Index of /2010/
../
001-TransfiniteCryptography.pdf 22-Dec-2014 15:32 150K
002-PracticalIDbasedEncryptionforWirelessSensor..> 22-Dec-2014 15:32 215K
003-EfficientOnlineOfflineIdentityBasedSignatur..> 22-Dec-2014 15:32 295K
004-HalvingonBinaryEdwardsCurves.pdf 22-Dec-2014 15:32 131K
004-HalvingonBinaryEdwardsCurves.ps 22-Dec-2014 15:32 297K
005-SkewFrobeniusmapontwistedEdwardscurve.pdf 22-Dec-2014 15:32 173K
006-Factorizationofa768bitRSAmodulus.pdf 22-Dec-2014 15:32 581K
007-EfficientAsynchronousVerifiableSecretSharin..> 22-Dec-2014 15:32 595K
008-ADAASchemeRequiringLessTPMResources.pdf 22-Dec-2014 15:32 310K
008-ADAASchemeRequiringLessTPMResources.ps 22-Dec-2014 15:32 617K
009-TheLowerBoundsontheSecondOrderNonlinearityo..> 22-Dec-2014 15:32 212K
010-EvaluationofHardwarePerformancefortheSHA3Ca..> 22-Dec-2014 15:32 459K
011-RelatedKeyCryptanalysisoftheLEXStreamCipher..> 20-Jan-2023 14:21 207
012-DifferentialCacheTraceAttackAgainstCLEFIA.pdf 22-Dec-2014 15:31 119K
012-DifferentialCacheTraceAttackAgainstCLEFIA.ps 22-Dec-2014 15:31 304K
013-APracticalTimeAttackontheA53CryptosystemUse..> 22-Dec-2014 15:31 243K
014-AUnifiedMethodforImprovingPRFBoundsforaClas..> 22-Dec-2014 15:31 331K
015-TowardsSideChannelResistantBlockCipherUsage..> 22-Dec-2014 15:31 302K
016-AdvancedMeetintheMiddlePreimageAttacksFirst..> 22-Dec-2014 15:31 307K
017-Anewonetimesignatureschemefromsyndromedecod..> 22-Dec-2014 15:31 197K
017-Anewonetimesignatureschemefromsyndromedecod..> 22-Dec-2014 15:31 748K
018-ScalabilityandSecurityConflictforRFIDAuthen..> 22-Dec-2014 15:31 191K
019-RelatedKeyBoomerangandRectangleAttacks.pdf 22-Dec-2014 15:31 468K
020-NumberofJacobiquarticcurvesoverfinitefields..> 22-Dec-2014 15:31 109K
020-NumberofJacobiquarticcurvesoverfinitefields.ps 22-Dec-2014 15:31 224K
021-AnoteonImprovedFastCorrelationAttacksonStre..> 22-Dec-2014 15:31 419K
021-AnoteonImprovedFastCorrelationAttacksonStre..> 20-Jan-2023 08:36 419K
022-EnhancedSecurityNotionsforDedicatedKeyHashF..> 22-Dec-2014 15:31 346K
023-DifferentialFaultAnalysisonAESwith192and256..> 22-Dec-2014 15:31 81K
024-Authenticationschemesfromactionsongraphsgro..> 22-Dec-2014 15:31 158K
025-NewMethodologiesforDifferentialLinearCrypta..> 22-Dec-2014 15:31 338K
026-FurtherImprovedDifferentialFaultAnalysisonC..> 22-Dec-2014 15:31 711K
027-AnovelkoutofnObliviousTransferProtocolsBase..> 22-Dec-2014 15:31 512K
028-Asecureanonymouscommunicationschemeinvehicu..> 22-Dec-2014 15:31 3M
029-OnAchievingthe34BestofBothWorlds34inSecureM..> 20-Jan-2023 08:36 170K
029-OnAchievingtheBestofBothWorldsinSecureMulti..> 22-Dec-2014 15:31 170K
030-OntheComplexityoftheHerdingAttackandSomeRel..> 22-Dec-2014 15:31 274K
031-ClassInvariantsbytheCRTMethod.pdf 22-Dec-2014 15:31 214K
032-AnInformationTheoreticPerspectiveontheDiffe..> 22-Dec-2014 15:31 146K
033-SimpleandEfficientPublicKeyEncryptionfromCo..> 22-Dec-2014 15:31 264K
034-Ontheorderofthepolynomialxpxa.pdf 22-Dec-2014 15:30 172K
035-BetweenHashedDHandComputationalDHCompactEnc..> 22-Dec-2014 15:30 302K
036-AnEnhancedRemoteUserAuthenticationScheme.pdf 20-Jan-2023 14:21 207
037-EstimatingtheSizeoftheImageofDeterministicH..> 22-Dec-2014 15:30 343K
038-FaultResistantRSASignaturesChineseRemainder..> 22-Dec-2014 15:30 192K
039-OnExponentialSumsNowtonidentitiesandDickson..> 22-Dec-2014 15:30 152K
040-BatchGrothSahai.pdf 22-Dec-2014 15:30 270K
041-TheEffectsoftheOmissionofLastRound39sMixCol..> 20-Jan-2023 08:36 125K
041-TheEffectsoftheOmissionofLastRoundsMixColum..> 22-Dec-2014 15:30 125K
042-AmodifiedeCKmodelwithstrongersecurityfortri..> 22-Dec-2014 15:30 135K
043-DifferentialandinvertibilitypropertiesofBLA..> 22-Dec-2014 15:30 231K
044-ANewChaoticImageEncryptionAlgorithmusingaNe..> 20-Jan-2023 14:21 207
045-Efficientchaoticpermutationsforimageencrypt..> 20-Jan-2023 14:21 207
046-ANewChaosBasedCryptosystemforSecureTransmit..> 20-Jan-2023 14:21 207
047-LowerBoundsforStraightLineFactoring.pdf 22-Dec-2014 15:30 211K
048-AnenhancedIDbasedremotemutualauthentication..> 20-Jan-2023 14:21 207
049-OnSymmetricEncryptionandPointObfuscation.pdf 22-Dec-2014 15:30 259K
049-OnSymmetricEncryptionandPointObfuscation.ps 22-Dec-2014 15:30 417K
050-AuthenticatingAggregateRangeQueriesoverMult..> 22-Dec-2014 15:30 611K
050-AuthenticatingAggregateRangeQueriesoverMult..> 22-Dec-2014 15:30 1M
051-APrincipleforCryptographicProtocolsBeyondSe..> 22-Dec-2014 15:30 159K
052-CryptanalysisandImprovementofaNewGatewayOri..> 20-Jan-2023 14:21 207
053-Logicalcryptoanalysisontheexampleofthecrypt..> 22-Dec-2014 15:30 176K
054-AnImprovedTimingAttackwithErrorDetectiononR..> 22-Dec-2014 15:30 173K
055-CredentialAuthenticatedIdentificationandKey..> 22-Dec-2014 15:30 576K
056-ImprovedCacheTraceAttackonAESandCLEFIAbyCon..> 22-Dec-2014 15:30 541K
057-MessageRecoveryandPseudoPreimageAttacksonth..> 22-Dec-2014 15:30 321K
058-Solinasprimesofsmallweightforfixedsizes.pdf 22-Dec-2014 15:30 2M
059-ANewFrameworkforRFIDPrivacy.pdf 22-Dec-2014 15:30 195K
060-InsecureProvablySecureNetworkCoding3939andH..> 20-Jan-2023 08:35 192K
060-InsecureProvablySecureNetworkCodingandHomom..> 22-Dec-2014 15:30 192K
061-PrivacyPreservingMatchingProtocolsforAttrib..> 22-Dec-2014 15:30 119K
062-DifferentialCryptanalysisofSMS4BlockCipher.pdf 22-Dec-2014 15:30 199K
063-DifferentialFaultAnalysisonSMS4UsingaSingle..> 22-Dec-2014 15:30 329K
064-NewAdvancesonPrivacyPreservingPolicyReconci..> 22-Dec-2014 15:29 237K
065-AnAnonymousIDbasedEncryptionRevisited.pdf 22-Dec-2014 15:29 119K
066-SomeObservationsonTWISBlockCipher.pdf 22-Dec-2014 15:29 171K
067-APairingBasedDAASchemeFurtherReducingTPMRes..> 22-Dec-2014 15:29 184K
068-OkamotoTanakaRevisitedFullyAuthenticatedDif..> 22-Dec-2014 15:29 348K
069-TypeIIOptimalPolynomialBases.pdf 22-Dec-2014 15:29 342K
070-StronglyUnforgeableSignaturesandHierarchica..> 22-Dec-2014 15:29 271K
071-2roundSubstitutionPermutationand3roundFeist..> 22-Dec-2014 15:29 209K
072-ApproximatingAdditionbyXORhowtogoalltheway.pdf 22-Dec-2014 15:29 226K
073-RelatedKeyBoomerangAttackonBlockCipherSQUAR..> 22-Dec-2014 15:29 493K
074-ConcurrentKnowledgeExtractioninthePublicKey..> 22-Dec-2014 15:29 411K
075-ANewSchemeforZeroKnowledgeProofbasedonMulti..> 22-Dec-2014 15:29 114K
076-PrivateandContinualReleaseofStatistics.pdf 22-Dec-2014 15:29 364K
077-ECC2K130onCellCPUs.pdf 22-Dec-2014 15:29 201K
078-MultipleBytesDifferentialFaultAnalysisonCLE..> 22-Dec-2014 15:29 530K
079-FromDusttoDawnPracticallyEfficientTwoPartyS..> 22-Dec-2014 15:29 713K
080-SecrecyOrientedFirstOrderLogicalAnalysisofC..> 22-Dec-2014 15:29 485K
081-TheErishybridcipher.pdf 22-Dec-2014 15:29 126K
082-PredicateBasedKeyExchange.pdf 22-Dec-2014 15:29 437K
083-OneRoundGroupKeyExchangewithForwardSecurity..> 22-Dec-2014 15:29 288K
083-OneRoundGroupKeyExchangewithForwardSecurity..> 22-Dec-2014 15:29 880K
084-AttributebasedAuthenticatedKeyExchange.pdf 22-Dec-2014 15:29 474K
085-PairwiseCryptographicModelsforSecureDataExc..> 22-Dec-2014 15:29 537K
086-AFrameworkforEfficientSignaturesRingSignatu..> 22-Dec-2014 15:29 310K
087-MQIPAnIdentitybasedIdentificationSchemewith..> 22-Dec-2014 15:29 197K
088-AnEfficientandParallelGaussianSamplerforLat..> 22-Dec-2014 15:28 398K
089-InteractiveLockingZeroKnowledgePCPsandUncon..> 22-Dec-2014 15:28 506K
090-Solvinga676bitDiscreteLogarithmProbleminGF3..> 22-Dec-2014 15:28 186K
091-DistinguishersfortheCompressionFunctionandO..> 22-Dec-2014 15:28 236K
092-SecurityWeaknessesinTwoCertificatelessSignc..> 22-Dec-2014 15:28 68K
092-SecurityWeaknessesinTwoCertificatelessSignc..> 22-Dec-2014 15:28 178K
093-NewImpossibleDierentialAttacksonAES.pdf 22-Dec-2014 15:28 252K
093-NewImpossibleDifferentialAttacksonAES.pdf 20-Jan-2023 08:35 252K
094-ARandomNumberGeneratorBasedonIsogeniesOpera..> 22-Dec-2014 15:28 106K
095-PlaintextDependentDecryptionAFormalSecurity..> 22-Dec-2014 15:28 339K
096-SecretSharingExtensionsbasedontheChineseRem..> 22-Dec-2014 15:28 243K
097-ParallelEnumerationofShortestLatticeVectors..> 22-Dec-2014 15:28 286K
098-AZeroOneLawforDeterministic2PartySecureComp..> 22-Dec-2014 15:28 436K
099-OnHomomorphicEncryptionandChosenCiphertextS..> 22-Dec-2014 15:28 350K
100-CorrelatedProductSecurityFromAnyOneWayFunct..> 22-Dec-2014 15:28 204K
101-FairBlindSignatureswithoutRandomOracles.pdf 22-Dec-2014 15:28 305K
102-ConstructingVeri64257ableRandomFunctionswit..> 22-Dec-2014 15:28 247K
102-ConstructingVeriableRandomFunctionswithLarg..> 20-Jan-2023 08:35 247K
103-TheExtendedAccessControlforMachineReadableT..> 22-Dec-2014 15:28 111K
104-AvoidingFullExtensionFieldArithmeticinPairi..> 22-Dec-2014 15:28 278K
105-Biasinthenonlinearfiltergeneratoroutputsequ..> 22-Dec-2014 15:28 311K
106-PerfectlySecureMultipartyComputationandtheC..> 22-Dec-2014 15:28 463K
107-AdaptiveConcurrentNonMalleabilitywithBarePu..> 22-Dec-2014 15:28 316K
108-PerfectlySecureObliviousRAMWithoutRandomOra..> 22-Dec-2014 15:28 376K
109-PracticalAdaptiveObliviousTransferfromSimpl..> 22-Dec-2014 15:28 342K
110-FullySecureFunctionalEncryptionAttributeBas..> 22-Dec-2014 15:28 565K
111-Onzeropracticalsignificanceof34Keyrecoverya..> 20-Jan-2023 08:35 854K
111-OnzeropracticalsignificanceofKeyrecoveryatt..> 22-Dec-2014 15:28 776K
112-CCASecurePRESchemewithoutRandomOracles.pdf 22-Dec-2014 15:28 264K
113-CryptanalysisofTwoEfficientHIBESchemesinthe..> 22-Dec-2014 15:28 167K
114-TheDiscreteLogarithmProblemModuloOneCryptan..> 22-Dec-2014 15:28 104K
115-ASecurityEvaluationofDNSSECwithNSEC3.pdf 22-Dec-2014 15:27 399K
116-PracticalImprovementsofProfiledSideChannelA..> 22-Dec-2014 15:27 827K
117-CryptographicAgilityanditsRelationtoCircula..> 22-Dec-2014 15:27 284K
118-ProposalofaSignatureSchemebasedonSTSTrapdoo..> 22-Dec-2014 15:27 118K
119-HowtoConstructSpaceEfficientRevocableIBEfro..> 20-Jan-2023 14:21 207
120-UniversalOneWayHashFunctionsandAverageCaseC..> 22-Dec-2014 15:27 296K
121-LatticeBasedPublicKeyCryptosystemProvablySe..> 20-Jan-2023 14:21 207
122-SecurityofEncryptionSchemesinWeakenedRandom..> 22-Dec-2014 15:27 378K
123-DelayingMismatchedFieldMultiplicationsinPai..> 22-Dec-2014 15:27 269K
124-AHardwareWrapperfortheSHA3HashAlgorithms.pdf 22-Dec-2014 15:27 84K
125-CryptographicAspectsofRealHyperellipticCurv..> 22-Dec-2014 15:27 326K
126-OntheSecurityofanEfficientMobileAuthenticat..> 22-Dec-2014 15:27 57K
127-CCASecureCryptosystemfromLattice.pdf 20-Jan-2023 14:21 207
128-UpdateOptimalAuthenticatedStructuresBasedon..> 20-Jan-2023 14:21 207
129-RelationforAlgebraicAttackonE0combiner.pdf 22-Dec-2014 15:27 72K
130-LowVoltageFaultAttackstoAESandRSAonGeneralP..> 22-Dec-2014 15:27 389K
131-MultipropertypreservingDomainExtensionUsing..> 22-Dec-2014 15:27 371K
132-OntheclaimedprivacyofECRACIII.pdf 22-Dec-2014 15:27 89K
132-OntheclaimedprivacyofECRACIII.ps 22-Dec-2014 15:27 277K
133-SigningonElementsinBilinearGroupsforModular..> 22-Dec-2014 15:27 650K
134-BarretoNaehrigCurveWithFixedCoefficientEffi..> 22-Dec-2014 15:27 238K
135-OnTheBroadcastandValidityCheckingSecurityof..> 22-Dec-2014 15:27 240K
135-OnTheBroadcastandValidityCheckingSecurityof..> 22-Dec-2014 15:27 492K
136-OnRobustKeyAgreementBasedonPublicKeyAuthent..> 22-Dec-2014 15:27 235K
137-EstimatingtheSecurityofLatticebasedCryptosy..> 22-Dec-2014 15:27 535K
138-OntheSecurityofaNovelRemoteUserAuthenticati..> 22-Dec-2014 15:27 51K
139-ANewClassofPublicKeyCryptosystemsConstructe..> 22-Dec-2014 15:27 187K
140-ImprovedAgreeingGluingAlgorithm.pdf 22-Dec-2014 15:27 401K
141-AReflectionontheSecurityProofsofBonehFrankl..> 20-Jan-2023 14:21 207
142-MeanvalueformulasfortwistedEdwardscurves.pdf 22-Dec-2014 15:27 272K
143-SmallScaleVariantsOfTheBlockCipherPRESENT.pdf 22-Dec-2014 15:27 138K
144-NewDefinitionsandSeparationsforCircularSecu..> 22-Dec-2014 15:27 320K
145-iHopHomomorphicEncryptionandRerandomizableY..> 22-Dec-2014 15:27 284K
146-SomeApplicationsofLatticeBasedRootFindingTe..> 22-Dec-2014 15:26 191K
147-ANewFrameworkforPasswordBasedAuthenticatedK..> 22-Dec-2014 15:26 245K
148-Commentsonfivesmartcardbasedpasswordauthent..> 22-Dec-2014 15:26 177K
149-OnSmallSubgroupNonconfinementAttack.pdf 22-Dec-2014 15:26 131K
150-BlackBoxComputationalZeroKnowledgeProofsRev..> 22-Dec-2014 15:26 295K
151-Ringsignaturewithdividedprivatekey.pdf 22-Dec-2014 15:26 84K
152-SecureandFastImplementationsofTwoInvolution..> 22-Dec-2014 15:26 164K
153-FoundingCryptographyonTamperProofHardwareTo..> 22-Dec-2014 15:26 386K
154-EfficientPublicKeyCryptographyinthePresence..> 22-Dec-2014 15:26 428K
155-theupperboundsondifferntialcharacteristicsi..> 22-Dec-2014 15:26 80K
156-Genus2CurveswithComplexMultiplication.pdf 22-Dec-2014 15:26 645K
157-EllipticCurveDiscreteLogarithmProblemoverSm..> 22-Dec-2014 15:26 241K
158-AvariantoftheF4algorithm.pdf 22-Dec-2014 15:26 240K
159-IdentityBasedEncryptionSecureagainstSelecti..> 22-Dec-2014 15:26 372K
160-AFlawinTheInternalStateRecoveryAttackonALPH..> 22-Dec-2014 15:26 141K
161-Stange39sEllipticNetsandCoxeterGroupF4.pdf 20-Jan-2023 08:35 203K
161-StangesEllipticNetsandCoxeterGroupF4.pdf 22-Dec-2014 15:26 203K
162-1024XKSAHighSecuritySoftwareOrientedBlockCi..> 22-Dec-2014 15:26 259K
162-1024XKSAHighSecuritySoftwareOrientedBlockCi..> 22-Dec-2014 15:26 285K
163-GolayComplementarySequencesOvertheQAMConste..> 22-Dec-2014 15:26 539K
164-BlackBoxConstructionsofProtocolsforSecureCo..> 22-Dec-2014 15:26 279K
165-Commentonfourtwopartyauthenticationprotocol..> 22-Dec-2014 15:26 189K
166-FaultAnalysisStudyoftheBlockCipherFOX64.pdf 22-Dec-2014 15:26 331K
167-EvolutionaryCipheragainstDifferentialPowerA..> 22-Dec-2014 15:26 348K
168-AMeetintheMiddleAttackonARIA.pdf 22-Dec-2014 15:26 399K
169-DismantlingSecureMemoryCryptoMemoryandCrypt..> 22-Dec-2014 15:26 208K
170-Onaconjectureaboutbinarystringsdistribution..> 22-Dec-2014 15:26 632K
171-OnFoundationandConstructionofPhysicalUnclon..> 22-Dec-2014 15:26 434K
172-ChosenCiphertextSecureEncryptionoverSemismo..> 22-Dec-2014 15:26 188K
172-ChosenCiphertextSecureEncryptionoverSemismo..> 22-Dec-2014 15:26 362K
173-CompactImplementationsofBLAKE32andBLAKE64on..> 22-Dec-2014 15:25 570K
174-AReflectionontheSecurityofTwoPartyKeyEstabl..> 22-Dec-2014 15:25 239K
175-Sanitizablesignatureswithstrongtransparency..> 22-Dec-2014 15:25 203K
176-AComparisonofCryptanalyticTradeoffAlgorithm..> 22-Dec-2014 15:25 827K
177-OntheStaticDiffieHellmanProblemonEllipticCu..> 22-Dec-2014 15:25 232K
178-IdentityBasedOnlineOfflineEncryptionScheme.pdf 22-Dec-2014 15:25 396K
179-AClassof1ResilientFunctionwithHighNonlinear..> 22-Dec-2014 15:25 151K
180-TheWorldisNotEnoughAnotherLookonSecondOrder..> 22-Dec-2014 15:25 815K
180-TheWorldisNotEnoughAnotherLookonSecondOrder..> 22-Dec-2014 15:25 4M
181-CryptanalysisofaDoSresistantIDbasedpassword..> 22-Dec-2014 15:25 66K
182-ASimpleBGNtypeCryptosystemfromLWE.pdf 22-Dec-2014 15:25 217K
183-PreventingPollutionAttacksinMultiSourceNetw..> 22-Dec-2014 15:25 230K
184-RationalSecretSharingASExtensiveGames.pdf 20-Jan-2023 14:21 207
185-NewMethodstoConstructGolayComplementarySequ..> 22-Dec-2014 15:25 188K
186-Newsoftwarespeedrecordsforcryptographicpair..> 22-Dec-2014 15:25 195K
187-CertificatelessSigncryptionwithoutPairing.pdf 22-Dec-2014 15:25 138K
187-CertificatelessSigncryptionwithoutPairing.ps 22-Dec-2014 15:25 227K
188-CryptographicRolebasedSecurityMechanismsbas..> 22-Dec-2014 15:25 604K
188-CryptographicRolebasedSecurityMechanismsbas..> 22-Dec-2014 15:25 4M
189-Newgenericalgorithmsforhardknapsacks.pdf 22-Dec-2014 15:25 313K
190-JPAKEAuthenticatedKeyExchangeWithoutPKI.pdf 22-Dec-2014 15:24 207K
191-OnDesignatedVerifierSignatureSchemes.pdf 22-Dec-2014 15:24 192K
192-NonTransferableProxyReEncryptionSchemeforDa..> 22-Dec-2014 15:24 644K
193-SpeedingUpTheWidepipeSecureandFastHashing.pdf 22-Dec-2014 15:24 332K
194-IdentityBasedOnlineOfflineKeyEncapsulationa..> 22-Dec-2014 15:24 200K
194-IdentityBasedOnlineOfflineKeyEncapsulationa..> 22-Dec-2014 15:24 698K
195-OnEVoteIntegrityintheCaseofMaliciousVoterCo..> 22-Dec-2014 15:24 269K
196-CryptographyAgainstContinuousMemoryAttacks.pdf 22-Dec-2014 15:24 729K
196-CryptographyAgainstContinuousMemoryAttacks.ps 22-Dec-2014 15:24 1M
197-FullySecureAnonymousHIBEandSecretKeyAnonymo..> 22-Dec-2014 15:24 357K
198-TheReboundAttackandSubspaceDistinguishersAp..> 22-Dec-2014 15:24 583K
199-AFrameworkForFullySimulatablehOutOfnOblivio..> 22-Dec-2014 15:24 562K
199-AFrameworkforFullySimulatabletoutofnOblivio..> 20-Jan-2023 08:35 387K
200-GenericConstructionsforVerifiablyEncryptedS..> 22-Dec-2014 15:24 264K
201-ImpossibleDifferentialCryptanalysisonE2.pdf 20-Jan-2023 14:21 207
202-RobustCombinerforObfuscators.pdf 22-Dec-2014 15:24 269K
203-HeraclitusALFSRbasedStreamCipherwithKeyDepe..> 22-Dec-2014 15:24 216K
204-Certificatelessgeneralizedsigncryption.pdf 22-Dec-2014 15:24 70K
205-OnProtectingCryptographicKeysAgainstContinu..> 22-Dec-2014 15:24 310K
206-Authenticationprotocolsbasedonlowbandwidthu..> 22-Dec-2014 15:24 663K
207-IncreasedResilienceinThresholdCryptographyS..> 22-Dec-2014 15:24 255K
208-EfficientImplementationofEllipticCurvePoint..> 22-Dec-2014 15:24 205K
209-IdentityBasedAuthenticatedAsymmetricGroupKe..> 22-Dec-2014 15:24 248K
210-FullySecureIdentityBasedEncryptionWithoutRa..> 20-Jan-2023 14:21 207
211-PracticaltimeAttackontheFullMMBBlockCipher.pdf 22-Dec-2014 15:24 142K
212-QuantumProofsofKnowledge.pdf 22-Dec-2014 15:24 271K
213-ComposableSecurityAnalysisofOSServices.pdf 22-Dec-2014 15:24 279K
214-HowtoTellifYourCloudFilesAreVulnerabletoDri..> 22-Dec-2014 15:24 1007K
215-OntheqStrongDiffieHellmanProblem.pdf 22-Dec-2014 15:23 64K
216-DistinguishingAttacksonMACHMACBasedonANewDe..> 22-Dec-2014 15:23 207K
217-SecureCodeUpdateforEmbeddedDevicesviaProofs..> 22-Dec-2014 15:23 395K
218-NewMontgomerybasedSemisystolicMultiplierfor..> 20-Jan-2023 14:21 207
219-TrackerSecurityandPrivacyforRFIDbasedSupply..> 22-Dec-2014 15:23 269K
220-IfSizeMattersSizeHidingPrivateSetIntersecti..> 22-Dec-2014 15:23 706K
220-IfSizeMattersSizeHidingPrivateSetIntersecti..> 22-Dec-2014 15:23 912K
221-SolvingGeneralizedSmallInverseProblems.pdf 22-Dec-2014 15:23 166K
222-SomeObservationsonIndifferentiability.pdf 22-Dec-2014 15:23 228K
222-SomeObservationsonIndifferentiability.ps 22-Dec-2014 15:23 892K
223-ImprovedDifferentialAttacksforECHOandGrostl..> 22-Dec-2014 15:23 973K
224-EfficientImplementationoftheOrlandiProtocol..> 22-Dec-2014 15:23 225K
224-EfficientImplementationoftheOrlandiProtocol..> 22-Dec-2014 15:23 749K
225-ASecurityWeaknessinaGenericConstructionofaG..> 22-Dec-2014 15:23 170K
226-CircularandLeakageResilientPublicKeyEncrypt..> 22-Dec-2014 15:23 381K
227-ASecurityWeaknessinCompositeOrderPairingBas..> 22-Dec-2014 15:23 68K
227-ASecurityWeaknessinCompositeOrderPairingBas..> 22-Dec-2014 15:23 191K
227-ASecurityWeaknessinCompositeOrderPairingBas..> 20-Jan-2023 08:35 67K
228-PracticalNFCPeertoPeerRelayAttackusingMobil..> 22-Dec-2014 15:23 3M
229-Concurrentcompositionintheboundedquantumsto..> 22-Dec-2014 15:23 441K
230-Acalculusforgamebasedsecurityproofs.pdf 22-Dec-2014 15:23 271K
231-ThroughputOptimalRoutinginUnreliableNetwork..> 22-Dec-2014 15:23 643K
231-ThroughputOptimalRoutinginUnreliableNetwork..> 22-Dec-2014 15:23 1M
232-OnRepresentableMatroidsandIdealSecretSharin..> 22-Dec-2014 15:23 225K
233-CommutingSignaturesandVerifiableEncryptiona..> 22-Dec-2014 15:23 437K
234-Efficientprovabledatapossessionforhybridclo..> 22-Dec-2014 15:22 321K
235-Attributebasedgroupkeyestablishment.pdf 22-Dec-2014 15:22 279K
236-AccountabilityDefinitionandRelationshiptoVe..> 22-Dec-2014 15:22 294K
237-ANewSecurityModelforAuthenticatedKeyAgreeme..> 22-Dec-2014 15:22 352K
237-ANewSecurityModelforAuthenticatedKeyAgreeme..> 22-Dec-2014 15:22 1M
238-CollusionFreeProtocolforCorrelatedElementSe..> 22-Dec-2014 15:22 190K
238-CollusionFreeProtocolforCorrelatedElementSe..> 22-Dec-2014 15:22 385K
239-Oneroundandauthenticatedthreepartymultiplek..> 22-Dec-2014 15:22 215K
240-WeaknessesofadynamicIDbasedremoteuserauthen..> 22-Dec-2014 15:22 82K
241-ImprovedDelegationofComputationusingFullyHo..> 22-Dec-2014 15:22 479K
242-EfficientAccessControlofSensitiveDataServic..> 22-Dec-2014 15:22 180K
243-Constructionof1ResilientBooleanFunctionswit..> 22-Dec-2014 15:22 95K
244-AuthenticatingAggregateRangeQueriesoverDyna..> 22-Dec-2014 15:22 396K
245-TowardsaTheoryofTrustBasedCollaborativeSear..> 22-Dec-2014 15:22 185K
246-QuantifyingTrust.pdf 22-Dec-2014 15:22 131K
247-ANewJointFingerprintingandDecryptionSchemeb..> 22-Dec-2014 15:22 183K
248-AutomaticSearchforRelatedKeyDifferentialCha..> 22-Dec-2014 15:22 327K
249-RationalSecretSharingwithoutBroadcast.pdf 22-Dec-2014 15:22 120K
249-RationalSecretSharingwithoutBroadcast.ps 22-Dec-2014 15:22 312K
250-CollusionFreeProtocolforRationalSecretShari..> 22-Dec-2014 15:22 85K
250-CollusionFreeProtocolforRationalSecretShari..> 22-Dec-2014 15:22 220K
251-ModelingAttacksonPhysicalUnclonableFunction..> 22-Dec-2014 15:22 511K
252-AsupplementtoLiuetal39scertificatelesssignc..> 20-Jan-2023 08:35 109K
252-AsupplementtoLiuetalscertificatelesssigncry..> 22-Dec-2014 15:22 109K
253-SeparableHashFunctions.pdf 22-Dec-2014 15:22 188K
254-CryptanalysisofXXTEA.pdf 22-Dec-2014 15:22 319K
255-Automorphismgroupofthesetofallbentfunctions..> 22-Dec-2014 15:22 77K
255-Automorphismgroupofthesetofallbentfunctions.ps 22-Dec-2014 15:22 189K
256-OnthePublicKeyReplacementandUniversalForger..> 20-Jan-2023 14:21 207
257-FeasibleAttackonthe13roundAES256.pdf 22-Dec-2014 15:22 183K
258-Onlowerboundsofsecondordernonlinearitiesofc..> 22-Dec-2014 15:22 239K
259-Bentfunctionsattheminimaldistanceandalgorit..> 22-Dec-2014 15:21 95K
259-Bentfunctionsattheminimaldistanceandalgorit..> 22-Dec-2014 15:21 246K
260-OnFPGAbasedimplementationsofGrostl.pdf 22-Dec-2014 15:21 682K
261-LinksBetweenTheoreticalandEffectiveDifferen..> 22-Dec-2014 15:21 169K
262-CubeTestAnalysisoftheStatisticalBehaviorofC..> 22-Dec-2014 15:21 495K
262-CubeTestAnalysisoftheStatisticalBehaviorofC..> 22-Dec-2014 15:21 5M
263-LatticeReductionandPolynomialSolving.pdf 20-Jan-2023 14:21 207
264-CryptographicExtractionandKeyDerivationTheH..> 22-Dec-2014 15:21 484K
265-CCASecureUnidirectionalProxyReEncryptionint..> 22-Dec-2014 15:21 227K
265-CCASecureUnidirectionalProxyReEncryptionint..> 22-Dec-2014 15:21 790K
266-MultipartyComputationforModuloReductionwith..> 22-Dec-2014 15:21 347K
267-Twoimprovedauthenticatedmultiplekeyexchange..> 22-Dec-2014 15:21 191K
268-KeyControlledOrderPreservingEncryption.pdf 22-Dec-2014 15:21 107K
269-LABFormforIteratedHashFunctions.pdf 22-Dec-2014 15:21 320K
270-FactorizationofRSA180.pdf 22-Dec-2014 15:21 71K
271-SelectingParametersforSecureMcEliecebasedCr..> 22-Dec-2014 15:21 393K
272-VirtualSecureCircuitPortingDualRailPrecharg..> 22-Dec-2014 15:21 2M
273-SymmetricStatesandtheirStructureImprovedAna..> 22-Dec-2014 15:21 143K
274-OnlineOfflineIdentityBasedSigncryptionRevis..> 22-Dec-2014 15:21 251K
275-PositionBasedQuantumCryptographyImpossibili..> 22-Dec-2014 15:21 310K
276-GarbledCircuitsforLeakageResilienceHardware..> 22-Dec-2014 15:21 853K
277-AdaptivelySecureBroadcastEncryptionwithShor..> 20-Jan-2023 14:21 207
278-OvercomingtheHoleInTheBucketPublicKeyCrypto..> 22-Dec-2014 15:21 496K
279-OntheRoundComplexityofCovertComputation.pdf 22-Dec-2014 15:21 424K
280-StudiesonVerifiableSecretSharingByzantineAg..> 22-Dec-2014 15:20 2M
281-ProtocolsforReliableandSecureMessageTransmi..> 22-Dec-2014 15:20 2M
282-PseudoLinearApproximationsforARXCiphersWith..> 22-Dec-2014 15:20 186K
283-RecursiveInformationHidinginVisualCryptogra..> 22-Dec-2014 15:20 835K
284-SecureTwoPartyComputationviaCutandChooseObl..> 22-Dec-2014 15:20 629K
285-ASATbasedpreimageanalysisofreducedKECCAKhas..> 22-Dec-2014 15:20 166K
286-OnsecondordernonlinearitiesofsomemathcalD_0..> 22-Dec-2014 15:20 316K
287-IntroductiontoMirrorTheoryAnalysisofSystems..> 22-Dec-2014 15:20 604K
288-LatticebasedIdentityBasedBroadcastEncryptio..> 22-Dec-2014 15:20 242K
289-ATwoPartyProtocolwithTrustedInitializerforC..> 22-Dec-2014 15:20 168K
290-IntractableProblemsinCryptography.pdf 22-Dec-2014 15:20 253K
291-CryptanalysisofanExquisiteMutualAuthenticat..> 22-Dec-2014 15:20 60K
292-ALowAreayetPerformantFPGAImplementationofSh..> 22-Dec-2014 15:20 302K
293-SecurityofbalancedandunbalancedFeistelSchem..> 22-Dec-2014 15:20 411K
294-Computinggenus2curvesfrominvariantsontheHil..> 22-Dec-2014 15:20 412K
295-IdealKeyDerivationandEncryptioninSimulation..> 22-Dec-2014 15:20 295K
296-HashbasedMultivariatePublicKeyCryptosystems..> 22-Dec-2014 15:20 222K
297-CorrelationEnhancedPowerAnalysisCollisionAt..> 22-Dec-2014 15:20 4M
298-OntheIndifferentiabilityoftheGrostlHashFunc..> 22-Dec-2014 15:20 509K
298-OntheIndifferentiabilityoftheGrstlHashFunct..> 20-Jan-2023 08:35 509K
299-FasterFullyHomomorphicEncryption.pdf 22-Dec-2014 15:20 416K
300-OptimalAverageJointHammingWeightandMinimalW..> 22-Dec-2014 15:20 352K
300-OptimalAverageJointHammingWeightandMinimalW..> 22-Dec-2014 15:19 849K
301-OngeneralizedFeistelnetworks.pdf 22-Dec-2014 15:19 293K
302-UsingtheInhomogeneousSimultaneousApproximat..> 22-Dec-2014 15:19 216K
303-UniversallyComposableSymbolicAnalysisofDiff..> 22-Dec-2014 15:19 548K
304-CryptanalysisoftheCompressionFunctionofSIMD..> 22-Dec-2014 15:19 194K
305-OntheImpossibilityofCryptographyAloneforPri..> 22-Dec-2014 15:19 557K
306-Onsecurityofaremoteuserauthenticationscheme..> 22-Dec-2014 15:19 66K
307-ImpossibleDifferentialCryptanalysisofSPNCip..> 22-Dec-2014 15:19 219K
308-AttackingMMCollectiveSignatureScheme.pdf 22-Dec-2014 15:19 230K
308-AttackingMampMCollectiveSignatureScheme.pdf 20-Jan-2023 08:35 230K
309-CoZAdditionFormulaeandBinaryLaddersonEllipt..> 22-Dec-2014 15:19 174K
310-Theanalyticalpropertyforzetas.pdf 20-Jan-2023 14:20 207
311-Combiningleakresistantarithmeticforelliptic..> 22-Dec-2014 15:19 209K
312-Securityweaknessoftwoauthenticatedkeyexchan..> 22-Dec-2014 15:19 92K
313-FastExhaustiveSearchforPolynomialSystemsinF..> 22-Dec-2014 15:19 175K
313-FastExhaustiveSearchforPolynomialSystemsinF..> 22-Dec-2014 15:19 2M
314-WeaknessesofadynamicIDbasedremoteuserauthen..> 22-Dec-2014 15:19 79K
315-EfficientTechniquesforHighSpeedEllipticCurv..> 22-Dec-2014 15:19 225K
316-ANewHumanIdentificationProtocolandCoppersmi..> 20-Jan-2023 08:35 255K
316-ANewHumanIdentificationProtocolandCoppersmi..> 22-Dec-2014 15:19 255K
317-ANoteOnGottesmanChuangQuantumSignatureSchem..> 22-Dec-2014 15:19 86K
318-MultipartyComputationforDishonestMajorityfr..> 22-Dec-2014 15:19 287K
318-MultipartyComputationforDishonestMajorityfr..> 22-Dec-2014 15:19 878K
319-OntheSecurityofaBidirectionalProxyReEncrypt..> 22-Dec-2014 15:19 2217
319-OntheSecurityofaBidirectionalProxyReEncrypt..> 22-Dec-2014 15:19 88K
320-OnisotopismsofcommutativepresemifieldsandCC..> 20-Jan-2023 08:35 168K
321-SubspaceDistinguisherfor58RoundsoftheECHO25..> 22-Dec-2014 15:19 620K
322-ImprovedSingleKeyAttackson8roundAES.pdf 22-Dec-2014 15:19 292K
323-SecurityAnalysisofSIMD.pdf 22-Dec-2014 15:19 619K
324-ApplicationsofSATSolverstoAESkeyRecoveryfro..> 22-Dec-2014 15:19 174K
325-EffectoftheDependentPathsinLinearHull.pdf 22-Dec-2014 15:18 306K
326-PrivacyPreservingMultiObjectiveEvolutionary..> 22-Dec-2014 15:18 717K
327-EfficiencyImprovedFullySimulatableAdaptiveO..> 22-Dec-2014 15:18 315K
328-SignaturesforMultisourceNetworkCoding.pdf 22-Dec-2014 15:18 149K
329-OntheSecurityofPseudorandomizedInformationT..> 22-Dec-2014 15:18 243K
330-DistributedRationalConsensus.pdf 22-Dec-2014 15:18 136K
330-DistributedRationalConsensus.ps 22-Dec-2014 15:18 539K
331-ADistinguisherforHighRateMcElieceCryptosyst..> 22-Dec-2014 15:18 399K
332-RelayAttacksonPassiveKeylessEntryandStartSy..> 22-Dec-2014 15:18 1M
333-CryptanalysisofLibertVergnaudProxyReencrypt..> 20-Jan-2023 14:20 207
334-SecurityProofofAugPAKE.pdf 22-Dec-2014 15:18 240K
335-AnalysisofEfficientTechniquesforFastEllipti..> 22-Dec-2014 15:18 333K
336-EfficientDifferentialFaultAnalysisforAES.pdf 22-Dec-2014 15:18 242K
336-EfficientDifferentialFaultAnalysisforAES.ps 22-Dec-2014 15:18 641K
337-PracticalTitledAttackonAES128UsingChosenTex..> 22-Dec-2014 15:18 61K
338-EfficientSIMDarithmeticmoduloaMersennenumbe..> 22-Dec-2014 15:18 162K
339-ACertifyingCompilerforZeroKnowledgeProofsof..> 22-Dec-2014 15:18 816K
340-AsecureDeniableAuthenticationProtocolbasedo..> 22-Dec-2014 15:18 189K
341-ANewClassofPublicKeyCryptosystemsConstructe..> 22-Dec-2014 15:18 224K
342-FixedArgumentPairings.pdf 22-Dec-2014 15:18 346K
343-IdentityBasedPublicVerifiableSigncryptionSc..> 22-Dec-2014 15:18 176K
343-IdentityBasedPublicVerifiableSigncryptionSc..> 22-Dec-2014 15:18 382K
344-GeneratingmoreKawazoeTakahashiGenus2Pairing..> 22-Dec-2014 15:18 318K
345-RobustRFIDAuthenticationProtocolwithFormalP..> 22-Dec-2014 15:18 363K
346-EfficientGeneralizedSigncryptionSchemes.pdf 22-Dec-2014 15:18 115K
347-TimeSpecificEncryption.pdf 22-Dec-2014 15:18 416K
348-LatticetheoreticCharacterizationofSecretSha..> 22-Dec-2014 15:18 99K
349-ImprovedAlgebraicCryptanalysisofQUADBiviuma..> 22-Dec-2014 15:18 1M
349-ImprovedAlgebraicCryptanalysisofQUADBiviuma..> 22-Dec-2014 15:18 1M
350-ASecurityEnhancementandProofforAuthenticati..> 22-Dec-2014 15:17 314K
350-ASecurityEnhancementandProofforAuthenticati..> 22-Dec-2014 15:17 1M
351-DecentralizingAttributeBasedEncryption.pdf 22-Dec-2014 15:17 387K
352-ADigitalSignatureUsingMultivariateFunctions..> 22-Dec-2014 15:17 71K
353-CryptographicPairingsBasedonEllipticNets.pdf 22-Dec-2014 15:17 217K
354-HighSpeedSoftwareImplementationoftheOptimal..> 22-Dec-2014 15:17 178K
355-NearCollisionsontheReducedRoundCompressionF..> 22-Dec-2014 15:17 333K
356-SecureConnectivityModelInWirelessSensorNetw..> 22-Dec-2014 15:17 134K
356-SecureConnectivityModelInWirelessSensorNetw..> 22-Dec-2014 15:17 2M
357-CCASecurePRESchemewithoutPublicVerifiabilit..> 20-Jan-2023 14:20 207
358-TheFiatShamirTransformforGroupandRingSignat..> 22-Dec-2014 15:17 312K
359-IdentityBasedSelfDelegatedSignatureSelfProx..> 22-Dec-2014 15:17 1M
360-OntheSecurityofIdentityBasedThresholdUnsign..> 22-Dec-2014 15:17 179K
360-OntheSecurityofIdentityBasedThresholdUnsign..> 22-Dec-2014 15:17 214K
361-OntheUseofFinancialDataasaRandomBeacon.pdf 22-Dec-2014 15:17 871K
362-ConstructionofBalancedBooleanFunctionswithH..> 22-Dec-2014 15:17 141K
362-ConstructionofBalancedBooleanFunctionswithH..> 22-Dec-2014 15:17 319K
363-AnAnalysisofAffineCoordinatesforPairingComp..> 22-Dec-2014 15:17 237K
364-ACompactFPGAImplementationoftheSHA3Candidat..> 22-Dec-2014 15:17 349K
365-TASTYToolforAutomatingSecureTwopartYcomputa..> 22-Dec-2014 15:17 797K
366-ObliviousRAMRevisited.pdf 22-Dec-2014 15:17 379K
367-StarfishonStrike.pdf 22-Dec-2014 15:16 510K
368-RoundOptimalPasswordBasedAuthenticatedKeyEx..> 22-Dec-2014 15:16 307K
369-DoubleCiphertextModeAProposalforSecureBacku..> 22-Dec-2014 15:16 281K
370-Findingdiscretelogarithmswithasetorbitdisti..> 22-Dec-2014 15:16 228K
371-CompacthardwareforcomputingtheTatepairingov..> 22-Dec-2014 15:16 550K
372-DecodingsquarefreeGoppacodesoverF_p.pdf 22-Dec-2014 15:16 221K
372-DecodingsquarefreeGoppacodesoverF_p.ps 22-Dec-2014 15:16 719K
373-HashingintoHessianCurves.pdf 22-Dec-2014 15:16 153K
374-EfficientGenerationofLinearSecretSharingSch..> 20-Jan-2023 08:35 665K
374-OnEfficientlyTransferringtheLinearSecretSha..> 22-Dec-2014 15:16 290K
375-ImprovedCollisionAttacksontheReducedRoundGr..> 22-Dec-2014 15:16 199K
375-ImprovedCollisionAttacksontheReducedRoundGr..> 20-Jan-2023 08:35 199K
376-IdentityBasedOnlineOfflineSigncryptionSchem..> 22-Dec-2014 15:16 171K
376-IdentityBasedOnlineOfflineSigncryptionSchem..> 22-Dec-2014 15:16 385K
377-KeyAgreementProtocolsBasedonMultivariateAlg..> 22-Dec-2014 15:16 73K
378-RingSignatureandIdentityBasedRingSignaturef..> 22-Dec-2014 15:16 253K
379-Pairingcomputationonellipticcurveswitheffic..> 22-Dec-2014 15:16 239K
380-Analysisofaninternetvotingprotocol.pdf 22-Dec-2014 15:16 418K
381-SecurityReductionsoftheSecondRoundSHA3Candi..> 22-Dec-2014 15:16 549K
382-DeterministicEncodingandHashingtoOddHyperel..> 22-Dec-2014 15:16 344K
383-Huff39sModelforEllipticCurves.pdf 20-Jan-2023 08:35 322K
383-HuffsModelforEllipticCurves.pdf 22-Dec-2014 15:16 322K
384-Practicalconsequencesoftheaberrationofnarro..> 22-Dec-2014 15:16 122K
385-FirstOrderSideChannelAttacksonthePermutatio..> 22-Dec-2014 15:16 484K
386-BoostReduceAFrameworkForStrongLatticeBasisR..> 22-Dec-2014 15:16 492K
387-ACombinatorialAnalysisofHC128.pdf 22-Dec-2014 15:16 351K
388-OntheEfficiencyandSecurityofPairingBasedPro..> 22-Dec-2014 15:16 288K
389-TheimpossibilityofcomputationallysoundXOR.pdf 22-Dec-2014 15:16 102K
390-EllipticcurvesinHuff39smodel.pdf 20-Jan-2023 08:35 263K
390-EllipticcurvesinHuffsmodel.pdf 22-Dec-2014 15:16 263K
391-ExponentialBoundsforInformationLeakageinUnk..> 22-Dec-2014 15:16 123K
392-InterplaybetweenImperfectnessSynchronyandCo..> 22-Dec-2014 15:15 295K
392-InterplaybetweenImperfectnessSynchronyandCo..> 22-Dec-2014 15:15 938K
393-APrivacyFlexiblePasswordAuthenticationSchem..> 22-Dec-2014 15:15 595K
394-HorizontalCorrelationAnalysisonExponentiati..> 22-Dec-2014 15:15 1M
395-OnEfficientCiphertextPolicyAttributeBasedEn..> 22-Dec-2014 15:15 575K
396-FromAES128toAES192andAES256HowtoAdaptDiffer..> 22-Dec-2014 15:15 273K
396-FromAES128toAES192andAES256HowtoAdaptDiffer..> 22-Dec-2014 15:15 911K
397-PseudorandomFunctionsandPermutationsProvabl..> 22-Dec-2014 15:15 363K
398-DistinguisherforShabal39sPermutationFunctio..> 20-Jan-2023 08:35 215K
398-DistinguisherforShabalsPermutationFunction.pdf 22-Dec-2014 15:15 215K
399-FasterComputationofSelfpairings.pdf 22-Dec-2014 15:15 175K
399-FasterComputationofSelfpairings.ps 22-Dec-2014 15:15 678K
400-SecurityAnalysisofaThresholdProxySignatureS..> 22-Dec-2014 15:15 78K
401-PrivacyfriendlyIncentivesandtheirApplicatio..> 22-Dec-2014 15:15 462K
402-OntheSecurityofNonLinearHBNLHBProtocolAgain..> 22-Dec-2014 15:15 290K
403-LinearSecretSharingforHierarchicalAccessStr..> 20-Jan-2023 14:20 207
404-OntheInsecurityofParallelRepetitionforLeaka..> 22-Dec-2014 15:15 265K
405-PrivacyPreservingRFIDSystemsModelandConstru..> 22-Dec-2014 15:15 385K
405-PrivacyPreservingRFIDSystemsModelandConstru..> 22-Dec-2014 15:15 1M
406-UnfoldingMethodforShabalonVirtex5FPGAsConcr..> 22-Dec-2014 15:15 511K
407-FlawsinDifferentialCryptanalysisofReducedRo..> 22-Dec-2014 15:15 226K
408-ImprovedTraceDrivenCacheCollisionAttacksaga..> 22-Dec-2014 15:15 391K
409-ThecollisionsecurityofTandemDMintheidealcip..> 22-Dec-2014 15:15 261K
410-WildMcEliece.pdf 22-Dec-2014 15:15 260K
411-CryptanalysisofCryptosystemsBasedonNoncommu..> 22-Dec-2014 15:15 249K
412-OptimalAdversaryBehaviorfortheSerialModelof..> 22-Dec-2014 15:15 196K
413-Collisionsfor72stepand73stepSHA1Improvement..> 22-Dec-2014 15:14 229K
414-OnStrongSimulationandComposablePointObfusca..> 22-Dec-2014 15:14 516K
415-PerfectlyBalancedBooleanFunctionsandGoliCon..> 20-Jan-2023 08:35 340K
415-PerfectlyBalancedBooleanFunctionsandGolicCo..> 22-Dec-2014 15:14 159K
415-PerfectlyBalancedBooleanFunctionsandGolicCo..> 22-Dec-2014 15:14 656K
416-ComputationallySoundVerificationofSourceCod..> 22-Dec-2014 15:14 664K
417-DistinguishingPropertiesofHigherOrderDeriva..> 22-Dec-2014 15:14 281K
418-CryptanalysisandImprovementofANewElectronic..> 22-Dec-2014 15:14 379K
419-WhiteBoxCryptographyandSPNciphersLRCmethod.pdf 22-Dec-2014 15:14 227K
420-TowardsprovablesecurityoftheUnbalancedOilan..> 22-Dec-2014 15:14 171K
420-TowardsprovablesecurityoftheUnbalancedOilan..> 22-Dec-2014 15:14 512K
421-BinomialSieveSeriesaProspectiveCryptographi..> 22-Dec-2014 15:14 592K
422-SynchronizedAggregateSignaturesNewDefinitio..> 22-Dec-2014 15:14 296K
423-NearCollisionsfortheCompressFunctionofHamsi..> 22-Dec-2014 15:14 180K
424-CyclicRainbowAmultivariateSignatureSchemewi..> 22-Dec-2014 15:14 168K
424-CyclicRainbowAmultivariateSignatureSchemewi..> 22-Dec-2014 15:14 351K
425-KISTAnewencryptionalgorithmbasedonsplay.pdf 22-Dec-2014 15:14 136K
426-ParallelizingtheCamelliaandSMS4BlockCiphers..> 22-Dec-2014 15:14 478K
427-SecurityImprovementonaPasswordAuthenticated..> 20-Jan-2023 14:20 207
428-RandomOraclesinaQuantumWorld.pdf 22-Dec-2014 15:14 584K
429-AFamilyofImplementationFriendlyBNEllipticCu..> 22-Dec-2014 15:14 195K
429-AFamilyofImplementationFriendlyBNEllipticCu..> 22-Dec-2014 15:14 652K
430-GenericCollisionAttacksonNarrowpipeHashFunc..> 22-Dec-2014 15:14 104K
431-CollusionResistantMulticastKeyDistributionB..> 22-Dec-2014 15:14 412K
432-ANEFFICIENTPARALLELALGORITHMFORSKEINHASHFUN..> 22-Dec-2014 15:14 185K
433-ThePASSERINEPublicKeyEncryptionandAuthentic..> 22-Dec-2014 15:14 66K
433-ThePASSERINEPublicKeyEncryptionandAuthentic..> 22-Dec-2014 15:14 291K
434-LowweightPseudoCollisionAttackonShabalandPr..> 22-Dec-2014 15:14 156K
435-TheImprobableDifferentialAttackCryptanalysi..> 22-Dec-2014 15:14 1M
436-ArithmeticofSupersingularKoblitzCurvesinCha..> 22-Dec-2014 15:14 242K
437-SelectingParametersfortheRainbowSignatureSc..> 22-Dec-2014 15:13 323K
438-AchievingLeakageResilienceThroughDualSystem..> 22-Dec-2014 15:13 481K
439-EmbeddedExtendedVisualCryptographySchemes.pdf 22-Dec-2014 15:13 11M
440-PiretandQuisquater39sDFAonAESRevisited.pdf 20-Jan-2023 08:35 358K
440-PiretandQuisquatersDFAonAESRevisited.pdf 22-Dec-2014 15:13 358K
441-ProvablySecureHigherOrderMaskingofAES.pdf 22-Dec-2014 15:13 401K
442-AlgebraicPseudorandomFunctionswithImprovedE..> 22-Dec-2014 15:13 406K
443-BalancedBooleanFunctionswithAlmostOptimalAl..> 22-Dec-2014 15:13 206K
443-BalancedBooleanFunctionswithAlmostOptimalAl..> 22-Dec-2014 15:13 379K
444-NewConstructionofIdentitybasedProxyReencryp..> 22-Dec-2014 15:13 177K
445-ComparingHardwarePerformanceofFourteenRound..> 22-Dec-2014 15:13 2M
446-ShortOneTimeSignatures.pdf 22-Dec-2014 15:13 223K
447-SidechannelAnalysisofSixSHA3Candidates.pdf 22-Dec-2014 15:13 3M
448-SequentialRationalityinCryptographicProtoco..> 22-Dec-2014 15:13 370K
449-ObliviousandFairServerAidedTwoPartyComputat..> 22-Dec-2014 15:13 278K
450-RoundEfficientPerfectlySecureMessageTransmi..> 22-Dec-2014 15:13 98K
451-AccelerationofDifferentialFaultAnalysisofth..> 22-Dec-2014 15:13 109K
451-AccelerationofDifferentialFaultAnalysisofth..> 22-Dec-2014 15:12 685K
452-EveryVoteCountsEnsuringIntegrityinLargeScal..> 22-Dec-2014 15:12 317K
453-LinearlyHomomorphicSignaturesoverBinaryFiel..> 22-Dec-2014 15:12 483K
454-KeyExchangewithAnonymousAuthenticationusing..> 22-Dec-2014 15:12 197K
455-OptimalVerificationofOperationsonDynamicSet..> 22-Dec-2014 15:12 418K
456-RobustFuzzyExtractorsandAuthenticatedKeyAgr..> 22-Dec-2014 15:12 1M
456-RobustFuzzyExtractorsandAuthenticatedKeyAgr..> 22-Dec-2014 15:12 2M
457-ImprovingtheperformanceofLuffaHashAlgorithm..> 22-Dec-2014 15:12 1M
458-KeyAgreementProtocolsUsingMultivariateEquat..> 22-Dec-2014 15:12 378K
459-CCA2SecureCertificatelessEncryptionSchemesB..> 22-Dec-2014 15:12 626K
460-Onextendedalgebraicimmunity.pdf 20-Jan-2023 14:20 207
461-IdentityBasedPartialAggregateSignatureSchem..> 22-Dec-2014 15:12 486K
462-UnconditionallySecureRationalSecretSharingi..> 22-Dec-2014 15:12 210K
463-PassiveCryptanalysisoftheUnConditionallySec..> 22-Dec-2014 15:12 396K
464-WeaknessesofSIPAuthenticationSchemeforConve..> 20-Jan-2023 14:20 207
465-HowtoimplementthepublicKeyOperationsinCodeb..> 22-Dec-2014 15:12 514K
466-PEKSrandProvidingPredicatePrivacyinPublicke..> 22-Dec-2014 15:12 363K
467-ComputationalSoundnessaboutFormalEncryption..> 22-Dec-2014 15:12 424K
468-GenericConstructionsofParallelKeyInsulatedE..> 22-Dec-2014 15:12 398K
468-GenericConstructionsofParallelKeyInsulatedE..> 22-Dec-2014 15:12 1M
469-LinearComplexityPrivateSetIntersectionProto..> 22-Dec-2014 15:12 248K
470-TwoidentificationprotocolsbasedonCayleygrap..> 22-Dec-2014 15:11 173K
471-PrivacypreservingSharingofSensitiveInformat..> 20-Jan-2023 14:20 207
472-AccusationprobabilitiesinTardoscodestheGaus..> 22-Dec-2014 15:11 2M
473-TwoAttacksonDuttasDynamicGroupKeyAgreementP..> 20-Jan-2023 14:20 207
474-LimitationsonTransformationsfromCompositeOr..> 22-Dec-2014 15:11 369K
475-PairingComputationonEllipticCurvesofJacobiQ..> 22-Dec-2014 15:11 248K
476-PredicateEncryptionwithPartialPublicKeys.pdf 22-Dec-2014 15:11 394K
477-OnCompressionofDataEncryptedwithBlockCipher..> 22-Dec-2014 15:11 459K
478-CryptanalysisoftheConvexHullClickHumanIdent..> 22-Dec-2014 15:11 1M
479-SideChannelAttacksontheMcElieceandNiederrei..> 22-Dec-2014 15:11 296K
480-EnhancedSTSusingCheckEquationExtendedVersio..> 22-Dec-2014 15:11 96K
481-Asecureemailloginsystemusingvirtualpassword..> 22-Dec-2014 15:11 54K
482-OnInstantiationoftheRandomOracle.pdf 20-Jan-2023 14:20 207
483-ConstantroundNonMalleableCommitmentsfromAny..> 22-Dec-2014 15:11 434K
484-AutomataEvaluationandTextSearchProtocolswit..> 22-Dec-2014 15:11 523K
485-CryptanalysisofBlockCiphersUsingAlmostImpos..> 22-Dec-2014 15:11 314K
486-ANOTEONSEMIBENTBOOLEANFUNCTIONS.pdf 22-Dec-2014 15:11 158K
487-ConstantRoundNonMalleableProtocolsusingOneW..> 22-Dec-2014 15:11 323K
488-FullyLeakageResilientSignatures.pdf 22-Dec-2014 15:11 376K
489-LoissAByteOrientedStreamCipher.pdf 22-Dec-2014 15:11 175K
490-Strongdesignatedverifiersignatureschemenewd..> 22-Dec-2014 15:11 59K
491-ACollaborativeFrameworkforPrivacyProtection..> 22-Dec-2014 15:11 920K
492-E64259cientFullySecurePredicateEncryptionfo..> 22-Dec-2014 15:11 329K
492-EcientFullySecurePredicateEncryptionforConj..> 20-Jan-2023 08:35 329K
493-ASuiteofIdentityBasedAggregateSignaturesand..> 20-Jan-2023 08:34 560K
494-StrongerSecurityModelofGroupKeyAgreement.pdf 22-Dec-2014 15:11 199K
494-StrongerSecurityModelofGroupKeyAgreement.ps 22-Dec-2014 15:11 658K
495-APracticalNoninteractivePubliclyVerifiableS..> 22-Dec-2014 15:11 229K
496-EfficientAttributesforAnonymousCredentialsE..> 22-Dec-2014 15:10 322K
497-Numberformulaanddegreelevelofergodicpolynom..> 20-Jan-2023 14:20 207
498-CoZDivisorAdditionFormulaeinJacobianofGenus..> 22-Dec-2014 15:10 132K
499-SecureComputationsonNonIntegerValues.pdf 22-Dec-2014 15:10 85K
500-ATTACKSONTHEAKACPPROTOCOL.pdf 22-Dec-2014 15:10 45K
500-ATTACKSONTHEAKACPPROTOCOL.ps 22-Dec-2014 15:10 45K
501-GroupHomomorphicEncryptionCharacterizations..> 22-Dec-2014 15:10 287K
502-ProvingCoercionResistanceofScantegrityII.pdf 22-Dec-2014 15:10 227K
503-BiTRBuiltinTamperResilience.pdf 22-Dec-2014 15:10 471K
504-PracticalCryptanalysisoftheIdentificationSc..> 22-Dec-2014 15:10 220K
505-TerminationInsensitiveComputationalIndistin..> 22-Dec-2014 15:10 312K
505-TerminationInsensitiveComputationalIndistin..> 22-Dec-2014 15:10 1M
506-QuantumPreimageandCollisionAttacksonCubeHas..> 22-Dec-2014 15:10 331K
507-OnisotopismsofcommutativepresemifieldsandCC..> 22-Dec-2014 15:10 164K
507-OnisotopismsofcommutativepresemifieldsandCC..> 22-Dec-2014 15:10 587K
508-AFaultAnalyticMethodagainstHB.pdf 22-Dec-2014 15:10 1M
509-OnEfficientNonInteractiveObliviousTransferw..> 22-Dec-2014 15:10 535K
511-OnthecomplexityofDecompositionAttack.pdf 22-Dec-2014 15:10 1M
512-MultiPartyPrivacyPreservingSetIntersectionw..> 22-Dec-2014 15:10 432K
513-KeyDependentMessageSecurityGenericAmplifica..> 22-Dec-2014 15:10 174K
514-SemiHomomorphicEncryptionandMultipartyCompu..> 22-Dec-2014 15:10 522K
515-Withdrawn.pdf 18-Aug-2023 00:00 207
516-KeyAgreementProtocolsBasedonMultivariatePol..> 22-Dec-2014 15:10 258K
517-CryptanalysisofblockEnRUPT.pdf 22-Dec-2014 15:10 324K
518-Booleanfunctionswithallmaincryptographicpro..> 22-Dec-2014 15:10 198K
519-PreimageResistanceBeyondtheBirthdayBoundDou..> 22-Dec-2014 15:10 391K
520-ImplementingGentry39sFullyHomomorphicEncryp..> 20-Jan-2023 08:34 223K
520-ImplementingGentrysFullyHomomorphicEncrypti..> 22-Dec-2014 15:10 223K
521-LinearApproximationsofAdditionModulo2n1.pdf 22-Dec-2014 15:09 136K
522-SignaturesResilienttoContinualLeakageonMemo..> 22-Dec-2014 15:09 351K
523-AffineMaskingagainstHigherOrderSideChannelA..> 22-Dec-2014 15:09 969K
524-Combiningpropertiesofcryptographichashfunct..> 22-Dec-2014 15:09 326K
525-Torusbasedcompressionbyfactor4and6.pdf 22-Dec-2014 15:09 1016K
525-Torusbasedcompressionbyfactor4and6.ps 22-Dec-2014 15:09 1M
526-FasterExplicitFormulasforComputingPairingso..> 22-Dec-2014 15:09 589K
527-TheDigitalSignatureSchemeMQQSIG.pdf 22-Dec-2014 15:09 104K
528-ConstantRoundPrivateFunctionEvaluationwithL..> 22-Dec-2014 15:09 257K
529-GeneratingPairingfriendlyParametersfortheCM..> 22-Dec-2014 15:09 200K
530-HowtoReadaSignature.pdf 22-Dec-2014 15:09 754K
531-ComparisonofsevenSHA3candidatessoftwareimpl..> 22-Dec-2014 15:09 209K
532-A3SubsetMeetintheMiddleAttackCryptanalysiso..> 22-Dec-2014 15:09 148K
533-DeterministicPublicKeyEncryptionRevisited.pdf 20-Jan-2023 14:20 207
534-BalancedBooleanFunctionswithOptimumAlgebrai..> 22-Dec-2014 15:09 126K
535-LinearAnalysisofReducedRoundCubeHash.pdf 22-Dec-2014 15:09 150K
536-OnTheImpactofTargetTechnologyinSHA3Hardware..> 22-Dec-2014 15:09 831K
537-MeetintheMiddleAttackon8RoundsoftheAESBlock..> 22-Dec-2014 15:09 296K
538-RotationalReboundAttacksonReducedSkein.pdf 22-Dec-2014 15:09 276K
539-IndifferentiableDeterministicHashingtoEllip..> 22-Dec-2014 15:09 433K
540-RationalSecretSharingwithSideInformationinP..> 22-Dec-2014 15:09 263K
541-OnetimeComputableandUncomputableFunctions.pdf 22-Dec-2014 15:09 536K
542-Squaringincyclotomicsubgroups.pdf 22-Dec-2014 15:09 895K
542-Squaringincyclotomicsubgroups.ps 22-Dec-2014 15:08 1M
543-FunctionalEncryptionDefinitionsandChallenge..> 22-Dec-2014 15:08 369K
544-SemanticSecurityUnderRelatedKeyAttacksandAp..> 22-Dec-2014 15:08 296K
545-OptimalXORbased2nVisualCryptographySchemes.pdf 22-Dec-2014 15:08 420K
546-TimedEncryptionandItsApplication.pdf 22-Dec-2014 15:08 250K
546-TimedEncryptionandItsApplication.ps 22-Dec-2014 15:08 830K
547-SymmetrickeySearchablekeywordConcealmentSSC..> 20-Jan-2023 14:20 207
548-SHA512256.pdf 22-Dec-2014 15:08 206K
549-ANovelNoninteractiveDeniableAuthenticationP..> 22-Dec-2014 15:08 593K
550-IsogeniesandCryptography.pdf 22-Dec-2014 15:08 488K
551-ANoteontheRelationbetweentheDefinitionsofSe..> 22-Dec-2014 15:08 62K
552-ANoteonZeroKnowledgeProofsofKnowledgeandthe..> 22-Dec-2014 15:08 97K
553-StronglySecureCertificateBasedEncryptionSch..> 20-Jan-2023 14:20 207
554-CryptanalysisofaFastEncryptionSchemeforData..> 22-Dec-2014 15:08 170K
555-RNSarithmeticinmathbbF_pkandapplicationtofa..> 22-Dec-2014 15:08 261K
556-DefinitionalIssuesinFunctionalEncryption.pdf 22-Dec-2014 15:08 128K
557-ADigitalSignatureBasedonMultivariatePolynom..> 20-Jan-2023 14:20 207
558-SolvingLWEproblemwithboundederrorsinpolynom..> 22-Dec-2014 15:08 113K
559-OptimalEtaPairingonSupersingularGenus2Binar..> 22-Dec-2014 15:08 525K
560-OnCCASecureFullyHomomorphicEncryption.pdf 22-Dec-2014 15:08 278K
561-PasswordProtectedSecretSharing.pdf 22-Dec-2014 15:08 466K
561-PasswordProtectedSecretSharing.ps 22-Dec-2014 15:08 1M
562-HowtoLeakonKeyUpdates.pdf 22-Dec-2014 15:08 422K
563-FullySecureFunctionalEncryptionwithGeneralR..> 22-Dec-2014 15:08 992K
564-CryptographicRandomnessTestingofBlockCipher..> 22-Dec-2014 15:08 110K
565-SelfProtectingElectronicMedicalRecordsUsing..> 22-Dec-2014 15:08 2M
566-BlockcipherbasedDoublelengthHashFunctionsfo..> 22-Dec-2014 15:07 195K
567-ONDILLON39SCLASSHOFBENTFUNCTIONSNIHOBENTFUN..> 20-Jan-2023 08:34 251K
567-ONDILLONSCLASSHOFBENTFUNCTIONSNIHOBENTFUNCT..> 22-Dec-2014 15:07 207K
567-ONDILLONSCLASSHOFBENTFUNCTIONSNIHOBENTFUNCT..> 22-Dec-2014 15:07 251K
568-EfficientTwoMoveBlindSignaturesintheCommonR..> 22-Dec-2014 15:07 252K
569-PracticalNearCollisionsandCollisionsonRound..> 22-Dec-2014 15:07 704K
570-BreakingGrain128withDynamicCubeAttacks.pdf 22-Dec-2014 15:07 187K
571-SingleCoreImplementationofBlueMidnightWishH..> 22-Dec-2014 15:07 1M
572-Cryptanalysisofsplaytreebasedencryption.pdf 22-Dec-2014 15:07 141K
573-OnpermutationpolynomialsEAequivalenttothein..> 22-Dec-2014 15:07 217K
574-CryptanalysisofPRESENTlikecipherswithsecret..> 22-Dec-2014 15:07 370K
575-ADiscreteLogarithmAttackonEllipticCurves.pdf 22-Dec-2014 15:07 265K
576-EfficientHashingusingtheAESInstructionSet.pdf 22-Dec-2014 15:07 571K
577-DiscreteLogarithmsDiffieHellmanandReduction..> 22-Dec-2014 15:07 202K
578-L1AnIntermediateLanguageforMixedProtocolSec..> 22-Dec-2014 15:07 304K
579-ConstructionofHighlyNonlinearResilientBoole..> 22-Dec-2014 15:07 143K
580-TheCubeAttackonStreamCipherTriviumandQuadra..> 22-Dec-2014 15:07 120K
581-FastAlgorithmtosolveafamilyofSISproblemwith..> 22-Dec-2014 15:07 125K
582-SecretKeyLeakagefromPublicKeyPerturbationof..> 22-Dec-2014 15:07 262K
583-ImprovedPreimageAttackonOneblockMD4.pdf 22-Dec-2014 15:07 342K
584-VMCryptModularSoftwareArchitectureforScalab..> 22-Dec-2014 15:07 143K
585-Smallerdecodingexponentsballcollisiondecodi..> 22-Dec-2014 15:07 374K
586-EnhancedFPGAImplementationoftheHummingbirdC..> 22-Dec-2014 15:06 841K
587-GroupMessageAuthentication.pdf 22-Dec-2014 15:06 515K
588-ImprovedCollisionsforReducedECHO256.pdf 22-Dec-2014 15:06 417K
589-HigherorderdifferentialpropertiesofKeccakan..> 22-Dec-2014 15:06 262K
589-HigherorderdifferentialpropertiesofKeccakan..> 22-Dec-2014 15:06 774K
590-BeyondtheLimitsofDPACombinedSideChannelColl..> 22-Dec-2014 15:06 2M
591-BonsaiTreesorHowtoDelegateaLatticeBasis.pdf 22-Dec-2014 15:06 608K
592-BetterKeySizesandAttacksforLWEBasedEncrypti..> 20-Jan-2023 08:34 457K
593-DifferentialAttackonFiveRoundsoftheSC2000Bl..> 22-Dec-2014 15:06 178K
594-CacheGamesBringingAccessBasedCacheAttackson..> 22-Dec-2014 15:06 733K
595-AttributeBasedSignatures.pdf 22-Dec-2014 15:06 386K
596-SolvingSystemsofMultivariateQuadraticEquati..> 22-Dec-2014 15:06 530K
597-ANewClassofBentNegabentBooleanFunctions.pdf 22-Dec-2014 15:06 334K
598-ABroadcastAttackagainstNTRUUsingDing39sAlgo..> 20-Jan-2023 08:34 134K
598-ABroadcastAttackagainstNTRUUsingDingsAlgori..> 22-Dec-2014 15:06 134K
599-SecureMultipartyComputationwithPartialFairn..> 22-Dec-2014 15:06 239K
599-SecureMultipartyComputationwithPartialFairn..> 22-Dec-2014 15:06 391K
600-ExactEfficientandInformationTheoreticallySe..> 22-Dec-2014 15:06 258K
601-FastEndomorphismforanyGenus2HyperellipticCu..> 22-Dec-2014 15:06 131K
602-AnImprovedAlgebraicAttackonHamsi256.pdf 22-Dec-2014 15:06 243K
603-CryptanalysisofDualCRTRSA.pdf 22-Dec-2014 15:06 342K
604-OnFunctionalDecompositionofMultivariatePoly..> 22-Dec-2014 15:06 207K
604-OnFunctionalDecompositionofMultivariatePoly..> 22-Dec-2014 15:06 414K
605-ACloserLookatKeyboardAcousticEmanationsRand..> 22-Dec-2014 15:06 270K
606-WeaknessoftwoIDbasedremotemutualauthenticat..> 22-Dec-2014 15:06 173K
607-HowtoImproveReboundAttacks.pdf 22-Dec-2014 15:06 650K
608-ANewModelofBinaryEllipticCurveswithFastArit..> 22-Dec-2014 15:05 272K
609-TheRoundComplexityofGeneralVSS.pdf 22-Dec-2014 15:05 251K
609-TheRoundComplexityofGeneralVSS.ps 22-Dec-2014 15:05 498K
610-SeparatingSuccinctNonInteractiveArgumentsFr..> 22-Dec-2014 15:05 386K
611-StatisticalAnalysisofReducedRoundCompressio..> 22-Dec-2014 15:05 246K
612-CryptanalysisofHummingbird1.pdf 20-Jan-2023 08:34 114K
613-BetterKeySizesandAttacksforLWEBasedEncrypti..> 22-Dec-2014 15:05 457K
614-AnEvaluationofHashFunctionsonaPowerAnalysis..> 22-Dec-2014 15:05 248K
615-UsingEquivalenceClassestoAccelerateSolvingt..> 22-Dec-2014 15:05 384K
616-Anonuniformbirthdayproblemwithapplicationst..> 22-Dec-2014 15:05 207K
617-ComputingDiscreteLogarithmsinanInterval.pdf 22-Dec-2014 15:05 207K
618-AForgeryAttackontheCandidateLTEIntegrityAlg..> 22-Dec-2014 15:05 251K
619-FurtherObservationsonCertificateBaseEncrypt..> 22-Dec-2014 15:05 258K
620-IdentitybasedDigitalSignatureSchemeWithoutB..> 20-Jan-2023 08:34 74K
621-GenericCompilersforAuthenticatedKeyExchange..> 22-Dec-2014 15:05 344K
622-Anewresultonthedistinctnessofprimitiveseque..> 22-Dec-2014 15:05 207K
623-CryptanalysisofSkein.pdf 22-Dec-2014 15:05 815K
624-NoleakauthenticationbytheSherlockHolmesmeth..> 22-Dec-2014 15:05 182K
625-AttackingandfixingHeliosAnanalysisofballots..> 22-Dec-2014 15:05 621K
626-PublicKeyEncryptionwithFuzzyKeywordSearchAP..> 22-Dec-2014 15:05 286K
627-SecureandEfficientProtocolsforIrisandFinger..> 22-Dec-2014 15:05 268K
627-SecureandEfficientProtocolsforIrisandFinger..> 22-Dec-2014 15:05 796K
628-StateconvergenceandkeyspacereductionoftheMi..> 22-Dec-2014 15:05 281K
629-OntheSecurityofHashFunctionsEmployingBlockc..> 22-Dec-2014 15:05 355K
630-DivisonPolynomialsforAlternateModelsofEllip..> 22-Dec-2014 15:05 354K
631-BlackboxpropertyofCryptographicHashFunction..> 22-Dec-2014 15:05 329K
632-Efficientandprovablysecurecertificatelesssi..> 22-Dec-2014 15:05 119K
633-LowDataComplexityAttacksonAES.pdf 22-Dec-2014 15:05 357K
634-ROTIVRFIDOwnershipTransferwithIssuerVerific..> 22-Dec-2014 15:04 311K
635-AnEfficientandInformationTheoreticallySecur..> 20-Jan-2023 14:20 207
636-DifferentialFaultAnalysisofAESusingaSingleM..> 22-Dec-2014 15:04 195K
636-DifferentialFaultAnalysisofAESusingaSingleM..> 22-Dec-2014 15:04 1M
637-BreakingAnIdentityBasedEncryptionSchemebase..> 22-Dec-2014 15:04 369K
638-OnePassHMQVandAsymmetricKeyWrapping.pdf 22-Dec-2014 15:04 350K
639-EnumeratingResultsofHomogeneousRotationover..> 20-Jan-2023 14:20 207
640-Shortcollusionsecurefingerprintcodesagainst..> 22-Dec-2014 15:04 292K
640-Shortcollusionsecurefingerprintcodesagainst..> 22-Dec-2014 15:04 577K
641-AnewalgorithmforcomputingGroebnerbases.pdf 22-Dec-2014 15:04 307K
642-MoreInsightsonBlockcipherBasedHashFunctions..> 22-Dec-2014 15:04 241K
643-ConstructMD5CollisionsUsingJustASingleBlock..> 22-Dec-2014 15:04 41K
644-APracticalPlatformforCubeAttacklikeCryptana..> 22-Dec-2014 15:04 410K
645-ATimedLogicforModelingandReasoningaboutSecu..> 22-Dec-2014 15:04 453K
646-StatisticalAnalysisofSecondOrderDifferentia..> 22-Dec-2014 15:04 312K
647-ImprovedNguyenVidickHeuristicSieveAlgorithm..> 22-Dec-2014 15:04 296K
648-UniquenessisaDifferentStoryImpossibilityofV..> 22-Dec-2014 15:04 450K
649-Strongerdifficultynotionsforclientpuzzlesan..> 22-Dec-2014 15:04 571K
650-CryptanalysisoftheRSASubgroupAssumptionfrom..> 22-Dec-2014 15:04 343K
651-OntheImpossibilityofInstantiatingPSSintheSt..> 22-Dec-2014 15:04 280K
652-ActiveDomainExpansionforNormalNarrowpipeHas..> 22-Dec-2014 15:04 265K
653-Cubicgroups.pdf 22-Dec-2014 15:04 141K
654-CompletenessTheoremswithConstructiveProofsf..> 22-Dec-2014 15:04 644K
655-OntheAffineEquivalenceandNonlinearityPreser..> 22-Dec-2014 15:04 170K
655-OntheAffineEquivalenceandNonlinearityPreser..> 22-Dec-2014 15:04 709K
656-ANoteonConstantRoundZeroKnowledgeProofsofKn..> 22-Dec-2014 15:04 376K
657-OnsmallsecretkeyattackagainstRSAwithhighbit..> 22-Dec-2014 15:03 228K
658-ABCANewFrameworkforBlockCiphers.pdf 22-Dec-2014 15:03 241K
659-PracticalAffiliationHidingAuthenticationfro..> 22-Dec-2014 15:03 321K
660-IdentificationofMultipleInvalidPairingbased..> 22-Dec-2014 15:03 257K
661-SecurityEvaluationofMISTYStructurewithSPNRo..> 22-Dec-2014 15:03 263K