Index of /2003/


../
001-AModeofOperationwithPartialEncryptionandMes..> 22-Dec-2014 08:15    151K
002-ImperfectDecryptionandanAttackontheNTRUEncr..> 22-Dec-2014 08:15    253K
002-ImperfectDecryptionandanAttackontheNTRUEncr..> 22-Dec-2014 08:15    205K
003-PlaintextdependantRepetitionCodesCryptanaly..> 22-Dec-2014 08:15    270K
003-PlaintextdependantRepetitionCodesCryptanaly..> 22-Dec-2014 08:15    249K
004-IDbasedtripartiteAuthenticatedKeyAgreementP..> 22-Dec-2014 08:15    125K
004-IDbasedtripartiteAuthenticatedKeyAgreementP..> 22-Dec-2014 08:15    313K
005-DistributingtheEncryptionandDecryptionofaBl..> 22-Dec-2014 08:15    234K
005-DistributingtheEncryptionandDecryptionofaBl..> 22-Dec-2014 08:15    391K
006-MultiPartyComputationfromanyLinearSecretSha..> 22-Dec-2014 08:15    243K
006-MultiPartyComputationfromanyLinearSecretSha..> 22-Dec-2014 08:15    254K
007-APriceNegotiableTransactionSystem.pdf          20-Jan-2023 14:22     207
008-DFAonAES.pdf                                   22-Dec-2014 08:15    178K
008-DFAonAES.ps                                    22-Dec-2014 08:15      3M
009-DomainExtendersforUOWHFAFiniteBinaryTreeAlg..> 22-Dec-2014 08:15    244K
009-DomainExtendersforUOWHFAFiniteBinaryTreeAlg..> 22-Dec-2014 08:15    235K
010-DifferentialFaultAnalysisonAES.pdf             22-Dec-2014 08:15    208K
011-CryptanalysisofLeeHwangLi39sKeyAuthenticati..> 20-Jan-2023 08:41     74K
011-CryptanalysisofLeeHwangLisKeyAuthentication..> 22-Dec-2014 08:15     78K
011-CryptanalysisofLeeHwangLisKeyAuthentication..> 22-Dec-2014 08:15    201K
012-ThenumberofinitialstatesoftheRC4cipherwitht..> 22-Dec-2014 08:15     95K
012-ThenumberofinitialstatesoftheRC4cipherwitht..> 22-Dec-2014 08:15    370K
013-SecurityConstraintsontheOswaldAignerExponen..> 22-Dec-2014 08:15    268K
013-SecurityConstraintsontheOswaldAignerExponen..> 22-Dec-2014 08:15    270K
014-HijibijbijANewStreamCipherwithaSelfSynchron..> 22-Dec-2014 08:15    283K
014-HijibijbijANewStreamCipherwithaSelfSynchron..> 22-Dec-2014 08:15    494K
015-AUniversallyComposableCryptographicLibrary.pdf 22-Dec-2014 08:15    601K
015-AUniversallyComposableCryptographicLibrary.ps  22-Dec-2014 08:15      3M
016-AThresholdGQSignatureScheme.pdf                22-Dec-2014 08:15    217K
016-AThresholdGQSignatureScheme.ps                 22-Dec-2014 08:15    458K
017-PerfectHashFamilieswithFewFunctions.pdf        22-Dec-2014 08:15    218K
017-PerfectHashFamilieswithFewFunctions.ps         22-Dec-2014 08:15    229K
018-AnAuthenticatedGroupKeyAgreementProtocolonB..> 22-Dec-2014 08:14    102K
018-AnAuthenticatedGroupKeyAgreementProtocolonB..> 22-Dec-2014 08:14    284K
019-APolynomialTimeAlgorithmfortheBraidDiffieHe..> 22-Dec-2014 08:14    248K
019-APolynomialTimeAlgorithmfortheBraidDiffieHe..> 22-Dec-2014 08:14    235K
020-AttacksbasedonConditionalCorrelationsagains..> 22-Dec-2014 08:14    293K
020-AttacksbasedonConditionalCorrelationsagains..> 22-Dec-2014 08:14    776K
021-InterleavingCryptographyandMechanismDesignT..> 22-Dec-2014 08:14    163K
021-InterleavingCryptographyandMechanismDesignT..> 22-Dec-2014 08:14    140K
022-DidFiliolBreakAES.pdf                          22-Dec-2014 08:14    155K
022-DidFiliolBreakAES.ps                           22-Dec-2014 08:14    357K
023-Newidentitybasedsigncryptionschemesfrompair..> 22-Dec-2014 08:14    246K
023-Newidentitybasedsigncryptionschemesfrompair..> 22-Dec-2014 08:14    254K
024-OnModelingINDCCASecurityinCryptographicProt..> 22-Dec-2014 08:14    243K
024-OnModelingINDCCASecurityinCryptographicProt..> 22-Dec-2014 08:14    212K
025-Homomorphicpublickeycryptosystemsandencrypt..> 22-Dec-2014 08:14    229K
025-Homomorphicpublickeycryptosystemsandencrypt..> 22-Dec-2014 08:14    182K
026-HyperellipticCurveCryptosystemsClosingthePe..> 22-Dec-2014 08:14    217K
026-HyperellipticCurveCryptosystemsClosingthePe..> 22-Dec-2014 08:14    526K
027-CryptographicRandomizedResponseTechniques.pdf  22-Dec-2014 08:14    272K
027-CryptographicRandomizedResponseTechniques.ps   22-Dec-2014 08:14    237K
028-EllipticCurveCryptosystemsinthePresenceofPe..> 22-Dec-2014 08:14    220K
028-EllipticCurveCryptosystemsinthePresenceofPe..> 22-Dec-2014 08:14    191K
029-UniversalPaddingSchemesforRSAwithOptimalBan..> 20-Jan-2023 14:22     207
030-EfficientMultiPartyComputationoverRings.pdf    22-Dec-2014 08:14    302K
030-EfficientMultiPartyComputationoverRings.ps     22-Dec-2014 08:14    509K
031-CryptographicTamperEvidence.pdf                22-Dec-2014 08:14    320K
031-CryptographicTamperEvidence.ps                 22-Dec-2014 08:14    415K
032-AFrameworkforPasswordBasedAuthenticatedKeyE..> 22-Dec-2014 08:14    465K
032-AFrameworkforPasswordBasedAuthenticatedKeyE..> 22-Dec-2014 08:14    730K
033-IntegralCryptanalysisonreducedroundSafer.pdf   22-Dec-2014 08:14    272K
034-OntheInsecurityoftheFiatShamirParadigm.pdf     22-Dec-2014 08:14    444K
034-OntheInsecurityoftheFiatShamirParadigm.ps      22-Dec-2014 08:14      1M
035-Onalternativeapproachforverifiablesecretsha..> 22-Dec-2014 08:14    262K
036-Cryptanalysisofapublickeyencryptionschemeba..> 22-Dec-2014 08:13    104K
036-Cryptanalysisofapublickeyencryptionschemeba..> 22-Dec-2014 08:13    251K
037-StrengtheningZeroKnowledgeProtocolsusingSig..> 22-Dec-2014 08:13    513K
037-StrengtheningZeroKnowledgeProtocolsusingSig..> 22-Dec-2014 08:13    944K
038-PrettySimplePasswordAuthenticatedKeyExchang..> 22-Dec-2014 08:13    217K
038-PrettySimplePasswordAuthenticatedKeyExchang..> 22-Dec-2014 08:13    176K
039-Torusbasedcryptography.pdf                     22-Dec-2014 08:13    273K
039-Torusbasedcryptography.ps                      22-Dec-2014 08:13    494K
040-ComputingPartialWalshTransformfromtheAlgebr..> 22-Dec-2014 08:13    273K
040-ComputingPartialWalshTransformfromtheAlgebr..> 22-Dec-2014 08:13    301K
041-Anewstatisticaldistinguisherfortheshrinking..> 22-Dec-2014 08:13    316K
041-Anewstatisticaldistinguisherfortheshrinking..> 22-Dec-2014 08:13    421K
042-TimedFairExchangeofStandardSignatures.pdf      22-Dec-2014 08:13    291K
042-TimedFairExchangeofStandardSignatures.ps       22-Dec-2014 08:13    538K
043-ParallelSigncryptionwithOAEPPSSRandotherFei..> 20-Jan-2023 14:22     207
044-SigncryptionschemeforIdentitybasedCryptosys..> 20-Jan-2023 14:22     207
045-AnalgorithmtoobtainanRSAmoduluswithalargepr..> 22-Dec-2014 08:13    124K
046-RemarksonSaeednia39sIdentitybasedSocietyOri..> 20-Jan-2023 08:41    117K
046-RemarksonSaeedniasIdentitybasedSocietyOrien..> 22-Dec-2014 08:13    135K
046-RemarksonSaeedniasIdentitybasedSocietyOrien..> 22-Dec-2014 08:13    110K
047-AConstructionof100bitPublicKeyCryptosystema..> 22-Dec-2014 08:13    195K
047-AConstructionof100bitPublicKeyCryptosystema..> 22-Dec-2014 08:13    251K
048-CompoundingSecretSharingSchemes.pdf            22-Dec-2014 08:13    186K
048-CompoundingSecretSharingSchemes.ps             22-Dec-2014 08:13    181K
049-HiddenNumberProbleminSmallSubgroups.pdf        22-Dec-2014 08:13    113K
049-HiddenNumberProbleminSmallSubgroups.ps         22-Dec-2014 08:13      1M
050-ConcealmentanditsApplicationstoAuthenticate..> 22-Dec-2014 08:13    222K
050-ConcealmentanditsApplicationstoAuthenticate..> 22-Dec-2014 08:13    228K
051-HowtoPredicttheOutputofaHardwareRandomNumbe..> 22-Dec-2014 08:13    111K
051-HowtoPredicttheOutputofaHardwareRandomNumbe..> 22-Dec-2014 08:13     72K
052-AttackingRSAbasedSessionsinSSLTLS.pdf          22-Dec-2014 08:13    462K
053-Tatepairingimplementationsfortripartitekeya..> 22-Dec-2014 08:13    234K
053-Tatepairingimplementationsfortripartitekeya..> 22-Dec-2014 08:13    280K
054-IDbasedCryptosystemswithPairingonEllipticCu..> 22-Dec-2014 08:13    175K
054-IDbasedCryptosystemswithPairingonEllipticCu..> 22-Dec-2014 08:13    153K
055-ANewApproachtoPreventBlackmailinginECash.pdf   22-Dec-2014 08:13     98K
056-ComputingofTrustinDistributedNetworks.pdf      22-Dec-2014 08:13     99K
056-ComputingofTrustinDistributedNetworks.ps       22-Dec-2014 08:13    237K
057-SecureMultiplicationofSharedSecretsintheExp..> 22-Dec-2014 08:13    262K
057-SecureMultiplicationofSharedSecretsintheExp..> 22-Dec-2014 08:13    218K
058-AnEllipticCurveTrapdoorSystem.pdf              22-Dec-2014 08:13    284K
058-AnEllipticCurveTrapdoorSystem.ps               22-Dec-2014 08:12    282K
059-ATransitiveSignatureSchemeProvablySecureAga..> 20-Jan-2023 14:22     207
060-IsomorphismClassesofPicardCurvesoverFiniteF..> 22-Dec-2014 08:12    207K
060-IsomorphismClassesofPicardCurvesoverFiniteF..> 22-Dec-2014 08:12    179K
061-HiddenPolynomialCryptosystems.pdf              22-Dec-2014 08:12    249K
062-ExtendingJoux39sProtocoltoMultiPartyKeyAgre..> 20-Jan-2023 14:22     207
062-ExtendingJouxsProtocoltoMultiPartyKeyAgreem..> 22-Dec-2014 08:12    252K
062-ExtendingJouxsProtocoltoMultiPartyKeyAgreem..> 22-Dec-2014 08:12    299K
063-InitiatorResilientUniversallyComposableKeyE..> 22-Dec-2014 08:12    284K
063-InitiatorResilientUniversallyComposableKeyE..> 22-Dec-2014 08:12    498K
064-OntheOptimalityofLinearDifferentialandSeque..> 22-Dec-2014 08:12    335K
064-OntheOptimalityofLinearDifferentialandSeque..> 22-Dec-2014 08:12    293K
065-HashFunctionBalanceanditsImpactonBirthdayAt..> 22-Dec-2014 08:12    408K
065-HashFunctionBalanceanditsImpactonBirthdayAt..> 22-Dec-2014 08:12    424K
066-SigncryptionschemeforIdentitybasedCryptosys..> 22-Dec-2014 08:12     84K
066-SigncryptionschemeforIdentitybasedCryptosys..> 22-Dec-2014 08:12    186K
067-ForkingLemmasintheRingSignatures39Scenario.pdf 20-Jan-2023 08:41    266K
067-ForkingLemmasintheRingSignaturesScenario.pdf   22-Dec-2014 08:12    248K
067-ForkingLemmasintheRingSignaturesScenario.ps    22-Dec-2014 08:12    244K
068-OntheSecurityofSomeProxySignatureSchemes.pdf   22-Dec-2014 08:12    130K
068-OntheSecurityofSomeProxySignatureSchemes.ps    22-Dec-2014 08:12    290K
069-EAXAConventionalAuthenticatedEncryptionMode..> 22-Dec-2014 08:12    517K
069-EAXAConventionalAuthenticatedEncryptionMode.ps 22-Dec-2014 08:12    540K
070-ACritiqueofCCM.pdf                             22-Dec-2014 08:12    252K
070-ACritiqueofCCM.ps                              22-Dec-2014 08:12    206K
071-HowtoProtectAgainstaMilitantSpammer.pdf        22-Dec-2014 08:12    141K
071-HowtoProtectAgainstaMilitantSpammer.ps         22-Dec-2014 08:12    276K
072-ProxyBlindSignatureScheme.pdf                  22-Dec-2014 08:12    170K
073-ASchemeforobtainingaWarrantMessagefromtheDi..> 22-Dec-2014 08:12    145K
074-DivisibleVotingScheme.pdf                      22-Dec-2014 08:12    204K
075-AlmostSecurityofCryptographicBooleanFunctio..> 22-Dec-2014 08:12    122K
075-AlmostSecurityofCryptographicBooleanFunctio..> 22-Dec-2014 08:12    285K
076-GoldbachsConjectureonECDSAProtocols.pdf        22-Dec-2014 08:12    129K
076-GoldbachsConjectureonECDSAProtocols.ps         22-Dec-2014 08:12    126K
077-AnUninstantiableRandomOracleModelSchemefora..> 22-Dec-2014 08:12    441K
077-AnUninstantiableRandomOracleModelSchemefora..> 22-Dec-2014 08:12    413K
078-Relationamongsimulatorbasedandcomparisonbas..> 22-Dec-2014 08:11    233K
078-Relationamongsimulatorbasedandcomparisonbas..> 22-Dec-2014 08:11    206K
079-FastarithmeticonJacobiansofPicardcurves.pdf    22-Dec-2014 08:11    173K
079-FastarithmeticonJacobiansofPicardcurves.ps     22-Dec-2014 08:11    449K
080-NoninteractiveandReusableNonmalleableCommit..> 22-Dec-2014 08:11    253K
080-NoninteractiveandReusableNonmalleableCommit..> 22-Dec-2014 08:11    391K
081-PrimitiveSpecificationforSOBER128.pdf          22-Dec-2014 08:11    329K
082-StrongerSecurityBoundsforOMACTMACandXCBC.pdf   22-Dec-2014 08:11    225K
082-StrongerSecurityBoundsforOMACTMACandXCBC.ps    22-Dec-2014 08:11    512K
083-AForwardSecurePublicKeyEncryptionScheme.pdf    22-Dec-2014 08:11    274K
083-AForwardSecurePublicKeyEncryptionScheme.ps     22-Dec-2014 08:11    479K
084-CryptanalysisofanimplementationschemeoftheT..> 22-Dec-2014 08:11    186K
084-CryptanalysisofanimplementationschemeoftheT..> 22-Dec-2014 08:11    387K
085-AdefectoftheimplementationschemesoftheTTMcr..> 22-Dec-2014 08:11    213K
085-AdefectoftheimplementationschemesoftheTTMcr..> 22-Dec-2014 08:11    419K
086-OntheSelectionofPairingFriendlyGroups.pdf      22-Dec-2014 08:11    130K
086-OntheSelectionofPairingFriendlyGroups.ps       22-Dec-2014 08:11    294K
087-APracticalEllipticCurvePublicKeyEncryptionS..> 22-Dec-2014 08:11     96K
087-APracticalEllipticCurvePublicKeyEncryptionS..> 22-Dec-2014 08:11    258K
088-EllipticCurvePointMultiplication.pdf           22-Dec-2014 08:11    208K
089-EfficientPublicKeyGenerationforMultivariate..> 22-Dec-2014 08:11    163K
089-EfficientPublicKeyGenerationforMultivariate..> 22-Dec-2014 08:11    341K
090-AStructuredMultisignatureSchemefromtheGapDi..> 22-Dec-2014 08:11     72K
091-SequentialAggregateSignaturesfromTrapdoorPe..> 22-Dec-2014 08:11    218K
091-SequentialAggregateSignaturesfromTrapdoorPe..> 22-Dec-2014 08:11    396K
092-ProvablySecureEnhancementon3GPPAuthenticati..> 22-Dec-2014 08:11    307K
092-ProvablySecureEnhancementon3GPPAuthenticati..> 22-Dec-2014 08:11    343K
093-SimpleStatelessSteganography.pdf               22-Dec-2014 08:11    289K
093-SimpleStatelessSteganography.ps                22-Dec-2014 08:11    393K
094-TraceZeroSubvarietyforCryptosystems.pdf        22-Dec-2014 08:11    271K
094-TraceZeroSubvarietyforCryptosystems.ps         22-Dec-2014 08:11    298K
095-PublicKeyTraceandRevokeSchemeSecureagainstA..> 22-Dec-2014 08:11    294K
095-PublicKeyTraceandRevokeSchemeSecureagainstA..> 22-Dec-2014 08:11    615K
096-SecureProxySignatureSchemesforDelegationofS..> 22-Dec-2014 08:10    399K
097-LowCostSecurityExplicitFormulaeforGenus4Hyp..> 22-Dec-2014 08:10    270K
097-LowCostSecurityExplicitFormulaeforGenus4Hyp..> 22-Dec-2014 08:10    280K
098-SideChannelAttacksonCBCEncryptedMessagesint..> 22-Dec-2014 08:10    108K
099-AlgorithmsinBraidGroups.pdf                    22-Dec-2014 08:10    148K
099-AlgorithmsinBraidGroups.ps                     22-Dec-2014 08:10    318K
100-ProtocolsforBoundedConcurrentSecureTwoParty..> 22-Dec-2014 08:10    488K
100-ProtocolsforBoundedConcurrentSecureTwoParty..> 22-Dec-2014 08:10    695K
101-CryptanalysisofHFE.pdf                         20-Jan-2023 14:22     207
102-LengthBasedAttacksforCertainGroupBasedEncry..> 22-Dec-2014 08:10    101K
103-SecurityanalysisonNallaReddy39sIDbasedtripa..> 20-Jan-2023 08:41     78K
103-SecurityanalysisonNallaReddysIDbasedtripart..> 22-Dec-2014 08:10     49K
103-SecurityanalysisonNallaReddysIDbasedtripart..> 22-Dec-2014 08:10    144K
104-NewProxySignatureProxyBlindSignatureandProx..> 22-Dec-2014 08:10    129K
104-NewProxySignatureProxyBlindSignatureandProx..> 22-Dec-2014 08:10    297K
105-OnDiophantineComplexityandStatisticalZeroKn..> 22-Dec-2014 08:10    315K
105-OnDiophantineComplexityandStatisticalZeroKn..> 22-Dec-2014 08:10    309K
106-CWCAhighperformanceconventionalauthenticate..> 22-Dec-2014 08:10    406K
106-CWCAhighperformanceconventionalauthenticate..> 22-Dec-2014 08:10    417K
107-FujisakiOkamotoINDCCAhybridencryptionrevisi..> 22-Dec-2014 08:10    249K
107-FujisakiOkamotoINDCCAhybridencryptionrevisi..> 22-Dec-2014 08:10    553K
108-NovelCyclicandAlgebraicPropertiesofAES.pdf     22-Dec-2014 08:10     76K
108-NovelCyclicandAlgebraicPropertiesofAES.ps      22-Dec-2014 08:10    184K
109-CrytanalysisofSAFER.pdf                        22-Dec-2014 08:10    239K
109-CrytanalysisofSAFER.ps                         22-Dec-2014 08:10      1M
110-ProposalonPersonalAuthenticationSysteminwhi..> 22-Dec-2014 08:10    492K
111-FurtherCryptanalysisofsomeProxySignatureSch..> 20-Jan-2023 08:41    120K
112-AccumulatingCompositesandImprovedGroupSigni..> 22-Dec-2014 08:10    315K
112-AccumulatingCompositesandImprovedGroupSigni..> 22-Dec-2014 08:10    335K
113-SecurityAnalysisofShim39sAuthenticatedKeyAg..> 20-Jan-2023 08:41    120K
113-SecurityAnalysisofShimsAuthenticatedKeyAgre..> 22-Dec-2014 08:10     88K
113-SecurityAnalysisofShimsAuthenticatedKeyAgre..> 22-Dec-2014 08:10    209K
114-UnifyingSimulatabilityDefinitionsinCryptogr..> 22-Dec-2014 08:10    266K
114-UnifyingSimulatabilityDefinitionsinCryptogr..> 22-Dec-2014 08:10      1M
115-CryptanalysisofIDbasedTripartiteAuthenticat..> 22-Dec-2014 08:10    109K
116-ANewIDbasedGroupSignatureSchemefromBilinear..> 22-Dec-2014 08:10    152K
116-ANewIDbasedGroupSignatureSchemefromBilinear..> 22-Dec-2014 08:10    335K
117-Anidentitybasedringsignatureschemefrombilin..> 22-Dec-2014 08:10     46K
118-VisualCryptoDisplaysEnablingSecureCommunica..> 22-Dec-2014 08:09    306K
118-VisualCryptoDisplaysEnablingSecureCommunica..> 22-Dec-2014 08:09    770K
119-HowSecureAreFPGAsinCryptographicApplication..> 22-Dec-2014 08:09    156K
119-HowSecureAreFPGAsinCryptographicApplication..> 22-Dec-2014 08:09    328K
120-PhysicallyObservableCryptography.pdf           22-Dec-2014 08:09    258K
120-PhysicallyObservableCryptography.ps            22-Dec-2014 08:09    522K
121-ACryptographicallySoundSecurityProofoftheNe..> 22-Dec-2014 08:09    194K
121-ACryptographicallySoundSecurityProofoftheNe..> 22-Dec-2014 08:09    386K
122-CryptanalysisofAlRiyamiPaterson39sAuthentic..> 20-Jan-2023 08:41    131K
122-CryptanalysisofAlRiyamiPatersonsAuthenticat..> 22-Dec-2014 08:09    131K
123-Assessingsecurityofsomegroupbasedcryptosyst..> 22-Dec-2014 08:09    116K
123-Assessingsecurityofsomegroupbasedcryptosyst..> 22-Dec-2014 08:09    260K
124-AGeneralCorrelationTheorem.pdf                 22-Dec-2014 08:09    209K
124-AGeneralCorrelationTheorem.ps                  22-Dec-2014 08:09    219K
125-AlgebraicAttacksonCombinerswithMemoryandSev..> 22-Dec-2014 08:09    234K
125-AlgebraicAttacksonCombinerswithMemoryandSev..> 22-Dec-2014 08:09    440K
126-CertificatelessPublicKeyCryptography.pdf       22-Dec-2014 08:09    406K
126-CertificatelessPublicKeyCryptography.ps        22-Dec-2014 08:09    742K
127-UsingInformationTheoryApproachtoRandomnessT..> 22-Dec-2014 08:09    170K
128-WeakFieldsforECC.pdf                           22-Dec-2014 08:09    295K
128-WeakFieldsforECC.ps                            22-Dec-2014 08:09    227K
129-AttackonHanetal39sIDbasedConfirmerUndeniabl..> 20-Jan-2023 08:41    122K
129-AttackonHanetalsIDbasedConfirmerUndeniableS..> 22-Dec-2014 08:09     73K
129-AttackonHanetalsIDbasedConfirmerUndeniableS..> 22-Dec-2014 08:09    204K
130-OnthePseudorandomnessofKASUMITypePermutatio..> 22-Dec-2014 08:09    209K
130-OnthePseudorandomnessofKASUMITypePermutatio..> 22-Dec-2014 08:09    537K
131-Homomorphicpublickeysystemsbasedonsubgroupm..> 22-Dec-2014 08:09    169K
131-Homomorphicpublickeysystemsbasedonsubgroupm..> 22-Dec-2014 08:09    312K
132-Guaranteeingthediversityofnumbergenerators.pdf 22-Dec-2014 08:09    297K
132-Guaranteeingthediversityofnumbergenerators.ps  22-Dec-2014 08:09    302K
133-MinimumDistancebetweenBentand1resilientBool..> 22-Dec-2014 08:09    238K
133-MinimumDistancebetweenBentand1resilientBool..> 22-Dec-2014 08:09    247K
134-DirectSumofNonNormalandNormalBentFunctionsA..> 20-Jan-2023 14:22     207
135-CollisionAttackonReducedRoundCamellia.pdf      22-Dec-2014 08:09    118K
135-CollisionAttackonReducedRoundCamellia.ps       22-Dec-2014 08:09    271K
136-Efficientlinearfeedbackshiftregisterswithma..> 22-Dec-2014 08:09    218K
136-Efficientlinearfeedbackshiftregisterswithma..> 22-Dec-2014 08:09    213K
137-Bernoullinumbersandtheprobabilityofabirthda..> 22-Dec-2014 08:09    176K
137-Bernoullinumbersandtheprobabilityofabirthda..> 22-Dec-2014 08:09    158K
138-Permutationgraphsfastforwardpermutationsand..> 22-Dec-2014 08:08    259K
138-Permutationgraphsfastforwardpermutationsand.ps 22-Dec-2014 08:08    255K
139-OntheRandomnessoftheEditingGenerator.pdf       22-Dec-2014 08:08    183K
140-TradingOffTypeInferenceMemoryComplexityAgai..> 22-Dec-2014 08:08    178K
140-TradingOffTypeInferenceMemoryComplexityAgai..> 22-Dec-2014 08:08    390K
141-GeneralCompositionandUniversalComposability..> 22-Dec-2014 08:08    343K
141-GeneralCompositionandUniversalComposability..> 22-Dec-2014 08:08    521K
142-ANewTreebasedDomainExtensionofUOWHF.pdf        22-Dec-2014 08:08    213K
142-ANewTreebasedDomainExtensionofUOWHF.ps         22-Dec-2014 08:08    200K
143-Ellipticcurvessuitableforpairingbasedcrypto..> 22-Dec-2014 08:08    196K
143-Ellipticcurvessuitableforpairingbasedcrypto..> 22-Dec-2014 08:08    162K
144-IDbasedtripartitekeyagreementwithsignatures..> 22-Dec-2014 08:08     84K
144-IDbasedtripartitekeyagreementwithsignatures.ps 22-Dec-2014 08:08    383K
145-SymmetricAuthenticationWithinaSimulatableCr..> 22-Dec-2014 08:08    368K
145-SymmetricAuthenticationWithinaSimulatableCr..> 22-Dec-2014 08:08    825K
146-BreakingandRepairingOptimisticFairExchangef..> 22-Dec-2014 08:08    149K
146-BreakingandRepairingOptimisticFairExchangef..> 22-Dec-2014 08:08    433K
147-AParallelizableEncipheringMode.pdf             22-Dec-2014 08:08    413K
147-AParallelizableEncipheringMode.ps              22-Dec-2014 08:08    448K
148-ATweakableEncipheringMode.pdf                  22-Dec-2014 08:08    501K
148-ATweakableEncipheringMode.ps                   22-Dec-2014 08:08    541K
149-ForwardSecureHierarchicalIDBasedCryptograph..> 20-Jan-2023 14:22     207
150-Ontherandomoraclemethodologyasappliedtoleng..> 22-Dec-2014 08:08    299K
150-Ontherandomoraclemethodologyasappliedtoleng..> 22-Dec-2014 08:08    263K
151-Secretsharingschemesonsparsehomogeneousacce..> 22-Dec-2014 08:08    276K
152-OptimalStatisticalPowerAnalysis.pdf            22-Dec-2014 08:08    900K
153-AttackonanIdentificationSchemeBasedonGapDif..> 22-Dec-2014 08:08     90K
154-ManTiCoreEncryptionwithJointCipherStateAuth..> 22-Dec-2014 08:08    139K
154-ManTiCoreEncryptionwithJointCipherStateAuth..> 22-Dec-2014 08:08    445K
155-AFormalProofofZhu39sSignatureScheme.pdf        20-Jan-2023 08:41    154K
155-AFormalProofofZhusSignatureScheme.pdf          22-Dec-2014 08:08    154K
156-EfficientProvablySecurePublicKeySteganograp..> 22-Dec-2014 08:08    179K
156-EfficientProvablySecurePublicKeySteganograp..> 22-Dec-2014 08:08    345K
157-SomeRSAbasedEncryptionSchemeswithTightSecur..> 22-Dec-2014 08:07    149K
157-SomeRSAbasedEncryptionSchemeswithTightSecur..> 22-Dec-2014 08:07    343K
158-ASufficientConditionandOptimalDomainExtensi..> 22-Dec-2014 08:07    261K
158-ASufficientConditionandOptimalDomainExtensi..> 22-Dec-2014 08:07    797K
159-AnefficientvariantoftheRSAcryptosystem.pdf     22-Dec-2014 08:07    121K
159-AnefficientvariantoftheRSAcryptosystem.ps      22-Dec-2014 08:07    267K
160-AMoreSecureandEfficaciousTTSSignatureScheme..> 22-Dec-2014 08:07    211K
160-AMoreSecureandEfficaciousTTSSignatureScheme.ps 22-Dec-2014 08:07    216K
161-IndifferentiabilityImpossibilityResultsonRe..> 22-Dec-2014 08:07    304K
161-IndifferentiabilityImpossibilityResultsonRe..> 22-Dec-2014 08:07    297K
162-CryptanalysisoftheAllegedSecurIDHashFunctio..> 22-Dec-2014 08:07    244K
162-CryptanalysisoftheAllegedSecurIDHashFunctio..> 22-Dec-2014 08:07    488K
163-MultipurposeIdentityBasedSigncryptionASwiss..> 22-Dec-2014 08:07    543K
163-MultipurposeIdentityBasedSigncryptionASwiss..> 22-Dec-2014 08:07    551K
164-IdentityBasedThresholdDecryption.pdf           22-Dec-2014 08:07    306K
164-IdentityBasedThresholdDecryption.ps            22-Dec-2014 08:07    553K
165-CommitmentCapacityofDiscreteMemorylessChann..> 22-Dec-2014 08:07    195K
166-AreductionofthespacefortheparallelizedPolla..> 22-Dec-2014 08:07    128K
166-AreductionofthespacefortheparallelizedPolla..> 22-Dec-2014 08:07    295K
167-IdentitybasedChameleonHashandApplications.pdf  22-Dec-2014 08:07    167K
168-Robustdiscretizationwithanapplicationtograp..> 22-Dec-2014 08:07    207K
168-Robustdiscretizationwithanapplicationtograp..> 22-Dec-2014 08:07    204K
169-PropertiesoftheTransformationSemigroupofthe..> 22-Dec-2014 08:07    175K
169-PropertiesoftheTransformationSemigroupofthe..> 22-Dec-2014 08:07    678K
170-HARPSHAshedRandomPreloadedSubsetKeyDistribu..> 22-Dec-2014 08:07    241K
170-HARPSHAshedRandomPreloadedSubsetKeyDistribu..> 22-Dec-2014 08:07    425K
171-ScalableProtocolsforAuthenticatedGroupKeyEx..> 22-Dec-2014 08:07    275K
171-ScalableProtocolsforAuthenticatedGroupKeyEx..> 22-Dec-2014 08:07    474K
172-NAEPProvableSecurityinthePresenceofDecrypti..> 22-Dec-2014 08:07    223K
172-NAEPProvableSecurityinthePresenceofDecrypti..> 22-Dec-2014 08:07    437K
173-DomainExtenderforCollisionResistantHashFunc..> 22-Dec-2014 08:07    282K
173-DomainExtenderforCollisionResistantHashFunc..> 22-Dec-2014 08:07    292K
174-RelaxingChosenCiphertextSecurity.pdf           22-Dec-2014 08:07    515K
174-RelaxingChosenCiphertextSecurity.ps            22-Dec-2014 08:06    521K
175-DoubleSpeedSafePrimeGeneration.pdf             22-Dec-2014 08:06     47K
175-DoubleSpeedSafePrimeGeneration.ps              22-Dec-2014 08:06    140K
176-PattersonWiedemannConstructionRevisited.pdf    22-Dec-2014 08:06    300K
176-PattersonWiedemannConstructionRevisited.ps     22-Dec-2014 08:06    342K
177-BuildingSecureCryptographicTransformsorHowt..> 22-Dec-2014 08:06    465K
177-BuildingSecureCryptographicTransformsorHowt..> 22-Dec-2014 08:06    551K
178-ConstructingOptimisticFairExchangeProtocols..> 22-Dec-2014 08:06    168K
179-VMPCOneWayFunction.pdf                         22-Dec-2014 08:06     49K
179-VMPCOneWayFunction.ps                          22-Dec-2014 08:06    343K
180-ParallelizingExplicitFormulaforArithmeticin..> 22-Dec-2014 08:06    258K
180-ParallelizingExplicitFormulaforArithmeticin..> 22-Dec-2014 08:06    296K
181-OntheSecurityofMultipleEncryptionorCCAsecur..> 22-Dec-2014 08:06    391K
181-OntheSecurityofMultipleEncryptionorCCAsecur..> 22-Dec-2014 08:06    468K
182-ChosenCiphertextSecurityfromIdentityBasedEn..> 22-Dec-2014 08:06    175K
182-ChosenCiphertextSecurityfromIdentityBasedEn..> 22-Dec-2014 08:06    331K
183-CertificateBasedEncryptionandtheCertificate..> 22-Dec-2014 08:06    252K
184-WhatdoDESSboxesSaytoEachOther.pdf              22-Dec-2014 08:06    206K
184-WhatdoDESSboxesSaytoEachOther.ps               22-Dec-2014 08:06    440K
185-VMPCStreamCipher.pdf                           22-Dec-2014 08:06     54K
185-VMPCStreamCipher.ps                            22-Dec-2014 08:06    318K
186-SafePrimeGenerationwithaCombinedSieve.pdf      22-Dec-2014 08:06     83K
186-SafePrimeGenerationwithaCombinedSieve.ps       22-Dec-2014 08:06     61K
187-ResourceBoundedUnprovabilityofComputational..> 22-Dec-2014 08:06    548K
187-ResourceBoundedUnprovabilityofComputational..> 22-Dec-2014 08:06      1M
188-ANewForwardSecureSignatureSchemeusingBiline..> 22-Dec-2014 08:06    345K
189-Cryptanalysisofpubliclyverifiableauthentica..> 22-Dec-2014 08:06    119K
190-ExtendingJoux39sProtocoltoMultiPartyKeyAgre..> 20-Jan-2023 14:22     207
191-ProjectiveCoordinatesLeak.pdf                  22-Dec-2014 08:06    219K
191-ProjectiveCoordinatesLeak.ps                   22-Dec-2014 08:06    174K
192-UniversalDesignatedVerifierSignatures.pdf      22-Dec-2014 08:06    290K
192-UniversalDesignatedVerifierSignatures.ps       22-Dec-2014 08:06    544K
193-EfficientExtensionofStandardSchnorrRSAsigna..> 22-Dec-2014 08:06    400K
193-EfficientExtensionofStandardSchnorrRSAsigna..> 22-Dec-2014 08:06    717K
194-SecurityAnalysisofSeveralGroupSignatureSche..> 22-Dec-2014 08:05    254K
194-SecurityAnalysisofSeveralGroupSignatureSche..> 22-Dec-2014 08:05    261K
195-PublicKeyEncryptionwithkeywordSearch.pdf       22-Dec-2014 08:05    181K
196-SecurityAnalysisofSomeProxySignatures.pdf      22-Dec-2014 08:05    221K
196-SecurityAnalysisofSomeProxySignatures.ps       22-Dec-2014 08:05    209K
197-Revisitingfullydistributedproxysignaturesch..> 22-Dec-2014 08:05    240K
197-Revisitingfullydistributedproxysignaturesch..> 22-Dec-2014 08:05    229K
198-ConstructionofPerfectNonlinearandMaximallyN..> 22-Dec-2014 08:05    243K
198-ConstructionofPerfectNonlinearandMaximallyN..> 22-Dec-2014 08:05    255K
199-CryptanalysisofaMessageAuthenticationCodedu..> 22-Dec-2014 08:05    150K
199-CryptanalysisofaMessageAuthenticationCodedu..> 22-Dec-2014 08:05    137K
200-CryptanalysisofBLeeSKimKKimProxySignature.pdf  22-Dec-2014 08:05    122K
201-anattackonamultisignaturescheme.pdf            22-Dec-2014 08:05     31K
202-YetAnotherSievingDevice.pdf                    22-Dec-2014 08:05    248K
202-YetAnotherSievingDevice.ps                     22-Dec-2014 08:05    224K
203-NovelEfficientImplementationsofHyperellipti..> 22-Dec-2014 08:05    228K
203-NovelEfficientImplementationsofHyperellipti..> 22-Dec-2014 08:05    536K
204-ACompositionConstructionofBentLikeBooleanFu..> 22-Dec-2014 08:05    443K
205-ImprovedCryptanalysisofSecurID.pdf             22-Dec-2014 08:05    221K
205-ImprovedCryptanalysisofSecurID.ps              22-Dec-2014 08:05    405K
206-IdentityBasedUndeniableSignatures.pdf          22-Dec-2014 08:05    229K
206-IdentityBasedUndeniableSignatures.ps           22-Dec-2014 08:05    461K
207-SecurityFlawsinSeveralGroupSignaturesPropos..> 22-Dec-2014 08:05    127K
207-SecurityFlawsinSeveralGroupSignaturesPropos..> 22-Dec-2014 08:05    318K
208-IDBasedChameleonHashesfromBilinearPairings.pdf 22-Dec-2014 08:05    118K
208-IDBasedChameleonHashesfromBilinearPairings.ps  22-Dec-2014 08:05    298K
209-UsingtheTraceOperatortorepairthePolynomialR..> 22-Dec-2014 08:05    177K
209-UsingtheTraceOperatortorepairthePolynomialR..> 22-Dec-2014 08:05    220K
210-OnaRelationBetweenVerifiableSecretSharingSc..> 22-Dec-2014 08:05    200K
210-OnaRelationBetweenVerifiableSecretSharingSc..> 22-Dec-2014 08:05    454K
211-SFLASHv3afastasymmetricsignaturescheme.pdf     22-Dec-2014 08:05    145K
211-SFLASHv3afastasymmetricsignaturescheme.ps      22-Dec-2014 08:05    334K
212-HighPerformanceArithmeticforHyperellipticCu..> 22-Dec-2014 08:05    201K
212-HighPerformanceArithmeticforHyperellipticCu..> 22-Dec-2014 08:05    187K
213-IsomorphismClassesofHyperellipticCurvesofGe..> 22-Dec-2014 08:05    165K
213-IsomorphismClassesofHyperellipticCurvesofGe..> 22-Dec-2014 08:05    377K
214-MultiTrapdoorCommitmentsandtheirApplication..> 22-Dec-2014 08:05    355K
214-MultiTrapdoorCommitmentsandtheirApplication..> 22-Dec-2014 08:05    580K
215-DivideandConcatenateAScalableHardwareArchit..> 22-Dec-2014 08:05    160K
216-SecureIndexes.pdf                              22-Dec-2014 08:04    224K
216-SecureIndexes.ps                               22-Dec-2014 08:04    571K
217-ChemicalCombinatorialAttacksonKeyboards.pdf    22-Dec-2014 08:04    128K
217-ChemicalCombinatorialAttacksonKeyboards.ps     22-Dec-2014 08:04    521K
218-ASecurityEvaluationofWhitenoise.pdf            22-Dec-2014 08:04     70K
219-CryptanalysisoftheRepairedPublickeyEncrypti..> 22-Dec-2014 08:04    148K
219-CryptanalysisoftheRepairedPublickeyEncrypti..> 22-Dec-2014 08:04    308K
220-AshortcommentontheaffinepartsofSFLASHv3.pdf    22-Dec-2014 08:04    157K
220-AshortcommentontheaffinepartsofSFLASHv3.ps     22-Dec-2014 08:04    129K
221-ACryptanalysisoftheOriginalDomingoFerrer39s..> 20-Jan-2023 08:41    171K
221-ACryptanalysisoftheOriginalDomingoFerrersAl..> 22-Dec-2014 08:04    128K
221-ACryptanalysisoftheOriginalDomingoFerrersAl..> 22-Dec-2014 08:04    290K
222-AVerifiableSecretSharingSchemewithStatistic..> 22-Dec-2014 08:04    204K
222-AVerifiableSecretSharingSchemewithStatistic..> 22-Dec-2014 08:04    404K
223-CryptanalysisofaCryptosystembasedonDrinfeld..> 22-Dec-2014 08:04    128K
223-CryptanalysisofaCryptosystembasedonDrinfeld..> 22-Dec-2014 08:04    101K
224-Withdrawn.pdf                                  18-Aug-2023 00:00     207
225-MaskingBasedDomainExtendersforUOWHFsBoundsa..> 22-Dec-2014 08:04    315K
225-MaskingBasedDomainExtendersforUOWHFsBoundsa..> 22-Dec-2014 08:04    329K
226-OntheSecurityofaGroupSignatureSchemewithFor..> 22-Dec-2014 08:04    242K
226-OntheSecurityofaGroupSignatureSchemewithFor..> 22-Dec-2014 08:04    224K
227-AttacksonaSecureGroupCommunicationSchemeWit..> 22-Dec-2014 08:04    118K
227-AttacksonaSecureGroupCommunicationSchemeWit..> 22-Dec-2014 08:04     95K
228-VerifiablyCommittedSignaturesProvablySecure..> 22-Dec-2014 08:04    194K
229-AlgebraicAttacksonSummationGenerators.pdf      22-Dec-2014 08:04    209K
229-AlgebraicAttacksonSummationGenerators.ps       22-Dec-2014 08:04    197K
230-AFastProvablySecureCryptographicHashFunctio..> 22-Dec-2014 08:04    189K
230-AFastProvablySecureCryptographicHashFunctio..> 22-Dec-2014 08:04    842K
231-PublicKeySteganographywithActiveAttacks.pdf    22-Dec-2014 08:04    183K
231-PublicKeySteganographywithActiveAttacks.ps     22-Dec-2014 08:04    258K
232-TheStatisticalZeroknowledgeProofforBlumInte..> 22-Dec-2014 08:04    179K
232-TheStatisticalZeroknowledgeProofforBlumInte..> 22-Dec-2014 08:04    372K
233-PublicKeySteganography.pdf                     22-Dec-2014 08:04    349K
233-PublicKeySteganography.ps                      22-Dec-2014 08:04    340K
234-GeneralizedKeyEvolvingSignatureSchemesorHow..> 22-Dec-2014 08:04    338K
234-GeneralizedKeyEvolvingSignatureSchemesorHow..> 22-Dec-2014 08:04    406K
235-FuzzyExtractorsHowtoGenerateStrongKeysfromB..> 22-Dec-2014 08:04    569K
235-FuzzyExtractorsHowtoGenerateStrongKeysfromB..> 22-Dec-2014 08:04   1015K
236-CombinationalLogicDesignforAESSubByteTransf..> 22-Dec-2014 08:03    222K
237-LowCostSolutionsforPreventingSimpleSideChan..> 22-Dec-2014 08:03    196K
237-LowCostSolutionsforPreventingSimpleSideChan..> 22-Dec-2014 08:03    665K
238-ChameleonSignaturefromBilinearPairing.pdf      22-Dec-2014 08:03     98K
239-UniversallyComposableSignaturesCertificatio..> 22-Dec-2014 08:03    412K
239-UniversallyComposableSignaturesCertificatio..> 22-Dec-2014 08:03    386K
240-HowtoBreakandRepairaUniversallyComposableSi..> 22-Dec-2014 08:03    177K
240-HowtoBreakandRepairaUniversallyComposableSi..> 22-Dec-2014 08:03    358K
241-HybridBroadcastEncryptionandSecurityAnalysi..> 22-Dec-2014 08:03    332K
241-HybridBroadcastEncryptionandSecurityAnalysi..> 22-Dec-2014 08:03    331K
242-ImprovedWeilandTatepairingsforellipticandhy..> 22-Dec-2014 08:03    242K
243-AnAttackonNotinteractiveDesignatedVerifierP..> 22-Dec-2014 08:03     72K
243-AnAttackonNotinteractiveDesignatedVerifierP..> 22-Dec-2014 08:03    240K
244-EfficientPublicKeySteganographySecureAgains..> 22-Dec-2014 08:03    174K
244-EfficientPublicKeySteganographySecureAgains..> 22-Dec-2014 08:03    346K
245-AKeySubstitutionAttackonSFLASHv3.pdf           22-Dec-2014 08:03    151K
245-AKeySubstitutionAttackonSFLASHv3.ps            22-Dec-2014 08:03    118K
246-QuantumDigitalSignatureBasedonQuantumOneway..> 22-Dec-2014 08:03     82K
246-QuantumDigitalSignatureBasedonQuantumOneway..> 22-Dec-2014 08:03    171K
247-IDbasedAuthenticatedTwoRoundMultiPartyKeyAg..> 22-Dec-2014 08:03    115K
248-EfficientImplementationofGenusThreeHyperell..> 22-Dec-2014 08:03    140K
248-EfficientImplementationofGenusThreeHyperell..> 22-Dec-2014 08:03    366K
249-SoftwareSpecificationsForTinnitusUtilizingW..> 22-Dec-2014 08:03    112K
249-SoftwareSpecificationsForTinnitusUtilizingW..> 22-Dec-2014 08:03    571K
250-BreakingtheStreamCipherWhitenoise.pdf          22-Dec-2014 08:03     80K
250-BreakingtheStreamCipherWhitenoise.ps           22-Dec-2014 08:03    176K
251-IsomorphismClassesofHyperellipticCurvesofge..> 22-Dec-2014 08:03    162K
252-OnSimulationSoundTrapdoorCommitments.pdf       22-Dec-2014 08:03    566K
252-OnSimulationSoundTrapdoorCommitments.ps        22-Dec-2014 08:03      1M
253-AspectsofHyperellipticCurvesoverLargePrimeF..> 22-Dec-2014 08:03    216K
254-CommittingEncryptionandPubliclyVerifiableSi..> 22-Dec-2014 08:03    295K
255-ImprovedConstructionsforUniversalReencrypti..> 22-Dec-2014 08:03     91K
255-ImprovedConstructionsforUniversalReencrypti..> 22-Dec-2014 08:03    183K
256-OntheSecurityofaMultiPartyCertifiedEmailPro..> 20-Jan-2023 14:22     207
257-TradingInversionsforMultiplicationsinEllipt..> 22-Dec-2014 08:03    241K
258-AnalysisofImplementationHierocrypt3algorith..> 22-Dec-2014 08:03    531K
259-AttackonTwoIDbasedAuthenticatedGroupKeyAgre..> 22-Dec-2014 08:02     82K
259-AttackonTwoIDbasedAuthenticatedGroupKeyAgre..> 22-Dec-2014 08:02    231K
260-AnImprovedIDbasedAuthenticatedGroupKeyAgree..> 22-Dec-2014 08:02     82K
261-AprovablysecureIDbasedringsignaturescheme.pdf  22-Dec-2014 08:02    216K
261-AprovablysecureIDbasedringsignaturescheme.ps   22-Dec-2014 08:02    190K
262-ASecureModifiedIDBasedUndeniableSignatureSc..> 22-Dec-2014 08:02     68K
262-ASecureModifiedIDBasedUndeniableSignatureSc..> 22-Dec-2014 08:02     65K
263-SecurityAnalysisofLalandAwasthi39sProxySign..> 20-Jan-2023 08:41    112K
263-SecurityAnalysisofLalandAwasthisProxySignat..> 22-Dec-2014 08:02     80K
263-SecurityAnalysisofLalandAwasthisProxySignat..> 22-Dec-2014 08:02    381K
264-InversionofSeveralFieldElementsANewParallel..> 22-Dec-2014 08:02    139K
264-InversionofSeveralFieldElementsANewParallel..> 22-Dec-2014 08:02    122K
265-ConcurrentResettableZeroKnowledgeWithConcur..> 22-Dec-2014 08:02    546K