Index of /2004/
../
002-EfficientUniversalPaddingSchemesforMultipli..> 22-Dec-2014 08:35 380K
002-EfficientUniversalPaddingSchemesforMultipli..> 22-Dec-2014 08:35 512K
003-OntheRoleoftheInnerStateSizeinStreamCiphers..> 22-Dec-2014 08:35 242K
003-OntheRoleoftheInnerStateSizeinStreamCiphers.ps 22-Dec-2014 08:35 215K
004-None.pdf 20-Jan-2023 14:22 207
005-UniversalUndeniableSignatures.pdf 22-Dec-2014 08:35 151K
006-ProtocolInitializationfortheFrameworkofUniv..> 22-Dec-2014 08:35 213K
006-ProtocolInitializationfortheFrameworkofUniv..> 22-Dec-2014 08:35 172K
007-TraceableSignatures.pdf 22-Dec-2014 08:35 343K
007-TraceableSignatures.ps 22-Dec-2014 08:35 602K
008-TheKnowledgeofExponentAssumptionsand3RoundZ..> 22-Dec-2014 08:35 331K
008-TheKnowledgeofExponentAssumptionsand3RoundZ..> 22-Dec-2014 08:35 311K
009-EfficientandSecureMultiPartyComputationwith..> 22-Dec-2014 08:35 489K
009-EfficientandSecureMultiPartyComputationwith..> 22-Dec-2014 08:35 856K
010-FastPseudoHadamardTransforms.pdf 22-Dec-2014 08:35 149K
011-KnownPlaintextAttackAgainstaPermutationBase..> 22-Dec-2014 08:35 200K
012-Pitfallsinpublickeycryptosystemsbasedonfree..> 22-Dec-2014 08:35 84K
012-Pitfallsinpublickeycryptosystemsbasedonfree..> 22-Dec-2014 08:35 249K
013-CryptanalysisofaProvablySecureCryptographic..> 22-Dec-2014 08:35 62K
013-CryptanalysisofaProvablySecureCryptographic..> 22-Dec-2014 08:35 160K
014-CrosscorrelationSpectraofDillonandPatterson..> 22-Dec-2014 08:35 258K
014-CrosscorrelationSpectraofDillonandPatterson..> 22-Dec-2014 08:35 293K
015-AnAGMtypeellipticcurvepointcountingalgorith..> 22-Dec-2014 08:35 175K
016-ASynchronousModelforMultiPartyComputationan..> 22-Dec-2014 08:35 283K
016-ASynchronousModelforMultiPartyComputationan..> 22-Dec-2014 08:35 508K
017-CryptanalysisofanIDbasedPasswordAuthenticat..> 22-Dec-2014 08:35 51K
017-CryptanalysisofanIDbasedPasswordAuthenticat..> 22-Dec-2014 08:35 134K
018-CorrectionsoftheNISTStatisticalTestSuitefor..> 22-Dec-2014 08:35 295K
018-CorrectionsoftheNISTStatisticalTestSuitefor..> 22-Dec-2014 08:35 475K
019-NewSecurityProofsforthe3GPPConfidentialitya..> 22-Dec-2014 08:35 251K
019-NewSecurityProofsforthe3GPPConfidentialitya..> 22-Dec-2014 08:35 499K
020-OptimalSigncryptionfromAnyTrapdoorPermutati..> 22-Dec-2014 08:35 244K
020-OptimalSigncryptionfromAnyTrapdoorPermutati..> 22-Dec-2014 08:35 387K
021-ExternalizedFingerprintMatching.pdf 22-Dec-2014 08:34 560K
021-ExternalizedFingerprintMatching.ps 22-Dec-2014 08:34 8M
022-PrivacyEnhancedSearchesUsingEncryptedBloomF..> 22-Dec-2014 08:34 145K
022-PrivacyEnhancedSearchesUsingEncryptedBloomF..> 22-Dec-2014 08:34 196K
023-RDSRemoteDistributedSchemeforProtectingMobi..> 22-Dec-2014 08:34 101K
024-ExponentialSboxes.pdf 22-Dec-2014 08:34 183K
024-ExponentialSboxes.ps 22-Dec-2014 08:34 407K
025-ClarifyingObfuscationImprovingtheSecurityof..> 22-Dec-2014 08:34 448K
026-TheCSQUARETransform.pdf 22-Dec-2014 08:34 110K
026-TheCSQUARETransform.ps 22-Dec-2014 08:34 247K
027-LinkableSpontaneousAnonymousGroupSignaturef..> 22-Dec-2014 08:34 264K
028-CustodianHidingVerifiableEncryption.pdf 22-Dec-2014 08:34 304K
028-CustodianHidingVerifiableEncryption.ps 22-Dec-2014 08:34 519K
029-FindingOptimumParallelCoprocessorDesignforG..> 22-Dec-2014 08:34 102K
030-PointCompressiononJacobiansofHyperellipticC..> 22-Dec-2014 08:34 115K
031-Summationpolynomialsandthediscretelogarithm..> 22-Dec-2014 08:34 89K
031-Summationpolynomialsandthediscretelogarithm..> 22-Dec-2014 08:34 262K
032-CompressedPairings.pdf 22-Dec-2014 08:34 192K
032-CompressedPairings.ps 22-Dec-2014 08:34 393K
033-NewApproachestoPasswordAuthenticatedKeyExch..> 22-Dec-2014 08:34 330K
033-NewApproachestoPasswordAuthenticatedKeyExch..> 22-Dec-2014 08:34 342K
034-snAnArithmeticFunctionofSomeInterestandRela..> 22-Dec-2014 08:34 194K
035-CryptographicHashFunctionBasicsDefinitionsI..> 22-Dec-2014 08:34 250K
035-CryptographicHashFunctionBasicsDefinitionsI..> 22-Dec-2014 08:34 500K
036-SingleDatabasePrivateInformationRetrievalwi..> 22-Dec-2014 08:33 182K
036-SingleDatabasePrivateInformationRetrievalwi..> 22-Dec-2014 08:33 365K
037-AProvablySecureSchemeforRestrictivePartiall..> 22-Dec-2014 08:33 70K
037-AProvablySecureSchemeforRestrictivePartiall..> 22-Dec-2014 08:33 209K
038-ChameleonHashingwithoutKeyExposure.pdf 22-Dec-2014 08:33 151K
038-ChameleonHashingwithoutKeyExposure.ps 22-Dec-2014 08:33 336K
039-ABilinearSpontaneousAnonymousThresholdSigna..> 22-Dec-2014 08:33 174K
040-Cryptanalysisofatimestampbasedpasswordauthe..> 22-Dec-2014 08:33 129K
040-Cryptanalysisofatimestampbasedpasswordauthe..> 22-Dec-2014 08:33 109K
041-EfficientkoutofnObliviousTransferSchemeswit..> 22-Dec-2014 08:33 168K
041-EfficientkoutofnObliviousTransferSchemeswit..> 22-Dec-2014 08:33 362K
042-CryptanalyzingBressonetal39sSpontaneousAnon..> 20-Jan-2023 14:22 207
043-Multisequenceswithdperfectproperty.pdf 22-Dec-2014 08:33 114K
043-Multisequenceswithdperfectproperty.ps 22-Dec-2014 08:33 269K
044-TransitiveSignaturesBasedonNonadaptiveStand..> 22-Dec-2014 08:33 134K
044-TransitiveSignaturesBasedonNonadaptiveStand..> 22-Dec-2014 08:33 318K
045-LowerBoundsandImpossibilityResultsforConcur..> 22-Dec-2014 08:33 498K
045-LowerBoundsandImpossibilityResultsforConcur..> 22-Dec-2014 08:33 842K
046-RevisionofTractableRationalMapCryptosystem.pdf 22-Dec-2014 08:33 133K
046-RevisionofTractableRationalMapCryptosystem.ps 22-Dec-2014 08:33 321K
047-Onazeroknowledgepropertyofargumentsofknowle..> 22-Dec-2014 08:33 226K
047-Onazeroknowledgepropertyofargumentsofknowle..> 22-Dec-2014 08:33 171K
048-TailMACAMessageAuthenticationSchemeforStrea..> 22-Dec-2014 08:33 143K
048-TailMACAMessageAuthenticationSchemeforStrea..> 22-Dec-2014 08:33 270K
049-SideChannelAnalysisforReverseEngineeringSCA..> 22-Dec-2014 08:33 235K
049-SideChannelAnalysisforReverseEngineeringSCA..> 22-Dec-2014 08:33 227K
050-Yetanotherattackonapasswordauthenticationsc..> 22-Dec-2014 08:33 29K
050-Yetanotherattackonapasswordauthenticationsc..> 22-Dec-2014 08:33 92K
051-PrivacyPreservingKeywordSearchesonRemoteEnc..> 22-Dec-2014 08:33 169K
051-PrivacyPreservingKeywordSearchesonRemoteEnc..> 22-Dec-2014 08:33 341K
052-TheHierarchyofKeyEvolvingSignaturesandaChar..> 22-Dec-2014 08:33 274K
052-TheHierarchyofKeyEvolvingSignaturesandaChar..> 22-Dec-2014 08:33 533K
053-EfficientandUniversallyComposableCommittedO..> 22-Dec-2014 08:33 493K
053-EfficientandUniversallyComposableCommittedO..> 22-Dec-2014 08:33 531K
054-CommentsonaThresholdProxySignatureSchemeBas..> 22-Dec-2014 08:33 117K
054-CommentsonaThresholdProxySignatureSchemeBas..> 22-Dec-2014 08:33 282K
055-RedundantTrinomialsforFiniteFieldsofCharact..> 22-Dec-2014 08:33 342K
055-RedundantTrinomialsforFiniteFieldsofCharact..> 22-Dec-2014 08:33 430K
057-OnMultipleLinearApproximations.pdf 22-Dec-2014 08:33 258K
057-OnMultipleLinearApproximations.ps 22-Dec-2014 08:32 606K
058-GeneratingmoreMNTellipticcurves.pdf 22-Dec-2014 08:32 125K
058-GeneratingmoreMNTellipticcurves.ps 22-Dec-2014 08:32 274K
059-SymmetricEncryptioninaSimulatableDolevYaoSt..> 22-Dec-2014 08:32 437K
059-SymmetricEncryptioninaSimulatableDolevYaoSt..> 22-Dec-2014 08:32 1M
060-PositiveResultsandTechniquesforObfuscation.pdf 22-Dec-2014 08:32 192K
060-PositiveResultsandTechniquesforObfuscation.ps 22-Dec-2014 08:32 325K
061-TTSRankAttacksinTameLikeMultivariatePKCs.pdf 22-Dec-2014 08:32 226K
061-TTSRankAttacksinTameLikeMultivariatePKCs.ps 22-Dec-2014 08:32 358K
062-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 08:32 232K
062-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 08:32 527K
063-AnObliviousTransferProtocolwithLogSquaredCo..> 22-Dec-2014 08:32 199K
063-AnObliviousTransferProtocolwithLogSquaredCo..> 22-Dec-2014 08:32 363K
064-PairingBasedCryptographicProtocolsASurvey.pdf 22-Dec-2014 08:32 369K
064-PairingBasedCryptographicProtocolsASurvey.ps 22-Dec-2014 08:32 428K
065-RefinementsofMiller39sAlgorithmforComputing..> 20-Jan-2023 08:41 179K
065-RefinementsofMillersAlgorithmforComputingWe..> 22-Dec-2014 08:32 222K
065-RefinementsofMillersAlgorithmforComputingWe..> 22-Dec-2014 08:32 225K
066-ADynamicandDifferentialCMOSLogicStyletoResi..> 22-Dec-2014 08:32 314K
067-ChargeRecyclingSenseAmplifierBasedLogicSecu..> 22-Dec-2014 08:32 192K
068-SynthesisofSecureFPGAImplementations.pdf 22-Dec-2014 08:32 303K
069-AGeneralizationofPGVHashFunctionsandSecurit..> 22-Dec-2014 08:32 284K
069-AGeneralizationofPGVHashFunctionsandSecurit..> 22-Dec-2014 08:32 304K
070-EasydecisionDiffieHellmangroups.pdf 22-Dec-2014 08:32 266K
070-EasydecisionDiffieHellmangroups.ps 22-Dec-2014 08:32 246K
071-AnIBESchemetoExchangeAuthenticatedSecretKey..> 22-Dec-2014 08:32 70K
071-AnIBESchemetoExchangeAuthenticatedSecretKey..> 22-Dec-2014 08:32 125K
072-AsymmetricCryptographyHiddenFieldEquations.pdf 22-Dec-2014 08:32 213K
072-AsymmetricCryptographyHiddenFieldEquations.ps 22-Dec-2014 08:32 398K
073-Indexcalculusforabelianvarietiesandtheellip..> 22-Dec-2014 08:32 160K
073-Indexcalculusforabelianvarietiesandtheellip..> 22-Dec-2014 08:32 369K
074-CompletionofComputationofImprovedUpperBound..> 22-Dec-2014 08:32 86K
074-CompletionofComputationofImprovedUpperBound..> 22-Dec-2014 08:32 258K
075-AnHybridModeofOperation.pdf 22-Dec-2014 08:32 127K
076-GroupSignaturesProvableSecurityEfficientCon..> 22-Dec-2014 08:32 327K
076-GroupSignaturesProvableSecurityEfficientCon..> 22-Dec-2014 08:31 541K
077-FoundationsofGroupSignaturesTheCaseofDynami..> 22-Dec-2014 08:31 321K
077-FoundationsofGroupSignaturesTheCaseofDynami..> 22-Dec-2014 08:31 548K
078-AnalysisoftheWinZipencryptionmethod.pdf 22-Dec-2014 08:31 349K
078-AnalysisoftheWinZipencryptionmethod.ps 22-Dec-2014 08:31 3M
079-PairingBasedOneRoundTripartiteKeyAgreementP..> 22-Dec-2014 08:31 204K
080-HENKOSStreamCipher.pdf 22-Dec-2014 08:31 107K
081-RewritingVariablestheComplexityofFastAlgebr..> 22-Dec-2014 08:31 308K
082-TheReactiveSimulatabilityRSIMFrameworkforAs..> 22-Dec-2014 08:31 552K
083-ScanBasedSideChannelAttackonDataEncryptionS..> 22-Dec-2014 08:31 437K
084-EvaluatingellipticcurvebasedKEMsinthelighto..> 22-Dec-2014 08:31 225K
085-TheCS2BlockCipher.pdf 22-Dec-2014 08:31 205K
086-FuzzyIdentityBasedEncryption.pdf 22-Dec-2014 08:31 196K
087-Usingprimitivesubgroupstodomorewithfewerbit..> 22-Dec-2014 08:31 299K
087-Usingprimitivesubgroupstodomorewithfewerbit..> 22-Dec-2014 08:31 490K
088-EfficientBatchVerificationofSignatureScheme..> 20-Jan-2023 14:22 207
089-SecurityofRandomKeyPredistributionSchemesWi..> 22-Dec-2014 08:31 155K
089-SecurityofRandomKeyPredistributionSchemesWi..> 22-Dec-2014 08:31 183K
090-ProvablySecureAuthenticatedTreeBasedGroupKe..> 22-Dec-2014 08:31 212K
091-SignatureBouquetsImmutabilityforAggregatedC..> 22-Dec-2014 08:31 158K
092-ANewStreamCipherHC256.pdf 22-Dec-2014 08:31 196K
092-ANewStreamCipherHC256.ps 22-Dec-2014 08:31 379K
093-AProvablySecureNybergRueppelSignatureVarian..> 22-Dec-2014 08:31 210K
093-AProvablySecureNybergRueppelSignatureVarian..> 22-Dec-2014 08:31 382K
094-BlockCiphersandStreamCiphersTheStateoftheAr..> 22-Dec-2014 08:31 206K
094-BlockCiphersandStreamCiphersTheStateoftheAr..> 22-Dec-2014 08:31 322K
095-GNFSFactoringStatisticsofRSA100110150.pdf 22-Dec-2014 08:31 71K
095-GNFSFactoringStatisticsofRSA100110150.ps 22-Dec-2014 08:31 219K
096-OntheAmbiguityofConcurrentSignatures.pdf 20-Jan-2023 14:22 207
097-HowToReinitializeaHashChain.pdf 22-Dec-2014 08:31 145K
098-AttackingaPublicKeyCryptosystemBasedonTreeR..> 22-Dec-2014 08:31 134K
098-AttackingaPublicKeyCryptosystemBasedonTreeR..> 22-Dec-2014 08:31 395K
099-SecureHashedDiffieHellmanoverNonDDHGroups.pdf 22-Dec-2014 08:30 354K
099-SecureHashedDiffieHellmanoverNonDDHGroups.ps 22-Dec-2014 08:30 346K
100-TheSorcerersApprenticeGuidetoFaultAttacks.pdf 22-Dec-2014 08:30 2M
101-ProvablySecureMaskingofAES.pdf 22-Dec-2014 08:30 231K
101-ProvablySecureMaskingofAES.ps 22-Dec-2014 08:30 576K
102-TheExactSecurityofanIdentityBasedSignaturea..> 22-Dec-2014 08:30 298K
102-TheExactSecurityofanIdentityBasedSignaturea..> 22-Dec-2014 08:30 567K
103-CryptanalysisofSFlashv3.pdf 22-Dec-2014 08:30 145K
103-CryptanalysisofSFlashv3.ps 22-Dec-2014 08:30 299K
104-EfficientandProvablySecureTrapdoorfreeGroup..> 22-Dec-2014 08:30 282K
104-EfficientandProvablySecureTrapdoorfreeGroup..> 22-Dec-2014 08:30 596K
105-ReceiptFreeHomomorphicElectionsandWriteinBa..> 22-Dec-2014 08:30 317K
105-ReceiptFreeHomomorphicElectionsandWriteinBa..> 22-Dec-2014 08:30 619K
106-CapacityandExamplesofTemplateProtectingBiom..> 22-Dec-2014 08:30 145K
107-Classificationofgenus2curvesovermathbbF_2na..> 22-Dec-2014 08:30 148K
107-Classificationofgenus2curvesovermathbbF_2na..> 22-Dec-2014 08:30 340K
108-TwoImprovedPartiallyBlindSignatureSchemesfr..> 22-Dec-2014 08:30 221K
108-TwoImprovedPartiallyBlindSignatureSchemesfr..> 22-Dec-2014 08:30 420K
109-ConcealingComplexPolicieswithHiddenCredenti..> 22-Dec-2014 08:30 178K
110-DesigningAgainsttheOverdefinedSystemofEquat..> 20-Jan-2023 08:41 164K
110-DesigningAgainsttheOverdefinedSystemofEquat..> 22-Dec-2014 08:30 164K
111-TheVulnerabilityofSSLtoChosenPlaintextAttac..> 22-Dec-2014 08:30 272K
111-TheVulnerabilityofSSLtoChosenPlaintextAttac..> 22-Dec-2014 08:30 2M
112-RelationbetweenXLalgorithmandGroebnerBasesA..> 22-Dec-2014 08:30 196K
113-OntheSecurityandComposabilityoftheOneTimePa..> 22-Dec-2014 08:30 243K
113-OntheSecurityandComposabilityoftheOneTimePa..> 22-Dec-2014 08:30 664K
114-ImprovedIdentityBasedSigncryption.pdf 22-Dec-2014 08:30 262K
114-ImprovedIdentityBasedSigncryption.ps 22-Dec-2014 08:30 276K
115-ProvablySecureandCommunicationEfficientSche..> 22-Dec-2014 08:30 200K
115-ProvablySecureandCommunicationEfficientSche..> 22-Dec-2014 08:30 393K
116-OntheLimitationsofUniversallyComposableTwoP..> 22-Dec-2014 08:29 359K
116-OntheLimitationsofUniversallyComposableTwoP..> 22-Dec-2014 08:29 695K
117-EfficientandForwardSecureIdentityBasedSignc..> 22-Dec-2014 08:29 153K
117-EfficientandForwardSecureIdentityBasedSignc..> 22-Dec-2014 08:29 315K
118-Fastadditiononnonhyperellipticgenus3curves.pdf 22-Dec-2014 08:29 188K
118-Fastadditiononnonhyperellipticgenus3curves.ps 22-Dec-2014 08:29 534K
119-AdaptivelySecureFeldmanVSSandApplicationsto..> 22-Dec-2014 08:29 454K
119-AdaptivelySecureFeldmanVSSandApplicationsto..> 22-Dec-2014 08:29 461K
120-SecurityofSymmetricEncryptionSchemeswithOne..> 22-Dec-2014 08:29 108K
120-SecurityofSymmetricEncryptionSchemeswithOne..> 22-Dec-2014 08:29 233K
121-FastandProvenSecureBlindIdentityBasedSigncr..> 22-Dec-2014 08:29 228K
121-FastandProvenSecureBlindIdentityBasedSigncr..> 22-Dec-2014 08:29 435K
122-ANewTwoPartyIdentityBasedAuthenticatedKeyAg..> 22-Dec-2014 08:29 260K
123-OnsecurityofXTRpublickeycryptosystemsagains..> 22-Dec-2014 08:29 183K
123-OnsecurityofXTRpublickeycryptosystemsagains..> 22-Dec-2014 08:29 472K
124-UniversallyComposableDKGwithLinearNumberofE..> 22-Dec-2014 08:29 225K
124-UniversallyComposableDKGwithLinearNumberofE..> 22-Dec-2014 08:29 724K
125-EMEextendingEMEtohandlearbitrarylengthmessa..> 22-Dec-2014 08:29 347K
125-EMEextendingEMEtohandlearbitrarylengthmessa..> 22-Dec-2014 08:29 694K
126-TwoSoftwareNormalBasisMultiplicationAlgorit..> 22-Dec-2014 08:29 133K
127-DDHbasedGroupKeyAgreementinaMobileEnvironme..> 22-Dec-2014 08:29 172K
127-DDHbasedGroupKeyAgreementinaMobileEnvironme..> 22-Dec-2014 08:29 355K
128-ElasticBlockCiphers.pdf 22-Dec-2014 08:29 167K
128-ElasticBlockCiphers.ps 22-Dec-2014 08:29 370K
129-GeneralizingKedlaya39sordercountingbasedonM..> 20-Jan-2023 08:41 312K
129-GeneralizingKedlayasordercountingbasedonMiu..> 22-Dec-2014 08:29 222K
129-GeneralizingKedlayasordercountingbasedonMiu..> 22-Dec-2014 08:29 696K
130-PrivateInferenceControl.pdf 22-Dec-2014 08:29 315K
130-PrivateInferenceControl.ps 22-Dec-2014 08:29 543K
131-ANewIDbasedSignaturewithBatchVerification.pdf 22-Dec-2014 08:28 236K
131-ANewIDbasedSignaturewithBatchVerification.ps 22-Dec-2014 08:28 219K
132-OnSmallCharacteristicAlgebraicToriinPairing..> 22-Dec-2014 08:28 294K
132-OnSmallCharacteristicAlgebraicToriinPairing..> 22-Dec-2014 08:28 287K
133-SecretHandshakesfromCAObliviousEncryption.pdf 22-Dec-2014 08:28 189K
133-SecretHandshakesfromCAObliviousEncryption.ps 22-Dec-2014 08:28 369K
134-SecureandEfficientMaskingofAESAMissionImpos..> 22-Dec-2014 08:28 304K
135-MoreEfficientServerAssistedOneTimeSignature..> 22-Dec-2014 08:28 138K
136-CompChallAddressingPasswordGuessingAttacks.pdf 22-Dec-2014 08:28 163K
137-NewGF2nParallelMultiplierUsingRedundantRepr..> 22-Dec-2014 08:28 131K
138-HowtoDisembedaProgram.pdf 22-Dec-2014 08:28 542K
138-HowtoDisembedaProgram.ps 22-Dec-2014 08:28 992K
139-NewNotionsofSecurityAchievingUniversalCompo..> 22-Dec-2014 08:28 308K
139-NewNotionsofSecurityAchievingUniversalCompo..> 22-Dec-2014 08:28 464K
140-ArchitecturesandHardwareImplementationsofth..> 20-Jan-2023 14:22 207
141-ElasticAES.pdf 22-Dec-2014 08:28 99K
141-ElasticAES.ps 22-Dec-2014 08:28 185K
142-EllipticCurvebasedSigncryptionanditsMultipa..> 20-Jan-2023 08:41 43K
143-ShortSignaturesProvableSecurityGenericAttac..> 22-Dec-2014 08:28 284K
143-ShortSignaturesProvableSecurityGenericAttac..> 22-Dec-2014 08:28 513K
144-PlateauedRotationSymmetricBooleanFunctionso..> 22-Dec-2014 08:28 270K
144-PlateauedRotationSymmetricBooleanFunctionso..> 22-Dec-2014 08:28 361K
145-ElectromagneticSideChannelsofanFPGAImplemen..> 22-Dec-2014 08:28 217K
145-ElectromagneticSideChannelsofanFPGAImplemen..> 22-Dec-2014 08:28 724K
146-NearCollisionsofSHA0.pdf 22-Dec-2014 08:28 228K
146-NearCollisionsofSHA0.ps 22-Dec-2014 08:28 224K
147-KeyRecoveryMethodforCRTImplementationofRSA.pdf 22-Dec-2014 08:28 111K
147-KeyRecoveryMethodforCRTImplementationofRSA.ps 22-Dec-2014 08:28 270K
148-ProvablySecureDelegationbyCertificationProx..> 22-Dec-2014 08:28 201K
149-SecureandEfficientAESSoftwareImplementation..> 22-Dec-2014 08:27 236K
150-AnAuthenticatedCertificatelessPublicKeyEncr..> 22-Dec-2014 08:27 215K
150-AnAuthenticatedCertificatelessPublicKeyEncr..> 22-Dec-2014 08:27 207K
151-SuitableCurvesforGenus4HCCoverPrimeFieldsPo..> 22-Dec-2014 08:27 219K
152-AnotherLookatProvableSecurity.pdf 22-Dec-2014 08:27 439K
152-AnotherLookatProvableSecurity3939.pdf 20-Jan-2023 08:41 439K
153-Adoublelargeprimevariationforsmallgenushype..> 22-Dec-2014 08:27 207K
153-Adoublelargeprimevariationforsmallgenushype..> 22-Dec-2014 08:27 421K
154-ControllingSpambySecureInternetContentSelec..> 22-Dec-2014 08:27 254K
155-SecurityandIdentificationIndicatorsforBrows..> 22-Dec-2014 08:27 700K
156-Quantumcryptographyapracticalinformationsec..> 22-Dec-2014 08:27 103K
157-HardwareandSoftwareNormalBasisArithmeticfor..> 22-Dec-2014 08:27 281K
157-HardwareandSoftwareNormalBasisArithmeticfor..> 22-Dec-2014 08:27 295K
158-MobileTerminalSecurity.pdf 22-Dec-2014 08:27 699K
159-ProvablySecureOndemandSourceRoutinginMobile..> 22-Dec-2014 08:27 216K
159-ProvablySecureOndemandSourceRoutinginMobile..> 22-Dec-2014 08:27 1M
160-ScalablePublicKeyTracingandRevoking.pdf 22-Dec-2014 08:27 432K
160-ScalablePublicKeyTracingandRevoking.ps 22-Dec-2014 08:27 803K
161-ImprovementofThLeriaultAlgorithmofIndexCalc..> 22-Dec-2014 08:27 220K
161-ImprovementofThLeriaultAlgorithmofIndexCalc..> 22-Dec-2014 08:27 205K
161-ImprovementofThriaultAlgorithmofIndexCalcul..> 20-Jan-2023 08:41 226K
162-OntheKeyUncertaintyofQuantumCiphersandtheCo..> 22-Dec-2014 08:27 213K
162-OntheKeyUncertaintyofQuantumCiphersandtheCo..> 22-Dec-2014 08:27 430K
163-OntheWeaknessesandImprovementsofanEfficient..> 20-Jan-2023 14:22 207
164-IDbasedCryptographyfromCompositeDegreeResid..> 22-Dec-2014 08:27 297K
165-AcomparisonofMNTcurvesandsupersingularcurve..> 22-Dec-2014 08:27 189K
166-FRMACaFastRandomizedMessageAuthenticationCo..> 22-Dec-2014 08:27 176K
167-ASecureandEfficientKeyExchangeProtocolforMo..> 22-Dec-2014 08:27 63K
167-ASecureandEfficientKeyExchangeProtocolforMo..> 22-Dec-2014 08:27 201K
168-BuildingInstancesofTTMImmunetotheGoubinCour..> 22-Dec-2014 08:27 111K
168-BuildingInstancesofTTMImmunetotheGoubinCour..> 22-Dec-2014 08:27 147K
169-RegionalBlackoutsProtectionofBroadcastConte..> 22-Dec-2014 08:27 167K
170-EfficientConsistencyProofsforGeneralizedQue..> 22-Dec-2014 08:27 237K
170-EfficientConsistencyProofsforGeneralizedQue..> 22-Dec-2014 08:27 234K
171-ShortSignaturesWithoutRandomOracles.pdf 22-Dec-2014 08:26 228K
171-ShortSignaturesWithoutRandomOracles.ps 22-Dec-2014 08:26 433K
172-EfficientSelectiveIDSecureIdentityBasedEncr..> 22-Dec-2014 08:26 247K
172-EfficientSelectiveIDSecureIdentityBasedEncr..> 22-Dec-2014 08:26 471K
173-SecureIdentityBasedEncryptionWithoutRandomO..> 22-Dec-2014 08:26 278K
173-SecureIdentityBasedEncryptionWithoutRandomO..> 22-Dec-2014 08:26 541K
174-ShortGroupSignatures.pdf 22-Dec-2014 08:26 240K
174-ShortGroupSignatures.ps 22-Dec-2014 08:26 463K
175-AProofofYao39sProtocolforSecureTwoPartyComp..> 20-Jan-2023 08:40 303K
175-AProofofYaosProtocolforSecureTwoPartyComput..> 22-Dec-2014 08:26 303K
176-ABiometricIdentityBasedSignatureScheme.pdf 22-Dec-2014 08:26 334K
177-UpdatingtheParametersofaThresholdSchemebyMi..> 22-Dec-2014 08:26 221K
178-OptimalUpdatingofIdealThresholdSchemes.pdf 22-Dec-2014 08:26 143K
179-IdentityBasedThresholdRingSignature.pdf 22-Dec-2014 08:26 225K
179-IdentityBasedThresholdRingSignature.ps 22-Dec-2014 08:26 202K
180-EfficientIdentityBasedEncryptionWithoutRand..> 22-Dec-2014 08:26 172K
181-OntheCompositionofAuthenticatedByzantineAgr..> 22-Dec-2014 08:26 333K
181-OntheCompositionofAuthenticatedByzantineAgr..> 22-Dec-2014 08:26 535K
182-SimplerSessionKeyGenerationfromShortRandomP..> 22-Dec-2014 08:26 427K
182-SimplerSessionKeyGenerationfromShortRandomP..> 22-Dec-2014 08:26 484K
183-ANewForwardSecureSignatureScheme.pdf 22-Dec-2014 08:26 194K
183-ANewForwardSecureSignatureScheme.ps 22-Dec-2014 08:26 420K
184-IDbasedRingSignatureandProxyRingSignatureSc..> 22-Dec-2014 08:26 128K
184-IDbasedRingSignatureandProxyRingSignatureSc..> 22-Dec-2014 08:26 318K
185-OntheExistenceoflowdegreeEquationsforAlgebr..> 22-Dec-2014 08:26 217K
185-OntheExistenceoflowdegreeEquationsforAlgebr..> 22-Dec-2014 08:26 461K
186-ANewRemoteUserAuthenticationSchemeUsingSmar..> 20-Jan-2023 14:22 207
187-ParallelFPGAImplementationofRSAwithResidueN..> 22-Dec-2014 08:26 219K
187-ParallelFPGAImplementationofRSAwithResidueN..> 22-Dec-2014 08:26 796K
188-GreyBoxImplementationofBlockCiphersPreservi..> 22-Dec-2014 08:26 219K
188-GreyBoxImplementationofBlockCiphersPreservi..> 22-Dec-2014 08:26 211K
189-ComputingModularPolynomials.pdf 22-Dec-2014 08:26 184K
190-DistributedRingSignaturesforIdentityBasedSc..> 22-Dec-2014 08:26 289K
190-DistributedRingSignaturesforIdentityBasedSc..> 22-Dec-2014 08:25 308K
191-ScalarMultiplicationinEllipticCurveCryptosy..> 22-Dec-2014 08:25 214K
191-ScalarMultiplicationinEllipticCurveCryptosy..> 22-Dec-2014 08:25 196K
192-SecurityPitfallsofanefficientremoteuserauth..> 20-Jan-2023 14:22 207
193-TheSecurityandPerformanceoftheGaloisCounter..> 22-Dec-2014 08:25 286K
194-ANoteonAnEncryptionSchemeofKurosawaandDesme..> 22-Dec-2014 08:25 195K
195-SignedBinaryRepresentationsRevisited.pdf 22-Dec-2014 08:25 287K
195-SignedBinaryRepresentationsRevisited.ps 22-Dec-2014 08:25 1M
196-PasswordBasedKeyExchangewithMutualAuthentic..> 22-Dec-2014 08:25 206K
196-PasswordBasedKeyExchangewithMutualAuthentic..> 22-Dec-2014 08:25 383K
197-SPAbasedattackagainstthemodularreductionwit..> 22-Dec-2014 08:25 22K
197-SPAbasedattackagainstthemodularreductionwit..> 22-Dec-2014 08:25 127K
198-LongModularMultiplicationforCryptographicAp..> 22-Dec-2014 08:25 556K
199-CollisionsforHashFunctionsMD4MD5HAVAL128and..> 22-Dec-2014 08:25 56K
200-OnCheatingImmuneSecretSharing.pdf 22-Dec-2014 08:25 101K
200-OnCheatingImmuneSecretSharing.ps 22-Dec-2014 08:25 233K
201-NonInteractiveandInformationTheoreticSecure..> 22-Dec-2014 08:25 121K
201-NonInteractiveandInformationTheoreticSecure..> 22-Dec-2014 08:25 264K
202-CoveringRadiusofthen3rdOrderReedMullerCodei..> 22-Dec-2014 08:25 94K
202-CoveringRadiusofthen3rdOrderReedMullerCodei..> 22-Dec-2014 08:25 220K
203-HowtoCheatatChessASecurityAnalysisoftheInte..> 22-Dec-2014 08:25 352K
203-HowtoCheatatChessASecurityAnalysisoftheInte..> 22-Dec-2014 08:25 661K
204-Authenticatedtreeparitymachinekeyexchange.pdf 22-Dec-2014 08:25 213K
204-Authenticatedtreeparitymachinekeyexchange.ps 22-Dec-2014 08:25 236K
205-DirectAnonymousAttestation.pdf 22-Dec-2014 08:25 286K
206-IDBasedProxySignatureUsingBilinearPairings.pdf 22-Dec-2014 08:25 191K
207-OnCorrectivePatternsfortheSHA2Family.pdf 22-Dec-2014 08:25 300K
208-DeterministicPolynomialTimeEquivalenceofCom..> 22-Dec-2014 08:25 132K
208-DeterministicPolynomialTimeEquivalenceofCom..> 22-Dec-2014 08:25 314K
209-TheSecurityandEfficiencyofMicciancio39sCryp..> 20-Jan-2023 08:40 180K
209-TheSecurityandEfficiencyofMiccianciosCrypto..> 22-Dec-2014 08:25 148K
209-TheSecurityandEfficiencyofMiccianciosCrypto..> 22-Dec-2014 08:25 329K
210-HybridCryptography.pdf 22-Dec-2014 08:25 439K
210-HybridCryptography.ps 22-Dec-2014 08:25 605K
211-ScalableServerPassiveUserAnonymousTimedRele..> 22-Dec-2014 08:24 173K
211-ScalableServerPassiveUserAnonymousTimedRele..> 22-Dec-2014 08:24 349K
212-IDBasedEncryptionforComplexHierarchieswithA..> 22-Dec-2014 08:24 343K
212-IDBasedEncryptionforComplexHierarchieswithA..> 22-Dec-2014 08:24 608K
213-CryptanalysisofChangetal39sSignatureSchemew..> 20-Jan-2023 08:40 69K
213-CryptanalysisofChangetalsSignatureSchemewit..> 22-Dec-2014 08:24 71K
213-CryptanalysisofChangetalsSignatureSchemewit..> 22-Dec-2014 08:24 185K
214-ClassificationofHighlyNonlinearBooleanPower..> 22-Dec-2014 08:24 208K
214-ClassificationofHighlyNonlinearBooleanPower..> 22-Dec-2014 08:24 427K
215-TransitiveSignaturesNewSchemesandProofs.pdf 22-Dec-2014 08:24 417K
215-TransitiveSignaturesNewSchemesandProofs.ps 22-Dec-2014 08:24 672K
216-TreeParityMachineRekeyingArchitectures.pdf 22-Dec-2014 08:24 165K
216-TreeParityMachineRekeyingArchitectures.ps 22-Dec-2014 08:24 364K
217-CryptanalyzingthePolynomialReconstructionba..> 22-Dec-2014 08:24 247K
217-CryptanalyzingthePolynomialReconstructionba..> 22-Dec-2014 08:24 944K
218-PlaintextSimulatability.pdf 22-Dec-2014 08:24 232K
219-EntropicSecurityandtheEncryptionofHighEntro..> 22-Dec-2014 08:24 322K
219-EntropicSecurityandtheEncryptionofHighEntro..> 22-Dec-2014 08:24 579K
220-OnOleshchuk39sPublicKeyCryptosystem.pdf 20-Jan-2023 08:40 225K
220-OnOleshchuksPublicKeyCryptosystem.pdf 22-Dec-2014 08:24 168K
220-OnOleshchuksPublicKeyCryptosystem.ps 22-Dec-2014 08:24 391K
221-TowardsPlaintextAwarePublicKeyEncryptionwit..> 22-Dec-2014 08:24 311K
221-TowardsPlaintextAwarePublicKeyEncryptionwit..> 22-Dec-2014 08:24 577K
222-AStudyoftheSecurityofUnbalancedOilandVinega..> 22-Dec-2014 08:24 202K
222-AStudyoftheSecurityofUnbalancedOilandVinega..> 22-Dec-2014 08:24 413K
223-InversionFreeArithmeticonGenus3Hyperellipti..> 22-Dec-2014 08:24 150K
224-ThePolynomialCompositionProbleminZnZX.pdf 22-Dec-2014 08:24 117K
224-ThePolynomialCompositionProbleminZnZX.ps 22-Dec-2014 08:24 163K
225-VectorialBooleanfunctionsandinducedalgebrai..> 22-Dec-2014 08:24 201K
225-VectorialBooleanfunctionsandinducedalgebrai..> 22-Dec-2014 08:24 217K
226-LowerBoundsforNonBlackBoxZeroKnowledge.pdf 22-Dec-2014 08:24 670K
226-LowerBoundsforNonBlackBoxZeroKnowledge.ps 22-Dec-2014 08:24 912K
227-SignChangeFaultAttacksOnEllipticCurveCrypto..> 22-Dec-2014 08:24 253K
227-SignChangeFaultAttacksOnEllipticCurveCrypto..> 22-Dec-2014 08:23 477K
228-DISTRIBUTIONOFRPATTERNSINTHEKERDOCKCODEBINA..> 22-Dec-2014 08:23 110K
228-DISTRIBUTIONOFRPATTERNSINTHEKERDOCKCODEBINA..> 22-Dec-2014 08:23 265K
229-SecureDirectCommunicationUsingQuantumCalder..> 22-Dec-2014 08:23 88K
229-SecureDirectCommunicationUsingQuantumCalder..> 22-Dec-2014 08:23 174K
230-AProvableSecureSchemeforPartiallyBlindSigna..> 22-Dec-2014 08:23 115K
230-AProvableSecureSchemeforPartiallyBlindSigna..> 22-Dec-2014 08:23 293K
231-TimedReleaseandKeyInsulatedPublicKeyEncrypt..> 22-Dec-2014 08:23 276K
231-TimedReleaseandKeyInsulatedPublicKeyEncrypt..> 22-Dec-2014 08:23 569K
232-ExtendingtheResynchronizationAttack.pdf 22-Dec-2014 08:23 320K
232-ExtendingtheResynchronizationAttack.ps 22-Dec-2014 08:23 580K
233-PasswordBasedAuthenticatedKeyExchangeintheT..> 22-Dec-2014 08:23 218K
233-PasswordBasedAuthenticatedKeyExchangeintheT..> 22-Dec-2014 08:23 401K
234-Onthesecurityofsomenonrepudiablethresholdpr..> 22-Dec-2014 08:23 159K
235-CryptographicImplicationsofHess39Generalize..> 20-Jan-2023 08:40 356K
235-CryptographicImplicationsofHessGeneralizedG..> 22-Dec-2014 08:23 356K
236-ForgeryAttacksonChangetal39ssignaturescheme..> 20-Jan-2023 08:40 105K
236-ForgeryAttacksonChangetalssignatureschemewi..> 22-Dec-2014 08:23 105K
237-EfficientCryptanalysisofRSE2PKCandRSSE2PKC.pdf 22-Dec-2014 08:23 214K
237-EfficientCryptanalysisofRSE2PKCandRSSE2PKC.ps 22-Dec-2014 08:23 453K
238-SecurityAnalysisofADynamicIDbasedRemoteUser..> 22-Dec-2014 08:23 103K
239-GeometricKeyEstablishment.pdf 22-Dec-2014 08:23 659K
240-AWeilDescentAttackagainstEllipticCurveCrypt..> 22-Dec-2014 08:23 239K
240-AWeilDescentAttackagainstEllipticCurveCrypt..> 22-Dec-2014 08:23 497K
241-AComparisonofPointCountingmethodsforHyperel..> 22-Dec-2014 08:23 122K
242-Combinatorialgrouptheoryandpublickeycryptog..> 22-Dec-2014 08:23 167K
242-Combinatorialgrouptheoryandpublickeycryptog..> 22-Dec-2014 08:23 374K
243-OntheKeyExposureProbleminChameleonHashes.pdf 22-Dec-2014 08:23 171K
244-SigncryptioninHierarchicalIdentityBasedCryp..> 22-Dec-2014 08:23 278K
244-SigncryptioninHierarchicalIdentityBasedCryp..> 22-Dec-2014 08:23 293K
245-Oncodesmatroidsandsecuremultipartycomputati..> 22-Dec-2014 08:23 248K
246-UpperandLowerBoundsonBlackBoxSteganography.pdf 22-Dec-2014 08:23 342K
246-UpperandLowerBoundsonBlackBoxSteganography.ps 22-Dec-2014 08:23 588K
247-Vectorialfastcorrelationattacks.pdf 22-Dec-2014 08:23 272K
247-Vectorialfastcorrelationattacks.ps 22-Dec-2014 08:23 786K
248-ClassificationofBooleanFunctionsof6Variable..> 22-Dec-2014 08:22 262K
248-ClassificationofBooleanFunctionsof6Variable..> 22-Dec-2014 08:22 517K
249-AttacksOnAnISOIEC117702KeyEstablishmentProt..> 22-Dec-2014 08:22 121K
249-AttacksOnAnISOIEC117702KeyEstablishmentProt..> 22-Dec-2014 08:22 297K
250-IdentityBasedThresholdProxySignature.pdf 22-Dec-2014 08:22 149K
251-AttacksonBressonChevassutEssiariPointcheval..> 20-Jan-2023 08:40 136K
251-AttacksonBressonChevassutEssiariPointcheval..> 22-Dec-2014 08:22 97K
251-AttacksonBressonChevassutEssiariPointcheval..> 22-Dec-2014 08:22 231K
252-SecurityProofsforIdentityBasedIdentificatio..> 22-Dec-2014 08:22 692K
252-SecurityProofsforIdentityBasedIdentificatio..> 22-Dec-2014 08:22 1017K
253-DesignPrinciplesforIteratedHashFunctions.pdf 22-Dec-2014 08:22 175K
254-Newparadigmsfordigitalgenerationandpostproc..> 22-Dec-2014 08:22 246K
254-Newparadigmsfordigitalgenerationandpostproc..> 22-Dec-2014 08:22 421K
255-ACompleteDivisorClassHalvingAlgorithmforHyp..> 22-Dec-2014 08:22 229K
255-ACompleteDivisorClassHalvingAlgorithmforHyp..> 22-Dec-2014 08:22 518K
256-OnthesupportsoftheWalshtransformsofBooleanf..> 22-Dec-2014 08:22 183K
257-AWeaknessinJungPaengKim39sIDbasedConference..> 20-Jan-2023 08:40 115K
257-AWeaknessinJungPaengKimsIDbasedConferenceKe..> 22-Dec-2014 08:22 85K
257-AWeaknessinJungPaengKimsIDbasedConferenceKe..> 22-Dec-2014 08:22 206K
258-EscrowFreeEncryptionSupportingCryptographic..> 22-Dec-2014 08:22 258K
258-EscrowFreeEncryptionSupportingCryptographic..> 22-Dec-2014 08:22 469K
259-OnBooleanFunctionswithGeneralizedCryptograp..> 22-Dec-2014 08:22 249K
259-OnBooleanFunctionswithGeneralizedCryptograp..> 22-Dec-2014 08:22 488K
260-SecureGroupCommunicationsoverCombinedWiredW..> 22-Dec-2014 08:22 162K
260-SecureGroupCommunicationsoverCombinedWiredW..> 22-Dec-2014 08:22 624K
261-ImprovedEfficiencyforCCASecureCryptosystems..> 22-Dec-2014 08:22 194K
261-ImprovedEfficiencyforCCASecureCryptosystems..> 22-Dec-2014 08:22 362K
262-UniversalForgeabilityofaForwardSecureBlindS..> 22-Dec-2014 08:22 75K
262-UniversalForgeabilityofaForwardSecureBlindS..> 22-Dec-2014 08:22 198K
263-ApplicationsofmathcalMultivariatemathcalQua..> 22-Dec-2014 08:22 147K
263-ApplicationsofmathcalMultivariatemathcalQua..> 22-Dec-2014 08:22 228K
264-MusingsontheWangetalMD5Collision.pdf 22-Dec-2014 08:22 471K
265-sSCADASecuringSCADAInfrastructureCommunicat..> 22-Dec-2014 08:22 145K
266-ANewMinimalAverageWeightRepresentationforLe..> 22-Dec-2014 08:21 172K
266-ANewMinimalAverageWeightRepresentationforLe..> 22-Dec-2014 08:21 157K
267-SeparableLinkableThresholdRingSignatures.pdf 22-Dec-2014 08:21 196K
267-SeparableLinkableThresholdRingSignatures.ps 22-Dec-2014 08:21 401K
268-UntraceabilityofWangFuGroupSignatureScheme.pdf 22-Dec-2014 08:21 75K
268-UntraceabilityofWangFuGroupSignatureScheme.ps 22-Dec-2014 08:21 188K
269-CryptanalysisofThresholdMultisignatureSchem..> 22-Dec-2014 08:21 118K
270-AnEnhancedandSecureProtocolforAuthenticated..> 22-Dec-2014 08:21 69K
270-AnEnhancedandSecureProtocolforAuthenticated..> 22-Dec-2014 08:21 223K
271-TheMundjaStreamingMAC.pdf 22-Dec-2014 08:21 276K
272-ACharacterizationofAuthenticatedEncryptiona..> 22-Dec-2014 08:21 103K
273-CryptanalysisofThresholdMultisignatureschem..> 22-Dec-2014 08:21 118K
274-ANOVELALGORITHMENUMERATINGBENTFUNCTIONS.pdf 22-Dec-2014 08:21 162K
275-AneVotingSchemewithImprovedResistancetoBrib..> 22-Dec-2014 08:21 382K
276-Improvingthealgebraicimmunityofresilientand..> 22-Dec-2014 08:21 228K
277-ExperimentingwithFaultsLatticesandtheDSA.pdf 22-Dec-2014 08:21 950K
278-TheExtendedCodebookXCBModeofOperation.pdf 22-Dec-2014 08:21 193K
279-ParallelMontgomeryMultiplicationinGF2kusing..> 22-Dec-2014 08:21 189K
279-ParallelMontgomeryMultiplicationinGF2kusing..> 22-Dec-2014 08:21 419K
280-CryptanalysisofParkLeeNominativeProxySignat..> 22-Dec-2014 08:21 62K
280-CryptanalysisofParkLeeNominativeProxySignat..> 22-Dec-2014 08:21 167K
281-ShortLinkableRingSignaturesforEVotingECasha..> 22-Dec-2014 08:21 184K
281-ShortLinkableRingSignaturesforEVotingECasha..> 22-Dec-2014 08:21 387K
282-NewMonotoneSpanProgramsfromOld.pdf 22-Dec-2014 08:21 194K
282-NewMonotoneSpanProgramsfromOld.ps 22-Dec-2014 08:21 416K
283-FaultandSideChannelAttacksonPairingBasedCry..> 22-Dec-2014 08:21 269K
283-FaultandSideChannelAttacksonPairingBasedCry..> 22-Dec-2014 08:21 241K
284-ONTHEDEGREEOFHOMOGENEOUSBENTFUNCTIONS.pdf 22-Dec-2014 08:21 91K
284-ONTHEDEGREEOFHOMOGENEOUSBENTFUNCTIONS.ps 22-Dec-2014 08:21 209K
285-GenerationofrandomPicardcurvesforcryptograp..> 22-Dec-2014 08:21 106K
285-GenerationofrandomPicardcurvesforcryptograp..> 22-Dec-2014 08:21 262K
286-Generalizedcompactknapsackscycliclatticesan..> 22-Dec-2014 08:21 385K
286-Generalizedcompactknapsackscycliclatticesan..> 22-Dec-2014 08:21 395K
287-AlmostIdealContrastVisualCryptographywithRe..> 22-Dec-2014 08:20 282K
287-AlmostIdealContrastVisualCryptographywithRe..> 22-Dec-2014 08:20 1M
288-ANewDesignatedConfirmerSignatureVariantwith..> 20-Jan-2023 14:22 207
289-FaultattackontheDVBCommonScramblingAlgorith..> 22-Dec-2014 08:20 175K
290-TheSecurityoftheFDHVariantofChaum39sUndenia..> 20-Jan-2023 08:40 255K
290-TheSecurityoftheFDHVariantofChaumsUndeniabl..> 22-Dec-2014 08:20 236K
290-TheSecurityoftheFDHVariantofChaumsUndeniabl..> 22-Dec-2014 08:20 457K
291-TheRabbitStreamCipherDesignandSecurityAnaly..> 22-Dec-2014 08:20 207K
291-TheRabbitStreamCipherDesignandSecurityAnaly..> 22-Dec-2014 08:20 406K
292-AsynchronousProactiveRSA.pdf 22-Dec-2014 08:20 2M
292-AsynchronousProactiveRSA.ps 22-Dec-2014 08:20 2M
293-ProvablySecureAuthenticationofDigitalMediaT..> 22-Dec-2014 08:20 156K
293-ProvablySecureAuthenticationofDigitalMediaT..> 22-Dec-2014 08:20 334K
294-SolvingSystemsofDifferentialEquationsofAddi..> 22-Dec-2014 08:20 254K
294-SolvingSystemsofDifferentialEquationsofAddi..> 22-Dec-2014 08:20 3M
295-AnAccessControlSchemeforPartiallyOrderedSet..> 22-Dec-2014 08:20 139K
295-AnAccessControlSchemeforPartiallyOrderedSet..> 22-Dec-2014 08:20 327K
296-DesignsofEfficientSecureLargeHashValues.pdf 22-Dec-2014 08:20 181K
296-DesignsofEfficientSecureLargeHashValues.ps 22-Dec-2014 08:20 380K
297-PostQuantumSignatures.pdf 22-Dec-2014 08:20 218K
297-PostQuantumSignatures.ps 22-Dec-2014 08:20 393K
298-NominativeProxySignatureSchemes.pdf 22-Dec-2014 08:20 115K
299-SecurityFlawsinaPairingbasedGroupSignatureS..> 22-Dec-2014 08:20 154K
299-SecurityFlawsinaPairingbasedGroupSignatureS..> 22-Dec-2014 08:20 128K
300-RelatingSymbolicandCryptographicSecrecy.pdf 22-Dec-2014 08:20 408K
300-RelatingSymbolicandCryptographicSecrecy.ps 22-Dec-2014 08:20 2M
301-VMPCMACAStreamCipherBasedAuthenticatedEncry..> 22-Dec-2014 08:19 121K
301-VMPCMACAStreamCipherBasedAuthenticatedEncry..> 22-Dec-2014 08:19 247K
302-SecurityofWangLiThresholdSignatureScheme.pdf 22-Dec-2014 08:19 100K
303-EfficientTatePairingComputationforSupersing..> 22-Dec-2014 08:19 186K
303-EfficientTatePairingComputationforSupersing..> 22-Dec-2014 08:19 355K
304-SecondPreimagesonnbitHashFunctionsforMuchLe..> 22-Dec-2014 08:19 165K
305-Anoteonefficientcomputationofcuberootsincha..> 22-Dec-2014 08:19 77K
305-Anoteonefficientcomputationofcuberootsincha..> 22-Dec-2014 08:19 213K
306-TheStaticDiffieHellmanProblem.pdf 22-Dec-2014 08:19 161K
306-TheStaticDiffieHellmanProblem.ps 22-Dec-2014 08:19 317K
307-UniversalForgeabilityofWangWuWangKeyInsulat..> 22-Dec-2014 08:19 62K
307-UniversalForgeabilityofWangWuWangKeyInsulat..> 22-Dec-2014 08:19 162K
308-CryptanalysisofNoelMcCullaghandPauloSLMBarr..> 22-Dec-2014 08:19 181K
309-ThePowerofVerificationQueriesinMessageAuthe..> 22-Dec-2014 08:19 232K
309-ThePowerofVerificationQueriesinMessageAuthe..> 22-Dec-2014 08:19 435K
310-AVerifiableRandomFunctionWithShortProofsand..> 22-Dec-2014 08:19 294K
310-AVerifiableRandomFunctionWithShortProofsand..> 22-Dec-2014 08:19 264K
311-HierarchicalGroupSignatures.pdf 22-Dec-2014 08:19 623K
311-HierarchicalGroupSignatures.ps 22-Dec-2014 08:19 2M
312-RamanujanGraphsandtheRandomReducibilityofDi..> 22-Dec-2014 08:19 277K
312-RamanujanGraphsandtheRandomReducibilityofDi..> 22-Dec-2014 08:19 844K
313-Cryptanalysisofathresholdproxysignaturewith..> 22-Dec-2014 08:19 53K
313-Cryptanalysisofathresholdproxysignaturewith..> 22-Dec-2014 08:19 138K
314-ATechnicalComparisonofIPSecandSSL.pdf 22-Dec-2014 08:19 273K
315-SecurityArgumentsforPartialDelegationwithWa..> 22-Dec-2014 08:19 170K
316-OnaThresholdGroupSignatureSchemeandaFairBli..> 22-Dec-2014 08:19 89K
316-OnaThresholdGroupSignatureSchemeandaFairBli..> 22-Dec-2014 08:19 214K
317-AdaptivelySecureNonInteractivePublicKeyEncr..> 22-Dec-2014 08:19 384K
317-AdaptivelySecureNonInteractivePublicKeyEncr..> 22-Dec-2014 08:19 621K
318-UpperBoundsontheCommunicationComplexityofOp..> 22-Dec-2014 08:19 294K
318-UpperBoundsontheCommunicationComplexityofOp..> 22-Dec-2014 08:19 282K
319-BadgerAFastandProvablySecureMAC.pdf 22-Dec-2014 08:19 216K
319-BadgerAFastandProvablySecureMAC.ps 22-Dec-2014 08:18 553K
320-UpperBoundsfortheSelectionoftheCryptographi..> 22-Dec-2014 08:18 206K
320-UpperBoundsfortheSelectionoftheCryptographi..> 22-Dec-2014 08:18 713K
321-Theconjugacysearchprobleminpublickeycryptog..> 22-Dec-2014 08:18 130K
322-SeparableandAnonymousIdentityBasedKeyIssuin..> 22-Dec-2014 08:18 136K
322-SeparableandAnonymousIdentityBasedKeyIssuin..> 22-Dec-2014 08:18 421K
323-AnoteonLopezDahabcoordinates.pdf 22-Dec-2014 08:18 100K
323-AnoteonLopezDahabcoordinates.ps 22-Dec-2014 08:18 247K
323-AnoteonLpezDahabcoordinates.pdf 20-Jan-2023 08:40 138K
324-OnaProbabilisticApproachtotheSecurityAnalys..> 22-Dec-2014 08:18 237K
325-ComplexityoftheCollisionandNearCollisionAtt..> 22-Dec-2014 08:18 125K
325-ComplexityoftheCollisionandNearCollisionAtt..> 22-Dec-2014 08:18 289K
326-CryptanalysisofQiuGuChenVariantGroupSignatu..> 22-Dec-2014 08:18 56K
326-CryptanalysisofQiuGuChenVariantGroupSignatu..> 22-Dec-2014 08:18 148K
327-EfficientIdentityBasedRingSignature.pdf 22-Dec-2014 08:18 188K
327-EfficientIdentityBasedRingSignature.ps 22-Dec-2014 08:18 378K
328-SecurityAnalysisofa23rateDoubleLengthCompre..> 20-Jan-2023 14:22 207
329-Hardnessamplificationofweaklyverifiablepuzz..> 22-Dec-2014 08:18 214K
329-Hardnessamplificationofweaklyverifiablepuzz..> 22-Dec-2014 08:18 424K
330-MulticollisionAttacksonGeneralizedHashFunct..> 22-Dec-2014 08:18 229K
330-MulticollisionAttacksonGeneralizedHashFunct..> 22-Dec-2014 08:18 830K
331-CodeBasedGamePlayingProofsandtheSecurityofT..> 22-Dec-2014 08:18 451K
332-Sequencesofgamesatoolfortamingcomplexityins..> 22-Dec-2014 08:18 296K
333-SecureMultipartyComputationforselectingasol..> 22-Dec-2014 08:18 154K
333-SecureMultipartyComputationforselectingasol..> 22-Dec-2014 08:18 174K
334-UniversallyComposableSymbolicAnalysisofCryp..> 22-Dec-2014 08:18 573K
335-StatisticalZeroKnowledgeArgumentsforNPUsing..> 22-Dec-2014 08:18 206K
335-StatisticalZeroKnowledgeArgumentsforNPUsing..> 22-Dec-2014 08:18 405K
336-ObliviousTransferIsSymmetric.pdf 22-Dec-2014 08:18 141K
336-ObliviousTransferIsSymmetric.ps 22-Dec-2014 08:18 341K
337-SecurityonGeneralizedFeistelSchemewithSPRou..> 22-Dec-2014 08:17 200K
338-IdentityBasedHierarchicalStronglyKeyInsulat..> 22-Dec-2014 08:17 143K
338-IdentityBasedHierarchicalStronglyKeyInsulat..> 22-Dec-2014 08:17 745K
339-DivisorsinResidueClassesConstructively.pdf 22-Dec-2014 08:17 163K
339-DivisorsinResidueClassesConstructively.ps 22-Dec-2014 08:17 340K
340-RequestforReviewofKeyWrapAlgorithms.pdf 22-Dec-2014 08:17 352K
341-ReducingComplexityAssumptionsforStatistical..> 22-Dec-2014 08:17 216K
341-ReducingComplexityAssumptionsforStatistical..> 22-Dec-2014 08:17 402K
342-AcombmethodtorenderECCresistantagainstSideC..> 22-Dec-2014 08:17 115K
342-AcombmethodtorenderECCresistantagainstSideC..> 22-Dec-2014 08:17 255K
343-RevisitOfMcCullaghBarretoTwoPartyIDBasedAut..> 22-Dec-2014 08:17 86K
344-ModifiedParameterAttacksPracticalAttacksaga..> 22-Dec-2014 08:17 152K
345-OnSessionIdentifiersinProvablySecureProtoco..> 22-Dec-2014 08:17 226K
345-OnSessionIdentifiersinProvablySecureProtoco..> 22-Dec-2014 08:17 602K
346-RandomSwitchingLogicACountermeasureagainstD..> 22-Dec-2014 08:17 244K
346-RandomSwitchingLogicACountermeasureagainstD..> 22-Dec-2014 08:17 1M
347-AddendumtoOntheGeneralizedLinearEquivalence..> 22-Dec-2014 08:17 54K
347-AddendumtoOntheGeneralizedLinearEquivalence..> 22-Dec-2014 08:17 144K
347-AddendumtoOntheGeneralizedLinearEquivalence..> 20-Jan-2023 08:40 53K
348-AweaknessinSunChenHwang39sthreepartykeyagre..> 20-Jan-2023 08:40 164K
348-AweaknessinSunChenHwangsthreepartykeyagreem..> 22-Dec-2014 08:17 115K
348-AweaknessinSunChenHwangsthreepartykeyagreem..> 22-Dec-2014 08:17 652K
349-ADPAAttackontheImprovedHaMoonAlgorithm.pdf 22-Dec-2014 08:17 146K
349-ADPAAttackontheImprovedHaMoonAlgorithm.ps 22-Dec-2014 08:17 110K
350-Multivariablepublickeycryptosystems.pdf 22-Dec-2014 08:17 176K
350-Multivariablepublickeycryptosystems.ps 22-Dec-2014 08:17 334K
351-EfficientandOptimisticFairExchangesBasedonS..> 20-Jan-2023 14:22 207
352-PracticalCryptographyinHighDimensionalTori.pdf 22-Dec-2014 08:17 208K
352-PracticalCryptographyinHighDimensionalTori.ps 22-Dec-2014 08:17 416K
353-DirectDivisioninFactorRings.pdf 22-Dec-2014 08:17 95K
353-DirectDivisioninFactorRings.ps 22-Dec-2014 08:17 252K
354-ClassesofPlateauedRotationSymmetricBooleanF..> 22-Dec-2014 08:17 254K
354-ClassesofPlateauedRotationSymmetricBooleanF..> 22-Dec-2014 08:17 592K
355-ASmallScaleVotingProtocolHidingVoteCountsof..> 22-Dec-2014 08:17 171K
356-PracticalAttacksonDigitalSignaturesUsingMD5..> 22-Dec-2014 08:17 53K
357-MD5ToBeConsideredHarmfulSomeday.pdf 22-Dec-2014 08:17 55K
358-ReusableCryptographicFuzzyExtractors.pdf 22-Dec-2014 08:16 307K
358-ReusableCryptographicFuzzyExtractors.ps 22-Dec-2014 08:16 519K
359-SecureComputationoftheMeanandRelatedStatist..> 22-Dec-2014 08:16 207K
359-SecureComputationoftheMeanandRelatedStatist..> 22-Dec-2014 08:16 421K
360-EquivalentKeysinHFECandvariations.pdf 22-Dec-2014 08:16 204K
360-EquivalentKeysinHFECandvariations.ps 22-Dec-2014 08:16 425K
361-SuperfluousKeysinMultivariateQuadraticAsymm..> 22-Dec-2014 08:16 169K
361-SuperfluousKeysinMultivariateQuadraticAsymm..> 22-Dec-2014 08:16 366K
362-AnewsecurityproofforDamgrd39sElGamal.pdf 20-Jan-2023 08:40 127K
362-AnewsecurityproofforDamgrdsElGamal.pdf 22-Dec-2014 08:16 127K
363-Rethinkingthesecurityofsomeauthenticatedgro..> 22-Dec-2014 08:16 136K
364-Findinggooddifferentialpatternsforattackson..> 22-Dec-2014 08:16 141K
364-Findinggooddifferentialpatternsforattackson..> 22-Dec-2014 08:16 350K
365-Ordinaryabelianvarietieshavingsmallembeddin..> 22-Dec-2014 08:16 230K
365-Ordinaryabelianvarietieshavingsmallembeddin..> 22-Dec-2014 08:16 210K
366-PieceInHandConceptforEnhancingtheSecurityof..> 22-Dec-2014 08:16 430K
367-OntheAffineTransformationsofHFECryptosystem..> 22-Dec-2014 08:16 200K
367-OntheAffineTransformationsofHFECryptosystem..> 22-Dec-2014 08:16 257K
368-CryptographicAsynchronousMultiPartyComputat..> 22-Dec-2014 08:16 272K
368-CryptographicAsynchronousMultiPartyComputat..> 22-Dec-2014 08:16 505K
369-SCA1ModelTowardsaconcretesecurityapproachto..> 22-Dec-2014 08:16 575K
370-TracingbyLinkingGroupSignautres.pdf 22-Dec-2014 08:16 267K
371-ConstructionandTraversalofHashChainwithPubl..> 22-Dec-2014 08:16 165K
372-OnTheSecurityofTwoKeyUpdatingSignatureSchem..> 20-Jan-2023 08:40 128K
373-DelegateableSignatureUsingWitnessIndistingu..> 22-Dec-2014 08:16 164K
373-DelegateableSignatureUsingWitnessIndistingu..> 22-Dec-2014 08:16 318K
374-Ageneralquantitativecryptanalysisofpermutat..> 22-Dec-2014 08:16 838K
375-EfficientPairingComputationonSupersingularA..> 22-Dec-2014 08:16 235K
375-EfficientPairingComputationonSupersingularA..> 22-Dec-2014 08:16 317K
376-CryptanalysisofRCESRSESImageEncryptionSchem..> 22-Dec-2014 08:16 1M
377-NewDistributedRingSignaturesforGeneralFamil..> 22-Dec-2014 08:16 273K
377-NewDistributedRingSignaturesforGeneralFamil..> 22-Dec-2014 08:16 288K