Index of /2011/
../
001-PracticalFrameworksForhOutOfnObliviousTrans..> 22-Dec-2014 11:03 472K
002-AZeroOneLawforSecureMultiPartyComputationwi..> 22-Dec-2014 11:03 529K
003-OnthecorrectuseofthenegationmapinthePollard..> 22-Dec-2014 11:03 467K
004-Alowmemoryalgorithmforfindingshortproductre..> 22-Dec-2014 11:03 306K
005-Isprivacycompatiblewithtruthfulness.pdf 22-Dec-2014 11:02 490K
006-ExploringtheLimitsofCommonCoinsUsingFrontie..> 22-Dec-2014 11:02 357K
007-KISSABitTooSimple.pdf 22-Dec-2014 11:02 295K
008-ComputingEllipticCurveDiscreteLogarithmswit..> 22-Dec-2014 11:02 166K
009-ProgressionFreeSetsandSublinearPairingBased..> 22-Dec-2014 11:02 510K
010-StructuredEncryptionandControlledDisclosure..> 22-Dec-2014 11:02 472K
011-AftertheFactLeakageinPublicKeyEncryption.pdf 22-Dec-2014 11:02 348K
012-MinimizingNoninteractiveZeroKnowledgeProofs..> 22-Dec-2014 11:02 291K
013-SecureMessageTransmissionInAsynchronousDire..> 22-Dec-2014 11:02 288K
014-UnconditionallyReliableMessageTransmissioni..> 22-Dec-2014 11:02 194K
015-Exponentialattackson6roundLubyRackoffandon5..> 20-Jan-2023 14:20 207
016-AnAnonymousHealthCareSystem.pdf 22-Dec-2014 11:02 138K
017-NewImpossibleDifferentialAttacksofReducedRo..> 22-Dec-2014 11:02 467K
018-HomomorphicSignaturesforPolynomialFunctions..> 22-Dec-2014 11:02 494K
019-CollisionResistanceoftheJHHashFunction.pdf 22-Dec-2014 11:02 105K
020-CoverandDecompositionIndexCalculusonEllipti..> 22-Dec-2014 11:02 398K
021-FullySecureAnonymousHierarchicalIdentityBas..> 22-Dec-2014 11:02 385K
022-CryptanalysiswithTernaryDifferenceAppliedto..> 22-Dec-2014 11:02 249K
023-ImprovedzerosumdistinguisherforfullroundKec..> 22-Dec-2014 11:02 212K
024-Secureevaluationofpolynomialusingprivacyrin..> 22-Dec-2014 11:02 85K
025-SupportingPublicationandSubscriptionConfide..> 22-Dec-2014 11:02 533K
026-PrivateDiscoveryofCommonSocialContacts.pdf 22-Dec-2014 11:02 284K
027-SimpleandEfficientSingleRoundAlmostPerfectl..> 22-Dec-2014 11:02 458K
028-TheParazoaFamilyGeneralizingtheSpongeHashFu..> 22-Dec-2014 11:02 631K
029-OutlineofaproposalrespondingtoEUandUScallsf..> 22-Dec-2014 11:02 314K
029-OutlineofaproposalrespondingtoEUandUScallsf..> 22-Dec-2014 11:01 895K
030-FastEllipticCurveCryptographyUsingOptimalDo..> 22-Dec-2014 11:01 363K
030-FastEllipticCurveCryptographyUsingOptimalDo..> 22-Dec-2014 11:01 1M
031-EfficientUnconditionalAsynchronousByzantine..> 22-Dec-2014 11:01 604K
032-CorrigendumtoTheCubeAttackonStreamCipherTri..> 22-Dec-2014 11:01 326K
033-TheGeometryofFlexTangentstoaCubicCurveandit..> 22-Dec-2014 11:01 226K
033-TheGeometryofFlexTangentstoaCubicCurveandit..> 22-Dec-2014 11:01 1M
034-SecureAuthenticationfromaWeakKeyWithoutLeak..> 22-Dec-2014 11:01 441K
035-ANewFamilyofImplicitlyAuthenticatedDiffieHe..> 22-Dec-2014 11:01 338K
036-TheComplexityAnalysisoftheMutantXLFamily.pdf 20-Jan-2023 14:20 207
037-HigherOrderDifferentialAttackonReducedSHA25..> 22-Dec-2014 11:01 379K
038-ColdBootKeyRecoverybySolvingPolynomialSyste..> 22-Dec-2014 11:01 356K
039-FastQuadruplingofaPointinEllipticCurveCrypt..> 22-Dec-2014 11:01 61K
039-Fastpointquadruplingonellipticcurves.pdf 20-Jan-2023 08:34 61K
040-SimpleandExactFormulaforMinimumLoopLengthin..> 22-Dec-2014 11:01 150K
041-ReclaimingPrivacyforSmartphoneApplicationsR..> 22-Dec-2014 11:01 248K
041-ReclaimingPrivacyforSmartphoneApplicationsR..> 22-Dec-2014 11:01 715K
042-Computingendomorphismringsofellipticcurvesu..> 22-Dec-2014 11:01 376K
043-ProxyBlindMultisignatureSchemeusingECCforha..> 22-Dec-2014 11:01 160K
044-FastScalarMultiplicationinECCusingTheMultib..> 22-Dec-2014 11:01 145K
045-PrivateIdentificationAuthenticationandKeyAg..> 22-Dec-2014 11:01 417K
046-LowerandUpperBoundsforDeniablePublicKeyEncr..> 22-Dec-2014 11:01 373K
047-Constructingdifferential4uniformpermutation..> 22-Dec-2014 11:01 191K
048-AnonAbelianfactorizationproblemandanassocia..> 22-Dec-2014 11:00 253K
049-UnboundedHIBEandAttributeBasedEncryption.pdf 22-Dec-2014 11:00 400K
050-AuthenticatedKeyExchangewithSynchronizedSta..> 20-Jan-2023 14:20 207
051-TowardsStrongAdaptiveCorruptionSecurityofAu..> 20-Jan-2023 14:20 207
052-RevocableAttributeBasedSignatureswithAdapti..> 22-Dec-2014 11:00 235K
052-RevocableAttributeBasedSignatureswithAdapti..> 22-Dec-2014 11:00 499K
053-AdaptivePseudoFreeGroupsandApplications.pdf 22-Dec-2014 11:00 306K
054-NonApplicabilityofPseudobasisforDesigningPe..> 20-Jan-2023 14:20 207
055-OnEnumerationofPolynomialEquivalenceClasses..> 22-Dec-2014 11:00 279K
056-SpectralCoherenceAnalysisFirstExperimentalR..> 22-Dec-2014 11:00 596K
057-AnotherLookatRSASignaturesWithAffinePadding..> 22-Dec-2014 11:00 326K
058-SupplementalAccessControlPACEv2SecurityAnal..> 22-Dec-2014 11:00 376K
059-ExtendingBabystepGiantstepalgorithmforFACTO..> 22-Dec-2014 11:00 213K
060-AGroupSignatureSchemefromLatticeAssumptions..> 22-Dec-2014 11:00 372K
061-CryptanalysisofSomeProtocolsforRFIDSystems.pdf 22-Dec-2014 11:00 76K
061-CryptanalysisofSomeProtocolsforRFIDSystems.ps 22-Dec-2014 11:00 515K
062-CryptanalysisandSecurityEnhancementofanAdva..> 22-Dec-2014 11:00 109K
063-SecretKeysfromChannelNoise.pdf 22-Dec-2014 11:00 551K
063-SecretKeysfromChannelNoise.ps 22-Dec-2014 11:00 3M
064-CryptographicTreatmentofPrivateUserProfiles..> 22-Dec-2014 11:00 255K
065-FullySimulatableQuantumSecureCoinFlippingan..> 22-Dec-2014 11:00 548K
066-DeniableEncryptionwithNegligibleDetectionPr..> 22-Dec-2014 11:00 296K
067-OntheDistributionoftheSubsetSumPseudorandom..> 22-Dec-2014 11:00 183K
068-RationalSecretSharingwithHonestPlayersovera..> 22-Dec-2014 11:00 191K
068-RationalSecretSharingwithHonestPlayersovera..> 22-Dec-2014 11:00 369K
069-ConstantRoundsLinearMultipartyComputationfo..> 22-Dec-2014 11:00 515K
070-Rationalauthenticationprotocols.pdf 22-Dec-2014 11:00 95K
071-InformationtheoreticBoundsforDifferentially..> 22-Dec-2014 11:00 206K
072-AESVariantsSecureAgainstRelatedKeyDifferent..> 22-Dec-2014 10:59 321K
073-Cryptanalysisofthreematrixbasedkeyestablish..> 22-Dec-2014 10:59 163K
074-Reallyfastsyndromebasedhashing.pdf 22-Dec-2014 10:59 286K
075-ANovelRFIDDistanceBoundingProtocolBasedonPh..> 20-Jan-2023 14:20 207
076-AUnifiedApproachtoCombinatorialKeyPredistri..> 22-Dec-2014 10:59 328K
077-DPALeakageEvaluationandCountermeasurePlugin..> 22-Dec-2014 10:59 734K
078-ALowAreaUnifiedHardwareArchitecturefortheAE..> 22-Dec-2014 10:59 1M
079-IdentitybasedDigitalSignatureSchemeWithoutB..> 22-Dec-2014 10:59 74K
080-TurboCodesCanBeAsymptoticallyInformationThe..> 22-Dec-2014 10:59 140K
081-SecureDatastructuresbasedonMultipartyComput..> 22-Dec-2014 10:59 180K
082-DoesPseudobasisExtendtoGeneralAdversary.pdf 20-Jan-2023 14:20 207
083-Onthenumberofbentfunctionsfromiterativecons..> 22-Dec-2014 10:59 403K
084-TraitorTracingagainstPublicCollaborationFul..> 22-Dec-2014 10:59 221K
085-CoinductionandComputationalSemanticsforPubl..> 20-Jan-2023 14:20 207
086-FaultpropagationPatternBasedDFAonSPNStructu..> 22-Dec-2014 10:59 421K
087-OntheInstantiabilityofHashandSignRSASignatu..> 22-Dec-2014 10:59 375K
088-LeftoverHashLemmaRevisited.pdf 22-Dec-2014 10:59 389K
088-LeftoverHashLemmaRevisited.ps 22-Dec-2014 10:59 1M
089-OctalBentGeneralizedBooleanFunctions.pdf 22-Dec-2014 10:59 343K
090-GenericMethodstoAchieveTighterSecurityReduc..> 22-Dec-2014 10:59 392K
091-ANewApproachtoPracticalActiveSecureTwoParty..> 22-Dec-2014 10:59 574K
091-ANewApproachtoPracticalActiveSecureTwoParty..> 22-Dec-2014 10:59 1M
092-Characterizationoftherelationsbetweeninform..> 22-Dec-2014 10:59 334K
092-Characterizationoftherelationsbetweeninform..> 22-Dec-2014 10:59 935K
093-LinearCryptanalysisUsingMultipleLinearAppro..> 22-Dec-2014 10:59 265K
094-GracefulDegradationinMultiPartyComputation.pdf 22-Dec-2014 10:59 220K
094-GracefulDegradationinMultiPartyComputation.ps 22-Dec-2014 10:59 304K
095-ALREDBluesNewAttacksonAESBasedMAC39s.pdf 20-Jan-2023 08:34 254K
095-ALREDBluesNewAttacksonAESBasedMACs.pdf 22-Dec-2014 10:59 254K
096-ComputingonAuthenticatedData.pdf 22-Dec-2014 10:59 370K
097-FastplayAParallelizationModelandImplementat..> 22-Dec-2014 10:58 704K
098-ComputingDiscreteLogarithmsintheJacobianofH..> 22-Dec-2014 10:58 360K
099-CanCodePolymorphismLimitInformationLeakage.pdf 22-Dec-2014 10:58 2M
100-ANovelGroupSignatureSchemeBasedonMPKC.pdf 22-Dec-2014 10:58 280K
101-LightweightAnonymousAuthenticationwithTLSan..> 22-Dec-2014 10:58 702K
102-OptimalandParallelOnlineMemoryChecking.pdf 22-Dec-2014 10:58 608K
103-CryptographicallySoundSecurityProofforOnDem..> 22-Dec-2014 10:58 196K
104-UnconditionallySecureSignatureSchemesRevisi..> 22-Dec-2014 10:58 331K
105-ExplicitFormulasforRealHyperellipticCurveso..> 22-Dec-2014 10:58 420K
106-CommonRandomnessandSecretKeyCapacitiesofTwo..> 22-Dec-2014 10:58 467K
106-CommonRandomnessandSecretKeyCapacitiesofTwo..> 22-Dec-2014 10:58 4M
107-ThresholdEncryptionintoMultipleCiphertexts.pdf 22-Dec-2014 10:58 308K
108-PracticalSecureandEfficientMultipartyLinear..> 22-Dec-2014 10:58 325K
109-SecureBlindDecryption.pdf 22-Dec-2014 10:58 408K
110-FullyHomomorphicEncryptionovertheBinaryPoly..> 20-Jan-2023 14:20 207
111-GeneralizationsofBentFunctionsASurvey.pdf 22-Dec-2014 10:58 269K
112-Anefficientcertificatelesstwopartyauthentic..> 22-Dec-2014 10:58 146K
113-EfficientTechniquesforPrivacyPreservingShar..> 22-Dec-2014 10:58 365K
114-FullyHomomorphicEncryptionApproximateLattic..> 22-Dec-2014 10:58 403K
115-MultipleDifferentialCryptanalysisTheoryandP..> 22-Dec-2014 10:58 306K
116-Shortoutputuniversalhashfunctionsandtheirus..> 22-Dec-2014 10:58 396K
117-BoundedVectorSignaturesandtheirApplications..> 22-Dec-2014 10:57 286K
118-NewFullyHomomorphicEncryptionovertheInteger..> 22-Dec-2014 10:57 392K
119-MultiplicativeLearningwithErrorsandCryptosy..> 20-Jan-2023 14:20 207
120-Faster2regularinformationsetdecoding.pdf 22-Dec-2014 10:57 301K
121-MorePracticalFullyHomomorphicEncryption.pdf 22-Dec-2014 10:57 282K
122-SecureMultiPartySortingandApplications.pdf 22-Dec-2014 10:57 394K
123-LinearHullswithCorrelationZeroandLinearCryp..> 22-Dec-2014 10:57 221K
124-ANewClassofBiometricsontheBasisofForgottenS..> 22-Dec-2014 10:57 84K
125-AConstructionofANewClassofKnapsackTypePubli..> 22-Dec-2014 10:57 70K
126-TheHummingbird2LightweightAuthenticatedEncr..> 22-Dec-2014 10:57 550K
127-IntegerArithmeticwithoutArithmeticAddition.pdf 22-Dec-2014 10:57 1M
128-TheLigoBlockCipher.pdf 20-Jan-2023 14:20 207
129-DistanceHijackingAttacksonDistanceBoundingP..> 22-Dec-2014 10:57 638K
130-ErgodicTheoryOverF_2T.pdf 22-Dec-2014 10:57 189K
130-ErgodicTheoryOverF_2T.ps 22-Dec-2014 10:57 401K
131-Trapdooronewayfunctionsassociatedwithexpone..> 22-Dec-2014 10:57 193K
132-VerifiableDelegationofComputationoverLargeD..> 22-Dec-2014 10:57 321K
133-FullyHomomorphicSIMDOperations.pdf 22-Dec-2014 10:57 239K
133-FullyHomomorphicSIMDOperations.ps 22-Dec-2014 10:57 648K
134-DifferentiallyPrivateBillingwithRebates.pdf 22-Dec-2014 10:57 239K
134-DifferentiallyPrivateBillingwithRebates.ps 22-Dec-2014 10:57 702K
135-OnisogenyclassesofEdwardscurvesoverfinitefi..> 22-Dec-2014 10:57 369K
136-AFullProofoftheBGWProtocolforPerfectlySecur..> 22-Dec-2014 10:57 902K
137-TowardsaGameTheoreticViewofSecureComputatio..> 22-Dec-2014 10:57 515K
138-ConstantRoundPrivacyPreservingMultisetUnion..> 22-Dec-2014 10:57 182K
138-ConstantRoundPrivacyPreservingMultisetUnion.ps 22-Dec-2014 10:57 642K
139-ShortestLatticeVectorsinthePresenceofGaps.pdf 22-Dec-2014 10:57 262K
140-SomeInstantandPracticalTimeRelatedKeyAttack..> 22-Dec-2014 10:57 360K
141-FastandPrivateComputationofCardinalityofSet..> 22-Dec-2014 10:57 287K
142-AParallelHardwareArchitecturefortheSolution..> 20-Jan-2023 14:20 207
143-ComputingellellisogeniesinpolynomialtimeonJ..> 22-Dec-2014 10:56 472K
144-DeniableEncryptionfromtheMcElieceAssumption..> 20-Jan-2023 14:20 207
145-LinearDiophantineEquationDiscreteLogProblem..> 20-Jan-2023 14:20 207
146-ECDLPonGPU.pdf 22-Dec-2014 10:56 237K
147-TheOptimalLinearSecretSharingSchemeforAnyGi..> 22-Dec-2014 10:56 136K
147-TheOptimalLinearSecretSharingSchemeforAnyGi..> 22-Dec-2014 10:56 244K
148-NearCollisionAttackontheStepReducedCompress..> 22-Dec-2014 10:56 187K
149-GenericSideChannelDistinguishersImprovement..> 22-Dec-2014 10:56 501K
150-ANovelkoutofnObliviousTransferProtocolfromB..> 22-Dec-2014 10:56 396K
151-DirectExponentandScalarMultiplicationClasse..> 22-Dec-2014 10:56 100K
152-APracticalApplicationofDifferentialPrivacyt..> 22-Dec-2014 10:56 226K
153-Lowerboundsofshortestvectorlengthsinrandomk..> 22-Dec-2014 10:56 266K
154-TheBlockCipherVuna.pdf 20-Jan-2023 14:20 207
155-HighspeedHardwareImplementationofRainbowSig..> 20-Jan-2023 14:20 207
156-StrongForwardSecurityinIdentityBasedSigncry..> 22-Dec-2014 10:56 465K
157-SecureComputationontheWebComputingwithoutSi..> 22-Dec-2014 10:56 487K
158-EnhancingDataPrivacyintheCloud.pdf 22-Dec-2014 10:56 398K
159-TheBlockCipherThuca.pdf 20-Jan-2023 14:20 207
160-CryptanalysisofARMADILLO2.pdf 22-Dec-2014 10:56 435K
161-EfficientHardwareImplementationsofBRWPolyno..> 22-Dec-2014 10:56 783K
162-CollisionTimingAttackwhenBreaking42AESASICC..> 22-Dec-2014 10:56 793K
163-ImprovedIntegralAttacksonReducedRoundCamell..> 20-Jan-2023 14:20 207
164-OntherelationbetweentheMXLfamilyofalgorithm..> 22-Dec-2014 10:56 368K
165-ImprovedSideChannelCubeAttacksonPRESENT.pdf 22-Dec-2014 10:56 334K
166-SelectionsInternetVotingwithOvertheShoulder..> 22-Dec-2014 10:56 1M
167-IdentifyingLargeScaleRFIDTagsUsingNonCrypto..> 22-Dec-2014 10:56 243K
168-ACommitmentConsistentProofofaShuffle.pdf 22-Dec-2014 10:56 457K
169-IdentityBasedCryptographyforCloudSecurity.pdf 22-Dec-2014 10:56 140K
170-Softwareimplementationofbinaryellipticcurve..> 22-Dec-2014 10:56 284K
171-Onlowerboundsonsecondordernonliearitiesofbe..> 22-Dec-2014 10:56 282K
172-Theweakpasswordproblemchaoscriticalityanden..> 22-Dec-2014 10:56 2M
173-Anefficientcertificatelessshortsignaturesch..> 20-Jan-2023 14:20 207
174-Onlinesecretsharing.pdf 22-Dec-2014 10:55 214K
175-AnalysisofreducedSHAvite3256v2.pdf 22-Dec-2014 10:55 509K
176-AFPGApairingimplementationusingtheResidueNu..> 22-Dec-2014 10:55 454K
177-DynamicMDSMatricesforSubstantialCryptograph..> 22-Dec-2014 10:55 133K
178-DifferentialFaultAnalysisofAESTowardReducin..> 22-Dec-2014 10:55 1M
179-CompactMcEliecekeysbasedonQuasiDyadicSrivas..> 22-Dec-2014 10:55 195K
180-HighlyEfficientUniversallyComposableCommitm..> 22-Dec-2014 10:55 393K
181-SecurityofPrimeFieldPairingCryptoprocessorA..> 22-Dec-2014 10:55 161K
181-SecurityofPrimeFieldPairingCryptoprocessorA..> 22-Dec-2014 10:55 646K
182-DesignatedConfirmerSignaturesWithUnifiedVer..> 22-Dec-2014 10:55 367K
183-EllipticCurvePointMultiplicationUsingMBNRan..> 20-Jan-2023 14:20 207
184-FortificationofAESwithDynamicMixColumnTrans..> 22-Dec-2014 10:55 185K
185-EfficientandSecureDataStorageOperationsforM..> 22-Dec-2014 10:55 710K
186-Someaspectsofmultivariablesecretsharing.pdf 20-Jan-2023 14:20 207
187-AcceleratingIDbasedEncryptionbasedonTrapdoo..> 22-Dec-2014 10:55 402K
188-PhysicalTuringMachinesandtheFormalizationof..> 22-Dec-2014 10:55 634K
189-SIMPLSystemsasaKeylessCryptographicandSecur..> 22-Dec-2014 10:55 209K
190-SHSSecureHybridSearchbyCombiningDynamicandS..> 22-Dec-2014 10:55 328K
191-OntheSecurityoftheWinternitzOneTimeSignatur..> 22-Dec-2014 10:55 458K
192-ShortandEfficientCertificateBasedSignature.pdf 22-Dec-2014 10:55 209K
193-SecurityAnalysisofLMAPanRFIDAuthenticationP..> 22-Dec-2014 10:55 77K
194-CryptanalysisofChentextitetal39sRFIDAccessC..> 20-Jan-2023 08:34 126K
194-CryptanalysisofChentextitetalsRFIDAccessCon..> 22-Dec-2014 10:55 116K
194-CryptanalysisofChentextitetalsRFIDAccessCon..> 22-Dec-2014 10:55 315K
195-AnIDbasedthreepartyauthenticatedkeyexchange..> 20-Jan-2023 14:20 207
196-AccelerationofCompositeOrderBilinearPairing..> 22-Dec-2014 10:55 411K
197-PublicKeyEncryptionfortheForgetful.pdf 22-Dec-2014 10:55 223K
198-TerminatingBKZ.pdf 22-Dec-2014 10:55 545K
199-AnefficientdeterministictestforKloostermans..> 22-Dec-2014 10:54 198K
200-FairandPrivacyPreservingMultiPartyProtocols..> 22-Dec-2014 10:54 451K
201-ImprovedMeetintheMiddleCryptanalysisofKTANT..> 22-Dec-2014 10:54 192K
202-CyclingAttacksonGCMGHASHandOtherPolynomialM..> 22-Dec-2014 10:54 318K
203-Keyagreementbasedonhomomorphismsofalgebraic..> 22-Dec-2014 10:54 220K
203-Keyagreementbasedonhomomorphismsofalgebraic..> 22-Dec-2014 10:54 640K
204-LeakageTolerantInteractiveProtocols.pdf 22-Dec-2014 10:54 670K
205-Grouporientedringsignature.pdf 22-Dec-2014 10:54 61K
206-IsomorphismclassesofEdwardscurvesoverfinite..> 22-Dec-2014 10:54 271K
207-ProofsofOwnershipinRemoteStorageSystems.pdf 22-Dec-2014 10:54 426K
208-DirectConstructionsofBidirectionalProxyReEn..> 22-Dec-2014 10:54 369K
208-DirectConstructionsofBidirectionalProxyReEn..> 22-Dec-2014 10:54 1M
209-BetterSecurityforDeterministicPublicKeyEncr..> 22-Dec-2014 10:54 333K
210-Thepreimagesecurityofdoubleblocklengthcompr..> 22-Dec-2014 10:54 200K
211-SecurityEvaluationofGOST2814789InViewOfInte..> 22-Dec-2014 10:54 179K
212-MaioranaMcFarlandFunctionswithHighSecondOrd..> 22-Dec-2014 10:54 252K
213-OnCipherDependentRelatedKeyAttacksintheIdea..> 22-Dec-2014 10:54 420K
214-Onidentities3939names3939NAMES3939ROLES3939..> 20-Jan-2023 08:34 135K
214-OnidentitiesnamesNAMESROLESandSecurityAMani..> 22-Dec-2014 10:54 135K
215-DelegatableHomomorphicEncryptionwithApplica..> 22-Dec-2014 10:54 390K
216-ProvablySecureGroupKeyManagementApproachBas..> 22-Dec-2014 10:54 193K
217-IdentityBasedDeterministicSignatureSchemeWi..> 22-Dec-2014 10:54 234K
218-CryptographicAnalysisofAll4x4BitSBoxes.pdf 22-Dec-2014 10:54 303K
219-OntheSecurityofTLSDHEintheStandardModel.pdf 22-Dec-2014 10:54 491K
220-FrameworkforSecurityProofsforOndemandRoutin..> 22-Dec-2014 10:54 190K
221-ProtectingDriveEncryptionSystemsAgainstMemo..> 22-Dec-2014 10:54 320K
222-SequentialAggregateSignatureswithLazyVerifi..> 22-Dec-2014 10:54 790K
223-APerfectlyBindingCommitmentSchemeAgainstQua..> 22-Dec-2014 10:54 254K
224-CryptanalysisandImprovementofanEfficientCCA..> 22-Dec-2014 10:53 163K
225-ASimpleandEfficientNewGroupKeyManagementApp..> 22-Dec-2014 10:53 380K
226-Substitutionpermutationnetworkspseudorandom..> 22-Dec-2014 10:53 324K
227-Robustparentidentifyingcodesandcombinatoria..> 22-Dec-2014 10:53 217K
228-AFrameworkforPracticalUniversallyComposable..> 22-Dec-2014 10:53 627K
229-RoutingProtocolBasedSharedandSessionKeyExch..> 22-Dec-2014 10:53 161K
230-AllButManyLossyTrapdoorFunctions.pdf 22-Dec-2014 10:53 504K
231-HistoryFreeSequentialAggregateSignatures.pdf 22-Dec-2014 10:53 441K
232-RemoteTimingAttacksareStillPractical.pdf 22-Dec-2014 10:53 348K
233-CorrelatedInputSecureHashFunctions.pdf 22-Dec-2014 10:53 482K
234-CommentsonasecuredynamicIDbasedremoteuserau..> 22-Dec-2014 10:53 231K
235-ComputerAidedDecisionMakingwithTrustRelatio..> 22-Dec-2014 10:53 697K
236-UsingTemplatestoDistinguishMultiplicationsf..> 22-Dec-2014 10:53 255K
237-TheblockcipherNSABCpublicdomain.pdf 22-Dec-2014 10:53 461K
238-AttacksOnaDoubleLengthBlockcipherbasedHashP..> 22-Dec-2014 10:53 214K
239-EfficientSoftwareImplementationsofModularEx..> 22-Dec-2014 10:53 553K
240-UniversalComposabilityfromEssentiallyAnyTru..> 22-Dec-2014 10:53 601K
241-ANovelAdaptiveProactiveSecretSharingwithout..> 22-Dec-2014 10:53 144K
242-CryptanalysisofKeeLoqcodehoppingusingaSingl..> 22-Dec-2014 10:53 696K
243-AffinePairingsonARM.pdf 22-Dec-2014 10:53 169K
244-PRISMPrivacyPreservingSearchinMapReduce.pdf 22-Dec-2014 10:53 408K
245-OntheNumberofCarriesOccuringinanAdditionmod..> 22-Dec-2014 10:53 858K
246-AFrameworkforSecureSingleSignOn.pdf 22-Dec-2014 10:53 338K
247-AnUltraEfficientKeyRecoveryAttackontheLight..> 22-Dec-2014 10:53 263K
248-FastPasswordRecoveryAttackApplicationtoAPOP..> 22-Dec-2014 10:52 307K
249-Breakingacertificatelesskeyagreementprotoco..> 20-Jan-2023 14:20 207
250-AParallelRepetitionTheoremforLeakageResilie..> 22-Dec-2014 10:52 420K
251-ConcurrentlySecureComputationinConstantRoun..> 22-Dec-2014 10:52 464K
252-CryptographySecureAgainstRelatedKeyAttacksa..> 22-Dec-2014 10:52 371K
253-AttackCryptosystemsBasedonHCDLP.pdf 22-Dec-2014 10:52 330K
254-UsingtheCloudtoDetermineKeyStrengths.pdf 22-Dec-2014 10:52 332K
255-HidingthePolicyinCryptographicAccessControl..> 22-Dec-2014 10:52 334K
256-LeakageResilientSecureTwoPartyComputation.pdf 20-Jan-2023 14:20 207
257-SecureMultiPartyComputationofBooleanCircuit..> 22-Dec-2014 10:52 333K
258-AHighSpeedPairingCoprocessorUsingRNSandLazy..> 22-Dec-2014 10:52 442K
259-Commentsonasensornetworkkeyredistributionte..> 22-Dec-2014 10:52 243K
260-SecurityIndistinguishabilityinthePresenceof..> 22-Dec-2014 10:52 2M
260-SecurityampIndistinguishabilityinthePresenc..> 20-Jan-2023 08:34 2M
261-OBSERVATIONAnexplicitformforaclassofsecondp..> 22-Dec-2014 10:52 284K
262-CryptanalysisoftheLightWeightCipherA2U2Redu..> 22-Dec-2014 10:52 271K
263-TheComputationalSquareRootExponentProblemRe..> 22-Dec-2014 10:52 146K
264-RoundOptimalBlindSignatures.pdf 22-Dec-2014 10:52 578K
265-Efficient2RoundGeneralPerfectlySecureMessag..> 20-Jan-2023 08:34 129K
265-Efficient2RoundGeneralPerfectlySecureMessag..> 22-Dec-2014 10:52 129K
266-IdentityBasedDecryption.pdf 22-Dec-2014 10:52 87K
267-MutualPrivateSetIntersectionwithLinearCompl..> 22-Dec-2014 10:52 352K
268-BirthdayForgeryAttackon128EIA3Version15.pdf 22-Dec-2014 10:52 225K
269-AuthenticatedandMisuseResistantEncryptionof..> 22-Dec-2014 10:52 230K
270-ProgrammableHashFunctionsandTheirApplicatio..> 22-Dec-2014 10:52 667K
271-PracticalKeyrecoveryForAllPossibleParameter..> 22-Dec-2014 10:52 377K
272-OutsourcingMultiPartyComputation.pdf 22-Dec-2014 10:52 549K
273-MemoryDelegation.pdf 22-Dec-2014 10:51 798K
274-ASpliceandCutCryptanalysisoftheAES.pdf 20-Jan-2023 14:20 207
275-InvertingtheSquaresystemsisexponential.pdf 22-Dec-2014 10:51 204K
276-AnalysisoftheSSHKeyExchangeProtocol.pdf 22-Dec-2014 10:51 245K
277-FullyHomomorphicEncryptionwithoutBootstrapp..> 22-Dec-2014 10:51 424K
278-ComparingDifferentDefinitionsofSecureSessio..> 22-Dec-2014 10:51 242K
279-FullyHomomorphicEncryptionwithoutSquashingU..> 22-Dec-2014 10:51 409K
280-DDHlikeAssumptionsBasedonExtensionRings.pdf 22-Dec-2014 10:51 463K
281-ComputationalVerifiableSecretSharingRevisit..> 22-Dec-2014 10:51 310K
282-AnExperimentallyVerifiedAttackonFullGrain12..> 22-Dec-2014 10:51 356K
283-TheFaultAttackECDLPRevisited.pdf 22-Dec-2014 10:51 345K
284-OntheSecurityofPPPoENetwork.pdf 20-Jan-2023 14:20 207
285-ExploitingLinearHullinMatsuisAlgorithm1exte..> 22-Dec-2014 10:51 416K
286-BicliquesforPreimagesAttacksonSkein512andth..> 22-Dec-2014 10:51 492K
287-Algebraiccryptanalysisoftheroundreducedands..> 22-Dec-2014 10:51 424K
288-OntheCommunicationComplexityofReliableandSe..> 22-Dec-2014 10:51 216K
289-PollyCrackerRevisited.pdf 22-Dec-2014 10:51 601K
290-SomeResultsConcerningGeneralizedBentFunctio..> 22-Dec-2014 10:51 200K
291-LeakageResilientCoinTossing.pdf 22-Dec-2014 10:51 483K
292-OnNonlinearPolynomialSelectionandGeometricP..> 22-Dec-2014 10:51 132K
293-WeaknessofaSecuredAuthenticationProtocolfor..> 20-Jan-2023 14:20 207
294-SmallPublicKeysandFastVerificationforMultiv..> 22-Dec-2014 10:51 470K
295-CountingPointsonGenus2CurveswithRealMultipl..> 22-Dec-2014 10:51 363K
296-ShortSignaturesFromWeakerAssumptions.pdf 22-Dec-2014 10:51 707K
297-NEWSTATISTICALBOXTESTANDITSPOWER.pdf 22-Dec-2014 10:51 165K
298-Locallimittheoremforlargedeviationsandstati..> 22-Dec-2014 10:51 417K
299-ModesofOperationsforEncryptionandAuthentica..> 22-Dec-2014 10:51 478K
300-OneroundStronglySecureKeyExchangewithPerfec..> 22-Dec-2014 10:50 466K
301-OntheAmortizedComplexityofZeroKnowledgeProt..> 22-Dec-2014 10:50 416K
302-UnivariateSideChannelAttacksandLeakageModel..> 22-Dec-2014 10:50 3M
303-GNUCANewUniversalComposabilityFramework.pdf 22-Dec-2014 10:50 836K
304-AuditingtheAuditorSecureDelegationofAuditin..> 22-Dec-2014 10:50 205K
305-AnewattackonJakobssonHybridMixNet.pdf 22-Dec-2014 10:50 197K
306-GroupLawComputationsonJacobiansofHyperellip..> 22-Dec-2014 10:50 355K
307-Waystorestrictthedifferentialpath.pdf 22-Dec-2014 10:50 462K
308-ProvablySecureandPracticalOnionRouting.pdf 22-Dec-2014 10:50 594K
309-OnConstructingHomomorphicEncryptionSchemesf..> 22-Dec-2014 10:50 407K
310-UniversallyComposableSynchronousComputation..> 22-Dec-2014 10:50 604K
311-TargetedMalleabilityHomomorphicEncryptionfo..> 22-Dec-2014 10:50 284K
312-DifferentialCryptanalysisofGOST.pdf 22-Dec-2014 10:50 194K
313-ErrorfreeMultivaluedBroadcastandByzantineAg..> 22-Dec-2014 10:50 362K
314-TamperProofCircuitsHowtoTradeLeakageforTamp..> 22-Dec-2014 10:50 490K
315-Implementing4DimensionalGLVMethodonGLSEllip..> 22-Dec-2014 10:50 405K
316-SecurityofBlindSignaturesRevisited.pdf 22-Dec-2014 10:50 454K
317-TwoSimpleCodeVerificationVotingProtocols.pdf 22-Dec-2014 10:50 361K
318-ScalarMultiplicationonKoblitzCurvesusingtau..> 22-Dec-2014 10:50 282K
319-StructurePreservingCCASecureEncryptionandIt..> 22-Dec-2014 10:50 365K
319-StructurePreservingCCASecureEncryptionandIt..> 22-Dec-2014 10:50 1M
320-MinimalConnectivityforUnconditionallySecure..> 22-Dec-2014 10:50 281K
321-AFormalApproachtoDistanceBoundingRFIDProtoc..> 22-Dec-2014 10:50 221K
322-AComprehensiveEvaluationofMutualInformation..> 22-Dec-2014 10:49 466K
323-ANewRelatedKeyBoomerangDistinguishingAttack..> 22-Dec-2014 10:49 221K
324-OntheEfficiencyofBitCommitmentReductions.pdf 22-Dec-2014 10:49 200K
325-NewReceiptFreeEVotingSchemeandSelfProvingMi..> 22-Dec-2014 10:49 285K
326-SGCMTheSophieGermainCounterMode.pdf 22-Dec-2014 10:49 186K
327-OntheInsecurityofHashbasedObliviousRAMandaN..> 22-Dec-2014 10:49 266K
328-CryptanalysisoftheSmartVercauterenandGentry..> 22-Dec-2014 10:49 146K
329-HardnessofComputingIndividualBitsforOnewayF..> 22-Dec-2014 10:49 329K
329-HardnessofComputingIndividualBitsforOnewayF..> 22-Dec-2014 10:49 1M
330-SimpleandAsymptoticallyOptimaltCheaterIdent..> 22-Dec-2014 10:49 138K
331-CryptanalysisofChotextitetal39sProtocolAHas..> 20-Jan-2023 08:34 75K
331-CryptanalysisofChotextitetalsProtocolAHashB..> 22-Dec-2014 10:49 76K
331-CryptanalysisofChotextitetalsProtocolAHashB..> 22-Dec-2014 10:49 207K
332-Adepth16circuitfortheAESSbox.pdf 22-Dec-2014 10:49 242K
333-Cryptanalysisofakeyagreementprotocolbasedon..> 22-Dec-2014 10:49 56K
334-OntheEfficientImplementationofPairingBasedP..> 22-Dec-2014 10:49 195K
335-NewlookatimpossibilityresultonDolevYaomodel..> 22-Dec-2014 10:49 187K
336-CryptanalysisofanAuthenticatedKeyAgreementP..> 20-Jan-2023 14:20 207
337-FunctionalReencryptionandCollusionResistant..> 22-Dec-2014 10:49 587K
338-FastandRegularAlgorithmsforScalarMultiplica..> 22-Dec-2014 10:49 447K
339-CarefulwithCompositionLimitationsofIndiffer..> 22-Dec-2014 10:49 485K
340-EncryptingMoreInformationinVisualCryptograp..> 22-Dec-2014 10:49 437K
341-AnImprovedInternetVotingProtocol.pdf 20-Jan-2023 14:20 207
342-ADomainTransformationforStructurePreserving..> 22-Dec-2014 10:49 513K
343-AnotherLookatSecurityDefinitions.pdf 22-Dec-2014 10:49 365K
344-EfficientFullyHomomorphicEncryptionfromStan..> 22-Dec-2014 10:49 522K
345-LBlockALightweightBlockCipher.pdf 22-Dec-2014 10:49 287K
346-StronglySecureOneRoundAuthenticatedKeyExcha..> 22-Dec-2014 10:49 208K
347-Anefficientcertificatelessauthenticatedkeya..> 20-Jan-2023 14:20 207
348-ExtractorsAgainstSideChannelAttacksWeakorSt..> 22-Dec-2014 10:49 1M
349-EfficientMethodsforExploitingFaultsInduceda..> 22-Dec-2014 10:49 4M
350-HBNAnHBlikeprotocolsecureagainstmaninthemid..> 22-Dec-2014 10:48 596K
351-CryptanalysisoftheAA_betaCryptosystembasedo..> 20-Jan-2023 14:20 207
352-BiDeniablePublicKeyEncryption.pdf 22-Dec-2014 10:48 442K
353-HiddenPairofBijectionSignatureScheme.pdf 22-Dec-2014 10:48 331K
354-Acoprocessorforsecureandhighspeedmodularari..> 22-Dec-2014 10:48 453K
355-OntheNonEquivalenceofUCSecurityNotions.pdf 22-Dec-2014 10:48 590K
356-AnEfficientAttackonAllConcreteKKSProposals.pdf 22-Dec-2014 10:48 625K
356-AnEfficientAttackonAllConcreteKKSProposals.ps 22-Dec-2014 10:48 847K
357-GeneralizedLearningProblemsandApplicationst..> 22-Dec-2014 10:48 594K
358-ConstructingaTernaryFCSRwithaGivenConnectio..> 22-Dec-2014 10:48 307K
359-HighEntropyVisualIdenti64257cationforTouchS..> 22-Dec-2014 10:48 574K
359-HighEntropyVisualIdenticationforTouchScreen..> 20-Jan-2023 08:34 574K
360-CertificatelessAggregateSigncryptionSchemes..> 22-Dec-2014 10:48 39K
361-TheExactSecurityofaStatefulIBEandNewCompact..> 22-Dec-2014 10:48 292K
362-PracticallyEfficientProofofRetrievabilityin..> 22-Dec-2014 10:48 584K
363-DynamicGroupBlindSignatures.pdf 20-Jan-2023 14:20 207
364-TheValue4ofBinaryKloostermanSums.pdf 22-Dec-2014 10:48 587K
365-Securityflawsinabiometricsbasedmultiservera..> 22-Dec-2014 10:48 60K
366-HighlyNonlinearBooleanFunctionswithOptimalA..> 22-Dec-2014 10:48 272K
367-DecodingOneOutofMany.pdf 22-Dec-2014 10:48 228K
368-Highspeedhighsecuritysignatures.pdf 22-Dec-2014 10:48 471K
369-StoringSecretsonContinuallyLeakyDevices.pdf 22-Dec-2014 10:48 539K
369-StoringSecretsonContinuallyLeakyDevices.ps 22-Dec-2014 10:48 1M
370-SocioRationalSecretSharingasaNewDirectionin..> 22-Dec-2014 10:48 504K
371-MonoidicCodesinCryptography.pdf 22-Dec-2014 10:47 317K
372-Identitybasedsigncryptionschemeswithoutrand..> 22-Dec-2014 10:47 154K
373-Anefficientcharacterizationofafamilyofhyper..> 22-Dec-2014 10:47 550K
374-RestoringtheDifferentialResistanceofMD6.pdf 22-Dec-2014 10:47 318K
375-Complexityofuniversalaccessstructures.pdf 22-Dec-2014 10:47 142K
376-BackwardUnlinkabilityforaVLRGroupSignatureS..> 22-Dec-2014 10:47 411K
377-ImprovedGeneralizedBirthdayAttack.pdf 22-Dec-2014 10:47 145K
377-ImprovedGeneralizedBirthdayAttack.ps 22-Dec-2014 10:47 482K
378-AgeneralizationoftheLucasadditionchains.pdf 22-Dec-2014 10:47 117K
378-AgeneralizationoftheLucasadditionchains.ps 22-Dec-2014 10:47 352K
379-Cryptanalysisandimprovementofacertificatele..> 22-Dec-2014 10:47 90K
380-AnExplorationoftheKolmogorovSmirnovTestasCo..> 22-Dec-2014 10:47 417K
381-ANovelRFIDAuthenticationProtocolbasedonElli..> 22-Dec-2014 10:47 525K
382-GenericFullySimulatableAdaptiveObliviousTra..> 22-Dec-2014 10:47 498K
383-ArepresentationofthepsylowsubgroupofpermF_p..> 22-Dec-2014 10:47 367K
384-DistributedObliviousRAMforSecureTwoPartyCom..> 22-Dec-2014 10:47 252K
385-EfficientImplementationofGrandCruwithTIC6xP..> 22-Dec-2014 10:47 128K
386-Howtosharesecretssimultaneously.pdf 22-Dec-2014 10:47 133K
387-AnalysisoftheParallelDistinguishedPointTrad..> 22-Dec-2014 10:47 269K
388-ModulusFaultAttacksAgainstRSACRTSignatures.pdf 22-Dec-2014 10:47 488K
389-SpatialEncryption.pdf 22-Dec-2014 10:47 500K
390-OntheVulnerabilityofFPGABitstreamEncryption..> 22-Dec-2014 10:47 2M
391-OnthePortabilityofSideChannelAttacksAnAnaly..> 22-Dec-2014 10:47 78K
392-AnEfficientRationalSecretSharingSchemeBased..> 22-Dec-2014 10:47 214K
393-AnalysisandImprovementofThing39sTimeMemoryT..> 20-Jan-2023 14:20 207
394-AMoreEfficientComputationallySoundNonIntera..> 22-Dec-2014 10:47 617K
395-ImprovedAnonymityforKeyTrees.pdf 22-Dec-2014 10:47 233K
396-FairComputationwithRationalPlayers.pdf 22-Dec-2014 10:46 216K
397-ThenDiffieHellmanProblemanditsApplications.pdf 22-Dec-2014 10:46 257K
397-ThenDiffieHellmanProblemanditsApplications.ps 22-Dec-2014 10:46 421K
398-HardnessofLearningProblemsoverBurnsideGroup..> 22-Dec-2014 10:46 613K
399-CryptanalysisofHFEMultiHFEandVariantsforOdd..> 22-Dec-2014 10:46 548K
400-Onageneralizedcombinatorialconjectureinvolv..> 22-Dec-2014 10:46 402K
401-PseudorandomFunctionsandLattices.pdf 22-Dec-2014 10:46 432K
402-FormalizingGroupBlindSignaturesandPractical..> 22-Dec-2014 10:46 375K
403-AFairEvaluationFrameworkforComparingSideCha..> 22-Dec-2014 10:46 521K
404-Aconstantroundresettablysoundresettablezero..> 22-Dec-2014 10:46 120K
405-CanHomomorphicEncryptionbePractical.pdf 22-Dec-2014 10:46 245K
406-CompositionTheoremsWithoutPreEstablishedSes..> 22-Dec-2014 10:46 674K
407-ObliviousRAMwithOlogN3WorstCaseCost.pdf 22-Dec-2014 10:46 272K
408-ResettableCryptographyinConstantRoundstheCa..> 22-Dec-2014 10:46 322K
409-EfficientPredicateEncryptionSupportingConst..> 22-Dec-2014 10:46 470K
409-Withdrawn.pdf 18-Aug-2023 00:00 207
410-FunctionalEncryptionforInnerProductPredicat..> 22-Dec-2014 10:46 357K
411-Commentsonapasswordauthenticationandupdates..> 22-Dec-2014 10:46 87K
412-AutomaticInsertionofDPACountermeasures.pdf 22-Dec-2014 10:46 426K
413-HigherOrderGlitchesFreeImplementationoftheA..> 22-Dec-2014 10:46 789K
414-FuzzyIdentityBasedEncryptionfromLattices.pdf 22-Dec-2014 10:46 251K
415-OntheAccessStructuresofHyperellipticSecretS..> 22-Dec-2014 10:46 85K
416-EfficientParallelizationofLanczosTypeAlgori..> 22-Dec-2014 10:46 397K
417-NewDataEfficientAttacksonReducedRoundIDEA.pdf 22-Dec-2014 10:46 309K
418-AnefficientRFIDmutualauthenticationschemeba..> 22-Dec-2014 10:46 290K
419-Onthesecurityofacertificatelessshortsignatu..> 20-Jan-2023 08:34 72K
420-UnalignedReboundAttackApplicationtoKeccak.pdf 22-Dec-2014 10:45 484K
420-UnalignedReboundAttackApplicationtoKeccak.ps 22-Dec-2014 10:45 2M
421-SuperpositionAttacksonCryptographicProtocol..> 22-Dec-2014 10:45 473K
422-ImprovedAnalysisofECHO256.pdf 22-Dec-2014 10:45 614K
423-LinearCryptanalysisofPRINTcipherTrailsandSa..> 22-Dec-2014 10:45 387K
424-CryptanalysisofAZUMIanEPCClass1Generation2S..> 22-Dec-2014 10:45 57K
424-CryptanalysisofAZUMIanEPCClass1Generation2S..> 22-Dec-2014 10:45 106K
425-ThwartingHigherOrderSideChannelAnalysiswith..> 22-Dec-2014 10:45 267K
426-CryptanalysisofimprovedYehtextitetal39sauth..> 20-Jan-2023 08:34 65K
426-CryptanalysisofimprovedYehtextitetalsauthen..> 22-Dec-2014 10:45 66K
426-CryptanalysisofimprovedYehtextitetalsauthen..> 22-Dec-2014 10:45 117K
427-AnewattackontheKMOVcryptosystem.pdf 22-Dec-2014 10:45 143K
428-AESFlowInterceptionKeySnoopingMethodonVirtu..> 22-Dec-2014 10:45 190K
429-RoundefficientObliviousDatabaseManipulation..> 22-Dec-2014 10:45 396K
430-AnaloguesofVelu39sFormulasforIsogeniesonAlt..> 20-Jan-2023 08:34 335K
430-AnaloguesofVelusFormulasforIsogeniesonAlter..> 22-Dec-2014 10:45 335K
431-RootsofSquareCryptanalysisofDoubleLayerSqua..> 22-Dec-2014 10:45 402K
432-CiphersthatSecurelyEnciphertheirownKeys.pdf 22-Dec-2014 10:45 255K
432-CiphersthatSecurelyEnciphertheirownKeys.ps 22-Dec-2014 10:45 765K
433-CollusionPreservingComputation.pdf 22-Dec-2014 10:45 620K
434-AnEfficientProtocolforObliviousDFAEvaluatio..> 22-Dec-2014 10:45 416K
435-TheIPSCompilerOptimizationsVariantsandConcr..> 22-Dec-2014 10:45 1M
436-FasterAlgorithmsforApproximateCommonDivisor..> 22-Dec-2014 10:45 306K
437-Approximatecommondivisorsvialattices.pdf 22-Dec-2014 10:45 322K
438-ShortTransitiveSignaturesforDirectedTrees.pdf 22-Dec-2014 10:45 322K
439-OptimalDataAuthenticationfromDirectedTransi..> 22-Dec-2014 10:45 146K
440-PublicKeyCompressionandModulusSwitchingforF..> 22-Dec-2014 10:45 472K
441-FullyHomomorphicEncryptionovertheIntegerswi..> 22-Dec-2014 10:45 536K
442-AnotherLookatTightness.pdf 22-Dec-2014 10:45 279K
443-FromExtractableCollisionResistancetoSuccinc..> 22-Dec-2014 10:44 577K
444-GeneralisedMersenneNumbersRevisited.pdf 22-Dec-2014 10:44 323K
445-PrivacyPreservingFriendSearchoverOnlineSoci..> 22-Dec-2014 10:44 322K
446-PrivacyPreservingFriendSearchoverOnlineSoci..> 20-Jan-2023 14:20 207
446-PrivateInformationExtractionoverOnlineSocia..> 22-Dec-2014 10:44 280K
447-OnVerifyingDynamicMultipleDataCopiesoverClo..> 22-Dec-2014 10:44 612K
448-NonRandomSequencesfromNonRandomPermutations..> 22-Dec-2014 10:44 763K
449-BicliqueCryptanalysisoftheFullAES.pdf 22-Dec-2014 10:44 428K
450-RhashHashFunctionUsingRandomQuadraticPolyno..> 20-Jan-2023 14:20 207
451-Cryptanalysisandimprovementofabiometricsbas..> 22-Dec-2014 10:44 221K
452-TheGoodlowerboundofSecondordernonlinearityo..> 22-Dec-2014 10:44 146K
453-PracticalComplexityDifferentialCryptanalysi..> 22-Dec-2014 10:44 181K
454-ThresholdFullyHomomorphicEncryptionandSecur..> 22-Dec-2014 10:44 426K
455-TheRelationandTransformationbetweenHierarch..> 22-Dec-2014 10:44 370K
456-DelegationofComputationwithoutRejectionProb..> 22-Dec-2014 10:44 445K
457-ResettableStatisticalZeroKnowledge.pdf 22-Dec-2014 10:44 642K
458-SievingforShortestVectorsinIdealLattices.pdf 22-Dec-2014 10:44 371K
459-Sufficientconditionsforsoundhashingusingatr..> 22-Dec-2014 10:44 336K
460-ComputationallySoundSymbolicSecurityReducti..> 22-Dec-2014 10:44 384K
461-SpeedingUpEllipticCurveDiscreteLogarithmCom..> 22-Dec-2014 10:44 176K
462-SecureOutsourcedComputationofIrisMatching.pdf 22-Dec-2014 10:44 371K
463-DecentralizedDynamicBroadcastEncryption.pdf 22-Dec-2014 10:44 525K
464-PrivateandObliviousSetandMultisetOperations..> 22-Dec-2014 10:44 426K
465-AttractiveSubfamiliesofBLSCurvesforImplemen..> 22-Dec-2014 10:44 304K
466-GreenCryptanalysisMeetintheMiddleKeyRecover..> 22-Dec-2014 10:44 1M
467-AewEfficientAsymmetricCryptosystemforlarged..> 22-Dec-2014 10:43 340K
468-FasterScalarMultiplicationonOrdinaryWeierst..> 22-Dec-2014 10:43 302K
469-CryptanalysisofINCrypt32inHID39siCLASSSyste..> 20-Jan-2023 08:33 1M
469-CryptanalysisofINCrypt32inHIDsiCLASSSystems..> 22-Dec-2014 10:43 1M
470-NonmalleablepublickeyencryptioninBRSIMUC.pdf 22-Dec-2014 10:43 137K
471-ImprovedKeyGenerationForGentry39sFullyHomom..> 20-Jan-2023 08:33 216K
471-ImprovedKeyGenerationForGentrysFullyHomomor..> 22-Dec-2014 10:43 216K
472-ForwardSecureRingSignaturewithoutRandomOrac..> 22-Dec-2014 10:43 423K
473-PracticallyEfficientVerifiableDelegationofP..> 22-Dec-2014 10:43 137K
473-PracticallyEfficientVerifiableDelegationofP..> 22-Dec-2014 10:43 345K
474-ImprovedGenericAlgorithmsforHardKnapsacks.pdf 22-Dec-2014 10:43 466K
475-SolvingCircuitOptimisationProblemsinCryptog..> 22-Dec-2014 10:43 180K
476-AnonymousBroadcastEncryptionAdaptiveSecurit..> 22-Dec-2014 10:43 579K
477-CryptanalysisofNTRUwithtwopublickeys.pdf 22-Dec-2014 10:43 141K
478-Anefficientcertificatelessauthenticatedkeya..> 22-Dec-2014 10:43 294K
479-IdentityBasedLossyTrapdoorFunctionsandAppli..> 22-Dec-2014 10:43 418K
480-CompleteTreeSubsetDifferenceBroadcastEncryp..> 22-Dec-2014 10:43 449K
481-ClosetoUniformPrimeNumberGenerationWithFewe..> 22-Dec-2014 10:43 350K
482-SecureComputationwithSublinearAmortizedWork..> 22-Dec-2014 10:43 787K
483-AdaptionofPollard39skangarooalgorithmtotheF..> 20-Jan-2023 08:33 308K
483-AdaptionofPollardskangarooalgorithmtotheFAC..> 22-Dec-2014 10:43 308K
484-XMSSAPracticalForwardSecureSignatureSchemeb..> 22-Dec-2014 10:43 584K
485-AnotherLookatAutomatedTheoremProvingII.pdf 22-Dec-2014 10:43 181K
486-OntheJointSecurityofEncryptionandSignatureR..> 22-Dec-2014 10:43 482K
487-NoiselessDatabasePrivacy.pdf 22-Dec-2014 10:43 378K
488-ASurveyofCryptographyBasedonPhysicallyUnclo..> 22-Dec-2014 10:43 121K
488-ASurveyofCryptographyBasedonPhysicallyUnclo..> 22-Dec-2014 10:43 256K
489-TowardsaTheoryofSecurityEvaluationforGOSTli..> 22-Dec-2014 10:43 223K
489-TowardsaTheoryofSecurityEvaluationforGOSTli..> 22-Dec-2014 10:43 342K
490-ToolsforSimulatingFeaturesofCompositeOrderB..> 22-Dec-2014 10:42 1M
491-CryptanalysisofaPrivacyPreservingCommunicat..> 20-Jan-2023 14:20 207
492-Rationaldistanceboundingprotocolsovernoisyc..> 22-Dec-2014 10:42 840K
493-FromPointObfuscationTo3roundZeroKnowledge.pdf 22-Dec-2014 10:42 432K
494-EfficientRSAKeyGenerationandThresholdPailli..> 22-Dec-2014 10:42 668K
495-VectorCommitmentsandtheirApplications.pdf 22-Dec-2014 10:42 474K
496-OnthePublicIndifferentiabilityandCorrelatio..> 22-Dec-2014 10:42 777K
497-CanaProgramReverseEngineerItself.pdf 22-Dec-2014 10:42 306K
498-AnEfficientSecureAnonymousProxySignatureSch..> 22-Dec-2014 10:42 156K
499-Duplexingthespongesinglepassauthenticateden..> 22-Dec-2014 10:42 411K
500-BicliqueCryptanalysisoftheBlockCipherSQUARE..> 22-Dec-2014 10:42 367K
501-TrapdoorsforLatticesSimplerTighterFasterSma..> 22-Dec-2014 10:42 516K
502-WildMcElieceIncognito.pdf 22-Dec-2014 10:42 334K
503-OntheinfluenceofthealgebraicdegreeofF1onthe..> 20-Jan-2023 08:33 757K
503-OntheinfluenceofthealgebraicdegreeofF87221o..> 22-Dec-2014 10:42 757K
504-FromNonAdaptivetoAdaptivePseudorandomFuncti..> 22-Dec-2014 10:42 383K
505-ANewSecondOrderSideChannelAttackBasedonLine..> 22-Dec-2014 10:42 602K
506-Towardsquantumresistantcryptosystemsfromsup..> 22-Dec-2014 10:42 488K
507-RelativelySoundNIZKsandPasswordBasedKeyExch..> 22-Dec-2014 10:42 402K
508-SecureTwoPartyComputationwithLowCommunicati..> 22-Dec-2014 10:42 236K
509-PolicyEnhancedPrivateSetIntersectionSharing..> 22-Dec-2014 10:42 361K
510-OntheSecurityoftheFreeXORTechnique.pdf 22-Dec-2014 10:42 197K
511-TheCryptographicPowerofRandomSelection.pdf 22-Dec-2014 10:42 432K
512-ADichotomyforLocalSmallBiasGenerators.pdf 22-Dec-2014 10:42 406K
513-NonMalleableZeroKnowledgeBlackBoxConstructi..> 22-Dec-2014 10:41 520K
514-MilderDefinitionsofComputationalApproximabi..> 22-Dec-2014 10:41 393K
515-AgeneralconjecturesimilartoTDconjectureandi..> 22-Dec-2014 10:41 238K
516-ProtectingAESwithShamir39sSecretSharingSche..> 20-Jan-2023 08:33 432K
516-ProtectingAESwithShamirsSecretSharingScheme..> 22-Dec-2014 10:41 432K
517-VerifiabilityPrivacyandCoercionResistanceNe..> 22-Dec-2014 10:41 374K
518-Two1RoundProtocolsforDelegationofComputatio..> 22-Dec-2014 10:41 294K
519-LeakageResilientCryptographyFromtheInnerPro..> 22-Dec-2014 10:41 663K
520-HoussemMaghrebiandSylvainGuilleyandClaudeCa..> 22-Dec-2014 10:41 282K
521-PseudorandomKnapsacksandtheSampleComplexity..> 22-Dec-2014 10:41 568K
522-ACompactSBoxDesignforSMS4BlockCipher.pdf 22-Dec-2014 10:41 772K
523-Securityanalysisofafuzzyidentitybasedencryp..> 20-Jan-2023 14:20 207
524-SecurityofReducedRoundCamelliaagainstImposs..> 22-Dec-2014 10:41 240K
525-ANoteontheDensityoftheMultipleSubsetSumProb..> 22-Dec-2014 10:41 232K
526-UniversallyComposableSecurityAnalysisofOAut..> 22-Dec-2014 10:41 237K
526-UniversallyComposableSecurityAnalysisofOAut..> 22-Dec-2014 10:41 444K
527-SecurityWeaknessesofpasswordonlyauthenticat..> 20-Jan-2023 14:20 207
528-EfficientDelegationBasedAuthenticationProto..> 22-Dec-2014 10:41 159K
529-SecureandEfficientProofofStoragewithDedupli..> 22-Dec-2014 10:41 160K
530-KeyEvolutionSchemesResilienttoSpaceBoundedL..> 22-Dec-2014 10:41 405K
531-StaticFaultAttacksonHardwareDESRegisters.pdf 22-Dec-2014 10:41 2M
532-HashFunctionsBasedonThreePermutationsAGener..> 22-Dec-2014 10:41 679K
533-TwoOutputSecureComputationwithMaliciousAdve..> 22-Dec-2014 10:41 513K
534-FormalAnalysisoftheEntropySecurityTradeoffi..> 22-Dec-2014 10:41 334K
535-MultipartyComputationfromSomewhatHomomorphi..> 22-Dec-2014 10:41 650K
536-RevisitingLowerandUpperBoundsforSelectiveDe..> 22-Dec-2014 10:41 783K
537-LatticeSignaturesWithoutTrapdoors.pdf 22-Dec-2014 10:40 464K
538-LeakageResilientClientsideDeduplicationofEn..> 22-Dec-2014 10:40 670K
539-SignModulesinSecureArithmeticCircuits.pdf 22-Dec-2014 10:40 464K
540-EfficientImplementationoftheeta_TPairingonG..> 22-Dec-2014 10:40 314K
541-MinimalisminCryptographyTheEvenMansourSchem..> 22-Dec-2014 10:40 252K
542-CertificateBasedSigncryptionSecurityModelan..> 22-Dec-2014 10:40 318K
543-AdaptivelyAttributeHidingHierarchicalInnerP..> 22-Dec-2014 10:40 764K
544-DesigningPrivacypreservingSmartMeterswithLo..> 22-Dec-2014 10:40 404K
545-PublicKeyCryptosystemsConstructedBasedonRan..> 22-Dec-2014 10:40 107K
546-HiddenVectorEncryptionFullySecureAgainstUnr..> 22-Dec-2014 10:40 428K
547-TheSingleCycleTfunctions.pdf 22-Dec-2014 10:40 111K
548-OnthesecurityofMQ_DRBG.pdf 22-Dec-2014 10:40 489K
549-1ResilientBooleanFunctionwithOptimalAlgebra..> 22-Dec-2014 10:40 255K
550-ANewDistinguisherforCubeHash8bandCubeHash15..> 22-Dec-2014 10:40 225K
551-SecurityEvaluationagainstDifferentialCrypta..> 22-Dec-2014 10:40 180K
552-RecyclablePUFsLogicallyReconfigurablePUFs.pdf 22-Dec-2014 10:40 517K
553-PubliclyVerifiableProofsofSequentialWork.pdf 22-Dec-2014 10:40 503K
554-Onthesecuritymodelsforcertificatelesssignat..> 22-Dec-2014 10:40 157K
555-OntheRoleofExpanderGraphsinKeyPredistributi..> 22-Dec-2014 10:40 347K
556-GF2nredundantrepresentationusingmatrixembed..> 22-Dec-2014 10:40 126K
557-AnImprovedTraceDrivenInstructionCacheTiming..> 22-Dec-2014 10:40 748K
558-ImprovedAttacksonFullGOST.pdf 22-Dec-2014 10:40 447K
559-InstantiabilityofRSAOAEPunderChosenPlaintex..> 22-Dec-2014 10:40 341K
560-RandomizedSecureTwoPartyComputationforModul..> 22-Dec-2014 10:40 415K
561-ADomainSpecificLanguageforComputingonEncryp..> 22-Dec-2014 10:40 261K
561-ADomainSpecificLanguageforComputingonEncryp..> 22-Dec-2014 10:39 784K
562-AGroupTestingApproachtoImprovedCorruptionLo..> 22-Dec-2014 10:39 401K
563-OntheSecurityofRFIDAntiCloningSecurityProto..> 22-Dec-2014 10:39 211K
563-OntheSecurityofRFIDAntiCloningSecurityProto..> 22-Dec-2014 10:39 952K
564-PrivatekeySymbolicEncryption.pdf 22-Dec-2014 10:39 411K
564-PrivatekeySymbolicEncryption.ps 22-Dec-2014 10:39 3M
565-CryptographicHashFunctionsRecentDesignTrend..> 22-Dec-2014 10:39 1M
566-FullyHomomorphicEncryptionwithPolylogOverhe..> 22-Dec-2014 10:39 518K
567-OnthesparsesubsetsumproblemfromGentryHalevi..> 20-Jan-2023 08:33 250K
567-OnthesparsesubsetsumproblemfromGentryHalevi..> 22-Dec-2014 10:39 250K
568-SingleLayerOpticalscanVotingwithFullyDistri..> 22-Dec-2014 10:39 480K
569-AnalysisoftheHammingWeightoftheExtendedwmbN..> 22-Dec-2014 10:39 173K
570-DegreeofregularityforHFE.pdf 22-Dec-2014 10:39 294K
571-LowerBoundonCoveringRadiusofReedMullerCodes..> 20-Jan-2023 14:20 207
572-TheElGamalcryptosystemovercirculantmatrices..> 22-Dec-2014 10:39 236K
573-ANewClassofMultivariatePublicKeyCryptosyste..> 22-Dec-2014 10:39 124K
574-TowardsEfficientProvableDataPossessioninClo..> 22-Dec-2014 10:39 475K
575-ExclusiveKeyBasedGroupRekeyingProtocols.pdf 22-Dec-2014 10:39 382K
576-EfficientMulticastKeyDistributionUsingHOWPB..> 22-Dec-2014 10:39 620K
577-AnEfficientProtocolfortheCommitProveFairOpe..> 22-Dec-2014 10:39 462K
578-ACCELERATINGTHESCALARMULTIPLICATIONONGENUS2..> 22-Dec-2014 10:39 468K
579-ClockwiseCollisionAnalysisOverlookedSideCha..> 22-Dec-2014 10:39 1M
580-OnanewgeneralizationofHuffcurves.pdf 22-Dec-2014 10:38 385K
581-StandardSecurityDoesNotImplySecurityAgainst..> 22-Dec-2014 10:38 339K
581-StandardSecurityDoesNotImplySecurityAgainst..> 22-Dec-2014 10:38 1M
582-RandomnessExtractioninfinitefieldsmathbbF_p..> 22-Dec-2014 10:38 113K
583-RevocableIdentityBasedEncryptionfromLattice..> 22-Dec-2014 10:38 364K
584-ASingleKeyAttackon6RoundKASUMI.pdf 22-Dec-2014 10:38 139K
585-IrisAScalableCloudFileSystemwithEfficientIn..> 22-Dec-2014 10:38 676K
586-TweLEXATweakedVersionoftheLEXStreamCipher.pdf 22-Dec-2014 10:38 155K
587-SignaturesofCorrectComputation.pdf 22-Dec-2014 10:38 497K
588-AnotherLookatSymmetricIncoherentOptimalEave..> 22-Dec-2014 10:38 323K
589-ImpactofIntel39sNewInstructionSetsonSoftwar..> 20-Jan-2023 08:33 393K
589-ImpactofIntelsNewInstructionSetsonSoftwareI..> 22-Dec-2014 10:38 393K
590-AnEfficientBroadcastAttackagainstNTRU.pdf 22-Dec-2014 10:38 145K
591-AUnifiedFrameworkforSmallSecretExponentAtta..> 22-Dec-2014 10:38 166K
592-GenericConstructionsforVerifiableSigncrypti..> 22-Dec-2014 10:38 330K
592-GenericConstructionsforVerifiableSigncrypti..> 22-Dec-2014 10:38 838K
593-CCASecureIBKEMfromtheComputationalBilinearD..> 22-Dec-2014 10:38 452K
594-ReceiptFreenessofPrtVoterProvablySecure.pdf 22-Dec-2014 10:38 3M
595-EfficientMultiQueryCPIRfromRingLWE.pdf 20-Jan-2023 14:20 207
596-ParallelHomomorphicEncryption.pdf 22-Dec-2014 10:38 492K
597-HowtoDelegateandVerifyinPublicVerifiableCom..> 22-Dec-2014 10:38 202K
598-NewSubexponentialAlgorithmsforFactoringinSL..> 22-Dec-2014 10:38 222K
599-EfficientPasswordBasedAuthenticatedKeyExcha..> 20-Jan-2023 14:20 207
600-ANewClassofHyperbentBooleanFunctionswithMul..> 22-Dec-2014 10:38 130K
601-AMultiReceiverIDBasedGeneralizedSigncryptio..> 22-Dec-2014 10:38 107K
602-PositiveResultsforConcurrentlySecureComputa..> 22-Dec-2014 10:38 512K
603-AdvancedZeroSumDistinguishersforthePermutat..> 20-Jan-2023 14:20 207
604-Genus2HyperellipticCurveFamilieswithExplici..> 22-Dec-2014 10:38 557K
605-EfficientandSecureDelegationofLinearAlgebra..> 22-Dec-2014 10:38 511K
606-GF2nSubquadraticPolynomialBasisMultipliersf..> 20-Jan-2023 14:20 207
607-ImprovingAdditiveandMultiplicativeHomomorph..> 22-Dec-2014 10:37 410K
608-FourDimensionalGallantLambertVanstoneScalar..> 22-Dec-2014 10:37 267K
609-ThePHOTONFamilyofLightweightHashFunctions.pdf 22-Dec-2014 10:37 592K
610-AnoptimalKeyEnumerationAlgorithmanditsAppli..> 22-Dec-2014 10:37 611K
611-AdaptiveandConcurrentSecureComputationfromN..> 22-Dec-2014 10:37 527K
612-IBAKEIdentityBasedAuthenticatedKeyExchangeP..> 22-Dec-2014 10:37 309K
613-MultipartyComputationwithLowCommunicationCo..> 22-Dec-2014 10:37 776K
614-OnSecurityofRASPDataPerturbationforSecureHa..> 22-Dec-2014 10:37 174K
614-OnSecurityofRASPDataPerturbationforSecureHa..> 22-Dec-2014 10:37 483K
615-OntheJointSecurityofEncryptionandSignaturei..> 22-Dec-2014 10:37 394K
616-ImpossibleDifferentialCryptanalysisoftheLig..> 22-Dec-2014 10:37 504K
617-CharmAframeworkforRapidlyPrototypingCryptos..> 22-Dec-2014 10:37 1M
618-PracticalRelayAttackonContactlessTransactio..> 22-Dec-2014 10:37 5M
619-MultidimensionalMeetintheMiddleAttackandIts..> 22-Dec-2014 10:37 286K
620-ProvableSecurityofBLAKEwithNonIdealCompress..> 22-Dec-2014 10:37 461K
621-AdaptiveSecurityofConcurrentNonMalleableZer..> 22-Dec-2014 10:37 669K
622-Homomorphicencryptionfromcodes.pdf 22-Dec-2014 10:37 323K
623-IndifferentiabilityoftheHashAlgorithmBLAKE.pdf 22-Dec-2014 10:37 199K
624-NewattacksonKeccak224andKeccak256.pdf 22-Dec-2014 10:37 365K
625-TwoRFIDPrivacyModelsinFrontofaCourt.pdf 20-Jan-2023 14:20 207
626-AlgebraicComplexityReductionandCryptanalysi..> 22-Dec-2014 10:37 940K
627-Anoteonsemibentfunctionswithmultipletracete..> 22-Dec-2014 10:36 509K
628-MaximumLeakageResilientIBEandIPE.pdf 22-Dec-2014 10:36 476K
629-NearLinearUnconditionallySecureMultipartyCo..> 22-Dec-2014 10:36 469K
630-IndifferentiabilitySecurityoftheFastWidePip..> 22-Dec-2014 10:36 1M
631-CheatingHumanVisioninVisualSecretSharing.pdf 22-Dec-2014 10:36 4M
632-AScalableMethodforConstructingGaloisNLFSRsw..> 22-Dec-2014 10:36 95K
633-PracticalrealisationandeliminationofanECCre..> 22-Dec-2014 10:36 339K
634-SecurityofMultipleKeyAgreementProtocolsandP..> 22-Dec-2014 10:36 230K
635-GroestlTweaksandtheirEffectonFPGAResults.pdf 22-Dec-2014 10:36 262K
636-UntanglingRFIDPrivacyModels.pdf 20-Jan-2023 14:20 207
637-RandomNumberGenerationBasedonOscillatoryMet..> 22-Dec-2014 10:36 353K
638-Rubik39sforcryptographers.pdf 20-Jan-2023 08:33 424K
638-Rubiksforcryptographers.pdf 22-Dec-2014 10:36 424K
639-TowardsaProbabilisticComplexitytheoreticMod..> 22-Dec-2014 10:36 464K
639-TowardsaProbabilisticComplexitytheoreticMod..> 22-Dec-2014 10:36 2M
640-HummingbirdPrivacyatthetimeofTwitter.pdf 22-Dec-2014 10:36 431K
641-Collisionfor75stepSHA1IntensiveParallelizat..> 22-Dec-2014 10:36 189K
642-Constructingdifferentially4uniformpermutati..> 22-Dec-2014 10:36 252K
643-SomeWordsAboutCryptographicKeyRecognitionIn..> 22-Dec-2014 10:36 253K
644-McOEAFamilyofAlmostFoolproofOnLineAuthentic..> 22-Dec-2014 10:36 557K
645-FullyHomomorphicEncryptionBasedonApproximat..> 22-Dec-2014 10:36 217K
646-Thesecurityimpactofanewcryptographiclibrary..> 22-Dec-2014 10:35 291K
647-BreakingH2MACUsingBirthdayParadox.pdf 22-Dec-2014 10:35 248K
648-AchievingShortCiphertextsorShortSecretKeysf..> 22-Dec-2014 10:35 398K
649-OntheSecurityofNMACandItsVariants.pdf 22-Dec-2014 10:35 319K
650-FullySecureSpatialEncryptionunderSimpleAssu..> 22-Dec-2014 10:35 429K
651-CHECKEROnsitecheckinginRFIDbasedsupplychain..> 22-Dec-2014 10:35 255K
652-SecurityEnhancementoftheVortexFamilyofHashF..> 22-Dec-2014 10:35 259K
653-AnImprovedCertificatelessAuthenticatedKeyAg..> 20-Jan-2023 14:20 207
654-EllipticCurveCryptographyinJavaScript.pdf 22-Dec-2014 10:35 256K
655-PrivacyPreservingStreamAggregationwithFault..> 22-Dec-2014 10:35 380K
656-UseDatadependFunctionBuildMessageExpansionF..> 22-Dec-2014 10:35 222K
657-ASystematicMethodtoEvaluateandComparethePer..> 22-Dec-2014 10:35 253K
658-Anonymousattestationwithusercontrolledlinka..> 22-Dec-2014 10:35 386K
659-FormallyAssessingCryptographicEntropy.pdf 22-Dec-2014 10:35 1M
660-ProgramObfuscationwithLeakyHardware.pdf 22-Dec-2014 10:35 579K
661-NewImpossibleDifferentialAttacksonCamellia.pdf 22-Dec-2014 10:35 336K
661-NewImpossibleDifferentialAttacksonCamellia.ps 22-Dec-2014 10:35 3M
662-Deployingsecuremultipartycomputationforfina..> 22-Dec-2014 10:35 559K
663-CloudAssistedMultipartyComputationfromFully..> 22-Dec-2014 10:35 568K
664-OntheSecurityofIDBasedSigncryptionSchemes.pdf 22-Dec-2014 10:35 367K
665-EfficientModularExponentiationbasedPuzzlesf..> 22-Dec-2014 10:35 479K
666-AGrossZagierformulaforquaternionalgebrasove..> 22-Dec-2014 10:35 600K
667-AnEfficientandPrivateRFIDAuthenticationProt..> 20-Jan-2023 14:20 207
668-ReEncryptionBasedKeyManagementTowardsSecure..> 22-Dec-2014 10:35 419K
669-SmallLinearizationMemoryFriendlySolvingofNo..> 22-Dec-2014 10:35 521K
670-SHA3onARM11processors.pdf 22-Dec-2014 10:34 300K
671-ImprovedResultsonImpossibleDifferentialCryp..> 22-Dec-2014 10:34 338K
672-FastandSecureRootFindingforCodebasedCryptos..> 22-Dec-2014 10:34 539K
673-PseudorandomSignatures.pdf 22-Dec-2014 10:34 549K
674-ExtendedCombinatorialConstructionsforPeerto..> 22-Dec-2014 10:34 329K
675-BasingObfuscationonSimpleTamperProofHardwar..> 22-Dec-2014 10:34 397K
676-EnhancedBiometricsbasedRemoteUserAuthentica..> 22-Dec-2014 10:34 257K
677-CommitCoinCarbonDatingCommitmentswithBitcoi..> 22-Dec-2014 10:34 537K
678-Ondefinitionsofselectiveopeningsecurity.pdf 22-Dec-2014 10:34 496K
679-CTLAPlatformIndependentCryptoToolsLibraryBa..> 22-Dec-2014 10:34 728K
680-BetterBootstrappinginFullyHomomorphicEncryp..> 22-Dec-2014 10:34 354K
681-PhysicallyUncloneableFunctionsintheUniversa..> 22-Dec-2014 10:34 652K
682-UCframeworkforanonymouscommunication.pdf 22-Dec-2014 10:34 166K
683-TimingAttacksagainsttheSyndromeInversioninC..> 22-Dec-2014 10:34 358K
684-IdentificationBasedEncryptionwithRSAOAEPUsi..> 22-Dec-2014 10:34 380K
684-IdentificationBasedEncryptionwithRSAOAEPUsi..> 22-Dec-2014 10:34 426K
685-CryptanalysisofSymmetricBlockCiphersBasedon..> 22-Dec-2014 10:34 232K
686-AnalysisofsomenaturalvariantsofthePKPAlgori..> 22-Dec-2014 10:34 324K
687-CryptanalysisofWG7ALightweightStreamCipherf..> 22-Dec-2014 10:34 312K
688-AuthenticatedKeyExchangeunderBadRandomness.pdf 22-Dec-2014 10:34 325K
689-EfficientUniversallyComposableTwoPartyCompu..> 20-Jan-2023 08:33 498K
690-ANewClassofMultivariatePublicKeyCryptosyste..> 22-Dec-2014 10:34 119K
691-YetAnotherUltralightweightAuthenticationPro..> 22-Dec-2014 10:34 174K
692-FullySecureDoublySpatialEncryptionunderSimp..> 22-Dec-2014 10:34 370K
693-Anoninteractivedeniableauthenticationscheme..> 22-Dec-2014 10:34 141K
694-GenericSidechannelDistinguisherBasedonKolmo..> 22-Dec-2014 10:33 735K
695-DeterministicIdentityBasedSignatureSchemean..> 22-Dec-2014 10:33 560K
696-EfficientNetworkCodingSignaturesintheStanda..> 22-Dec-2014 10:33 281K
697-SPONGENTTheDesignSpaceofLightweightCryptogr..> 22-Dec-2014 10:33 945K
698-AgeneralizationoftheclassofhyperbentBoolean..> 22-Dec-2014 10:33 313K
699-PublicKeyEncryptionwithClusterChainbasedKey..> 20-Jan-2023 14:20 207
700-EfficientAttributeBasedSignaturesforNonMono..> 22-Dec-2014 10:33 502K
701-DecentralizedAttributeBasedSignatures.pdf 22-Dec-2014 10:33 535K
702-Commentsofanefficientandsecuremultiserverau..> 22-Dec-2014 10:33 77K
703-WatersSignatureswithOptimalSecurityReductio..> 22-Dec-2014 10:33 278K
704-SecurityAnalysisofaPUFbasedRFIDAuthenticati..> 22-Dec-2014 10:33 152K
704-SecurityAnalysisofaPUFbasedRFIDAuthenticati..> 22-Dec-2014 10:33 637K
705-DifferentialAttacksonGeneralizedFeistelSche..> 22-Dec-2014 10:33 372K
706-ImprovedSideChannelAttacksonPairingBasedCry..> 22-Dec-2014 10:33 651K
707-CryptanalysisofTheAtmelCipherinSecureMemory..> 22-Dec-2014 10:33 269K
707-CryptanalysisofTheAtmelCipherinSecureMemory..> 22-Dec-2014 10:33 1M
708-ComputationalExtractorsandPseudorandomness.pdf 22-Dec-2014 10:33 408K
709-FaultAttackagainstMiller39salgorithm.pdf 20-Jan-2023 08:33 362K
709-FaultAttackagainstMillersalgorithm.pdf 22-Dec-2014 10:33 362K
710-CryptanalysisoftheFullAESUsingGPULikeSpecia..> 22-Dec-2014 10:33 180K
711-EvolutionaryConstructionofdeBruijnSequences..> 22-Dec-2014 10:33 148K
712-EfficientJavaImplementationofEllipticCurveC..> 22-Dec-2014 10:33 279K
713-Aserveraidedverificationsignatureschemewith..> 22-Dec-2014 10:33 162K
714-PositionVerificationinMultiChannelModels.pdf 22-Dec-2014 10:33 328K