Index of /2009/
../
001-AHardwareAnalysisofTwistedEdwardsCurvesfora..> 22-Dec-2014 10:33 594K
002-Thermocommunication.pdf 22-Dec-2014 10:32 748K
003-Separatingtworolesofhashinginonewaymessagea..> 22-Dec-2014 10:32 234K
004-OnStatelessSchemesforMessageAuthenticationU..> 20-Jan-2023 14:21 207
005-ImpossibleDifferentialCryptanalysisofPelica..> 22-Dec-2014 10:32 171K
006-HugeMulticollisionsandMultipreimagesofHashF..> 22-Dec-2014 10:32 172K
007-HomomorphicTrapdoorCommitmentstoGroupElemen..> 22-Dec-2014 10:32 103K
007-HomomorphicTrapdoorCommitmentstoGroupElemen..> 22-Dec-2014 10:32 195K
008-AnoteonAgrawalconjecture.pdf 22-Dec-2014 10:32 96K
009-HybridSecureMPCTradingInformationTheoreticR..> 22-Dec-2014 10:32 342K
009-HybridSecureMPCTradingInformationTheoreticR..> 22-Dec-2014 10:32 611K
010-OptimalMulticastGroupCommunication.pdf 22-Dec-2014 10:32 676K
011-AVeryCompact34PerfectlyMasked34SBoxforAESco..> 20-Jan-2023 08:37 164K
011-AVeryCompactPerfectlyMaskedSBoxforAEScorrec..> 22-Dec-2014 10:32 164K
012-AvoidMaskReuseinMaskedGaloisMultipliers.pdf 22-Dec-2014 10:32 139K
013-ComparisonBasedKeyExchangeandtheSecurityoft..> 22-Dec-2014 10:32 239K
014-KeyPredistributionTechniquesforGridBasedWir..> 22-Dec-2014 10:32 203K
015-CubeAttacksonTrivium.pdf 22-Dec-2014 10:32 288K
016-FastellipticcurvecryptographyontheCellBroad..> 22-Dec-2014 10:32 195K
017-Anonymoussignaturescheme.pdf 22-Dec-2014 10:32 206K
018-Huge2ndpreimagesandcollisionsofkhichidi1.pdf 22-Dec-2014 10:32 82K
019-CommunicationEfficientPrivateProtocolsforLo..> 22-Dec-2014 10:32 213K
020-ApplyingTimeMemoryDataTradeOfftoMeetintheMi..> 22-Dec-2014 10:32 199K
021-ComparingWithRSA.pdf 22-Dec-2014 10:32 213K
022-CorrectnessofLiGeneralizationofRSACryptosys..> 22-Dec-2014 10:32 54K
023-PolynomialRuntimeandComposability.pdf 22-Dec-2014 10:32 653K
024-OnSecondOrderFaultAnalysisResistanceforCRTR..> 22-Dec-2014 10:32 246K
025-ShortRedactableSignaturesUsingRandomTrees.pdf 22-Dec-2014 10:32 270K
025-ShortRedactableSignaturesUsingRandomTrees.ps 22-Dec-2014 10:32 662K
026-CollisionAttacksonNaSHA384512.pdf 22-Dec-2014 10:32 156K
027-SecurityofVerifiablyEncryptedSignatures.pdf 22-Dec-2014 10:32 151K
028-RealizingHashandSignSignaturesunderStandard..> 22-Dec-2014 10:32 237K
029-NofishAnewstreamcipher.pdf 22-Dec-2014 10:32 133K
030-Anefficientfuzzyextractorforlimitednoise.pdf 22-Dec-2014 10:32 246K
031-AdaptivelySecureTwoPartyComputationwithEras..> 22-Dec-2014 10:31 342K
032-AFastImplementationofeta_TPairinginCharacte..> 22-Dec-2014 10:31 84K
033-NESHA256NEw256bitSecureHashAlgorithmExtende..> 22-Dec-2014 10:31 134K
034-OnaConditionalCollisionAttackonNaSHA512.pdf 22-Dec-2014 10:31 131K
035-KeyExposureFreeChameleonHashingandSignature..> 22-Dec-2014 10:31 146K
036-ConstructionsofTrulyPracticalSecureProtocol..> 22-Dec-2014 10:31 289K
037-CommonModulusAttacksonSmallPrivateExponentR..> 22-Dec-2014 10:31 273K
038-OnAlgebraicRelationsofSerpentSBoxes.pdf 22-Dec-2014 10:31 71K
039-KeyInsulationandIntrusionResilienceOveraPub..> 22-Dec-2014 10:31 304K
040-HowtoProvetheSecurityofPracticalCryptosyste..> 22-Dec-2014 10:31 198K
040-HowtoProvetheSecurityofPracticalCryptosyste..> 20-Jan-2023 08:37 198K
041-ProofsofRetrievabilityviaHardnessAmplificat..> 22-Dec-2014 10:31 411K
041-ProofsofRetrievabilityviaHardnessAmplificat..> 22-Dec-2014 10:31 713K
042-OnCCZequivalenceanditsuseinsecondaryconstru..> 22-Dec-2014 10:31 191K
042-OnCCZequivalenceanditsuseinsecondaryconstru..> 22-Dec-2014 10:31 384K
043-ImageEncryptionbyPixelPropertySeparation.pdf 22-Dec-2014 10:31 530K
044-UnTrustedHBSecurityVulnerabilitiesofTrusted..> 22-Dec-2014 10:31 178K
045-EfficientProtocolsforSetIntersectionandPatt..> 22-Dec-2014 10:31 370K
046-TraceabilityCodes.pdf 22-Dec-2014 10:31 168K
047-OnApproximatingAdditionbyExclusiveOR.pdf 22-Dec-2014 10:31 180K
048-ATradeOffBetweenCollisionProbabilityandKeyS..> 22-Dec-2014 10:31 177K
049-ExtensionsoftheCubeAttackbasedonLowDegreeAn..> 22-Dec-2014 10:31 209K
050-OnthePortabilityofGeneralizedSchnorrProofs.pdf 22-Dec-2014 10:31 610K
051-EnhancedTargetCollisionResistantHashFunctio..> 22-Dec-2014 10:31 336K
052-ONTHESECURITYOFTWORINGSIGNCRYPTIONSCHEMES.pdf 22-Dec-2014 10:31 74K
052-ONTHESECURITYOFTWORINGSIGNCRYPTIONSCHEMES.ps 22-Dec-2014 10:31 105K
053-NewcommutativesemifieldsdefinedbyPNmultinom..> 22-Dec-2014 10:31 179K
053-NewcommutativesemifieldsdefinedbyPNmultinom..> 22-Dec-2014 10:31 370K
054-OntheSecurityofTandemDM.pdf 22-Dec-2014 10:31 221K
055-UniversallyComposableSymmetricEncryption.pdf 22-Dec-2014 10:31 651K
056-DesigninganASIPforCryptographicPairingsover..> 22-Dec-2014 10:31 652K
057-AnonymityinSharedSymmetricKeyPrimitives.pdf 22-Dec-2014 10:30 258K
058-OnGeneralizationofCheon39sAlgorithm.pdf 20-Jan-2023 08:37 131K
058-OnGeneralizationofCheonsAlgorithm.pdf 22-Dec-2014 10:30 131K
059-Ontheimpossibilityofgraphsecretsharing.pdf 22-Dec-2014 10:30 175K
060-ComparingTwoPairingBasedAggregateSignatureS..> 22-Dec-2014 10:30 308K
061-SecurityEnhancementofVariousMPKCsby2layerNo..> 22-Dec-2014 10:30 115K
062-OnDeterministicPolynomialTimeEquivalenceofC..> 22-Dec-2014 10:30 167K
063-CCZequivalenceandBooleanfunctions.pdf 22-Dec-2014 10:30 132K
063-CCZequivalenceandBooleanfunctions.ps 22-Dec-2014 10:30 276K
064-OntheDataComplexityofStatisticalAttacksAgai..> 22-Dec-2014 10:30 244K
065-FoundationsofNonMalleableHashandOneWayFunct..> 22-Dec-2014 10:30 258K
065-FoundationsofNonMalleableHashandOneWayFunct..> 22-Dec-2014 10:30 415K
066-AdaptivePreimageResistanceandPermutationbas..> 22-Dec-2014 10:30 272K
067-Onfractionalcorrelationimmunityofmajorityfu..> 22-Dec-2014 10:30 221K
068-OverviewofTurboCodeReconstructionTechniques..> 22-Dec-2014 10:30 179K
069-OptimisticFairExchangewithMultipleArbiters.pdf 22-Dec-2014 10:30 209K
070-LowComplexityCubingandCubeRootComputationov..> 22-Dec-2014 10:30 261K
071-Secretsharingontreesproblemsolved.pdf 22-Dec-2014 10:30 150K
072-Implementingcryptographicpairingsamagmatuto..> 22-Dec-2014 10:30 307K
073-AutomaticApproachofProvableSecurityanditsAp..> 22-Dec-2014 10:30 114K
074-ComputationalObliviousTransferandInteractiv..> 22-Dec-2014 10:30 183K
075-SecurityofPracticalCryptosystemsUsingMerkle..> 22-Dec-2014 10:30 176K
076-Constructionoflargefamiliesofpseudorandomsu..> 22-Dec-2014 10:30 116K
077-OntheSecurityofIteratedHashingbasedonForger..> 22-Dec-2014 10:30 198K
078-AttacksontheDECTauthenticationmechanisms.pdf 22-Dec-2014 10:30 213K
079-FromDolevYaotoStrongAdaptiveCorruptionAnaly..> 22-Dec-2014 10:30 591K
080-CoSPAGeneralFrameworkForComputationalSoundn..> 22-Dec-2014 10:30 611K
081-EnsuringDataStorageSecurityinCloudComputing..> 22-Dec-2014 10:30 950K
082-TheCaseforQuantumKeyDistribution.pdf 22-Dec-2014 10:30 290K
083-Multiauthorityattributebasedencryptionwithh..> 22-Dec-2014 10:30 209K
083-Multiauthorityattributebasedencryptionwithh..> 22-Dec-2014 10:30 402K
084-SimulationwithouttheArtificialAbortSimplifi..> 20-Jan-2023 08:37 318K
084-SimulationwithouttheArtificialAbortSimplifi..> 22-Dec-2014 10:29 318K
085-UCSecureSourceRoutingProtocol.pdf 22-Dec-2014 10:29 410K
086-PointCompressionforKoblitzEllipticCurves.pdf 22-Dec-2014 10:29 177K
087-UnconditionallySecureAsynchronousMultiparty..> 20-Jan-2023 14:21 207
088-LossyEncryptionConstructionsfromGeneralAssu..> 22-Dec-2014 10:29 677K
089-AProvablySecureAndEfficientCountermeasureAg..> 22-Dec-2014 10:29 172K
090-ABriefHistoryofProvablySecurePublicKeyEncry..> 22-Dec-2014 10:29 187K
090-ABriefHistoryofProvablySecurePublicKeyEncry..> 22-Dec-2014 10:29 398K
091-KnapsackCryptosystemonEllipticCurves.pdf 22-Dec-2014 10:29 86K
092-ReducingRFIDReaderLoadwiththeMeetintheMiddl..> 22-Dec-2014 10:29 147K
093-CascadeEncryptionRevisited.pdf 22-Dec-2014 10:29 196K
093-CascadeEncryptionRevisited.ps 22-Dec-2014 10:29 405K
094-OntheLowerBoundsoftheSecondOrderNonlinearit..> 22-Dec-2014 10:29 153K
095-EnhancedPrivacyIDfromBilinearPairing.pdf 22-Dec-2014 10:29 225K
096-AnoteonthesecurityofMST3.pdf 22-Dec-2014 10:29 181K
097-IdentificationofMultipleInvalidSignaturesin..> 22-Dec-2014 10:29 331K
097-IdentificationofMultipleInvalidSignaturesin..> 22-Dec-2014 10:29 1M
098-AttackingCryptographicSchemesBasedon34Pertu..> 20-Jan-2023 08:37 245K
098-AttackingCryptographicSchemesBasedonPerturb..> 22-Dec-2014 10:29 245K
099-ASingleInitializationServerforMultiPartyCry..> 22-Dec-2014 10:29 180K
099-ASingleInitializationServerforMultiPartyCry..> 22-Dec-2014 10:29 409K
100-Computingtheendomorphismringofanordinaryell..> 22-Dec-2014 10:29 249K
101-EncryptionSchemesSecureunderSelectiveOpenin..> 22-Dec-2014 10:29 333K
102-AStepTowardsQCBlindSignatures.pdf 22-Dec-2014 10:29 152K
103-Constructingpairingfriendlyhyperellipticcur..> 22-Dec-2014 10:29 323K
104-1024AHighSecuritySoftwareOrientedBlockCiphe..> 22-Dec-2014 10:29 204K
104-1024AHighSecuritySoftwareOrientedBlockCiphe..> 22-Dec-2014 10:29 233K
105-PublicKeyCryptosystemsResilienttoKeyLeakage..> 22-Dec-2014 10:29 387K
106-ACollisionAttackonAURORA512.pdf 22-Dec-2014 10:29 152K
107-CompactECashandSimulatableVRFsRevisited.pdf 22-Dec-2014 10:29 338K
108-FurtherResultsonImplicitFactoringinPolynomi..> 22-Dec-2014 10:29 193K
109-CryptanalysisofStreamCipherGrainFamily.pdf 22-Dec-2014 10:28 179K
110-OntheSecurityofStreamCipherCryptMTv3.pdf 22-Dec-2014 10:28 142K
111-ShortChosenPrefixCollisionsforMD5andtheCrea..> 22-Dec-2014 10:28 228K
112-A2ndPreimageAttackonAURORA512.pdf 22-Dec-2014 10:28 151K
113-AttacksonAURORA512andtheDoubleMixMerkleDamg..> 22-Dec-2014 10:28 117K
114-WeaknessofKeyPredistributionSchemeProposedb..> 22-Dec-2014 10:28 195K
115-ScalableCompilersforGroupKeyEstablishmentTw..> 22-Dec-2014 10:28 216K
115-ScalableCompilersforGroupKeyEstablishmentTw..> 22-Dec-2014 10:28 1M
116-InformationTheoreticallySecureMultiPartySet..> 22-Dec-2014 10:28 317K
117-Changingprobabilitiesofdifferentialsandline..> 22-Dec-2014 10:28 95K
118-A2BEAccountableAttributeBasedEncryptionforA..> 22-Dec-2014 10:28 233K
119-AContinuousFaultCountermeasureforAESProvidi..> 22-Dec-2014 10:28 177K
120-OntheComplexityofKhovratovichetal39sPreimag..> 20-Jan-2023 08:36 89K
120-OntheComplexityofKhovratovichetalsPreimageA..> 22-Dec-2014 10:28 89K
121-OptimizedPublicKeyInfrastructureAPKItoSuppo..> 20-Jan-2023 14:21 207
122-HardwareAcceleratorfortheTatePairinginChara..> 22-Dec-2014 10:28 361K
123-OntheComplexityofIntegerFactorization.pdf 22-Dec-2014 10:28 79K
124-PracticalSecureEvaluationofSemiPrivateFunct..> 22-Dec-2014 10:28 1M
125-AFullKeyRecoveryAttackonHMACAURORA512.pdf 22-Dec-2014 10:28 203K
126-ThresholdAttributeBasedSignaturesandTheirAp..> 22-Dec-2014 10:28 363K
127-SideChannelCubeAttacksonBlockCiphers.pdf 22-Dec-2014 10:28 162K
128-AttacksonaLightweightCipherBasedonaMultiple..> 22-Dec-2014 10:28 297K
128-AttacksonaLightweightCipherBasedonaMultiple..> 22-Dec-2014 10:28 915K
129-FasterandTimingAttackResistantAESGCM.pdf 22-Dec-2014 10:28 240K
130-ConstructionsofEvenvariableBooleanFunctionw..> 22-Dec-2014 10:28 170K
131-KeyPredistributionSchemesinDistributedWirel..> 22-Dec-2014 10:28 336K
132-ANewLatticeforImplicitFactoring.pdf 20-Jan-2023 14:21 207
133-SignatureSchemeswithBoundedLeakageResilienc..> 20-Jan-2023 08:36 241K
134-AFirstOrderRecursiveConstructionofBooleanFu..> 22-Dec-2014 10:28 188K
135-PracticalKeyRecoveryAttackagainstSecretpre6..> 22-Dec-2014 10:28 370K
135-PracticalKeyRecoveryAttackagainstSecretprex..> 20-Jan-2023 08:36 370K
136-HowtoExtractandExpandRandomnessASummaryandE..> 22-Dec-2014 10:28 350K
137-TheDarkSideofSecuritybyObscurityandCloningM..> 22-Dec-2014 10:28 171K
138-AHybridRFIDProtocolagainstTrackingAttacks.pdf 22-Dec-2014 10:27 174K
138-AHybridRFIDProtocolagainstTrackingAttacks.ps 22-Dec-2014 10:27 1M
139-CertificatelessGroupOrientedSignatureSecure..> 22-Dec-2014 10:27 210K
140-TheAnalysisofGaloisSubstitutionCounterModeG..> 22-Dec-2014 10:27 162K
141-IdealHierarchicalSecretSharingSchemes.pdf 22-Dec-2014 10:27 374K
142-ChosenciphertextSecureEncryptionfromHardAlg..> 22-Dec-2014 10:27 387K
143-MultipleandUnlinkablePublicKeyEncryptionwit..> 22-Dec-2014 10:27 246K
144-OnthesecurityofIdentityBasedRingSigncryptio..> 22-Dec-2014 10:27 238K
144-OnthesecurityofIdentityBasedRingSigncryptio..> 22-Dec-2014 10:27 454K
145-SecurityofPermutationbasedCompressionFuncti..> 22-Dec-2014 10:27 345K
146-TransferableConstantSizeFairECash.pdf 22-Dec-2014 10:27 278K
146-TransferableConstantSizeFairECash.ps 22-Dec-2014 10:27 541K
147-PreimageAttackonARIRANG.pdf 22-Dec-2014 10:27 2M
148-SecretHandshakeStrongAnonymityDefinitionand..> 22-Dec-2014 10:27 155K
149-SecureEPCGen2compliantRadioFrequencyIdentif..> 22-Dec-2014 10:27 214K
150-Efficientgroupauthenticationprotocolsbasedo..> 22-Dec-2014 10:27 223K
151-Euclid39sAlgorithmGuass39EliminationandBuch..> 20-Jan-2023 08:36 112K
151-EuclidsAlgorithmGuassEliminationandBuchberg..> 22-Dec-2014 10:27 112K
152-FaceTrustAssessingtheCredibilityofOnlinePer..> 20-Jan-2023 14:21 207
153-Anewboundfort8722wisealmostuniversalhashfun..> 22-Dec-2014 10:27 250K
153-Anewboundfortwisealmostuniversalhashfunctio..> 20-Jan-2023 08:36 250K
154-Algorithmstosolvemassivelyunderdefinedsyste..> 22-Dec-2014 10:27 197K
155-FasterComputationoftheTatePairing.pdf 22-Dec-2014 10:27 221K
156-ADeterministicApproachofMergingofBlocksinTr..> 22-Dec-2014 10:27 285K
157-EfficientHalvingforGenus3CurvesoverBinaryFi..> 22-Dec-2014 10:27 352K
158-SecurityAnalysisofaProxySignatureSchemeover..> 22-Dec-2014 10:27 73K
158-SecurityAnalysisofaProxySignatureSchemeover..> 22-Dec-2014 10:27 143K
159-HardwareImplementationoftheSHA3CandidateSke..> 22-Dec-2014 10:27 131K
160-LeakageResilientPublicKeyCryptographyintheB..> 22-Dec-2014 10:27 478K
160-LeakageResilientPublicKeyCryptographyintheB..> 22-Dec-2014 10:27 802K
161-BuiltinDeterminedSubkeyCorrelationPowerAnal..> 22-Dec-2014 10:27 239K
161-BuiltinDeterminedSubkeyCorrelationPowerAnal..> 22-Dec-2014 10:26 430K
162-CertificatelessHybridSigncryption.pdf 22-Dec-2014 10:26 309K
162-CertificatelessHybridSigncryption.ps 22-Dec-2014 10:26 536K
163-ANewKeyAgreementProtocol.pdf 22-Dec-2014 10:26 66K
163-ANewKeyAgreementProtocol.ps 22-Dec-2014 10:26 170K
164-CCASecureProxyReEncryptionwithoutPairings.pdf 22-Dec-2014 10:26 261K
165-SecuringRSAagainstFaultAnalysisbyDoubleAddi..> 22-Dec-2014 10:26 281K
166-Ishallloveyouuptothedeath.pdf 22-Dec-2014 10:26 425K
167-AnewapproachforFCSRs.pdf 22-Dec-2014 10:26 299K
168-ASecondPreimageAttackAgainstEllipticCurveOn..> 22-Dec-2014 10:26 45K
169-FloatingFaultanalysisofTriviumunderWeakerAs..> 22-Dec-2014 10:26 241K
170-AnalysisofPropertyPreservationCapabilitieso..> 22-Dec-2014 10:26 428K
171-OntheTheoryandPracticeofPersonalDigitalSign..> 22-Dec-2014 10:26 290K
172-AnewProtocolfor12ObliviousTransfer.pdf 22-Dec-2014 10:26 73K
172-AnewProtocolfor12ObliviousTransfer.ps 22-Dec-2014 10:26 186K
173-FastMultibaseMethodsandOtherSeveralOptimiza..> 22-Dec-2014 10:26 253K
174-MakingtheDiffieHellmanProtocolIdentityBased..> 22-Dec-2014 10:26 262K
175-ConcreteSecurityforEntityRecognitionTheJane..> 22-Dec-2014 10:26 234K
176-Anovelmultiserverauthenticationprotocol.pdf 22-Dec-2014 10:26 497K
177-SalvagingMerkleDamgardforPracticalApplicati..> 22-Dec-2014 10:26 396K
178-CryptographicPropertiesandApplicationofaGen..> 22-Dec-2014 10:26 326K
179-NearCollisionAttackontheCompressionFunction..> 22-Dec-2014 10:26 129K
179-NearCollisionAttackontheCompressionFunction..> 22-Dec-2014 10:26 154K
180-CollaborativePrivacyPreservingDataAggregati..> 22-Dec-2014 10:26 257K
181-PSPPrivateandSecurePaymentwithRFID.pdf 22-Dec-2014 10:26 407K
182-ExtendedSubstitutionCipherChainingmodeESCC.pdf 22-Dec-2014 10:26 134K
183-ProactiveLinearIntegerSecretSharing.pdf 22-Dec-2014 10:26 179K
184-CryptanalysisofDynamicSHA2.pdf 22-Dec-2014 10:26 169K
185-AllorNothingTransformsasaCountermeasuretoDi..> 22-Dec-2014 10:26 187K
186-StatisticsofRandomPermutationsandtheCryptan..> 22-Dec-2014 10:26 235K
187-CompactMcElieceKeysfromGoppaCodes.pdf 22-Dec-2014 10:25 232K
187-CompactMcElieceKeysfromGoppaCodes.ps 22-Dec-2014 10:25 763K
188-BreakingandBuildingofGroupInsideSignature.pdf 22-Dec-2014 10:25 212K
188-BreakingandBuildingofGroupInsideSignature.ps 22-Dec-2014 10:25 410K
189-EfficientUnidirectionalProxyReEncryption.pdf 22-Dec-2014 10:25 339K
189-EfficientUnidirectionalProxyReEncryption.ps 22-Dec-2014 10:25 632K
190-Thediscretelogarithmprobleminthegroupofnons..> 22-Dec-2014 10:25 2217
190-Thediscretelogarithmprobleminthegroupofnons..> 22-Dec-2014 10:25 21K
191-Newlogicminimizationtechniqueswithapplicati..> 22-Dec-2014 10:25 180K
192-LinkabilityofBlindSignatureSchemesoverBraid..> 22-Dec-2014 10:25 60K
192-LinkabilityofBlindSignatureSchemesoverBraid..> 22-Dec-2014 10:25 122K
193-GeneralizationofBarretoetalIDbasedSigncrypt..> 22-Dec-2014 10:25 195K
194-AnalysisandEnhanceofAnonymousSigncryptionSc..> 22-Dec-2014 10:25 192K
195-SecureEvaluationofPrivateLinearBranchingPro..> 22-Dec-2014 10:25 1M
196-Analysisofonequantumbitstringcommitment.pdf 22-Dec-2014 10:25 92K
197-PracticalpseudocollisionsforhashfunctionsAR..> 22-Dec-2014 10:25 205K
198-DAAFixingthepairingbasedprotocols.pdf 20-Jan-2023 14:21 207
199-IndifferentiabilitywithDistinguishersWhySha..> 22-Dec-2014 10:25 490K
200-ASurveyontheEvolutionofCryptographicProtoco..> 22-Dec-2014 10:25 252K
201-EnhancedCryptanalysisofSubstitutionCipherCh..> 22-Dec-2014 10:25 259K
202-AGENERALIZEDFRAMEWORKFORCRISPCOMMITMENTSCHE..> 22-Dec-2014 10:25 92K
203-PracticalCryptanalysisofISOIEC97962andEMVSi..> 22-Dec-2014 10:25 334K
204-GUCSecureJoinOperatorinDistributedRelationa..> 22-Dec-2014 10:25 592K
205-RelatedMessageAttackstoPublicKeyEncryptionS..> 22-Dec-2014 10:25 202K
205-RelatedMessageAttackstoPublicKeyEncryptionS..> 22-Dec-2014 10:25 391K
206-OnOptimizedFPGAImplementationsoftheSHA3Cand..> 22-Dec-2014 10:25 249K
206-OnOptimizedFPGAImplementationsoftheSHA3Cand..> 22-Dec-2014 10:25 335K
207-UnconditionallySecureSocialSecretSharingSch..> 20-Jan-2023 14:21 207
208-PUBLICKEYCRYPTOGRAPHYUSINGPERMUTATIONPPOLYN..> 22-Dec-2014 10:25 195K
208-PUBLICKEYCRYPTOGRAPHYUSINGPERMUTATIONPPOLYN..> 22-Dec-2014 10:25 402K
209-OnDirectedTransitiveSignature.pdf 22-Dec-2014 10:25 250K
209-OnDirectedTransitiveSignature.ps 22-Dec-2014 10:25 860K
210-Sufficientconditionsforsoundtreeandsequenti..> 22-Dec-2014 10:25 429K
211-BringingZeroKnowledgeProofsofKnowledgetoPra..> 22-Dec-2014 10:24 202K
212-AFlyweightRFIDAuthenticationProtocol.pdf 20-Jan-2023 14:21 207
213-EllipticCurvesinMontgomeryFormwithB1andThei..> 22-Dec-2014 10:24 137K
214-AnOptimallyFairCoinToss.pdf 22-Dec-2014 10:24 342K
214-AnOptimallyFairCoinToss.ps 22-Dec-2014 10:24 1M
215-ASimpleandGenericConstructionofAuthenticate..> 22-Dec-2014 10:24 191K
216-TweakableEncipheringSchemesUsingOnlytheEncr..> 22-Dec-2014 10:24 185K
217-PseudoRandomFunctionsandParallelizableModes..> 22-Dec-2014 10:24 424K
218-EfficientFPGAImplementationsofHighDimension..> 22-Dec-2014 10:24 175K
219-StronglySecureCertificatelessKeyAgreement.pdf 22-Dec-2014 10:24 507K
220-SignatureSchemeswithBoundedLeakageResilienc..> 22-Dec-2014 10:24 216K
221-BonehBoyensignaturesandtheStrongDiffieHellm..> 22-Dec-2014 10:24 2M
222-PETSNAKEASpecialPurposeArchitecturetoImplem..> 22-Dec-2014 10:24 659K
223-HowToFindWeakInputDifferencesForMD5Collisio..> 22-Dec-2014 10:24 314K
224-PseudoCryptanalysisofLuffa.pdf 22-Dec-2014 10:24 88K
225-TheSecurityofAbreastDMintheIdealCipherModel..> 22-Dec-2014 10:24 197K
226-HowtoHashintoEllipticCurves.pdf 22-Dec-2014 10:24 223K
227-Computationalsoundnesscoinductionandencrypt..> 22-Dec-2014 10:24 207K
227-Computationalsoundnesscoinductionandencrypt..> 22-Dec-2014 10:24 387K
228-RevisitingHigherOrderDPAAttacksMultivariate..> 22-Dec-2014 10:24 191K
229-HardwareImplementationsofaVariantoftheZmorT..> 22-Dec-2014 10:24 198K
230-AdaptivelySecureBroadcast.pdf 22-Dec-2014 10:24 140K
230-AdaptivelySecureBroadcast.ps 22-Dec-2014 10:24 237K
231-PracticalDPAAttacksonMDPL.pdf 22-Dec-2014 10:24 271K
232-MeshHash2.pdf 22-Dec-2014 10:24 369K
233-Astrategyforrecoveringrootsofbivariatepolyn..> 22-Dec-2014 10:24 151K
234-OntheRandomnessandRegularityofReducedEDONma..> 22-Dec-2014 10:24 209K
235-BreakingandFixingofanIdentityBasedMultiSign..> 22-Dec-2014 10:24 204K
235-BreakingandFixingofanIdentityBasedMultiSign..> 22-Dec-2014 10:24 412K
236-Ellipticcurveswithweakcoveringsovercubicext..> 22-Dec-2014 10:24 210K
237-RemarksonOneArbitratedQuantumsignatureSchem..> 22-Dec-2014 10:23 79K
238-AttacksonRoundReducedBLAKE.pdf 22-Dec-2014 10:23 141K
239-ProtectingtheNOEKEONCipherAgainstSCAREAttac..> 22-Dec-2014 10:23 200K
240-GroupTestingandBatchVerification.pdf 22-Dec-2014 10:23 211K
241-DistinguisherandRelatedKeyAttackontheFullAE..> 22-Dec-2014 10:23 331K
242-Examplesofdifferentialmulticollisionsfor13a..> 22-Dec-2014 10:23 135K
243-FasterPairingsonSpecialWeierstrassCurves.pdf 22-Dec-2014 10:23 2217
243-FasterPairingsonSpecialWeierstrassCurves.ps 22-Dec-2014 10:23 59K
244-TardosFingerprintingCodesintheCombinedDigit..> 22-Dec-2014 10:23 1M
245-CryptanalysisoftheBirationalPermutationSign..> 22-Dec-2014 10:23 125K
246-OnChipElectricWavesAnAnalogCircuitApproacht..> 22-Dec-2014 10:23 1M
247-OntheNecessaryandSufficientAssumptionsforUC..> 22-Dec-2014 10:23 362K
247-OntheNecessaryandSufficientAssumptionsforUC..> 22-Dec-2014 10:23 1M
248-CryptanalysisoftheMST_3PublicKeyCryptosyste..> 22-Dec-2014 10:23 220K
249-Pseudorandomnessandpartialinformationinsymb..> 22-Dec-2014 10:23 270K
249-Pseudorandomnessandpartialinformationinsymb..> 22-Dec-2014 10:23 493K
249-SymbolicEncryptionwithPseudorandomKeys.pdf 20-Jan-2023 08:36 439K
250-ModificationsintheDesignofTriviumtoIncrease..> 20-Jan-2023 14:21 207
251-FormatPreservingEncryption.pdf 22-Dec-2014 10:23 387K
252-SparseBooleanequationsandcircuitlattices.pdf 22-Dec-2014 10:23 216K
253-FormallyandPracticallyRelatingtheCKCKHMQVan..> 22-Dec-2014 10:23 383K
254-ImprovementofOneQuantumEncryptionScheme.pdf 22-Dec-2014 10:23 104K
255-SIMPLSystemsOnaPublicKeyVariantofPhysicalUn..> 22-Dec-2014 10:23 402K
256-MultipleLinearCryptanalysisofReducedRoundSM..> 22-Dec-2014 10:23 156K
257-FORMATCONTROLLINGENCRYPTIONUSINGDATATYPEPRE..> 22-Dec-2014 10:23 316K
258-FACTORIZATIONWITHGENUS2CURVES.pdf 22-Dec-2014 10:23 220K
258-FACTORIZATIONWITHGENUS2CURVES.ps 22-Dec-2014 10:23 439K
259-DifferentialPathforSHA1withcomplexityO252.pdf 20-Jan-2023 14:21 207
260-AStudyonRAMRequirementsofVariousSHA3Candida..> 22-Dec-2014 10:23 139K
261-SecurityofCyclicDoubleBlockLengthHashFuncti..> 22-Dec-2014 10:23 311K
262-ComputationallySecureTwoRoundAuthenticatedM..> 22-Dec-2014 10:23 391K
263-GeneralErrorDecodableSecretSharingSchemeand..> 22-Dec-2014 10:22 222K
263-GeneralErrorDecodableSecretSharingSchemeand..> 22-Dec-2014 10:22 437K
264-ProposalofPPSMultivariatePublicKeyCryptosys..> 22-Dec-2014 10:22 161K
265-RevisitingtheIndifferentiabilityofPGVHashFu..> 22-Dec-2014 10:22 194K
265-RevisitingtheIndifferentiabilityofPGVHashFu..> 22-Dec-2014 10:22 329K
266-PseudorandomnessAnalysisoftheLaiMasseySchem..> 22-Dec-2014 10:22 236K
267-Simulationbasedsecurityintheappliedpicalcul..> 22-Dec-2014 10:22 208K
268-DealerFreeDynamicSecretSharingSchemeswithUn..> 20-Jan-2023 14:21 207
269-Sidechannelattacksbasedonlinearapproximatio..> 22-Dec-2014 10:22 314K
270-InformationTheoreticallySecureObliviousPoly..> 22-Dec-2014 10:22 595K
271-ReducingtheCiphertextSizeofDolevDworkNaorli..> 22-Dec-2014 10:22 136K
271-ReducingtheCiphertextSizeofDolevDworkNaorli..> 22-Dec-2014 10:22 299K
272-AConjectureonBinaryStringandItsApplications..> 22-Dec-2014 10:22 182K
273-UniversallyComposableandStatisticallySecure..> 22-Dec-2014 10:22 268K
274-ACollisionresistanceHashFunctionDIHA2.pdf 22-Dec-2014 10:22 165K
275-AlgebraicAttacksspecializedtomathbbF_2Diplo..> 22-Dec-2014 10:22 1M
276-MulticoreImplementationoftheTatePairingover..> 22-Dec-2014 10:22 305K
277-OntheFoundationsofPhysicalUnclonableFunctio..> 22-Dec-2014 10:22 684K
278-TowardsElectricalIntegratedImplementationso..> 22-Dec-2014 10:22 3M
279-AlgebraicSideChannelAttacks.pdf 22-Dec-2014 10:22 2M
280-UniversallyAnonymousIBEbasedontheQuadraticR..> 22-Dec-2014 10:21 378K
281-EnablingPublicVerifiabilityandDataDynamicsf..> 22-Dec-2014 10:21 376K
282-LeakageResilientSignatures.pdf 22-Dec-2014 10:21 282K
283-ShortandStatelessSignaturesfromtheRSAAssump..> 22-Dec-2014 10:21 232K
284-PrivacyawareAttributebasedEncryptionwithUse..> 22-Dec-2014 10:21 227K
284-PrivacyawareAttributebasedEncryptionwithUse..> 22-Dec-2014 10:21 444K
285-EfficientPublicKeyEncryptionBasedonIdealLat..> 22-Dec-2014 10:21 365K
286-OnPrivacyLossesintheTrustedAgentModelAbstra..> 22-Dec-2014 10:21 184K
287-GenericAttacksonAlternatingUnbalancedFeiste..> 22-Dec-2014 10:21 248K
288-EfficientKeyExchangewithTightSecurityReduct..> 22-Dec-2014 10:21 221K
289-AnalysisoftheEndbyHopProtocolforSecureAggre..> 22-Dec-2014 10:21 381K
290-SecurityAnalysisofAggregatesignatureandBatc..> 22-Dec-2014 10:21 155K
291-ModelingKeyCompromiseImpersonationAttackson..> 22-Dec-2014 10:21 207K
291-ModelingKeyCompromiseImpersonationAttackson..> 22-Dec-2014 10:21 437K
292-ImplementingWagner39sgeneralizedbirthdayatt..> 20-Jan-2023 08:36 290K
292-ImplementingWagnersgeneralizedbirthdayattac..> 22-Dec-2014 10:21 290K
293-EnhancingAttributebasedEncryptionwithAttrib..> 22-Dec-2014 10:21 111K
293-EnhancingAttributebasedEncryptionwithAttrib..> 22-Dec-2014 10:21 198K
294-LowLatencyHighBandwidthAnonymousOverlayNetw..> 22-Dec-2014 10:21 400K
295-DefendingAgainstKeyAbuseAttacksinKPABEEnabl..> 22-Dec-2014 10:21 265K
296-PerfectlyBalancedFunctionsinSymbolicDynamic..> 22-Dec-2014 10:21 2217
296-PerfectlyBalancedFunctionsinSymbolicDynamic..> 22-Dec-2014 10:21 50K
297-ANewImprovedDistinguisherforHC128.pdf 20-Jan-2023 14:21 207
298-CryptanalysisofCertificatelessSigncryptionS..> 22-Dec-2014 10:21 186K
298-CryptanalysisofCertificatelessSigncryptionS..> 22-Dec-2014 10:21 392K
299-Onthesecurityofoscillatorbasedrandomnumberg..> 22-Dec-2014 10:21 426K
299-Onthesecurityofoscillatorbasedrandomnumberg..> 22-Dec-2014 10:21 908K
300-UniversallyComposableContributoryGroupKeyEx..> 22-Dec-2014 10:21 269K
300-UniversallyComposableContributoryGroupKeyEx..> 22-Dec-2014 10:21 508K
301-AProbabilisticSecretSharingSchemeforaCompar..> 22-Dec-2014 10:21 149K
302-CryptanalysisofESSENCE.pdf 22-Dec-2014 10:21 222K
303-Keyextractionfromgeneralnondiscretesignals.pdf 22-Dec-2014 10:21 323K
304-Factor4and6CompressionofCyclotomicSubgroups..> 22-Dec-2014 10:21 1M
304-Factor4and6CompressionofCyclotomicSubgroups.ps 22-Dec-2014 10:20 2M
305-Improvedgenericalgorithmsfor3collisions.pdf 22-Dec-2014 10:20 188K
306-AuthenticTimeStampsforArchivalStorage.pdf 22-Dec-2014 10:20 296K
307-AnonymousSignaturesRevisited.pdf 22-Dec-2014 10:20 246K
308-AnoteontheCertificatelessMultireceiverSignc..> 22-Dec-2014 10:20 282K
309-FaultAttacksonRSASignatureswithPartiallyUnk..> 22-Dec-2014 10:20 258K
310-RFIDdistanceboundingprotocolwithmixedchalle..> 22-Dec-2014 10:20 178K
311-MultiPartyDistributedPrivateMatchingSetDisj..> 22-Dec-2014 10:20 232K
312-JacobiQuarticCurvesRevisited.pdf 22-Dec-2014 10:20 207K
312-JacobiQuarticCurvesRevisited.ps 22-Dec-2014 10:20 424K
313-IdentityBasedGroupSignaturesfromHierarchica..> 22-Dec-2014 10:20 334K
314-SecureTwoPartyComputationisPractical.pdf 22-Dec-2014 10:20 261K
315-BreakingRSAbasedPINEncryptionwiththirtyciph..> 22-Dec-2014 10:20 157K
316-AnEfficientPasswordSecurityofKeyExchangePro..> 22-Dec-2014 10:20 72K
317-RelatedkeyCryptanalysisoftheFullAES192andAE..> 22-Dec-2014 10:20 379K
318-TheFermatfactorizationmethodrevisited.pdf 22-Dec-2014 10:20 89K
318-TheFermatfactorizationmethodrevisited.ps 22-Dec-2014 10:20 226K
319-CommentsandImprovementsonChameleonHashingWi..> 22-Dec-2014 10:20 116K
320-AutomorphicSignaturesinBilinearGroupsandanA..> 22-Dec-2014 10:20 295K
320-AutomorphicSignaturesinBilinearGroupsandanA..> 22-Dec-2014 10:20 508K
321-TweakableEncipheringSchemesFromStreamCipher..> 22-Dec-2014 10:20 366K
322-CertifyingAssemblywithFormalCryptographicPr..> 22-Dec-2014 10:20 343K
323-FactoringUnbalancedModuliwithKnownBits.pdf 22-Dec-2014 10:20 174K
324-GroupOrientedFairExchangeofSignatures.pdf 22-Dec-2014 10:20 355K
325-CharacterizingPaddingRulesofMDHashFunctions..> 22-Dec-2014 10:20 308K
326-TheApplicationofPolynomialsovertheFieldofTw..> 22-Dec-2014 10:20 160K
327-SimpleAdaptiveObliviousTransferWithoutRando..> 22-Dec-2014 10:19 221K
328-Flowchartdescriptionofsecurityprimitivesfor..> 22-Dec-2014 10:19 220K
329-EfficientApproximationofHigherOrderBooleanf..> 20-Jan-2023 14:21 207
330-NTRUquaternionalgebrapublickeycryptography.pdf 20-Jan-2023 14:21 207
331-SecurityNotionsandGenericConstructionsforCl..> 22-Dec-2014 10:19 276K
332-UntraceableRFIDprotocolsarenottriviallycomp..> 22-Dec-2014 10:19 91K
333-HardFaultAnalysisofTrivium.pdf 22-Dec-2014 10:19 166K
334-AttackingReducedRoundsoftheARIABlockCipher.pdf 22-Dec-2014 10:19 172K
335-RelatedKeyRectangleAttackoftheFull80RoundHA..> 22-Dec-2014 10:19 165K
336-PartialSignaturesandtheirApplications.pdf 22-Dec-2014 10:19 314K
337-ANewLatticeBasedCryptosystemMixedwithaKnaps..> 22-Dec-2014 10:19 165K
338-Securityweaknessesintwomultiserverpasswordb..> 22-Dec-2014 10:19 488K
339-ANovelIDbasedElectronicCashSystemfromPairin..> 22-Dec-2014 10:19 623K
340-EfficientIndifferentiableHashingintoOrdinar..> 22-Dec-2014 10:19 363K
341-LeakageResilientCryptographyinPractice.pdf 22-Dec-2014 10:19 3M
342-FPGAImplementationsofSHA3CandidatesCubeHash..> 22-Dec-2014 10:19 188K
342-FPGAImplementationsofSHA3CandidatesCubeHash..> 20-Jan-2023 08:36 188K
343-PartitioningMultivariatePolynomialEquations..> 22-Dec-2014 10:19 2M
344-CommentsonShaoCao39sUnidirectionalProxyReEn..> 20-Jan-2023 08:36 173K
344-CommentsonShaoCaosUnidirectionalProxyReEncr..> 22-Dec-2014 10:19 139K
344-CommentsonShaoCaosUnidirectionalProxyReEncr..> 22-Dec-2014 10:19 310K
345-AnonymousIDBasedSigncryptionSchemeforMultip..> 22-Dec-2014 10:19 362K
346-SecurityAnalysisoftheGFNLFSRStructureandFou..> 22-Dec-2014 10:19 211K
347-AnEfficientConcurrentRepetitionTheorem.pdf 22-Dec-2014 10:19 223K
348-Aprovablysecurereallysourcehidingdesignated..> 22-Dec-2014 10:19 660K
349-CompactHardwareImplementationsoftheSHA3Cand..> 22-Dec-2014 10:19 238K
349-CompactHardwareImplementationsoftheSHA3Cand..> 20-Jan-2023 08:36 238K
350-GameTheoreticResistancetoDenialofServiceAtt..> 22-Dec-2014 10:19 454K
351-HowtoDelegateaLatticeBasis.pdf 22-Dec-2014 10:19 358K
351-HowtoDelegateaLatticeBasis.ps 22-Dec-2014 10:19 639K
352-OntheDualityofProbingandFaultAttacks.pdf 22-Dec-2014 10:18 410K
353-ComparingSessionStateRevealandEphemeralKeyR..> 22-Dec-2014 10:18 357K
354-CacheTimingAttacksonCamelliaBlockCipher.pdf 22-Dec-2014 10:18 591K
355-AsynchronousDistributedPrivateKeyGenerators..> 22-Dec-2014 10:18 302K
355-AsynchronousDistributedPrivateKeyGenerators..> 22-Dec-2014 10:18 489K
356-ADomainExtenderfortheIdealCipher.pdf 22-Dec-2014 10:18 310K
357-ImpossibleDifferentialCryptanalysisofFOX.pdf 22-Dec-2014 10:18 164K
358-MACPrecomputationwithApplicationstoSecureMe..> 22-Dec-2014 10:18 220K
358-MACPrecomputationwithApplicationstoSecureMe..> 22-Dec-2014 10:18 928K
359-BonsaiTreesorArboricultureinLatticeBasedCry..> 22-Dec-2014 10:18 294K
360-CryptanalysisofaGeneralizedUnbalancedFeiste..> 22-Dec-2014 10:18 244K
360-CryptanalysisofaGeneralizedUnbalancedFeiste..> 22-Dec-2014 10:18 3M
361-OntheSecurityofaProxyBlindSignatureSchemeov..> 22-Dec-2014 10:18 94K
361-OntheSecurityofaProxyBlindSignatureSchemeov..> 22-Dec-2014 10:18 179K
362-TowardaGenericConstructionofConvertibleUnde..> 22-Dec-2014 10:18 213K
363-SomeLatticesAttacksonDSAandECDSA.pdf 22-Dec-2014 10:18 121K
364-PositionBasedCryptography.pdf 22-Dec-2014 10:18 878K
365-SpaceEfficientSecretSharingARecursiveApproa..> 22-Dec-2014 10:18 144K
366-AdaptiveZeroKnowledgeProofsandAdaptivelySec..> 22-Dec-2014 10:18 374K
366-AdaptiveZeroKnowledgeProofsandAdaptivelySec..> 22-Dec-2014 10:18 628K
367-NondelegatableIdentitybasedDesignatedVerifi..> 22-Dec-2014 10:18 173K
368-ASimulationBasedTreatmentofAuthenticatedMes..> 22-Dec-2014 10:18 405K
369-QuantumreadoutofPhysicalUnclonableFunctions..> 22-Dec-2014 10:18 268K
370-Astudyofpairingcomputationforellipticcurves..> 22-Dec-2014 10:18 194K
370-Astudyofpairingcomputationforellipticcurves..> 22-Dec-2014 10:18 428K
371-AttributeSetsAPracticallyMotivatedEnhanceme..> 22-Dec-2014 10:17 350K
372-MoreonKeyWrapping.pdf 22-Dec-2014 10:17 295K
372-MoreonKeyWrapping.ps 22-Dec-2014 10:17 532K
373-UtilityDependenceinCorrectandFairRationalSe..> 22-Dec-2014 10:17 269K
374-KeyRecoveryAttacksofPracticalComplexityonAE..> 22-Dec-2014 10:17 292K
375-ForgottenSecretRecoveringSchemeandFuzzyVaul..> 22-Dec-2014 10:17 132K
376-CryptanalysisoftheTillichZemorhashfunction.pdf 22-Dec-2014 10:17 182K
376-CryptanalysisoftheTillichZmorhashfunction.pdf 20-Jan-2023 08:36 182K
377-ChosenCiphertextSecureRSAtypeCryptosystems.pdf 22-Dec-2014 10:17 428K
378-DetectablecorrelationsinEdonR.pdf 22-Dec-2014 10:17 101K
379-ProtectingCircuitsfromComputationallyBounde..> 22-Dec-2014 10:17 774K
380-UntraceableTagsbasedonMildAssumptions.pdf 22-Dec-2014 10:17 229K
381-AshortNoteonDiscreteLogProbleminmathbbF_p.pdf 22-Dec-2014 10:17 96K
381-AshortNoteonDiscreteLogProbleminmathbbF_p.ps 22-Dec-2014 10:17 250K
382-LinearizationFrameworkforCollisionAttacksAp..> 22-Dec-2014 10:17 324K
383-ARegistrationSchemetoAllocateaUniqueIdentif..> 22-Dec-2014 10:17 84K
384-PracticalAttacksonNESHA256.pdf 22-Dec-2014 10:17 106K
385-DualSystemEncryptionRealizingFullySecureIBE..> 22-Dec-2014 10:17 312K
386-QTRUALatticeAttackResistantVersionofNTRU.pdf 22-Dec-2014 10:17 270K
387-SecuringPlasticMoneyUsinganRFIDBasedProtoco..> 22-Dec-2014 10:17 653K
388-ASimpleSecretSharingSchemeforHierarchicalTh..> 20-Jan-2023 14:21 207
389-OntheSecurityof1024bitRSAand160bitEllipticC..> 22-Dec-2014 10:17 217K
390-SublinearSizePairingbasedNoninteractiveZero..> 22-Dec-2014 10:17 255K
390-SublinearSizePairingbasedNoninteractiveZero..> 22-Dec-2014 10:17 638K
391-ThresholdDecryptionandZeroKnowledgeProofsfo..> 22-Dec-2014 10:17 353K
392-ComputationalSoundnessforKeyExchangeProtoco..> 22-Dec-2014 10:17 482K
393-PermutationPolynomialsmodulopn.pdf 22-Dec-2014 10:17 108K
393-PermutationPolynomialsmodulopn.ps 22-Dec-2014 10:17 260K
394-ProvablySecureConvertibleUndeniableSignatur..> 22-Dec-2014 10:17 445K
395-FirstCPIRProtocolwithDataDependentComputati..> 22-Dec-2014 10:17 242K
396-ComputationalIndistinguishabilityAmplificat..> 22-Dec-2014 10:17 396K
397-LinearCryptanalysisofReducedRoundPRESENT.pdf 22-Dec-2014 10:16 198K
397-LinearCryptanalysisofReducedRoundPRESENT.ps 22-Dec-2014 10:16 431K
398-FastArchitecturesfortheeta_TPairingoverSmal..> 22-Dec-2014 10:16 413K
399-LeakageResilientStorage.pdf 22-Dec-2014 10:16 399K
400-IdentityBasedChameleonHashSchemeWithoutKeyE..> 22-Dec-2014 10:16 155K
401-LongestCommonSubsequenceasPrivateSearch.pdf 22-Dec-2014 10:16 257K
402-AIDABreaksBIVIUMABin1MinuteDualCoreCPUTime.pdf 22-Dec-2014 10:16 152K
402-AIDABreaksBIVIUMAampBin1MinuteDualCoreCPUTi..> 20-Jan-2023 08:36 152K
403-OnGenericConstructionsofDesignatedConfirmer..> 20-Jan-2023 08:36 206K
403-OnGenericConstructionsofDesignatedConfirmer..> 22-Dec-2014 10:16 203K
403-OnGenericConstructionsofDesignatedConfirmer..> 22-Dec-2014 10:16 363K
404-PairingFriendlyEllipticCurvesWithVariousDis..> 20-Jan-2023 14:21 207
405-GenericAttacksonMistySchemes5roundsisnoteno..> 22-Dec-2014 10:16 298K
406-OnlineNontransferableSignaturesRevisited.pdf 22-Dec-2014 10:16 458K
407-SingleBlockAttacksandStatisticalTestsonCube..> 22-Dec-2014 10:16 192K
407-SingleBlockAttacksandStatisticalTestsonCube..> 22-Dec-2014 10:16 2M
408-ASecureandEfficientAuthenticatedDiffieHellm..> 22-Dec-2014 10:16 349K
408-ASecureandEfficientAuthenticatedDiffieHellm..> 22-Dec-2014 10:16 1M
409-ATreeBasedRecursiveSchemeforSpaceEfficientS..> 22-Dec-2014 10:16 459K
409-ATreeBasedRecursiveSchemeforSpaceEfficientS..> 22-Dec-2014 10:16 970K
410-AuthenticatedBroadcastwithaPartiallyComprom..> 22-Dec-2014 10:16 227K
411-ImprovedGarbledCircuitBuildingBlocksandAppl..> 22-Dec-2014 10:16 990K
412-DistinguishingAttacksonStreamCiphersBasedon..> 22-Dec-2014 10:16 287K
413-ThreeImprovedAlgorithmsforMultipathKeyEstab..> 22-Dec-2014 10:16 233K
414-SecurityBoundsfortheDesignofCodebasedCrypto..> 22-Dec-2014 10:16 318K
415-AttacksAgainstPermuteTransformXorCompressio..> 22-Dec-2014 10:16 343K
416-KronCryptANewSymmetricCryptosystemBasedonKr..> 20-Jan-2023 08:36 362K
416-KronCryptANewSymmetricCryptosystemBasedonKr..> 22-Dec-2014 10:16 362K
417-MoreDifferentialPathsofTIB3.pdf 22-Dec-2014 10:15 460K
417-MoreDifferentialPathsofTIB3.ps 22-Dec-2014 10:15 794K
418-SubtletiesintheDefinitionofINDCCAWhenandHow..> 22-Dec-2014 10:15 242K
419-AnEfficientMethodforRandomDelayGenerationin..> 22-Dec-2014 10:15 353K
420-HigherorderMaskingandShufflingforSoftwareIm..> 22-Dec-2014 10:15 286K
421-HowtoConstructIdentityBasedSignatureswithou..> 22-Dec-2014 10:15 225K
421-HowtoConstructIdentityBasedSignatureswithou..> 22-Dec-2014 10:15 417K
422-AttacksonRFIDBasedElectronicVotingSystems.pdf 22-Dec-2014 10:15 447K
423-Utilizingpostponedephemeralandpseudostatick..> 22-Dec-2014 10:15 125K
424-DoubleVoterPerceptibleBlindSignatureBasedEl..> 22-Dec-2014 10:15 768K
425-CryptanalysisandSecurityEnhancementontheGen..> 22-Dec-2014 10:15 125K
426-CheatingDetectionandCheaterIdentificationin..> 22-Dec-2014 10:15 220K
427-EfficientVerifiableEscrowandFairExchangewit..> 22-Dec-2014 10:15 306K
428-EfficientlyfromSemihonesttoMaliciousOTviaOL..> 22-Dec-2014 10:15 224K
429-PreciseTimeandSpaceSimulatableZeroKnowledge..> 22-Dec-2014 10:15 271K
430-Onetimepasswordauthenticatedkeyexchange.pdf 22-Dec-2014 10:15 260K
431-OntheDesignofTrivium.pdf 22-Dec-2014 10:15 359K
431-OntheDesignofTrivium.ps 22-Dec-2014 10:15 1M
432-PracticalDistributedKeyGenerationScheme.pdf 20-Jan-2023 14:21 207
433-CommunicationOptimalMultiValuedAsynchronous..> 22-Dec-2014 10:15 304K
434-TightBoundsforProtocolswithHybridSecurity.pdf 22-Dec-2014 10:15 388K
435-EfficientConfirmerSignaturesfromtheSignatur..> 20-Jan-2023 08:36 230K
435-EfficientConfirmerSignaturesfromtheSignatur..> 22-Dec-2014 10:15 226K
435-EfficientConfirmerSignaturesfromtheSignatur..> 22-Dec-2014 10:15 403K
436-OntheConnectionbetweenSigncryptionandOnepas..> 22-Dec-2014 10:15 312K
436-OntheConnectionbetweenSigncryptionandOnepas..> 22-Dec-2014 10:15 553K
437-OntheRelationsBetweenDiffieHellmanandIDBase..> 22-Dec-2014 10:15 179K
437-OntheRelationsBetweenDiffieHellmanandIDBase..> 22-Dec-2014 10:15 387K
438-ImprovedCryptanalysisofSkein.pdf 22-Dec-2014 10:15 194K
439-AFastMentalPokerProtocol.pdf 22-Dec-2014 10:15 228K
439-AFastMentalPokerProtocol.ps 22-Dec-2014 10:14 516K
440-AMultivariateSignatureSchemewithanalmostcyc..> 22-Dec-2014 10:14 97K
440-AMultivariateSignatureSchemewithanalmostcyc..> 22-Dec-2014 10:14 240K
441-AnEfficientTwoPartyIdentityBasedKeyExchange..> 22-Dec-2014 10:14 77K
442-FuzzyPrivacyPreservingPeertoPeerReputationM..> 22-Dec-2014 10:14 160K
443-ReboundAttackontheFullLANECompressionFuncti..> 22-Dec-2014 10:14 480K
444-SecureandEfficientHBCMEntityAuthenticationP..> 22-Dec-2014 10:14 271K
445-ComputingHilbertclasspolynomialswiththeChin..> 22-Dec-2014 10:14 405K
446-NtrulikePublicKeyCryptosystemsbeyondDedekin..> 22-Dec-2014 10:14 167K
447-ROSSLERNONLINEARDYNAMICALMACHINEFORCRYPTOGR..> 22-Dec-2014 10:14 58K
448-PreciseBoundedConcurrentZeroKnowledgeinAlmo..> 22-Dec-2014 10:14 325K
449-OneforAllAllforOneUnifyingStandardDPAAttack..> 22-Dec-2014 10:14 406K
449-OneforAllAllforOneUnifyingStandardDPAAttack..> 22-Dec-2014 10:14 1M
450-OnHierarchicalThresholdSecretSharing.pdf 22-Dec-2014 10:14 104K
451-EfficientCertificatelessKEMintheStandardMod..> 22-Dec-2014 10:14 265K
452-CryptanalysisoftheNiederreiterPublicKeySche..> 22-Dec-2014 10:14 192K
453-ANoteonLinearApproximationsofBLUEMIDNIGHTWI..> 22-Dec-2014 10:14 2M
454-AnEfficientConvertibleUndeniableSignatureSc..> 22-Dec-2014 10:14 271K
455-IdentityBasedHybridSigncryption.pdf 22-Dec-2014 10:14 117K
455-IdentityBasedHybridSigncryption.ps 22-Dec-2014 10:14 209K
456-AnAutomataTheoreticInterpretationofIterated..> 20-Jan-2023 14:21 207
457-Aremarkonthecomputationofcuberootsinfinitef..> 22-Dec-2014 10:14 110K
458-SecurityAnalysisandDesignofProxySignatureSc..> 22-Dec-2014 10:14 175K
459-EfficientObliviousPolynomialEvaluationwithS..> 22-Dec-2014 10:14 392K
459-EfficientObliviousPolynomialEvaluationwithS..> 22-Dec-2014 10:14 648K
460-Asymptoticenumerationofcorrelationimmuneboo..> 22-Dec-2014 10:14 199K
461-AFrameworkforNonInteractiveInstanceDependen..> 22-Dec-2014 10:14 289K
462-CertificatelessKEMandHybridSigncryptionSche..> 22-Dec-2014 10:14 254K
462-CertificatelessKEMandHybridSigncryptionSche..> 22-Dec-2014 10:14 498K
463-OnLinearCryptanalysiswithManyLinearApproxim..> 22-Dec-2014 10:14 269K
464-OnKeyAuthenticDegreeofCryptosystem.pdf 22-Dec-2014 10:13 82K
465-ReadersBehavingBadlyReaderRevocationinPKIBa..> 22-Dec-2014 10:13 308K
466-TheCerticomChallengesECC2X.pdf 22-Dec-2014 10:13 511K
467-TheLPNProblemwithAuxiliaryInput.pdf 20-Jan-2023 14:21 207
468-PasswordBasedKeyExchangewithHiddenEllipticC..> 22-Dec-2014 10:13 260K
469-AdditiveCombinatoricsandDiscreteLogarithmBa..> 22-Dec-2014 10:13 589K
470-OnTheCommunicationComplexityofPerfectlySecu..> 22-Dec-2014 10:13 341K
471-ImprovingtheBerlekampalgorithmforbinomialsb..> 22-Dec-2014 10:13 92K
471-ImprovingtheBerlekampalgorithmforbinomialsb..> 22-Dec-2014 10:13 262K
472-CryptanalysisofaMessageRecognitionProtocolb..> 22-Dec-2014 10:13 181K
473-ASimplePowerAnalysisAttackontheSerpentKeySc..> 22-Dec-2014 10:13 126K
473-ASimplePowerAnalysisAttackontheSerpentKeySc..> 22-Dec-2014 10:13 328K
474-ResettablePublicKeyEncryptionHowtoEncrypton..> 22-Dec-2014 10:13 210K
475-DoubleExponentiationinFactor4GroupsanditsAp..> 22-Dec-2014 10:13 546K
475-DoubleExponentiationinFactor4GroupsanditsAp..> 22-Dec-2014 10:13 712K
476-OntheSecurityofPASPredicatebasedAuthenticat..> 22-Dec-2014 10:13 316K
477-PreimagesforStepReducedSHA2.pdf 22-Dec-2014 10:13 195K
478-PseudocryptanalysisoftheOriginalBlueMidnigh..> 22-Dec-2014 10:13 213K
479-PreimageAttackson41StepSHA256and46StepSHA51..> 22-Dec-2014 10:13 277K
480-OnCryptographicProtocolsEmployingAsymmetric..> 22-Dec-2014 10:13 245K
481-PPSPrivacyPreservingStatisticsusingRFIDTags..> 22-Dec-2014 10:13 298K
482-NewTechniquesforDualSystemEncryptionandFull..> 22-Dec-2014 10:13 224K
483-OntheSecurityofUOV.pdf 22-Dec-2014 10:13 154K
484-NewPseudoNearCollisionAttackonReducedRoundo..> 22-Dec-2014 10:13 70K
485-BlackBoxCircularSecureEncryptionBeyondAffin..> 22-Dec-2014 10:13 225K
486-EfficientPseudorandomFunctionsFromtheDecisi..> 22-Dec-2014 10:13 193K
487-ErrorDecodableSecretSharingandOneRoundPerfe..> 22-Dec-2014 10:13 206K
488-LittleDragonTwoAnefficientMultivariatePubli..> 22-Dec-2014 10:13 251K
489-ImpossibleBoomerangAttackforBlockCipherStru..> 22-Dec-2014 10:13 221K
490-CryptanalysisofMultipleServerPasswordAuthen..> 22-Dec-2014 10:13 151K
491-PracticalPrivateSetIntersectionProtocolswit..> 22-Dec-2014 10:12 290K
492-EfficientStatisticalAsynchronousVerifiableS..> 22-Dec-2014 10:12 645K
493-RemarksonSomeQuantumCryptographicSchemes.pdf 22-Dec-2014 10:12 86K
494-AFrameworkforUniversallyComposableNonCommit..> 22-Dec-2014 10:12 655K
495-SecurityWeaknessinTwoAuthenticatedKeyExchan..> 22-Dec-2014 10:12 88K
496-AnonymousFuzzyIdentitybasedEncryptionforSim..> 22-Dec-2014 10:12 306K
496-AnonymousFuzzyIdentitybasedEncryptionforSim..> 22-Dec-2014 10:12 553K
497-CubeAttackonCourtoisToyCipher.pdf 22-Dec-2014 10:12 464K
498-NTRUbasedgrouporientedsignature.pdf 22-Dec-2014 10:12 68K
499-UnderlyingAssumptionsandDesignatedVerifierS..> 22-Dec-2014 10:12 194K
499-UnderlyingAssumptionsandDesignatedVerifierS..> 22-Dec-2014 10:12 402K
500-KeyRecoveryAttackonQuiSci.pdf 22-Dec-2014 10:12 84K
500-KeyRecoveryAttackonQuiSci.ps 22-Dec-2014 10:12 200K
501-FastImplementationsofAESonVariousPlatforms.pdf 22-Dec-2014 10:12 174K
502-OnsecondordernonlinearitiesofcubicmonomialB..> 22-Dec-2014 10:12 156K
503-FaultAttacksAgainstEMVSignatures.pdf 22-Dec-2014 10:12 200K
504-InsecureProvableSecureNetworkCoding.pdf 22-Dec-2014 10:12 153K
504-InsecureProvableSecureNetworkCoding3939.pdf 20-Jan-2023 08:36 153K
505-AuthenticatedKeyExchangeProtocolswithEnhanc..> 22-Dec-2014 10:12 157K
506-AnInvestigationoftheEnhancedTargetCollision..> 22-Dec-2014 10:12 431K
507-E64259cientPrivacyPreservingFaceRecognition..> 22-Dec-2014 10:12 645K
507-EcientPrivacyPreservingFaceRecognition.pdf 20-Jan-2023 08:36 645K
508-OntheEfficiencyofClassicalandQuantumOblivio..> 22-Dec-2014 10:12 342K
509-PracticalKeyRecoveryAttacksOnTwoMcElieceVar..> 22-Dec-2014 10:12 224K
510-HighSpeedHardwareImplementationsofBLAKEBlue..> 22-Dec-2014 10:12 647K
510-HighSpeedHardwareImplementationsofBLAKEBlue..> 20-Jan-2023 08:36 647K
511-BoundedKeyDependentMessageSecurity.pdf 22-Dec-2014 10:12 697K
512-PublicKeyEncryptionintheBoundedRetrievalMod..> 22-Dec-2014 10:12 464K
512-PublicKeyEncryptionintheBoundedRetrievalMod..> 22-Dec-2014 10:12 740K
513-Ontheroundcomplexityofblackboxconstructions..> 22-Dec-2014 10:12 431K
514-GenericOneRoundGroupKeyExchangeintheStandar..> 22-Dec-2014 10:12 217K
514-GenericOneRoundGroupKeyExchangeintheStandar..> 22-Dec-2014 10:12 735K
515-BlakeWilsonJohnsonandMenezesProtocolRevisit..> 22-Dec-2014 10:11 189K
516-LightweightCryptographyCryptographicEnginee..> 22-Dec-2014 10:11 7M
517-NewConstructionsofConvertibleUndeniableSign..> 22-Dec-2014 10:11 399K
518-EfficientStrongDesignatedVerifierSignatureS..> 22-Dec-2014 10:11 303K
519-SecureMessageTransmissionwithSmallPublicDis..> 22-Dec-2014 10:11 313K
520-UniversallyComposableIncoercibility.pdf 22-Dec-2014 10:11 492K
521-AnEfficientSecureObliviousTransfer.pdf 22-Dec-2014 10:11 234K
522-IsogeniesofEllipticCurvesAComputationalAppr..> 22-Dec-2014 10:11 324K
523-DifferentialAdditioningeneralizedEdwardsCoo..> 22-Dec-2014 10:11 127K
524-ChosenCiphertextSecurityfromSlightlyLossyTr..> 22-Dec-2014 10:11 269K
525-OnQuantifyingtheResistanceofConcreteHashFun..> 22-Dec-2014 10:11 310K
525-OnQuantifyingtheResistanceofConcreteHashFun..> 22-Dec-2014 10:11 588K
526-ImprovedRelatedKeyBoomerangAttacksonRoundRe..> 22-Dec-2014 10:11 234K
527-AnEfficientAdaptiveDeniableConcurrentNonmal..> 22-Dec-2014 10:11 323K
528-NewFaultAttackonEllipticCurveScalarMultipli..> 22-Dec-2014 10:11 164K
529-ObliviousTransferwithAccessControl.pdf 22-Dec-2014 10:11 317K
530-ANewProposalAgainsttheMainofGenericAttacks.pdf 22-Dec-2014 10:11 177K
531-SuperSboxCryptanalysisImprovedAttacksforAES..> 22-Dec-2014 10:11 335K
532-BuildingEfficientFullyCollusionResilientTra..> 22-Dec-2014 10:11 465K
533-Findingcompositeorderordinaryellipticcurves..> 22-Dec-2014 10:11 188K
534-Weaknessesandimprovementofthreepartyauthent..> 20-Jan-2023 14:21 207
535-Weaknessofathreepartypasswordbasedauthentic..> 20-Jan-2023 14:21 207
536-Practicalremotemutualauthenticationwithkeya..> 20-Jan-2023 14:21 207
537-Cryptanalysisoftwoknapsackpublickeycryptosy..> 22-Dec-2014 10:11 150K
538-SideChannelAnalysisofCryptographicSoftwarev..> 22-Dec-2014 10:11 272K
538-SideChannelAnalysisofCryptographicSoftwarev..> 22-Dec-2014 10:10 859K
539-CoveringRadiusofTwodimensionalLattices.pdf 22-Dec-2014 10:10 135K
540-ConvertingPairingBasedCryptosystemsfromComp..> 22-Dec-2014 10:10 336K
541-BreakingECC2K130.pdf 22-Dec-2014 10:10 247K
542-AnalysisofIntermediateFieldSystems.pdf 22-Dec-2014 10:10 196K
543-AFormalFrameworkforCryptanalyzingRFIDDistan..> 20-Jan-2023 14:21 207
544-ConnectionsbetweenQuaternaryandBinaryBentFu..> 22-Dec-2014 10:10 156K
544-ConnectionsbetweenQuaternaryandBinaryBentFu..> 22-Dec-2014 10:10 350K
545-Fuzzyextractorsforcontinuousdistributions.pdf 22-Dec-2014 10:10 241K
546-ConstructionofANewClassofLinearMultivariate..> 22-Dec-2014 10:10 161K
547-NonInteractiveVerifiableComputingOutsourcin..> 22-Dec-2014 10:10 175K
547-NonInteractiveVerifiableComputingOutsourcin..> 22-Dec-2014 10:10 608K
548-ANOTEONYAO39STHEOREMABOUTPSEUDORANDOMGENERA..> 20-Jan-2023 08:36 191K
548-ANOTEONYAOSTHEOREMABOUTPSEUDORANDOMGENERATO..> 22-Dec-2014 10:10 569K
548-ANOTEONYAOSTHEOREMABOUTPSEUDORANDOMGENERATO..> 22-Dec-2014 10:10 752K
549-MakingCollusionSecureCodesMoreRobustagainst..> 22-Dec-2014 10:10 165K
550-HowtoConstructCryptosystemsandHashFunctions..> 22-Dec-2014 10:10 162K
551-ANovelDesignMethodofStreamCiphersBasedonTab..> 22-Dec-2014 10:10 79K
552-PreimageAttacksonReducedDHA256.pdf 22-Dec-2014 10:10 280K
553-Cryptanalysisofakeyexchangeschemebasedonblo..> 22-Dec-2014 10:10 221K
554-ONACOMBINATORIALCONJECTURE.pdf 22-Dec-2014 10:10 162K
555-Anenhancedpasswordauthenticatedkeyagreement..> 20-Jan-2023 14:21 207
556-ConstructingTowerExtensionsfortheimplementa..> 22-Dec-2014 10:10 210K
557-TowardsaTheoryofTrustBasedCollaborativeSear..> 20-Jan-2023 14:21 207
558-QuantifyingTrust.pdf 20-Jan-2023 14:21 207
559-NewIntegralDistinguisherforRijndael256.pdf 22-Dec-2014 10:10 138K
560-OntheSecurityVulnerabilitiesofaHashBasedStr..> 22-Dec-2014 10:10 62K
561-Improvementsontwopasswordbasedauthenticatio..> 22-Dec-2014 10:10 633K
562-Howtopairwithahuman.pdf 22-Dec-2014 10:10 414K
563-AFamilyofparyBinomialBentFunctions.pdf 22-Dec-2014 10:10 182K
564-Optimalpairingrevisited.pdf 22-Dec-2014 10:10 220K
565-FasterSquaringintheCyclotomicSubgroupofSixt..> 22-Dec-2014 10:10 227K
566-NewCryptosystemsFromCSPBasedSelfDistributiv..> 22-Dec-2014 10:10 334K
567-PropertiesoftheDiscreteDifferentialwithCryp..> 22-Dec-2014 10:10 189K
568-EphemeralkeycompromiseattackontheIBKAprotoc..> 22-Dec-2014 10:09 93K
569-SecureNetworkCodingOvertheIntegers.pdf 22-Dec-2014 10:09 285K
570-AchievingObliviousTransferCapacityofGeneral..> 22-Dec-2014 10:09 242K
571-FullyHomomorphicEncryptionwithRelativelySma..> 22-Dec-2014 10:09 262K
572-OntheEquivalenceofTwoModelsforKeyDependentM..> 20-Jan-2023 14:21 207
573-NewAdditionOperationandItsApplicationforSca..> 22-Dec-2014 10:09 157K
574-VotingwithunconditionalprivacyCFSYforboothv..> 22-Dec-2014 10:09 218K
574-VotingwithunconditionalprivacyCFSYforboothv..> 22-Dec-2014 10:09 735K
575-DifferentialFaultAnalysisoftheAdvancedEncry..> 22-Dec-2014 10:09 296K
576-PublicKeyCryptographicPrimitivesProvablyasS..> 22-Dec-2014 10:09 234K
577-OnthenonlinearityprofileoftheDillonfunction..> 22-Dec-2014 10:09 181K
578-EfficientandProvablySecureCertificatelessSi..> 22-Dec-2014 10:09 161K
578-EfficientandProvablySecureCertificatelessSi..> 22-Dec-2014 10:09 252K
579-PrivacyPreservingPublicAuditingforSecureClo..> 22-Dec-2014 10:09 245K
580-AcompletesetofadditionlawsforincompleteEdwa..> 22-Dec-2014 10:09 237K
581-ADiagonalFaultAttackontheAdvancedEncryption..> 22-Dec-2014 10:09 388K
582-AGameBasedDefinitionofCoercionResistanceand..> 22-Dec-2014 10:09 597K
583-DifferentialAlgebraicAlgorithmsfortheIsomor..> 22-Dec-2014 10:09 387K
584-ScanbasedAttacksonLinearFeedbackShiftRegist..> 22-Dec-2014 10:09 182K
585-AnImprovedDifferentialFaultAttackonCamellia..> 22-Dec-2014 10:09 644K
586-Ameanvalueformulaforellipticcurves.pdf 22-Dec-2014 10:09 96K
586-Ameanvalueformulaforellipticcurves.ps 22-Dec-2014 10:09 421K
587-PolyDragonAnefficientMultivariatePublicKeyC..> 22-Dec-2014 10:09 202K
588-ConfidentialSignaturesandDeterministicSignc..> 22-Dec-2014 10:09 372K
588-ConfidentialSignaturesandDeterministicSignc..> 22-Dec-2014 10:09 664K
589-InformationsetdecodingforlinearcodesoverFq.pdf 22-Dec-2014 10:09 181K
590-MoreConstructionsofLossyandCorrelationSecur..> 22-Dec-2014 10:09 426K
591-EmbeddedSFEOffloadingServerandNetworkusingH..> 22-Dec-2014 10:09 600K
592-FromPassivetoCovertSecurityatLowCost.pdf 22-Dec-2014 10:09 269K
593-EnablingEfficientFuzzyKeywordSearchoverEncr..> 22-Dec-2014 10:08 382K
593-EnablingEfficientFuzzyKeywordSearchoverEncr..> 22-Dec-2014 10:08 2M
594-EfficientSetOperationsinthePresenceofMalici..> 22-Dec-2014 10:08 301K
595-EfficiencyLimitationsforSigmaProtocolsforGr..> 22-Dec-2014 10:08 266K
596-CouldSFLASHberepaired.pdf 22-Dec-2014 10:08 221K
596-CouldSFLASHberepaired.ps 22-Dec-2014 10:08 435K
597-TwistedJacobiIntersectionsCurves.pdf 22-Dec-2014 10:08 137K
597-TwistedJacobiIntersectionsCurves.ps 22-Dec-2014 10:08 471K
598-OntheDesignandImplementationofanEfficientDA..> 22-Dec-2014 10:08 237K
599-GrothSahaiproofsrevisited.pdf 22-Dec-2014 10:08 212K
600-ConstructingCertificatelessEncryptionandIDB..> 22-Dec-2014 10:08 272K
601-ParallelShortestLatticeVectorEnumerationonG..> 22-Dec-2014 10:08 265K
602-SecureRangingWithMessageTemporalIntegrity.pdf 22-Dec-2014 10:08 496K
602-SecureRangingWithMessageTemporalIntegrity.ps 22-Dec-2014 10:08 2M
603-AnFPGATechnologiesAreaExaminationoftheSHA3H..> 22-Dec-2014 10:08 84K
604-CompositionofZeroKnowledgeProofswithEfficie..> 22-Dec-2014 10:08 248K
605-SolvingtheShortestLatticeVectorProbleminTim..> 22-Dec-2014 10:08 217K
606-OnaweaknessoftheTuDengfunctionanditsrepair.pdf 22-Dec-2014 10:08 155K
607-EfficientClientPuzzlesbasedonRepeatedSquari..> 20-Jan-2023 14:21 207
608-NonMalleableCodes.pdf 22-Dec-2014 10:08 285K
608-NonMalleableCodes.ps 22-Dec-2014 10:08 477K
609-GroupingProofProtocolforRFIDTagsSecurityDef..> 22-Dec-2014 10:08 204K
610-SecurityAnalysisofARemoteUserAuthentication..> 22-Dec-2014 10:08 72K
611-GoldenFishAnIntelligentStreamCipherFuseMemo..> 22-Dec-2014 10:08 78K
612-OntheImpossibilityofBatchUpdateforCryptogra..> 22-Dec-2014 10:08 248K
613-ClassificationofElliptichyperellipticCurves..> 22-Dec-2014 10:08 178K
614-SecureMultipartyAESfullpaper.pdf 22-Dec-2014 10:08 200K
615-FasterPairingComputationsonCurveswithHighDe..> 22-Dec-2014 10:07 238K
616-FullyHomomorphicEncryptionovertheIntegers.pdf 22-Dec-2014 10:07 359K
616-FullyHomomorphicEncryptionovertheIntegers.ps 22-Dec-2014 10:07 620K
617-AnefficientIDbaseddirectedsignatureschemefr..> 22-Dec-2014 10:07 116K
618-DataDependHashAlgorithm.pdf 22-Dec-2014 10:07 110K
619-AFamilyofWeakKeysinHFEandtheCorrespondingPr..> 22-Dec-2014 10:07 377K
620-SecurityofECQVCertifiedECDSAAgainstPassiveA..> 22-Dec-2014 10:07 186K
621-OntheAnalysisofCryptographicAssumptionsinth..> 22-Dec-2014 10:07 510K
622-AStrongBlindSignatureSchemeoverBraidGroups.pdf 22-Dec-2014 10:07 183K
623-UniversallyConstructing12thDegreeExtensionF..> 22-Dec-2014 10:07 214K
624-SecurityAnalysisofthePACEKeyAgreementProtoc..> 22-Dec-2014 10:07 249K
624-SecurityAnalysisofthePACEKeyAgreementProtoc..> 22-Dec-2014 10:07 451K
625-CryptographicAccumulatorsforAuthenticatedHa..> 22-Dec-2014 10:07 467K
625-CryptographicAccumulatorsforAuthenticatedHa..> 22-Dec-2014 10:07 862K
626-ApproximateIntegerCommonDivisorProblemrelat..> 22-Dec-2014 10:07 216K
627-AUnifiedMethodforFindingImpossibleDifferent..> 22-Dec-2014 10:07 353K
628-UsingSphinxtoImproveOnionRoutingCircuitCons..> 22-Dec-2014 10:07 187K
628-UsingSphinxtoImproveOnionRoutingCircuitCons..> 22-Dec-2014 10:07 354K
629-AComparativeAnalysisofDelayBasedPUFImplemen..> 22-Dec-2014 10:07 563K
630-InformationTheoreticallySecureProtocolsandS..> 22-Dec-2014 10:07 262K
631-ImprovementofDas39sTwoFactorAuthenticationP..> 20-Jan-2023 08:36 95K
631-ImprovementofDassTwoFactorAuthenticationPro..> 22-Dec-2014 10:07 95K
632-CryptanalysisofSecureMessageTransmissionPro..> 22-Dec-2014 10:07 260K
633-TraitorTracingonBinaryStrings.pdf 22-Dec-2014 10:07 114K
634-AttacksonHashFunctionsbasedonGeneralizedFei..> 22-Dec-2014 10:07 335K
635-FlexibleQuasiDyadicCodeBasedPublicKeyEncryp..> 22-Dec-2014 10:07 35K
636-ObtainingMoreKaratsubaLikeFormulaeoverTheBi..> 22-Dec-2014 10:07 160K
637-EfficientCharacteristicSetAlgorithmsforEqua..> 22-Dec-2014 10:07 288K
638-ReducingEllipticCurveLogarithmtoLogarithmin..> 20-Jan-2023 14:21 207