Index of /2004/


../
002-EfficientUniversalPaddingSchemesforMultipli..> 22-Dec-2014 08:35    380K
002-EfficientUniversalPaddingSchemesforMultipli..> 22-Dec-2014 08:35    512K
003-OntheRoleoftheInnerStateSizeinStreamCiphers..> 22-Dec-2014 08:35    242K
003-OntheRoleoftheInnerStateSizeinStreamCiphers.ps 22-Dec-2014 08:35    215K
004-None.pdf                                       20-Jan-2023 14:22     207
005-UniversalUndeniableSignatures.pdf              22-Dec-2014 08:35    151K
006-ProtocolInitializationfortheFrameworkofUniv..> 22-Dec-2014 08:35    213K
006-ProtocolInitializationfortheFrameworkofUniv..> 22-Dec-2014 08:35    172K
007-TraceableSignatures.pdf                        22-Dec-2014 08:35    343K
007-TraceableSignatures.ps                         22-Dec-2014 08:35    602K
008-TheKnowledgeofExponentAssumptionsand3RoundZ..> 22-Dec-2014 08:35    331K
008-TheKnowledgeofExponentAssumptionsand3RoundZ..> 22-Dec-2014 08:35    311K
009-EfficientandSecureMultiPartyComputationwith..> 22-Dec-2014 08:35    489K
009-EfficientandSecureMultiPartyComputationwith..> 22-Dec-2014 08:35    856K
010-FastPseudoHadamardTransforms.pdf               22-Dec-2014 08:35    149K
011-KnownPlaintextAttackAgainstaPermutationBase..> 22-Dec-2014 08:35    200K
012-Pitfallsinpublickeycryptosystemsbasedonfree..> 22-Dec-2014 08:35     84K
012-Pitfallsinpublickeycryptosystemsbasedonfree..> 22-Dec-2014 08:35    249K
013-CryptanalysisofaProvablySecureCryptographic..> 22-Dec-2014 08:35     62K
013-CryptanalysisofaProvablySecureCryptographic..> 22-Dec-2014 08:35    160K
014-CrosscorrelationSpectraofDillonandPatterson..> 22-Dec-2014 08:35    258K
014-CrosscorrelationSpectraofDillonandPatterson..> 22-Dec-2014 08:35    293K
015-AnAGMtypeellipticcurvepointcountingalgorith..> 22-Dec-2014 08:35    175K
016-ASynchronousModelforMultiPartyComputationan..> 22-Dec-2014 08:35    283K
016-ASynchronousModelforMultiPartyComputationan..> 22-Dec-2014 08:35    508K
017-CryptanalysisofanIDbasedPasswordAuthenticat..> 22-Dec-2014 08:35     51K
017-CryptanalysisofanIDbasedPasswordAuthenticat..> 22-Dec-2014 08:35    134K
018-CorrectionsoftheNISTStatisticalTestSuitefor..> 22-Dec-2014 08:35    295K
018-CorrectionsoftheNISTStatisticalTestSuitefor..> 22-Dec-2014 08:35    475K
019-NewSecurityProofsforthe3GPPConfidentialitya..> 22-Dec-2014 08:35    251K
019-NewSecurityProofsforthe3GPPConfidentialitya..> 22-Dec-2014 08:35    499K
020-OptimalSigncryptionfromAnyTrapdoorPermutati..> 22-Dec-2014 08:35    244K
020-OptimalSigncryptionfromAnyTrapdoorPermutati..> 22-Dec-2014 08:35    387K
021-ExternalizedFingerprintMatching.pdf            22-Dec-2014 08:34    560K
021-ExternalizedFingerprintMatching.ps             22-Dec-2014 08:34      8M
022-PrivacyEnhancedSearchesUsingEncryptedBloomF..> 22-Dec-2014 08:34    145K
022-PrivacyEnhancedSearchesUsingEncryptedBloomF..> 22-Dec-2014 08:34    196K
023-RDSRemoteDistributedSchemeforProtectingMobi..> 22-Dec-2014 08:34    101K
024-ExponentialSboxes.pdf                          22-Dec-2014 08:34    183K
024-ExponentialSboxes.ps                           22-Dec-2014 08:34    407K
025-ClarifyingObfuscationImprovingtheSecurityof..> 22-Dec-2014 08:34    448K
026-TheCSQUARETransform.pdf                        22-Dec-2014 08:34    110K
026-TheCSQUARETransform.ps                         22-Dec-2014 08:34    247K
027-LinkableSpontaneousAnonymousGroupSignaturef..> 22-Dec-2014 08:34    264K
028-CustodianHidingVerifiableEncryption.pdf        22-Dec-2014 08:34    304K
028-CustodianHidingVerifiableEncryption.ps         22-Dec-2014 08:34    519K
029-FindingOptimumParallelCoprocessorDesignforG..> 22-Dec-2014 08:34    102K
030-PointCompressiononJacobiansofHyperellipticC..> 22-Dec-2014 08:34    115K
031-Summationpolynomialsandthediscretelogarithm..> 22-Dec-2014 08:34     89K
031-Summationpolynomialsandthediscretelogarithm..> 22-Dec-2014 08:34    262K
032-CompressedPairings.pdf                         22-Dec-2014 08:34    192K
032-CompressedPairings.ps                          22-Dec-2014 08:34    393K
033-NewApproachestoPasswordAuthenticatedKeyExch..> 22-Dec-2014 08:34    330K
033-NewApproachestoPasswordAuthenticatedKeyExch..> 22-Dec-2014 08:34    342K
034-snAnArithmeticFunctionofSomeInterestandRela..> 22-Dec-2014 08:34    194K
035-CryptographicHashFunctionBasicsDefinitionsI..> 22-Dec-2014 08:34    250K
035-CryptographicHashFunctionBasicsDefinitionsI..> 22-Dec-2014 08:34    500K
036-SingleDatabasePrivateInformationRetrievalwi..> 22-Dec-2014 08:33    182K
036-SingleDatabasePrivateInformationRetrievalwi..> 22-Dec-2014 08:33    365K
037-AProvablySecureSchemeforRestrictivePartiall..> 22-Dec-2014 08:33     70K
037-AProvablySecureSchemeforRestrictivePartiall..> 22-Dec-2014 08:33    209K
038-ChameleonHashingwithoutKeyExposure.pdf         22-Dec-2014 08:33    151K
038-ChameleonHashingwithoutKeyExposure.ps          22-Dec-2014 08:33    336K
039-ABilinearSpontaneousAnonymousThresholdSigna..> 22-Dec-2014 08:33    174K
040-Cryptanalysisofatimestampbasedpasswordauthe..> 22-Dec-2014 08:33    129K
040-Cryptanalysisofatimestampbasedpasswordauthe..> 22-Dec-2014 08:33    109K
041-EfficientkoutofnObliviousTransferSchemeswit..> 22-Dec-2014 08:33    168K
041-EfficientkoutofnObliviousTransferSchemeswit..> 22-Dec-2014 08:33    362K
042-CryptanalyzingBressonetal39sSpontaneousAnon..> 20-Jan-2023 14:22     207
043-Multisequenceswithdperfectproperty.pdf         22-Dec-2014 08:33    114K
043-Multisequenceswithdperfectproperty.ps          22-Dec-2014 08:33    269K
044-TransitiveSignaturesBasedonNonadaptiveStand..> 22-Dec-2014 08:33    134K
044-TransitiveSignaturesBasedonNonadaptiveStand..> 22-Dec-2014 08:33    318K
045-LowerBoundsandImpossibilityResultsforConcur..> 22-Dec-2014 08:33    498K
045-LowerBoundsandImpossibilityResultsforConcur..> 22-Dec-2014 08:33    842K
046-RevisionofTractableRationalMapCryptosystem.pdf 22-Dec-2014 08:33    133K
046-RevisionofTractableRationalMapCryptosystem.ps  22-Dec-2014 08:33    321K
047-Onazeroknowledgepropertyofargumentsofknowle..> 22-Dec-2014 08:33    226K
047-Onazeroknowledgepropertyofargumentsofknowle..> 22-Dec-2014 08:33    171K
048-TailMACAMessageAuthenticationSchemeforStrea..> 22-Dec-2014 08:33    143K
048-TailMACAMessageAuthenticationSchemeforStrea..> 22-Dec-2014 08:33    270K
049-SideChannelAnalysisforReverseEngineeringSCA..> 22-Dec-2014 08:33    235K
049-SideChannelAnalysisforReverseEngineeringSCA..> 22-Dec-2014 08:33    227K
050-Yetanotherattackonapasswordauthenticationsc..> 22-Dec-2014 08:33     29K
050-Yetanotherattackonapasswordauthenticationsc..> 22-Dec-2014 08:33     92K
051-PrivacyPreservingKeywordSearchesonRemoteEnc..> 22-Dec-2014 08:33    169K
051-PrivacyPreservingKeywordSearchesonRemoteEnc..> 22-Dec-2014 08:33    341K
052-TheHierarchyofKeyEvolvingSignaturesandaChar..> 22-Dec-2014 08:33    274K
052-TheHierarchyofKeyEvolvingSignaturesandaChar..> 22-Dec-2014 08:33    533K
053-EfficientandUniversallyComposableCommittedO..> 22-Dec-2014 08:33    493K
053-EfficientandUniversallyComposableCommittedO..> 22-Dec-2014 08:33    531K
054-CommentsonaThresholdProxySignatureSchemeBas..> 22-Dec-2014 08:33    117K
054-CommentsonaThresholdProxySignatureSchemeBas..> 22-Dec-2014 08:33    282K
055-RedundantTrinomialsforFiniteFieldsofCharact..> 22-Dec-2014 08:33    342K
055-RedundantTrinomialsforFiniteFieldsofCharact..> 22-Dec-2014 08:33    430K
057-OnMultipleLinearApproximations.pdf             22-Dec-2014 08:33    258K
057-OnMultipleLinearApproximations.ps              22-Dec-2014 08:32    606K
058-GeneratingmoreMNTellipticcurves.pdf            22-Dec-2014 08:32    125K
058-GeneratingmoreMNTellipticcurves.ps             22-Dec-2014 08:32    274K
059-SymmetricEncryptioninaSimulatableDolevYaoSt..> 22-Dec-2014 08:32    437K
059-SymmetricEncryptioninaSimulatableDolevYaoSt..> 22-Dec-2014 08:32      1M
060-PositiveResultsandTechniquesforObfuscation.pdf 22-Dec-2014 08:32    192K
060-PositiveResultsandTechniquesforObfuscation.ps  22-Dec-2014 08:32    325K
061-TTSRankAttacksinTameLikeMultivariatePKCs.pdf   22-Dec-2014 08:32    226K
061-TTSRankAttacksinTameLikeMultivariatePKCs.ps    22-Dec-2014 08:32    358K
062-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 08:32    232K
062-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 08:32    527K
063-AnObliviousTransferProtocolwithLogSquaredCo..> 22-Dec-2014 08:32    199K
063-AnObliviousTransferProtocolwithLogSquaredCo..> 22-Dec-2014 08:32    363K
064-PairingBasedCryptographicProtocolsASurvey.pdf  22-Dec-2014 08:32    369K
064-PairingBasedCryptographicProtocolsASurvey.ps   22-Dec-2014 08:32    428K
065-RefinementsofMiller39sAlgorithmforComputing..> 20-Jan-2023 08:41    179K
065-RefinementsofMillersAlgorithmforComputingWe..> 22-Dec-2014 08:32    222K
065-RefinementsofMillersAlgorithmforComputingWe..> 22-Dec-2014 08:32    225K
066-ADynamicandDifferentialCMOSLogicStyletoResi..> 22-Dec-2014 08:32    314K
067-ChargeRecyclingSenseAmplifierBasedLogicSecu..> 22-Dec-2014 08:32    192K
068-SynthesisofSecureFPGAImplementations.pdf       22-Dec-2014 08:32    303K
069-AGeneralizationofPGVHashFunctionsandSecurit..> 22-Dec-2014 08:32    284K
069-AGeneralizationofPGVHashFunctionsandSecurit..> 22-Dec-2014 08:32    304K
070-EasydecisionDiffieHellmangroups.pdf            22-Dec-2014 08:32    266K
070-EasydecisionDiffieHellmangroups.ps             22-Dec-2014 08:32    246K
071-AnIBESchemetoExchangeAuthenticatedSecretKey..> 22-Dec-2014 08:32     70K
071-AnIBESchemetoExchangeAuthenticatedSecretKey..> 22-Dec-2014 08:32    125K
072-AsymmetricCryptographyHiddenFieldEquations.pdf 22-Dec-2014 08:32    213K
072-AsymmetricCryptographyHiddenFieldEquations.ps  22-Dec-2014 08:32    398K
073-Indexcalculusforabelianvarietiesandtheellip..> 22-Dec-2014 08:32    160K
073-Indexcalculusforabelianvarietiesandtheellip..> 22-Dec-2014 08:32    369K
074-CompletionofComputationofImprovedUpperBound..> 22-Dec-2014 08:32     86K
074-CompletionofComputationofImprovedUpperBound..> 22-Dec-2014 08:32    258K
075-AnHybridModeofOperation.pdf                    22-Dec-2014 08:32    127K
076-GroupSignaturesProvableSecurityEfficientCon..> 22-Dec-2014 08:32    327K
076-GroupSignaturesProvableSecurityEfficientCon..> 22-Dec-2014 08:31    541K
077-FoundationsofGroupSignaturesTheCaseofDynami..> 22-Dec-2014 08:31    321K
077-FoundationsofGroupSignaturesTheCaseofDynami..> 22-Dec-2014 08:31    548K
078-AnalysisoftheWinZipencryptionmethod.pdf        22-Dec-2014 08:31    349K
078-AnalysisoftheWinZipencryptionmethod.ps         22-Dec-2014 08:31      3M
079-PairingBasedOneRoundTripartiteKeyAgreementP..> 22-Dec-2014 08:31    204K
080-HENKOSStreamCipher.pdf                         22-Dec-2014 08:31    107K
081-RewritingVariablestheComplexityofFastAlgebr..> 22-Dec-2014 08:31    308K
082-TheReactiveSimulatabilityRSIMFrameworkforAs..> 22-Dec-2014 08:31    552K
083-ScanBasedSideChannelAttackonDataEncryptionS..> 22-Dec-2014 08:31    437K
084-EvaluatingellipticcurvebasedKEMsinthelighto..> 22-Dec-2014 08:31    225K
085-TheCS2BlockCipher.pdf                          22-Dec-2014 08:31    205K
086-FuzzyIdentityBasedEncryption.pdf               22-Dec-2014 08:31    196K
087-Usingprimitivesubgroupstodomorewithfewerbit..> 22-Dec-2014 08:31    299K
087-Usingprimitivesubgroupstodomorewithfewerbit..> 22-Dec-2014 08:31    490K
088-EfficientBatchVerificationofSignatureScheme..> 20-Jan-2023 14:22     207
089-SecurityofRandomKeyPredistributionSchemesWi..> 22-Dec-2014 08:31    155K
089-SecurityofRandomKeyPredistributionSchemesWi..> 22-Dec-2014 08:31    183K
090-ProvablySecureAuthenticatedTreeBasedGroupKe..> 22-Dec-2014 08:31    212K
091-SignatureBouquetsImmutabilityforAggregatedC..> 22-Dec-2014 08:31    158K
092-ANewStreamCipherHC256.pdf                      22-Dec-2014 08:31    196K
092-ANewStreamCipherHC256.ps                       22-Dec-2014 08:31    379K
093-AProvablySecureNybergRueppelSignatureVarian..> 22-Dec-2014 08:31    210K
093-AProvablySecureNybergRueppelSignatureVarian..> 22-Dec-2014 08:31    382K
094-BlockCiphersandStreamCiphersTheStateoftheAr..> 22-Dec-2014 08:31    206K
094-BlockCiphersandStreamCiphersTheStateoftheAr..> 22-Dec-2014 08:31    322K
095-GNFSFactoringStatisticsofRSA100110150.pdf      22-Dec-2014 08:31     71K
095-GNFSFactoringStatisticsofRSA100110150.ps       22-Dec-2014 08:31    219K
096-OntheAmbiguityofConcurrentSignatures.pdf       20-Jan-2023 14:22     207
097-HowToReinitializeaHashChain.pdf                22-Dec-2014 08:31    145K
098-AttackingaPublicKeyCryptosystemBasedonTreeR..> 22-Dec-2014 08:31    134K
098-AttackingaPublicKeyCryptosystemBasedonTreeR..> 22-Dec-2014 08:31    395K
099-SecureHashedDiffieHellmanoverNonDDHGroups.pdf  22-Dec-2014 08:30    354K
099-SecureHashedDiffieHellmanoverNonDDHGroups.ps   22-Dec-2014 08:30    346K
100-TheSorcerersApprenticeGuidetoFaultAttacks.pdf  22-Dec-2014 08:30      2M
101-ProvablySecureMaskingofAES.pdf                 22-Dec-2014 08:30    231K
101-ProvablySecureMaskingofAES.ps                  22-Dec-2014 08:30    576K
102-TheExactSecurityofanIdentityBasedSignaturea..> 22-Dec-2014 08:30    298K
102-TheExactSecurityofanIdentityBasedSignaturea..> 22-Dec-2014 08:30    567K
103-CryptanalysisofSFlashv3.pdf                    22-Dec-2014 08:30    145K
103-CryptanalysisofSFlashv3.ps                     22-Dec-2014 08:30    299K
104-EfficientandProvablySecureTrapdoorfreeGroup..> 22-Dec-2014 08:30    282K
104-EfficientandProvablySecureTrapdoorfreeGroup..> 22-Dec-2014 08:30    596K
105-ReceiptFreeHomomorphicElectionsandWriteinBa..> 22-Dec-2014 08:30    317K
105-ReceiptFreeHomomorphicElectionsandWriteinBa..> 22-Dec-2014 08:30    619K
106-CapacityandExamplesofTemplateProtectingBiom..> 22-Dec-2014 08:30    145K
107-Classificationofgenus2curvesovermathbbF_2na..> 22-Dec-2014 08:30    148K
107-Classificationofgenus2curvesovermathbbF_2na..> 22-Dec-2014 08:30    340K
108-TwoImprovedPartiallyBlindSignatureSchemesfr..> 22-Dec-2014 08:30    221K
108-TwoImprovedPartiallyBlindSignatureSchemesfr..> 22-Dec-2014 08:30    420K
109-ConcealingComplexPolicieswithHiddenCredenti..> 22-Dec-2014 08:30    178K
110-DesigningAgainsttheOverdefinedSystemofEquat..> 20-Jan-2023 08:41    164K
110-DesigningAgainsttheOverdefinedSystemofEquat..> 22-Dec-2014 08:30    164K
111-TheVulnerabilityofSSLtoChosenPlaintextAttac..> 22-Dec-2014 08:30    272K
111-TheVulnerabilityofSSLtoChosenPlaintextAttac..> 22-Dec-2014 08:30      2M
112-RelationbetweenXLalgorithmandGroebnerBasesA..> 22-Dec-2014 08:30    196K
113-OntheSecurityandComposabilityoftheOneTimePa..> 22-Dec-2014 08:30    243K
113-OntheSecurityandComposabilityoftheOneTimePa..> 22-Dec-2014 08:30    664K
114-ImprovedIdentityBasedSigncryption.pdf          22-Dec-2014 08:30    262K
114-ImprovedIdentityBasedSigncryption.ps           22-Dec-2014 08:30    276K
115-ProvablySecureandCommunicationEfficientSche..> 22-Dec-2014 08:30    200K
115-ProvablySecureandCommunicationEfficientSche..> 22-Dec-2014 08:30    393K
116-OntheLimitationsofUniversallyComposableTwoP..> 22-Dec-2014 08:29    359K
116-OntheLimitationsofUniversallyComposableTwoP..> 22-Dec-2014 08:29    695K
117-EfficientandForwardSecureIdentityBasedSignc..> 22-Dec-2014 08:29    153K
117-EfficientandForwardSecureIdentityBasedSignc..> 22-Dec-2014 08:29    315K
118-Fastadditiononnonhyperellipticgenus3curves.pdf 22-Dec-2014 08:29    188K
118-Fastadditiononnonhyperellipticgenus3curves.ps  22-Dec-2014 08:29    534K
119-AdaptivelySecureFeldmanVSSandApplicationsto..> 22-Dec-2014 08:29    454K
119-AdaptivelySecureFeldmanVSSandApplicationsto..> 22-Dec-2014 08:29    461K
120-SecurityofSymmetricEncryptionSchemeswithOne..> 22-Dec-2014 08:29    108K
120-SecurityofSymmetricEncryptionSchemeswithOne..> 22-Dec-2014 08:29    233K
121-FastandProvenSecureBlindIdentityBasedSigncr..> 22-Dec-2014 08:29    228K
121-FastandProvenSecureBlindIdentityBasedSigncr..> 22-Dec-2014 08:29    435K
122-ANewTwoPartyIdentityBasedAuthenticatedKeyAg..> 22-Dec-2014 08:29    260K
123-OnsecurityofXTRpublickeycryptosystemsagains..> 22-Dec-2014 08:29    183K
123-OnsecurityofXTRpublickeycryptosystemsagains..> 22-Dec-2014 08:29    472K
124-UniversallyComposableDKGwithLinearNumberofE..> 22-Dec-2014 08:29    225K
124-UniversallyComposableDKGwithLinearNumberofE..> 22-Dec-2014 08:29    724K
125-EMEextendingEMEtohandlearbitrarylengthmessa..> 22-Dec-2014 08:29    347K
125-EMEextendingEMEtohandlearbitrarylengthmessa..> 22-Dec-2014 08:29    694K
126-TwoSoftwareNormalBasisMultiplicationAlgorit..> 22-Dec-2014 08:29    133K
127-DDHbasedGroupKeyAgreementinaMobileEnvironme..> 22-Dec-2014 08:29    172K
127-DDHbasedGroupKeyAgreementinaMobileEnvironme..> 22-Dec-2014 08:29    355K
128-ElasticBlockCiphers.pdf                        22-Dec-2014 08:29    167K
128-ElasticBlockCiphers.ps                         22-Dec-2014 08:29    370K
129-GeneralizingKedlaya39sordercountingbasedonM..> 20-Jan-2023 08:41    312K
129-GeneralizingKedlayasordercountingbasedonMiu..> 22-Dec-2014 08:29    222K
129-GeneralizingKedlayasordercountingbasedonMiu..> 22-Dec-2014 08:29    696K
130-PrivateInferenceControl.pdf                    22-Dec-2014 08:29    315K
130-PrivateInferenceControl.ps                     22-Dec-2014 08:29    543K
131-ANewIDbasedSignaturewithBatchVerification.pdf  22-Dec-2014 08:28    236K
131-ANewIDbasedSignaturewithBatchVerification.ps   22-Dec-2014 08:28    219K
132-OnSmallCharacteristicAlgebraicToriinPairing..> 22-Dec-2014 08:28    294K
132-OnSmallCharacteristicAlgebraicToriinPairing..> 22-Dec-2014 08:28    287K
133-SecretHandshakesfromCAObliviousEncryption.pdf  22-Dec-2014 08:28    189K
133-SecretHandshakesfromCAObliviousEncryption.ps   22-Dec-2014 08:28    369K
134-SecureandEfficientMaskingofAESAMissionImpos..> 22-Dec-2014 08:28    304K
135-MoreEfficientServerAssistedOneTimeSignature..> 22-Dec-2014 08:28    138K
136-CompChallAddressingPasswordGuessingAttacks.pdf 22-Dec-2014 08:28    163K
137-NewGF2nParallelMultiplierUsingRedundantRepr..> 22-Dec-2014 08:28    131K
138-HowtoDisembedaProgram.pdf                      22-Dec-2014 08:28    542K
138-HowtoDisembedaProgram.ps                       22-Dec-2014 08:28    992K
139-NewNotionsofSecurityAchievingUniversalCompo..> 22-Dec-2014 08:28    308K
139-NewNotionsofSecurityAchievingUniversalCompo..> 22-Dec-2014 08:28    464K
140-ArchitecturesandHardwareImplementationsofth..> 20-Jan-2023 14:22     207
141-ElasticAES.pdf                                 22-Dec-2014 08:28     99K
141-ElasticAES.ps                                  22-Dec-2014 08:28    185K
142-EllipticCurvebasedSigncryptionanditsMultipa..> 20-Jan-2023 08:41     43K
143-ShortSignaturesProvableSecurityGenericAttac..> 22-Dec-2014 08:28    284K
143-ShortSignaturesProvableSecurityGenericAttac..> 22-Dec-2014 08:28    513K
144-PlateauedRotationSymmetricBooleanFunctionso..> 22-Dec-2014 08:28    270K
144-PlateauedRotationSymmetricBooleanFunctionso..> 22-Dec-2014 08:28    361K
145-ElectromagneticSideChannelsofanFPGAImplemen..> 22-Dec-2014 08:28    217K
145-ElectromagneticSideChannelsofanFPGAImplemen..> 22-Dec-2014 08:28    724K
146-NearCollisionsofSHA0.pdf                       22-Dec-2014 08:28    228K
146-NearCollisionsofSHA0.ps                        22-Dec-2014 08:28    224K
147-KeyRecoveryMethodforCRTImplementationofRSA.pdf 22-Dec-2014 08:28    111K
147-KeyRecoveryMethodforCRTImplementationofRSA.ps  22-Dec-2014 08:28    270K
148-ProvablySecureDelegationbyCertificationProx..> 22-Dec-2014 08:28    201K
149-SecureandEfficientAESSoftwareImplementation..> 22-Dec-2014 08:27    236K
150-AnAuthenticatedCertificatelessPublicKeyEncr..> 22-Dec-2014 08:27    215K
150-AnAuthenticatedCertificatelessPublicKeyEncr..> 22-Dec-2014 08:27    207K
151-SuitableCurvesforGenus4HCCoverPrimeFieldsPo..> 22-Dec-2014 08:27    219K
152-AnotherLookatProvableSecurity.pdf              22-Dec-2014 08:27    439K
152-AnotherLookatProvableSecurity3939.pdf          20-Jan-2023 08:41    439K
153-Adoublelargeprimevariationforsmallgenushype..> 22-Dec-2014 08:27    207K
153-Adoublelargeprimevariationforsmallgenushype..> 22-Dec-2014 08:27    421K
154-ControllingSpambySecureInternetContentSelec..> 22-Dec-2014 08:27    254K
155-SecurityandIdentificationIndicatorsforBrows..> 22-Dec-2014 08:27    700K
156-Quantumcryptographyapracticalinformationsec..> 22-Dec-2014 08:27    103K
157-HardwareandSoftwareNormalBasisArithmeticfor..> 22-Dec-2014 08:27    281K
157-HardwareandSoftwareNormalBasisArithmeticfor..> 22-Dec-2014 08:27    295K
158-MobileTerminalSecurity.pdf                     22-Dec-2014 08:27    699K
159-ProvablySecureOndemandSourceRoutinginMobile..> 22-Dec-2014 08:27    216K
159-ProvablySecureOndemandSourceRoutinginMobile..> 22-Dec-2014 08:27      1M
160-ScalablePublicKeyTracingandRevoking.pdf        22-Dec-2014 08:27    432K
160-ScalablePublicKeyTracingandRevoking.ps         22-Dec-2014 08:27    803K
161-ImprovementofThLeriaultAlgorithmofIndexCalc..> 22-Dec-2014 08:27    220K
161-ImprovementofThLeriaultAlgorithmofIndexCalc..> 22-Dec-2014 08:27    205K
161-ImprovementofThriaultAlgorithmofIndexCalcul..> 20-Jan-2023 08:41    226K
162-OntheKeyUncertaintyofQuantumCiphersandtheCo..> 22-Dec-2014 08:27    213K
162-OntheKeyUncertaintyofQuantumCiphersandtheCo..> 22-Dec-2014 08:27    430K
163-OntheWeaknessesandImprovementsofanEfficient..> 20-Jan-2023 14:22     207
164-IDbasedCryptographyfromCompositeDegreeResid..> 22-Dec-2014 08:27    297K
165-AcomparisonofMNTcurvesandsupersingularcurve..> 22-Dec-2014 08:27    189K
166-FRMACaFastRandomizedMessageAuthenticationCo..> 22-Dec-2014 08:27    176K
167-ASecureandEfficientKeyExchangeProtocolforMo..> 22-Dec-2014 08:27     63K
167-ASecureandEfficientKeyExchangeProtocolforMo..> 22-Dec-2014 08:27    201K
168-BuildingInstancesofTTMImmunetotheGoubinCour..> 22-Dec-2014 08:27    111K
168-BuildingInstancesofTTMImmunetotheGoubinCour..> 22-Dec-2014 08:27    147K
169-RegionalBlackoutsProtectionofBroadcastConte..> 22-Dec-2014 08:27    167K
170-EfficientConsistencyProofsforGeneralizedQue..> 22-Dec-2014 08:27    237K
170-EfficientConsistencyProofsforGeneralizedQue..> 22-Dec-2014 08:27    234K
171-ShortSignaturesWithoutRandomOracles.pdf        22-Dec-2014 08:26    228K
171-ShortSignaturesWithoutRandomOracles.ps         22-Dec-2014 08:26    433K
172-EfficientSelectiveIDSecureIdentityBasedEncr..> 22-Dec-2014 08:26    247K
172-EfficientSelectiveIDSecureIdentityBasedEncr..> 22-Dec-2014 08:26    471K
173-SecureIdentityBasedEncryptionWithoutRandomO..> 22-Dec-2014 08:26    278K
173-SecureIdentityBasedEncryptionWithoutRandomO..> 22-Dec-2014 08:26    541K
174-ShortGroupSignatures.pdf                       22-Dec-2014 08:26    240K
174-ShortGroupSignatures.ps                        22-Dec-2014 08:26    463K
175-AProofofYao39sProtocolforSecureTwoPartyComp..> 20-Jan-2023 08:40    303K
175-AProofofYaosProtocolforSecureTwoPartyComput..> 22-Dec-2014 08:26    303K
176-ABiometricIdentityBasedSignatureScheme.pdf     22-Dec-2014 08:26    334K
177-UpdatingtheParametersofaThresholdSchemebyMi..> 22-Dec-2014 08:26    221K
178-OptimalUpdatingofIdealThresholdSchemes.pdf     22-Dec-2014 08:26    143K
179-IdentityBasedThresholdRingSignature.pdf        22-Dec-2014 08:26    225K
179-IdentityBasedThresholdRingSignature.ps         22-Dec-2014 08:26    202K
180-EfficientIdentityBasedEncryptionWithoutRand..> 22-Dec-2014 08:26    172K
181-OntheCompositionofAuthenticatedByzantineAgr..> 22-Dec-2014 08:26    333K
181-OntheCompositionofAuthenticatedByzantineAgr..> 22-Dec-2014 08:26    535K
182-SimplerSessionKeyGenerationfromShortRandomP..> 22-Dec-2014 08:26    427K
182-SimplerSessionKeyGenerationfromShortRandomP..> 22-Dec-2014 08:26    484K
183-ANewForwardSecureSignatureScheme.pdf           22-Dec-2014 08:26    194K
183-ANewForwardSecureSignatureScheme.ps            22-Dec-2014 08:26    420K
184-IDbasedRingSignatureandProxyRingSignatureSc..> 22-Dec-2014 08:26    128K
184-IDbasedRingSignatureandProxyRingSignatureSc..> 22-Dec-2014 08:26    318K
185-OntheExistenceoflowdegreeEquationsforAlgebr..> 22-Dec-2014 08:26    217K
185-OntheExistenceoflowdegreeEquationsforAlgebr..> 22-Dec-2014 08:26    461K
186-ANewRemoteUserAuthenticationSchemeUsingSmar..> 20-Jan-2023 14:22     207
187-ParallelFPGAImplementationofRSAwithResidueN..> 22-Dec-2014 08:26    219K
187-ParallelFPGAImplementationofRSAwithResidueN..> 22-Dec-2014 08:26    796K
188-GreyBoxImplementationofBlockCiphersPreservi..> 22-Dec-2014 08:26    219K
188-GreyBoxImplementationofBlockCiphersPreservi..> 22-Dec-2014 08:26    211K
189-ComputingModularPolynomials.pdf                22-Dec-2014 08:26    184K
190-DistributedRingSignaturesforIdentityBasedSc..> 22-Dec-2014 08:26    289K
190-DistributedRingSignaturesforIdentityBasedSc..> 22-Dec-2014 08:25    308K
191-ScalarMultiplicationinEllipticCurveCryptosy..> 22-Dec-2014 08:25    214K
191-ScalarMultiplicationinEllipticCurveCryptosy..> 22-Dec-2014 08:25    196K
192-SecurityPitfallsofanefficientremoteuserauth..> 20-Jan-2023 14:22     207
193-TheSecurityandPerformanceoftheGaloisCounter..> 22-Dec-2014 08:25    286K
194-ANoteonAnEncryptionSchemeofKurosawaandDesme..> 22-Dec-2014 08:25    195K
195-SignedBinaryRepresentationsRevisited.pdf       22-Dec-2014 08:25    287K
195-SignedBinaryRepresentationsRevisited.ps        22-Dec-2014 08:25      1M
196-PasswordBasedKeyExchangewithMutualAuthentic..> 22-Dec-2014 08:25    206K
196-PasswordBasedKeyExchangewithMutualAuthentic..> 22-Dec-2014 08:25    383K
197-SPAbasedattackagainstthemodularreductionwit..> 22-Dec-2014 08:25     22K
197-SPAbasedattackagainstthemodularreductionwit..> 22-Dec-2014 08:25    127K
198-LongModularMultiplicationforCryptographicAp..> 22-Dec-2014 08:25    556K
199-CollisionsforHashFunctionsMD4MD5HAVAL128and..> 22-Dec-2014 08:25     56K
200-OnCheatingImmuneSecretSharing.pdf              22-Dec-2014 08:25    101K
200-OnCheatingImmuneSecretSharing.ps               22-Dec-2014 08:25    233K
201-NonInteractiveandInformationTheoreticSecure..> 22-Dec-2014 08:25    121K
201-NonInteractiveandInformationTheoreticSecure..> 22-Dec-2014 08:25    264K
202-CoveringRadiusofthen3rdOrderReedMullerCodei..> 22-Dec-2014 08:25     94K
202-CoveringRadiusofthen3rdOrderReedMullerCodei..> 22-Dec-2014 08:25    220K
203-HowtoCheatatChessASecurityAnalysisoftheInte..> 22-Dec-2014 08:25    352K
203-HowtoCheatatChessASecurityAnalysisoftheInte..> 22-Dec-2014 08:25    661K
204-Authenticatedtreeparitymachinekeyexchange.pdf  22-Dec-2014 08:25    213K
204-Authenticatedtreeparitymachinekeyexchange.ps   22-Dec-2014 08:25    236K
205-DirectAnonymousAttestation.pdf                 22-Dec-2014 08:25    286K
206-IDBasedProxySignatureUsingBilinearPairings.pdf 22-Dec-2014 08:25    191K
207-OnCorrectivePatternsfortheSHA2Family.pdf       22-Dec-2014 08:25    300K
208-DeterministicPolynomialTimeEquivalenceofCom..> 22-Dec-2014 08:25    132K
208-DeterministicPolynomialTimeEquivalenceofCom..> 22-Dec-2014 08:25    314K
209-TheSecurityandEfficiencyofMicciancio39sCryp..> 20-Jan-2023 08:40    180K
209-TheSecurityandEfficiencyofMiccianciosCrypto..> 22-Dec-2014 08:25    148K
209-TheSecurityandEfficiencyofMiccianciosCrypto..> 22-Dec-2014 08:25    329K
210-HybridCryptography.pdf                         22-Dec-2014 08:25    439K
210-HybridCryptography.ps                          22-Dec-2014 08:25    605K
211-ScalableServerPassiveUserAnonymousTimedRele..> 22-Dec-2014 08:24    173K
211-ScalableServerPassiveUserAnonymousTimedRele..> 22-Dec-2014 08:24    349K
212-IDBasedEncryptionforComplexHierarchieswithA..> 22-Dec-2014 08:24    343K
212-IDBasedEncryptionforComplexHierarchieswithA..> 22-Dec-2014 08:24    608K
213-CryptanalysisofChangetal39sSignatureSchemew..> 20-Jan-2023 08:40     69K
213-CryptanalysisofChangetalsSignatureSchemewit..> 22-Dec-2014 08:24     71K
213-CryptanalysisofChangetalsSignatureSchemewit..> 22-Dec-2014 08:24    185K
214-ClassificationofHighlyNonlinearBooleanPower..> 22-Dec-2014 08:24    208K
214-ClassificationofHighlyNonlinearBooleanPower..> 22-Dec-2014 08:24    427K
215-TransitiveSignaturesNewSchemesandProofs.pdf    22-Dec-2014 08:24    417K
215-TransitiveSignaturesNewSchemesandProofs.ps     22-Dec-2014 08:24    672K
216-TreeParityMachineRekeyingArchitectures.pdf     22-Dec-2014 08:24    165K
216-TreeParityMachineRekeyingArchitectures.ps      22-Dec-2014 08:24    364K
217-CryptanalyzingthePolynomialReconstructionba..> 22-Dec-2014 08:24    247K
217-CryptanalyzingthePolynomialReconstructionba..> 22-Dec-2014 08:24    944K
218-PlaintextSimulatability.pdf                    22-Dec-2014 08:24    232K
219-EntropicSecurityandtheEncryptionofHighEntro..> 22-Dec-2014 08:24    322K
219-EntropicSecurityandtheEncryptionofHighEntro..> 22-Dec-2014 08:24    579K
220-OnOleshchuk39sPublicKeyCryptosystem.pdf        20-Jan-2023 08:40    225K
220-OnOleshchuksPublicKeyCryptosystem.pdf          22-Dec-2014 08:24    168K
220-OnOleshchuksPublicKeyCryptosystem.ps           22-Dec-2014 08:24    391K
221-TowardsPlaintextAwarePublicKeyEncryptionwit..> 22-Dec-2014 08:24    311K
221-TowardsPlaintextAwarePublicKeyEncryptionwit..> 22-Dec-2014 08:24    577K
222-AStudyoftheSecurityofUnbalancedOilandVinega..> 22-Dec-2014 08:24    202K
222-AStudyoftheSecurityofUnbalancedOilandVinega..> 22-Dec-2014 08:24    413K
223-InversionFreeArithmeticonGenus3Hyperellipti..> 22-Dec-2014 08:24    150K
224-ThePolynomialCompositionProbleminZnZX.pdf      22-Dec-2014 08:24    117K
224-ThePolynomialCompositionProbleminZnZX.ps       22-Dec-2014 08:24    163K
225-VectorialBooleanfunctionsandinducedalgebrai..> 22-Dec-2014 08:24    201K
225-VectorialBooleanfunctionsandinducedalgebrai..> 22-Dec-2014 08:24    217K
226-LowerBoundsforNonBlackBoxZeroKnowledge.pdf     22-Dec-2014 08:24    670K
226-LowerBoundsforNonBlackBoxZeroKnowledge.ps      22-Dec-2014 08:24    912K
227-SignChangeFaultAttacksOnEllipticCurveCrypto..> 22-Dec-2014 08:24    253K
227-SignChangeFaultAttacksOnEllipticCurveCrypto..> 22-Dec-2014 08:23    477K
228-DISTRIBUTIONOFRPATTERNSINTHEKERDOCKCODEBINA..> 22-Dec-2014 08:23    110K
228-DISTRIBUTIONOFRPATTERNSINTHEKERDOCKCODEBINA..> 22-Dec-2014 08:23    265K
229-SecureDirectCommunicationUsingQuantumCalder..> 22-Dec-2014 08:23     88K
229-SecureDirectCommunicationUsingQuantumCalder..> 22-Dec-2014 08:23    174K
230-AProvableSecureSchemeforPartiallyBlindSigna..> 22-Dec-2014 08:23    115K
230-AProvableSecureSchemeforPartiallyBlindSigna..> 22-Dec-2014 08:23    293K
231-TimedReleaseandKeyInsulatedPublicKeyEncrypt..> 22-Dec-2014 08:23    276K
231-TimedReleaseandKeyInsulatedPublicKeyEncrypt..> 22-Dec-2014 08:23    569K
232-ExtendingtheResynchronizationAttack.pdf        22-Dec-2014 08:23    320K
232-ExtendingtheResynchronizationAttack.ps         22-Dec-2014 08:23    580K
233-PasswordBasedAuthenticatedKeyExchangeintheT..> 22-Dec-2014 08:23    218K
233-PasswordBasedAuthenticatedKeyExchangeintheT..> 22-Dec-2014 08:23    401K
234-Onthesecurityofsomenonrepudiablethresholdpr..> 22-Dec-2014 08:23    159K
235-CryptographicImplicationsofHess39Generalize..> 20-Jan-2023 08:40    356K
235-CryptographicImplicationsofHessGeneralizedG..> 22-Dec-2014 08:23    356K
236-ForgeryAttacksonChangetal39ssignaturescheme..> 20-Jan-2023 08:40    105K
236-ForgeryAttacksonChangetalssignatureschemewi..> 22-Dec-2014 08:23    105K
237-EfficientCryptanalysisofRSE2PKCandRSSE2PKC.pdf 22-Dec-2014 08:23    214K
237-EfficientCryptanalysisofRSE2PKCandRSSE2PKC.ps  22-Dec-2014 08:23    453K
238-SecurityAnalysisofADynamicIDbasedRemoteUser..> 22-Dec-2014 08:23    103K
239-GeometricKeyEstablishment.pdf                  22-Dec-2014 08:23    659K
240-AWeilDescentAttackagainstEllipticCurveCrypt..> 22-Dec-2014 08:23    239K
240-AWeilDescentAttackagainstEllipticCurveCrypt..> 22-Dec-2014 08:23    497K
241-AComparisonofPointCountingmethodsforHyperel..> 22-Dec-2014 08:23    122K
242-Combinatorialgrouptheoryandpublickeycryptog..> 22-Dec-2014 08:23    167K
242-Combinatorialgrouptheoryandpublickeycryptog..> 22-Dec-2014 08:23    374K
243-OntheKeyExposureProbleminChameleonHashes.pdf   22-Dec-2014 08:23    171K
244-SigncryptioninHierarchicalIdentityBasedCryp..> 22-Dec-2014 08:23    278K
244-SigncryptioninHierarchicalIdentityBasedCryp..> 22-Dec-2014 08:23    293K
245-Oncodesmatroidsandsecuremultipartycomputati..> 22-Dec-2014 08:23    248K
246-UpperandLowerBoundsonBlackBoxSteganography.pdf 22-Dec-2014 08:23    342K
246-UpperandLowerBoundsonBlackBoxSteganography.ps  22-Dec-2014 08:23    588K
247-Vectorialfastcorrelationattacks.pdf            22-Dec-2014 08:23    272K
247-Vectorialfastcorrelationattacks.ps             22-Dec-2014 08:23    786K
248-ClassificationofBooleanFunctionsof6Variable..> 22-Dec-2014 08:22    262K
248-ClassificationofBooleanFunctionsof6Variable..> 22-Dec-2014 08:22    517K
249-AttacksOnAnISOIEC117702KeyEstablishmentProt..> 22-Dec-2014 08:22    121K
249-AttacksOnAnISOIEC117702KeyEstablishmentProt..> 22-Dec-2014 08:22    297K
250-IdentityBasedThresholdProxySignature.pdf       22-Dec-2014 08:22    149K
251-AttacksonBressonChevassutEssiariPointcheval..> 20-Jan-2023 08:40    136K
251-AttacksonBressonChevassutEssiariPointcheval..> 22-Dec-2014 08:22     97K
251-AttacksonBressonChevassutEssiariPointcheval..> 22-Dec-2014 08:22    231K
252-SecurityProofsforIdentityBasedIdentificatio..> 22-Dec-2014 08:22    692K
252-SecurityProofsforIdentityBasedIdentificatio..> 22-Dec-2014 08:22   1017K
253-DesignPrinciplesforIteratedHashFunctions.pdf   22-Dec-2014 08:22    175K
254-Newparadigmsfordigitalgenerationandpostproc..> 22-Dec-2014 08:22    246K
254-Newparadigmsfordigitalgenerationandpostproc..> 22-Dec-2014 08:22    421K
255-ACompleteDivisorClassHalvingAlgorithmforHyp..> 22-Dec-2014 08:22    229K
255-ACompleteDivisorClassHalvingAlgorithmforHyp..> 22-Dec-2014 08:22    518K
256-OnthesupportsoftheWalshtransformsofBooleanf..> 22-Dec-2014 08:22    183K
257-AWeaknessinJungPaengKim39sIDbasedConference..> 20-Jan-2023 08:40    115K
257-AWeaknessinJungPaengKimsIDbasedConferenceKe..> 22-Dec-2014 08:22     85K
257-AWeaknessinJungPaengKimsIDbasedConferenceKe..> 22-Dec-2014 08:22    206K
258-EscrowFreeEncryptionSupportingCryptographic..> 22-Dec-2014 08:22    258K
258-EscrowFreeEncryptionSupportingCryptographic..> 22-Dec-2014 08:22    469K
259-OnBooleanFunctionswithGeneralizedCryptograp..> 22-Dec-2014 08:22    249K
259-OnBooleanFunctionswithGeneralizedCryptograp..> 22-Dec-2014 08:22    488K
260-SecureGroupCommunicationsoverCombinedWiredW..> 22-Dec-2014 08:22    162K
260-SecureGroupCommunicationsoverCombinedWiredW..> 22-Dec-2014 08:22    624K
261-ImprovedEfficiencyforCCASecureCryptosystems..> 22-Dec-2014 08:22    194K
261-ImprovedEfficiencyforCCASecureCryptosystems..> 22-Dec-2014 08:22    362K
262-UniversalForgeabilityofaForwardSecureBlindS..> 22-Dec-2014 08:22     75K
262-UniversalForgeabilityofaForwardSecureBlindS..> 22-Dec-2014 08:22    198K
263-ApplicationsofmathcalMultivariatemathcalQua..> 22-Dec-2014 08:22    147K
263-ApplicationsofmathcalMultivariatemathcalQua..> 22-Dec-2014 08:22    228K
264-MusingsontheWangetalMD5Collision.pdf           22-Dec-2014 08:22    471K
265-sSCADASecuringSCADAInfrastructureCommunicat..> 22-Dec-2014 08:22    145K
266-ANewMinimalAverageWeightRepresentationforLe..> 22-Dec-2014 08:21    172K
266-ANewMinimalAverageWeightRepresentationforLe..> 22-Dec-2014 08:21    157K
267-SeparableLinkableThresholdRingSignatures.pdf   22-Dec-2014 08:21    196K
267-SeparableLinkableThresholdRingSignatures.ps    22-Dec-2014 08:21    401K
268-UntraceabilityofWangFuGroupSignatureScheme.pdf 22-Dec-2014 08:21     75K
268-UntraceabilityofWangFuGroupSignatureScheme.ps  22-Dec-2014 08:21    188K
269-CryptanalysisofThresholdMultisignatureSchem..> 22-Dec-2014 08:21    118K
270-AnEnhancedandSecureProtocolforAuthenticated..> 22-Dec-2014 08:21     69K
270-AnEnhancedandSecureProtocolforAuthenticated..> 22-Dec-2014 08:21    223K
271-TheMundjaStreamingMAC.pdf                      22-Dec-2014 08:21    276K
272-ACharacterizationofAuthenticatedEncryptiona..> 22-Dec-2014 08:21    103K
273-CryptanalysisofThresholdMultisignatureschem..> 22-Dec-2014 08:21    118K
274-ANOVELALGORITHMENUMERATINGBENTFUNCTIONS.pdf    22-Dec-2014 08:21    162K
275-AneVotingSchemewithImprovedResistancetoBrib..> 22-Dec-2014 08:21    382K
276-Improvingthealgebraicimmunityofresilientand..> 22-Dec-2014 08:21    228K
277-ExperimentingwithFaultsLatticesandtheDSA.pdf   22-Dec-2014 08:21    950K
278-TheExtendedCodebookXCBModeofOperation.pdf      22-Dec-2014 08:21    193K
279-ParallelMontgomeryMultiplicationinGF2kusing..> 22-Dec-2014 08:21    189K
279-ParallelMontgomeryMultiplicationinGF2kusing..> 22-Dec-2014 08:21    419K
280-CryptanalysisofParkLeeNominativeProxySignat..> 22-Dec-2014 08:21     62K
280-CryptanalysisofParkLeeNominativeProxySignat..> 22-Dec-2014 08:21    167K
281-ShortLinkableRingSignaturesforEVotingECasha..> 22-Dec-2014 08:21    184K
281-ShortLinkableRingSignaturesforEVotingECasha..> 22-Dec-2014 08:21    387K
282-NewMonotoneSpanProgramsfromOld.pdf             22-Dec-2014 08:21    194K
282-NewMonotoneSpanProgramsfromOld.ps              22-Dec-2014 08:21    416K
283-FaultandSideChannelAttacksonPairingBasedCry..> 22-Dec-2014 08:21    269K
283-FaultandSideChannelAttacksonPairingBasedCry..> 22-Dec-2014 08:21    241K
284-ONTHEDEGREEOFHOMOGENEOUSBENTFUNCTIONS.pdf      22-Dec-2014 08:21     91K
284-ONTHEDEGREEOFHOMOGENEOUSBENTFUNCTIONS.ps       22-Dec-2014 08:21    209K
285-GenerationofrandomPicardcurvesforcryptograp..> 22-Dec-2014 08:21    106K
285-GenerationofrandomPicardcurvesforcryptograp..> 22-Dec-2014 08:21    262K
286-Generalizedcompactknapsackscycliclatticesan..> 22-Dec-2014 08:21    385K
286-Generalizedcompactknapsackscycliclatticesan..> 22-Dec-2014 08:21    395K
287-AlmostIdealContrastVisualCryptographywithRe..> 22-Dec-2014 08:20    282K
287-AlmostIdealContrastVisualCryptographywithRe..> 22-Dec-2014 08:20      1M
288-ANewDesignatedConfirmerSignatureVariantwith..> 20-Jan-2023 14:22     207
289-FaultattackontheDVBCommonScramblingAlgorith..> 22-Dec-2014 08:20    175K
290-TheSecurityoftheFDHVariantofChaum39sUndenia..> 20-Jan-2023 08:40    255K
290-TheSecurityoftheFDHVariantofChaumsUndeniabl..> 22-Dec-2014 08:20    236K
290-TheSecurityoftheFDHVariantofChaumsUndeniabl..> 22-Dec-2014 08:20    457K
291-TheRabbitStreamCipherDesignandSecurityAnaly..> 22-Dec-2014 08:20    207K
291-TheRabbitStreamCipherDesignandSecurityAnaly..> 22-Dec-2014 08:20    406K
292-AsynchronousProactiveRSA.pdf                   22-Dec-2014 08:20      2M
292-AsynchronousProactiveRSA.ps                    22-Dec-2014 08:20      2M
293-ProvablySecureAuthenticationofDigitalMediaT..> 22-Dec-2014 08:20    156K
293-ProvablySecureAuthenticationofDigitalMediaT..> 22-Dec-2014 08:20    334K
294-SolvingSystemsofDifferentialEquationsofAddi..> 22-Dec-2014 08:20    254K
294-SolvingSystemsofDifferentialEquationsofAddi..> 22-Dec-2014 08:20      3M
295-AnAccessControlSchemeforPartiallyOrderedSet..> 22-Dec-2014 08:20    139K
295-AnAccessControlSchemeforPartiallyOrderedSet..> 22-Dec-2014 08:20    327K
296-DesignsofEfficientSecureLargeHashValues.pdf    22-Dec-2014 08:20    181K
296-DesignsofEfficientSecureLargeHashValues.ps     22-Dec-2014 08:20    380K
297-PostQuantumSignatures.pdf                      22-Dec-2014 08:20    218K
297-PostQuantumSignatures.ps                       22-Dec-2014 08:20    393K
298-NominativeProxySignatureSchemes.pdf            22-Dec-2014 08:20    115K
299-SecurityFlawsinaPairingbasedGroupSignatureS..> 22-Dec-2014 08:20    154K
299-SecurityFlawsinaPairingbasedGroupSignatureS..> 22-Dec-2014 08:20    128K
300-RelatingSymbolicandCryptographicSecrecy.pdf    22-Dec-2014 08:20    408K
300-RelatingSymbolicandCryptographicSecrecy.ps     22-Dec-2014 08:20      2M
301-VMPCMACAStreamCipherBasedAuthenticatedEncry..> 22-Dec-2014 08:19    121K
301-VMPCMACAStreamCipherBasedAuthenticatedEncry..> 22-Dec-2014 08:19    247K
302-SecurityofWangLiThresholdSignatureScheme.pdf   22-Dec-2014 08:19    100K
303-EfficientTatePairingComputationforSupersing..> 22-Dec-2014 08:19    186K
303-EfficientTatePairingComputationforSupersing..> 22-Dec-2014 08:19    355K
304-SecondPreimagesonnbitHashFunctionsforMuchLe..> 22-Dec-2014 08:19    165K
305-Anoteonefficientcomputationofcuberootsincha..> 22-Dec-2014 08:19     77K
305-Anoteonefficientcomputationofcuberootsincha..> 22-Dec-2014 08:19    213K
306-TheStaticDiffieHellmanProblem.pdf              22-Dec-2014 08:19    161K
306-TheStaticDiffieHellmanProblem.ps               22-Dec-2014 08:19    317K
307-UniversalForgeabilityofWangWuWangKeyInsulat..> 22-Dec-2014 08:19     62K
307-UniversalForgeabilityofWangWuWangKeyInsulat..> 22-Dec-2014 08:19    162K
308-CryptanalysisofNoelMcCullaghandPauloSLMBarr..> 22-Dec-2014 08:19    181K
309-ThePowerofVerificationQueriesinMessageAuthe..> 22-Dec-2014 08:19    232K
309-ThePowerofVerificationQueriesinMessageAuthe..> 22-Dec-2014 08:19    435K
310-AVerifiableRandomFunctionWithShortProofsand..> 22-Dec-2014 08:19    294K
310-AVerifiableRandomFunctionWithShortProofsand..> 22-Dec-2014 08:19    264K
311-HierarchicalGroupSignatures.pdf                22-Dec-2014 08:19    623K
311-HierarchicalGroupSignatures.ps                 22-Dec-2014 08:19      2M
312-RamanujanGraphsandtheRandomReducibilityofDi..> 22-Dec-2014 08:19    277K
312-RamanujanGraphsandtheRandomReducibilityofDi..> 22-Dec-2014 08:19    844K
313-Cryptanalysisofathresholdproxysignaturewith..> 22-Dec-2014 08:19     53K
313-Cryptanalysisofathresholdproxysignaturewith..> 22-Dec-2014 08:19    138K
314-ATechnicalComparisonofIPSecandSSL.pdf          22-Dec-2014 08:19    273K
315-SecurityArgumentsforPartialDelegationwithWa..> 22-Dec-2014 08:19    170K
316-OnaThresholdGroupSignatureSchemeandaFairBli..> 22-Dec-2014 08:19     89K
316-OnaThresholdGroupSignatureSchemeandaFairBli..> 22-Dec-2014 08:19    214K
317-AdaptivelySecureNonInteractivePublicKeyEncr..> 22-Dec-2014 08:19    384K
317-AdaptivelySecureNonInteractivePublicKeyEncr..> 22-Dec-2014 08:19    621K
318-UpperBoundsontheCommunicationComplexityofOp..> 22-Dec-2014 08:19    294K
318-UpperBoundsontheCommunicationComplexityofOp..> 22-Dec-2014 08:19    282K
319-BadgerAFastandProvablySecureMAC.pdf            22-Dec-2014 08:19    216K
319-BadgerAFastandProvablySecureMAC.ps             22-Dec-2014 08:18    553K
320-UpperBoundsfortheSelectionoftheCryptographi..> 22-Dec-2014 08:18    206K
320-UpperBoundsfortheSelectionoftheCryptographi..> 22-Dec-2014 08:18    713K
321-Theconjugacysearchprobleminpublickeycryptog..> 22-Dec-2014 08:18    130K
322-SeparableandAnonymousIdentityBasedKeyIssuin..> 22-Dec-2014 08:18    136K
322-SeparableandAnonymousIdentityBasedKeyIssuin..> 22-Dec-2014 08:18    421K
323-AnoteonLopezDahabcoordinates.pdf               22-Dec-2014 08:18    100K
323-AnoteonLopezDahabcoordinates.ps                22-Dec-2014 08:18    247K
323-AnoteonLpezDahabcoordinates.pdf                20-Jan-2023 08:40    138K
324-OnaProbabilisticApproachtotheSecurityAnalys..> 22-Dec-2014 08:18    237K
325-ComplexityoftheCollisionandNearCollisionAtt..> 22-Dec-2014 08:18    125K
325-ComplexityoftheCollisionandNearCollisionAtt..> 22-Dec-2014 08:18    289K
326-CryptanalysisofQiuGuChenVariantGroupSignatu..> 22-Dec-2014 08:18     56K
326-CryptanalysisofQiuGuChenVariantGroupSignatu..> 22-Dec-2014 08:18    148K
327-EfficientIdentityBasedRingSignature.pdf        22-Dec-2014 08:18    188K
327-EfficientIdentityBasedRingSignature.ps         22-Dec-2014 08:18    378K
328-SecurityAnalysisofa23rateDoubleLengthCompre..> 20-Jan-2023 14:22     207
329-Hardnessamplificationofweaklyverifiablepuzz..> 22-Dec-2014 08:18    214K
329-Hardnessamplificationofweaklyverifiablepuzz..> 22-Dec-2014 08:18    424K
330-MulticollisionAttacksonGeneralizedHashFunct..> 22-Dec-2014 08:18    229K
330-MulticollisionAttacksonGeneralizedHashFunct..> 22-Dec-2014 08:18    830K
331-CodeBasedGamePlayingProofsandtheSecurityofT..> 22-Dec-2014 08:18    451K
332-Sequencesofgamesatoolfortamingcomplexityins..> 22-Dec-2014 08:18    296K
333-SecureMultipartyComputationforselectingasol..> 22-Dec-2014 08:18    154K
333-SecureMultipartyComputationforselectingasol..> 22-Dec-2014 08:18    174K
334-UniversallyComposableSymbolicAnalysisofCryp..> 22-Dec-2014 08:18    573K
335-StatisticalZeroKnowledgeArgumentsforNPUsing..> 22-Dec-2014 08:18    206K
335-StatisticalZeroKnowledgeArgumentsforNPUsing..> 22-Dec-2014 08:18    405K
336-ObliviousTransferIsSymmetric.pdf               22-Dec-2014 08:18    141K
336-ObliviousTransferIsSymmetric.ps                22-Dec-2014 08:18    341K
337-SecurityonGeneralizedFeistelSchemewithSPRou..> 22-Dec-2014 08:17    200K
338-IdentityBasedHierarchicalStronglyKeyInsulat..> 22-Dec-2014 08:17    143K
338-IdentityBasedHierarchicalStronglyKeyInsulat..> 22-Dec-2014 08:17    745K
339-DivisorsinResidueClassesConstructively.pdf     22-Dec-2014 08:17    163K
339-DivisorsinResidueClassesConstructively.ps      22-Dec-2014 08:17    340K
340-RequestforReviewofKeyWrapAlgorithms.pdf        22-Dec-2014 08:17    352K
341-ReducingComplexityAssumptionsforStatistical..> 22-Dec-2014 08:17    216K
341-ReducingComplexityAssumptionsforStatistical..> 22-Dec-2014 08:17    402K
342-AcombmethodtorenderECCresistantagainstSideC..> 22-Dec-2014 08:17    115K
342-AcombmethodtorenderECCresistantagainstSideC..> 22-Dec-2014 08:17    255K
343-RevisitOfMcCullaghBarretoTwoPartyIDBasedAut..> 22-Dec-2014 08:17     86K
344-ModifiedParameterAttacksPracticalAttacksaga..> 22-Dec-2014 08:17    152K
345-OnSessionIdentifiersinProvablySecureProtoco..> 22-Dec-2014 08:17    226K
345-OnSessionIdentifiersinProvablySecureProtoco..> 22-Dec-2014 08:17    602K
346-RandomSwitchingLogicACountermeasureagainstD..> 22-Dec-2014 08:17    244K
346-RandomSwitchingLogicACountermeasureagainstD..> 22-Dec-2014 08:17      1M
347-AddendumtoOntheGeneralizedLinearEquivalence..> 22-Dec-2014 08:17     54K
347-AddendumtoOntheGeneralizedLinearEquivalence..> 22-Dec-2014 08:17    144K
347-AddendumtoOntheGeneralizedLinearEquivalence..> 20-Jan-2023 08:40     53K
348-AweaknessinSunChenHwang39sthreepartykeyagre..> 20-Jan-2023 08:40    164K
348-AweaknessinSunChenHwangsthreepartykeyagreem..> 22-Dec-2014 08:17    115K
348-AweaknessinSunChenHwangsthreepartykeyagreem..> 22-Dec-2014 08:17    652K
349-ADPAAttackontheImprovedHaMoonAlgorithm.pdf     22-Dec-2014 08:17    146K
349-ADPAAttackontheImprovedHaMoonAlgorithm.ps      22-Dec-2014 08:17    110K
350-Multivariablepublickeycryptosystems.pdf        22-Dec-2014 08:17    176K
350-Multivariablepublickeycryptosystems.ps         22-Dec-2014 08:17    334K
351-EfficientandOptimisticFairExchangesBasedonS..> 20-Jan-2023 14:22     207
352-PracticalCryptographyinHighDimensionalTori.pdf 22-Dec-2014 08:17    208K
352-PracticalCryptographyinHighDimensionalTori.ps  22-Dec-2014 08:17    416K
353-DirectDivisioninFactorRings.pdf                22-Dec-2014 08:17     95K
353-DirectDivisioninFactorRings.ps                 22-Dec-2014 08:17    252K
354-ClassesofPlateauedRotationSymmetricBooleanF..> 22-Dec-2014 08:17    254K
354-ClassesofPlateauedRotationSymmetricBooleanF..> 22-Dec-2014 08:17    592K
355-ASmallScaleVotingProtocolHidingVoteCountsof..> 22-Dec-2014 08:17    171K
356-PracticalAttacksonDigitalSignaturesUsingMD5..> 22-Dec-2014 08:17     53K
357-MD5ToBeConsideredHarmfulSomeday.pdf            22-Dec-2014 08:17     55K
358-ReusableCryptographicFuzzyExtractors.pdf       22-Dec-2014 08:16    307K
358-ReusableCryptographicFuzzyExtractors.ps        22-Dec-2014 08:16    519K
359-SecureComputationoftheMeanandRelatedStatist..> 22-Dec-2014 08:16    207K
359-SecureComputationoftheMeanandRelatedStatist..> 22-Dec-2014 08:16    421K
360-EquivalentKeysinHFECandvariations.pdf          22-Dec-2014 08:16    204K
360-EquivalentKeysinHFECandvariations.ps           22-Dec-2014 08:16    425K
361-SuperfluousKeysinMultivariateQuadraticAsymm..> 22-Dec-2014 08:16    169K
361-SuperfluousKeysinMultivariateQuadraticAsymm..> 22-Dec-2014 08:16    366K
362-AnewsecurityproofforDamgrd39sElGamal.pdf       20-Jan-2023 08:40    127K
362-AnewsecurityproofforDamgrdsElGamal.pdf         22-Dec-2014 08:16    127K
363-Rethinkingthesecurityofsomeauthenticatedgro..> 22-Dec-2014 08:16    136K
364-Findinggooddifferentialpatternsforattackson..> 22-Dec-2014 08:16    141K
364-Findinggooddifferentialpatternsforattackson..> 22-Dec-2014 08:16    350K
365-Ordinaryabelianvarietieshavingsmallembeddin..> 22-Dec-2014 08:16    230K
365-Ordinaryabelianvarietieshavingsmallembeddin..> 22-Dec-2014 08:16    210K
366-PieceInHandConceptforEnhancingtheSecurityof..> 22-Dec-2014 08:16    430K
367-OntheAffineTransformationsofHFECryptosystem..> 22-Dec-2014 08:16    200K
367-OntheAffineTransformationsofHFECryptosystem..> 22-Dec-2014 08:16    257K
368-CryptographicAsynchronousMultiPartyComputat..> 22-Dec-2014 08:16    272K
368-CryptographicAsynchronousMultiPartyComputat..> 22-Dec-2014 08:16    505K
369-SCA1ModelTowardsaconcretesecurityapproachto..> 22-Dec-2014 08:16    575K
370-TracingbyLinkingGroupSignautres.pdf            22-Dec-2014 08:16    267K
371-ConstructionandTraversalofHashChainwithPubl..> 22-Dec-2014 08:16    165K
372-OnTheSecurityofTwoKeyUpdatingSignatureSchem..> 20-Jan-2023 08:40    128K
373-DelegateableSignatureUsingWitnessIndistingu..> 22-Dec-2014 08:16    164K
373-DelegateableSignatureUsingWitnessIndistingu..> 22-Dec-2014 08:16    318K
374-Ageneralquantitativecryptanalysisofpermutat..> 22-Dec-2014 08:16    838K
375-EfficientPairingComputationonSupersingularA..> 22-Dec-2014 08:16    235K
375-EfficientPairingComputationonSupersingularA..> 22-Dec-2014 08:16    317K
376-CryptanalysisofRCESRSESImageEncryptionSchem..> 22-Dec-2014 08:16      1M
377-NewDistributedRingSignaturesforGeneralFamil..> 22-Dec-2014 08:16    273K
377-NewDistributedRingSignaturesforGeneralFamil..> 22-Dec-2014 08:16    288K