Index of /2007/
../
001-Familiesofgenus2curveswithsmallembeddingdeg..> 22-Dec-2014 09:44 2217
001-Familiesofgenus2curveswithsmallembeddingdeg..> 22-Dec-2014 09:44 943
002-CryptanalysisofAnObliviousPolynomialEvaluat..> 20-Jan-2023 14:21 207
003-TheEnergyCostofCryptographicKeyEstablishmen..> 22-Dec-2014 09:44 197K
003-TheEnergyCostofCryptographicKeyEstablishmen..> 22-Dec-2014 09:44 397K
004-CryptanalysisofHwangChangsaTimeStampProtoco..> 22-Dec-2014 09:44 402K
005-PrivacyProtectingCouponSystemRevisited.pdf 22-Dec-2014 09:44 205K
006-EfficientDynamickTimesAnonymousAuthenticati..> 22-Dec-2014 09:44 253K
007-OneRoundIDBasedBlindSignatureSchemewithoutR..> 22-Dec-2014 09:44 299K
008-Securityanalysisofthevariantoftheselfshrink..> 22-Dec-2014 09:44 193K
008-Securityanalysisofthevariantoftheselfshrink..> 22-Dec-2014 09:44 185K
009-NewPublicKeyCryptosystemsUsingPolynomialsov..> 22-Dec-2014 09:44 392K
010-ComputingendomorphismringsofJacobiansofgenu..> 22-Dec-2014 09:44 332K
011-UniversallyComposableKeyevolvingSignature.pdf 22-Dec-2014 09:44 149K
012-Interactivetwochannelmessageauthenticationb..> 22-Dec-2014 09:44 218K
013-OptimisedversionsoftheAteandTwistedAtePairi..> 22-Dec-2014 09:44 175K
014-InvertibleUniversalHashingandtheTETEncrypti..> 22-Dec-2014 09:44 300K
015-GroupEncryption.pdf 22-Dec-2014 09:43 406K
015-GroupEncryption.ps 22-Dec-2014 09:43 670K
016-VESTCiphers.pdf 20-Jan-2023 14:21 207
017-GroupDecryption.pdf 22-Dec-2014 09:43 261K
018-StronglySecureIdentitybasedKeyAgreementandA..> 22-Dec-2014 09:43 325K
018-StronglySecureIdentitybasedKeyAgreementandA..> 22-Dec-2014 09:43 591K
019-FastDigitalSignatureSchemesasSecureasDiffie..> 22-Dec-2014 09:43 221K
020-TinyTateIdentityBasedEncryptionforSensorNet..> 22-Dec-2014 09:43 176K
021-TwoTrivialAttacksonTrivium.pdf 22-Dec-2014 09:43 182K
022-OnPerfectlyBalancedBooleanFunctions.pdf 22-Dec-2014 09:43 138K
022-OnPerfectlyBalancedBooleanFunctions.ps 22-Dec-2014 09:43 128K
023-EfficientHybridEncryptionfromIDBasedEncrypt..> 22-Dec-2014 09:43 440K
024-EfficientMethodsforConversionandSolutionofS..> 22-Dec-2014 09:43 417K
025-PrivateLocallyDecodableCodes.pdf 22-Dec-2014 09:43 233K
026-CryptanalysisandImprovementofanEllipticCurv..> 22-Dec-2014 09:43 122K
026-CryptanalysisandImprovementofanEllipticCurv..> 22-Dec-2014 09:43 288K
027-VerifyingDataIntegritywithFewQueriestoUntru..> 20-Jan-2023 14:21 207
028-HCHANewTweakableEncipheringSchemeUsingtheHa..> 22-Dec-2014 09:43 307K
028-HCHANewTweakableEncipheringSchemeUsingtheHa..> 22-Dec-2014 09:43 596K
029-AGeneralConstructionofTweakableBlockCiphers..> 22-Dec-2014 09:43 308K
030-FormalSecurityTreatmentsforIBEtoSignatureTr..> 22-Dec-2014 09:43 282K
030-FormalSecurityTreatmentsforIBEtoSignatureTr..> 22-Dec-2014 09:43 527K
031-ImprovedSecurityAnalysisofPMAC.pdf 22-Dec-2014 09:43 223K
032-AnimprovedcollisionprobabilityforCBCMACandP..> 22-Dec-2014 09:43 212K
033-FromSelectiveIDtoFullSecurityTheCaseoftheIn..> 22-Dec-2014 09:43 168K
034-ANewTypeofCipherDICING_CSB.pdf 22-Dec-2014 09:43 60K
035-CryptanalysisofwhiteboxDESimplementations.pdf 22-Dec-2014 09:43 417K
035-CryptanalysisofwhiteboxDESimplementations.ps 22-Dec-2014 09:43 971K
036-ChosenCiphertextSecureKeyEncapsulationBased..> 22-Dec-2014 09:43 389K
037-BestQuadraticApproximationsofCubicBooleanFu..> 22-Dec-2014 09:43 323K
038-MultipleModularAdditionsandCrosswordPuzzleA..> 22-Dec-2014 09:43 220K
039-NewBranchPredictionVulnerabilitiesinOpenSSL..> 22-Dec-2014 09:43 251K
040-EfficientQuintupleFormulasforEllipticCurves..> 22-Dec-2014 09:42 178K
040-EfficientQuintupleFormulasforEllipticCurves..> 22-Dec-2014 09:42 338K
041-SymmetricTardosfingerprintingcodesforarbitr..> 22-Dec-2014 09:42 396K
041-SymmetricTardosfingerprintingcodesforarbitr..> 22-Dec-2014 09:42 546K
042-AuthorshipProofforTextualDocument.pdf 22-Dec-2014 09:42 203K
043-ReflectionAttacksonProductCiphers.pdf 22-Dec-2014 09:42 196K
043-ReflectionAttacksonProductCiphers.ps 22-Dec-2014 09:42 389K
044-DesignandPrimitiveSpecificationforShannon.pdf 22-Dec-2014 09:42 374K
045-ACoprocessorfortheFinalExponentiationofthee..> 22-Dec-2014 09:42 245K
046-DirectReductionofString12OTtoRabin39sOT.pdf 20-Jan-2023 14:21 207
046-DirectReductionofString12OTtoRabinsOT.pdf 22-Dec-2014 09:42 109K
046-DirectReductionofString12OTtoRabinsOT.ps 22-Dec-2014 09:42 99K
047-NewConstructionsofFuzzyIdentityBasedEncrypt..> 22-Dec-2014 09:42 187K
048-ASecurityAnalysisoftheNISTSP80090EllipticCu..> 22-Dec-2014 09:42 234K
049-SecurityArgumentsforaClassofIDbasedSignatur..> 22-Dec-2014 09:42 187K
050-SpecialblockcipherfamilyDNandnewgenerationS..> 22-Dec-2014 09:42 927K
051-ForwardsecureRFIDAuthenticationandKeyExchan..> 22-Dec-2014 09:42 203K
052-ForwardSecureSequentialAggregateAuthenticat..> 22-Dec-2014 09:42 119K
052-ForwardSecureSequentialAggregateAuthenticat..> 22-Dec-2014 09:42 226K
053-CompilerAssistedEllipticCurveCryptography.pdf 22-Dec-2014 09:42 162K
053-CompilerAssistedEllipticCurveCryptography.ps 22-Dec-2014 09:42 323K
054-CryptanalysisofStreamCiphersBasedonArraysan..> 22-Dec-2014 09:42 960K
054-CryptanalysisofStreamCiphersBasedonArraysan..> 22-Dec-2014 09:42 3M
055-CryptanalysisoftheKeeLoqblockcipher.pdf 22-Dec-2014 09:42 220K
056-EnforcingSemanticIntegrityonUntrustedClient..> 22-Dec-2014 09:42 177K
056-EnforcingSemanticIntegrityonUntrustedClient..> 22-Dec-2014 09:42 914K
057-Constructingpairingfriendlygenus2curvesover..> 22-Dec-2014 09:42 271K
058-ThesimplestmethodforconstructingAPNpolynomi..> 22-Dec-2014 09:42 144K
058-ThesimplestmethodforconstructingAPNpolynomi..> 22-Dec-2014 09:42 327K
059-ASurveyofSingleDatabasePIRTechniquesandAppl..> 22-Dec-2014 09:42 221K
059-ASurveyofSingleDatabasePIRTechniquesandAppl..> 22-Dec-2014 09:41 472K
060-SecurityAgainstCovertAdversariesEfficientPr..> 22-Dec-2014 09:41 463K
061-AcceleratingSSLusingtheVectorprocessorsinIB..> 20-Jan-2023 08:38 191K
061-AcceleratingSSLusingtheVectorprocessorsinIB..> 22-Dec-2014 09:41 191K
062-AlgebraicandSlideAttacksonKeeLoq.pdf 22-Dec-2014 09:41 336K
062-AlgebraicandSlideAttacksonKeeLoq.ps 22-Dec-2014 09:41 9M
063-ConstructingnewAPNfunctionsfromknownones.pdf 22-Dec-2014 09:41 199K
063-ConstructingnewAPNfunctionsfromknownones.ps 22-Dec-2014 09:41 406K
064-AlgebraicLowerBoundsforComputingonEncrypted..> 22-Dec-2014 09:41 220K
065-HowtoDeriveLowerBoundonObliviousTransferRed..> 22-Dec-2014 09:41 153K
066-LowDensityAttackRevisited.pdf 22-Dec-2014 09:41 165K
067-withdrawn.pdf 20-Jan-2023 14:21 207
068-EfficientHierarchicalIdentityBasedSignature..> 20-Jan-2023 14:21 207
069-NominativeSignatureApplicationSecurityModel..> 22-Dec-2014 09:41 260K
070-TwoLinearDistinguishingAttacksonVMPCandRC4A..> 22-Dec-2014 09:41 220K
070-TwoLinearDistinguishingAttacksonVMPCandRC4A..> 22-Dec-2014 09:41 481K
071-KnowledgeBindingCommitmentswithApplications..> 22-Dec-2014 09:41 195K
071-KnowledgeBindingCommitmentswithApplications..> 22-Dec-2014 09:41 331K
072-AHybridApproachtoConcurrentErrorDetectionfo..> 20-Jan-2023 14:21 207
073-PublicKeyEncryptionthatAllowsPIRQueries.pdf 22-Dec-2014 09:41 235K
073-PublicKeyEncryptionthatAllowsPIRQueries.ps 22-Dec-2014 09:41 488K
074-ACramerShoupEncryptionSchemefromtheLinearAs..> 22-Dec-2014 09:41 295K
075-WeaknessesinthePseudorandomBitGenerationAlg..> 22-Dec-2014 09:41 176K
075-WeaknessesinthePseudorandomBitGenerationAlg..> 22-Dec-2014 09:41 428K
076-AlmostSecure1RoundnChannelMessageTransmissi..> 22-Dec-2014 09:41 199K
077-Onbentfunctionswithzerosecondderivatives.pdf 20-Jan-2023 14:21 207
078-MPCvsSFEPerfectSecurityinaUnifiedCorruption..> 22-Dec-2014 09:41 197K
078-MPCvsSFEPerfectSecurityinaUnifiedCorruption..> 22-Dec-2014 09:41 215K
079-HowToFindManyCollisionsof3PassHAVAL.pdf 22-Dec-2014 09:41 170K
079-HowToFindManyCollisionsof3PassHAVAL.ps 22-Dec-2014 09:41 2M
080-WeaklyonlyUnforgeableSignatureandItsApplica..> 20-Jan-2023 14:21 207
081-RevisitinganEfficientEllipticCurveKeyAgreem..> 22-Dec-2014 09:40 131K
082-DeniableAuthenticationontheInternet.pdf 22-Dec-2014 09:40 240K
082-DeniableAuthenticationontheInternet.ps 22-Dec-2014 09:40 469K
083-PublicKeyEncryptionWhichisSimultaneouslyaLo..> 22-Dec-2014 09:40 299K
084-ConstantSizeCiphertextHIBEintheAugmentedSel..> 22-Dec-2014 09:40 325K
084-ConstantSizeCiphertextHIBEintheAugmentedSel..> 22-Dec-2014 09:40 354K
085-MultiCollisionAttackontheCompressionFunctio..> 22-Dec-2014 09:40 164K
085-MultiCollisionAttackontheCompressionFunctio..> 22-Dec-2014 09:40 403K
086-NonInteractiveProofsforIntegerMultiplicatio..> 22-Dec-2014 09:40 311K
086-NonInteractiveProofsforIntegerMultiplicatio..> 22-Dec-2014 09:40 389K
087-ImprovementonaDigitalSignatureSchemewithout..> 22-Dec-2014 09:40 261K
088-AnAlgorithmforFindingSmallRootsofMultivaria..> 22-Dec-2014 09:40 233K
089-BlackBoxExtensionFieldsandtheInexistenceofF..> 22-Dec-2014 09:40 153K
089-BlackBoxExtensionFieldsandtheInexistenceofF..> 22-Dec-2014 09:40 166K
090-Onthesecurityofanimageencryptionscheme.pdf 20-Jan-2023 08:38 4M
091-ArithmeticOperatorsforPairingBasedCryptogra..> 22-Dec-2014 09:40 339K
092-PRIMEPOINTSONELLIPTICCURVESANDITSIMPACTONEC..> 22-Dec-2014 09:40 259K
093-HAPADEPHumanAsistedPureAudioDevicePairing.pdf 22-Dec-2014 09:40 345K
094-MeshSignaturesHowtoLeakaSecretwithUnwitting..> 22-Dec-2014 09:40 384K
095-GenericCertificatelessEncryptionintheStanda..> 22-Dec-2014 09:40 268K
096-SomosSequenceNearAdditionFormulasandModular..> 22-Dec-2014 09:40 251K
096-SomosSequenceNearAdditionFormulasandModular..> 22-Dec-2014 09:40 606K
097-LargeCyclicSubgroupsofJacobiansofHyperellip..> 22-Dec-2014 09:40 141K
097-LargeCyclicSubgroupsofJacobiansofHyperellip..> 22-Dec-2014 09:40 630K
098-ClassesofQuadraticAPNTrinomialsandHexanomia..> 22-Dec-2014 09:40 158K
098-ClassesofQuadraticAPNTrinomialsandHexanomia..> 22-Dec-2014 09:40 332K
099-Inferringsequencesproducedbyalinearcongruen..> 22-Dec-2014 09:40 217K
100-PracticalIdentityBasedEncryptionIBEinMultip..> 22-Dec-2014 09:40 211K
100-PracticalIdentityBasedEncryptionIBEinMultip..> 22-Dec-2014 09:39 431K
101-PracticalPasswordRecoveryonanMD5Challengean..> 22-Dec-2014 09:39 144K
101-PracticalPasswordRecoveryonanMD5Challengean..> 22-Dec-2014 09:39 326K
102-OntheRoleofSchedulinginSimulationBasedSecur..> 22-Dec-2014 09:39 260K
103-AnotherLookatSquareRootsandTracesandQuadrat..> 22-Dec-2014 09:39 204K
104-CryptanalysisofWhiteBoxDESImplementationswi..> 22-Dec-2014 09:39 194K
104-CryptanalysisofWhiteBoxDESImplementationswi..> 22-Dec-2014 09:39 437K
105-IsodualReductionofLattices.pdf 22-Dec-2014 09:39 655K
105-IsodualReductionofLattices.ps 22-Dec-2014 09:39 2M
106-AgeneralizationofSecretSharingSchemeontheBa..> 22-Dec-2014 09:39 240K
107-KnapsackPublicKeyCryptosystemUsingChineseRe..> 22-Dec-2014 09:39 137K
108-AnImprovedDistinguisherforDragon.pdf 22-Dec-2014 09:39 181K
109-HowtoEnrichtheMessageSpaceofaCipher.pdf 22-Dec-2014 09:39 365K
110-ConstructionofPairingFriendlyEllipticCurves..> 22-Dec-2014 09:39 304K
111-PrivacyPreservingDistributedSetIntersection..> 22-Dec-2014 09:39 146K
111-PrivacyPreservingDistributedSetIntersection.ps 22-Dec-2014 09:39 292K
112-DecomposedAttackfortheJacobianofaHyperellip..> 22-Dec-2014 09:39 227K
113-AnEnhancedIDbasedDeniableAuthenticationProt..> 22-Dec-2014 09:39 166K
114-HighEfficiencyFeedbackShiftRegistersigmaLFS..> 22-Dec-2014 09:39 225K
115-QuadraticAlmostPerfectNonlinearFunctionsWit..> 22-Dec-2014 09:39 141K
116-AZeroKnowledgeIdentificationandKeyAgreement..> 22-Dec-2014 09:39 202K
117-Improvingthelowerboundonthehigherordernonli..> 22-Dec-2014 09:39 211K
118-SmoothProjectiveHashingandTwoMessageOblivio..> 22-Dec-2014 09:39 335K
119-RerandomizableRCCAEncryption.pdf 22-Dec-2014 09:39 335K
120-Breaking104bitWEPinlessthan60seconds.pdf 22-Dec-2014 09:39 264K
121-CertificatelessEncryptionSchemesStronglySec..> 22-Dec-2014 09:39 346K
121-CertificatelessEncryptionSchemesStronglySec..> 22-Dec-2014 09:39 624K
122-OntheSecurityofthreeVersionsoftheWAIProtoco..> 22-Dec-2014 09:39 183K
123-Obtainingasecureandefficientkeyagreementpro..> 22-Dec-2014 09:39 308K
124-RebuttalofovertakingVEST.pdf 22-Dec-2014 09:38 508K
125-AttackingtheIPsecStandardsinEncryptiononlyC..> 22-Dec-2014 09:38 249K
126-AnInterestingMemberIDbasedGroupSignature.pdf 22-Dec-2014 09:38 228K
127-CCA2SecureThresholdBroadcastEncryptionwithS..> 22-Dec-2014 09:38 175K
127-CCA2SecureThresholdBroadcastEncryptionwithS..> 22-Dec-2014 09:38 346K
128-ComputationallySoundMechanizedProofsofCorre..> 22-Dec-2014 09:38 410K
128-ComputationallySoundMechanizedProofsofCorre..> 22-Dec-2014 09:38 723K
129-AnAlgebraicAnalysisofTriviumCiphersbasedont..> 22-Dec-2014 09:38 111K
129-AnAlgebraicAnalysisofTriviumCiphersbasedont..> 22-Dec-2014 09:38 261K
130-SomeResultsonAnonymityinHybridEncryption.pdf 22-Dec-2014 09:38 499K
131-NoninteractiveManualChannelMessageAuthentic..> 22-Dec-2014 09:38 223K
132-EquivocalBlindSignaturesandAdaptiveUCSecuri..> 22-Dec-2014 09:38 620K
133-NewCommunicationEfficientObliviousTransferP..> 22-Dec-2014 09:38 203K
134-EstimationofkeysstoredinCMOScryptographicde..> 22-Dec-2014 09:38 73K
135-EfficientIDbasedSignatureWithoutTrustedPKG.pdf 22-Dec-2014 09:38 230K
136-FairExchangeSignatureSchemes.pdf 20-Jan-2023 14:21 207
137-MultivariatesPolynomialsforHashing.pdf 22-Dec-2014 09:38 135K
138-EfficientPairingComputationonCurves.pdf 22-Dec-2014 09:38 139K
138-EfficientPairingComputationonCurves.ps 22-Dec-2014 09:38 301K
139-TheDeliveryandEvidencesLayer.pdf 22-Dec-2014 09:38 623K
140-HiddenIdentityBasedSignatures.pdf 22-Dec-2014 09:38 580K
141-PracticalCryptanalysisofSFLASH.pdf 22-Dec-2014 09:38 195K
142-AnEnhancedOneroundPairingbasedTripartiteAut..> 22-Dec-2014 09:38 185K
143-OfflineOnlineMixing.pdf 22-Dec-2014 09:38 257K
144-TwoNewExamplesofTTM.pdf 22-Dec-2014 09:38 171K
144-TwoNewExamplesofTTM.ps 22-Dec-2014 09:38 154K
145-FindingCollisionsinInteractiveProtocolsATig..> 22-Dec-2014 09:38 464K
145-FindingCollisionsinInteractiveProtocolsATig..> 22-Dec-2014 09:38 1M
146-TimeCapsuleSignatureEfficientandProvablySec..> 22-Dec-2014 09:37 257K
147-Usingdecisionproblemsinpublickeycryptograph..> 22-Dec-2014 09:37 201K
148-PracticalCompactECash.pdf 22-Dec-2014 09:37 272K
149-TowardsGeneratingSecureKeysforBraidCryptogr..> 22-Dec-2014 09:37 196K
149-TowardsGeneratingSecureKeysforBraidCryptogr..> 22-Dec-2014 09:37 392K
150-GeneratorsofJacobiansofHyperellipticCurves.pdf 22-Dec-2014 09:37 135K
150-GeneratorsofJacobiansofHyperellipticCurves.ps 22-Dec-2014 09:37 578K
151-DeterministicHistoryIndependentStrategiesfo..> 22-Dec-2014 09:37 281K
151-DeterministicHistoryIndependentStrategiesfo..> 22-Dec-2014 09:37 802K
152-CTC2andFastAlgebraicAttacksonBlockCiphersRe..> 22-Dec-2014 09:37 124K
152-CTC2andFastAlgebraicAttacksonBlockCiphersRe..> 22-Dec-2014 09:37 324K
153-CryptographicHardnessbasedontheDecodingofRe..> 22-Dec-2014 09:37 310K
153-CryptographicHardnessbasedontheDecodingofRe..> 22-Dec-2014 09:37 564K
154-EdoncalR256384512anEfficientImplementationo..> 22-Dec-2014 09:37 256K
155-EfficientNoninteractiveProofSystemsforBilin..> 22-Dec-2014 09:37 279K
155-EfficientNoninteractiveProofSystemsforBilin..> 22-Dec-2014 09:37 669K
156-ComputationalSemanticsforBasicProtocolLogic..> 22-Dec-2014 09:37 208K
157-ConSumv0AnExperimentalCipher.pdf 22-Dec-2014 09:37 292K
158-ASimpleSecurityAnalysisofHashCBCandaNewEffi..> 22-Dec-2014 09:37 212K
158-ASimpleSecurityAnalysisofHashCBCandaNewEffi..> 22-Dec-2014 09:37 977K
159-AttributeBasedGroupSignatures.pdf 22-Dec-2014 09:37 371K
160-AnalysisofCollusionAttackFreeIDBasedNonInte..> 22-Dec-2014 09:37 195K
160-AnalysisofCollusionAttackFreeIDBasedNonInte..> 22-Dec-2014 09:37 190K
161-CollusionResistantGroupKeyManagementUsingAt..> 22-Dec-2014 09:37 211K
162-BingoVotingSecureandcoercionfreevotingusing..> 22-Dec-2014 09:37 171K
162-BingoVotingSecureandcoercionfreevotingusing..> 22-Dec-2014 09:37 665K
163-SecureDeniableAuthenticatedKeyEstablishment..> 22-Dec-2014 09:37 140K
164-YetAnotherMicroArchitecturalAttackExploitin..> 22-Dec-2014 09:37 159K
165-InductiveProofMethodforComputationalSecrecy..> 22-Dec-2014 09:37 389K
166-EnhancingSecurityofaGroupKeyExchangeProtoco..> 22-Dec-2014 09:37 172K
166-EnhancingSecurityofaGroupKeyExchangeProtoco..> 22-Dec-2014 09:36 148K
167-PublicKeyBroadcastEncryptionwithLowNumberof..> 22-Dec-2014 09:36 217K
168-RandomOraclesandAuxiliaryInput.pdf 22-Dec-2014 09:36 366K
169-OntheSecurityofProtocolswithLogarithmicComm..> 22-Dec-2014 09:36 491K
170-CloneResistantMutualAuthenticationforLowCos..> 22-Dec-2014 09:36 192K
171-ChosenCiphertextSecureProxyReEncryption.pdf 22-Dec-2014 09:36 277K
172-BatchVerificationofShortSignatures.pdf 22-Dec-2014 09:36 280K
173-ProvableSecureGeneralizedSigncryption.pdf 22-Dec-2014 09:36 208K
174-CountinghyperellipticcurvesthatadmitaKoblit..> 22-Dec-2014 09:36 183K
174-CountinghyperellipticcurvesthatadmitaKoblit..> 22-Dec-2014 09:36 401K
175-EmbeddingDegreeofHyperellipticCurveswithCom..> 22-Dec-2014 09:36 339K
176-SevenPropertyPreservingIteratedHashingROX.pdf 22-Dec-2014 09:36 361K
176-SevenPropertyPreservingIteratedHashingROX.ps 22-Dec-2014 09:36 649K
177-SpaceEfficientIdentityBasedEncryptionWithou..> 22-Dec-2014 09:36 364K
178-UtilitySamplingforTrustMetricsinPKI.pdf 22-Dec-2014 09:36 148K
178-UtilitySamplingforTrustMetricsinPKI.ps 22-Dec-2014 09:36 334K
179-NewFastAlgorithmsforArithmeticonEllipticCur..> 22-Dec-2014 09:36 226K
180-ANovelSecureSessionKeyGenerationusingtwolev..> 22-Dec-2014 09:36 578K
181-ANewMethodforSpeedingUpArithmeticonElliptic..> 22-Dec-2014 09:36 126K
182-OptimisticFairExchangeinaMultiuserSetting.pdf 22-Dec-2014 09:36 284K
183-ProvablySecureCiphertextPolicyABE.pdf 22-Dec-2014 09:36 231K
184-Provablepasswordbasedtripartitekeyagreement..> 22-Dec-2014 09:36 210K
185-NewFORK256.pdf 22-Dec-2014 09:36 178K
186-FullyAnonymousGroupSignatureswithoutRandomO..> 22-Dec-2014 09:36 199K
186-FullyAnonymousGroupSignatureswithoutRandomO..> 22-Dec-2014 09:36 343K
187-ExecutingModularExponentiationonaGraphicsAc..> 22-Dec-2014 09:36 226K
188-AProofofRevisedYahalomProtocolintheBellarea..> 22-Dec-2014 09:36 261K
189-AnImprovedOneRoundIDBasedTripartiteAuthenti..> 22-Dec-2014 09:36 190K
189-AnImprovedOneRoundIDBasedTripartiteAuthenti..> 22-Dec-2014 09:36 375K
190-SomeGeneralResultsonChosenciphertextAnonymi..> 22-Dec-2014 09:35 495K
191-DeniableInternetKeyExchange.pdf 22-Dec-2014 09:35 277K
192-OptimalIrreduciblePolynomialsforGF2mArithme..> 22-Dec-2014 09:35 185K
193-SomeIdentityBasedStrongBiDesignatedVerifier..> 22-Dec-2014 09:35 133K
194-EnhancedPrivacyIDADirectAnonymousAttestatio..> 22-Dec-2014 09:35 302K
195-VerifyingStatisticalZeroKnowledgewithApprox..> 22-Dec-2014 09:35 334K
196-AnEfficientCertificatelessSignatureScheme.pdf 20-Jan-2023 14:21 207
197-OnLineCiphersandtheHashCBCConstructions.pdf 22-Dec-2014 09:35 344K
197-OnLineCiphersandtheHashCBCConstructions.ps 22-Dec-2014 09:35 662K
198-MutualInformationAnalysisAUniversalDifferen..> 22-Dec-2014 09:35 3M
198-MutualInformationAnalysisAUniversalDifferen..> 22-Dec-2014 09:35 5M
199-AFrameworkforGameBasedSecurityProofs.pdf 22-Dec-2014 09:35 226K
200-ProSiBIRProactiveSignerBaseIntrusionResilie..> 22-Dec-2014 09:35 193K
201-TheBBGHIBEHasLimitedDelegation.pdf 22-Dec-2014 09:35 175K
202-ProvableDataPossessionatUntrustedStores.pdf 22-Dec-2014 09:35 482K
203-KipnisShamir39sAttackonHFERevisited.pdf 20-Jan-2023 08:38 210K
203-KipnisShamirsAttackonHFERevisited.pdf 22-Dec-2014 09:35 210K
204-DragonMACSecuringWirelessSensorNetworkswith..> 22-Dec-2014 09:35 120K
205-Akilobitspecialnumberfieldsievefactorizatio..> 22-Dec-2014 09:35 121K
205-Akilobitspecialnumberfieldsievefactorizatio..> 22-Dec-2014 09:35 226K
206-AutomaticSearchofDifferentialPathinMD4.pdf 22-Dec-2014 09:35 278K
206-AutomaticSearchofDifferentialPathinMD4.ps 22-Dec-2014 09:35 952K
207-OnanImprovedCorrelationAnalysisofStreamCiph..> 22-Dec-2014 09:35 268K
208-RC4StateInformationatAnyStageRevealstheSecr..> 22-Dec-2014 09:35 302K
209-BilateralUnknownKeyShareAttacksinKeyAgreeme..> 22-Dec-2014 09:35 219K
210-EfficientchosenciphertextsecurePKEschemewit..> 20-Jan-2023 14:21 207
211-ScalableStorageSchemefromForwardKeyRotation..> 22-Dec-2014 09:35 192K
212-Theconstructingof3resilientBooleanfunctions..> 22-Dec-2014 09:34 162K
213-UnlinkableRandomizableSignatureandItsApplic..> 22-Dec-2014 09:34 334K
214-MatrixPowerSBoxConstruction.pdf 22-Dec-2014 09:34 132K
215-ExtendingObliviousTransfersEfficientlyHowto..> 22-Dec-2014 09:34 206K
215-ExtendingObliviousTransfersEfficientlyHowto..> 22-Dec-2014 09:34 656K
216-UnlinkableDivisibleDigitalCashwithoutTruste..> 22-Dec-2014 09:34 184K
216-UnlinkableDivisibleDigitalCashwithoutTruste..> 22-Dec-2014 09:34 391K
217-IdentityBasedBroadcastEncryption.pdf 22-Dec-2014 09:34 163K
217-IdentityBasedBroadcastEncryption.ps 22-Dec-2014 09:34 344K
218-DifferentialCryptanalysisinStreamCiphers.pdf 22-Dec-2014 09:34 233K
219-ANewProvablySecureAuthenticationandKeyAgree..> 22-Dec-2014 09:34 131K
220-ANewProvablySecureAuthenticationandKeyAgree..> 22-Dec-2014 09:34 184K
221-GeneralizedKeyDelegationforHierarchicalIden..> 22-Dec-2014 09:34 269K
221-GeneralizedKeyDelegationforHierarchicalIden..> 22-Dec-2014 09:34 517K
222-TowardsSecurityLimitsinSideChannelAttacks.pdf 22-Dec-2014 09:34 348K
222-TowardsSecurityLimitsinSideChannelAttacks.ps 22-Dec-2014 09:34 1M
223-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 09:34 241K
223-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 09:34 498K
224-ANovelMutualAuthenticationSchemeBasedonQuad..> 22-Dec-2014 09:34 167K
225-OntheForgeabilityofWangTangLi39sIDBasedRest..> 20-Jan-2023 08:38 122K
225-OntheForgeabilityofWangTangLisIDBasedRestri..> 22-Dec-2014 09:34 122K
226-Generalizedmixfunctionsandorthogonalequitab..> 22-Dec-2014 09:34 298K
227-RelatedKeyStatisticalCryptanalysis.pdf 22-Dec-2014 09:34 404K
228-ANOPTIMIZEDHARDWAREARCHITECTUREOFMONTGOMERY..> 22-Dec-2014 09:34 246K
228-ANOPTIMIZEDHARDWAREARCHITECTUREOFMONTGOMERY..> 22-Dec-2014 09:34 814K
229-DomainExtensionofPublicRandomFunctionsBeyon..> 22-Dec-2014 09:34 451K
229-DomainExtensionofPublicRandomFunctionsBeyon..> 22-Dec-2014 09:34 625K
230-NewWeaknessesintheKeystreamGenerationAlgori..> 22-Dec-2014 09:33 177K
230-NewWeaknessesintheKeystreamGenerationAlgori..> 22-Dec-2014 09:33 424K
231-SecureTwoPartykMeansClustering.pdf 22-Dec-2014 09:33 273K
231-SecureTwoPartykMeansClustering.ps 22-Dec-2014 09:33 484K
232-Anewparadigmofchosenciphertextsecurepublick..> 20-Jan-2023 14:21 207
233-OnSimulatabilitySoundnessandMappingSoundnes..> 22-Dec-2014 09:33 265K
234-ProvableSecurityAnalysisofAuthenticatedEncr..> 22-Dec-2014 09:33 189K
235-BlindIdentityBasedEncryptionandSimulatableO..> 22-Dec-2014 09:33 334K
236-CertificatelessRingSignatures.pdf 22-Dec-2014 09:33 182K
236-CertificatelessRingSignatures.ps 22-Dec-2014 09:33 376K
237-ForwardsecureKeyEvolutioninWirelessSensorNe..> 22-Dec-2014 09:33 216K
238-Longliveddigitalintegrityusingshortlivedhas..> 22-Dec-2014 09:33 83K
239-MakingLargeHashFunctionsFromSmallCompressio..> 22-Dec-2014 09:33 150K
239-MakingLargeHashFunctionsFromSmallCompressio..> 22-Dec-2014 09:33 318K
240-AFourComponentFrameworkforDesigningandAnaly..> 22-Dec-2014 09:33 159K
241-AttributeBasedGroupSignaturewithRevocation.pdf 22-Dec-2014 09:33 332K
242-TimeMemoryDataTradeoffAttackonStreamCiphers..> 22-Dec-2014 09:33 227K
243-PORsProofsofRetrievabilityforLargeFiles.pdf 20-Jan-2023 14:21 207
244-ANoteontheRelayAttacksonepassportsTheCaseof..> 22-Dec-2014 09:33 124K
245-IncorporatingTemporalCapabilitiesinExisting..> 22-Dec-2014 09:33 238K
245-IncorporatingTemporalCapabilitiesinExisting..> 22-Dec-2014 09:33 433K
246-BEDAButtonEnabledDevicePairing.pdf 22-Dec-2014 09:33 249K
247-ANoteontheAtePairing.pdf 22-Dec-2014 09:33 137K
247-ANoteontheAtePairing.ps 22-Dec-2014 09:33 319K
248-1AESseemsweak2Lineartimesecurecryptography.pdf 22-Dec-2014 09:33 370K
248-1AESseemsweak2Lineartimesecurecryptography.ps 22-Dec-2014 09:33 619K
249-RandomnessExtractionviaDeltaBiasedMaskingin..> 22-Dec-2014 09:33 232K
250-EfficientandProvablySecureCertificatelessSh..> 22-Dec-2014 09:33 196K
251-ACryptographicModelforBranchingTimeSecurity..> 22-Dec-2014 09:33 279K
251-ACryptographicModelforBranchingTimeSecurity..> 22-Dec-2014 09:33 429K
252-AVerifiableVotingProtocolbasedonFarnel.pdf 22-Dec-2014 09:33 250K
253-ChoosingthecorrectellipticcurveintheCMmetho..> 22-Dec-2014 09:33 309K
254-FullySecureProxyReEncryptionwithoutRandomOr..> 20-Jan-2023 14:21 207
255-EfficientIdentityBasedSignatureinStandardMo..> 20-Jan-2023 14:21 207
256-AspectsofPairingInversion.pdf 22-Dec-2014 09:32 265K
257-AForwardSecureSignaturewithBackwardSecureDe..> 22-Dec-2014 09:32 142K
258-UICEAHighPerformanceCryptographicModuleforS..> 22-Dec-2014 09:32 241K
259-AlgebraicImmunityHierarchyofBooleanFunction..> 22-Dec-2014 09:32 136K
260-AnEfficientOnemoveNominativeSignatureScheme..> 22-Dec-2014 09:32 229K
261-NewFormofPermutationBiasandSecretKeyLeakage..> 22-Dec-2014 09:32 233K
262-CertificatelessPublicKeyEncryptionSecureaga..> 22-Dec-2014 09:32 203K
262-CertificatelessPublicKeyEncryptionSecureaga..> 22-Dec-2014 09:32 403K
263-EfficiencyImprovementforNTRU.pdf 20-Jan-2023 08:38 346K
264-ThePowerofProofsofPossessionSecuringMultipa..> 22-Dec-2014 09:32 373K
265-WhichLanguagesHave4RoundZeroKnowledgeProofs..> 22-Dec-2014 09:32 178K
266-FillingtheGapbetweenVotersandCryptographyin..> 22-Dec-2014 09:32 137K
267-CRUSTCryptographicRemoteUntrustedStoragewit..> 22-Dec-2014 09:32 585K
268-AffinePrecomputationwithSoleInversioninElli..> 22-Dec-2014 09:32 187K
269-VotingwithUnconditionalPrivacybyMergingPrtV..> 22-Dec-2014 09:32 292K
270-SecretBallotElectionswithUnconditionalInteg..> 22-Dec-2014 09:32 341K
271-HashFunctionsintheDedicatedKeySettingDesign..> 22-Dec-2014 09:32 351K
272-CryptanalysisofaHashFunctionProposedatICISC..> 22-Dec-2014 09:32 122K
272-CryptanalysisofaHashFunctionProposedatICISC..> 22-Dec-2014 09:32 282K
273-TwoTierSignaturesStronglyUnforgeableSignatu..> 22-Dec-2014 09:32 280K
274-GroupbasedProxyReencryptionscheme.pdf 22-Dec-2014 09:32 134K
275-Good39PseudoRandomBinarySequencesfromEllipt..> 20-Jan-2023 08:38 152K
275-GoodPseudoRandomBinarySequencesfromElliptic..> 22-Dec-2014 09:32 152K
276-ProlificCodeswiththeIdentifiableParentPrope..> 22-Dec-2014 09:32 285K
277-Cryptanalysisofaclassofcryptographichashfun..> 22-Dec-2014 09:32 327K
277-Cryptanalysisofaclassofcryptographichashfun..> 22-Dec-2014 09:32 696K
278-AFrameworkforIterativeHashFunctionsHAIFA.pdf 22-Dec-2014 09:32 223K
279-LossyTrapdoorFunctionsandTheirApplications.pdf 22-Dec-2014 09:32 434K
280-Onsolvingsparsealgebraicequationsoverfinite..> 22-Dec-2014 09:32 210K
281-APollardlikepseudorandomnumbergeneratorover..> 22-Dec-2014 09:32 39K
282-Analysisofcountermeasuresagainstaccessdrive..> 22-Dec-2014 09:32 223K
283-ProvablySecureFrameworkforInformationAggreg..> 22-Dec-2014 09:32 623K
284-Notitle.pdf 20-Jan-2023 14:21 207
285-SolvingMRHSlinearequations.pdf 22-Dec-2014 09:31 189K
286-Fasteradditionanddoublingonellipticcurves.pdf 22-Dec-2014 09:31 286K
287-TheEffectivenessofReceiptBasedAttacksonThre..> 22-Dec-2014 09:31 289K
288-SecureHybridEncryptionfromWeakenedKeyEncaps..> 22-Dec-2014 09:31 479K
288-SecureHybridEncryptionfromWeakenedKeyEncaps..> 22-Dec-2014 09:31 816K
289-ZeroKnowledgeintheAppliedPicalculusandAutom..> 22-Dec-2014 09:31 548K
290-ConstructionofRotationSymmetricBooleanFunct..> 22-Dec-2014 09:31 237K
291-RelationsAmongNotionsofPlaintextAwareness.pdf 22-Dec-2014 09:31 220K
292-ImprovedsecurityanalysisofOMAC.pdf 22-Dec-2014 09:31 212K
293-FullyResilientTraitorTracingSchemeusingKeyU..> 22-Dec-2014 09:31 216K
294-ImprovedPrivacyoftheTreeBasedHashprotocolsu..> 22-Dec-2014 09:31 165K
295-LinearizationAttacksAgainstSyndromeBasedHas..> 22-Dec-2014 09:31 80K
295-LinearizationAttacksAgainstSyndromeBasedHas..> 22-Dec-2014 09:31 147K
296-ConstructionofEfficientandSecurePairingAlgo..> 22-Dec-2014 09:31 234K
297-Secretsharingoninfinitegraphs.pdf 22-Dec-2014 09:31 205K
298-TheSecurityoftheExtendedCodebookXCBModeofOp..> 22-Dec-2014 09:31 232K
299-OptimizingMultiprecisionMultiplicationforPu..> 22-Dec-2014 09:31 150K
300-ANoteonAutomatabasedDynamicConvolutionalCry..> 22-Dec-2014 09:31 113K
300-ANoteonAutomatabasedDynamicConvolutionalCry..> 22-Dec-2014 09:31 270K
301-OnAsymptoticBehavioroftheRatioBetweentheNum..> 22-Dec-2014 09:31 180K
302-CompressionFunctionsSuitablefortheMultiProp..> 22-Dec-2014 09:31 110K
303-AForwardSecureRemoteUserAuthenticationSchem..> 22-Dec-2014 09:31 127K
304-ABoundontheSizeofSeparatingHashFamilies.pdf 22-Dec-2014 09:31 189K
305-OnNonRandomnessofthePermutationafterRC4KeyS..> 22-Dec-2014 09:31 177K
306-NovelApproachesforImprovingthePowerConsumpt..> 22-Dec-2014 09:31 347K
307-LocallyInvertibleBooleanMappings.pdf 22-Dec-2014 09:31 107K
307-LocallyInvertibleBooleanMappings.ps 22-Dec-2014 09:31 268K
308-GeneralizedRotationSymmetricandDihedralSymm..> 22-Dec-2014 09:31 60K
309-BalancedBooleanFunctionon13variableshavingN..> 22-Dec-2014 09:31 99K
310-ANoteonPointMultiplicationonSupersingularEl..> 22-Dec-2014 09:31 96K
311-ARefinedAlgorithmfortheeta_TPairingCalculat..> 22-Dec-2014 09:31 135K
312-SecureSimilaritySearch.pdf 22-Dec-2014 09:31 463K
313-PerfectForwardSecureIdentityBasedAuthentica..> 22-Dec-2014 09:30 223K
313-PerfectForwardSecureIdentityBasedAuthentica..> 22-Dec-2014 09:30 451K
314-FormalCertificationofCodeBasedCryptographic..> 20-Jan-2023 14:21 207
315-SecurityunderKeyDependentInputs.pdf 22-Dec-2014 09:30 298K
316-SECURITYPROOFFORSHENGBAOWANGSIDENTITYBASEDE..> 22-Dec-2014 09:30 131K
317-ImprovingUpontheTETModeofOperation.pdf 22-Dec-2014 09:30 230K
318-OnthecomplexityofsidechannelattacksonAES256..> 22-Dec-2014 09:30 280K
319-ANewSecurityDefinitionforPublicKeyEncryptio..> 22-Dec-2014 09:30 203K
320-OntheBigGapBetweenpandqinDSA.pdf 22-Dec-2014 09:30 151K
321-BalancedBooleanFunctionswithNonlinearity2n1..> 22-Dec-2014 09:30 47K
321-BalancedBooleanFunctionswithNonlinearitygt2..> 20-Jan-2023 08:38 47K
322-IdentifyingIdealLattices.pdf 22-Dec-2014 09:30 143K
322-IdentifyingIdealLattices.ps 22-Dec-2014 09:30 305K
323-AttributeBasedEncryptionwithNonMonotonicAcc..> 22-Dec-2014 09:30 227K
324-Towardsprovablesecurityforroutediscoverypro..> 22-Dec-2014 09:30 149K
325-FasterandShorterPasswordAuthenticatedKeyExc..> 22-Dec-2014 09:30 291K
325-FasterandShorterPasswordAuthenticatedKeyExc..> 22-Dec-2014 09:30 508K
326-EfficientPasswordbasedAuthenticatedKeyExcha..> 22-Dec-2014 09:30 275K
327-SecureIdentificationandQKDintheBoundedQuant..> 22-Dec-2014 09:30 310K
328-ATightHighOrderEntropicQuantumUncertaintyRe..> 22-Dec-2014 09:30 361K
329-ATunableBroadcastEncryptionScheme.pdf 22-Dec-2014 09:30 220K
330-RemotePowerAnalysisofRFIDTags.pdf 22-Dec-2014 09:30 2M
330-RemotePowerAnalysisofRFIDTags.ps 22-Dec-2014 09:30 18M
331-IsolatedProofsofKnowledgeandIsolatedZeroKno..> 22-Dec-2014 09:29 371K
331-IsolatedProofsofKnowledgeandIsolatedZeroKno..> 22-Dec-2014 09:29 601K
332-UniversallyComposableMultipartyComputationw..> 22-Dec-2014 09:29 260K
332-UniversallyComposableMultipartyComputationw..> 22-Dec-2014 09:29 482K
333-TowardsKeyDependentMessageSecurityintheStan..> 22-Dec-2014 09:29 249K
333-TowardsKeyDependentMessageSecurityintheStan..> 22-Dec-2014 09:29 478K
334-NewConstructionsforUCSecureComputationusing..> 22-Dec-2014 09:29 278K
335-EncryptionTechniquesforSecureDatabaseOutsou..> 22-Dec-2014 09:29 237K
336-AMajorVulnerabilityinRSAImplementationsduet..> 22-Dec-2014 09:29 269K
337-MobilePhonesasSecureGatewaysforMessageBased..> 22-Dec-2014 09:29 5M
338-VHASHSecurity.pdf 22-Dec-2014 09:29 134K
338-VHASHSecurity.ps 22-Dec-2014 09:29 333K
339-Onthesecurityofaclassofimageencryptionschem..> 22-Dec-2014 09:29 3M
340-EfficientImplementationofthePairingonMobile..> 22-Dec-2014 09:29 353K
341-MultiPartyIndirectIndexingandApplications.pdf 22-Dec-2014 09:29 201K
342-ANewSecurityModelforCrossRealmC2CPAKEProtoc..> 22-Dec-2014 09:29 134K
343-Updatedstandardsforvalidatingellipticcurves..> 22-Dec-2014 09:29 72K
343-Updatedstandardsforvalidatingellipticcurves.ps 22-Dec-2014 09:29 191K
344-SecurityAnalysisofWAPIAuthenticationandKeyE..> 22-Dec-2014 09:29 179K
345-AnalysisofUnderlyingAssumptionsinNISTDRBGs.pdf 22-Dec-2014 09:29 181K
346-Securemultipartycomputationonincompletenetw..> 20-Jan-2023 14:21 207
347-LaiMasseySchemeandQuasiFeistelNetworks.pdf 22-Dec-2014 09:29 247K
348-AFrameworkforEfficientandComposableObliviou..> 22-Dec-2014 09:28 372K
349-StatisticallyHidingSets.pdf 22-Dec-2014 09:28 265K
349-StatisticallyHidingSets.ps 22-Dec-2014 09:28 466K
350-OnTweakingLubyRackoffBlockciphers.pdf 22-Dec-2014 09:28 277K
350-OnTweakingLubyRackoffBlockciphers.ps 22-Dec-2014 09:28 1023K
351-ALinearLowerBoundontheCommunicationComplexi..> 22-Dec-2014 09:28 230K
351-ALinearLowerBoundontheCommunicationComplexi..> 22-Dec-2014 09:28 720K
352-NewLocalCollisionsfortheSHA2HashFamily.pdf 22-Dec-2014 09:28 252K
352-NewLocalCollisionsfortheSHA2HashFamily.ps 22-Dec-2014 09:28 877K
353-MultipartyComputationtoGenerateSecretPermut..> 22-Dec-2014 09:28 207K
353-MultipartyComputationtoGenerateSecretPermut..> 22-Dec-2014 09:28 368K
354-IdentityCommittableSignaturesandTheirExtens..> 22-Dec-2014 09:28 249K
355-Secretsharingontheinfiniteladder.pdf 22-Dec-2014 09:28 118K
356-ABlockCipherbasedPRNGSecureAgainstSideChann..> 22-Dec-2014 09:28 305K
356-ABlockCipherbasedPRNGSecureAgainstSideChann..> 22-Dec-2014 09:28 1M
357-ANoteonSignatureStandards.pdf 22-Dec-2014 09:28 88K
358-ImprovingtheRoundComplexityofVSSinPointtoPo..> 22-Dec-2014 09:28 194K
359-IntrusionResilientSecretSharing.pdf 22-Dec-2014 09:28 282K
360-SufficientConditionsforIntractabilityoverBl..> 22-Dec-2014 09:28 405K
361-ProxyReencryptionSystemsforIdentitybasedEnc..> 22-Dec-2014 09:28 286K
362-StatisticalTestingforDiskEncryptionModesofO..> 22-Dec-2014 09:28 145K
363-FuzzyPrivateMatchingExtendedAbstract.pdf 22-Dec-2014 09:28 187K
364-AProofofSecurityofaMeshSecurityArchitecture..> 22-Dec-2014 09:28 426K
365-PairingsonJacobiansofHyperellipticCurves.pdf 22-Dec-2014 09:28 261K
365-PairingsonJacobiansofHyperellipticCurves.ps 22-Dec-2014 09:28 462K
366-BreakingtheSymmetryaWaytoResisttheNewDiffer..> 22-Dec-2014 09:28 196K
367-CryptanalysisofRationalMultivariatePublicKe..> 22-Dec-2014 09:28 170K
368-ReducingTrustinthePKGinIdentityBasedCryptos..> 22-Dec-2014 09:28 232K
369-UniversallyComposableMultiPartyComputationw..> 22-Dec-2014 09:28 192K
370-FURTHERPROPERTIESOFSEVERALCLASSESOFBOOLEANF..> 22-Dec-2014 09:27 321K
371-Grouporientedencryptionsecureagainstcollude..> 22-Dec-2014 09:27 151K
372-OntheAuthenticationofOnePopularSigncryption..> 22-Dec-2014 09:27 114K
373-AMeetintheMiddleCollisionAttackAgainsttheNe..> 22-Dec-2014 09:27 69K
373-AMeetintheMiddleCollisionAttackAgainsttheNe..> 22-Dec-2014 09:27 150K
374-OnFactoringArbitraryIntegerswithKnownBits.pdf 22-Dec-2014 09:27 83K
374-OnFactoringArbitraryIntegerswithKnownBits.ps 22-Dec-2014 09:27 155K
375-FurtherMusingsontheWangetalMD5CollisionImpr..> 22-Dec-2014 09:27 435K
376-AnEfficientRangeBoundedCommitmentScheme.pdf 22-Dec-2014 09:27 125K
377-FastPointMultiplicationonEllipticCurvesofEv..> 20-Jan-2023 08:38 127K
378-AlgebraicStructureDefectoscopy.pdf 22-Dec-2014 09:27 256K
379-OnTheInequivalenceOfNessHellesethAPNFunctio..> 22-Dec-2014 09:27 183K
380-XFCSRanewsoftwareorientedstreamcipherbasedu..> 22-Dec-2014 09:27 174K
380-XFCSRanewsoftwareorientedstreamcipherbasedu..> 22-Dec-2014 09:27 349K
381-CryptanalysisofTwoNewInstancesofTTMCryptosy..> 22-Dec-2014 09:27 178K
382-ObliviousTransferviaMcEliece39sPKCandPermut..> 20-Jan-2023 08:38 195K
382-ObliviousTransferviaMcEliecesPKCandPermuted..> 22-Dec-2014 09:27 195K
383-CryptanalysisonImprovedChouetal39sIDBasedDe..> 20-Jan-2023 08:38 128K
383-CryptanalysisonImprovedChouetalsIDBasedDeni..> 22-Dec-2014 09:27 128K
384-NonInteractiveAnonymousCredentials.pdf 22-Dec-2014 09:27 2M
384-NonInteractiveAnonymousCredentials.ps 22-Dec-2014 09:27 2M
385-OntheinsecurityofinterchangeduseofOFBandCBC..> 22-Dec-2014 09:27 304K
386-ConvertibleUndeniableSignatureswithoutRando..> 22-Dec-2014 09:27 185K
386-ConvertibleUndeniableSignatureswithoutRando..> 22-Dec-2014 09:27 376K
387-AnalysisofLocalOptimainBlockCiphers.pdf 20-Jan-2023 14:21 207
388-OnCiphertextUndetectability.pdf 22-Dec-2014 09:27 195K
388-OnCiphertextUndetectability.ps 22-Dec-2014 09:27 386K
389-InteractiveandNoninteractiveZeroKnowledgeCo..> 22-Dec-2014 09:27 284K
390-ImplementingCryptographicPairingsoverBarret..> 22-Dec-2014 09:27 190K
391-Anovelpublickeycryptosystembasedonsemimodul..> 22-Dec-2014 09:27 93K
392-EfficientComputationallyPrivateInformationR..> 22-Dec-2014 09:27 247K
393-OverlapfreeKaratsubaOfmanPolynomialMultipli..> 22-Dec-2014 09:26 144K
394-AlmosteverywhereSecureComputation.pdf 22-Dec-2014 09:26 160K
394-AlmosteverywhereSecureComputation.ps 22-Dec-2014 09:26 201K
395-SecondPreimageAttacksonDitheredHashFunction..> 22-Dec-2014 09:26 262K
395-SecondPreimageAttacksonDitheredHashFunction..> 22-Dec-2014 09:26 842K
396-ProxyReSignatureSchemeswithoutRandomOracles..> 22-Dec-2014 09:26 259K
397-Onthesecuritydefectsofanimageencryptionsche..> 22-Dec-2014 09:26 3M
398-AShortSignatureSchemeintheStandardModel.pdf 20-Jan-2023 14:21 207
399-CeremonyDesignandAnalysis.pdf 22-Dec-2014 09:26 292K
400-REMARKSONIBESCHEMEOFWANGANDCAO.pdf 22-Dec-2014 09:26 102K
401-AnotherLookatAutomatedTheoremProving.pdf 22-Dec-2014 09:26 253K
402-RobustAnonymousRFIDAuthenticationwithConsta..> 22-Dec-2014 09:26 183K
403-TurboSHA2.pdf 22-Dec-2014 09:26 501K
404-PredicateEncryptionSupportingDisjunctionsPo..> 22-Dec-2014 09:26 300K
405-SecurePRNGsfromSpecializedPolynomialMapsove..> 22-Dec-2014 09:26 417K
406-ModelingComputationalSecurityinLongLivedSys..> 22-Dec-2014 09:26 318K
406-ModelingComputationalSecurityinLongLivedSys..> 22-Dec-2014 09:26 491K
407-ProvablySecureGroupingproofsforRFIDtags.pdf 20-Jan-2023 14:21 207
408-DifferentialCryptanalysisofPRESENT.pdf 22-Dec-2014 09:26 152K
409-BuildingaCollisionResistantCompressionFunct..> 22-Dec-2014 09:26 256K
410-InvertedEdwardscoordinates.pdf 22-Dec-2014 09:26 109K
411-CryptanalysisonImprovedOneroundLinLi39sTrip..> 20-Jan-2023 08:38 214K
411-CryptanalysisonImprovedOneroundLinLisTripar..> 22-Dec-2014 09:26 214K
412-ProposingaMasterOneWayFunction.pdf 22-Dec-2014 09:26 159K
413-BreakingONEFIVIUMbyAIDAanAlgebraicIVDiffere..> 22-Dec-2014 09:26 118K
414-Optimizingdoublebaseellipticcurvesinglescal..> 22-Dec-2014 09:26 395K
415-CryptanalyticFlawsinOhetal39sIDBasedAuthent..> 20-Jan-2023 08:38 113K
415-CryptanalyticFlawsinOhetalsIDBasedAuthentic..> 22-Dec-2014 09:26 113K
416-CompressionFunctionDesignPrinciplesSupporti..> 22-Dec-2014 09:26 176K
416-CompressionFunctionDesignPrinciplesSupporti..> 22-Dec-2014 09:26 369K
417-AlgorithmsandArithmeticOperatorsforComputin..> 22-Dec-2014 09:26 337K
418-AnImprovedRemoteUserAuthenticationSchemewit..> 20-Jan-2023 14:21 207
419-CryptanalysisoftheRandomNumberGeneratorofth..> 22-Dec-2014 09:26 289K
420-ACriticalAnalysisandImprovementofAACSDriveH..> 22-Dec-2014 09:25 155K
421-TheroleofhelpinClassicalandQuantumZeroKnowl..> 22-Dec-2014 09:25 308K
421-TheroleofhelpinClassicalandQuantumZeroKnowl..> 22-Dec-2014 09:25 662K
422-StructuralIdentityBasedEncryption.pdf 22-Dec-2014 09:25 247K
423-FindingLowWeightPolynomialMultiplesUsingLat..> 22-Dec-2014 09:25 144K
424-WhenethRootsBecomeEasierThanFactoring.pdf 22-Dec-2014 09:25 226K
424-WhenethRootsBecomeEasierThanFactoring.ps 22-Dec-2014 09:25 444K
425-Onprimeorderellipticcurveswithembeddingdegr..> 22-Dec-2014 09:25 202K
425-Onprimeorderellipticcurveswithembeddingdegr..> 22-Dec-2014 09:25 404K
426-ImplementingCryptographicPairingsoverCurves..> 22-Dec-2014 09:25 178K
427-IdempotentsintheNeighbourhoodofPattersonWie..> 22-Dec-2014 09:25 249K
428-IsogeniesandtheDiscreteLogarithmProblemonJa..> 22-Dec-2014 09:25 224K
429-Oncompressiblepairingsandtheircomputation.pdf 22-Dec-2014 09:25 206K
429-Oncompressiblepairingsandtheircomputation.ps 22-Dec-2014 09:25 430K
430-CryptanalysisofLASH.pdf 22-Dec-2014 09:25 275K
431-NotionsofEfficiencyinSimulationParadigm.pdf 22-Dec-2014 09:25 279K
431-NotionsofEfficiencyinSimulationParadigm.ps 22-Dec-2014 09:25 771K
432-TrapdoorsforHardLatticesandNewCryptographic..> 22-Dec-2014 09:25 482K
433-AnAlmostConstantEffortSolutionVerificationP..> 22-Dec-2014 09:25 268K
434-ComputingtheAtePairingonEllipticCurveswithE..> 22-Dec-2014 09:25 180K
434-ComputingtheAtePairingonEllipticCurveswithE..> 22-Dec-2014 09:25 379K
435-IrreducibilitytotheOneMoreEvaluationProblem..> 22-Dec-2014 09:25 238K
435-IrreducibilitytotheOneMoreEvaluationProblem..> 22-Dec-2014 09:25 438K
436-NewAttacksontheStreamCipherTPy6andDesignofN..> 22-Dec-2014 09:25 176K
436-NewAttacksontheStreamCipherTPy6andDesignofN..> 22-Dec-2014 09:25 428K
437-ReconfigurableHardwareImplementationsofTwea..> 22-Dec-2014 09:25 451K
438-OrderedMultisignaturesandIdentityBasedSeque..> 22-Dec-2014 09:25 534K
439-MultipartyKeyAgreementUsingBilinearMap.pdf 22-Dec-2014 09:25 336K
440-AnImprovedRemoteUserAuthenticationSchemeusi..> 22-Dec-2014 09:25 64K
441-FasterGroupOperationsonEllipticCurves.pdf 22-Dec-2014 09:25 187K
441-FasterGroupOperationsonEllipticCurves.ps 22-Dec-2014 09:25 544K
442-AnotherLookatNonStandardDiscreteLogandDiffi..> 22-Dec-2014 09:24 176K
443-TemplateAttackswithaPowerModel.pdf 22-Dec-2014 09:24 627K
444-Tightboundsbetweenalgebraicimmunityandnonli..> 22-Dec-2014 09:24 199K
445-Proposalofanewefficientpublickeysystemforen..> 22-Dec-2014 09:24 191K
446-ALatticeBasedComputationallyEfficientPrivat..> 22-Dec-2014 09:24 655K
447-Weakadaptivechosenciphertextsecurehybridenc..> 22-Dec-2014 09:24 158K
448-GeneralizedCorrelationandHigherOrderNonline..> 22-Dec-2014 09:24 218K
449-GenericAttacksonUnbalancedFeistelSchemeswit..> 22-Dec-2014 09:24 415K
450-ShortGroupSignaturewithoutRandomOracles.pdf 22-Dec-2014 09:24 167K
451-PreciseConcurrentZeroKnowledge.pdf 22-Dec-2014 09:24 283K
452-ConstructingBrezingWengpairingfriendlyellip..> 22-Dec-2014 09:24 182K
453-OntheRelationsBetweenNonInteractiveKeyDistr..> 22-Dec-2014 09:24 278K
454-EfficientCertificatelessSignaturesSuitablef..> 22-Dec-2014 09:24 269K
455-Analysisandoptimizationofellipticcurvesingl..> 22-Dec-2014 09:24 341K
456-PreciseZeroKnowledgeinConcurrentSetting.pdf 20-Jan-2023 14:21 207
457-ComparingImplementationEfficiencyofOrdinary..> 22-Dec-2014 09:24 166K
458-SavingPrivateRandomnessinOneWayFunctionsand..> 22-Dec-2014 09:24 247K
458-SavingPrivateRandomnessinOneWayFunctionsand..> 22-Dec-2014 09:24 539K
459-PracticalAnonymousDivisibleECashFromBounded..> 22-Dec-2014 09:24 335K
460-GuaranteesforCustomersofIncentiveAnonymizin..> 22-Dec-2014 09:24 127K
460-GuaranteesforCustomersofIncentiveAnonymizin..> 22-Dec-2014 09:24 262K
461-VerifiableAttributebasedEncryption.pdf 22-Dec-2014 09:24 164K
462-ConstructionofUniversalDesignatedVerifierSi..> 22-Dec-2014 09:24 503K
463-EfficientGF3mMultiplicationAlgorithmforetaT..> 22-Dec-2014 09:24 268K
464-SecureComputationWithoutAuthentication.pdf 22-Dec-2014 09:24 347K
465-ASyntheticIndifferentiabilityAnalysisofSome..> 22-Dec-2014 09:24 206K
466-ImprovedImpossibleDifferentialCryptanalysis..> 22-Dec-2014 09:24 229K
467-InteractiveandNoninteractiveZeroKnowledgear..> 22-Dec-2014 09:24 395K
467-InteractiveandNoninteractiveZeroKnowledgear..> 22-Dec-2014 09:24 639K
468-OnthehashfunctionofODHassumption.pdf 20-Jan-2023 14:21 207
469-IDBasedGroupPasswordAuthenticatedKeyExchang..> 22-Dec-2014 09:23 269K
470-FasterMultiExponentiationthroughCachingAcce..> 22-Dec-2014 09:23 254K
471-AttacksontheWEPprotocol.pdf 22-Dec-2014 09:23 1M
472-NewFeaturesofLatinDancesAnalysisofSalsaChaC..> 22-Dec-2014 09:23 235K
472-NewFeaturesofLatinDancesAnalysisofSalsaChaC..> 22-Dec-2014 09:23 462K
473-AuthenticatedKeyExchangeandKeyEncapsulation..> 22-Dec-2014 09:23 258K
474-NotesontheWangetal263SHA1DifferentialPath.pdf 22-Dec-2014 09:23 262K
475-ObtainingUniversallyComposableSecurityTowar..> 22-Dec-2014 09:23 294K
476-DynamicSHA.pdf 22-Dec-2014 09:23 297K
477-AlgebraicSideChannelCollisionAttacksonAES.pdf 22-Dec-2014 09:23 207K
478-ImpossibilityResultsforUniversalComposabili..> 22-Dec-2014 09:23 180K
479-AnEfficientIdentificationProtocolandtheKnow..> 22-Dec-2014 09:23 167K
480-DifferentialFaultAnalysisontheAESKeySchedul..> 22-Dec-2014 09:23 177K
481-MACfreevariantofKD04.pdf 20-Jan-2023 14:21 207
482-TinyPBCPairingsforAuthenticatedIdentityBase..> 22-Dec-2014 09:23 175K