Index of /2007/


../
001-Familiesofgenus2curveswithsmallembeddingdeg..> 22-Dec-2014 09:44    2217
001-Familiesofgenus2curveswithsmallembeddingdeg..> 22-Dec-2014 09:44     943
002-CryptanalysisofAnObliviousPolynomialEvaluat..> 20-Jan-2023 14:21     207
003-TheEnergyCostofCryptographicKeyEstablishmen..> 22-Dec-2014 09:44    197K
003-TheEnergyCostofCryptographicKeyEstablishmen..> 22-Dec-2014 09:44    397K
004-CryptanalysisofHwangChangsaTimeStampProtoco..> 22-Dec-2014 09:44    402K
005-PrivacyProtectingCouponSystemRevisited.pdf     22-Dec-2014 09:44    205K
006-EfficientDynamickTimesAnonymousAuthenticati..> 22-Dec-2014 09:44    253K
007-OneRoundIDBasedBlindSignatureSchemewithoutR..> 22-Dec-2014 09:44    299K
008-Securityanalysisofthevariantoftheselfshrink..> 22-Dec-2014 09:44    193K
008-Securityanalysisofthevariantoftheselfshrink..> 22-Dec-2014 09:44    185K
009-NewPublicKeyCryptosystemsUsingPolynomialsov..> 22-Dec-2014 09:44    392K
010-ComputingendomorphismringsofJacobiansofgenu..> 22-Dec-2014 09:44    332K
011-UniversallyComposableKeyevolvingSignature.pdf  22-Dec-2014 09:44    149K
012-Interactivetwochannelmessageauthenticationb..> 22-Dec-2014 09:44    218K
013-OptimisedversionsoftheAteandTwistedAtePairi..> 22-Dec-2014 09:44    175K
014-InvertibleUniversalHashingandtheTETEncrypti..> 22-Dec-2014 09:44    300K
015-GroupEncryption.pdf                            22-Dec-2014 09:43    406K
015-GroupEncryption.ps                             22-Dec-2014 09:43    670K
016-VESTCiphers.pdf                                20-Jan-2023 14:21     207
017-GroupDecryption.pdf                            22-Dec-2014 09:43    261K
018-StronglySecureIdentitybasedKeyAgreementandA..> 22-Dec-2014 09:43    325K
018-StronglySecureIdentitybasedKeyAgreementandA..> 22-Dec-2014 09:43    591K
019-FastDigitalSignatureSchemesasSecureasDiffie..> 22-Dec-2014 09:43    221K
020-TinyTateIdentityBasedEncryptionforSensorNet..> 22-Dec-2014 09:43    176K
021-TwoTrivialAttacksonTrivium.pdf                 22-Dec-2014 09:43    182K
022-OnPerfectlyBalancedBooleanFunctions.pdf        22-Dec-2014 09:43    138K
022-OnPerfectlyBalancedBooleanFunctions.ps         22-Dec-2014 09:43    128K
023-EfficientHybridEncryptionfromIDBasedEncrypt..> 22-Dec-2014 09:43    440K
024-EfficientMethodsforConversionandSolutionofS..> 22-Dec-2014 09:43    417K
025-PrivateLocallyDecodableCodes.pdf               22-Dec-2014 09:43    233K
026-CryptanalysisandImprovementofanEllipticCurv..> 22-Dec-2014 09:43    122K
026-CryptanalysisandImprovementofanEllipticCurv..> 22-Dec-2014 09:43    288K
027-VerifyingDataIntegritywithFewQueriestoUntru..> 20-Jan-2023 14:21     207
028-HCHANewTweakableEncipheringSchemeUsingtheHa..> 22-Dec-2014 09:43    307K
028-HCHANewTweakableEncipheringSchemeUsingtheHa..> 22-Dec-2014 09:43    596K
029-AGeneralConstructionofTweakableBlockCiphers..> 22-Dec-2014 09:43    308K
030-FormalSecurityTreatmentsforIBEtoSignatureTr..> 22-Dec-2014 09:43    282K
030-FormalSecurityTreatmentsforIBEtoSignatureTr..> 22-Dec-2014 09:43    527K
031-ImprovedSecurityAnalysisofPMAC.pdf             22-Dec-2014 09:43    223K
032-AnimprovedcollisionprobabilityforCBCMACandP..> 22-Dec-2014 09:43    212K
033-FromSelectiveIDtoFullSecurityTheCaseoftheIn..> 22-Dec-2014 09:43    168K
034-ANewTypeofCipherDICING_CSB.pdf                 22-Dec-2014 09:43     60K
035-CryptanalysisofwhiteboxDESimplementations.pdf  22-Dec-2014 09:43    417K
035-CryptanalysisofwhiteboxDESimplementations.ps   22-Dec-2014 09:43    971K
036-ChosenCiphertextSecureKeyEncapsulationBased..> 22-Dec-2014 09:43    389K
037-BestQuadraticApproximationsofCubicBooleanFu..> 22-Dec-2014 09:43    323K
038-MultipleModularAdditionsandCrosswordPuzzleA..> 22-Dec-2014 09:43    220K
039-NewBranchPredictionVulnerabilitiesinOpenSSL..> 22-Dec-2014 09:43    251K
040-EfficientQuintupleFormulasforEllipticCurves..> 22-Dec-2014 09:42    178K
040-EfficientQuintupleFormulasforEllipticCurves..> 22-Dec-2014 09:42    338K
041-SymmetricTardosfingerprintingcodesforarbitr..> 22-Dec-2014 09:42    396K
041-SymmetricTardosfingerprintingcodesforarbitr..> 22-Dec-2014 09:42    546K
042-AuthorshipProofforTextualDocument.pdf          22-Dec-2014 09:42    203K
043-ReflectionAttacksonProductCiphers.pdf          22-Dec-2014 09:42    196K
043-ReflectionAttacksonProductCiphers.ps           22-Dec-2014 09:42    389K
044-DesignandPrimitiveSpecificationforShannon.pdf  22-Dec-2014 09:42    374K
045-ACoprocessorfortheFinalExponentiationofthee..> 22-Dec-2014 09:42    245K
046-DirectReductionofString12OTtoRabin39sOT.pdf    20-Jan-2023 14:21     207
046-DirectReductionofString12OTtoRabinsOT.pdf      22-Dec-2014 09:42    109K
046-DirectReductionofString12OTtoRabinsOT.ps       22-Dec-2014 09:42     99K
047-NewConstructionsofFuzzyIdentityBasedEncrypt..> 22-Dec-2014 09:42    187K
048-ASecurityAnalysisoftheNISTSP80090EllipticCu..> 22-Dec-2014 09:42    234K
049-SecurityArgumentsforaClassofIDbasedSignatur..> 22-Dec-2014 09:42    187K
050-SpecialblockcipherfamilyDNandnewgenerationS..> 22-Dec-2014 09:42    927K
051-ForwardsecureRFIDAuthenticationandKeyExchan..> 22-Dec-2014 09:42    203K
052-ForwardSecureSequentialAggregateAuthenticat..> 22-Dec-2014 09:42    119K
052-ForwardSecureSequentialAggregateAuthenticat..> 22-Dec-2014 09:42    226K
053-CompilerAssistedEllipticCurveCryptography.pdf  22-Dec-2014 09:42    162K
053-CompilerAssistedEllipticCurveCryptography.ps   22-Dec-2014 09:42    323K
054-CryptanalysisofStreamCiphersBasedonArraysan..> 22-Dec-2014 09:42    960K
054-CryptanalysisofStreamCiphersBasedonArraysan..> 22-Dec-2014 09:42      3M
055-CryptanalysisoftheKeeLoqblockcipher.pdf        22-Dec-2014 09:42    220K
056-EnforcingSemanticIntegrityonUntrustedClient..> 22-Dec-2014 09:42    177K
056-EnforcingSemanticIntegrityonUntrustedClient..> 22-Dec-2014 09:42    914K
057-Constructingpairingfriendlygenus2curvesover..> 22-Dec-2014 09:42    271K
058-ThesimplestmethodforconstructingAPNpolynomi..> 22-Dec-2014 09:42    144K
058-ThesimplestmethodforconstructingAPNpolynomi..> 22-Dec-2014 09:42    327K
059-ASurveyofSingleDatabasePIRTechniquesandAppl..> 22-Dec-2014 09:42    221K
059-ASurveyofSingleDatabasePIRTechniquesandAppl..> 22-Dec-2014 09:41    472K
060-SecurityAgainstCovertAdversariesEfficientPr..> 22-Dec-2014 09:41    463K
061-AcceleratingSSLusingtheVectorprocessorsinIB..> 20-Jan-2023 08:38    191K
061-AcceleratingSSLusingtheVectorprocessorsinIB..> 22-Dec-2014 09:41    191K
062-AlgebraicandSlideAttacksonKeeLoq.pdf           22-Dec-2014 09:41    336K
062-AlgebraicandSlideAttacksonKeeLoq.ps            22-Dec-2014 09:41      9M
063-ConstructingnewAPNfunctionsfromknownones.pdf   22-Dec-2014 09:41    199K
063-ConstructingnewAPNfunctionsfromknownones.ps    22-Dec-2014 09:41    406K
064-AlgebraicLowerBoundsforComputingonEncrypted..> 22-Dec-2014 09:41    220K
065-HowtoDeriveLowerBoundonObliviousTransferRed..> 22-Dec-2014 09:41    153K
066-LowDensityAttackRevisited.pdf                  22-Dec-2014 09:41    165K
067-withdrawn.pdf                                  20-Jan-2023 14:21     207
068-EfficientHierarchicalIdentityBasedSignature..> 20-Jan-2023 14:21     207
069-NominativeSignatureApplicationSecurityModel..> 22-Dec-2014 09:41    260K
070-TwoLinearDistinguishingAttacksonVMPCandRC4A..> 22-Dec-2014 09:41    220K
070-TwoLinearDistinguishingAttacksonVMPCandRC4A..> 22-Dec-2014 09:41    481K
071-KnowledgeBindingCommitmentswithApplications..> 22-Dec-2014 09:41    195K
071-KnowledgeBindingCommitmentswithApplications..> 22-Dec-2014 09:41    331K
072-AHybridApproachtoConcurrentErrorDetectionfo..> 20-Jan-2023 14:21     207
073-PublicKeyEncryptionthatAllowsPIRQueries.pdf    22-Dec-2014 09:41    235K
073-PublicKeyEncryptionthatAllowsPIRQueries.ps     22-Dec-2014 09:41    488K
074-ACramerShoupEncryptionSchemefromtheLinearAs..> 22-Dec-2014 09:41    295K
075-WeaknessesinthePseudorandomBitGenerationAlg..> 22-Dec-2014 09:41    176K
075-WeaknessesinthePseudorandomBitGenerationAlg..> 22-Dec-2014 09:41    428K
076-AlmostSecure1RoundnChannelMessageTransmissi..> 22-Dec-2014 09:41    199K
077-Onbentfunctionswithzerosecondderivatives.pdf   20-Jan-2023 14:21     207
078-MPCvsSFEPerfectSecurityinaUnifiedCorruption..> 22-Dec-2014 09:41    197K
078-MPCvsSFEPerfectSecurityinaUnifiedCorruption..> 22-Dec-2014 09:41    215K
079-HowToFindManyCollisionsof3PassHAVAL.pdf        22-Dec-2014 09:41    170K
079-HowToFindManyCollisionsof3PassHAVAL.ps         22-Dec-2014 09:41      2M
080-WeaklyonlyUnforgeableSignatureandItsApplica..> 20-Jan-2023 14:21     207
081-RevisitinganEfficientEllipticCurveKeyAgreem..> 22-Dec-2014 09:40    131K
082-DeniableAuthenticationontheInternet.pdf        22-Dec-2014 09:40    240K
082-DeniableAuthenticationontheInternet.ps         22-Dec-2014 09:40    469K
083-PublicKeyEncryptionWhichisSimultaneouslyaLo..> 22-Dec-2014 09:40    299K
084-ConstantSizeCiphertextHIBEintheAugmentedSel..> 22-Dec-2014 09:40    325K
084-ConstantSizeCiphertextHIBEintheAugmentedSel..> 22-Dec-2014 09:40    354K
085-MultiCollisionAttackontheCompressionFunctio..> 22-Dec-2014 09:40    164K
085-MultiCollisionAttackontheCompressionFunctio..> 22-Dec-2014 09:40    403K
086-NonInteractiveProofsforIntegerMultiplicatio..> 22-Dec-2014 09:40    311K
086-NonInteractiveProofsforIntegerMultiplicatio..> 22-Dec-2014 09:40    389K
087-ImprovementonaDigitalSignatureSchemewithout..> 22-Dec-2014 09:40    261K
088-AnAlgorithmforFindingSmallRootsofMultivaria..> 22-Dec-2014 09:40    233K
089-BlackBoxExtensionFieldsandtheInexistenceofF..> 22-Dec-2014 09:40    153K
089-BlackBoxExtensionFieldsandtheInexistenceofF..> 22-Dec-2014 09:40    166K
090-Onthesecurityofanimageencryptionscheme.pdf     20-Jan-2023 08:38      4M
091-ArithmeticOperatorsforPairingBasedCryptogra..> 22-Dec-2014 09:40    339K
092-PRIMEPOINTSONELLIPTICCURVESANDITSIMPACTONEC..> 22-Dec-2014 09:40    259K
093-HAPADEPHumanAsistedPureAudioDevicePairing.pdf  22-Dec-2014 09:40    345K
094-MeshSignaturesHowtoLeakaSecretwithUnwitting..> 22-Dec-2014 09:40    384K
095-GenericCertificatelessEncryptionintheStanda..> 22-Dec-2014 09:40    268K
096-SomosSequenceNearAdditionFormulasandModular..> 22-Dec-2014 09:40    251K
096-SomosSequenceNearAdditionFormulasandModular..> 22-Dec-2014 09:40    606K
097-LargeCyclicSubgroupsofJacobiansofHyperellip..> 22-Dec-2014 09:40    141K
097-LargeCyclicSubgroupsofJacobiansofHyperellip..> 22-Dec-2014 09:40    630K
098-ClassesofQuadraticAPNTrinomialsandHexanomia..> 22-Dec-2014 09:40    158K
098-ClassesofQuadraticAPNTrinomialsandHexanomia..> 22-Dec-2014 09:40    332K
099-Inferringsequencesproducedbyalinearcongruen..> 22-Dec-2014 09:40    217K
100-PracticalIdentityBasedEncryptionIBEinMultip..> 22-Dec-2014 09:40    211K
100-PracticalIdentityBasedEncryptionIBEinMultip..> 22-Dec-2014 09:39    431K
101-PracticalPasswordRecoveryonanMD5Challengean..> 22-Dec-2014 09:39    144K
101-PracticalPasswordRecoveryonanMD5Challengean..> 22-Dec-2014 09:39    326K
102-OntheRoleofSchedulinginSimulationBasedSecur..> 22-Dec-2014 09:39    260K
103-AnotherLookatSquareRootsandTracesandQuadrat..> 22-Dec-2014 09:39    204K
104-CryptanalysisofWhiteBoxDESImplementationswi..> 22-Dec-2014 09:39    194K
104-CryptanalysisofWhiteBoxDESImplementationswi..> 22-Dec-2014 09:39    437K
105-IsodualReductionofLattices.pdf                 22-Dec-2014 09:39    655K
105-IsodualReductionofLattices.ps                  22-Dec-2014 09:39      2M
106-AgeneralizationofSecretSharingSchemeontheBa..> 22-Dec-2014 09:39    240K
107-KnapsackPublicKeyCryptosystemUsingChineseRe..> 22-Dec-2014 09:39    137K
108-AnImprovedDistinguisherforDragon.pdf           22-Dec-2014 09:39    181K
109-HowtoEnrichtheMessageSpaceofaCipher.pdf        22-Dec-2014 09:39    365K
110-ConstructionofPairingFriendlyEllipticCurves..> 22-Dec-2014 09:39    304K
111-PrivacyPreservingDistributedSetIntersection..> 22-Dec-2014 09:39    146K
111-PrivacyPreservingDistributedSetIntersection.ps 22-Dec-2014 09:39    292K
112-DecomposedAttackfortheJacobianofaHyperellip..> 22-Dec-2014 09:39    227K
113-AnEnhancedIDbasedDeniableAuthenticationProt..> 22-Dec-2014 09:39    166K
114-HighEfficiencyFeedbackShiftRegistersigmaLFS..> 22-Dec-2014 09:39    225K
115-QuadraticAlmostPerfectNonlinearFunctionsWit..> 22-Dec-2014 09:39    141K
116-AZeroKnowledgeIdentificationandKeyAgreement..> 22-Dec-2014 09:39    202K
117-Improvingthelowerboundonthehigherordernonli..> 22-Dec-2014 09:39    211K
118-SmoothProjectiveHashingandTwoMessageOblivio..> 22-Dec-2014 09:39    335K
119-RerandomizableRCCAEncryption.pdf               22-Dec-2014 09:39    335K
120-Breaking104bitWEPinlessthan60seconds.pdf       22-Dec-2014 09:39    264K
121-CertificatelessEncryptionSchemesStronglySec..> 22-Dec-2014 09:39    346K
121-CertificatelessEncryptionSchemesStronglySec..> 22-Dec-2014 09:39    624K
122-OntheSecurityofthreeVersionsoftheWAIProtoco..> 22-Dec-2014 09:39    183K
123-Obtainingasecureandefficientkeyagreementpro..> 22-Dec-2014 09:39    308K
124-RebuttalofovertakingVEST.pdf                   22-Dec-2014 09:38    508K
125-AttackingtheIPsecStandardsinEncryptiononlyC..> 22-Dec-2014 09:38    249K
126-AnInterestingMemberIDbasedGroupSignature.pdf   22-Dec-2014 09:38    228K
127-CCA2SecureThresholdBroadcastEncryptionwithS..> 22-Dec-2014 09:38    175K
127-CCA2SecureThresholdBroadcastEncryptionwithS..> 22-Dec-2014 09:38    346K
128-ComputationallySoundMechanizedProofsofCorre..> 22-Dec-2014 09:38    410K
128-ComputationallySoundMechanizedProofsofCorre..> 22-Dec-2014 09:38    723K
129-AnAlgebraicAnalysisofTriviumCiphersbasedont..> 22-Dec-2014 09:38    111K
129-AnAlgebraicAnalysisofTriviumCiphersbasedont..> 22-Dec-2014 09:38    261K
130-SomeResultsonAnonymityinHybridEncryption.pdf   22-Dec-2014 09:38    499K
131-NoninteractiveManualChannelMessageAuthentic..> 22-Dec-2014 09:38    223K
132-EquivocalBlindSignaturesandAdaptiveUCSecuri..> 22-Dec-2014 09:38    620K
133-NewCommunicationEfficientObliviousTransferP..> 22-Dec-2014 09:38    203K
134-EstimationofkeysstoredinCMOScryptographicde..> 22-Dec-2014 09:38     73K
135-EfficientIDbasedSignatureWithoutTrustedPKG.pdf 22-Dec-2014 09:38    230K
136-FairExchangeSignatureSchemes.pdf               20-Jan-2023 14:21     207
137-MultivariatesPolynomialsforHashing.pdf         22-Dec-2014 09:38    135K
138-EfficientPairingComputationonCurves.pdf        22-Dec-2014 09:38    139K
138-EfficientPairingComputationonCurves.ps         22-Dec-2014 09:38    301K
139-TheDeliveryandEvidencesLayer.pdf               22-Dec-2014 09:38    623K
140-HiddenIdentityBasedSignatures.pdf              22-Dec-2014 09:38    580K
141-PracticalCryptanalysisofSFLASH.pdf             22-Dec-2014 09:38    195K
142-AnEnhancedOneroundPairingbasedTripartiteAut..> 22-Dec-2014 09:38    185K
143-OfflineOnlineMixing.pdf                        22-Dec-2014 09:38    257K
144-TwoNewExamplesofTTM.pdf                        22-Dec-2014 09:38    171K
144-TwoNewExamplesofTTM.ps                         22-Dec-2014 09:38    154K
145-FindingCollisionsinInteractiveProtocolsATig..> 22-Dec-2014 09:38    464K
145-FindingCollisionsinInteractiveProtocolsATig..> 22-Dec-2014 09:38      1M
146-TimeCapsuleSignatureEfficientandProvablySec..> 22-Dec-2014 09:37    257K
147-Usingdecisionproblemsinpublickeycryptograph..> 22-Dec-2014 09:37    201K
148-PracticalCompactECash.pdf                      22-Dec-2014 09:37    272K
149-TowardsGeneratingSecureKeysforBraidCryptogr..> 22-Dec-2014 09:37    196K
149-TowardsGeneratingSecureKeysforBraidCryptogr..> 22-Dec-2014 09:37    392K
150-GeneratorsofJacobiansofHyperellipticCurves.pdf 22-Dec-2014 09:37    135K
150-GeneratorsofJacobiansofHyperellipticCurves.ps  22-Dec-2014 09:37    578K
151-DeterministicHistoryIndependentStrategiesfo..> 22-Dec-2014 09:37    281K
151-DeterministicHistoryIndependentStrategiesfo..> 22-Dec-2014 09:37    802K
152-CTC2andFastAlgebraicAttacksonBlockCiphersRe..> 22-Dec-2014 09:37    124K
152-CTC2andFastAlgebraicAttacksonBlockCiphersRe..> 22-Dec-2014 09:37    324K
153-CryptographicHardnessbasedontheDecodingofRe..> 22-Dec-2014 09:37    310K
153-CryptographicHardnessbasedontheDecodingofRe..> 22-Dec-2014 09:37    564K
154-EdoncalR256384512anEfficientImplementationo..> 22-Dec-2014 09:37    256K
155-EfficientNoninteractiveProofSystemsforBilin..> 22-Dec-2014 09:37    279K
155-EfficientNoninteractiveProofSystemsforBilin..> 22-Dec-2014 09:37    669K
156-ComputationalSemanticsforBasicProtocolLogic..> 22-Dec-2014 09:37    208K
157-ConSumv0AnExperimentalCipher.pdf               22-Dec-2014 09:37    292K
158-ASimpleSecurityAnalysisofHashCBCandaNewEffi..> 22-Dec-2014 09:37    212K
158-ASimpleSecurityAnalysisofHashCBCandaNewEffi..> 22-Dec-2014 09:37    977K
159-AttributeBasedGroupSignatures.pdf              22-Dec-2014 09:37    371K
160-AnalysisofCollusionAttackFreeIDBasedNonInte..> 22-Dec-2014 09:37    195K
160-AnalysisofCollusionAttackFreeIDBasedNonInte..> 22-Dec-2014 09:37    190K
161-CollusionResistantGroupKeyManagementUsingAt..> 22-Dec-2014 09:37    211K
162-BingoVotingSecureandcoercionfreevotingusing..> 22-Dec-2014 09:37    171K
162-BingoVotingSecureandcoercionfreevotingusing..> 22-Dec-2014 09:37    665K
163-SecureDeniableAuthenticatedKeyEstablishment..> 22-Dec-2014 09:37    140K
164-YetAnotherMicroArchitecturalAttackExploitin..> 22-Dec-2014 09:37    159K
165-InductiveProofMethodforComputationalSecrecy..> 22-Dec-2014 09:37    389K
166-EnhancingSecurityofaGroupKeyExchangeProtoco..> 22-Dec-2014 09:37    172K
166-EnhancingSecurityofaGroupKeyExchangeProtoco..> 22-Dec-2014 09:36    148K
167-PublicKeyBroadcastEncryptionwithLowNumberof..> 22-Dec-2014 09:36    217K
168-RandomOraclesandAuxiliaryInput.pdf             22-Dec-2014 09:36    366K
169-OntheSecurityofProtocolswithLogarithmicComm..> 22-Dec-2014 09:36    491K
170-CloneResistantMutualAuthenticationforLowCos..> 22-Dec-2014 09:36    192K
171-ChosenCiphertextSecureProxyReEncryption.pdf    22-Dec-2014 09:36    277K
172-BatchVerificationofShortSignatures.pdf         22-Dec-2014 09:36    280K
173-ProvableSecureGeneralizedSigncryption.pdf      22-Dec-2014 09:36    208K
174-CountinghyperellipticcurvesthatadmitaKoblit..> 22-Dec-2014 09:36    183K
174-CountinghyperellipticcurvesthatadmitaKoblit..> 22-Dec-2014 09:36    401K
175-EmbeddingDegreeofHyperellipticCurveswithCom..> 22-Dec-2014 09:36    339K
176-SevenPropertyPreservingIteratedHashingROX.pdf  22-Dec-2014 09:36    361K
176-SevenPropertyPreservingIteratedHashingROX.ps   22-Dec-2014 09:36    649K
177-SpaceEfficientIdentityBasedEncryptionWithou..> 22-Dec-2014 09:36    364K
178-UtilitySamplingforTrustMetricsinPKI.pdf        22-Dec-2014 09:36    148K
178-UtilitySamplingforTrustMetricsinPKI.ps         22-Dec-2014 09:36    334K
179-NewFastAlgorithmsforArithmeticonEllipticCur..> 22-Dec-2014 09:36    226K
180-ANovelSecureSessionKeyGenerationusingtwolev..> 22-Dec-2014 09:36    578K
181-ANewMethodforSpeedingUpArithmeticonElliptic..> 22-Dec-2014 09:36    126K
182-OptimisticFairExchangeinaMultiuserSetting.pdf  22-Dec-2014 09:36    284K
183-ProvablySecureCiphertextPolicyABE.pdf          22-Dec-2014 09:36    231K
184-Provablepasswordbasedtripartitekeyagreement..> 22-Dec-2014 09:36    210K
185-NewFORK256.pdf                                 22-Dec-2014 09:36    178K
186-FullyAnonymousGroupSignatureswithoutRandomO..> 22-Dec-2014 09:36    199K
186-FullyAnonymousGroupSignatureswithoutRandomO..> 22-Dec-2014 09:36    343K
187-ExecutingModularExponentiationonaGraphicsAc..> 22-Dec-2014 09:36    226K
188-AProofofRevisedYahalomProtocolintheBellarea..> 22-Dec-2014 09:36    261K
189-AnImprovedOneRoundIDBasedTripartiteAuthenti..> 22-Dec-2014 09:36    190K
189-AnImprovedOneRoundIDBasedTripartiteAuthenti..> 22-Dec-2014 09:36    375K
190-SomeGeneralResultsonChosenciphertextAnonymi..> 22-Dec-2014 09:35    495K
191-DeniableInternetKeyExchange.pdf                22-Dec-2014 09:35    277K
192-OptimalIrreduciblePolynomialsforGF2mArithme..> 22-Dec-2014 09:35    185K
193-SomeIdentityBasedStrongBiDesignatedVerifier..> 22-Dec-2014 09:35    133K
194-EnhancedPrivacyIDADirectAnonymousAttestatio..> 22-Dec-2014 09:35    302K
195-VerifyingStatisticalZeroKnowledgewithApprox..> 22-Dec-2014 09:35    334K
196-AnEfficientCertificatelessSignatureScheme.pdf  20-Jan-2023 14:21     207
197-OnLineCiphersandtheHashCBCConstructions.pdf    22-Dec-2014 09:35    344K
197-OnLineCiphersandtheHashCBCConstructions.ps     22-Dec-2014 09:35    662K
198-MutualInformationAnalysisAUniversalDifferen..> 22-Dec-2014 09:35      3M
198-MutualInformationAnalysisAUniversalDifferen..> 22-Dec-2014 09:35      5M
199-AFrameworkforGameBasedSecurityProofs.pdf       22-Dec-2014 09:35    226K
200-ProSiBIRProactiveSignerBaseIntrusionResilie..> 22-Dec-2014 09:35    193K
201-TheBBGHIBEHasLimitedDelegation.pdf             22-Dec-2014 09:35    175K
202-ProvableDataPossessionatUntrustedStores.pdf    22-Dec-2014 09:35    482K
203-KipnisShamir39sAttackonHFERevisited.pdf        20-Jan-2023 08:38    210K
203-KipnisShamirsAttackonHFERevisited.pdf          22-Dec-2014 09:35    210K
204-DragonMACSecuringWirelessSensorNetworkswith..> 22-Dec-2014 09:35    120K
205-Akilobitspecialnumberfieldsievefactorizatio..> 22-Dec-2014 09:35    121K
205-Akilobitspecialnumberfieldsievefactorizatio..> 22-Dec-2014 09:35    226K
206-AutomaticSearchofDifferentialPathinMD4.pdf     22-Dec-2014 09:35    278K
206-AutomaticSearchofDifferentialPathinMD4.ps      22-Dec-2014 09:35    952K
207-OnanImprovedCorrelationAnalysisofStreamCiph..> 22-Dec-2014 09:35    268K
208-RC4StateInformationatAnyStageRevealstheSecr..> 22-Dec-2014 09:35    302K
209-BilateralUnknownKeyShareAttacksinKeyAgreeme..> 22-Dec-2014 09:35    219K
210-EfficientchosenciphertextsecurePKEschemewit..> 20-Jan-2023 14:21     207
211-ScalableStorageSchemefromForwardKeyRotation..> 22-Dec-2014 09:35    192K
212-Theconstructingof3resilientBooleanfunctions..> 22-Dec-2014 09:34    162K
213-UnlinkableRandomizableSignatureandItsApplic..> 22-Dec-2014 09:34    334K
214-MatrixPowerSBoxConstruction.pdf                22-Dec-2014 09:34    132K
215-ExtendingObliviousTransfersEfficientlyHowto..> 22-Dec-2014 09:34    206K
215-ExtendingObliviousTransfersEfficientlyHowto..> 22-Dec-2014 09:34    656K
216-UnlinkableDivisibleDigitalCashwithoutTruste..> 22-Dec-2014 09:34    184K
216-UnlinkableDivisibleDigitalCashwithoutTruste..> 22-Dec-2014 09:34    391K
217-IdentityBasedBroadcastEncryption.pdf           22-Dec-2014 09:34    163K
217-IdentityBasedBroadcastEncryption.ps            22-Dec-2014 09:34    344K
218-DifferentialCryptanalysisinStreamCiphers.pdf   22-Dec-2014 09:34    233K
219-ANewProvablySecureAuthenticationandKeyAgree..> 22-Dec-2014 09:34    131K
220-ANewProvablySecureAuthenticationandKeyAgree..> 22-Dec-2014 09:34    184K
221-GeneralizedKeyDelegationforHierarchicalIden..> 22-Dec-2014 09:34    269K
221-GeneralizedKeyDelegationforHierarchicalIden..> 22-Dec-2014 09:34    517K
222-TowardsSecurityLimitsinSideChannelAttacks.pdf  22-Dec-2014 09:34    348K
222-TowardsSecurityLimitsinSideChannelAttacks.ps   22-Dec-2014 09:34      1M
223-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 09:34    241K
223-OntheImpossibilityofHighlyEfficientBlockcip..> 22-Dec-2014 09:34    498K
224-ANovelMutualAuthenticationSchemeBasedonQuad..> 22-Dec-2014 09:34    167K
225-OntheForgeabilityofWangTangLi39sIDBasedRest..> 20-Jan-2023 08:38    122K
225-OntheForgeabilityofWangTangLisIDBasedRestri..> 22-Dec-2014 09:34    122K
226-Generalizedmixfunctionsandorthogonalequitab..> 22-Dec-2014 09:34    298K
227-RelatedKeyStatisticalCryptanalysis.pdf         22-Dec-2014 09:34    404K
228-ANOPTIMIZEDHARDWAREARCHITECTUREOFMONTGOMERY..> 22-Dec-2014 09:34    246K
228-ANOPTIMIZEDHARDWAREARCHITECTUREOFMONTGOMERY..> 22-Dec-2014 09:34    814K
229-DomainExtensionofPublicRandomFunctionsBeyon..> 22-Dec-2014 09:34    451K
229-DomainExtensionofPublicRandomFunctionsBeyon..> 22-Dec-2014 09:34    625K
230-NewWeaknessesintheKeystreamGenerationAlgori..> 22-Dec-2014 09:33    177K
230-NewWeaknessesintheKeystreamGenerationAlgori..> 22-Dec-2014 09:33    424K
231-SecureTwoPartykMeansClustering.pdf             22-Dec-2014 09:33    273K
231-SecureTwoPartykMeansClustering.ps              22-Dec-2014 09:33    484K
232-Anewparadigmofchosenciphertextsecurepublick..> 20-Jan-2023 14:21     207
233-OnSimulatabilitySoundnessandMappingSoundnes..> 22-Dec-2014 09:33    265K
234-ProvableSecurityAnalysisofAuthenticatedEncr..> 22-Dec-2014 09:33    189K
235-BlindIdentityBasedEncryptionandSimulatableO..> 22-Dec-2014 09:33    334K
236-CertificatelessRingSignatures.pdf              22-Dec-2014 09:33    182K
236-CertificatelessRingSignatures.ps               22-Dec-2014 09:33    376K
237-ForwardsecureKeyEvolutioninWirelessSensorNe..> 22-Dec-2014 09:33    216K
238-Longliveddigitalintegrityusingshortlivedhas..> 22-Dec-2014 09:33     83K
239-MakingLargeHashFunctionsFromSmallCompressio..> 22-Dec-2014 09:33    150K
239-MakingLargeHashFunctionsFromSmallCompressio..> 22-Dec-2014 09:33    318K
240-AFourComponentFrameworkforDesigningandAnaly..> 22-Dec-2014 09:33    159K
241-AttributeBasedGroupSignaturewithRevocation.pdf 22-Dec-2014 09:33    332K
242-TimeMemoryDataTradeoffAttackonStreamCiphers..> 22-Dec-2014 09:33    227K
243-PORsProofsofRetrievabilityforLargeFiles.pdf    20-Jan-2023 14:21     207
244-ANoteontheRelayAttacksonepassportsTheCaseof..> 22-Dec-2014 09:33    124K
245-IncorporatingTemporalCapabilitiesinExisting..> 22-Dec-2014 09:33    238K
245-IncorporatingTemporalCapabilitiesinExisting..> 22-Dec-2014 09:33    433K
246-BEDAButtonEnabledDevicePairing.pdf             22-Dec-2014 09:33    249K
247-ANoteontheAtePairing.pdf                       22-Dec-2014 09:33    137K
247-ANoteontheAtePairing.ps                        22-Dec-2014 09:33    319K
248-1AESseemsweak2Lineartimesecurecryptography.pdf 22-Dec-2014 09:33    370K
248-1AESseemsweak2Lineartimesecurecryptography.ps  22-Dec-2014 09:33    619K
249-RandomnessExtractionviaDeltaBiasedMaskingin..> 22-Dec-2014 09:33    232K
250-EfficientandProvablySecureCertificatelessSh..> 22-Dec-2014 09:33    196K
251-ACryptographicModelforBranchingTimeSecurity..> 22-Dec-2014 09:33    279K
251-ACryptographicModelforBranchingTimeSecurity..> 22-Dec-2014 09:33    429K
252-AVerifiableVotingProtocolbasedonFarnel.pdf     22-Dec-2014 09:33    250K
253-ChoosingthecorrectellipticcurveintheCMmetho..> 22-Dec-2014 09:33    309K
254-FullySecureProxyReEncryptionwithoutRandomOr..> 20-Jan-2023 14:21     207
255-EfficientIdentityBasedSignatureinStandardMo..> 20-Jan-2023 14:21     207
256-AspectsofPairingInversion.pdf                  22-Dec-2014 09:32    265K
257-AForwardSecureSignaturewithBackwardSecureDe..> 22-Dec-2014 09:32    142K
258-UICEAHighPerformanceCryptographicModuleforS..> 22-Dec-2014 09:32    241K
259-AlgebraicImmunityHierarchyofBooleanFunction..> 22-Dec-2014 09:32    136K
260-AnEfficientOnemoveNominativeSignatureScheme..> 22-Dec-2014 09:32    229K
261-NewFormofPermutationBiasandSecretKeyLeakage..> 22-Dec-2014 09:32    233K
262-CertificatelessPublicKeyEncryptionSecureaga..> 22-Dec-2014 09:32    203K
262-CertificatelessPublicKeyEncryptionSecureaga..> 22-Dec-2014 09:32    403K
263-EfficiencyImprovementforNTRU.pdf               20-Jan-2023 08:38    346K
264-ThePowerofProofsofPossessionSecuringMultipa..> 22-Dec-2014 09:32    373K
265-WhichLanguagesHave4RoundZeroKnowledgeProofs..> 22-Dec-2014 09:32    178K
266-FillingtheGapbetweenVotersandCryptographyin..> 22-Dec-2014 09:32    137K
267-CRUSTCryptographicRemoteUntrustedStoragewit..> 22-Dec-2014 09:32    585K
268-AffinePrecomputationwithSoleInversioninElli..> 22-Dec-2014 09:32    187K
269-VotingwithUnconditionalPrivacybyMergingPrtV..> 22-Dec-2014 09:32    292K
270-SecretBallotElectionswithUnconditionalInteg..> 22-Dec-2014 09:32    341K
271-HashFunctionsintheDedicatedKeySettingDesign..> 22-Dec-2014 09:32    351K
272-CryptanalysisofaHashFunctionProposedatICISC..> 22-Dec-2014 09:32    122K
272-CryptanalysisofaHashFunctionProposedatICISC..> 22-Dec-2014 09:32    282K
273-TwoTierSignaturesStronglyUnforgeableSignatu..> 22-Dec-2014 09:32    280K
274-GroupbasedProxyReencryptionscheme.pdf          22-Dec-2014 09:32    134K
275-Good39PseudoRandomBinarySequencesfromEllipt..> 20-Jan-2023 08:38    152K
275-GoodPseudoRandomBinarySequencesfromElliptic..> 22-Dec-2014 09:32    152K
276-ProlificCodeswiththeIdentifiableParentPrope..> 22-Dec-2014 09:32    285K
277-Cryptanalysisofaclassofcryptographichashfun..> 22-Dec-2014 09:32    327K
277-Cryptanalysisofaclassofcryptographichashfun..> 22-Dec-2014 09:32    696K
278-AFrameworkforIterativeHashFunctionsHAIFA.pdf   22-Dec-2014 09:32    223K
279-LossyTrapdoorFunctionsandTheirApplications.pdf 22-Dec-2014 09:32    434K
280-Onsolvingsparsealgebraicequationsoverfinite..> 22-Dec-2014 09:32    210K
281-APollardlikepseudorandomnumbergeneratorover..> 22-Dec-2014 09:32     39K
282-Analysisofcountermeasuresagainstaccessdrive..> 22-Dec-2014 09:32    223K
283-ProvablySecureFrameworkforInformationAggreg..> 22-Dec-2014 09:32    623K
284-Notitle.pdf                                    20-Jan-2023 14:21     207
285-SolvingMRHSlinearequations.pdf                 22-Dec-2014 09:31    189K
286-Fasteradditionanddoublingonellipticcurves.pdf  22-Dec-2014 09:31    286K
287-TheEffectivenessofReceiptBasedAttacksonThre..> 22-Dec-2014 09:31    289K
288-SecureHybridEncryptionfromWeakenedKeyEncaps..> 22-Dec-2014 09:31    479K
288-SecureHybridEncryptionfromWeakenedKeyEncaps..> 22-Dec-2014 09:31    816K
289-ZeroKnowledgeintheAppliedPicalculusandAutom..> 22-Dec-2014 09:31    548K
290-ConstructionofRotationSymmetricBooleanFunct..> 22-Dec-2014 09:31    237K
291-RelationsAmongNotionsofPlaintextAwareness.pdf  22-Dec-2014 09:31    220K
292-ImprovedsecurityanalysisofOMAC.pdf             22-Dec-2014 09:31    212K
293-FullyResilientTraitorTracingSchemeusingKeyU..> 22-Dec-2014 09:31    216K
294-ImprovedPrivacyoftheTreeBasedHashprotocolsu..> 22-Dec-2014 09:31    165K
295-LinearizationAttacksAgainstSyndromeBasedHas..> 22-Dec-2014 09:31     80K
295-LinearizationAttacksAgainstSyndromeBasedHas..> 22-Dec-2014 09:31    147K
296-ConstructionofEfficientandSecurePairingAlgo..> 22-Dec-2014 09:31    234K
297-Secretsharingoninfinitegraphs.pdf              22-Dec-2014 09:31    205K
298-TheSecurityoftheExtendedCodebookXCBModeofOp..> 22-Dec-2014 09:31    232K
299-OptimizingMultiprecisionMultiplicationforPu..> 22-Dec-2014 09:31    150K
300-ANoteonAutomatabasedDynamicConvolutionalCry..> 22-Dec-2014 09:31    113K
300-ANoteonAutomatabasedDynamicConvolutionalCry..> 22-Dec-2014 09:31    270K
301-OnAsymptoticBehavioroftheRatioBetweentheNum..> 22-Dec-2014 09:31    180K
302-CompressionFunctionsSuitablefortheMultiProp..> 22-Dec-2014 09:31    110K
303-AForwardSecureRemoteUserAuthenticationSchem..> 22-Dec-2014 09:31    127K
304-ABoundontheSizeofSeparatingHashFamilies.pdf    22-Dec-2014 09:31    189K
305-OnNonRandomnessofthePermutationafterRC4KeyS..> 22-Dec-2014 09:31    177K
306-NovelApproachesforImprovingthePowerConsumpt..> 22-Dec-2014 09:31    347K
307-LocallyInvertibleBooleanMappings.pdf           22-Dec-2014 09:31    107K
307-LocallyInvertibleBooleanMappings.ps            22-Dec-2014 09:31    268K
308-GeneralizedRotationSymmetricandDihedralSymm..> 22-Dec-2014 09:31     60K
309-BalancedBooleanFunctionon13variableshavingN..> 22-Dec-2014 09:31     99K
310-ANoteonPointMultiplicationonSupersingularEl..> 22-Dec-2014 09:31     96K
311-ARefinedAlgorithmfortheeta_TPairingCalculat..> 22-Dec-2014 09:31    135K
312-SecureSimilaritySearch.pdf                     22-Dec-2014 09:31    463K
313-PerfectForwardSecureIdentityBasedAuthentica..> 22-Dec-2014 09:30    223K
313-PerfectForwardSecureIdentityBasedAuthentica..> 22-Dec-2014 09:30    451K
314-FormalCertificationofCodeBasedCryptographic..> 20-Jan-2023 14:21     207
315-SecurityunderKeyDependentInputs.pdf            22-Dec-2014 09:30    298K
316-SECURITYPROOFFORSHENGBAOWANGSIDENTITYBASEDE..> 22-Dec-2014 09:30    131K
317-ImprovingUpontheTETModeofOperation.pdf         22-Dec-2014 09:30    230K
318-OnthecomplexityofsidechannelattacksonAES256..> 22-Dec-2014 09:30    280K
319-ANewSecurityDefinitionforPublicKeyEncryptio..> 22-Dec-2014 09:30    203K
320-OntheBigGapBetweenpandqinDSA.pdf               22-Dec-2014 09:30    151K
321-BalancedBooleanFunctionswithNonlinearity2n1..> 22-Dec-2014 09:30     47K
321-BalancedBooleanFunctionswithNonlinearitygt2..> 20-Jan-2023 08:38     47K
322-IdentifyingIdealLattices.pdf                   22-Dec-2014 09:30    143K
322-IdentifyingIdealLattices.ps                    22-Dec-2014 09:30    305K
323-AttributeBasedEncryptionwithNonMonotonicAcc..> 22-Dec-2014 09:30    227K
324-Towardsprovablesecurityforroutediscoverypro..> 22-Dec-2014 09:30    149K
325-FasterandShorterPasswordAuthenticatedKeyExc..> 22-Dec-2014 09:30    291K
325-FasterandShorterPasswordAuthenticatedKeyExc..> 22-Dec-2014 09:30    508K
326-EfficientPasswordbasedAuthenticatedKeyExcha..> 22-Dec-2014 09:30    275K
327-SecureIdentificationandQKDintheBoundedQuant..> 22-Dec-2014 09:30    310K
328-ATightHighOrderEntropicQuantumUncertaintyRe..> 22-Dec-2014 09:30    361K
329-ATunableBroadcastEncryptionScheme.pdf          22-Dec-2014 09:30    220K
330-RemotePowerAnalysisofRFIDTags.pdf              22-Dec-2014 09:30      2M
330-RemotePowerAnalysisofRFIDTags.ps               22-Dec-2014 09:30     18M
331-IsolatedProofsofKnowledgeandIsolatedZeroKno..> 22-Dec-2014 09:29    371K
331-IsolatedProofsofKnowledgeandIsolatedZeroKno..> 22-Dec-2014 09:29    601K
332-UniversallyComposableMultipartyComputationw..> 22-Dec-2014 09:29    260K
332-UniversallyComposableMultipartyComputationw..> 22-Dec-2014 09:29    482K
333-TowardsKeyDependentMessageSecurityintheStan..> 22-Dec-2014 09:29    249K
333-TowardsKeyDependentMessageSecurityintheStan..> 22-Dec-2014 09:29    478K
334-NewConstructionsforUCSecureComputationusing..> 22-Dec-2014 09:29    278K
335-EncryptionTechniquesforSecureDatabaseOutsou..> 22-Dec-2014 09:29    237K
336-AMajorVulnerabilityinRSAImplementationsduet..> 22-Dec-2014 09:29    269K
337-MobilePhonesasSecureGatewaysforMessageBased..> 22-Dec-2014 09:29      5M
338-VHASHSecurity.pdf                              22-Dec-2014 09:29    134K
338-VHASHSecurity.ps                               22-Dec-2014 09:29    333K
339-Onthesecurityofaclassofimageencryptionschem..> 22-Dec-2014 09:29      3M
340-EfficientImplementationofthePairingonMobile..> 22-Dec-2014 09:29    353K
341-MultiPartyIndirectIndexingandApplications.pdf  22-Dec-2014 09:29    201K
342-ANewSecurityModelforCrossRealmC2CPAKEProtoc..> 22-Dec-2014 09:29    134K
343-Updatedstandardsforvalidatingellipticcurves..> 22-Dec-2014 09:29     72K
343-Updatedstandardsforvalidatingellipticcurves.ps 22-Dec-2014 09:29    191K
344-SecurityAnalysisofWAPIAuthenticationandKeyE..> 22-Dec-2014 09:29    179K
345-AnalysisofUnderlyingAssumptionsinNISTDRBGs.pdf 22-Dec-2014 09:29    181K
346-Securemultipartycomputationonincompletenetw..> 20-Jan-2023 14:21     207
347-LaiMasseySchemeandQuasiFeistelNetworks.pdf     22-Dec-2014 09:29    247K
348-AFrameworkforEfficientandComposableObliviou..> 22-Dec-2014 09:28    372K
349-StatisticallyHidingSets.pdf                    22-Dec-2014 09:28    265K
349-StatisticallyHidingSets.ps                     22-Dec-2014 09:28    466K
350-OnTweakingLubyRackoffBlockciphers.pdf          22-Dec-2014 09:28    277K
350-OnTweakingLubyRackoffBlockciphers.ps           22-Dec-2014 09:28   1023K
351-ALinearLowerBoundontheCommunicationComplexi..> 22-Dec-2014 09:28    230K
351-ALinearLowerBoundontheCommunicationComplexi..> 22-Dec-2014 09:28    720K
352-NewLocalCollisionsfortheSHA2HashFamily.pdf     22-Dec-2014 09:28    252K
352-NewLocalCollisionsfortheSHA2HashFamily.ps      22-Dec-2014 09:28    877K
353-MultipartyComputationtoGenerateSecretPermut..> 22-Dec-2014 09:28    207K
353-MultipartyComputationtoGenerateSecretPermut..> 22-Dec-2014 09:28    368K
354-IdentityCommittableSignaturesandTheirExtens..> 22-Dec-2014 09:28    249K
355-Secretsharingontheinfiniteladder.pdf           22-Dec-2014 09:28    118K
356-ABlockCipherbasedPRNGSecureAgainstSideChann..> 22-Dec-2014 09:28    305K
356-ABlockCipherbasedPRNGSecureAgainstSideChann..> 22-Dec-2014 09:28      1M
357-ANoteonSignatureStandards.pdf                  22-Dec-2014 09:28     88K
358-ImprovingtheRoundComplexityofVSSinPointtoPo..> 22-Dec-2014 09:28    194K
359-IntrusionResilientSecretSharing.pdf            22-Dec-2014 09:28    282K
360-SufficientConditionsforIntractabilityoverBl..> 22-Dec-2014 09:28    405K
361-ProxyReencryptionSystemsforIdentitybasedEnc..> 22-Dec-2014 09:28    286K
362-StatisticalTestingforDiskEncryptionModesofO..> 22-Dec-2014 09:28    145K
363-FuzzyPrivateMatchingExtendedAbstract.pdf       22-Dec-2014 09:28    187K
364-AProofofSecurityofaMeshSecurityArchitecture..> 22-Dec-2014 09:28    426K
365-PairingsonJacobiansofHyperellipticCurves.pdf   22-Dec-2014 09:28    261K
365-PairingsonJacobiansofHyperellipticCurves.ps    22-Dec-2014 09:28    462K
366-BreakingtheSymmetryaWaytoResisttheNewDiffer..> 22-Dec-2014 09:28    196K
367-CryptanalysisofRationalMultivariatePublicKe..> 22-Dec-2014 09:28    170K
368-ReducingTrustinthePKGinIdentityBasedCryptos..> 22-Dec-2014 09:28    232K
369-UniversallyComposableMultiPartyComputationw..> 22-Dec-2014 09:28    192K
370-FURTHERPROPERTIESOFSEVERALCLASSESOFBOOLEANF..> 22-Dec-2014 09:27    321K
371-Grouporientedencryptionsecureagainstcollude..> 22-Dec-2014 09:27    151K
372-OntheAuthenticationofOnePopularSigncryption..> 22-Dec-2014 09:27    114K
373-AMeetintheMiddleCollisionAttackAgainsttheNe..> 22-Dec-2014 09:27     69K
373-AMeetintheMiddleCollisionAttackAgainsttheNe..> 22-Dec-2014 09:27    150K
374-OnFactoringArbitraryIntegerswithKnownBits.pdf  22-Dec-2014 09:27     83K
374-OnFactoringArbitraryIntegerswithKnownBits.ps   22-Dec-2014 09:27    155K
375-FurtherMusingsontheWangetalMD5CollisionImpr..> 22-Dec-2014 09:27    435K
376-AnEfficientRangeBoundedCommitmentScheme.pdf    22-Dec-2014 09:27    125K
377-FastPointMultiplicationonEllipticCurvesofEv..> 20-Jan-2023 08:38    127K
378-AlgebraicStructureDefectoscopy.pdf             22-Dec-2014 09:27    256K
379-OnTheInequivalenceOfNessHellesethAPNFunctio..> 22-Dec-2014 09:27    183K
380-XFCSRanewsoftwareorientedstreamcipherbasedu..> 22-Dec-2014 09:27    174K
380-XFCSRanewsoftwareorientedstreamcipherbasedu..> 22-Dec-2014 09:27    349K
381-CryptanalysisofTwoNewInstancesofTTMCryptosy..> 22-Dec-2014 09:27    178K
382-ObliviousTransferviaMcEliece39sPKCandPermut..> 20-Jan-2023 08:38    195K
382-ObliviousTransferviaMcEliecesPKCandPermuted..> 22-Dec-2014 09:27    195K
383-CryptanalysisonImprovedChouetal39sIDBasedDe..> 20-Jan-2023 08:38    128K
383-CryptanalysisonImprovedChouetalsIDBasedDeni..> 22-Dec-2014 09:27    128K
384-NonInteractiveAnonymousCredentials.pdf         22-Dec-2014 09:27      2M
384-NonInteractiveAnonymousCredentials.ps          22-Dec-2014 09:27      2M
385-OntheinsecurityofinterchangeduseofOFBandCBC..> 22-Dec-2014 09:27    304K
386-ConvertibleUndeniableSignatureswithoutRando..> 22-Dec-2014 09:27    185K
386-ConvertibleUndeniableSignatureswithoutRando..> 22-Dec-2014 09:27    376K
387-AnalysisofLocalOptimainBlockCiphers.pdf        20-Jan-2023 14:21     207
388-OnCiphertextUndetectability.pdf                22-Dec-2014 09:27    195K
388-OnCiphertextUndetectability.ps                 22-Dec-2014 09:27    386K
389-InteractiveandNoninteractiveZeroKnowledgeCo..> 22-Dec-2014 09:27    284K
390-ImplementingCryptographicPairingsoverBarret..> 22-Dec-2014 09:27    190K
391-Anovelpublickeycryptosystembasedonsemimodul..> 22-Dec-2014 09:27     93K
392-EfficientComputationallyPrivateInformationR..> 22-Dec-2014 09:27    247K
393-OverlapfreeKaratsubaOfmanPolynomialMultipli..> 22-Dec-2014 09:26    144K
394-AlmosteverywhereSecureComputation.pdf          22-Dec-2014 09:26    160K
394-AlmosteverywhereSecureComputation.ps           22-Dec-2014 09:26    201K
395-SecondPreimageAttacksonDitheredHashFunction..> 22-Dec-2014 09:26    262K
395-SecondPreimageAttacksonDitheredHashFunction..> 22-Dec-2014 09:26    842K
396-ProxyReSignatureSchemeswithoutRandomOracles..> 22-Dec-2014 09:26    259K
397-Onthesecuritydefectsofanimageencryptionsche..> 22-Dec-2014 09:26      3M
398-AShortSignatureSchemeintheStandardModel.pdf    20-Jan-2023 14:21     207
399-CeremonyDesignandAnalysis.pdf                  22-Dec-2014 09:26    292K
400-REMARKSONIBESCHEMEOFWANGANDCAO.pdf             22-Dec-2014 09:26    102K
401-AnotherLookatAutomatedTheoremProving.pdf       22-Dec-2014 09:26    253K
402-RobustAnonymousRFIDAuthenticationwithConsta..> 22-Dec-2014 09:26    183K
403-TurboSHA2.pdf                                  22-Dec-2014 09:26    501K
404-PredicateEncryptionSupportingDisjunctionsPo..> 22-Dec-2014 09:26    300K
405-SecurePRNGsfromSpecializedPolynomialMapsove..> 22-Dec-2014 09:26    417K
406-ModelingComputationalSecurityinLongLivedSys..> 22-Dec-2014 09:26    318K
406-ModelingComputationalSecurityinLongLivedSys..> 22-Dec-2014 09:26    491K
407-ProvablySecureGroupingproofsforRFIDtags.pdf    20-Jan-2023 14:21     207
408-DifferentialCryptanalysisofPRESENT.pdf         22-Dec-2014 09:26    152K
409-BuildingaCollisionResistantCompressionFunct..> 22-Dec-2014 09:26    256K
410-InvertedEdwardscoordinates.pdf                 22-Dec-2014 09:26    109K
411-CryptanalysisonImprovedOneroundLinLi39sTrip..> 20-Jan-2023 08:38    214K
411-CryptanalysisonImprovedOneroundLinLisTripar..> 22-Dec-2014 09:26    214K
412-ProposingaMasterOneWayFunction.pdf             22-Dec-2014 09:26    159K
413-BreakingONEFIVIUMbyAIDAanAlgebraicIVDiffere..> 22-Dec-2014 09:26    118K
414-Optimizingdoublebaseellipticcurvesinglescal..> 22-Dec-2014 09:26    395K
415-CryptanalyticFlawsinOhetal39sIDBasedAuthent..> 20-Jan-2023 08:38    113K
415-CryptanalyticFlawsinOhetalsIDBasedAuthentic..> 22-Dec-2014 09:26    113K
416-CompressionFunctionDesignPrinciplesSupporti..> 22-Dec-2014 09:26    176K
416-CompressionFunctionDesignPrinciplesSupporti..> 22-Dec-2014 09:26    369K
417-AlgorithmsandArithmeticOperatorsforComputin..> 22-Dec-2014 09:26    337K
418-AnImprovedRemoteUserAuthenticationSchemewit..> 20-Jan-2023 14:21     207
419-CryptanalysisoftheRandomNumberGeneratorofth..> 22-Dec-2014 09:26    289K
420-ACriticalAnalysisandImprovementofAACSDriveH..> 22-Dec-2014 09:25    155K
421-TheroleofhelpinClassicalandQuantumZeroKnowl..> 22-Dec-2014 09:25    308K
421-TheroleofhelpinClassicalandQuantumZeroKnowl..> 22-Dec-2014 09:25    662K
422-StructuralIdentityBasedEncryption.pdf          22-Dec-2014 09:25    247K
423-FindingLowWeightPolynomialMultiplesUsingLat..> 22-Dec-2014 09:25    144K
424-WhenethRootsBecomeEasierThanFactoring.pdf      22-Dec-2014 09:25    226K
424-WhenethRootsBecomeEasierThanFactoring.ps       22-Dec-2014 09:25    444K
425-Onprimeorderellipticcurveswithembeddingdegr..> 22-Dec-2014 09:25    202K
425-Onprimeorderellipticcurveswithembeddingdegr..> 22-Dec-2014 09:25    404K
426-ImplementingCryptographicPairingsoverCurves..> 22-Dec-2014 09:25    178K
427-IdempotentsintheNeighbourhoodofPattersonWie..> 22-Dec-2014 09:25    249K
428-IsogeniesandtheDiscreteLogarithmProblemonJa..> 22-Dec-2014 09:25    224K
429-Oncompressiblepairingsandtheircomputation.pdf  22-Dec-2014 09:25    206K
429-Oncompressiblepairingsandtheircomputation.ps   22-Dec-2014 09:25    430K
430-CryptanalysisofLASH.pdf                        22-Dec-2014 09:25    275K
431-NotionsofEfficiencyinSimulationParadigm.pdf    22-Dec-2014 09:25    279K
431-NotionsofEfficiencyinSimulationParadigm.ps     22-Dec-2014 09:25    771K
432-TrapdoorsforHardLatticesandNewCryptographic..> 22-Dec-2014 09:25    482K
433-AnAlmostConstantEffortSolutionVerificationP..> 22-Dec-2014 09:25    268K
434-ComputingtheAtePairingonEllipticCurveswithE..> 22-Dec-2014 09:25    180K
434-ComputingtheAtePairingonEllipticCurveswithE..> 22-Dec-2014 09:25    379K
435-IrreducibilitytotheOneMoreEvaluationProblem..> 22-Dec-2014 09:25    238K
435-IrreducibilitytotheOneMoreEvaluationProblem..> 22-Dec-2014 09:25    438K
436-NewAttacksontheStreamCipherTPy6andDesignofN..> 22-Dec-2014 09:25    176K
436-NewAttacksontheStreamCipherTPy6andDesignofN..> 22-Dec-2014 09:25    428K
437-ReconfigurableHardwareImplementationsofTwea..> 22-Dec-2014 09:25    451K
438-OrderedMultisignaturesandIdentityBasedSeque..> 22-Dec-2014 09:25    534K
439-MultipartyKeyAgreementUsingBilinearMap.pdf     22-Dec-2014 09:25    336K
440-AnImprovedRemoteUserAuthenticationSchemeusi..> 22-Dec-2014 09:25     64K
441-FasterGroupOperationsonEllipticCurves.pdf      22-Dec-2014 09:25    187K
441-FasterGroupOperationsonEllipticCurves.ps       22-Dec-2014 09:25    544K
442-AnotherLookatNonStandardDiscreteLogandDiffi..> 22-Dec-2014 09:24    176K
443-TemplateAttackswithaPowerModel.pdf             22-Dec-2014 09:24    627K
444-Tightboundsbetweenalgebraicimmunityandnonli..> 22-Dec-2014 09:24    199K
445-Proposalofanewefficientpublickeysystemforen..> 22-Dec-2014 09:24    191K
446-ALatticeBasedComputationallyEfficientPrivat..> 22-Dec-2014 09:24    655K
447-Weakadaptivechosenciphertextsecurehybridenc..> 22-Dec-2014 09:24    158K
448-GeneralizedCorrelationandHigherOrderNonline..> 22-Dec-2014 09:24    218K
449-GenericAttacksonUnbalancedFeistelSchemeswit..> 22-Dec-2014 09:24    415K
450-ShortGroupSignaturewithoutRandomOracles.pdf    22-Dec-2014 09:24    167K
451-PreciseConcurrentZeroKnowledge.pdf             22-Dec-2014 09:24    283K
452-ConstructingBrezingWengpairingfriendlyellip..> 22-Dec-2014 09:24    182K
453-OntheRelationsBetweenNonInteractiveKeyDistr..> 22-Dec-2014 09:24    278K
454-EfficientCertificatelessSignaturesSuitablef..> 22-Dec-2014 09:24    269K
455-Analysisandoptimizationofellipticcurvesingl..> 22-Dec-2014 09:24    341K
456-PreciseZeroKnowledgeinConcurrentSetting.pdf    20-Jan-2023 14:21     207
457-ComparingImplementationEfficiencyofOrdinary..> 22-Dec-2014 09:24    166K
458-SavingPrivateRandomnessinOneWayFunctionsand..> 22-Dec-2014 09:24    247K
458-SavingPrivateRandomnessinOneWayFunctionsand..> 22-Dec-2014 09:24    539K
459-PracticalAnonymousDivisibleECashFromBounded..> 22-Dec-2014 09:24    335K
460-GuaranteesforCustomersofIncentiveAnonymizin..> 22-Dec-2014 09:24    127K
460-GuaranteesforCustomersofIncentiveAnonymizin..> 22-Dec-2014 09:24    262K
461-VerifiableAttributebasedEncryption.pdf         22-Dec-2014 09:24    164K
462-ConstructionofUniversalDesignatedVerifierSi..> 22-Dec-2014 09:24    503K
463-EfficientGF3mMultiplicationAlgorithmforetaT..> 22-Dec-2014 09:24    268K
464-SecureComputationWithoutAuthentication.pdf     22-Dec-2014 09:24    347K
465-ASyntheticIndifferentiabilityAnalysisofSome..> 22-Dec-2014 09:24    206K
466-ImprovedImpossibleDifferentialCryptanalysis..> 22-Dec-2014 09:24    229K
467-InteractiveandNoninteractiveZeroKnowledgear..> 22-Dec-2014 09:24    395K
467-InteractiveandNoninteractiveZeroKnowledgear..> 22-Dec-2014 09:24    639K
468-OnthehashfunctionofODHassumption.pdf           20-Jan-2023 14:21     207
469-IDBasedGroupPasswordAuthenticatedKeyExchang..> 22-Dec-2014 09:23    269K
470-FasterMultiExponentiationthroughCachingAcce..> 22-Dec-2014 09:23    254K
471-AttacksontheWEPprotocol.pdf                    22-Dec-2014 09:23      1M
472-NewFeaturesofLatinDancesAnalysisofSalsaChaC..> 22-Dec-2014 09:23    235K
472-NewFeaturesofLatinDancesAnalysisofSalsaChaC..> 22-Dec-2014 09:23    462K
473-AuthenticatedKeyExchangeandKeyEncapsulation..> 22-Dec-2014 09:23    258K
474-NotesontheWangetal263SHA1DifferentialPath.pdf  22-Dec-2014 09:23    262K
475-ObtainingUniversallyComposableSecurityTowar..> 22-Dec-2014 09:23    294K
476-DynamicSHA.pdf                                 22-Dec-2014 09:23    297K
477-AlgebraicSideChannelCollisionAttacksonAES.pdf  22-Dec-2014 09:23    207K
478-ImpossibilityResultsforUniversalComposabili..> 22-Dec-2014 09:23    180K
479-AnEfficientIdentificationProtocolandtheKnow..> 22-Dec-2014 09:23    167K
480-DifferentialFaultAnalysisontheAESKeySchedul..> 22-Dec-2014 09:23    177K
481-MACfreevariantofKD04.pdf                       20-Jan-2023 14:21     207
482-TinyPBCPairingsforAuthenticatedIdentityBase..> 22-Dec-2014 09:23    175K