Index of /2009/


../
001-AHardwareAnalysisofTwistedEdwardsCurvesfora..> 22-Dec-2014 10:33    594K
002-Thermocommunication.pdf                        22-Dec-2014 10:32    748K
003-Separatingtworolesofhashinginonewaymessagea..> 22-Dec-2014 10:32    234K
004-OnStatelessSchemesforMessageAuthenticationU..> 20-Jan-2023 14:21     207
005-ImpossibleDifferentialCryptanalysisofPelica..> 22-Dec-2014 10:32    171K
006-HugeMulticollisionsandMultipreimagesofHashF..> 22-Dec-2014 10:32    172K
007-HomomorphicTrapdoorCommitmentstoGroupElemen..> 22-Dec-2014 10:32    103K
007-HomomorphicTrapdoorCommitmentstoGroupElemen..> 22-Dec-2014 10:32    195K
008-AnoteonAgrawalconjecture.pdf                   22-Dec-2014 10:32     96K
009-HybridSecureMPCTradingInformationTheoreticR..> 22-Dec-2014 10:32    342K
009-HybridSecureMPCTradingInformationTheoreticR..> 22-Dec-2014 10:32    611K
010-OptimalMulticastGroupCommunication.pdf         22-Dec-2014 10:32    676K
011-AVeryCompact34PerfectlyMasked34SBoxforAESco..> 20-Jan-2023 08:37    164K
011-AVeryCompactPerfectlyMaskedSBoxforAEScorrec..> 22-Dec-2014 10:32    164K
012-AvoidMaskReuseinMaskedGaloisMultipliers.pdf    22-Dec-2014 10:32    139K
013-ComparisonBasedKeyExchangeandtheSecurityoft..> 22-Dec-2014 10:32    239K
014-KeyPredistributionTechniquesforGridBasedWir..> 22-Dec-2014 10:32    203K
015-CubeAttacksonTrivium.pdf                       22-Dec-2014 10:32    288K
016-FastellipticcurvecryptographyontheCellBroad..> 22-Dec-2014 10:32    195K
017-Anonymoussignaturescheme.pdf                   22-Dec-2014 10:32    206K
018-Huge2ndpreimagesandcollisionsofkhichidi1.pdf   22-Dec-2014 10:32     82K
019-CommunicationEfficientPrivateProtocolsforLo..> 22-Dec-2014 10:32    213K
020-ApplyingTimeMemoryDataTradeOfftoMeetintheMi..> 22-Dec-2014 10:32    199K
021-ComparingWithRSA.pdf                           22-Dec-2014 10:32    213K
022-CorrectnessofLiGeneralizationofRSACryptosys..> 22-Dec-2014 10:32     54K
023-PolynomialRuntimeandComposability.pdf          22-Dec-2014 10:32    653K
024-OnSecondOrderFaultAnalysisResistanceforCRTR..> 22-Dec-2014 10:32    246K
025-ShortRedactableSignaturesUsingRandomTrees.pdf  22-Dec-2014 10:32    270K
025-ShortRedactableSignaturesUsingRandomTrees.ps   22-Dec-2014 10:32    662K
026-CollisionAttacksonNaSHA384512.pdf              22-Dec-2014 10:32    156K
027-SecurityofVerifiablyEncryptedSignatures.pdf    22-Dec-2014 10:32    151K
028-RealizingHashandSignSignaturesunderStandard..> 22-Dec-2014 10:32    237K
029-NofishAnewstreamcipher.pdf                     22-Dec-2014 10:32    133K
030-Anefficientfuzzyextractorforlimitednoise.pdf   22-Dec-2014 10:32    246K
031-AdaptivelySecureTwoPartyComputationwithEras..> 22-Dec-2014 10:31    342K
032-AFastImplementationofeta_TPairinginCharacte..> 22-Dec-2014 10:31     84K
033-NESHA256NEw256bitSecureHashAlgorithmExtende..> 22-Dec-2014 10:31    134K
034-OnaConditionalCollisionAttackonNaSHA512.pdf    22-Dec-2014 10:31    131K
035-KeyExposureFreeChameleonHashingandSignature..> 22-Dec-2014 10:31    146K
036-ConstructionsofTrulyPracticalSecureProtocol..> 22-Dec-2014 10:31    289K
037-CommonModulusAttacksonSmallPrivateExponentR..> 22-Dec-2014 10:31    273K
038-OnAlgebraicRelationsofSerpentSBoxes.pdf        22-Dec-2014 10:31     71K
039-KeyInsulationandIntrusionResilienceOveraPub..> 22-Dec-2014 10:31    304K
040-HowtoProvetheSecurityofPracticalCryptosyste..> 22-Dec-2014 10:31    198K
040-HowtoProvetheSecurityofPracticalCryptosyste..> 20-Jan-2023 08:37    198K
041-ProofsofRetrievabilityviaHardnessAmplificat..> 22-Dec-2014 10:31    411K
041-ProofsofRetrievabilityviaHardnessAmplificat..> 22-Dec-2014 10:31    713K
042-OnCCZequivalenceanditsuseinsecondaryconstru..> 22-Dec-2014 10:31    191K
042-OnCCZequivalenceanditsuseinsecondaryconstru..> 22-Dec-2014 10:31    384K
043-ImageEncryptionbyPixelPropertySeparation.pdf   22-Dec-2014 10:31    530K
044-UnTrustedHBSecurityVulnerabilitiesofTrusted..> 22-Dec-2014 10:31    178K
045-EfficientProtocolsforSetIntersectionandPatt..> 22-Dec-2014 10:31    370K
046-TraceabilityCodes.pdf                          22-Dec-2014 10:31    168K
047-OnApproximatingAdditionbyExclusiveOR.pdf       22-Dec-2014 10:31    180K
048-ATradeOffBetweenCollisionProbabilityandKeyS..> 22-Dec-2014 10:31    177K
049-ExtensionsoftheCubeAttackbasedonLowDegreeAn..> 22-Dec-2014 10:31    209K
050-OnthePortabilityofGeneralizedSchnorrProofs.pdf 22-Dec-2014 10:31    610K
051-EnhancedTargetCollisionResistantHashFunctio..> 22-Dec-2014 10:31    336K
052-ONTHESECURITYOFTWORINGSIGNCRYPTIONSCHEMES.pdf  22-Dec-2014 10:31     74K
052-ONTHESECURITYOFTWORINGSIGNCRYPTIONSCHEMES.ps   22-Dec-2014 10:31    105K
053-NewcommutativesemifieldsdefinedbyPNmultinom..> 22-Dec-2014 10:31    179K
053-NewcommutativesemifieldsdefinedbyPNmultinom..> 22-Dec-2014 10:31    370K
054-OntheSecurityofTandemDM.pdf                    22-Dec-2014 10:31    221K
055-UniversallyComposableSymmetricEncryption.pdf   22-Dec-2014 10:31    651K
056-DesigninganASIPforCryptographicPairingsover..> 22-Dec-2014 10:31    652K
057-AnonymityinSharedSymmetricKeyPrimitives.pdf    22-Dec-2014 10:30    258K
058-OnGeneralizationofCheon39sAlgorithm.pdf        20-Jan-2023 08:37    131K
058-OnGeneralizationofCheonsAlgorithm.pdf          22-Dec-2014 10:30    131K
059-Ontheimpossibilityofgraphsecretsharing.pdf     22-Dec-2014 10:30    175K
060-ComparingTwoPairingBasedAggregateSignatureS..> 22-Dec-2014 10:30    308K
061-SecurityEnhancementofVariousMPKCsby2layerNo..> 22-Dec-2014 10:30    115K
062-OnDeterministicPolynomialTimeEquivalenceofC..> 22-Dec-2014 10:30    167K
063-CCZequivalenceandBooleanfunctions.pdf          22-Dec-2014 10:30    132K
063-CCZequivalenceandBooleanfunctions.ps           22-Dec-2014 10:30    276K
064-OntheDataComplexityofStatisticalAttacksAgai..> 22-Dec-2014 10:30    244K
065-FoundationsofNonMalleableHashandOneWayFunct..> 22-Dec-2014 10:30    258K
065-FoundationsofNonMalleableHashandOneWayFunct..> 22-Dec-2014 10:30    415K
066-AdaptivePreimageResistanceandPermutationbas..> 22-Dec-2014 10:30    272K
067-Onfractionalcorrelationimmunityofmajorityfu..> 22-Dec-2014 10:30    221K
068-OverviewofTurboCodeReconstructionTechniques..> 22-Dec-2014 10:30    179K
069-OptimisticFairExchangewithMultipleArbiters.pdf 22-Dec-2014 10:30    209K
070-LowComplexityCubingandCubeRootComputationov..> 22-Dec-2014 10:30    261K
071-Secretsharingontreesproblemsolved.pdf          22-Dec-2014 10:30    150K
072-Implementingcryptographicpairingsamagmatuto..> 22-Dec-2014 10:30    307K
073-AutomaticApproachofProvableSecurityanditsAp..> 22-Dec-2014 10:30    114K
074-ComputationalObliviousTransferandInteractiv..> 22-Dec-2014 10:30    183K
075-SecurityofPracticalCryptosystemsUsingMerkle..> 22-Dec-2014 10:30    176K
076-Constructionoflargefamiliesofpseudorandomsu..> 22-Dec-2014 10:30    116K
077-OntheSecurityofIteratedHashingbasedonForger..> 22-Dec-2014 10:30    198K
078-AttacksontheDECTauthenticationmechanisms.pdf   22-Dec-2014 10:30    213K
079-FromDolevYaotoStrongAdaptiveCorruptionAnaly..> 22-Dec-2014 10:30    591K
080-CoSPAGeneralFrameworkForComputationalSoundn..> 22-Dec-2014 10:30    611K
081-EnsuringDataStorageSecurityinCloudComputing..> 22-Dec-2014 10:30    950K
082-TheCaseforQuantumKeyDistribution.pdf           22-Dec-2014 10:30    290K
083-Multiauthorityattributebasedencryptionwithh..> 22-Dec-2014 10:30    209K
083-Multiauthorityattributebasedencryptionwithh..> 22-Dec-2014 10:30    402K
084-SimulationwithouttheArtificialAbortSimplifi..> 20-Jan-2023 08:37    318K
084-SimulationwithouttheArtificialAbortSimplifi..> 22-Dec-2014 10:29    318K
085-UCSecureSourceRoutingProtocol.pdf              22-Dec-2014 10:29    410K
086-PointCompressionforKoblitzEllipticCurves.pdf   22-Dec-2014 10:29    177K
087-UnconditionallySecureAsynchronousMultiparty..> 20-Jan-2023 14:21     207
088-LossyEncryptionConstructionsfromGeneralAssu..> 22-Dec-2014 10:29    677K
089-AProvablySecureAndEfficientCountermeasureAg..> 22-Dec-2014 10:29    172K
090-ABriefHistoryofProvablySecurePublicKeyEncry..> 22-Dec-2014 10:29    187K
090-ABriefHistoryofProvablySecurePublicKeyEncry..> 22-Dec-2014 10:29    398K
091-KnapsackCryptosystemonEllipticCurves.pdf       22-Dec-2014 10:29     86K
092-ReducingRFIDReaderLoadwiththeMeetintheMiddl..> 22-Dec-2014 10:29    147K
093-CascadeEncryptionRevisited.pdf                 22-Dec-2014 10:29    196K
093-CascadeEncryptionRevisited.ps                  22-Dec-2014 10:29    405K
094-OntheLowerBoundsoftheSecondOrderNonlinearit..> 22-Dec-2014 10:29    153K
095-EnhancedPrivacyIDfromBilinearPairing.pdf       22-Dec-2014 10:29    225K
096-AnoteonthesecurityofMST3.pdf                   22-Dec-2014 10:29    181K
097-IdentificationofMultipleInvalidSignaturesin..> 22-Dec-2014 10:29    331K
097-IdentificationofMultipleInvalidSignaturesin..> 22-Dec-2014 10:29      1M
098-AttackingCryptographicSchemesBasedon34Pertu..> 20-Jan-2023 08:37    245K
098-AttackingCryptographicSchemesBasedonPerturb..> 22-Dec-2014 10:29    245K
099-ASingleInitializationServerforMultiPartyCry..> 22-Dec-2014 10:29    180K
099-ASingleInitializationServerforMultiPartyCry..> 22-Dec-2014 10:29    409K
100-Computingtheendomorphismringofanordinaryell..> 22-Dec-2014 10:29    249K
101-EncryptionSchemesSecureunderSelectiveOpenin..> 22-Dec-2014 10:29    333K
102-AStepTowardsQCBlindSignatures.pdf              22-Dec-2014 10:29    152K
103-Constructingpairingfriendlyhyperellipticcur..> 22-Dec-2014 10:29    323K
104-1024AHighSecuritySoftwareOrientedBlockCiphe..> 22-Dec-2014 10:29    204K
104-1024AHighSecuritySoftwareOrientedBlockCiphe..> 22-Dec-2014 10:29    233K
105-PublicKeyCryptosystemsResilienttoKeyLeakage..> 22-Dec-2014 10:29    387K
106-ACollisionAttackonAURORA512.pdf                22-Dec-2014 10:29    152K
107-CompactECashandSimulatableVRFsRevisited.pdf    22-Dec-2014 10:29    338K
108-FurtherResultsonImplicitFactoringinPolynomi..> 22-Dec-2014 10:29    193K
109-CryptanalysisofStreamCipherGrainFamily.pdf     22-Dec-2014 10:28    179K
110-OntheSecurityofStreamCipherCryptMTv3.pdf       22-Dec-2014 10:28    142K
111-ShortChosenPrefixCollisionsforMD5andtheCrea..> 22-Dec-2014 10:28    228K
112-A2ndPreimageAttackonAURORA512.pdf              22-Dec-2014 10:28    151K
113-AttacksonAURORA512andtheDoubleMixMerkleDamg..> 22-Dec-2014 10:28    117K
114-WeaknessofKeyPredistributionSchemeProposedb..> 22-Dec-2014 10:28    195K
115-ScalableCompilersforGroupKeyEstablishmentTw..> 22-Dec-2014 10:28    216K
115-ScalableCompilersforGroupKeyEstablishmentTw..> 22-Dec-2014 10:28      1M
116-InformationTheoreticallySecureMultiPartySet..> 22-Dec-2014 10:28    317K
117-Changingprobabilitiesofdifferentialsandline..> 22-Dec-2014 10:28     95K
118-A2BEAccountableAttributeBasedEncryptionforA..> 22-Dec-2014 10:28    233K
119-AContinuousFaultCountermeasureforAESProvidi..> 22-Dec-2014 10:28    177K
120-OntheComplexityofKhovratovichetal39sPreimag..> 20-Jan-2023 08:36     89K
120-OntheComplexityofKhovratovichetalsPreimageA..> 22-Dec-2014 10:28     89K
121-OptimizedPublicKeyInfrastructureAPKItoSuppo..> 20-Jan-2023 14:21     207
122-HardwareAcceleratorfortheTatePairinginChara..> 22-Dec-2014 10:28    361K
123-OntheComplexityofIntegerFactorization.pdf      22-Dec-2014 10:28     79K
124-PracticalSecureEvaluationofSemiPrivateFunct..> 22-Dec-2014 10:28      1M
125-AFullKeyRecoveryAttackonHMACAURORA512.pdf      22-Dec-2014 10:28    203K
126-ThresholdAttributeBasedSignaturesandTheirAp..> 22-Dec-2014 10:28    363K
127-SideChannelCubeAttacksonBlockCiphers.pdf       22-Dec-2014 10:28    162K
128-AttacksonaLightweightCipherBasedonaMultiple..> 22-Dec-2014 10:28    297K
128-AttacksonaLightweightCipherBasedonaMultiple..> 22-Dec-2014 10:28    915K
129-FasterandTimingAttackResistantAESGCM.pdf       22-Dec-2014 10:28    240K
130-ConstructionsofEvenvariableBooleanFunctionw..> 22-Dec-2014 10:28    170K
131-KeyPredistributionSchemesinDistributedWirel..> 22-Dec-2014 10:28    336K
132-ANewLatticeforImplicitFactoring.pdf            20-Jan-2023 14:21     207
133-SignatureSchemeswithBoundedLeakageResilienc..> 20-Jan-2023 08:36    241K
134-AFirstOrderRecursiveConstructionofBooleanFu..> 22-Dec-2014 10:28    188K
135-PracticalKeyRecoveryAttackagainstSecretpre6..> 22-Dec-2014 10:28    370K
135-PracticalKeyRecoveryAttackagainstSecretprex..> 20-Jan-2023 08:36    370K
136-HowtoExtractandExpandRandomnessASummaryandE..> 22-Dec-2014 10:28    350K
137-TheDarkSideofSecuritybyObscurityandCloningM..> 22-Dec-2014 10:28    171K
138-AHybridRFIDProtocolagainstTrackingAttacks.pdf  22-Dec-2014 10:27    174K
138-AHybridRFIDProtocolagainstTrackingAttacks.ps   22-Dec-2014 10:27      1M
139-CertificatelessGroupOrientedSignatureSecure..> 22-Dec-2014 10:27    210K
140-TheAnalysisofGaloisSubstitutionCounterModeG..> 22-Dec-2014 10:27    162K
141-IdealHierarchicalSecretSharingSchemes.pdf      22-Dec-2014 10:27    374K
142-ChosenciphertextSecureEncryptionfromHardAlg..> 22-Dec-2014 10:27    387K
143-MultipleandUnlinkablePublicKeyEncryptionwit..> 22-Dec-2014 10:27    246K
144-OnthesecurityofIdentityBasedRingSigncryptio..> 22-Dec-2014 10:27    238K
144-OnthesecurityofIdentityBasedRingSigncryptio..> 22-Dec-2014 10:27    454K
145-SecurityofPermutationbasedCompressionFuncti..> 22-Dec-2014 10:27    345K
146-TransferableConstantSizeFairECash.pdf          22-Dec-2014 10:27    278K
146-TransferableConstantSizeFairECash.ps           22-Dec-2014 10:27    541K
147-PreimageAttackonARIRANG.pdf                    22-Dec-2014 10:27      2M
148-SecretHandshakeStrongAnonymityDefinitionand..> 22-Dec-2014 10:27    155K
149-SecureEPCGen2compliantRadioFrequencyIdentif..> 22-Dec-2014 10:27    214K
150-Efficientgroupauthenticationprotocolsbasedo..> 22-Dec-2014 10:27    223K
151-Euclid39sAlgorithmGuass39EliminationandBuch..> 20-Jan-2023 08:36    112K
151-EuclidsAlgorithmGuassEliminationandBuchberg..> 22-Dec-2014 10:27    112K
152-FaceTrustAssessingtheCredibilityofOnlinePer..> 20-Jan-2023 14:21     207
153-Anewboundfort8722wisealmostuniversalhashfun..> 22-Dec-2014 10:27    250K
153-Anewboundfortwisealmostuniversalhashfunctio..> 20-Jan-2023 08:36    250K
154-Algorithmstosolvemassivelyunderdefinedsyste..> 22-Dec-2014 10:27    197K
155-FasterComputationoftheTatePairing.pdf          22-Dec-2014 10:27    221K
156-ADeterministicApproachofMergingofBlocksinTr..> 22-Dec-2014 10:27    285K
157-EfficientHalvingforGenus3CurvesoverBinaryFi..> 22-Dec-2014 10:27    352K
158-SecurityAnalysisofaProxySignatureSchemeover..> 22-Dec-2014 10:27     73K
158-SecurityAnalysisofaProxySignatureSchemeover..> 22-Dec-2014 10:27    143K
159-HardwareImplementationoftheSHA3CandidateSke..> 22-Dec-2014 10:27    131K
160-LeakageResilientPublicKeyCryptographyintheB..> 22-Dec-2014 10:27    478K
160-LeakageResilientPublicKeyCryptographyintheB..> 22-Dec-2014 10:27    802K
161-BuiltinDeterminedSubkeyCorrelationPowerAnal..> 22-Dec-2014 10:27    239K
161-BuiltinDeterminedSubkeyCorrelationPowerAnal..> 22-Dec-2014 10:26    430K
162-CertificatelessHybridSigncryption.pdf          22-Dec-2014 10:26    309K
162-CertificatelessHybridSigncryption.ps           22-Dec-2014 10:26    536K
163-ANewKeyAgreementProtocol.pdf                   22-Dec-2014 10:26     66K
163-ANewKeyAgreementProtocol.ps                    22-Dec-2014 10:26    170K
164-CCASecureProxyReEncryptionwithoutPairings.pdf  22-Dec-2014 10:26    261K
165-SecuringRSAagainstFaultAnalysisbyDoubleAddi..> 22-Dec-2014 10:26    281K
166-Ishallloveyouuptothedeath.pdf                  22-Dec-2014 10:26    425K
167-AnewapproachforFCSRs.pdf                       22-Dec-2014 10:26    299K
168-ASecondPreimageAttackAgainstEllipticCurveOn..> 22-Dec-2014 10:26     45K
169-FloatingFaultanalysisofTriviumunderWeakerAs..> 22-Dec-2014 10:26    241K
170-AnalysisofPropertyPreservationCapabilitieso..> 22-Dec-2014 10:26    428K
171-OntheTheoryandPracticeofPersonalDigitalSign..> 22-Dec-2014 10:26    290K
172-AnewProtocolfor12ObliviousTransfer.pdf         22-Dec-2014 10:26     73K
172-AnewProtocolfor12ObliviousTransfer.ps          22-Dec-2014 10:26    186K
173-FastMultibaseMethodsandOtherSeveralOptimiza..> 22-Dec-2014 10:26    253K
174-MakingtheDiffieHellmanProtocolIdentityBased..> 22-Dec-2014 10:26    262K
175-ConcreteSecurityforEntityRecognitionTheJane..> 22-Dec-2014 10:26    234K
176-Anovelmultiserverauthenticationprotocol.pdf    22-Dec-2014 10:26    497K
177-SalvagingMerkleDamgardforPracticalApplicati..> 22-Dec-2014 10:26    396K
178-CryptographicPropertiesandApplicationofaGen..> 22-Dec-2014 10:26    326K
179-NearCollisionAttackontheCompressionFunction..> 22-Dec-2014 10:26    129K
179-NearCollisionAttackontheCompressionFunction..> 22-Dec-2014 10:26    154K
180-CollaborativePrivacyPreservingDataAggregati..> 22-Dec-2014 10:26    257K
181-PSPPrivateandSecurePaymentwithRFID.pdf         22-Dec-2014 10:26    407K
182-ExtendedSubstitutionCipherChainingmodeESCC.pdf 22-Dec-2014 10:26    134K
183-ProactiveLinearIntegerSecretSharing.pdf        22-Dec-2014 10:26    179K
184-CryptanalysisofDynamicSHA2.pdf                 22-Dec-2014 10:26    169K
185-AllorNothingTransformsasaCountermeasuretoDi..> 22-Dec-2014 10:26    187K
186-StatisticsofRandomPermutationsandtheCryptan..> 22-Dec-2014 10:26    235K
187-CompactMcElieceKeysfromGoppaCodes.pdf          22-Dec-2014 10:25    232K
187-CompactMcElieceKeysfromGoppaCodes.ps           22-Dec-2014 10:25    763K
188-BreakingandBuildingofGroupInsideSignature.pdf  22-Dec-2014 10:25    212K
188-BreakingandBuildingofGroupInsideSignature.ps   22-Dec-2014 10:25    410K
189-EfficientUnidirectionalProxyReEncryption.pdf   22-Dec-2014 10:25    339K
189-EfficientUnidirectionalProxyReEncryption.ps    22-Dec-2014 10:25    632K
190-Thediscretelogarithmprobleminthegroupofnons..> 22-Dec-2014 10:25    2217
190-Thediscretelogarithmprobleminthegroupofnons..> 22-Dec-2014 10:25     21K
191-Newlogicminimizationtechniqueswithapplicati..> 22-Dec-2014 10:25    180K
192-LinkabilityofBlindSignatureSchemesoverBraid..> 22-Dec-2014 10:25     60K
192-LinkabilityofBlindSignatureSchemesoverBraid..> 22-Dec-2014 10:25    122K
193-GeneralizationofBarretoetalIDbasedSigncrypt..> 22-Dec-2014 10:25    195K
194-AnalysisandEnhanceofAnonymousSigncryptionSc..> 22-Dec-2014 10:25    192K
195-SecureEvaluationofPrivateLinearBranchingPro..> 22-Dec-2014 10:25      1M
196-Analysisofonequantumbitstringcommitment.pdf    22-Dec-2014 10:25     92K
197-PracticalpseudocollisionsforhashfunctionsAR..> 22-Dec-2014 10:25    205K
198-DAAFixingthepairingbasedprotocols.pdf          20-Jan-2023 14:21     207
199-IndifferentiabilitywithDistinguishersWhySha..> 22-Dec-2014 10:25    490K
200-ASurveyontheEvolutionofCryptographicProtoco..> 22-Dec-2014 10:25    252K
201-EnhancedCryptanalysisofSubstitutionCipherCh..> 22-Dec-2014 10:25    259K
202-AGENERALIZEDFRAMEWORKFORCRISPCOMMITMENTSCHE..> 22-Dec-2014 10:25     92K
203-PracticalCryptanalysisofISOIEC97962andEMVSi..> 22-Dec-2014 10:25    334K
204-GUCSecureJoinOperatorinDistributedRelationa..> 22-Dec-2014 10:25    592K
205-RelatedMessageAttackstoPublicKeyEncryptionS..> 22-Dec-2014 10:25    202K
205-RelatedMessageAttackstoPublicKeyEncryptionS..> 22-Dec-2014 10:25    391K
206-OnOptimizedFPGAImplementationsoftheSHA3Cand..> 22-Dec-2014 10:25    249K
206-OnOptimizedFPGAImplementationsoftheSHA3Cand..> 22-Dec-2014 10:25    335K
207-UnconditionallySecureSocialSecretSharingSch..> 20-Jan-2023 14:21     207
208-PUBLICKEYCRYPTOGRAPHYUSINGPERMUTATIONPPOLYN..> 22-Dec-2014 10:25    195K
208-PUBLICKEYCRYPTOGRAPHYUSINGPERMUTATIONPPOLYN..> 22-Dec-2014 10:25    402K
209-OnDirectedTransitiveSignature.pdf              22-Dec-2014 10:25    250K
209-OnDirectedTransitiveSignature.ps               22-Dec-2014 10:25    860K
210-Sufficientconditionsforsoundtreeandsequenti..> 22-Dec-2014 10:25    429K
211-BringingZeroKnowledgeProofsofKnowledgetoPra..> 22-Dec-2014 10:24    202K
212-AFlyweightRFIDAuthenticationProtocol.pdf       20-Jan-2023 14:21     207
213-EllipticCurvesinMontgomeryFormwithB1andThei..> 22-Dec-2014 10:24    137K
214-AnOptimallyFairCoinToss.pdf                    22-Dec-2014 10:24    342K
214-AnOptimallyFairCoinToss.ps                     22-Dec-2014 10:24      1M
215-ASimpleandGenericConstructionofAuthenticate..> 22-Dec-2014 10:24    191K
216-TweakableEncipheringSchemesUsingOnlytheEncr..> 22-Dec-2014 10:24    185K
217-PseudoRandomFunctionsandParallelizableModes..> 22-Dec-2014 10:24    424K
218-EfficientFPGAImplementationsofHighDimension..> 22-Dec-2014 10:24    175K
219-StronglySecureCertificatelessKeyAgreement.pdf  22-Dec-2014 10:24    507K
220-SignatureSchemeswithBoundedLeakageResilienc..> 22-Dec-2014 10:24    216K
221-BonehBoyensignaturesandtheStrongDiffieHellm..> 22-Dec-2014 10:24      2M
222-PETSNAKEASpecialPurposeArchitecturetoImplem..> 22-Dec-2014 10:24    659K
223-HowToFindWeakInputDifferencesForMD5Collisio..> 22-Dec-2014 10:24    314K
224-PseudoCryptanalysisofLuffa.pdf                 22-Dec-2014 10:24     88K
225-TheSecurityofAbreastDMintheIdealCipherModel..> 22-Dec-2014 10:24    197K
226-HowtoHashintoEllipticCurves.pdf                22-Dec-2014 10:24    223K
227-Computationalsoundnesscoinductionandencrypt..> 22-Dec-2014 10:24    207K
227-Computationalsoundnesscoinductionandencrypt..> 22-Dec-2014 10:24    387K
228-RevisitingHigherOrderDPAAttacksMultivariate..> 22-Dec-2014 10:24    191K
229-HardwareImplementationsofaVariantoftheZmorT..> 22-Dec-2014 10:24    198K
230-AdaptivelySecureBroadcast.pdf                  22-Dec-2014 10:24    140K
230-AdaptivelySecureBroadcast.ps                   22-Dec-2014 10:24    237K
231-PracticalDPAAttacksonMDPL.pdf                  22-Dec-2014 10:24    271K
232-MeshHash2.pdf                                  22-Dec-2014 10:24    369K
233-Astrategyforrecoveringrootsofbivariatepolyn..> 22-Dec-2014 10:24    151K
234-OntheRandomnessandRegularityofReducedEDONma..> 22-Dec-2014 10:24    209K
235-BreakingandFixingofanIdentityBasedMultiSign..> 22-Dec-2014 10:24    204K
235-BreakingandFixingofanIdentityBasedMultiSign..> 22-Dec-2014 10:24    412K
236-Ellipticcurveswithweakcoveringsovercubicext..> 22-Dec-2014 10:24    210K
237-RemarksonOneArbitratedQuantumsignatureSchem..> 22-Dec-2014 10:23     79K
238-AttacksonRoundReducedBLAKE.pdf                 22-Dec-2014 10:23    141K
239-ProtectingtheNOEKEONCipherAgainstSCAREAttac..> 22-Dec-2014 10:23    200K
240-GroupTestingandBatchVerification.pdf           22-Dec-2014 10:23    211K
241-DistinguisherandRelatedKeyAttackontheFullAE..> 22-Dec-2014 10:23    331K
242-Examplesofdifferentialmulticollisionsfor13a..> 22-Dec-2014 10:23    135K
243-FasterPairingsonSpecialWeierstrassCurves.pdf   22-Dec-2014 10:23    2217
243-FasterPairingsonSpecialWeierstrassCurves.ps    22-Dec-2014 10:23     59K
244-TardosFingerprintingCodesintheCombinedDigit..> 22-Dec-2014 10:23      1M
245-CryptanalysisoftheBirationalPermutationSign..> 22-Dec-2014 10:23    125K
246-OnChipElectricWavesAnAnalogCircuitApproacht..> 22-Dec-2014 10:23      1M
247-OntheNecessaryandSufficientAssumptionsforUC..> 22-Dec-2014 10:23    362K
247-OntheNecessaryandSufficientAssumptionsforUC..> 22-Dec-2014 10:23      1M
248-CryptanalysisoftheMST_3PublicKeyCryptosyste..> 22-Dec-2014 10:23    220K
249-Pseudorandomnessandpartialinformationinsymb..> 22-Dec-2014 10:23    270K
249-Pseudorandomnessandpartialinformationinsymb..> 22-Dec-2014 10:23    493K
249-SymbolicEncryptionwithPseudorandomKeys.pdf     20-Jan-2023 08:36    439K
250-ModificationsintheDesignofTriviumtoIncrease..> 20-Jan-2023 14:21     207
251-FormatPreservingEncryption.pdf                 22-Dec-2014 10:23    387K
252-SparseBooleanequationsandcircuitlattices.pdf   22-Dec-2014 10:23    216K
253-FormallyandPracticallyRelatingtheCKCKHMQVan..> 22-Dec-2014 10:23    383K
254-ImprovementofOneQuantumEncryptionScheme.pdf    22-Dec-2014 10:23    104K
255-SIMPLSystemsOnaPublicKeyVariantofPhysicalUn..> 22-Dec-2014 10:23    402K
256-MultipleLinearCryptanalysisofReducedRoundSM..> 22-Dec-2014 10:23    156K
257-FORMATCONTROLLINGENCRYPTIONUSINGDATATYPEPRE..> 22-Dec-2014 10:23    316K
258-FACTORIZATIONWITHGENUS2CURVES.pdf              22-Dec-2014 10:23    220K
258-FACTORIZATIONWITHGENUS2CURVES.ps               22-Dec-2014 10:23    439K
259-DifferentialPathforSHA1withcomplexityO252.pdf  20-Jan-2023 14:21     207
260-AStudyonRAMRequirementsofVariousSHA3Candida..> 22-Dec-2014 10:23    139K
261-SecurityofCyclicDoubleBlockLengthHashFuncti..> 22-Dec-2014 10:23    311K
262-ComputationallySecureTwoRoundAuthenticatedM..> 22-Dec-2014 10:23    391K
263-GeneralErrorDecodableSecretSharingSchemeand..> 22-Dec-2014 10:22    222K
263-GeneralErrorDecodableSecretSharingSchemeand..> 22-Dec-2014 10:22    437K
264-ProposalofPPSMultivariatePublicKeyCryptosys..> 22-Dec-2014 10:22    161K
265-RevisitingtheIndifferentiabilityofPGVHashFu..> 22-Dec-2014 10:22    194K
265-RevisitingtheIndifferentiabilityofPGVHashFu..> 22-Dec-2014 10:22    329K
266-PseudorandomnessAnalysisoftheLaiMasseySchem..> 22-Dec-2014 10:22    236K
267-Simulationbasedsecurityintheappliedpicalcul..> 22-Dec-2014 10:22    208K
268-DealerFreeDynamicSecretSharingSchemeswithUn..> 20-Jan-2023 14:21     207
269-Sidechannelattacksbasedonlinearapproximatio..> 22-Dec-2014 10:22    314K
270-InformationTheoreticallySecureObliviousPoly..> 22-Dec-2014 10:22    595K
271-ReducingtheCiphertextSizeofDolevDworkNaorli..> 22-Dec-2014 10:22    136K
271-ReducingtheCiphertextSizeofDolevDworkNaorli..> 22-Dec-2014 10:22    299K
272-AConjectureonBinaryStringandItsApplications..> 22-Dec-2014 10:22    182K
273-UniversallyComposableandStatisticallySecure..> 22-Dec-2014 10:22    268K
274-ACollisionresistanceHashFunctionDIHA2.pdf      22-Dec-2014 10:22    165K
275-AlgebraicAttacksspecializedtomathbbF_2Diplo..> 22-Dec-2014 10:22      1M
276-MulticoreImplementationoftheTatePairingover..> 22-Dec-2014 10:22    305K
277-OntheFoundationsofPhysicalUnclonableFunctio..> 22-Dec-2014 10:22    684K
278-TowardsElectricalIntegratedImplementationso..> 22-Dec-2014 10:22      3M
279-AlgebraicSideChannelAttacks.pdf                22-Dec-2014 10:22      2M
280-UniversallyAnonymousIBEbasedontheQuadraticR..> 22-Dec-2014 10:21    378K
281-EnablingPublicVerifiabilityandDataDynamicsf..> 22-Dec-2014 10:21    376K
282-LeakageResilientSignatures.pdf                 22-Dec-2014 10:21    282K
283-ShortandStatelessSignaturesfromtheRSAAssump..> 22-Dec-2014 10:21    232K
284-PrivacyawareAttributebasedEncryptionwithUse..> 22-Dec-2014 10:21    227K
284-PrivacyawareAttributebasedEncryptionwithUse..> 22-Dec-2014 10:21    444K
285-EfficientPublicKeyEncryptionBasedonIdealLat..> 22-Dec-2014 10:21    365K
286-OnPrivacyLossesintheTrustedAgentModelAbstra..> 22-Dec-2014 10:21    184K
287-GenericAttacksonAlternatingUnbalancedFeiste..> 22-Dec-2014 10:21    248K
288-EfficientKeyExchangewithTightSecurityReduct..> 22-Dec-2014 10:21    221K
289-AnalysisoftheEndbyHopProtocolforSecureAggre..> 22-Dec-2014 10:21    381K
290-SecurityAnalysisofAggregatesignatureandBatc..> 22-Dec-2014 10:21    155K
291-ModelingKeyCompromiseImpersonationAttackson..> 22-Dec-2014 10:21    207K
291-ModelingKeyCompromiseImpersonationAttackson..> 22-Dec-2014 10:21    437K
292-ImplementingWagner39sgeneralizedbirthdayatt..> 20-Jan-2023 08:36    290K
292-ImplementingWagnersgeneralizedbirthdayattac..> 22-Dec-2014 10:21    290K
293-EnhancingAttributebasedEncryptionwithAttrib..> 22-Dec-2014 10:21    111K
293-EnhancingAttributebasedEncryptionwithAttrib..> 22-Dec-2014 10:21    198K
294-LowLatencyHighBandwidthAnonymousOverlayNetw..> 22-Dec-2014 10:21    400K
295-DefendingAgainstKeyAbuseAttacksinKPABEEnabl..> 22-Dec-2014 10:21    265K
296-PerfectlyBalancedFunctionsinSymbolicDynamic..> 22-Dec-2014 10:21    2217
296-PerfectlyBalancedFunctionsinSymbolicDynamic..> 22-Dec-2014 10:21     50K
297-ANewImprovedDistinguisherforHC128.pdf          20-Jan-2023 14:21     207
298-CryptanalysisofCertificatelessSigncryptionS..> 22-Dec-2014 10:21    186K
298-CryptanalysisofCertificatelessSigncryptionS..> 22-Dec-2014 10:21    392K
299-Onthesecurityofoscillatorbasedrandomnumberg..> 22-Dec-2014 10:21    426K
299-Onthesecurityofoscillatorbasedrandomnumberg..> 22-Dec-2014 10:21    908K
300-UniversallyComposableContributoryGroupKeyEx..> 22-Dec-2014 10:21    269K
300-UniversallyComposableContributoryGroupKeyEx..> 22-Dec-2014 10:21    508K
301-AProbabilisticSecretSharingSchemeforaCompar..> 22-Dec-2014 10:21    149K
302-CryptanalysisofESSENCE.pdf                     22-Dec-2014 10:21    222K
303-Keyextractionfromgeneralnondiscretesignals.pdf 22-Dec-2014 10:21    323K
304-Factor4and6CompressionofCyclotomicSubgroups..> 22-Dec-2014 10:21      1M
304-Factor4and6CompressionofCyclotomicSubgroups.ps 22-Dec-2014 10:20      2M
305-Improvedgenericalgorithmsfor3collisions.pdf    22-Dec-2014 10:20    188K
306-AuthenticTimeStampsforArchivalStorage.pdf      22-Dec-2014 10:20    296K
307-AnonymousSignaturesRevisited.pdf               22-Dec-2014 10:20    246K
308-AnoteontheCertificatelessMultireceiverSignc..> 22-Dec-2014 10:20    282K
309-FaultAttacksonRSASignatureswithPartiallyUnk..> 22-Dec-2014 10:20    258K
310-RFIDdistanceboundingprotocolwithmixedchalle..> 22-Dec-2014 10:20    178K
311-MultiPartyDistributedPrivateMatchingSetDisj..> 22-Dec-2014 10:20    232K
312-JacobiQuarticCurvesRevisited.pdf               22-Dec-2014 10:20    207K
312-JacobiQuarticCurvesRevisited.ps                22-Dec-2014 10:20    424K
313-IdentityBasedGroupSignaturesfromHierarchica..> 22-Dec-2014 10:20    334K
314-SecureTwoPartyComputationisPractical.pdf       22-Dec-2014 10:20    261K
315-BreakingRSAbasedPINEncryptionwiththirtyciph..> 22-Dec-2014 10:20    157K
316-AnEfficientPasswordSecurityofKeyExchangePro..> 22-Dec-2014 10:20     72K
317-RelatedkeyCryptanalysisoftheFullAES192andAE..> 22-Dec-2014 10:20    379K
318-TheFermatfactorizationmethodrevisited.pdf      22-Dec-2014 10:20     89K
318-TheFermatfactorizationmethodrevisited.ps       22-Dec-2014 10:20    226K
319-CommentsandImprovementsonChameleonHashingWi..> 22-Dec-2014 10:20    116K
320-AutomorphicSignaturesinBilinearGroupsandanA..> 22-Dec-2014 10:20    295K
320-AutomorphicSignaturesinBilinearGroupsandanA..> 22-Dec-2014 10:20    508K
321-TweakableEncipheringSchemesFromStreamCipher..> 22-Dec-2014 10:20    366K
322-CertifyingAssemblywithFormalCryptographicPr..> 22-Dec-2014 10:20    343K
323-FactoringUnbalancedModuliwithKnownBits.pdf     22-Dec-2014 10:20    174K
324-GroupOrientedFairExchangeofSignatures.pdf      22-Dec-2014 10:20    355K
325-CharacterizingPaddingRulesofMDHashFunctions..> 22-Dec-2014 10:20    308K
326-TheApplicationofPolynomialsovertheFieldofTw..> 22-Dec-2014 10:20    160K
327-SimpleAdaptiveObliviousTransferWithoutRando..> 22-Dec-2014 10:19    221K
328-Flowchartdescriptionofsecurityprimitivesfor..> 22-Dec-2014 10:19    220K
329-EfficientApproximationofHigherOrderBooleanf..> 20-Jan-2023 14:21     207
330-NTRUquaternionalgebrapublickeycryptography.pdf 20-Jan-2023 14:21     207
331-SecurityNotionsandGenericConstructionsforCl..> 22-Dec-2014 10:19    276K
332-UntraceableRFIDprotocolsarenottriviallycomp..> 22-Dec-2014 10:19     91K
333-HardFaultAnalysisofTrivium.pdf                 22-Dec-2014 10:19    166K
334-AttackingReducedRoundsoftheARIABlockCipher.pdf 22-Dec-2014 10:19    172K
335-RelatedKeyRectangleAttackoftheFull80RoundHA..> 22-Dec-2014 10:19    165K
336-PartialSignaturesandtheirApplications.pdf      22-Dec-2014 10:19    314K
337-ANewLatticeBasedCryptosystemMixedwithaKnaps..> 22-Dec-2014 10:19    165K
338-Securityweaknessesintwomultiserverpasswordb..> 22-Dec-2014 10:19    488K
339-ANovelIDbasedElectronicCashSystemfromPairin..> 22-Dec-2014 10:19    623K
340-EfficientIndifferentiableHashingintoOrdinar..> 22-Dec-2014 10:19    363K
341-LeakageResilientCryptographyinPractice.pdf     22-Dec-2014 10:19      3M
342-FPGAImplementationsofSHA3CandidatesCubeHash..> 22-Dec-2014 10:19    188K
342-FPGAImplementationsofSHA3CandidatesCubeHash..> 20-Jan-2023 08:36    188K
343-PartitioningMultivariatePolynomialEquations..> 22-Dec-2014 10:19      2M
344-CommentsonShaoCao39sUnidirectionalProxyReEn..> 20-Jan-2023 08:36    173K
344-CommentsonShaoCaosUnidirectionalProxyReEncr..> 22-Dec-2014 10:19    139K
344-CommentsonShaoCaosUnidirectionalProxyReEncr..> 22-Dec-2014 10:19    310K
345-AnonymousIDBasedSigncryptionSchemeforMultip..> 22-Dec-2014 10:19    362K
346-SecurityAnalysisoftheGFNLFSRStructureandFou..> 22-Dec-2014 10:19    211K
347-AnEfficientConcurrentRepetitionTheorem.pdf     22-Dec-2014 10:19    223K
348-Aprovablysecurereallysourcehidingdesignated..> 22-Dec-2014 10:19    660K
349-CompactHardwareImplementationsoftheSHA3Cand..> 22-Dec-2014 10:19    238K
349-CompactHardwareImplementationsoftheSHA3Cand..> 20-Jan-2023 08:36    238K
350-GameTheoreticResistancetoDenialofServiceAtt..> 22-Dec-2014 10:19    454K
351-HowtoDelegateaLatticeBasis.pdf                 22-Dec-2014 10:19    358K
351-HowtoDelegateaLatticeBasis.ps                  22-Dec-2014 10:19    639K
352-OntheDualityofProbingandFaultAttacks.pdf       22-Dec-2014 10:18    410K
353-ComparingSessionStateRevealandEphemeralKeyR..> 22-Dec-2014 10:18    357K
354-CacheTimingAttacksonCamelliaBlockCipher.pdf    22-Dec-2014 10:18    591K
355-AsynchronousDistributedPrivateKeyGenerators..> 22-Dec-2014 10:18    302K
355-AsynchronousDistributedPrivateKeyGenerators..> 22-Dec-2014 10:18    489K
356-ADomainExtenderfortheIdealCipher.pdf           22-Dec-2014 10:18    310K
357-ImpossibleDifferentialCryptanalysisofFOX.pdf   22-Dec-2014 10:18    164K
358-MACPrecomputationwithApplicationstoSecureMe..> 22-Dec-2014 10:18    220K
358-MACPrecomputationwithApplicationstoSecureMe..> 22-Dec-2014 10:18    928K
359-BonsaiTreesorArboricultureinLatticeBasedCry..> 22-Dec-2014 10:18    294K
360-CryptanalysisofaGeneralizedUnbalancedFeiste..> 22-Dec-2014 10:18    244K
360-CryptanalysisofaGeneralizedUnbalancedFeiste..> 22-Dec-2014 10:18      3M
361-OntheSecurityofaProxyBlindSignatureSchemeov..> 22-Dec-2014 10:18     94K
361-OntheSecurityofaProxyBlindSignatureSchemeov..> 22-Dec-2014 10:18    179K
362-TowardaGenericConstructionofConvertibleUnde..> 22-Dec-2014 10:18    213K
363-SomeLatticesAttacksonDSAandECDSA.pdf           22-Dec-2014 10:18    121K
364-PositionBasedCryptography.pdf                  22-Dec-2014 10:18    878K
365-SpaceEfficientSecretSharingARecursiveApproa..> 22-Dec-2014 10:18    144K
366-AdaptiveZeroKnowledgeProofsandAdaptivelySec..> 22-Dec-2014 10:18    374K
366-AdaptiveZeroKnowledgeProofsandAdaptivelySec..> 22-Dec-2014 10:18    628K
367-NondelegatableIdentitybasedDesignatedVerifi..> 22-Dec-2014 10:18    173K
368-ASimulationBasedTreatmentofAuthenticatedMes..> 22-Dec-2014 10:18    405K
369-QuantumreadoutofPhysicalUnclonableFunctions..> 22-Dec-2014 10:18    268K
370-Astudyofpairingcomputationforellipticcurves..> 22-Dec-2014 10:18    194K
370-Astudyofpairingcomputationforellipticcurves..> 22-Dec-2014 10:18    428K
371-AttributeSetsAPracticallyMotivatedEnhanceme..> 22-Dec-2014 10:17    350K
372-MoreonKeyWrapping.pdf                          22-Dec-2014 10:17    295K
372-MoreonKeyWrapping.ps                           22-Dec-2014 10:17    532K
373-UtilityDependenceinCorrectandFairRationalSe..> 22-Dec-2014 10:17    269K
374-KeyRecoveryAttacksofPracticalComplexityonAE..> 22-Dec-2014 10:17    292K
375-ForgottenSecretRecoveringSchemeandFuzzyVaul..> 22-Dec-2014 10:17    132K
376-CryptanalysisoftheTillichZemorhashfunction.pdf 22-Dec-2014 10:17    182K
376-CryptanalysisoftheTillichZmorhashfunction.pdf  20-Jan-2023 08:36    182K
377-ChosenCiphertextSecureRSAtypeCryptosystems.pdf 22-Dec-2014 10:17    428K
378-DetectablecorrelationsinEdonR.pdf              22-Dec-2014 10:17    101K
379-ProtectingCircuitsfromComputationallyBounde..> 22-Dec-2014 10:17    774K
380-UntraceableTagsbasedonMildAssumptions.pdf      22-Dec-2014 10:17    229K
381-AshortNoteonDiscreteLogProbleminmathbbF_p.pdf  22-Dec-2014 10:17     96K
381-AshortNoteonDiscreteLogProbleminmathbbF_p.ps   22-Dec-2014 10:17    250K
382-LinearizationFrameworkforCollisionAttacksAp..> 22-Dec-2014 10:17    324K
383-ARegistrationSchemetoAllocateaUniqueIdentif..> 22-Dec-2014 10:17     84K
384-PracticalAttacksonNESHA256.pdf                 22-Dec-2014 10:17    106K
385-DualSystemEncryptionRealizingFullySecureIBE..> 22-Dec-2014 10:17    312K
386-QTRUALatticeAttackResistantVersionofNTRU.pdf   22-Dec-2014 10:17    270K
387-SecuringPlasticMoneyUsinganRFIDBasedProtoco..> 22-Dec-2014 10:17    653K
388-ASimpleSecretSharingSchemeforHierarchicalTh..> 20-Jan-2023 14:21     207
389-OntheSecurityof1024bitRSAand160bitEllipticC..> 22-Dec-2014 10:17    217K
390-SublinearSizePairingbasedNoninteractiveZero..> 22-Dec-2014 10:17    255K
390-SublinearSizePairingbasedNoninteractiveZero..> 22-Dec-2014 10:17    638K
391-ThresholdDecryptionandZeroKnowledgeProofsfo..> 22-Dec-2014 10:17    353K
392-ComputationalSoundnessforKeyExchangeProtoco..> 22-Dec-2014 10:17    482K
393-PermutationPolynomialsmodulopn.pdf             22-Dec-2014 10:17    108K
393-PermutationPolynomialsmodulopn.ps              22-Dec-2014 10:17    260K
394-ProvablySecureConvertibleUndeniableSignatur..> 22-Dec-2014 10:17    445K
395-FirstCPIRProtocolwithDataDependentComputati..> 22-Dec-2014 10:17    242K
396-ComputationalIndistinguishabilityAmplificat..> 22-Dec-2014 10:17    396K
397-LinearCryptanalysisofReducedRoundPRESENT.pdf   22-Dec-2014 10:16    198K
397-LinearCryptanalysisofReducedRoundPRESENT.ps    22-Dec-2014 10:16    431K
398-FastArchitecturesfortheeta_TPairingoverSmal..> 22-Dec-2014 10:16    413K
399-LeakageResilientStorage.pdf                    22-Dec-2014 10:16    399K
400-IdentityBasedChameleonHashSchemeWithoutKeyE..> 22-Dec-2014 10:16    155K
401-LongestCommonSubsequenceasPrivateSearch.pdf    22-Dec-2014 10:16    257K
402-AIDABreaksBIVIUMABin1MinuteDualCoreCPUTime.pdf 22-Dec-2014 10:16    152K
402-AIDABreaksBIVIUMAampBin1MinuteDualCoreCPUTi..> 20-Jan-2023 08:36    152K
403-OnGenericConstructionsofDesignatedConfirmer..> 20-Jan-2023 08:36    206K
403-OnGenericConstructionsofDesignatedConfirmer..> 22-Dec-2014 10:16    203K
403-OnGenericConstructionsofDesignatedConfirmer..> 22-Dec-2014 10:16    363K
404-PairingFriendlyEllipticCurvesWithVariousDis..> 20-Jan-2023 14:21     207
405-GenericAttacksonMistySchemes5roundsisnoteno..> 22-Dec-2014 10:16    298K
406-OnlineNontransferableSignaturesRevisited.pdf   22-Dec-2014 10:16    458K
407-SingleBlockAttacksandStatisticalTestsonCube..> 22-Dec-2014 10:16    192K
407-SingleBlockAttacksandStatisticalTestsonCube..> 22-Dec-2014 10:16      2M
408-ASecureandEfficientAuthenticatedDiffieHellm..> 22-Dec-2014 10:16    349K
408-ASecureandEfficientAuthenticatedDiffieHellm..> 22-Dec-2014 10:16      1M
409-ATreeBasedRecursiveSchemeforSpaceEfficientS..> 22-Dec-2014 10:16    459K
409-ATreeBasedRecursiveSchemeforSpaceEfficientS..> 22-Dec-2014 10:16    970K
410-AuthenticatedBroadcastwithaPartiallyComprom..> 22-Dec-2014 10:16    227K
411-ImprovedGarbledCircuitBuildingBlocksandAppl..> 22-Dec-2014 10:16    990K
412-DistinguishingAttacksonStreamCiphersBasedon..> 22-Dec-2014 10:16    287K
413-ThreeImprovedAlgorithmsforMultipathKeyEstab..> 22-Dec-2014 10:16    233K
414-SecurityBoundsfortheDesignofCodebasedCrypto..> 22-Dec-2014 10:16    318K
415-AttacksAgainstPermuteTransformXorCompressio..> 22-Dec-2014 10:16    343K
416-KronCryptANewSymmetricCryptosystemBasedonKr..> 20-Jan-2023 08:36    362K
416-KronCryptANewSymmetricCryptosystemBasedonKr..> 22-Dec-2014 10:16    362K
417-MoreDifferentialPathsofTIB3.pdf                22-Dec-2014 10:15    460K
417-MoreDifferentialPathsofTIB3.ps                 22-Dec-2014 10:15    794K
418-SubtletiesintheDefinitionofINDCCAWhenandHow..> 22-Dec-2014 10:15    242K
419-AnEfficientMethodforRandomDelayGenerationin..> 22-Dec-2014 10:15    353K
420-HigherorderMaskingandShufflingforSoftwareIm..> 22-Dec-2014 10:15    286K
421-HowtoConstructIdentityBasedSignatureswithou..> 22-Dec-2014 10:15    225K
421-HowtoConstructIdentityBasedSignatureswithou..> 22-Dec-2014 10:15    417K
422-AttacksonRFIDBasedElectronicVotingSystems.pdf  22-Dec-2014 10:15    447K
423-Utilizingpostponedephemeralandpseudostatick..> 22-Dec-2014 10:15    125K
424-DoubleVoterPerceptibleBlindSignatureBasedEl..> 22-Dec-2014 10:15    768K
425-CryptanalysisandSecurityEnhancementontheGen..> 22-Dec-2014 10:15    125K
426-CheatingDetectionandCheaterIdentificationin..> 22-Dec-2014 10:15    220K
427-EfficientVerifiableEscrowandFairExchangewit..> 22-Dec-2014 10:15    306K
428-EfficientlyfromSemihonesttoMaliciousOTviaOL..> 22-Dec-2014 10:15    224K
429-PreciseTimeandSpaceSimulatableZeroKnowledge..> 22-Dec-2014 10:15    271K
430-Onetimepasswordauthenticatedkeyexchange.pdf    22-Dec-2014 10:15    260K
431-OntheDesignofTrivium.pdf                       22-Dec-2014 10:15    359K
431-OntheDesignofTrivium.ps                        22-Dec-2014 10:15      1M
432-PracticalDistributedKeyGenerationScheme.pdf    20-Jan-2023 14:21     207
433-CommunicationOptimalMultiValuedAsynchronous..> 22-Dec-2014 10:15    304K
434-TightBoundsforProtocolswithHybridSecurity.pdf  22-Dec-2014 10:15    388K
435-EfficientConfirmerSignaturesfromtheSignatur..> 20-Jan-2023 08:36    230K
435-EfficientConfirmerSignaturesfromtheSignatur..> 22-Dec-2014 10:15    226K
435-EfficientConfirmerSignaturesfromtheSignatur..> 22-Dec-2014 10:15    403K
436-OntheConnectionbetweenSigncryptionandOnepas..> 22-Dec-2014 10:15    312K
436-OntheConnectionbetweenSigncryptionandOnepas..> 22-Dec-2014 10:15    553K
437-OntheRelationsBetweenDiffieHellmanandIDBase..> 22-Dec-2014 10:15    179K
437-OntheRelationsBetweenDiffieHellmanandIDBase..> 22-Dec-2014 10:15    387K
438-ImprovedCryptanalysisofSkein.pdf               22-Dec-2014 10:15    194K
439-AFastMentalPokerProtocol.pdf                   22-Dec-2014 10:15    228K
439-AFastMentalPokerProtocol.ps                    22-Dec-2014 10:14    516K
440-AMultivariateSignatureSchemewithanalmostcyc..> 22-Dec-2014 10:14     97K
440-AMultivariateSignatureSchemewithanalmostcyc..> 22-Dec-2014 10:14    240K
441-AnEfficientTwoPartyIdentityBasedKeyExchange..> 22-Dec-2014 10:14     77K
442-FuzzyPrivacyPreservingPeertoPeerReputationM..> 22-Dec-2014 10:14    160K
443-ReboundAttackontheFullLANECompressionFuncti..> 22-Dec-2014 10:14    480K
444-SecureandEfficientHBCMEntityAuthenticationP..> 22-Dec-2014 10:14    271K
445-ComputingHilbertclasspolynomialswiththeChin..> 22-Dec-2014 10:14    405K
446-NtrulikePublicKeyCryptosystemsbeyondDedekin..> 22-Dec-2014 10:14    167K
447-ROSSLERNONLINEARDYNAMICALMACHINEFORCRYPTOGR..> 22-Dec-2014 10:14     58K
448-PreciseBoundedConcurrentZeroKnowledgeinAlmo..> 22-Dec-2014 10:14    325K
449-OneforAllAllforOneUnifyingStandardDPAAttack..> 22-Dec-2014 10:14    406K
449-OneforAllAllforOneUnifyingStandardDPAAttack..> 22-Dec-2014 10:14      1M
450-OnHierarchicalThresholdSecretSharing.pdf       22-Dec-2014 10:14    104K
451-EfficientCertificatelessKEMintheStandardMod..> 22-Dec-2014 10:14    265K
452-CryptanalysisoftheNiederreiterPublicKeySche..> 22-Dec-2014 10:14    192K
453-ANoteonLinearApproximationsofBLUEMIDNIGHTWI..> 22-Dec-2014 10:14      2M
454-AnEfficientConvertibleUndeniableSignatureSc..> 22-Dec-2014 10:14    271K
455-IdentityBasedHybridSigncryption.pdf            22-Dec-2014 10:14    117K
455-IdentityBasedHybridSigncryption.ps             22-Dec-2014 10:14    209K
456-AnAutomataTheoreticInterpretationofIterated..> 20-Jan-2023 14:21     207
457-Aremarkonthecomputationofcuberootsinfinitef..> 22-Dec-2014 10:14    110K
458-SecurityAnalysisandDesignofProxySignatureSc..> 22-Dec-2014 10:14    175K
459-EfficientObliviousPolynomialEvaluationwithS..> 22-Dec-2014 10:14    392K
459-EfficientObliviousPolynomialEvaluationwithS..> 22-Dec-2014 10:14    648K
460-Asymptoticenumerationofcorrelationimmuneboo..> 22-Dec-2014 10:14    199K
461-AFrameworkforNonInteractiveInstanceDependen..> 22-Dec-2014 10:14    289K
462-CertificatelessKEMandHybridSigncryptionSche..> 22-Dec-2014 10:14    254K
462-CertificatelessKEMandHybridSigncryptionSche..> 22-Dec-2014 10:14    498K
463-OnLinearCryptanalysiswithManyLinearApproxim..> 22-Dec-2014 10:14    269K
464-OnKeyAuthenticDegreeofCryptosystem.pdf         22-Dec-2014 10:13     82K
465-ReadersBehavingBadlyReaderRevocationinPKIBa..> 22-Dec-2014 10:13    308K
466-TheCerticomChallengesECC2X.pdf                 22-Dec-2014 10:13    511K
467-TheLPNProblemwithAuxiliaryInput.pdf            20-Jan-2023 14:21     207
468-PasswordBasedKeyExchangewithHiddenEllipticC..> 22-Dec-2014 10:13    260K
469-AdditiveCombinatoricsandDiscreteLogarithmBa..> 22-Dec-2014 10:13    589K
470-OnTheCommunicationComplexityofPerfectlySecu..> 22-Dec-2014 10:13    341K
471-ImprovingtheBerlekampalgorithmforbinomialsb..> 22-Dec-2014 10:13     92K
471-ImprovingtheBerlekampalgorithmforbinomialsb..> 22-Dec-2014 10:13    262K
472-CryptanalysisofaMessageRecognitionProtocolb..> 22-Dec-2014 10:13    181K
473-ASimplePowerAnalysisAttackontheSerpentKeySc..> 22-Dec-2014 10:13    126K
473-ASimplePowerAnalysisAttackontheSerpentKeySc..> 22-Dec-2014 10:13    328K
474-ResettablePublicKeyEncryptionHowtoEncrypton..> 22-Dec-2014 10:13    210K
475-DoubleExponentiationinFactor4GroupsanditsAp..> 22-Dec-2014 10:13    546K
475-DoubleExponentiationinFactor4GroupsanditsAp..> 22-Dec-2014 10:13    712K
476-OntheSecurityofPASPredicatebasedAuthenticat..> 22-Dec-2014 10:13    316K
477-PreimagesforStepReducedSHA2.pdf                22-Dec-2014 10:13    195K
478-PseudocryptanalysisoftheOriginalBlueMidnigh..> 22-Dec-2014 10:13    213K
479-PreimageAttackson41StepSHA256and46StepSHA51..> 22-Dec-2014 10:13    277K
480-OnCryptographicProtocolsEmployingAsymmetric..> 22-Dec-2014 10:13    245K
481-PPSPrivacyPreservingStatisticsusingRFIDTags..> 22-Dec-2014 10:13    298K
482-NewTechniquesforDualSystemEncryptionandFull..> 22-Dec-2014 10:13    224K
483-OntheSecurityofUOV.pdf                         22-Dec-2014 10:13    154K
484-NewPseudoNearCollisionAttackonReducedRoundo..> 22-Dec-2014 10:13     70K
485-BlackBoxCircularSecureEncryptionBeyondAffin..> 22-Dec-2014 10:13    225K
486-EfficientPseudorandomFunctionsFromtheDecisi..> 22-Dec-2014 10:13    193K
487-ErrorDecodableSecretSharingandOneRoundPerfe..> 22-Dec-2014 10:13    206K
488-LittleDragonTwoAnefficientMultivariatePubli..> 22-Dec-2014 10:13    251K
489-ImpossibleBoomerangAttackforBlockCipherStru..> 22-Dec-2014 10:13    221K
490-CryptanalysisofMultipleServerPasswordAuthen..> 22-Dec-2014 10:13    151K
491-PracticalPrivateSetIntersectionProtocolswit..> 22-Dec-2014 10:12    290K
492-EfficientStatisticalAsynchronousVerifiableS..> 22-Dec-2014 10:12    645K
493-RemarksonSomeQuantumCryptographicSchemes.pdf   22-Dec-2014 10:12     86K
494-AFrameworkforUniversallyComposableNonCommit..> 22-Dec-2014 10:12    655K
495-SecurityWeaknessinTwoAuthenticatedKeyExchan..> 22-Dec-2014 10:12     88K
496-AnonymousFuzzyIdentitybasedEncryptionforSim..> 22-Dec-2014 10:12    306K
496-AnonymousFuzzyIdentitybasedEncryptionforSim..> 22-Dec-2014 10:12    553K
497-CubeAttackonCourtoisToyCipher.pdf              22-Dec-2014 10:12    464K
498-NTRUbasedgrouporientedsignature.pdf            22-Dec-2014 10:12     68K
499-UnderlyingAssumptionsandDesignatedVerifierS..> 22-Dec-2014 10:12    194K
499-UnderlyingAssumptionsandDesignatedVerifierS..> 22-Dec-2014 10:12    402K
500-KeyRecoveryAttackonQuiSci.pdf                  22-Dec-2014 10:12     84K
500-KeyRecoveryAttackonQuiSci.ps                   22-Dec-2014 10:12    200K
501-FastImplementationsofAESonVariousPlatforms.pdf 22-Dec-2014 10:12    174K
502-OnsecondordernonlinearitiesofcubicmonomialB..> 22-Dec-2014 10:12    156K
503-FaultAttacksAgainstEMVSignatures.pdf           22-Dec-2014 10:12    200K
504-InsecureProvableSecureNetworkCoding.pdf        22-Dec-2014 10:12    153K
504-InsecureProvableSecureNetworkCoding3939.pdf    20-Jan-2023 08:36    153K
505-AuthenticatedKeyExchangeProtocolswithEnhanc..> 22-Dec-2014 10:12    157K
506-AnInvestigationoftheEnhancedTargetCollision..> 22-Dec-2014 10:12    431K
507-E64259cientPrivacyPreservingFaceRecognition..> 22-Dec-2014 10:12    645K
507-EcientPrivacyPreservingFaceRecognition.pdf     20-Jan-2023 08:36    645K
508-OntheEfficiencyofClassicalandQuantumOblivio..> 22-Dec-2014 10:12    342K
509-PracticalKeyRecoveryAttacksOnTwoMcElieceVar..> 22-Dec-2014 10:12    224K
510-HighSpeedHardwareImplementationsofBLAKEBlue..> 22-Dec-2014 10:12    647K
510-HighSpeedHardwareImplementationsofBLAKEBlue..> 20-Jan-2023 08:36    647K
511-BoundedKeyDependentMessageSecurity.pdf         22-Dec-2014 10:12    697K
512-PublicKeyEncryptionintheBoundedRetrievalMod..> 22-Dec-2014 10:12    464K
512-PublicKeyEncryptionintheBoundedRetrievalMod..> 22-Dec-2014 10:12    740K
513-Ontheroundcomplexityofblackboxconstructions..> 22-Dec-2014 10:12    431K
514-GenericOneRoundGroupKeyExchangeintheStandar..> 22-Dec-2014 10:12    217K
514-GenericOneRoundGroupKeyExchangeintheStandar..> 22-Dec-2014 10:12    735K
515-BlakeWilsonJohnsonandMenezesProtocolRevisit..> 22-Dec-2014 10:11    189K
516-LightweightCryptographyCryptographicEnginee..> 22-Dec-2014 10:11      7M
517-NewConstructionsofConvertibleUndeniableSign..> 22-Dec-2014 10:11    399K
518-EfficientStrongDesignatedVerifierSignatureS..> 22-Dec-2014 10:11    303K
519-SecureMessageTransmissionwithSmallPublicDis..> 22-Dec-2014 10:11    313K
520-UniversallyComposableIncoercibility.pdf        22-Dec-2014 10:11    492K
521-AnEfficientSecureObliviousTransfer.pdf         22-Dec-2014 10:11    234K
522-IsogeniesofEllipticCurvesAComputationalAppr..> 22-Dec-2014 10:11    324K
523-DifferentialAdditioningeneralizedEdwardsCoo..> 22-Dec-2014 10:11    127K
524-ChosenCiphertextSecurityfromSlightlyLossyTr..> 22-Dec-2014 10:11    269K
525-OnQuantifyingtheResistanceofConcreteHashFun..> 22-Dec-2014 10:11    310K
525-OnQuantifyingtheResistanceofConcreteHashFun..> 22-Dec-2014 10:11    588K
526-ImprovedRelatedKeyBoomerangAttacksonRoundRe..> 22-Dec-2014 10:11    234K
527-AnEfficientAdaptiveDeniableConcurrentNonmal..> 22-Dec-2014 10:11    323K
528-NewFaultAttackonEllipticCurveScalarMultipli..> 22-Dec-2014 10:11    164K
529-ObliviousTransferwithAccessControl.pdf         22-Dec-2014 10:11    317K
530-ANewProposalAgainsttheMainofGenericAttacks.pdf 22-Dec-2014 10:11    177K
531-SuperSboxCryptanalysisImprovedAttacksforAES..> 22-Dec-2014 10:11    335K
532-BuildingEfficientFullyCollusionResilientTra..> 22-Dec-2014 10:11    465K
533-Findingcompositeorderordinaryellipticcurves..> 22-Dec-2014 10:11    188K
534-Weaknessesandimprovementofthreepartyauthent..> 20-Jan-2023 14:21     207
535-Weaknessofathreepartypasswordbasedauthentic..> 20-Jan-2023 14:21     207
536-Practicalremotemutualauthenticationwithkeya..> 20-Jan-2023 14:21     207
537-Cryptanalysisoftwoknapsackpublickeycryptosy..> 22-Dec-2014 10:11    150K
538-SideChannelAnalysisofCryptographicSoftwarev..> 22-Dec-2014 10:11    272K
538-SideChannelAnalysisofCryptographicSoftwarev..> 22-Dec-2014 10:10    859K
539-CoveringRadiusofTwodimensionalLattices.pdf     22-Dec-2014 10:10    135K
540-ConvertingPairingBasedCryptosystemsfromComp..> 22-Dec-2014 10:10    336K
541-BreakingECC2K130.pdf                           22-Dec-2014 10:10    247K
542-AnalysisofIntermediateFieldSystems.pdf         22-Dec-2014 10:10    196K
543-AFormalFrameworkforCryptanalyzingRFIDDistan..> 20-Jan-2023 14:21     207
544-ConnectionsbetweenQuaternaryandBinaryBentFu..> 22-Dec-2014 10:10    156K
544-ConnectionsbetweenQuaternaryandBinaryBentFu..> 22-Dec-2014 10:10    350K
545-Fuzzyextractorsforcontinuousdistributions.pdf  22-Dec-2014 10:10    241K
546-ConstructionofANewClassofLinearMultivariate..> 22-Dec-2014 10:10    161K
547-NonInteractiveVerifiableComputingOutsourcin..> 22-Dec-2014 10:10    175K
547-NonInteractiveVerifiableComputingOutsourcin..> 22-Dec-2014 10:10    608K
548-ANOTEONYAO39STHEOREMABOUTPSEUDORANDOMGENERA..> 20-Jan-2023 08:36    191K
548-ANOTEONYAOSTHEOREMABOUTPSEUDORANDOMGENERATO..> 22-Dec-2014 10:10    569K
548-ANOTEONYAOSTHEOREMABOUTPSEUDORANDOMGENERATO..> 22-Dec-2014 10:10    752K
549-MakingCollusionSecureCodesMoreRobustagainst..> 22-Dec-2014 10:10    165K
550-HowtoConstructCryptosystemsandHashFunctions..> 22-Dec-2014 10:10    162K
551-ANovelDesignMethodofStreamCiphersBasedonTab..> 22-Dec-2014 10:10     79K
552-PreimageAttacksonReducedDHA256.pdf             22-Dec-2014 10:10    280K
553-Cryptanalysisofakeyexchangeschemebasedonblo..> 22-Dec-2014 10:10    221K
554-ONACOMBINATORIALCONJECTURE.pdf                 22-Dec-2014 10:10    162K
555-Anenhancedpasswordauthenticatedkeyagreement..> 20-Jan-2023 14:21     207
556-ConstructingTowerExtensionsfortheimplementa..> 22-Dec-2014 10:10    210K
557-TowardsaTheoryofTrustBasedCollaborativeSear..> 20-Jan-2023 14:21     207
558-QuantifyingTrust.pdf                           20-Jan-2023 14:21     207
559-NewIntegralDistinguisherforRijndael256.pdf     22-Dec-2014 10:10    138K
560-OntheSecurityVulnerabilitiesofaHashBasedStr..> 22-Dec-2014 10:10     62K
561-Improvementsontwopasswordbasedauthenticatio..> 22-Dec-2014 10:10    633K
562-Howtopairwithahuman.pdf                        22-Dec-2014 10:10    414K
563-AFamilyofparyBinomialBentFunctions.pdf         22-Dec-2014 10:10    182K
564-Optimalpairingrevisited.pdf                    22-Dec-2014 10:10    220K
565-FasterSquaringintheCyclotomicSubgroupofSixt..> 22-Dec-2014 10:10    227K
566-NewCryptosystemsFromCSPBasedSelfDistributiv..> 22-Dec-2014 10:10    334K
567-PropertiesoftheDiscreteDifferentialwithCryp..> 22-Dec-2014 10:10    189K
568-EphemeralkeycompromiseattackontheIBKAprotoc..> 22-Dec-2014 10:09     93K
569-SecureNetworkCodingOvertheIntegers.pdf         22-Dec-2014 10:09    285K
570-AchievingObliviousTransferCapacityofGeneral..> 22-Dec-2014 10:09    242K
571-FullyHomomorphicEncryptionwithRelativelySma..> 22-Dec-2014 10:09    262K
572-OntheEquivalenceofTwoModelsforKeyDependentM..> 20-Jan-2023 14:21     207
573-NewAdditionOperationandItsApplicationforSca..> 22-Dec-2014 10:09    157K
574-VotingwithunconditionalprivacyCFSYforboothv..> 22-Dec-2014 10:09    218K
574-VotingwithunconditionalprivacyCFSYforboothv..> 22-Dec-2014 10:09    735K
575-DifferentialFaultAnalysisoftheAdvancedEncry..> 22-Dec-2014 10:09    296K
576-PublicKeyCryptographicPrimitivesProvablyasS..> 22-Dec-2014 10:09    234K
577-OnthenonlinearityprofileoftheDillonfunction..> 22-Dec-2014 10:09    181K
578-EfficientandProvablySecureCertificatelessSi..> 22-Dec-2014 10:09    161K
578-EfficientandProvablySecureCertificatelessSi..> 22-Dec-2014 10:09    252K
579-PrivacyPreservingPublicAuditingforSecureClo..> 22-Dec-2014 10:09    245K
580-AcompletesetofadditionlawsforincompleteEdwa..> 22-Dec-2014 10:09    237K
581-ADiagonalFaultAttackontheAdvancedEncryption..> 22-Dec-2014 10:09    388K
582-AGameBasedDefinitionofCoercionResistanceand..> 22-Dec-2014 10:09    597K
583-DifferentialAlgebraicAlgorithmsfortheIsomor..> 22-Dec-2014 10:09    387K
584-ScanbasedAttacksonLinearFeedbackShiftRegist..> 22-Dec-2014 10:09    182K
585-AnImprovedDifferentialFaultAttackonCamellia..> 22-Dec-2014 10:09    644K
586-Ameanvalueformulaforellipticcurves.pdf         22-Dec-2014 10:09     96K
586-Ameanvalueformulaforellipticcurves.ps          22-Dec-2014 10:09    421K
587-PolyDragonAnefficientMultivariatePublicKeyC..> 22-Dec-2014 10:09    202K
588-ConfidentialSignaturesandDeterministicSignc..> 22-Dec-2014 10:09    372K
588-ConfidentialSignaturesandDeterministicSignc..> 22-Dec-2014 10:09    664K
589-InformationsetdecodingforlinearcodesoverFq.pdf 22-Dec-2014 10:09    181K
590-MoreConstructionsofLossyandCorrelationSecur..> 22-Dec-2014 10:09    426K
591-EmbeddedSFEOffloadingServerandNetworkusingH..> 22-Dec-2014 10:09    600K
592-FromPassivetoCovertSecurityatLowCost.pdf       22-Dec-2014 10:09    269K
593-EnablingEfficientFuzzyKeywordSearchoverEncr..> 22-Dec-2014 10:08    382K
593-EnablingEfficientFuzzyKeywordSearchoverEncr..> 22-Dec-2014 10:08      2M
594-EfficientSetOperationsinthePresenceofMalici..> 22-Dec-2014 10:08    301K
595-EfficiencyLimitationsforSigmaProtocolsforGr..> 22-Dec-2014 10:08    266K
596-CouldSFLASHberepaired.pdf                      22-Dec-2014 10:08    221K
596-CouldSFLASHberepaired.ps                       22-Dec-2014 10:08    435K
597-TwistedJacobiIntersectionsCurves.pdf           22-Dec-2014 10:08    137K
597-TwistedJacobiIntersectionsCurves.ps            22-Dec-2014 10:08    471K
598-OntheDesignandImplementationofanEfficientDA..> 22-Dec-2014 10:08    237K
599-GrothSahaiproofsrevisited.pdf                  22-Dec-2014 10:08    212K
600-ConstructingCertificatelessEncryptionandIDB..> 22-Dec-2014 10:08    272K
601-ParallelShortestLatticeVectorEnumerationonG..> 22-Dec-2014 10:08    265K
602-SecureRangingWithMessageTemporalIntegrity.pdf  22-Dec-2014 10:08    496K
602-SecureRangingWithMessageTemporalIntegrity.ps   22-Dec-2014 10:08      2M
603-AnFPGATechnologiesAreaExaminationoftheSHA3H..> 22-Dec-2014 10:08     84K
604-CompositionofZeroKnowledgeProofswithEfficie..> 22-Dec-2014 10:08    248K
605-SolvingtheShortestLatticeVectorProbleminTim..> 22-Dec-2014 10:08    217K
606-OnaweaknessoftheTuDengfunctionanditsrepair.pdf 22-Dec-2014 10:08    155K
607-EfficientClientPuzzlesbasedonRepeatedSquari..> 20-Jan-2023 14:21     207
608-NonMalleableCodes.pdf                          22-Dec-2014 10:08    285K
608-NonMalleableCodes.ps                           22-Dec-2014 10:08    477K
609-GroupingProofProtocolforRFIDTagsSecurityDef..> 22-Dec-2014 10:08    204K
610-SecurityAnalysisofARemoteUserAuthentication..> 22-Dec-2014 10:08     72K
611-GoldenFishAnIntelligentStreamCipherFuseMemo..> 22-Dec-2014 10:08     78K
612-OntheImpossibilityofBatchUpdateforCryptogra..> 22-Dec-2014 10:08    248K
613-ClassificationofElliptichyperellipticCurves..> 22-Dec-2014 10:08    178K
614-SecureMultipartyAESfullpaper.pdf               22-Dec-2014 10:08    200K
615-FasterPairingComputationsonCurveswithHighDe..> 22-Dec-2014 10:07    238K
616-FullyHomomorphicEncryptionovertheIntegers.pdf  22-Dec-2014 10:07    359K
616-FullyHomomorphicEncryptionovertheIntegers.ps   22-Dec-2014 10:07    620K
617-AnefficientIDbaseddirectedsignatureschemefr..> 22-Dec-2014 10:07    116K
618-DataDependHashAlgorithm.pdf                    22-Dec-2014 10:07    110K
619-AFamilyofWeakKeysinHFEandtheCorrespondingPr..> 22-Dec-2014 10:07    377K
620-SecurityofECQVCertifiedECDSAAgainstPassiveA..> 22-Dec-2014 10:07    186K
621-OntheAnalysisofCryptographicAssumptionsinth..> 22-Dec-2014 10:07    510K
622-AStrongBlindSignatureSchemeoverBraidGroups.pdf 22-Dec-2014 10:07    183K
623-UniversallyConstructing12thDegreeExtensionF..> 22-Dec-2014 10:07    214K
624-SecurityAnalysisofthePACEKeyAgreementProtoc..> 22-Dec-2014 10:07    249K
624-SecurityAnalysisofthePACEKeyAgreementProtoc..> 22-Dec-2014 10:07    451K
625-CryptographicAccumulatorsforAuthenticatedHa..> 22-Dec-2014 10:07    467K
625-CryptographicAccumulatorsforAuthenticatedHa..> 22-Dec-2014 10:07    862K
626-ApproximateIntegerCommonDivisorProblemrelat..> 22-Dec-2014 10:07    216K
627-AUnifiedMethodforFindingImpossibleDifferent..> 22-Dec-2014 10:07    353K
628-UsingSphinxtoImproveOnionRoutingCircuitCons..> 22-Dec-2014 10:07    187K
628-UsingSphinxtoImproveOnionRoutingCircuitCons..> 22-Dec-2014 10:07    354K
629-AComparativeAnalysisofDelayBasedPUFImplemen..> 22-Dec-2014 10:07    563K
630-InformationTheoreticallySecureProtocolsandS..> 22-Dec-2014 10:07    262K
631-ImprovementofDas39sTwoFactorAuthenticationP..> 20-Jan-2023 08:36     95K
631-ImprovementofDassTwoFactorAuthenticationPro..> 22-Dec-2014 10:07     95K
632-CryptanalysisofSecureMessageTransmissionPro..> 22-Dec-2014 10:07    260K
633-TraitorTracingonBinaryStrings.pdf              22-Dec-2014 10:07    114K
634-AttacksonHashFunctionsbasedonGeneralizedFei..> 22-Dec-2014 10:07    335K
635-FlexibleQuasiDyadicCodeBasedPublicKeyEncryp..> 22-Dec-2014 10:07     35K
636-ObtainingMoreKaratsubaLikeFormulaeoverTheBi..> 22-Dec-2014 10:07    160K
637-EfficientCharacteristicSetAlgorithmsforEqua..> 22-Dec-2014 10:07    288K
638-ReducingEllipticCurveLogarithmtoLogarithmin..> 20-Jan-2023 14:21     207