377K
026-GenericGroupsCollisionResistanceandECDSA.ps    22-Dec-2014 08:01    372K
027-EfficientandNonMalleableProofsofPlaintextKn..> 22-Dec-2014 08:01    279K
027-EfficientandNonMalleableProofsofPlaintextKn..> 22-Dec-2014 08:01    460K
028-AUniversalForgeryofHess39sSecondIDbasedSign..> 20-Jan-2023 08:41     97K
028-AUniversalForgeryofHesssSecondIDbasedSignat..> 22-Dec-2014 08:01     52K
028-AUniversalForgeryofHesssSecondIDbasedSignat..> 22-Dec-2014 08:01    149K
029-EfficientComputationModuloaSharedSecretwith..> 22-Dec-2014 08:01    270K
029-EfficientComputationModuloaSharedSecretwith..> 22-Dec-2014 08:01    271K
030-Adaptivechisquaretestanditsapplicationtosom..> 22-Dec-2014 08:01    135K
030-Adaptivechisquaretestanditsapplicationtosom..> 22-Dec-2014 08:01    272K
031-AParallelizableDesignPrincipleforCryptograp..> 22-Dec-2014 08:01    336K
031-AParallelizableDesignPrincipleforCryptograp..> 22-Dec-2014 08:00    351K
032-SupersingularHyperellipticCurveofGenus2over..> 22-Dec-2014 08:00    224K
032-SupersingularHyperellipticCurveofGenus2over..> 22-Dec-2014 08:00    221K
033-Equivalencebetweensemanticsecurityandindist..> 22-Dec-2014 08:00    187K
033-Equivalencebetweensemanticsecurityandindist..> 22-Dec-2014 08:00    162K
034-AnOAEPVariantWithaTightSecurityProof.pdf       22-Dec-2014 08:00    323K
034-AnOAEPVariantWithaTightSecurityProof.ps        22-Dec-2014 08:00    313K
035-TripartiteAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 08:00    243K
035-TripartiteAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 08:00    496K
036-OptimalBlackBoxSecretSharingoverArbitraryAb..> 22-Dec-2014 08:00    202K
036-OptimalBlackBoxSecretSharingoverArbitraryAb..> 22-Dec-2014 08:00    386K
037-Anefficientsemanticallysecureellipticcurvec..> 22-Dec-2014 08:00    220K
037-Anefficientsemanticallysecureellipticcurvec..> 22-Dec-2014 08:00    191K
038-ADistributedRSASignatureSchemeforGeneralAcc..> 20-Jan-2023 14:22     207
039-PartialKeyEscrowMonitoringScheme.pdf           22-Dec-2014 08:00    189K
039-PartialKeyEscrowMonitoringScheme.ps            22-Dec-2014 08:00    379K
040-SecureComputationWithoutAgreement.pdf          22-Dec-2014 08:00    384K
040-SecureComputationWithoutAgreement.ps           22-Dec-2014 08:00    577K
041-NewResultsonBoomerangandRectangleAttack.pdf    22-Dec-2014 08:00    210K
041-NewResultsonBoomerangandRectangleAttack.ps     22-Dec-2014 08:00    228K
042-AUnifiedMethodologyForConstructingPublicKey..> 22-Dec-2014 08:00    148K
042-AUnifiedMethodologyForConstructingPublicKey..> 22-Dec-2014 08:00    159K
043-StrictPolynomialtimeinSimulationandExtracti..> 22-Dec-2014 08:00    410K
043-StrictPolynomialtimeinSimulationandExtracti..> 22-Dec-2014 08:00    630K
044-CryptanalysisofBlockCipherswithOverdefinedS..> 22-Dec-2014 08:00    372K
044-CryptanalysisofBlockCipherswithOverdefinedS..> 22-Dec-2014 08:00    541K
045-CryptanalysisofSDES.pdf                        22-Dec-2014 08:00      1M
045-CryptanalysisofSDES.ps                         22-Dec-2014 08:00      2M
046-OntheSecurityofJointSignatureandEncryption.pdf 22-Dec-2014 08:00    384K
046-OntheSecurityofJointSignatureandEncryption.ps  22-Dec-2014 08:00    391K
047-UniversalCompositionwithJointState.pdf         22-Dec-2014 07:59    352K
047-UniversalCompositionwithJointState.ps          22-Dec-2014 07:59    341K
048-TowardsaUniformDescriptionofSeveralGroupBas..> 22-Dec-2014 07:59    221K
048-TowardsaUniformDescriptionofSeveralGroupBas..> 22-Dec-2014 07:59    212K
049-TensorTransformofBooleanFunctionsandRelated..> 22-Dec-2014 07:59    206K
049-TensorTransformofBooleanFunctionsandRelated..> 22-Dec-2014 07:59    421K
050-Secretsharingschemeswiththreeorfourminimalq..> 22-Dec-2014 07:59    238K
050-Secretsharingschemeswiththreeorfourminimalq..> 22-Dec-2014 07:59    289K
051-FullyDistributedProxySignatureSchemes.pdf      22-Dec-2014 07:59    235K
051-FullyDistributedProxySignatureSchemes.ps       22-Dec-2014 07:59    223K
052-AVariantoftheCramerShoupCryptosystemforGrou..> 22-Dec-2014 07:59    246K
052-AVariantoftheCramerShoupCryptosystemforGrou..> 22-Dec-2014 07:59    243K
053-ExtendedValidityandConsistencyinByzantineAg..> 22-Dec-2014 07:59    282K
053-ExtendedValidityandConsistencyinByzantineAg..> 22-Dec-2014 07:59    309K
054-SiBIRSignerBaseIntrusionResilientSignatures..> 22-Dec-2014 07:59    183K
054-SiBIRSignerBaseIntrusionResilientSignatures.ps 22-Dec-2014 07:59    571K
055-ConcurrentZeroKnowledgeProofswithLogarithmi..> 22-Dec-2014 07:59    186K
055-ConcurrentZeroKnowledgeProofswithLogarithmi..> 22-Dec-2014 07:59    346K
056-HierarchicalIDBasedCryptography.pdf            22-Dec-2014 07:59    278K
056-HierarchicalIDBasedCryptography.ps             22-Dec-2014 07:59    290K
057-ASimplerConstructionofCCA2SecurePublicKeyEn..> 22-Dec-2014 07:59    222K
057-ASimplerConstructionofCCA2SecurePublicKeyEn..> 22-Dec-2014 07:59    480K
058-ConstructionofUOWHFTreeHashingRevisited.pdf    22-Dec-2014 07:59    194K
058-ConstructionofUOWHFTreeHashingRevisited.ps     22-Dec-2014 07:59    181K
059-UniversallyComposableNotionsofKeyExchangean..> 22-Dec-2014 07:59    571K
059-UniversallyComposableNotionsofKeyExchangean..> 22-Dec-2014 07:59    572K
060-AForwardSecurePublicKeyEncryptionScheme.pdf    22-Dec-2014 07:59    236K
060-AForwardSecurePublicKeyEncryptionScheme.ps     22-Dec-2014 07:59    211K
061-StrengthenedEncryptionintheCBCMode.pdf         22-Dec-2014 07:59     70K
062-ABCABlockCipher.pdf                            22-Dec-2014 07:59    132K
062-ABCABlockCipher.ps                             22-Dec-2014 07:59    161K
063-OnsomeAttacksonMultiprimeRSA.pdf               22-Dec-2014 07:59    272K
063-OnsomeAttacksonMultiprimeRSA.ps                22-Dec-2014 07:59    230K
064-ProtectingagainstKeyExposureStronglyKeyInsu..> 22-Dec-2014 07:59    315K
064-ProtectingagainstKeyExposureStronglyKeyInsu..> 22-Dec-2014 07:59    279K
065-SecureChannelsbasedonAuthenticatedEncryptio..> 22-Dec-2014 07:59    359K
065-SecureChannelsbasedonAuthenticatedEncryptio..> 22-Dec-2014 07:59    390K
066-BlackBoxAnalysisoftheBlockCipherBasedHashFu..> 22-Dec-2014 07:58    412K
066-BlackBoxAnalysisoftheBlockCipherBasedHashFu..> 22-Dec-2014 07:58    483K
067-NotSoRandomShufflesofRC4.pdf                   22-Dec-2014 07:58    243K
067-NotSoRandomShufflesofRC4.ps                    22-Dec-2014 07:58    948K
068-Improvedkeyrecoveryoflevel1oftheBluetoothEn..> 22-Dec-2014 07:58    125K
068-Improvedkeyrecoveryoflevel1oftheBluetoothEn..> 22-Dec-2014 07:58    107K
069-ADistributedandComputationallySecureKeyDist..> 22-Dec-2014 07:58    243K
069-ADistributedandComputationallySecureKeyDist..> 22-Dec-2014 07:58    222K
070-WeakKeysinMST1.pdf                             22-Dec-2014 07:58    241K
070-WeakKeysinMST1.ps                              22-Dec-2014 07:58    251K
071-FurtherResultsandConsiderationsonSideChanne..> 22-Dec-2014 07:58    122K
072-AuthenticatedIdentityBasedEncryption.pdf       22-Dec-2014 07:58    192K
072-AuthenticatedIdentityBasedEncryption.ps        22-Dec-2014 07:58    172K
073-FaultattacksonRSAwithCRTConcreteResultsandP..> 22-Dec-2014 07:58    303K
073-FaultattacksonRSAwithCRTConcreteResultsandP..> 22-Dec-2014 07:58      3M
074-HowtorepairESIGN.pdf                           22-Dec-2014 07:58    162K
074-HowtorepairESIGN.ps                            22-Dec-2014 07:58    128K
075-FaultbasedcryptanalysisoftheAdvancedEncrypt..> 22-Dec-2014 07:58    332K
076-AttackonPrivateSignatureKeysoftheOpenPGPFor..> 22-Dec-2014 07:58    103K
077-KeyInsulatedPublicKeyCryptosystems.pdf         22-Dec-2014 07:58    326K
077-KeyInsulatedPublicKeyCryptosystems.ps          22-Dec-2014 07:58    319K
078-BreakingandProvablyRepairingtheSSHAuthentic..> 22-Dec-2014 07:58    424K
078-BreakingandProvablyRepairingtheSSHAuthentic..> 22-Dec-2014 07:58    439K
079-OntheefficiencyoftheClockControlGuessingAtt..> 22-Dec-2014 07:58    212K
079-OntheefficiencyoftheClockControlGuessingAtt..> 22-Dec-2014 07:58    183K
080-ApplicationsofMultilinearFormstoCryptograph..> 22-Dec-2014 07:58    328K
080-ApplicationsofMultilinearFormstoCryptograph..> 22-Dec-2014 07:58    523K
081-SomeApplicationsofThresholdSignatureSchemes..> 22-Dec-2014 07:58    212K
081-SomeApplicationsofThresholdSignatureSchemes..> 22-Dec-2014 07:58    201K
082-AuthenticationofQuantumMessages.pdf            22-Dec-2014 07:58    236K
082-AuthenticationofQuantumMessages.ps             22-Dec-2014 07:58    353K
083-AsemanticallysecureellipticcurveRSAschemewi..> 22-Dec-2014 07:58    189K
083-AsemanticallysecureellipticcurveRSAschemewi..> 22-Dec-2014 07:57    168K
084-TowardsProvablySecureTimedECommerceTheTrust..> 22-Dec-2014 07:57    325K
085-EfficientandPlayerOptimalStrongConsensus.pdf   22-Dec-2014 07:57    342K
085-EfficientandPlayerOptimalStrongConsensus.ps    22-Dec-2014 07:57    304K
086-AdaptingtheweaknessesoftheRandomOraclemodel..> 22-Dec-2014 07:57    131K
086-AdaptingtheweaknessesoftheRandomOraclemodel..> 22-Dec-2014 07:57    379K
087-HigherOrderCorrelationAttacksXLalgorithmand..> 22-Dec-2014 07:57    233K
087-HigherOrderCorrelationAttacksXLalgorithmand..> 22-Dec-2014 07:57    179K
088-ConstructingEllipticCurveswithPrescribedEmb..> 22-Dec-2014 07:57    140K
088-ConstructingEllipticCurveswithPrescribedEmb..> 22-Dec-2014 07:57    292K
089-OnChosenCiphertextSecurityofMultipleEncrypt..> 22-Dec-2014 07:57    293K
089-OnChosenCiphertextSecurityofMultipleEncrypt..> 22-Dec-2014 07:57    529K
090-EfficientandConcurrentZeroKnowledgefromanyp..> 22-Dec-2014 07:57    305K
090-EfficientandConcurrentZeroKnowledgefromanyp..> 22-Dec-2014 07:57    299K
091-MultiplicativeMaskingandPowerAnalysisofAES.pdf 22-Dec-2014 07:57    167K
091-MultiplicativeMaskingandPowerAnalysisofAES.ps  22-Dec-2014 07:57    155K
092-TMACTwoKeyCBCMAC.pdf                           22-Dec-2014 07:57    248K
092-TMACTwoKeyCBCMAC.ps                            22-Dec-2014 07:57    181K
093-AFuzzyVaultScheme.pdf                          22-Dec-2014 07:57    211K
093-AFuzzyVaultScheme.ps                           22-Dec-2014 07:57    403K
094-BuildingcurveswitharbitrarysmallMOVdegreeov..> 22-Dec-2014 07:57    232K
094-BuildingcurveswitharbitrarysmallMOVdegreeov..> 22-Dec-2014 07:57    196K
095-TheabShrinkingGenerator.pdf                    20-Jan-2023 14:22     207
096-GeneratingLargeNonSingularMatricesoveranArb..> 22-Dec-2014 07:57    149K
096-GeneratingLargeNonSingularMatricesoveranArb..> 22-Dec-2014 07:57    125K
097-Anewpublickeyencryptionschemeprovablysecure..> 20-Jan-2023 14:22     207
098-IdentityBasedSigncryption.pdf                  22-Dec-2014 07:57    164K
098-IdentityBasedSigncryption.ps                   22-Dec-2014 07:57    134K
099-ANewStatisticalTestingforSymmetricCiphersan..> 22-Dec-2014 07:57    232K
099-ANewStatisticalTestingforSymmetricCiphersan..> 22-Dec-2014 07:57    201K
100-EncryptionSchemeSecurityinthePresenceofKeyD..> 22-Dec-2014 07:57    251K
100-EncryptionSchemeSecurityinthePresenceofKeyD..> 22-Dec-2014 07:57    236K
101-AnUpperBoundontheSizeofaCodewiththekIdentif..> 22-Dec-2014 07:57    154K
101-AnUpperBoundontheSizeofaCodewiththekIdentif..> 22-Dec-2014 07:57    150K
102-ApplyingGeneralAccessStructuretoMeteringSch..> 22-Dec-2014 07:57    213K
102-ApplyingGeneralAccessStructuretoMeteringSch..> 22-Dec-2014 07:57    212K
103-OnthePowerofClawFreePermutations.pdf           22-Dec-2014 07:57    342K
103-OnthePowerofClawFreePermutations.ps            22-Dec-2014 07:57    317K
104-ForwardSecureSignatureswithFastKeyUpdate.pdf   22-Dec-2014 07:57    160K
104-ForwardSecureSignatureswithFastKeyUpdate.ps    22-Dec-2014 07:57    508K
105-AnExtensionofKedlaya39sAlgorithmtoHyperelli..> 20-Jan-2023 08:41    345K
105-AnExtensionofKedlayasAlgorithmtoHyperellipt..> 22-Dec-2014 07:57    361K
105-AnExtensionofKedlayasAlgorithmtoHyperellipt..> 22-Dec-2014 07:57    406K
106-Secretsharingschemesonaccessstructureswithi..> 22-Dec-2014 07:56    254K
106-Secretsharingschemesonaccessstructureswithi..> 22-Dec-2014 07:56    287K
107-EfficientArithmeticonHyperellipticCurves.pdf   22-Dec-2014 07:56    871K
107-EfficientArithmeticonHyperellipticCurves.ps    22-Dec-2014 07:56      1M
108-ClockControlledAlternatingStepGenerator.pdf    20-Jan-2023 14:22     207
109-ANewClassofUnsafePrimes.pdf                    22-Dec-2014 07:56    160K
110-TheGGMConstructiondoesNOTyieldCorrelationIn..> 22-Dec-2014 07:56    208K
110-TheGGMConstructiondoesNOTyieldCorrelationIn..> 22-Dec-2014 07:56    426K
111-OnLinearRedundancyintheAESSBox.pdf             22-Dec-2014 07:56    235K
111-OnLinearRedundancyintheAESSBox.ps              22-Dec-2014 07:56    205K
112-AnEfficientProceduretoDoubleandAddPointsona..> 22-Dec-2014 07:56    217K
112-AnEfficientProceduretoDoubleandAddPointsona..> 22-Dec-2014 07:56    193K
113-ANoteontheBilinearDiffieHellmanAssumption.pdf  22-Dec-2014 07:56    114K
113-ANoteontheBilinearDiffieHellmanAssumption.ps   22-Dec-2014 07:56    302K
114-PointMultiplicationonOrdinaryEllipticCurves..> 22-Dec-2014 07:56    204K
114-PointMultiplicationonOrdinaryEllipticCurves..> 22-Dec-2014 07:56    182K
115-UniversalPaddingSchemesforRSA.pdf              22-Dec-2014 07:56    272K
115-UniversalPaddingSchemesforRSA.ps               22-Dec-2014 07:56    273K
116-HowtoconvertanyIDbasedSignatureSchemes.pdf     22-Dec-2014 07:56    164K
116-HowtoconvertanyIDbasedSignatureSchemes.ps      22-Dec-2014 07:56    152K
117-DiffieHellmanProblemsandBilinearMaps.pdf       22-Dec-2014 07:56    204K
117-DiffieHellmanProblemsandBilinearMaps.ps        22-Dec-2014 07:56    485K
118-Efficientthresholdsignaturemultisignaturean..> 22-Dec-2014 07:56    318K
118-Efficientthresholdsignaturemultisignaturean..> 22-Dec-2014 07:56    287K
119-ProvablySecurePublicKeyEncryptionforLengthP..> 22-Dec-2014 07:56    252K
120-SecurityAnalysisofIKE39sSignaturebasedKeyEx..> 20-Jan-2023 14:22     207
120-SecurityAnalysisofIKEsSignaturebasedKeyExch..> 22-Dec-2014 07:56    485K
120-SecurityAnalysisofIKEsSignaturebasedKeyExch..> 22-Dec-2014 07:56    553K
121-EfficientArithmeticonGenus2HyperellipticCur..> 22-Dec-2014 07:56    232K
121-EfficientArithmeticonGenus2HyperellipticCur..> 22-Dec-2014 07:56    237K
122-IDBasedOneRoundAuthenticatedTripartiteKeyAg..> 22-Dec-2014 07:56    141K
122-IDBasedOneRoundAuthenticatedTripartiteKeyAg..> 22-Dec-2014 07:56    335K
123-NewcoveringradiusofReedMullercodesfortresil..> 22-Dec-2014 07:56    233K
123-NewcoveringradiusofReedMullercodesfortresil..> 22-Dec-2014 07:56    159K
124-OnOptimalHashTreeTraversalforIntervalTimeSt..> 22-Dec-2014 07:56    199K
124-OnOptimalHashTreeTraversalforIntervalTimeSt..> 22-Dec-2014 07:56    224K
125-TheJacobiModelofanEllipticCurveandSideChann..> 22-Dec-2014 07:56    189K
125-TheJacobiModelofanEllipticCurveandSideChann..> 22-Dec-2014 07:56    163K
126-AssumptionsRelatedtoDiscreteLogarithmsWhySu..> 22-Dec-2014 07:56    689K
126-AssumptionsRelatedtoDiscreteLogarithmsWhySu..> 22-Dec-2014 07:56      1M
127-PowerofaPublicRandomPermutationanditsApplic..> 22-Dec-2014 07:55    180K
128-PerfectlySecureMessageTransmissionRevisited..> 22-Dec-2014 07:55    320K
128-PerfectlySecureMessageTransmissionRevisited.ps 22-Dec-2014 07:55    344K
129-KeycollisionsinECDSAAttackingNonrepudiation..> 22-Dec-2014 07:55    128K
130-OAEPAVerySimpleWaytoApplyOAEPtoDeterministi..> 22-Dec-2014 07:55    176K
130-OAEPAVerySimpleWaytoApplyOAEPtoDeterministi..> 22-Dec-2014 07:55    114K
131-AnImprovedPseudorandomGeneratorBasedonHardn..> 22-Dec-2014 07:55    148K
131-AnImprovedPseudorandomGeneratorBasedonHardn..> 22-Dec-2014 07:55    476K
132-TightLowerBoundonLinearAuthenticatedEncrypt..> 22-Dec-2014 07:55    171K
132-TightLowerBoundonLinearAuthenticatedEncrypt..> 22-Dec-2014 07:55    246K
133-EfficientConstructionofDistributedVerifiabl..> 22-Dec-2014 07:55    211K
133-EfficientConstructionofDistributedVerifiabl..> 22-Dec-2014 07:55    355K
134-AsynchronousVerifiableSecretSharingandProac..> 22-Dec-2014 07:55    240K
134-AsynchronousVerifiableSecretSharingandProac..> 22-Dec-2014 07:55    265K
135-FolklorePracticeandTheoryofRobustCombiners.pdf 22-Dec-2014 07:55    293K
136-PracticalNonInteractiveKeyDistributionBased..> 22-Dec-2014 07:55    223K
136-PracticalNonInteractiveKeyDistributionBased..> 22-Dec-2014 07:55    191K
137-ProvablySecureSteganography.pdf                22-Dec-2014 07:55    275K
137-ProvablySecureSteganography.ps                 22-Dec-2014 07:55    262K
138-OntheSecurityofHFEHFEvandQuartz.pdf            22-Dec-2014 07:55    264K
138-OntheSecurityofHFEHFEvandQuartz.ps             22-Dec-2014 07:55    228K
139-ReactionAttacksonPublicKeyCryptosystemsBase..> 22-Dec-2014 07:55    147K
139-ReactionAttacksonPublicKeyCryptosystemsBase..> 22-Dec-2014 07:55    139K
140-UniversallyComposableTwoPartyandMultiPartyS..> 22-Dec-2014 07:55    815K
140-UniversallyComposableTwoPartyandMultiPartyS..> 22-Dec-2014 07:55      1M
141-ApplyingGeneralAccessStructuretoProactiveSe..> 22-Dec-2014 07:55    145K
141-ApplyingGeneralAccessStructuretoProactiveSe..> 22-Dec-2014 07:55    304K
142-OntheApplicabilityofDistinguishingAttacksAg..> 22-Dec-2014 07:55    153K
143-AnAttackontheIsomorphismsofPolynomialsProbl..> 22-Dec-2014 07:55    201K
143-AnAttackontheIsomorphismsofPolynomialsProbl..> 22-Dec-2014 07:55    174K
144-OnSomeAlgebraicStructuresintheAESRoundFunct..> 22-Dec-2014 07:55    150K
144-OnSomeAlgebraicStructuresintheAESRoundFunct..> 22-Dec-2014 07:55    163K
145-CryptanalysisofMQVwithpartiallyknownnonces.pdf 22-Dec-2014 07:55    196K
145-CryptanalysisofMQVwithpartiallyknownnonces.ps  22-Dec-2014 07:55    160K
146-BauerBersonFeiertagattackrevisited.pdf         22-Dec-2014 07:55    111K
146-BauerBersonFeiertagattackrevisited.ps          22-Dec-2014 07:55    276K
147-InversionFreeArithmeticonGenus2Hyperellipti..> 22-Dec-2014 07:55    147K
147-InversionFreeArithmeticonGenus2Hyperellipti..> 22-Dec-2014 07:55    149K
148-TheEMDModeofOperationATweakedWideBlocksizeS..> 22-Dec-2014 07:54    250K
148-TheEMDModeofOperationATweakedWideBlocksizeS..> 22-Dec-2014 07:54    601K
149-AboutFilliol39sObservationsonDESAESandHashF..> 20-Jan-2023 08:41     92K
149-AboutFilliolsObservationsonDESAESandHashFun..> 22-Dec-2014 07:54    105K
149-AboutFilliolsObservationsonDESAESandHashFun..> 22-Dec-2014 07:54     56K
150-CryptanalysisoftheLeeHwangGroupOrientedUnde..> 22-Dec-2014 07:54    199K
150-CryptanalysisoftheLeeHwangGroupOrientedUnde..> 22-Dec-2014 07:54    169K
151-Selectivedisclosurecredentialsets.pdf          22-Dec-2014 07:54    164K
152-AnoteonWeakKeysofPESIDEAandsomeExtendedVari..> 22-Dec-2014 07:54    147K
152-AnoteonWeakKeysofPESIDEAandsomeExtendedVari..> 22-Dec-2014 07:54    168K
153-WeightedCoordinatesonGenus2HyperellipticCur..> 22-Dec-2014 07:54    235K
153-WeightedCoordinatesonGenus2HyperellipticCur..> 22-Dec-2014 07:54    289K
154-Onmultiexponentiationincryptography.pdf        22-Dec-2014 07:54    268K
154-Onmultiexponentiationincryptography.ps         22-Dec-2014 07:54    259K
155-SecureBilinearDiffieHellmanBits.pdf            22-Dec-2014 07:54    190K
155-SecureBilinearDiffieHellmanBits.ps             22-Dec-2014 07:54    175K
156-ValidatingDigitalSignatureswithoutTimeStamp..> 20-Jan-2023 08:41    152K
157-InHowManyWaysCanYouWriteRijndael.pdf           22-Dec-2014 07:54    220K
157-InHowManyWaysCanYouWriteRijndael.ps            22-Dec-2014 07:54    209K
158-TheBookofRijndaels.pdf                         22-Dec-2014 07:54    645K
158-TheBookofRijndaels.ps                          22-Dec-2014 07:54      1M
159-RelatedKeyandKeyCollisionAttacksAgainstRMAC..> 22-Dec-2014 07:54    190K
159-RelatedKeyandKeyCollisionAttacksAgainstRMAC.ps 22-Dec-2014 07:54    185K
160-CryptologyandPhysicalSecurityRightsAmplific..> 22-Dec-2014 07:54    488K
160-CryptologyandPhysicalSecurityRightsAmplific..> 22-Dec-2014 07:54     15M
161-PracticalVerifiableEncryptionandDecryptiono..> 22-Dec-2014 07:53    431K
161-PracticalVerifiableEncryptionandDecryptiono..> 22-Dec-2014 07:53    493K
162-OnConstructingLocallyComputableExtractorsan..> 22-Dec-2014 07:53    281K
162-OnConstructingLocallyComputableExtractorsan..> 22-Dec-2014 07:53    502K
163-ManintheMiddleinTunnelledAuthenticationProt..> 22-Dec-2014 07:53    437K
163-ManintheMiddleinTunnelledAuthenticationProt..> 22-Dec-2014 07:53    521K
164-AuthenticatedIDbasedKeyExchangeandremotelog..> 22-Dec-2014 07:53    118K
164-AuthenticatedIDbasedKeyExchangeandremotelog..> 22-Dec-2014 07:53    248K
165-CoercionResistantElectronicElections.pdf       22-Dec-2014 07:53    159K
166-MultiPartyAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 07:53    158K
166-MultiPartyAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 07:53    381K
167-CryptanalysisofTwoNewSignatureSchemes.pdf      22-Dec-2014 07:53     96K
167-CryptanalysisofTwoNewSignatureSchemes.ps       22-Dec-2014 07:53    237K
168-NewSignatureSchemeUsingConjugacyProblem.pdf    22-Dec-2014 07:53    180K
168-NewSignatureSchemeUsingConjugacyProblem.ps     22-Dec-2014 07:53    432K
169-TheoreticalUseofCacheMemoryasaCryptanalytic..> 22-Dec-2014 07:53    147K
169-TheoreticalUseofCacheMemoryasaCryptanalytic..> 22-Dec-2014 07:53    318K
170-AnAnalysisofRMAC.pdf                           22-Dec-2014 07:53    120K
170-AnAnalysisofRMAC.ps                            22-Dec-2014 07:53     95K
171-StatisticalweaknessesintheallegedRC4keystre..> 22-Dec-2014 07:53    131K
171-StatisticalweaknessesintheallegedRC4keystre..> 22-Dec-2014 07:53    668K
172-PECDSAHowtobuildaDLbaseddigitalsignaturesch..> 22-Dec-2014 07:53    217K
172-PECDSAHowtobuildaDLbaseddigitalsignaturesch..> 22-Dec-2014 07:53    480K
173-EfficientGroupSignatureswithoutTrapdoors.pdf   22-Dec-2014 07:53    209K
174-ADesigner39sGuidetoKEMs.pdf                    20-Jan-2023 08:41    228K
174-ADesignersGuidetoKEMs.pdf                      22-Dec-2014 07:53    218K
174-ADesignersGuidetoKEMs.ps                       22-Dec-2014 07:53    380K
175-AggregateandVerifiablyEncryptedSignaturesfr..> 22-Dec-2014 07:53    302K
175-AggregateandVerifiablyEncryptedSignaturesfr..> 22-Dec-2014 07:53    319K
176-TheoreticalAnalysisofCorrelationsinRC6.pdf     22-Dec-2014 07:53    293K
176-TheoreticalAnalysisofCorrelationsinRC6.ps      22-Dec-2014 07:53    471K
176-TheoreticalAnalysisofCorrelationsinRC63939.pdf 20-Jan-2023 08:41    281K
177-twoattacksonxiayouGroupSignature.pdf           22-Dec-2014 07:53    184K
178-AttackonANewPublicKeyCryptosystemfromISC02L..> 22-Dec-2014 07:53     81K
178-AttackonANewPublicKeyCryptosystemfromISC02L..> 22-Dec-2014 07:53    222K
178-AttackonANewPublicKeyCryptosystemfromISC390..> 20-Jan-2023 08:41     77K
179-ParallelAlgorithmforMultiplicationonEllipti..> 22-Dec-2014 07:53    165K
179-ParallelAlgorithmforMultiplicationonEllipti..> 22-Dec-2014 07:53    135K
180-OMACOneKeyCBCMAC.pdf                           22-Dec-2014 07:52    226K
180-OMACOneKeyCBCMAC.ps                            22-Dec-2014 07:52    562K
181-CountingPointsforHyperellipticCurvesoftypey..> 22-Dec-2014 07:52    197K
181-CountingPointsforHyperellipticCurvesoftypey..> 22-Dec-2014 07:52    447K
182-ObliviousKeywordSearch.pdf                     22-Dec-2014 07:52    132K
182-ObliviousKeywordSearch.ps                      22-Dec-2014 07:52    292K
183-SimplebackdoorstoRSAkeygeneration.pdf          22-Dec-2014 07:52    180K
183-SimplebackdoorstoRSAkeygeneration.ps           22-Dec-2014 07:52    347K
184-IdentityBasedAuthenticatedKeyAgreementProto..> 22-Dec-2014 07:52    216K
184-IdentityBasedAuthenticatedKeyAgreementProto..> 22-Dec-2014 07:52    447K
185-Turingafaststreamcipher.pdf                    22-Dec-2014 07:52    234K
186-ZeroKnowledgetwentyyearsafteritsinvention.pdf  22-Dec-2014 07:52    481K
186-ZeroKnowledgetwentyyearsafteritsinvention.ps   22-Dec-2014 07:52    889K
187-EntityAuthenticationSchemesUsingBraidWordRe..> 22-Dec-2014 07:52    238K
187-EntityAuthenticationSchemesUsingBraidWordRe..> 22-Dec-2014 07:52    835K
188-KeyrecoveryattacksonNTRUwithoutciphertextva..> 22-Dec-2014 07:52    178K
188-KeyrecoveryattacksonNTRUwithoutciphertextva..> 22-Dec-2014 07:52    450K
189-BitSliceAuctionCircuit.pdf                     22-Dec-2014 07:52    205K
189-BitSliceAuctionCircuit.ps                      22-Dec-2014 07:52    140K
190-ParallelizableAuthenticationTrees.pdf          22-Dec-2014 07:52    231K
190-ParallelizableAuthenticationTrees.ps           22-Dec-2014 07:52    314K
191-ALinearizationAttackontheBluetoothKeyStream..> 22-Dec-2014 07:52    156K
191-ALinearizationAttackontheBluetoothKeyStream..> 22-Dec-2014 07:52    151K
192-SecurityProofsforanEfficientPasswordBasedKe..> 22-Dec-2014 07:52    282K
192-SecurityProofsforanEfficientPasswordBasedKe..> 22-Dec-2014 07:52    565K
193-ANoteonIdealTripartiteAccessStructures.pdf     22-Dec-2014 07:52    124K
193-ANoteonIdealTripartiteAccessStructures.ps      22-Dec-2014 07:52    368K
194-ApolarisationbasedVisualCryptoSystemanditsS..> 22-Dec-2014 07:52    230K
194-ApolarisationbasedVisualCryptoSystemanditsS..> 22-Dec-2014 07:52    255K
195-AnadditiontothepaperApolarisationbasedvisua..> 22-Dec-2014 07:52    161K
195-AnadditiontothepaperApolarisationbasedvisua..> 22-Dec-2014 07:52    157K