Index of /2006/


../
001-HomomorphicCryptosystemsandtheirApplication..> 22-Dec-2014 09:23    715K
001-HomomorphicCryptosystemsandtheirApplication..> 22-Dec-2014 09:23      2M
002-Geometricconstructionsofoptimallinearperfec..> 22-Dec-2014 09:23      1M
003-SequentialandParallelCascadedConvolutionalE..> 22-Dec-2014 09:23    214K
004-ProvablySecureSubsitutionofCryptographicToo..> 22-Dec-2014 09:23    350K
005-PairingCalculationonSupersingularGenus2Curv..> 22-Dec-2014 09:23    137K
006-GroupKeyAgreementforAdHocNetworks.pdf          22-Dec-2014 09:23      2M
007-FurtherDiscussionsontheSecurityofaNominativ..> 22-Dec-2014 09:23    168K
008-ASimpleLefttoRightAlgorithmfortheComputatio..> 22-Dec-2014 09:22    111K
008-ASimpleLefttoRightAlgorithmfortheComputatio..> 22-Dec-2014 09:22    191K
009-BreakingandFixingPublicKeyKerberos.pdf         22-Dec-2014 09:22    193K
009-BreakingandFixingPublicKeyKerberos.ps          22-Dec-2014 09:22    380K
010-FindingCharacteristicPolynomialswithJumpInd..> 22-Dec-2014 09:22    128K
011-FormalProoffortheCorrectnessofRSAPSS.pdf       22-Dec-2014 09:22    284K
012-CertificateBasedEncryptionWithoutRandomOrac..> 22-Dec-2014 09:22    234K
012-CertificateBasedEncryptionWithoutRandomOrac..> 22-Dec-2014 09:22    452K
013-CommentsonaProvablySecureThreePartyPassword..> 22-Dec-2014 09:22    136K
014-SoundComputationalInterpretationofSymbolicH..> 22-Dec-2014 09:22    187K
014-SoundComputationalInterpretationofSymbolicH..> 22-Dec-2014 09:22    412K
015-AFamilyofDuncesTrivialRFIDIdentificationand..> 22-Dec-2014 09:22    269K
015-AFamilyofDuncesTrivialRFIDIdentificationand..> 22-Dec-2014 09:22    445K
016-MessageModificationforStep2123onSHA0.pdf       22-Dec-2014 09:22    129K
017-ThresholdandProactivePseudoRandomPermutatio..> 22-Dec-2014 09:22    268K
017-ThresholdandProactivePseudoRandomPermutatio..> 22-Dec-2014 09:22    587K
018-NotionofAlgebraicImmunityandItsevaluationRe..> 22-Dec-2014 09:22    164K
018-NotionofAlgebraicImmunityandItsevaluationRe..> 22-Dec-2014 09:22    347K
019-Hermes8ALowComplexityLowPowerStreamCipher.pdf  22-Dec-2014 09:22    214K
020-ScramblingAdversarialErrorsUsingFewRandomBi..> 22-Dec-2014 09:22    227K
020-ScramblingAdversarialErrorsUsingFewRandomBi..> 22-Dec-2014 09:22    433K
021-Cryptographichashfunctionsfromexpandergraph..> 22-Dec-2014 09:22    148K
023-AMethodtoImplementDirectAnonymousAttestatio..> 22-Dec-2014 09:22    171K
023-AMethodtoImplementDirectAnonymousAttestatio..> 22-Dec-2014 09:22    333K
024-ImprovingtheDecodingEfficiencyofPrivateSear..> 22-Dec-2014 09:22    103K
025-SignaturesforNetworkCoding.pdf                 22-Dec-2014 09:22    195K
026-ConstructingPairingFriendlyEllipticCurveswi..> 22-Dec-2014 09:22    186K
027-FindingLowDegreeAnnihilatorsforaBooleanFunc..> 22-Dec-2014 09:22    127K
027-FindingLowDegreeAnnihilatorsforaBooleanFunc..> 22-Dec-2014 09:22    191K
028-CryptanalysisofrecentlyproposedRemoteUserAu..> 22-Dec-2014 09:22    207K
029-AuthenticatedHybridEncryptionforMultipleRec..> 22-Dec-2014 09:22    288K
029-AuthenticatedHybridEncryptionforMultipleRec..> 22-Dec-2014 09:22    534K
030-ImprovedcryptanalysisofPy.pdf                  22-Dec-2014 09:22    184K
031-OnaVariationofKurosawaDesmedtEncryptionSche..> 22-Dec-2014 09:21    113K
031-OnaVariationofKurosawaDesmedtEncryptionSche..> 22-Dec-2014 09:21    245K
032-ReducingtheNumberofHomogeneousLinearEquatio..> 22-Dec-2014 09:21    280K
032-ReducingtheNumberofHomogeneousLinearEquatio..> 22-Dec-2014 09:21    278K
033-ArithmeticofGeneralizedJacobians.pdf           22-Dec-2014 09:21    469K
034-DirectChosenCiphertextSecureIdentityBasedKe..> 22-Dec-2014 09:21    430K
035-ParallelItohTsujiiMultiplicativeInversionAl..> 22-Dec-2014 09:21    327K
036-VectorStreamCipherInstantKeyRecovery.pdf       22-Dec-2014 09:21    125K
037-MessageAuthenticationon64bitArchitectures.pdf  22-Dec-2014 09:21    101K
037-MessageAuthenticationon64bitArchitectures.ps   22-Dec-2014 09:21    143K
038-ZhuangZiANewAlgorithmforSolvingMultivariate..> 22-Dec-2014 09:21    180K
039-TwoRoundAESDifferentials.pdf                   22-Dec-2014 09:21    240K
040-LinkableDemocraticGroupSignatures.pdf          22-Dec-2014 09:21    288K
041-ReactivelySimulatableCertifiedMail.pdf         22-Dec-2014 09:21    586K
041-ReactivelySimulatableCertifiedMail.ps          22-Dec-2014 09:21      2M
042-ApplicationofLFSRsforParallelSequenceGenera..> 22-Dec-2014 09:21    158K
043-NewProofsforNMACandHMACSecurityWithoutColli..> 22-Dec-2014 09:21    455K
044-LinearIntegerSecretSharingandDistributedExp..> 22-Dec-2014 09:21    291K
044-LinearIntegerSecretSharingandDistributedExp..> 22-Dec-2014 09:21    369K
045-FullyCollusionResistantTraitorTracing.pdf      22-Dec-2014 09:21    283K
046-EfficientPrimitivesfromExponentiationinZp.pdf  22-Dec-2014 09:21    175K
046-EfficientPrimitivesfromExponentiationinZp.ps   22-Dec-2014 09:21    362K
047-CryptographicallySoundTheoremProving.pdf       22-Dec-2014 09:21    138K
048-NewResultsonMultipartiteAccessStructures.pdf   22-Dec-2014 09:21    277K
048-NewResultsonMultipartiteAccessStructures.ps    22-Dec-2014 09:21    376K
049-CrosswordPuzzleAttackonNLS.pdf                 22-Dec-2014 09:21    202K
049-CrosswordPuzzleAttackonNLS.ps                  22-Dec-2014 09:21    192K
050-SecureDevicePairingbasedonaVisualChannel.pdf   22-Dec-2014 09:21      1M
051-ProposalforPieceInHandMatrixVer2GeneralConc..> 22-Dec-2014 09:20    198K
052-SoftwaremitigationstohedgeAESagainstcacheba..> 22-Dec-2014 09:20    220K
052-SoftwaremitigationstohedgeAESagainstcacheba..> 22-Dec-2014 09:20    927K
053-CryptanalysisoftheCFVZcryptosystem.pdf         22-Dec-2014 09:20    122K
053-CryptanalysisoftheCFVZcryptosystem.ps          22-Dec-2014 09:20    256K
054-HowtoBuildaLowCostExtendedRangeRFIDSkimmer.pdf 22-Dec-2014 09:20    836K
055-MulticollisionAttacksonsomeGeneralizedSeque..> 22-Dec-2014 09:20    367K
056-KeyExchangeProtocolsSecurityDefinitionProof..> 22-Dec-2014 09:20    307K
057-KeyExchangeUsingPasswordsandLongKeys.pdf       22-Dec-2014 09:20    293K
057-KeyExchangeUsingPasswordsandLongKeys.ps        22-Dec-2014 09:20    464K
058-SymbolicandCryptographicAnalysisoftheSecure..> 22-Dec-2014 09:20    259K
059-HighSecurityPairingBasedCryptographyRevisit..> 22-Dec-2014 09:20    154K
059-HighSecurityPairingBasedCryptographyRevisit..> 22-Dec-2014 09:20    338K
060-AnEfficientIDbasedSignatureSchemefromPairin..> 20-Jan-2023 14:22     207
061-Withdrawn.pdf                                  20-Jan-2023 14:22     207
062-ANewModeofEncryptionSecureAgainstSymmetricN..> 20-Jan-2023 14:22     207
063-ProvablySecureUniversalSteganographicSystem..> 22-Dec-2014 09:20    105K
063-ProvablySecureUniversalSteganographicSystem..> 22-Dec-2014 09:20    218K
064-PerturbingandProtectingaTraceableBlockCiphe..> 22-Dec-2014 09:20    131K
064-PerturbingandProtectingaTraceableBlockCiphe..> 22-Dec-2014 09:20    319K
065-OnExpectedConstantRoundProtocolsforByzantin..> 22-Dec-2014 09:20    287K
065-OnExpectedConstantRoundProtocolsforByzantin..> 22-Dec-2014 09:20    477K
066-SimpleandFlexiblePrivateRevocationChecking.pdf 22-Dec-2014 09:20    183K
066-SimpleandFlexiblePrivateRevocationChecking.ps  22-Dec-2014 09:20    445K
067-ScalarMultiplicationonKoblitzCurvesusingDou..> 22-Dec-2014 09:20    204K
067-ScalarMultiplicationonKoblitzCurvesusingDou..> 22-Dec-2014 09:20    474K
068-LimitsoftheReactiveSimulatabilityUCofDolevY..> 22-Dec-2014 09:20    528K
069-AutomatedSecurityProofswithSequencesofGames..> 22-Dec-2014 09:20    304K
069-AutomatedSecurityProofswithSequencesofGames.ps 22-Dec-2014 09:20    602K
070-TheexperimentaldistinguishingattackonRC4.pdf   22-Dec-2014 09:20     93K
071-AFastandKeyEfficientReductionofChosenCipher..> 22-Dec-2014 09:20    257K
071-AFastandKeyEfficientReductionofChosenCipher..> 22-Dec-2014 09:20    550K
072-CryptanalysisoftheBluetoothE0CipherusingOBD..> 20-Jan-2023 08:39    276K
072-CryptanalysisoftheBluetoothE0CipherusingOBD..> 22-Dec-2014 09:19    276K
073-StrongerSecurityofAuthenticatedKeyExchange.pdf 22-Dec-2014 09:19    192K
073-StrongerSecurityofAuthenticatedKeyExchange.ps  22-Dec-2014 09:19    380K
074-HowtoConstructSufficientConditioninSearchin..> 22-Dec-2014 09:19    169K
075-ONTHEWEILSUMEVALUATIONOFCENTRALPOLYNOMIALIN..> 22-Dec-2014 09:19    165K
075-ONTHEWEILSUMEVALUATIONOFCENTRALPOLYNOMIALIN..> 22-Dec-2014 09:19    369K
076-ACryptosystemBasedonHiddenOrderGroupsandIts..> 20-Jan-2023 14:22     207
077-OnSecretSharingSchemesMatroidsandPolymatroi..> 22-Dec-2014 09:19    204K
078-VerifiableRandomPermutations.pdf               22-Dec-2014 09:19    296K
079-TowardsProvablySecureGroupKeyAgreementBuild..> 22-Dec-2014 09:19    204K
079-TowardsProvablySecureGroupKeyAgreementBuild..> 22-Dec-2014 09:19    405K
080-EfficientIdentitybasedSignaturesSecureinthe..> 22-Dec-2014 09:19    234K
081-TamperEvidentHistoryIndependentSubliminalFr..> 22-Dec-2014 09:19    264K
081-TamperEvidentHistoryIndependentSubliminalFr..> 22-Dec-2014 09:19    571K
082-ParsimoniousAsynchronousByzantineFaultToler..> 22-Dec-2014 09:19    163K
082-ParsimoniousAsynchronousByzantineFaultToler..> 22-Dec-2014 09:19    260K
083-BrowsersDefensesAgainstPhishingSpoofingandM..> 22-Dec-2014 09:19    311K
084-CryptographyfromAnonymity.pdf                  22-Dec-2014 09:19    236K
084-CryptographyfromAnonymity.ps                   22-Dec-2014 09:19    227K
085-AnonymousHierarchicalIdentityBasedEncryptio..> 22-Dec-2014 09:19    321K
085-AnonymousHierarchicalIdentityBasedEncryptio..> 22-Dec-2014 09:19    565K
086-AnalysisoftheLinuxRandomNumberGenerator.pdf    22-Dec-2014 09:19    288K
087-AnalysisoftheSPVSecureRoutingProtocolWeakne..> 22-Dec-2014 09:19    337K
088-OntheFeasibilityofConsistentComputations.pdf   22-Dec-2014 09:19    258K
089-ATreebasedModelofUnicastStreamAuthenticatio..> 22-Dec-2014 09:19    232K
089-ATreebasedModelofUnicastStreamAuthenticatio..> 22-Dec-2014 09:19    479K
090-SecureSketchforMultiSets.pdf                   22-Dec-2014 09:19     95K
091-TheComplexityofOnlineMemoryChecking.pdf        22-Dec-2014 09:19    414K
091-TheComplexityofOnlineMemoryChecking.ps         22-Dec-2014 09:19    650K
092-CryptanalysisofRSAwithconstrainedkeys.pdf      22-Dec-2014 09:19    217K
092-CryptanalysisofRSAwithconstrainedkeys.ps       22-Dec-2014 09:19    210K
093-RSAandahigherdegreediophantineequation.pdf     22-Dec-2014 09:19    173K
093-RSAandahigherdegreediophantineequation.ps      22-Dec-2014 09:19    377K
094-CryptanalysisoftheMEMModeofOperation.pdf       22-Dec-2014 09:19    101K
094-CryptanalysisoftheMEMModeofOperation.ps        22-Dec-2014 09:18    276K
095-MACReforgeability.pdf                          22-Dec-2014 09:18    406K
096-SequentialAggregateSignaturesandMultisignat..> 22-Dec-2014 09:18    253K
097-ACryptographicTouroftheIPsecStandards.pdf      22-Dec-2014 09:18    152K
098-GrbnerBasisBasedCryptanalysisofSHA1.pdf        20-Jan-2023 08:39    447K
098-GrobnerBasisBasedCryptanalysisofSHA1.pdf       22-Dec-2014 09:18    381K
098-GrobnerBasisBasedCryptanalysisofSHA1.ps        22-Dec-2014 09:18      1M
099-AnEfficientSingleKeyPiratesTracingSchemeUsi..> 22-Dec-2014 09:18    225K
100-AShorterGroupSignaturewithVerifierLocationR..> 22-Dec-2014 09:18    173K
101-InformationtheoreticanalysisofcoatingPUFs.pdf  22-Dec-2014 09:18    281K
101-InformationtheoreticanalysisofcoatingPUFs.ps   22-Dec-2014 09:18    477K
102-EfficientBlindandPartiallyBlindSignaturesWi..> 22-Dec-2014 09:18    363K
102-EfficientBlindandPartiallyBlindSignaturesWi..> 22-Dec-2014 09:18    549K
103-SecurityofVSHintheRealWorld.pdf                22-Dec-2014 09:18     81K
103-SecurityofVSHintheRealWorld.ps                 22-Dec-2014 09:18    134K
104-FastCollisionAttackonMD5.pdf                   22-Dec-2014 09:18    194K
105-TunnelsinHashFunctionsMD5CollisionsWithinaM..> 22-Dec-2014 09:18    140K
106-FurtherRefinementofPairingComputationBasedo..> 20-Jan-2023 08:39    244K
106-FurtherRefinementofPairingComputationBasedo..> 22-Dec-2014 09:18    200K
106-FurtherRefinementofPairingComputationBasedo..> 22-Dec-2014 09:18    442K
107-Thenumberfieldsieveforintegersoflowweight.pdf  22-Dec-2014 09:18    224K
108-EfficientPublicKeyEncryptionwithKeywordSear..> 22-Dec-2014 09:18    125K
109-ASimplerSievingDeviceCombiningECMandTWIRL.pdf  22-Dec-2014 09:18    206K
109-ASimplerSievingDeviceCombiningECMandTWIRL.ps   22-Dec-2014 09:18    384K
110-TheEtaPairingRevisited.pdf                     22-Dec-2014 09:18    199K
110-TheEtaPairingRevisited.ps                      22-Dec-2014 09:18    423K
111-AttackingLCCCBatchVerificationofRSASignatur..> 22-Dec-2014 09:18     94K
111-AttackingLCCCBatchVerificationofRSASignatur..> 22-Dec-2014 09:18    236K
112-EntityAuthenticationandAuthenticatedKeyExch..> 22-Dec-2014 09:18    196K
112-EntityAuthenticationandAuthenticatedKeyExch..> 22-Dec-2014 09:18    378K
113-ANewConstructionofTimeCapsuleSignature.pdf     22-Dec-2014 09:18    225K
114-Tatepairingfory2x5alphaxinCharacteristicFiv..> 22-Dec-2014 09:18    177K
114-Tatepairingfory2x5alphaxinCharacteristicFiv..> 22-Dec-2014 09:18    482K
115-Fastexponentiationviaprimefinitefieldisomor..> 22-Dec-2014 09:18     88K
116-SecondPreimagesforIteratedHashFunctionsBase..> 22-Dec-2014 09:18    237K
117-ConjecturedSecurityoftheANSINISTEllipticCur..> 22-Dec-2014 09:17    227K
118-OnconstructionofnonnormalBooleanfunctions.pdf  22-Dec-2014 09:17     74K
118-OnconstructionofnonnormalBooleanfunctions.ps   22-Dec-2014 09:17    194K
119-RepairingAttacksonaPasswordBasedGroupKeyAgr..> 20-Jan-2023 14:22     207
120-KeyPrivacyforIdentityBasedEncryption.pdf       22-Dec-2014 09:17    103K
121-CountingPrimeNumberswithShortBinarySignedRe..> 22-Dec-2014 09:17    251K
121-CountingPrimeNumberswithShortBinarySignedRe..> 22-Dec-2014 09:17      2M
122-ChosenCiphertextSecureIdentityBasedEncrypti..> 22-Dec-2014 09:17    387K
123-DesignatedConfirmerSignaturesRevisited.pdf     22-Dec-2014 09:17    524K
124-FastEllipticScalarMultiplicationusingNewDou..> 22-Dec-2014 09:17    199K
125-FastcomputationofTatepairingongeneraldiviso..> 22-Dec-2014 09:17    230K
126-ECGSCEllipticCurvebasedGeneralizedSigncrypt..> 22-Dec-2014 09:17     98K
127-ANewCryptanalyticTimeMemoryDataTradeoffAlgo..> 22-Dec-2014 09:17    221K
127-ANewCryptanalyticTimeMemoryDataTradeoffAlgo..> 22-Dec-2014 09:17    204K
128-Ontheexistenceofdistortionmapsonordinaryell..> 22-Dec-2014 09:17    128K
129-SomeRemarksontheTKIPKeyMixingFunctionofIEEE..> 22-Dec-2014 09:17    205K
130-SimulatableSecurityandPolynomiallyBoundedCo..> 22-Dec-2014 09:17    252K
130-SimulatableSecurityandPolynomiallyBoundedCo..> 22-Dec-2014 09:17    466K
131-ProvablySecureUbiquitousSystemsUniversallyC..> 22-Dec-2014 09:17    565K
131-ProvablySecureUbiquitousSystemsUniversallyC..> 22-Dec-2014 09:17    734K
132-ConditionalReactiveSimulatability.pdf          22-Dec-2014 09:17    177K
133-LowComplexityBitParallelSquareRootComputati..> 22-Dec-2014 09:17    308K
134-IdentityBasedStrongDesignatedVerifierSignat..> 22-Dec-2014 09:17    145K
135-TheDesignPrincipleofHashFunctionwithMerkleD..> 22-Dec-2014 09:17    201K
135-TheDesignPrincipleofHashFunctionwithMerkleD..> 20-Jan-2023 08:39    201K
136-AChallengingbutFeasibleBlockwiseAdaptiveCho..> 22-Dec-2014 09:17    130K
137-DefiningStrongPrivacyforRFID.pdf               22-Dec-2014 09:17    378K
138-TraceDrivenCacheAttacksonAES.pdf               22-Dec-2014 09:17    166K
139-AUnifiedFrameworkfortheAnalysisofSideChanne..> 22-Dec-2014 09:17      1M
139-AUnifiedFrameworkfortheAnalysisofSideChanne..> 22-Dec-2014 09:17      5M
140-GVGRPANetcentricNegligibilitybasedSecurityM..> 22-Dec-2014 09:16    259K
140-GVGRPANetcentricNegligibilitybasedSecurityM..> 22-Dec-2014 09:16    568K
141-LinearSequentialCircuitApproximationofGrain..> 22-Dec-2014 09:16    244K
142-RationalSecretSharingRevisited.pdf             22-Dec-2014 09:16    165K
142-RationalSecretSharingRevisited.ps              22-Dec-2014 09:16    308K
143-BlindedFaultResistantExponentiation.pdf        22-Dec-2014 09:16    134K
144-ImplementingCryptographicPairingsonSmartcar..> 22-Dec-2014 09:16    230K
145-PUBLICKEYCRYPTOSYSTEMBASEDONISOGENIES.pdf      22-Dec-2014 09:16    190K
145-PUBLICKEYCRYPTOSYSTEMBASEDONISOGENIES.ps       22-Dec-2014 09:16    574K
146-CompletenessofFormalHashesintheStandardMode..> 22-Dec-2014 09:16    167K
146-CompletenessofFormalHashesintheStandardMode..> 22-Dec-2014 09:16    362K
147-NewIntegratedproofMethodonIteratedHashStruc..> 22-Dec-2014 09:16    641K
148-ComputationalIndistinguishabilitybetweenQua..> 22-Dec-2014 09:16    342K
148-ComputationalIndistinguishabilitybetweenQua..> 22-Dec-2014 09:16    485K
149-Amethodofconstructionofbalancedfunctionswit..> 22-Dec-2014 09:16    236K
150-Demonstratingdatapossessionanduncheatableda..> 22-Dec-2014 09:16     72K
151-SimulationBasedSecuritywithInexhaustibleInt..> 22-Dec-2014 09:16    325K
151-SimulationBasedSecuritywithInexhaustibleInt..> 22-Dec-2014 09:16    518K
152-PairingbasedMutualAuthenticationSchemeUsing..> 22-Dec-2014 09:16    132K
153-OntheRelationshipsBetweenNotionsofSimulatio..> 22-Dec-2014 09:16    562K
153-OntheRelationshipsBetweenNotionsofSimulatio..> 22-Dec-2014 09:16    898K
154-NewPublicKeyAuthenticationFrameworkswithLit..> 22-Dec-2014 09:16    202K
154-NewPublicKeyAuthenticationFrameworkswithLit..> 22-Dec-2014 09:16    408K
155-IndependentZeroKnowledgeSets.pdf               22-Dec-2014 09:16    333K
155-IndependentZeroKnowledgeSets.ps                22-Dec-2014 09:16    540K
156-TheHardnessoftheDHKProblemintheGenericGroup..> 22-Dec-2014 09:16     90K
156-TheHardnessoftheDHKProblemintheGenericGroup..> 22-Dec-2014 09:16    219K
157-Anefficientwaytoaccessanarrayatasecretindex..> 22-Dec-2014 09:15     94K
157-Anefficientwaytoaccessanarrayatasecretindex.ps 22-Dec-2014 09:15    217K
158-AnEfficientIDbasedProxySignatureSchemefromP..> 22-Dec-2014 09:15    189K
159-RepairingaSecurityMediatedCertificatelessEn..> 20-Jan-2023 14:22     207
160-ABuiltinDecisionalFunctionandSecurityProofo..> 20-Jan-2023 14:22     207
161-Cryptanalysisof4PassHAVAL.pdf                  22-Dec-2014 09:15    168K
162-ASummaryofMcElieceTypeCryptosystemsandtheir..> 22-Dec-2014 09:15    475K
162-ASummaryofMcElieceTypeCryptosystemsandtheir..> 22-Dec-2014 09:15    471K
163-AchievingalognSpeedUpforBooleanMatrixOperat..> 22-Dec-2014 09:15    259K
164-ClassificationofSignatureonlySignatureModel..> 22-Dec-2014 09:15    141K
165-PairingsforCryptographers.pdf                  22-Dec-2014 09:15    132K
165-PairingsforCryptographers.ps                   22-Dec-2014 09:15    276K
166-GeneralSecretSharingBasedontheChineseRemain..> 22-Dec-2014 09:15    217K
167-TowardsTrustworthyeVotingusingPaperReceipts..> 22-Dec-2014 09:15    364K
167-TowardsTrustworthyeVotingusingPaperReceipts.ps 22-Dec-2014 09:15      1M
168-HowFastcanbeAlgebraicAttacksonBlockCiphers.pdf 22-Dec-2014 09:15     96K
168-HowFastcanbeAlgebraicAttacksonBlockCiphers.ps  22-Dec-2014 09:15    255K
169-Simplifiedpairingcomputationandsecurityimpl..> 22-Dec-2014 09:15     95K
170-VisualCryptographySchemeswithOptimalPixelEx..> 22-Dec-2014 09:15    281K
171-Keyconfirmationandadaptivecorruptionsinthep..> 22-Dec-2014 09:15    246K
171-Keyconfirmationandadaptivecorruptionsinthep..> 22-Dec-2014 09:15    391K
172-OnComputingProductsofPairings.pdf              22-Dec-2014 09:15    132K
172-OnComputingProductsofPairings.ps               22-Dec-2014 09:15    285K
173-SomePracticalPublicKeyEncryptionSchemesinbo..> 22-Dec-2014 09:15    168K
173-SomePracticalPublicKeyEncryptionSchemesinbo..> 22-Dec-2014 09:15    333K
174-FrobeniusexpansionandtheDiffieHellmanproble..> 20-Jan-2023 14:22     207
175-TightBoundsforUnconditionalAuthenticationPr..> 22-Dec-2014 09:15    321K
175-TightBoundsforUnconditionalAuthenticationPr..> 22-Dec-2014 09:15      2M
176-Countingpointsonellipticcurvesinmediumchara..> 22-Dec-2014 09:15    223K
177-OntheImPossibilityofExtendingCoinToss.pdf      22-Dec-2014 09:15    406K
177-OntheImPossibilityofExtendingCoinToss.ps       22-Dec-2014 09:15    745K
178-ANewCryptosystemBasedOnHiddenOrderGroups.pdf   22-Dec-2014 09:14    499K
178-ANewCryptosystemBasedOnHiddenOrderGroups.ps    22-Dec-2014 09:14      2M
179-FPGAAcceleratedTatePairingBasedCryptosystem..> 22-Dec-2014 09:14    313K
180-DivisibilityoftheHammingWeightby2kandMonomi..> 22-Dec-2014 09:14    150K
181-ThereexistBooleanfunctionsonnoddvariablesha..> 22-Dec-2014 09:14    157K
181-ThereexistBooleanfunctionsonnoddvariablesha..> 22-Dec-2014 09:14    299K
181-ThereexistBooleanfunctionsonnoddvariablesha..> 20-Jan-2023 08:39    173K
182-OntheLimitsofPointFunctionObfuscation.pdf      22-Dec-2014 09:14    228K
182-OntheLimitsofPointFunctionObfuscation.ps       22-Dec-2014 09:14    439K
183-InformationTheoreticConditionsforTwoPartySe..> 22-Dec-2014 09:14    242K
184-OnSignaturesofKnowledge.pdf                    22-Dec-2014 09:14    323K
184-OnSignaturesofKnowledge.ps                     22-Dec-2014 09:14    579K
185-StatisticalZeroKnowledgeArgumentsforNPfromA..> 22-Dec-2014 09:14    609K
185-StatisticalZeroKnowledgeArgumentsforNPfromA..> 22-Dec-2014 09:14    954K
186-DeterministicandEfficientlySearchableEncryp..> 22-Dec-2014 09:14    444K
187-OntheSecurityofHMACandNMACBasedonHAVALMD4MD..> 22-Dec-2014 09:14    236K
187-OntheSecurityofHMACandNMACBasedonHAVALMD4MD..> 22-Dec-2014 09:14    501K
188-NewBlockcipherModesofOperationwithBeyondthe..> 22-Dec-2014 09:14    234K
188-NewBlockcipherModesofOperationwithBeyondthe..> 22-Dec-2014 09:14    522K
189-Unconditionallysecurechaffingandwinnowingwi..> 22-Dec-2014 09:14    309K
190-CryptanalysisoftheDualEllipticCurvePseudora..> 22-Dec-2014 09:14    122K
190-CryptanalysisoftheDualEllipticCurvePseudora..> 22-Dec-2014 09:14    553K
191-APUBLICKEYCRYPTOSYSTEMBASEDONPELLEQUATION.pdf  22-Dec-2014 09:14    157K
192-DPAattacksonkeysstoredinCMOScryptographicde..> 22-Dec-2014 09:14     79K
193-HierarchicalIdentityBasedThresholdRingSigna..> 22-Dec-2014 09:14    335K
194-SelfGeneratedCertificatePublicKeyCryptosyst..> 20-Jan-2023 08:39    379K
195-AnEfficientIDbasedDigitalSignaturewithMessa..> 22-Dec-2014 09:14    145K
195-AnEfficientIDbasedDigitalSignaturewithMessa..> 22-Dec-2014 09:14    412K
196-OnZKCryptBookStackandStatisticalTests.pdf      22-Dec-2014 09:14    121K
197-ANovelAlgorithmforSolvingtheLPNProblemandit..> 22-Dec-2014 09:14    186K
198-CryptographicallyPrivateSupportVectorMachin..> 22-Dec-2014 09:13    270K
199-IdentitybasedKeyAgreementProtocolsFromPairi..> 22-Dec-2014 09:13    412K
199-IdentitybasedKeyAgreementProtocolsFromPairi..> 22-Dec-2014 09:13    687K
200-ImprovementofrecentlyproposedRemoteUserAuth..> 22-Dec-2014 09:13     67K
201-EfficientTatePairingComputationUsingDoubleB..> 22-Dec-2014 09:13    157K
201-EfficientTatePairingComputationUsingDoubleB..> 22-Dec-2014 09:13    347K
202-Atepairingfory2x5alphaxincharacteristicfive..> 22-Dec-2014 09:13    133K
202-Atepairingfory2x5alphaxincharacteristicfive.ps 22-Dec-2014 09:13    376K
203-GeneralizationoftheSelectiveIDSecurityModel..> 22-Dec-2014 09:13    255K
203-GeneralizationoftheSelectiveIDSecurityModel..> 22-Dec-2014 09:13    262K
204-TowardsMinimizingMemoryRequirementforImplem..> 22-Dec-2014 09:13    312K
204-TowardsMinimizingMemoryRequirementforImplem..> 22-Dec-2014 09:13    552K
205-IDBasedRingSignatureSchemesecureintheStanda..> 20-Jan-2023 14:22     207
206-OntheProvableSecurityofanEfficientRSABasedP..> 22-Dec-2014 09:13    295K
206-OntheProvableSecurityofanEfficientRSABasedP..> 22-Dec-2014 09:13    552K
207-TheKurosawaDesmedtKeyEncapsulationisnotChos..> 22-Dec-2014 09:13    101K
208-PrivateInformationRetrievalUsingTrustedHard..> 22-Dec-2014 09:13    363K
208-PrivateInformationRetrievalUsingTrustedHard..> 22-Dec-2014 09:13    987K
209-MinimalWeightandColexicographicallyMinimalI..> 22-Dec-2014 09:13    174K
209-MinimalWeightandColexicographicallyMinimalI..> 22-Dec-2014 09:13    276K
210-SearchableSymmetricEncryptionImprovedDefini..> 22-Dec-2014 09:13    542K
211-ASurveyofCertificatelessEncryptionSchemesan..> 22-Dec-2014 09:13    297K
211-ASurveyofCertificatelessEncryptionSchemesan..> 22-Dec-2014 09:13    377K
212-ReverseSSLImprovedServerPerformanceandDoSRe..> 22-Dec-2014 09:13    107K
213-LubyRackoffCiphersfromWeakRoundFunctions.pdf   22-Dec-2014 09:13    348K
213-LubyRackoffCiphersfromWeakRoundFunctions.ps    22-Dec-2014 09:13    710K
214-PasswordAuthenticatedConstantRoundGroupKeyE..> 22-Dec-2014 09:13    284K
214-PasswordAuthenticatedGroupKeyEstablishmentf..> 20-Jan-2023 08:39    430K
215-CryptanalysisofanImageScramblingSchemewitho..> 22-Dec-2014 09:13      1M
216-FastandSecureEllipticCurveScalarMultiplicat..> 22-Dec-2014 09:13    173K
217-StatisticalAnalysisoftheMARSBlockCipher.pdf    22-Dec-2014 09:13    112K
217-StatisticalAnalysisoftheMARSBlockCipher.ps     22-Dec-2014 09:13    106K
218-ComputationallySoundSymbolicSecrecyinthePre..> 22-Dec-2014 09:13    302K
218-ComputationallySoundSymbolicSecrecyinthePre..> 22-Dec-2014 09:12    466K
219-CryptographicallySoundSecurityProofsforBasi..> 22-Dec-2014 09:12    414K
219-CryptographicallySoundSecurityProofsforBasi..> 22-Dec-2014 09:12    718K
220-MultiDimensionalMontgomeryLaddersforEllipti..> 22-Dec-2014 09:12    160K
221-DeterministicAuthenticatedEncryptionAProvab..> 22-Dec-2014 09:12    501K
221-DeterministicAuthenticatedEncryptionAProvab..> 22-Dec-2014 09:12      4M
222-DecodingInterleavedGabidulinCodesandCiphert..> 22-Dec-2014 09:12    156K
222-DecodingInterleavedGabidulinCodesandCiphert..> 22-Dec-2014 09:12    335K
223-WhatHashesMakeRSAOAEPSecure.pdf                22-Dec-2014 09:12    225K
224-GeneralizationsoftheKaratsubaAlgorithmforEf..> 22-Dec-2014 09:12    211K
224-GeneralizationsoftheKaratsubaAlgorithmforEf..> 22-Dec-2014 09:12    430K
225-ProvablySecureTimeBoundHierarchicalKeyAssig..> 22-Dec-2014 09:12    382K
225-ProvablySecureTimeBoundHierarchicalKeyAssig..> 22-Dec-2014 09:12    665K
226-TheFairnessofPerfectConcurrentSignatures.pdf   22-Dec-2014 09:12    186K
227-AnEllipticCurveProcessorSuitableForRFIDTags..> 22-Dec-2014 09:12    312K
227-AnEllipticCurveProcessorSuitableForRFIDTags.ps 22-Dec-2014 09:12    925K
228-NonMalleableEncryptionEquivalencebetweenTwo..> 22-Dec-2014 09:12    246K
228-NonMalleableEncryptionEquivalencebetweenTwo..> 22-Dec-2014 09:12    473K
229-AnotherLookat34ProvableSecurity34II.pdf        20-Jan-2023 08:39    341K
229-AnotherLookatProvableSecurityII.pdf            22-Dec-2014 09:12    341K
230-AnotherLookatGenericGroups.pdf                 22-Dec-2014 09:12    210K
231-Ahandymulticouponsystem.pdf                    22-Dec-2014 09:12    274K
231-Ahandymulticouponsystem.ps                     22-Dec-2014 09:12    568K
232-ImprovementtoAKSalgorithm.pdf                  22-Dec-2014 09:12     32K
233-AsimplegeneralizationofElGamalcryptosystemt..> 22-Dec-2014 09:12    411K
233-AsimplegeneralizationofElGamalcryptosystemt..> 22-Dec-2014 09:12    550K
234-RFIDSecurityTradeoffsbetweenSecurityandEffi..> 22-Dec-2014 09:12    177K
235-ApplicationofECMtoaClassofRSAkeys.pdf          22-Dec-2014 09:11    172K
235-ApplicationofECMtoaClassofRSAkeys.ps           22-Dec-2014 09:11    372K
236-OnlineOfflineSignaturesandMultisignaturesfo..> 22-Dec-2014 09:11    299K
236-OnlineOfflineSignaturesandMultisignaturesfo..> 22-Dec-2014 09:11    711K
237-SideChannelAnalysisofPracticalPairingImplem..> 22-Dec-2014 09:11    215K
238-SearchableIndexSchemesforGroupsSecurityvsEf..> 20-Jan-2023 14:22     207
239-ResettableZeroKnowledgeintheBarePublicKeyMo..> 22-Dec-2014 09:11    222K
240-ComputingZetaFunctionsofNondegenerateCurves..> 22-Dec-2014 09:11    466K
240-ComputingZetaFunctionsofNondegenerateCurves.ps 22-Dec-2014 09:11    804K
241-AStrongerDefinitionforAnonymousElectronicCa..> 22-Dec-2014 09:11    395K
241-AStrongerDefinitionforAnonymousElectronicCa..> 22-Dec-2014 09:11      1M
242-TheProbabilityAdvantagesofTwoLinearExpressi..> 22-Dec-2014 09:11    149K
243-SideChannelAttacksandCountermeasuresonPairi..> 22-Dec-2014 09:11    162K
244-LengthbasedcryptanalysisThecaseofThompson39..> 20-Jan-2023 08:39    214K
244-LengthbasedcryptanalysisThecaseofThompsonsG..> 22-Dec-2014 09:11    152K
244-LengthbasedcryptanalysisThecaseofThompsonsG..> 22-Dec-2014 09:11    328K
245-SecureandEfficientThresholdKeyIssuingProtoc..> 22-Dec-2014 09:11    142K
246-ONTHEPOSTQUANTUMCIPHERSCHEME.pdf               22-Dec-2014 09:11    112K
246-ONTHEPOSTQUANTUMCIPHERSCHEME.ps                22-Dec-2014 09:11    213K
247-FactoringClassPolynomialsovertheGenusField.pdf 20-Jan-2023 14:22     207
248-Disguisingtoriandellipticcurves.pdf            22-Dec-2014 09:11    157K
249-Enumerationof9variableRotationSymmetricBool..> 22-Dec-2014 09:11    170K
249-Enumerationof9variableRotationSymmetricBool..> 22-Dec-2014 09:11    350K
249-Enumerationof9variableRotationSymmetricBool..> 20-Jan-2023 08:39    197K
250-LinearCryptanalysisofCTC.pdf                   22-Dec-2014 09:11     91K
251-AcceleratingCryptanalysiswiththeMethodofFou..> 22-Dec-2014 09:11    220K
252-OntheResilienceofKeyAgreementProtocolstoKey..> 22-Dec-2014 09:11    162K
253-HardInstancesoftheConstrainedDiscreteLogari..> 22-Dec-2014 09:11    265K
253-HardInstancesoftheConstrainedDiscreteLogari..> 22-Dec-2014 09:11    588K
254-ApplicationsofSATSolverstoCryptanalysisofHa..> 22-Dec-2014 09:11    181K
254-ApplicationsofSATSolverstoCryptanalysisofHa..> 22-Dec-2014 09:11    464K
255-MaliciousKGCAttacksinCertificatelessCryptog..> 22-Dec-2014 09:11    247K
256-ConstantRoundConcurrentNMWIanditsrelationto..> 22-Dec-2014 09:11    375K
257-EfficientDivisorClassHalvingonGenusTwoCurve..> 22-Dec-2014 09:10    130K
258-CryptanalysisofaCognitiveAuthenticationSche..> 22-Dec-2014 09:10    138K
259-SimplifiedSubmissionofInputstoProtocols.pdf    22-Dec-2014 09:10    276K
260-ANoteOnGameHoppingProofs.pdf                   22-Dec-2014 09:10    174K
261-UsingWiedemann39salgorithmtocomputetheimmun..> 20-Jan-2023 08:39    142K
261-UsingWiedemannsalgorithmtocomputetheimmunit..> 22-Dec-2014 09:10    184K
261-UsingWiedemannsalgorithmtocomputetheimmunit..> 22-Dec-2014 09:10    369K
262-LogicalConceptsinCryptography.pdf              22-Dec-2014 09:10      2M
263-EfficientFPGAImplementationsandCryptanalysi..> 22-Dec-2014 09:10    270K
264-ASimpleandUnifiedMethodofProvingUnpredictab..> 22-Dec-2014 09:10    217K
264-ASimpleandUnifiedMethodofProvingUnpredictab..> 22-Dec-2014 09:10    430K
265-Someinsufficientconditionsforsecurehybriden..> 22-Dec-2014 09:10    373K
266-ComputationallySoundSecrecyProofsbyMechaniz..> 22-Dec-2014 09:10    272K
266-ComputationallySoundSecrecyProofsbyMechaniz..> 22-Dec-2014 09:10    474K
267-StatefulPublicKeyCryptosystemsHowtoEncryptw..> 22-Dec-2014 09:10    252K
267-StatefulPublicKeyCryptosystemsHowtoEncryptw..> 22-Dec-2014 09:10    487K
268-OntheEquivalenceofSeveralSecurityNotionsofK..> 22-Dec-2014 09:10    141K
269-AnAnalysisoftheHermes8StreamCiphers.pdf        22-Dec-2014 09:10    223K
269-AnAnalysisoftheHermes8StreamCiphers.ps         22-Dec-2014 09:10    415K
270-FormalAnalysisandSystematicConstructionofTw..> 22-Dec-2014 09:10    272K
271-ModesofEncryptionSecureagainstBlockwiseAdap..> 22-Dec-2014 09:10    228K
272-EfficientUseofRandomDelays.pdf                 22-Dec-2014 09:10    242K
272-EfficientUseofRandomDelays.ps                  22-Dec-2014 09:10     19M
273-SecurePositioningofMobileTerminalswithSimpl..> 22-Dec-2014 09:09    180K
273-SecurePositioningofMobileTerminalswithSimpl..> 22-Dec-2014 09:09    555K
274-AnImprovedRemoteUserAuthenticationSchemewit..> 22-Dec-2014 09:09    124K
275-ANewModeofEncryptionProvidingATweakableStro..> 22-Dec-2014 09:09    265K
275-ANewModeofEncryptionProvidingATweakableStro..> 22-Dec-2014 09:09    592K
276-MitigatingDictionaryAttacksonPasswordProtec..> 22-Dec-2014 09:09    261K
276-MitigatingDictionaryAttacksonPasswordProtec..> 22-Dec-2014 09:09    438K
277-OnExpectedProbabilisticPolynomialTimeAdvers..> 22-Dec-2014 09:09    332K
277-OnExpectedProbabilisticPolynomialTimeAdvers..> 22-Dec-2014 09:09    594K
278-Fundamentalproblemsinprovablesecurityandcry..> 22-Dec-2014 09:09    286K
278-Fundamentalproblemsinprovablesecurityandcry..> 22-Dec-2014 09:09      9M
279-OnHierarchicalIdentityBasedEncryptionProtoc..> 20-Jan-2023 08:39    316K
279-OnHierarchicalIdentityBasedEncryptionProtoc..> 22-Dec-2014 09:09    316K
280-DeniableAuthenticationandKeyExchange.pdf       22-Dec-2014 09:09    409K
280-DeniableAuthenticationandKeyExchange.ps        22-Dec-2014 09:08    390K
281-FormalizingHumanIgnoranceCollisionResistant..> 22-Dec-2014 09:08    206K
281-FormalizingHumanIgnoranceCollisionResistant..> 22-Dec-2014 09:08    375K
282-ChosenCiphertextSecureBroadcastThresholdEnc..> 20-Jan-2023 14:22     207
283-DoesPrivacyRequireTrueRandomness.pdf           22-Dec-2014 09:08    288K
283-DoesPrivacyRequireTrueRandomness.ps            22-Dec-2014 09:08    527K
284-ConstantRoundGroupKeyExchangewithLogarithmi..> 22-Dec-2014 09:08    353K
284-ConstantRoundGroupKeyExchangewithLogarithmi..> 22-Dec-2014 09:08    720K
285-UnrestrictedAggregateSignatures.pdf            22-Dec-2014 09:08    346K
285-UnrestrictedAggregateSignatures.ps             22-Dec-2014 09:08    671K
286-ShorterVerifierLocalRevocationGroupSignatur..> 22-Dec-2014 09:08    336K
287-ConjunctiveSubsetandRangeQueriesonEncrypted..> 22-Dec-2014 09:08    312K
288-PredictingSecretKeysviaBranchPrediction.pdf    22-Dec-2014 09:08    465K
289-EfficientRingSignatureswithoutRandomOracles..> 22-Dec-2014 09:08    279K
290-OnAuthenticationwithHMACandNonRandomPropert..> 22-Dec-2014 09:08    258K
291-HardHomogeneousSpaces.pdf                      22-Dec-2014 09:08    158K
291-HardHomogeneousSpaces.ps                       22-Dec-2014 09:08    311K
292-IdealMultipartiteSecretSharingSchemes.pdf      22-Dec-2014 09:08    264K
293-FastAlgorithmsfortheFreeRidersProbleminBroa..> 22-Dec-2014 09:08    295K
293-FastAlgorithmsfortheFreeRidersProbleminBroa..> 22-Dec-2014 09:08    506K
294-TheCollisionIntractabilityofMDC2intheIdealC..> 22-Dec-2014 09:08    314K
295-Visualsecretsharingschemewithautostereogram..> 22-Dec-2014 09:08      2M
296-OntheGenericConstructionofIdentityBasedSign..> 22-Dec-2014 09:08    377K
296-OntheGenericConstructionofIdentityBasedSign..> 22-Dec-2014 09:08    623K
297-ForwardSecureSignatureswithUntrustedUpdate.pdf 22-Dec-2014 09:08    287K
298-AFullyCollusionResistantBroadcastTraceandRe..> 22-Dec-2014 09:08    283K
299-EfficientImplementationofTatePairingonaMobi..> 22-Dec-2014 09:08    284K
300-AttacksandModificationsofCJC39sEvotingSchem..> 20-Jan-2023 14:22     207
301-NewfeaturesforJPEGSteganalysis.pdf             22-Dec-2014 09:08    482K
302-Noninteractivetwochannelmessageauthenticati..> 22-Dec-2014 09:07    222K
303-ZeroknowledgelikeProofofCryptanalysisofBlue..> 22-Dec-2014 09:07    274K
303-ZeroknowledgelikeProofofCryptanalysisofBlue..> 22-Dec-2014 09:07      4M
304-IdentityBasedEncryptionGoneWild.pdf            22-Dec-2014 09:07    341K
304-IdentityBasedEncryptionGoneWild.ps             22-Dec-2014 09:07    606K
305-ProvablySublinearPointMultiplicationonKobli..> 22-Dec-2014 09:07    230K
305-ProvablySublinearPointMultiplicationonKobli..> 22-Dec-2014 09:07    529K
306-RevisitingtheSecurityModelforTimedReleasePu..> 22-Dec-2014 09:07    230K
306-RevisitingtheSecurityModelforTimedReleasePu..> 22-Dec-2014 09:07    465K
307-NoteonDesignCriteriaforRainbowTypeMultivari..> 22-Dec-2014 09:07     72K
308-EfficientIDbasedThresholdSignatureSchemeswi..> 22-Dec-2014 09:07    256K
309-AttributeBasedEncryptionforFineGrainedAcces..> 22-Dec-2014 09:07    286K
310-AdSequencebasedRecursiveRandomNumberGenerat..> 22-Dec-2014 09:07    107K
311-AnalysisofSomeAttacksonAwasthiandLal39sProx..> 20-Jan-2023 14:22     207
312-ElGamaltypesignatureschemesforndimensionalv..> 22-Dec-2014 09:07    133K
312-ElGamaltypesignatureschemesforndimensionalv..> 22-Dec-2014 09:07    276K
313-EfficientScalarMultiplicationandSecurityaga..> 22-Dec-2014 09:07      1M
314-ConcurrentlyNonMalleableZeroKnowledgeintheA..> 22-Dec-2014 09:07    261K
315-OntheNecessityofRewindinginSecureMultiparty..> 22-Dec-2014 09:07    521K
316-AParallelizationofECDSAResistanttoSimplePow..> 22-Dec-2014 09:07    193K
317-WeaknessesoftheFORK256compressionfunction.pdf  22-Dec-2014 09:07    234K
317-WeaknessesoftheFORK256compressionfunction.ps   22-Dec-2014 09:07    727K
318-ChameleonBasedDeniableAuthenticatedKeyAgree..> 22-Dec-2014 09:07    124K
319-ForgeryandPartialKeyRecoveryAttacksonHMACan..> 22-Dec-2014 09:07    276K
319-ForgeryandPartialKeyRecoveryAttacksonHMACan..> 22-Dec-2014 09:07    249K
320-CMSSAnImprovedMerkleSignatureScheme.pdf        22-Dec-2014 09:07    181K
321-EfficientPseudorandomGeneratorsBasedontheDD..> 22-Dec-2014 09:07    187K
321-EfficientPseudorandomGeneratorsBasedontheDD..> 22-Dec-2014 09:07    417K
322-AlgebraicImmunityofSboxesBasedonPowerMappin..> 22-Dec-2014 09:07    284K
323-ComputationalSoundnessofFormalIndistinguish..> 22-Dec-2014 09:06    211K
323-ComputationalSoundnessofFormalIndistinguish..> 22-Dec-2014 09:06    404K
324-TheAverageTransmissionOverheadofBroadcastEn..> 22-Dec-2014 09:06    168K
325-InvisibleDesignatedConfirmerSignatureswitho..> 22-Dec-2014 09:06    186K
325-InvisibleDesignatedConfirmerSignatureswitho..> 22-Dec-2014 09:06    384K
326-AnalyzingtheHBandHBProtocolsintheLargeError..> 20-Jan-2023 08:39    194K
326-AnalyzingtheHBandHBProtocolsintheLargeError..> 22-Dec-2014 09:06    194K
327-AnAlgorithmfortheeta_TPairingCalculationinC..> 22-Dec-2014 09:06    240K
328-AnonymousSecureCommunicationinWirelessMobil..> 22-Dec-2014 09:06    349K
329-DesignatedVerifierSignatureSchemeBasedonBra..> 22-Dec-2014 09:06    116K
330-ExtendedDoubleBaseNumberSystemwithapplicati..> 22-Dec-2014 09:06    286K
330-ExtendedDoubleBaseNumberSystemwithapplicati..> 22-Dec-2014 09:06    477K
331-OntheSecurityofGeneralizedJacobianCryptosys..> 22-Dec-2014 09:06    300K
332-ImprovedEfficiencyforPrivateStableMatching.pdf 22-Dec-2014 09:06    187K
333-DiscreteLogarithmsinGeneralizedJacobians.pdf   22-Dec-2014 09:06    149K
334-CollidingMessagePairfor53StepHAS160.pdf        22-Dec-2014 09:06    179K
335-AIDBasedDeniableAuthenticationProtocolonpai..> 22-Dec-2014 09:06    592K
336-HighOrderLinearizationEquationHOLEAttackonM..> 22-Dec-2014 09:06    153K
337-AnEfficientandSecureTwoflowZeroKnowledgeIde..> 22-Dec-2014 09:06    342K
338-EfficientandProvablySecureMultiRecipientSig..> 22-Dec-2014 09:06    120K
338-EfficientandProvablySecureMultiRecipientSig..> 22-Dec-2014 09:06    268K
339-ANewfamilyofIdealMultipartiteAccessStructur..> 20-Jan-2023 14:22     207
340-CryptanalysesofSomeMultimediaEncryptionSche..> 22-Dec-2014 09:06      4M
341-MV3Anewwordbasedstreamcipherusingrapidmixin..> 22-Dec-2014 09:06    279K
341-MV3Anewwordbasedstreamcipherusingrapidmixin..> 22-Dec-2014 09:06    477K
342-ANovelSecureElectronicVotingProtocolBasedOn..> 22-Dec-2014 09:06    418K
343-VerifiablyEncryptedSignatureSchemewithThres..> 22-Dec-2014 09:06    101K
343-VerifiablyEncryptedSignatureSchemewithThres..> 22-Dec-2014 09:06    248K
344-ASubjectDelegatedDecryptionSchemewithTightl..> 20-Jan-2023 08:39    207K
344-ASubjectDelegatedDecryptionSchemewithTightl..> 22-Dec-2014 09:05    207K
345-PrivateandEfficientStableMarriagesMatching.pdf 22-Dec-2014 09:05    124K
345-PrivateandEfficientStableMarriagesMatching.ps  22-Dec-2014 09:05    209K
346-GenericTransformationtoStronglyUnforgeableS..> 22-Dec-2014 09:05    262K
347-ClassificationofWeilRestrictionsObtainedby2..> 22-Dec-2014 09:05    307K
348-NonTrivialBlackBoxCombinersforCollisionResi..> 20-Jan-2023 08:39    188K
348-NonTrivialBlackBoxCombinersforCollisionResi..> 22-Dec-2014 09:05    207K
348-NonTrivialBlackBoxCombinersforCollisionResi..> 22-Dec-2014 09:05    184K
349-ANoteOnSideChannelsResultingFromDynamicComp..> 22-Dec-2014 09:05    130K
349-ANoteOnSideChannelsResultingFromDynamicComp..> 22-Dec-2014 09:05    289K
350-ImpossibleDifferentialCryptanalysisofARIAan..> 22-Dec-2014 09:05    201K
351-OnthePowerofSimpleBranchPredictionAnalysis.pdf 22-Dec-2014 09:05    737K
352-FoundationsofSecureECommerceTheOrderLayer.pdf  22-Dec-2014 09:05    944K
353-AnalysisandImprovementsofTwoIdentityBasedPe..> 22-Dec-2014 09:05    206K
354-AnewstreamcipherDICING.pdf                     22-Dec-2014 09:05    101K
355-ConcurrentNonMalleableZeroKnowledge.pdf        22-Dec-2014 09:05    241K
355-ConcurrentNonMalleableZeroKnowledge.ps         22-Dec-2014 09:05    396K
356-BlackBoxKnowledgeExtractionRevisitedUnivers..> 22-Dec-2014 09:05    349K
356-BlackBoxKnowledgeExtractionRevisitedUnivers..> 22-Dec-2014 09:05    403K
357-Cryptanalysisofahomomorphicpublickeycryptos..> 22-Dec-2014 09:05    134K
358-PublicKeyEncryptionwithKeywordSearchbasedon..> 22-Dec-2014 09:05    207K
359-OnProbabilisticversusDeterministicProversin..> 22-Dec-2014 09:05    227K
359-OnProbabilisticversusDeterministicProversin..> 22-Dec-2014 09:05    426K
360-TargetCollisionsforMD5andCollidingX509Certi..> 22-Dec-2014 09:05    340K
361-GenericConstructionofIdentitybasedPerfectCo..> 22-Dec-2014 09:05    212K
361-GenericConstructionofIdentitybasedPerfectCo..> 22-Dec-2014 09:05    405K
362-ConstructionofaHybridHierarchicalIdentityBa..> 22-Dec-2014 09:05    268K
362-ConstructionofaHybridHierarchicalIdentityBa..> 22-Dec-2014 09:05    488K
363-AWeaknessinSomeObliviousTransferandZeroKnow..> 20-Jan-2023 14:22     207
364-SpellingErrorTolerantOrderIndependentPassPh..> 22-Dec-2014 09:05    188K
365-RevisitofKD04.pdf                              20-Jan-2023 14:22     207
366-ALatencyFreeElectionScheme.pdf                 22-Dec-2014 09:05    176K
367-AnAttackonaCertificatelessSignatureScheme.pdf  22-Dec-2014 09:05    123K
368-PracticalHierarchicalIdentityBasedEncryptio..> 22-Dec-2014 09:04    218K
369-RadioGatnabeltandmillhashfunction.pdf          20-Jan-2023 08:39    272K
369-RadioGatunabeltandmillhashfunction.pdf         22-Dec-2014 09:04    272K
370-ADoSAttackAgainsttheIntegrityLessESPIPSec.pdf  22-Dec-2014 09:04    578K
370-ADoSAttackAgainsttheIntegrityLessESPIPSec.ps   22-Dec-2014 09:04      3M
371-HardwareImplementationoftheeta_TPairinginCh..> 22-Dec-2014 09:04    194K
372-Ataxonomyofpairingfriendlyellipticcurves.pdf   22-Dec-2014 09:04    612K
373-SelfGeneratedCertificatePublicKeyCryptograp..> 22-Dec-2014 09:04    379K
374-RobustFinalRoundCacheTraceAttacksAgainstAES..> 22-Dec-2014 09:04    260K
374-RobustFinalRoundCacheTraceAttacksAgainstAES.ps 22-Dec-2014 09:04    880K
375-Distortionmapsforgenustwocurves.pdf            22-Dec-2014 09:04    252K
376-ANewConceptofHashFunctionsSNMACUsingaSpecia..> 22-Dec-2014 09:04    252K
377-EfficientChosenCiphertextSecureIdentityBase..> 22-Dec-2014 09:04    270K
377-EfficientChosenCiphertextSecureIdentityBase..> 22-Dec-2014 09:04    518K
378-ANewKeyExchangePrimitiveBasedontheTripleDec..> 22-Dec-2014 09:04    145K
378-ANewKeyExchangePrimitiveBasedontheTripleDec..> 22-Dec-2014 09:04    288K
379-SecurityBoundsfortheNISTCodebookbasedDeterm..> 22-Dec-2014 09:04    180K
380-OnSecurityofSovereignJoins.pdf                 22-Dec-2014 09:04     87K
381-CryptanalysisonanAlgorithmforEfficientDigit..> 22-Dec-2014 09:04     38K
382-ProvisioningProtectedResourceSharinginMulti..> 22-Dec-2014 09:04    263K
382-ProvisioningProtectedResourceSharinginMulti..> 22-Dec-2014 09:04    667K
383-Traitortracingschemewithconstantciphertextr..> 22-Dec-2014 09:04    241K
383-Traitortracingschemewithconstantciphertextr..> 22-Dec-2014 09:04    457K
384-DesignandAnalysisofaHashRingiterativeStruct..> 22-Dec-2014 09:04    218K
385-OnSecurityModelsandCompilersforGroupKeyExch..> 22-Dec-2014 09:04      1M
386-TheWrestlersProtocolAsimplepracticalsecured..> 22-Dec-2014 09:04    457K
386-TheWrestlersProtocolAsimplepracticalsecured..> 22-Dec-2014 09:04    532K
387-ANoteontheSecurityofNTRUSign.pdf               22-Dec-2014 09:04    124K
388-SurveyonSecurityRequirementsandModelsforGro..> 22-Dec-2014 09:03    505K
389-TraceableRingSignature.pdf                     22-Dec-2014 09:03    234K
390-RevisitofCS98.pdf                              20-Jan-2023 14:22     207
391-ANoteonBoundedChosenCiphertextSecurityfromB..> 22-Dec-2014 09:03    249K
392-TheTatePairingviaEllipticNets.pdf              22-Dec-2014 09:03    216K
392-TheTatePairingviaEllipticNets.ps               22-Dec-2014 09:03    433K
393-TheIdentityEscrowGroupSignatureSchemeatCTRS..> 20-Jan-2023 14:22     207
394-IdentityBasedStrongDesignatedVerifierProxyS..> 22-Dec-2014 09:03     92K
395-SecurityFocusedSurveyonGroupKeyExchangeProt..> 22-Dec-2014 09:03    630K
396-SecurityProtocolswithIsotropicChannels.pdf     22-Dec-2014 09:03    258K
397-RevisitingtheEfficiencyofMaliciousTwoPartyC..> 22-Dec-2014 09:03    220K
397-RevisitingtheEfficiencyofMaliciousTwoPartyC..> 22-Dec-2014 09:03    402K
398-TheLayeredGamesFrameworkforSpecificationsan..> 22-Dec-2014 09:03    528K
399-MultiPropertyPreservingHashDomainExtensiona..> 22-Dec-2014 09:03    350K
400-ConcurrentStatisticalZeroKnowledgeArguments..> 22-Dec-2014 09:03    238K
401-Onthecostofcryptanalyticattacks.pdf            20-Jan-2023 14:22     207
402-AlgebraicCryptanalysisoftheDataEncryptionSt..> 22-Dec-2014 09:03    193K
402-AlgebraicCryptanalysisoftheDataEncryptionSt..> 22-Dec-2014 09:03    376K
403-NonWaferScaleSievingHardwarefortheNFSAnothe..> 22-Dec-2014 09:03    264K
403-NonWaferScaleSievingHardwarefortheNFSAnothe..> 22-Dec-2014 09:03    895K
404-Faugere39sF5AlgorithmRevisited.pdf             20-Jan-2023 08:38    639K
404-FaugeresF5AlgorithmRevisited.pdf               22-Dec-2014 09:03    639K
405-UniversallyComposableBlindSignaturesinthePl..> 22-Dec-2014 09:03    174K
405-UniversallyComposableBlindSignaturesinthePl..> 22-Dec-2014 09:03    329K
406-RedundancyoftheWangYuSufficientConditions.pdf  22-Dec-2014 09:03     77K
407-CryptographyintheMultistringModel.pdf          22-Dec-2014 09:03    231K
407-CryptographyintheMultistringModel.ps           22-Dec-2014 09:03    378K
408-AGenericConstructionofCCASecureCryptosystem..> 22-Dec-2014 09:03    200K
408-AGenericConstructionofCCASecureCryptosystem..> 22-Dec-2014 09:03    555K
409-ANEWMACLAMA.pdf                                22-Dec-2014 09:03     87K
410-GaloisFieldCommitmentScheme.pdf                22-Dec-2014 09:03    219K
411-PreimageAttackonHashingwithPolynomialspropo..> 22-Dec-2014 09:03    119K
411-PreimageAttackonHashingwithPolynomialspropo..> 22-Dec-2014 09:03      2M
411-PreimageAttackonHashingwithPolynomialspropo..> 20-Jan-2023 08:38    115K
412-PreimageAttacksonCellHashSubHashandStrength..> 22-Dec-2014 09:02    140K
412-PreimageAttacksonCellHashSubHashandStrength..> 22-Dec-2014 09:02      2M
413-PreimageAttackonParallelFFTHashing.pdf         22-Dec-2014 09:02    199K
414-ZeroKnowledgeandSoundnessareSymmetric.pdf      22-Dec-2014 09:02    325K
414-ZeroKnowledgeandSoundnessareSymmetric.ps       22-Dec-2014 09:02    558K
415-OntheMinimalEmbeddingField.pdf                 22-Dec-2014 09:02    123K
415-OntheMinimalEmbeddingField.ps                  22-Dec-2014 09:02    272K
416-AuthenticatedInterleavedEncryption.pdf         22-Dec-2014 09:02    190K
416-AuthenticatedInterleavedEncryption.ps          22-Dec-2014 09:02    283K
417-TheRecentAttackofNieetalOnTTMisFaulty.pdf      22-Dec-2014 09:02    134K
417-TheRecentAttackofNieetalOnTTMisFaulty.ps       22-Dec-2014 09:02    104K
418-AnalysisofPrivacyPreservingElementReduction..> 22-Dec-2014 09:02    161K
419-SomeNewHiddenIdealCryptosystems.pdf            22-Dec-2014 09:02    149K
420-TheREESSE1PublicKeyCryptosystemv221.pdf        22-Dec-2014 09:02    601K
421-UniversallyComposableThreePartyKeyDistribut..> 22-Dec-2014 09:02    141K
422-LongtermSecurityandUniversalComposability.pdf  22-Dec-2014 09:02    856K
423-PerfectNIZKwithAdaptiveSoundness.pdf           22-Dec-2014 09:02    273K
423-PerfectNIZKwithAdaptiveSoundness.ps            22-Dec-2014 09:02    542K
424-SecurityAnalysisofVoiceoverIPProtocols.pdf     22-Dec-2014 09:02    197K
425-Aprotocol.pdf                                  20-Jan-2023 08:38    251K
426-TheBilinearPairingbasedAccumulatorProposeda..> 20-Jan-2023 14:22     207
427-Pairingfriendlyellipticcurveswithsmallsecur..> 20-Jan-2023 08:38    197K
427-Pairingfriendlyellipticcurveswithsmallsecur..> 22-Dec-2014 09:02    197K
428-AnotherclassofquadraticAPNbinomialsoverF_2n..> 22-Dec-2014 09:02    158K
428-AnotherclassofquadraticAPNbinomialsoverF_2n..> 22-Dec-2014 09:02    335K
429-OnanewinvariantofBooleanfunctions.pdf          22-Dec-2014 09:02    110K
430-FromWeaktoStrongWatermarking.pdf               22-Dec-2014 09:02    339K
431-SomeEfficientAlgorithmsfortheFinalExponenti..> 22-Dec-2014 09:02    259K
432-UniversallyComposableSecuritywithGlobalSetu..> 22-Dec-2014 09:02    523K
432-UniversallyComposableSecuritywithGlobalSetu..> 22-Dec-2014 09:02    773K
433-InformationTheoreticBoundsonAuthenticationS..> 22-Dec-2014 09:02    194K
433-InformationTheoreticBoundsonAuthenticationS..> 22-Dec-2014 09:02    393K
434-BalancedBooleanFunctionswithmorethanMaximum..> 22-Dec-2014 09:02    113K
434-BalancedBooleanFunctionswithmorethanMaximum..> 22-Dec-2014 09:02    230K
435-SearchingforShapesinCryptographicProtocolse..> 22-Dec-2014 09:01    359K
436-StatisticallyHidingCommitmentfromAnyOneWayF..> 22-Dec-2014 09:01    246K
436-StatisticallyHidingCommitmentfromAnyOneWayF..> 22-Dec-2014 09:01    479K
437-OnZigzagFunctionsandRelatedObjectsinNewMetr..> 22-Dec-2014 09:01    137K
437-OnZigzagFunctionsandRelatedObjectsinNewMetr..> 22-Dec-2014 09:01    296K
438-OnthepseudorandomgeneratorISAAC.pdf            22-Dec-2014 09:01    115K
438-OnthepseudorandomgeneratorISAAC.ps             22-Dec-2014 09:01    283K
439-ANewTypeofGroupBlindSignatureSchemeBasedonB..> 22-Dec-2014 09:01    111K
440-ANewTypeofGroupSignatureScheme.pdf             22-Dec-2014 09:01    145K
441-GeneralDistinguishingAttacksonNMACandHMACwi..> 22-Dec-2014 09:01    142K
441-GeneralDistinguishingAttacksonNMACandHMACwi..> 22-Dec-2014 09:01      2M
442-Anattackonthecertificatelesssignaturescheme..> 22-Dec-2014 09:01     54K
443-ScalableAuthenticatedTreeBasedGroupKeyExcha..> 22-Dec-2014 09:01    203K
443-ScalableAuthenticatedTreeBasedGroupKeyExcha..> 22-Dec-2014 09:01    408K
444-LatticesthatAdmitLogarithmicWorstCasetoAver..> 22-Dec-2014 09:01    370K
444-LatticesthatAdmitLogarithmicWorstCasetoAver..> 22-Dec-2014 09:01    624K
445-AclassofquadraticAPNbinomialsinequivalentto..> 22-Dec-2014 09:01    232K
445-AclassofquadraticAPNbinomialsinequivalentto..> 22-Dec-2014 09:01    441K
446-NewIdentityBasedAuthenticatedKeyAgreementPr..> 22-Dec-2014 09:01    221K
446-NewIdentityBasedAuthenticatedKeyAgreementPr..> 22-Dec-2014 09:01    458K
447-TowardsaSeparationofSemanticandCCASecurityf..> 22-Dec-2014 09:01    927K
447-TowardsaSeparationofSemanticandCCASecurityf..> 22-Dec-2014 09:01      1M
448-UniversallyComposableandForwardSecureRFIDAu..> 22-Dec-2014 09:01    199K
448-UniversallyComposableandForwardSecureRFIDAu..> 22-Dec-2014 09:01    388K
449-RobustComputationalSecretSharingandaUnified..> 22-Dec-2014 09:01    366K
449-RobustComputationalSecretSharingandaUnified..> 22-Dec-2014 09:01    548K
450-SecureCryptographicWorkflowintheStandardMod..> 22-Dec-2014 09:01    265K
450-SecureCryptographicWorkflowintheStandardMod..> 22-Dec-2014 09:01    453K
451-CombinedDifferentialLinearandRelatedKeyAtta..> 22-Dec-2014 09:01    946K
452-HybridProtocolForPasswordbasedKeyExchangein..> 22-Dec-2014 09:00    294K
453-KeyReplacementAttackonaCertificatelessSigna..> 22-Dec-2014 09:00    116K
454-HowtoWintheCloneWarsEfficientPeriodicnTimes..> 22-Dec-2014 09:00    341K
454-HowtoWintheCloneWarsEfficientPeriodicnTimes..> 22-Dec-2014 09:00    629K
455-OnAchievingthe3939BestofBothWorlds3939inSec..> 20-Jan-2023 08:38    246K
455-OnAchievingtheBestofBothWorldsinSecureMulti..> 22-Dec-2014 09:00    238K
455-OnAchievingtheBestofBothWorldsinSecureMulti..> 22-Dec-2014 09:00    420K
456-IndistinguishabilityAmplification.pdf          22-Dec-2014 09:00    217K
457-LinearApproximatingtoIntegerAddition.pdf       22-Dec-2014 09:00     87K
458-CopyrightingPublickeyFunctionsandApplicatio..> 22-Dec-2014 09:00    356K
458-CopyrightingPublickeyFunctionsandApplicatio..> 22-Dec-2014 09:00    548K
459-Recursivelowerboundsonthenonlinearityprofil..> 22-Dec-2014 09:00    260K
460-PreimageAttacksOnProvablySecureFFTHashingpr..> 22-Dec-2014 09:00    145K
460-PreimageAttacksOnProvablySecureFFTHashingpr..> 22-Dec-2014 09:00      3M
461-OnPostModernCryptography.pdf                   22-Dec-2014 09:00    195K
461-OnPostModernCryptography.ps                    22-Dec-2014 09:00    342K
462-ImprovedCollisionandPreimageResistanceBound..> 22-Dec-2014 09:00    264K
463-ObfuscationforCryptographicPurposes.pdf        22-Dec-2014 09:00    262K
463-ObfuscationforCryptographicPurposes.ps         22-Dec-2014 09:00    468K
464-Remarkson34AnalysisofOnePopularGroupSignatu..> 20-Jan-2023 08:38    122K
464-RemarksonAnalysisofOnePopularGroupSignature..> 22-Dec-2014 09:00    122K
465-SecurityandCompositionofCryptographicProtoc..> 22-Dec-2014 09:00    503K
465-SecurityandCompositionofCryptographicProtoc..> 22-Dec-2014 09:00    518K
466-PrimeOrderPrimitiveSubgroupsinTorusBasedCry..> 22-Dec-2014 09:00    182K
467-DoWeNeedtoVarytheConstantsMethodologicalInv..> 22-Dec-2014 09:00    343K
467-DoWeNeedtoVarytheConstantsMethodologicalInv..> 22-Dec-2014 09:00      7M
468-WhiteBoxCryptographyAnotherAttempt.pdf         22-Dec-2014 08:59    142K
469-AnAttackonDisguisedEllipticCurves.pdf          22-Dec-2014 08:59    116K
469-AnAttackonDisguisedEllipticCurves.ps           22-Dec-2014 08:59    257K
470-Onthesecurityofagroupkeyagreementprotocol.pdf  22-Dec-2014 08:59     80K
470-Onthesecurityofagroupkeyagreementprotocol.ps   22-Dec-2014 08:59    204K
471-MultiplicationandSquaringonPairingFriendlyF..> 22-Dec-2014 08:59    242K
472-AFrameworkforInteractiveArgumentSystemsusin..> 22-Dec-2014 08:59    262K
472-AFrameworkforInteractiveArgumentSystemsusin..> 22-Dec-2014 08:59    543K
473-IdentityBasedProxyReencryption.pdf             22-Dec-2014 08:59    217K
474-SpeedinguptheBilinearPairingsComputationonC..> 22-Dec-2014 08:59    117K
475-NewTechniqueforSolvingSparseEquationSystems..> 22-Dec-2014 08:59    201K
475-NewTechniqueforSolvingSparseEquationSystems.ps 22-Dec-2014 08:59    261K
476-PasswordAuthenticatedMultiPartyKeyExchangew..> 22-Dec-2014 08:59    437K
476-PasswordAuthenticatedMultiPartyKeyExchangew..> 22-Dec-2014 08:59    486K
477-DynamicCryptographicHashFunctions.pdf          22-Dec-2014 08:59    158K
477-DynamicCryptographicHashFunctions.ps           22-Dec-2014 08:59    331K
478-NearCollisionAttackandCollisionAttackonDoub..> 22-Dec-2014 08:59    447K
478-NearCollisionAttackandCollisionAttackonDoub..> 22-Dec-2014 08:59      6M
479-EfficientProvablySecureHierarchicalKeyAssig..> 22-Dec-2014 08:59    325K
479-EfficientProvablySecureHierarchicalKeyAssig..> 22-Dec-2014 08:59    612K
480-CryptanalysisofREESSE1PublicKeyCryptosystem..> 22-Dec-2014 08:59    116K
481-APracticalLimitofSecurityProofintheIdealCip..> 22-Dec-2014 08:59    349K
481-APracticalLimitofSecurityProofintheIdealCip..> 22-Dec-2014 08:59      5M
482-CountermeasuresfortheSimpleBranchPrediction..> 22-Dec-2014 08:58     96K
482-CountermeasuresfortheSimpleBranchPrediction..> 22-Dec-2014 08:58    141K
483-NewConstructionsforProvablySecureTimeBoundH..> 22-Dec-2014 08:58    334K
483-NewConstructionsforProvablySecureTimeBoundH..> 22-Dec-2014 08:58    692K
484-ANewIdentityBasedEncryptionSchemeFromPairin..> 20-Jan-2023 14:21     207
485-IndifferentiabilityofSingleBlockLengthandRa..> 22-Dec-2014 08:58    170K
486-InductiveTracePropertiesforComputationalSec..> 22-Dec-2014 08:58    163K