Index of /2008/


../
001-SecurityProoffortheImprovedRyuYoonYooIdenti..> 22-Dec-2014 10:07    236K
001-SecurityProoffortheImprovedRyuYoonYooIdenti..> 22-Dec-2014 10:07    444K
002-FuzzyIdentityBasedSignature.pdf                22-Dec-2014 10:06    175K
003-OnCollisionsofHashFunctionsTurboSHA2.pdf       22-Dec-2014 10:06    229K
004-EfficientTweakableEncipheringSchemesfromBlo..> 22-Dec-2014 10:06    376K
005-InformationTheoreticEvaluationofSideChannel..> 22-Dec-2014 10:06    224K
005-InformationTheoreticEvaluationofSideChannel..> 22-Dec-2014 10:06    660K
006-JointStateTheoremsforPublicKeyEncryptionand..> 22-Dec-2014 10:06    930K
007-EfficientOneroundKeyExchangeintheStandardMo..> 22-Dec-2014 10:06    338K
008-FactoringPolynomialsforConstructingPairingf..> 22-Dec-2014 10:06     74K
008-FactoringPolynomialsforConstructingPairingf..> 22-Dec-2014 10:06    147K
009-GenericAttacksfortheXorofkrandompermutation..> 22-Dec-2014 10:06    378K
010-AProofofSecurityinO2nfortheXorofTwoRandomPe..> 22-Dec-2014 10:06    482K
010-AProofofSecurityinO2nfortheXorofTwoRandomPe..> 20-Jan-2023 08:38    515K
011-AsimplegeneralizationoftheElGamalcryptosyst..> 22-Dec-2014 10:06    207K
012-TheEncryptedEllipticCurveHash.pdf              22-Dec-2014 10:06    236K
013-TwistedEdwardsCurves.pdf                       22-Dec-2014 10:06    222K
014-SimulatableAdaptiveObliviousTransfer.pdf       22-Dec-2014 10:06    339K
014-SimulatableAdaptiveObliviousTransfer.ps        22-Dec-2014 10:06    602K
015-PracticalShortSignatureBatchVerification.pdf   22-Dec-2014 10:06    356K
016-ECMusingEdwardscurves.pdf                      22-Dec-2014 10:06    903K
017-NewStateRecoveryAttackonRC4.pdf                22-Dec-2014 10:06    437K
017-NewStateRecoveryAttackonRC4.ps                 22-Dec-2014 10:06      6M
018-DisjunctiveMultiLevelSecretSharing.pdf         22-Dec-2014 10:06    189K
019-ComputingPairingsUsingxCoordinatesOnly.pdf     22-Dec-2014 10:05    198K
019-ComputingPairingsUsingxCoordinatesOnly.ps      22-Dec-2014 10:05    405K
020-CCA2SecureIBEStandardModelEfficiencythrough..> 22-Dec-2014 10:05    387K
021-BlockCiphersImplementationsProvablySecureAg..> 22-Dec-2014 10:05    301K
022-ComputingAlmostExactProbabilitiesofDifferen..> 22-Dec-2014 10:05    257K
023-GeneralCertificatelessEncryptionandTimedRel..> 22-Dec-2014 10:05    289K
023-GeneralCertificatelessEncryptionandTimedRel..> 22-Dec-2014 10:05    523K
024-IdentityBasedStrongBiDesignatedVerifierProx..> 22-Dec-2014 10:05     67K
025-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05    202K
025-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05    370K
026-PairingfriendlyHyperellipticCurveswithOrdin..> 22-Dec-2014 10:05    142K
027-BlindSignatureSchemeoverBraidGroups.pdf        22-Dec-2014 10:05     66K
028-HBIncreasingtheSecurityandEfficiencyofHB.pdf   22-Dec-2014 10:05    307K
028-HBIncreasingtheSecurityandEfficiencyofHB.ps    22-Dec-2014 10:05    908K
029-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05    246K
029-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05    435K
030-DetectionofAlgebraicManipulationwithApplica..> 22-Dec-2014 10:05    233K
030-DetectionofAlgebraicManipulationwithApplica..> 22-Dec-2014 10:05    396K
031-AuthenticatingwithAttributes.pdf               22-Dec-2014 10:05    214K
032-Merkle39sKeyAgreementProtocolisOptimalAnOn2..> 20-Jan-2023 08:38    584K
032-MerklePuzzlesareOptimal.pdf                    22-Dec-2014 10:05    272K
032-MerklePuzzlesareOptimal.ps                     22-Dec-2014 10:05    515K
033-LowerBoundsonSignaturesFromSymmetricPrimiti..> 22-Dec-2014 10:05    382K
034-PerfectlyHidingCommitmentSchemewithTwoRound..> 22-Dec-2014 10:05    154K
034-PerfectlyHidingCommitmentSchemewithTwoRound..> 22-Dec-2014 10:05    310K
035-EfficientFullySimulatableObliviousTransfer.pdf 22-Dec-2014 10:05    288K
035-EfficientFullySimulatableObliviousTransfer.ps  22-Dec-2014 10:05    287K
036-GenericAttacksonFeistelSchemes.pdf             22-Dec-2014 10:05    208K
037-AnonymousConsecutiveDelegationofSigningRigh..> 22-Dec-2014 10:05    253K
037-AnonymousConsecutiveDelegationofSigningRigh..> 22-Dec-2014 10:05    503K
038-ANewBlindIdentityBasedSignatureSchemewithMe..> 22-Dec-2014 10:05    105K
039-NewResultsonUnconditionallySecureMultirecei..> 22-Dec-2014 10:05    316K
040-EfficientandGeneralizedPairingComputationon..> 22-Dec-2014 10:05    270K
041-ANewProxyIdentityBasedSigncryptionSchemefor..> 22-Dec-2014 10:04     81K
042-TrustedHBalowcostversionofHBsecureagainstMa..> 22-Dec-2014 10:04    147K
043-CryptanalysisofCRUSHhashstructure.pdf          22-Dec-2014 10:04    180K
044-UnidirectionalKeyDistributionAcrossTimeandS..> 22-Dec-2014 10:04    279K
045-ThresholdRSAforDynamicandAdHocGroups.pdf       22-Dec-2014 10:04    230K
046-DavidandGoliathCommitmentsUCComputationforA..> 22-Dec-2014 10:04    251K
046-DavidandGoliathCommitmentsUCComputationforA..> 22-Dec-2014 10:04    895K
047-FairTraceableMultiGroupSignatures.pdf          22-Dec-2014 10:04    356K
047-FairTraceableMultiGroupSignatures.ps           22-Dec-2014 10:04    640K
048-ImprovedCryptanalysisofAPOPMD4andNMACMD4usi..> 22-Dec-2014 10:04    219K
049-AnEfficientProtocolforSecureTwoPartyComputa..> 22-Dec-2014 10:04    533K
050-MultiPKGIDbasedsigncryption.pdf                22-Dec-2014 10:04    176K
051-NewCompositeOperationsandPrecomputationSche..> 22-Dec-2014 10:04      1M
052-NewMultibaseNonAdjacentFormScalarMultiplica..> 22-Dec-2014 10:04    393K
053-BreakingOneRoundKeyAgreementProtocolsintheR..> 22-Dec-2014 10:04    108K
054-VariantsoftheDistinguishedPointMethodforCry..> 22-Dec-2014 10:04    193K
054-VariantsoftheDistinguishedPointMethodforCry..> 22-Dec-2014 10:04    387K
055-cryptanalysisandImprovementofaRecentlyPropo..> 20-Jan-2023 14:21     207
056-Fastexplicitformulaeforgenus2hyperellipticc..> 22-Dec-2014 10:04    140K
057-SoftwareImplementationofGenus2Hyperelliptic..> 22-Dec-2014 10:04    209K
058-PhysicalCryptanalysisofKeeLoqCodeHoppingApp..> 22-Dec-2014 10:04    907K
059-Buyingrandomvotesisashardasbuyingnovotes.pdf   22-Dec-2014 10:04    181K
060-FastAlgorithmsforArithmeticonEllipticCurves..> 22-Dec-2014 10:04    725K
061-Abelianvarietieswithprescribedembeddingdegr..> 22-Dec-2014 10:04    199K
062-ComputingHilbertClassPolynomials.pdf           22-Dec-2014 10:04    198K
063-EfficientSequentialAggregateSignedData.pdf     22-Dec-2014 10:04    330K
063-EfficientSequentialAggregateSignedData.ps      22-Dec-2014 10:04    944K
064-RemarksontheNFScomplexity.pdf                  22-Dec-2014 10:03    217K
065-InfringingandImprovingPasswordSecurityofaTh..> 22-Dec-2014 10:03    152K
065-InfringingandImprovingPasswordSecurityofaTh..> 22-Dec-2014 10:03    131K
066-HighPerformanceArchitectureforEllipticCurve..> 22-Dec-2014 10:03    241K
067-TheTwinDiffieHellmanProblemandApplications.pdf 22-Dec-2014 10:03    387K
068-MultipartyComputationGoesLive.pdf              22-Dec-2014 10:03    328K
069-HENKOSCryptanalysisRelatedkeysattack.pdf       22-Dec-2014 10:03     78K
070-GeneratorsofJacobiansofGenusTwoCurves.pdf      22-Dec-2014 10:03    235K
070-GeneratorsofJacobiansofGenusTwoCurves.ps       22-Dec-2014 10:03    417K
071-BlockcipherBasedHashingRevisited.pdf           22-Dec-2014 10:03    265K
072-TheSIPSecurityEnhancedbyUsingPairingassiste..> 22-Dec-2014 10:03    548K
073-CompactProofsofRetrievability.pdf              22-Dec-2014 10:03    627K
074-OntheChikazawaInoueIDbasedkeysystem.pdf        22-Dec-2014 10:03    101K
075-OntheStrengthoftheConcatenatedHashCombinerw..> 22-Dec-2014 10:03    217K
075-OntheStrengthoftheConcatenatedHashCombinerw..> 22-Dec-2014 10:03    498K
076-ResultsfromaSearchfortheBestLinearApproxima..> 22-Dec-2014 10:03     42K
077-NonlinearPieceInHandMatrixMethodforEnhancin..> 22-Dec-2014 10:03    203K
078-AShortProofofthePRPPRFSwitchingLemma.pdf       22-Dec-2014 10:03     73K
078-AShortProofofthePRPPRFSwitchingLemma.ps        22-Dec-2014 10:03    200K
079-HomomorphicEncryptionwithCCASecurity.pdf       22-Dec-2014 10:03    354K
080-PairingBasedOnionRoutingwithImprovedForward..> 22-Dec-2014 10:03    280K
081-TemplateAttacksonECDSA.pdf                     22-Dec-2014 10:03    320K
082-ImprovingtheFarnelThreeballotandRandellRyan..> 22-Dec-2014 10:03    297K
083-OntheSecurityofChien39sUltralightweightRFID..> 20-Jan-2023 08:37    106K
083-OntheSecurityofChiensUltralightweightRFIDAu..> 22-Dec-2014 10:03    106K
084-IDbasedgeneralizedsigncryption.pdf             22-Dec-2014 10:03    567K
085-AllPairingsAreinaGroup.pdf                     22-Dec-2014 10:03    170K
086-EfficientPerfectlyReliableandSecureCommunic..> 22-Dec-2014 10:03    310K
087-TowardsaTheoryofWhiteBoxSecurity.pdf           22-Dec-2014 10:03    168K
088-APublicKeyEncryptionInStandardModelUsingCra..> 22-Dec-2014 10:03    195K
089-AnimprovedpreimageattackonMD2.pdf              22-Dec-2014 10:03    164K
090-ImprovinguponHCTRandmatchingattacksforHashC..> 22-Dec-2014 10:02    249K
091-AGenericMethodtoExtendMessageSpaceofaStrong..> 22-Dec-2014 10:02    181K
092-AnEfficientSPRPsecureConstructionbasedonPse..> 22-Dec-2014 10:02    231K
093-NewIDbasedFairBlindSignatures.pdf              22-Dec-2014 10:02     65K
094-UniversallyComposableUndeniableSignature.pdf   22-Dec-2014 10:02    209K
095-StronglyUnforgeableIDbasedSignaturesWithout..> 22-Dec-2014 10:02    215K
095-StronglyUnforgeableIDbasedSignaturesWithout..> 22-Dec-2014 10:02    476K
096-OptimalPairings.pdf                            22-Dec-2014 10:02    182K
096-OptimalPairings.ps                             22-Dec-2014 10:02    392K
097-FairnesswithanHonestMinorityandaRationalMaj..> 22-Dec-2014 10:02    280K
097-FairnesswithanHonestMinorityandaRationalMaj..> 22-Dec-2014 10:02    454K
098-OnSecurityNotionsforVerifiableEncryptedSign..> 22-Dec-2014 10:02    168K
099-TheEllipticCurveDiscreteLogarithmProblemand..> 22-Dec-2014 10:02    212K
099-TheEllipticCurveDiscreteLogarithmProblemand..> 22-Dec-2014 10:02    424K
100-AcceleratingtheScalarMultiplicationonEllipt..> 22-Dec-2014 10:02      2M
101-ProbabilisticVerifiableSecretSharingTolerat..> 20-Jan-2023 14:21     207
102-DegradationandAmplificationofComputationalH..> 22-Dec-2014 10:02    229K
102-DegradationandAmplificationofComputationalH..> 22-Dec-2014 10:02    456K
103-IdentityBasedProxyReencryptionSchemeswithMu..> 20-Jan-2023 14:21     207
104-SimplifiedSecurityNotionsofDirectAnonymousA..> 22-Dec-2014 10:02    249K
104-SimplifiedSecurityNotionsofDirectAnonymousA..> 22-Dec-2014 10:02    458K
105-CryptanalysisofWhiteBoxImplementations.pdf     22-Dec-2014 10:02    223K
105-CryptanalysisofWhiteBoxImplementations.ps      22-Dec-2014 10:02    206K
106-KnapsackcryptosystemsbuiltonNPhardinstances..> 22-Dec-2014 10:02    227K
106-KnapsackcryptosystemsbuiltonNPhardinstances.ps 22-Dec-2014 10:02    408K
107-PrivateBranchingProgramsOnCommunicationEffi..> 22-Dec-2014 10:02    326K
108-NewDifferentialAlgebraicAttacksandReparamet..> 22-Dec-2014 10:02    335K
109-CollisionsforRoundReducedLAKE.pdf              22-Dec-2014 10:02    223K
110-OntheDesignofSecureandFastDoubleBlockLength..> 20-Jan-2023 14:21     207
111-THEDESIGNOFBOOLEANFUNCTIONSBYMODIFIEDHILLCL..> 22-Dec-2014 10:02    236K
112-DemocraticGroupSignatureswithThresholdTrace..> 22-Dec-2014 10:02    245K
113-OpenSourceIsNotEnoughAttackingtheECpackageo..> 22-Dec-2014 10:02    100K
114-ScalableandEfficientProvableDataPossession.pdf 22-Dec-2014 10:02    330K
115-AComparisonBetweenHardwareAcceleratorsforth..> 22-Dec-2014 10:02    318K
116-ChosenCiphertextSecurityviaCorrelatedProduc..> 22-Dec-2014 10:02    327K
116-ChosenCiphertextSecurityviaCorrelatedProduc..> 22-Dec-2014 10:01    990K
117-Exponentiationinpairingfriendlygroupsusingh..> 22-Dec-2014 10:01    205K
118-SettingSpeedRecordswiththeFractionalMultiba..> 22-Dec-2014 10:01    317K
119-LinearBandwidthNaccacheSternEncryption.pdf     22-Dec-2014 10:01    242K
120-Publickeyencryptionandencryptionemulationat..> 22-Dec-2014 10:01    135K
121-Newproofsforoldmodes.pdf                       22-Dec-2014 10:01    319K
121-Newproofsforoldmodes.ps                        22-Dec-2014 10:01    503K
122-TinyECCKEfficientEllipticCurveCryptographyI..> 22-Dec-2014 10:01    324K
123-SecureAdiabaticLogicaLowEnergyDPAResistantL..> 22-Dec-2014 10:01      2M
124-ASimpleDerivationfortheFrobeniusPseudoprime..> 22-Dec-2014 10:01     85K
125-PairingLattices.pdf                            22-Dec-2014 10:01    223K
126-MachineLearningAttacksAgainsttheASIRRACAPTC..> 22-Dec-2014 10:01    188K
127-APipelinedKaratsubaOfmanMultiplieroverGF397..> 22-Dec-2014 10:01    524K
128-AChosenIVAttackUsingPhaseShiftingEquivalent..> 22-Dec-2014 10:01    198K
128-AChosenIVAttackUsingPhaseShiftingEquivalent..> 22-Dec-2014 10:01    462K
129-ControllingaccesstopersonaldatathroughAccre..> 22-Dec-2014 10:01    292K
130-AnalysisofStepReducedSHA256.pdf                22-Dec-2014 10:01    257K
130-AnalysisofStepReducedSHA256.ps                 22-Dec-2014 10:01    572K
131-CollisionsandotherNonRandomPropertiesforSte..> 22-Dec-2014 10:01    243K
131-CollisionsandotherNonRandomPropertiesforSte..> 22-Dec-2014 10:01    467K
132-AFrameworkfortheSoundSpecificationofCryptog..> 22-Dec-2014 10:01      1M
133-Thearithmeticofcharacteristic2Kummersurface..> 22-Dec-2014 10:01    220K
134-EfficientLossyTrapdoorFunctionsbasedontheCo..> 22-Dec-2014 10:01     99K
134-EfficientLossyTrapdoorFunctionsbasedontheCo..> 22-Dec-2014 10:01    255K
135-UnbalancedDigitSetsandtheClosestChoiceStrat..> 22-Dec-2014 10:01    313K
135-UnbalancedDigitSetsandtheClosestChoiceStrat..> 22-Dec-2014 10:01    642K
136-ConstantSizeDynamickTAA.pdf                    22-Dec-2014 10:01    251K
137-MoreDiscriminantswiththeBrezingWengMethod.pdf  22-Dec-2014 10:00    163K
138-ObliviousTransferBasedontheMcElieceAssumpti..> 22-Dec-2014 10:00    125K
139-ChosenCiphertextSecureFuzzyIdentityBasedKey..> 22-Dec-2014 10:00    168K
140-ReducingComplexityAssumptionsforObliviousTr..> 22-Dec-2014 10:00    291K
141-UnconditionallyReliableandSecureMessageTran..> 22-Dec-2014 10:00    673K
142-AttackingReducedRoundSHA256.pdf                22-Dec-2014 10:00    241K
143-CertificatelessSigncryption.pdf                22-Dec-2014 10:00    243K
143-CertificatelessSigncryption.ps                 22-Dec-2014 10:00    428K
144-ANoteonDifferentialPrivacyDefiningResistanc..> 22-Dec-2014 10:00    135K
144-ANoteonDifferentialPrivacyDefiningResistanc..> 22-Dec-2014 10:00    256K
145-FastMultiplePointMultiplicationonEllipticCu..> 22-Dec-2014 10:00    333K
146-DynamicSHA2.pdf                                22-Dec-2014 10:00    239K
147-ARealWorldAttackBreakingA51withinHours.pdf     22-Dec-2014 10:00    235K
148-RedundanttauadicExpansionsINonAdjacentDigit..> 22-Dec-2014 10:00    466K
149-ToyFactoringbyNewton39sMethod.pdf              20-Jan-2023 14:21     207
149-ToyFactoringbyNewtonsMethod.pdf                22-Dec-2014 10:00     80K
149-ToyFactoringbyNewtonsMethod.ps                 22-Dec-2014 10:00    187K
150-RobustCombinersforSoftwareHardening.pdf        22-Dec-2014 10:00    546K
151-ImpossibleDifferentialCryptanalysisofCLEFIA..> 20-Jan-2023 14:21     207
152-Computationalsoundnessofsymboliczeroknowled..> 22-Dec-2014 10:00    941K
153-RedundanttauadicExpansionsIINonOptimalityan..> 22-Dec-2014 10:00    233K
154-TheWalshSpectrumofaNewFamilyofAPNFunctions.pdf 20-Jan-2023 14:21     207
155-AGeneralizedBrezingWengAlgorithmforConstruc..> 22-Dec-2014 10:00    255K
156-OnBlackBoxRingExtractionandIntegerFactoriza..> 22-Dec-2014 10:00    287K
157-SecureOnlineElectionsinPractice.pdf            22-Dec-2014 10:00    146K
158-DISHDistributedSelfHealinginUnattendedSenso..> 22-Dec-2014 10:00    311K
158-DISHDistributedSelfHealinginUnattendedSenso..> 22-Dec-2014 10:00    828K
159-Anoninteractivedeniableauthenticationscheme..> 22-Dec-2014 10:00     92K
160-AProxySignatureSchemeoverBraidGroups.pdf       22-Dec-2014 10:00     65K
161-Modularpolynomialsforgenus2.pdf                22-Dec-2014 10:00    186K
162-FormallyBoundingtheSideChannelLeakageinUnkn..> 22-Dec-2014 10:00    273K
163-UniversallyComposableAdaptiveObliviousTrans..> 22-Dec-2014 10:00    556K
164-OntheImPossibilityofKeyDependentEncryption.pdf 22-Dec-2014 09:59    320K
165-Improvedlowerboundonthenumberofbalancedsymm..> 22-Dec-2014 09:59     88K
166-AlgebraicAttacksontheCrypto1StreamCipherinM..> 22-Dec-2014 09:59     58K
166-AlgebraicAttacksontheCrypto1StreamCipherinM..> 22-Dec-2014 09:59    155K
167-NonblackboxTechniquesAreNotNecessaryforCons..> 22-Dec-2014 09:59    368K
168-Possibilityandimpossibilityresultsforselect..> 22-Dec-2014 09:59    565K
168-Possibilityandimpossibilityresultsforselect..> 22-Dec-2014 09:59    787K
169-UnderstandingPhaseShiftingEquivalentKeysand..> 22-Dec-2014 09:59     80K
169-UnderstandingPhaseShiftingEquivalentKeysand..> 22-Dec-2014 09:59    206K
170-CryptanalysingtheCriticalGroupEfficientlySo..> 20-Jan-2023 08:37    109K
170-CryptanalysingtheCriticalGroupEfficientlySo..> 22-Dec-2014 09:59    109K
171-BinaryEdwardsCurves.pdf                        22-Dec-2014 09:59    239K
172-TheRoundComplexityofVerifiableSecretSharing..> 22-Dec-2014 09:59    263K
173-FullCryptanalysisofLPSandMorgensternHashFun..> 22-Dec-2014 09:59    228K
174-NonLinearReducedRoundAttacksAgainstSHA2Hash..> 22-Dec-2014 09:59    220K
174-NonLinearReducedRoundAttacksAgainstSHA2Hash..> 22-Dec-2014 09:59    750K
175-ProofsofRetrievabilityTheoryandImplementati..> 22-Dec-2014 09:59    396K
176-NewconstructionofBooleanfunctionswithmaximu..> 22-Dec-2014 09:59    160K
177-AlgebraicTechniquesinDifferentialCryptanaly..> 22-Dec-2014 09:59    214K
178-OptimalDiscretizationforHighEntropyGraphica..> 22-Dec-2014 09:59    192K
179-AnEfficientIDbasedRingSignatureSchemefromPa..> 20-Jan-2023 14:21     207
180-Imaginaryquadraticorderswithgivenprimefacto..> 22-Dec-2014 09:59     71K
181-ProofsofKnowledgewithSeveralChallengeValues..> 22-Dec-2014 09:59    197K
182-RestrictedAdaptiveObliviousTransfer.pdf        22-Dec-2014 09:59    294K
183-PreimageAttackson3PassHAVALandStepReducedMD..> 22-Dec-2014 09:59    229K
184-OntheSecureObfuscationofDeterministicFinite..> 22-Dec-2014 09:59    408K
185-ANewApproachtoSecureLogging.pdf                22-Dec-2014 09:59    212K
185-ANewApproachtoSecureLogging.ps                 22-Dec-2014 09:59      3M
186-PrivacyPreservingAuditandExtractionofDigita..> 22-Dec-2014 09:59    220K
187-AnEfficientandProvablySecureIDBasedThreshol..> 22-Dec-2014 09:59    129K
187-AnEfficientandProvablySecureIDBasedThreshol..> 22-Dec-2014 09:59    233K
188-InformationLeakageofFlipFlopsinDPAResistant..> 22-Dec-2014 09:59      3M
189-HowtoBuildaHashFunctionfromanyCollisionResi..> 22-Dec-2014 09:58    385K
190-UserSureandSafeKeyRetrieval.pdf                22-Dec-2014 09:58    180K
190-UserSureandSafeKeyRetrieval.ps                 22-Dec-2014 09:58    352K
191-None.pdf                                       20-Jan-2023 14:21     207
192-InvestigatingtheDPAResistancePropertyofChar..> 22-Dec-2014 09:58      2M
193-ATamperEvidentVotingMachineResistanttoCover..> 20-Jan-2023 14:21     207
194-Endomorphismsforfasterellipticcurvecryptogr..> 22-Dec-2014 09:58    274K
195-AnEfficientandProvablySecureIdentitybasedSi..> 22-Dec-2014 09:58    275K
196-ANewFamilyofPerfectNonlinearBinomials.pdf      22-Dec-2014 09:58    138K
196-ANewFamilyofPerfectNonlinearBinomials.ps       22-Dec-2014 09:58    293K
197-SecureMultipartyComputationforPrivacyPreser..> 22-Dec-2014 09:58    306K
198-Securityneedsinembeddedsystems.pdf             22-Dec-2014 09:58    177K
199-SimultaneousfielddivisionsanextensionofMont..> 20-Jan-2023 08:37    520K
199-SimultaneousfielddivisionsanextensionofMont..> 22-Dec-2014 09:58    520K
200-OnTheSecurityofTheElGamalEncryptionSchemean..> 22-Dec-2014 09:58    187K
201-HowToEnsureForwardandBackwardUntraceability..> 22-Dec-2014 09:58    123K
202-PolynomialsforAtePairingandmathbfAte_iPairi..> 22-Dec-2014 09:58     76K
202-PolynomialsforAtePairingandmathbfAte_iPairi..> 22-Dec-2014 09:58    171K
203-PrivacyPreservingMatchingofDNAProfiles.pdf     22-Dec-2014 09:58    119K
204-CryptanalysisoftheCaiCusickLatticebasedPubl..> 22-Dec-2014 09:58    169K
205-OnSoftwareParallelImplementationofCryptogra..> 22-Dec-2014 09:58    183K
205-OnSoftwareParallelImplementationofCryptogra..> 22-Dec-2014 09:58    441K
206-PartialFairnessinSecureTwoPartyComputation.pdf 22-Dec-2014 09:58    274K
207-EfficientReceiptFreeBallotCastingResistantt..> 22-Dec-2014 09:58    319K
208-RemarksontheAttackofFouqueetalagainsttheell..> 22-Dec-2014 09:58    163K
208-RemarksontheAttackofFouqueetalagainsttheell..> 22-Dec-2014 09:58    344K
209-ComputingBilinearPairingsonEllipticCurveswi..> 22-Dec-2014 09:58    118K
210-ComplexityAnalysisofaFastModularMultiexpone..> 22-Dec-2014 09:58    194K
211-EfficientChosenCiphertextSecurePublicKeyEnc..> 22-Dec-2014 09:58    390K
212-ReducingtheComplexityoftheWeilPairingComput..> 22-Dec-2014 09:58    102K
213-TheMultireceiverCommitmentSchemes.pdf          22-Dec-2014 09:58    224K
214-MultiFactorPasswordAuthenticatedKeyExchange..> 22-Dec-2014 09:58    403K
215-OnImplementationofGHSAttackagainstEllipticC..> 22-Dec-2014 09:57    202K
216-ANewMultiLinearUniversalHashFamily.pdf         22-Dec-2014 09:57    411K
217-OracleAssistedStaticDiffieHellmanIsEasierTh..> 22-Dec-2014 09:57    286K
218-Efficientarithmeticonellipticcurvesusingami..> 22-Dec-2014 09:57    135K
219-AnalysisandDetailsoftheRandomCipherOutputMo..> 20-Jan-2023 14:21     207
220-EssentiallyOptimalUniversallyComposableObli..> 22-Dec-2014 09:57    134K
220-EssentiallyOptimalUniversallyComposableObli..> 22-Dec-2014 09:57    224K
221-EfficientConversionofSecretsharedValuesBetw..> 22-Dec-2014 09:57    128K
222-EncryptionOnDemandPracticalandTheoreticalCo..> 22-Dec-2014 09:57    237K
223-OntheSecurityofaVisualCryptographySchemefor..> 22-Dec-2014 09:57      4M
224-AnIDbasedAuthenticatedKeyExchangeProtocolBa..> 22-Dec-2014 09:57    226K
225-ProvablySecureIDBasedBroadcastSigncryptionI..> 22-Dec-2014 09:57    259K
225-ProvablySecureIDBasedBroadcastSigncryptionI..> 22-Dec-2014 09:57    471K
226-ProxyKeyReencapsulationMechanismforGroupCom..> 22-Dec-2014 09:57    133K
227-NewImpossibleDifferentialCryptanalysisofARI..> 22-Dec-2014 09:57    263K
227-NewImpossibleDifferentialCryptanalysisofARI..> 22-Dec-2014 09:57      2M
228-RevisitingWiener39sAttackNewWeakKeysinRSA.pdf  20-Jan-2023 08:37    341K
228-RevisitingWienersAttackNewWeakKeysinRSA.pdf    22-Dec-2014 09:57    341K
229-IdentificationandPrivacyZeroKnowledgeisnotE..> 22-Dec-2014 09:57    434K
230-ANewCollisionDifferentialForMD5WithItsFullD..> 22-Dec-2014 09:57    296K
231-ANovelProbabilisticPassiveAttackontheProtoc..> 22-Dec-2014 09:57    120K
232-PerfectlySecureMessageTransmissionToleratin..> 22-Dec-2014 09:57    722K
233-OnResettablySoundResttableZeroKnowledegeArg..> 20-Jan-2023 14:21     207
234-OntheCCA1SecurityofElgamalandDamgaardsElgam..> 22-Dec-2014 09:57    231K
234-OntheCCA1SecurityofElgamalandDamgrd39sElgam..> 20-Jan-2023 08:37    231K
235-ConstantRoundConcurrentNonMalleableCommitme..> 22-Dec-2014 09:57    339K
236-AModularSecurityAnalysisoftheTLSHandshakePr..> 22-Dec-2014 09:57    338K
237-LocalAffinityBasedInversionofFilterGenerato..> 22-Dec-2014 09:57    172K
238-OntheProvableSecurityofMultiReceiverSigncry..> 22-Dec-2014 09:56    254K
238-OntheProvableSecurityofMultiReceiverSigncry..> 22-Dec-2014 09:56    488K
239-RecognitioninAdHocPervasiveNetworks.pdf        22-Dec-2014 09:56    189K
240-LeakageResilientCryptographyintheStandardMo..> 22-Dec-2014 09:56    265K
241-PracticalAttacksonHBandHBProtocols.pdf         22-Dec-2014 09:56    119K
242-EnumerationofHomogeneousRotationSymmetricfu..> 20-Jan-2023 14:21     207
243-Ontheeconomicpayoffofforensicsystemswhenuse..> 22-Dec-2014 09:56    116K
244-NewbalancedBooleanfunctionssatisfyingallthe..> 22-Dec-2014 09:56    169K
245-CryptanalysisofanAuthenticationSchemeUsingT..> 22-Dec-2014 09:56     89K
245-CryptanalysisofanAuthenticationSchemeUsingT..> 22-Dec-2014 09:56    232K
246-TheRandomOracleModelandtheIdealCipherModela..> 22-Dec-2014 09:56    301K
247-CryptanalysisofBohioetal39sIDBasedBroadcast..> 20-Jan-2023 08:37    272K
247-CryptanalysisofBohioetalsIDBasedBroadcastSi..> 22-Dec-2014 09:56    165K
247-CryptanalysisofBohioetalsIDBasedBroadcastSi..> 22-Dec-2014 09:56    292K
248-Cryptanalysisofaclienttoclientpasswordauthe..> 22-Dec-2014 09:56    134K
249-ConstructionofResilientFunctionswithMultipl..> 20-Jan-2023 14:21     207
250-Pairingsonhyperellipticcurveswitharealmodel..> 22-Dec-2014 09:56    223K
251-UniversallyComposableSecurityAnalysisofTLSS..> 22-Dec-2014 09:56    451K
252-ProvableSecurityofDigitalSignaturesintheTam..> 22-Dec-2014 09:56    166K
252-ProvableSecurityofDigitalSignaturesintheTam..> 22-Dec-2014 09:56    151K
253-MultiRecipientSigncryptionforSecureWireless..> 22-Dec-2014 09:56    131K
254-AnEfficientIdentitybasedRingSigncryptionSch..> 22-Dec-2014 09:56    134K
255-EmbeddinginTwoLeastSignificantBitswithWetPa..> 22-Dec-2014 09:56    162K
256-ONMIDDLEUNIVERSALWEAKANDCROSSINVERSEPROPERT..> 22-Dec-2014 09:56    143K
257-ONMIDDLEUNIVERSALmINVERSEQUASIGROUPSANDTHEI..> 22-Dec-2014 09:56    149K
258-ONACRYPTOGRAPHICIDENTITYINOSBORNLOOPS.pdf      22-Dec-2014 09:56    145K
259-2AdicComplexityofaSequenceObtainedfromaPeri..> 22-Dec-2014 09:56    151K
260-BreakingRSAGenericallyisEquivalenttoFactori..> 22-Dec-2014 09:56    326K
261-TheHiddenRootProblem.pdf                       22-Dec-2014 09:56    167K
261-TheHiddenRootProblem.ps                        22-Dec-2014 09:56    363K
262-StatisticallyReliableandSecureMessageTransm..> 22-Dec-2014 09:56    584K
263-SlideAttacksonaClassofHashFunctions.pdf        22-Dec-2014 09:56    238K
263-SlideAttacksonaClassofHashFunctions.ps         22-Dec-2014 09:56      3M
264-SecureComputabilityofFunctionsintheITsettin..> 22-Dec-2014 09:56    469K
265-EfficientHyperellipticArithmeticusingBalanc..> 22-Dec-2014 09:56    212K
266-InformationTheoreticallySecureVotingWithout..> 22-Dec-2014 09:55    187K
267-DeterministicEncryptionDefinitionalEquivale..> 22-Dec-2014 09:55    264K
268-AdaptiveSecurityinBroadcastEncryptionSystem..> 22-Dec-2014 09:55    247K
269-SearchingforLowWeightCodewordsinLinearBinar..> 22-Dec-2014 09:55    106K
269-SearchingforLowWeightCodewordsinLinearBinar..> 22-Dec-2014 09:55    244K
270-NewCollisionattacksAgainstUpTo24stepSHA2.pdf   22-Dec-2014 09:55    268K
270-NewCollisionattacksAgainstUpTo24stepSHA2.ps    22-Dec-2014 09:55    542K
271-ACombinatorialAnalysisofRecentAttacksonStep..> 22-Dec-2014 09:55    360K
271-ACombinatorialAnalysisofRecentAttacksonStep..> 22-Dec-2014 09:55    677K
272-ANewHashFamilyObtainedbyModifyingtheSHA2Fam..> 22-Dec-2014 09:55    207K
272-ANewHashFamilyObtainedbyModifyingtheSHA2Fam..> 22-Dec-2014 09:55    844K
273-WhiteBoxCryptographyFormalNotionsandImpossi..> 22-Dec-2014 09:55    282K
274-TwistedAtePairingonHyperellipticCurvesandAp..> 22-Dec-2014 09:55    169K
274-TwistedAtePairingonHyperellipticCurvesandAp..> 22-Dec-2014 09:55    366K
275-CertificateBasedSignatureSchemeswithoutPair..> 22-Dec-2014 09:55    260K
276-SigncryptionwithProxyReencryption.pdf          22-Dec-2014 09:55    246K
276-SigncryptionwithProxyReencryption.ps           22-Dec-2014 09:55    494K
277-AstrategyforanyDAAIssuerandanadditionalveri..> 22-Dec-2014 09:55     25K
277-AstrategyforanyDAAIssuerandanadditionalveri..> 22-Dec-2014 09:55     58K
278-AnImprovedRobustFuzzyExtractor.pdf             22-Dec-2014 09:55    208K
278-AnImprovedRobustFuzzyExtractor.ps              22-Dec-2014 09:55    418K
279-DelegatingCapabilitiesinPredicateEncryption..> 22-Dec-2014 09:55    383K
280-FPGAandASICImplementationsoftheeta_TPairing..> 22-Dec-2014 09:55   1016K
281-LinearandDifferentialCryptanalysisofReduced..> 22-Dec-2014 09:55    322K
282-SurvivalintheWildRobustGroupKeyAgreementinW..> 22-Dec-2014 09:55    198K
283-AttacksonSingeleeandPreneel39sprotocol.pdf     20-Jan-2023 08:37    441K
283-AttacksonSingeleeandPreneelsprotocol.pdf       22-Dec-2014 09:55    441K
284-BreakingtheAkiyamaGotocryptosystem.pdf         22-Dec-2014 09:55    177K
285-HybridBinaryTernaryJointSparseFormanditsApp..> 22-Dec-2014 09:55    172K
286-OneUpProblemforECDSA.pdf                       22-Dec-2014 09:55    135K
286-OneUpProblemforECDSA.ps                        22-Dec-2014 09:55    289K
287-AuthenticatedByzantineGeneralsinDualFailure..> 22-Dec-2014 09:55    329K
288-HowtoLaunchABirthdayAttackAgainstDES.pdf       22-Dec-2014 09:54    295K
289-Sharemindaframeworkforfastprivacypreserving..> 22-Dec-2014 09:54    284K
290-CiphertextPolicyAttributeBasedEncryptionAnE..> 22-Dec-2014 09:54    282K
291-HowtoProtectYourselfwithoutPerfectShredding..> 22-Dec-2014 09:54    603K
292-AnotherapproachtopairingcomputationinEdward..> 22-Dec-2014 09:54    200K
293-MaximizingdatasurvivalinUnattendedWirelessS..> 22-Dec-2014 09:54    244K
294-ANewMessageRecognitionProtocolforAdHocPerva..> 22-Dec-2014 09:54    176K
295-FoundationsofGroupKeyManagementFrameworkSec..> 22-Dec-2014 09:54    258K
295-FoundationsofGroupKeyManagementFrameworkSec..> 22-Dec-2014 09:54    414K
296-CryptanalysisofShortExponentRSAwithPrimesSh..> 22-Dec-2014 09:54    198K
297-AttackonKangetal39sIdentityBasedStrongDesig..> 20-Jan-2023 08:37    193K
297-AttackonKangetalsIdentityBasedStrongDesigna..> 22-Dec-2014 09:54    193K
298-NonlinearPieceInHandPerturbationVectorMetho..> 22-Dec-2014 09:54    203K
299-Ananalysisoftheinfrastructureinrealfunction..> 22-Dec-2014 09:54    208K
300-Cheon39salgorithmpairinginversionandthedisc..> 20-Jan-2023 08:37    192K
300-Cheonsalgorithmpairinginversionandthediscre..> 22-Dec-2014 09:54    192K
301-AccountabilityofPerfectConcurrentSignature.pdf 22-Dec-2014 09:54    152K
302-SecureBiometricAuthenticationWithImprovedAc..> 22-Dec-2014 09:54    235K
303-CompleteFairnessinSecureTwoPartyComputation..> 22-Dec-2014 09:54    385K
304-ANewRandomnessExtractionParadigmforHybridEn..> 22-Dec-2014 09:54    286K
305-IdentityBasedDirectedSignatureSchemefromBil..> 22-Dec-2014 09:54    220K
306-Combinatorialbatchcodes.pdf                    22-Dec-2014 09:54    163K
307-FullSecurityFuzzyIdentityBasedEncryption.pdf   22-Dec-2014 09:54    198K
308-StronglyResilientandNonInteractiveHierarchi..> 22-Dec-2014 09:54    278K
309-RevocationSystemswithVerySmallPrivateKeys.pdf  22-Dec-2014 09:54    280K
310-AttacksonRFIDProtocols.pdf                     22-Dec-2014 09:54    426K
311-TreatmentoftheInitialValueinTimeMemoryDataT..> 22-Dec-2014 09:54    150K
312-ImprovedefficiencyofKiltz07KEM.pdf             22-Dec-2014 09:54    116K
313-Anewalmostperfectnonlinearfunctionwhichisno..> 22-Dec-2014 09:54    284K
313-Anewalmostperfectnonlinearfunctionwhichisno..> 22-Dec-2014 09:54    591K
314-ScratchClickVoteE2EvotingovertheInternet.pdf   22-Dec-2014 09:54    140K
314-ScratchClickampVoteE2EvotingovertheInternet..> 20-Jan-2023 08:37    140K
315-RSACryptanalysiswithIncreasedBoundsontheSec..> 22-Dec-2014 09:53    227K
316-SigningaLinearSubspaceSignatureSchemesforNe..> 22-Dec-2014 09:53    245K
317-EllipticCurvesScalarMultiplicationCombining..> 20-Jan-2023 14:21     207
318-AttackinganddefendingtheMcEliececryptosyste..> 22-Dec-2014 09:53    206K
319-YetAnotherSecureDistanceBoundingProtocol.pdf   22-Dec-2014 09:53    318K
320-PublicKeyBlockCipherBasedonMultivariateQuad..> 22-Dec-2014 09:53    318K
321-AcorrectiontoEfficientandSecureComparisonfo..> 22-Dec-2014 09:53     75K
321-AcorrectiontoEfficientandSecureComparisonfo..> 20-Jan-2023 08:37     75K
322-LatticebasedBlindSignatures.pdf                22-Dec-2014 09:53    554K
323-Anewidentitybasedproxysignaturescheme.pdf      22-Dec-2014 09:53    128K
324-RSATBOSSigncryptionwithProxyReencryption.pdf   22-Dec-2014 09:53    234K
325-RevisitofGroupbasedUnidirectionalProxyReenc..> 22-Dec-2014 09:53    210K
326-Twoattacksonasensornetworkkeydistributionsc..> 22-Dec-2014 09:53    125K
327-BlindHIBEanditsApplicationstoIdentityBasedB..> 22-Dec-2014 09:53    246K
328-AttributeBasedSignaturesAchievingAttributeP..> 22-Dec-2014 09:53    281K
329-SMS4EncryptionAlgorithmforWirelessNetworks.pdf 22-Dec-2014 09:53     53K
329-SMS4EncryptionAlgorithmforWirelessNetworks.ps  22-Dec-2014 09:53    120K
330-Chosenciphertextsecurepublickeyencryptionun..> 20-Jan-2023 14:21     207
331-ASecureRemoteUserAuthenticationSchemewithSm..> 22-Dec-2014 09:53     80K
332-EfficientKeyDistributionSchemesforLargeScal..> 22-Dec-2014 09:53    282K
333-Explicithardinstancesoftheshortestvectorpro..> 22-Dec-2014 09:53    275K
334-AnalyzingtheGalbraithLinScottPointMultiplic..> 22-Dec-2014 09:53    230K
335-PublicKeyCryptographyfromDifferentAssumptio..> 22-Dec-2014 09:53    265K
336-NewattacksonISOkeyestablishmentprotocols.pdf   22-Dec-2014 09:53     99K
337-ModifiedHuangWang39sConvertibleNominativeSi..> 20-Jan-2023 08:37    204K
337-ModifiedHuangWangsConvertibleNominativeSign..> 22-Dec-2014 09:53    204K
338-AnimprovementofdiscreteTardosfingerprinting..> 22-Dec-2014 09:53    325K
338-AnimprovementofdiscreteTardosfingerprinting..> 22-Dec-2014 09:53    637K
339-HighPerformanceImplementationofaPublicKeyBl..> 22-Dec-2014 09:53    626K
340-Onconstructionofsignatureschemesbasedonbira..> 20-Jan-2023 14:21     207
341-AnEfficientIdentityBasedSigncryptionSchemef..> 22-Dec-2014 09:53    256K
342-CryptanalysisofLietal39sIdentityBasedThresh..> 20-Jan-2023 08:37    207K
342-CryptanalysisofLietalsIdentityBasedThreshol..> 22-Dec-2014 09:53    171K
342-CryptanalysisofLietalsIdentityBasedThreshol..> 22-Dec-2014 09:53    345K
343-EfficientRFIDauthenticationprotocolsbasedon..> 22-Dec-2014 09:53    256K
344-AuthenticatedKeyExchangeSecureundertheCompu..> 22-Dec-2014 09:53    223K
345-AnEfficientAuthenticatedKeyExchangeProtocol..> 22-Dec-2014 09:53    214K
346-RemoteIntegrityCheckwithDishonestStorageSer..> 22-Dec-2014 09:52    212K
347-InformationLeakageinOptimalAnonymizedandDiv..> 22-Dec-2014 09:52    207K
348-IterativeProbabilisticReconstructionofRC4In..> 22-Dec-2014 09:52    207K
348-IterativeProbabilisticReconstructionofRC4In..> 22-Dec-2014 09:52    317K
349-TimeAreaOptimizedPublicKeyEnginesMQCryptosy..> 22-Dec-2014 09:52    223K
350-HigherOrderDifferentialCryptanalysisofMulti..> 22-Dec-2014 09:52    143K
351-FlawsinSomeSelfHealingKeyDistributionScheme..> 22-Dec-2014 09:52    132K
352-OnNotionsofSecurityforDeterministicEncrypti..> 22-Dec-2014 09:52    426K
353-WeaknessesinHENKOSStreamCipher.pdf             22-Dec-2014 09:52     57K
354-OnDDosAttackagainstProxyinReencryptionandRe..> 20-Jan-2023 08:37    268K
355-Anargumentforrankmetric.pdf                    22-Dec-2014 09:52     71K
355-Anargumentforrankmetric.ps                     22-Dec-2014 09:52    170K
356-UsingCommutativeEncryptiontoShareaSecret.pdf   22-Dec-2014 09:52    120K
357-AprotocolforKmultiplesubstringmatching.pdf     22-Dec-2014 09:52     95K
357-AprotocolforKmultiplesubstringmatching.ps      22-Dec-2014 09:52    210K
358-HistoryIndependentCuckooHashing.pdf            22-Dec-2014 09:52    213K
358-HistoryIndependentCuckooHashing.ps             22-Dec-2014 09:52    399K
359-Argumentofknowledgeofaboundederror.pdf         22-Dec-2014 09:52     88K
359-Argumentofknowledgeofaboundederror.ps          22-Dec-2014 09:52    191K
360-AnApproachtoensureInformationSecuritythroug..> 22-Dec-2014 09:52    233K
361-IEEEP13631Draft10DraftStandardforPublicKeyC..> 20-Jan-2023 14:21     207
362-TheCostofFalseAlarmsinHellmanandRainbowTrad..> 22-Dec-2014 09:52    572K
363-AnargumentforHamiltonicity.pdf                 22-Dec-2014 09:52     94K
363-AnargumentforHamiltonicity.ps                  22-Dec-2014 09:52    214K
364-ZcipherAlgorithmSpecification.pdf              22-Dec-2014 09:52     54K
365-EntropyBoundsforTrafficConfirmation.pdf        22-Dec-2014 09:52    168K
366-UniqueShortestVectorProblemformaxnormisNPha..> 22-Dec-2014 09:52    214K
367-ThresholdHomomorphicEncryptionintheUniversa..> 22-Dec-2014 09:52    582K
367-ThresholdHomomorphicEncryptionintheUniversa..> 22-Dec-2014 09:52    962K
368-SideChannelAttackResistantImplementationofM..> 22-Dec-2014 09:52    154K
369-NewDirectionsinCryptanalysisofSelfSynchroni..> 22-Dec-2014 09:52    194K
370-CompartmentedThresholdRSABasedontheChineseR..> 22-Dec-2014 09:52    194K
371-UnconditionallyReliableMessageTransmissioni..> 22-Dec-2014 09:52    609K
372-EnumerationofBalancedSymmetricFunctionsover..> 22-Dec-2014 09:52    154K
373-AnalysisandImprovementofAuthenticatableRing..> 22-Dec-2014 09:52    186K
373-AnalysisandImprovementofAuthenticatableRing..> 22-Dec-2014 09:52    381K
374-ChosenCiphertextSecuritywithOptimalCipherte..> 22-Dec-2014 09:51    337K
375-Apublickeyencryptionschemesecureagainstkeyd..> 22-Dec-2014 09:51    275K
376-SessionstateRevealisstrongerthanEphemeralKe..> 22-Dec-2014 09:51    255K
377-TRIVIUM39soutputpartiallyautocancels.pdf       20-Jan-2023 08:37     39K
377-TRIVIUMsoutputpartiallyautocancels.pdf         22-Dec-2014 09:51     39K
378-AdditivelyHomomorphicEncryptionwithdOperand..> 22-Dec-2014 09:51    211K
379-ACharacterizationofChameleonHashFunctionsan..> 22-Dec-2014 09:51    251K
380-DynamicThresholdCryptosystemwithoutGroupMan..> 22-Dec-2014 09:51    194K
381-NewAESsoftwarespeedrecords.pdf                 22-Dec-2014 09:51    154K
382-AuthenticatedWirelessRoamingviaTunnelsMakin..> 22-Dec-2014 09:51    904K
383-HierarchicalIdentityBasedEncryptionwithPoly..> 22-Dec-2014 09:51    321K
383-HierarchicalIdentityBasedEncryptionwithPoly..> 22-Dec-2014 09:51    598K
384-ImprovingtheBonehFranklinTraitorTracingSche..> 22-Dec-2014 09:51    214K
385-CubeAttacksonTweakableBlackBoxPolynomials.pdf  22-Dec-2014 09:51    247K
386-SharedKeyEncryptionbytheStateMachinewithTwo..> 22-Dec-2014 09:51     86K
387-Withdrawn.pdf                                  20-Jan-2023 14:21     207
388-DoubleBaseNumberSystemforMultiScalarMultipl..> 22-Dec-2014 09:51    255K
388-DoubleBaseNumberSystemforMultiScalarMultipl..> 22-Dec-2014 09:51      1M
389-OptimalSubsetDifferenceBroadcastEncryptionw..> 22-Dec-2014 09:51    301K
389-OptimalSubsetDifferenceBroadcastEncryptionw..> 22-Dec-2014 09:51      3M
390-EllipticCurveCryptographyTheSerpentineCours..> 22-Dec-2014 09:51    420K
391-CouldThe1MSBInputDifferenceBeTheFastestColl..> 22-Dec-2014 09:51    306K
392-GUCSecureSetIntersectionComputation.pdf        22-Dec-2014 09:51    517K
393-HowFarMustYouSeeToHearReliably.pdf             22-Dec-2014 09:51    273K
394-AttributeBasedRingSignatures.pdf               22-Dec-2014 09:51    231K
395-NewApplicationsofDifferentialBoundsoftheSDS..> 22-Dec-2014 09:51    212K
396-AnalysisofRC4andProposalofAdditionalLayersf..> 22-Dec-2014 09:51    264K
397-AFrameworkfortheDevelopmentPlayfairCipherCo..> 20-Jan-2023 14:21     207
398-Generatinggenustwohyperellipticcurvesoverla..> 22-Dec-2014 09:51    185K
398-Generatinggenustwohyperellipticcurvesoverla..> 22-Dec-2014 09:51    420K
399-RoundEfficientUnconditionallySecureMultipar..> 22-Dec-2014 09:50    316K
400-Commentsontwopasswordbasedprotocols.pdf        22-Dec-2014 09:50    482K
401-TwoNewEfficientCCASecureOnlineCiphersMHCBCa..> 22-Dec-2014 09:50    290K
402-AlgebraicCryptanalysisofCurryandFlurryusing..> 22-Dec-2014 09:50    250K
403-SPICESimulationofa34ProvablySecure34TrueRan..> 20-Jan-2023 08:37    128K
403-SPICESimulationofaProvablySecureTrueRandomN..> 22-Dec-2014 09:50    128K
404-PairingwithSupersingularTraceZeroVarietiesR..> 22-Dec-2014 09:50    261K
404-PairingwithSupersingularTraceZeroVarietiesR..> 22-Dec-2014 09:50    501K
405-SlidPairsinSalsa20andTrivium.pdf               22-Dec-2014 09:50    199K
406-AnasymptoticallyoptimalRFIDprotocolagainstr..> 22-Dec-2014 09:50    154K
407-IndifferentiableSecurityAnalysisofchoppfMDc..> 22-Dec-2014 09:50    233K
407-IndifferentiableSecurityAnalysisofchoppfMDc..> 22-Dec-2014 09:50    484K
408-TheEnigmatiqueToolkit.pdf                      22-Dec-2014 09:50    124K
409-ANewknThresholdSecretSharingSchemeandItsExt..> 22-Dec-2014 09:50    204K
410-OntheRoleofPKGforProxyReencryptioninIdentit..> 22-Dec-2014 09:50    539K
411-CryptanalysisofLUDecompositionbasedKeyPredi..> 22-Dec-2014 09:50    126K
412-KeyPredistributionforHomogeneousWirelessSen..> 22-Dec-2014 09:50    236K
413-PasswordMistypinginTwoFactorAuthenticatedKe..> 22-Dec-2014 09:50    290K
413-PasswordMistypinginTwoFactorAuthenticatedKe..> 22-Dec-2014 09:50    467K
414-OntheNumberofSynchronousRoundsRequiredforBy..> 22-Dec-2014 09:50    369K
415-AsynchronousMultipartyComputationTheoryandI..> 22-Dec-2014 09:50    236K
416-AlmostAsynchronousMPCwithFaultyMinority.pdf    22-Dec-2014 09:50    243K
417-Onthesecurityofpairingfriendlyabelianvariet..> 22-Dec-2014 09:50    200K
418-PrivacyEnhancingFirstPriceAuctionsUsingRati..> 22-Dec-2014 09:50    323K
419-Parsingambiguitiesinauthenticationandkeyest..> 22-Dec-2014 09:50    149K
419-Parsingambiguitiesinauthenticationandkeyest..> 22-Dec-2014 09:50    282K
420-ObliviousTransferfromWeakNoisyChannels.pdf     22-Dec-2014 09:50    267K
421-TrulyEfficient2RoundPerfectlySecureMessageT..> 22-Dec-2014 09:50    263K
422-ANewApproachforAlgebraicallyHomomorphicEncr..> 22-Dec-2014 09:50    253K
423-Searchableencryptionwithdecryptioninthestan..> 22-Dec-2014 09:50    246K
423-Searchableencryptionwithdecryptioninthestan..> 22-Dec-2014 09:50    315K
424-AsynchronousByzantineAgreementwithOptimalRe..> 22-Dec-2014 09:49    559K
425-EfficientAsynchronousMultipartyComputationw..> 22-Dec-2014 09:49    766K
426-OnKasamiBentFunctions.pdf                      22-Dec-2014 09:49    135K
427-LEGOforTwoPartySecureComputation.pdf           22-Dec-2014 09:49    294K
428-DelegatableAnonymousCredentials.pdf            22-Dec-2014 09:49    375K
429-PublicKeyEncryptionwithEfficientAmortizedUp..> 22-Dec-2014 09:49    254K
430-CryptographicProtocolCompositionviatheAuthe..> 22-Dec-2014 09:49    300K
431-UsableOptimisticFairExchange.pdf               22-Dec-2014 09:49    317K
432-DynamicProvableDataPossession.pdf              22-Dec-2014 09:49    319K
433-Ondifferencesofquadraticresidues.pdf           22-Dec-2014 09:49    294K
434-ThecomputationalSLRalogicforreasoningaboutc..> 22-Dec-2014 09:49    262K
435-Obtainingandsolvingsystemsofequationsinkeyv..> 22-Dec-2014 09:49    206K
435-Obtainingandsolvingsystemsofequationsinkeyv..> 22-Dec-2014 09:49    368K
436-BGKMAnEfficientSecureBroadcastingGroupKeyMa..> 20-Jan-2023 14:21     207
437-DivisibilitySmoothnessandCryptographicAppli..> 22-Dec-2014 09:49    376K
438-NewRelatedKeyBoomerangAttacksonAES.pdf         22-Dec-2014 09:49    389K
439-LinearequivalencebetweenellipticcurvesinWei..> 22-Dec-2014 09:49     55K
440-RobustEncryption.pdf                           22-Dec-2014 09:49    359K
441-HowRiskyistheRandomOracleModel.pdf             22-Dec-2014 09:49    249K
442-FastArithmeticonATmega128forEllipticCurveCr..> 22-Dec-2014 09:49    245K
442-FastArithmeticonATmega128forEllipticCurveCr..> 22-Dec-2014 09:49      1M
443-Keydifferentiationattacksonstreamciphers.pdf   22-Dec-2014 09:49    161K
444-Ellipticdivisibilitysequencesandtheelliptic..> 22-Dec-2014 09:49    119K
444-Ellipticdivisibilitysequencesandtheelliptic..> 22-Dec-2014 09:49    277K
445-CryptanalysisoftheImprovedCellularMessageEn..> 22-Dec-2014 09:49    159K
446-SecureRandomKeyPreDistributionAgainstSemiHo..> 22-Dec-2014 09:49    463K
447-DivisibleOnlineOfflineSignatures.pdf           22-Dec-2014 09:49    261K
447-DivisibleOnlineOfflineSignatures.ps            22-Dec-2014 09:49    467K
448-AuthenticatedAdversarialRouting.pdf            22-Dec-2014 09:48      1M
448-AuthenticatedAdversarialRouting.ps             22-Dec-2014 09:48      2M
449-ANewVariantoftheCramerShoupKEMSecureagainst..> 22-Dec-2014 09:48    185K
450-OntheSecurityofFullyCollusionResistantTrait..> 22-Dec-2014 09:48    224K
451-AlgebraicCryptanalysisofMQQPublicKeyCryptos..> 22-Dec-2014 09:48    148K
452-InjectiveTrapdoorFunctionsareNecessaryandSu..> 20-Jan-2023 14:21     207
453-GeneralizedUniversalCircuitsforSecureEvalua..> 22-Dec-2014 09:48      1M
454-ComplexityofMultipartyComputationProblemsTh..> 22-Dec-2014 09:48    316K
455-Newhashfunctiondesigns.pdf                     22-Dec-2014 09:48    154K
456-TheDiffieHellmanproblemandgeneralizationofV..> 20-Jan-2023 08:37    468K
456-TheDiffieHellmanproblemandgeneralizationofV..> 22-Dec-2014 09:48    468K
457-OntheComposabilityofStatisticallySecureBitC..> 22-Dec-2014 09:48    261K
458-CompleteFairnessinMultiPartyComputationWith..> 22-Dec-2014 09:48    256K
459-AvariantofWiener39sattackonRSA.pdf             20-Jan-2023 08:37    142K
459-AvariantofWienersattackonRSA.pdf               22-Dec-2014 09:48    142K
460-VariousSecurityAnalysisofapfCMMDHashDomainE..> 22-Dec-2014 09:48    311K
460-VariousSecurityAnalysisofapfCMMDHashDomainE..> 22-Dec-2014 09:48    641K
461-OnCommunicationComplexityofPerfectlyReliabl..> 20-Jan-2023 14:21     207
462-UnconditionallySecureMultipartySetIntersect..> 22-Dec-2014 09:48    314K
463-KeyPrivateProxyReEncryption.pdf                22-Dec-2014 09:48    217K
464-VortexANewFamilyofOneWayHashFunctionsbasedo..> 22-Dec-2014 09:48    407K
465-SecureArithmeticComputationwithNoHonestMajo..> 22-Dec-2014 09:48    333K
466-Combinedidentitybasedpublickeyschemes.pdf      22-Dec-2014 09:48    236K
466-Combinedidentitybasedpublickeyschemes.ps       22-Dec-2014 09:48    453K
467-CryptanalysisofEnRUPT.pdf                      22-Dec-2014 09:48    178K
468-ACCA2SecureVariantoftheMcElieceCryptosystem..> 22-Dec-2014 09:48    298K
469-ClassificationandGenerationofDisturbanceVec..> 22-Dec-2014 09:48    123K
469-ClassificationandGenerationofDisturbanceVec..> 22-Dec-2014 09:48    307K
470-FromWeaknessestoSecretDisclosureinaRecentUl..> 22-Dec-2014 09:48      3M
471-AutomaticGenerationofSoundZeroKnowledgeProt..> 22-Dec-2014 09:47    383K
472-PracticalattacksagainstWEPandWPA.pdf           22-Dec-2014 09:47    181K
473-ExploringCipherspaceCombiningstreamciphersa..> 22-Dec-2014 09:47    145K
474-AccessControlsforObliviousandAnonymousSyste..> 22-Dec-2014 09:47    387K
475-SphinxACompactandProvablySecureMixFormat.pdf   22-Dec-2014 09:47    474K
476-TheF_fFamilyofProtocolsforRFIDPrivacyandAut..> 22-Dec-2014 09:47    922K
476-TheF_fFamilyofProtocolsforRFIDPrivacyandAut..> 22-Dec-2014 09:47      7M
477-OnaNewFormalProofModelforRFIDLocationPrivac..> 22-Dec-2014 09:47    131K
478-AttributeBasedEncryptionwithKeyCloningProte..> 22-Dec-2014 09:47    257K
478-AttributeBasedEncryptionwithKeyCloningProte..> 22-Dec-2014 09:47    443K
479-FormalProofofRelativeStrengthsofSecuritybet..> 22-Dec-2014 09:47    138K
480-ECMonGraphicsCards.pdf                         22-Dec-2014 09:47    223K
481-PublicKeyCryptosystemsfromtheWorstCaseShort..> 22-Dec-2014 09:47    250K
481-PublicKeyCryptosystemsfromtheWorstCaseShort..> 22-Dec-2014 09:47    406K
482-TheGenericHardnessofSubsetMembershipProblem..> 22-Dec-2014 09:46    256K
483-SharingDSSbytheChineseRemainderTheorem.pdf     22-Dec-2014 09:46    219K
484-Sharplowerboundsontheextractablerandomnessf..> 22-Dec-2014 09:46    213K
485-FastPointMultiplicationFormulaeonEllipticCu..> 20-Jan-2023 14:21     207
486-InsidetheHypercube.pdf                         22-Dec-2014 09:46    209K
487-SecureCertificatelessPublicKeyEncryptionwit..> 22-Dec-2014 09:46    218K
488-EfficientRationalSecretSharinginStandardCom..> 22-Dec-2014 09:46    296K
489-HAILAHighAvailabilityandIntegrityLayerforCl..> 22-Dec-2014 09:46    674K
490-Onthefinalexponentiationforcalculatingpairi..> 22-Dec-2014 09:46    170K
491-ACMconstructionforcurvesofgenus2withprank1.pdf 22-Dec-2014 09:46    307K
492-ModelingComputationalSecurityinLongLivedSys..> 22-Dec-2014 09:46    342K
493-SecureParametersforSWIFFT.pdf                  22-Dec-2014 09:46    231K
494-KeyAgreementfromCloseSecretsoverUnsecuredCh..> 22-Dec-2014 09:46    229K
494-KeyAgreementfromCloseSecretsoverUnsecuredCh..> 22-Dec-2014 09:46    431K
495-NonMalleableObfuscation.pdf                    22-Dec-2014 09:46    311K
496-ConstructingVariableLengthPRPsandSPRPsfromF..> 22-Dec-2014 09:46    282K
497-OntheCorrectnessofAnApproachAgainstSidechan..> 22-Dec-2014 09:46    141K
498-SmallOddPrimeFieldMultivariatePKCs.pdf         22-Dec-2014 09:46    290K
499-SomeObservationsonHC128.pdf                    22-Dec-2014 09:46    169K
500-StronglySecureAuthenticatedKeyExchangeProto..> 22-Dec-2014 09:46    206K
501-SomeObservationsonSHAMATA.pdf                  22-Dec-2014 09:46     88K
502-ExtendedAccessStructuresandTheirCryptograph..> 22-Dec-2014 09:46    262K
503-NonMalleableExtractorsandSymmetricKeyCrypto..> 22-Dec-2014 09:46    423K
503-NonMalleableExtractorsandSymmetricKeyCrypto..> 22-Dec-2014 09:46    760K
504-ThencUniqueShortestVectorProblemisHard.pdf     22-Dec-2014 09:46    118K
504-ThencUniqueShortestVectorProblemisHard.ps      22-Dec-2014 09:46    261K
505-Withdrawn.pdf                                  20-Jan-2023 08:37    201K
505-removed.pdf                                    22-Dec-2014 09:46    201K
506-UnconditionallySecureMessageTransmissioninA..> 22-Dec-2014 09:46    596K
507-Anondelegatableidentitybasedstrongdesignate..> 22-Dec-2014 09:46    158K
508-SomeFormalSolutionsinSidechannelCryptanalys..> 22-Dec-2014 09:45    775K
509-ChosenCiphertextSecureProxyReEncryptionwith..> 22-Dec-2014 09:45    232K
509-ChosenCiphertextSecureProxyReEncryptionwith..> 22-Dec-2014 09:45    490K
510-ReconstructingRSAPrivateKeysfromRandomKeyBi..> 22-Dec-2014 09:45    269K
511-ClassificationoftheSHA3Candidates.pdf          22-Dec-2014 09:45    153K
512-AnewclassofBentfunctionsinPolynomialForms.pdf  22-Dec-2014 09:45    167K
512-AnewclassofBentfunctionsinPolynomialForms.ps   22-Dec-2014 09:45    225K
513-ImprovedCryptanalysisofSHAMATABC.pdf           22-Dec-2014 09:45     78K
514-NoncommutativePollyCrackertypecryptosystems..> 22-Dec-2014 09:45    180K
514-NoncommutativePollyCrackertypecryptosystems..> 22-Dec-2014 09:45    313K
515-CryptanalysisofRadioGatun.pdf                  22-Dec-2014 09:45    337K
516-DistinguishingandForgeryAttacksonAlredandIt..> 22-Dec-2014 09:45    189K
517-ImprovingtheRulesoftheDPAContest.pdf           22-Dec-2014 09:45     87K
517-ImprovingtheRulesoftheDPAContest.ps            22-Dec-2014 09:45    262K
518-ANEWHASHALGORITHMKhichidi1.pdf                 20-Jan-2023 14:21     207
519-CollisionattackonNaSHA512.pdf                  22-Dec-2014 09:45    883K
520-CryptanalysisoftheHashFunctionLUX256.pdf       22-Dec-2014 09:45    245K
521-GeneratingShorterBasesforHardRandomLattices..> 22-Dec-2014 09:45    327K
522-TwistedEdwardsCurvesRevisited.pdf              22-Dec-2014 09:45    223K
523-PrivacyPreservingMultisetUnionwithElGamalEn..> 20-Jan-2023 14:21     207
524-RoundOptimalZeroKnowledgeProofsofKnowledgef..> 22-Dec-2014 09:45    223K
525-OnTheDiffieHellmanAssumption.pdf               22-Dec-2014 09:45    135K
526-NovelPrecomputationSchemesforEllipticCurveC..> 22-Dec-2014 09:45    213K
527-PropertiesofCryptographicHashFunctions.pdf     22-Dec-2014 09:45    174K
527-PropertiesofCryptographicHashFunctions.ps      22-Dec-2014 09:45    352K
528-EncryptingProofsonPairingsandItsApplication..> 22-Dec-2014 09:45    401K
529-AHardwareInterfaceforHashingAlgorithms.pdf     22-Dec-2014 09:45    412K
530-FasthashingtoG2onpairingfriendlycurves.pdf     22-Dec-2014 09:45    171K
531-CollisionAttackontheWaterfallHashFunction.pdf  22-Dec-2014 09:45    109K
532-SemifreestartcollisionattackonBlender.pdf      22-Dec-2014 09:45     52K
533-CollusionFreeMultipartyComputationintheMedi..> 22-Dec-2014 09:45    299K
534-SomewhatNonCommittingEncryptionandEfficient..> 22-Dec-2014 09:45    917K
535-ARecursiveThresholdVisualCryptographyScheme..> 22-Dec-2014 09:44    122K
536-PredicatePrivacyinEncryptionSystems.pdf        22-Dec-2014 09:44    321K
536-PredicatePrivacyinEncryptionSystems.ps         22-Dec-2014 09:44    568K
537-ASecureThresholdAnonymousPasswordAuthentica..> 22-Dec-2014 09:44    335K
538-SupportingNonmembershipProofswithBilinearma..> 22-Dec-2014 09:44     69K
539-AnAccumulatorBasedonBilinearMapsandEfficien..> 22-Dec-2014 09:44    277K
540-NewImpossibleDifferentialAttacksonAES.pdf      22-Dec-2014 09:44    240K
541-ResettablySoundResettableZeroKnowledgeArgum..> 22-Dec-2014 09:44    505K
542-DistinguishingAttackandSecondPreimageAttack..> 22-Dec-2014 09:44    194K
543-OddCharMultivariateHiddenFieldEquations.pdf    22-Dec-2014 09:44    421K
544-Commentsontwomultiserverauthenticationproto..> 22-Dec-2014 09:44    400K
545-ResolvingtheSimultaneousResettabilityConjec..> 22-Dec-2014 09:44    308K