Index of /2011/


../
001-PracticalFrameworksForhOutOfnObliviousTrans..> 22-Dec-2014 11:03    472K
002-AZeroOneLawforSecureMultiPartyComputationwi..> 22-Dec-2014 11:03    529K
003-OnthecorrectuseofthenegationmapinthePollard..> 22-Dec-2014 11:03    467K
004-Alowmemoryalgorithmforfindingshortproductre..> 22-Dec-2014 11:03    306K
005-Isprivacycompatiblewithtruthfulness.pdf        22-Dec-2014 11:02    490K
006-ExploringtheLimitsofCommonCoinsUsingFrontie..> 22-Dec-2014 11:02    357K
007-KISSABitTooSimple.pdf                          22-Dec-2014 11:02    295K
008-ComputingEllipticCurveDiscreteLogarithmswit..> 22-Dec-2014 11:02    166K
009-ProgressionFreeSetsandSublinearPairingBased..> 22-Dec-2014 11:02    510K
010-StructuredEncryptionandControlledDisclosure..> 22-Dec-2014 11:02    472K
011-AftertheFactLeakageinPublicKeyEncryption.pdf   22-Dec-2014 11:02    348K
012-MinimizingNoninteractiveZeroKnowledgeProofs..> 22-Dec-2014 11:02    291K
013-SecureMessageTransmissionInAsynchronousDire..> 22-Dec-2014 11:02    288K
014-UnconditionallyReliableMessageTransmissioni..> 22-Dec-2014 11:02    194K
015-Exponentialattackson6roundLubyRackoffandon5..> 20-Jan-2023 14:20     207
016-AnAnonymousHealthCareSystem.pdf                22-Dec-2014 11:02    138K
017-NewImpossibleDifferentialAttacksofReducedRo..> 22-Dec-2014 11:02    467K
018-HomomorphicSignaturesforPolynomialFunctions..> 22-Dec-2014 11:02    494K
019-CollisionResistanceoftheJHHashFunction.pdf     22-Dec-2014 11:02    105K
020-CoverandDecompositionIndexCalculusonEllipti..> 22-Dec-2014 11:02    398K
021-FullySecureAnonymousHierarchicalIdentityBas..> 22-Dec-2014 11:02    385K
022-CryptanalysiswithTernaryDifferenceAppliedto..> 22-Dec-2014 11:02    249K
023-ImprovedzerosumdistinguisherforfullroundKec..> 22-Dec-2014 11:02    212K
024-Secureevaluationofpolynomialusingprivacyrin..> 22-Dec-2014 11:02     85K
025-SupportingPublicationandSubscriptionConfide..> 22-Dec-2014 11:02    533K
026-PrivateDiscoveryofCommonSocialContacts.pdf     22-Dec-2014 11:02    284K
027-SimpleandEfficientSingleRoundAlmostPerfectl..> 22-Dec-2014 11:02    458K
028-TheParazoaFamilyGeneralizingtheSpongeHashFu..> 22-Dec-2014 11:02    631K
029-OutlineofaproposalrespondingtoEUandUScallsf..> 22-Dec-2014 11:02    314K
029-OutlineofaproposalrespondingtoEUandUScallsf..> 22-Dec-2014 11:01    895K
030-FastEllipticCurveCryptographyUsingOptimalDo..> 22-Dec-2014 11:01    363K
030-FastEllipticCurveCryptographyUsingOptimalDo..> 22-Dec-2014 11:01      1M
031-EfficientUnconditionalAsynchronousByzantine..> 22-Dec-2014 11:01    604K
032-CorrigendumtoTheCubeAttackonStreamCipherTri..> 22-Dec-2014 11:01    326K
033-TheGeometryofFlexTangentstoaCubicCurveandit..> 22-Dec-2014 11:01    226K
033-TheGeometryofFlexTangentstoaCubicCurveandit..> 22-Dec-2014 11:01      1M
034-SecureAuthenticationfromaWeakKeyWithoutLeak..> 22-Dec-2014 11:01    441K
035-ANewFamilyofImplicitlyAuthenticatedDiffieHe..> 22-Dec-2014 11:01    338K
036-TheComplexityAnalysisoftheMutantXLFamily.pdf   20-Jan-2023 14:20     207
037-HigherOrderDifferentialAttackonReducedSHA25..> 22-Dec-2014 11:01    379K
038-ColdBootKeyRecoverybySolvingPolynomialSyste..> 22-Dec-2014 11:01    356K
039-FastQuadruplingofaPointinEllipticCurveCrypt..> 22-Dec-2014 11:01     61K
039-Fastpointquadruplingonellipticcurves.pdf       20-Jan-2023 08:34     61K
040-SimpleandExactFormulaforMinimumLoopLengthin..> 22-Dec-2014 11:01    150K
041-ReclaimingPrivacyforSmartphoneApplicationsR..> 22-Dec-2014 11:01    248K
041-ReclaimingPrivacyforSmartphoneApplicationsR..> 22-Dec-2014 11:01    715K
042-Computingendomorphismringsofellipticcurvesu..> 22-Dec-2014 11:01    376K
043-ProxyBlindMultisignatureSchemeusingECCforha..> 22-Dec-2014 11:01    160K
044-FastScalarMultiplicationinECCusingTheMultib..> 22-Dec-2014 11:01    145K
045-PrivateIdentificationAuthenticationandKeyAg..> 22-Dec-2014 11:01    417K
046-LowerandUpperBoundsforDeniablePublicKeyEncr..> 22-Dec-2014 11:01    373K
047-Constructingdifferential4uniformpermutation..> 22-Dec-2014 11:01    191K
048-AnonAbelianfactorizationproblemandanassocia..> 22-Dec-2014 11:00    253K
049-UnboundedHIBEandAttributeBasedEncryption.pdf   22-Dec-2014 11:00    400K
050-AuthenticatedKeyExchangewithSynchronizedSta..> 20-Jan-2023 14:20     207
051-TowardsStrongAdaptiveCorruptionSecurityofAu..> 20-Jan-2023 14:20     207
052-RevocableAttributeBasedSignatureswithAdapti..> 22-Dec-2014 11:00    235K
052-RevocableAttributeBasedSignatureswithAdapti..> 22-Dec-2014 11:00    499K
053-AdaptivePseudoFreeGroupsandApplications.pdf    22-Dec-2014 11:00    306K
054-NonApplicabilityofPseudobasisforDesigningPe..> 20-Jan-2023 14:20     207
055-OnEnumerationofPolynomialEquivalenceClasses..> 22-Dec-2014 11:00    279K
056-SpectralCoherenceAnalysisFirstExperimentalR..> 22-Dec-2014 11:00    596K
057-AnotherLookatRSASignaturesWithAffinePadding..> 22-Dec-2014 11:00    326K
058-SupplementalAccessControlPACEv2SecurityAnal..> 22-Dec-2014 11:00    376K
059-ExtendingBabystepGiantstepalgorithmforFACTO..> 22-Dec-2014 11:00    213K
060-AGroupSignatureSchemefromLatticeAssumptions..> 22-Dec-2014 11:00    372K
061-CryptanalysisofSomeProtocolsforRFIDSystems.pdf 22-Dec-2014 11:00     76K
061-CryptanalysisofSomeProtocolsforRFIDSystems.ps  22-Dec-2014 11:00    515K
062-CryptanalysisandSecurityEnhancementofanAdva..> 22-Dec-2014 11:00    109K
063-SecretKeysfromChannelNoise.pdf                 22-Dec-2014 11:00    551K
063-SecretKeysfromChannelNoise.ps                  22-Dec-2014 11:00      3M
064-CryptographicTreatmentofPrivateUserProfiles..> 22-Dec-2014 11:00    255K
065-FullySimulatableQuantumSecureCoinFlippingan..> 22-Dec-2014 11:00    548K
066-DeniableEncryptionwithNegligibleDetectionPr..> 22-Dec-2014 11:00    296K
067-OntheDistributionoftheSubsetSumPseudorandom..> 22-Dec-2014 11:00    183K
068-RationalSecretSharingwithHonestPlayersovera..> 22-Dec-2014 11:00    191K
068-RationalSecretSharingwithHonestPlayersovera..> 22-Dec-2014 11:00    369K
069-ConstantRoundsLinearMultipartyComputationfo..> 22-Dec-2014 11:00    515K
070-Rationalauthenticationprotocols.pdf            22-Dec-2014 11:00     95K
071-InformationtheoreticBoundsforDifferentially..> 22-Dec-2014 11:00    206K
072-AESVariantsSecureAgainstRelatedKeyDifferent..> 22-Dec-2014 10:59    321K
073-Cryptanalysisofthreematrixbasedkeyestablish..> 22-Dec-2014 10:59    163K
074-Reallyfastsyndromebasedhashing.pdf             22-Dec-2014 10:59    286K
075-ANovelRFIDDistanceBoundingProtocolBasedonPh..> 20-Jan-2023 14:20     207
076-AUnifiedApproachtoCombinatorialKeyPredistri..> 22-Dec-2014 10:59    328K
077-DPALeakageEvaluationandCountermeasurePlugin..> 22-Dec-2014 10:59    734K
078-ALowAreaUnifiedHardwareArchitecturefortheAE..> 22-Dec-2014 10:59      1M
079-IdentitybasedDigitalSignatureSchemeWithoutB..> 22-Dec-2014 10:59     74K
080-TurboCodesCanBeAsymptoticallyInformationThe..> 22-Dec-2014 10:59    140K
081-SecureDatastructuresbasedonMultipartyComput..> 22-Dec-2014 10:59    180K
082-DoesPseudobasisExtendtoGeneralAdversary.pdf    20-Jan-2023 14:20     207
083-Onthenumberofbentfunctionsfromiterativecons..> 22-Dec-2014 10:59    403K
084-TraitorTracingagainstPublicCollaborationFul..> 22-Dec-2014 10:59    221K
085-CoinductionandComputationalSemanticsforPubl..> 20-Jan-2023 14:20     207
086-FaultpropagationPatternBasedDFAonSPNStructu..> 22-Dec-2014 10:59    421K
087-OntheInstantiabilityofHashandSignRSASignatu..> 22-Dec-2014 10:59    375K
088-LeftoverHashLemmaRevisited.pdf                 22-Dec-2014 10:59    389K
088-LeftoverHashLemmaRevisited.ps                  22-Dec-2014 10:59      1M
089-OctalBentGeneralizedBooleanFunctions.pdf       22-Dec-2014 10:59    343K
090-GenericMethodstoAchieveTighterSecurityReduc..> 22-Dec-2014 10:59    392K
091-ANewApproachtoPracticalActiveSecureTwoParty..> 22-Dec-2014 10:59    574K
091-ANewApproachtoPracticalActiveSecureTwoParty..> 22-Dec-2014 10:59      1M
092-Characterizationoftherelationsbetweeninform..> 22-Dec-2014 10:59    334K
092-Characterizationoftherelationsbetweeninform..> 22-Dec-2014 10:59    935K
093-LinearCryptanalysisUsingMultipleLinearAppro..> 22-Dec-2014 10:59    265K
094-GracefulDegradationinMultiPartyComputation.pdf 22-Dec-2014 10:59    220K
094-GracefulDegradationinMultiPartyComputation.ps  22-Dec-2014 10:59    304K
095-ALREDBluesNewAttacksonAESBasedMAC39s.pdf       20-Jan-2023 08:34    254K
095-ALREDBluesNewAttacksonAESBasedMACs.pdf         22-Dec-2014 10:59    254K
096-ComputingonAuthenticatedData.pdf               22-Dec-2014 10:59    370K
097-FastplayAParallelizationModelandImplementat..> 22-Dec-2014 10:58    704K
098-ComputingDiscreteLogarithmsintheJacobianofH..> 22-Dec-2014 10:58    360K
099-CanCodePolymorphismLimitInformationLeakage.pdf 22-Dec-2014 10:58      2M
100-ANovelGroupSignatureSchemeBasedonMPKC.pdf      22-Dec-2014 10:58    280K
101-LightweightAnonymousAuthenticationwithTLSan..> 22-Dec-2014 10:58    702K
102-OptimalandParallelOnlineMemoryChecking.pdf     22-Dec-2014 10:58    608K
103-CryptographicallySoundSecurityProofforOnDem..> 22-Dec-2014 10:58    196K
104-UnconditionallySecureSignatureSchemesRevisi..> 22-Dec-2014 10:58    331K
105-ExplicitFormulasforRealHyperellipticCurveso..> 22-Dec-2014 10:58    420K
106-CommonRandomnessandSecretKeyCapacitiesofTwo..> 22-Dec-2014 10:58    467K
106-CommonRandomnessandSecretKeyCapacitiesofTwo..> 22-Dec-2014 10:58      4M
107-ThresholdEncryptionintoMultipleCiphertexts.pdf 22-Dec-2014 10:58    308K
108-PracticalSecureandEfficientMultipartyLinear..> 22-Dec-2014 10:58    325K
109-SecureBlindDecryption.pdf                      22-Dec-2014 10:58    408K
110-FullyHomomorphicEncryptionovertheBinaryPoly..> 20-Jan-2023 14:20     207
111-GeneralizationsofBentFunctionsASurvey.pdf      22-Dec-2014 10:58    269K
112-Anefficientcertificatelesstwopartyauthentic..> 22-Dec-2014 10:58    146K
113-EfficientTechniquesforPrivacyPreservingShar..> 22-Dec-2014 10:58    365K
114-FullyHomomorphicEncryptionApproximateLattic..> 22-Dec-2014 10:58    403K
115-MultipleDifferentialCryptanalysisTheoryandP..> 22-Dec-2014 10:58    306K
116-Shortoutputuniversalhashfunctionsandtheirus..> 22-Dec-2014 10:58    396K
117-BoundedVectorSignaturesandtheirApplications..> 22-Dec-2014 10:57    286K
118-NewFullyHomomorphicEncryptionovertheInteger..> 22-Dec-2014 10:57    392K
119-MultiplicativeLearningwithErrorsandCryptosy..> 20-Jan-2023 14:20     207
120-Faster2regularinformationsetdecoding.pdf       22-Dec-2014 10:57    301K
121-MorePracticalFullyHomomorphicEncryption.pdf    22-Dec-2014 10:57    282K
122-SecureMultiPartySortingandApplications.pdf     22-Dec-2014 10:57    394K
123-LinearHullswithCorrelationZeroandLinearCryp..> 22-Dec-2014 10:57    221K
124-ANewClassofBiometricsontheBasisofForgottenS..> 22-Dec-2014 10:57     84K
125-AConstructionofANewClassofKnapsackTypePubli..> 22-Dec-2014 10:57     70K
126-TheHummingbird2LightweightAuthenticatedEncr..> 22-Dec-2014 10:57    550K
127-IntegerArithmeticwithoutArithmeticAddition.pdf 22-Dec-2014 10:57      1M
128-TheLigoBlockCipher.pdf                         20-Jan-2023 14:20     207
129-DistanceHijackingAttacksonDistanceBoundingP..> 22-Dec-2014 10:57    638K
130-ErgodicTheoryOverF_2T.pdf                      22-Dec-2014 10:57    189K
130-ErgodicTheoryOverF_2T.ps                       22-Dec-2014 10:57    401K
131-Trapdooronewayfunctionsassociatedwithexpone..> 22-Dec-2014 10:57    193K
132-VerifiableDelegationofComputationoverLargeD..> 22-Dec-2014 10:57    321K
133-FullyHomomorphicSIMDOperations.pdf             22-Dec-2014 10:57    239K
133-FullyHomomorphicSIMDOperations.ps              22-Dec-2014 10:57    648K
134-DifferentiallyPrivateBillingwithRebates.pdf    22-Dec-2014 10:57    239K
134-DifferentiallyPrivateBillingwithRebates.ps     22-Dec-2014 10:57    702K
135-OnisogenyclassesofEdwardscurvesoverfinitefi..> 22-Dec-2014 10:57    369K
136-AFullProofoftheBGWProtocolforPerfectlySecur..> 22-Dec-2014 10:57    902K
137-TowardsaGameTheoreticViewofSecureComputatio..> 22-Dec-2014 10:57    515K
138-ConstantRoundPrivacyPreservingMultisetUnion..> 22-Dec-2014 10:57    182K
138-ConstantRoundPrivacyPreservingMultisetUnion.ps 22-Dec-2014 10:57    642K
139-ShortestLatticeVectorsinthePresenceofGaps.pdf  22-Dec-2014 10:57    262K
140-SomeInstantandPracticalTimeRelatedKeyAttack..> 22-Dec-2014 10:57    360K
141-FastandPrivateComputationofCardinalityofSet..> 22-Dec-2014 10:57    287K
142-AParallelHardwareArchitecturefortheSolution..> 20-Jan-2023 14:20     207
143-ComputingellellisogeniesinpolynomialtimeonJ..> 22-Dec-2014 10:56    472K
144-DeniableEncryptionfromtheMcElieceAssumption..> 20-Jan-2023 14:20     207
145-LinearDiophantineEquationDiscreteLogProblem..> 20-Jan-2023 14:20     207
146-ECDLPonGPU.pdf                                 22-Dec-2014 10:56    237K
147-TheOptimalLinearSecretSharingSchemeforAnyGi..> 22-Dec-2014 10:56    136K
147-TheOptimalLinearSecretSharingSchemeforAnyGi..> 22-Dec-2014 10:56    244K
148-NearCollisionAttackontheStepReducedCompress..> 22-Dec-2014 10:56    187K
149-GenericSideChannelDistinguishersImprovement..> 22-Dec-2014 10:56    501K
150-ANovelkoutofnObliviousTransferProtocolfromB..> 22-Dec-2014 10:56    396K
151-DirectExponentandScalarMultiplicationClasse..> 22-Dec-2014 10:56    100K
152-APracticalApplicationofDifferentialPrivacyt..> 22-Dec-2014 10:56    226K
153-Lowerboundsofshortestvectorlengthsinrandomk..> 22-Dec-2014 10:56    266K
154-TheBlockCipherVuna.pdf                         20-Jan-2023 14:20     207
155-HighspeedHardwareImplementationofRainbowSig..> 20-Jan-2023 14:20     207
156-StrongForwardSecurityinIdentityBasedSigncry..> 22-Dec-2014 10:56    465K
157-SecureComputationontheWebComputingwithoutSi..> 22-Dec-2014 10:56    487K
158-EnhancingDataPrivacyintheCloud.pdf             22-Dec-2014 10:56    398K
159-TheBlockCipherThuca.pdf                        20-Jan-2023 14:20     207
160-CryptanalysisofARMADILLO2.pdf                  22-Dec-2014 10:56    435K
161-EfficientHardwareImplementationsofBRWPolyno..> 22-Dec-2014 10:56    783K
162-CollisionTimingAttackwhenBreaking42AESASICC..> 22-Dec-2014 10:56    793K
163-ImprovedIntegralAttacksonReducedRoundCamell..> 20-Jan-2023 14:20     207
164-OntherelationbetweentheMXLfamilyofalgorithm..> 22-Dec-2014 10:56    368K
165-ImprovedSideChannelCubeAttacksonPRESENT.pdf    22-Dec-2014 10:56    334K
166-SelectionsInternetVotingwithOvertheShoulder..> 22-Dec-2014 10:56      1M
167-IdentifyingLargeScaleRFIDTagsUsingNonCrypto..> 22-Dec-2014 10:56    243K
168-ACommitmentConsistentProofofaShuffle.pdf       22-Dec-2014 10:56    457K
169-IdentityBasedCryptographyforCloudSecurity.pdf  22-Dec-2014 10:56    140K
170-Softwareimplementationofbinaryellipticcurve..> 22-Dec-2014 10:56    284K
171-Onlowerboundsonsecondordernonliearitiesofbe..> 22-Dec-2014 10:56    282K
172-Theweakpasswordproblemchaoscriticalityanden..> 22-Dec-2014 10:56      2M
173-Anefficientcertificatelessshortsignaturesch..> 20-Jan-2023 14:20     207
174-Onlinesecretsharing.pdf                        22-Dec-2014 10:55    214K
175-AnalysisofreducedSHAvite3256v2.pdf             22-Dec-2014 10:55    509K
176-AFPGApairingimplementationusingtheResidueNu..> 22-Dec-2014 10:55    454K
177-DynamicMDSMatricesforSubstantialCryptograph..> 22-Dec-2014 10:55    133K
178-DifferentialFaultAnalysisofAESTowardReducin..> 22-Dec-2014 10:55      1M
179-CompactMcEliecekeysbasedonQuasiDyadicSrivas..> 22-Dec-2014 10:55    195K
180-HighlyEfficientUniversallyComposableCommitm..> 22-Dec-2014 10:55    393K
181-SecurityofPrimeFieldPairingCryptoprocessorA..> 22-Dec-2014 10:55    161K
181-SecurityofPrimeFieldPairingCryptoprocessorA..> 22-Dec-2014 10:55    646K
182-DesignatedConfirmerSignaturesWithUnifiedVer..> 22-Dec-2014 10:55    367K
183-EllipticCurvePointMultiplicationUsingMBNRan..> 20-Jan-2023 14:20     207
184-FortificationofAESwithDynamicMixColumnTrans..> 22-Dec-2014 10:55    185K
185-EfficientandSecureDataStorageOperationsforM..> 22-Dec-2014 10:55    710K
186-Someaspectsofmultivariablesecretsharing.pdf    20-Jan-2023 14:20     207
187-AcceleratingIDbasedEncryptionbasedonTrapdoo..> 22-Dec-2014 10:55    402K
188-PhysicalTuringMachinesandtheFormalizationof..> 22-Dec-2014 10:55    634K
189-SIMPLSystemsasaKeylessCryptographicandSecur..> 22-Dec-2014 10:55    209K
190-SHSSecureHybridSearchbyCombiningDynamicandS..> 22-Dec-2014 10:55    328K
191-OntheSecurityoftheWinternitzOneTimeSignatur..> 22-Dec-2014 10:55    458K
192-ShortandEfficientCertificateBasedSignature.pdf 22-Dec-2014 10:55    209K
193-SecurityAnalysisofLMAPanRFIDAuthenticationP..> 22-Dec-2014 10:55     77K
194-CryptanalysisofChentextitetal39sRFIDAccessC..> 20-Jan-2023 08:34    126K
194-CryptanalysisofChentextitetalsRFIDAccessCon..> 22-Dec-2014 10:55    116K
194-CryptanalysisofChentextitetalsRFIDAccessCon..> 22-Dec-2014 10:55    315K
195-AnIDbasedthreepartyauthenticatedkeyexchange..> 20-Jan-2023 14:20     207
196-AccelerationofCompositeOrderBilinearPairing..> 22-Dec-2014 10:55    411K
197-PublicKeyEncryptionfortheForgetful.pdf         22-Dec-2014 10:55    223K
198-TerminatingBKZ.pdf                             22-Dec-2014 10:55    545K
199-AnefficientdeterministictestforKloostermans..> 22-Dec-2014 10:54    198K
200-FairandPrivacyPreservingMultiPartyProtocols..> 22-Dec-2014 10:54    451K
201-ImprovedMeetintheMiddleCryptanalysisofKTANT..> 22-Dec-2014 10:54    192K
202-CyclingAttacksonGCMGHASHandOtherPolynomialM..> 22-Dec-2014 10:54    318K
203-Keyagreementbasedonhomomorphismsofalgebraic..> 22-Dec-2014 10:54    220K
203-Keyagreementbasedonhomomorphismsofalgebraic..> 22-Dec-2014 10:54    640K
204-LeakageTolerantInteractiveProtocols.pdf        22-Dec-2014 10:54    670K
205-Grouporientedringsignature.pdf                 22-Dec-2014 10:54     61K
206-IsomorphismclassesofEdwardscurvesoverfinite..> 22-Dec-2014 10:54    271K
207-ProofsofOwnershipinRemoteStorageSystems.pdf    22-Dec-2014 10:54    426K
208-DirectConstructionsofBidirectionalProxyReEn..> 22-Dec-2014 10:54    369K
208-DirectConstructionsofBidirectionalProxyReEn..> 22-Dec-2014 10:54      1M
209-BetterSecurityforDeterministicPublicKeyEncr..> 22-Dec-2014 10:54    333K
210-Thepreimagesecurityofdoubleblocklengthcompr..> 22-Dec-2014 10:54    200K
211-SecurityEvaluationofGOST2814789InViewOfInte..> 22-Dec-2014 10:54    179K
212-MaioranaMcFarlandFunctionswithHighSecondOrd..> 22-Dec-2014 10:54    252K
213-OnCipherDependentRelatedKeyAttacksintheIdea..> 22-Dec-2014 10:54    420K
214-Onidentities3939names3939NAMES3939ROLES3939..> 20-Jan-2023 08:34    135K
214-OnidentitiesnamesNAMESROLESandSecurityAMani..> 22-Dec-2014 10:54    135K
215-DelegatableHomomorphicEncryptionwithApplica..> 22-Dec-2014 10:54    390K
216-ProvablySecureGroupKeyManagementApproachBas..> 22-Dec-2014 10:54    193K
217-IdentityBasedDeterministicSignatureSchemeWi..> 22-Dec-2014 10:54    234K
218-CryptographicAnalysisofAll4x4BitSBoxes.pdf     22-Dec-2014 10:54    303K
219-OntheSecurityofTLSDHEintheStandardModel.pdf    22-Dec-2014 10:54    491K
220-FrameworkforSecurityProofsforOndemandRoutin..> 22-Dec-2014 10:54    190K
221-ProtectingDriveEncryptionSystemsAgainstMemo..> 22-Dec-2014 10:54    320K
222-SequentialAggregateSignatureswithLazyVerifi..> 22-Dec-2014 10:54    790K
223-APerfectlyBindingCommitmentSchemeAgainstQua..> 22-Dec-2014 10:54    254K
224-CryptanalysisandImprovementofanEfficientCCA..> 22-Dec-2014 10:53    163K
225-ASimpleandEfficientNewGroupKeyManagementApp..> 22-Dec-2014 10:53    380K
226-Substitutionpermutationnetworkspseudorandom..> 22-Dec-2014 10:53    324K
227-Robustparentidentifyingcodesandcombinatoria..> 22-Dec-2014 10:53    217K
228-AFrameworkforPracticalUniversallyComposable..> 22-Dec-2014 10:53    627K
229-RoutingProtocolBasedSharedandSessionKeyExch..> 22-Dec-2014 10:53    161K
230-AllButManyLossyTrapdoorFunctions.pdf           22-Dec-2014 10:53    504K
231-HistoryFreeSequentialAggregateSignatures.pdf   22-Dec-2014 10:53    441K
232-RemoteTimingAttacksareStillPractical.pdf       22-Dec-2014 10:53    348K
233-CorrelatedInputSecureHashFunctions.pdf         22-Dec-2014 10:53    482K
234-CommentsonasecuredynamicIDbasedremoteuserau..> 22-Dec-2014 10:53    231K
235-ComputerAidedDecisionMakingwithTrustRelatio..> 22-Dec-2014 10:53    697K
236-UsingTemplatestoDistinguishMultiplicationsf..> 22-Dec-2014 10:53    255K
237-TheblockcipherNSABCpublicdomain.pdf            22-Dec-2014 10:53    461K
238-AttacksOnaDoubleLengthBlockcipherbasedHashP..> 22-Dec-2014 10:53    214K
239-EfficientSoftwareImplementationsofModularEx..> 22-Dec-2014 10:53    553K
240-UniversalComposabilityfromEssentiallyAnyTru..> 22-Dec-2014 10:53    601K
241-ANovelAdaptiveProactiveSecretSharingwithout..> 22-Dec-2014 10:53    144K
242-CryptanalysisofKeeLoqcodehoppingusingaSingl..> 22-Dec-2014 10:53    696K
243-AffinePairingsonARM.pdf                        22-Dec-2014 10:53    169K
244-PRISMPrivacyPreservingSearchinMapReduce.pdf    22-Dec-2014 10:53    408K
245-OntheNumberofCarriesOccuringinanAdditionmod..> 22-Dec-2014 10:53    858K
246-AFrameworkforSecureSingleSignOn.pdf            22-Dec-2014 10:53    338K
247-AnUltraEfficientKeyRecoveryAttackontheLight..> 22-Dec-2014 10:53    263K
248-FastPasswordRecoveryAttackApplicationtoAPOP..> 22-Dec-2014 10:52    307K
249-Breakingacertificatelesskeyagreementprotoco..> 20-Jan-2023 14:20     207
250-AParallelRepetitionTheoremforLeakageResilie..> 22-Dec-2014 10:52    420K
251-ConcurrentlySecureComputationinConstantRoun..> 22-Dec-2014 10:52    464K
252-CryptographySecureAgainstRelatedKeyAttacksa..> 22-Dec-2014 10:52    371K
253-AttackCryptosystemsBasedonHCDLP.pdf            22-Dec-2014 10:52    330K
254-UsingtheCloudtoDetermineKeyStrengths.pdf       22-Dec-2014 10:52    332K
255-HidingthePolicyinCryptographicAccessControl..> 22-Dec-2014 10:52    334K
256-LeakageResilientSecureTwoPartyComputation.pdf  20-Jan-2023 14:20     207
257-SecureMultiPartyComputationofBooleanCircuit..> 22-Dec-2014 10:52    333K
258-AHighSpeedPairingCoprocessorUsingRNSandLazy..> 22-Dec-2014 10:52    442K
259-Commentsonasensornetworkkeyredistributionte..> 22-Dec-2014 10:52    243K
260-SecurityIndistinguishabilityinthePresenceof..> 22-Dec-2014 10:52      2M
260-SecurityampIndistinguishabilityinthePresenc..> 20-Jan-2023 08:34      2M
261-OBSERVATIONAnexplicitformforaclassofsecondp..> 22-Dec-2014 10:52    284K
262-CryptanalysisoftheLightWeightCipherA2U2Redu..> 22-Dec-2014 10:52    271K
263-TheComputationalSquareRootExponentProblemRe..> 22-Dec-2014 10:52    146K
264-RoundOptimalBlindSignatures.pdf                22-Dec-2014 10:52    578K
265-Efficient2RoundGeneralPerfectlySecureMessag..> 20-Jan-2023 08:34    129K
265-Efficient2RoundGeneralPerfectlySecureMessag..> 22-Dec-2014 10:52    129K
266-IdentityBasedDecryption.pdf                    22-Dec-2014 10:52     87K
267-MutualPrivateSetIntersectionwithLinearCompl..> 22-Dec-2014 10:52    352K
268-BirthdayForgeryAttackon128EIA3Version15.pdf    22-Dec-2014 10:52    225K
269-AuthenticatedandMisuseResistantEncryptionof..> 22-Dec-2014 10:52    230K
270-ProgrammableHashFunctionsandTheirApplicatio..> 22-Dec-2014 10:52    667K
271-PracticalKeyrecoveryForAllPossibleParameter..> 22-Dec-2014 10:52    377K
272-OutsourcingMultiPartyComputation.pdf           22-Dec-2014 10:52    549K
273-MemoryDelegation.pdf                           22-Dec-2014 10:51    798K
274-ASpliceandCutCryptanalysisoftheAES.pdf         20-Jan-2023 14:20     207
275-InvertingtheSquaresystemsisexponential.pdf     22-Dec-2014 10:51    204K
276-AnalysisoftheSSHKeyExchangeProtocol.pdf        22-Dec-2014 10:51    245K
277-FullyHomomorphicEncryptionwithoutBootstrapp..> 22-Dec-2014 10:51    424K
278-ComparingDifferentDefinitionsofSecureSessio..> 22-Dec-2014 10:51    242K
279-FullyHomomorphicEncryptionwithoutSquashingU..> 22-Dec-2014 10:51    409K
280-DDHlikeAssumptionsBasedonExtensionRings.pdf    22-Dec-2014 10:51    463K
281-ComputationalVerifiableSecretSharingRevisit..> 22-Dec-2014 10:51    310K
282-AnExperimentallyVerifiedAttackonFullGrain12..> 22-Dec-2014 10:51    356K
283-TheFaultAttackECDLPRevisited.pdf               22-Dec-2014 10:51    345K
284-OntheSecurityofPPPoENetwork.pdf                20-Jan-2023 14:20     207
285-ExploitingLinearHullinMatsuisAlgorithm1exte..> 22-Dec-2014 10:51    416K
286-BicliquesforPreimagesAttacksonSkein512andth..> 22-Dec-2014 10:51    492K
287-Algebraiccryptanalysisoftheroundreducedands..> 22-Dec-2014 10:51    424K
288-OntheCommunicationComplexityofReliableandSe..> 22-Dec-2014 10:51    216K
289-PollyCrackerRevisited.pdf                      22-Dec-2014 10:51    601K
290-SomeResultsConcerningGeneralizedBentFunctio..> 22-Dec-2014 10:51    200K
291-LeakageResilientCoinTossing.pdf                22-Dec-2014 10:51    483K
292-OnNonlinearPolynomialSelectionandGeometricP..> 22-Dec-2014 10:51    132K
293-WeaknessofaSecuredAuthenticationProtocolfor..> 20-Jan-2023 14:20     207
294-SmallPublicKeysandFastVerificationforMultiv..> 22-Dec-2014 10:51    470K
295-CountingPointsonGenus2CurveswithRealMultipl..> 22-Dec-2014 10:51    363K
296-ShortSignaturesFromWeakerAssumptions.pdf       22-Dec-2014 10:51    707K
297-NEWSTATISTICALBOXTESTANDITSPOWER.pdf           22-Dec-2014 10:51    165K
298-Locallimittheoremforlargedeviationsandstati..> 22-Dec-2014 10:51    417K
299-ModesofOperationsforEncryptionandAuthentica..> 22-Dec-2014 10:51    478K
300-OneroundStronglySecureKeyExchangewithPerfec..> 22-Dec-2014 10:50    466K
301-OntheAmortizedComplexityofZeroKnowledgeProt..> 22-Dec-2014 10:50    416K
302-UnivariateSideChannelAttacksandLeakageModel..> 22-Dec-2014 10:50      3M
303-GNUCANewUniversalComposabilityFramework.pdf    22-Dec-2014 10:50    836K
304-AuditingtheAuditorSecureDelegationofAuditin..> 22-Dec-2014 10:50    205K
305-AnewattackonJakobssonHybridMixNet.pdf          22-Dec-2014 10:50    197K
306-GroupLawComputationsonJacobiansofHyperellip..> 22-Dec-2014 10:50    355K
307-Waystorestrictthedifferentialpath.pdf          22-Dec-2014 10:50    462K
308-ProvablySecureandPracticalOnionRouting.pdf     22-Dec-2014 10:50    594K
309-OnConstructingHomomorphicEncryptionSchemesf..> 22-Dec-2014 10:50    407K
310-UniversallyComposableSynchronousComputation..> 22-Dec-2014 10:50    604K
311-TargetedMalleabilityHomomorphicEncryptionfo..> 22-Dec-2014 10:50    284K
312-DifferentialCryptanalysisofGOST.pdf            22-Dec-2014 10:50    194K
313-ErrorfreeMultivaluedBroadcastandByzantineAg..> 22-Dec-2014 10:50    362K
314-TamperProofCircuitsHowtoTradeLeakageforTamp..> 22-Dec-2014 10:50    490K
315-Implementing4DimensionalGLVMethodonGLSEllip..> 22-Dec-2014 10:50    405K
316-SecurityofBlindSignaturesRevisited.pdf         22-Dec-2014 10:50    454K
317-TwoSimpleCodeVerificationVotingProtocols.pdf   22-Dec-2014 10:50    361K
318-ScalarMultiplicationonKoblitzCurvesusingtau..> 22-Dec-2014 10:50    282K
319-StructurePreservingCCASecureEncryptionandIt..> 22-Dec-2014 10:50    365K
319-StructurePreservingCCASecureEncryptionandIt..> 22-Dec-2014 10:50      1M
320-MinimalConnectivityforUnconditionallySecure..> 22-Dec-2014 10:50    281K
321-AFormalApproachtoDistanceBoundingRFIDProtoc..> 22-Dec-2014 10:50    221K
322-AComprehensiveEvaluationofMutualInformation..> 22-Dec-2014 10:49    466K
323-ANewRelatedKeyBoomerangDistinguishingAttack..> 22-Dec-2014 10:49    221K
324-OntheEfficiencyofBitCommitmentReductions.pdf   22-Dec-2014 10:49    200K
325-NewReceiptFreeEVotingSchemeandSelfProvingMi..> 22-Dec-2014 10:49    285K
326-SGCMTheSophieGermainCounterMode.pdf            22-Dec-2014 10:49    186K
327-OntheInsecurityofHashbasedObliviousRAMandaN..> 22-Dec-2014 10:49    266K
328-CryptanalysisoftheSmartVercauterenandGentry..> 22-Dec-2014 10:49    146K
329-HardnessofComputingIndividualBitsforOnewayF..> 22-Dec-2014 10:49    329K
329-HardnessofComputingIndividualBitsforOnewayF..> 22-Dec-2014 10:49      1M
330-SimpleandAsymptoticallyOptimaltCheaterIdent..> 22-Dec-2014 10:49    138K
331-CryptanalysisofChotextitetal39sProtocolAHas..> 20-Jan-2023 08:34     75K
331-CryptanalysisofChotextitetalsProtocolAHashB..> 22-Dec-2014 10:49     76K
331-CryptanalysisofChotextitetalsProtocolAHashB..> 22-Dec-2014 10:49    207K
332-Adepth16circuitfortheAESSbox.pdf               22-Dec-2014 10:49    242K
333-Cryptanalysisofakeyagreementprotocolbasedon..> 22-Dec-2014 10:49     56K
334-OntheEfficientImplementationofPairingBasedP..> 22-Dec-2014 10:49    195K
335-NewlookatimpossibilityresultonDolevYaomodel..> 22-Dec-2014 10:49    187K
336-CryptanalysisofanAuthenticatedKeyAgreementP..> 20-Jan-2023 14:20     207
337-FunctionalReencryptionandCollusionResistant..> 22-Dec-2014 10:49    587K
338-FastandRegularAlgorithmsforScalarMultiplica..> 22-Dec-2014 10:49    447K
339-CarefulwithCompositionLimitationsofIndiffer..> 22-Dec-2014 10:49    485K
340-EncryptingMoreInformationinVisualCryptograp..> 22-Dec-2014 10:49    437K
341-AnImprovedInternetVotingProtocol.pdf           20-Jan-2023 14:20     207
342-ADomainTransformationforStructurePreserving..> 22-Dec-2014 10:49    513K
343-AnotherLookatSecurityDefinitions.pdf           22-Dec-2014 10:49    365K
344-EfficientFullyHomomorphicEncryptionfromStan..> 22-Dec-2014 10:49    522K
345-LBlockALightweightBlockCipher.pdf              22-Dec-2014 10:49    287K
346-StronglySecureOneRoundAuthenticatedKeyExcha..> 22-Dec-2014 10:49    208K
347-Anefficientcertificatelessauthenticatedkeya..> 20-Jan-2023 14:20     207
348-ExtractorsAgainstSideChannelAttacksWeakorSt..> 22-Dec-2014 10:49      1M
349-EfficientMethodsforExploitingFaultsInduceda..> 22-Dec-2014 10:49      4M
350-HBNAnHBlikeprotocolsecureagainstmaninthemid..> 22-Dec-2014 10:48    596K
351-CryptanalysisoftheAA_betaCryptosystembasedo..> 20-Jan-2023 14:20     207
352-BiDeniablePublicKeyEncryption.pdf              22-Dec-2014 10:48    442K
353-HiddenPairofBijectionSignatureScheme.pdf       22-Dec-2014 10:48    331K
354-Acoprocessorforsecureandhighspeedmodularari..> 22-Dec-2014 10:48    453K
355-OntheNonEquivalenceofUCSecurityNotions.pdf     22-Dec-2014 10:48    590K
356-AnEfficientAttackonAllConcreteKKSProposals.pdf 22-Dec-2014 10:48    625K
356-AnEfficientAttackonAllConcreteKKSProposals.ps  22-Dec-2014 10:48    847K
357-GeneralizedLearningProblemsandApplicationst..> 22-Dec-2014 10:48    594K
358-ConstructingaTernaryFCSRwithaGivenConnectio..> 22-Dec-2014 10:48    307K
359-HighEntropyVisualIdenti64257cationforTouchS..> 22-Dec-2014 10:48    574K
359-HighEntropyVisualIdenticationforTouchScreen..> 20-Jan-2023 08:34    574K
360-CertificatelessAggregateSigncryptionSchemes..> 22-Dec-2014 10:48     39K
361-TheExactSecurityofaStatefulIBEandNewCompact..> 22-Dec-2014 10:48    292K
362-PracticallyEfficientProofofRetrievabilityin..> 22-Dec-2014 10:48    584K
363-DynamicGroupBlindSignatures.pdf                20-Jan-2023 14:20     207
364-TheValue4ofBinaryKloostermanSums.pdf           22-Dec-2014 10:48    587K
365-Securityflawsinabiometricsbasedmultiservera..> 22-Dec-2014 10:48     60K
366-HighlyNonlinearBooleanFunctionswithOptimalA..> 22-Dec-2014 10:48    272K
367-DecodingOneOutofMany.pdf                       22-Dec-2014 10:48    228K
368-Highspeedhighsecuritysignatures.pdf            22-Dec-2014 10:48    471K
369-StoringSecretsonContinuallyLeakyDevices.pdf    22-Dec-2014 10:48    539K
369-StoringSecretsonContinuallyLeakyDevices.ps     22-Dec-2014 10:48      1M
370-SocioRationalSecretSharingasaNewDirectionin..> 22-Dec-2014 10:48    504K
371-MonoidicCodesinCryptography.pdf                22-Dec-2014 10:47    317K
372-Identitybasedsigncryptionschemeswithoutrand..> 22-Dec-2014 10:47    154K
373-Anefficientcharacterizationofafamilyofhyper..> 22-Dec-2014 10:47    550K
374-RestoringtheDifferentialResistanceofMD6.pdf    22-Dec-2014 10:47    318K
375-Complexityofuniversalaccessstructures.pdf      22-Dec-2014 10:47    142K
376-BackwardUnlinkabilityforaVLRGroupSignatureS..> 22-Dec-2014 10:47    411K
377-ImprovedGeneralizedBirthdayAttack.pdf          22-Dec-2014 10:47    145K
377-ImprovedGeneralizedBirthdayAttack.ps           22-Dec-2014 10:47    482K
378-AgeneralizationoftheLucasadditionchains.pdf    22-Dec-2014 10:47    117K
378-AgeneralizationoftheLucasadditionchains.ps     22-Dec-2014 10:47    352K
379-Cryptanalysisandimprovementofacertificatele..> 22-Dec-2014 10:47     90K
380-AnExplorationoftheKolmogorovSmirnovTestasCo..> 22-Dec-2014 10:47    417K
381-ANovelRFIDAuthenticationProtocolbasedonElli..> 22-Dec-2014 10:47    525K
382-GenericFullySimulatableAdaptiveObliviousTra..> 22-Dec-2014 10:47    498K
383-ArepresentationofthepsylowsubgroupofpermF_p..> 22-Dec-2014 10:47    367K
384-DistributedObliviousRAMforSecureTwoPartyCom..> 22-Dec-2014 10:47    252K
385-EfficientImplementationofGrandCruwithTIC6xP..> 22-Dec-2014 10:47    128K
386-Howtosharesecretssimultaneously.pdf            22-Dec-2014 10:47    133K
387-AnalysisoftheParallelDistinguishedPointTrad..> 22-Dec-2014 10:47    269K
388-ModulusFaultAttacksAgainstRSACRTSignatures.pdf 22-Dec-2014 10:47    488K
389-SpatialEncryption.pdf                          22-Dec-2014 10:47    500K
390-OntheVulnerabilityofFPGABitstreamEncryption..> 22-Dec-2014 10:47      2M
391-OnthePortabilityofSideChannelAttacksAnAnaly..> 22-Dec-2014 10:47     78K
392-AnEfficientRationalSecretSharingSchemeBased..> 22-Dec-2014 10:47    214K
393-AnalysisandImprovementofThing39sTimeMemoryT..> 20-Jan-2023 14:20     207
394-AMoreEfficientComputationallySoundNonIntera..> 22-Dec-2014 10:47    617K
395-ImprovedAnonymityforKeyTrees.pdf               22-Dec-2014 10:47    233K
396-FairComputationwithRationalPlayers.pdf         22-Dec-2014 10:46    216K
397-ThenDiffieHellmanProblemanditsApplications.pdf 22-Dec-2014 10:46    257K
397-ThenDiffieHellmanProblemanditsApplications.ps  22-Dec-2014 10:46    421K
398-HardnessofLearningProblemsoverBurnsideGroup..> 22-Dec-2014 10:46    613K
399-CryptanalysisofHFEMultiHFEandVariantsforOdd..> 22-Dec-2014 10:46    548K
400-Onageneralizedcombinatorialconjectureinvolv..> 22-Dec-2014 10:46    402K
401-PseudorandomFunctionsandLattices.pdf           22-Dec-2014 10:46    432K
402-FormalizingGroupBlindSignaturesandPractical..> 22-Dec-2014 10:46    375K
403-AFairEvaluationFrameworkforComparingSideCha..> 22-Dec-2014 10:46    521K
404-Aconstantroundresettablysoundresettablezero..> 22-Dec-2014 10:46    120K
405-CanHomomorphicEncryptionbePractical.pdf        22-Dec-2014 10:46    245K
406-CompositionTheoremsWithoutPreEstablishedSes..> 22-Dec-2014 10:46    674K
407-ObliviousRAMwithOlogN3WorstCaseCost.pdf        22-Dec-2014 10:46    272K
408-ResettableCryptographyinConstantRoundstheCa..> 22-Dec-2014 10:46    322K
409-EfficientPredicateEncryptionSupportingConst..> 22-Dec-2014 10:46    470K
409-Withdrawn.pdf                                  18-Aug-2023 00:00     207
410-FunctionalEncryptionforInnerProductPredicat..> 22-Dec-2014 10:46    357K
411-Commentsonapasswordauthenticationandupdates..> 22-Dec-2014 10:46     87K
412-AutomaticInsertionofDPACountermeasures.pdf     22-Dec-2014 10:46    426K
413-HigherOrderGlitchesFreeImplementationoftheA..> 22-Dec-2014 10:46    789K
414-FuzzyIdentityBasedEncryptionfromLattices.pdf   22-Dec-2014 10:46    251K
415-OntheAccessStructuresofHyperellipticSecretS..> 22-Dec-2014 10:46     85K
416-EfficientParallelizationofLanczosTypeAlgori..> 22-Dec-2014 10:46    397K
417-NewDataEfficientAttacksonReducedRoundIDEA.pdf  22-Dec-2014 10:46    309K
418-AnefficientRFIDmutualauthenticationschemeba..> 22-Dec-2014 10:46    290K
419-Onthesecurityofacertificatelessshortsignatu..> 20-Jan-2023 08:34     72K
420-UnalignedReboundAttackApplicationtoKeccak.pdf  22-Dec-2014 10:45    484K
420-UnalignedReboundAttackApplicationtoKeccak.ps   22-Dec-2014 10:45      2M
421-SuperpositionAttacksonCryptographicProtocol..> 22-Dec-2014 10:45    473K
422-ImprovedAnalysisofECHO256.pdf                  22-Dec-2014 10:45    614K
423-LinearCryptanalysisofPRINTcipherTrailsandSa..> 22-Dec-2014 10:45    387K
424-CryptanalysisofAZUMIanEPCClass1Generation2S..> 22-Dec-2014 10:45     57K
424-CryptanalysisofAZUMIanEPCClass1Generation2S..> 22-Dec-2014 10:45    106K
425-ThwartingHigherOrderSideChannelAnalysiswith..> 22-Dec-2014 10:45    267K
426-CryptanalysisofimprovedYehtextitetal39sauth..> 20-Jan-2023 08:34     65K
426-CryptanalysisofimprovedYehtextitetalsauthen..> 22-Dec-2014 10:45     66K
426-CryptanalysisofimprovedYehtextitetalsauthen..> 22-Dec-2014 10:45    117K
427-AnewattackontheKMOVcryptosystem.pdf            22-Dec-2014 10:45    143K
428-AESFlowInterceptionKeySnoopingMethodonVirtu..> 22-Dec-2014 10:45    190K
429-RoundefficientObliviousDatabaseManipulation..> 22-Dec-2014 10:45    396K
430-AnaloguesofVelu39sFormulasforIsogeniesonAlt..> 20-Jan-2023 08:34    335K
430-AnaloguesofVelusFormulasforIsogeniesonAlter..> 22-Dec-2014 10:45    335K
431-RootsofSquareCryptanalysisofDoubleLayerSqua..> 22-Dec-2014 10:45    402K
432-CiphersthatSecurelyEnciphertheirownKeys.pdf    22-Dec-2014 10:45    255K
432-CiphersthatSecurelyEnciphertheirownKeys.ps     22-Dec-2014 10:45    765K
433-CollusionPreservingComputation.pdf             22-Dec-2014 10:45    620K
434-AnEfficientProtocolforObliviousDFAEvaluatio..> 22-Dec-2014 10:45    416K
435-TheIPSCompilerOptimizationsVariantsandConcr..> 22-Dec-2014 10:45      1M
436-FasterAlgorithmsforApproximateCommonDivisor..> 22-Dec-2014 10:45    306K
437-Approximatecommondivisorsvialattices.pdf       22-Dec-2014 10:45    322K
438-ShortTransitiveSignaturesforDirectedTrees.pdf  22-Dec-2014 10:45    322K
439-OptimalDataAuthenticationfromDirectedTransi..> 22-Dec-2014 10:45    146K
440-PublicKeyCompressionandModulusSwitchingforF..> 22-Dec-2014 10:45    472K
441-FullyHomomorphicEncryptionovertheIntegerswi..> 22-Dec-2014 10:45    536K
442-AnotherLookatTightness.pdf                     22-Dec-2014 10:45    279K
443-FromExtractableCollisionResistancetoSuccinc..> 22-Dec-2014 10:44    577K
444-GeneralisedMersenneNumbersRevisited.pdf        22-Dec-2014 10:44    323K
445-PrivacyPreservingFriendSearchoverOnlineSoci..> 22-Dec-2014 10:44    322K
446-PrivacyPreservingFriendSearchoverOnlineSoci..> 20-Jan-2023 14:20     207
446-PrivateInformationExtractionoverOnlineSocia..> 22-Dec-2014 10:44    280K
447-OnVerifyingDynamicMultipleDataCopiesoverClo..> 22-Dec-2014 10:44    612K
448-NonRandomSequencesfromNonRandomPermutations..> 22-Dec-2014 10:44    763K
449-BicliqueCryptanalysisoftheFullAES.pdf          22-Dec-2014 10:44    428K
450-RhashHashFunctionUsingRandomQuadraticPolyno..> 20-Jan-2023 14:20     207
451-Cryptanalysisandimprovementofabiometricsbas..> 22-Dec-2014 10:44    221K
452-TheGoodlowerboundofSecondordernonlinearityo..> 22-Dec-2014 10:44    146K
453-PracticalComplexityDifferentialCryptanalysi..> 22-Dec-2014 10:44    181K
454-ThresholdFullyHomomorphicEncryptionandSecur..> 22-Dec-2014 10:44    426K
455-TheRelationandTransformationbetweenHierarch..> 22-Dec-2014 10:44    370K
456-DelegationofComputationwithoutRejectionProb..> 22-Dec-2014 10:44    445K
457-ResettableStatisticalZeroKnowledge.pdf         22-Dec-2014 10:44    642K
458-SievingforShortestVectorsinIdealLattices.pdf   22-Dec-2014 10:44    371K
459-Sufficientconditionsforsoundhashingusingatr..> 22-Dec-2014 10:44    336K
460-ComputationallySoundSymbolicSecurityReducti..> 22-Dec-2014 10:44    384K
461-SpeedingUpEllipticCurveDiscreteLogarithmCom..> 22-Dec-2014 10:44    176K
462-SecureOutsourcedComputationofIrisMatching.pdf  22-Dec-2014 10:44    371K
463-DecentralizedDynamicBroadcastEncryption.pdf    22-Dec-2014 10:44    525K
464-PrivateandObliviousSetandMultisetOperations..> 22-Dec-2014 10:44    426K
465-AttractiveSubfamiliesofBLSCurvesforImplemen..> 22-Dec-2014 10:44    304K
466-GreenCryptanalysisMeetintheMiddleKeyRecover..> 22-Dec-2014 10:44      1M
467-AewEfficientAsymmetricCryptosystemforlarged..> 22-Dec-2014 10:43    340K
468-FasterScalarMultiplicationonOrdinaryWeierst..> 22-Dec-2014 10:43    302K
469-CryptanalysisofINCrypt32inHID39siCLASSSyste..> 20-Jan-2023 08:33      1M
469-CryptanalysisofINCrypt32inHIDsiCLASSSystems..> 22-Dec-2014 10:43      1M
470-NonmalleablepublickeyencryptioninBRSIMUC.pdf   22-Dec-2014 10:43    137K
471-ImprovedKeyGenerationForGentry39sFullyHomom..> 20-Jan-2023 08:33    216K
471-ImprovedKeyGenerationForGentrysFullyHomomor..> 22-Dec-2014 10:43    216K
472-ForwardSecureRingSignaturewithoutRandomOrac..> 22-Dec-2014 10:43    423K
473-PracticallyEfficientVerifiableDelegationofP..> 22-Dec-2014 10:43    137K
473-PracticallyEfficientVerifiableDelegationofP..> 22-Dec-2014 10:43    345K
474-ImprovedGenericAlgorithmsforHardKnapsacks.pdf  22-Dec-2014 10:43    466K
475-SolvingCircuitOptimisationProblemsinCryptog..> 22-Dec-2014 10:43    180K
476-AnonymousBroadcastEncryptionAdaptiveSecurit..> 22-Dec-2014 10:43    579K
477-CryptanalysisofNTRUwithtwopublickeys.pdf       22-Dec-2014 10:43    141K
478-Anefficientcertificatelessauthenticatedkeya..> 22-Dec-2014 10:43    294K
479-IdentityBasedLossyTrapdoorFunctionsandAppli..> 22-Dec-2014 10:43    418K
480-CompleteTreeSubsetDifferenceBroadcastEncryp..> 22-Dec-2014 10:43    449K
481-ClosetoUniformPrimeNumberGenerationWithFewe..> 22-Dec-2014 10:43    350K
482-SecureComputationwithSublinearAmortizedWork..> 22-Dec-2014 10:43    787K
483-AdaptionofPollard39skangarooalgorithmtotheF..> 20-Jan-2023 08:33    308K
483-AdaptionofPollardskangarooalgorithmtotheFAC..> 22-Dec-2014 10:43    308K
484-XMSSAPracticalForwardSecureSignatureSchemeb..> 22-Dec-2014 10:43    584K
485-AnotherLookatAutomatedTheoremProvingII.pdf     22-Dec-2014 10:43    181K
486-OntheJointSecurityofEncryptionandSignatureR..> 22-Dec-2014 10:43    482K
487-NoiselessDatabasePrivacy.pdf                   22-Dec-2014 10:43    378K
488-ASurveyofCryptographyBasedonPhysicallyUnclo..> 22-Dec-2014 10:43    121K
488-ASurveyofCryptographyBasedonPhysicallyUnclo..> 22-Dec-2014 10:43    256K
489-TowardsaTheoryofSecurityEvaluationforGOSTli..> 22-Dec-2014 10:43    223K
489-TowardsaTheoryofSecurityEvaluationforGOSTli..> 22-Dec-2014 10:43    342K
490-ToolsforSimulatingFeaturesofCompositeOrderB..> 22-Dec-2014 10:42      1M
491-CryptanalysisofaPrivacyPreservingCommunicat..> 20-Jan-2023 14:20     207
492-Rationaldistanceboundingprotocolsovernoisyc..> 22-Dec-2014 10:42    840K
493-FromPointObfuscationTo3roundZeroKnowledge.pdf  22-Dec-2014 10:42    432K
494-EfficientRSAKeyGenerationandThresholdPailli..> 22-Dec-2014 10:42    668K
495-VectorCommitmentsandtheirApplications.pdf      22-Dec-2014 10:42    474K
496-OnthePublicIndifferentiabilityandCorrelatio..> 22-Dec-2014 10:42    777K
497-CanaProgramReverseEngineerItself.pdf           22-Dec-2014 10:42    306K
498-AnEfficientSecureAnonymousProxySignatureSch..> 22-Dec-2014 10:42    156K
499-Duplexingthespongesinglepassauthenticateden..> 22-Dec-2014 10:42    411K
500-BicliqueCryptanalysisoftheBlockCipherSQUARE..> 22-Dec-2014 10:42    367K
501-TrapdoorsforLatticesSimplerTighterFasterSma..> 22-Dec-2014 10:42    516K
502-WildMcElieceIncognito.pdf                      22-Dec-2014 10:42    334K
503-OntheinfluenceofthealgebraicdegreeofF1onthe..> 20-Jan-2023 08:33    757K
503-OntheinfluenceofthealgebraicdegreeofF87221o..> 22-Dec-2014 10:42    757K
504-FromNonAdaptivetoAdaptivePseudorandomFuncti..> 22-Dec-2014 10:42    383K
505-ANewSecondOrderSideChannelAttackBasedonLine..> 22-Dec-2014 10:42    602K
506-Towardsquantumresistantcryptosystemsfromsup..> 22-Dec-2014 10:42    488K
507-RelativelySoundNIZKsandPasswordBasedKeyExch..> 22-Dec-2014 10:42    402K
508-SecureTwoPartyComputationwithLowCommunicati..> 22-Dec-2014 10:42    236K
509-PolicyEnhancedPrivateSetIntersectionSharing..> 22-Dec-2014 10:42    361K
510-OntheSecurityoftheFreeXORTechnique.pdf         22-Dec-2014 10:42    197K
511-TheCryptographicPowerofRandomSelection.pdf     22-Dec-2014 10:42    432K
512-ADichotomyforLocalSmallBiasGenerators.pdf      22-Dec-2014 10:42    406K
513-NonMalleableZeroKnowledgeBlackBoxConstructi..> 22-Dec-2014 10:41    520K
514-MilderDefinitionsofComputationalApproximabi..> 22-Dec-2014 10:41    393K
515-AgeneralconjecturesimilartoTDconjectureandi..> 22-Dec-2014 10:41    238K
516-ProtectingAESwithShamir39sSecretSharingSche..> 20-Jan-2023 08:33    432K
516-ProtectingAESwithShamirsSecretSharingScheme..> 22-Dec-2014 10:41    432K
517-VerifiabilityPrivacyandCoercionResistanceNe..> 22-Dec-2014 10:41    374K
518-Two1RoundProtocolsforDelegationofComputatio..> 22-Dec-2014 10:41    294K
519-LeakageResilientCryptographyFromtheInnerPro..> 22-Dec-2014 10:41    663K
520-HoussemMaghrebiandSylvainGuilleyandClaudeCa..> 22-Dec-2014 10:41    282K
521-PseudorandomKnapsacksandtheSampleComplexity..> 22-Dec-2014 10:41    568K
522-ACompactSBoxDesignforSMS4BlockCipher.pdf       22-Dec-2014 10:41    772K
523-Securityanalysisofafuzzyidentitybasedencryp..> 20-Jan-2023 14:20     207
524-SecurityofReducedRoundCamelliaagainstImposs..> 22-Dec-2014 10:41    240K
525-ANoteontheDensityoftheMultipleSubsetSumProb..> 22-Dec-2014 10:41    232K
526-UniversallyComposableSecurityAnalysisofOAut..> 22-Dec-2014 10:41    237K
526-UniversallyComposableSecurityAnalysisofOAut..> 22-Dec-2014 10:41    444K
527-SecurityWeaknessesofpasswordonlyauthenticat..> 20-Jan-2023 14:20     207
528-EfficientDelegationBasedAuthenticationProto..> 22-Dec-2014 10:41    159K
529-SecureandEfficientProofofStoragewithDedupli..> 22-Dec-2014 10:41    160K
530-KeyEvolutionSchemesResilienttoSpaceBoundedL..> 22-Dec-2014 10:41    405K
531-StaticFaultAttacksonHardwareDESRegisters.pdf   22-Dec-2014 10:41      2M
532-HashFunctionsBasedonThreePermutationsAGener..> 22-Dec-2014 10:41    679K
533-TwoOutputSecureComputationwithMaliciousAdve..> 22-Dec-2014 10:41    513K
534-FormalAnalysisoftheEntropySecurityTradeoffi..> 22-Dec-2014 10:41    334K
535-MultipartyComputationfromSomewhatHomomorphi..> 22-Dec-2014 10:41    650K
536-RevisitingLowerandUpperBoundsforSelectiveDe..> 22-Dec-2014 10:41    783K
537-LatticeSignaturesWithoutTrapdoors.pdf          22-Dec-2014 10:40    464K
538-LeakageResilientClientsideDeduplicationofEn..> 22-Dec-2014 10:40    670K
539-SignModulesinSecureArithmeticCircuits.pdf      22-Dec-2014 10:40    464K
540-EfficientImplementationoftheeta_TPairingonG..> 22-Dec-2014 10:40    314K
541-MinimalisminCryptographyTheEvenMansourSchem..> 22-Dec-2014 10:40    252K
542-CertificateBasedSigncryptionSecurityModelan..> 22-Dec-2014 10:40    318K
543-AdaptivelyAttributeHidingHierarchicalInnerP..> 22-Dec-2014 10:40    764K
544-DesigningPrivacypreservingSmartMeterswithLo..> 22-Dec-2014 10:40    404K
545-PublicKeyCryptosystemsConstructedBasedonRan..> 22-Dec-2014 10:40    107K
546-HiddenVectorEncryptionFullySecureAgainstUnr..> 22-Dec-2014 10:40    428K
547-TheSingleCycleTfunctions.pdf                   22-Dec-2014 10:40    111K
548-OnthesecurityofMQ_DRBG.pdf                     22-Dec-2014 10:40    489K
549-1ResilientBooleanFunctionwithOptimalAlgebra..> 22-Dec-2014 10:40    255K
550-ANewDistinguisherforCubeHash8bandCubeHash15..> 22-Dec-2014 10:40    225K
551-SecurityEvaluationagainstDifferentialCrypta..> 22-Dec-2014 10:40    180K
552-RecyclablePUFsLogicallyReconfigurablePUFs.pdf  22-Dec-2014 10:40    517K
553-PubliclyVerifiableProofsofSequentialWork.pdf   22-Dec-2014 10:40    503K
554-Onthesecuritymodelsforcertificatelesssignat..> 22-Dec-2014 10:40    157K
555-OntheRoleofExpanderGraphsinKeyPredistributi..> 22-Dec-2014 10:40    347K
556-GF2nredundantrepresentationusingmatrixembed..> 22-Dec-2014 10:40    126K
557-AnImprovedTraceDrivenInstructionCacheTiming..> 22-Dec-2014 10:40    748K
558-ImprovedAttacksonFullGOST.pdf                  22-Dec-2014 10:40    447K
559-InstantiabilityofRSAOAEPunderChosenPlaintex..> 22-Dec-2014 10:40    341K
560-RandomizedSecureTwoPartyComputationforModul..> 22-Dec-2014 10:40    415K
561-ADomainSpecificLanguageforComputingonEncryp..> 22-Dec-2014 10:40    261K
561-ADomainSpecificLanguageforComputingonEncryp..> 22-Dec-2014 10:39    784K
562-AGroupTestingApproachtoImprovedCorruptionLo..> 22-Dec-2014 10:39    401K
563-OntheSecurityofRFIDAntiCloningSecurityProto..> 22-Dec-2014 10:39    211K
563-OntheSecurityofRFIDAntiCloningSecurityProto..> 22-Dec-2014 10:39    952K
564-PrivatekeySymbolicEncryption.pdf               22-Dec-2014 10:39    411K
564-PrivatekeySymbolicEncryption.ps                22-Dec-2014 10:39      3M
565-CryptographicHashFunctionsRecentDesignTrend..> 22-Dec-2014 10:39      1M
566-FullyHomomorphicEncryptionwithPolylogOverhe..> 22-Dec-2014 10:39    518K
567-OnthesparsesubsetsumproblemfromGentryHalevi..> 20-Jan-2023 08:33    250K
567-OnthesparsesubsetsumproblemfromGentryHalevi..> 22-Dec-2014 10:39    250K
568-SingleLayerOpticalscanVotingwithFullyDistri..> 22-Dec-2014 10:39    480K
569-AnalysisoftheHammingWeightoftheExtendedwmbN..> 22-Dec-2014 10:39    173K
570-DegreeofregularityforHFE.pdf                   22-Dec-2014 10:39    294K
571-LowerBoundonCoveringRadiusofReedMullerCodes..> 20-Jan-2023 14:20     207
572-TheElGamalcryptosystemovercirculantmatrices..> 22-Dec-2014 10:39    236K
573-ANewClassofMultivariatePublicKeyCryptosyste..> 22-Dec-2014 10:39    124K
574-TowardsEfficientProvableDataPossessioninClo..> 22-Dec-2014 10:39    475K
575-ExclusiveKeyBasedGroupRekeyingProtocols.pdf    22-Dec-2014 10:39    382K
576-EfficientMulticastKeyDistributionUsingHOWPB..> 22-Dec-2014 10:39    620K
577-AnEfficientProtocolfortheCommitProveFairOpe..> 22-Dec-2014 10:39    462K
578-ACCELERATINGTHESCALARMULTIPLICATIONONGENUS2..> 22-Dec-2014 10:39    468K
579-ClockwiseCollisionAnalysisOverlookedSideCha..> 22-Dec-2014 10:39      1M
580-OnanewgeneralizationofHuffcurves.pdf           22-Dec-2014 10:38    385K
581-StandardSecurityDoesNotImplySecurityAgainst..> 22-Dec-2014 10:38    339K
581-StandardSecurityDoesNotImplySecurityAgainst..> 22-Dec-2014 10:38      1M
582-RandomnessExtractioninfinitefieldsmathbbF_p..> 22-Dec-2014 10:38    113K
583-RevocableIdentityBasedEncryptionfromLattice..> 22-Dec-2014 10:38    364K
584-ASingleKeyAttackon6RoundKASUMI.pdf             22-Dec-2014 10:38    139K
585-IrisAScalableCloudFileSystemwithEfficientIn..> 22-Dec-2014 10:38    676K
586-TweLEXATweakedVersionoftheLEXStreamCipher.pdf  22-Dec-2014 10:38    155K
587-SignaturesofCorrectComputation.pdf             22-Dec-2014 10:38    497K
588-AnotherLookatSymmetricIncoherentOptimalEave..> 22-Dec-2014 10:38    323K
589-ImpactofIntel39sNewInstructionSetsonSoftwar..> 20-Jan-2023 08:33    393K
589-ImpactofIntelsNewInstructionSetsonSoftwareI..> 22-Dec-2014 10:38    393K
590-AnEfficientBroadcastAttackagainstNTRU.pdf      22-Dec-2014 10:38    145K
591-AUnifiedFrameworkforSmallSecretExponentAtta..> 22-Dec-2014 10:38    166K
592-GenericConstructionsforVerifiableSigncrypti..> 22-Dec-2014 10:38    330K
592-GenericConstructionsforVerifiableSigncrypti..> 22-Dec-2014 10:38    838K
593-CCASecureIBKEMfromtheComputationalBilinearD..> 22-Dec-2014 10:38    452K
594-ReceiptFreenessofPrtVoterProvablySecure.pdf    22-Dec-2014 10:38      3M
595-EfficientMultiQueryCPIRfromRingLWE.pdf         20-Jan-2023 14:20     207
596-ParallelHomomorphicEncryption.pdf              22-Dec-2014 10:38    492K
597-HowtoDelegateandVerifyinPublicVerifiableCom..> 22-Dec-2014 10:38    202K
598-NewSubexponentialAlgorithmsforFactoringinSL..> 22-Dec-2014 10:38    222K
599-EfficientPasswordBasedAuthenticatedKeyExcha..> 20-Jan-2023 14:20     207
600-ANewClassofHyperbentBooleanFunctionswithMul..> 22-Dec-2014 10:38    130K
601-AMultiReceiverIDBasedGeneralizedSigncryptio..> 22-Dec-2014 10:38    107K
602-PositiveResultsforConcurrentlySecureComputa..> 22-Dec-2014 10:38    512K
603-AdvancedZeroSumDistinguishersforthePermutat..> 20-Jan-2023 14:20     207
604-Genus2HyperellipticCurveFamilieswithExplici..> 22-Dec-2014 10:38    557K
605-EfficientandSecureDelegationofLinearAlgebra..> 22-Dec-2014 10:38    511K
606-GF2nSubquadraticPolynomialBasisMultipliersf..> 20-Jan-2023 14:20     207
607-ImprovingAdditiveandMultiplicativeHomomorph..> 22-Dec-2014 10:37    410K
608-FourDimensionalGallantLambertVanstoneScalar..> 22-Dec-2014 10:37    267K
609-ThePHOTONFamilyofLightweightHashFunctions.pdf  22-Dec-2014 10:37    592K
610-AnoptimalKeyEnumerationAlgorithmanditsAppli..> 22-Dec-2014 10:37    611K
611-AdaptiveandConcurrentSecureComputationfromN..> 22-Dec-2014 10:37    527K
612-IBAKEIdentityBasedAuthenticatedKeyExchangeP..> 22-Dec-2014 10:37    309K
613-MultipartyComputationwithLowCommunicationCo..> 22-Dec-2014 10:37    776K
614-OnSecurityofRASPDataPerturbationforSecureHa..> 22-Dec-2014 10:37    174K
614-OnSecurityofRASPDataPerturbationforSecureHa..> 22-Dec-2014 10:37    483K
615-OntheJointSecurityofEncryptionandSignaturei..> 22-Dec-2014 10:37    394K
616-ImpossibleDifferentialCryptanalysisoftheLig..> 22-Dec-2014 10:37    504K
617-CharmAframeworkforRapidlyPrototypingCryptos..> 22-Dec-2014 10:37      1M
618-PracticalRelayAttackonContactlessTransactio..> 22-Dec-2014 10:37      5M
619-MultidimensionalMeetintheMiddleAttackandIts..> 22-Dec-2014 10:37    286K
620-ProvableSecurityofBLAKEwithNonIdealCompress..> 22-Dec-2014 10:37    461K
621-AdaptiveSecurityofConcurrentNonMalleableZer..> 22-Dec-2014 10:37    669K
622-Homomorphicencryptionfromcodes.pdf             22-Dec-2014 10:37    323K
623-IndifferentiabilityoftheHashAlgorithmBLAKE.pdf 22-Dec-2014 10:37    199K
624-NewattacksonKeccak224andKeccak256.pdf          22-Dec-2014 10:37    365K
625-TwoRFIDPrivacyModelsinFrontofaCourt.pdf        20-Jan-2023 14:20     207
626-AlgebraicComplexityReductionandCryptanalysi..> 22-Dec-2014 10:37    940K
627-Anoteonsemibentfunctionswithmultipletracete..> 22-Dec-2014 10:36    509K
628-MaximumLeakageResilientIBEandIPE.pdf           22-Dec-2014 10:36    476K
629-NearLinearUnconditionallySecureMultipartyCo..> 22-Dec-2014 10:36    469K
630-IndifferentiabilitySecurityoftheFastWidePip..> 22-Dec-2014 10:36      1M
631-CheatingHumanVisioninVisualSecretSharing.pdf   22-Dec-2014 10:36      4M
632-AScalableMethodforConstructingGaloisNLFSRsw..> 22-Dec-2014 10:36     95K
633-PracticalrealisationandeliminationofanECCre..> 22-Dec-2014 10:36    339K
634-SecurityofMultipleKeyAgreementProtocolsandP..> 22-Dec-2014 10:36    230K
635-GroestlTweaksandtheirEffectonFPGAResults.pdf   22-Dec-2014 10:36    262K
636-UntanglingRFIDPrivacyModels.pdf                20-Jan-2023 14:20     207
637-RandomNumberGenerationBasedonOscillatoryMet..> 22-Dec-2014 10:36    353K
638-Rubik39sforcryptographers.pdf                  20-Jan-2023 08:33    424K
638-Rubiksforcryptographers.pdf                    22-Dec-2014 10:36    424K
639-TowardsaProbabilisticComplexitytheoreticMod..> 22-Dec-2014 10:36    464K
639-TowardsaProbabilisticComplexitytheoreticMod..> 22-Dec-2014 10:36      2M
640-HummingbirdPrivacyatthetimeofTwitter.pdf       22-Dec-2014 10:36    431K
641-Collisionfor75stepSHA1IntensiveParallelizat..> 22-Dec-2014 10:36    189K
642-Constructingdifferentially4uniformpermutati..> 22-Dec-2014 10:36    252K
643-SomeWordsAboutCryptographicKeyRecognitionIn..> 22-Dec-2014 10:36    253K
644-McOEAFamilyofAlmostFoolproofOnLineAuthentic..> 22-Dec-2014 10:36    557K
645-FullyHomomorphicEncryptionBasedonApproximat..> 22-Dec-2014 10:36    217K
646-Thesecurityimpactofanewcryptographiclibrary..> 22-Dec-2014 10:35    291K
647-BreakingH2MACUsingBirthdayParadox.pdf          22-Dec-2014 10:35    248K
648-AchievingShortCiphertextsorShortSecretKeysf..> 22-Dec-2014 10:35    398K
649-OntheSecurityofNMACandItsVariants.pdf          22-Dec-2014 10:35    319K
650-FullySecureSpatialEncryptionunderSimpleAssu..> 22-Dec-2014 10:35    429K
651-CHECKEROnsitecheckinginRFIDbasedsupplychain..> 22-Dec-2014 10:35    255K
652-SecurityEnhancementoftheVortexFamilyofHashF..> 22-Dec-2014 10:35    259K
653-AnImprovedCertificatelessAuthenticatedKeyAg..> 20-Jan-2023 14:20     207
654-EllipticCurveCryptographyinJavaScript.pdf      22-Dec-2014 10:35    256K
655-PrivacyPreservingStreamAggregationwithFault..> 22-Dec-2014 10:35    380K
656-UseDatadependFunctionBuildMessageExpansionF..> 22-Dec-2014 10:35    222K
657-ASystematicMethodtoEvaluateandComparethePer..> 22-Dec-2014 10:35    253K
658-Anonymousattestationwithusercontrolledlinka..> 22-Dec-2014 10:35    386K
659-FormallyAssessingCryptographicEntropy.pdf      22-Dec-2014 10:35      1M
660-ProgramObfuscationwithLeakyHardware.pdf        22-Dec-2014 10:35    579K
661-NewImpossibleDifferentialAttacksonCamellia.pdf 22-Dec-2014 10:35    336K
661-NewImpossibleDifferentialAttacksonCamellia.ps  22-Dec-2014 10:35      3M
662-Deployingsecuremultipartycomputationforfina..> 22-Dec-2014 10:35    559K
663-CloudAssistedMultipartyComputationfromFully..> 22-Dec-2014 10:35    568K
664-OntheSecurityofIDBasedSigncryptionSchemes.pdf  22-Dec-2014 10:35    367K
665-EfficientModularExponentiationbasedPuzzlesf..> 22-Dec-2014 10:35    479K
666-AGrossZagierformulaforquaternionalgebrasove..> 22-Dec-2014 10:35    600K
667-AnEfficientandPrivateRFIDAuthenticationProt..> 20-Jan-2023 14:20     207
668-ReEncryptionBasedKeyManagementTowardsSecure..> 22-Dec-2014 10:35    419K
669-SmallLinearizationMemoryFriendlySolvingofNo..> 22-Dec-2014 10:35    521K
670-SHA3onARM11processors.pdf                      22-Dec-2014 10:34    300K
671-ImprovedResultsonImpossibleDifferentialCryp..> 22-Dec-2014 10:34    338K
672-FastandSecureRootFindingforCodebasedCryptos..> 22-Dec-2014 10:34    539K
673-PseudorandomSignatures.pdf                     22-Dec-2014 10:34    549K
674-ExtendedCombinatorialConstructionsforPeerto..> 22-Dec-2014 10:34    329K
675-BasingObfuscationonSimpleTamperProofHardwar..> 22-Dec-2014 10:34    397K
676-EnhancedBiometricsbasedRemoteUserAuthentica..> 22-Dec-2014 10:34    257K
677-CommitCoinCarbonDatingCommitmentswithBitcoi..> 22-Dec-2014 10:34    537K
678-Ondefinitionsofselectiveopeningsecurity.pdf    22-Dec-2014 10:34    496K
679-CTLAPlatformIndependentCryptoToolsLibraryBa..> 22-Dec-2014 10:34    728K
680-BetterBootstrappinginFullyHomomorphicEncryp..> 22-Dec-2014 10:34    354K
681-PhysicallyUncloneableFunctionsintheUniversa..> 22-Dec-2014 10:34    652K
682-UCframeworkforanonymouscommunication.pdf       22-Dec-2014 10:34    166K
683-TimingAttacksagainsttheSyndromeInversioninC..> 22-Dec-2014 10:34    358K
684-IdentificationBasedEncryptionwithRSAOAEPUsi..> 22-Dec-2014 10:34    380K
684-IdentificationBasedEncryptionwithRSAOAEPUsi..> 22-Dec-2014 10:34    426K
685-CryptanalysisofSymmetricBlockCiphersBasedon..> 22-Dec-2014 10:34    232K
686-AnalysisofsomenaturalvariantsofthePKPAlgori..> 22-Dec-2014 10:34    324K
687-CryptanalysisofWG7ALightweightStreamCipherf..> 22-Dec-2014 10:34    312K
688-AuthenticatedKeyExchangeunderBadRandomness.pdf 22-Dec-2014 10:34    325K
689-EfficientUniversallyComposableTwoPartyCompu..> 20-Jan-2023 08:33    498K
690-ANewClassofMultivariatePublicKeyCryptosyste..> 22-Dec-2014 10:34    119K
691-YetAnotherUltralightweightAuthenticationPro..> 22-Dec-2014 10:34    174K
692-FullySecureDoublySpatialEncryptionunderSimp..> 22-Dec-2014 10:34    370K
693-Anoninteractivedeniableauthenticationscheme..> 22-Dec-2014 10:34    141K
694-GenericSidechannelDistinguisherBasedonKolmo..> 22-Dec-2014 10:33    735K
695-DeterministicIdentityBasedSignatureSchemean..> 22-Dec-2014 10:33    560K
696-EfficientNetworkCodingSignaturesintheStanda..> 22-Dec-2014 10:33    281K
697-SPONGENTTheDesignSpaceofLightweightCryptogr..> 22-Dec-2014 10:33    945K
698-AgeneralizationoftheclassofhyperbentBoolean..> 22-Dec-2014 10:33    313K
699-PublicKeyEncryptionwithClusterChainbasedKey..> 20-Jan-2023 14:20     207
700-EfficientAttributeBasedSignaturesforNonMono..> 22-Dec-2014 10:33    502K
701-DecentralizedAttributeBasedSignatures.pdf      22-Dec-2014 10:33    535K
702-Commentsofanefficientandsecuremultiserverau..> 22-Dec-2014 10:33     77K
703-WatersSignatureswithOptimalSecurityReductio..> 22-Dec-2014 10:33    278K
704-SecurityAnalysisofaPUFbasedRFIDAuthenticati..> 22-Dec-2014 10:33    152K
704-SecurityAnalysisofaPUFbasedRFIDAuthenticati..> 22-Dec-2014 10:33    637K
705-DifferentialAttacksonGeneralizedFeistelSche..> 22-Dec-2014 10:33    372K
706-ImprovedSideChannelAttacksonPairingBasedCry..> 22-Dec-2014 10:33    651K
707-CryptanalysisofTheAtmelCipherinSecureMemory..> 22-Dec-2014 10:33    269K
707-CryptanalysisofTheAtmelCipherinSecureMemory..> 22-Dec-2014 10:33      1M
708-ComputationalExtractorsandPseudorandomness.pdf 22-Dec-2014 10:33    408K
709-FaultAttackagainstMiller39salgorithm.pdf       20-Jan-2023 08:33    362K
709-FaultAttackagainstMillersalgorithm.pdf         22-Dec-2014 10:33    362K
710-CryptanalysisoftheFullAESUsingGPULikeSpecia..> 22-Dec-2014 10:33    180K
711-EvolutionaryConstructionofdeBruijnSequences..> 22-Dec-2014 10:33    148K
712-EfficientJavaImplementationofEllipticCurveC..> 22-Dec-2014 10:33    279K
713-Aserveraidedverificationsignatureschemewith..> 22-Dec-2014 10:33    162K
714-PositionVerificationinMultiChannelModels.pdf   22-Dec-2014 10:33    328K