Index of /2002/
../
001-FractalHashSequenceRepresentationandTravers..> 22-Dec-2014 08:02 95K
001-FractalHashSequenceRepresentationandTravers..> 22-Dec-2014 08:02 229K
002-EvaluatingSecurityofVotingSchemesintheUnive..> 22-Dec-2014 08:02 261K
002-EvaluatingSecurityofVotingSchemesintheUnive..> 22-Dec-2014 08:02 257K
003-SquareAttacksonReducedRoundVariantsoftheSki..> 22-Dec-2014 08:02 2217
003-SquareAttacksonReducedRoundVariantsoftheSki..> 22-Dec-2014 08:02 215K
004-IDbasedSignaturesfromPairingsonEllipticCurv..> 22-Dec-2014 08:02 120K
004-IDbasedSignaturesfromPairingsonEllipticCurv..> 22-Dec-2014 08:02 95K
005-CryptanalysisofStreamCipherCOS2128ModeI.pdf 22-Dec-2014 08:02 166K
005-CryptanalysisofStreamCipherCOS2128ModeI.ps 22-Dec-2014 08:02 145K
006-Thebestandworstofsupersingularabelianvariet..> 22-Dec-2014 08:02 274K
007-Parallelscalarmultiplicationongeneralellipt..> 22-Dec-2014 08:02 175K
007-Parallelscalarmultiplicationongeneralellipt..> 22-Dec-2014 08:02 156K
008-EfficientAlgorithmsforPairingBasedCryptosys..> 22-Dec-2014 08:02 256K
008-EfficientAlgorithmsforPairingBasedCryptosys..> 22-Dec-2014 08:02 234K
009-TreebasedGroupKeyAgreement.pdf 22-Dec-2014 08:02 334K
009-TreebasedGroupKeyAgreement.ps 22-Dec-2014 08:02 668K
010-CutandPasteAttackswithJava.pdf 22-Dec-2014 08:02 413K
010-CutandPasteAttackswithJava.ps 22-Dec-2014 08:02 5M
011-OptimalChosenCiphertextSecureEncryptionofAr..> 22-Dec-2014 08:02 345K
011-OptimalChosenCiphertextSecureEncryptionofAr..> 22-Dec-2014 08:01 351K
012-ExponentGroupSignatureSchemesandEfficientId..> 22-Dec-2014 08:01 212K
012-ExponentGroupSignatureSchemesandEfficientId..> 22-Dec-2014 08:01 189K
013-GenericLowerBoundsforRootExtractionandSigna..> 22-Dec-2014 08:01 294K
013-GenericLowerBoundsforRootExtractionandSigna..> 22-Dec-2014 08:01 291K
014-BetterthanBiBaShortOnetimeSignatureswithFas..> 22-Dec-2014 08:01 137K
014-BetterthanBiBaShortOnetimeSignatureswithFas..> 22-Dec-2014 08:01 309K
015-Securityproofsofcryptographicprotocols.pdf 22-Dec-2014 08:01 203K
016-ContentExtractionSignatures.pdf 22-Dec-2014 08:01 397K
017-TheCramerShoupStrongRSASignatureSchemeRevis..> 22-Dec-2014 08:01 213K
017-TheCramerShoupStrongRSASignatureSchemeRevis..> 22-Dec-2014 08:01 245K
018-AnIdentityBasedSignaturefromGapDiffieHellma..> 22-Dec-2014 08:01 159K
018-AnIdentityBasedSignaturefromGapDiffieHellma..> 22-Dec-2014 08:01 335K
019-Screamasoftwareefficientstreamcipher.pdf 22-Dec-2014 08:01 357K
019-Screamasoftwareefficientstreamcipher.ps 22-Dec-2014 08:01 424K
020-Cryptanalysisofstreamcipherswithlinearmaski..> 22-Dec-2014 08:01 374K
020-Cryptanalysisofstreamcipherswithlinearmaski..> 22-Dec-2014 08:01 420K
021-SpectralAnalysisofBooleanFunctionsunderNonu..> 22-Dec-2014 08:01 226K
021-SpectralAnalysisofBooleanFunctionsunderNonu..> 22-Dec-2014 08:01 220K
022-FromIdentificationtoSignaturesviatheFiatSha..> 22-Dec-2014 08:01 339K
022-FromIdentificationtoSignaturesviatheFiatSha..> 22-Dec-2014 08:01 608K
023-AlmostOptimalHashSequenceTraversal.pdf 22-Dec-2014 08:01 189K
023-AlmostOptimalHashSequenceTraversal.ps 22-Dec-2014 08:01 860K
024-TimedReleaseofStandardDigitalSignatures.pdf 20-Jan-2023 14:22 207
025-MakingMixNetsRobustForElectronicVotingByRan..> 22-Dec-2014 08:01 146K
025-MakingMixNetsRobustForElectronicVotingByRan..> 22-Dec-2014 08:01 411K
026-GenericGroupsCollisionResistanceandECDSA.pdf 22-Dec-2014 08:01 377K
026-GenericGroupsCollisionResistanceandECDSA.ps 22-Dec-2014 08:01 372K
027-EfficientandNonMalleableProofsofPlaintextKn..> 22-Dec-2014 08:01 279K
027-EfficientandNonMalleableProofsofPlaintextKn..> 22-Dec-2014 08:01 460K
028-AUniversalForgeryofHess39sSecondIDbasedSign..> 20-Jan-2023 08:41 97K
028-AUniversalForgeryofHesssSecondIDbasedSignat..> 22-Dec-2014 08:01 52K
028-AUniversalForgeryofHesssSecondIDbasedSignat..> 22-Dec-2014 08:01 149K
029-EfficientComputationModuloaSharedSecretwith..> 22-Dec-2014 08:01 270K
029-EfficientComputationModuloaSharedSecretwith..> 22-Dec-2014 08:01 271K
030-Adaptivechisquaretestanditsapplicationtosom..> 22-Dec-2014 08:01 135K
030-Adaptivechisquaretestanditsapplicationtosom..> 22-Dec-2014 08:01 272K
031-AParallelizableDesignPrincipleforCryptograp..> 22-Dec-2014 08:01 336K
031-AParallelizableDesignPrincipleforCryptograp..> 22-Dec-2014 08:00 351K
032-SupersingularHyperellipticCurveofGenus2over..> 22-Dec-2014 08:00 224K
032-SupersingularHyperellipticCurveofGenus2over..> 22-Dec-2014 08:00 221K
033-Equivalencebetweensemanticsecurityandindist..> 22-Dec-2014 08:00 187K
033-Equivalencebetweensemanticsecurityandindist..> 22-Dec-2014 08:00 162K
034-AnOAEPVariantWithaTightSecurityProof.pdf 22-Dec-2014 08:00 323K
034-AnOAEPVariantWithaTightSecurityProof.ps 22-Dec-2014 08:00 313K
035-TripartiteAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 08:00 243K
035-TripartiteAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 08:00 496K
036-OptimalBlackBoxSecretSharingoverArbitraryAb..> 22-Dec-2014 08:00 202K
036-OptimalBlackBoxSecretSharingoverArbitraryAb..> 22-Dec-2014 08:00 386K
037-Anefficientsemanticallysecureellipticcurvec..> 22-Dec-2014 08:00 220K
037-Anefficientsemanticallysecureellipticcurvec..> 22-Dec-2014 08:00 191K
038-ADistributedRSASignatureSchemeforGeneralAcc..> 20-Jan-2023 14:22 207
039-PartialKeyEscrowMonitoringScheme.pdf 22-Dec-2014 08:00 189K
039-PartialKeyEscrowMonitoringScheme.ps 22-Dec-2014 08:00 379K
040-SecureComputationWithoutAgreement.pdf 22-Dec-2014 08:00 384K
040-SecureComputationWithoutAgreement.ps 22-Dec-2014 08:00 577K
041-NewResultsonBoomerangandRectangleAttack.pdf 22-Dec-2014 08:00 210K
041-NewResultsonBoomerangandRectangleAttack.ps 22-Dec-2014 08:00 228K
042-AUnifiedMethodologyForConstructingPublicKey..> 22-Dec-2014 08:00 148K
042-AUnifiedMethodologyForConstructingPublicKey..> 22-Dec-2014 08:00 159K
043-StrictPolynomialtimeinSimulationandExtracti..> 22-Dec-2014 08:00 410K
043-StrictPolynomialtimeinSimulationandExtracti..> 22-Dec-2014 08:00 630K
044-CryptanalysisofBlockCipherswithOverdefinedS..> 22-Dec-2014 08:00 372K
044-CryptanalysisofBlockCipherswithOverdefinedS..> 22-Dec-2014 08:00 541K
045-CryptanalysisofSDES.pdf 22-Dec-2014 08:00 1M
045-CryptanalysisofSDES.ps 22-Dec-2014 08:00 2M
046-OntheSecurityofJointSignatureandEncryption.pdf 22-Dec-2014 08:00 384K
046-OntheSecurityofJointSignatureandEncryption.ps 22-Dec-2014 08:00 391K
047-UniversalCompositionwithJointState.pdf 22-Dec-2014 07:59 352K
047-UniversalCompositionwithJointState.ps 22-Dec-2014 07:59 341K
048-TowardsaUniformDescriptionofSeveralGroupBas..> 22-Dec-2014 07:59 221K
048-TowardsaUniformDescriptionofSeveralGroupBas..> 22-Dec-2014 07:59 212K
049-TensorTransformofBooleanFunctionsandRelated..> 22-Dec-2014 07:59 206K
049-TensorTransformofBooleanFunctionsandRelated..> 22-Dec-2014 07:59 421K
050-Secretsharingschemeswiththreeorfourminimalq..> 22-Dec-2014 07:59 238K
050-Secretsharingschemeswiththreeorfourminimalq..> 22-Dec-2014 07:59 289K
051-FullyDistributedProxySignatureSchemes.pdf 22-Dec-2014 07:59 235K
051-FullyDistributedProxySignatureSchemes.ps 22-Dec-2014 07:59 223K
052-AVariantoftheCramerShoupCryptosystemforGrou..> 22-Dec-2014 07:59 246K
052-AVariantoftheCramerShoupCryptosystemforGrou..> 22-Dec-2014 07:59 243K
053-ExtendedValidityandConsistencyinByzantineAg..> 22-Dec-2014 07:59 282K
053-ExtendedValidityandConsistencyinByzantineAg..> 22-Dec-2014 07:59 309K
054-SiBIRSignerBaseIntrusionResilientSignatures..> 22-Dec-2014 07:59 183K
054-SiBIRSignerBaseIntrusionResilientSignatures.ps 22-Dec-2014 07:59 571K
055-ConcurrentZeroKnowledgeProofswithLogarithmi..> 22-Dec-2014 07:59 186K
055-ConcurrentZeroKnowledgeProofswithLogarithmi..> 22-Dec-2014 07:59 346K
056-HierarchicalIDBasedCryptography.pdf 22-Dec-2014 07:59 278K
056-HierarchicalIDBasedCryptography.ps 22-Dec-2014 07:59 290K
057-ASimplerConstructionofCCA2SecurePublicKeyEn..> 22-Dec-2014 07:59 222K
057-ASimplerConstructionofCCA2SecurePublicKeyEn..> 22-Dec-2014 07:59 480K
058-ConstructionofUOWHFTreeHashingRevisited.pdf 22-Dec-2014 07:59 194K
058-ConstructionofUOWHFTreeHashingRevisited.ps 22-Dec-2014 07:59 181K
059-UniversallyComposableNotionsofKeyExchangean..> 22-Dec-2014 07:59 571K
059-UniversallyComposableNotionsofKeyExchangean..> 22-Dec-2014 07:59 572K
060-AForwardSecurePublicKeyEncryptionScheme.pdf 22-Dec-2014 07:59 236K
060-AForwardSecurePublicKeyEncryptionScheme.ps 22-Dec-2014 07:59 211K
061-StrengthenedEncryptionintheCBCMode.pdf 22-Dec-2014 07:59 70K
062-ABCABlockCipher.pdf 22-Dec-2014 07:59 132K
062-ABCABlockCipher.ps 22-Dec-2014 07:59 161K
063-OnsomeAttacksonMultiprimeRSA.pdf 22-Dec-2014 07:59 272K
063-OnsomeAttacksonMultiprimeRSA.ps 22-Dec-2014 07:59 230K
064-ProtectingagainstKeyExposureStronglyKeyInsu..> 22-Dec-2014 07:59 315K
064-ProtectingagainstKeyExposureStronglyKeyInsu..> 22-Dec-2014 07:59 279K
065-SecureChannelsbasedonAuthenticatedEncryptio..> 22-Dec-2014 07:59 359K
065-SecureChannelsbasedonAuthenticatedEncryptio..> 22-Dec-2014 07:59 390K
066-BlackBoxAnalysisoftheBlockCipherBasedHashFu..> 22-Dec-2014 07:58 412K
066-BlackBoxAnalysisoftheBlockCipherBasedHashFu..> 22-Dec-2014 07:58 483K
067-NotSoRandomShufflesofRC4.pdf 22-Dec-2014 07:58 243K
067-NotSoRandomShufflesofRC4.ps 22-Dec-2014 07:58 948K
068-Improvedkeyrecoveryoflevel1oftheBluetoothEn..> 22-Dec-2014 07:58 125K
068-Improvedkeyrecoveryoflevel1oftheBluetoothEn..> 22-Dec-2014 07:58 107K
069-ADistributedandComputationallySecureKeyDist..> 22-Dec-2014 07:58 243K
069-ADistributedandComputationallySecureKeyDist..> 22-Dec-2014 07:58 222K
070-WeakKeysinMST1.pdf 22-Dec-2014 07:58 241K
070-WeakKeysinMST1.ps 22-Dec-2014 07:58 251K
071-FurtherResultsandConsiderationsonSideChanne..> 22-Dec-2014 07:58 122K
072-AuthenticatedIdentityBasedEncryption.pdf 22-Dec-2014 07:58 192K
072-AuthenticatedIdentityBasedEncryption.ps 22-Dec-2014 07:58 172K
073-FaultattacksonRSAwithCRTConcreteResultsandP..> 22-Dec-2014 07:58 303K
073-FaultattacksonRSAwithCRTConcreteResultsandP..> 22-Dec-2014 07:58 3M
074-HowtorepairESIGN.pdf 22-Dec-2014 07:58 162K
074-HowtorepairESIGN.ps 22-Dec-2014 07:58 128K
075-FaultbasedcryptanalysisoftheAdvancedEncrypt..> 22-Dec-2014 07:58 332K
076-AttackonPrivateSignatureKeysoftheOpenPGPFor..> 22-Dec-2014 07:58 103K
077-KeyInsulatedPublicKeyCryptosystems.pdf 22-Dec-2014 07:58 326K
077-KeyInsulatedPublicKeyCryptosystems.ps 22-Dec-2014 07:58 319K
078-BreakingandProvablyRepairingtheSSHAuthentic..> 22-Dec-2014 07:58 424K
078-BreakingandProvablyRepairingtheSSHAuthentic..> 22-Dec-2014 07:58 439K
079-OntheefficiencyoftheClockControlGuessingAtt..> 22-Dec-2014 07:58 212K
079-OntheefficiencyoftheClockControlGuessingAtt..> 22-Dec-2014 07:58 183K
080-ApplicationsofMultilinearFormstoCryptograph..> 22-Dec-2014 07:58 328K
080-ApplicationsofMultilinearFormstoCryptograph..> 22-Dec-2014 07:58 523K
081-SomeApplicationsofThresholdSignatureSchemes..> 22-Dec-2014 07:58 212K
081-SomeApplicationsofThresholdSignatureSchemes..> 22-Dec-2014 07:58 201K
082-AuthenticationofQuantumMessages.pdf 22-Dec-2014 07:58 236K
082-AuthenticationofQuantumMessages.ps 22-Dec-2014 07:58 353K
083-AsemanticallysecureellipticcurveRSAschemewi..> 22-Dec-2014 07:58 189K
083-AsemanticallysecureellipticcurveRSAschemewi..> 22-Dec-2014 07:57 168K
084-TowardsProvablySecureTimedECommerceTheTrust..> 22-Dec-2014 07:57 325K
085-EfficientandPlayerOptimalStrongConsensus.pdf 22-Dec-2014 07:57 342K
085-EfficientandPlayerOptimalStrongConsensus.ps 22-Dec-2014 07:57 304K
086-AdaptingtheweaknessesoftheRandomOraclemodel..> 22-Dec-2014 07:57 131K
086-AdaptingtheweaknessesoftheRandomOraclemodel..> 22-Dec-2014 07:57 379K
087-HigherOrderCorrelationAttacksXLalgorithmand..> 22-Dec-2014 07:57 233K
087-HigherOrderCorrelationAttacksXLalgorithmand..> 22-Dec-2014 07:57 179K
088-ConstructingEllipticCurveswithPrescribedEmb..> 22-Dec-2014 07:57 140K
088-ConstructingEllipticCurveswithPrescribedEmb..> 22-Dec-2014 07:57 292K
089-OnChosenCiphertextSecurityofMultipleEncrypt..> 22-Dec-2014 07:57 293K
089-OnChosenCiphertextSecurityofMultipleEncrypt..> 22-Dec-2014 07:57 529K
090-EfficientandConcurrentZeroKnowledgefromanyp..> 22-Dec-2014 07:57 305K
090-EfficientandConcurrentZeroKnowledgefromanyp..> 22-Dec-2014 07:57 299K
091-MultiplicativeMaskingandPowerAnalysisofAES.pdf 22-Dec-2014 07:57 167K
091-MultiplicativeMaskingandPowerAnalysisofAES.ps 22-Dec-2014 07:57 155K
092-TMACTwoKeyCBCMAC.pdf 22-Dec-2014 07:57 248K
092-TMACTwoKeyCBCMAC.ps 22-Dec-2014 07:57 181K
093-AFuzzyVaultScheme.pdf 22-Dec-2014 07:57 211K
093-AFuzzyVaultScheme.ps 22-Dec-2014 07:57 403K
094-BuildingcurveswitharbitrarysmallMOVdegreeov..> 22-Dec-2014 07:57 232K
094-BuildingcurveswitharbitrarysmallMOVdegreeov..> 22-Dec-2014 07:57 196K
095-TheabShrinkingGenerator.pdf 20-Jan-2023 14:22 207
096-GeneratingLargeNonSingularMatricesoveranArb..> 22-Dec-2014 07:57 149K
096-GeneratingLargeNonSingularMatricesoveranArb..> 22-Dec-2014 07:57 125K
097-Anewpublickeyencryptionschemeprovablysecure..> 20-Jan-2023 14:22 207
098-IdentityBasedSigncryption.pdf 22-Dec-2014 07:57 164K
098-IdentityBasedSigncryption.ps 22-Dec-2014 07:57 134K
099-ANewStatisticalTestingforSymmetricCiphersan..> 22-Dec-2014 07:57 232K
099-ANewStatisticalTestingforSymmetricCiphersan..> 22-Dec-2014 07:57 201K
100-EncryptionSchemeSecurityinthePresenceofKeyD..> 22-Dec-2014 07:57 251K
100-EncryptionSchemeSecurityinthePresenceofKeyD..> 22-Dec-2014 07:57 236K
101-AnUpperBoundontheSizeofaCodewiththekIdentif..> 22-Dec-2014 07:57 154K
101-AnUpperBoundontheSizeofaCodewiththekIdentif..> 22-Dec-2014 07:57 150K
102-ApplyingGeneralAccessStructuretoMeteringSch..> 22-Dec-2014 07:57 213K
102-ApplyingGeneralAccessStructuretoMeteringSch..> 22-Dec-2014 07:57 212K
103-OnthePowerofClawFreePermutations.pdf 22-Dec-2014 07:57 342K
103-OnthePowerofClawFreePermutations.ps 22-Dec-2014 07:57 317K
104-ForwardSecureSignatureswithFastKeyUpdate.pdf 22-Dec-2014 07:57 160K
104-ForwardSecureSignatureswithFastKeyUpdate.ps 22-Dec-2014 07:57 508K
105-AnExtensionofKedlaya39sAlgorithmtoHyperelli..> 20-Jan-2023 08:41 345K
105-AnExtensionofKedlayasAlgorithmtoHyperellipt..> 22-Dec-2014 07:57 361K
105-AnExtensionofKedlayasAlgorithmtoHyperellipt..> 22-Dec-2014 07:57 406K
106-Secretsharingschemesonaccessstructureswithi..> 22-Dec-2014 07:56 254K
106-Secretsharingschemesonaccessstructureswithi..> 22-Dec-2014 07:56 287K
107-EfficientArithmeticonHyperellipticCurves.pdf 22-Dec-2014 07:56 871K
107-EfficientArithmeticonHyperellipticCurves.ps 22-Dec-2014 07:56 1M
108-ClockControlledAlternatingStepGenerator.pdf 20-Jan-2023 14:22 207
109-ANewClassofUnsafePrimes.pdf 22-Dec-2014 07:56 160K
110-TheGGMConstructiondoesNOTyieldCorrelationIn..> 22-Dec-2014 07:56 208K
110-TheGGMConstructiondoesNOTyieldCorrelationIn..> 22-Dec-2014 07:56 426K
111-OnLinearRedundancyintheAESSBox.pdf 22-Dec-2014 07:56 235K
111-OnLinearRedundancyintheAESSBox.ps 22-Dec-2014 07:56 205K
112-AnEfficientProceduretoDoubleandAddPointsona..> 22-Dec-2014 07:56 217K
112-AnEfficientProceduretoDoubleandAddPointsona..> 22-Dec-2014 07:56 193K
113-ANoteontheBilinearDiffieHellmanAssumption.pdf 22-Dec-2014 07:56 114K
113-ANoteontheBilinearDiffieHellmanAssumption.ps 22-Dec-2014 07:56 302K
114-PointMultiplicationonOrdinaryEllipticCurves..> 22-Dec-2014 07:56 204K
114-PointMultiplicationonOrdinaryEllipticCurves..> 22-Dec-2014 07:56 182K
115-UniversalPaddingSchemesforRSA.pdf 22-Dec-2014 07:56 272K
115-UniversalPaddingSchemesforRSA.ps 22-Dec-2014 07:56 273K
116-HowtoconvertanyIDbasedSignatureSchemes.pdf 22-Dec-2014 07:56 164K
116-HowtoconvertanyIDbasedSignatureSchemes.ps 22-Dec-2014 07:56 152K
117-DiffieHellmanProblemsandBilinearMaps.pdf 22-Dec-2014 07:56 204K
117-DiffieHellmanProblemsandBilinearMaps.ps 22-Dec-2014 07:56 485K
118-Efficientthresholdsignaturemultisignaturean..> 22-Dec-2014 07:56 318K
118-Efficientthresholdsignaturemultisignaturean..> 22-Dec-2014 07:56 287K
119-ProvablySecurePublicKeyEncryptionforLengthP..> 22-Dec-2014 07:56 252K
120-SecurityAnalysisofIKE39sSignaturebasedKeyEx..> 20-Jan-2023 14:22 207
120-SecurityAnalysisofIKEsSignaturebasedKeyExch..> 22-Dec-2014 07:56 485K
120-SecurityAnalysisofIKEsSignaturebasedKeyExch..> 22-Dec-2014 07:56 553K
121-EfficientArithmeticonGenus2HyperellipticCur..> 22-Dec-2014 07:56 232K
121-EfficientArithmeticonGenus2HyperellipticCur..> 22-Dec-2014 07:56 237K
122-IDBasedOneRoundAuthenticatedTripartiteKeyAg..> 22-Dec-2014 07:56 141K
122-IDBasedOneRoundAuthenticatedTripartiteKeyAg..> 22-Dec-2014 07:56 335K
123-NewcoveringradiusofReedMullercodesfortresil..> 22-Dec-2014 07:56 233K
123-NewcoveringradiusofReedMullercodesfortresil..> 22-Dec-2014 07:56 159K
124-OnOptimalHashTreeTraversalforIntervalTimeSt..> 22-Dec-2014 07:56 199K
124-OnOptimalHashTreeTraversalforIntervalTimeSt..> 22-Dec-2014 07:56 224K
125-TheJacobiModelofanEllipticCurveandSideChann..> 22-Dec-2014 07:56 189K
125-TheJacobiModelofanEllipticCurveandSideChann..> 22-Dec-2014 07:56 163K
126-AssumptionsRelatedtoDiscreteLogarithmsWhySu..> 22-Dec-2014 07:56 689K
126-AssumptionsRelatedtoDiscreteLogarithmsWhySu..> 22-Dec-2014 07:56 1M
127-PowerofaPublicRandomPermutationanditsApplic..> 22-Dec-2014 07:55 180K
128-PerfectlySecureMessageTransmissionRevisited..> 22-Dec-2014 07:55 320K
128-PerfectlySecureMessageTransmissionRevisited.ps 22-Dec-2014 07:55 344K
129-KeycollisionsinECDSAAttackingNonrepudiation..> 22-Dec-2014 07:55 128K
130-OAEPAVerySimpleWaytoApplyOAEPtoDeterministi..> 22-Dec-2014 07:55 176K
130-OAEPAVerySimpleWaytoApplyOAEPtoDeterministi..> 22-Dec-2014 07:55 114K
131-AnImprovedPseudorandomGeneratorBasedonHardn..> 22-Dec-2014 07:55 148K
131-AnImprovedPseudorandomGeneratorBasedonHardn..> 22-Dec-2014 07:55 476K
132-TightLowerBoundonLinearAuthenticatedEncrypt..> 22-Dec-2014 07:55 171K
132-TightLowerBoundonLinearAuthenticatedEncrypt..> 22-Dec-2014 07:55 246K
133-EfficientConstructionofDistributedVerifiabl..> 22-Dec-2014 07:55 211K
133-EfficientConstructionofDistributedVerifiabl..> 22-Dec-2014 07:55 355K
134-AsynchronousVerifiableSecretSharingandProac..> 22-Dec-2014 07:55 240K
134-AsynchronousVerifiableSecretSharingandProac..> 22-Dec-2014 07:55 265K
135-FolklorePracticeandTheoryofRobustCombiners.pdf 22-Dec-2014 07:55 293K
136-PracticalNonInteractiveKeyDistributionBased..> 22-Dec-2014 07:55 223K
136-PracticalNonInteractiveKeyDistributionBased..> 22-Dec-2014 07:55 191K
137-ProvablySecureSteganography.pdf 22-Dec-2014 07:55 275K
137-ProvablySecureSteganography.ps 22-Dec-2014 07:55 262K
138-OntheSecurityofHFEHFEvandQuartz.pdf 22-Dec-2014 07:55 264K
138-OntheSecurityofHFEHFEvandQuartz.ps 22-Dec-2014 07:55 228K
139-ReactionAttacksonPublicKeyCryptosystemsBase..> 22-Dec-2014 07:55 147K
139-ReactionAttacksonPublicKeyCryptosystemsBase..> 22-Dec-2014 07:55 139K
140-UniversallyComposableTwoPartyandMultiPartyS..> 22-Dec-2014 07:55 815K
140-UniversallyComposableTwoPartyandMultiPartyS..> 22-Dec-2014 07:55 1M
141-ApplyingGeneralAccessStructuretoProactiveSe..> 22-Dec-2014 07:55 145K
141-ApplyingGeneralAccessStructuretoProactiveSe..> 22-Dec-2014 07:55 304K
142-OntheApplicabilityofDistinguishingAttacksAg..> 22-Dec-2014 07:55 153K
143-AnAttackontheIsomorphismsofPolynomialsProbl..> 22-Dec-2014 07:55 201K
143-AnAttackontheIsomorphismsofPolynomialsProbl..> 22-Dec-2014 07:55 174K
144-OnSomeAlgebraicStructuresintheAESRoundFunct..> 22-Dec-2014 07:55 150K
144-OnSomeAlgebraicStructuresintheAESRoundFunct..> 22-Dec-2014 07:55 163K
145-CryptanalysisofMQVwithpartiallyknownnonces.pdf 22-Dec-2014 07:55 196K
145-CryptanalysisofMQVwithpartiallyknownnonces.ps 22-Dec-2014 07:55 160K
146-BauerBersonFeiertagattackrevisited.pdf 22-Dec-2014 07:55 111K
146-BauerBersonFeiertagattackrevisited.ps 22-Dec-2014 07:55 276K
147-InversionFreeArithmeticonGenus2Hyperellipti..> 22-Dec-2014 07:55 147K
147-InversionFreeArithmeticonGenus2Hyperellipti..> 22-Dec-2014 07:55 149K
148-TheEMDModeofOperationATweakedWideBlocksizeS..> 22-Dec-2014 07:54 250K
148-TheEMDModeofOperationATweakedWideBlocksizeS..> 22-Dec-2014 07:54 601K
149-AboutFilliol39sObservationsonDESAESandHashF..> 20-Jan-2023 08:41 92K
149-AboutFilliolsObservationsonDESAESandHashFun..> 22-Dec-2014 07:54 105K
149-AboutFilliolsObservationsonDESAESandHashFun..> 22-Dec-2014 07:54 56K
150-CryptanalysisoftheLeeHwangGroupOrientedUnde..> 22-Dec-2014 07:54 199K
150-CryptanalysisoftheLeeHwangGroupOrientedUnde..> 22-Dec-2014 07:54 169K
151-Selectivedisclosurecredentialsets.pdf 22-Dec-2014 07:54 164K
152-AnoteonWeakKeysofPESIDEAandsomeExtendedVari..> 22-Dec-2014 07:54 147K
152-AnoteonWeakKeysofPESIDEAandsomeExtendedVari..> 22-Dec-2014 07:54 168K
153-WeightedCoordinatesonGenus2HyperellipticCur..> 22-Dec-2014 07:54 235K
153-WeightedCoordinatesonGenus2HyperellipticCur..> 22-Dec-2014 07:54 289K
154-Onmultiexponentiationincryptography.pdf 22-Dec-2014 07:54 268K
154-Onmultiexponentiationincryptography.ps 22-Dec-2014 07:54 259K
155-SecureBilinearDiffieHellmanBits.pdf 22-Dec-2014 07:54 190K
155-SecureBilinearDiffieHellmanBits.ps 22-Dec-2014 07:54 175K
156-ValidatingDigitalSignatureswithoutTimeStamp..> 20-Jan-2023 08:41 152K
157-InHowManyWaysCanYouWriteRijndael.pdf 22-Dec-2014 07:54 220K
157-InHowManyWaysCanYouWriteRijndael.ps 22-Dec-2014 07:54 209K
158-TheBookofRijndaels.pdf 22-Dec-2014 07:54 645K
158-TheBookofRijndaels.ps 22-Dec-2014 07:54 1M
159-RelatedKeyandKeyCollisionAttacksAgainstRMAC..> 22-Dec-2014 07:54 190K
159-RelatedKeyandKeyCollisionAttacksAgainstRMAC.ps 22-Dec-2014 07:54 185K
160-CryptologyandPhysicalSecurityRightsAmplific..> 22-Dec-2014 07:54 488K
160-CryptologyandPhysicalSecurityRightsAmplific..> 22-Dec-2014 07:54 15M
161-PracticalVerifiableEncryptionandDecryptiono..> 22-Dec-2014 07:53 431K
161-PracticalVerifiableEncryptionandDecryptiono..> 22-Dec-2014 07:53 493K
162-OnConstructingLocallyComputableExtractorsan..> 22-Dec-2014 07:53 281K
162-OnConstructingLocallyComputableExtractorsan..> 22-Dec-2014 07:53 502K
163-ManintheMiddleinTunnelledAuthenticationProt..> 22-Dec-2014 07:53 437K
163-ManintheMiddleinTunnelledAuthenticationProt..> 22-Dec-2014 07:53 521K
164-AuthenticatedIDbasedKeyExchangeandremotelog..> 22-Dec-2014 07:53 118K
164-AuthenticatedIDbasedKeyExchangeandremotelog..> 22-Dec-2014 07:53 248K
165-CoercionResistantElectronicElections.pdf 22-Dec-2014 07:53 159K
166-MultiPartyAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 07:53 158K
166-MultiPartyAuthenticatedKeyAgreementProtocol..> 22-Dec-2014 07:53 381K
167-CryptanalysisofTwoNewSignatureSchemes.pdf 22-Dec-2014 07:53 96K
167-CryptanalysisofTwoNewSignatureSchemes.ps 22-Dec-2014 07:53 237K
168-NewSignatureSchemeUsingConjugacyProblem.pdf 22-Dec-2014 07:53 180K
168-NewSignatureSchemeUsingConjugacyProblem.ps 22-Dec-2014 07:53 432K
169-TheoreticalUseofCacheMemoryasaCryptanalytic..> 22-Dec-2014 07:53 147K
169-TheoreticalUseofCacheMemoryasaCryptanalytic..> 22-Dec-2014 07:53 318K
170-AnAnalysisofRMAC.pdf 22-Dec-2014 07:53 120K
170-AnAnalysisofRMAC.ps 22-Dec-2014 07:53 95K
171-StatisticalweaknessesintheallegedRC4keystre..> 22-Dec-2014 07:53 131K
171-StatisticalweaknessesintheallegedRC4keystre..> 22-Dec-2014 07:53 668K
172-PECDSAHowtobuildaDLbaseddigitalsignaturesch..> 22-Dec-2014 07:53 217K
172-PECDSAHowtobuildaDLbaseddigitalsignaturesch..> 22-Dec-2014 07:53 480K
173-EfficientGroupSignatureswithoutTrapdoors.pdf 22-Dec-2014 07:53 209K
174-ADesigner39sGuidetoKEMs.pdf 20-Jan-2023 08:41 228K
174-ADesignersGuidetoKEMs.pdf 22-Dec-2014 07:53 218K
174-ADesignersGuidetoKEMs.ps 22-Dec-2014 07:53 380K
175-AggregateandVerifiablyEncryptedSignaturesfr..> 22-Dec-2014 07:53 302K
175-AggregateandVerifiablyEncryptedSignaturesfr..> 22-Dec-2014 07:53 319K
176-TheoreticalAnalysisofCorrelationsinRC6.pdf 22-Dec-2014 07:53 293K
176-TheoreticalAnalysisofCorrelationsinRC6.ps 22-Dec-2014 07:53 471K
176-TheoreticalAnalysisofCorrelationsinRC63939.pdf 20-Jan-2023 08:41 281K
177-twoattacksonxiayouGroupSignature.pdf 22-Dec-2014 07:53 184K
178-AttackonANewPublicKeyCryptosystemfromISC02L..> 22-Dec-2014 07:53 81K
178-AttackonANewPublicKeyCryptosystemfromISC02L..> 22-Dec-2014 07:53 222K
178-AttackonANewPublicKeyCryptosystemfromISC390..> 20-Jan-2023 08:41 77K
179-ParallelAlgorithmforMultiplicationonEllipti..> 22-Dec-2014 07:53 165K
179-ParallelAlgorithmforMultiplicationonEllipti..> 22-Dec-2014 07:53 135K
180-OMACOneKeyCBCMAC.pdf 22-Dec-2014 07:52 226K
180-OMACOneKeyCBCMAC.ps 22-Dec-2014 07:52 562K
181-CountingPointsforHyperellipticCurvesoftypey..> 22-Dec-2014 07:52 197K
181-CountingPointsforHyperellipticCurvesoftypey..> 22-Dec-2014 07:52 447K
182-ObliviousKeywordSearch.pdf 22-Dec-2014 07:52 132K
182-ObliviousKeywordSearch.ps 22-Dec-2014 07:52 292K
183-SimplebackdoorstoRSAkeygeneration.pdf 22-Dec-2014 07:52 180K
183-SimplebackdoorstoRSAkeygeneration.ps 22-Dec-2014 07:52 347K
184-IdentityBasedAuthenticatedKeyAgreementProto..> 22-Dec-2014 07:52 216K
184-IdentityBasedAuthenticatedKeyAgreementProto..> 22-Dec-2014 07:52 447K
185-Turingafaststreamcipher.pdf 22-Dec-2014 07:52 234K
186-ZeroKnowledgetwentyyearsafteritsinvention.pdf 22-Dec-2014 07:52 481K
186-ZeroKnowledgetwentyyearsafteritsinvention.ps 22-Dec-2014 07:52 889K
187-EntityAuthenticationSchemesUsingBraidWordRe..> 22-Dec-2014 07:52 238K
187-EntityAuthenticationSchemesUsingBraidWordRe..> 22-Dec-2014 07:52 835K
188-KeyrecoveryattacksonNTRUwithoutciphertextva..> 22-Dec-2014 07:52 178K
188-KeyrecoveryattacksonNTRUwithoutciphertextva..> 22-Dec-2014 07:52 450K
189-BitSliceAuctionCircuit.pdf 22-Dec-2014 07:52 205K
189-BitSliceAuctionCircuit.ps 22-Dec-2014 07:52 140K
190-ParallelizableAuthenticationTrees.pdf 22-Dec-2014 07:52 231K
190-ParallelizableAuthenticationTrees.ps 22-Dec-2014 07:52 314K
191-ALinearizationAttackontheBluetoothKeyStream..> 22-Dec-2014 07:52 156K
191-ALinearizationAttackontheBluetoothKeyStream..> 22-Dec-2014 07:52 151K
192-SecurityProofsforanEfficientPasswordBasedKe..> 22-Dec-2014 07:52 282K
192-SecurityProofsforanEfficientPasswordBasedKe..> 22-Dec-2014 07:52 565K
193-ANoteonIdealTripartiteAccessStructures.pdf 22-Dec-2014 07:52 124K
193-ANoteonIdealTripartiteAccessStructures.ps 22-Dec-2014 07:52 368K
194-ApolarisationbasedVisualCryptoSystemanditsS..> 22-Dec-2014 07:52 230K
194-ApolarisationbasedVisualCryptoSystemanditsS..> 22-Dec-2014 07:52 255K
195-AnadditiontothepaperApolarisationbasedvisua..> 22-Dec-2014 07:52 161K
195-AnadditiontothepaperApolarisationbasedvisua..> 22-Dec-2014 07:52 157K