Index of /2008/
../
001-SecurityProoffortheImprovedRyuYoonYooIdenti..> 22-Dec-2014 10:07 236K
001-SecurityProoffortheImprovedRyuYoonYooIdenti..> 22-Dec-2014 10:07 444K
002-FuzzyIdentityBasedSignature.pdf 22-Dec-2014 10:06 175K
003-OnCollisionsofHashFunctionsTurboSHA2.pdf 22-Dec-2014 10:06 229K
004-EfficientTweakableEncipheringSchemesfromBlo..> 22-Dec-2014 10:06 376K
005-InformationTheoreticEvaluationofSideChannel..> 22-Dec-2014 10:06 224K
005-InformationTheoreticEvaluationofSideChannel..> 22-Dec-2014 10:06 660K
006-JointStateTheoremsforPublicKeyEncryptionand..> 22-Dec-2014 10:06 930K
007-EfficientOneroundKeyExchangeintheStandardMo..> 22-Dec-2014 10:06 338K
008-FactoringPolynomialsforConstructingPairingf..> 22-Dec-2014 10:06 74K
008-FactoringPolynomialsforConstructingPairingf..> 22-Dec-2014 10:06 147K
009-GenericAttacksfortheXorofkrandompermutation..> 22-Dec-2014 10:06 378K
010-AProofofSecurityinO2nfortheXorofTwoRandomPe..> 22-Dec-2014 10:06 482K
010-AProofofSecurityinO2nfortheXorofTwoRandomPe..> 20-Jan-2023 08:38 515K
011-AsimplegeneralizationoftheElGamalcryptosyst..> 22-Dec-2014 10:06 207K
012-TheEncryptedEllipticCurveHash.pdf 22-Dec-2014 10:06 236K
013-TwistedEdwardsCurves.pdf 22-Dec-2014 10:06 222K
014-SimulatableAdaptiveObliviousTransfer.pdf 22-Dec-2014 10:06 339K
014-SimulatableAdaptiveObliviousTransfer.ps 22-Dec-2014 10:06 602K
015-PracticalShortSignatureBatchVerification.pdf 22-Dec-2014 10:06 356K
016-ECMusingEdwardscurves.pdf 22-Dec-2014 10:06 903K
017-NewStateRecoveryAttackonRC4.pdf 22-Dec-2014 10:06 437K
017-NewStateRecoveryAttackonRC4.ps 22-Dec-2014 10:06 6M
018-DisjunctiveMultiLevelSecretSharing.pdf 22-Dec-2014 10:06 189K
019-ComputingPairingsUsingxCoordinatesOnly.pdf 22-Dec-2014 10:05 198K
019-ComputingPairingsUsingxCoordinatesOnly.ps 22-Dec-2014 10:05 405K
020-CCA2SecureIBEStandardModelEfficiencythrough..> 22-Dec-2014 10:05 387K
021-BlockCiphersImplementationsProvablySecureAg..> 22-Dec-2014 10:05 301K
022-ComputingAlmostExactProbabilitiesofDifferen..> 22-Dec-2014 10:05 257K
023-GeneralCertificatelessEncryptionandTimedRel..> 22-Dec-2014 10:05 289K
023-GeneralCertificatelessEncryptionandTimedRel..> 22-Dec-2014 10:05 523K
024-IdentityBasedStrongBiDesignatedVerifierProx..> 22-Dec-2014 10:05 67K
025-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05 202K
025-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05 370K
026-PairingfriendlyHyperellipticCurveswithOrdin..> 22-Dec-2014 10:05 142K
027-BlindSignatureSchemeoverBraidGroups.pdf 22-Dec-2014 10:05 66K
028-HBIncreasingtheSecurityandEfficiencyofHB.pdf 22-Dec-2014 10:05 307K
028-HBIncreasingtheSecurityandEfficiencyofHB.ps 22-Dec-2014 10:05 908K
029-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05 246K
029-NonCyclicSubgroupsofJacobiansofGenusTwoCurv..> 22-Dec-2014 10:05 435K
030-DetectionofAlgebraicManipulationwithApplica..> 22-Dec-2014 10:05 233K
030-DetectionofAlgebraicManipulationwithApplica..> 22-Dec-2014 10:05 396K
031-AuthenticatingwithAttributes.pdf 22-Dec-2014 10:05 214K
032-Merkle39sKeyAgreementProtocolisOptimalAnOn2..> 20-Jan-2023 08:38 584K
032-MerklePuzzlesareOptimal.pdf 22-Dec-2014 10:05 272K
032-MerklePuzzlesareOptimal.ps 22-Dec-2014 10:05 515K
033-LowerBoundsonSignaturesFromSymmetricPrimiti..> 22-Dec-2014 10:05 382K
034-PerfectlyHidingCommitmentSchemewithTwoRound..> 22-Dec-2014 10:05 154K
034-PerfectlyHidingCommitmentSchemewithTwoRound..> 22-Dec-2014 10:05 310K
035-EfficientFullySimulatableObliviousTransfer.pdf 22-Dec-2014 10:05 288K
035-EfficientFullySimulatableObliviousTransfer.ps 22-Dec-2014 10:05 287K
036-GenericAttacksonFeistelSchemes.pdf 22-Dec-2014 10:05 208K
037-AnonymousConsecutiveDelegationofSigningRigh..> 22-Dec-2014 10:05 253K
037-AnonymousConsecutiveDelegationofSigningRigh..> 22-Dec-2014 10:05 503K
038-ANewBlindIdentityBasedSignatureSchemewithMe..> 22-Dec-2014 10:05 105K
039-NewResultsonUnconditionallySecureMultirecei..> 22-Dec-2014 10:05 316K
040-EfficientandGeneralizedPairingComputationon..> 22-Dec-2014 10:05 270K
041-ANewProxyIdentityBasedSigncryptionSchemefor..> 22-Dec-2014 10:04 81K
042-TrustedHBalowcostversionofHBsecureagainstMa..> 22-Dec-2014 10:04 147K
043-CryptanalysisofCRUSHhashstructure.pdf 22-Dec-2014 10:04 180K
044-UnidirectionalKeyDistributionAcrossTimeandS..> 22-Dec-2014 10:04 279K
045-ThresholdRSAforDynamicandAdHocGroups.pdf 22-Dec-2014 10:04 230K
046-DavidandGoliathCommitmentsUCComputationforA..> 22-Dec-2014 10:04 251K
046-DavidandGoliathCommitmentsUCComputationforA..> 22-Dec-2014 10:04 895K
047-FairTraceableMultiGroupSignatures.pdf 22-Dec-2014 10:04 356K
047-FairTraceableMultiGroupSignatures.ps 22-Dec-2014 10:04 640K
048-ImprovedCryptanalysisofAPOPMD4andNMACMD4usi..> 22-Dec-2014 10:04 219K
049-AnEfficientProtocolforSecureTwoPartyComputa..> 22-Dec-2014 10:04 533K
050-MultiPKGIDbasedsigncryption.pdf 22-Dec-2014 10:04 176K
051-NewCompositeOperationsandPrecomputationSche..> 22-Dec-2014 10:04 1M
052-NewMultibaseNonAdjacentFormScalarMultiplica..> 22-Dec-2014 10:04 393K
053-BreakingOneRoundKeyAgreementProtocolsintheR..> 22-Dec-2014 10:04 108K
054-VariantsoftheDistinguishedPointMethodforCry..> 22-Dec-2014 10:04 193K
054-VariantsoftheDistinguishedPointMethodforCry..> 22-Dec-2014 10:04 387K
055-cryptanalysisandImprovementofaRecentlyPropo..> 20-Jan-2023 14:21 207
056-Fastexplicitformulaeforgenus2hyperellipticc..> 22-Dec-2014 10:04 140K
057-SoftwareImplementationofGenus2Hyperelliptic..> 22-Dec-2014 10:04 209K
058-PhysicalCryptanalysisofKeeLoqCodeHoppingApp..> 22-Dec-2014 10:04 907K
059-Buyingrandomvotesisashardasbuyingnovotes.pdf 22-Dec-2014 10:04 181K
060-FastAlgorithmsforArithmeticonEllipticCurves..> 22-Dec-2014 10:04 725K
061-Abelianvarietieswithprescribedembeddingdegr..> 22-Dec-2014 10:04 199K
062-ComputingHilbertClassPolynomials.pdf 22-Dec-2014 10:04 198K
063-EfficientSequentialAggregateSignedData.pdf 22-Dec-2014 10:04 330K
063-EfficientSequentialAggregateSignedData.ps 22-Dec-2014 10:04 944K
064-RemarksontheNFScomplexity.pdf 22-Dec-2014 10:03 217K
065-InfringingandImprovingPasswordSecurityofaTh..> 22-Dec-2014 10:03 152K
065-InfringingandImprovingPasswordSecurityofaTh..> 22-Dec-2014 10:03 131K
066-HighPerformanceArchitectureforEllipticCurve..> 22-Dec-2014 10:03 241K
067-TheTwinDiffieHellmanProblemandApplications.pdf 22-Dec-2014 10:03 387K
068-MultipartyComputationGoesLive.pdf 22-Dec-2014 10:03 328K
069-HENKOSCryptanalysisRelatedkeysattack.pdf 22-Dec-2014 10:03 78K
070-GeneratorsofJacobiansofGenusTwoCurves.pdf 22-Dec-2014 10:03 235K
070-GeneratorsofJacobiansofGenusTwoCurves.ps 22-Dec-2014 10:03 417K
071-BlockcipherBasedHashingRevisited.pdf 22-Dec-2014 10:03 265K
072-TheSIPSecurityEnhancedbyUsingPairingassiste..> 22-Dec-2014 10:03 548K
073-CompactProofsofRetrievability.pdf 22-Dec-2014 10:03 627K
074-OntheChikazawaInoueIDbasedkeysystem.pdf 22-Dec-2014 10:03 101K
075-OntheStrengthoftheConcatenatedHashCombinerw..> 22-Dec-2014 10:03 217K
075-OntheStrengthoftheConcatenatedHashCombinerw..> 22-Dec-2014 10:03 498K
076-ResultsfromaSearchfortheBestLinearApproxima..> 22-Dec-2014 10:03 42K
077-NonlinearPieceInHandMatrixMethodforEnhancin..> 22-Dec-2014 10:03 203K
078-AShortProofofthePRPPRFSwitchingLemma.pdf 22-Dec-2014 10:03 73K
078-AShortProofofthePRPPRFSwitchingLemma.ps 22-Dec-2014 10:03 200K
079-HomomorphicEncryptionwithCCASecurity.pdf 22-Dec-2014 10:03 354K
080-PairingBasedOnionRoutingwithImprovedForward..> 22-Dec-2014 10:03 280K
081-TemplateAttacksonECDSA.pdf 22-Dec-2014 10:03 320K
082-ImprovingtheFarnelThreeballotandRandellRyan..> 22-Dec-2014 10:03 297K
083-OntheSecurityofChien39sUltralightweightRFID..> 20-Jan-2023 08:37 106K
083-OntheSecurityofChiensUltralightweightRFIDAu..> 22-Dec-2014 10:03 106K
084-IDbasedgeneralizedsigncryption.pdf 22-Dec-2014 10:03 567K
085-AllPairingsAreinaGroup.pdf 22-Dec-2014 10:03 170K
086-EfficientPerfectlyReliableandSecureCommunic..> 22-Dec-2014 10:03 310K
087-TowardsaTheoryofWhiteBoxSecurity.pdf 22-Dec-2014 10:03 168K
088-APublicKeyEncryptionInStandardModelUsingCra..> 22-Dec-2014 10:03 195K
089-AnimprovedpreimageattackonMD2.pdf 22-Dec-2014 10:03 164K
090-ImprovinguponHCTRandmatchingattacksforHashC..> 22-Dec-2014 10:02 249K
091-AGenericMethodtoExtendMessageSpaceofaStrong..> 22-Dec-2014 10:02 181K
092-AnEfficientSPRPsecureConstructionbasedonPse..> 22-Dec-2014 10:02 231K
093-NewIDbasedFairBlindSignatures.pdf 22-Dec-2014 10:02 65K
094-UniversallyComposableUndeniableSignature.pdf 22-Dec-2014 10:02 209K
095-StronglyUnforgeableIDbasedSignaturesWithout..> 22-Dec-2014 10:02 215K
095-StronglyUnforgeableIDbasedSignaturesWithout..> 22-Dec-2014 10:02 476K
096-OptimalPairings.pdf 22-Dec-2014 10:02 182K
096-OptimalPairings.ps 22-Dec-2014 10:02 392K
097-FairnesswithanHonestMinorityandaRationalMaj..> 22-Dec-2014 10:02 280K
097-FairnesswithanHonestMinorityandaRationalMaj..> 22-Dec-2014 10:02 454K
098-OnSecurityNotionsforVerifiableEncryptedSign..> 22-Dec-2014 10:02 168K
099-TheEllipticCurveDiscreteLogarithmProblemand..> 22-Dec-2014 10:02 212K
099-TheEllipticCurveDiscreteLogarithmProblemand..> 22-Dec-2014 10:02 424K
100-AcceleratingtheScalarMultiplicationonEllipt..> 22-Dec-2014 10:02 2M
101-ProbabilisticVerifiableSecretSharingTolerat..> 20-Jan-2023 14:21 207
102-DegradationandAmplificationofComputationalH..> 22-Dec-2014 10:02 229K
102-DegradationandAmplificationofComputationalH..> 22-Dec-2014 10:02 456K
103-IdentityBasedProxyReencryptionSchemeswithMu..> 20-Jan-2023 14:21 207
104-SimplifiedSecurityNotionsofDirectAnonymousA..> 22-Dec-2014 10:02 249K
104-SimplifiedSecurityNotionsofDirectAnonymousA..> 22-Dec-2014 10:02 458K
105-CryptanalysisofWhiteBoxImplementations.pdf 22-Dec-2014 10:02 223K
105-CryptanalysisofWhiteBoxImplementations.ps 22-Dec-2014 10:02 206K
106-KnapsackcryptosystemsbuiltonNPhardinstances..> 22-Dec-2014 10:02 227K
106-KnapsackcryptosystemsbuiltonNPhardinstances.ps 22-Dec-2014 10:02 408K
107-PrivateBranchingProgramsOnCommunicationEffi..> 22-Dec-2014 10:02 326K
108-NewDifferentialAlgebraicAttacksandReparamet..> 22-Dec-2014 10:02 335K
109-CollisionsforRoundReducedLAKE.pdf 22-Dec-2014 10:02 223K
110-OntheDesignofSecureandFastDoubleBlockLength..> 20-Jan-2023 14:21 207
111-THEDESIGNOFBOOLEANFUNCTIONSBYMODIFIEDHILLCL..> 22-Dec-2014 10:02 236K
112-DemocraticGroupSignatureswithThresholdTrace..> 22-Dec-2014 10:02 245K
113-OpenSourceIsNotEnoughAttackingtheECpackageo..> 22-Dec-2014 10:02 100K
114-ScalableandEfficientProvableDataPossession.pdf 22-Dec-2014 10:02 330K
115-AComparisonBetweenHardwareAcceleratorsforth..> 22-Dec-2014 10:02 318K
116-ChosenCiphertextSecurityviaCorrelatedProduc..> 22-Dec-2014 10:02 327K
116-ChosenCiphertextSecurityviaCorrelatedProduc..> 22-Dec-2014 10:01 990K
117-Exponentiationinpairingfriendlygroupsusingh..> 22-Dec-2014 10:01 205K
118-SettingSpeedRecordswiththeFractionalMultiba..> 22-Dec-2014 10:01 317K
119-LinearBandwidthNaccacheSternEncryption.pdf 22-Dec-2014 10:01 242K
120-Publickeyencryptionandencryptionemulationat..> 22-Dec-2014 10:01 135K
121-Newproofsforoldmodes.pdf 22-Dec-2014 10:01 319K
121-Newproofsforoldmodes.ps 22-Dec-2014 10:01 503K
122-TinyECCKEfficientEllipticCurveCryptographyI..> 22-Dec-2014 10:01 324K
123-SecureAdiabaticLogicaLowEnergyDPAResistantL..> 22-Dec-2014 10:01 2M
124-ASimpleDerivationfortheFrobeniusPseudoprime..> 22-Dec-2014 10:01 85K
125-PairingLattices.pdf 22-Dec-2014 10:01 223K
126-MachineLearningAttacksAgainsttheASIRRACAPTC..> 22-Dec-2014 10:01 188K
127-APipelinedKaratsubaOfmanMultiplieroverGF397..> 22-Dec-2014 10:01 524K
128-AChosenIVAttackUsingPhaseShiftingEquivalent..> 22-Dec-2014 10:01 198K
128-AChosenIVAttackUsingPhaseShiftingEquivalent..> 22-Dec-2014 10:01 462K
129-ControllingaccesstopersonaldatathroughAccre..> 22-Dec-2014 10:01 292K
130-AnalysisofStepReducedSHA256.pdf 22-Dec-2014 10:01 257K
130-AnalysisofStepReducedSHA256.ps 22-Dec-2014 10:01 572K
131-CollisionsandotherNonRandomPropertiesforSte..> 22-Dec-2014 10:01 243K
131-CollisionsandotherNonRandomPropertiesforSte..> 22-Dec-2014 10:01 467K
132-AFrameworkfortheSoundSpecificationofCryptog..> 22-Dec-2014 10:01 1M
133-Thearithmeticofcharacteristic2Kummersurface..> 22-Dec-2014 10:01 220K
134-EfficientLossyTrapdoorFunctionsbasedontheCo..> 22-Dec-2014 10:01 99K
134-EfficientLossyTrapdoorFunctionsbasedontheCo..> 22-Dec-2014 10:01 255K
135-UnbalancedDigitSetsandtheClosestChoiceStrat..> 22-Dec-2014 10:01 313K
135-UnbalancedDigitSetsandtheClosestChoiceStrat..> 22-Dec-2014 10:01 642K
136-ConstantSizeDynamickTAA.pdf 22-Dec-2014 10:01 251K
137-MoreDiscriminantswiththeBrezingWengMethod.pdf 22-Dec-2014 10:00 163K
138-ObliviousTransferBasedontheMcElieceAssumpti..> 22-Dec-2014 10:00 125K
139-ChosenCiphertextSecureFuzzyIdentityBasedKey..> 22-Dec-2014 10:00 168K
140-ReducingComplexityAssumptionsforObliviousTr..> 22-Dec-2014 10:00 291K
141-UnconditionallyReliableandSecureMessageTran..> 22-Dec-2014 10:00 673K
142-AttackingReducedRoundSHA256.pdf 22-Dec-2014 10:00 241K
143-CertificatelessSigncryption.pdf 22-Dec-2014 10:00 243K
143-CertificatelessSigncryption.ps 22-Dec-2014 10:00 428K
144-ANoteonDifferentialPrivacyDefiningResistanc..> 22-Dec-2014 10:00 135K
144-ANoteonDifferentialPrivacyDefiningResistanc..> 22-Dec-2014 10:00 256K
145-FastMultiplePointMultiplicationonEllipticCu..> 22-Dec-2014 10:00 333K
146-DynamicSHA2.pdf 22-Dec-2014 10:00 239K
147-ARealWorldAttackBreakingA51withinHours.pdf 22-Dec-2014 10:00 235K
148-RedundanttauadicExpansionsINonAdjacentDigit..> 22-Dec-2014 10:00 466K
149-ToyFactoringbyNewton39sMethod.pdf 20-Jan-2023 14:21 207
149-ToyFactoringbyNewtonsMethod.pdf 22-Dec-2014 10:00 80K
149-ToyFactoringbyNewtonsMethod.ps 22-Dec-2014 10:00 187K
150-RobustCombinersforSoftwareHardening.pdf 22-Dec-2014 10:00 546K
151-ImpossibleDifferentialCryptanalysisofCLEFIA..> 20-Jan-2023 14:21 207
152-Computationalsoundnessofsymboliczeroknowled..> 22-Dec-2014 10:00 941K
153-RedundanttauadicExpansionsIINonOptimalityan..> 22-Dec-2014 10:00 233K
154-TheWalshSpectrumofaNewFamilyofAPNFunctions.pdf 20-Jan-2023 14:21 207
155-AGeneralizedBrezingWengAlgorithmforConstruc..> 22-Dec-2014 10:00 255K
156-OnBlackBoxRingExtractionandIntegerFactoriza..> 22-Dec-2014 10:00 287K
157-SecureOnlineElectionsinPractice.pdf 22-Dec-2014 10:00 146K
158-DISHDistributedSelfHealinginUnattendedSenso..> 22-Dec-2014 10:00 311K
158-DISHDistributedSelfHealinginUnattendedSenso..> 22-Dec-2014 10:00 828K
159-Anoninteractivedeniableauthenticationscheme..> 22-Dec-2014 10:00 92K
160-AProxySignatureSchemeoverBraidGroups.pdf 22-Dec-2014 10:00 65K
161-Modularpolynomialsforgenus2.pdf 22-Dec-2014 10:00 186K
162-FormallyBoundingtheSideChannelLeakageinUnkn..> 22-Dec-2014 10:00 273K
163-UniversallyComposableAdaptiveObliviousTrans..> 22-Dec-2014 10:00 556K
164-OntheImPossibilityofKeyDependentEncryption.pdf 22-Dec-2014 09:59 320K
165-Improvedlowerboundonthenumberofbalancedsymm..> 22-Dec-2014 09:59 88K
166-AlgebraicAttacksontheCrypto1StreamCipherinM..> 22-Dec-2014 09:59 58K
166-AlgebraicAttacksontheCrypto1StreamCipherinM..> 22-Dec-2014 09:59 155K
167-NonblackboxTechniquesAreNotNecessaryforCons..> 22-Dec-2014 09:59 368K
168-Possibilityandimpossibilityresultsforselect..> 22-Dec-2014 09:59 565K
168-Possibilityandimpossibilityresultsforselect..> 22-Dec-2014 09:59 787K
169-UnderstandingPhaseShiftingEquivalentKeysand..> 22-Dec-2014 09:59 80K
169-UnderstandingPhaseShiftingEquivalentKeysand..> 22-Dec-2014 09:59 206K
170-CryptanalysingtheCriticalGroupEfficientlySo..> 20-Jan-2023 08:37 109K
170-CryptanalysingtheCriticalGroupEfficientlySo..> 22-Dec-2014 09:59 109K
171-BinaryEdwardsCurves.pdf 22-Dec-2014 09:59 239K
172-TheRoundComplexityofVerifiableSecretSharing..> 22-Dec-2014 09:59 263K
173-FullCryptanalysisofLPSandMorgensternHashFun..> 22-Dec-2014 09:59 228K
174-NonLinearReducedRoundAttacksAgainstSHA2Hash..> 22-Dec-2014 09:59 220K
174-NonLinearReducedRoundAttacksAgainstSHA2Hash..> 22-Dec-2014 09:59 750K
175-ProofsofRetrievabilityTheoryandImplementati..> 22-Dec-2014 09:59 396K
176-NewconstructionofBooleanfunctionswithmaximu..> 22-Dec-2014 09:59 160K
177-AlgebraicTechniquesinDifferentialCryptanaly..> 22-Dec-2014 09:59 214K
178-OptimalDiscretizationforHighEntropyGraphica..> 22-Dec-2014 09:59 192K
179-AnEfficientIDbasedRingSignatureSchemefromPa..> 20-Jan-2023 14:21 207
180-Imaginaryquadraticorderswithgivenprimefacto..> 22-Dec-2014 09:59 71K
181-ProofsofKnowledgewithSeveralChallengeValues..> 22-Dec-2014 09:59 197K
182-RestrictedAdaptiveObliviousTransfer.pdf 22-Dec-2014 09:59 294K
183-PreimageAttackson3PassHAVALandStepReducedMD..> 22-Dec-2014 09:59 229K
184-OntheSecureObfuscationofDeterministicFinite..> 22-Dec-2014 09:59 408K
185-ANewApproachtoSecureLogging.pdf 22-Dec-2014 09:59 212K
185-ANewApproachtoSecureLogging.ps 22-Dec-2014 09:59 3M
186-PrivacyPreservingAuditandExtractionofDigita..> 22-Dec-2014 09:59 220K
187-AnEfficientandProvablySecureIDBasedThreshol..> 22-Dec-2014 09:59 129K
187-AnEfficientandProvablySecureIDBasedThreshol..> 22-Dec-2014 09:59 233K
188-InformationLeakageofFlipFlopsinDPAResistant..> 22-Dec-2014 09:59 3M
189-HowtoBuildaHashFunctionfromanyCollisionResi..> 22-Dec-2014 09:58 385K
190-UserSureandSafeKeyRetrieval.pdf 22-Dec-2014 09:58 180K
190-UserSureandSafeKeyRetrieval.ps 22-Dec-2014 09:58 352K
191-None.pdf 20-Jan-2023 14:21 207
192-InvestigatingtheDPAResistancePropertyofChar..> 22-Dec-2014 09:58 2M
193-ATamperEvidentVotingMachineResistanttoCover..> 20-Jan-2023 14:21 207
194-Endomorphismsforfasterellipticcurvecryptogr..> 22-Dec-2014 09:58 274K
195-AnEfficientandProvablySecureIdentitybasedSi..> 22-Dec-2014 09:58 275K
196-ANewFamilyofPerfectNonlinearBinomials.pdf 22-Dec-2014 09:58 138K
196-ANewFamilyofPerfectNonlinearBinomials.ps 22-Dec-2014 09:58 293K
197-SecureMultipartyComputationforPrivacyPreser..> 22-Dec-2014 09:58 306K
198-Securityneedsinembeddedsystems.pdf 22-Dec-2014 09:58 177K
199-SimultaneousfielddivisionsanextensionofMont..> 20-Jan-2023 08:37 520K
199-SimultaneousfielddivisionsanextensionofMont..> 22-Dec-2014 09:58 520K
200-OnTheSecurityofTheElGamalEncryptionSchemean..> 22-Dec-2014 09:58 187K
201-HowToEnsureForwardandBackwardUntraceability..> 22-Dec-2014 09:58 123K
202-PolynomialsforAtePairingandmathbfAte_iPairi..> 22-Dec-2014 09:58 76K
202-PolynomialsforAtePairingandmathbfAte_iPairi..> 22-Dec-2014 09:58 171K
203-PrivacyPreservingMatchingofDNAProfiles.pdf 22-Dec-2014 09:58 119K
204-CryptanalysisoftheCaiCusickLatticebasedPubl..> 22-Dec-2014 09:58 169K
205-OnSoftwareParallelImplementationofCryptogra..> 22-Dec-2014 09:58 183K
205-OnSoftwareParallelImplementationofCryptogra..> 22-Dec-2014 09:58 441K
206-PartialFairnessinSecureTwoPartyComputation.pdf 22-Dec-2014 09:58 274K
207-EfficientReceiptFreeBallotCastingResistantt..> 22-Dec-2014 09:58 319K
208-RemarksontheAttackofFouqueetalagainsttheell..> 22-Dec-2014 09:58 163K
208-RemarksontheAttackofFouqueetalagainsttheell..> 22-Dec-2014 09:58 344K
209-ComputingBilinearPairingsonEllipticCurveswi..> 22-Dec-2014 09:58 118K
210-ComplexityAnalysisofaFastModularMultiexpone..> 22-Dec-2014 09:58 194K
211-EfficientChosenCiphertextSecurePublicKeyEnc..> 22-Dec-2014 09:58 390K
212-ReducingtheComplexityoftheWeilPairingComput..> 22-Dec-2014 09:58 102K
213-TheMultireceiverCommitmentSchemes.pdf 22-Dec-2014 09:58 224K
214-MultiFactorPasswordAuthenticatedKeyExchange..> 22-Dec-2014 09:58 403K
215-OnImplementationofGHSAttackagainstEllipticC..> 22-Dec-2014 09:57 202K
216-ANewMultiLinearUniversalHashFamily.pdf 22-Dec-2014 09:57 411K
217-OracleAssistedStaticDiffieHellmanIsEasierTh..> 22-Dec-2014 09:57 286K
218-Efficientarithmeticonellipticcurvesusingami..> 22-Dec-2014 09:57 135K
219-AnalysisandDetailsoftheRandomCipherOutputMo..> 20-Jan-2023 14:21 207
220-EssentiallyOptimalUniversallyComposableObli..> 22-Dec-2014 09:57 134K
220-EssentiallyOptimalUniversallyComposableObli..> 22-Dec-2014 09:57 224K
221-EfficientConversionofSecretsharedValuesBetw..> 22-Dec-2014 09:57 128K
222-EncryptionOnDemandPracticalandTheoreticalCo..> 22-Dec-2014 09:57 237K
223-OntheSecurityofaVisualCryptographySchemefor..> 22-Dec-2014 09:57 4M
224-AnIDbasedAuthenticatedKeyExchangeProtocolBa..> 22-Dec-2014 09:57 226K
225-ProvablySecureIDBasedBroadcastSigncryptionI..> 22-Dec-2014 09:57 259K
225-ProvablySecureIDBasedBroadcastSigncryptionI..> 22-Dec-2014 09:57 471K
226-ProxyKeyReencapsulationMechanismforGroupCom..> 22-Dec-2014 09:57 133K
227-NewImpossibleDifferentialCryptanalysisofARI..> 22-Dec-2014 09:57 263K
227-NewImpossibleDifferentialCryptanalysisofARI..> 22-Dec-2014 09:57 2M
228-RevisitingWiener39sAttackNewWeakKeysinRSA.pdf 20-Jan-2023 08:37 341K
228-RevisitingWienersAttackNewWeakKeysinRSA.pdf 22-Dec-2014 09:57 341K
229-IdentificationandPrivacyZeroKnowledgeisnotE..> 22-Dec-2014 09:57 434K
230-ANewCollisionDifferentialForMD5WithItsFullD..> 22-Dec-2014 09:57 296K
231-ANovelProbabilisticPassiveAttackontheProtoc..> 22-Dec-2014 09:57 120K
232-PerfectlySecureMessageTransmissionToleratin..> 22-Dec-2014 09:57 722K
233-OnResettablySoundResttableZeroKnowledegeArg..> 20-Jan-2023 14:21 207
234-OntheCCA1SecurityofElgamalandDamgaardsElgam..> 22-Dec-2014 09:57 231K
234-OntheCCA1SecurityofElgamalandDamgrd39sElgam..> 20-Jan-2023 08:37 231K
235-ConstantRoundConcurrentNonMalleableCommitme..> 22-Dec-2014 09:57 339K
236-AModularSecurityAnalysisoftheTLSHandshakePr..> 22-Dec-2014 09:57 338K
237-LocalAffinityBasedInversionofFilterGenerato..> 22-Dec-2014 09:57 172K
238-OntheProvableSecurityofMultiReceiverSigncry..> 22-Dec-2014 09:56 254K
238-OntheProvableSecurityofMultiReceiverSigncry..> 22-Dec-2014 09:56 488K
239-RecognitioninAdHocPervasiveNetworks.pdf 22-Dec-2014 09:56 189K
240-LeakageResilientCryptographyintheStandardMo..> 22-Dec-2014 09:56 265K
241-PracticalAttacksonHBandHBProtocols.pdf 22-Dec-2014 09:56 119K
242-EnumerationofHomogeneousRotationSymmetricfu..> 20-Jan-2023 14:21 207
243-Ontheeconomicpayoffofforensicsystemswhenuse..> 22-Dec-2014 09:56 116K
244-NewbalancedBooleanfunctionssatisfyingallthe..> 22-Dec-2014 09:56 169K
245-CryptanalysisofanAuthenticationSchemeUsingT..> 22-Dec-2014 09:56 89K
245-CryptanalysisofanAuthenticationSchemeUsingT..> 22-Dec-2014 09:56 232K
246-TheRandomOracleModelandtheIdealCipherModela..> 22-Dec-2014 09:56 301K
247-CryptanalysisofBohioetal39sIDBasedBroadcast..> 20-Jan-2023 08:37 272K
247-CryptanalysisofBohioetalsIDBasedBroadcastSi..> 22-Dec-2014 09:56 165K
247-CryptanalysisofBohioetalsIDBasedBroadcastSi..> 22-Dec-2014 09:56 292K
248-Cryptanalysisofaclienttoclientpasswordauthe..> 22-Dec-2014 09:56 134K
249-ConstructionofResilientFunctionswithMultipl..> 20-Jan-2023 14:21 207
250-Pairingsonhyperellipticcurveswitharealmodel..> 22-Dec-2014 09:56 223K
251-UniversallyComposableSecurityAnalysisofTLSS..> 22-Dec-2014 09:56 451K
252-ProvableSecurityofDigitalSignaturesintheTam..> 22-Dec-2014 09:56 166K
252-ProvableSecurityofDigitalSignaturesintheTam..> 22-Dec-2014 09:56 151K
253-MultiRecipientSigncryptionforSecureWireless..> 22-Dec-2014 09:56 131K
254-AnEfficientIdentitybasedRingSigncryptionSch..> 22-Dec-2014 09:56 134K
255-EmbeddinginTwoLeastSignificantBitswithWetPa..> 22-Dec-2014 09:56 162K
256-ONMIDDLEUNIVERSALWEAKANDCROSSINVERSEPROPERT..> 22-Dec-2014 09:56 143K
257-ONMIDDLEUNIVERSALmINVERSEQUASIGROUPSANDTHEI..> 22-Dec-2014 09:56 149K
258-ONACRYPTOGRAPHICIDENTITYINOSBORNLOOPS.pdf 22-Dec-2014 09:56 145K
259-2AdicComplexityofaSequenceObtainedfromaPeri..> 22-Dec-2014 09:56 151K
260-BreakingRSAGenericallyisEquivalenttoFactori..> 22-Dec-2014 09:56 326K
261-TheHiddenRootProblem.pdf 22-Dec-2014 09:56 167K
261-TheHiddenRootProblem.ps 22-Dec-2014 09:56 363K
262-StatisticallyReliableandSecureMessageTransm..> 22-Dec-2014 09:56 584K
263-SlideAttacksonaClassofHashFunctions.pdf 22-Dec-2014 09:56 238K
263-SlideAttacksonaClassofHashFunctions.ps 22-Dec-2014 09:56 3M
264-SecureComputabilityofFunctionsintheITsettin..> 22-Dec-2014 09:56 469K
265-EfficientHyperellipticArithmeticusingBalanc..> 22-Dec-2014 09:56 212K
266-InformationTheoreticallySecureVotingWithout..> 22-Dec-2014 09:55 187K
267-DeterministicEncryptionDefinitionalEquivale..> 22-Dec-2014 09:55 264K
268-AdaptiveSecurityinBroadcastEncryptionSystem..> 22-Dec-2014 09:55 247K
269-SearchingforLowWeightCodewordsinLinearBinar..> 22-Dec-2014 09:55 106K
269-SearchingforLowWeightCodewordsinLinearBinar..> 22-Dec-2014 09:55 244K
270-NewCollisionattacksAgainstUpTo24stepSHA2.pdf 22-Dec-2014 09:55 268K
270-NewCollisionattacksAgainstUpTo24stepSHA2.ps 22-Dec-2014 09:55 542K
271-ACombinatorialAnalysisofRecentAttacksonStep..> 22-Dec-2014 09:55 360K
271-ACombinatorialAnalysisofRecentAttacksonStep..> 22-Dec-2014 09:55 677K
272-ANewHashFamilyObtainedbyModifyingtheSHA2Fam..> 22-Dec-2014 09:55 207K
272-ANewHashFamilyObtainedbyModifyingtheSHA2Fam..> 22-Dec-2014 09:55 844K
273-WhiteBoxCryptographyFormalNotionsandImpossi..> 22-Dec-2014 09:55 282K
274-TwistedAtePairingonHyperellipticCurvesandAp..> 22-Dec-2014 09:55 169K
274-TwistedAtePairingonHyperellipticCurvesandAp..> 22-Dec-2014 09:55 366K
275-CertificateBasedSignatureSchemeswithoutPair..> 22-Dec-2014 09:55 260K
276-SigncryptionwithProxyReencryption.pdf 22-Dec-2014 09:55 246K
276-SigncryptionwithProxyReencryption.ps 22-Dec-2014 09:55 494K
277-AstrategyforanyDAAIssuerandanadditionalveri..> 22-Dec-2014 09:55 25K
277-AstrategyforanyDAAIssuerandanadditionalveri..> 22-Dec-2014 09:55 58K
278-AnImprovedRobustFuzzyExtractor.pdf 22-Dec-2014 09:55 208K
278-AnImprovedRobustFuzzyExtractor.ps 22-Dec-2014 09:55 418K
279-DelegatingCapabilitiesinPredicateEncryption..> 22-Dec-2014 09:55 383K
280-FPGAandASICImplementationsoftheeta_TPairing..> 22-Dec-2014 09:55 1016K
281-LinearandDifferentialCryptanalysisofReduced..> 22-Dec-2014 09:55 322K
282-SurvivalintheWildRobustGroupKeyAgreementinW..> 22-Dec-2014 09:55 198K
283-AttacksonSingeleeandPreneel39sprotocol.pdf 20-Jan-2023 08:37 441K
283-AttacksonSingeleeandPreneelsprotocol.pdf 22-Dec-2014 09:55 441K
284-BreakingtheAkiyamaGotocryptosystem.pdf 22-Dec-2014 09:55 177K
285-HybridBinaryTernaryJointSparseFormanditsApp..> 22-Dec-2014 09:55 172K
286-OneUpProblemforECDSA.pdf 22-Dec-2014 09:55 135K
286-OneUpProblemforECDSA.ps 22-Dec-2014 09:55 289K
287-AuthenticatedByzantineGeneralsinDualFailure..> 22-Dec-2014 09:55 329K
288-HowtoLaunchABirthdayAttackAgainstDES.pdf 22-Dec-2014 09:54 295K
289-Sharemindaframeworkforfastprivacypreserving..> 22-Dec-2014 09:54 284K
290-CiphertextPolicyAttributeBasedEncryptionAnE..> 22-Dec-2014 09:54 282K
291-HowtoProtectYourselfwithoutPerfectShredding..> 22-Dec-2014 09:54 603K
292-AnotherapproachtopairingcomputationinEdward..> 22-Dec-2014 09:54 200K
293-MaximizingdatasurvivalinUnattendedWirelessS..> 22-Dec-2014 09:54 244K
294-ANewMessageRecognitionProtocolforAdHocPerva..> 22-Dec-2014 09:54 176K
295-FoundationsofGroupKeyManagementFrameworkSec..> 22-Dec-2014 09:54 258K
295-FoundationsofGroupKeyManagementFrameworkSec..> 22-Dec-2014 09:54 414K
296-CryptanalysisofShortExponentRSAwithPrimesSh..> 22-Dec-2014 09:54 198K
297-AttackonKangetal39sIdentityBasedStrongDesig..> 20-Jan-2023 08:37 193K
297-AttackonKangetalsIdentityBasedStrongDesigna..> 22-Dec-2014 09:54 193K
298-NonlinearPieceInHandPerturbationVectorMetho..> 22-Dec-2014 09:54 203K
299-Ananalysisoftheinfrastructureinrealfunction..> 22-Dec-2014 09:54 208K
300-Cheon39salgorithmpairinginversionandthedisc..> 20-Jan-2023 08:37 192K
300-Cheonsalgorithmpairinginversionandthediscre..> 22-Dec-2014 09:54 192K
301-AccountabilityofPerfectConcurrentSignature.pdf 22-Dec-2014 09:54 152K
302-SecureBiometricAuthenticationWithImprovedAc..> 22-Dec-2014 09:54 235K
303-CompleteFairnessinSecureTwoPartyComputation..> 22-Dec-2014 09:54 385K
304-ANewRandomnessExtractionParadigmforHybridEn..> 22-Dec-2014 09:54 286K
305-IdentityBasedDirectedSignatureSchemefromBil..> 22-Dec-2014 09:54 220K
306-Combinatorialbatchcodes.pdf 22-Dec-2014 09:54 163K
307-FullSecurityFuzzyIdentityBasedEncryption.pdf 22-Dec-2014 09:54 198K
308-StronglyResilientandNonInteractiveHierarchi..> 22-Dec-2014 09:54 278K
309-RevocationSystemswithVerySmallPrivateKeys.pdf 22-Dec-2014 09:54 280K
310-AttacksonRFIDProtocols.pdf 22-Dec-2014 09:54 426K
311-TreatmentoftheInitialValueinTimeMemoryDataT..> 22-Dec-2014 09:54 150K
312-ImprovedefficiencyofKiltz07KEM.pdf 22-Dec-2014 09:54 116K
313-Anewalmostperfectnonlinearfunctionwhichisno..> 22-Dec-2014 09:54 284K
313-Anewalmostperfectnonlinearfunctionwhichisno..> 22-Dec-2014 09:54 591K
314-ScratchClickVoteE2EvotingovertheInternet.pdf 22-Dec-2014 09:54 140K
314-ScratchClickampVoteE2EvotingovertheInternet..> 20-Jan-2023 08:37 140K
315-RSACryptanalysiswithIncreasedBoundsontheSec..> 22-Dec-2014 09:53 227K
316-SigningaLinearSubspaceSignatureSchemesforNe..> 22-Dec-2014 09:53 245K
317-EllipticCurvesScalarMultiplicationCombining..> 20-Jan-2023 14:21 207
318-AttackinganddefendingtheMcEliececryptosyste..> 22-Dec-2014 09:53 206K
319-YetAnotherSecureDistanceBoundingProtocol.pdf 22-Dec-2014 09:53 318K
320-PublicKeyBlockCipherBasedonMultivariateQuad..> 22-Dec-2014 09:53 318K
321-AcorrectiontoEfficientandSecureComparisonfo..> 22-Dec-2014 09:53 75K
321-AcorrectiontoEfficientandSecureComparisonfo..> 20-Jan-2023 08:37 75K
322-LatticebasedBlindSignatures.pdf 22-Dec-2014 09:53 554K
323-Anewidentitybasedproxysignaturescheme.pdf 22-Dec-2014 09:53 128K
324-RSATBOSSigncryptionwithProxyReencryption.pdf 22-Dec-2014 09:53 234K
325-RevisitofGroupbasedUnidirectionalProxyReenc..> 22-Dec-2014 09:53 210K
326-Twoattacksonasensornetworkkeydistributionsc..> 22-Dec-2014 09:53 125K
327-BlindHIBEanditsApplicationstoIdentityBasedB..> 22-Dec-2014 09:53 246K
328-AttributeBasedSignaturesAchievingAttributeP..> 22-Dec-2014 09:53 281K
329-SMS4EncryptionAlgorithmforWirelessNetworks.pdf 22-Dec-2014 09:53 53K
329-SMS4EncryptionAlgorithmforWirelessNetworks.ps 22-Dec-2014 09:53 120K
330-Chosenciphertextsecurepublickeyencryptionun..> 20-Jan-2023 14:21 207
331-ASecureRemoteUserAuthenticationSchemewithSm..> 22-Dec-2014 09:53 80K
332-EfficientKeyDistributionSchemesforLargeScal..> 22-Dec-2014 09:53 282K
333-Explicithardinstancesoftheshortestvectorpro..> 22-Dec-2014 09:53 275K
334-AnalyzingtheGalbraithLinScottPointMultiplic..> 22-Dec-2014 09:53 230K
335-PublicKeyCryptographyfromDifferentAssumptio..> 22-Dec-2014 09:53 265K
336-NewattacksonISOkeyestablishmentprotocols.pdf 22-Dec-2014 09:53 99K
337-ModifiedHuangWang39sConvertibleNominativeSi..> 20-Jan-2023 08:37 204K
337-ModifiedHuangWangsConvertibleNominativeSign..> 22-Dec-2014 09:53 204K
338-AnimprovementofdiscreteTardosfingerprinting..> 22-Dec-2014 09:53 325K
338-AnimprovementofdiscreteTardosfingerprinting..> 22-Dec-2014 09:53 637K
339-HighPerformanceImplementationofaPublicKeyBl..> 22-Dec-2014 09:53 626K
340-Onconstructionofsignatureschemesbasedonbira..> 20-Jan-2023 14:21 207
341-AnEfficientIdentityBasedSigncryptionSchemef..> 22-Dec-2014 09:53 256K
342-CryptanalysisofLietal39sIdentityBasedThresh..> 20-Jan-2023 08:37 207K
342-CryptanalysisofLietalsIdentityBasedThreshol..> 22-Dec-2014 09:53 171K
342-CryptanalysisofLietalsIdentityBasedThreshol..> 22-Dec-2014 09:53 345K
343-EfficientRFIDauthenticationprotocolsbasedon..> 22-Dec-2014 09:53 256K
344-AuthenticatedKeyExchangeSecureundertheCompu..> 22-Dec-2014 09:53 223K
345-AnEfficientAuthenticatedKeyExchangeProtocol..> 22-Dec-2014 09:53 214K
346-RemoteIntegrityCheckwithDishonestStorageSer..> 22-Dec-2014 09:52 212K
347-InformationLeakageinOptimalAnonymizedandDiv..> 22-Dec-2014 09:52 207K
348-IterativeProbabilisticReconstructionofRC4In..> 22-Dec-2014 09:52 207K
348-IterativeProbabilisticReconstructionofRC4In..> 22-Dec-2014 09:52 317K
349-TimeAreaOptimizedPublicKeyEnginesMQCryptosy..> 22-Dec-2014 09:52 223K
350-HigherOrderDifferentialCryptanalysisofMulti..> 22-Dec-2014 09:52 143K
351-FlawsinSomeSelfHealingKeyDistributionScheme..> 22-Dec-2014 09:52 132K
352-OnNotionsofSecurityforDeterministicEncrypti..> 22-Dec-2014 09:52 426K
353-WeaknessesinHENKOSStreamCipher.pdf 22-Dec-2014 09:52 57K
354-OnDDosAttackagainstProxyinReencryptionandRe..> 20-Jan-2023 08:37 268K
355-Anargumentforrankmetric.pdf 22-Dec-2014 09:52 71K
355-Anargumentforrankmetric.ps 22-Dec-2014 09:52 170K
356-UsingCommutativeEncryptiontoShareaSecret.pdf 22-Dec-2014 09:52 120K
357-AprotocolforKmultiplesubstringmatching.pdf 22-Dec-2014 09:52 95K
357-AprotocolforKmultiplesubstringmatching.ps 22-Dec-2014 09:52 210K
358-HistoryIndependentCuckooHashing.pdf 22-Dec-2014 09:52 213K
358-HistoryIndependentCuckooHashing.ps 22-Dec-2014 09:52 399K
359-Argumentofknowledgeofaboundederror.pdf 22-Dec-2014 09:52 88K
359-Argumentofknowledgeofaboundederror.ps 22-Dec-2014 09:52 191K
360-AnApproachtoensureInformationSecuritythroug..> 22-Dec-2014 09:52 233K
361-IEEEP13631Draft10DraftStandardforPublicKeyC..> 20-Jan-2023 14:21 207
362-TheCostofFalseAlarmsinHellmanandRainbowTrad..> 22-Dec-2014 09:52 572K
363-AnargumentforHamiltonicity.pdf 22-Dec-2014 09:52 94K
363-AnargumentforHamiltonicity.ps 22-Dec-2014 09:52 214K
364-ZcipherAlgorithmSpecification.pdf 22-Dec-2014 09:52 54K
365-EntropyBoundsforTrafficConfirmation.pdf 22-Dec-2014 09:52 168K
366-UniqueShortestVectorProblemformaxnormisNPha..> 22-Dec-2014 09:52 214K
367-ThresholdHomomorphicEncryptionintheUniversa..> 22-Dec-2014 09:52 582K
367-ThresholdHomomorphicEncryptionintheUniversa..> 22-Dec-2014 09:52 962K
368-SideChannelAttackResistantImplementationofM..> 22-Dec-2014 09:52 154K
369-NewDirectionsinCryptanalysisofSelfSynchroni..> 22-Dec-2014 09:52 194K
370-CompartmentedThresholdRSABasedontheChineseR..> 22-Dec-2014 09:52 194K
371-UnconditionallyReliableMessageTransmissioni..> 22-Dec-2014 09:52 609K
372-EnumerationofBalancedSymmetricFunctionsover..> 22-Dec-2014 09:52 154K
373-AnalysisandImprovementofAuthenticatableRing..> 22-Dec-2014 09:52 186K
373-AnalysisandImprovementofAuthenticatableRing..> 22-Dec-2014 09:52 381K
374-ChosenCiphertextSecuritywithOptimalCipherte..> 22-Dec-2014 09:51 337K
375-Apublickeyencryptionschemesecureagainstkeyd..> 22-Dec-2014 09:51 275K
376-SessionstateRevealisstrongerthanEphemeralKe..> 22-Dec-2014 09:51 255K
377-TRIVIUM39soutputpartiallyautocancels.pdf 20-Jan-2023 08:37 39K
377-TRIVIUMsoutputpartiallyautocancels.pdf 22-Dec-2014 09:51 39K
378-AdditivelyHomomorphicEncryptionwithdOperand..> 22-Dec-2014 09:51 211K
379-ACharacterizationofChameleonHashFunctionsan..> 22-Dec-2014 09:51 251K
380-DynamicThresholdCryptosystemwithoutGroupMan..> 22-Dec-2014 09:51 194K
381-NewAESsoftwarespeedrecords.pdf 22-Dec-2014 09:51 154K
382-AuthenticatedWirelessRoamingviaTunnelsMakin..> 22-Dec-2014 09:51 904K
383-HierarchicalIdentityBasedEncryptionwithPoly..> 22-Dec-2014 09:51 321K
383-HierarchicalIdentityBasedEncryptionwithPoly..> 22-Dec-2014 09:51 598K
384-ImprovingtheBonehFranklinTraitorTracingSche..> 22-Dec-2014 09:51 214K
385-CubeAttacksonTweakableBlackBoxPolynomials.pdf 22-Dec-2014 09:51 247K
386-SharedKeyEncryptionbytheStateMachinewithTwo..> 22-Dec-2014 09:51 86K
387-Withdrawn.pdf 20-Jan-2023 14:21 207
388-DoubleBaseNumberSystemforMultiScalarMultipl..> 22-Dec-2014 09:51 255K
388-DoubleBaseNumberSystemforMultiScalarMultipl..> 22-Dec-2014 09:51 1M
389-OptimalSubsetDifferenceBroadcastEncryptionw..> 22-Dec-2014 09:51 301K
389-OptimalSubsetDifferenceBroadcastEncryptionw..> 22-Dec-2014 09:51 3M
390-EllipticCurveCryptographyTheSerpentineCours..> 22-Dec-2014 09:51 420K
391-CouldThe1MSBInputDifferenceBeTheFastestColl..> 22-Dec-2014 09:51 306K
392-GUCSecureSetIntersectionComputation.pdf 22-Dec-2014 09:51 517K
393-HowFarMustYouSeeToHearReliably.pdf 22-Dec-2014 09:51 273K
394-AttributeBasedRingSignatures.pdf 22-Dec-2014 09:51 231K
395-NewApplicationsofDifferentialBoundsoftheSDS..> 22-Dec-2014 09:51 212K
396-AnalysisofRC4andProposalofAdditionalLayersf..> 22-Dec-2014 09:51 264K
397-AFrameworkfortheDevelopmentPlayfairCipherCo..> 20-Jan-2023 14:21 207
398-Generatinggenustwohyperellipticcurvesoverla..> 22-Dec-2014 09:51 185K
398-Generatinggenustwohyperellipticcurvesoverla..> 22-Dec-2014 09:51 420K
399-RoundEfficientUnconditionallySecureMultipar..> 22-Dec-2014 09:50 316K
400-Commentsontwopasswordbasedprotocols.pdf 22-Dec-2014 09:50 482K
401-TwoNewEfficientCCASecureOnlineCiphersMHCBCa..> 22-Dec-2014 09:50 290K
402-AlgebraicCryptanalysisofCurryandFlurryusing..> 22-Dec-2014 09:50 250K
403-SPICESimulationofa34ProvablySecure34TrueRan..> 20-Jan-2023 08:37 128K
403-SPICESimulationofaProvablySecureTrueRandomN..> 22-Dec-2014 09:50 128K
404-PairingwithSupersingularTraceZeroVarietiesR..> 22-Dec-2014 09:50 261K
404-PairingwithSupersingularTraceZeroVarietiesR..> 22-Dec-2014 09:50 501K
405-SlidPairsinSalsa20andTrivium.pdf 22-Dec-2014 09:50 199K
406-AnasymptoticallyoptimalRFIDprotocolagainstr..> 22-Dec-2014 09:50 154K
407-IndifferentiableSecurityAnalysisofchoppfMDc..> 22-Dec-2014 09:50 233K
407-IndifferentiableSecurityAnalysisofchoppfMDc..> 22-Dec-2014 09:50 484K
408-TheEnigmatiqueToolkit.pdf 22-Dec-2014 09:50 124K
409-ANewknThresholdSecretSharingSchemeandItsExt..> 22-Dec-2014 09:50 204K
410-OntheRoleofPKGforProxyReencryptioninIdentit..> 22-Dec-2014 09:50 539K
411-CryptanalysisofLUDecompositionbasedKeyPredi..> 22-Dec-2014 09:50 126K
412-KeyPredistributionforHomogeneousWirelessSen..> 22-Dec-2014 09:50 236K
413-PasswordMistypinginTwoFactorAuthenticatedKe..> 22-Dec-2014 09:50 290K
413-PasswordMistypinginTwoFactorAuthenticatedKe..> 22-Dec-2014 09:50 467K
414-OntheNumberofSynchronousRoundsRequiredforBy..> 22-Dec-2014 09:50 369K
415-AsynchronousMultipartyComputationTheoryandI..> 22-Dec-2014 09:50 236K
416-AlmostAsynchronousMPCwithFaultyMinority.pdf 22-Dec-2014 09:50 243K
417-Onthesecurityofpairingfriendlyabelianvariet..> 22-Dec-2014 09:50 200K
418-PrivacyEnhancingFirstPriceAuctionsUsingRati..> 22-Dec-2014 09:50 323K
419-Parsingambiguitiesinauthenticationandkeyest..> 22-Dec-2014 09:50 149K
419-Parsingambiguitiesinauthenticationandkeyest..> 22-Dec-2014 09:50 282K
420-ObliviousTransferfromWeakNoisyChannels.pdf 22-Dec-2014 09:50 267K
421-TrulyEfficient2RoundPerfectlySecureMessageT..> 22-Dec-2014 09:50 263K
422-ANewApproachforAlgebraicallyHomomorphicEncr..> 22-Dec-2014 09:50 253K
423-Searchableencryptionwithdecryptioninthestan..> 22-Dec-2014 09:50 246K
423-Searchableencryptionwithdecryptioninthestan..> 22-Dec-2014 09:50 315K
424-AsynchronousByzantineAgreementwithOptimalRe..> 22-Dec-2014 09:49 559K
425-EfficientAsynchronousMultipartyComputationw..> 22-Dec-2014 09:49 766K
426-OnKasamiBentFunctions.pdf 22-Dec-2014 09:49 135K
427-LEGOforTwoPartySecureComputation.pdf 22-Dec-2014 09:49 294K
428-DelegatableAnonymousCredentials.pdf 22-Dec-2014 09:49 375K
429-PublicKeyEncryptionwithEfficientAmortizedUp..> 22-Dec-2014 09:49 254K
430-CryptographicProtocolCompositionviatheAuthe..> 22-Dec-2014 09:49 300K
431-UsableOptimisticFairExchange.pdf 22-Dec-2014 09:49 317K
432-DynamicProvableDataPossession.pdf 22-Dec-2014 09:49 319K
433-Ondifferencesofquadraticresidues.pdf 22-Dec-2014 09:49 294K
434-ThecomputationalSLRalogicforreasoningaboutc..> 22-Dec-2014 09:49 262K
435-Obtainingandsolvingsystemsofequationsinkeyv..> 22-Dec-2014 09:49 206K
435-Obtainingandsolvingsystemsofequationsinkeyv..> 22-Dec-2014 09:49 368K
436-BGKMAnEfficientSecureBroadcastingGroupKeyMa..> 20-Jan-2023 14:21 207
437-DivisibilitySmoothnessandCryptographicAppli..> 22-Dec-2014 09:49 376K
438-NewRelatedKeyBoomerangAttacksonAES.pdf 22-Dec-2014 09:49 389K
439-LinearequivalencebetweenellipticcurvesinWei..> 22-Dec-2014 09:49 55K
440-RobustEncryption.pdf 22-Dec-2014 09:49 359K
441-HowRiskyistheRandomOracleModel.pdf 22-Dec-2014 09:49 249K
442-FastArithmeticonATmega128forEllipticCurveCr..> 22-Dec-2014 09:49 245K
442-FastArithmeticonATmega128forEllipticCurveCr..> 22-Dec-2014 09:49 1M
443-Keydifferentiationattacksonstreamciphers.pdf 22-Dec-2014 09:49 161K
444-Ellipticdivisibilitysequencesandtheelliptic..> 22-Dec-2014 09:49 119K
444-Ellipticdivisibilitysequencesandtheelliptic..> 22-Dec-2014 09:49 277K
445-CryptanalysisoftheImprovedCellularMessageEn..> 22-Dec-2014 09:49 159K
446-SecureRandomKeyPreDistributionAgainstSemiHo..> 22-Dec-2014 09:49 463K
447-DivisibleOnlineOfflineSignatures.pdf 22-Dec-2014 09:49 261K
447-DivisibleOnlineOfflineSignatures.ps 22-Dec-2014 09:49 467K
448-AuthenticatedAdversarialRouting.pdf 22-Dec-2014 09:48 1M
448-AuthenticatedAdversarialRouting.ps 22-Dec-2014 09:48 2M
449-ANewVariantoftheCramerShoupKEMSecureagainst..> 22-Dec-2014 09:48 185K
450-OntheSecurityofFullyCollusionResistantTrait..> 22-Dec-2014 09:48 224K
451-AlgebraicCryptanalysisofMQQPublicKeyCryptos..> 22-Dec-2014 09:48 148K
452-InjectiveTrapdoorFunctionsareNecessaryandSu..> 20-Jan-2023 14:21 207
453-GeneralizedUniversalCircuitsforSecureEvalua..> 22-Dec-2014 09:48 1M
454-ComplexityofMultipartyComputationProblemsTh..> 22-Dec-2014 09:48 316K
455-Newhashfunctiondesigns.pdf 22-Dec-2014 09:48 154K
456-TheDiffieHellmanproblemandgeneralizationofV..> 20-Jan-2023 08:37 468K
456-TheDiffieHellmanproblemandgeneralizationofV..> 22-Dec-2014 09:48 468K
457-OntheComposabilityofStatisticallySecureBitC..> 22-Dec-2014 09:48 261K
458-CompleteFairnessinMultiPartyComputationWith..> 22-Dec-2014 09:48 256K
459-AvariantofWiener39sattackonRSA.pdf 20-Jan-2023 08:37 142K
459-AvariantofWienersattackonRSA.pdf 22-Dec-2014 09:48 142K
460-VariousSecurityAnalysisofapfCMMDHashDomainE..> 22-Dec-2014 09:48 311K
460-VariousSecurityAnalysisofapfCMMDHashDomainE..> 22-Dec-2014 09:48 641K
461-OnCommunicationComplexityofPerfectlyReliabl..> 20-Jan-2023 14:21 207
462-UnconditionallySecureMultipartySetIntersect..> 22-Dec-2014 09:48 314K
463-KeyPrivateProxyReEncryption.pdf 22-Dec-2014 09:48 217K
464-VortexANewFamilyofOneWayHashFunctionsbasedo..> 22-Dec-2014 09:48 407K
465-SecureArithmeticComputationwithNoHonestMajo..> 22-Dec-2014 09:48 333K
466-Combinedidentitybasedpublickeyschemes.pdf 22-Dec-2014 09:48 236K
466-Combinedidentitybasedpublickeyschemes.ps 22-Dec-2014 09:48 453K
467-CryptanalysisofEnRUPT.pdf 22-Dec-2014 09:48 178K
468-ACCA2SecureVariantoftheMcElieceCryptosystem..> 22-Dec-2014 09:48 298K
469-ClassificationandGenerationofDisturbanceVec..> 22-Dec-2014 09:48 123K
469-ClassificationandGenerationofDisturbanceVec..> 22-Dec-2014 09:48 307K
470-FromWeaknessestoSecretDisclosureinaRecentUl..> 22-Dec-2014 09:48 3M
471-AutomaticGenerationofSoundZeroKnowledgeProt..> 22-Dec-2014 09:47 383K
472-PracticalattacksagainstWEPandWPA.pdf 22-Dec-2014 09:47 181K
473-ExploringCipherspaceCombiningstreamciphersa..> 22-Dec-2014 09:47 145K
474-AccessControlsforObliviousandAnonymousSyste..> 22-Dec-2014 09:47 387K
475-SphinxACompactandProvablySecureMixFormat.pdf 22-Dec-2014 09:47 474K
476-TheF_fFamilyofProtocolsforRFIDPrivacyandAut..> 22-Dec-2014 09:47 922K
476-TheF_fFamilyofProtocolsforRFIDPrivacyandAut..> 22-Dec-2014 09:47 7M
477-OnaNewFormalProofModelforRFIDLocationPrivac..> 22-Dec-2014 09:47 131K
478-AttributeBasedEncryptionwithKeyCloningProte..> 22-Dec-2014 09:47 257K
478-AttributeBasedEncryptionwithKeyCloningProte..> 22-Dec-2014 09:47 443K
479-FormalProofofRelativeStrengthsofSecuritybet..> 22-Dec-2014 09:47 138K
480-ECMonGraphicsCards.pdf 22-Dec-2014 09:47 223K
481-PublicKeyCryptosystemsfromtheWorstCaseShort..> 22-Dec-2014 09:47 250K
481-PublicKeyCryptosystemsfromtheWorstCaseShort..> 22-Dec-2014 09:47 406K
482-TheGenericHardnessofSubsetMembershipProblem..> 22-Dec-2014 09:46 256K
483-SharingDSSbytheChineseRemainderTheorem.pdf 22-Dec-2014 09:46 219K
484-Sharplowerboundsontheextractablerandomnessf..> 22-Dec-2014 09:46 213K
485-FastPointMultiplicationFormulaeonEllipticCu..> 20-Jan-2023 14:21 207
486-InsidetheHypercube.pdf 22-Dec-2014 09:46 209K
487-SecureCertificatelessPublicKeyEncryptionwit..> 22-Dec-2014 09:46 218K
488-EfficientRationalSecretSharinginStandardCom..> 22-Dec-2014 09:46 296K
489-HAILAHighAvailabilityandIntegrityLayerforCl..> 22-Dec-2014 09:46 674K
490-Onthefinalexponentiationforcalculatingpairi..> 22-Dec-2014 09:46 170K
491-ACMconstructionforcurvesofgenus2withprank1.pdf 22-Dec-2014 09:46 307K
492-ModelingComputationalSecurityinLongLivedSys..> 22-Dec-2014 09:46 342K
493-SecureParametersforSWIFFT.pdf 22-Dec-2014 09:46 231K
494-KeyAgreementfromCloseSecretsoverUnsecuredCh..> 22-Dec-2014 09:46 229K
494-KeyAgreementfromCloseSecretsoverUnsecuredCh..> 22-Dec-2014 09:46 431K
495-NonMalleableObfuscation.pdf 22-Dec-2014 09:46 311K
496-ConstructingVariableLengthPRPsandSPRPsfromF..> 22-Dec-2014 09:46 282K
497-OntheCorrectnessofAnApproachAgainstSidechan..> 22-Dec-2014 09:46 141K
498-SmallOddPrimeFieldMultivariatePKCs.pdf 22-Dec-2014 09:46 290K
499-SomeObservationsonHC128.pdf 22-Dec-2014 09:46 169K
500-StronglySecureAuthenticatedKeyExchangeProto..> 22-Dec-2014 09:46 206K
501-SomeObservationsonSHAMATA.pdf 22-Dec-2014 09:46 88K
502-ExtendedAccessStructuresandTheirCryptograph..> 22-Dec-2014 09:46 262K
503-NonMalleableExtractorsandSymmetricKeyCrypto..> 22-Dec-2014 09:46 423K
503-NonMalleableExtractorsandSymmetricKeyCrypto..> 22-Dec-2014 09:46 760K
504-ThencUniqueShortestVectorProblemisHard.pdf 22-Dec-2014 09:46 118K
504-ThencUniqueShortestVectorProblemisHard.ps 22-Dec-2014 09:46 261K
505-Withdrawn.pdf 20-Jan-2023 08:37 201K
505-removed.pdf 22-Dec-2014 09:46 201K
506-UnconditionallySecureMessageTransmissioninA..> 22-Dec-2014 09:46 596K
507-Anondelegatableidentitybasedstrongdesignate..> 22-Dec-2014 09:46 158K
508-SomeFormalSolutionsinSidechannelCryptanalys..> 22-Dec-2014 09:45 775K
509-ChosenCiphertextSecureProxyReEncryptionwith..> 22-Dec-2014 09:45 232K
509-ChosenCiphertextSecureProxyReEncryptionwith..> 22-Dec-2014 09:45 490K
510-ReconstructingRSAPrivateKeysfromRandomKeyBi..> 22-Dec-2014 09:45 269K
511-ClassificationoftheSHA3Candidates.pdf 22-Dec-2014 09:45 153K
512-AnewclassofBentfunctionsinPolynomialForms.pdf 22-Dec-2014 09:45 167K
512-AnewclassofBentfunctionsinPolynomialForms.ps 22-Dec-2014 09:45 225K
513-ImprovedCryptanalysisofSHAMATABC.pdf 22-Dec-2014 09:45 78K
514-NoncommutativePollyCrackertypecryptosystems..> 22-Dec-2014 09:45 180K
514-NoncommutativePollyCrackertypecryptosystems..> 22-Dec-2014 09:45 313K
515-CryptanalysisofRadioGatun.pdf 22-Dec-2014 09:45 337K
516-DistinguishingandForgeryAttacksonAlredandIt..> 22-Dec-2014 09:45 189K
517-ImprovingtheRulesoftheDPAContest.pdf 22-Dec-2014 09:45 87K
517-ImprovingtheRulesoftheDPAContest.ps 22-Dec-2014 09:45 262K
518-ANEWHASHALGORITHMKhichidi1.pdf 20-Jan-2023 14:21 207
519-CollisionattackonNaSHA512.pdf 22-Dec-2014 09:45 883K
520-CryptanalysisoftheHashFunctionLUX256.pdf 22-Dec-2014 09:45 245K
521-GeneratingShorterBasesforHardRandomLattices..> 22-Dec-2014 09:45 327K
522-TwistedEdwardsCurvesRevisited.pdf 22-Dec-2014 09:45 223K
523-PrivacyPreservingMultisetUnionwithElGamalEn..> 20-Jan-2023 14:21 207
524-RoundOptimalZeroKnowledgeProofsofKnowledgef..> 22-Dec-2014 09:45 223K
525-OnTheDiffieHellmanAssumption.pdf 22-Dec-2014 09:45 135K
526-NovelPrecomputationSchemesforEllipticCurveC..> 22-Dec-2014 09:45 213K
527-PropertiesofCryptographicHashFunctions.pdf 22-Dec-2014 09:45 174K
527-PropertiesofCryptographicHashFunctions.ps 22-Dec-2014 09:45 352K
528-EncryptingProofsonPairingsandItsApplication..> 22-Dec-2014 09:45 401K
529-AHardwareInterfaceforHashingAlgorithms.pdf 22-Dec-2014 09:45 412K
530-FasthashingtoG2onpairingfriendlycurves.pdf 22-Dec-2014 09:45 171K
531-CollisionAttackontheWaterfallHashFunction.pdf 22-Dec-2014 09:45 109K
532-SemifreestartcollisionattackonBlender.pdf 22-Dec-2014 09:45 52K
533-CollusionFreeMultipartyComputationintheMedi..> 22-Dec-2014 09:45 299K
534-SomewhatNonCommittingEncryptionandEfficient..> 22-Dec-2014 09:45 917K
535-ARecursiveThresholdVisualCryptographyScheme..> 22-Dec-2014 09:44 122K
536-PredicatePrivacyinEncryptionSystems.pdf 22-Dec-2014 09:44 321K
536-PredicatePrivacyinEncryptionSystems.ps 22-Dec-2014 09:44 568K
537-ASecureThresholdAnonymousPasswordAuthentica..> 22-Dec-2014 09:44 335K
538-SupportingNonmembershipProofswithBilinearma..> 22-Dec-2014 09:44 69K
539-AnAccumulatorBasedonBilinearMapsandEfficien..> 22-Dec-2014 09:44 277K
540-NewImpossibleDifferentialAttacksonAES.pdf 22-Dec-2014 09:44 240K
541-ResettablySoundResettableZeroKnowledgeArgum..> 22-Dec-2014 09:44 505K
542-DistinguishingAttackandSecondPreimageAttack..> 22-Dec-2014 09:44 194K
543-OddCharMultivariateHiddenFieldEquations.pdf 22-Dec-2014 09:44 421K
544-Commentsontwomultiserverauthenticationproto..> 22-Dec-2014 09:44 400K
545-ResolvingtheSimultaneousResettabilityConjec..> 22-Dec-2014 09:44 308K