Index of /2010/


../
001-TransfiniteCryptography.pdf                    22-Dec-2014 15:32    150K
002-PracticalIDbasedEncryptionforWirelessSensor..> 22-Dec-2014 15:32    215K
003-EfficientOnlineOfflineIdentityBasedSignatur..> 22-Dec-2014 15:32    295K
004-HalvingonBinaryEdwardsCurves.pdf               22-Dec-2014 15:32    131K
004-HalvingonBinaryEdwardsCurves.ps                22-Dec-2014 15:32    297K
005-SkewFrobeniusmapontwistedEdwardscurve.pdf      22-Dec-2014 15:32    173K
006-Factorizationofa768bitRSAmodulus.pdf           22-Dec-2014 15:32    581K
007-EfficientAsynchronousVerifiableSecretSharin..> 22-Dec-2014 15:32    595K
008-ADAASchemeRequiringLessTPMResources.pdf        22-Dec-2014 15:32    310K
008-ADAASchemeRequiringLessTPMResources.ps         22-Dec-2014 15:32    617K
009-TheLowerBoundsontheSecondOrderNonlinearityo..> 22-Dec-2014 15:32    212K
010-EvaluationofHardwarePerformancefortheSHA3Ca..> 22-Dec-2014 15:32    459K
011-RelatedKeyCryptanalysisoftheLEXStreamCipher..> 20-Jan-2023 14:21     207
012-DifferentialCacheTraceAttackAgainstCLEFIA.pdf  22-Dec-2014 15:31    119K
012-DifferentialCacheTraceAttackAgainstCLEFIA.ps   22-Dec-2014 15:31    304K
013-APracticalTimeAttackontheA53CryptosystemUse..> 22-Dec-2014 15:31    243K
014-AUnifiedMethodforImprovingPRFBoundsforaClas..> 22-Dec-2014 15:31    331K
015-TowardsSideChannelResistantBlockCipherUsage..> 22-Dec-2014 15:31    302K
016-AdvancedMeetintheMiddlePreimageAttacksFirst..> 22-Dec-2014 15:31    307K
017-Anewonetimesignatureschemefromsyndromedecod..> 22-Dec-2014 15:31    197K
017-Anewonetimesignatureschemefromsyndromedecod..> 22-Dec-2014 15:31    748K
018-ScalabilityandSecurityConflictforRFIDAuthen..> 22-Dec-2014 15:31    191K
019-RelatedKeyBoomerangandRectangleAttacks.pdf     22-Dec-2014 15:31    468K
020-NumberofJacobiquarticcurvesoverfinitefields..> 22-Dec-2014 15:31    109K
020-NumberofJacobiquarticcurvesoverfinitefields.ps 22-Dec-2014 15:31    224K
021-AnoteonImprovedFastCorrelationAttacksonStre..> 22-Dec-2014 15:31    419K
021-AnoteonImprovedFastCorrelationAttacksonStre..> 20-Jan-2023 08:36    419K
022-EnhancedSecurityNotionsforDedicatedKeyHashF..> 22-Dec-2014 15:31    346K
023-DifferentialFaultAnalysisonAESwith192and256..> 22-Dec-2014 15:31     81K
024-Authenticationschemesfromactionsongraphsgro..> 22-Dec-2014 15:31    158K
025-NewMethodologiesforDifferentialLinearCrypta..> 22-Dec-2014 15:31    338K
026-FurtherImprovedDifferentialFaultAnalysisonC..> 22-Dec-2014 15:31    711K
027-AnovelkoutofnObliviousTransferProtocolsBase..> 22-Dec-2014 15:31    512K
028-Asecureanonymouscommunicationschemeinvehicu..> 22-Dec-2014 15:31      3M
029-OnAchievingthe34BestofBothWorlds34inSecureM..> 20-Jan-2023 08:36    170K
029-OnAchievingtheBestofBothWorldsinSecureMulti..> 22-Dec-2014 15:31    170K
030-OntheComplexityoftheHerdingAttackandSomeRel..> 22-Dec-2014 15:31    274K
031-ClassInvariantsbytheCRTMethod.pdf              22-Dec-2014 15:31    214K
032-AnInformationTheoreticPerspectiveontheDiffe..> 22-Dec-2014 15:31    146K
033-SimpleandEfficientPublicKeyEncryptionfromCo..> 22-Dec-2014 15:31    264K
034-Ontheorderofthepolynomialxpxa.pdf              22-Dec-2014 15:30    172K
035-BetweenHashedDHandComputationalDHCompactEnc..> 22-Dec-2014 15:30    302K
036-AnEnhancedRemoteUserAuthenticationScheme.pdf   20-Jan-2023 14:21     207
037-EstimatingtheSizeoftheImageofDeterministicH..> 22-Dec-2014 15:30    343K
038-FaultResistantRSASignaturesChineseRemainder..> 22-Dec-2014 15:30    192K
039-OnExponentialSumsNowtonidentitiesandDickson..> 22-Dec-2014 15:30    152K
040-BatchGrothSahai.pdf                            22-Dec-2014 15:30    270K
041-TheEffectsoftheOmissionofLastRound39sMixCol..> 20-Jan-2023 08:36    125K
041-TheEffectsoftheOmissionofLastRoundsMixColum..> 22-Dec-2014 15:30    125K
042-AmodifiedeCKmodelwithstrongersecurityfortri..> 22-Dec-2014 15:30    135K
043-DifferentialandinvertibilitypropertiesofBLA..> 22-Dec-2014 15:30    231K
044-ANewChaoticImageEncryptionAlgorithmusingaNe..> 20-Jan-2023 14:21     207
045-Efficientchaoticpermutationsforimageencrypt..> 20-Jan-2023 14:21     207
046-ANewChaosBasedCryptosystemforSecureTransmit..> 20-Jan-2023 14:21     207
047-LowerBoundsforStraightLineFactoring.pdf        22-Dec-2014 15:30    211K
048-AnenhancedIDbasedremotemutualauthentication..> 20-Jan-2023 14:21     207
049-OnSymmetricEncryptionandPointObfuscation.pdf   22-Dec-2014 15:30    259K
049-OnSymmetricEncryptionandPointObfuscation.ps    22-Dec-2014 15:30    417K
050-AuthenticatingAggregateRangeQueriesoverMult..> 22-Dec-2014 15:30    611K
050-AuthenticatingAggregateRangeQueriesoverMult..> 22-Dec-2014 15:30      1M
051-APrincipleforCryptographicProtocolsBeyondSe..> 22-Dec-2014 15:30    159K
052-CryptanalysisandImprovementofaNewGatewayOri..> 20-Jan-2023 14:21     207
053-Logicalcryptoanalysisontheexampleofthecrypt..> 22-Dec-2014 15:30    176K
054-AnImprovedTimingAttackwithErrorDetectiononR..> 22-Dec-2014 15:30    173K
055-CredentialAuthenticatedIdentificationandKey..> 22-Dec-2014 15:30    576K
056-ImprovedCacheTraceAttackonAESandCLEFIAbyCon..> 22-Dec-2014 15:30    541K
057-MessageRecoveryandPseudoPreimageAttacksonth..> 22-Dec-2014 15:30    321K
058-Solinasprimesofsmallweightforfixedsizes.pdf    22-Dec-2014 15:30      2M
059-ANewFrameworkforRFIDPrivacy.pdf                22-Dec-2014 15:30    195K
060-InsecureProvablySecureNetworkCoding3939andH..> 20-Jan-2023 08:35    192K
060-InsecureProvablySecureNetworkCodingandHomom..> 22-Dec-2014 15:30    192K
061-PrivacyPreservingMatchingProtocolsforAttrib..> 22-Dec-2014 15:30    119K
062-DifferentialCryptanalysisofSMS4BlockCipher.pdf 22-Dec-2014 15:30    199K
063-DifferentialFaultAnalysisonSMS4UsingaSingle..> 22-Dec-2014 15:30    329K
064-NewAdvancesonPrivacyPreservingPolicyReconci..> 22-Dec-2014 15:29    237K
065-AnAnonymousIDbasedEncryptionRevisited.pdf      22-Dec-2014 15:29    119K
066-SomeObservationsonTWISBlockCipher.pdf          22-Dec-2014 15:29    171K
067-APairingBasedDAASchemeFurtherReducingTPMRes..> 22-Dec-2014 15:29    184K
068-OkamotoTanakaRevisitedFullyAuthenticatedDif..> 22-Dec-2014 15:29    348K
069-TypeIIOptimalPolynomialBases.pdf               22-Dec-2014 15:29    342K
070-StronglyUnforgeableSignaturesandHierarchica..> 22-Dec-2014 15:29    271K
071-2roundSubstitutionPermutationand3roundFeist..> 22-Dec-2014 15:29    209K
072-ApproximatingAdditionbyXORhowtogoalltheway.pdf 22-Dec-2014 15:29    226K
073-RelatedKeyBoomerangAttackonBlockCipherSQUAR..> 22-Dec-2014 15:29    493K
074-ConcurrentKnowledgeExtractioninthePublicKey..> 22-Dec-2014 15:29    411K
075-ANewSchemeforZeroKnowledgeProofbasedonMulti..> 22-Dec-2014 15:29    114K
076-PrivateandContinualReleaseofStatistics.pdf     22-Dec-2014 15:29    364K
077-ECC2K130onCellCPUs.pdf                         22-Dec-2014 15:29    201K
078-MultipleBytesDifferentialFaultAnalysisonCLE..> 22-Dec-2014 15:29    530K
079-FromDusttoDawnPracticallyEfficientTwoPartyS..> 22-Dec-2014 15:29    713K
080-SecrecyOrientedFirstOrderLogicalAnalysisofC..> 22-Dec-2014 15:29    485K
081-TheErishybridcipher.pdf                        22-Dec-2014 15:29    126K
082-PredicateBasedKeyExchange.pdf                  22-Dec-2014 15:29    437K
083-OneRoundGroupKeyExchangewithForwardSecurity..> 22-Dec-2014 15:29    288K
083-OneRoundGroupKeyExchangewithForwardSecurity..> 22-Dec-2014 15:29    880K
084-AttributebasedAuthenticatedKeyExchange.pdf     22-Dec-2014 15:29    474K
085-PairwiseCryptographicModelsforSecureDataExc..> 22-Dec-2014 15:29    537K
086-AFrameworkforEfficientSignaturesRingSignatu..> 22-Dec-2014 15:29    310K
087-MQIPAnIdentitybasedIdentificationSchemewith..> 22-Dec-2014 15:29    197K
088-AnEfficientandParallelGaussianSamplerforLat..> 22-Dec-2014 15:28    398K
089-InteractiveLockingZeroKnowledgePCPsandUncon..> 22-Dec-2014 15:28    506K
090-Solvinga676bitDiscreteLogarithmProbleminGF3..> 22-Dec-2014 15:28    186K
091-DistinguishersfortheCompressionFunctionandO..> 22-Dec-2014 15:28    236K
092-SecurityWeaknessesinTwoCertificatelessSignc..> 22-Dec-2014 15:28     68K
092-SecurityWeaknessesinTwoCertificatelessSignc..> 22-Dec-2014 15:28    178K
093-NewImpossibleDierentialAttacksonAES.pdf        22-Dec-2014 15:28    252K
093-NewImpossibleDifferentialAttacksonAES.pdf      20-Jan-2023 08:35    252K
094-ARandomNumberGeneratorBasedonIsogeniesOpera..> 22-Dec-2014 15:28    106K
095-PlaintextDependentDecryptionAFormalSecurity..> 22-Dec-2014 15:28    339K
096-SecretSharingExtensionsbasedontheChineseRem..> 22-Dec-2014 15:28    243K
097-ParallelEnumerationofShortestLatticeVectors..> 22-Dec-2014 15:28    286K
098-AZeroOneLawforDeterministic2PartySecureComp..> 22-Dec-2014 15:28    436K
099-OnHomomorphicEncryptionandChosenCiphertextS..> 22-Dec-2014 15:28    350K
100-CorrelatedProductSecurityFromAnyOneWayFunct..> 22-Dec-2014 15:28    204K
101-FairBlindSignatureswithoutRandomOracles.pdf    22-Dec-2014 15:28    305K
102-ConstructingVeri64257ableRandomFunctionswit..> 22-Dec-2014 15:28    247K
102-ConstructingVeriableRandomFunctionswithLarg..> 20-Jan-2023 08:35    247K
103-TheExtendedAccessControlforMachineReadableT..> 22-Dec-2014 15:28    111K
104-AvoidingFullExtensionFieldArithmeticinPairi..> 22-Dec-2014 15:28    278K
105-Biasinthenonlinearfiltergeneratoroutputsequ..> 22-Dec-2014 15:28    311K
106-PerfectlySecureMultipartyComputationandtheC..> 22-Dec-2014 15:28    463K
107-AdaptiveConcurrentNonMalleabilitywithBarePu..> 22-Dec-2014 15:28    316K
108-PerfectlySecureObliviousRAMWithoutRandomOra..> 22-Dec-2014 15:28    376K
109-PracticalAdaptiveObliviousTransferfromSimpl..> 22-Dec-2014 15:28    342K
110-FullySecureFunctionalEncryptionAttributeBas..> 22-Dec-2014 15:28    565K
111-Onzeropracticalsignificanceof34Keyrecoverya..> 20-Jan-2023 08:35    854K
111-OnzeropracticalsignificanceofKeyrecoveryatt..> 22-Dec-2014 15:28    776K
112-CCASecurePRESchemewithoutRandomOracles.pdf     22-Dec-2014 15:28    264K
113-CryptanalysisofTwoEfficientHIBESchemesinthe..> 22-Dec-2014 15:28    167K
114-TheDiscreteLogarithmProblemModuloOneCryptan..> 22-Dec-2014 15:28    104K
115-ASecurityEvaluationofDNSSECwithNSEC3.pdf       22-Dec-2014 15:27    399K
116-PracticalImprovementsofProfiledSideChannelA..> 22-Dec-2014 15:27    827K
117-CryptographicAgilityanditsRelationtoCircula..> 22-Dec-2014 15:27    284K
118-ProposalofaSignatureSchemebasedonSTSTrapdoo..> 22-Dec-2014 15:27    118K
119-HowtoConstructSpaceEfficientRevocableIBEfro..> 20-Jan-2023 14:21     207
120-UniversalOneWayHashFunctionsandAverageCaseC..> 22-Dec-2014 15:27    296K
121-LatticeBasedPublicKeyCryptosystemProvablySe..> 20-Jan-2023 14:21     207
122-SecurityofEncryptionSchemesinWeakenedRandom..> 22-Dec-2014 15:27    378K
123-DelayingMismatchedFieldMultiplicationsinPai..> 22-Dec-2014 15:27    269K
124-AHardwareWrapperfortheSHA3HashAlgorithms.pdf   22-Dec-2014 15:27     84K
125-CryptographicAspectsofRealHyperellipticCurv..> 22-Dec-2014 15:27    326K
126-OntheSecurityofanEfficientMobileAuthenticat..> 22-Dec-2014 15:27     57K
127-CCASecureCryptosystemfromLattice.pdf           20-Jan-2023 14:21     207
128-UpdateOptimalAuthenticatedStructuresBasedon..> 20-Jan-2023 14:21     207
129-RelationforAlgebraicAttackonE0combiner.pdf     22-Dec-2014 15:27     72K
130-LowVoltageFaultAttackstoAESandRSAonGeneralP..> 22-Dec-2014 15:27    389K
131-MultipropertypreservingDomainExtensionUsing..> 22-Dec-2014 15:27    371K
132-OntheclaimedprivacyofECRACIII.pdf              22-Dec-2014 15:27     89K
132-OntheclaimedprivacyofECRACIII.ps               22-Dec-2014 15:27    277K
133-SigningonElementsinBilinearGroupsforModular..> 22-Dec-2014 15:27    650K
134-BarretoNaehrigCurveWithFixedCoefficientEffi..> 22-Dec-2014 15:27    238K
135-OnTheBroadcastandValidityCheckingSecurityof..> 22-Dec-2014 15:27    240K
135-OnTheBroadcastandValidityCheckingSecurityof..> 22-Dec-2014 15:27    492K
136-OnRobustKeyAgreementBasedonPublicKeyAuthent..> 22-Dec-2014 15:27    235K
137-EstimatingtheSecurityofLatticebasedCryptosy..> 22-Dec-2014 15:27    535K
138-OntheSecurityofaNovelRemoteUserAuthenticati..> 22-Dec-2014 15:27     51K
139-ANewClassofPublicKeyCryptosystemsConstructe..> 22-Dec-2014 15:27    187K
140-ImprovedAgreeingGluingAlgorithm.pdf            22-Dec-2014 15:27    401K
141-AReflectionontheSecurityProofsofBonehFrankl..> 20-Jan-2023 14:21     207
142-MeanvalueformulasfortwistedEdwardscurves.pdf   22-Dec-2014 15:27    272K
143-SmallScaleVariantsOfTheBlockCipherPRESENT.pdf  22-Dec-2014 15:27    138K
144-NewDefinitionsandSeparationsforCircularSecu..> 22-Dec-2014 15:27    320K
145-iHopHomomorphicEncryptionandRerandomizableY..> 22-Dec-2014 15:27    284K
146-SomeApplicationsofLatticeBasedRootFindingTe..> 22-Dec-2014 15:26    191K
147-ANewFrameworkforPasswordBasedAuthenticatedK..> 22-Dec-2014 15:26    245K
148-Commentsonfivesmartcardbasedpasswordauthent..> 22-Dec-2014 15:26    177K
149-OnSmallSubgroupNonconfinementAttack.pdf        22-Dec-2014 15:26    131K
150-BlackBoxComputationalZeroKnowledgeProofsRev..> 22-Dec-2014 15:26    295K
151-Ringsignaturewithdividedprivatekey.pdf         22-Dec-2014 15:26     84K
152-SecureandFastImplementationsofTwoInvolution..> 22-Dec-2014 15:26    164K
153-FoundingCryptographyonTamperProofHardwareTo..> 22-Dec-2014 15:26    386K
154-EfficientPublicKeyCryptographyinthePresence..> 22-Dec-2014 15:26    428K
155-theupperboundsondifferntialcharacteristicsi..> 22-Dec-2014 15:26     80K
156-Genus2CurveswithComplexMultiplication.pdf      22-Dec-2014 15:26    645K
157-EllipticCurveDiscreteLogarithmProblemoverSm..> 22-Dec-2014 15:26    241K
158-AvariantoftheF4algorithm.pdf                   22-Dec-2014 15:26    240K
159-IdentityBasedEncryptionSecureagainstSelecti..> 22-Dec-2014 15:26    372K
160-AFlawinTheInternalStateRecoveryAttackonALPH..> 22-Dec-2014 15:26    141K
161-Stange39sEllipticNetsandCoxeterGroupF4.pdf     20-Jan-2023 08:35    203K
161-StangesEllipticNetsandCoxeterGroupF4.pdf       22-Dec-2014 15:26    203K
162-1024XKSAHighSecuritySoftwareOrientedBlockCi..> 22-Dec-2014 15:26    259K
162-1024XKSAHighSecuritySoftwareOrientedBlockCi..> 22-Dec-2014 15:26    285K
163-GolayComplementarySequencesOvertheQAMConste..> 22-Dec-2014 15:26    539K
164-BlackBoxConstructionsofProtocolsforSecureCo..> 22-Dec-2014 15:26    279K
165-Commentonfourtwopartyauthenticationprotocol..> 22-Dec-2014 15:26    189K
166-FaultAnalysisStudyoftheBlockCipherFOX64.pdf    22-Dec-2014 15:26    331K
167-EvolutionaryCipheragainstDifferentialPowerA..> 22-Dec-2014 15:26    348K
168-AMeetintheMiddleAttackonARIA.pdf               22-Dec-2014 15:26    399K
169-DismantlingSecureMemoryCryptoMemoryandCrypt..> 22-Dec-2014 15:26    208K
170-Onaconjectureaboutbinarystringsdistribution..> 22-Dec-2014 15:26    632K
171-OnFoundationandConstructionofPhysicalUnclon..> 22-Dec-2014 15:26    434K
172-ChosenCiphertextSecureEncryptionoverSemismo..> 22-Dec-2014 15:26    188K
172-ChosenCiphertextSecureEncryptionoverSemismo..> 22-Dec-2014 15:26    362K
173-CompactImplementationsofBLAKE32andBLAKE64on..> 22-Dec-2014 15:25    570K
174-AReflectionontheSecurityofTwoPartyKeyEstabl..> 22-Dec-2014 15:25    239K
175-Sanitizablesignatureswithstrongtransparency..> 22-Dec-2014 15:25    203K
176-AComparisonofCryptanalyticTradeoffAlgorithm..> 22-Dec-2014 15:25    827K
177-OntheStaticDiffieHellmanProblemonEllipticCu..> 22-Dec-2014 15:25    232K
178-IdentityBasedOnlineOfflineEncryptionScheme.pdf 22-Dec-2014 15:25    396K
179-AClassof1ResilientFunctionwithHighNonlinear..> 22-Dec-2014 15:25    151K
180-TheWorldisNotEnoughAnotherLookonSecondOrder..> 22-Dec-2014 15:25    815K
180-TheWorldisNotEnoughAnotherLookonSecondOrder..> 22-Dec-2014 15:25      4M
181-CryptanalysisofaDoSresistantIDbasedpassword..> 22-Dec-2014 15:25     66K
182-ASimpleBGNtypeCryptosystemfromLWE.pdf          22-Dec-2014 15:25    217K
183-PreventingPollutionAttacksinMultiSourceNetw..> 22-Dec-2014 15:25    230K
184-RationalSecretSharingASExtensiveGames.pdf      20-Jan-2023 14:21     207
185-NewMethodstoConstructGolayComplementarySequ..> 22-Dec-2014 15:25    188K
186-Newsoftwarespeedrecordsforcryptographicpair..> 22-Dec-2014 15:25    195K
187-CertificatelessSigncryptionwithoutPairing.pdf  22-Dec-2014 15:25    138K
187-CertificatelessSigncryptionwithoutPairing.ps   22-Dec-2014 15:25    227K
188-CryptographicRolebasedSecurityMechanismsbas..> 22-Dec-2014 15:25    604K
188-CryptographicRolebasedSecurityMechanismsbas..> 22-Dec-2014 15:25      4M
189-Newgenericalgorithmsforhardknapsacks.pdf       22-Dec-2014 15:25    313K
190-JPAKEAuthenticatedKeyExchangeWithoutPKI.pdf    22-Dec-2014 15:24    207K
191-OnDesignatedVerifierSignatureSchemes.pdf       22-Dec-2014 15:24    192K
192-NonTransferableProxyReEncryptionSchemeforDa..> 22-Dec-2014 15:24    644K
193-SpeedingUpTheWidepipeSecureandFastHashing.pdf  22-Dec-2014 15:24    332K
194-IdentityBasedOnlineOfflineKeyEncapsulationa..> 22-Dec-2014 15:24    200K
194-IdentityBasedOnlineOfflineKeyEncapsulationa..> 22-Dec-2014 15:24    698K
195-OnEVoteIntegrityintheCaseofMaliciousVoterCo..> 22-Dec-2014 15:24    269K
196-CryptographyAgainstContinuousMemoryAttacks.pdf 22-Dec-2014 15:24    729K
196-CryptographyAgainstContinuousMemoryAttacks.ps  22-Dec-2014 15:24      1M
197-FullySecureAnonymousHIBEandSecretKeyAnonymo..> 22-Dec-2014 15:24    357K
198-TheReboundAttackandSubspaceDistinguishersAp..> 22-Dec-2014 15:24    583K
199-AFrameworkForFullySimulatablehOutOfnOblivio..> 22-Dec-2014 15:24    562K
199-AFrameworkforFullySimulatabletoutofnOblivio..> 20-Jan-2023 08:35    387K
200-GenericConstructionsforVerifiablyEncryptedS..> 22-Dec-2014 15:24    264K
201-ImpossibleDifferentialCryptanalysisonE2.pdf    20-Jan-2023 14:21     207
202-RobustCombinerforObfuscators.pdf               22-Dec-2014 15:24    269K
203-HeraclitusALFSRbasedStreamCipherwithKeyDepe..> 22-Dec-2014 15:24    216K
204-Certificatelessgeneralizedsigncryption.pdf     22-Dec-2014 15:24     70K
205-OnProtectingCryptographicKeysAgainstContinu..> 22-Dec-2014 15:24    310K
206-Authenticationprotocolsbasedonlowbandwidthu..> 22-Dec-2014 15:24    663K
207-IncreasedResilienceinThresholdCryptographyS..> 22-Dec-2014 15:24    255K
208-EfficientImplementationofEllipticCurvePoint..> 22-Dec-2014 15:24    205K
209-IdentityBasedAuthenticatedAsymmetricGroupKe..> 22-Dec-2014 15:24    248K
210-FullySecureIdentityBasedEncryptionWithoutRa..> 20-Jan-2023 14:21     207
211-PracticaltimeAttackontheFullMMBBlockCipher.pdf 22-Dec-2014 15:24    142K
212-QuantumProofsofKnowledge.pdf                   22-Dec-2014 15:24    271K
213-ComposableSecurityAnalysisofOSServices.pdf     22-Dec-2014 15:24    279K
214-HowtoTellifYourCloudFilesAreVulnerabletoDri..> 22-Dec-2014 15:24   1007K
215-OntheqStrongDiffieHellmanProblem.pdf           22-Dec-2014 15:23     64K
216-DistinguishingAttacksonMACHMACBasedonANewDe..> 22-Dec-2014 15:23    207K
217-SecureCodeUpdateforEmbeddedDevicesviaProofs..> 22-Dec-2014 15:23    395K
218-NewMontgomerybasedSemisystolicMultiplierfor..> 20-Jan-2023 14:21     207
219-TrackerSecurityandPrivacyforRFIDbasedSupply..> 22-Dec-2014 15:23    269K
220-IfSizeMattersSizeHidingPrivateSetIntersecti..> 22-Dec-2014 15:23    706K
220-IfSizeMattersSizeHidingPrivateSetIntersecti..> 22-Dec-2014 15:23    912K
221-SolvingGeneralizedSmallInverseProblems.pdf     22-Dec-2014 15:23    166K
222-SomeObservationsonIndifferentiability.pdf      22-Dec-2014 15:23    228K
222-SomeObservationsonIndifferentiability.ps       22-Dec-2014 15:23    892K
223-ImprovedDifferentialAttacksforECHOandGrostl..> 22-Dec-2014 15:23    973K
224-EfficientImplementationoftheOrlandiProtocol..> 22-Dec-2014 15:23    225K
224-EfficientImplementationoftheOrlandiProtocol..> 22-Dec-2014 15:23    749K
225-ASecurityWeaknessinaGenericConstructionofaG..> 22-Dec-2014 15:23    170K
226-CircularandLeakageResilientPublicKeyEncrypt..> 22-Dec-2014 15:23    381K
227-ASecurityWeaknessinCompositeOrderPairingBas..> 22-Dec-2014 15:23     68K
227-ASecurityWeaknessinCompositeOrderPairingBas..> 22-Dec-2014 15:23    191K
227-ASecurityWeaknessinCompositeOrderPairingBas..> 20-Jan-2023 08:35     67K
228-PracticalNFCPeertoPeerRelayAttackusingMobil..> 22-Dec-2014 15:23      3M
229-Concurrentcompositionintheboundedquantumsto..> 22-Dec-2014 15:23    441K
230-Acalculusforgamebasedsecurityproofs.pdf        22-Dec-2014 15:23    271K
231-ThroughputOptimalRoutinginUnreliableNetwork..> 22-Dec-2014 15:23    643K
231-ThroughputOptimalRoutinginUnreliableNetwork..> 22-Dec-2014 15:23      1M
232-OnRepresentableMatroidsandIdealSecretSharin..> 22-Dec-2014 15:23    225K
233-CommutingSignaturesandVerifiableEncryptiona..> 22-Dec-2014 15:23    437K
234-Efficientprovabledatapossessionforhybridclo..> 22-Dec-2014 15:22    321K
235-Attributebasedgroupkeyestablishment.pdf        22-Dec-2014 15:22    279K
236-AccountabilityDefinitionandRelationshiptoVe..> 22-Dec-2014 15:22    294K
237-ANewSecurityModelforAuthenticatedKeyAgreeme..> 22-Dec-2014 15:22    352K
237-ANewSecurityModelforAuthenticatedKeyAgreeme..> 22-Dec-2014 15:22      1M
238-CollusionFreeProtocolforCorrelatedElementSe..> 22-Dec-2014 15:22    190K
238-CollusionFreeProtocolforCorrelatedElementSe..> 22-Dec-2014 15:22    385K
239-Oneroundandauthenticatedthreepartymultiplek..> 22-Dec-2014 15:22    215K
240-WeaknessesofadynamicIDbasedremoteuserauthen..> 22-Dec-2014 15:22     82K
241-ImprovedDelegationofComputationusingFullyHo..> 22-Dec-2014 15:22    479K
242-EfficientAccessControlofSensitiveDataServic..> 22-Dec-2014 15:22    180K
243-Constructionof1ResilientBooleanFunctionswit..> 22-Dec-2014 15:22     95K
244-AuthenticatingAggregateRangeQueriesoverDyna..> 22-Dec-2014 15:22    396K
245-TowardsaTheoryofTrustBasedCollaborativeSear..> 22-Dec-2014 15:22    185K
246-QuantifyingTrust.pdf                           22-Dec-2014 15:22    131K
247-ANewJointFingerprintingandDecryptionSchemeb..> 22-Dec-2014 15:22    183K
248-AutomaticSearchforRelatedKeyDifferentialCha..> 22-Dec-2014 15:22    327K
249-RationalSecretSharingwithoutBroadcast.pdf      22-Dec-2014 15:22    120K
249-RationalSecretSharingwithoutBroadcast.ps       22-Dec-2014 15:22    312K
250-CollusionFreeProtocolforRationalSecretShari..> 22-Dec-2014 15:22     85K
250-CollusionFreeProtocolforRationalSecretShari..> 22-Dec-2014 15:22    220K
251-ModelingAttacksonPhysicalUnclonableFunction..> 22-Dec-2014 15:22    511K
252-AsupplementtoLiuetal39scertificatelesssignc..> 20-Jan-2023 08:35    109K
252-AsupplementtoLiuetalscertificatelesssigncry..> 22-Dec-2014 15:22    109K
253-SeparableHashFunctions.pdf                     22-Dec-2014 15:22    188K
254-CryptanalysisofXXTEA.pdf                       22-Dec-2014 15:22    319K
255-Automorphismgroupofthesetofallbentfunctions..> 22-Dec-2014 15:22     77K
255-Automorphismgroupofthesetofallbentfunctions.ps 22-Dec-2014 15:22    189K
256-OnthePublicKeyReplacementandUniversalForger..> 20-Jan-2023 14:21     207
257-FeasibleAttackonthe13roundAES256.pdf           22-Dec-2014 15:22    183K
258-Onlowerboundsofsecondordernonlinearitiesofc..> 22-Dec-2014 15:22    239K
259-Bentfunctionsattheminimaldistanceandalgorit..> 22-Dec-2014 15:21     95K
259-Bentfunctionsattheminimaldistanceandalgorit..> 22-Dec-2014 15:21    246K
260-OnFPGAbasedimplementationsofGrostl.pdf         22-Dec-2014 15:21    682K
261-LinksBetweenTheoreticalandEffectiveDifferen..> 22-Dec-2014 15:21    169K
262-CubeTestAnalysisoftheStatisticalBehaviorofC..> 22-Dec-2014 15:21    495K
262-CubeTestAnalysisoftheStatisticalBehaviorofC..> 22-Dec-2014 15:21      5M
263-LatticeReductionandPolynomialSolving.pdf       20-Jan-2023 14:21     207
264-CryptographicExtractionandKeyDerivationTheH..> 22-Dec-2014 15:21    484K
265-CCASecureUnidirectionalProxyReEncryptionint..> 22-Dec-2014 15:21    227K
265-CCASecureUnidirectionalProxyReEncryptionint..> 22-Dec-2014 15:21    790K
266-MultipartyComputationforModuloReductionwith..> 22-Dec-2014 15:21    347K
267-Twoimprovedauthenticatedmultiplekeyexchange..> 22-Dec-2014 15:21    191K
268-KeyControlledOrderPreservingEncryption.pdf     22-Dec-2014 15:21    107K
269-LABFormforIteratedHashFunctions.pdf            22-Dec-2014 15:21    320K
270-FactorizationofRSA180.pdf                      22-Dec-2014 15:21     71K
271-SelectingParametersforSecureMcEliecebasedCr..> 22-Dec-2014 15:21    393K
272-VirtualSecureCircuitPortingDualRailPrecharg..> 22-Dec-2014 15:21      2M
273-SymmetricStatesandtheirStructureImprovedAna..> 22-Dec-2014 15:21    143K
274-OnlineOfflineIdentityBasedSigncryptionRevis..> 22-Dec-2014 15:21    251K
275-PositionBasedQuantumCryptographyImpossibili..> 22-Dec-2014 15:21    310K
276-GarbledCircuitsforLeakageResilienceHardware..> 22-Dec-2014 15:21    853K
277-AdaptivelySecureBroadcastEncryptionwithShor..> 20-Jan-2023 14:21     207
278-OvercomingtheHoleInTheBucketPublicKeyCrypto..> 22-Dec-2014 15:21    496K
279-OntheRoundComplexityofCovertComputation.pdf    22-Dec-2014 15:21    424K
280-StudiesonVerifiableSecretSharingByzantineAg..> 22-Dec-2014 15:20      2M
281-ProtocolsforReliableandSecureMessageTransmi..> 22-Dec-2014 15:20      2M
282-PseudoLinearApproximationsforARXCiphersWith..> 22-Dec-2014 15:20    186K
283-RecursiveInformationHidinginVisualCryptogra..> 22-Dec-2014 15:20    835K
284-SecureTwoPartyComputationviaCutandChooseObl..> 22-Dec-2014 15:20    629K
285-ASATbasedpreimageanalysisofreducedKECCAKhas..> 22-Dec-2014 15:20    166K
286-OnsecondordernonlinearitiesofsomemathcalD_0..> 22-Dec-2014 15:20    316K
287-IntroductiontoMirrorTheoryAnalysisofSystems..> 22-Dec-2014 15:20    604K
288-LatticebasedIdentityBasedBroadcastEncryptio..> 22-Dec-2014 15:20    242K
289-ATwoPartyProtocolwithTrustedInitializerforC..> 22-Dec-2014 15:20    168K
290-IntractableProblemsinCryptography.pdf          22-Dec-2014 15:20    253K
291-CryptanalysisofanExquisiteMutualAuthenticat..> 22-Dec-2014 15:20     60K
292-ALowAreayetPerformantFPGAImplementationofSh..> 22-Dec-2014 15:20    302K
293-SecurityofbalancedandunbalancedFeistelSchem..> 22-Dec-2014 15:20    411K
294-Computinggenus2curvesfrominvariantsontheHil..> 22-Dec-2014 15:20    412K
295-IdealKeyDerivationandEncryptioninSimulation..> 22-Dec-2014 15:20    295K
296-HashbasedMultivariatePublicKeyCryptosystems..> 22-Dec-2014 15:20    222K
297-CorrelationEnhancedPowerAnalysisCollisionAt..> 22-Dec-2014 15:20      4M
298-OntheIndifferentiabilityoftheGrostlHashFunc..> 22-Dec-2014 15:20    509K
298-OntheIndifferentiabilityoftheGrstlHashFunct..> 20-Jan-2023 08:35    509K
299-FasterFullyHomomorphicEncryption.pdf           22-Dec-2014 15:20    416K
300-OptimalAverageJointHammingWeightandMinimalW..> 22-Dec-2014 15:20    352K
300-OptimalAverageJointHammingWeightandMinimalW..> 22-Dec-2014 15:19    849K
301-OngeneralizedFeistelnetworks.pdf               22-Dec-2014 15:19    293K
302-UsingtheInhomogeneousSimultaneousApproximat..> 22-Dec-2014 15:19    216K
303-UniversallyComposableSymbolicAnalysisofDiff..> 22-Dec-2014 15:19    548K
304-CryptanalysisoftheCompressionFunctionofSIMD..> 22-Dec-2014 15:19    194K
305-OntheImpossibilityofCryptographyAloneforPri..> 22-Dec-2014 15:19    557K
306-Onsecurityofaremoteuserauthenticationscheme..> 22-Dec-2014 15:19     66K
307-ImpossibleDifferentialCryptanalysisofSPNCip..> 22-Dec-2014 15:19    219K
308-AttackingMMCollectiveSignatureScheme.pdf       22-Dec-2014 15:19    230K
308-AttackingMampMCollectiveSignatureScheme.pdf    20-Jan-2023 08:35    230K
309-CoZAdditionFormulaeandBinaryLaddersonEllipt..> 22-Dec-2014 15:19    174K
310-Theanalyticalpropertyforzetas.pdf              20-Jan-2023 14:20     207
311-Combiningleakresistantarithmeticforelliptic..> 22-Dec-2014 15:19    209K
312-Securityweaknessoftwoauthenticatedkeyexchan..> 22-Dec-2014 15:19     92K
313-FastExhaustiveSearchforPolynomialSystemsinF..> 22-Dec-2014 15:19    175K
313-FastExhaustiveSearchforPolynomialSystemsinF..> 22-Dec-2014 15:19      2M
314-WeaknessesofadynamicIDbasedremoteuserauthen..> 22-Dec-2014 15:19     79K
315-EfficientTechniquesforHighSpeedEllipticCurv..> 22-Dec-2014 15:19    225K
316-ANewHumanIdentificationProtocolandCoppersmi..> 20-Jan-2023 08:35    255K
316-ANewHumanIdentificationProtocolandCoppersmi..> 22-Dec-2014 15:19    255K
317-ANoteOnGottesmanChuangQuantumSignatureSchem..> 22-Dec-2014 15:19     86K
318-MultipartyComputationforDishonestMajorityfr..> 22-Dec-2014 15:19    287K
318-MultipartyComputationforDishonestMajorityfr..> 22-Dec-2014 15:19    878K
319-OntheSecurityofaBidirectionalProxyReEncrypt..> 22-Dec-2014 15:19    2217
319-OntheSecurityofaBidirectionalProxyReEncrypt..> 22-Dec-2014 15:19     88K
320-OnisotopismsofcommutativepresemifieldsandCC..> 20-Jan-2023 08:35    168K
321-SubspaceDistinguisherfor58RoundsoftheECHO25..> 22-Dec-2014 15:19    620K
322-ImprovedSingleKeyAttackson8roundAES.pdf        22-Dec-2014 15:19    292K
323-SecurityAnalysisofSIMD.pdf                     22-Dec-2014 15:19    619K
324-ApplicationsofSATSolverstoAESkeyRecoveryfro..> 22-Dec-2014 15:19    174K
325-EffectoftheDependentPathsinLinearHull.pdf      22-Dec-2014 15:18    306K
326-PrivacyPreservingMultiObjectiveEvolutionary..> 22-Dec-2014 15:18    717K
327-EfficiencyImprovedFullySimulatableAdaptiveO..> 22-Dec-2014 15:18    315K
328-SignaturesforMultisourceNetworkCoding.pdf      22-Dec-2014 15:18    149K
329-OntheSecurityofPseudorandomizedInformationT..> 22-Dec-2014 15:18    243K
330-DistributedRationalConsensus.pdf               22-Dec-2014 15:18    136K
330-DistributedRationalConsensus.ps                22-Dec-2014 15:18    539K
331-ADistinguisherforHighRateMcElieceCryptosyst..> 22-Dec-2014 15:18    399K
332-RelayAttacksonPassiveKeylessEntryandStartSy..> 22-Dec-2014 15:18      1M
333-CryptanalysisofLibertVergnaudProxyReencrypt..> 20-Jan-2023 14:20     207
334-SecurityProofofAugPAKE.pdf                     22-Dec-2014 15:18    240K
335-AnalysisofEfficientTechniquesforFastEllipti..> 22-Dec-2014 15:18    333K
336-EfficientDifferentialFaultAnalysisforAES.pdf   22-Dec-2014 15:18    242K
336-EfficientDifferentialFaultAnalysisforAES.ps    22-Dec-2014 15:18    641K
337-PracticalTitledAttackonAES128UsingChosenTex..> 22-Dec-2014 15:18     61K
338-EfficientSIMDarithmeticmoduloaMersennenumbe..> 22-Dec-2014 15:18    162K
339-ACertifyingCompilerforZeroKnowledgeProofsof..> 22-Dec-2014 15:18    816K
340-AsecureDeniableAuthenticationProtocolbasedo..> 22-Dec-2014 15:18    189K
341-ANewClassofPublicKeyCryptosystemsConstructe..> 22-Dec-2014 15:18    224K
342-FixedArgumentPairings.pdf                      22-Dec-2014 15:18    346K
343-IdentityBasedPublicVerifiableSigncryptionSc..> 22-Dec-2014 15:18    176K
343-IdentityBasedPublicVerifiableSigncryptionSc..> 22-Dec-2014 15:18    382K
344-GeneratingmoreKawazoeTakahashiGenus2Pairing..> 22-Dec-2014 15:18    318K
345-RobustRFIDAuthenticationProtocolwithFormalP..> 22-Dec-2014 15:18    363K
346-EfficientGeneralizedSigncryptionSchemes.pdf    22-Dec-2014 15:18    115K
347-TimeSpecificEncryption.pdf                     22-Dec-2014 15:18    416K
348-LatticetheoreticCharacterizationofSecretSha..> 22-Dec-2014 15:18     99K
349-ImprovedAlgebraicCryptanalysisofQUADBiviuma..> 22-Dec-2014 15:18      1M
349-ImprovedAlgebraicCryptanalysisofQUADBiviuma..> 22-Dec-2014 15:18      1M
350-ASecurityEnhancementandProofforAuthenticati..> 22-Dec-2014 15:17    314K
350-ASecurityEnhancementandProofforAuthenticati..> 22-Dec-2014 15:17      1M
351-DecentralizingAttributeBasedEncryption.pdf     22-Dec-2014 15:17    387K
352-ADigitalSignatureUsingMultivariateFunctions..> 22-Dec-2014 15:17     71K
353-CryptographicPairingsBasedonEllipticNets.pdf   22-Dec-2014 15:17    217K
354-HighSpeedSoftwareImplementationoftheOptimal..> 22-Dec-2014 15:17    178K
355-NearCollisionsontheReducedRoundCompressionF..> 22-Dec-2014 15:17    333K
356-SecureConnectivityModelInWirelessSensorNetw..> 22-Dec-2014 15:17    134K
356-SecureConnectivityModelInWirelessSensorNetw..> 22-Dec-2014 15:17      2M
357-CCASecurePRESchemewithoutPublicVerifiabilit..> 20-Jan-2023 14:20     207
358-TheFiatShamirTransformforGroupandRingSignat..> 22-Dec-2014 15:17    312K
359-IdentityBasedSelfDelegatedSignatureSelfProx..> 22-Dec-2014 15:17      1M
360-OntheSecurityofIdentityBasedThresholdUnsign..> 22-Dec-2014 15:17    179K
360-OntheSecurityofIdentityBasedThresholdUnsign..> 22-Dec-2014 15:17    214K
361-OntheUseofFinancialDataasaRandomBeacon.pdf     22-Dec-2014 15:17    871K
362-ConstructionofBalancedBooleanFunctionswithH..> 22-Dec-2014 15:17    141K
362-ConstructionofBalancedBooleanFunctionswithH..> 22-Dec-2014 15:17    319K
363-AnAnalysisofAffineCoordinatesforPairingComp..> 22-Dec-2014 15:17    237K
364-ACompactFPGAImplementationoftheSHA3Candidat..> 22-Dec-2014 15:17    349K
365-TASTYToolforAutomatingSecureTwopartYcomputa..> 22-Dec-2014 15:17    797K
366-ObliviousRAMRevisited.pdf                      22-Dec-2014 15:17    379K
367-StarfishonStrike.pdf                           22-Dec-2014 15:16    510K
368-RoundOptimalPasswordBasedAuthenticatedKeyEx..> 22-Dec-2014 15:16    307K
369-DoubleCiphertextModeAProposalforSecureBacku..> 22-Dec-2014 15:16    281K
370-Findingdiscretelogarithmswithasetorbitdisti..> 22-Dec-2014 15:16    228K
371-CompacthardwareforcomputingtheTatepairingov..> 22-Dec-2014 15:16    550K
372-DecodingsquarefreeGoppacodesoverF_p.pdf        22-Dec-2014 15:16    221K
372-DecodingsquarefreeGoppacodesoverF_p.ps         22-Dec-2014 15:16    719K
373-HashingintoHessianCurves.pdf                   22-Dec-2014 15:16    153K
374-EfficientGenerationofLinearSecretSharingSch..> 20-Jan-2023 08:35    665K
374-OnEfficientlyTransferringtheLinearSecretSha..> 22-Dec-2014 15:16    290K
375-ImprovedCollisionAttacksontheReducedRoundGr..> 22-Dec-2014 15:16    199K
375-ImprovedCollisionAttacksontheReducedRoundGr..> 20-Jan-2023 08:35    199K
376-IdentityBasedOnlineOfflineSigncryptionSchem..> 22-Dec-2014 15:16    171K
376-IdentityBasedOnlineOfflineSigncryptionSchem..> 22-Dec-2014 15:16    385K
377-KeyAgreementProtocolsBasedonMultivariateAlg..> 22-Dec-2014 15:16     73K
378-RingSignatureandIdentityBasedRingSignaturef..> 22-Dec-2014 15:16    253K
379-Pairingcomputationonellipticcurveswitheffic..> 22-Dec-2014 15:16    239K
380-Analysisofaninternetvotingprotocol.pdf         22-Dec-2014 15:16    418K
381-SecurityReductionsoftheSecondRoundSHA3Candi..> 22-Dec-2014 15:16    549K
382-DeterministicEncodingandHashingtoOddHyperel..> 22-Dec-2014 15:16    344K
383-Huff39sModelforEllipticCurves.pdf              20-Jan-2023 08:35    322K
383-HuffsModelforEllipticCurves.pdf                22-Dec-2014 15:16    322K
384-Practicalconsequencesoftheaberrationofnarro..> 22-Dec-2014 15:16    122K
385-FirstOrderSideChannelAttacksonthePermutatio..> 22-Dec-2014 15:16    484K
386-BoostReduceAFrameworkForStrongLatticeBasisR..> 22-Dec-2014 15:16    492K
387-ACombinatorialAnalysisofHC128.pdf              22-Dec-2014 15:16    351K
388-OntheEfficiencyandSecurityofPairingBasedPro..> 22-Dec-2014 15:16    288K
389-TheimpossibilityofcomputationallysoundXOR.pdf  22-Dec-2014 15:16    102K
390-EllipticcurvesinHuff39smodel.pdf               20-Jan-2023 08:35    263K
390-EllipticcurvesinHuffsmodel.pdf                 22-Dec-2014 15:16    263K
391-ExponentialBoundsforInformationLeakageinUnk..> 22-Dec-2014 15:16    123K
392-InterplaybetweenImperfectnessSynchronyandCo..> 22-Dec-2014 15:15    295K
392-InterplaybetweenImperfectnessSynchronyandCo..> 22-Dec-2014 15:15    938K
393-APrivacyFlexiblePasswordAuthenticationSchem..> 22-Dec-2014 15:15    595K
394-HorizontalCorrelationAnalysisonExponentiati..> 22-Dec-2014 15:15      1M
395-OnEfficientCiphertextPolicyAttributeBasedEn..> 22-Dec-2014 15:15    575K
396-FromAES128toAES192andAES256HowtoAdaptDiffer..> 22-Dec-2014 15:15    273K
396-FromAES128toAES192andAES256HowtoAdaptDiffer..> 22-Dec-2014 15:15    911K
397-PseudorandomFunctionsandPermutationsProvabl..> 22-Dec-2014 15:15    363K
398-DistinguisherforShabal39sPermutationFunctio..> 20-Jan-2023 08:35    215K
398-DistinguisherforShabalsPermutationFunction.pdf 22-Dec-2014 15:15    215K
399-FasterComputationofSelfpairings.pdf            22-Dec-2014 15:15    175K
399-FasterComputationofSelfpairings.ps             22-Dec-2014 15:15    678K
400-SecurityAnalysisofaThresholdProxySignatureS..> 22-Dec-2014 15:15     78K
401-PrivacyfriendlyIncentivesandtheirApplicatio..> 22-Dec-2014 15:15    462K
402-OntheSecurityofNonLinearHBNLHBProtocolAgain..> 22-Dec-2014 15:15    290K
403-LinearSecretSharingforHierarchicalAccessStr..> 20-Jan-2023 14:20     207
404-OntheInsecurityofParallelRepetitionforLeaka..> 22-Dec-2014 15:15    265K
405-PrivacyPreservingRFIDSystemsModelandConstru..> 22-Dec-2014 15:15    385K
405-PrivacyPreservingRFIDSystemsModelandConstru..> 22-Dec-2014 15:15      1M
406-UnfoldingMethodforShabalonVirtex5FPGAsConcr..> 22-Dec-2014 15:15    511K
407-FlawsinDifferentialCryptanalysisofReducedRo..> 22-Dec-2014 15:15    226K
408-ImprovedTraceDrivenCacheCollisionAttacksaga..> 22-Dec-2014 15:15    391K
409-ThecollisionsecurityofTandemDMintheidealcip..> 22-Dec-2014 15:15    261K
410-WildMcEliece.pdf                               22-Dec-2014 15:15    260K
411-CryptanalysisofCryptosystemsBasedonNoncommu..> 22-Dec-2014 15:15    249K
412-OptimalAdversaryBehaviorfortheSerialModelof..> 22-Dec-2014 15:15    196K
413-Collisionsfor72stepand73stepSHA1Improvement..> 22-Dec-2014 15:14    229K
414-OnStrongSimulationandComposablePointObfusca..> 22-Dec-2014 15:14    516K
415-PerfectlyBalancedBooleanFunctionsandGoliCon..> 20-Jan-2023 08:35    340K
415-PerfectlyBalancedBooleanFunctionsandGolicCo..> 22-Dec-2014 15:14    159K
415-PerfectlyBalancedBooleanFunctionsandGolicCo..> 22-Dec-2014 15:14    656K
416-ComputationallySoundVerificationofSourceCod..> 22-Dec-2014 15:14    664K
417-DistinguishingPropertiesofHigherOrderDeriva..> 22-Dec-2014 15:14    281K
418-CryptanalysisandImprovementofANewElectronic..> 22-Dec-2014 15:14    379K
419-WhiteBoxCryptographyandSPNciphersLRCmethod.pdf 22-Dec-2014 15:14    227K
420-TowardsprovablesecurityoftheUnbalancedOilan..> 22-Dec-2014 15:14    171K
420-TowardsprovablesecurityoftheUnbalancedOilan..> 22-Dec-2014 15:14    512K
421-BinomialSieveSeriesaProspectiveCryptographi..> 22-Dec-2014 15:14    592K
422-SynchronizedAggregateSignaturesNewDefinitio..> 22-Dec-2014 15:14    296K
423-NearCollisionsfortheCompressFunctionofHamsi..> 22-Dec-2014 15:14    180K
424-CyclicRainbowAmultivariateSignatureSchemewi..> 22-Dec-2014 15:14    168K
424-CyclicRainbowAmultivariateSignatureSchemewi..> 22-Dec-2014 15:14    351K
425-KISTAnewencryptionalgorithmbasedonsplay.pdf    22-Dec-2014 15:14    136K
426-ParallelizingtheCamelliaandSMS4BlockCiphers..> 22-Dec-2014 15:14    478K
427-SecurityImprovementonaPasswordAuthenticated..> 20-Jan-2023 14:20     207
428-RandomOraclesinaQuantumWorld.pdf               22-Dec-2014 15:14    584K
429-AFamilyofImplementationFriendlyBNEllipticCu..> 22-Dec-2014 15:14    195K
429-AFamilyofImplementationFriendlyBNEllipticCu..> 22-Dec-2014 15:14    652K
430-GenericCollisionAttacksonNarrowpipeHashFunc..> 22-Dec-2014 15:14    104K
431-CollusionResistantMulticastKeyDistributionB..> 22-Dec-2014 15:14    412K
432-ANEFFICIENTPARALLELALGORITHMFORSKEINHASHFUN..> 22-Dec-2014 15:14    185K
433-ThePASSERINEPublicKeyEncryptionandAuthentic..> 22-Dec-2014 15:14     66K
433-ThePASSERINEPublicKeyEncryptionandAuthentic..> 22-Dec-2014 15:14    291K
434-LowweightPseudoCollisionAttackonShabalandPr..> 22-Dec-2014 15:14    156K
435-TheImprobableDifferentialAttackCryptanalysi..> 22-Dec-2014 15:14      1M
436-ArithmeticofSupersingularKoblitzCurvesinCha..> 22-Dec-2014 15:14    242K
437-SelectingParametersfortheRainbowSignatureSc..> 22-Dec-2014 15:13    323K
438-AchievingLeakageResilienceThroughDualSystem..> 22-Dec-2014 15:13    481K
439-EmbeddedExtendedVisualCryptographySchemes.pdf  22-Dec-2014 15:13     11M
440-PiretandQuisquater39sDFAonAESRevisited.pdf     20-Jan-2023 08:35    358K
440-PiretandQuisquatersDFAonAESRevisited.pdf       22-Dec-2014 15:13    358K
441-ProvablySecureHigherOrderMaskingofAES.pdf      22-Dec-2014 15:13    401K
442-AlgebraicPseudorandomFunctionswithImprovedE..> 22-Dec-2014 15:13    406K
443-BalancedBooleanFunctionswithAlmostOptimalAl..> 22-Dec-2014 15:13    206K
443-BalancedBooleanFunctionswithAlmostOptimalAl..> 22-Dec-2014 15:13    379K
444-NewConstructionofIdentitybasedProxyReencryp..> 22-Dec-2014 15:13    177K
445-ComparingHardwarePerformanceofFourteenRound..> 22-Dec-2014 15:13      2M
446-ShortOneTimeSignatures.pdf                     22-Dec-2014 15:13    223K
447-SidechannelAnalysisofSixSHA3Candidates.pdf     22-Dec-2014 15:13      3M
448-SequentialRationalityinCryptographicProtoco..> 22-Dec-2014 15:13    370K
449-ObliviousandFairServerAidedTwoPartyComputat..> 22-Dec-2014 15:13    278K
450-RoundEfficientPerfectlySecureMessageTransmi..> 22-Dec-2014 15:13     98K
451-AccelerationofDifferentialFaultAnalysisofth..> 22-Dec-2014 15:13    109K
451-AccelerationofDifferentialFaultAnalysisofth..> 22-Dec-2014 15:12    685K
452-EveryVoteCountsEnsuringIntegrityinLargeScal..> 22-Dec-2014 15:12    317K
453-LinearlyHomomorphicSignaturesoverBinaryFiel..> 22-Dec-2014 15:12    483K
454-KeyExchangewithAnonymousAuthenticationusing..> 22-Dec-2014 15:12    197K
455-OptimalVerificationofOperationsonDynamicSet..> 22-Dec-2014 15:12    418K
456-RobustFuzzyExtractorsandAuthenticatedKeyAgr..> 22-Dec-2014 15:12      1M
456-RobustFuzzyExtractorsandAuthenticatedKeyAgr..> 22-Dec-2014 15:12      2M
457-ImprovingtheperformanceofLuffaHashAlgorithm..> 22-Dec-2014 15:12      1M
458-KeyAgreementProtocolsUsingMultivariateEquat..> 22-Dec-2014 15:12    378K
459-CCA2SecureCertificatelessEncryptionSchemesB..> 22-Dec-2014 15:12    626K
460-Onextendedalgebraicimmunity.pdf                20-Jan-2023 14:20     207
461-IdentityBasedPartialAggregateSignatureSchem..> 22-Dec-2014 15:12    486K
462-UnconditionallySecureRationalSecretSharingi..> 22-Dec-2014 15:12    210K
463-PassiveCryptanalysisoftheUnConditionallySec..> 22-Dec-2014 15:12    396K
464-WeaknessesofSIPAuthenticationSchemeforConve..> 20-Jan-2023 14:20     207
465-HowtoimplementthepublicKeyOperationsinCodeb..> 22-Dec-2014 15:12    514K
466-PEKSrandProvidingPredicatePrivacyinPublicke..> 22-Dec-2014 15:12    363K
467-ComputationalSoundnessaboutFormalEncryption..> 22-Dec-2014 15:12    424K
468-GenericConstructionsofParallelKeyInsulatedE..> 22-Dec-2014 15:12    398K
468-GenericConstructionsofParallelKeyInsulatedE..> 22-Dec-2014 15:12      1M
469-LinearComplexityPrivateSetIntersectionProto..> 22-Dec-2014 15:12    248K
470-TwoidentificationprotocolsbasedonCayleygrap..> 22-Dec-2014 15:11    173K
471-PrivacypreservingSharingofSensitiveInformat..> 20-Jan-2023 14:20     207
472-AccusationprobabilitiesinTardoscodestheGaus..> 22-Dec-2014 15:11      2M
473-TwoAttacksonDuttasDynamicGroupKeyAgreementP..> 20-Jan-2023 14:20     207
474-LimitationsonTransformationsfromCompositeOr..> 22-Dec-2014 15:11    369K
475-PairingComputationonEllipticCurvesofJacobiQ..> 22-Dec-2014 15:11    248K
476-PredicateEncryptionwithPartialPublicKeys.pdf   22-Dec-2014 15:11    394K
477-OnCompressionofDataEncryptedwithBlockCipher..> 22-Dec-2014 15:11    459K
478-CryptanalysisoftheConvexHullClickHumanIdent..> 22-Dec-2014 15:11      1M
479-SideChannelAttacksontheMcElieceandNiederrei..> 22-Dec-2014 15:11    296K
480-EnhancedSTSusingCheckEquationExtendedVersio..> 22-Dec-2014 15:11     96K
481-Asecureemailloginsystemusingvirtualpassword..> 22-Dec-2014 15:11     54K
482-OnInstantiationoftheRandomOracle.pdf           20-Jan-2023 14:20     207
483-ConstantroundNonMalleableCommitmentsfromAny..> 22-Dec-2014 15:11    434K
484-AutomataEvaluationandTextSearchProtocolswit..> 22-Dec-2014 15:11    523K
485-CryptanalysisofBlockCiphersUsingAlmostImpos..> 22-Dec-2014 15:11    314K
486-ANOTEONSEMIBENTBOOLEANFUNCTIONS.pdf            22-Dec-2014 15:11    158K
487-ConstantRoundNonMalleableProtocolsusingOneW..> 22-Dec-2014 15:11    323K
488-FullyLeakageResilientSignatures.pdf            22-Dec-2014 15:11    376K
489-LoissAByteOrientedStreamCipher.pdf             22-Dec-2014 15:11    175K
490-Strongdesignatedverifiersignatureschemenewd..> 22-Dec-2014 15:11     59K
491-ACollaborativeFrameworkforPrivacyProtection..> 22-Dec-2014 15:11    920K
492-E64259cientFullySecurePredicateEncryptionfo..> 22-Dec-2014 15:11    329K
492-EcientFullySecurePredicateEncryptionforConj..> 20-Jan-2023 08:35    329K
493-ASuiteofIdentityBasedAggregateSignaturesand..> 20-Jan-2023 08:34    560K
494-StrongerSecurityModelofGroupKeyAgreement.pdf   22-Dec-2014 15:11    199K
494-StrongerSecurityModelofGroupKeyAgreement.ps    22-Dec-2014 15:11    658K
495-APracticalNoninteractivePubliclyVerifiableS..> 22-Dec-2014 15:11    229K
496-EfficientAttributesforAnonymousCredentialsE..> 22-Dec-2014 15:10    322K
497-Numberformulaanddegreelevelofergodicpolynom..> 20-Jan-2023 14:20     207
498-CoZDivisorAdditionFormulaeinJacobianofGenus..> 22-Dec-2014 15:10    132K
499-SecureComputationsonNonIntegerValues.pdf       22-Dec-2014 15:10     85K
500-ATTACKSONTHEAKACPPROTOCOL.pdf                  22-Dec-2014 15:10     45K
500-ATTACKSONTHEAKACPPROTOCOL.ps                   22-Dec-2014 15:10     45K
501-GroupHomomorphicEncryptionCharacterizations..> 22-Dec-2014 15:10    287K
502-ProvingCoercionResistanceofScantegrityII.pdf   22-Dec-2014 15:10    227K
503-BiTRBuiltinTamperResilience.pdf                22-Dec-2014 15:10    471K
504-PracticalCryptanalysisoftheIdentificationSc..> 22-Dec-2014 15:10    220K
505-TerminationInsensitiveComputationalIndistin..> 22-Dec-2014 15:10    312K
505-TerminationInsensitiveComputationalIndistin..> 22-Dec-2014 15:10      1M
506-QuantumPreimageandCollisionAttacksonCubeHas..> 22-Dec-2014 15:10    331K
507-OnisotopismsofcommutativepresemifieldsandCC..> 22-Dec-2014 15:10    164K
507-OnisotopismsofcommutativepresemifieldsandCC..> 22-Dec-2014 15:10    587K
508-AFaultAnalyticMethodagainstHB.pdf              22-Dec-2014 15:10      1M
509-OnEfficientNonInteractiveObliviousTransferw..> 22-Dec-2014 15:10    535K
511-OnthecomplexityofDecompositionAttack.pdf       22-Dec-2014 15:10      1M
512-MultiPartyPrivacyPreservingSetIntersectionw..> 22-Dec-2014 15:10    432K
513-KeyDependentMessageSecurityGenericAmplifica..> 22-Dec-2014 15:10    174K
514-SemiHomomorphicEncryptionandMultipartyCompu..> 22-Dec-2014 15:10    522K
515-Withdrawn.pdf                                  18-Aug-2023 00:00     207
516-KeyAgreementProtocolsBasedonMultivariatePol..> 22-Dec-2014 15:10    258K
517-CryptanalysisofblockEnRUPT.pdf                 22-Dec-2014 15:10    324K
518-Booleanfunctionswithallmaincryptographicpro..> 22-Dec-2014 15:10    198K
519-PreimageResistanceBeyondtheBirthdayBoundDou..> 22-Dec-2014 15:10    391K
520-ImplementingGentry39sFullyHomomorphicEncryp..> 20-Jan-2023 08:34    223K
520-ImplementingGentrysFullyHomomorphicEncrypti..> 22-Dec-2014 15:10    223K
521-LinearApproximationsofAdditionModulo2n1.pdf    22-Dec-2014 15:09    136K
522-SignaturesResilienttoContinualLeakageonMemo..> 22-Dec-2014 15:09    351K
523-AffineMaskingagainstHigherOrderSideChannelA..> 22-Dec-2014 15:09    969K
524-Combiningpropertiesofcryptographichashfunct..> 22-Dec-2014 15:09    326K
525-Torusbasedcompressionbyfactor4and6.pdf         22-Dec-2014 15:09   1016K
525-Torusbasedcompressionbyfactor4and6.ps          22-Dec-2014 15:09      1M
526-FasterExplicitFormulasforComputingPairingso..> 22-Dec-2014 15:09    589K
527-TheDigitalSignatureSchemeMQQSIG.pdf            22-Dec-2014 15:09    104K
528-ConstantRoundPrivateFunctionEvaluationwithL..> 22-Dec-2014 15:09    257K
529-GeneratingPairingfriendlyParametersfortheCM..> 22-Dec-2014 15:09    200K
530-HowtoReadaSignature.pdf                        22-Dec-2014 15:09    754K
531-ComparisonofsevenSHA3candidatessoftwareimpl..> 22-Dec-2014 15:09    209K
532-A3SubsetMeetintheMiddleAttackCryptanalysiso..> 22-Dec-2014 15:09    148K
533-DeterministicPublicKeyEncryptionRevisited.pdf  20-Jan-2023 14:20     207
534-BalancedBooleanFunctionswithOptimumAlgebrai..> 22-Dec-2014 15:09    126K
535-LinearAnalysisofReducedRoundCubeHash.pdf       22-Dec-2014 15:09    150K
536-OnTheImpactofTargetTechnologyinSHA3Hardware..> 22-Dec-2014 15:09    831K
537-MeetintheMiddleAttackon8RoundsoftheAESBlock..> 22-Dec-2014 15:09    296K
538-RotationalReboundAttacksonReducedSkein.pdf     22-Dec-2014 15:09    276K
539-IndifferentiableDeterministicHashingtoEllip..> 22-Dec-2014 15:09    433K
540-RationalSecretSharingwithSideInformationinP..> 22-Dec-2014 15:09    263K
541-OnetimeComputableandUncomputableFunctions.pdf  22-Dec-2014 15:09    536K
542-Squaringincyclotomicsubgroups.pdf              22-Dec-2014 15:09    895K
542-Squaringincyclotomicsubgroups.ps               22-Dec-2014 15:08      1M
543-FunctionalEncryptionDefinitionsandChallenge..> 22-Dec-2014 15:08    369K
544-SemanticSecurityUnderRelatedKeyAttacksandAp..> 22-Dec-2014 15:08    296K
545-OptimalXORbased2nVisualCryptographySchemes.pdf 22-Dec-2014 15:08    420K
546-TimedEncryptionandItsApplication.pdf           22-Dec-2014 15:08    250K
546-TimedEncryptionandItsApplication.ps            22-Dec-2014 15:08    830K
547-SymmetrickeySearchablekeywordConcealmentSSC..> 20-Jan-2023 14:20     207
548-SHA512256.pdf                                  22-Dec-2014 15:08    206K
549-ANovelNoninteractiveDeniableAuthenticationP..> 22-Dec-2014 15:08    593K
550-IsogeniesandCryptography.pdf                   22-Dec-2014 15:08    488K
551-ANoteontheRelationbetweentheDefinitionsofSe..> 22-Dec-2014 15:08     62K
552-ANoteonZeroKnowledgeProofsofKnowledgeandthe..> 22-Dec-2014 15:08     97K
553-StronglySecureCertificateBasedEncryptionSch..> 20-Jan-2023 14:20     207
554-CryptanalysisofaFastEncryptionSchemeforData..> 22-Dec-2014 15:08    170K
555-RNSarithmeticinmathbbF_pkandapplicationtofa..> 22-Dec-2014 15:08    261K
556-DefinitionalIssuesinFunctionalEncryption.pdf   22-Dec-2014 15:08    128K
557-ADigitalSignatureBasedonMultivariatePolynom..> 20-Jan-2023 14:20     207
558-SolvingLWEproblemwithboundederrorsinpolynom..> 22-Dec-2014 15:08    113K
559-OptimalEtaPairingonSupersingularGenus2Binar..> 22-Dec-2014 15:08    525K
560-OnCCASecureFullyHomomorphicEncryption.pdf      22-Dec-2014 15:08    278K
561-PasswordProtectedSecretSharing.pdf             22-Dec-2014 15:08    466K
561-PasswordProtectedSecretSharing.ps              22-Dec-2014 15:08      1M
562-HowtoLeakonKeyUpdates.pdf                      22-Dec-2014 15:08    422K
563-FullySecureFunctionalEncryptionwithGeneralR..> 22-Dec-2014 15:08    992K
564-CryptographicRandomnessTestingofBlockCipher..> 22-Dec-2014 15:08    110K
565-SelfProtectingElectronicMedicalRecordsUsing..> 22-Dec-2014 15:08      2M
566-BlockcipherbasedDoublelengthHashFunctionsfo..> 22-Dec-2014 15:07    195K
567-ONDILLON39SCLASSHOFBENTFUNCTIONSNIHOBENTFUN..> 20-Jan-2023 08:34    251K
567-ONDILLONSCLASSHOFBENTFUNCTIONSNIHOBENTFUNCT..> 22-Dec-2014 15:07    207K
567-ONDILLONSCLASSHOFBENTFUNCTIONSNIHOBENTFUNCT..> 22-Dec-2014 15:07    251K
568-EfficientTwoMoveBlindSignaturesintheCommonR..> 22-Dec-2014 15:07    252K
569-PracticalNearCollisionsandCollisionsonRound..> 22-Dec-2014 15:07    704K
570-BreakingGrain128withDynamicCubeAttacks.pdf     22-Dec-2014 15:07    187K
571-SingleCoreImplementationofBlueMidnightWishH..> 22-Dec-2014 15:07      1M
572-Cryptanalysisofsplaytreebasedencryption.pdf    22-Dec-2014 15:07    141K
573-OnpermutationpolynomialsEAequivalenttothein..> 22-Dec-2014 15:07    217K
574-CryptanalysisofPRESENTlikecipherswithsecret..> 22-Dec-2014 15:07    370K
575-ADiscreteLogarithmAttackonEllipticCurves.pdf   22-Dec-2014 15:07    265K
576-EfficientHashingusingtheAESInstructionSet.pdf  22-Dec-2014 15:07    571K
577-DiscreteLogarithmsDiffieHellmanandReduction..> 22-Dec-2014 15:07    202K
578-L1AnIntermediateLanguageforMixedProtocolSec..> 22-Dec-2014 15:07    304K
579-ConstructionofHighlyNonlinearResilientBoole..> 22-Dec-2014 15:07    143K
580-TheCubeAttackonStreamCipherTriviumandQuadra..> 22-Dec-2014 15:07    120K
581-FastAlgorithmtosolveafamilyofSISproblemwith..> 22-Dec-2014 15:07    125K
582-SecretKeyLeakagefromPublicKeyPerturbationof..> 22-Dec-2014 15:07    262K
583-ImprovedPreimageAttackonOneblockMD4.pdf        22-Dec-2014 15:07    342K
584-VMCryptModularSoftwareArchitectureforScalab..> 22-Dec-2014 15:07    143K
585-Smallerdecodingexponentsballcollisiondecodi..> 22-Dec-2014 15:07    374K
586-EnhancedFPGAImplementationoftheHummingbirdC..> 22-Dec-2014 15:06    841K
587-GroupMessageAuthentication.pdf                 22-Dec-2014 15:06    515K
588-ImprovedCollisionsforReducedECHO256.pdf        22-Dec-2014 15:06    417K
589-HigherorderdifferentialpropertiesofKeccakan..> 22-Dec-2014 15:06    262K
589-HigherorderdifferentialpropertiesofKeccakan..> 22-Dec-2014 15:06    774K
590-BeyondtheLimitsofDPACombinedSideChannelColl..> 22-Dec-2014 15:06      2M
591-BonsaiTreesorHowtoDelegateaLatticeBasis.pdf    22-Dec-2014 15:06    608K
592-BetterKeySizesandAttacksforLWEBasedEncrypti..> 20-Jan-2023 08:34    457K
593-DifferentialAttackonFiveRoundsoftheSC2000Bl..> 22-Dec-2014 15:06    178K
594-CacheGamesBringingAccessBasedCacheAttackson..> 22-Dec-2014 15:06    733K
595-AttributeBasedSignatures.pdf                   22-Dec-2014 15:06    386K
596-SolvingSystemsofMultivariateQuadraticEquati..> 22-Dec-2014 15:06    530K
597-ANewClassofBentNegabentBooleanFunctions.pdf    22-Dec-2014 15:06    334K
598-ABroadcastAttackagainstNTRUUsingDing39sAlgo..> 20-Jan-2023 08:34    134K
598-ABroadcastAttackagainstNTRUUsingDingsAlgori..> 22-Dec-2014 15:06    134K
599-SecureMultipartyComputationwithPartialFairn..> 22-Dec-2014 15:06    239K
599-SecureMultipartyComputationwithPartialFairn..> 22-Dec-2014 15:06    391K
600-ExactEfficientandInformationTheoreticallySe..> 22-Dec-2014 15:06    258K
601-FastEndomorphismforanyGenus2HyperellipticCu..> 22-Dec-2014 15:06    131K
602-AnImprovedAlgebraicAttackonHamsi256.pdf        22-Dec-2014 15:06    243K
603-CryptanalysisofDualCRTRSA.pdf                  22-Dec-2014 15:06    342K
604-OnFunctionalDecompositionofMultivariatePoly..> 22-Dec-2014 15:06    207K
604-OnFunctionalDecompositionofMultivariatePoly..> 22-Dec-2014 15:06    414K
605-ACloserLookatKeyboardAcousticEmanationsRand..> 22-Dec-2014 15:06    270K
606-WeaknessoftwoIDbasedremotemutualauthenticat..> 22-Dec-2014 15:06    173K
607-HowtoImproveReboundAttacks.pdf                 22-Dec-2014 15:06    650K
608-ANewModelofBinaryEllipticCurveswithFastArit..> 22-Dec-2014 15:05    272K
609-TheRoundComplexityofGeneralVSS.pdf             22-Dec-2014 15:05    251K
609-TheRoundComplexityofGeneralVSS.ps              22-Dec-2014 15:05    498K
610-SeparatingSuccinctNonInteractiveArgumentsFr..> 22-Dec-2014 15:05    386K
611-StatisticalAnalysisofReducedRoundCompressio..> 22-Dec-2014 15:05    246K
612-CryptanalysisofHummingbird1.pdf                20-Jan-2023 08:34    114K
613-BetterKeySizesandAttacksforLWEBasedEncrypti..> 22-Dec-2014 15:05    457K
614-AnEvaluationofHashFunctionsonaPowerAnalysis..> 22-Dec-2014 15:05    248K
615-UsingEquivalenceClassestoAccelerateSolvingt..> 22-Dec-2014 15:05    384K
616-Anonuniformbirthdayproblemwithapplicationst..> 22-Dec-2014 15:05    207K
617-ComputingDiscreteLogarithmsinanInterval.pdf    22-Dec-2014 15:05    207K
618-AForgeryAttackontheCandidateLTEIntegrityAlg..> 22-Dec-2014 15:05    251K
619-FurtherObservationsonCertificateBaseEncrypt..> 22-Dec-2014 15:05    258K
620-IdentitybasedDigitalSignatureSchemeWithoutB..> 20-Jan-2023 08:34     74K
621-GenericCompilersforAuthenticatedKeyExchange..> 22-Dec-2014 15:05    344K
622-Anewresultonthedistinctnessofprimitiveseque..> 22-Dec-2014 15:05    207K
623-CryptanalysisofSkein.pdf                       22-Dec-2014 15:05    815K
624-NoleakauthenticationbytheSherlockHolmesmeth..> 22-Dec-2014 15:05    182K
625-AttackingandfixingHeliosAnanalysisofballots..> 22-Dec-2014 15:05    621K
626-PublicKeyEncryptionwithFuzzyKeywordSearchAP..> 22-Dec-2014 15:05    286K
627-SecureandEfficientProtocolsforIrisandFinger..> 22-Dec-2014 15:05    268K
627-SecureandEfficientProtocolsforIrisandFinger..> 22-Dec-2014 15:05    796K
628-StateconvergenceandkeyspacereductionoftheMi..> 22-Dec-2014 15:05    281K
629-OntheSecurityofHashFunctionsEmployingBlockc..> 22-Dec-2014 15:05    355K
630-DivisonPolynomialsforAlternateModelsofEllip..> 22-Dec-2014 15:05    354K
631-BlackboxpropertyofCryptographicHashFunction..> 22-Dec-2014 15:05    329K
632-Efficientandprovablysecurecertificatelesssi..> 22-Dec-2014 15:05    119K
633-LowDataComplexityAttacksonAES.pdf              22-Dec-2014 15:05    357K
634-ROTIVRFIDOwnershipTransferwithIssuerVerific..> 22-Dec-2014 15:04    311K
635-AnEfficientandInformationTheoreticallySecur..> 20-Jan-2023 14:20     207
636-DifferentialFaultAnalysisofAESusingaSingleM..> 22-Dec-2014 15:04    195K
636-DifferentialFaultAnalysisofAESusingaSingleM..> 22-Dec-2014 15:04      1M
637-BreakingAnIdentityBasedEncryptionSchemebase..> 22-Dec-2014 15:04    369K
638-OnePassHMQVandAsymmetricKeyWrapping.pdf        22-Dec-2014 15:04    350K
639-EnumeratingResultsofHomogeneousRotationover..> 20-Jan-2023 14:20     207
640-Shortcollusionsecurefingerprintcodesagainst..> 22-Dec-2014 15:04    292K
640-Shortcollusionsecurefingerprintcodesagainst..> 22-Dec-2014 15:04    577K
641-AnewalgorithmforcomputingGroebnerbases.pdf     22-Dec-2014 15:04    307K
642-MoreInsightsonBlockcipherBasedHashFunctions..> 22-Dec-2014 15:04    241K
643-ConstructMD5CollisionsUsingJustASingleBlock..> 22-Dec-2014 15:04     41K
644-APracticalPlatformforCubeAttacklikeCryptana..> 22-Dec-2014 15:04    410K
645-ATimedLogicforModelingandReasoningaboutSecu..> 22-Dec-2014 15:04    453K
646-StatisticalAnalysisofSecondOrderDifferentia..> 22-Dec-2014 15:04    312K
647-ImprovedNguyenVidickHeuristicSieveAlgorithm..> 22-Dec-2014 15:04    296K
648-UniquenessisaDifferentStoryImpossibilityofV..> 22-Dec-2014 15:04    450K
649-Strongerdifficultynotionsforclientpuzzlesan..> 22-Dec-2014 15:04    571K
650-CryptanalysisoftheRSASubgroupAssumptionfrom..> 22-Dec-2014 15:04    343K
651-OntheImpossibilityofInstantiatingPSSintheSt..> 22-Dec-2014 15:04    280K
652-ActiveDomainExpansionforNormalNarrowpipeHas..> 22-Dec-2014 15:04    265K
653-Cubicgroups.pdf                                22-Dec-2014 15:04    141K
654-CompletenessTheoremswithConstructiveProofsf..> 22-Dec-2014 15:04    644K
655-OntheAffineEquivalenceandNonlinearityPreser..> 22-Dec-2014 15:04    170K
655-OntheAffineEquivalenceandNonlinearityPreser..> 22-Dec-2014 15:04    709K
656-ANoteonConstantRoundZeroKnowledgeProofsofKn..> 22-Dec-2014 15:04    376K
657-OnsmallsecretkeyattackagainstRSAwithhighbit..> 22-Dec-2014 15:03    228K
658-ABCANewFrameworkforBlockCiphers.pdf            22-Dec-2014 15:03    241K
659-PracticalAffiliationHidingAuthenticationfro..> 22-Dec-2014 15:03    321K
660-IdentificationofMultipleInvalidPairingbased..> 22-Dec-2014 15:03    257K
661-SecurityEvaluationofMISTYStructurewithSPNRo..> 22-Dec-2014 15:03    263K