Index of /2005/
../
001-OnObfuscatingPointFunctions.pdf 22-Dec-2014 08:57 228K
001-OnObfuscatingPointFunctions.ps 22-Dec-2014 08:57 442K
002-LogcryptForwardSecurityandPublicVerificatio..> 22-Dec-2014 08:57 422K
002-LogcryptForwardSecurityandPublicVerificatio..> 22-Dec-2014 08:57 948K
003-CryptanalysisofHijibijbijHBB.pdf 22-Dec-2014 08:57 92K
004-BenesandButterflyschemesrevisited.pdf 22-Dec-2014 08:57 269K
004-BenesandButterflyschemesrevisited.ps 22-Dec-2014 08:57 520K
005-Asufficientconditionforkeyprivacy.pdf 22-Dec-2014 08:57 63K
005-Asufficientconditionforkeyprivacy.ps 22-Dec-2014 08:57 161K
006-AMetricontheSetofEllipticCurvesovermathbfF_..> 22-Dec-2014 08:57 106K
006-AMetricontheSetofEllipticCurvesovermathbfF_..> 22-Dec-2014 08:57 55K
007-TheMisuseofRC4inMicrosoftWordandExcel.pdf 22-Dec-2014 08:57 124K
007-TheMisuseofRC4inMicrosoftWordandExcel.ps 22-Dec-2014 08:57 395K
008-CommentsonDistributedSymmetricKeyManagement..> 20-Jan-2023 08:40 141K
008-CommentsonDistributedSymmetricKeyManagement..> 22-Dec-2014 08:57 75K
008-CommentsonDistributedSymmetricKeyManagement..> 22-Dec-2014 08:57 186K
009-Mixingpropertiesoftriangularfeedbackshiftre..> 22-Dec-2014 08:57 510K
010-UpdateonSHA1.pdf 22-Dec-2014 08:57 156K
010-UpdateonSHA1.ps 22-Dec-2014 08:57 327K
011-AnImprovedElegantMethodtoReinitializeHashCh..> 22-Dec-2014 08:57 103K
012-EfficientCertificatelessPublicKeyEncryption..> 22-Dec-2014 08:57 243K
012-EfficientCertificatelessPublicKeyEncryption.ps 22-Dec-2014 08:57 457K
013-CommentsInsiderattackonChengetal39spairingb..> 20-Jan-2023 08:40 82K
013-CommentsInsiderattackonChengetalspairingbas..> 22-Dec-2014 08:57 82K
014-AChosenCiphertextAttackonaPublicKeyCryptosy..> 22-Dec-2014 08:57 226K
014-AChosenCiphertextAttackonaPublicKeyCryptosy..> 22-Dec-2014 08:57 245K
015-HierarchicalIdentityBasedEncryptionwithCons..> 22-Dec-2014 08:57 313K
015-HierarchicalIdentityBasedEncryptionwithCons..> 22-Dec-2014 08:57 560K
016-NarrowTfunctions.pdf 22-Dec-2014 08:57 328K
016-NarrowTfunctions.ps 22-Dec-2014 08:57 3M
017-SideChannelAttacksonImplementationsofCurveB..> 22-Dec-2014 08:56 270K
018-CollusionResistantBroadcastEncryptionWithSh..> 22-Dec-2014 08:56 227K
019-TheFullAbstractionoftheUCFramework.pdf 22-Dec-2014 08:56 256K
020-DeCompositionsofCryptographicSchemesandthei..> 22-Dec-2014 08:56 239K
020-DeCompositionsofCryptographicSchemesandthei..> 22-Dec-2014 08:56 382K
021-PartialHidinginPublicKeyCryptography.pdf 22-Dec-2014 08:56 188K
021-PartialHidinginPublicKeyCryptography.ps 22-Dec-2014 08:56 1015K
022-AnImprovedandEfficientCountermeasureagainst..> 22-Dec-2014 08:56 148K
022-AnImprovedandEfficientCountermeasureagainst..> 22-Dec-2014 08:56 332K
023-AConstructionofPublicKeyCryptosystemUsingAl..> 22-Dec-2014 08:56 299K
024-WeakkeysoftheDiffeHellmankeyexchangeI.pdf 22-Dec-2014 08:56 211K
025-AnalysisofAffinelyEquivalentBooleanFunction..> 22-Dec-2014 08:56 110K
025-AnalysisofAffinelyEquivalentBooleanFunction..> 22-Dec-2014 08:56 250K
026-Techniquesforrandommaskininhardware.pdf 22-Dec-2014 08:56 287K
026-Techniquesforrandommaskininhardware.ps 22-Dec-2014 08:56 451K
027-TagKEMDEMANewFrameworkforHybridEncryption.pdf 22-Dec-2014 08:56 415K
027-TagKEMDEMANewFrameworkforHybridEncryption.ps 22-Dec-2014 08:56 690K
028-ImprovedProxyReEncryptionSchemeswithApplica..> 22-Dec-2014 08:56 179K
029-Amodelandarchitectureforpseudorandomgenerat..> 22-Dec-2014 08:56 241K
029-Amodelandarchitectureforpseudorandomgenerat..> 22-Dec-2014 08:56 433K
030-WeakkeysoftheDiffieHellmankeyexchangeIIPair..> 22-Dec-2014 08:56 218K
031-TheVectorDecompositionProblemforEllipticand..> 22-Dec-2014 08:56 248K
031-TheVectorDecompositionProblemforEllipticand..> 22-Dec-2014 08:56 243K
032-OntheNotionofStatisticalSecurityinSimulatab..> 22-Dec-2014 08:56 220K
032-OntheNotionofStatisticalSecurityinSimulatab..> 22-Dec-2014 08:56 468K
033-AnAttackonCFBModeEncryptionAsUsedByOpenPGP.pdf 22-Dec-2014 08:56 150K
034-FlexibleFrameworkforSecretHandshakesMultiPa..> 22-Dec-2014 08:56 345K
035-AnEfficientCDHbasedSignatureSchemeWithaTigh..> 22-Dec-2014 08:56 300K
035-AnEfficientCDHbasedSignatureSchemeWithaTigh..> 22-Dec-2014 08:56 510K
036-ConcurrentCompositionofSecureProtocolsinthe..> 22-Dec-2014 08:55 642K
036-ConcurrentCompositionofSecureProtocolsinthe..> 22-Dec-2014 08:55 1M
037-ImprovingSecureServerPerformancebyRebalanci..> 22-Dec-2014 08:55 180K
037-ImprovingSecureServerPerformancebyRebalanci..> 22-Dec-2014 08:55 390K
038-Cryptanalysisofimprovementofdigitalsignatur..> 20-Jan-2023 14:22 207
039-DistinguishingStreamCipherswithConvolutiona..> 22-Dec-2014 08:55 255K
040-Unfairnessofaprotocolforcertifieddelivery.pdf 22-Dec-2014 08:55 105K
040-Unfairnessofaprotocolforcertifieddelivery.ps 22-Dec-2014 08:55 349K
041-OntheSecurityofaGroupSignatureSchemewithStr..> 22-Dec-2014 08:55 91K
041-OntheSecurityofaGroupSignatureSchemewithStr..> 22-Dec-2014 08:55 229K
042-PolyhedronsoverFiniteAbelianGroupsandTheirC..> 22-Dec-2014 08:55 98K
042-PolyhedronsoverFiniteAbelianGroupsandTheirC..> 22-Dec-2014 08:55 282K
043-AnEfficientSolutiontoTheMillionaires39Probl..> 20-Jan-2023 08:40 153K
043-AnEfficientSolutiontoTheMillionairesProblem..> 22-Dec-2014 08:55 141K
043-AnEfficientSolutiontoTheMillionairesProblem..> 22-Dec-2014 08:55 307K
044-Ontheaffineclassificationofcubicbentfunctio..> 22-Dec-2014 08:55 128K
044-Ontheaffineclassificationofcubicbentfunctio..> 22-Dec-2014 08:55 292K
045-ChoosingParameterSetsforNTRUEncryptwithNAEP..> 22-Dec-2014 08:55 264K
046-NewApproachesforDeniableAuthentication.pdf 22-Dec-2014 08:55 410K
047-Cryptanalysisofananonymouswirelessauthentic..> 22-Dec-2014 08:55 119K
048-Cryptanalysisoftwoidentificationschemesbase..> 22-Dec-2014 08:55 89K
049-AdversarialModelforRadioFrequencyIdentifica..> 22-Dec-2014 08:55 233K
050-DavidChaum39sVoterVerificationusingEncrypte..> 20-Jan-2023 08:40 354K
050-DavidChaumsVoterVerificationusingEncryptedP..> 22-Dec-2014 08:55 354K
051-ANoteonShor39sQuantumAlgorithmforPrimeFacto..> 20-Jan-2023 08:40 102K
051-ANoteonShorsQuantumAlgorithmforPrimeFactori..> 22-Dec-2014 08:55 67K
051-ANoteonShorsQuantumAlgorithmforPrimeFactori..> 22-Dec-2014 08:55 181K
052-PickingVirtualPocketsusingRelayAttacksonCon..> 22-Dec-2014 08:55 246K
053-AnApproachTowardsRebalancedRSACRTwithShortP..> 22-Dec-2014 08:55 176K
054-CommentoncryptanalysisofTsengetalsauthentic..> 20-Jan-2023 14:22 207
055-UntraceabilityofTwoGroupSignatureSchemes.pdf 22-Dec-2014 08:55 87K
055-UntraceabilityofTwoGroupSignatureSchemes.ps 22-Dec-2014 08:55 221K
056-DeniableAuthenticationwithRSAandMulticastin..> 22-Dec-2014 08:55 235K
056-DeniableAuthenticationwithRSAandMulticastin..> 22-Dec-2014 08:55 218K
057-TightReductionsamongStrongDieHellmanAssumpt..> 22-Dec-2014 08:55 154K
057-TightReductionsamongStrongDiffieHellmanAssu..> 20-Jan-2023 08:40 154K
058-GenericConstructionsofIdentityBasedandCerti..> 22-Dec-2014 08:55 356K
058-GenericConstructionsofIdentityBasedandCerti..> 22-Dec-2014 08:55 372K
059-Secretsharingschemesongraphs.pdf 22-Dec-2014 08:55 149K
060-CompactECash.pdf 22-Dec-2014 08:54 370K
061-KeyDerivationandRandomnessExtraction.pdf 22-Dec-2014 08:54 334K
061-KeyDerivationandRandomnessExtraction.ps 22-Dec-2014 08:54 602K
062-CryptanalysisofOneFairEcashSystem.pdf 20-Jan-2023 14:22 207
063-OntheKeyScheduleofBlowfish.pdf 20-Jan-2023 14:22 207
064-OnEfficientKeyAgreementProtocols.pdf 22-Dec-2014 08:54 108K
065-EfficienthardwarefortheTatepairingcalculati..> 22-Dec-2014 08:54 300K
065-EfficienthardwarefortheTatepairingcalculati..> 22-Dec-2014 08:54 1M
066-UnconditionallySecureConstantRoundMultiPart..> 22-Dec-2014 08:54 295K
066-UnconditionallySecureConstantRoundMultiPart..> 22-Dec-2014 08:54 516K
067-CollidingX509Certificates.pdf 22-Dec-2014 08:54 95K
068-NadicSummationShrinkingGeneratorBasicproper..> 22-Dec-2014 08:54 270K
068-NadicSummationShrinkingGeneratorBasicproper..> 22-Dec-2014 08:54 5M
069-FastEllipticCurvePointMultiplicationusingDo..> 22-Dec-2014 08:54 147K
069-FastEllipticCurvePointMultiplicationusingDo..> 22-Dec-2014 08:54 300K
070-Onpublickeycryptosystemsbasedoncombinatoria..> 22-Dec-2014 08:54 201K
071-Afastparallelscalarmultiplicationagainstsid..> 20-Jan-2023 14:22 207
072-PracticalLatticeBasisSamplingReduction.pdf 22-Dec-2014 08:54 364K
072-PracticalLatticeBasisSamplingReduction.ps 22-Dec-2014 08:54 1M
073-BROADCASTENCRYPTIONpi.pdf 22-Dec-2014 08:54 450K
073-BROADCASTENCRYPTIONpi.ps 22-Dec-2014 08:54 2M
074-Computationallysoundimplementationsofequati..> 22-Dec-2014 08:54 395K
074-Computationallysoundimplementationsofequati..> 22-Dec-2014 08:54 665K
075-FindingMD5CollisionsaToyForaNotebook.pdf 22-Dec-2014 08:54 83K
076-PairingBasedCryptographyatHighSecurityLevel..> 22-Dec-2014 08:54 383K
077-TaxonomyofPublicKeySchemesbasedontheproblem..> 22-Dec-2014 08:54 476K
077-TaxonomyofPublicKeySchemesbasedontheproblem..> 22-Dec-2014 08:54 751K
078-DualitybetweenMultiplicationandModularReduc..> 22-Dec-2014 08:54 175K
078-DualitybetweenMultiplicationandModularReduc..> 22-Dec-2014 08:53 383K
079-ZeroKnowledgeProofsforMixnetsofSecretShares..> 22-Dec-2014 08:53 295K
079-ZeroKnowledgeProofsforMixnetsofSecretShares..> 22-Dec-2014 08:53 566K
080-AQKDProtocolExtendabletoSupportEntanglement..> 22-Dec-2014 08:53 192K
081-SmashingSMASH.pdf 20-Jan-2023 14:22 207
082-SomepropertiesofanFSE2005HashProposal.pdf 22-Dec-2014 08:53 50K
082-SomepropertiesofanFSE2005HashProposal.ps 22-Dec-2014 08:53 136K
083-Securitynotionsfordiskencryption.pdf 22-Dec-2014 08:53 164K
084-OnResistanceofDEStoRelatedKeyDifferentialCr..> 22-Dec-2014 08:53 197K
084-OnResistanceofDEStoRelatedKeyDifferentialCr..> 22-Dec-2014 08:53 274K
085-AnewstructuralattackforGPTandvariants.pdf 20-Jan-2023 14:22 207
086-SimplePseudorandomNumberGeneratorwithStreng..> 22-Dec-2014 08:53 223K
087-AESsidechannelattackprotectionusingrandomis..> 22-Dec-2014 08:53 60K
088-TheMACfunctionPelican20.pdf 22-Dec-2014 08:53 85K
089-Cryptographer39sToolkitforConstructionof8Bi..> 20-Jan-2023 08:40 483K
089-CryptographersToolkitforConstructionof8BitB..> 22-Dec-2014 08:53 483K
090-RediscoveryofTimeMemoryTradeoffs.pdf 22-Dec-2014 08:53 264K
090-RediscoveryofTimeMemoryTradeoffs.ps 22-Dec-2014 08:53 235K
091-DistributedPhishingAttacks.pdf 22-Dec-2014 08:53 148K
092-PRFDomainExtensionUsingDAGs.pdf 22-Dec-2014 08:53 275K
092-PRFDomainExtensionUsingDAGs.ps 22-Dec-2014 08:53 392K
093-AnIDBasedKeyAgreementSchemefrompairing.pdf 22-Dec-2014 08:53 182K
094-ASurveyonIDBasedCryptographicPrimitives.pdf 22-Dec-2014 08:53 305K
094-ASurveyonIDBasedCryptographicPrimitives.ps 22-Dec-2014 08:53 573K
095-SecurityandPrivacyIssuesinEpassports.pdf 22-Dec-2014 08:53 222K
095-SecurityandPrivacyIssuesinEpassports.ps 22-Dec-2014 08:53 2M
096-AlmostPerfectNonlinearMonomialsoverGF2nforI..> 22-Dec-2014 08:53 227K
096-AlmostPerfectNonlinearMonomialsoverGF2nforI..> 22-Dec-2014 08:53 417K
097-ComputationallySoundVerificationofSecurityP..> 22-Dec-2014 08:53 213K
097-ComputationallySoundVerificationofSecurityP..> 22-Dec-2014 08:53 390K
098-ProbabilisticOpacityforaPassiveAdversaryand..> 20-Jan-2023 08:40 223K
098-ProbabilisticOpacityforaPassiveAdversaryand..> 22-Dec-2014 08:53 228K
098-ProbabilisticOpacityforaPassiveAdversaryand..> 22-Dec-2014 08:53 436K
099-TimeDataMemoryTradeOffBasedCryptanalysisofC..> 22-Dec-2014 08:53 245K
100-almostenumerationof8variablebentfunctions.pdf 22-Dec-2014 08:53 189K
101-SoundnessandCompletenessofFormalLogicsofSym..> 22-Dec-2014 08:53 470K
102-FindingMD5CollisionsonaNotebookPCUsingMulti..> 22-Dec-2014 08:52 102K
103-CryptanalysisandimprovementofanIDbasedadhoc..> 22-Dec-2014 08:52 112K
103-CryptanalysisandimprovementofanIDbasedadhoc..> 22-Dec-2014 08:52 281K
104-OnestimatingthelatticesecurityofNTRU.pdf 22-Dec-2014 08:52 104K
104-OnestimatingthelatticesecurityofNTRU.ps 22-Dec-2014 08:52 227K
105-OnErrorCorrectionintheExponent.pdf 22-Dec-2014 08:52 208K
105-OnErrorCorrectionintheExponent.ps 22-Dec-2014 08:52 400K
106-HowToPlayAlmostAnyMentalGameOverTheNetConcu..> 22-Dec-2014 08:52 518K
106-HowToPlayAlmostAnyMentalGameOverTheNetConcu..> 22-Dec-2014 08:52 799K
107-AUniformFrameworkforCryptanalysisoftheBluet..> 22-Dec-2014 08:52 245K
108-EfficientIdentityBasedandAuthenticatedKeyAg..> 22-Dec-2014 08:52 223K
108-EfficientIdentityBasedandAuthenticatedKeyAg..> 22-Dec-2014 08:52 372K
109-APublicKeyCryptosystemBasedonSingularCubicC..> 22-Dec-2014 08:52 124K
110-DiffieHellmankeyexchangeprotocolandnonabeli..> 22-Dec-2014 08:52 211K
110-DiffieHellmankeyexchangeprotocolandnonabeli..> 22-Dec-2014 08:52 417K
111-WeakCompositeDiffieHellmanisnotWeakerthanFa..> 22-Dec-2014 08:52 127K
112-Ontherelationshipbetweensquaredpairingsandp..> 22-Dec-2014 08:52 202K
112-Ontherelationshipbetweensquaredpairingsandp..> 22-Dec-2014 08:52 182K
113-PartiallyFixedPointMultiplication.pdf 22-Dec-2014 08:52 269K
113-PartiallyFixedPointMultiplication.ps 22-Dec-2014 08:52 287K
114-IntrusionResilientSecureChannels.pdf 22-Dec-2014 08:52 468K
114-IntrusionResilientSecureChannels.ps 22-Dec-2014 08:52 787K
115-CharacteristicsofKeyDependentSBoxestheCaseo..> 22-Dec-2014 08:52 152K
115-CharacteristicsofKeyDependentSBoxestheCaseo..> 22-Dec-2014 08:52 302K
116-OnComputableIsomorphismsinEfficientAsymmetr..> 22-Dec-2014 08:52 167K
116-OnComputableIsomorphismsinEfficientAsymmetr..> 22-Dec-2014 08:52 353K
117-BonehFranklinIdentityBasedEncryptionRevisit..> 22-Dec-2014 08:52 188K
117-BonehFranklinIdentityBasedEncryptionRevisit..> 22-Dec-2014 08:52 418K
118-ResultsonRotationSymmetricBentFunctions.pdf 22-Dec-2014 08:52 138K
118-ResultsonRotationSymmetricBentFunctions.ps 22-Dec-2014 08:52 324K
119-IndexCalculusinClassGroupsofPlaneCurvesofSm..> 22-Dec-2014 08:52 335K
119-IndexCalculusinClassGroupsofPlaneCurvesofSm..> 22-Dec-2014 08:52 506K
120-OnDesignatedlyVerifiedNoninteractiveWaterma..> 22-Dec-2014 08:52 164K
121-PassthoughtsAuthenticatingWithOurMinds.pdf 22-Dec-2014 08:52 175K
122-BreakingandRepairingTrapdoorfreeGroupSignat..> 22-Dec-2014 08:52 173K
123-AccumulatorsfromBilinearPairingsandApplicat..> 22-Dec-2014 08:52 308K
123-AccumulatorsfromBilinearPairingsandApplicat..> 22-Dec-2014 08:52 581K
124-AppendOnlySignatures.pdf 22-Dec-2014 08:51 403K
124-AppendOnlySignatures.ps 22-Dec-2014 08:51 721K
125-SPAResistantLefttoRightIntegerRecodings.pdf 22-Dec-2014 08:51 95K
125-SPAResistantLefttoRightIntegerRecodings.ps 22-Dec-2014 08:51 91K
126-OntheStatisticallyOptimalDivideandConquerCo..> 22-Dec-2014 08:51 166K
127-BrowserModelforSecurityAnalysisofBrowserBas..> 22-Dec-2014 08:51 554K
128-ImprovetheBehaviorofXLFamilybyReducingtheEx..> 20-Jan-2023 14:22 207
129-OnTheIndistinguishabilityBasedSecurityModel..> 22-Dec-2014 08:51 414K
129-OnTheIndistinguishabilityBasedSecurityModel..> 22-Dec-2014 08:51 695K
130-ResultsonRotationSymmetricBooleanFunctionso..> 20-Jan-2023 14:22 207
131-DynamicGroupKeyAgreementinTreeBasedSetting.pdf 22-Dec-2014 08:51 265K
131-DynamicGroupKeyAgreementinTreeBasedSetting.ps 22-Dec-2014 08:51 322K
132-FormalNotionsofAnonymityforPeertopeerNetwor..> 22-Dec-2014 08:51 171K
132-FormalNotionsofAnonymityforPeertopeerNetwor..> 22-Dec-2014 08:51 303K
133-PairingFriendlyEllipticCurvesofPrimeOrder.pdf 22-Dec-2014 08:51 161K
133-PairingFriendlyEllipticCurvesofPrimeOrder.ps 22-Dec-2014 08:51 340K
134-BroadcastAuthenticationWithHashedRandomPrel..> 22-Dec-2014 08:51 202K
135-Designofnearoptimalpseudorandomfunctionsand..> 22-Dec-2014 08:51 196K
135-Designofnearoptimalpseudorandomfunctionsand..> 22-Dec-2014 08:51 371K
136-SkippingCascadeandCombinedChainSchemesforBr..> 22-Dec-2014 08:51 285K
137-ASenderVerifiableMixNetandaNewProofofaShuff..> 22-Dec-2014 08:51 679K
137-ASenderVerifiableMixNetandaNewProofofaShuff..> 22-Dec-2014 08:51 2M
138-IHARPSAnEfficientKeyPredistributionScheme.pdf 22-Dec-2014 08:51 291K
139-Scalingsecurityinpairingbasedprotocols.pdf 22-Dec-2014 08:51 205K
140-HowtoSplitaSharedSecretintoSharedBitsinCons..> 22-Dec-2014 08:51 179K
140-HowtoSplitaSharedSecretintoSharedBitsinCons..> 22-Dec-2014 08:51 720K
141-Enhancedpasswordbasedkeyestablishmentprotoc..> 22-Dec-2014 08:51 111K
142-BroadcastEncryptionwithRandomKeyPredistribu..> 22-Dec-2014 08:51 139K
143-MultipartyComputationBasedonConnectivityofG..> 22-Dec-2014 08:51 164K
144-KaweichelanExtensionofBlowfishfor64BitArchi..> 22-Dec-2014 08:51 141K
144-KaweichelanExtensionofBlowfishfor64BitArchi..> 22-Dec-2014 08:51 138K
145-SmallSecureSketchforPointSetDifference.pdf 22-Dec-2014 08:51 206K
146-AHighSpeedArchitectureforGaloisCounterModeo..> 22-Dec-2014 08:50 542K
147-TamperEvidentDigitalSignaturesProtectingCer..> 22-Dec-2014 08:50 147K
148-OnUniversalComposableSecurityofTimeStamping..> 22-Dec-2014 08:50 807K
149-ConditionallyVerifiableSignatures.pdf 22-Dec-2014 08:50 209K
150-SecureDelegationofEllipticCurvePairing.pdf 22-Dec-2014 08:50 133K
150-SecureDelegationofEllipticCurvePairing.ps 22-Dec-2014 08:50 298K
151-ImprovedCollisionAttackonMD4.pdf 22-Dec-2014 08:50 99K
152-OnHighRateCryptographicCompressionFunctions..> 22-Dec-2014 08:50 142K
152-OnHighRateCryptographicCompressionFunctions.ps 22-Dec-2014 08:50 353K
153-OnSecurityofKoyamaSchemes.pdf 22-Dec-2014 08:50 106K
154-SecureStochasticMultipartyComputationforCom..> 22-Dec-2014 08:50 202K
154-SecureStochasticMultipartyComputationforCom..> 22-Dec-2014 08:50 1M
155-PyRooAFastandSecureStreamCipherusingRolling..> 22-Dec-2014 08:50 163K
155-PyRooAFastandSecureStreamCipherusingRolling..> 22-Dec-2014 08:50 319K
156-Onthesecurityofsomepasswordbasedkeyagreemen..> 22-Dec-2014 08:50 104K
157-FOXAlgorithmImplementationahardwaredesignap..> 22-Dec-2014 08:50 178K
158-GeometricCryptosystem.pdf 22-Dec-2014 08:50 718K
159-OnConstructingParallelPseudorandomGenerator..> 22-Dec-2014 08:50 297K
159-OnConstructingParallelPseudorandomGenerator..> 22-Dec-2014 08:50 512K
160-FirstStepsTowardaCryptographyAwareLanguagea..> 22-Dec-2014 08:50 330K
160-FirstStepsTowardaCryptographyAwareLanguagea..> 22-Dec-2014 08:50 996K
161-MultipleforgeryattacksagainstMessageAuthent..> 22-Dec-2014 08:50 143K
162-AProvablySecureandEfficientVerifiableShuffl..> 22-Dec-2014 08:50 229K
162-AProvablySecureandEfficientVerifiableShuffl..> 22-Dec-2014 08:50 445K
163-ModelingInsiderAttacksonGroupKeyExchangePro..> 22-Dec-2014 08:50 253K
164-ADistinguishattackonCOSvdCiphers.pdf 22-Dec-2014 08:50 101K
165-CRYPTOGRAPHICMERSENNETWISTERANDFUBUKISTREAM..> 22-Dec-2014 08:50 185K
166-Tatepairingcomputationonthedivisorsofhypere..> 22-Dec-2014 08:50 235K
167-EfficientComputationoftheTatePairingonHyper..> 20-Jan-2023 14:22 207
168-DynamickTimesAnonymousAuthentication.pdf 22-Dec-2014 08:50 204K
168-DynamickTimesAnonymousAuthentication.ps 22-Dec-2014 08:50 515K
169-EnforcingConfinementinDistributedStorageand..> 22-Dec-2014 08:49 302K
169-EnforcingConfinementinDistributedStorageand..> 22-Dec-2014 08:49 510K
170-UnclonableGroupIdentification.pdf 22-Dec-2014 08:49 257K
171-Towardscomputationallysoundsymbolicanalysis..> 22-Dec-2014 08:49 244K
171-Towardscomputationallysoundsymbolicanalysis..> 22-Dec-2014 08:49 264K
172-ConjunctiveKeywordSearchonEncryptedDatawith..> 20-Jan-2023 14:22 207
173-Weaknessesinaleakageresilientauthenticatedk..> 22-Dec-2014 08:49 95K
174-OntheAutomaticConstructionofIndistinguishab..> 22-Dec-2014 08:49 209K
174-OntheAutomaticConstructionofIndistinguishab..> 22-Dec-2014 08:49 459K
175-A32bitRC4likeKeystreamGenerator.pdf 22-Dec-2014 08:49 153K
175-A32bitRC4likeKeystreamGenerator.ps 22-Dec-2014 08:49 347K
176-HMQVAHighPerformanceSecureDiffieHellmanProt..> 22-Dec-2014 08:49 536K
177-Secretsharingontheddimensionalcube.pdf 22-Dec-2014 08:49 182K
178-AnalyzingUnlinkabilityofSomeGroupSignatures..> 22-Dec-2014 08:49 94K
179-IntrusionResilienceviatheBoundedStorageMode..> 22-Dec-2014 08:49 232K
179-IntrusionResilienceviatheBoundedStorageMode..> 22-Dec-2014 08:49 428K
180-ANoteonSecureKeyIssuinginIDbasedCryptograph..> 22-Dec-2014 08:49 113K
181-Aplausibleapproachtocomputeraidedcryptograp..> 22-Dec-2014 08:49 291K
181-Aplausibleapproachtocomputeraidedcryptograp..> 22-Dec-2014 08:49 568K
182-CryptanalysisonChangYangHwangProtectedPassw..> 22-Dec-2014 08:49 65K
183-PEKEProbabilisticEncryptionKeyExchange10Yea..> 22-Dec-2014 08:49 168K
184-RecursiveConstructionsofSecureCodesandHashF..> 22-Dec-2014 08:49 236K
185-Securitypropertiesoftwoprovablysecureconfer..> 22-Dec-2014 08:49 164K
186-LinkabilityofSeveralBlindSignatureSchemes.pdf 20-Jan-2023 14:22 207
187-HowToExchangeSecretswithObliviousTransfer.pdf 22-Dec-2014 08:49 358K
188-GroupSignaturewhereGroupManagerMembersandOp..> 22-Dec-2014 08:49 211K
188-GroupSignaturewhereGroupManagerMembersandOp..> 22-Dec-2014 08:49 436K
189-AWeakRandomizerAttackonRSAOAEPwithe3.pdf 22-Dec-2014 08:49 148K
190-SecurityProofof34EfficientandLeakageResilie..> 20-Jan-2023 08:40 190K
190-SecurityProofofEfficientandLeakageResilient..> 22-Dec-2014 08:49 190K
191-PublicKeyEncryptionwithKeywordSearchRevisit..> 22-Dec-2014 08:49 204K
192-OnthesecurityandtheefficiencyoftheMerklesig..> 22-Dec-2014 08:49 260K
192-OnthesecurityandtheefficiencyoftheMerklesig..> 22-Dec-2014 08:49 516K
193-VSHanEfficientandProvableCollisionResistant..> 22-Dec-2014 08:49 241K
193-VSHanEfficientandProvableCollisionResistant..> 22-Dec-2014 08:48 434K
194-PrimalDualDistanceBoundsofLinearCodeswithAp..> 22-Dec-2014 08:48 102K
195-TwinRSA.pdf 22-Dec-2014 08:48 103K
195-TwinRSA.ps 22-Dec-2014 08:48 226K
196-UniversallyComposablePasswordBasedKeyExchan..> 22-Dec-2014 08:48 425K
196-UniversallyComposablePasswordBasedKeyExchan..> 22-Dec-2014 08:48 702K
197-WeaknessesintwogroupDiffieHellmankeyexchang..> 22-Dec-2014 08:48 107K
198-UniversallyComposableTimeStampingSchemeswit..> 22-Dec-2014 08:48 187K
198-UniversallyComposableTimeStampingSchemeswit..> 22-Dec-2014 08:48 375K
199-VerifiableShufflesAFormalModelandaPaillierb..> 20-Jan-2023 14:22 207
200-BlockcipherssensitivetoGroebnerBasisAttacks..> 22-Dec-2014 08:48 246K
201-OnSecurityProofofMcCullaghBarreto39sKeyAgre..> 20-Jan-2023 08:40 183K
201-OnSecurityProofofMcCullaghBarretosKeyAgreem..> 22-Dec-2014 08:48 176K
201-OnSecurityProofofMcCullaghBarretosKeyAgreem..> 22-Dec-2014 08:48 336K
202-TheBestDifferentialCharacteristicsandSubtle..> 22-Dec-2014 08:48 89K
202-TheBestDifferentialCharacteristicsandSubtle..> 22-Dec-2014 08:48 225K
203-OnExactAlgebraicNonImmunityofSboxesBasedonP..> 22-Dec-2014 08:48 201K
203-OnExactAlgebraicNonImmunityofSboxesBasedonP..> 22-Dec-2014 08:48 422K
204-AnAlgebraicMaskingMethodtoProtectAESAgainst..> 22-Dec-2014 08:48 189K
204-AnAlgebraicMaskingMethodtoProtectAESAgainst..> 22-Dec-2014 08:48 378K
205-AnotherlookatHMQV.pdf 22-Dec-2014 08:48 270K
206-OnSessionKeyConstructioninProvablySecureKey..> 22-Dec-2014 08:48 261K
206-OnSessionKeyConstructioninProvablySecureKey..> 20-Jan-2023 08:40 261K
207-SomeThoughtsonTimeMemoryDataTradeoffs.pdf 22-Dec-2014 08:48 111K
207-SomeThoughtsonTimeMemoryDataTradeoffs.ps 22-Dec-2014 08:48 255K
208-OnFindingRootsWithoutFactoringandASpecialPu..> 20-Jan-2023 14:22 207
209-CommentsonWeaknessesinTwoGroupDiffieHellman..> 22-Dec-2014 08:48 114K
209-CommentsonWeaknessesinTwoGroupDiffieHellman..> 22-Dec-2014 08:48 398K
210-TheIdealCipherModelRevisitedAnUninstantiabl..> 22-Dec-2014 08:48 160K
210-TheIdealCipherModelRevisitedAnUninstantiabl..> 22-Dec-2014 08:48 334K
211-GamesandtheImpossibilityofRealizableIdealFu..> 22-Dec-2014 08:48 222K
212-ProbabilitydistributionsofCorrelationandDif..> 22-Dec-2014 08:48 308K
213-ACounterbasedMACRevisitedTowardsBetterSecur..> 20-Jan-2023 14:22 207
214-TMTOWithMultipleDataAnalysisandNewSingleTab..> 22-Dec-2014 08:48 211K
214-TMTOWithMultipleDataAnalysisandNewSingleTab..> 22-Dec-2014 08:48 199K
215-ReconcilingCAObliviousEncryptionHiddenCrede..> 22-Dec-2014 08:48 178K
215-ReconcilingCAObliviousEncryptionHiddenCrede..> 22-Dec-2014 08:48 153K
216-ASecretSharingSchemeforPreventingtheCheater..> 22-Dec-2014 08:48 181K
217-EfficientIdentityBasedKeyEncapsulationtoMul..> 22-Dec-2014 08:48 166K
217-EfficientIdentityBasedKeyEncapsulationtoMul..> 22-Dec-2014 08:48 649K
218-Theconjugacyproblemandrelatedproblemsinlatt..> 22-Dec-2014 08:48 133K
218-Theconjugacyproblemandrelatedproblemsinlatt..> 22-Dec-2014 08:48 325K
219-Cryptanalysisofa32bitRC4likeStreamCipher.pdf 22-Dec-2014 08:47 48K
219-Cryptanalysisofa32bitRC4likeStreamCipher.ps 22-Dec-2014 08:47 124K
220-LimitsoftheCryptographicRealizationofDolevY..> 22-Dec-2014 08:47 328K
220-LimitsoftheCryptographicRealizationofDolevY..> 22-Dec-2014 08:47 945K
221-ConstantRoundDynamicGroupKeyAgreement.pdf 22-Dec-2014 08:47 295K
221-ConstantRoundDynamicGroupKeyAgreement.ps 22-Dec-2014 08:47 342K
222-EfficientCombEllipticCurveMultiplicationMet..> 22-Dec-2014 08:47 218K
222-EfficientCombEllipticCurveMultiplicationMet..> 22-Dec-2014 08:47 376K
223-DiffieHellmanKeyExchangeProtocolItsGenerali..> 22-Dec-2014 08:47 244K
223-DiffieHellmanKeyExchangeProtocolItsGenerali..> 22-Dec-2014 08:47 342K
224-AnEfficientIDKEMBasedOnTheSakaiKasaharaKeyC..> 22-Dec-2014 08:47 265K
224-AnEfficientIDKEMBasedOnTheSakaiKasaharaKeyC..> 22-Dec-2014 08:47 235K
225-MinimalityoftheHammingWeightofthetauNAFforK..> 22-Dec-2014 08:47 184K
226-SecurityProofofSakaiKasahara39sIdentityBase..> 20-Jan-2023 08:40 272K
226-SecurityProofofSakaiKasaharasIdentityBasedE..> 22-Dec-2014 08:47 236K
226-SecurityProofofSakaiKasaharasIdentityBasedE..> 22-Dec-2014 08:47 501K
227-ThresholdRingSignaturesEfficientforLargeSet..> 22-Dec-2014 08:47 102K
227-ThresholdRingSignaturesEfficientforLargeSet..> 22-Dec-2014 08:47 273K
228-EfficientDoublingonGenus3CurvesoverBinaryFi..> 22-Dec-2014 08:47 222K
228-EfficientDoublingonGenus3CurvesoverBinaryFi..> 22-Dec-2014 08:47 561K
229-BasicTheoryinConstructionofBooleanFunctions..> 22-Dec-2014 08:47 269K
229-BasicTheoryinConstructionofBooleanFunctions..> 22-Dec-2014 08:47 298K
230-YetAnotherShortSignaturesWithoutRandomOracl..> 20-Jan-2023 08:40 187K
231-FastgeneratorsfortheDiffieHellmankeyagreeme..> 22-Dec-2014 08:47 111K
231-FastgeneratorsfortheDiffieHellmankeyagreeme..> 22-Dec-2014 08:47 282K
232-LightweightKeyExchangeandStreamCipherbaseds..> 22-Dec-2014 08:47 208K
232-LightweightKeyExchangeandStreamCipherbaseds..> 22-Dec-2014 08:47 262K
233-OntheEntropyofArcfourKeys.pdf 22-Dec-2014 08:47 247K
234-LILIIIisnotBroken.pdf 22-Dec-2014 08:47 69K
235-TreeParityMachineRekeyingArchitecturesforEm..> 22-Dec-2014 08:47 186K
235-TreeParityMachineRekeyingArchitecturesforEm..> 22-Dec-2014 08:47 243K
236-EffectivePolynomialFamiliesforGeneratingMor..> 22-Dec-2014 08:47 295K
237-AnActiveAttackAgainstHBAProvablySecureLight..> 22-Dec-2014 08:47 160K
238-SimpleandProvableSecureStrongDesignatedVeri..> 20-Jan-2023 14:22 207
239-AShareCorrectableProtocolfortheShamirThresh..> 22-Dec-2014 08:47 133K
240-AttackonOkamotoetal39sNewShortSignatureSche..> 20-Jan-2023 08:40 63K
240-AttackonOkamotoetalsNewShortSignatureScheme..> 22-Dec-2014 08:47 64K
240-AttackonOkamotoetalsNewShortSignatureScheme..> 22-Dec-2014 08:47 173K
241-OnthebinarysequenceswithhighGF2linearcomple..> 22-Dec-2014 08:47 108K
241-OnthebinarysequenceswithhighGF2linearcomple..> 22-Dec-2014 08:47 136K
242-PrivateSearchingOnStreamingData.pdf 22-Dec-2014 08:46 341K
242-PrivateSearchingOnStreamingData.ps 22-Dec-2014 08:46 679K
243-CryptanalysisofSfinks.pdf 22-Dec-2014 08:46 138K
243-CryptanalysisofSfinks.ps 22-Dec-2014 08:46 310K
244-TheoreticalcryptanalysisoftheKlimovShamirnu..> 22-Dec-2014 08:46 76K
244-TheoreticalcryptanalysisoftheKlimovShamirnu..> 22-Dec-2014 08:46 214K
245-OntheAlgebraicImmunityofSymmetricBooleanFun..> 22-Dec-2014 08:46 258K
245-OntheAlgebraicImmunityofSymmetricBooleanFun..> 22-Dec-2014 08:46 479K
246-AVerifiableSecretShuffleofHomomorphicEncryp..> 22-Dec-2014 08:46 218K
246-AVerifiableSecretShuffleofHomomorphicEncryp..> 22-Dec-2014 08:46 356K
247-ASimpleandProvablyGoodCodeforSHAMessageExpa..> 22-Dec-2014 08:46 230K
247-ASimpleandProvablyGoodCodeforSHAMessageExpa..> 22-Dec-2014 08:46 516K
248-CollisionResistantusageofMD5andSHA1viaMessa..> 22-Dec-2014 08:46 172K
248-CollisionResistantusageofMD5andSHA1viaMessa..> 22-Dec-2014 08:46 319K
249-EfficientCertificatelessPublicKeyEncryption..> 20-Jan-2023 08:39 183K
250-Thetopologyofcovertconflict.pdf 22-Dec-2014 08:46 203K
251-FeistelSchemesandBiLinearCryptanalysis.pdf 22-Dec-2014 08:46 326K
251-FeistelSchemesandBiLinearCryptanalysis.ps 22-Dec-2014 08:46 623K
252-FasterPairingsusinganEllipticCurvewithanEff..> 22-Dec-2014 08:46 177K
253-SecurityNotionsforIdentityBasedEncryption.pdf 22-Dec-2014 08:46 337K
253-SecurityNotionsforIdentityBasedEncryption.ps 22-Dec-2014 08:46 650K
254-SearchableEncryptionRevisitedConsistencyPro..> 22-Dec-2014 08:46 555K
254-SearchableEncryptionRevisitedConsistencyPro..> 22-Dec-2014 08:46 901K
255-InoculatingMultivariateSchemesAgainstDiffer..> 22-Dec-2014 08:46 202K
256-FuzzyUniversalHashingandApproximateAuthenti..> 22-Dec-2014 08:46 298K
257-TMDTradeoffandStateEntropyLossConsideration..> 22-Dec-2014 08:46 221K
257-TMDTradeoffandStateEntropyLossConsideration..> 22-Dec-2014 08:46 199K
258-RelationsAmongNotionsofSecurityforIdentityB..> 22-Dec-2014 08:46 214K
258-RelationsAmongNotionsofSecurityforIdentityB..> 22-Dec-2014 08:46 438K
259-EfficientDelegationofPairingComputation.pdf 22-Dec-2014 08:46 108K
259-EfficientDelegationofPairingComputation.ps 22-Dec-2014 08:46 263K
260-PoweredTatePairingComputation.pdf 22-Dec-2014 08:46 143K
260-PoweredTatePairingComputation.ps 22-Dec-2014 08:46 319K
261-TheCramerShoupEncryptionSchemeisPlaintextAw..> 22-Dec-2014 08:46 289K
261-TheCramerShoupEncryptionSchemeisPlaintextAw..> 22-Dec-2014 08:45 458K
262-ConstantRoundMultipartyComputationUsingaBla..> 22-Dec-2014 08:45 229K
262-ConstantRoundMultipartyComputationUsingaBla..> 22-Dec-2014 08:45 393K
263-Wang39ssufficientconditionsofMD5arenotsuffi..> 20-Jan-2023 08:39 139K
263-WangssufficientconditionsofMD5arenotsuffici..> 22-Dec-2014 08:45 139K
264-OnanauthenticationschemebasedontheRootProbl..> 22-Dec-2014 08:45 99K
264-OnanauthenticationschemebasedontheRootProbl..> 22-Dec-2014 08:45 237K
265-SecurityAnalysisofKEAAuthenticatedKeyExchan..> 22-Dec-2014 08:45 183K
265-SecurityAnalysisofKEAAuthenticatedKeyExchan..> 22-Dec-2014 08:45 328K
266-AMatchingLowerBoundontheMinimumWeightofSHA1..> 22-Dec-2014 08:45 96K
266-AMatchingLowerBoundontheMinimumWeightofSHA1..> 22-Dec-2014 08:45 241K
267-StreamCipherDesignbasedonJumpingFiniteState..> 22-Dec-2014 08:45 213K
267-StreamCipherDesignbasedonJumpingFiniteState..> 22-Dec-2014 08:45 402K
268-SecureHumanComputerIdentificationInterfaceS..> 22-Dec-2014 08:45 3M
269-SecurityWeaknessinaThreePartyPasswordBasedK..> 22-Dec-2014 08:45 119K
269-SecurityWeaknessinaThreePartyPasswordBasedK..> 22-Dec-2014 08:45 483K
270-ExaminingIndistinguishabilityBasedProofMode..> 22-Dec-2014 08:45 308K
270-ExaminingIndistinguishabilityBasedProofMode..> 22-Dec-2014 08:45 636K
271-CacheattacksandCountermeasurestheCaseofAES.pdf 22-Dec-2014 08:45 713K
271-CacheattacksandCountermeasurestheCaseofAES.ps 22-Dec-2014 08:45 5M
272-AnAuthenticationProtocolForMobileAgentsUsin..> 22-Dec-2014 08:45 230K
273-CRYPTOGRAPHYBASEDONCHAOTICSYNCHRONIZATIONRO..> 22-Dec-2014 08:45 230K
274-PerformanceImprovementsandaBaselineParamete..> 22-Dec-2014 08:45 253K
275-ExplicitConstructionofSecureFrameproofCodes..> 22-Dec-2014 08:45 236K
276-UseofSparseandorComplexExponentsinBatchVeri..> 22-Dec-2014 08:45 277K
277-ScholtenFormsandEllipticHyperellipticCurves..> 22-Dec-2014 08:45 248K
277-ScholtenFormsandEllipticHyperellipticCurves..> 22-Dec-2014 08:45 268K
278-ANewRabintypeTrapdoorPermutationEquivalentt..> 22-Dec-2014 08:44 269K
278-ANewRabintypeTrapdoorPermutationEquivalentt..> 22-Dec-2014 08:44 245K
279-Efficientreductionof1outofnoblivioustransfe..> 22-Dec-2014 08:44 129K
279-Efficientreductionof1outofnoblivioustransfe..> 22-Dec-2014 08:44 271K
280-PartitionedCacheArchitectureasaSideChannelD..> 22-Dec-2014 08:44 187K
280-PartitionedCacheArchitectureasaSideChannelD..> 22-Dec-2014 08:44 205K
281-HerdingHashFunctionsandtheNostradamusAttack..> 22-Dec-2014 08:44 304K
282-SpreadingAlertsQuietlyandtheSubgroupEscapeP..> 22-Dec-2014 08:44 168K
282-SpreadingAlertsQuietlyandtheSubgroupEscapeP..> 22-Dec-2014 08:44 667K
283-RevisitingObliviousSignatureBasedEnvelopes.pdf 22-Dec-2014 08:44 162K
283-RevisitingObliviousSignatureBasedEnvelopes.ps 22-Dec-2014 08:44 259K
284-FoundationsandApplicationsforSecureTriggers..> 22-Dec-2014 08:44 231K
284-FoundationsandApplicationsforSecureTriggers.ps 22-Dec-2014 08:44 422K
285-GeneralizationsofRSApublickeycryptosystems.pdf 22-Dec-2014 08:44 93K
285-GeneralizationsofRSApublickeycryptosystems.ps 22-Dec-2014 08:44 225K
286-ConcurrentZeroKnowledgewithoutComplexityAss..> 22-Dec-2014 08:44 430K
286-ConcurrentZeroKnowledgewithoutComplexityAss..> 22-Dec-2014 08:44 690K
287-ProvableEfficientCertificatelessPublicKeyEn..> 22-Dec-2014 08:44 168K
287-ProvableEfficientCertificatelessPublicKeyEn..> 22-Dec-2014 08:44 325K
288-DirectChosenCiphertextSecurityfromIdentityB..> 22-Dec-2014 08:44 291K
288-DirectChosenCiphertextSecurityfromIdentityB..> 22-Dec-2014 08:44 527K
289-OverviewofKeyAgreementProtocols.pdf 22-Dec-2014 08:44 347K
289-OverviewofKeyAgreementProtocols.ps 22-Dec-2014 08:44 523K
290-PerfectNonInteractiveZeroKnowledgeforNP.pdf 22-Dec-2014 08:44 219K
290-PerfectNonInteractiveZeroKnowledgeforNP.ps 22-Dec-2014 08:44 314K
291-CryptographyIntheBoundedQuantumStorageModel..> 22-Dec-2014 08:44 330K
292-ImprovedIntegralCryptanalysisofFOXBlockCiph..> 22-Dec-2014 08:44 231K
293-SpeedingUpPairingComputation.pdf 22-Dec-2014 08:44 75K
294-OnFairnessinSimulatabilitybasedCryptographi..> 22-Dec-2014 08:44 338K
294-OnFairnessinSimulatabilitybasedCryptographi..> 22-Dec-2014 08:44 693K
295-HiddenExponentRSAandEfficientKeyDistributio..> 22-Dec-2014 08:44 113K
295-HiddenExponentRSAandEfficientKeyDistributio..> 22-Dec-2014 08:43 259K
296-AKeyEstablishmentIPCoreforUbiquitousComputi..> 22-Dec-2014 08:43 403K
296-AKeyEstablishmentIPCoreforUbiquitousComputi..> 22-Dec-2014 08:43 559K
297-DSACAnApproachtoEnsureIntegrityofOutsourced..> 22-Dec-2014 08:43 181K
297-DSACAnApproachtoEnsureIntegrityofOutsourced..> 22-Dec-2014 08:43 523K
298-KeepingDenialofServiceAttackersintheDark.pdf 22-Dec-2014 08:43 255K
299-NonlinearityoftheRoundFunction.pdf 22-Dec-2014 08:43 136K
300-TowardsSecurityTwopartAuthenticatedKeyAgree..> 22-Dec-2014 08:43 156K
300-TowardsSecurityTwopartAuthenticatedKeyAgree..> 22-Dec-2014 08:43 582K
301-OntheHardwareImplementationoftheMICKEY128St..> 22-Dec-2014 08:43 81K
302-EllipticCurvesforPairingApplications.pdf 22-Dec-2014 08:43 134K
302-EllipticCurvesforPairingApplications.ps 22-Dec-2014 08:43 331K
303-KeyRegressionEnablingEfficientKeyDistributi..> 22-Dec-2014 08:43 527K
304-RingSignaturesStrongerDefinitionsandConstru..> 22-Dec-2014 08:43 268K
304-RingSignaturesStrongerDefinitionsandConstru..> 22-Dec-2014 08:43 474K
305-SteganographywithImperfectSamplers.pdf 22-Dec-2014 08:43 247K
306-MurakamiKasaharaIDbasedKeySharingSchemeRevi..> 22-Dec-2014 08:43 208K
307-TheEquivalenceBetweentheDHPandDLPforEllipti..> 22-Dec-2014 08:43 355K
307-TheEquivalenceBetweentheDHPandDLPforEllipti..> 22-Dec-2014 08:43 315K
308-AdaptableGroupOrientedSignature.pdf 22-Dec-2014 08:43 119K
309-ANewEfficientIDBasedAuthenticatedKeyAgreeme..> 22-Dec-2014 08:43 107K
309-ANewEfficientIDBasedAuthenticatedKeyAgreeme..> 22-Dec-2014 08:43 239K
310-MetaRingSignature.pdf 22-Dec-2014 08:43 121K
310-MetaRingSignature.ps 22-Dec-2014 08:43 95K
311-WhatdoSboxesSayinDifferentialSideChannelAtt..> 22-Dec-2014 08:43 188K
312-ANewEfficientAlgorithmforSolvingSystemsofMu..> 22-Dec-2014 08:43 205K
313-DeterministicIdentityBasedSignaturesforPart..> 22-Dec-2014 08:43 173K
313-DeterministicIdentityBasedSignaturesforPart..> 22-Dec-2014 08:43 341K
314-Fastgenus2arithmeticbasedonThetafunctions.pdf 22-Dec-2014 08:43 188K
314-Fastgenus2arithmeticbasedonThetafunctions.ps 22-Dec-2014 08:43 378K
315-AScalableDelegatablePseudonymProtocolEnabli..> 22-Dec-2014 08:43 174K
316-CollisionAttackonXTRandaCountermeasurewitha..> 22-Dec-2014 08:43 290K
316-CollisionAttackonXTRandaCountermeasurewitha..> 22-Dec-2014 08:43 911K
317-RingSignatureswithoutRandomOracles.pdf 22-Dec-2014 08:42 152K
317-RingSignatureswithoutRandomOracles.ps 22-Dec-2014 08:42 330K
318-BoundsonBirthdayAttackTimes.pdf 22-Dec-2014 08:42 274K
319-IDbasedRestrictivePartiallyBlindSignaturesa..> 22-Dec-2014 08:42 170K
319-IDbasedRestrictivePartiallyBlindSignaturesa..> 22-Dec-2014 08:42 372K
320-EfficientIdentityBasedEncryptionwithTightSe..> 22-Dec-2014 08:42 303K
321-ExactMaximumExpectedDifferentialandLinearPr..> 22-Dec-2014 08:42 160K
321-ExactMaximumExpectedDifferentialandLinearPr..> 22-Dec-2014 08:42 409K
322-EvolutionaryDesignofTraceFormBentFunctions.pdf 22-Dec-2014 08:42 184K
323-TheWeilpairingonellipticcurvesoverC.pdf 22-Dec-2014 08:42 102K
324-Extractingbitsfromcoordinatesofapointofanel..> 22-Dec-2014 08:42 132K
324-Extractingbitsfromcoordinatesofapointofanel..> 22-Dec-2014 08:42 340K
325-AnEffectiveMethodtoImplementGroupSignaturew..> 22-Dec-2014 08:42 134K
325-AnEffectiveMethodtoImplementGroupSignaturew..> 22-Dec-2014 08:42 287K
326-ASuiteofNonPairingIDBasedThresholdRingSigna..> 22-Dec-2014 08:42 315K
327-OntheSecurityofEncryptionModesofMD4MD5andHA..> 22-Dec-2014 08:42 299K
327-OntheSecurityofEncryptionModesofMD4MD5andHA..> 22-Dec-2014 08:42 334K
328-OnConstructingUniversalOneWayHashFunctionsf..> 22-Dec-2014 08:42 299K
329-CryptographicProtocolstoPreventSpam.pdf 22-Dec-2014 08:42 668K
330-ADedicatedProcessorfortheetaPairing.pdf 22-Dec-2014 08:42 260K
331-AFuzzySketchwithTrapdoor.pdf 22-Dec-2014 08:42 123K
331-AFuzzySketchwithTrapdoor.ps 22-Dec-2014 08:42 287K
332-ClassificationofCubicn4resilientBooleanFunc..> 22-Dec-2014 08:42 178K
332-ClassificationofCubicn4resilientBooleanFunc..> 22-Dec-2014 08:42 405K
333-UniversallyComposableDiskEncryptionSchemes.pdf 22-Dec-2014 08:42 172K
334-SecureKeyUpdatingforLazyRevocation.pdf 22-Dec-2014 08:42 184K
334-SecureKeyUpdatingforLazyRevocation.ps 22-Dec-2014 08:42 347K
335-OneWaySignatureChainingANewParadigmForGroup..> 22-Dec-2014 08:42 324K
335-OneWaySignatureChainingANewParadigmForGroup..> 22-Dec-2014 08:42 686K
336-Pairingbasedidentificationschemes.pdf 22-Dec-2014 08:42 249K
337-StatisticalMultipartyComputationBasedonRand..> 22-Dec-2014 08:42 181K
338-AnImprovedPowerAnalysisAttackAgainstCamelli..> 20-Jan-2023 08:39 138K
338-AnImprovedPowerAnalysisAttackAgainstCamelli..> 22-Dec-2014 08:41 138K
339-IdentityBasedKeyAgreementwithUnilateralIden..> 22-Dec-2014 08:41 265K
339-IdentityBasedKeyAgreementwithUnilateralIden..> 22-Dec-2014 08:41 531K
340-ANewApproachtoCounteractDPAAttacksonBlockCi..> 20-Jan-2023 14:22 207
341-AUniversallyComposableSchemeforElectronicCa..> 22-Dec-2014 08:41 274K
341-AUniversallyComposableSchemeforElectronicCa..> 22-Dec-2014 08:41 899K
342-SpecialPolynomialFamiliesforGeneratingMoreS..> 22-Dec-2014 08:41 222K
343-ZeroKnowledgeBlindIdentificationForSmartCar..> 22-Dec-2014 08:41 329K
343-ZeroKnowledgeBlindIdentificationForSmartCar..> 22-Dec-2014 08:41 1M
344-Counteringchosenciphertextattacksagainstnon..> 22-Dec-2014 08:41 155K
344-Counteringchosenciphertextattacksagainstnon..> 22-Dec-2014 08:41 317K
345-GroupSignatureswithEfficientConcurrentJoin.pdf 22-Dec-2014 08:41 371K
346-BatchVerificationofValidityofBidsinHomomorp..> 22-Dec-2014 08:41 176K
346-BatchVerificationofValidityofBidsinHomomorp..> 22-Dec-2014 08:41 352K
347-KnapsackDiffieHellmanANewFamilyofDiffieHell..> 20-Jan-2023 14:22 207
348-OnProofsofSecurityforCertificatelessCryptos..> 20-Jan-2023 14:22 207
349-ObliviousTransferandLinearFunctions.pdf 22-Dec-2014 08:41 420K
349-ObliviousTransferandLinearFunctions.ps 22-Dec-2014 08:41 555K
350-IsSHA1conceptuallysound.pdf 22-Dec-2014 08:41 253K
350-IsSHA1conceptuallysound.ps 22-Dec-2014 08:41 238K
351-ErrorsinComputationalComplexityProofsforPro..> 22-Dec-2014 08:41 290K
351-ErrorsinComputationalComplexityProofsforPro..> 22-Dec-2014 08:41 596K
352-CandidateOneWayFunctionsandOneWayPermutatio..> 22-Dec-2014 08:41 350K
352-CandidateOneWayFunctionsandOneWayPermutatio..> 22-Dec-2014 08:41 5M
353-OntheSecurityofAGroupSignatureScheme.pdf 22-Dec-2014 08:41 135K
353-OntheSecurityofAGroupSignatureScheme.ps 22-Dec-2014 08:41 171K
354-PairingBasedTwoPartyAuthenticatedKeyAgreeme..> 22-Dec-2014 08:41 150K
354-PairingBasedTwoPartyAuthenticatedKeyAgreeme..> 22-Dec-2014 08:40 330K
355-IDbasedEncryptionSchemeSecureagainstChosenC..> 22-Dec-2014 08:40 114K
355-IDbasedEncryptionSchemeSecureagainstChosenC..> 22-Dec-2014 08:40 276K
356-ExponentialMemoryBoundFunctionsforProofofWo..> 22-Dec-2014 08:40 186K
357-CryptanalysisofTwoIDbasedAuthenticatedKeyAg..> 22-Dec-2014 08:40 115K
358-NormalBasisMultiplicationAlgorithmsforGF2nF..> 22-Dec-2014 08:40 297K
359-AninfiniteclassofquadraticAPNfunctionswhich..> 22-Dec-2014 08:40 162K
359-AninfiniteclassofquadraticAPNfunctionswhich..> 22-Dec-2014 08:40 349K
360-BurmesterDesmedtTreeBasedKeyTransportRevisi..> 22-Dec-2014 08:40 182K
360-BurmesterDesmedtTreeBasedKeyTransportRevisi..> 22-Dec-2014 08:40 479K
361-StrictAvalancheCriterionOverFiniteFields.pdf 22-Dec-2014 08:40 150K
361-StrictAvalancheCriterionOverFiniteFields.ps 22-Dec-2014 08:40 358K
362-OnaFlawedProposaltoBuildMorePairingFriendly..> 22-Dec-2014 08:40 25K
362-OnaFlawedProposaltoBuildMorePairingFriendly..> 22-Dec-2014 08:40 46K
363-EllipticCurveswithLowEmbeddingDegree.pdf 22-Dec-2014 08:40 397K
364-AdditiveProofsofKnowledgeANewNotionForNonIn..> 22-Dec-2014 08:40 157K
364-AdditiveProofsofKnowledgeANewNotionForNonIn..> 22-Dec-2014 08:40 373K
365-DerandomizationinCryptography.pdf 22-Dec-2014 08:40 265K
365-DerandomizationinCryptography.ps 22-Dec-2014 08:40 471K
366-EfficientCompilersforAuthenticatedGroupKeyE..> 22-Dec-2014 08:40 140K
366-EfficientCompilersforAuthenticatedGroupKeyE..> 22-Dec-2014 08:40 272K
367-SearchableKeywordBasedEncryption.pdf 22-Dec-2014 08:40 279K
368-TheProgramCounterSecurityModelAutomaticDete..> 22-Dec-2014 08:40 330K
369-SecureandslPracticalIdentityBasedEncryption..> 22-Dec-2014 08:40 199K
370-ResourceFairnessandComposabilityofCryptogra..> 22-Dec-2014 08:40 429K
370-ResourceFairnessandComposabilityofCryptogra..> 22-Dec-2014 08:40 696K
371-OnaTraitorTracingSchemefromACISP2003.pdf 22-Dec-2014 08:40 105K
372-SecretcolorimagessharingschemesbasedonXORop..> 22-Dec-2014 08:40 682K
373-EfficientBroadcastEncryptionSchemewithLogKe..> 22-Dec-2014 08:40 184K
373-EfficientBroadcastEncryptionSchemewithLogKe..> 22-Dec-2014 08:40 1M
374-ComputationofTatePairingforSupersingularCur..> 22-Dec-2014 08:40 172K
375-Truncateddifferentialcryptanalysisoffiverou..> 22-Dec-2014 08:39 59K
376-Representingsmallidenticallyselfdualmatroid..> 22-Dec-2014 08:39 194K
377-ExclusionIntersectionEncryption.pdf 22-Dec-2014 08:39 204K
377-ExclusionIntersectionEncryption.ps 22-Dec-2014 08:39 657K
378-ANewProtocolforConditionalDisclosureofSecre..> 22-Dec-2014 08:39 210K
379-HandlingExpectedPolynomialTimeStrategiesinS..> 22-Dec-2014 08:39 477K
379-HandlingExpectedPolynomialTimeStrategiesinS..> 22-Dec-2014 08:39 507K
380-BreakingRSAMayBeAsDifficultAsFactoring.pdf 22-Dec-2014 08:39 284K
381-CompactGroupSignaturesWithoutRandomOracles.pdf 22-Dec-2014 08:39 231K
382-OneWaynessEquivalenttoGeneralFactoring.pdf 22-Dec-2014 08:39 216K
383-KeyMixinginBlockCiphersthroughAdditionmodul..> 22-Dec-2014 08:39 218K
383-KeyMixinginBlockCiphersthroughAdditionmodul..> 22-Dec-2014 08:39 234K
384-SomeExplicitFormulaeofNAFanditsLefttoRightA..> 22-Dec-2014 08:39 170K
384-SomeExplicitFormulaeofNAFanditsLefttoRightA..> 22-Dec-2014 08:39 721K
385-PracticalGroupSignatureswithoutRandomOracle..> 22-Dec-2014 08:39 260K
386-ANewShortSignatureSchemeWithoutRandomOracle..> 22-Dec-2014 08:39 220K
386-ANewShortSignatureSchemeWithoutRandomOracle..> 22-Dec-2014 08:39 414K
387-OnhighlynonlinearSboxesandtheirinabilitytot..> 22-Dec-2014 08:39 239K
388-SideChannelAttacksTenYearsAfterItsPublicati..> 22-Dec-2014 08:39 584K
389-HowtoGenerateUniversallyVerifiableSignature..> 22-Dec-2014 08:39 210K
389-HowtoGenerateUniversallyVerifiableSignature..> 22-Dec-2014 08:39 406K
390-3CAProvablySecurePseudorandomFunctionandMes..> 22-Dec-2014 08:39 289K
390-3CAProvablySecurePseudorandomFunctionandMes..> 22-Dec-2014 08:39 574K
391-SomethoughtsonCollisionAttacksintheHashFunc..> 22-Dec-2014 08:39 156K
391-SomethoughtsonCollisionAttacksintheHashFunc..> 22-Dec-2014 08:39 342K
392-AnEfficientVariantofRSACryptosystem.pdf 22-Dec-2014 08:39 93K
393-MultivariateQuadraticPolynomialsinPublicKey..> 22-Dec-2014 08:39 1M
393-MultivariateQuadraticPolynomialsinPublicKey..> 22-Dec-2014 08:39 3M
394-HowtoShuffleinPublic.pdf 22-Dec-2014 08:38 328K
395-SecureGroupKeyEstablishmentRevisited.pdf 22-Dec-2014 08:38 259K
396-DesignandAnalysisofaRobustandEfficientBlock..> 22-Dec-2014 08:38 231K
396-DesignandAnalysisofaRobustandEfficientBlock..> 22-Dec-2014 08:38 232K
397-EnhancingtheMDStrengtheningandDesigningScal..> 22-Dec-2014 08:38 200K
398-PreliminaryAnalysisofDHA256.pdf 22-Dec-2014 08:38 115K
399-Onaffinerankofspectrumsupportforplateauedfu..> 22-Dec-2014 08:38 238K
399-Onaffinerankofspectrumsupportforplateauedfu..> 22-Dec-2014 08:38 271K
400-ImprovedCollisionAttackonMD5.pdf 22-Dec-2014 08:38 160K
401-AComputationallySoundMechanizedProverforSec..> 22-Dec-2014 08:38 855K
401-AComputationallySoundMechanizedProverforSec..> 22-Dec-2014 08:38 2M
402-SomeAnalysisofRadixrRepresentations.pdf 22-Dec-2014 08:38 265K
402-SomeAnalysisofRadixrRepresentations.ps 22-Dec-2014 08:38 813K
403-CollisionsintheOriginalVersionofaChaoticHas..> 22-Dec-2014 08:38 53K
404-PreventingAttacksonMachineReadableTravelDoc..> 22-Dec-2014 08:38 90K
405-BuildingBetterSigncryptionSchemeswithTagKEM..> 22-Dec-2014 08:38 315K
405-BuildingBetterSigncryptionSchemeswithTagKEM..> 22-Dec-2014 08:38 538K
406-RelationsamountStatisticalSecurityNotionsor..> 22-Dec-2014 08:38 285K
406-RelationsamountStatisticalSecurityNotionsor..> 22-Dec-2014 08:38 543K
407-AnonymousSignatureSchemes.pdf 22-Dec-2014 08:38 336K
408-CompartmentedSecretSharingBasedontheChinese..> 22-Dec-2014 08:38 146K
409-IntrusionResilientAuthenticationintheLimite..> 20-Jan-2023 14:22 207
410-ShortrespFastCCA2FullyAnonymousGroupSignatu..> 22-Dec-2014 08:38 276K
411-MoreCompactECashwithEfficientCoinTracing.pdf 22-Dec-2014 08:38 287K
412-ConstantSizeHierarchicalIdentityBasedSignat..> 22-Dec-2014 08:38 243K
413-VESTHardwareDedicatedStreamCiphers.pdf 20-Jan-2023 14:22 207
414-AuthenticatedEncryptionModeofVESTCiphers.pdf 20-Jan-2023 14:22 207
415-APresentationonVESTHardwarePerformanceChipA..> 20-Jan-2023 14:22 207
416-CryptographyinTheoryandPracticeTheCaseofEnc..> 22-Dec-2014 08:38 472K
417-CorrelationResistantStorageviaKeywordSearch..> 22-Dec-2014 08:38 264K
417-CorrelationResistantStorageviaKeywordSearch..> 22-Dec-2014 08:38 702K
418-GenericOnLineOffLineThresholdSignatures.pdf 22-Dec-2014 08:37 313K
419-UnifiedPointAdditionFormulaeandSideChannelA..> 22-Dec-2014 08:37 220K
419-UnifiedPointAdditionFormulandSideChannelAtt..> 20-Jan-2023 08:39 220K
420-EfficientScalarMultiplicationbyIsogenyDecom..> 22-Dec-2014 08:37 253K
420-EfficientScalarMultiplicationbyIsogenyDecom..> 22-Dec-2014 08:37 324K
421-KeydependentMessageSecurityunderActiveAttac..> 22-Dec-2014 08:37 290K
421-KeydependentMessageSecurityunderActiveAttac..> 22-Dec-2014 08:37 606K
422-OnAnonymityofGroupSignatures.pdf 22-Dec-2014 08:37 159K
423-IDbasedsignatureandKeyinsulatedthresholdsig..> 20-Jan-2023 14:22 207
424-EfficientMutualDataAuthenticationUsingManua..> 22-Dec-2014 08:37 214K
424-EfficientMutualDataAuthenticationUsingManua..> 22-Dec-2014 08:37 193K
425-ImprovedCollisionAttackonHashFunctionMD5.pdf 22-Dec-2014 08:37 314K
426-OntheSecurityofaCertificatelessPublicKeyEnc..> 22-Dec-2014 08:37 155K
427-SolutionstoKeyExposureProbleminRingSignatur..> 22-Dec-2014 08:37 244K
428-LoudandClearHumanVerifiableAuthenticationBa..> 22-Dec-2014 08:37 209K
428-LoudandClearHumanVerifiableAuthenticationBa..> 22-Dec-2014 08:37 2M
429-SignaturefromaNewSubgroupAssumption.pdf 22-Dec-2014 08:37 113K
430-FHASHSecuringHashFunctionsUsingFeistelChain..> 22-Dec-2014 08:37 336K
431-IsitpossibletohaveCBEfromCLPKE.pdf 22-Dec-2014 08:37 119K
431-IsitpossibletohaveCBEfromCLPKE.ps 22-Dec-2014 08:37 250K
432-OntheSecurityofKaweichel.pdf 22-Dec-2014 08:37 151K
432-OntheSecurityofKaweichel.ps 22-Dec-2014 08:37 148K
433-ProxyReSignaturesNewDefinitionsAlgorithmsan..> 22-Dec-2014 08:37 297K
434-PromptedUserRetrievalofSecretEntropyThePass..> 22-Dec-2014 08:37 135K
435-ConcurrentBlindSignatureswithoutRandomOracl..> 22-Dec-2014 08:37 296K
436-ANoteontheKasamiPowerFunction.pdf 22-Dec-2014 08:37 60K
437-OnBooleanfunctionswithmaximumalgebraicimmun..> 20-Jan-2023 14:22 207
438-MinimalAssumptionsforEfficientMercurialComm..> 22-Dec-2014 08:37 198K
438-MinimalAssumptionsforEfficientMercurialComm..> 22-Dec-2014 08:37 310K
439-AnoteonthenspendableextensionofFerguson39ss..> 20-Jan-2023 08:39 113K
439-AnoteonthenspendableextensionofFergusonssin..> 22-Dec-2014 08:37 113K
440-HBaLightweightAuthenticationProtocolSecurea..> 20-Jan-2023 14:22 207
441-Tightboundbetweennonlinearityandalgebraicim..> 22-Dec-2014 08:37 129K
441-Tightboundbetweennonlinearityandalgebraicim..> 22-Dec-2014 08:37 119K
442-OneTimeSignaturesRevisitedHaveTheyBecomePra..> 22-Dec-2014 08:37 209K
443-RevisedBlockCipherBasedHashFunctionConstruc..> 22-Dec-2014 08:37 145K
444-PrivacyPreservingPollingusingPlayingCards.pdf 22-Dec-2014 08:37 145K
445-AnAnonymousAuthenticationSchemeforTrustedCo..> 22-Dec-2014 08:36 147K
445-AnAnonymousAuthenticationSchemeforTrustedCo..> 22-Dec-2014 08:36 308K
446-DemocraticGroupSignaturesonExampleofJointVe..> 22-Dec-2014 08:36 234K
447-Anewkeyexchangeprotocolbasedonthedecomposit..> 22-Dec-2014 08:36 149K
448-OntheInsecurityofStreamCiphersBasedonArrays..> 22-Dec-2014 08:36 201K
448-OntheInsecurityofStreamCiphersBasedonArrays..> 22-Dec-2014 08:36 472K
449-OntheBooleanfunctionsWithMaximumPossibleAlg..> 22-Dec-2014 08:36 163K
450-ImprovementofManiketalsremoteuserauthentica..> 22-Dec-2014 08:36 417K
451-WeaknessesoftheBoydMaoDeniableAuthenticated..> 22-Dec-2014 08:36 376K
452-UsingProbabilisticIOAutomatatoAnalyzeanObli..> 22-Dec-2014 08:36 701K
453-FurtherConstructionsofAlmostResilientFuncti..> 22-Dec-2014 08:36 184K
454-EfficientArithmeticonSubfieldEllipticCurves..> 22-Dec-2014 08:36 214K
454-EfficientArithmeticonSubfieldEllipticCurves..> 22-Dec-2014 08:36 599K
455-EnhancingCKModelforKeyCompromiseImpersonati..> 22-Dec-2014 08:36 277K
456-ASecureSchemeforAuthenticatedEncryption.pdf 22-Dec-2014 08:36 143K
457-WeaknessofshimsNewIDbasedtripartitemultiple..> 22-Dec-2014 08:36 63K
458-Seifert39sRSAFaultAttackSimplifiedAnalysisa..> 20-Jan-2023 08:39 73K
458-SeifertsRSAFaultAttackSimplifiedAnalysisand..> 22-Dec-2014 08:36 74K
458-SeifertsRSAFaultAttackSimplifiedAnalysisand..> 22-Dec-2014 08:36 112K
459-APracticalAttackontheRootProbleminBraidGrou..> 22-Dec-2014 08:36 168K
459-APracticalAttackontheRootProbleminBraidGrou..> 22-Dec-2014 08:36 358K
460-OneTimeHNPorAttacksonaFlawedElGamalRevisite..> 22-Dec-2014 08:36 68K
461-ParallelandConcurrentSecurityoftheHBandHBPr..> 22-Dec-2014 08:36 189K
461-ParallelandConcurrentSecurityoftheHBandHBPr..> 22-Dec-2014 08:36 367K
462-ASimplifiedQuadraticFrobeniusPrimalityTest.pdf 22-Dec-2014 08:36 357K
462-ASimplifiedQuadraticFrobeniusPrimalityTest.ps 22-Dec-2014 08:36 395K
463-Moreshortsignatureswithoutrandomoracles.pdf 22-Dec-2014 08:36 289K
464-EquivalentKeysinMultivariateQuadraticPublic..> 22-Dec-2014 08:36 278K
464-EquivalentKeysinMultivariateQuadraticPublic..> 22-Dec-2014 08:36 550K
465-Asequenceapproachtoconstructingperfecthashf..> 22-Dec-2014 08:36 271K
466-CryptanalysisoftheYangWang39spasswordauthen..> 20-Jan-2023 08:39 159K
466-CryptanalysisoftheYangWangspasswordauthenti..> 22-Dec-2014 08:36 159K
467-AProbabilisticHoarestylelogicforGamebasedCr..> 22-Dec-2014 08:36 251K
468-BlindAttacksonEngineeringSamples.pdf 22-Dec-2014 08:36 148K
469-Alowerboundonthehigherordernonlinearityofal..> 22-Dec-2014 08:35 129K