Index of /2005/


../
001-OnObfuscatingPointFunctions.pdf                22-Dec-2014 08:57    228K
001-OnObfuscatingPointFunctions.ps                 22-Dec-2014 08:57    442K
002-LogcryptForwardSecurityandPublicVerificatio..> 22-Dec-2014 08:57    422K
002-LogcryptForwardSecurityandPublicVerificatio..> 22-Dec-2014 08:57    948K
003-CryptanalysisofHijibijbijHBB.pdf               22-Dec-2014 08:57     92K
004-BenesandButterflyschemesrevisited.pdf          22-Dec-2014 08:57    269K
004-BenesandButterflyschemesrevisited.ps           22-Dec-2014 08:57    520K
005-Asufficientconditionforkeyprivacy.pdf          22-Dec-2014 08:57     63K
005-Asufficientconditionforkeyprivacy.ps           22-Dec-2014 08:57    161K
006-AMetricontheSetofEllipticCurvesovermathbfF_..> 22-Dec-2014 08:57    106K
006-AMetricontheSetofEllipticCurvesovermathbfF_..> 22-Dec-2014 08:57     55K
007-TheMisuseofRC4inMicrosoftWordandExcel.pdf      22-Dec-2014 08:57    124K
007-TheMisuseofRC4inMicrosoftWordandExcel.ps       22-Dec-2014 08:57    395K
008-CommentsonDistributedSymmetricKeyManagement..> 20-Jan-2023 08:40    141K
008-CommentsonDistributedSymmetricKeyManagement..> 22-Dec-2014 08:57     75K
008-CommentsonDistributedSymmetricKeyManagement..> 22-Dec-2014 08:57    186K
009-Mixingpropertiesoftriangularfeedbackshiftre..> 22-Dec-2014 08:57    510K
010-UpdateonSHA1.pdf                               22-Dec-2014 08:57    156K
010-UpdateonSHA1.ps                                22-Dec-2014 08:57    327K
011-AnImprovedElegantMethodtoReinitializeHashCh..> 22-Dec-2014 08:57    103K
012-EfficientCertificatelessPublicKeyEncryption..> 22-Dec-2014 08:57    243K
012-EfficientCertificatelessPublicKeyEncryption.ps 22-Dec-2014 08:57    457K
013-CommentsInsiderattackonChengetal39spairingb..> 20-Jan-2023 08:40     82K
013-CommentsInsiderattackonChengetalspairingbas..> 22-Dec-2014 08:57     82K
014-AChosenCiphertextAttackonaPublicKeyCryptosy..> 22-Dec-2014 08:57    226K
014-AChosenCiphertextAttackonaPublicKeyCryptosy..> 22-Dec-2014 08:57    245K
015-HierarchicalIdentityBasedEncryptionwithCons..> 22-Dec-2014 08:57    313K
015-HierarchicalIdentityBasedEncryptionwithCons..> 22-Dec-2014 08:57    560K
016-NarrowTfunctions.pdf                           22-Dec-2014 08:57    328K
016-NarrowTfunctions.ps                            22-Dec-2014 08:57      3M
017-SideChannelAttacksonImplementationsofCurveB..> 22-Dec-2014 08:56    270K
018-CollusionResistantBroadcastEncryptionWithSh..> 22-Dec-2014 08:56    227K
019-TheFullAbstractionoftheUCFramework.pdf         22-Dec-2014 08:56    256K
020-DeCompositionsofCryptographicSchemesandthei..> 22-Dec-2014 08:56    239K
020-DeCompositionsofCryptographicSchemesandthei..> 22-Dec-2014 08:56    382K
021-PartialHidinginPublicKeyCryptography.pdf       22-Dec-2014 08:56    188K
021-PartialHidinginPublicKeyCryptography.ps        22-Dec-2014 08:56   1015K
022-AnImprovedandEfficientCountermeasureagainst..> 22-Dec-2014 08:56    148K
022-AnImprovedandEfficientCountermeasureagainst..> 22-Dec-2014 08:56    332K
023-AConstructionofPublicKeyCryptosystemUsingAl..> 22-Dec-2014 08:56    299K
024-WeakkeysoftheDiffeHellmankeyexchangeI.pdf      22-Dec-2014 08:56    211K
025-AnalysisofAffinelyEquivalentBooleanFunction..> 22-Dec-2014 08:56    110K
025-AnalysisofAffinelyEquivalentBooleanFunction..> 22-Dec-2014 08:56    250K
026-Techniquesforrandommaskininhardware.pdf        22-Dec-2014 08:56    287K
026-Techniquesforrandommaskininhardware.ps         22-Dec-2014 08:56    451K
027-TagKEMDEMANewFrameworkforHybridEncryption.pdf  22-Dec-2014 08:56    415K
027-TagKEMDEMANewFrameworkforHybridEncryption.ps   22-Dec-2014 08:56    690K
028-ImprovedProxyReEncryptionSchemeswithApplica..> 22-Dec-2014 08:56    179K
029-Amodelandarchitectureforpseudorandomgenerat..> 22-Dec-2014 08:56    241K
029-Amodelandarchitectureforpseudorandomgenerat..> 22-Dec-2014 08:56    433K
030-WeakkeysoftheDiffieHellmankeyexchangeIIPair..> 22-Dec-2014 08:56    218K
031-TheVectorDecompositionProblemforEllipticand..> 22-Dec-2014 08:56    248K
031-TheVectorDecompositionProblemforEllipticand..> 22-Dec-2014 08:56    243K
032-OntheNotionofStatisticalSecurityinSimulatab..> 22-Dec-2014 08:56    220K
032-OntheNotionofStatisticalSecurityinSimulatab..> 22-Dec-2014 08:56    468K
033-AnAttackonCFBModeEncryptionAsUsedByOpenPGP.pdf 22-Dec-2014 08:56    150K
034-FlexibleFrameworkforSecretHandshakesMultiPa..> 22-Dec-2014 08:56    345K
035-AnEfficientCDHbasedSignatureSchemeWithaTigh..> 22-Dec-2014 08:56    300K
035-AnEfficientCDHbasedSignatureSchemeWithaTigh..> 22-Dec-2014 08:56    510K
036-ConcurrentCompositionofSecureProtocolsinthe..> 22-Dec-2014 08:55    642K
036-ConcurrentCompositionofSecureProtocolsinthe..> 22-Dec-2014 08:55      1M
037-ImprovingSecureServerPerformancebyRebalanci..> 22-Dec-2014 08:55    180K
037-ImprovingSecureServerPerformancebyRebalanci..> 22-Dec-2014 08:55    390K
038-Cryptanalysisofimprovementofdigitalsignatur..> 20-Jan-2023 14:22     207
039-DistinguishingStreamCipherswithConvolutiona..> 22-Dec-2014 08:55    255K
040-Unfairnessofaprotocolforcertifieddelivery.pdf  22-Dec-2014 08:55    105K
040-Unfairnessofaprotocolforcertifieddelivery.ps   22-Dec-2014 08:55    349K
041-OntheSecurityofaGroupSignatureSchemewithStr..> 22-Dec-2014 08:55     91K
041-OntheSecurityofaGroupSignatureSchemewithStr..> 22-Dec-2014 08:55    229K
042-PolyhedronsoverFiniteAbelianGroupsandTheirC..> 22-Dec-2014 08:55     98K
042-PolyhedronsoverFiniteAbelianGroupsandTheirC..> 22-Dec-2014 08:55    282K
043-AnEfficientSolutiontoTheMillionaires39Probl..> 20-Jan-2023 08:40    153K
043-AnEfficientSolutiontoTheMillionairesProblem..> 22-Dec-2014 08:55    141K
043-AnEfficientSolutiontoTheMillionairesProblem..> 22-Dec-2014 08:55    307K
044-Ontheaffineclassificationofcubicbentfunctio..> 22-Dec-2014 08:55    128K
044-Ontheaffineclassificationofcubicbentfunctio..> 22-Dec-2014 08:55    292K
045-ChoosingParameterSetsforNTRUEncryptwithNAEP..> 22-Dec-2014 08:55    264K
046-NewApproachesforDeniableAuthentication.pdf     22-Dec-2014 08:55    410K
047-Cryptanalysisofananonymouswirelessauthentic..> 22-Dec-2014 08:55    119K
048-Cryptanalysisoftwoidentificationschemesbase..> 22-Dec-2014 08:55     89K
049-AdversarialModelforRadioFrequencyIdentifica..> 22-Dec-2014 08:55    233K
050-DavidChaum39sVoterVerificationusingEncrypte..> 20-Jan-2023 08:40    354K
050-DavidChaumsVoterVerificationusingEncryptedP..> 22-Dec-2014 08:55    354K
051-ANoteonShor39sQuantumAlgorithmforPrimeFacto..> 20-Jan-2023 08:40    102K
051-ANoteonShorsQuantumAlgorithmforPrimeFactori..> 22-Dec-2014 08:55     67K
051-ANoteonShorsQuantumAlgorithmforPrimeFactori..> 22-Dec-2014 08:55    181K
052-PickingVirtualPocketsusingRelayAttacksonCon..> 22-Dec-2014 08:55    246K
053-AnApproachTowardsRebalancedRSACRTwithShortP..> 22-Dec-2014 08:55    176K
054-CommentoncryptanalysisofTsengetalsauthentic..> 20-Jan-2023 14:22     207
055-UntraceabilityofTwoGroupSignatureSchemes.pdf   22-Dec-2014 08:55     87K
055-UntraceabilityofTwoGroupSignatureSchemes.ps    22-Dec-2014 08:55    221K
056-DeniableAuthenticationwithRSAandMulticastin..> 22-Dec-2014 08:55    235K
056-DeniableAuthenticationwithRSAandMulticastin..> 22-Dec-2014 08:55    218K
057-TightReductionsamongStrongDieHellmanAssumpt..> 22-Dec-2014 08:55    154K
057-TightReductionsamongStrongDiffieHellmanAssu..> 20-Jan-2023 08:40    154K
058-GenericConstructionsofIdentityBasedandCerti..> 22-Dec-2014 08:55    356K
058-GenericConstructionsofIdentityBasedandCerti..> 22-Dec-2014 08:55    372K
059-Secretsharingschemesongraphs.pdf               22-Dec-2014 08:55    149K
060-CompactECash.pdf                               22-Dec-2014 08:54    370K
061-KeyDerivationandRandomnessExtraction.pdf       22-Dec-2014 08:54    334K
061-KeyDerivationandRandomnessExtraction.ps        22-Dec-2014 08:54    602K
062-CryptanalysisofOneFairEcashSystem.pdf          20-Jan-2023 14:22     207
063-OntheKeyScheduleofBlowfish.pdf                 20-Jan-2023 14:22     207
064-OnEfficientKeyAgreementProtocols.pdf           22-Dec-2014 08:54    108K
065-EfficienthardwarefortheTatepairingcalculati..> 22-Dec-2014 08:54    300K
065-EfficienthardwarefortheTatepairingcalculati..> 22-Dec-2014 08:54      1M
066-UnconditionallySecureConstantRoundMultiPart..> 22-Dec-2014 08:54    295K
066-UnconditionallySecureConstantRoundMultiPart..> 22-Dec-2014 08:54    516K
067-CollidingX509Certificates.pdf                  22-Dec-2014 08:54     95K
068-NadicSummationShrinkingGeneratorBasicproper..> 22-Dec-2014 08:54    270K
068-NadicSummationShrinkingGeneratorBasicproper..> 22-Dec-2014 08:54      5M
069-FastEllipticCurvePointMultiplicationusingDo..> 22-Dec-2014 08:54    147K
069-FastEllipticCurvePointMultiplicationusingDo..> 22-Dec-2014 08:54    300K
070-Onpublickeycryptosystemsbasedoncombinatoria..> 22-Dec-2014 08:54    201K
071-Afastparallelscalarmultiplicationagainstsid..> 20-Jan-2023 14:22     207
072-PracticalLatticeBasisSamplingReduction.pdf     22-Dec-2014 08:54    364K
072-PracticalLatticeBasisSamplingReduction.ps      22-Dec-2014 08:54      1M
073-BROADCASTENCRYPTIONpi.pdf                      22-Dec-2014 08:54    450K
073-BROADCASTENCRYPTIONpi.ps                       22-Dec-2014 08:54      2M
074-Computationallysoundimplementationsofequati..> 22-Dec-2014 08:54    395K
074-Computationallysoundimplementationsofequati..> 22-Dec-2014 08:54    665K
075-FindingMD5CollisionsaToyForaNotebook.pdf       22-Dec-2014 08:54     83K
076-PairingBasedCryptographyatHighSecurityLevel..> 22-Dec-2014 08:54    383K
077-TaxonomyofPublicKeySchemesbasedontheproblem..> 22-Dec-2014 08:54    476K
077-TaxonomyofPublicKeySchemesbasedontheproblem..> 22-Dec-2014 08:54    751K
078-DualitybetweenMultiplicationandModularReduc..> 22-Dec-2014 08:54    175K
078-DualitybetweenMultiplicationandModularReduc..> 22-Dec-2014 08:53    383K
079-ZeroKnowledgeProofsforMixnetsofSecretShares..> 22-Dec-2014 08:53    295K
079-ZeroKnowledgeProofsforMixnetsofSecretShares..> 22-Dec-2014 08:53    566K
080-AQKDProtocolExtendabletoSupportEntanglement..> 22-Dec-2014 08:53    192K
081-SmashingSMASH.pdf                              20-Jan-2023 14:22     207
082-SomepropertiesofanFSE2005HashProposal.pdf      22-Dec-2014 08:53     50K
082-SomepropertiesofanFSE2005HashProposal.ps       22-Dec-2014 08:53    136K
083-Securitynotionsfordiskencryption.pdf           22-Dec-2014 08:53    164K
084-OnResistanceofDEStoRelatedKeyDifferentialCr..> 22-Dec-2014 08:53    197K
084-OnResistanceofDEStoRelatedKeyDifferentialCr..> 22-Dec-2014 08:53    274K
085-AnewstructuralattackforGPTandvariants.pdf      20-Jan-2023 14:22     207
086-SimplePseudorandomNumberGeneratorwithStreng..> 22-Dec-2014 08:53    223K
087-AESsidechannelattackprotectionusingrandomis..> 22-Dec-2014 08:53     60K
088-TheMACfunctionPelican20.pdf                    22-Dec-2014 08:53     85K
089-Cryptographer39sToolkitforConstructionof8Bi..> 20-Jan-2023 08:40    483K
089-CryptographersToolkitforConstructionof8BitB..> 22-Dec-2014 08:53    483K
090-RediscoveryofTimeMemoryTradeoffs.pdf           22-Dec-2014 08:53    264K
090-RediscoveryofTimeMemoryTradeoffs.ps            22-Dec-2014 08:53    235K
091-DistributedPhishingAttacks.pdf                 22-Dec-2014 08:53    148K
092-PRFDomainExtensionUsingDAGs.pdf                22-Dec-2014 08:53    275K
092-PRFDomainExtensionUsingDAGs.ps                 22-Dec-2014 08:53    392K
093-AnIDBasedKeyAgreementSchemefrompairing.pdf     22-Dec-2014 08:53    182K
094-ASurveyonIDBasedCryptographicPrimitives.pdf    22-Dec-2014 08:53    305K
094-ASurveyonIDBasedCryptographicPrimitives.ps     22-Dec-2014 08:53    573K
095-SecurityandPrivacyIssuesinEpassports.pdf       22-Dec-2014 08:53    222K
095-SecurityandPrivacyIssuesinEpassports.ps        22-Dec-2014 08:53      2M
096-AlmostPerfectNonlinearMonomialsoverGF2nforI..> 22-Dec-2014 08:53    227K
096-AlmostPerfectNonlinearMonomialsoverGF2nforI..> 22-Dec-2014 08:53    417K
097-ComputationallySoundVerificationofSecurityP..> 22-Dec-2014 08:53    213K
097-ComputationallySoundVerificationofSecurityP..> 22-Dec-2014 08:53    390K
098-ProbabilisticOpacityforaPassiveAdversaryand..> 20-Jan-2023 08:40    223K
098-ProbabilisticOpacityforaPassiveAdversaryand..> 22-Dec-2014 08:53    228K
098-ProbabilisticOpacityforaPassiveAdversaryand..> 22-Dec-2014 08:53    436K
099-TimeDataMemoryTradeOffBasedCryptanalysisofC..> 22-Dec-2014 08:53    245K
100-almostenumerationof8variablebentfunctions.pdf  22-Dec-2014 08:53    189K
101-SoundnessandCompletenessofFormalLogicsofSym..> 22-Dec-2014 08:53    470K
102-FindingMD5CollisionsonaNotebookPCUsingMulti..> 22-Dec-2014 08:52    102K
103-CryptanalysisandimprovementofanIDbasedadhoc..> 22-Dec-2014 08:52    112K
103-CryptanalysisandimprovementofanIDbasedadhoc..> 22-Dec-2014 08:52    281K
104-OnestimatingthelatticesecurityofNTRU.pdf       22-Dec-2014 08:52    104K
104-OnestimatingthelatticesecurityofNTRU.ps        22-Dec-2014 08:52    227K
105-OnErrorCorrectionintheExponent.pdf             22-Dec-2014 08:52    208K
105-OnErrorCorrectionintheExponent.ps              22-Dec-2014 08:52    400K
106-HowToPlayAlmostAnyMentalGameOverTheNetConcu..> 22-Dec-2014 08:52    518K
106-HowToPlayAlmostAnyMentalGameOverTheNetConcu..> 22-Dec-2014 08:52    799K
107-AUniformFrameworkforCryptanalysisoftheBluet..> 22-Dec-2014 08:52    245K
108-EfficientIdentityBasedandAuthenticatedKeyAg..> 22-Dec-2014 08:52    223K
108-EfficientIdentityBasedandAuthenticatedKeyAg..> 22-Dec-2014 08:52    372K
109-APublicKeyCryptosystemBasedonSingularCubicC..> 22-Dec-2014 08:52    124K
110-DiffieHellmankeyexchangeprotocolandnonabeli..> 22-Dec-2014 08:52    211K
110-DiffieHellmankeyexchangeprotocolandnonabeli..> 22-Dec-2014 08:52    417K
111-WeakCompositeDiffieHellmanisnotWeakerthanFa..> 22-Dec-2014 08:52    127K
112-Ontherelationshipbetweensquaredpairingsandp..> 22-Dec-2014 08:52    202K
112-Ontherelationshipbetweensquaredpairingsandp..> 22-Dec-2014 08:52    182K
113-PartiallyFixedPointMultiplication.pdf          22-Dec-2014 08:52    269K
113-PartiallyFixedPointMultiplication.ps           22-Dec-2014 08:52    287K
114-IntrusionResilientSecureChannels.pdf           22-Dec-2014 08:52    468K
114-IntrusionResilientSecureChannels.ps            22-Dec-2014 08:52    787K
115-CharacteristicsofKeyDependentSBoxestheCaseo..> 22-Dec-2014 08:52    152K
115-CharacteristicsofKeyDependentSBoxestheCaseo..> 22-Dec-2014 08:52    302K
116-OnComputableIsomorphismsinEfficientAsymmetr..> 22-Dec-2014 08:52    167K
116-OnComputableIsomorphismsinEfficientAsymmetr..> 22-Dec-2014 08:52    353K
117-BonehFranklinIdentityBasedEncryptionRevisit..> 22-Dec-2014 08:52    188K
117-BonehFranklinIdentityBasedEncryptionRevisit..> 22-Dec-2014 08:52    418K
118-ResultsonRotationSymmetricBentFunctions.pdf    22-Dec-2014 08:52    138K
118-ResultsonRotationSymmetricBentFunctions.ps     22-Dec-2014 08:52    324K
119-IndexCalculusinClassGroupsofPlaneCurvesofSm..> 22-Dec-2014 08:52    335K
119-IndexCalculusinClassGroupsofPlaneCurvesofSm..> 22-Dec-2014 08:52    506K
120-OnDesignatedlyVerifiedNoninteractiveWaterma..> 22-Dec-2014 08:52    164K
121-PassthoughtsAuthenticatingWithOurMinds.pdf     22-Dec-2014 08:52    175K
122-BreakingandRepairingTrapdoorfreeGroupSignat..> 22-Dec-2014 08:52    173K
123-AccumulatorsfromBilinearPairingsandApplicat..> 22-Dec-2014 08:52    308K
123-AccumulatorsfromBilinearPairingsandApplicat..> 22-Dec-2014 08:52    581K
124-AppendOnlySignatures.pdf                       22-Dec-2014 08:51    403K
124-AppendOnlySignatures.ps                        22-Dec-2014 08:51    721K
125-SPAResistantLefttoRightIntegerRecodings.pdf    22-Dec-2014 08:51     95K
125-SPAResistantLefttoRightIntegerRecodings.ps     22-Dec-2014 08:51     91K
126-OntheStatisticallyOptimalDivideandConquerCo..> 22-Dec-2014 08:51    166K
127-BrowserModelforSecurityAnalysisofBrowserBas..> 22-Dec-2014 08:51    554K
128-ImprovetheBehaviorofXLFamilybyReducingtheEx..> 20-Jan-2023 14:22     207
129-OnTheIndistinguishabilityBasedSecurityModel..> 22-Dec-2014 08:51    414K
129-OnTheIndistinguishabilityBasedSecurityModel..> 22-Dec-2014 08:51    695K
130-ResultsonRotationSymmetricBooleanFunctionso..> 20-Jan-2023 14:22     207
131-DynamicGroupKeyAgreementinTreeBasedSetting.pdf 22-Dec-2014 08:51    265K
131-DynamicGroupKeyAgreementinTreeBasedSetting.ps  22-Dec-2014 08:51    322K
132-FormalNotionsofAnonymityforPeertopeerNetwor..> 22-Dec-2014 08:51    171K
132-FormalNotionsofAnonymityforPeertopeerNetwor..> 22-Dec-2014 08:51    303K
133-PairingFriendlyEllipticCurvesofPrimeOrder.pdf  22-Dec-2014 08:51    161K
133-PairingFriendlyEllipticCurvesofPrimeOrder.ps   22-Dec-2014 08:51    340K
134-BroadcastAuthenticationWithHashedRandomPrel..> 22-Dec-2014 08:51    202K
135-Designofnearoptimalpseudorandomfunctionsand..> 22-Dec-2014 08:51    196K
135-Designofnearoptimalpseudorandomfunctionsand..> 22-Dec-2014 08:51    371K
136-SkippingCascadeandCombinedChainSchemesforBr..> 22-Dec-2014 08:51    285K
137-ASenderVerifiableMixNetandaNewProofofaShuff..> 22-Dec-2014 08:51    679K
137-ASenderVerifiableMixNetandaNewProofofaShuff..> 22-Dec-2014 08:51      2M
138-IHARPSAnEfficientKeyPredistributionScheme.pdf  22-Dec-2014 08:51    291K
139-Scalingsecurityinpairingbasedprotocols.pdf     22-Dec-2014 08:51    205K
140-HowtoSplitaSharedSecretintoSharedBitsinCons..> 22-Dec-2014 08:51    179K
140-HowtoSplitaSharedSecretintoSharedBitsinCons..> 22-Dec-2014 08:51    720K
141-Enhancedpasswordbasedkeyestablishmentprotoc..> 22-Dec-2014 08:51    111K
142-BroadcastEncryptionwithRandomKeyPredistribu..> 22-Dec-2014 08:51    139K
143-MultipartyComputationBasedonConnectivityofG..> 22-Dec-2014 08:51    164K
144-KaweichelanExtensionofBlowfishfor64BitArchi..> 22-Dec-2014 08:51    141K
144-KaweichelanExtensionofBlowfishfor64BitArchi..> 22-Dec-2014 08:51    138K
145-SmallSecureSketchforPointSetDifference.pdf     22-Dec-2014 08:51    206K
146-AHighSpeedArchitectureforGaloisCounterModeo..> 22-Dec-2014 08:50    542K
147-TamperEvidentDigitalSignaturesProtectingCer..> 22-Dec-2014 08:50    147K
148-OnUniversalComposableSecurityofTimeStamping..> 22-Dec-2014 08:50    807K
149-ConditionallyVerifiableSignatures.pdf          22-Dec-2014 08:50    209K
150-SecureDelegationofEllipticCurvePairing.pdf     22-Dec-2014 08:50    133K
150-SecureDelegationofEllipticCurvePairing.ps      22-Dec-2014 08:50    298K
151-ImprovedCollisionAttackonMD4.pdf               22-Dec-2014 08:50     99K
152-OnHighRateCryptographicCompressionFunctions..> 22-Dec-2014 08:50    142K
152-OnHighRateCryptographicCompressionFunctions.ps 22-Dec-2014 08:50    353K
153-OnSecurityofKoyamaSchemes.pdf                  22-Dec-2014 08:50    106K
154-SecureStochasticMultipartyComputationforCom..> 22-Dec-2014 08:50    202K
154-SecureStochasticMultipartyComputationforCom..> 22-Dec-2014 08:50      1M
155-PyRooAFastandSecureStreamCipherusingRolling..> 22-Dec-2014 08:50    163K
155-PyRooAFastandSecureStreamCipherusingRolling..> 22-Dec-2014 08:50    319K
156-Onthesecurityofsomepasswordbasedkeyagreemen..> 22-Dec-2014 08:50    104K
157-FOXAlgorithmImplementationahardwaredesignap..> 22-Dec-2014 08:50    178K
158-GeometricCryptosystem.pdf                      22-Dec-2014 08:50    718K
159-OnConstructingParallelPseudorandomGenerator..> 22-Dec-2014 08:50    297K
159-OnConstructingParallelPseudorandomGenerator..> 22-Dec-2014 08:50    512K
160-FirstStepsTowardaCryptographyAwareLanguagea..> 22-Dec-2014 08:50    330K
160-FirstStepsTowardaCryptographyAwareLanguagea..> 22-Dec-2014 08:50    996K
161-MultipleforgeryattacksagainstMessageAuthent..> 22-Dec-2014 08:50    143K
162-AProvablySecureandEfficientVerifiableShuffl..> 22-Dec-2014 08:50    229K
162-AProvablySecureandEfficientVerifiableShuffl..> 22-Dec-2014 08:50    445K
163-ModelingInsiderAttacksonGroupKeyExchangePro..> 22-Dec-2014 08:50    253K
164-ADistinguishattackonCOSvdCiphers.pdf           22-Dec-2014 08:50    101K
165-CRYPTOGRAPHICMERSENNETWISTERANDFUBUKISTREAM..> 22-Dec-2014 08:50    185K
166-Tatepairingcomputationonthedivisorsofhypere..> 22-Dec-2014 08:50    235K
167-EfficientComputationoftheTatePairingonHyper..> 20-Jan-2023 14:22     207
168-DynamickTimesAnonymousAuthentication.pdf       22-Dec-2014 08:50    204K
168-DynamickTimesAnonymousAuthentication.ps        22-Dec-2014 08:50    515K
169-EnforcingConfinementinDistributedStorageand..> 22-Dec-2014 08:49    302K
169-EnforcingConfinementinDistributedStorageand..> 22-Dec-2014 08:49    510K
170-UnclonableGroupIdentification.pdf              22-Dec-2014 08:49    257K
171-Towardscomputationallysoundsymbolicanalysis..> 22-Dec-2014 08:49    244K
171-Towardscomputationallysoundsymbolicanalysis..> 22-Dec-2014 08:49    264K
172-ConjunctiveKeywordSearchonEncryptedDatawith..> 20-Jan-2023 14:22     207
173-Weaknessesinaleakageresilientauthenticatedk..> 22-Dec-2014 08:49     95K
174-OntheAutomaticConstructionofIndistinguishab..> 22-Dec-2014 08:49    209K
174-OntheAutomaticConstructionofIndistinguishab..> 22-Dec-2014 08:49    459K
175-A32bitRC4likeKeystreamGenerator.pdf            22-Dec-2014 08:49    153K
175-A32bitRC4likeKeystreamGenerator.ps             22-Dec-2014 08:49    347K
176-HMQVAHighPerformanceSecureDiffieHellmanProt..> 22-Dec-2014 08:49    536K
177-Secretsharingontheddimensionalcube.pdf         22-Dec-2014 08:49    182K
178-AnalyzingUnlinkabilityofSomeGroupSignatures..> 22-Dec-2014 08:49     94K
179-IntrusionResilienceviatheBoundedStorageMode..> 22-Dec-2014 08:49    232K
179-IntrusionResilienceviatheBoundedStorageMode..> 22-Dec-2014 08:49    428K
180-ANoteonSecureKeyIssuinginIDbasedCryptograph..> 22-Dec-2014 08:49    113K
181-Aplausibleapproachtocomputeraidedcryptograp..> 22-Dec-2014 08:49    291K
181-Aplausibleapproachtocomputeraidedcryptograp..> 22-Dec-2014 08:49    568K
182-CryptanalysisonChangYangHwangProtectedPassw..> 22-Dec-2014 08:49     65K
183-PEKEProbabilisticEncryptionKeyExchange10Yea..> 22-Dec-2014 08:49    168K
184-RecursiveConstructionsofSecureCodesandHashF..> 22-Dec-2014 08:49    236K
185-Securitypropertiesoftwoprovablysecureconfer..> 22-Dec-2014 08:49    164K
186-LinkabilityofSeveralBlindSignatureSchemes.pdf  20-Jan-2023 14:22     207
187-HowToExchangeSecretswithObliviousTransfer.pdf  22-Dec-2014 08:49    358K
188-GroupSignaturewhereGroupManagerMembersandOp..> 22-Dec-2014 08:49    211K
188-GroupSignaturewhereGroupManagerMembersandOp..> 22-Dec-2014 08:49    436K
189-AWeakRandomizerAttackonRSAOAEPwithe3.pdf       22-Dec-2014 08:49    148K
190-SecurityProofof34EfficientandLeakageResilie..> 20-Jan-2023 08:40    190K
190-SecurityProofofEfficientandLeakageResilient..> 22-Dec-2014 08:49    190K
191-PublicKeyEncryptionwithKeywordSearchRevisit..> 22-Dec-2014 08:49    204K
192-OnthesecurityandtheefficiencyoftheMerklesig..> 22-Dec-2014 08:49    260K
192-OnthesecurityandtheefficiencyoftheMerklesig..> 22-Dec-2014 08:49    516K
193-VSHanEfficientandProvableCollisionResistant..> 22-Dec-2014 08:49    241K
193-VSHanEfficientandProvableCollisionResistant..> 22-Dec-2014 08:48    434K
194-PrimalDualDistanceBoundsofLinearCodeswithAp..> 22-Dec-2014 08:48    102K
195-TwinRSA.pdf                                    22-Dec-2014 08:48    103K
195-TwinRSA.ps                                     22-Dec-2014 08:48    226K
196-UniversallyComposablePasswordBasedKeyExchan..> 22-Dec-2014 08:48    425K
196-UniversallyComposablePasswordBasedKeyExchan..> 22-Dec-2014 08:48    702K
197-WeaknessesintwogroupDiffieHellmankeyexchang..> 22-Dec-2014 08:48    107K
198-UniversallyComposableTimeStampingSchemeswit..> 22-Dec-2014 08:48    187K
198-UniversallyComposableTimeStampingSchemeswit..> 22-Dec-2014 08:48    375K
199-VerifiableShufflesAFormalModelandaPaillierb..> 20-Jan-2023 14:22     207
200-BlockcipherssensitivetoGroebnerBasisAttacks..> 22-Dec-2014 08:48    246K
201-OnSecurityProofofMcCullaghBarreto39sKeyAgre..> 20-Jan-2023 08:40    183K
201-OnSecurityProofofMcCullaghBarretosKeyAgreem..> 22-Dec-2014 08:48    176K
201-OnSecurityProofofMcCullaghBarretosKeyAgreem..> 22-Dec-2014 08:48    336K
202-TheBestDifferentialCharacteristicsandSubtle..> 22-Dec-2014 08:48     89K
202-TheBestDifferentialCharacteristicsandSubtle..> 22-Dec-2014 08:48    225K
203-OnExactAlgebraicNonImmunityofSboxesBasedonP..> 22-Dec-2014 08:48    201K
203-OnExactAlgebraicNonImmunityofSboxesBasedonP..> 22-Dec-2014 08:48    422K
204-AnAlgebraicMaskingMethodtoProtectAESAgainst..> 22-Dec-2014 08:48    189K
204-AnAlgebraicMaskingMethodtoProtectAESAgainst..> 22-Dec-2014 08:48    378K
205-AnotherlookatHMQV.pdf                          22-Dec-2014 08:48    270K
206-OnSessionKeyConstructioninProvablySecureKey..> 22-Dec-2014 08:48    261K
206-OnSessionKeyConstructioninProvablySecureKey..> 20-Jan-2023 08:40    261K
207-SomeThoughtsonTimeMemoryDataTradeoffs.pdf      22-Dec-2014 08:48    111K
207-SomeThoughtsonTimeMemoryDataTradeoffs.ps       22-Dec-2014 08:48    255K
208-OnFindingRootsWithoutFactoringandASpecialPu..> 20-Jan-2023 14:22     207
209-CommentsonWeaknessesinTwoGroupDiffieHellman..> 22-Dec-2014 08:48    114K
209-CommentsonWeaknessesinTwoGroupDiffieHellman..> 22-Dec-2014 08:48    398K
210-TheIdealCipherModelRevisitedAnUninstantiabl..> 22-Dec-2014 08:48    160K
210-TheIdealCipherModelRevisitedAnUninstantiabl..> 22-Dec-2014 08:48    334K
211-GamesandtheImpossibilityofRealizableIdealFu..> 22-Dec-2014 08:48    222K
212-ProbabilitydistributionsofCorrelationandDif..> 22-Dec-2014 08:48    308K
213-ACounterbasedMACRevisitedTowardsBetterSecur..> 20-Jan-2023 14:22     207
214-TMTOWithMultipleDataAnalysisandNewSingleTab..> 22-Dec-2014 08:48    211K
214-TMTOWithMultipleDataAnalysisandNewSingleTab..> 22-Dec-2014 08:48    199K
215-ReconcilingCAObliviousEncryptionHiddenCrede..> 22-Dec-2014 08:48    178K
215-ReconcilingCAObliviousEncryptionHiddenCrede..> 22-Dec-2014 08:48    153K
216-ASecretSharingSchemeforPreventingtheCheater..> 22-Dec-2014 08:48    181K
217-EfficientIdentityBasedKeyEncapsulationtoMul..> 22-Dec-2014 08:48    166K
217-EfficientIdentityBasedKeyEncapsulationtoMul..> 22-Dec-2014 08:48    649K
218-Theconjugacyproblemandrelatedproblemsinlatt..> 22-Dec-2014 08:48    133K
218-Theconjugacyproblemandrelatedproblemsinlatt..> 22-Dec-2014 08:48    325K
219-Cryptanalysisofa32bitRC4likeStreamCipher.pdf   22-Dec-2014 08:47     48K
219-Cryptanalysisofa32bitRC4likeStreamCipher.ps    22-Dec-2014 08:47    124K
220-LimitsoftheCryptographicRealizationofDolevY..> 22-Dec-2014 08:47    328K
220-LimitsoftheCryptographicRealizationofDolevY..> 22-Dec-2014 08:47    945K
221-ConstantRoundDynamicGroupKeyAgreement.pdf      22-Dec-2014 08:47    295K
221-ConstantRoundDynamicGroupKeyAgreement.ps       22-Dec-2014 08:47    342K
222-EfficientCombEllipticCurveMultiplicationMet..> 22-Dec-2014 08:47    218K
222-EfficientCombEllipticCurveMultiplicationMet..> 22-Dec-2014 08:47    376K
223-DiffieHellmanKeyExchangeProtocolItsGenerali..> 22-Dec-2014 08:47    244K
223-DiffieHellmanKeyExchangeProtocolItsGenerali..> 22-Dec-2014 08:47    342K
224-AnEfficientIDKEMBasedOnTheSakaiKasaharaKeyC..> 22-Dec-2014 08:47    265K
224-AnEfficientIDKEMBasedOnTheSakaiKasaharaKeyC..> 22-Dec-2014 08:47    235K
225-MinimalityoftheHammingWeightofthetauNAFforK..> 22-Dec-2014 08:47    184K
226-SecurityProofofSakaiKasahara39sIdentityBase..> 20-Jan-2023 08:40    272K
226-SecurityProofofSakaiKasaharasIdentityBasedE..> 22-Dec-2014 08:47    236K
226-SecurityProofofSakaiKasaharasIdentityBasedE..> 22-Dec-2014 08:47    501K
227-ThresholdRingSignaturesEfficientforLargeSet..> 22-Dec-2014 08:47    102K
227-ThresholdRingSignaturesEfficientforLargeSet..> 22-Dec-2014 08:47    273K
228-EfficientDoublingonGenus3CurvesoverBinaryFi..> 22-Dec-2014 08:47    222K
228-EfficientDoublingonGenus3CurvesoverBinaryFi..> 22-Dec-2014 08:47    561K
229-BasicTheoryinConstructionofBooleanFunctions..> 22-Dec-2014 08:47    269K
229-BasicTheoryinConstructionofBooleanFunctions..> 22-Dec-2014 08:47    298K
230-YetAnotherShortSignaturesWithoutRandomOracl..> 20-Jan-2023 08:40    187K
231-FastgeneratorsfortheDiffieHellmankeyagreeme..> 22-Dec-2014 08:47    111K
231-FastgeneratorsfortheDiffieHellmankeyagreeme..> 22-Dec-2014 08:47    282K
232-LightweightKeyExchangeandStreamCipherbaseds..> 22-Dec-2014 08:47    208K
232-LightweightKeyExchangeandStreamCipherbaseds..> 22-Dec-2014 08:47    262K
233-OntheEntropyofArcfourKeys.pdf                  22-Dec-2014 08:47    247K
234-LILIIIisnotBroken.pdf                          22-Dec-2014 08:47     69K
235-TreeParityMachineRekeyingArchitecturesforEm..> 22-Dec-2014 08:47    186K
235-TreeParityMachineRekeyingArchitecturesforEm..> 22-Dec-2014 08:47    243K
236-EffectivePolynomialFamiliesforGeneratingMor..> 22-Dec-2014 08:47    295K
237-AnActiveAttackAgainstHBAProvablySecureLight..> 22-Dec-2014 08:47    160K
238-SimpleandProvableSecureStrongDesignatedVeri..> 20-Jan-2023 14:22     207
239-AShareCorrectableProtocolfortheShamirThresh..> 22-Dec-2014 08:47    133K
240-AttackonOkamotoetal39sNewShortSignatureSche..> 20-Jan-2023 08:40     63K
240-AttackonOkamotoetalsNewShortSignatureScheme..> 22-Dec-2014 08:47     64K
240-AttackonOkamotoetalsNewShortSignatureScheme..> 22-Dec-2014 08:47    173K
241-OnthebinarysequenceswithhighGF2linearcomple..> 22-Dec-2014 08:47    108K
241-OnthebinarysequenceswithhighGF2linearcomple..> 22-Dec-2014 08:47    136K
242-PrivateSearchingOnStreamingData.pdf            22-Dec-2014 08:46    341K
242-PrivateSearchingOnStreamingData.ps             22-Dec-2014 08:46    679K
243-CryptanalysisofSfinks.pdf                      22-Dec-2014 08:46    138K
243-CryptanalysisofSfinks.ps                       22-Dec-2014 08:46    310K
244-TheoreticalcryptanalysisoftheKlimovShamirnu..> 22-Dec-2014 08:46     76K
244-TheoreticalcryptanalysisoftheKlimovShamirnu..> 22-Dec-2014 08:46    214K
245-OntheAlgebraicImmunityofSymmetricBooleanFun..> 22-Dec-2014 08:46    258K
245-OntheAlgebraicImmunityofSymmetricBooleanFun..> 22-Dec-2014 08:46    479K
246-AVerifiableSecretShuffleofHomomorphicEncryp..> 22-Dec-2014 08:46    218K
246-AVerifiableSecretShuffleofHomomorphicEncryp..> 22-Dec-2014 08:46    356K
247-ASimpleandProvablyGoodCodeforSHAMessageExpa..> 22-Dec-2014 08:46    230K
247-ASimpleandProvablyGoodCodeforSHAMessageExpa..> 22-Dec-2014 08:46    516K
248-CollisionResistantusageofMD5andSHA1viaMessa..> 22-Dec-2014 08:46    172K
248-CollisionResistantusageofMD5andSHA1viaMessa..> 22-Dec-2014 08:46    319K
249-EfficientCertificatelessPublicKeyEncryption..> 20-Jan-2023 08:39    183K
250-Thetopologyofcovertconflict.pdf                22-Dec-2014 08:46    203K
251-FeistelSchemesandBiLinearCryptanalysis.pdf     22-Dec-2014 08:46    326K
251-FeistelSchemesandBiLinearCryptanalysis.ps      22-Dec-2014 08:46    623K
252-FasterPairingsusinganEllipticCurvewithanEff..> 22-Dec-2014 08:46    177K
253-SecurityNotionsforIdentityBasedEncryption.pdf  22-Dec-2014 08:46    337K
253-SecurityNotionsforIdentityBasedEncryption.ps   22-Dec-2014 08:46    650K
254-SearchableEncryptionRevisitedConsistencyPro..> 22-Dec-2014 08:46    555K
254-SearchableEncryptionRevisitedConsistencyPro..> 22-Dec-2014 08:46    901K
255-InoculatingMultivariateSchemesAgainstDiffer..> 22-Dec-2014 08:46    202K
256-FuzzyUniversalHashingandApproximateAuthenti..> 22-Dec-2014 08:46    298K
257-TMDTradeoffandStateEntropyLossConsideration..> 22-Dec-2014 08:46    221K
257-TMDTradeoffandStateEntropyLossConsideration..> 22-Dec-2014 08:46    199K
258-RelationsAmongNotionsofSecurityforIdentityB..> 22-Dec-2014 08:46    214K
258-RelationsAmongNotionsofSecurityforIdentityB..> 22-Dec-2014 08:46    438K
259-EfficientDelegationofPairingComputation.pdf    22-Dec-2014 08:46    108K
259-EfficientDelegationofPairingComputation.ps     22-Dec-2014 08:46    263K
260-PoweredTatePairingComputation.pdf              22-Dec-2014 08:46    143K
260-PoweredTatePairingComputation.ps               22-Dec-2014 08:46    319K
261-TheCramerShoupEncryptionSchemeisPlaintextAw..> 22-Dec-2014 08:46    289K
261-TheCramerShoupEncryptionSchemeisPlaintextAw..> 22-Dec-2014 08:45    458K
262-ConstantRoundMultipartyComputationUsingaBla..> 22-Dec-2014 08:45    229K
262-ConstantRoundMultipartyComputationUsingaBla..> 22-Dec-2014 08:45    393K
263-Wang39ssufficientconditionsofMD5arenotsuffi..> 20-Jan-2023 08:39    139K
263-WangssufficientconditionsofMD5arenotsuffici..> 22-Dec-2014 08:45    139K
264-OnanauthenticationschemebasedontheRootProbl..> 22-Dec-2014 08:45     99K
264-OnanauthenticationschemebasedontheRootProbl..> 22-Dec-2014 08:45    237K
265-SecurityAnalysisofKEAAuthenticatedKeyExchan..> 22-Dec-2014 08:45    183K
265-SecurityAnalysisofKEAAuthenticatedKeyExchan..> 22-Dec-2014 08:45    328K
266-AMatchingLowerBoundontheMinimumWeightofSHA1..> 22-Dec-2014 08:45     96K
266-AMatchingLowerBoundontheMinimumWeightofSHA1..> 22-Dec-2014 08:45    241K
267-StreamCipherDesignbasedonJumpingFiniteState..> 22-Dec-2014 08:45    213K
267-StreamCipherDesignbasedonJumpingFiniteState..> 22-Dec-2014 08:45    402K
268-SecureHumanComputerIdentificationInterfaceS..> 22-Dec-2014 08:45      3M
269-SecurityWeaknessinaThreePartyPasswordBasedK..> 22-Dec-2014 08:45    119K
269-SecurityWeaknessinaThreePartyPasswordBasedK..> 22-Dec-2014 08:45    483K
270-ExaminingIndistinguishabilityBasedProofMode..> 22-Dec-2014 08:45    308K
270-ExaminingIndistinguishabilityBasedProofMode..> 22-Dec-2014 08:45    636K
271-CacheattacksandCountermeasurestheCaseofAES.pdf 22-Dec-2014 08:45    713K
271-CacheattacksandCountermeasurestheCaseofAES.ps  22-Dec-2014 08:45      5M
272-AnAuthenticationProtocolForMobileAgentsUsin..> 22-Dec-2014 08:45    230K
273-CRYPTOGRAPHYBASEDONCHAOTICSYNCHRONIZATIONRO..> 22-Dec-2014 08:45    230K
274-PerformanceImprovementsandaBaselineParamete..> 22-Dec-2014 08:45    253K
275-ExplicitConstructionofSecureFrameproofCodes..> 22-Dec-2014 08:45    236K
276-UseofSparseandorComplexExponentsinBatchVeri..> 22-Dec-2014 08:45    277K
277-ScholtenFormsandEllipticHyperellipticCurves..> 22-Dec-2014 08:45    248K
277-ScholtenFormsandEllipticHyperellipticCurves..> 22-Dec-2014 08:45    268K
278-ANewRabintypeTrapdoorPermutationEquivalentt..> 22-Dec-2014 08:44    269K
278-ANewRabintypeTrapdoorPermutationEquivalentt..> 22-Dec-2014 08:44    245K
279-Efficientreductionof1outofnoblivioustransfe..> 22-Dec-2014 08:44    129K
279-Efficientreductionof1outofnoblivioustransfe..> 22-Dec-2014 08:44    271K
280-PartitionedCacheArchitectureasaSideChannelD..> 22-Dec-2014 08:44    187K
280-PartitionedCacheArchitectureasaSideChannelD..> 22-Dec-2014 08:44    205K
281-HerdingHashFunctionsandtheNostradamusAttack..> 22-Dec-2014 08:44    304K
282-SpreadingAlertsQuietlyandtheSubgroupEscapeP..> 22-Dec-2014 08:44    168K
282-SpreadingAlertsQuietlyandtheSubgroupEscapeP..> 22-Dec-2014 08:44    667K
283-RevisitingObliviousSignatureBasedEnvelopes.pdf 22-Dec-2014 08:44    162K
283-RevisitingObliviousSignatureBasedEnvelopes.ps  22-Dec-2014 08:44    259K
284-FoundationsandApplicationsforSecureTriggers..> 22-Dec-2014 08:44    231K
284-FoundationsandApplicationsforSecureTriggers.ps 22-Dec-2014 08:44    422K
285-GeneralizationsofRSApublickeycryptosystems.pdf 22-Dec-2014 08:44     93K
285-GeneralizationsofRSApublickeycryptosystems.ps  22-Dec-2014 08:44    225K
286-ConcurrentZeroKnowledgewithoutComplexityAss..> 22-Dec-2014 08:44    430K
286-ConcurrentZeroKnowledgewithoutComplexityAss..> 22-Dec-2014 08:44    690K
287-ProvableEfficientCertificatelessPublicKeyEn..> 22-Dec-2014 08:44    168K
287-ProvableEfficientCertificatelessPublicKeyEn..> 22-Dec-2014 08:44    325K
288-DirectChosenCiphertextSecurityfromIdentityB..> 22-Dec-2014 08:44    291K
288-DirectChosenCiphertextSecurityfromIdentityB..> 22-Dec-2014 08:44    527K
289-OverviewofKeyAgreementProtocols.pdf            22-Dec-2014 08:44    347K
289-OverviewofKeyAgreementProtocols.ps             22-Dec-2014 08:44    523K
290-PerfectNonInteractiveZeroKnowledgeforNP.pdf    22-Dec-2014 08:44    219K
290-PerfectNonInteractiveZeroKnowledgeforNP.ps     22-Dec-2014 08:44    314K
291-CryptographyIntheBoundedQuantumStorageModel..> 22-Dec-2014 08:44    330K
292-ImprovedIntegralCryptanalysisofFOXBlockCiph..> 22-Dec-2014 08:44    231K
293-SpeedingUpPairingComputation.pdf               22-Dec-2014 08:44     75K
294-OnFairnessinSimulatabilitybasedCryptographi..> 22-Dec-2014 08:44    338K
294-OnFairnessinSimulatabilitybasedCryptographi..> 22-Dec-2014 08:44    693K
295-HiddenExponentRSAandEfficientKeyDistributio..> 22-Dec-2014 08:44    113K
295-HiddenExponentRSAandEfficientKeyDistributio..> 22-Dec-2014 08:43    259K
296-AKeyEstablishmentIPCoreforUbiquitousComputi..> 22-Dec-2014 08:43    403K
296-AKeyEstablishmentIPCoreforUbiquitousComputi..> 22-Dec-2014 08:43    559K
297-DSACAnApproachtoEnsureIntegrityofOutsourced..> 22-Dec-2014 08:43    181K
297-DSACAnApproachtoEnsureIntegrityofOutsourced..> 22-Dec-2014 08:43    523K
298-KeepingDenialofServiceAttackersintheDark.pdf   22-Dec-2014 08:43    255K
299-NonlinearityoftheRoundFunction.pdf             22-Dec-2014 08:43    136K
300-TowardsSecurityTwopartAuthenticatedKeyAgree..> 22-Dec-2014 08:43    156K
300-TowardsSecurityTwopartAuthenticatedKeyAgree..> 22-Dec-2014 08:43    582K
301-OntheHardwareImplementationoftheMICKEY128St..> 22-Dec-2014 08:43     81K
302-EllipticCurvesforPairingApplications.pdf       22-Dec-2014 08:43    134K
302-EllipticCurvesforPairingApplications.ps        22-Dec-2014 08:43    331K
303-KeyRegressionEnablingEfficientKeyDistributi..> 22-Dec-2014 08:43    527K
304-RingSignaturesStrongerDefinitionsandConstru..> 22-Dec-2014 08:43    268K
304-RingSignaturesStrongerDefinitionsandConstru..> 22-Dec-2014 08:43    474K
305-SteganographywithImperfectSamplers.pdf         22-Dec-2014 08:43    247K
306-MurakamiKasaharaIDbasedKeySharingSchemeRevi..> 22-Dec-2014 08:43    208K
307-TheEquivalenceBetweentheDHPandDLPforEllipti..> 22-Dec-2014 08:43    355K
307-TheEquivalenceBetweentheDHPandDLPforEllipti..> 22-Dec-2014 08:43    315K
308-AdaptableGroupOrientedSignature.pdf            22-Dec-2014 08:43    119K
309-ANewEfficientIDBasedAuthenticatedKeyAgreeme..> 22-Dec-2014 08:43    107K
309-ANewEfficientIDBasedAuthenticatedKeyAgreeme..> 22-Dec-2014 08:43    239K
310-MetaRingSignature.pdf                          22-Dec-2014 08:43    121K
310-MetaRingSignature.ps                           22-Dec-2014 08:43     95K
311-WhatdoSboxesSayinDifferentialSideChannelAtt..> 22-Dec-2014 08:43    188K
312-ANewEfficientAlgorithmforSolvingSystemsofMu..> 22-Dec-2014 08:43    205K
313-DeterministicIdentityBasedSignaturesforPart..> 22-Dec-2014 08:43    173K
313-DeterministicIdentityBasedSignaturesforPart..> 22-Dec-2014 08:43    341K
314-Fastgenus2arithmeticbasedonThetafunctions.pdf  22-Dec-2014 08:43    188K
314-Fastgenus2arithmeticbasedonThetafunctions.ps   22-Dec-2014 08:43    378K
315-AScalableDelegatablePseudonymProtocolEnabli..> 22-Dec-2014 08:43    174K
316-CollisionAttackonXTRandaCountermeasurewitha..> 22-Dec-2014 08:43    290K
316-CollisionAttackonXTRandaCountermeasurewitha..> 22-Dec-2014 08:43    911K
317-RingSignatureswithoutRandomOracles.pdf         22-Dec-2014 08:42    152K
317-RingSignatureswithoutRandomOracles.ps          22-Dec-2014 08:42    330K
318-BoundsonBirthdayAttackTimes.pdf                22-Dec-2014 08:42    274K
319-IDbasedRestrictivePartiallyBlindSignaturesa..> 22-Dec-2014 08:42    170K
319-IDbasedRestrictivePartiallyBlindSignaturesa..> 22-Dec-2014 08:42    372K
320-EfficientIdentityBasedEncryptionwithTightSe..> 22-Dec-2014 08:42    303K
321-ExactMaximumExpectedDifferentialandLinearPr..> 22-Dec-2014 08:42    160K
321-ExactMaximumExpectedDifferentialandLinearPr..> 22-Dec-2014 08:42    409K
322-EvolutionaryDesignofTraceFormBentFunctions.pdf 22-Dec-2014 08:42    184K
323-TheWeilpairingonellipticcurvesoverC.pdf        22-Dec-2014 08:42    102K
324-Extractingbitsfromcoordinatesofapointofanel..> 22-Dec-2014 08:42    132K
324-Extractingbitsfromcoordinatesofapointofanel..> 22-Dec-2014 08:42    340K
325-AnEffectiveMethodtoImplementGroupSignaturew..> 22-Dec-2014 08:42    134K
325-AnEffectiveMethodtoImplementGroupSignaturew..> 22-Dec-2014 08:42    287K
326-ASuiteofNonPairingIDBasedThresholdRingSigna..> 22-Dec-2014 08:42    315K
327-OntheSecurityofEncryptionModesofMD4MD5andHA..> 22-Dec-2014 08:42    299K
327-OntheSecurityofEncryptionModesofMD4MD5andHA..> 22-Dec-2014 08:42    334K
328-OnConstructingUniversalOneWayHashFunctionsf..> 22-Dec-2014 08:42    299K
329-CryptographicProtocolstoPreventSpam.pdf        22-Dec-2014 08:42    668K
330-ADedicatedProcessorfortheetaPairing.pdf        22-Dec-2014 08:42    260K
331-AFuzzySketchwithTrapdoor.pdf                   22-Dec-2014 08:42    123K
331-AFuzzySketchwithTrapdoor.ps                    22-Dec-2014 08:42    287K
332-ClassificationofCubicn4resilientBooleanFunc..> 22-Dec-2014 08:42    178K
332-ClassificationofCubicn4resilientBooleanFunc..> 22-Dec-2014 08:42    405K
333-UniversallyComposableDiskEncryptionSchemes.pdf 22-Dec-2014 08:42    172K
334-SecureKeyUpdatingforLazyRevocation.pdf         22-Dec-2014 08:42    184K
334-SecureKeyUpdatingforLazyRevocation.ps          22-Dec-2014 08:42    347K
335-OneWaySignatureChainingANewParadigmForGroup..> 22-Dec-2014 08:42    324K
335-OneWaySignatureChainingANewParadigmForGroup..> 22-Dec-2014 08:42    686K
336-Pairingbasedidentificationschemes.pdf          22-Dec-2014 08:42    249K
337-StatisticalMultipartyComputationBasedonRand..> 22-Dec-2014 08:42    181K
338-AnImprovedPowerAnalysisAttackAgainstCamelli..> 20-Jan-2023 08:39    138K
338-AnImprovedPowerAnalysisAttackAgainstCamelli..> 22-Dec-2014 08:41    138K
339-IdentityBasedKeyAgreementwithUnilateralIden..> 22-Dec-2014 08:41    265K
339-IdentityBasedKeyAgreementwithUnilateralIden..> 22-Dec-2014 08:41    531K
340-ANewApproachtoCounteractDPAAttacksonBlockCi..> 20-Jan-2023 14:22     207
341-AUniversallyComposableSchemeforElectronicCa..> 22-Dec-2014 08:41    274K
341-AUniversallyComposableSchemeforElectronicCa..> 22-Dec-2014 08:41    899K
342-SpecialPolynomialFamiliesforGeneratingMoreS..> 22-Dec-2014 08:41    222K
343-ZeroKnowledgeBlindIdentificationForSmartCar..> 22-Dec-2014 08:41    329K
343-ZeroKnowledgeBlindIdentificationForSmartCar..> 22-Dec-2014 08:41      1M
344-Counteringchosenciphertextattacksagainstnon..> 22-Dec-2014 08:41    155K
344-Counteringchosenciphertextattacksagainstnon..> 22-Dec-2014 08:41    317K
345-GroupSignatureswithEfficientConcurrentJoin.pdf 22-Dec-2014 08:41    371K
346-BatchVerificationofValidityofBidsinHomomorp..> 22-Dec-2014 08:41    176K
346-BatchVerificationofValidityofBidsinHomomorp..> 22-Dec-2014 08:41    352K
347-KnapsackDiffieHellmanANewFamilyofDiffieHell..> 20-Jan-2023 14:22     207
348-OnProofsofSecurityforCertificatelessCryptos..> 20-Jan-2023 14:22     207
349-ObliviousTransferandLinearFunctions.pdf        22-Dec-2014 08:41    420K
349-ObliviousTransferandLinearFunctions.ps         22-Dec-2014 08:41    555K
350-IsSHA1conceptuallysound.pdf                    22-Dec-2014 08:41    253K
350-IsSHA1conceptuallysound.ps                     22-Dec-2014 08:41    238K
351-ErrorsinComputationalComplexityProofsforPro..> 22-Dec-2014 08:41    290K
351-ErrorsinComputationalComplexityProofsforPro..> 22-Dec-2014 08:41    596K
352-CandidateOneWayFunctionsandOneWayPermutatio..> 22-Dec-2014 08:41    350K
352-CandidateOneWayFunctionsandOneWayPermutatio..> 22-Dec-2014 08:41      5M
353-OntheSecurityofAGroupSignatureScheme.pdf       22-Dec-2014 08:41    135K
353-OntheSecurityofAGroupSignatureScheme.ps        22-Dec-2014 08:41    171K
354-PairingBasedTwoPartyAuthenticatedKeyAgreeme..> 22-Dec-2014 08:41    150K
354-PairingBasedTwoPartyAuthenticatedKeyAgreeme..> 22-Dec-2014 08:40    330K
355-IDbasedEncryptionSchemeSecureagainstChosenC..> 22-Dec-2014 08:40    114K
355-IDbasedEncryptionSchemeSecureagainstChosenC..> 22-Dec-2014 08:40    276K
356-ExponentialMemoryBoundFunctionsforProofofWo..> 22-Dec-2014 08:40    186K
357-CryptanalysisofTwoIDbasedAuthenticatedKeyAg..> 22-Dec-2014 08:40    115K
358-NormalBasisMultiplicationAlgorithmsforGF2nF..> 22-Dec-2014 08:40    297K
359-AninfiniteclassofquadraticAPNfunctionswhich..> 22-Dec-2014 08:40    162K
359-AninfiniteclassofquadraticAPNfunctionswhich..> 22-Dec-2014 08:40    349K
360-BurmesterDesmedtTreeBasedKeyTransportRevisi..> 22-Dec-2014 08:40    182K
360-BurmesterDesmedtTreeBasedKeyTransportRevisi..> 22-Dec-2014 08:40    479K
361-StrictAvalancheCriterionOverFiniteFields.pdf   22-Dec-2014 08:40    150K
361-StrictAvalancheCriterionOverFiniteFields.ps    22-Dec-2014 08:40    358K
362-OnaFlawedProposaltoBuildMorePairingFriendly..> 22-Dec-2014 08:40     25K
362-OnaFlawedProposaltoBuildMorePairingFriendly..> 22-Dec-2014 08:40     46K
363-EllipticCurveswithLowEmbeddingDegree.pdf       22-Dec-2014 08:40    397K
364-AdditiveProofsofKnowledgeANewNotionForNonIn..> 22-Dec-2014 08:40    157K
364-AdditiveProofsofKnowledgeANewNotionForNonIn..> 22-Dec-2014 08:40    373K
365-DerandomizationinCryptography.pdf              22-Dec-2014 08:40    265K
365-DerandomizationinCryptography.ps               22-Dec-2014 08:40    471K
366-EfficientCompilersforAuthenticatedGroupKeyE..> 22-Dec-2014 08:40    140K
366-EfficientCompilersforAuthenticatedGroupKeyE..> 22-Dec-2014 08:40    272K
367-SearchableKeywordBasedEncryption.pdf           22-Dec-2014 08:40    279K
368-TheProgramCounterSecurityModelAutomaticDete..> 22-Dec-2014 08:40    330K
369-SecureandslPracticalIdentityBasedEncryption..> 22-Dec-2014 08:40    199K
370-ResourceFairnessandComposabilityofCryptogra..> 22-Dec-2014 08:40    429K
370-ResourceFairnessandComposabilityofCryptogra..> 22-Dec-2014 08:40    696K
371-OnaTraitorTracingSchemefromACISP2003.pdf       22-Dec-2014 08:40    105K
372-SecretcolorimagessharingschemesbasedonXORop..> 22-Dec-2014 08:40    682K
373-EfficientBroadcastEncryptionSchemewithLogKe..> 22-Dec-2014 08:40    184K
373-EfficientBroadcastEncryptionSchemewithLogKe..> 22-Dec-2014 08:40      1M
374-ComputationofTatePairingforSupersingularCur..> 22-Dec-2014 08:40    172K
375-Truncateddifferentialcryptanalysisoffiverou..> 22-Dec-2014 08:39     59K
376-Representingsmallidenticallyselfdualmatroid..> 22-Dec-2014 08:39    194K
377-ExclusionIntersectionEncryption.pdf            22-Dec-2014 08:39    204K
377-ExclusionIntersectionEncryption.ps             22-Dec-2014 08:39    657K
378-ANewProtocolforConditionalDisclosureofSecre..> 22-Dec-2014 08:39    210K
379-HandlingExpectedPolynomialTimeStrategiesinS..> 22-Dec-2014 08:39    477K
379-HandlingExpectedPolynomialTimeStrategiesinS..> 22-Dec-2014 08:39    507K
380-BreakingRSAMayBeAsDifficultAsFactoring.pdf     22-Dec-2014 08:39    284K
381-CompactGroupSignaturesWithoutRandomOracles.pdf 22-Dec-2014 08:39    231K
382-OneWaynessEquivalenttoGeneralFactoring.pdf     22-Dec-2014 08:39    216K
383-KeyMixinginBlockCiphersthroughAdditionmodul..> 22-Dec-2014 08:39    218K
383-KeyMixinginBlockCiphersthroughAdditionmodul..> 22-Dec-2014 08:39    234K
384-SomeExplicitFormulaeofNAFanditsLefttoRightA..> 22-Dec-2014 08:39    170K
384-SomeExplicitFormulaeofNAFanditsLefttoRightA..> 22-Dec-2014 08:39    721K
385-PracticalGroupSignatureswithoutRandomOracle..> 22-Dec-2014 08:39    260K
386-ANewShortSignatureSchemeWithoutRandomOracle..> 22-Dec-2014 08:39    220K
386-ANewShortSignatureSchemeWithoutRandomOracle..> 22-Dec-2014 08:39    414K
387-OnhighlynonlinearSboxesandtheirinabilitytot..> 22-Dec-2014 08:39    239K
388-SideChannelAttacksTenYearsAfterItsPublicati..> 22-Dec-2014 08:39    584K
389-HowtoGenerateUniversallyVerifiableSignature..> 22-Dec-2014 08:39    210K
389-HowtoGenerateUniversallyVerifiableSignature..> 22-Dec-2014 08:39    406K
390-3CAProvablySecurePseudorandomFunctionandMes..> 22-Dec-2014 08:39    289K
390-3CAProvablySecurePseudorandomFunctionandMes..> 22-Dec-2014 08:39    574K
391-SomethoughtsonCollisionAttacksintheHashFunc..> 22-Dec-2014 08:39    156K
391-SomethoughtsonCollisionAttacksintheHashFunc..> 22-Dec-2014 08:39    342K
392-AnEfficientVariantofRSACryptosystem.pdf        22-Dec-2014 08:39     93K
393-MultivariateQuadraticPolynomialsinPublicKey..> 22-Dec-2014 08:39      1M
393-MultivariateQuadraticPolynomialsinPublicKey..> 22-Dec-2014 08:39      3M
394-HowtoShuffleinPublic.pdf                       22-Dec-2014 08:38    328K
395-SecureGroupKeyEstablishmentRevisited.pdf       22-Dec-2014 08:38    259K
396-DesignandAnalysisofaRobustandEfficientBlock..> 22-Dec-2014 08:38    231K
396-DesignandAnalysisofaRobustandEfficientBlock..> 22-Dec-2014 08:38    232K
397-EnhancingtheMDStrengtheningandDesigningScal..> 22-Dec-2014 08:38    200K
398-PreliminaryAnalysisofDHA256.pdf                22-Dec-2014 08:38    115K
399-Onaffinerankofspectrumsupportforplateauedfu..> 22-Dec-2014 08:38    238K
399-Onaffinerankofspectrumsupportforplateauedfu..> 22-Dec-2014 08:38    271K
400-ImprovedCollisionAttackonMD5.pdf               22-Dec-2014 08:38    160K
401-AComputationallySoundMechanizedProverforSec..> 22-Dec-2014 08:38    855K
401-AComputationallySoundMechanizedProverforSec..> 22-Dec-2014 08:38      2M
402-SomeAnalysisofRadixrRepresentations.pdf        22-Dec-2014 08:38    265K
402-SomeAnalysisofRadixrRepresentations.ps         22-Dec-2014 08:38    813K
403-CollisionsintheOriginalVersionofaChaoticHas..> 22-Dec-2014 08:38     53K
404-PreventingAttacksonMachineReadableTravelDoc..> 22-Dec-2014 08:38     90K
405-BuildingBetterSigncryptionSchemeswithTagKEM..> 22-Dec-2014 08:38    315K
405-BuildingBetterSigncryptionSchemeswithTagKEM..> 22-Dec-2014 08:38    538K
406-RelationsamountStatisticalSecurityNotionsor..> 22-Dec-2014 08:38    285K
406-RelationsamountStatisticalSecurityNotionsor..> 22-Dec-2014 08:38    543K
407-AnonymousSignatureSchemes.pdf                  22-Dec-2014 08:38    336K
408-CompartmentedSecretSharingBasedontheChinese..> 22-Dec-2014 08:38    146K
409-IntrusionResilientAuthenticationintheLimite..> 20-Jan-2023 14:22     207
410-ShortrespFastCCA2FullyAnonymousGroupSignatu..> 22-Dec-2014 08:38    276K
411-MoreCompactECashwithEfficientCoinTracing.pdf   22-Dec-2014 08:38    287K
412-ConstantSizeHierarchicalIdentityBasedSignat..> 22-Dec-2014 08:38    243K
413-VESTHardwareDedicatedStreamCiphers.pdf         20-Jan-2023 14:22     207
414-AuthenticatedEncryptionModeofVESTCiphers.pdf   20-Jan-2023 14:22     207
415-APresentationonVESTHardwarePerformanceChipA..> 20-Jan-2023 14:22     207
416-CryptographyinTheoryandPracticeTheCaseofEnc..> 22-Dec-2014 08:38    472K
417-CorrelationResistantStorageviaKeywordSearch..> 22-Dec-2014 08:38    264K
417-CorrelationResistantStorageviaKeywordSearch..> 22-Dec-2014 08:38    702K
418-GenericOnLineOffLineThresholdSignatures.pdf    22-Dec-2014 08:37    313K
419-UnifiedPointAdditionFormulaeandSideChannelA..> 22-Dec-2014 08:37    220K
419-UnifiedPointAdditionFormulandSideChannelAtt..> 20-Jan-2023 08:39    220K
420-EfficientScalarMultiplicationbyIsogenyDecom..> 22-Dec-2014 08:37    253K
420-EfficientScalarMultiplicationbyIsogenyDecom..> 22-Dec-2014 08:37    324K
421-KeydependentMessageSecurityunderActiveAttac..> 22-Dec-2014 08:37    290K
421-KeydependentMessageSecurityunderActiveAttac..> 22-Dec-2014 08:37    606K
422-OnAnonymityofGroupSignatures.pdf               22-Dec-2014 08:37    159K
423-IDbasedsignatureandKeyinsulatedthresholdsig..> 20-Jan-2023 14:22     207
424-EfficientMutualDataAuthenticationUsingManua..> 22-Dec-2014 08:37    214K
424-EfficientMutualDataAuthenticationUsingManua..> 22-Dec-2014 08:37    193K
425-ImprovedCollisionAttackonHashFunctionMD5.pdf   22-Dec-2014 08:37    314K
426-OntheSecurityofaCertificatelessPublicKeyEnc..> 22-Dec-2014 08:37    155K
427-SolutionstoKeyExposureProbleminRingSignatur..> 22-Dec-2014 08:37    244K
428-LoudandClearHumanVerifiableAuthenticationBa..> 22-Dec-2014 08:37    209K
428-LoudandClearHumanVerifiableAuthenticationBa..> 22-Dec-2014 08:37      2M
429-SignaturefromaNewSubgroupAssumption.pdf        22-Dec-2014 08:37    113K
430-FHASHSecuringHashFunctionsUsingFeistelChain..> 22-Dec-2014 08:37    336K
431-IsitpossibletohaveCBEfromCLPKE.pdf             22-Dec-2014 08:37    119K
431-IsitpossibletohaveCBEfromCLPKE.ps              22-Dec-2014 08:37    250K
432-OntheSecurityofKaweichel.pdf                   22-Dec-2014 08:37    151K
432-OntheSecurityofKaweichel.ps                    22-Dec-2014 08:37    148K
433-ProxyReSignaturesNewDefinitionsAlgorithmsan..> 22-Dec-2014 08:37    297K
434-PromptedUserRetrievalofSecretEntropyThePass..> 22-Dec-2014 08:37    135K
435-ConcurrentBlindSignatureswithoutRandomOracl..> 22-Dec-2014 08:37    296K
436-ANoteontheKasamiPowerFunction.pdf              22-Dec-2014 08:37     60K
437-OnBooleanfunctionswithmaximumalgebraicimmun..> 20-Jan-2023 14:22     207
438-MinimalAssumptionsforEfficientMercurialComm..> 22-Dec-2014 08:37    198K
438-MinimalAssumptionsforEfficientMercurialComm..> 22-Dec-2014 08:37    310K
439-AnoteonthenspendableextensionofFerguson39ss..> 20-Jan-2023 08:39    113K
439-AnoteonthenspendableextensionofFergusonssin..> 22-Dec-2014 08:37    113K
440-HBaLightweightAuthenticationProtocolSecurea..> 20-Jan-2023 14:22     207
441-Tightboundbetweennonlinearityandalgebraicim..> 22-Dec-2014 08:37    129K
441-Tightboundbetweennonlinearityandalgebraicim..> 22-Dec-2014 08:37    119K
442-OneTimeSignaturesRevisitedHaveTheyBecomePra..> 22-Dec-2014 08:37    209K
443-RevisedBlockCipherBasedHashFunctionConstruc..> 22-Dec-2014 08:37    145K
444-PrivacyPreservingPollingusingPlayingCards.pdf  22-Dec-2014 08:37    145K
445-AnAnonymousAuthenticationSchemeforTrustedCo..> 22-Dec-2014 08:36    147K
445-AnAnonymousAuthenticationSchemeforTrustedCo..> 22-Dec-2014 08:36    308K
446-DemocraticGroupSignaturesonExampleofJointVe..> 22-Dec-2014 08:36    234K
447-Anewkeyexchangeprotocolbasedonthedecomposit..> 22-Dec-2014 08:36    149K
448-OntheInsecurityofStreamCiphersBasedonArrays..> 22-Dec-2014 08:36    201K
448-OntheInsecurityofStreamCiphersBasedonArrays..> 22-Dec-2014 08:36    472K
449-OntheBooleanfunctionsWithMaximumPossibleAlg..> 22-Dec-2014 08:36    163K
450-ImprovementofManiketalsremoteuserauthentica..> 22-Dec-2014 08:36    417K
451-WeaknessesoftheBoydMaoDeniableAuthenticated..> 22-Dec-2014 08:36    376K
452-UsingProbabilisticIOAutomatatoAnalyzeanObli..> 22-Dec-2014 08:36    701K
453-FurtherConstructionsofAlmostResilientFuncti..> 22-Dec-2014 08:36    184K
454-EfficientArithmeticonSubfieldEllipticCurves..> 22-Dec-2014 08:36    214K
454-EfficientArithmeticonSubfieldEllipticCurves..> 22-Dec-2014 08:36    599K
455-EnhancingCKModelforKeyCompromiseImpersonati..> 22-Dec-2014 08:36    277K
456-ASecureSchemeforAuthenticatedEncryption.pdf    22-Dec-2014 08:36    143K
457-WeaknessofshimsNewIDbasedtripartitemultiple..> 22-Dec-2014 08:36     63K
458-Seifert39sRSAFaultAttackSimplifiedAnalysisa..> 20-Jan-2023 08:39     73K
458-SeifertsRSAFaultAttackSimplifiedAnalysisand..> 22-Dec-2014 08:36     74K
458-SeifertsRSAFaultAttackSimplifiedAnalysisand..> 22-Dec-2014 08:36    112K
459-APracticalAttackontheRootProbleminBraidGrou..> 22-Dec-2014 08:36    168K
459-APracticalAttackontheRootProbleminBraidGrou..> 22-Dec-2014 08:36    358K
460-OneTimeHNPorAttacksonaFlawedElGamalRevisite..> 22-Dec-2014 08:36     68K
461-ParallelandConcurrentSecurityoftheHBandHBPr..> 22-Dec-2014 08:36    189K
461-ParallelandConcurrentSecurityoftheHBandHBPr..> 22-Dec-2014 08:36    367K
462-ASimplifiedQuadraticFrobeniusPrimalityTest.pdf 22-Dec-2014 08:36    357K
462-ASimplifiedQuadraticFrobeniusPrimalityTest.ps  22-Dec-2014 08:36    395K
463-Moreshortsignatureswithoutrandomoracles.pdf    22-Dec-2014 08:36    289K
464-EquivalentKeysinMultivariateQuadraticPublic..> 22-Dec-2014 08:36    278K
464-EquivalentKeysinMultivariateQuadraticPublic..> 22-Dec-2014 08:36    550K
465-Asequenceapproachtoconstructingperfecthashf..> 22-Dec-2014 08:36    271K
466-CryptanalysisoftheYangWang39spasswordauthen..> 20-Jan-2023 08:39    159K
466-CryptanalysisoftheYangWangspasswordauthenti..> 22-Dec-2014 08:36    159K
467-AProbabilisticHoarestylelogicforGamebasedCr..> 22-Dec-2014 08:36    251K
468-BlindAttacksonEngineeringSamples.pdf           22-Dec-2014 08:36    148K
469-Alowerboundonthehigherordernonlinearityofal..> 22-Dec-2014 08:35    129K