Index of /2003/
../
001-AModeofOperationwithPartialEncryptionandMes..> 22-Dec-2014 08:15 151K
002-ImperfectDecryptionandanAttackontheNTRUEncr..> 22-Dec-2014 08:15 253K
002-ImperfectDecryptionandanAttackontheNTRUEncr..> 22-Dec-2014 08:15 205K
003-PlaintextdependantRepetitionCodesCryptanaly..> 22-Dec-2014 08:15 270K
003-PlaintextdependantRepetitionCodesCryptanaly..> 22-Dec-2014 08:15 249K
004-IDbasedtripartiteAuthenticatedKeyAgreementP..> 22-Dec-2014 08:15 125K
004-IDbasedtripartiteAuthenticatedKeyAgreementP..> 22-Dec-2014 08:15 313K
005-DistributingtheEncryptionandDecryptionofaBl..> 22-Dec-2014 08:15 234K
005-DistributingtheEncryptionandDecryptionofaBl..> 22-Dec-2014 08:15 391K
006-MultiPartyComputationfromanyLinearSecretSha..> 22-Dec-2014 08:15 243K
006-MultiPartyComputationfromanyLinearSecretSha..> 22-Dec-2014 08:15 254K
007-APriceNegotiableTransactionSystem.pdf 20-Jan-2023 14:22 207
008-DFAonAES.pdf 22-Dec-2014 08:15 178K
008-DFAonAES.ps 22-Dec-2014 08:15 3M
009-DomainExtendersforUOWHFAFiniteBinaryTreeAlg..> 22-Dec-2014 08:15 244K
009-DomainExtendersforUOWHFAFiniteBinaryTreeAlg..> 22-Dec-2014 08:15 235K
010-DifferentialFaultAnalysisonAES.pdf 22-Dec-2014 08:15 208K
011-CryptanalysisofLeeHwangLi39sKeyAuthenticati..> 20-Jan-2023 08:41 74K
011-CryptanalysisofLeeHwangLisKeyAuthentication..> 22-Dec-2014 08:15 78K
011-CryptanalysisofLeeHwangLisKeyAuthentication..> 22-Dec-2014 08:15 201K
012-ThenumberofinitialstatesoftheRC4cipherwitht..> 22-Dec-2014 08:15 95K
012-ThenumberofinitialstatesoftheRC4cipherwitht..> 22-Dec-2014 08:15 370K
013-SecurityConstraintsontheOswaldAignerExponen..> 22-Dec-2014 08:15 268K
013-SecurityConstraintsontheOswaldAignerExponen..> 22-Dec-2014 08:15 270K
014-HijibijbijANewStreamCipherwithaSelfSynchron..> 22-Dec-2014 08:15 283K
014-HijibijbijANewStreamCipherwithaSelfSynchron..> 22-Dec-2014 08:15 494K
015-AUniversallyComposableCryptographicLibrary.pdf 22-Dec-2014 08:15 601K
015-AUniversallyComposableCryptographicLibrary.ps 22-Dec-2014 08:15 3M
016-AThresholdGQSignatureScheme.pdf 22-Dec-2014 08:15 217K
016-AThresholdGQSignatureScheme.ps 22-Dec-2014 08:15 458K
017-PerfectHashFamilieswithFewFunctions.pdf 22-Dec-2014 08:15 218K
017-PerfectHashFamilieswithFewFunctions.ps 22-Dec-2014 08:15 229K
018-AnAuthenticatedGroupKeyAgreementProtocolonB..> 22-Dec-2014 08:14 102K
018-AnAuthenticatedGroupKeyAgreementProtocolonB..> 22-Dec-2014 08:14 284K
019-APolynomialTimeAlgorithmfortheBraidDiffieHe..> 22-Dec-2014 08:14 248K
019-APolynomialTimeAlgorithmfortheBraidDiffieHe..> 22-Dec-2014 08:14 235K
020-AttacksbasedonConditionalCorrelationsagains..> 22-Dec-2014 08:14 293K
020-AttacksbasedonConditionalCorrelationsagains..> 22-Dec-2014 08:14 776K
021-InterleavingCryptographyandMechanismDesignT..> 22-Dec-2014 08:14 163K
021-InterleavingCryptographyandMechanismDesignT..> 22-Dec-2014 08:14 140K
022-DidFiliolBreakAES.pdf 22-Dec-2014 08:14 155K
022-DidFiliolBreakAES.ps 22-Dec-2014 08:14 357K
023-Newidentitybasedsigncryptionschemesfrompair..> 22-Dec-2014 08:14 246K
023-Newidentitybasedsigncryptionschemesfrompair..> 22-Dec-2014 08:14 254K
024-OnModelingINDCCASecurityinCryptographicProt..> 22-Dec-2014 08:14 243K
024-OnModelingINDCCASecurityinCryptographicProt..> 22-Dec-2014 08:14 212K
025-Homomorphicpublickeycryptosystemsandencrypt..> 22-Dec-2014 08:14 229K
025-Homomorphicpublickeycryptosystemsandencrypt..> 22-Dec-2014 08:14 182K
026-HyperellipticCurveCryptosystemsClosingthePe..> 22-Dec-2014 08:14 217K
026-HyperellipticCurveCryptosystemsClosingthePe..> 22-Dec-2014 08:14 526K
027-CryptographicRandomizedResponseTechniques.pdf 22-Dec-2014 08:14 272K
027-CryptographicRandomizedResponseTechniques.ps 22-Dec-2014 08:14 237K
028-EllipticCurveCryptosystemsinthePresenceofPe..> 22-Dec-2014 08:14 220K
028-EllipticCurveCryptosystemsinthePresenceofPe..> 22-Dec-2014 08:14 191K
029-UniversalPaddingSchemesforRSAwithOptimalBan..> 20-Jan-2023 14:22 207
030-EfficientMultiPartyComputationoverRings.pdf 22-Dec-2014 08:14 302K
030-EfficientMultiPartyComputationoverRings.ps 22-Dec-2014 08:14 509K
031-CryptographicTamperEvidence.pdf 22-Dec-2014 08:14 320K
031-CryptographicTamperEvidence.ps 22-Dec-2014 08:14 415K
032-AFrameworkforPasswordBasedAuthenticatedKeyE..> 22-Dec-2014 08:14 465K
032-AFrameworkforPasswordBasedAuthenticatedKeyE..> 22-Dec-2014 08:14 730K
033-IntegralCryptanalysisonreducedroundSafer.pdf 22-Dec-2014 08:14 272K
034-OntheInsecurityoftheFiatShamirParadigm.pdf 22-Dec-2014 08:14 444K
034-OntheInsecurityoftheFiatShamirParadigm.ps 22-Dec-2014 08:14 1M
035-Onalternativeapproachforverifiablesecretsha..> 22-Dec-2014 08:14 262K
036-Cryptanalysisofapublickeyencryptionschemeba..> 22-Dec-2014 08:13 104K
036-Cryptanalysisofapublickeyencryptionschemeba..> 22-Dec-2014 08:13 251K
037-StrengtheningZeroKnowledgeProtocolsusingSig..> 22-Dec-2014 08:13 513K
037-StrengtheningZeroKnowledgeProtocolsusingSig..> 22-Dec-2014 08:13 944K
038-PrettySimplePasswordAuthenticatedKeyExchang..> 22-Dec-2014 08:13 217K
038-PrettySimplePasswordAuthenticatedKeyExchang..> 22-Dec-2014 08:13 176K
039-Torusbasedcryptography.pdf 22-Dec-2014 08:13 273K
039-Torusbasedcryptography.ps 22-Dec-2014 08:13 494K
040-ComputingPartialWalshTransformfromtheAlgebr..> 22-Dec-2014 08:13 273K
040-ComputingPartialWalshTransformfromtheAlgebr..> 22-Dec-2014 08:13 301K
041-Anewstatisticaldistinguisherfortheshrinking..> 22-Dec-2014 08:13 316K
041-Anewstatisticaldistinguisherfortheshrinking..> 22-Dec-2014 08:13 421K
042-TimedFairExchangeofStandardSignatures.pdf 22-Dec-2014 08:13 291K
042-TimedFairExchangeofStandardSignatures.ps 22-Dec-2014 08:13 538K
043-ParallelSigncryptionwithOAEPPSSRandotherFei..> 20-Jan-2023 14:22 207
044-SigncryptionschemeforIdentitybasedCryptosys..> 20-Jan-2023 14:22 207
045-AnalgorithmtoobtainanRSAmoduluswithalargepr..> 22-Dec-2014 08:13 124K
046-RemarksonSaeednia39sIdentitybasedSocietyOri..> 20-Jan-2023 08:41 117K
046-RemarksonSaeedniasIdentitybasedSocietyOrien..> 22-Dec-2014 08:13 135K
046-RemarksonSaeedniasIdentitybasedSocietyOrien..> 22-Dec-2014 08:13 110K
047-AConstructionof100bitPublicKeyCryptosystema..> 22-Dec-2014 08:13 195K
047-AConstructionof100bitPublicKeyCryptosystema..> 22-Dec-2014 08:13 251K
048-CompoundingSecretSharingSchemes.pdf 22-Dec-2014 08:13 186K
048-CompoundingSecretSharingSchemes.ps 22-Dec-2014 08:13 181K
049-HiddenNumberProbleminSmallSubgroups.pdf 22-Dec-2014 08:13 113K
049-HiddenNumberProbleminSmallSubgroups.ps 22-Dec-2014 08:13 1M
050-ConcealmentanditsApplicationstoAuthenticate..> 22-Dec-2014 08:13 222K
050-ConcealmentanditsApplicationstoAuthenticate..> 22-Dec-2014 08:13 228K
051-HowtoPredicttheOutputofaHardwareRandomNumbe..> 22-Dec-2014 08:13 111K
051-HowtoPredicttheOutputofaHardwareRandomNumbe..> 22-Dec-2014 08:13 72K
052-AttackingRSAbasedSessionsinSSLTLS.pdf 22-Dec-2014 08:13 462K
053-Tatepairingimplementationsfortripartitekeya..> 22-Dec-2014 08:13 234K
053-Tatepairingimplementationsfortripartitekeya..> 22-Dec-2014 08:13 280K
054-IDbasedCryptosystemswithPairingonEllipticCu..> 22-Dec-2014 08:13 175K
054-IDbasedCryptosystemswithPairingonEllipticCu..> 22-Dec-2014 08:13 153K
055-ANewApproachtoPreventBlackmailinginECash.pdf 22-Dec-2014 08:13 98K
056-ComputingofTrustinDistributedNetworks.pdf 22-Dec-2014 08:13 99K
056-ComputingofTrustinDistributedNetworks.ps 22-Dec-2014 08:13 237K
057-SecureMultiplicationofSharedSecretsintheExp..> 22-Dec-2014 08:13 262K
057-SecureMultiplicationofSharedSecretsintheExp..> 22-Dec-2014 08:13 218K
058-AnEllipticCurveTrapdoorSystem.pdf 22-Dec-2014 08:13 284K
058-AnEllipticCurveTrapdoorSystem.ps 22-Dec-2014 08:12 282K
059-ATransitiveSignatureSchemeProvablySecureAga..> 20-Jan-2023 14:22 207
060-IsomorphismClassesofPicardCurvesoverFiniteF..> 22-Dec-2014 08:12 207K
060-IsomorphismClassesofPicardCurvesoverFiniteF..> 22-Dec-2014 08:12 179K
061-HiddenPolynomialCryptosystems.pdf 22-Dec-2014 08:12 249K
062-ExtendingJoux39sProtocoltoMultiPartyKeyAgre..> 20-Jan-2023 14:22 207
062-ExtendingJouxsProtocoltoMultiPartyKeyAgreem..> 22-Dec-2014 08:12 252K
062-ExtendingJouxsProtocoltoMultiPartyKeyAgreem..> 22-Dec-2014 08:12 299K
063-InitiatorResilientUniversallyComposableKeyE..> 22-Dec-2014 08:12 284K
063-InitiatorResilientUniversallyComposableKeyE..> 22-Dec-2014 08:12 498K
064-OntheOptimalityofLinearDifferentialandSeque..> 22-Dec-2014 08:12 335K
064-OntheOptimalityofLinearDifferentialandSeque..> 22-Dec-2014 08:12 293K
065-HashFunctionBalanceanditsImpactonBirthdayAt..> 22-Dec-2014 08:12 408K
065-HashFunctionBalanceanditsImpactonBirthdayAt..> 22-Dec-2014 08:12 424K
066-SigncryptionschemeforIdentitybasedCryptosys..> 22-Dec-2014 08:12 84K
066-SigncryptionschemeforIdentitybasedCryptosys..> 22-Dec-2014 08:12 186K
067-ForkingLemmasintheRingSignatures39Scenario.pdf 20-Jan-2023 08:41 266K
067-ForkingLemmasintheRingSignaturesScenario.pdf 22-Dec-2014 08:12 248K
067-ForkingLemmasintheRingSignaturesScenario.ps 22-Dec-2014 08:12 244K
068-OntheSecurityofSomeProxySignatureSchemes.pdf 22-Dec-2014 08:12 130K
068-OntheSecurityofSomeProxySignatureSchemes.ps 22-Dec-2014 08:12 290K
069-EAXAConventionalAuthenticatedEncryptionMode..> 22-Dec-2014 08:12 517K
069-EAXAConventionalAuthenticatedEncryptionMode.ps 22-Dec-2014 08:12 540K
070-ACritiqueofCCM.pdf 22-Dec-2014 08:12 252K
070-ACritiqueofCCM.ps 22-Dec-2014 08:12 206K
071-HowtoProtectAgainstaMilitantSpammer.pdf 22-Dec-2014 08:12 141K
071-HowtoProtectAgainstaMilitantSpammer.ps 22-Dec-2014 08:12 276K
072-ProxyBlindSignatureScheme.pdf 22-Dec-2014 08:12 170K
073-ASchemeforobtainingaWarrantMessagefromtheDi..> 22-Dec-2014 08:12 145K
074-DivisibleVotingScheme.pdf 22-Dec-2014 08:12 204K
075-AlmostSecurityofCryptographicBooleanFunctio..> 22-Dec-2014 08:12 122K
075-AlmostSecurityofCryptographicBooleanFunctio..> 22-Dec-2014 08:12 285K
076-GoldbachsConjectureonECDSAProtocols.pdf 22-Dec-2014 08:12 129K
076-GoldbachsConjectureonECDSAProtocols.ps 22-Dec-2014 08:12 126K
077-AnUninstantiableRandomOracleModelSchemefora..> 22-Dec-2014 08:12 441K
077-AnUninstantiableRandomOracleModelSchemefora..> 22-Dec-2014 08:12 413K
078-Relationamongsimulatorbasedandcomparisonbas..> 22-Dec-2014 08:11 233K
078-Relationamongsimulatorbasedandcomparisonbas..> 22-Dec-2014 08:11 206K
079-FastarithmeticonJacobiansofPicardcurves.pdf 22-Dec-2014 08:11 173K
079-FastarithmeticonJacobiansofPicardcurves.ps 22-Dec-2014 08:11 449K
080-NoninteractiveandReusableNonmalleableCommit..> 22-Dec-2014 08:11 253K
080-NoninteractiveandReusableNonmalleableCommit..> 22-Dec-2014 08:11 391K
081-PrimitiveSpecificationforSOBER128.pdf 22-Dec-2014 08:11 329K
082-StrongerSecurityBoundsforOMACTMACandXCBC.pdf 22-Dec-2014 08:11 225K
082-StrongerSecurityBoundsforOMACTMACandXCBC.ps 22-Dec-2014 08:11 512K
083-AForwardSecurePublicKeyEncryptionScheme.pdf 22-Dec-2014 08:11 274K
083-AForwardSecurePublicKeyEncryptionScheme.ps 22-Dec-2014 08:11 479K
084-CryptanalysisofanimplementationschemeoftheT..> 22-Dec-2014 08:11 186K
084-CryptanalysisofanimplementationschemeoftheT..> 22-Dec-2014 08:11 387K
085-AdefectoftheimplementationschemesoftheTTMcr..> 22-Dec-2014 08:11 213K
085-AdefectoftheimplementationschemesoftheTTMcr..> 22-Dec-2014 08:11 419K
086-OntheSelectionofPairingFriendlyGroups.pdf 22-Dec-2014 08:11 130K
086-OntheSelectionofPairingFriendlyGroups.ps 22-Dec-2014 08:11 294K
087-APracticalEllipticCurvePublicKeyEncryptionS..> 22-Dec-2014 08:11 96K
087-APracticalEllipticCurvePublicKeyEncryptionS..> 22-Dec-2014 08:11 258K
088-EllipticCurvePointMultiplication.pdf 22-Dec-2014 08:11 208K
089-EfficientPublicKeyGenerationforMultivariate..> 22-Dec-2014 08:11 163K
089-EfficientPublicKeyGenerationforMultivariate..> 22-Dec-2014 08:11 341K
090-AStructuredMultisignatureSchemefromtheGapDi..> 22-Dec-2014 08:11 72K
091-SequentialAggregateSignaturesfromTrapdoorPe..> 22-Dec-2014 08:11 218K
091-SequentialAggregateSignaturesfromTrapdoorPe..> 22-Dec-2014 08:11 396K
092-ProvablySecureEnhancementon3GPPAuthenticati..> 22-Dec-2014 08:11 307K
092-ProvablySecureEnhancementon3GPPAuthenticati..> 22-Dec-2014 08:11 343K
093-SimpleStatelessSteganography.pdf 22-Dec-2014 08:11 289K
093-SimpleStatelessSteganography.ps 22-Dec-2014 08:11 393K
094-TraceZeroSubvarietyforCryptosystems.pdf 22-Dec-2014 08:11 271K
094-TraceZeroSubvarietyforCryptosystems.ps 22-Dec-2014 08:11 298K
095-PublicKeyTraceandRevokeSchemeSecureagainstA..> 22-Dec-2014 08:11 294K
095-PublicKeyTraceandRevokeSchemeSecureagainstA..> 22-Dec-2014 08:11 615K
096-SecureProxySignatureSchemesforDelegationofS..> 22-Dec-2014 08:10 399K
097-LowCostSecurityExplicitFormulaeforGenus4Hyp..> 22-Dec-2014 08:10 270K
097-LowCostSecurityExplicitFormulaeforGenus4Hyp..> 22-Dec-2014 08:10 280K
098-SideChannelAttacksonCBCEncryptedMessagesint..> 22-Dec-2014 08:10 108K
099-AlgorithmsinBraidGroups.pdf 22-Dec-2014 08:10 148K
099-AlgorithmsinBraidGroups.ps 22-Dec-2014 08:10 318K
100-ProtocolsforBoundedConcurrentSecureTwoParty..> 22-Dec-2014 08:10 488K
100-ProtocolsforBoundedConcurrentSecureTwoParty..> 22-Dec-2014 08:10 695K
101-CryptanalysisofHFE.pdf 20-Jan-2023 14:22 207
102-LengthBasedAttacksforCertainGroupBasedEncry..> 22-Dec-2014 08:10 101K
103-SecurityanalysisonNallaReddy39sIDbasedtripa..> 20-Jan-2023 08:41 78K
103-SecurityanalysisonNallaReddysIDbasedtripart..> 22-Dec-2014 08:10 49K
103-SecurityanalysisonNallaReddysIDbasedtripart..> 22-Dec-2014 08:10 144K
104-NewProxySignatureProxyBlindSignatureandProx..> 22-Dec-2014 08:10 129K
104-NewProxySignatureProxyBlindSignatureandProx..> 22-Dec-2014 08:10 297K
105-OnDiophantineComplexityandStatisticalZeroKn..> 22-Dec-2014 08:10 315K
105-OnDiophantineComplexityandStatisticalZeroKn..> 22-Dec-2014 08:10 309K
106-CWCAhighperformanceconventionalauthenticate..> 22-Dec-2014 08:10 406K
106-CWCAhighperformanceconventionalauthenticate..> 22-Dec-2014 08:10 417K
107-FujisakiOkamotoINDCCAhybridencryptionrevisi..> 22-Dec-2014 08:10 249K
107-FujisakiOkamotoINDCCAhybridencryptionrevisi..> 22-Dec-2014 08:10 553K
108-NovelCyclicandAlgebraicPropertiesofAES.pdf 22-Dec-2014 08:10 76K
108-NovelCyclicandAlgebraicPropertiesofAES.ps 22-Dec-2014 08:10 184K
109-CrytanalysisofSAFER.pdf 22-Dec-2014 08:10 239K
109-CrytanalysisofSAFER.ps 22-Dec-2014 08:10 1M
110-ProposalonPersonalAuthenticationSysteminwhi..> 22-Dec-2014 08:10 492K
111-FurtherCryptanalysisofsomeProxySignatureSch..> 20-Jan-2023 08:41 120K
112-AccumulatingCompositesandImprovedGroupSigni..> 22-Dec-2014 08:10 315K
112-AccumulatingCompositesandImprovedGroupSigni..> 22-Dec-2014 08:10 335K
113-SecurityAnalysisofShim39sAuthenticatedKeyAg..> 20-Jan-2023 08:41 120K
113-SecurityAnalysisofShimsAuthenticatedKeyAgre..> 22-Dec-2014 08:10 88K
113-SecurityAnalysisofShimsAuthenticatedKeyAgre..> 22-Dec-2014 08:10 209K
114-UnifyingSimulatabilityDefinitionsinCryptogr..> 22-Dec-2014 08:10 266K
114-UnifyingSimulatabilityDefinitionsinCryptogr..> 22-Dec-2014 08:10 1M
115-CryptanalysisofIDbasedTripartiteAuthenticat..> 22-Dec-2014 08:10 109K
116-ANewIDbasedGroupSignatureSchemefromBilinear..> 22-Dec-2014 08:10 152K
116-ANewIDbasedGroupSignatureSchemefromBilinear..> 22-Dec-2014 08:10 335K
117-Anidentitybasedringsignatureschemefrombilin..> 22-Dec-2014 08:10 46K
118-VisualCryptoDisplaysEnablingSecureCommunica..> 22-Dec-2014 08:09 306K
118-VisualCryptoDisplaysEnablingSecureCommunica..> 22-Dec-2014 08:09 770K
119-HowSecureAreFPGAsinCryptographicApplication..> 22-Dec-2014 08:09 156K
119-HowSecureAreFPGAsinCryptographicApplication..> 22-Dec-2014 08:09 328K
120-PhysicallyObservableCryptography.pdf 22-Dec-2014 08:09 258K
120-PhysicallyObservableCryptography.ps 22-Dec-2014 08:09 522K
121-ACryptographicallySoundSecurityProofoftheNe..> 22-Dec-2014 08:09 194K
121-ACryptographicallySoundSecurityProofoftheNe..> 22-Dec-2014 08:09 386K
122-CryptanalysisofAlRiyamiPaterson39sAuthentic..> 20-Jan-2023 08:41 131K
122-CryptanalysisofAlRiyamiPatersonsAuthenticat..> 22-Dec-2014 08:09 131K
123-Assessingsecurityofsomegroupbasedcryptosyst..> 22-Dec-2014 08:09 116K
123-Assessingsecurityofsomegroupbasedcryptosyst..> 22-Dec-2014 08:09 260K
124-AGeneralCorrelationTheorem.pdf 22-Dec-2014 08:09 209K
124-AGeneralCorrelationTheorem.ps 22-Dec-2014 08:09 219K
125-AlgebraicAttacksonCombinerswithMemoryandSev..> 22-Dec-2014 08:09 234K
125-AlgebraicAttacksonCombinerswithMemoryandSev..> 22-Dec-2014 08:09 440K
126-CertificatelessPublicKeyCryptography.pdf 22-Dec-2014 08:09 406K
126-CertificatelessPublicKeyCryptography.ps 22-Dec-2014 08:09 742K
127-UsingInformationTheoryApproachtoRandomnessT..> 22-Dec-2014 08:09 170K
128-WeakFieldsforECC.pdf 22-Dec-2014 08:09 295K
128-WeakFieldsforECC.ps 22-Dec-2014 08:09 227K
129-AttackonHanetal39sIDbasedConfirmerUndeniabl..> 20-Jan-2023 08:41 122K
129-AttackonHanetalsIDbasedConfirmerUndeniableS..> 22-Dec-2014 08:09 73K
129-AttackonHanetalsIDbasedConfirmerUndeniableS..> 22-Dec-2014 08:09 204K
130-OnthePseudorandomnessofKASUMITypePermutatio..> 22-Dec-2014 08:09 209K
130-OnthePseudorandomnessofKASUMITypePermutatio..> 22-Dec-2014 08:09 537K
131-Homomorphicpublickeysystemsbasedonsubgroupm..> 22-Dec-2014 08:09 169K
131-Homomorphicpublickeysystemsbasedonsubgroupm..> 22-Dec-2014 08:09 312K
132-Guaranteeingthediversityofnumbergenerators.pdf 22-Dec-2014 08:09 297K
132-Guaranteeingthediversityofnumbergenerators.ps 22-Dec-2014 08:09 302K
133-MinimumDistancebetweenBentand1resilientBool..> 22-Dec-2014 08:09 238K
133-MinimumDistancebetweenBentand1resilientBool..> 22-Dec-2014 08:09 247K
134-DirectSumofNonNormalandNormalBentFunctionsA..> 20-Jan-2023 14:22 207
135-CollisionAttackonReducedRoundCamellia.pdf 22-Dec-2014 08:09 118K
135-CollisionAttackonReducedRoundCamellia.ps 22-Dec-2014 08:09 271K
136-Efficientlinearfeedbackshiftregisterswithma..> 22-Dec-2014 08:09 218K
136-Efficientlinearfeedbackshiftregisterswithma..> 22-Dec-2014 08:09 213K
137-Bernoullinumbersandtheprobabilityofabirthda..> 22-Dec-2014 08:09 176K
137-Bernoullinumbersandtheprobabilityofabirthda..> 22-Dec-2014 08:09 158K
138-Permutationgraphsfastforwardpermutationsand..> 22-Dec-2014 08:08 259K
138-Permutationgraphsfastforwardpermutationsand.ps 22-Dec-2014 08:08 255K
139-OntheRandomnessoftheEditingGenerator.pdf 22-Dec-2014 08:08 183K
140-TradingOffTypeInferenceMemoryComplexityAgai..> 22-Dec-2014 08:08 178K
140-TradingOffTypeInferenceMemoryComplexityAgai..> 22-Dec-2014 08:08 390K
141-GeneralCompositionandUniversalComposability..> 22-Dec-2014 08:08 343K
141-GeneralCompositionandUniversalComposability..> 22-Dec-2014 08:08 521K
142-ANewTreebasedDomainExtensionofUOWHF.pdf 22-Dec-2014 08:08 213K
142-ANewTreebasedDomainExtensionofUOWHF.ps 22-Dec-2014 08:08 200K
143-Ellipticcurvessuitableforpairingbasedcrypto..> 22-Dec-2014 08:08 196K
143-Ellipticcurvessuitableforpairingbasedcrypto..> 22-Dec-2014 08:08 162K
144-IDbasedtripartitekeyagreementwithsignatures..> 22-Dec-2014 08:08 84K
144-IDbasedtripartitekeyagreementwithsignatures.ps 22-Dec-2014 08:08 383K
145-SymmetricAuthenticationWithinaSimulatableCr..> 22-Dec-2014 08:08 368K
145-SymmetricAuthenticationWithinaSimulatableCr..> 22-Dec-2014 08:08 825K
146-BreakingandRepairingOptimisticFairExchangef..> 22-Dec-2014 08:08 149K
146-BreakingandRepairingOptimisticFairExchangef..> 22-Dec-2014 08:08 433K
147-AParallelizableEncipheringMode.pdf 22-Dec-2014 08:08 413K
147-AParallelizableEncipheringMode.ps 22-Dec-2014 08:08 448K
148-ATweakableEncipheringMode.pdf 22-Dec-2014 08:08 501K
148-ATweakableEncipheringMode.ps 22-Dec-2014 08:08 541K
149-ForwardSecureHierarchicalIDBasedCryptograph..> 20-Jan-2023 14:22 207
150-Ontherandomoraclemethodologyasappliedtoleng..> 22-Dec-2014 08:08 299K
150-Ontherandomoraclemethodologyasappliedtoleng..> 22-Dec-2014 08:08 263K
151-Secretsharingschemesonsparsehomogeneousacce..> 22-Dec-2014 08:08 276K
152-OptimalStatisticalPowerAnalysis.pdf 22-Dec-2014 08:08 900K
153-AttackonanIdentificationSchemeBasedonGapDif..> 22-Dec-2014 08:08 90K
154-ManTiCoreEncryptionwithJointCipherStateAuth..> 22-Dec-2014 08:08 139K
154-ManTiCoreEncryptionwithJointCipherStateAuth..> 22-Dec-2014 08:08 445K
155-AFormalProofofZhu39sSignatureScheme.pdf 20-Jan-2023 08:41 154K
155-AFormalProofofZhusSignatureScheme.pdf 22-Dec-2014 08:08 154K
156-EfficientProvablySecurePublicKeySteganograp..> 22-Dec-2014 08:08 179K
156-EfficientProvablySecurePublicKeySteganograp..> 22-Dec-2014 08:08 345K
157-SomeRSAbasedEncryptionSchemeswithTightSecur..> 22-Dec-2014 08:07 149K
157-SomeRSAbasedEncryptionSchemeswithTightSecur..> 22-Dec-2014 08:07 343K
158-ASufficientConditionandOptimalDomainExtensi..> 22-Dec-2014 08:07 261K
158-ASufficientConditionandOptimalDomainExtensi..> 22-Dec-2014 08:07 797K
159-AnefficientvariantoftheRSAcryptosystem.pdf 22-Dec-2014 08:07 121K
159-AnefficientvariantoftheRSAcryptosystem.ps 22-Dec-2014 08:07 267K
160-AMoreSecureandEfficaciousTTSSignatureScheme..> 22-Dec-2014 08:07 211K
160-AMoreSecureandEfficaciousTTSSignatureScheme.ps 22-Dec-2014 08:07 216K
161-IndifferentiabilityImpossibilityResultsonRe..> 22-Dec-2014 08:07 304K
161-IndifferentiabilityImpossibilityResultsonRe..> 22-Dec-2014 08:07 297K
162-CryptanalysisoftheAllegedSecurIDHashFunctio..> 22-Dec-2014 08:07 244K
162-CryptanalysisoftheAllegedSecurIDHashFunctio..> 22-Dec-2014 08:07 488K
163-MultipurposeIdentityBasedSigncryptionASwiss..> 22-Dec-2014 08:07 543K
163-MultipurposeIdentityBasedSigncryptionASwiss..> 22-Dec-2014 08:07 551K
164-IdentityBasedThresholdDecryption.pdf 22-Dec-2014 08:07 306K
164-IdentityBasedThresholdDecryption.ps 22-Dec-2014 08:07 553K
165-CommitmentCapacityofDiscreteMemorylessChann..> 22-Dec-2014 08:07 195K
166-AreductionofthespacefortheparallelizedPolla..> 22-Dec-2014 08:07 128K
166-AreductionofthespacefortheparallelizedPolla..> 22-Dec-2014 08:07 295K
167-IdentitybasedChameleonHashandApplications.pdf 22-Dec-2014 08:07 167K
168-Robustdiscretizationwithanapplicationtograp..> 22-Dec-2014 08:07 207K
168-Robustdiscretizationwithanapplicationtograp..> 22-Dec-2014 08:07 204K
169-PropertiesoftheTransformationSemigroupofthe..> 22-Dec-2014 08:07 175K
169-PropertiesoftheTransformationSemigroupofthe..> 22-Dec-2014 08:07 678K
170-HARPSHAshedRandomPreloadedSubsetKeyDistribu..> 22-Dec-2014 08:07 241K
170-HARPSHAshedRandomPreloadedSubsetKeyDistribu..> 22-Dec-2014 08:07 425K
171-ScalableProtocolsforAuthenticatedGroupKeyEx..> 22-Dec-2014 08:07 275K
171-ScalableProtocolsforAuthenticatedGroupKeyEx..> 22-Dec-2014 08:07 474K
172-NAEPProvableSecurityinthePresenceofDecrypti..> 22-Dec-2014 08:07 223K
172-NAEPProvableSecurityinthePresenceofDecrypti..> 22-Dec-2014 08:07 437K
173-DomainExtenderforCollisionResistantHashFunc..> 22-Dec-2014 08:07 282K
173-DomainExtenderforCollisionResistantHashFunc..> 22-Dec-2014 08:07 292K
174-RelaxingChosenCiphertextSecurity.pdf 22-Dec-2014 08:07 515K
174-RelaxingChosenCiphertextSecurity.ps 22-Dec-2014 08:06 521K
175-DoubleSpeedSafePrimeGeneration.pdf 22-Dec-2014 08:06 47K
175-DoubleSpeedSafePrimeGeneration.ps 22-Dec-2014 08:06 140K
176-PattersonWiedemannConstructionRevisited.pdf 22-Dec-2014 08:06 300K
176-PattersonWiedemannConstructionRevisited.ps 22-Dec-2014 08:06 342K
177-BuildingSecureCryptographicTransformsorHowt..> 22-Dec-2014 08:06 465K
177-BuildingSecureCryptographicTransformsorHowt..> 22-Dec-2014 08:06 551K
178-ConstructingOptimisticFairExchangeProtocols..> 22-Dec-2014 08:06 168K
179-VMPCOneWayFunction.pdf 22-Dec-2014 08:06 49K
179-VMPCOneWayFunction.ps 22-Dec-2014 08:06 343K
180-ParallelizingExplicitFormulaforArithmeticin..> 22-Dec-2014 08:06 258K
180-ParallelizingExplicitFormulaforArithmeticin..> 22-Dec-2014 08:06 296K
181-OntheSecurityofMultipleEncryptionorCCAsecur..> 22-Dec-2014 08:06 391K
181-OntheSecurityofMultipleEncryptionorCCAsecur..> 22-Dec-2014 08:06 468K
182-ChosenCiphertextSecurityfromIdentityBasedEn..> 22-Dec-2014 08:06 175K
182-ChosenCiphertextSecurityfromIdentityBasedEn..> 22-Dec-2014 08:06 331K
183-CertificateBasedEncryptionandtheCertificate..> 22-Dec-2014 08:06 252K
184-WhatdoDESSboxesSaytoEachOther.pdf 22-Dec-2014 08:06 206K
184-WhatdoDESSboxesSaytoEachOther.ps 22-Dec-2014 08:06 440K
185-VMPCStreamCipher.pdf 22-Dec-2014 08:06 54K
185-VMPCStreamCipher.ps 22-Dec-2014 08:06 318K
186-SafePrimeGenerationwithaCombinedSieve.pdf 22-Dec-2014 08:06 83K
186-SafePrimeGenerationwithaCombinedSieve.ps 22-Dec-2014 08:06 61K
187-ResourceBoundedUnprovabilityofComputational..> 22-Dec-2014 08:06 548K
187-ResourceBoundedUnprovabilityofComputational..> 22-Dec-2014 08:06 1M
188-ANewForwardSecureSignatureSchemeusingBiline..> 22-Dec-2014 08:06 345K
189-Cryptanalysisofpubliclyverifiableauthentica..> 22-Dec-2014 08:06 119K
190-ExtendingJoux39sProtocoltoMultiPartyKeyAgre..> 20-Jan-2023 14:22 207
191-ProjectiveCoordinatesLeak.pdf 22-Dec-2014 08:06 219K
191-ProjectiveCoordinatesLeak.ps 22-Dec-2014 08:06 174K
192-UniversalDesignatedVerifierSignatures.pdf 22-Dec-2014 08:06 290K
192-UniversalDesignatedVerifierSignatures.ps 22-Dec-2014 08:06 544K
193-EfficientExtensionofStandardSchnorrRSAsigna..> 22-Dec-2014 08:06 400K
193-EfficientExtensionofStandardSchnorrRSAsigna..> 22-Dec-2014 08:06 717K
194-SecurityAnalysisofSeveralGroupSignatureSche..> 22-Dec-2014 08:05 254K
194-SecurityAnalysisofSeveralGroupSignatureSche..> 22-Dec-2014 08:05 261K
195-PublicKeyEncryptionwithkeywordSearch.pdf 22-Dec-2014 08:05 181K
196-SecurityAnalysisofSomeProxySignatures.pdf 22-Dec-2014 08:05 221K
196-SecurityAnalysisofSomeProxySignatures.ps 22-Dec-2014 08:05 209K
197-Revisitingfullydistributedproxysignaturesch..> 22-Dec-2014 08:05 240K
197-Revisitingfullydistributedproxysignaturesch..> 22-Dec-2014 08:05 229K
198-ConstructionofPerfectNonlinearandMaximallyN..> 22-Dec-2014 08:05 243K
198-ConstructionofPerfectNonlinearandMaximallyN..> 22-Dec-2014 08:05 255K
199-CryptanalysisofaMessageAuthenticationCodedu..> 22-Dec-2014 08:05 150K
199-CryptanalysisofaMessageAuthenticationCodedu..> 22-Dec-2014 08:05 137K
200-CryptanalysisofBLeeSKimKKimProxySignature.pdf 22-Dec-2014 08:05 122K
201-anattackonamultisignaturescheme.pdf 22-Dec-2014 08:05 31K
202-YetAnotherSievingDevice.pdf 22-Dec-2014 08:05 248K
202-YetAnotherSievingDevice.ps 22-Dec-2014 08:05 224K
203-NovelEfficientImplementationsofHyperellipti..> 22-Dec-2014 08:05 228K
203-NovelEfficientImplementationsofHyperellipti..> 22-Dec-2014 08:05 536K
204-ACompositionConstructionofBentLikeBooleanFu..> 22-Dec-2014 08:05 443K
205-ImprovedCryptanalysisofSecurID.pdf 22-Dec-2014 08:05 221K
205-ImprovedCryptanalysisofSecurID.ps 22-Dec-2014 08:05 405K
206-IdentityBasedUndeniableSignatures.pdf 22-Dec-2014 08:05 229K
206-IdentityBasedUndeniableSignatures.ps 22-Dec-2014 08:05 461K
207-SecurityFlawsinSeveralGroupSignaturesPropos..> 22-Dec-2014 08:05 127K
207-SecurityFlawsinSeveralGroupSignaturesPropos..> 22-Dec-2014 08:05 318K
208-IDBasedChameleonHashesfromBilinearPairings.pdf 22-Dec-2014 08:05 118K
208-IDBasedChameleonHashesfromBilinearPairings.ps 22-Dec-2014 08:05 298K
209-UsingtheTraceOperatortorepairthePolynomialR..> 22-Dec-2014 08:05 177K
209-UsingtheTraceOperatortorepairthePolynomialR..> 22-Dec-2014 08:05 220K
210-OnaRelationBetweenVerifiableSecretSharingSc..> 22-Dec-2014 08:05 200K
210-OnaRelationBetweenVerifiableSecretSharingSc..> 22-Dec-2014 08:05 454K
211-SFLASHv3afastasymmetricsignaturescheme.pdf 22-Dec-2014 08:05 145K
211-SFLASHv3afastasymmetricsignaturescheme.ps 22-Dec-2014 08:05 334K
212-HighPerformanceArithmeticforHyperellipticCu..> 22-Dec-2014 08:05 201K
212-HighPerformanceArithmeticforHyperellipticCu..> 22-Dec-2014 08:05 187K
213-IsomorphismClassesofHyperellipticCurvesofGe..> 22-Dec-2014 08:05 165K
213-IsomorphismClassesofHyperellipticCurvesofGe..> 22-Dec-2014 08:05 377K
214-MultiTrapdoorCommitmentsandtheirApplication..> 22-Dec-2014 08:05 355K
214-MultiTrapdoorCommitmentsandtheirApplication..> 22-Dec-2014 08:05 580K
215-DivideandConcatenateAScalableHardwareArchit..> 22-Dec-2014 08:05 160K
216-SecureIndexes.pdf 22-Dec-2014 08:04 224K
216-SecureIndexes.ps 22-Dec-2014 08:04 571K
217-ChemicalCombinatorialAttacksonKeyboards.pdf 22-Dec-2014 08:04 128K
217-ChemicalCombinatorialAttacksonKeyboards.ps 22-Dec-2014 08:04 521K
218-ASecurityEvaluationofWhitenoise.pdf 22-Dec-2014 08:04 70K
219-CryptanalysisoftheRepairedPublickeyEncrypti..> 22-Dec-2014 08:04 148K
219-CryptanalysisoftheRepairedPublickeyEncrypti..> 22-Dec-2014 08:04 308K
220-AshortcommentontheaffinepartsofSFLASHv3.pdf 22-Dec-2014 08:04 157K
220-AshortcommentontheaffinepartsofSFLASHv3.ps 22-Dec-2014 08:04 129K
221-ACryptanalysisoftheOriginalDomingoFerrer39s..> 20-Jan-2023 08:41 171K
221-ACryptanalysisoftheOriginalDomingoFerrersAl..> 22-Dec-2014 08:04 128K
221-ACryptanalysisoftheOriginalDomingoFerrersAl..> 22-Dec-2014 08:04 290K
222-AVerifiableSecretSharingSchemewithStatistic..> 22-Dec-2014 08:04 204K
222-AVerifiableSecretSharingSchemewithStatistic..> 22-Dec-2014 08:04 404K
223-CryptanalysisofaCryptosystembasedonDrinfeld..> 22-Dec-2014 08:04 128K
223-CryptanalysisofaCryptosystembasedonDrinfeld..> 22-Dec-2014 08:04 101K
224-Withdrawn.pdf 18-Aug-2023 00:00 207
225-MaskingBasedDomainExtendersforUOWHFsBoundsa..> 22-Dec-2014 08:04 315K
225-MaskingBasedDomainExtendersforUOWHFsBoundsa..> 22-Dec-2014 08:04 329K
226-OntheSecurityofaGroupSignatureSchemewithFor..> 22-Dec-2014 08:04 242K
226-OntheSecurityofaGroupSignatureSchemewithFor..> 22-Dec-2014 08:04 224K
227-AttacksonaSecureGroupCommunicationSchemeWit..> 22-Dec-2014 08:04 118K
227-AttacksonaSecureGroupCommunicationSchemeWit..> 22-Dec-2014 08:04 95K
228-VerifiablyCommittedSignaturesProvablySecure..> 22-Dec-2014 08:04 194K
229-AlgebraicAttacksonSummationGenerators.pdf 22-Dec-2014 08:04 209K
229-AlgebraicAttacksonSummationGenerators.ps 22-Dec-2014 08:04 197K
230-AFastProvablySecureCryptographicHashFunctio..> 22-Dec-2014 08:04 189K
230-AFastProvablySecureCryptographicHashFunctio..> 22-Dec-2014 08:04 842K
231-PublicKeySteganographywithActiveAttacks.pdf 22-Dec-2014 08:04 183K
231-PublicKeySteganographywithActiveAttacks.ps 22-Dec-2014 08:04 258K
232-TheStatisticalZeroknowledgeProofforBlumInte..> 22-Dec-2014 08:04 179K
232-TheStatisticalZeroknowledgeProofforBlumInte..> 22-Dec-2014 08:04 372K
233-PublicKeySteganography.pdf 22-Dec-2014 08:04 349K
233-PublicKeySteganography.ps 22-Dec-2014 08:04 340K
234-GeneralizedKeyEvolvingSignatureSchemesorHow..> 22-Dec-2014 08:04 338K
234-GeneralizedKeyEvolvingSignatureSchemesorHow..> 22-Dec-2014 08:04 406K
235-FuzzyExtractorsHowtoGenerateStrongKeysfromB..> 22-Dec-2014 08:04 569K
235-FuzzyExtractorsHowtoGenerateStrongKeysfromB..> 22-Dec-2014 08:04 1015K
236-CombinationalLogicDesignforAESSubByteTransf..> 22-Dec-2014 08:03 222K
237-LowCostSolutionsforPreventingSimpleSideChan..> 22-Dec-2014 08:03 196K
237-LowCostSolutionsforPreventingSimpleSideChan..> 22-Dec-2014 08:03 665K
238-ChameleonSignaturefromBilinearPairing.pdf 22-Dec-2014 08:03 98K
239-UniversallyComposableSignaturesCertificatio..> 22-Dec-2014 08:03 412K
239-UniversallyComposableSignaturesCertificatio..> 22-Dec-2014 08:03 386K
240-HowtoBreakandRepairaUniversallyComposableSi..> 22-Dec-2014 08:03 177K
240-HowtoBreakandRepairaUniversallyComposableSi..> 22-Dec-2014 08:03 358K
241-HybridBroadcastEncryptionandSecurityAnalysi..> 22-Dec-2014 08:03 332K
241-HybridBroadcastEncryptionandSecurityAnalysi..> 22-Dec-2014 08:03 331K
242-ImprovedWeilandTatepairingsforellipticandhy..> 22-Dec-2014 08:03 242K
243-AnAttackonNotinteractiveDesignatedVerifierP..> 22-Dec-2014 08:03 72K
243-AnAttackonNotinteractiveDesignatedVerifierP..> 22-Dec-2014 08:03 240K
244-EfficientPublicKeySteganographySecureAgains..> 22-Dec-2014 08:03 174K
244-EfficientPublicKeySteganographySecureAgains..> 22-Dec-2014 08:03 346K
245-AKeySubstitutionAttackonSFLASHv3.pdf 22-Dec-2014 08:03 151K
245-AKeySubstitutionAttackonSFLASHv3.ps 22-Dec-2014 08:03 118K
246-QuantumDigitalSignatureBasedonQuantumOneway..> 22-Dec-2014 08:03 82K
246-QuantumDigitalSignatureBasedonQuantumOneway..> 22-Dec-2014 08:03 171K
247-IDbasedAuthenticatedTwoRoundMultiPartyKeyAg..> 22-Dec-2014 08:03 115K
248-EfficientImplementationofGenusThreeHyperell..> 22-Dec-2014 08:03 140K
248-EfficientImplementationofGenusThreeHyperell..> 22-Dec-2014 08:03 366K
249-SoftwareSpecificationsForTinnitusUtilizingW..> 22-Dec-2014 08:03 112K
249-SoftwareSpecificationsForTinnitusUtilizingW..> 22-Dec-2014 08:03 571K
250-BreakingtheStreamCipherWhitenoise.pdf 22-Dec-2014 08:03 80K
250-BreakingtheStreamCipherWhitenoise.ps 22-Dec-2014 08:03 176K
251-IsomorphismClassesofHyperellipticCurvesofge..> 22-Dec-2014 08:03 162K
252-OnSimulationSoundTrapdoorCommitments.pdf 22-Dec-2014 08:03 566K
252-OnSimulationSoundTrapdoorCommitments.ps 22-Dec-2014 08:03 1M
253-AspectsofHyperellipticCurvesoverLargePrimeF..> 22-Dec-2014 08:03 216K
254-CommittingEncryptionandPubliclyVerifiableSi..> 22-Dec-2014 08:03 295K
255-ImprovedConstructionsforUniversalReencrypti..> 22-Dec-2014 08:03 91K
255-ImprovedConstructionsforUniversalReencrypti..> 22-Dec-2014 08:03 183K
256-OntheSecurityofaMultiPartyCertifiedEmailPro..> 20-Jan-2023 14:22 207
257-TradingInversionsforMultiplicationsinEllipt..> 22-Dec-2014 08:03 241K
258-AnalysisofImplementationHierocrypt3algorith..> 22-Dec-2014 08:03 531K
259-AttackonTwoIDbasedAuthenticatedGroupKeyAgre..> 22-Dec-2014 08:02 82K
259-AttackonTwoIDbasedAuthenticatedGroupKeyAgre..> 22-Dec-2014 08:02 231K
260-AnImprovedIDbasedAuthenticatedGroupKeyAgree..> 22-Dec-2014 08:02 82K
261-AprovablysecureIDbasedringsignaturescheme.pdf 22-Dec-2014 08:02 216K
261-AprovablysecureIDbasedringsignaturescheme.ps 22-Dec-2014 08:02 190K
262-ASecureModifiedIDBasedUndeniableSignatureSc..> 22-Dec-2014 08:02 68K
262-ASecureModifiedIDBasedUndeniableSignatureSc..> 22-Dec-2014 08:02 65K
263-SecurityAnalysisofLalandAwasthi39sProxySign..> 20-Jan-2023 08:41 112K
263-SecurityAnalysisofLalandAwasthisProxySignat..> 22-Dec-2014 08:02 80K
263-SecurityAnalysisofLalandAwasthisProxySignat..> 22-Dec-2014 08:02 381K
264-InversionofSeveralFieldElementsANewParallel..> 22-Dec-2014 08:02 139K
264-InversionofSeveralFieldElementsANewParallel..> 22-Dec-2014 08:02 122K
265-ConcurrentResettableZeroKnowledgeWithConcur..> 22-Dec-2014 08:02 546K