Index of /2006/
../
001-HomomorphicCryptosystemsandtheirApplication..> 22-Dec-2014 09:23 715K
001-HomomorphicCryptosystemsandtheirApplication..> 22-Dec-2014 09:23 2M
002-Geometricconstructionsofoptimallinearperfec..> 22-Dec-2014 09:23 1M
003-SequentialandParallelCascadedConvolutionalE..> 22-Dec-2014 09:23 214K
004-ProvablySecureSubsitutionofCryptographicToo..> 22-Dec-2014 09:23 350K
005-PairingCalculationonSupersingularGenus2Curv..> 22-Dec-2014 09:23 137K
006-GroupKeyAgreementforAdHocNetworks.pdf 22-Dec-2014 09:23 2M
007-FurtherDiscussionsontheSecurityofaNominativ..> 22-Dec-2014 09:23 168K
008-ASimpleLefttoRightAlgorithmfortheComputatio..> 22-Dec-2014 09:22 111K
008-ASimpleLefttoRightAlgorithmfortheComputatio..> 22-Dec-2014 09:22 191K
009-BreakingandFixingPublicKeyKerberos.pdf 22-Dec-2014 09:22 193K
009-BreakingandFixingPublicKeyKerberos.ps 22-Dec-2014 09:22 380K
010-FindingCharacteristicPolynomialswithJumpInd..> 22-Dec-2014 09:22 128K
011-FormalProoffortheCorrectnessofRSAPSS.pdf 22-Dec-2014 09:22 284K
012-CertificateBasedEncryptionWithoutRandomOrac..> 22-Dec-2014 09:22 234K
012-CertificateBasedEncryptionWithoutRandomOrac..> 22-Dec-2014 09:22 452K
013-CommentsonaProvablySecureThreePartyPassword..> 22-Dec-2014 09:22 136K
014-SoundComputationalInterpretationofSymbolicH..> 22-Dec-2014 09:22 187K
014-SoundComputationalInterpretationofSymbolicH..> 22-Dec-2014 09:22 412K
015-AFamilyofDuncesTrivialRFIDIdentificationand..> 22-Dec-2014 09:22 269K
015-AFamilyofDuncesTrivialRFIDIdentificationand..> 22-Dec-2014 09:22 445K
016-MessageModificationforStep2123onSHA0.pdf 22-Dec-2014 09:22 129K
017-ThresholdandProactivePseudoRandomPermutatio..> 22-Dec-2014 09:22 268K
017-ThresholdandProactivePseudoRandomPermutatio..> 22-Dec-2014 09:22 587K
018-NotionofAlgebraicImmunityandItsevaluationRe..> 22-Dec-2014 09:22 164K
018-NotionofAlgebraicImmunityandItsevaluationRe..> 22-Dec-2014 09:22 347K
019-Hermes8ALowComplexityLowPowerStreamCipher.pdf 22-Dec-2014 09:22 214K
020-ScramblingAdversarialErrorsUsingFewRandomBi..> 22-Dec-2014 09:22 227K
020-ScramblingAdversarialErrorsUsingFewRandomBi..> 22-Dec-2014 09:22 433K
021-Cryptographichashfunctionsfromexpandergraph..> 22-Dec-2014 09:22 148K
023-AMethodtoImplementDirectAnonymousAttestatio..> 22-Dec-2014 09:22 171K
023-AMethodtoImplementDirectAnonymousAttestatio..> 22-Dec-2014 09:22 333K
024-ImprovingtheDecodingEfficiencyofPrivateSear..> 22-Dec-2014 09:22 103K
025-SignaturesforNetworkCoding.pdf 22-Dec-2014 09:22 195K
026-ConstructingPairingFriendlyEllipticCurveswi..> 22-Dec-2014 09:22 186K
027-FindingLowDegreeAnnihilatorsforaBooleanFunc..> 22-Dec-2014 09:22 127K
027-FindingLowDegreeAnnihilatorsforaBooleanFunc..> 22-Dec-2014 09:22 191K
028-CryptanalysisofrecentlyproposedRemoteUserAu..> 22-Dec-2014 09:22 207K
029-AuthenticatedHybridEncryptionforMultipleRec..> 22-Dec-2014 09:22 288K
029-AuthenticatedHybridEncryptionforMultipleRec..> 22-Dec-2014 09:22 534K
030-ImprovedcryptanalysisofPy.pdf 22-Dec-2014 09:22 184K
031-OnaVariationofKurosawaDesmedtEncryptionSche..> 22-Dec-2014 09:21 113K
031-OnaVariationofKurosawaDesmedtEncryptionSche..> 22-Dec-2014 09:21 245K
032-ReducingtheNumberofHomogeneousLinearEquatio..> 22-Dec-2014 09:21 280K
032-ReducingtheNumberofHomogeneousLinearEquatio..> 22-Dec-2014 09:21 278K
033-ArithmeticofGeneralizedJacobians.pdf 22-Dec-2014 09:21 469K
034-DirectChosenCiphertextSecureIdentityBasedKe..> 22-Dec-2014 09:21 430K
035-ParallelItohTsujiiMultiplicativeInversionAl..> 22-Dec-2014 09:21 327K
036-VectorStreamCipherInstantKeyRecovery.pdf 22-Dec-2014 09:21 125K
037-MessageAuthenticationon64bitArchitectures.pdf 22-Dec-2014 09:21 101K
037-MessageAuthenticationon64bitArchitectures.ps 22-Dec-2014 09:21 143K
038-ZhuangZiANewAlgorithmforSolvingMultivariate..> 22-Dec-2014 09:21 180K
039-TwoRoundAESDifferentials.pdf 22-Dec-2014 09:21 240K
040-LinkableDemocraticGroupSignatures.pdf 22-Dec-2014 09:21 288K
041-ReactivelySimulatableCertifiedMail.pdf 22-Dec-2014 09:21 586K
041-ReactivelySimulatableCertifiedMail.ps 22-Dec-2014 09:21 2M
042-ApplicationofLFSRsforParallelSequenceGenera..> 22-Dec-2014 09:21 158K
043-NewProofsforNMACandHMACSecurityWithoutColli..> 22-Dec-2014 09:21 455K
044-LinearIntegerSecretSharingandDistributedExp..> 22-Dec-2014 09:21 291K
044-LinearIntegerSecretSharingandDistributedExp..> 22-Dec-2014 09:21 369K
045-FullyCollusionResistantTraitorTracing.pdf 22-Dec-2014 09:21 283K
046-EfficientPrimitivesfromExponentiationinZp.pdf 22-Dec-2014 09:21 175K
046-EfficientPrimitivesfromExponentiationinZp.ps 22-Dec-2014 09:21 362K
047-CryptographicallySoundTheoremProving.pdf 22-Dec-2014 09:21 138K
048-NewResultsonMultipartiteAccessStructures.pdf 22-Dec-2014 09:21 277K
048-NewResultsonMultipartiteAccessStructures.ps 22-Dec-2014 09:21 376K
049-CrosswordPuzzleAttackonNLS.pdf 22-Dec-2014 09:21 202K
049-CrosswordPuzzleAttackonNLS.ps 22-Dec-2014 09:21 192K
050-SecureDevicePairingbasedonaVisualChannel.pdf 22-Dec-2014 09:21 1M
051-ProposalforPieceInHandMatrixVer2GeneralConc..> 22-Dec-2014 09:20 198K
052-SoftwaremitigationstohedgeAESagainstcacheba..> 22-Dec-2014 09:20 220K
052-SoftwaremitigationstohedgeAESagainstcacheba..> 22-Dec-2014 09:20 927K
053-CryptanalysisoftheCFVZcryptosystem.pdf 22-Dec-2014 09:20 122K
053-CryptanalysisoftheCFVZcryptosystem.ps 22-Dec-2014 09:20 256K
054-HowtoBuildaLowCostExtendedRangeRFIDSkimmer.pdf 22-Dec-2014 09:20 836K
055-MulticollisionAttacksonsomeGeneralizedSeque..> 22-Dec-2014 09:20 367K
056-KeyExchangeProtocolsSecurityDefinitionProof..> 22-Dec-2014 09:20 307K
057-KeyExchangeUsingPasswordsandLongKeys.pdf 22-Dec-2014 09:20 293K
057-KeyExchangeUsingPasswordsandLongKeys.ps 22-Dec-2014 09:20 464K
058-SymbolicandCryptographicAnalysisoftheSecure..> 22-Dec-2014 09:20 259K
059-HighSecurityPairingBasedCryptographyRevisit..> 22-Dec-2014 09:20 154K
059-HighSecurityPairingBasedCryptographyRevisit..> 22-Dec-2014 09:20 338K
060-AnEfficientIDbasedSignatureSchemefromPairin..> 20-Jan-2023 14:22 207
061-Withdrawn.pdf 20-Jan-2023 14:22 207
062-ANewModeofEncryptionSecureAgainstSymmetricN..> 20-Jan-2023 14:22 207
063-ProvablySecureUniversalSteganographicSystem..> 22-Dec-2014 09:20 105K
063-ProvablySecureUniversalSteganographicSystem..> 22-Dec-2014 09:20 218K
064-PerturbingandProtectingaTraceableBlockCiphe..> 22-Dec-2014 09:20 131K
064-PerturbingandProtectingaTraceableBlockCiphe..> 22-Dec-2014 09:20 319K
065-OnExpectedConstantRoundProtocolsforByzantin..> 22-Dec-2014 09:20 287K
065-OnExpectedConstantRoundProtocolsforByzantin..> 22-Dec-2014 09:20 477K
066-SimpleandFlexiblePrivateRevocationChecking.pdf 22-Dec-2014 09:20 183K
066-SimpleandFlexiblePrivateRevocationChecking.ps 22-Dec-2014 09:20 445K
067-ScalarMultiplicationonKoblitzCurvesusingDou..> 22-Dec-2014 09:20 204K
067-ScalarMultiplicationonKoblitzCurvesusingDou..> 22-Dec-2014 09:20 474K
068-LimitsoftheReactiveSimulatabilityUCofDolevY..> 22-Dec-2014 09:20 528K
069-AutomatedSecurityProofswithSequencesofGames..> 22-Dec-2014 09:20 304K
069-AutomatedSecurityProofswithSequencesofGames.ps 22-Dec-2014 09:20 602K
070-TheexperimentaldistinguishingattackonRC4.pdf 22-Dec-2014 09:20 93K
071-AFastandKeyEfficientReductionofChosenCipher..> 22-Dec-2014 09:20 257K
071-AFastandKeyEfficientReductionofChosenCipher..> 22-Dec-2014 09:20 550K
072-CryptanalysisoftheBluetoothE0CipherusingOBD..> 20-Jan-2023 08:39 276K
072-CryptanalysisoftheBluetoothE0CipherusingOBD..> 22-Dec-2014 09:19 276K
073-StrongerSecurityofAuthenticatedKeyExchange.pdf 22-Dec-2014 09:19 192K
073-StrongerSecurityofAuthenticatedKeyExchange.ps 22-Dec-2014 09:19 380K
074-HowtoConstructSufficientConditioninSearchin..> 22-Dec-2014 09:19 169K
075-ONTHEWEILSUMEVALUATIONOFCENTRALPOLYNOMIALIN..> 22-Dec-2014 09:19 165K
075-ONTHEWEILSUMEVALUATIONOFCENTRALPOLYNOMIALIN..> 22-Dec-2014 09:19 369K
076-ACryptosystemBasedonHiddenOrderGroupsandIts..> 20-Jan-2023 14:22 207
077-OnSecretSharingSchemesMatroidsandPolymatroi..> 22-Dec-2014 09:19 204K
078-VerifiableRandomPermutations.pdf 22-Dec-2014 09:19 296K
079-TowardsProvablySecureGroupKeyAgreementBuild..> 22-Dec-2014 09:19 204K
079-TowardsProvablySecureGroupKeyAgreementBuild..> 22-Dec-2014 09:19 405K
080-EfficientIdentitybasedSignaturesSecureinthe..> 22-Dec-2014 09:19 234K
081-TamperEvidentHistoryIndependentSubliminalFr..> 22-Dec-2014 09:19 264K
081-TamperEvidentHistoryIndependentSubliminalFr..> 22-Dec-2014 09:19 571K
082-ParsimoniousAsynchronousByzantineFaultToler..> 22-Dec-2014 09:19 163K
082-ParsimoniousAsynchronousByzantineFaultToler..> 22-Dec-2014 09:19 260K
083-BrowsersDefensesAgainstPhishingSpoofingandM..> 22-Dec-2014 09:19 311K
084-CryptographyfromAnonymity.pdf 22-Dec-2014 09:19 236K
084-CryptographyfromAnonymity.ps 22-Dec-2014 09:19 227K
085-AnonymousHierarchicalIdentityBasedEncryptio..> 22-Dec-2014 09:19 321K
085-AnonymousHierarchicalIdentityBasedEncryptio..> 22-Dec-2014 09:19 565K
086-AnalysisoftheLinuxRandomNumberGenerator.pdf 22-Dec-2014 09:19 288K
087-AnalysisoftheSPVSecureRoutingProtocolWeakne..> 22-Dec-2014 09:19 337K
088-OntheFeasibilityofConsistentComputations.pdf 22-Dec-2014 09:19 258K
089-ATreebasedModelofUnicastStreamAuthenticatio..> 22-Dec-2014 09:19 232K
089-ATreebasedModelofUnicastStreamAuthenticatio..> 22-Dec-2014 09:19 479K
090-SecureSketchforMultiSets.pdf 22-Dec-2014 09:19 95K
091-TheComplexityofOnlineMemoryChecking.pdf 22-Dec-2014 09:19 414K
091-TheComplexityofOnlineMemoryChecking.ps 22-Dec-2014 09:19 650K
092-CryptanalysisofRSAwithconstrainedkeys.pdf 22-Dec-2014 09:19 217K
092-CryptanalysisofRSAwithconstrainedkeys.ps 22-Dec-2014 09:19 210K
093-RSAandahigherdegreediophantineequation.pdf 22-Dec-2014 09:19 173K
093-RSAandahigherdegreediophantineequation.ps 22-Dec-2014 09:19 377K
094-CryptanalysisoftheMEMModeofOperation.pdf 22-Dec-2014 09:19 101K
094-CryptanalysisoftheMEMModeofOperation.ps 22-Dec-2014 09:18 276K
095-MACReforgeability.pdf 22-Dec-2014 09:18 406K
096-SequentialAggregateSignaturesandMultisignat..> 22-Dec-2014 09:18 253K
097-ACryptographicTouroftheIPsecStandards.pdf 22-Dec-2014 09:18 152K
098-GrbnerBasisBasedCryptanalysisofSHA1.pdf 20-Jan-2023 08:39 447K
098-GrobnerBasisBasedCryptanalysisofSHA1.pdf 22-Dec-2014 09:18 381K
098-GrobnerBasisBasedCryptanalysisofSHA1.ps 22-Dec-2014 09:18 1M
099-AnEfficientSingleKeyPiratesTracingSchemeUsi..> 22-Dec-2014 09:18 225K
100-AShorterGroupSignaturewithVerifierLocationR..> 22-Dec-2014 09:18 173K
101-InformationtheoreticanalysisofcoatingPUFs.pdf 22-Dec-2014 09:18 281K
101-InformationtheoreticanalysisofcoatingPUFs.ps 22-Dec-2014 09:18 477K
102-EfficientBlindandPartiallyBlindSignaturesWi..> 22-Dec-2014 09:18 363K
102-EfficientBlindandPartiallyBlindSignaturesWi..> 22-Dec-2014 09:18 549K
103-SecurityofVSHintheRealWorld.pdf 22-Dec-2014 09:18 81K
103-SecurityofVSHintheRealWorld.ps 22-Dec-2014 09:18 134K
104-FastCollisionAttackonMD5.pdf 22-Dec-2014 09:18 194K
105-TunnelsinHashFunctionsMD5CollisionsWithinaM..> 22-Dec-2014 09:18 140K
106-FurtherRefinementofPairingComputationBasedo..> 20-Jan-2023 08:39 244K
106-FurtherRefinementofPairingComputationBasedo..> 22-Dec-2014 09:18 200K
106-FurtherRefinementofPairingComputationBasedo..> 22-Dec-2014 09:18 442K
107-Thenumberfieldsieveforintegersoflowweight.pdf 22-Dec-2014 09:18 224K
108-EfficientPublicKeyEncryptionwithKeywordSear..> 22-Dec-2014 09:18 125K
109-ASimplerSievingDeviceCombiningECMandTWIRL.pdf 22-Dec-2014 09:18 206K
109-ASimplerSievingDeviceCombiningECMandTWIRL.ps 22-Dec-2014 09:18 384K
110-TheEtaPairingRevisited.pdf 22-Dec-2014 09:18 199K
110-TheEtaPairingRevisited.ps 22-Dec-2014 09:18 423K
111-AttackingLCCCBatchVerificationofRSASignatur..> 22-Dec-2014 09:18 94K
111-AttackingLCCCBatchVerificationofRSASignatur..> 22-Dec-2014 09:18 236K
112-EntityAuthenticationandAuthenticatedKeyExch..> 22-Dec-2014 09:18 196K
112-EntityAuthenticationandAuthenticatedKeyExch..> 22-Dec-2014 09:18 378K
113-ANewConstructionofTimeCapsuleSignature.pdf 22-Dec-2014 09:18 225K
114-Tatepairingfory2x5alphaxinCharacteristicFiv..> 22-Dec-2014 09:18 177K
114-Tatepairingfory2x5alphaxinCharacteristicFiv..> 22-Dec-2014 09:18 482K
115-Fastexponentiationviaprimefinitefieldisomor..> 22-Dec-2014 09:18 88K
116-SecondPreimagesforIteratedHashFunctionsBase..> 22-Dec-2014 09:18 237K
117-ConjecturedSecurityoftheANSINISTEllipticCur..> 22-Dec-2014 09:17 227K
118-OnconstructionofnonnormalBooleanfunctions.pdf 22-Dec-2014 09:17 74K
118-OnconstructionofnonnormalBooleanfunctions.ps 22-Dec-2014 09:17 194K
119-RepairingAttacksonaPasswordBasedGroupKeyAgr..> 20-Jan-2023 14:22 207
120-KeyPrivacyforIdentityBasedEncryption.pdf 22-Dec-2014 09:17 103K
121-CountingPrimeNumberswithShortBinarySignedRe..> 22-Dec-2014 09:17 251K
121-CountingPrimeNumberswithShortBinarySignedRe..> 22-Dec-2014 09:17 2M
122-ChosenCiphertextSecureIdentityBasedEncrypti..> 22-Dec-2014 09:17 387K
123-DesignatedConfirmerSignaturesRevisited.pdf 22-Dec-2014 09:17 524K
124-FastEllipticScalarMultiplicationusingNewDou..> 22-Dec-2014 09:17 199K
125-FastcomputationofTatepairingongeneraldiviso..> 22-Dec-2014 09:17 230K
126-ECGSCEllipticCurvebasedGeneralizedSigncrypt..> 22-Dec-2014 09:17 98K
127-ANewCryptanalyticTimeMemoryDataTradeoffAlgo..> 22-Dec-2014 09:17 221K
127-ANewCryptanalyticTimeMemoryDataTradeoffAlgo..> 22-Dec-2014 09:17 204K
128-Ontheexistenceofdistortionmapsonordinaryell..> 22-Dec-2014 09:17 128K
129-SomeRemarksontheTKIPKeyMixingFunctionofIEEE..> 22-Dec-2014 09:17 205K
130-SimulatableSecurityandPolynomiallyBoundedCo..> 22-Dec-2014 09:17 252K
130-SimulatableSecurityandPolynomiallyBoundedCo..> 22-Dec-2014 09:17 466K
131-ProvablySecureUbiquitousSystemsUniversallyC..> 22-Dec-2014 09:17 565K
131-ProvablySecureUbiquitousSystemsUniversallyC..> 22-Dec-2014 09:17 734K
132-ConditionalReactiveSimulatability.pdf 22-Dec-2014 09:17 177K
133-LowComplexityBitParallelSquareRootComputati..> 22-Dec-2014 09:17 308K
134-IdentityBasedStrongDesignatedVerifierSignat..> 22-Dec-2014 09:17 145K
135-TheDesignPrincipleofHashFunctionwithMerkleD..> 22-Dec-2014 09:17 201K
135-TheDesignPrincipleofHashFunctionwithMerkleD..> 20-Jan-2023 08:39 201K
136-AChallengingbutFeasibleBlockwiseAdaptiveCho..> 22-Dec-2014 09:17 130K
137-DefiningStrongPrivacyforRFID.pdf 22-Dec-2014 09:17 378K
138-TraceDrivenCacheAttacksonAES.pdf 22-Dec-2014 09:17 166K
139-AUnifiedFrameworkfortheAnalysisofSideChanne..> 22-Dec-2014 09:17 1M
139-AUnifiedFrameworkfortheAnalysisofSideChanne..> 22-Dec-2014 09:17 5M
140-GVGRPANetcentricNegligibilitybasedSecurityM..> 22-Dec-2014 09:16 259K
140-GVGRPANetcentricNegligibilitybasedSecurityM..> 22-Dec-2014 09:16 568K
141-LinearSequentialCircuitApproximationofGrain..> 22-Dec-2014 09:16 244K
142-RationalSecretSharingRevisited.pdf 22-Dec-2014 09:16 165K
142-RationalSecretSharingRevisited.ps 22-Dec-2014 09:16 308K
143-BlindedFaultResistantExponentiation.pdf 22-Dec-2014 09:16 134K
144-ImplementingCryptographicPairingsonSmartcar..> 22-Dec-2014 09:16 230K
145-PUBLICKEYCRYPTOSYSTEMBASEDONISOGENIES.pdf 22-Dec-2014 09:16 190K
145-PUBLICKEYCRYPTOSYSTEMBASEDONISOGENIES.ps 22-Dec-2014 09:16 574K
146-CompletenessofFormalHashesintheStandardMode..> 22-Dec-2014 09:16 167K
146-CompletenessofFormalHashesintheStandardMode..> 22-Dec-2014 09:16 362K
147-NewIntegratedproofMethodonIteratedHashStruc..> 22-Dec-2014 09:16 641K
148-ComputationalIndistinguishabilitybetweenQua..> 22-Dec-2014 09:16 342K
148-ComputationalIndistinguishabilitybetweenQua..> 22-Dec-2014 09:16 485K
149-Amethodofconstructionofbalancedfunctionswit..> 22-Dec-2014 09:16 236K
150-Demonstratingdatapossessionanduncheatableda..> 22-Dec-2014 09:16 72K
151-SimulationBasedSecuritywithInexhaustibleInt..> 22-Dec-2014 09:16 325K
151-SimulationBasedSecuritywithInexhaustibleInt..> 22-Dec-2014 09:16 518K
152-PairingbasedMutualAuthenticationSchemeUsing..> 22-Dec-2014 09:16 132K
153-OntheRelationshipsBetweenNotionsofSimulatio..> 22-Dec-2014 09:16 562K
153-OntheRelationshipsBetweenNotionsofSimulatio..> 22-Dec-2014 09:16 898K
154-NewPublicKeyAuthenticationFrameworkswithLit..> 22-Dec-2014 09:16 202K
154-NewPublicKeyAuthenticationFrameworkswithLit..> 22-Dec-2014 09:16 408K
155-IndependentZeroKnowledgeSets.pdf 22-Dec-2014 09:16 333K
155-IndependentZeroKnowledgeSets.ps 22-Dec-2014 09:16 540K
156-TheHardnessoftheDHKProblemintheGenericGroup..> 22-Dec-2014 09:16 90K
156-TheHardnessoftheDHKProblemintheGenericGroup..> 22-Dec-2014 09:16 219K
157-Anefficientwaytoaccessanarrayatasecretindex..> 22-Dec-2014 09:15 94K
157-Anefficientwaytoaccessanarrayatasecretindex.ps 22-Dec-2014 09:15 217K
158-AnEfficientIDbasedProxySignatureSchemefromP..> 22-Dec-2014 09:15 189K
159-RepairingaSecurityMediatedCertificatelessEn..> 20-Jan-2023 14:22 207
160-ABuiltinDecisionalFunctionandSecurityProofo..> 20-Jan-2023 14:22 207
161-Cryptanalysisof4PassHAVAL.pdf 22-Dec-2014 09:15 168K
162-ASummaryofMcElieceTypeCryptosystemsandtheir..> 22-Dec-2014 09:15 475K
162-ASummaryofMcElieceTypeCryptosystemsandtheir..> 22-Dec-2014 09:15 471K
163-AchievingalognSpeedUpforBooleanMatrixOperat..> 22-Dec-2014 09:15 259K
164-ClassificationofSignatureonlySignatureModel..> 22-Dec-2014 09:15 141K
165-PairingsforCryptographers.pdf 22-Dec-2014 09:15 132K
165-PairingsforCryptographers.ps 22-Dec-2014 09:15 276K
166-GeneralSecretSharingBasedontheChineseRemain..> 22-Dec-2014 09:15 217K
167-TowardsTrustworthyeVotingusingPaperReceipts..> 22-Dec-2014 09:15 364K
167-TowardsTrustworthyeVotingusingPaperReceipts.ps 22-Dec-2014 09:15 1M
168-HowFastcanbeAlgebraicAttacksonBlockCiphers.pdf 22-Dec-2014 09:15 96K
168-HowFastcanbeAlgebraicAttacksonBlockCiphers.ps 22-Dec-2014 09:15 255K
169-Simplifiedpairingcomputationandsecurityimpl..> 22-Dec-2014 09:15 95K
170-VisualCryptographySchemeswithOptimalPixelEx..> 22-Dec-2014 09:15 281K
171-Keyconfirmationandadaptivecorruptionsinthep..> 22-Dec-2014 09:15 246K
171-Keyconfirmationandadaptivecorruptionsinthep..> 22-Dec-2014 09:15 391K
172-OnComputingProductsofPairings.pdf 22-Dec-2014 09:15 132K
172-OnComputingProductsofPairings.ps 22-Dec-2014 09:15 285K
173-SomePracticalPublicKeyEncryptionSchemesinbo..> 22-Dec-2014 09:15 168K
173-SomePracticalPublicKeyEncryptionSchemesinbo..> 22-Dec-2014 09:15 333K
174-FrobeniusexpansionandtheDiffieHellmanproble..> 20-Jan-2023 14:22 207
175-TightBoundsforUnconditionalAuthenticationPr..> 22-Dec-2014 09:15 321K
175-TightBoundsforUnconditionalAuthenticationPr..> 22-Dec-2014 09:15 2M
176-Countingpointsonellipticcurvesinmediumchara..> 22-Dec-2014 09:15 223K
177-OntheImPossibilityofExtendingCoinToss.pdf 22-Dec-2014 09:15 406K
177-OntheImPossibilityofExtendingCoinToss.ps 22-Dec-2014 09:15 745K
178-ANewCryptosystemBasedOnHiddenOrderGroups.pdf 22-Dec-2014 09:14 499K
178-ANewCryptosystemBasedOnHiddenOrderGroups.ps 22-Dec-2014 09:14 2M
179-FPGAAcceleratedTatePairingBasedCryptosystem..> 22-Dec-2014 09:14 313K
180-DivisibilityoftheHammingWeightby2kandMonomi..> 22-Dec-2014 09:14 150K
181-ThereexistBooleanfunctionsonnoddvariablesha..> 22-Dec-2014 09:14 157K
181-ThereexistBooleanfunctionsonnoddvariablesha..> 22-Dec-2014 09:14 299K
181-ThereexistBooleanfunctionsonnoddvariablesha..> 20-Jan-2023 08:39 173K
182-OntheLimitsofPointFunctionObfuscation.pdf 22-Dec-2014 09:14 228K
182-OntheLimitsofPointFunctionObfuscation.ps 22-Dec-2014 09:14 439K
183-InformationTheoreticConditionsforTwoPartySe..> 22-Dec-2014 09:14 242K
184-OnSignaturesofKnowledge.pdf 22-Dec-2014 09:14 323K
184-OnSignaturesofKnowledge.ps 22-Dec-2014 09:14 579K
185-StatisticalZeroKnowledgeArgumentsforNPfromA..> 22-Dec-2014 09:14 609K
185-StatisticalZeroKnowledgeArgumentsforNPfromA..> 22-Dec-2014 09:14 954K
186-DeterministicandEfficientlySearchableEncryp..> 22-Dec-2014 09:14 444K
187-OntheSecurityofHMACandNMACBasedonHAVALMD4MD..> 22-Dec-2014 09:14 236K
187-OntheSecurityofHMACandNMACBasedonHAVALMD4MD..> 22-Dec-2014 09:14 501K
188-NewBlockcipherModesofOperationwithBeyondthe..> 22-Dec-2014 09:14 234K
188-NewBlockcipherModesofOperationwithBeyondthe..> 22-Dec-2014 09:14 522K
189-Unconditionallysecurechaffingandwinnowingwi..> 22-Dec-2014 09:14 309K
190-CryptanalysisoftheDualEllipticCurvePseudora..> 22-Dec-2014 09:14 122K
190-CryptanalysisoftheDualEllipticCurvePseudora..> 22-Dec-2014 09:14 553K
191-APUBLICKEYCRYPTOSYSTEMBASEDONPELLEQUATION.pdf 22-Dec-2014 09:14 157K
192-DPAattacksonkeysstoredinCMOScryptographicde..> 22-Dec-2014 09:14 79K
193-HierarchicalIdentityBasedThresholdRingSigna..> 22-Dec-2014 09:14 335K
194-SelfGeneratedCertificatePublicKeyCryptosyst..> 20-Jan-2023 08:39 379K
195-AnEfficientIDbasedDigitalSignaturewithMessa..> 22-Dec-2014 09:14 145K
195-AnEfficientIDbasedDigitalSignaturewithMessa..> 22-Dec-2014 09:14 412K
196-OnZKCryptBookStackandStatisticalTests.pdf 22-Dec-2014 09:14 121K
197-ANovelAlgorithmforSolvingtheLPNProblemandit..> 22-Dec-2014 09:14 186K
198-CryptographicallyPrivateSupportVectorMachin..> 22-Dec-2014 09:13 270K
199-IdentitybasedKeyAgreementProtocolsFromPairi..> 22-Dec-2014 09:13 412K
199-IdentitybasedKeyAgreementProtocolsFromPairi..> 22-Dec-2014 09:13 687K
200-ImprovementofrecentlyproposedRemoteUserAuth..> 22-Dec-2014 09:13 67K
201-EfficientTatePairingComputationUsingDoubleB..> 22-Dec-2014 09:13 157K
201-EfficientTatePairingComputationUsingDoubleB..> 22-Dec-2014 09:13 347K
202-Atepairingfory2x5alphaxincharacteristicfive..> 22-Dec-2014 09:13 133K
202-Atepairingfory2x5alphaxincharacteristicfive.ps 22-Dec-2014 09:13 376K
203-GeneralizationoftheSelectiveIDSecurityModel..> 22-Dec-2014 09:13 255K
203-GeneralizationoftheSelectiveIDSecurityModel..> 22-Dec-2014 09:13 262K
204-TowardsMinimizingMemoryRequirementforImplem..> 22-Dec-2014 09:13 312K
204-TowardsMinimizingMemoryRequirementforImplem..> 22-Dec-2014 09:13 552K
205-IDBasedRingSignatureSchemesecureintheStanda..> 20-Jan-2023 14:22 207
206-OntheProvableSecurityofanEfficientRSABasedP..> 22-Dec-2014 09:13 295K
206-OntheProvableSecurityofanEfficientRSABasedP..> 22-Dec-2014 09:13 552K
207-TheKurosawaDesmedtKeyEncapsulationisnotChos..> 22-Dec-2014 09:13 101K
208-PrivateInformationRetrievalUsingTrustedHard..> 22-Dec-2014 09:13 363K
208-PrivateInformationRetrievalUsingTrustedHard..> 22-Dec-2014 09:13 987K
209-MinimalWeightandColexicographicallyMinimalI..> 22-Dec-2014 09:13 174K
209-MinimalWeightandColexicographicallyMinimalI..> 22-Dec-2014 09:13 276K
210-SearchableSymmetricEncryptionImprovedDefini..> 22-Dec-2014 09:13 542K
211-ASurveyofCertificatelessEncryptionSchemesan..> 22-Dec-2014 09:13 297K
211-ASurveyofCertificatelessEncryptionSchemesan..> 22-Dec-2014 09:13 377K
212-ReverseSSLImprovedServerPerformanceandDoSRe..> 22-Dec-2014 09:13 107K
213-LubyRackoffCiphersfromWeakRoundFunctions.pdf 22-Dec-2014 09:13 348K
213-LubyRackoffCiphersfromWeakRoundFunctions.ps 22-Dec-2014 09:13 710K
214-PasswordAuthenticatedConstantRoundGroupKeyE..> 22-Dec-2014 09:13 284K
214-PasswordAuthenticatedGroupKeyEstablishmentf..> 20-Jan-2023 08:39 430K
215-CryptanalysisofanImageScramblingSchemewitho..> 22-Dec-2014 09:13 1M
216-FastandSecureEllipticCurveScalarMultiplicat..> 22-Dec-2014 09:13 173K
217-StatisticalAnalysisoftheMARSBlockCipher.pdf 22-Dec-2014 09:13 112K
217-StatisticalAnalysisoftheMARSBlockCipher.ps 22-Dec-2014 09:13 106K
218-ComputationallySoundSymbolicSecrecyinthePre..> 22-Dec-2014 09:13 302K
218-ComputationallySoundSymbolicSecrecyinthePre..> 22-Dec-2014 09:12 466K
219-CryptographicallySoundSecurityProofsforBasi..> 22-Dec-2014 09:12 414K
219-CryptographicallySoundSecurityProofsforBasi..> 22-Dec-2014 09:12 718K
220-MultiDimensionalMontgomeryLaddersforEllipti..> 22-Dec-2014 09:12 160K
221-DeterministicAuthenticatedEncryptionAProvab..> 22-Dec-2014 09:12 501K
221-DeterministicAuthenticatedEncryptionAProvab..> 22-Dec-2014 09:12 4M
222-DecodingInterleavedGabidulinCodesandCiphert..> 22-Dec-2014 09:12 156K
222-DecodingInterleavedGabidulinCodesandCiphert..> 22-Dec-2014 09:12 335K
223-WhatHashesMakeRSAOAEPSecure.pdf 22-Dec-2014 09:12 225K
224-GeneralizationsoftheKaratsubaAlgorithmforEf..> 22-Dec-2014 09:12 211K
224-GeneralizationsoftheKaratsubaAlgorithmforEf..> 22-Dec-2014 09:12 430K
225-ProvablySecureTimeBoundHierarchicalKeyAssig..> 22-Dec-2014 09:12 382K
225-ProvablySecureTimeBoundHierarchicalKeyAssig..> 22-Dec-2014 09:12 665K
226-TheFairnessofPerfectConcurrentSignatures.pdf 22-Dec-2014 09:12 186K
227-AnEllipticCurveProcessorSuitableForRFIDTags..> 22-Dec-2014 09:12 312K
227-AnEllipticCurveProcessorSuitableForRFIDTags.ps 22-Dec-2014 09:12 925K
228-NonMalleableEncryptionEquivalencebetweenTwo..> 22-Dec-2014 09:12 246K
228-NonMalleableEncryptionEquivalencebetweenTwo..> 22-Dec-2014 09:12 473K
229-AnotherLookat34ProvableSecurity34II.pdf 20-Jan-2023 08:39 341K
229-AnotherLookatProvableSecurityII.pdf 22-Dec-2014 09:12 341K
230-AnotherLookatGenericGroups.pdf 22-Dec-2014 09:12 210K
231-Ahandymulticouponsystem.pdf 22-Dec-2014 09:12 274K
231-Ahandymulticouponsystem.ps 22-Dec-2014 09:12 568K
232-ImprovementtoAKSalgorithm.pdf 22-Dec-2014 09:12 32K
233-AsimplegeneralizationofElGamalcryptosystemt..> 22-Dec-2014 09:12 411K
233-AsimplegeneralizationofElGamalcryptosystemt..> 22-Dec-2014 09:12 550K
234-RFIDSecurityTradeoffsbetweenSecurityandEffi..> 22-Dec-2014 09:12 177K
235-ApplicationofECMtoaClassofRSAkeys.pdf 22-Dec-2014 09:11 172K
235-ApplicationofECMtoaClassofRSAkeys.ps 22-Dec-2014 09:11 372K
236-OnlineOfflineSignaturesandMultisignaturesfo..> 22-Dec-2014 09:11 299K
236-OnlineOfflineSignaturesandMultisignaturesfo..> 22-Dec-2014 09:11 711K
237-SideChannelAnalysisofPracticalPairingImplem..> 22-Dec-2014 09:11 215K
238-SearchableIndexSchemesforGroupsSecurityvsEf..> 20-Jan-2023 14:22 207
239-ResettableZeroKnowledgeintheBarePublicKeyMo..> 22-Dec-2014 09:11 222K
240-ComputingZetaFunctionsofNondegenerateCurves..> 22-Dec-2014 09:11 466K
240-ComputingZetaFunctionsofNondegenerateCurves.ps 22-Dec-2014 09:11 804K
241-AStrongerDefinitionforAnonymousElectronicCa..> 22-Dec-2014 09:11 395K
241-AStrongerDefinitionforAnonymousElectronicCa..> 22-Dec-2014 09:11 1M
242-TheProbabilityAdvantagesofTwoLinearExpressi..> 22-Dec-2014 09:11 149K
243-SideChannelAttacksandCountermeasuresonPairi..> 22-Dec-2014 09:11 162K
244-LengthbasedcryptanalysisThecaseofThompson39..> 20-Jan-2023 08:39 214K
244-LengthbasedcryptanalysisThecaseofThompsonsG..> 22-Dec-2014 09:11 152K
244-LengthbasedcryptanalysisThecaseofThompsonsG..> 22-Dec-2014 09:11 328K
245-SecureandEfficientThresholdKeyIssuingProtoc..> 22-Dec-2014 09:11 142K
246-ONTHEPOSTQUANTUMCIPHERSCHEME.pdf 22-Dec-2014 09:11 112K
246-ONTHEPOSTQUANTUMCIPHERSCHEME.ps 22-Dec-2014 09:11 213K
247-FactoringClassPolynomialsovertheGenusField.pdf 20-Jan-2023 14:22 207
248-Disguisingtoriandellipticcurves.pdf 22-Dec-2014 09:11 157K
249-Enumerationof9variableRotationSymmetricBool..> 22-Dec-2014 09:11 170K
249-Enumerationof9variableRotationSymmetricBool..> 22-Dec-2014 09:11 350K
249-Enumerationof9variableRotationSymmetricBool..> 20-Jan-2023 08:39 197K
250-LinearCryptanalysisofCTC.pdf 22-Dec-2014 09:11 91K
251-AcceleratingCryptanalysiswiththeMethodofFou..> 22-Dec-2014 09:11 220K
252-OntheResilienceofKeyAgreementProtocolstoKey..> 22-Dec-2014 09:11 162K
253-HardInstancesoftheConstrainedDiscreteLogari..> 22-Dec-2014 09:11 265K
253-HardInstancesoftheConstrainedDiscreteLogari..> 22-Dec-2014 09:11 588K
254-ApplicationsofSATSolverstoCryptanalysisofHa..> 22-Dec-2014 09:11 181K
254-ApplicationsofSATSolverstoCryptanalysisofHa..> 22-Dec-2014 09:11 464K
255-MaliciousKGCAttacksinCertificatelessCryptog..> 22-Dec-2014 09:11 247K
256-ConstantRoundConcurrentNMWIanditsrelationto..> 22-Dec-2014 09:11 375K
257-EfficientDivisorClassHalvingonGenusTwoCurve..> 22-Dec-2014 09:10 130K
258-CryptanalysisofaCognitiveAuthenticationSche..> 22-Dec-2014 09:10 138K
259-SimplifiedSubmissionofInputstoProtocols.pdf 22-Dec-2014 09:10 276K
260-ANoteOnGameHoppingProofs.pdf 22-Dec-2014 09:10 174K
261-UsingWiedemann39salgorithmtocomputetheimmun..> 20-Jan-2023 08:39 142K
261-UsingWiedemannsalgorithmtocomputetheimmunit..> 22-Dec-2014 09:10 184K
261-UsingWiedemannsalgorithmtocomputetheimmunit..> 22-Dec-2014 09:10 369K
262-LogicalConceptsinCryptography.pdf 22-Dec-2014 09:10 2M
263-EfficientFPGAImplementationsandCryptanalysi..> 22-Dec-2014 09:10 270K
264-ASimpleandUnifiedMethodofProvingUnpredictab..> 22-Dec-2014 09:10 217K
264-ASimpleandUnifiedMethodofProvingUnpredictab..> 22-Dec-2014 09:10 430K
265-Someinsufficientconditionsforsecurehybriden..> 22-Dec-2014 09:10 373K
266-ComputationallySoundSecrecyProofsbyMechaniz..> 22-Dec-2014 09:10 272K
266-ComputationallySoundSecrecyProofsbyMechaniz..> 22-Dec-2014 09:10 474K
267-StatefulPublicKeyCryptosystemsHowtoEncryptw..> 22-Dec-2014 09:10 252K
267-StatefulPublicKeyCryptosystemsHowtoEncryptw..> 22-Dec-2014 09:10 487K
268-OntheEquivalenceofSeveralSecurityNotionsofK..> 22-Dec-2014 09:10 141K
269-AnAnalysisoftheHermes8StreamCiphers.pdf 22-Dec-2014 09:10 223K
269-AnAnalysisoftheHermes8StreamCiphers.ps 22-Dec-2014 09:10 415K
270-FormalAnalysisandSystematicConstructionofTw..> 22-Dec-2014 09:10 272K
271-ModesofEncryptionSecureagainstBlockwiseAdap..> 22-Dec-2014 09:10 228K
272-EfficientUseofRandomDelays.pdf 22-Dec-2014 09:10 242K
272-EfficientUseofRandomDelays.ps 22-Dec-2014 09:10 19M
273-SecurePositioningofMobileTerminalswithSimpl..> 22-Dec-2014 09:09 180K
273-SecurePositioningofMobileTerminalswithSimpl..> 22-Dec-2014 09:09 555K
274-AnImprovedRemoteUserAuthenticationSchemewit..> 22-Dec-2014 09:09 124K
275-ANewModeofEncryptionProvidingATweakableStro..> 22-Dec-2014 09:09 265K
275-ANewModeofEncryptionProvidingATweakableStro..> 22-Dec-2014 09:09 592K
276-MitigatingDictionaryAttacksonPasswordProtec..> 22-Dec-2014 09:09 261K
276-MitigatingDictionaryAttacksonPasswordProtec..> 22-Dec-2014 09:09 438K
277-OnExpectedProbabilisticPolynomialTimeAdvers..> 22-Dec-2014 09:09 332K
277-OnExpectedProbabilisticPolynomialTimeAdvers..> 22-Dec-2014 09:09 594K
278-Fundamentalproblemsinprovablesecurityandcry..> 22-Dec-2014 09:09 286K
278-Fundamentalproblemsinprovablesecurityandcry..> 22-Dec-2014 09:09 9M
279-OnHierarchicalIdentityBasedEncryptionProtoc..> 20-Jan-2023 08:39 316K
279-OnHierarchicalIdentityBasedEncryptionProtoc..> 22-Dec-2014 09:09 316K
280-DeniableAuthenticationandKeyExchange.pdf 22-Dec-2014 09:09 409K
280-DeniableAuthenticationandKeyExchange.ps 22-Dec-2014 09:08 390K
281-FormalizingHumanIgnoranceCollisionResistant..> 22-Dec-2014 09:08 206K
281-FormalizingHumanIgnoranceCollisionResistant..> 22-Dec-2014 09:08 375K
282-ChosenCiphertextSecureBroadcastThresholdEnc..> 20-Jan-2023 14:22 207
283-DoesPrivacyRequireTrueRandomness.pdf 22-Dec-2014 09:08 288K
283-DoesPrivacyRequireTrueRandomness.ps 22-Dec-2014 09:08 527K
284-ConstantRoundGroupKeyExchangewithLogarithmi..> 22-Dec-2014 09:08 353K
284-ConstantRoundGroupKeyExchangewithLogarithmi..> 22-Dec-2014 09:08 720K
285-UnrestrictedAggregateSignatures.pdf 22-Dec-2014 09:08 346K
285-UnrestrictedAggregateSignatures.ps 22-Dec-2014 09:08 671K
286-ShorterVerifierLocalRevocationGroupSignatur..> 22-Dec-2014 09:08 336K
287-ConjunctiveSubsetandRangeQueriesonEncrypted..> 22-Dec-2014 09:08 312K
288-PredictingSecretKeysviaBranchPrediction.pdf 22-Dec-2014 09:08 465K
289-EfficientRingSignatureswithoutRandomOracles..> 22-Dec-2014 09:08 279K
290-OnAuthenticationwithHMACandNonRandomPropert..> 22-Dec-2014 09:08 258K
291-HardHomogeneousSpaces.pdf 22-Dec-2014 09:08 158K
291-HardHomogeneousSpaces.ps 22-Dec-2014 09:08 311K
292-IdealMultipartiteSecretSharingSchemes.pdf 22-Dec-2014 09:08 264K
293-FastAlgorithmsfortheFreeRidersProbleminBroa..> 22-Dec-2014 09:08 295K
293-FastAlgorithmsfortheFreeRidersProbleminBroa..> 22-Dec-2014 09:08 506K
294-TheCollisionIntractabilityofMDC2intheIdealC..> 22-Dec-2014 09:08 314K
295-Visualsecretsharingschemewithautostereogram..> 22-Dec-2014 09:08 2M
296-OntheGenericConstructionofIdentityBasedSign..> 22-Dec-2014 09:08 377K
296-OntheGenericConstructionofIdentityBasedSign..> 22-Dec-2014 09:08 623K
297-ForwardSecureSignatureswithUntrustedUpdate.pdf 22-Dec-2014 09:08 287K
298-AFullyCollusionResistantBroadcastTraceandRe..> 22-Dec-2014 09:08 283K
299-EfficientImplementationofTatePairingonaMobi..> 22-Dec-2014 09:08 284K
300-AttacksandModificationsofCJC39sEvotingSchem..> 20-Jan-2023 14:22 207
301-NewfeaturesforJPEGSteganalysis.pdf 22-Dec-2014 09:08 482K
302-Noninteractivetwochannelmessageauthenticati..> 22-Dec-2014 09:07 222K
303-ZeroknowledgelikeProofofCryptanalysisofBlue..> 22-Dec-2014 09:07 274K
303-ZeroknowledgelikeProofofCryptanalysisofBlue..> 22-Dec-2014 09:07 4M
304-IdentityBasedEncryptionGoneWild.pdf 22-Dec-2014 09:07 341K
304-IdentityBasedEncryptionGoneWild.ps 22-Dec-2014 09:07 606K
305-ProvablySublinearPointMultiplicationonKobli..> 22-Dec-2014 09:07 230K
305-ProvablySublinearPointMultiplicationonKobli..> 22-Dec-2014 09:07 529K
306-RevisitingtheSecurityModelforTimedReleasePu..> 22-Dec-2014 09:07 230K
306-RevisitingtheSecurityModelforTimedReleasePu..> 22-Dec-2014 09:07 465K
307-NoteonDesignCriteriaforRainbowTypeMultivari..> 22-Dec-2014 09:07 72K
308-EfficientIDbasedThresholdSignatureSchemeswi..> 22-Dec-2014 09:07 256K
309-AttributeBasedEncryptionforFineGrainedAcces..> 22-Dec-2014 09:07 286K
310-AdSequencebasedRecursiveRandomNumberGenerat..> 22-Dec-2014 09:07 107K
311-AnalysisofSomeAttacksonAwasthiandLal39sProx..> 20-Jan-2023 14:22 207
312-ElGamaltypesignatureschemesforndimensionalv..> 22-Dec-2014 09:07 133K
312-ElGamaltypesignatureschemesforndimensionalv..> 22-Dec-2014 09:07 276K
313-EfficientScalarMultiplicationandSecurityaga..> 22-Dec-2014 09:07 1M
314-ConcurrentlyNonMalleableZeroKnowledgeintheA..> 22-Dec-2014 09:07 261K
315-OntheNecessityofRewindinginSecureMultiparty..> 22-Dec-2014 09:07 521K
316-AParallelizationofECDSAResistanttoSimplePow..> 22-Dec-2014 09:07 193K
317-WeaknessesoftheFORK256compressionfunction.pdf 22-Dec-2014 09:07 234K
317-WeaknessesoftheFORK256compressionfunction.ps 22-Dec-2014 09:07 727K
318-ChameleonBasedDeniableAuthenticatedKeyAgree..> 22-Dec-2014 09:07 124K
319-ForgeryandPartialKeyRecoveryAttacksonHMACan..> 22-Dec-2014 09:07 276K
319-ForgeryandPartialKeyRecoveryAttacksonHMACan..> 22-Dec-2014 09:07 249K
320-CMSSAnImprovedMerkleSignatureScheme.pdf 22-Dec-2014 09:07 181K
321-EfficientPseudorandomGeneratorsBasedontheDD..> 22-Dec-2014 09:07 187K
321-EfficientPseudorandomGeneratorsBasedontheDD..> 22-Dec-2014 09:07 417K
322-AlgebraicImmunityofSboxesBasedonPowerMappin..> 22-Dec-2014 09:07 284K
323-ComputationalSoundnessofFormalIndistinguish..> 22-Dec-2014 09:06 211K
323-ComputationalSoundnessofFormalIndistinguish..> 22-Dec-2014 09:06 404K
324-TheAverageTransmissionOverheadofBroadcastEn..> 22-Dec-2014 09:06 168K
325-InvisibleDesignatedConfirmerSignatureswitho..> 22-Dec-2014 09:06 186K
325-InvisibleDesignatedConfirmerSignatureswitho..> 22-Dec-2014 09:06 384K
326-AnalyzingtheHBandHBProtocolsintheLargeError..> 20-Jan-2023 08:39 194K
326-AnalyzingtheHBandHBProtocolsintheLargeError..> 22-Dec-2014 09:06 194K
327-AnAlgorithmfortheeta_TPairingCalculationinC..> 22-Dec-2014 09:06 240K
328-AnonymousSecureCommunicationinWirelessMobil..> 22-Dec-2014 09:06 349K
329-DesignatedVerifierSignatureSchemeBasedonBra..> 22-Dec-2014 09:06 116K
330-ExtendedDoubleBaseNumberSystemwithapplicati..> 22-Dec-2014 09:06 286K
330-ExtendedDoubleBaseNumberSystemwithapplicati..> 22-Dec-2014 09:06 477K
331-OntheSecurityofGeneralizedJacobianCryptosys..> 22-Dec-2014 09:06 300K
332-ImprovedEfficiencyforPrivateStableMatching.pdf 22-Dec-2014 09:06 187K
333-DiscreteLogarithmsinGeneralizedJacobians.pdf 22-Dec-2014 09:06 149K
334-CollidingMessagePairfor53StepHAS160.pdf 22-Dec-2014 09:06 179K
335-AIDBasedDeniableAuthenticationProtocolonpai..> 22-Dec-2014 09:06 592K
336-HighOrderLinearizationEquationHOLEAttackonM..> 22-Dec-2014 09:06 153K
337-AnEfficientandSecureTwoflowZeroKnowledgeIde..> 22-Dec-2014 09:06 342K
338-EfficientandProvablySecureMultiRecipientSig..> 22-Dec-2014 09:06 120K
338-EfficientandProvablySecureMultiRecipientSig..> 22-Dec-2014 09:06 268K
339-ANewfamilyofIdealMultipartiteAccessStructur..> 20-Jan-2023 14:22 207
340-CryptanalysesofSomeMultimediaEncryptionSche..> 22-Dec-2014 09:06 4M
341-MV3Anewwordbasedstreamcipherusingrapidmixin..> 22-Dec-2014 09:06 279K
341-MV3Anewwordbasedstreamcipherusingrapidmixin..> 22-Dec-2014 09:06 477K
342-ANovelSecureElectronicVotingProtocolBasedOn..> 22-Dec-2014 09:06 418K
343-VerifiablyEncryptedSignatureSchemewithThres..> 22-Dec-2014 09:06 101K
343-VerifiablyEncryptedSignatureSchemewithThres..> 22-Dec-2014 09:06 248K
344-ASubjectDelegatedDecryptionSchemewithTightl..> 20-Jan-2023 08:39 207K
344-ASubjectDelegatedDecryptionSchemewithTightl..> 22-Dec-2014 09:05 207K
345-PrivateandEfficientStableMarriagesMatching.pdf 22-Dec-2014 09:05 124K
345-PrivateandEfficientStableMarriagesMatching.ps 22-Dec-2014 09:05 209K
346-GenericTransformationtoStronglyUnforgeableS..> 22-Dec-2014 09:05 262K
347-ClassificationofWeilRestrictionsObtainedby2..> 22-Dec-2014 09:05 307K
348-NonTrivialBlackBoxCombinersforCollisionResi..> 20-Jan-2023 08:39 188K
348-NonTrivialBlackBoxCombinersforCollisionResi..> 22-Dec-2014 09:05 207K
348-NonTrivialBlackBoxCombinersforCollisionResi..> 22-Dec-2014 09:05 184K
349-ANoteOnSideChannelsResultingFromDynamicComp..> 22-Dec-2014 09:05 130K
349-ANoteOnSideChannelsResultingFromDynamicComp..> 22-Dec-2014 09:05 289K
350-ImpossibleDifferentialCryptanalysisofARIAan..> 22-Dec-2014 09:05 201K
351-OnthePowerofSimpleBranchPredictionAnalysis.pdf 22-Dec-2014 09:05 737K
352-FoundationsofSecureECommerceTheOrderLayer.pdf 22-Dec-2014 09:05 944K
353-AnalysisandImprovementsofTwoIdentityBasedPe..> 22-Dec-2014 09:05 206K
354-AnewstreamcipherDICING.pdf 22-Dec-2014 09:05 101K
355-ConcurrentNonMalleableZeroKnowledge.pdf 22-Dec-2014 09:05 241K
355-ConcurrentNonMalleableZeroKnowledge.ps 22-Dec-2014 09:05 396K
356-BlackBoxKnowledgeExtractionRevisitedUnivers..> 22-Dec-2014 09:05 349K
356-BlackBoxKnowledgeExtractionRevisitedUnivers..> 22-Dec-2014 09:05 403K
357-Cryptanalysisofahomomorphicpublickeycryptos..> 22-Dec-2014 09:05 134K
358-PublicKeyEncryptionwithKeywordSearchbasedon..> 22-Dec-2014 09:05 207K
359-OnProbabilisticversusDeterministicProversin..> 22-Dec-2014 09:05 227K
359-OnProbabilisticversusDeterministicProversin..> 22-Dec-2014 09:05 426K
360-TargetCollisionsforMD5andCollidingX509Certi..> 22-Dec-2014 09:05 340K
361-GenericConstructionofIdentitybasedPerfectCo..> 22-Dec-2014 09:05 212K
361-GenericConstructionofIdentitybasedPerfectCo..> 22-Dec-2014 09:05 405K
362-ConstructionofaHybridHierarchicalIdentityBa..> 22-Dec-2014 09:05 268K
362-ConstructionofaHybridHierarchicalIdentityBa..> 22-Dec-2014 09:05 488K
363-AWeaknessinSomeObliviousTransferandZeroKnow..> 20-Jan-2023 14:22 207
364-SpellingErrorTolerantOrderIndependentPassPh..> 22-Dec-2014 09:05 188K
365-RevisitofKD04.pdf 20-Jan-2023 14:22 207
366-ALatencyFreeElectionScheme.pdf 22-Dec-2014 09:05 176K
367-AnAttackonaCertificatelessSignatureScheme.pdf 22-Dec-2014 09:05 123K
368-PracticalHierarchicalIdentityBasedEncryptio..> 22-Dec-2014 09:04 218K
369-RadioGatnabeltandmillhashfunction.pdf 20-Jan-2023 08:39 272K
369-RadioGatunabeltandmillhashfunction.pdf 22-Dec-2014 09:04 272K
370-ADoSAttackAgainsttheIntegrityLessESPIPSec.pdf 22-Dec-2014 09:04 578K
370-ADoSAttackAgainsttheIntegrityLessESPIPSec.ps 22-Dec-2014 09:04 3M
371-HardwareImplementationoftheeta_TPairinginCh..> 22-Dec-2014 09:04 194K
372-Ataxonomyofpairingfriendlyellipticcurves.pdf 22-Dec-2014 09:04 612K
373-SelfGeneratedCertificatePublicKeyCryptograp..> 22-Dec-2014 09:04 379K
374-RobustFinalRoundCacheTraceAttacksAgainstAES..> 22-Dec-2014 09:04 260K
374-RobustFinalRoundCacheTraceAttacksAgainstAES.ps 22-Dec-2014 09:04 880K
375-Distortionmapsforgenustwocurves.pdf 22-Dec-2014 09:04 252K
376-ANewConceptofHashFunctionsSNMACUsingaSpecia..> 22-Dec-2014 09:04 252K
377-EfficientChosenCiphertextSecureIdentityBase..> 22-Dec-2014 09:04 270K
377-EfficientChosenCiphertextSecureIdentityBase..> 22-Dec-2014 09:04 518K
378-ANewKeyExchangePrimitiveBasedontheTripleDec..> 22-Dec-2014 09:04 145K
378-ANewKeyExchangePrimitiveBasedontheTripleDec..> 22-Dec-2014 09:04 288K
379-SecurityBoundsfortheNISTCodebookbasedDeterm..> 22-Dec-2014 09:04 180K
380-OnSecurityofSovereignJoins.pdf 22-Dec-2014 09:04 87K
381-CryptanalysisonanAlgorithmforEfficientDigit..> 22-Dec-2014 09:04 38K
382-ProvisioningProtectedResourceSharinginMulti..> 22-Dec-2014 09:04 263K
382-ProvisioningProtectedResourceSharinginMulti..> 22-Dec-2014 09:04 667K
383-Traitortracingschemewithconstantciphertextr..> 22-Dec-2014 09:04 241K
383-Traitortracingschemewithconstantciphertextr..> 22-Dec-2014 09:04 457K
384-DesignandAnalysisofaHashRingiterativeStruct..> 22-Dec-2014 09:04 218K
385-OnSecurityModelsandCompilersforGroupKeyExch..> 22-Dec-2014 09:04 1M
386-TheWrestlersProtocolAsimplepracticalsecured..> 22-Dec-2014 09:04 457K
386-TheWrestlersProtocolAsimplepracticalsecured..> 22-Dec-2014 09:04 532K
387-ANoteontheSecurityofNTRUSign.pdf 22-Dec-2014 09:04 124K
388-SurveyonSecurityRequirementsandModelsforGro..> 22-Dec-2014 09:03 505K
389-TraceableRingSignature.pdf 22-Dec-2014 09:03 234K
390-RevisitofCS98.pdf 20-Jan-2023 14:22 207
391-ANoteonBoundedChosenCiphertextSecurityfromB..> 22-Dec-2014 09:03 249K
392-TheTatePairingviaEllipticNets.pdf 22-Dec-2014 09:03 216K
392-TheTatePairingviaEllipticNets.ps 22-Dec-2014 09:03 433K
393-TheIdentityEscrowGroupSignatureSchemeatCTRS..> 20-Jan-2023 14:22 207
394-IdentityBasedStrongDesignatedVerifierProxyS..> 22-Dec-2014 09:03 92K
395-SecurityFocusedSurveyonGroupKeyExchangeProt..> 22-Dec-2014 09:03 630K
396-SecurityProtocolswithIsotropicChannels.pdf 22-Dec-2014 09:03 258K
397-RevisitingtheEfficiencyofMaliciousTwoPartyC..> 22-Dec-2014 09:03 220K
397-RevisitingtheEfficiencyofMaliciousTwoPartyC..> 22-Dec-2014 09:03 402K
398-TheLayeredGamesFrameworkforSpecificationsan..> 22-Dec-2014 09:03 528K
399-MultiPropertyPreservingHashDomainExtensiona..> 22-Dec-2014 09:03 350K
400-ConcurrentStatisticalZeroKnowledgeArguments..> 22-Dec-2014 09:03 238K
401-Onthecostofcryptanalyticattacks.pdf 20-Jan-2023 14:22 207
402-AlgebraicCryptanalysisoftheDataEncryptionSt..> 22-Dec-2014 09:03 193K
402-AlgebraicCryptanalysisoftheDataEncryptionSt..> 22-Dec-2014 09:03 376K
403-NonWaferScaleSievingHardwarefortheNFSAnothe..> 22-Dec-2014 09:03 264K
403-NonWaferScaleSievingHardwarefortheNFSAnothe..> 22-Dec-2014 09:03 895K
404-Faugere39sF5AlgorithmRevisited.pdf 20-Jan-2023 08:38 639K
404-FaugeresF5AlgorithmRevisited.pdf 22-Dec-2014 09:03 639K
405-UniversallyComposableBlindSignaturesinthePl..> 22-Dec-2014 09:03 174K
405-UniversallyComposableBlindSignaturesinthePl..> 22-Dec-2014 09:03 329K
406-RedundancyoftheWangYuSufficientConditions.pdf 22-Dec-2014 09:03 77K
407-CryptographyintheMultistringModel.pdf 22-Dec-2014 09:03 231K
407-CryptographyintheMultistringModel.ps 22-Dec-2014 09:03 378K
408-AGenericConstructionofCCASecureCryptosystem..> 22-Dec-2014 09:03 200K
408-AGenericConstructionofCCASecureCryptosystem..> 22-Dec-2014 09:03 555K
409-ANEWMACLAMA.pdf 22-Dec-2014 09:03 87K
410-GaloisFieldCommitmentScheme.pdf 22-Dec-2014 09:03 219K
411-PreimageAttackonHashingwithPolynomialspropo..> 22-Dec-2014 09:03 119K
411-PreimageAttackonHashingwithPolynomialspropo..> 22-Dec-2014 09:03 2M
411-PreimageAttackonHashingwithPolynomialspropo..> 20-Jan-2023 08:38 115K
412-PreimageAttacksonCellHashSubHashandStrength..> 22-Dec-2014 09:02 140K
412-PreimageAttacksonCellHashSubHashandStrength..> 22-Dec-2014 09:02 2M
413-PreimageAttackonParallelFFTHashing.pdf 22-Dec-2014 09:02 199K
414-ZeroKnowledgeandSoundnessareSymmetric.pdf 22-Dec-2014 09:02 325K
414-ZeroKnowledgeandSoundnessareSymmetric.ps 22-Dec-2014 09:02 558K
415-OntheMinimalEmbeddingField.pdf 22-Dec-2014 09:02 123K
415-OntheMinimalEmbeddingField.ps 22-Dec-2014 09:02 272K
416-AuthenticatedInterleavedEncryption.pdf 22-Dec-2014 09:02 190K
416-AuthenticatedInterleavedEncryption.ps 22-Dec-2014 09:02 283K
417-TheRecentAttackofNieetalOnTTMisFaulty.pdf 22-Dec-2014 09:02 134K
417-TheRecentAttackofNieetalOnTTMisFaulty.ps 22-Dec-2014 09:02 104K
418-AnalysisofPrivacyPreservingElementReduction..> 22-Dec-2014 09:02 161K
419-SomeNewHiddenIdealCryptosystems.pdf 22-Dec-2014 09:02 149K
420-TheREESSE1PublicKeyCryptosystemv221.pdf 22-Dec-2014 09:02 601K
421-UniversallyComposableThreePartyKeyDistribut..> 22-Dec-2014 09:02 141K
422-LongtermSecurityandUniversalComposability.pdf 22-Dec-2014 09:02 856K
423-PerfectNIZKwithAdaptiveSoundness.pdf 22-Dec-2014 09:02 273K
423-PerfectNIZKwithAdaptiveSoundness.ps 22-Dec-2014 09:02 542K
424-SecurityAnalysisofVoiceoverIPProtocols.pdf 22-Dec-2014 09:02 197K
425-Aprotocol.pdf 20-Jan-2023 08:38 251K
426-TheBilinearPairingbasedAccumulatorProposeda..> 20-Jan-2023 14:22 207
427-Pairingfriendlyellipticcurveswithsmallsecur..> 20-Jan-2023 08:38 197K
427-Pairingfriendlyellipticcurveswithsmallsecur..> 22-Dec-2014 09:02 197K
428-AnotherclassofquadraticAPNbinomialsoverF_2n..> 22-Dec-2014 09:02 158K
428-AnotherclassofquadraticAPNbinomialsoverF_2n..> 22-Dec-2014 09:02 335K
429-OnanewinvariantofBooleanfunctions.pdf 22-Dec-2014 09:02 110K
430-FromWeaktoStrongWatermarking.pdf 22-Dec-2014 09:02 339K
431-SomeEfficientAlgorithmsfortheFinalExponenti..> 22-Dec-2014 09:02 259K
432-UniversallyComposableSecuritywithGlobalSetu..> 22-Dec-2014 09:02 523K
432-UniversallyComposableSecuritywithGlobalSetu..> 22-Dec-2014 09:02 773K
433-InformationTheoreticBoundsonAuthenticationS..> 22-Dec-2014 09:02 194K
433-InformationTheoreticBoundsonAuthenticationS..> 22-Dec-2014 09:02 393K
434-BalancedBooleanFunctionswithmorethanMaximum..> 22-Dec-2014 09:02 113K
434-BalancedBooleanFunctionswithmorethanMaximum..> 22-Dec-2014 09:02 230K
435-SearchingforShapesinCryptographicProtocolse..> 22-Dec-2014 09:01 359K
436-StatisticallyHidingCommitmentfromAnyOneWayF..> 22-Dec-2014 09:01 246K
436-StatisticallyHidingCommitmentfromAnyOneWayF..> 22-Dec-2014 09:01 479K
437-OnZigzagFunctionsandRelatedObjectsinNewMetr..> 22-Dec-2014 09:01 137K
437-OnZigzagFunctionsandRelatedObjectsinNewMetr..> 22-Dec-2014 09:01 296K
438-OnthepseudorandomgeneratorISAAC.pdf 22-Dec-2014 09:01 115K
438-OnthepseudorandomgeneratorISAAC.ps 22-Dec-2014 09:01 283K
439-ANewTypeofGroupBlindSignatureSchemeBasedonB..> 22-Dec-2014 09:01 111K
440-ANewTypeofGroupSignatureScheme.pdf 22-Dec-2014 09:01 145K
441-GeneralDistinguishingAttacksonNMACandHMACwi..> 22-Dec-2014 09:01 142K
441-GeneralDistinguishingAttacksonNMACandHMACwi..> 22-Dec-2014 09:01 2M
442-Anattackonthecertificatelesssignaturescheme..> 22-Dec-2014 09:01 54K
443-ScalableAuthenticatedTreeBasedGroupKeyExcha..> 22-Dec-2014 09:01 203K
443-ScalableAuthenticatedTreeBasedGroupKeyExcha..> 22-Dec-2014 09:01 408K
444-LatticesthatAdmitLogarithmicWorstCasetoAver..> 22-Dec-2014 09:01 370K
444-LatticesthatAdmitLogarithmicWorstCasetoAver..> 22-Dec-2014 09:01 624K
445-AclassofquadraticAPNbinomialsinequivalentto..> 22-Dec-2014 09:01 232K
445-AclassofquadraticAPNbinomialsinequivalentto..> 22-Dec-2014 09:01 441K
446-NewIdentityBasedAuthenticatedKeyAgreementPr..> 22-Dec-2014 09:01 221K
446-NewIdentityBasedAuthenticatedKeyAgreementPr..> 22-Dec-2014 09:01 458K
447-TowardsaSeparationofSemanticandCCASecurityf..> 22-Dec-2014 09:01 927K
447-TowardsaSeparationofSemanticandCCASecurityf..> 22-Dec-2014 09:01 1M
448-UniversallyComposableandForwardSecureRFIDAu..> 22-Dec-2014 09:01 199K
448-UniversallyComposableandForwardSecureRFIDAu..> 22-Dec-2014 09:01 388K
449-RobustComputationalSecretSharingandaUnified..> 22-Dec-2014 09:01 366K
449-RobustComputationalSecretSharingandaUnified..> 22-Dec-2014 09:01 548K
450-SecureCryptographicWorkflowintheStandardMod..> 22-Dec-2014 09:01 265K
450-SecureCryptographicWorkflowintheStandardMod..> 22-Dec-2014 09:01 453K
451-CombinedDifferentialLinearandRelatedKeyAtta..> 22-Dec-2014 09:01 946K
452-HybridProtocolForPasswordbasedKeyExchangein..> 22-Dec-2014 09:00 294K
453-KeyReplacementAttackonaCertificatelessSigna..> 22-Dec-2014 09:00 116K
454-HowtoWintheCloneWarsEfficientPeriodicnTimes..> 22-Dec-2014 09:00 341K
454-HowtoWintheCloneWarsEfficientPeriodicnTimes..> 22-Dec-2014 09:00 629K
455-OnAchievingthe3939BestofBothWorlds3939inSec..> 20-Jan-2023 08:38 246K
455-OnAchievingtheBestofBothWorldsinSecureMulti..> 22-Dec-2014 09:00 238K
455-OnAchievingtheBestofBothWorldsinSecureMulti..> 22-Dec-2014 09:00 420K
456-IndistinguishabilityAmplification.pdf 22-Dec-2014 09:00 217K
457-LinearApproximatingtoIntegerAddition.pdf 22-Dec-2014 09:00 87K
458-CopyrightingPublickeyFunctionsandApplicatio..> 22-Dec-2014 09:00 356K
458-CopyrightingPublickeyFunctionsandApplicatio..> 22-Dec-2014 09:00 548K
459-Recursivelowerboundsonthenonlinearityprofil..> 22-Dec-2014 09:00 260K
460-PreimageAttacksOnProvablySecureFFTHashingpr..> 22-Dec-2014 09:00 145K
460-PreimageAttacksOnProvablySecureFFTHashingpr..> 22-Dec-2014 09:00 3M
461-OnPostModernCryptography.pdf 22-Dec-2014 09:00 195K
461-OnPostModernCryptography.ps 22-Dec-2014 09:00 342K
462-ImprovedCollisionandPreimageResistanceBound..> 22-Dec-2014 09:00 264K
463-ObfuscationforCryptographicPurposes.pdf 22-Dec-2014 09:00 262K
463-ObfuscationforCryptographicPurposes.ps 22-Dec-2014 09:00 468K
464-Remarkson34AnalysisofOnePopularGroupSignatu..> 20-Jan-2023 08:38 122K
464-RemarksonAnalysisofOnePopularGroupSignature..> 22-Dec-2014 09:00 122K
465-SecurityandCompositionofCryptographicProtoc..> 22-Dec-2014 09:00 503K
465-SecurityandCompositionofCryptographicProtoc..> 22-Dec-2014 09:00 518K
466-PrimeOrderPrimitiveSubgroupsinTorusBasedCry..> 22-Dec-2014 09:00 182K
467-DoWeNeedtoVarytheConstantsMethodologicalInv..> 22-Dec-2014 09:00 343K
467-DoWeNeedtoVarytheConstantsMethodologicalInv..> 22-Dec-2014 09:00 7M
468-WhiteBoxCryptographyAnotherAttempt.pdf 22-Dec-2014 08:59 142K
469-AnAttackonDisguisedEllipticCurves.pdf 22-Dec-2014 08:59 116K
469-AnAttackonDisguisedEllipticCurves.ps 22-Dec-2014 08:59 257K
470-Onthesecurityofagroupkeyagreementprotocol.pdf 22-Dec-2014 08:59 80K
470-Onthesecurityofagroupkeyagreementprotocol.ps 22-Dec-2014 08:59 204K
471-MultiplicationandSquaringonPairingFriendlyF..> 22-Dec-2014 08:59 242K
472-AFrameworkforInteractiveArgumentSystemsusin..> 22-Dec-2014 08:59 262K
472-AFrameworkforInteractiveArgumentSystemsusin..> 22-Dec-2014 08:59 543K
473-IdentityBasedProxyReencryption.pdf 22-Dec-2014 08:59 217K
474-SpeedinguptheBilinearPairingsComputationonC..> 22-Dec-2014 08:59 117K
475-NewTechniqueforSolvingSparseEquationSystems..> 22-Dec-2014 08:59 201K
475-NewTechniqueforSolvingSparseEquationSystems.ps 22-Dec-2014 08:59 261K
476-PasswordAuthenticatedMultiPartyKeyExchangew..> 22-Dec-2014 08:59 437K
476-PasswordAuthenticatedMultiPartyKeyExchangew..> 22-Dec-2014 08:59 486K
477-DynamicCryptographicHashFunctions.pdf 22-Dec-2014 08:59 158K
477-DynamicCryptographicHashFunctions.ps 22-Dec-2014 08:59 331K
478-NearCollisionAttackandCollisionAttackonDoub..> 22-Dec-2014 08:59 447K
478-NearCollisionAttackandCollisionAttackonDoub..> 22-Dec-2014 08:59 6M
479-EfficientProvablySecureHierarchicalKeyAssig..> 22-Dec-2014 08:59 325K
479-EfficientProvablySecureHierarchicalKeyAssig..> 22-Dec-2014 08:59 612K
480-CryptanalysisofREESSE1PublicKeyCryptosystem..> 22-Dec-2014 08:59 116K
481-APracticalLimitofSecurityProofintheIdealCip..> 22-Dec-2014 08:59 349K
481-APracticalLimitofSecurityProofintheIdealCip..> 22-Dec-2014 08:59 5M
482-CountermeasuresfortheSimpleBranchPrediction..> 22-Dec-2014 08:58 96K
482-CountermeasuresfortheSimpleBranchPrediction..> 22-Dec-2014 08:58 141K
483-NewConstructionsforProvablySecureTimeBoundH..> 22-Dec-2014 08:58 334K
483-NewConstructionsforProvablySecureTimeBoundH..> 22-Dec-2014 08:58 692K
484-ANewIdentityBasedEncryptionSchemeFromPairin..> 20-Jan-2023 14:21 207
485-IndifferentiabilityofSingleBlockLengthandRa..> 22-Dec-2014 08:58 170K
486-InductiveTracePropertiesforComputationalSec..> 22-Dec-2014 08:58 163K