Index of /2012/
../
001-DigitalSignaturesfromChallengeDividedSigmaP..> 22-Dec-2014 11:35 132K
002-ECC2K130onNVIDIAGPUs.pdf 22-Dec-2014 11:35 227K
003-Onthedistinctnessofbinarysequencesderivedfr..> 22-Dec-2014 11:35 240K
004-ThenewSHA3softwareshootout.pdf 22-Dec-2014 11:35 415K
005-AUnifiedApproachtoDeterministicEncryptionNe..> 22-Dec-2014 11:35 518K
006-DetectingDangerousQueriesANewApproachforCho..> 22-Dec-2014 11:35 244K
007-OptimalMultipleAssignmentswithmmSchemeforGe..> 22-Dec-2014 11:35 92K
008-Securityproofwithdishonestkeys.pdf 22-Dec-2014 11:35 700K
009-OntheIndifferentiabilityoftheIntegratedKeyH..> 22-Dec-2014 11:35 1M
010-PayTree34AmortizedSignature34forFlexibleMic..> 20-Jan-2023 08:33 88K
010-PayTreeAmortizedSignatureforFlexibleMicroPa..> 22-Dec-2014 11:34 88K
011-BicliqueAttackoftheFullARIA256.pdf 22-Dec-2014 11:34 204K
012-MalleableProofSystemsandApplications.pdf 22-Dec-2014 11:34 698K
013-HigherOrderAlgebraicAttacksonStreamCiphers.pdf 20-Jan-2023 14:20 207
014-ResetIndifferentiabilityfromWeakenedRandomO..> 22-Dec-2014 11:34 268K
015-ACryptographicTreatmentoftheWiretapChannel.pdf 22-Dec-2014 11:34 362K
015-ACryptographicTreatmentoftheWiretapChannel.ps 22-Dec-2014 11:34 1M
016-EfficientMixNetVericationbyProofsofRandomBl..> 20-Jan-2023 14:20 207
017-Secondaryconstructionsongeneralizedbentfunc..> 22-Dec-2014 11:34 197K
018-AttacksandSecurityProofsofEAXPrime.pdf 22-Dec-2014 11:34 268K
019-TowardsUnconditionalSoundnessComputationall..> 22-Dec-2014 11:34 393K
020-Dicksonpolynomialshyperellipticcurvesandhyp..> 22-Dec-2014 11:34 507K
021-SecurityAnalysisofJPAKE.pdf 20-Jan-2023 08:33 220K
022-PolynomialTimeSemanticallySecureEncryptionA..> 22-Dec-2014 11:34 288K
022-PolynomialTimeSemanticallySecureEncryptionA..> 22-Dec-2014 11:34 937K
023-OnthesecurityofLoetalsownershiptransferprot..> 22-Dec-2014 11:34 152K
023-OnthesecurityofLoetalsownershiptransferprot..> 22-Dec-2014 11:34 2M
024-VariantsofWaters39DualSystemPrimitivesUsing..> 20-Jan-2023 08:33 421K
024-VariantsofWatersDualSystemPrimitivesUsingAs..> 22-Dec-2014 11:34 366K
024-VariantsofWatersDualSystemPrimitivesUsingAs..> 22-Dec-2014 11:34 959K
025-Anewremotedataintegritycheckingschemeforclo..> 22-Dec-2014 11:34 222K
026-DecodingRandomBinaryLinearCodesin2n20How110..> 22-Dec-2014 11:34 200K
026-DecodingRandomBinaryLinearCodesin2n20How110..> 22-Dec-2014 11:34 693K
027-BreakingtheprovablysecureSAKECauthenticated..> 20-Jan-2023 14:20 207
028-AFirstOrderLeakFreeMaskingCountermeasure.pdf 22-Dec-2014 11:34 257K
029-OntheExactSecurityofSchnorrTypeSignaturesin..> 22-Dec-2014 11:34 535K
030-FaultAnalysisoftheKATANFamilyofBlockCiphers..> 22-Dec-2014 11:34 333K
031-Anerrorin34OnanewformalproofmodelforRFIDloc..> 20-Jan-2023 08:33 100K
031-AnerrorinOnanewformalproofmodelforRFIDlocat..> 22-Dec-2014 11:34 100K
032-CounterexamplestoHardnessAmplificationBeyon..> 22-Dec-2014 11:34 335K
032-CounterexamplestoHardnessAmplificationBeyon..> 22-Dec-2014 11:34 978K
033-AnoteonhyperbentfunctionsviaDillonlikeexpon..> 22-Dec-2014 11:33 603K
034-AutomaticQuantificationofCacheSideChannels.pdf 22-Dec-2014 11:33 452K
035-KeyAlternatingCiphersinaProvableSettingEncr..> 22-Dec-2014 11:33 485K
036-EfficientLeakagefreeAuthenticationofTreesGr..> 22-Dec-2014 11:33 237K
036-EfficientLeakagefreeAuthenticationofTreesGr..> 22-Dec-2014 11:33 661K
037-Someresultsonqarybentfunctions.pdf 22-Dec-2014 11:33 203K
038-CryptanalysisoftheCHES20092010RandomDelayCo..> 22-Dec-2014 11:33 506K
039-SecurityAnalysisofaMultiFactorAuthenticated..> 22-Dec-2014 11:33 514K
040-SingleblockcollisionattackonMD5.pdf 22-Dec-2014 11:33 411K
041-ANEWDEDICATEDCRYPTOGRAPHICHASHFUNCTION.pdf 20-Jan-2023 14:20 207
042-KeyLengthEstimationofPairingbasedCryptosyst..> 22-Dec-2014 11:33 159K
043-AnovelGroupKeyTransferProtocol.pdf 22-Dec-2014 11:33 156K
044-PSCPAPatientSelfcontrollablePrivacypreservi..> 22-Dec-2014 11:33 6M
045-SignatureSchemesSecureagainstHardtoInvertLe..> 22-Dec-2014 11:33 434K
046-ModifyingBooleanFunctionstoEnsureMaximumAlg..> 22-Dec-2014 11:33 268K
047-IncrementalDeterministicPublicKeyEncryption..> 22-Dec-2014 11:33 248K
048-DesigningIntegratedAcceleratorforStreamCiph..> 22-Dec-2014 11:33 1M
049-2DimensionSumsDistinguishersBeyondThreeRoun..> 22-Dec-2014 11:33 279K
050-InvestigatingthePotentialofCustomInstructio..> 22-Dec-2014 11:33 153K
051-EavesdroppingonSatelliteTelecommunicationSy..> 22-Dec-2014 11:33 212K
052-IdentitybasedEncryptionwithEfficientRevocat..> 22-Dec-2014 11:33 436K
053-BeatingShannonrequiresBOTHefficientadversar..> 22-Dec-2014 11:33 63K
053-BeatingShannonrequiresBOTHefficientadversar..> 22-Dec-2014 11:33 337K
054-OntheperformanceofcertainPrivateSetIntersec..> 22-Dec-2014 11:33 514K
055-CryptanalysisofMunetal39sanonymousauthentic..> 20-Jan-2023 14:20 207
056-ANewPseudorandomGeneratorfromCollisionResis..> 22-Dec-2014 11:32 419K
057-AnonymousConstantSizeCiphertextHIBEFromAsym..> 22-Dec-2014 11:32 393K
058-Keyrecyclinginauthentication.pdf 22-Dec-2014 11:32 245K
058-Keyrecyclinginauthentication.ps 22-Dec-2014 11:32 793K
059-MessageAuthenticationRevisited.pdf 22-Dec-2014 11:32 364K
060-ImprovedSecurityforLinearlyHomomorphicSigna..> 22-Dec-2014 11:32 470K
061-APairingBasedStrongDesignatedVerifierSignat..> 22-Dec-2014 11:32 209K
062-OntheSecurityofAttributeBasedSignatureSchem..> 20-Jan-2023 08:33 417K
063-RandomizedPartialCheckingRevisited.pdf 22-Dec-2014 11:32 256K
064-RonwaswrongWhitisright.pdf 22-Dec-2014 11:32 464K
065-ModifiedversionofLatinDancesRevisitedNewAna..> 22-Dec-2014 11:32 60K
066-WeakKeysoftheFullMISTY1BlockCipherforRelate..> 22-Dec-2014 11:32 303K
067-Parallelizingmessageschedulestoaccelerateth..> 22-Dec-2014 11:32 1M
068-ExtendedSecurityArgumentsforRingSignatureSc..> 22-Dec-2014 11:32 379K
069-AutomaticSearchofAttacksonroundreducedAESan..> 22-Dec-2014 11:32 631K
070-FindingECMFriendlyCurvesthroughaStudyofGalo..> 22-Dec-2014 11:32 493K
071-FastReductionsfromRAMstoDelegatableSuccinct..> 22-Dec-2014 11:32 2M
072-ParticularlyFriendlyMembersofFamilyTrees.pdf 22-Dec-2014 11:32 543K
073-Efficientidentitybasedthresholdsignaturesch..> 22-Dec-2014 11:32 311K
074-AnotherlookatHMAC.pdf 22-Dec-2014 11:32 233K
075-Efficientidentitybasedthresholddecryptionsc..> 22-Dec-2014 11:32 165K
076-SecureIdentityBasedEncryptionintheQuantumRa..> 22-Dec-2014 11:32 553K
077-MAGNITUDESQUAREDCOHERENCEBASEDSCA.pdf 22-Dec-2014 11:32 264K
078-FullyHomomorphicEncryptionwithoutModulusSwi..> 22-Dec-2014 11:32 171K
079-PublicKeyCryptosystemsConstructedBasedonRee..> 22-Dec-2014 11:32 121K
080-StronglyUnforgeableProxyReSignaturesintheSt..> 22-Dec-2014 11:31 283K
081-ComputationalSoundnessofSymbolicZeroknowled..> 22-Dec-2014 11:31 566K
082-SemiSupervisedTemplateAttack.pdf 22-Dec-2014 11:31 443K
083-OptimallyRobustPrivateInformationRetrieval.pdf 22-Dec-2014 11:31 218K
084-ImprovedAlgebraicSideChannelAttackonAES.pdf 22-Dec-2014 11:31 295K
085-StudyoftheinvariantcosetattackonPRINTcipher..> 22-Dec-2014 11:31 509K
086-RemarksonAnidealmultisecretsharingschemebas..> 20-Jan-2023 14:20 207
087-CollisionBoundsfortheAdditivePollardRhoAlgo..> 22-Dec-2014 11:31 396K
088-ALatticeBasedTraitorTracingScheme.pdf 20-Jan-2023 14:20 207
089-ECMatWork.pdf 22-Dec-2014 11:31 541K
090-WorstCasetoAverageCaseReductionsforModuleLa..> 22-Dec-2014 11:31 620K
091-HardnessofdecisionRLWEforanymodulus.pdf 20-Jan-2023 14:20 207
092-TolerantAlgebraicSideChannelAnalysisofAES.pdf 22-Dec-2014 11:31 407K
093-RecentResultsonBalancedSymmetricBooleanFunc..> 22-Dec-2014 11:31 273K
094-Algebraicattackonlatticebasedcryptosystemsv..> 22-Dec-2014 11:31 108K
095-RecursiveCompositionandBootstrappingforSNAR..> 22-Dec-2014 11:31 879K
096-TheCollisionSecurityofMDC4.pdf 22-Dec-2014 11:31 226K
097-Analgorithmforfactoringintegers.pdf 22-Dec-2014 11:31 113K
098-CombinedAttacksontheAESKeySchedule.pdf 22-Dec-2014 11:31 179K
098-CombinedAttacksontheAESKeySchedule.ps 22-Dec-2014 11:31 771K
099-HomomorphicEvaluationoftheAESCircuit.pdf 22-Dec-2014 11:31 432K
100-CryptanalysisofaUniversallyVerifiableEffici..> 22-Dec-2014 11:31 270K
101-UnbalancedElementarySymmetricBooleanFunctio..> 20-Jan-2023 14:20 207
102-OntheCircularSecurityofBitEncryption.pdf 22-Dec-2014 11:31 464K
103-FlipItTheGameof34StealthyTakeover34.pdf 20-Jan-2023 08:33 642K
103-FlipItTheGameofStealthyTakeover.pdf 22-Dec-2014 11:31 642K
104-ProvablySecureGenericConstructionofCertific..> 22-Dec-2014 11:31 339K
105-GenericConstructionofCertificateBasedEncryp..> 22-Dec-2014 11:31 316K
106-MoreonCorrectingErrorsinRSAPrivateKeysBreak..> 22-Dec-2014 11:31 335K
107-SecurityAnalysisofASingleSignOnMechanismfor..> 22-Dec-2014 11:31 312K
108-OntheOptimalityofLatticesfortheCoppersmithT..> 22-Dec-2014 11:30 306K
109-ChosenCiphertextSecureEfficientlySearchable..> 20-Jan-2023 14:20 207
110-FindingOptimalFormulaeforBilinearMaps.pdf 22-Dec-2014 11:30 384K
111-OntheImmunityofRotationSymmetricBooleanFunc..> 22-Dec-2014 11:30 257K
112-OnTheNonlinearityofMaximumlengthNFSRFeedbac..> 22-Dec-2014 11:30 289K
113-OntheCollisionandPreimageSecurityofMDC4inth..> 22-Dec-2014 11:30 1M
114-OnHardeningLeakageResilienceofRandomExtract..> 22-Dec-2014 11:30 199K
115-CryptanalysisofauditingprotocolproposedbyWa..> 22-Dec-2014 11:30 911K
116-ClashAttacksontheVerifiabilityofEVotingSyst..> 22-Dec-2014 11:30 289K
117-UniversallyComposableSecurityWithLocalAdver..> 22-Dec-2014 11:30 640K
118-StrongerPublicKeyEncryptionSchemesWithstand..> 22-Dec-2014 11:30 567K
119-AcceleratingtheFinalExponentiationintheComp..> 22-Dec-2014 11:30 328K
120-PasswordProtectedSmartCardandMemoryStickAut..> 22-Dec-2014 11:30 179K
121-AnEfficientMultistageSecretSharingSchemeUsi..> 22-Dec-2014 11:30 325K
122-EfficientArithmeticonEllipticCurvesoverFiel..> 22-Dec-2014 11:30 317K
123-Injectionoftransientfaultsusingelectromagne..> 22-Dec-2014 11:30 2M
124-OnSecuringCommunicationFromProfilers.pdf 22-Dec-2014 11:30 183K
124-OnSecuringCommunicationFromProfilers.ps 22-Dec-2014 11:30 636K
125-ShortandEfficientExpressiveAttributeBasedSi..> 20-Jan-2023 08:33 361K
126-CompactImplementationofThreefishandSkeinonF..> 22-Dec-2014 11:30 664K
127-Additiveautocorrelationofsomeclassesofcubic..> 22-Dec-2014 11:30 199K
128-ProvablySecureDistanceBoundinganAnalysisofP..> 22-Dec-2014 11:30 421K
129-OutsiderAnonymousBroadcastEncryptionwithSub..> 22-Dec-2014 11:30 592K
130-BroadcastandRoundEfficientVerifiableSecretS..> 22-Dec-2014 11:30 183K
131-CompositionTheoremsforCCACryptographicSecur..> 22-Dec-2014 11:30 384K
132-CFSSoftwareImplementation.pdf 22-Dec-2014 11:29 333K
133-TowardPracticalPrivateAccesstoDataCentersvi..> 22-Dec-2014 11:29 490K
134-ADigitalSignatureSchemeforLongTermSecurity.pdf 22-Dec-2014 11:29 241K
135-DavidGoliathObliviousAffineFunctionEvaluati..> 22-Dec-2014 11:29 751K
135-DavidampGoliathObliviousAffineFunctionEvalu..> 20-Jan-2023 08:33 770K
136-AdaptiveKeyProtectioninComplexCryptosystems..> 22-Dec-2014 11:29 277K
137-UsableassemblylanguageforGPUsasuccessstory.pdf 22-Dec-2014 11:29 141K
138-AnImprovedDifferentialAttackonFullGOST.pdf 22-Dec-2014 11:29 896K
138-AnImprovedDifferentialAttackonFullGOSTexten..> 20-Jan-2023 08:33 1M
139-Formalvericationofsecureadhocnetworkrouting..> 22-Dec-2014 11:29 1M
140-HighlyParallelMontgomeryMultiplicationforMu..> 22-Dec-2014 11:29 1M
141-Bicliquesforpermutationscollisionandpreimag..> 22-Dec-2014 11:29 456K
142-IdentityBasedEncryptionwithMasterKeyDepende..> 22-Dec-2014 11:29 581K
143-UniversallyComposableSecureComputationwithM..> 22-Dec-2014 11:29 653K
144-SomewhatPracticalFullyHomomorphicEncryption..> 22-Dec-2014 11:29 381K
145-ConstructionoftheTsujiiShamirKasaharaTSKTyp..> 22-Dec-2014 11:29 93K
145-ConstructionoftheTsujiiShamirKasaharaTSKTyp..> 20-Jan-2023 08:32 93K
146-OnPolynomialSystemsArisingfromaWeilDescent.pdf 22-Dec-2014 11:29 522K
147-OnSecurityArgumentsoftheSecondRoundSHA3Cand..> 22-Dec-2014 11:29 285K
148-ReplacingUsernamePasswordwithSoftwareOnlyTw..> 22-Dec-2014 11:29 191K
149-AttackingScrambledBurrowsWheelerTransform.pdf 22-Dec-2014 11:29 218K
150-Circularchosenciphertextsecuritywithcompact..> 22-Dec-2014 11:29 507K
151-OnBooleanIdealsandVarietieswithApplicationt..> 22-Dec-2014 11:29 217K
152-OnsecurityofaCertificatelessAggregateSignat..> 22-Dec-2014 11:29 224K
153-AFrameworkfortheCryptographicVerificationof..> 22-Dec-2014 11:29 626K
154-TheJointSignatureandEncryptionRevisited.pdf 22-Dec-2014 11:29 501K
154-TheJointSignatureandEncryptionRevisited.ps 22-Dec-2014 11:28 616K
155-TowardPracticalGroupEncryption.pdf 22-Dec-2014 11:28 343K
155-TowardPracticalGroupEncryption.ps 22-Dec-2014 11:28 391K
156-FastEmbeddedSoftwareHashing.pdf 22-Dec-2014 11:28 327K
157-AttackonFullyHomomorphicEncryptionovertheIn..> 22-Dec-2014 11:28 320K
158-EfficientandOptimallySecureKeyLengthExtensi..> 22-Dec-2014 11:28 326K
159-HybridEncryptionintheMultiUserSetting.pdf 22-Dec-2014 11:28 265K
160-NewConstructionofPerfectSequenceSetandLowCo..> 20-Jan-2023 14:20 207
161-NewConstructionsofLowCorrelationSequenceswi..> 22-Dec-2014 11:28 315K
162-ProvablySecureOnlineOfflineIdentityBasedSig..> 22-Dec-2014 11:28 135K
162-ProvablySecureOnlineOfflineIdentityBasedSig..> 22-Dec-2014 11:28 192K
163-DifferentialpropagationanalysisofKeccak.pdf 22-Dec-2014 11:28 382K
164-OnSecureTwopartyIntegerDivision.pdf 22-Dec-2014 11:28 482K
165-KeyUpdatesforRFIDDistanceBoundingProtocolsA..> 22-Dec-2014 11:28 388K
166-AListofMaximumPeriodNLFSRs.pdf 22-Dec-2014 11:28 76K
167-Pairingbasedmethodsforgenus2jacobianswithma..> 22-Dec-2014 11:28 550K
168-ADistinguisherBasedAttackofaHomomorphicEncr..> 22-Dec-2014 11:28 308K
169-AnalysisofMinimumNumbersofLinearlyActiveSBo..> 22-Dec-2014 11:28 372K
170-Approachesfortheperformanceincreasingofsoft..> 22-Dec-2014 11:28 119K
171-QuantumMoneyfromHiddenSubspaces.pdf 22-Dec-2014 11:28 426K
171-QuantumMoneyfromHiddenSubspaces.ps 22-Dec-2014 11:28 947K
172-AttackingRSACRTSignatureswithFaultsonMontgo..> 22-Dec-2014 11:28 544K
173-AutomaticallyVerifiedMechanizedProofofOneEn..> 22-Dec-2014 11:28 363K
173-AutomaticallyVerifiedMechanizedProofofOneEn..> 22-Dec-2014 11:28 820K
174-ZeroKnowledgewithRubik39sCubesandNonAbelian..> 20-Jan-2023 08:32 368K
174-ZeroKnowledgewithRubiksCubesandNonAbelianGr..> 22-Dec-2014 11:28 368K
175-OptimalFirstOrderMaskingwithLinearandNonLin..> 22-Dec-2014 11:28 821K
176-ImprovementsofAlgebraicAttacksBasedonStruct..> 22-Dec-2014 11:28 154K
176-ImprovementsofAlgebraicAttacksBasedonStruct..> 22-Dec-2014 11:28 519K
177-EverlastingMultiPartyComputation.pdf 22-Dec-2014 11:27 533K
178-EperioMitigatingTechnicalComplexityinCrypto..> 22-Dec-2014 11:27 1000K
179-BillionGateSecureComputationwithMaliciousAd..> 22-Dec-2014 11:27 266K
180-YetAnotherSHA3Round3FPGAResultsPaper.pdf 22-Dec-2014 11:27 169K
181-AModularFrameworkforMultiFactorAuthenticati..> 22-Dec-2014 11:27 561K
182-HowtoConstructQuantumRandomFunctions.pdf 22-Dec-2014 11:27 524K
183-DifferentiallyPrivateSmartMeteringwithBatte..> 22-Dec-2014 11:27 233K
184-AsymptoticfingerprintingcapacityintheCombin..> 22-Dec-2014 11:27 553K
185-ReplayattacksthatviolateballotsecrecyinHeli..> 22-Dec-2014 11:27 374K
186-Thirdordernonlinearitiesofsomebiquadraticmo..> 22-Dec-2014 11:27 115K
187-SmartTokensDelegableAccessControlwithNFCena..> 22-Dec-2014 11:27 711K
188-NonMalleableExtractorsTwoSourceExtractorsan..> 22-Dec-2014 11:27 550K
188-NonMalleableExtractorsTwoSourceExtractorsan..> 22-Dec-2014 11:27 1M
189-UniversallyComposableKeyManagement.pdf 22-Dec-2014 11:27 585K
190-OntheSecurityofanImprovedPasswordAuthentica..> 22-Dec-2014 11:27 170K
191-SecurityAnalysisandEnhancementforPrefixPres..> 22-Dec-2014 11:27 335K
192-ExtendingOrderPreservingEncryptionforMultiU..> 22-Dec-2014 11:27 202K
193-AnEfficientHomomorphicEncryptionProtocolfor..> 22-Dec-2014 11:27 232K
194-AMultivariatebasedThresholdRingSignatureSch..> 22-Dec-2014 11:27 213K
195-TheBlueJayUltraLightweightHybridCryptosyste..> 22-Dec-2014 11:27 965K
196-MultiInstanceSecurityanditsApplicationtoPas..> 22-Dec-2014 11:27 267K
197-OnTheSecurityofOneWitnessBlindSignatureSche..> 22-Dec-2014 11:27 421K
198-BeyondtheLimitationofPrimeOrderBilinearGrou..> 22-Dec-2014 11:27 538K
199-UsingSymmetriesintheIndexCalculusforEllipti..> 22-Dec-2014 11:26 453K
200-AggregateSigncryption.pdf 22-Dec-2014 11:26 545K
201-CommentanAnonymousMultireceiverIdentitybase..> 22-Dec-2014 11:26 146K
202-SecureSimilarityCoefficientsComputationwith..> 22-Dec-2014 11:26 177K
203-Robustbiometricbaseduserauthenticationschem..> 22-Dec-2014 11:26 217K
204-UniqueGroupSignatures.pdf 22-Dec-2014 11:26 390K
205-Informationflowcontrolforprogrammingonencry..> 22-Dec-2014 11:26 591K
206-PseudoPreimageAttackonRoundReducedGrostlHas..> 22-Dec-2014 11:26 390K
206-PseudoPreimageAttackonRoundReducedGrstlHash..> 20-Jan-2023 08:32 390K
207-CryptanalysisofHummingbird2.pdf 20-Jan-2023 14:20 207
208-ANEWGUESSANDDETERMINEATTACKONTHEA51STREAMCI..> 22-Dec-2014 11:26 474K
209-AdaptivePreimageResistanceAnalysisRevisited..> 22-Dec-2014 11:26 201K
209-AdaptivePreimageResistanceAnalysisRevisited..> 22-Dec-2014 11:26 1M
210-OntheExistenceofBooleanFunctionswithOptimal..> 22-Dec-2014 11:26 111K
211-StronglySecureAuthenticatedKeyExchangefromF..> 22-Dec-2014 11:26 513K
212-PerfectAlgebraicImmuneFunctions.pdf 22-Dec-2014 11:26 370K
213-RelationbetweenVerifiableRandomFunctionsand..> 22-Dec-2014 11:26 421K
214-AutomaticSearchofTruncatedImpossibleDiffere..> 22-Dec-2014 11:26 618K
215-QuadraticSpanProgramsandSuccinctNIZKswithou..> 22-Dec-2014 11:26 725K
216-AdaptiveCCABroadcastEncryptionwithConstantS..> 22-Dec-2014 11:26 480K
217-EfficientDissectionofBicompositeProblemswit..> 20-Jan-2023 08:32 518K
217-EfficientDissectionofCompositeProblemswithA..> 22-Dec-2014 11:26 484K
218-DifferentiallyPrivateContinualMonitoringofH..> 22-Dec-2014 11:26 633K
219-PrivateFingerprintMatching.pdf 22-Dec-2014 11:26 233K
220-HedgedPublickeyEncryptionHowtoProtectagains..> 22-Dec-2014 11:26 537K
221-AlmostEverywhereSecureComputationwithEdgeCo..> 22-Dec-2014 11:26 457K
222-Asecretsharingschemeofprimenumbersbasedonha..> 22-Dec-2014 11:25 726K
223-AGeneralizationoftheRainbowBandSeparationAt..> 22-Dec-2014 11:25 572K
224-ShorterIBEandSignaturesviaAsymmetricPairing..> 22-Dec-2014 11:25 274K
225-WhenHomomorphismBecomesaLiability.pdf 22-Dec-2014 11:25 123K
226-ZKPDLALanguageBasedSystemforEfficientZeroKn..> 22-Dec-2014 11:25 760K
227-Securepasswordbasedremoteuserauthentication..> 20-Jan-2023 14:20 207
228-PhysicalUnclonableFunctionsinCryptographicP..> 22-Dec-2014 11:25 380K
229-LanguageswithEfficientZeroKnowledgePCP39sar..> 20-Jan-2023 08:32 391K
229-LanguageswithEfficientZeroKnowledgePCPsarei..> 22-Dec-2014 11:25 391K
230-OnIdealLatticesandLearningwithErrorsOverRin..> 22-Dec-2014 11:25 478K
231-AGeneralConstructionfor1rounddeltaRMTand0de..> 22-Dec-2014 11:25 410K
232-ImplementingPairingsatthe192bitSecurityLeve..> 22-Dec-2014 11:25 160K
233-ACryptanalysisofHummingBird2TheDifferential..> 22-Dec-2014 11:25 513K
234-SPNHashImprovingtheProvableResistanceAgains..> 22-Dec-2014 11:25 739K
235-RingLWEinPolynomialRings.pdf 22-Dec-2014 11:25 443K
236-OnNecessaryandSufficientConditionsforPrivat..> 22-Dec-2014 11:25 342K
237-InthepointofviewsecurityAnefficientschemein..> 22-Dec-2014 11:25 206K
237-InthepointofviewsecurityAnefficientschemein..> 22-Dec-2014 11:25 269K
238-TheBoomerangAttacksontheRoundReducedSkein51..> 22-Dec-2014 11:25 491K
239-ZeroKnowledgeforMultivariatePolynomials.pdf 22-Dec-2014 11:25 394K
240-FieldSwitchinginBGVStyleHomomorphicEncrypti..> 22-Dec-2014 11:25 389K
241-Keydistributionsystemandattributebasedencry..> 22-Dec-2014 11:25 507K
242-LessisMoreRelaxedyetComposableSecurityNotio..> 22-Dec-2014 11:25 439K
243-COMPRESSMULTIPLECIPHERTEXTSUSINGELGAMALENCR..> 22-Dec-2014 11:25 329K
244-Cryptographyfromtensorproblems.pdf 22-Dec-2014 11:25 208K
245-OntheEquivalencebetweentheSetCoveringProble..> 22-Dec-2014 11:25 99K
246-ASecretSharingSchemeBasedonGroupPresentatio..> 22-Dec-2014 11:24 162K
247-OnEfficientPairingsonEllipticCurvesoverExte..> 22-Dec-2014 11:24 386K
248-TwoBitcoinsatthePriceofOneDoubleSpendingAtt..> 22-Dec-2014 11:24 529K
249-BinaryandqaryTardoscodesrevisited.pdf 22-Dec-2014 11:24 1M
250-NewIdentityBasedEncryptionAndItsProxyReencr..> 22-Dec-2014 11:24 468K
251-TheLinuxPseudorandomNumberGeneratorRevisite..> 22-Dec-2014 11:24 758K
252-FairPrivateSetIntersectionwithaSemitrustedA..> 22-Dec-2014 11:24 653K
253-Cryptanalysisofpairingfreecertificatelessau..> 22-Dec-2014 11:24 111K
254-FastPRPFastPseudoRandomPermutationsforSmall..> 22-Dec-2014 11:24 630K
255-HowtoGarbleArithmeticCircuits.pdf 22-Dec-2014 11:24 490K
256-ThemythofgenericDPAandthemagicoflearning.pdf 22-Dec-2014 11:24 501K
257-TheTransformationfromtheGaloisNLFSRtotheFib..> 20-Jan-2023 14:20 207
258-FullProofCryptographyVerifiableCompilationo..> 22-Dec-2014 11:24 577K
259-ANovelStrongDesignatedVerifierSignatureSche..> 22-Dec-2014 11:24 209K
260-TranspositionofAESKeySchedule.pdf 22-Dec-2014 11:24 277K
261-DualFormSignaturesAnApproachforProvingSecur..> 22-Dec-2014 11:24 513K
262-ImplementingAESviaanActivelyCovertlySecureD..> 22-Dec-2014 11:24 248K
263-OnewayFunctionsfromChebyshevPolynomials.pdf 22-Dec-2014 11:24 2M
264-OntheInSecurityofIDEAinVariousHashingModes.pdf 22-Dec-2014 11:24 396K
265-FoundationsofGarbledCircuits.pdf 22-Dec-2014 11:24 401K
266-CompilationTechniquesforEfficientEncryptedC..> 22-Dec-2014 11:24 1M
267-SelfpairingsonHyperellipticCurves.pdf 22-Dec-2014 11:24 261K
268-OnaCCA2securevariantofMcElieceinthestandard..> 22-Dec-2014 11:24 239K
268-OntheCCA2SecurityofMcElieceintheStandardMod..> 20-Jan-2023 08:32 359K
269-QuantifyingSideChannelInformationLeakagefro..> 22-Dec-2014 11:24 566K
270-QuoVadisQuaternionCryptanalysisofRainbowove..> 22-Dec-2014 11:23 393K
271-HomomorphicSignatureforIdentityAuthenticati..> 20-Jan-2023 14:20 207
272-PassiveCorruptioninStatisticalMultiPartyCom..> 22-Dec-2014 11:23 253K
272-PassiveCorruptioninStatisticalMultiPartyCom..> 22-Dec-2014 11:23 330K
273-PublicKeyCryptographyfromNewMultivariateQua..> 22-Dec-2014 11:23 528K
274-BoomerangandSlideRotationalAnalysisoftheSM3..> 22-Dec-2014 11:23 264K
275-ImplementingBLAKEwithAVXAVX2andXOP.pdf 22-Dec-2014 11:23 354K
276-OfficialArbitrationwithSecureCloudStorageAp..> 22-Dec-2014 11:23 334K
277-CyptanalysisCDHPBDHPandTatepairingundercert..> 22-Dec-2014 11:23 130K
277-CyptanalysisCDHPBDHPandTatepairingundercert..> 22-Dec-2014 11:23 170K
278-ImprovedIndifferentiabilitySecurityBoundfor..> 22-Dec-2014 11:23 509K
278-ImprovedIndifferentiabilitySecurityBoundfor..> 22-Dec-2014 11:23 5M
279-ConcurrentZeroKnowledgeintheBoundedPlayerMo..> 22-Dec-2014 11:23 490K
280-ImprovedPartialSums34basedSquareAttackonAES..> 20-Jan-2023 08:32 300K
280-ImprovedPartialSumsbasedSquareAttackonAES.pdf 22-Dec-2014 11:23 300K
281-PubliclyVerifiableDelegationofLargePolynomi..> 22-Dec-2014 11:23 304K
282-ALGEBRAICCOUNTERMEASURETOENHANCETHEIMPROVED..> 22-Dec-2014 11:23 322K
283-Somepropertiesofqaryfunctionsbasedonspectra..> 22-Dec-2014 11:23 151K
284-EfficientUCSecureAuthenticatedKeyExchangefo..> 22-Dec-2014 11:23 655K
285-ConstantSizeStructurePreservingSignaturesGe..> 22-Dec-2014 11:23 507K
286-ProtectingLastFourRoundsofCLEFIAisNotEnough..> 22-Dec-2014 11:23 198K
286-ProtectingLastFourRoundsofCLEFIAisNotEnough..> 22-Dec-2014 11:23 2M
287-ComputationallyFairGroupandIdentityBasedKey..> 22-Dec-2014 11:23 136K
288-FairExchangeofShortSignatureswithoutTrusted..> 22-Dec-2014 11:23 311K
289-RingGroupSignatures.pdf 22-Dec-2014 11:22 276K
289-RingGroupSignatures.ps 22-Dec-2014 11:22 534K
290-FullyHomomorphicMessageAuthenticators.pdf 22-Dec-2014 11:22 373K
291-EfficientDynamicProvablePossessionofRemoteD..> 22-Dec-2014 11:22 934K
292-AnAdaptiveCiphertextAttackagainst34IoplusC3..> 20-Jan-2023 08:32 251K
292-AnAdaptiveCiphertextAttackagainstIoplusCBlo..> 22-Dec-2014 11:22 251K
293-NewTransferenceTheoremsonLatticesPossessing..> 22-Dec-2014 11:22 234K
294-Twogrumpygiantsandababy.pdf 22-Dec-2014 11:22 428K
295-Broadcastenhancedkeypredistributionschemes.pdf 22-Dec-2014 11:22 700K
296-IntheblinkofaneyeTheregoesyourAESkey.pdf 22-Dec-2014 11:22 935K
297-TamperandLeakageResilienceintheSplitStateMo..> 22-Dec-2014 11:22 404K
298-AnonymousCredentialsLight.pdf 22-Dec-2014 11:22 564K
299-DifferentialPowerAnalysisonZUCAlgorithm.pdf 22-Dec-2014 11:22 848K
300-ThresholdImplementationsofall3x3and4x4Sboxe..> 22-Dec-2014 11:22 2M
301-APublicShufflewithoutPrivatePermutations.pdf 22-Dec-2014 11:22 569K
302-OninstanceseparationintheUCframework.pdf 22-Dec-2014 11:22 209K
303-OnTheDistributionofLinearBiasesThreeInstruc..> 22-Dec-2014 11:22 1M
304-ActivelySecureTwoPartyEvaluationofanyQuantu..> 22-Dec-2014 11:22 452K
305-ResistancetoPirates20AMethodfromLeakageResi..> 22-Dec-2014 11:22 515K
306-EfficientThresholdZeroKnowledgewithApplicat..> 22-Dec-2014 11:22 270K
307-MultiChannelBroadcastEncryption.pdf 22-Dec-2014 11:22 367K
308-VerifiedSecurityofRedundancyFreeEncryptionf..> 22-Dec-2014 11:22 447K
309-Fastandcompactellipticcurvecryptography.pdf 22-Dec-2014 11:22 279K
310-Amathematicalproblemforsecurityanalysisofha..> 22-Dec-2014 11:21 169K
311-TightlySecureSignaturesandPublicKeyEncrypti..> 22-Dec-2014 11:21 468K
312-CryptanalysisofaProvablySecureGatewayOrient..> 22-Dec-2014 11:21 124K
313-Ananonymousproxysignatureschemewithoutrando..> 20-Jan-2023 14:20 207
314-GenerationofNonlinearFeedbackShiftRegisters..> 22-Dec-2014 11:21 126K
315-UsingVariancetoAnalyzeVisualCryptographySch..> 22-Dec-2014 11:21 12M
316-ComputationallyCompleteSymbolicAttackerinAc..> 22-Dec-2014 11:21 357K
317-ADoItAllCipherforRFIDDesignRequirementsExte..> 22-Dec-2014 11:21 194K
318-Nonuniformcracksintheconcretethepoweroffree..> 22-Dec-2014 11:21 516K
319-BoundsontheThresholdGapinSecretSharingandit..> 22-Dec-2014 11:21 634K
320-TheDiscreteLogarithmProbleminnonrepresentab..> 22-Dec-2014 11:21 294K
321-DECTSecurityAnalysis.pdf 22-Dec-2014 11:21 690K
322-RevisitingDedicatedandBlockCipherbasedHashF..> 22-Dec-2014 11:21 419K
323-MLConfidentialMachineLearningonEncryptedDat..> 22-Dec-2014 11:21 372K
324-3DHardwareCanaries.pdf 22-Dec-2014 11:21 4M
325-AnoteongeneralizedbentcriteriaforBooleanfun..> 22-Dec-2014 11:21 282K
326-NewProofMethodsforAttributeBasedEncryptionA..> 22-Dec-2014 11:21 503K
327-SecurityAnalysisofRAPPAnRFIDAuthenticationP..> 22-Dec-2014 11:20 167K
328-TheMultivariateProbabilisticEncryptionSchem..> 22-Dec-2014 11:20 287K
328-TheMultivariateProbabilisticEncryptionSchem..> 22-Dec-2014 11:20 1M
329-AnAnalysisofZVPAttackonECCCryptosystems.pdf 22-Dec-2014 11:20 516K
330-AWayReduceSignedBitwiseDifferencesthatTrans..> 22-Dec-2014 11:20 449K
331-HomomorphicAuthenticationCodesforNetworkCod..> 22-Dec-2014 11:20 285K
332-ANondelegatableIdentitybasedDesignatedVerif..> 22-Dec-2014 11:20 200K
333-OntheFeasibilityofExtendingObliviousTransfe..> 22-Dec-2014 11:20 422K
334-OntheTraceabilityofTagsinSUAPRFIDAuthentica..> 22-Dec-2014 11:20 213K
335-ConstructingVectorialBooleanFunctionswithHi..> 22-Dec-2014 11:20 128K
336-RSAmodulusgenerationinthetwopartycase.pdf 22-Dec-2014 11:20 184K
337-AnalysisandTradeOffsfortheCompleteTreeLayer..> 22-Dec-2014 11:20 427K
338-CharacterizationsonAlgebraicImmunityforMult..> 22-Dec-2014 11:20 121K
339-PracticalPolynomialTimeKnownPlaintextAttack..> 22-Dec-2014 11:20 292K
340-DecidingEpistemicandStrategicPropertiesofCr..> 22-Dec-2014 11:20 572K
341-FromSelectivetoFullSecuritySemiGenericTrans..> 22-Dec-2014 11:20 591K
342-EnhancingLocationPrivacyforElectricVehicles..> 22-Dec-2014 11:20 1M
343-HighThroughputHardwareArchitecturefortheSWI..> 22-Dec-2014 11:20 957K
344-ConstructionofNewClassesofKnapsackTypePubli..> 22-Dec-2014 11:20 195K
345-Breakingpairingbasedcryptosystemsusingeta_T..> 22-Dec-2014 11:20 373K
346-Edwardsmodelofellipticcurvesdefinedoveranyf..> 22-Dec-2014 11:20 409K
346-Edwardsmodelofellipticcurvesdefinedoveranyf..> 22-Dec-2014 11:20 827K
347-AlgebraicDifferentialFaultAttacksonLEDusing..> 22-Dec-2014 11:20 304K
348-ObliviousTransferwithHiddenAccessControlfro..> 22-Dec-2014 11:20 561K
349-ADifferentialFaultAttackonGrain128ausingMAC..> 22-Dec-2014 11:19 283K
350-ANotefortheIdealOrderPreservingEncryptionOb..> 22-Dec-2014 11:19 333K
351-SipHashafastshortinputPRF.pdf 22-Dec-2014 11:19 357K
352-OnHashingGraphs.pdf 22-Dec-2014 11:19 205K
352-OnHashingGraphs.ps 22-Dec-2014 11:19 746K
353-OnReconfigurableFabricsandGenericSideChanne..> 22-Dec-2014 11:19 443K
354-HashCombinersforSecondPreImageResistanceTar..> 22-Dec-2014 11:19 576K
355-Nevertrustabunny.pdf 22-Dec-2014 11:19 239K
356-FullyAnonymousAttributeTokensfromLattices.pdf 22-Dec-2014 11:19 507K
357-PubliclyVerifiableCiphertexts.pdf 22-Dec-2014 11:19 476K
358-PICAROABlockCipherAllowingEfficientHigherOr..> 22-Dec-2014 11:19 392K
359-Anotherlookatnonuniformity.pdf 22-Dec-2014 11:19 189K
360-MultipleDifferentialCryptanalysisusingLLRan..> 22-Dec-2014 11:19 427K
361-QuantumKeyDistributionintheClassicalAuthent..> 22-Dec-2014 11:19 407K
362-AchievingConstantRoundLeakageResilientZeroK..> 22-Dec-2014 11:19 495K
363-AUnifiedIndifferentiabilityProofforPermutat..> 22-Dec-2014 11:19 587K
364-ZeroKnowledgeProofswithLowAmortizedCommunic..> 22-Dec-2014 11:19 357K
365-PublicAuditingforEnsuringCloudDataStorageSe..> 22-Dec-2014 11:19 151K
366-SecuringCircuitsAgainstConstantRateTamperin..> 22-Dec-2014 11:19 552K
367-OnContinualLeakageofDiscreteLogRepresentati..> 22-Dec-2014 11:19 500K
368-ComprehensiveEvaluationofHighSpeedandMedium..> 22-Dec-2014 11:19 3M
369-FactorisationofRSA704withCADONFS.pdf 22-Dec-2014 11:19 175K
370-ImprovedBroadcastEncryptionSchemewithConsta..> 22-Dec-2014 11:19 668K
371-Simultaneoushashingofmultiplemessages.pdf 22-Dec-2014 11:18 1M
372-NewPreimageAttacksonHashModesofAES256.pdf 20-Jan-2023 14:20 207
373-OptimalLowerBoundforDifferentiallyPrivateMu..> 22-Dec-2014 11:18 355K
374-InfiltratetheVaultSecurityAnalysisandDecryp..> 22-Dec-2014 11:18 403K
375-HowtoStoresomeSecrets.pdf 22-Dec-2014 11:18 151K
376-CombinatorialSolutionsProvidingImprovedSecu..> 22-Dec-2014 11:18 351K
377-DistributedKeyGenerationintheWild.pdf 22-Dec-2014 11:18 492K
378-MultipartyProximityTestingwithDishonestMajo..> 22-Dec-2014 11:18 528K
379-AllButManyEncryptionANewFrameworkforFullyEq..> 22-Dec-2014 11:18 283K
380-SeveralWeakBitCommitmentsUsingSealOnceTampe..> 22-Dec-2014 11:18 209K
381-AStronglySecureAuthenticatedKeyExchangeProt..> 20-Jan-2023 14:20 207
382-OntheJointSecurityofSignatureandEncryptionS..> 22-Dec-2014 11:18 388K
383-FormalizationofInformationTheoreticSecurity..> 22-Dec-2014 11:18 312K
384-FunctionalEncryptionforRegularLanguages.pdf 22-Dec-2014 11:18 223K
385-CCBKESessionKeyNegotiationforFastandSecureS..> 22-Dec-2014 11:18 1M
386-CryptanalysisofSoodetalsAuthenticationSchem..> 22-Dec-2014 11:18 194K
387-Newcryptographicconstructionsusinggeneraliz..> 22-Dec-2014 11:18 109K
388-TheArithmeticCodex.pdf 22-Dec-2014 11:18 350K
389-WideStrongPrivateRFIDIdentificationbasedonZ..> 22-Dec-2014 11:18 269K
390-RegularTernaryAlgorithmforScalarMultiplicat..> 22-Dec-2014 11:18 94K
391-AnalysisandConstructionofEfficientRFIDAuthe..> 22-Dec-2014 11:18 97K
392-IDBasedSigncryptionSchemeinStandardModel.pdf 22-Dec-2014 11:18 419K
393-ACertificatelessMultiplekeyAgreementProtoco..> 22-Dec-2014 11:18 199K
394-AnIDBasedKeyAgreementProtocolBasedonECCAmon..> 22-Dec-2014 11:18 277K
395-ANewEfficientAuthenticatedIDBasedGroupKeyAg..> 22-Dec-2014 11:18 501K
396-Onsecondordernonlinearityandmaximumalgebrai..> 22-Dec-2014 11:18 137K
397-CrossDomainPasswordBasedAuthenticatedKeyExc..> 22-Dec-2014 11:18 2M
398-PIRMAPEfficientPrivateInformationRetrievalf..> 22-Dec-2014 11:17 116K
399-DifferentialFaultAnalysisonBlockCipherPicco..> 22-Dec-2014 11:17 210K
400-AnAlgebraicFaultAttackontheLEDBlockCipher.pdf 22-Dec-2014 11:17 308K
401-AnAllInOneApproachtoDifferentialCryptanalys..> 22-Dec-2014 11:17 432K
402-ForwardSecureHierarchicalPredicateEncryptio..> 22-Dec-2014 11:17 564K
403-FullyPrivateRevocablePredicateEncryption.pdf 22-Dec-2014 11:17 706K
404-SecretSharingSchemesforVeryDenseGraphs.pdf 22-Dec-2014 11:17 177K
405-SecureComputationonFloatingPointNumbers.pdf 22-Dec-2014 11:17 408K
406-Commentsonfourmultiserverauthenticationprot..> 22-Dec-2014 11:17 151K
407-CrossUnlinkableHierarchicalGroupSignatures.pdf 22-Dec-2014 11:17 357K
408-EfficientImplementationofBilinearPairingson..> 22-Dec-2014 11:17 483K
409-MDPCMcElieceNewMcElieceVariantsfromModerate..> 22-Dec-2014 11:17 407K
410-CryptanalysisofanIdentityBasedMultipleKeyAg..> 22-Dec-2014 11:17 140K
411-InfiniteSecretSharingExamples.pdf 22-Dec-2014 11:17 255K
412-ProbabilisticInfiniteSecretSharing.pdf 22-Dec-2014 11:17 223K
413-HighlySecureStrongPUFbasedonNonlinearityofM..> 22-Dec-2014 11:17 797K
414-LowcomplexitybitparallelGF2mmultiplierforal..> 22-Dec-2014 11:17 276K
415-RevisitingKeySchedule39sDiffusionInRelation..> 20-Jan-2023 08:32 517K
415-RevisitingKeySchedulesDiffusionInRelationWi..> 22-Dec-2014 11:17 517K
416-BeyondeCKPerfectForwardSecrecyunderActorCom..> 22-Dec-2014 11:17 467K
417-EfficientPaddingOracleAttacksonCryptographi..> 22-Dec-2014 11:17 379K
418-WeaknessesofanImprovementAuthenticationSche..> 22-Dec-2014 11:17 58K
419-DACMACSEffectiveDataAccessControlforMultiAu..> 20-Jan-2023 14:20 207
420-APubliclyVeriableMixnetwithEverlastingPriva..> 22-Dec-2014 11:17 376K
421-SecuritymarginevaluationofSHA3contestfinali..> 22-Dec-2014 11:17 178K
422-BicliqueCryptanalysisofTWINE.pdf 22-Dec-2014 11:17 565K
423-Programmableencryptionandkeydependentmessag..> 22-Dec-2014 11:17 610K
424-ScalableGroupSignatureswithRevocation.pdf 22-Dec-2014 11:16 544K
425-TheStreamCipherCoreofthe3GPPEncryptionStand..> 22-Dec-2014 11:16 250K
426-AGeneralisedFormulaforCalculatingtheResilie..> 22-Dec-2014 11:16 327K
427-ConstructingPairingFriendlyGenus2Curveswith..> 22-Dec-2014 11:16 369K
428-Rationalauthenticationprotocolsandtheirusei..> 22-Dec-2014 11:16 442K
429-Simpleconstructionofepsilonbiaseddistributi..> 22-Dec-2014 11:16 445K
430-Aformalstudyoftwophysicalcountermeasuresaga..> 22-Dec-2014 11:16 587K
431-OntheSecurityofDynamicGroupSignaturesPreven..> 22-Dec-2014 11:16 381K
432-TorScanTracingLonglivedConnectionsandDiffer..> 22-Dec-2014 11:16 619K
433-ImpossibilityResultsforStaticInputSecureCom..> 22-Dec-2014 11:16 287K
434-AlgebraicTrapdoorOneWayFunctionsandtheirApp..> 22-Dec-2014 11:16 531K
435-DifferentialPrivacywithImperfectRandomness.pdf 22-Dec-2014 11:16 342K
435-DifferentialPrivacywithImperfectRandomness.ps 22-Dec-2014 11:16 740K
436-SecureDatabaseCommitmentsandUniversalArgume..> 22-Dec-2014 11:16 628K
437-DynamicCredentialsandCiphertextDelegationfo..> 22-Dec-2014 11:16 385K
438-BreakingandRepairingGCMSecurityProofs.pdf 22-Dec-2014 11:16 333K
439-RobustSmartCardbasedPasswordAuthenticationS..> 22-Dec-2014 11:16 671K
440-NewPreimageAttacksAgainstReducedSHA1.pdf 22-Dec-2014 11:16 425K
441-AdaptivelySecureMultiPartyComputationwithDi..> 22-Dec-2014 11:16 253K
442-GroupSignatureswithAlmostforfreeRevocation.pdf 22-Dec-2014 11:16 544K
443-ImprovedCRTAlgorithmforClassPolynomialsinGe..> 22-Dec-2014 11:16 553K
444-Factorizationofa1061bitnumberbytheSpecialNu..> 22-Dec-2014 11:16 149K
445-AnoteonAnefficientcertificatelessaggregates..> 22-Dec-2014 11:16 74K
446-DifferentialFaultAnalysisofAESTowardsReachi..> 22-Dec-2014 11:16 493K
446-DifferentialFaultAnalysisofAESTowardsReachi..> 22-Dec-2014 11:15 4M
447-MultireceiverHomomorphicAuthenticationCodes..> 22-Dec-2014 11:15 302K
448-OntheImpossibilityofConstructingEfficientKe..> 22-Dec-2014 11:15 537K
449-LongTermConfidentialityaSurvey.pdf 22-Dec-2014 11:15 330K
450-TweakableBlockcipherswithBeyondBirthdayBoun..> 22-Dec-2014 11:15 663K
451-Stam39sConjectureandThresholdPhenomenainCol..> 20-Jan-2023 08:32 265K
451-StamsConjectureandThresholdPhenomenainColli..> 22-Dec-2014 11:15 264K
451-StamsConjectureandThresholdPhenomenainColli..> 22-Dec-2014 11:15 945K
452-EPiCEfficientPrivacyPreservingCountingforMa..> 22-Dec-2014 11:15 385K
453-NewLeakageResilientCCASecurePublicKeyEncryp..> 22-Dec-2014 11:15 379K
454-AProbabilisticQuantumKeyTransferProtocol.pdf 22-Dec-2014 11:15 428K
455-Mustyouknowthecodeofftosecurelycomputef.pdf 22-Dec-2014 11:15 409K
456-CrowdBlendingPrivacy.pdf 22-Dec-2014 11:15 411K
457-HushFunctionsExtendedtoAnySizeInputversusAn..> 22-Dec-2014 11:15 1M
458-Computingsmalldiscretelogarithmsfaster.pdf 22-Dec-2014 11:15 446K
459-BarriersinCryptographywithWeakCorrelatedand..> 22-Dec-2014 11:15 462K
460-InformationTheoreticTimedReleaseSecurityKey..> 22-Dec-2014 11:15 244K
461-SuccinctArgumentsfromMultiProverInteractive..> 22-Dec-2014 11:15 663K
462-PerfectAmbiguousOptimisticFairExchange.pdf 22-Dec-2014 11:15 144K
463-DeterministicPublicKeyEncryptionandIdentity..> 22-Dec-2014 11:15 452K
464-FindingLowerBoundsontheComplexityofSecretSh..> 22-Dec-2014 11:15 182K
465-TMATCHPrivacyPreservingItemMatchingforStora..> 22-Dec-2014 11:14 279K
466-ComputationalEntropyandInformationLeakage.pdf 22-Dec-2014 11:14 285K
467-Newresultsonnonexistenceofgeneralizedbentfu..> 22-Dec-2014 11:14 101K
468-FunctionalEncryptionNewPerspectivesandLower..> 22-Dec-2014 11:14 163K
469-PerfectKeywordPrivacyinPEKSSystems.pdf 22-Dec-2014 11:14 193K
470-SomeConnectionsBetweenPrimitiveRootsandQuad..> 22-Dec-2014 11:14 235K
471-AQuasigroupBasedRandomNumberGeneratorforRes..> 22-Dec-2014 11:14 155K
472-OntheSimplicityofConvertingLeakagesfromMult..> 22-Dec-2014 11:14 6M
473-SenderEquivocableEncryptionSchemesSecureaga..> 22-Dec-2014 11:14 388K
474-OntheSemanticSecurityofFunctionalEncryption..> 22-Dec-2014 11:14 693K
475-EfficientSignaturesofKnowledgeandDAAintheSt..> 22-Dec-2014 11:14 337K
476-AjlanestreehashingmodeandjlanesSHA256.pdf 22-Dec-2014 11:14 130K
477-ImprovedKeyRecoveryAttacksonReducedRoundAES..> 22-Dec-2014 11:14 598K
478-Cryptanalysisonanovelunconditionallysecureo..> 22-Dec-2014 11:14 121K
479-MixCompressMixRevisitedDispensingwithNoninv..> 22-Dec-2014 11:14 350K
480-ShortSignaturesFromDiffieHellmanRealizingSh..> 22-Dec-2014 11:14 463K
481-ImprovedSecurityBoundsforKeyAlternatingCiph..> 22-Dec-2014 11:14 182K
482-ApproachesfortheParallelizationofSoftwareIm..> 22-Dec-2014 11:14 240K
483-AnEfficientSigncryptionSchemefromqDiffieHel..> 22-Dec-2014 11:14 151K
483-AnEfficientSigncryptionSchemefromqDiffieHel..> 22-Dec-2014 11:14 334K
484-CryptanalysisofTwoDynamicIDbasedRemoteUserA..> 22-Dec-2014 11:14 235K
484-CryptanalysisofTwoDynamicIDbasedRemoteUserA..> 22-Dec-2014 11:14 188K
485-ExploitingCollisionsinAdditionChainbasedExp..> 22-Dec-2014 11:13 523K
486-ComputationalSoundnesswithoutProtocolRestri..> 22-Dec-2014 11:13 660K
487-ShortcommunicationAninterpretationoftheLinu..> 22-Dec-2014 11:13 130K
488-DesignatedVerifierThresholdProxySignatureSc..> 22-Dec-2014 11:13 360K
489-RecursiveLinearandDifferentialCryptanalysis..> 22-Dec-2014 11:13 321K
490-DesynchronizationAttackonRAPPUltralightweig..> 22-Dec-2014 11:13 81K
490-DesynchronizationAttackonRAPPUltralightweig..> 22-Dec-2014 11:13 61K
491-OntheMultipleFaultAttackonRSASignatureswith..> 22-Dec-2014 11:13 174K
492-AMethodforGeneratingFullCyclesbyaCompositio..> 22-Dec-2014 11:13 182K
493-EfficientQueryIntegrityforOutsourcedDynamic..> 22-Dec-2014 11:13 214K
494-ProtocolMisidentificationMadeEasywithFormat..> 22-Dec-2014 11:13 696K
495-34Metaproofs34andtheirCryptographicApplicat..> 20-Jan-2023 08:32 230K
495-MetaproofsandtheirCryptographicApplications..> 22-Dec-2014 11:13 230K
496-UpdatingattributeinCPABEANewApproach.pdf 22-Dec-2014 11:13 958K
497-ThelowcalldietAuthenticatedEncryptionforcal..> 22-Dec-2014 11:13 200K
498-AlmostPerfectAlgebraicImmuneFunctionswithGo..> 22-Dec-2014 11:13 209K
499-AuthenticityIntegrityandProofofExistencefor..> 22-Dec-2014 11:13 355K
500-ConstantCiphertextLengthinCPABE.pdf 22-Dec-2014 11:13 668K
501-PrivacyAmplificationwithAsymptoticallyOptim..> 22-Dec-2014 11:13 562K
502-AreWeCompromisedModellingSecurityAssessment..> 22-Dec-2014 11:13 309K
503-HierarchicalIdentityBasedLossyTrapdoorFunct..> 22-Dec-2014 11:13 604K
504-ScalableDeniableGroupKeyEstablishment.pdf 22-Dec-2014 11:13 400K
505-Onpseudorandomizationofinformationtheoretic..> 22-Dec-2014 11:13 235K
506-SuccinctMalleableNIZKsandanApplicationtoCom..> 22-Dec-2014 11:13 498K
507-CompactImplementationandPerformanceEvaluati..> 22-Dec-2014 11:13 374K
508-OnLimitationsofUniversalSimulationConstantR..> 22-Dec-2014 11:13 238K
508-OntheImplausibilityofConstantRoundPublicCoi..> 20-Jan-2023 08:32 244K
509-On3shareThresholdImplementationsfor4bitSbox..> 22-Dec-2014 11:13 933K
510-Enabling3shareThresholdImplementationsforan..> 22-Dec-2014 11:12 364K
511-EntangledCloudStorage.pdf 22-Dec-2014 11:12 512K
512-ConstantOverheadSecureComputationofBooleanC..> 22-Dec-2014 11:12 433K
513-CommitmentsandEfficientZeroKnowledgeProofsf..> 22-Dec-2014 11:12 281K
513-CommitmentsandEfficientZeroKnowledgeProofsf..> 22-Dec-2014 11:12 875K
514-RKASecuritybeyondtheLinearBarrierIBEEncrypt..> 22-Dec-2014 11:12 593K
515-SemanticallySecureFunctionalEncryptionPossi..> 22-Dec-2014 11:12 351K
516-GarblingXORGatesForFree3939intheStandardMod..> 20-Jan-2023 08:32 423K
516-GarblingXORGatesForFreeintheStandardModel.pdf 22-Dec-2014 11:12 423K
517-UnconditionallySecureAsynchronousMultiparty..> 22-Dec-2014 11:12 544K
518-SequentialAggregateSignatureswithShortPubli..> 22-Dec-2014 11:12 306K
519-Fasterimplementationofscalarmultiplicationo..> 22-Dec-2014 11:12 484K
520-OptimizingSegmentBasedDocumentProtectionCor..> 22-Dec-2014 11:12 302K
521-FunctionalEncryptionwithBoundedCollusionsvi..> 22-Dec-2014 11:12 554K
522-FalsePositiveprobabilitiesinqaryTardoscodes..> 22-Dec-2014 11:12 3M
523-TheCuriousCaseofNonInteractiveCommitments.pdf 22-Dec-2014 11:12 760K
524-TahoeTheLeastAuthorityFilesystem.pdf 22-Dec-2014 11:12 269K
525-Computingendomorphismringsofabelianvarietie..> 22-Dec-2014 11:12 254K
526-InvertiblePolynomialRepresentationforPrivat..> 22-Dec-2014 11:12 662K
527-Cryptanalysisofarecenttwofactorauthenticati..> 22-Dec-2014 11:12 39K
528-AnIDBasedSigncryptionSchemewithCompartmente..> 22-Dec-2014 11:12 157K
529-PRINCEALowlatencyBlockCipherforPervasiveCom..> 22-Dec-2014 11:12 678K
530-DynamicSearchableSymmetricEncryption.pdf 22-Dec-2014 11:11 301K
530-DynamicSearchableSymmetricEncryption.ps 22-Dec-2014 11:11 2M
531-GenericConstructionofTraceandRevokeSchemes.pdf 22-Dec-2014 11:11 488K
532-PairingcomputationonEdwardscurveswithhighde..> 22-Dec-2014 11:11 396K
533-SolvingHardLatticeProblemsandtheSecurityofL..> 22-Dec-2014 11:11 652K
534-ASimpleCombinatorialTreatmentofConstruction..> 22-Dec-2014 11:11 254K
535-ALowAreaUnifiedHardwareArchitecturefortheAE..> 22-Dec-2014 11:11 1M
535-ALowAreaUnifiedHardwareArchitecturefortheAE..> 20-Jan-2023 08:32 1M
536-SecretSharingandSecureComputingfromMonotone..> 22-Dec-2014 11:11 373K
537-InterceptingTokensTheEmpireStrikesBackinthe..> 22-Dec-2014 11:11 373K
538-PrivateTopkAggregationProtocols.pdf 22-Dec-2014 11:11 415K
539-EfficientImplementationofRSAAlgorithmwithMK..> 22-Dec-2014 11:11 954K
540-AComparisonofPerfectTableCryptanalyticTrade..> 22-Dec-2014 11:11 378K
541-2048XKSASoftwareOrientedHighSecurityBlockCi..> 20-Jan-2023 08:32 199K
542-SalusASystemforServerAidedSecureFunctionEva..> 22-Dec-2014 11:11 484K
543-EnhancedChosenCiphertextSecurityandApplicat..> 22-Dec-2014 11:11 473K
544-DifferentialAnalysisoftheLEDBlockCipher.pdf 22-Dec-2014 11:11 406K
545-AVersatileMultiInputMultiplieroverFiniteFie..> 22-Dec-2014 11:11 322K
546-RotationalcryptanalysisofroundreducedKeccak..> 22-Dec-2014 11:11 724K
547-ConstrainedSearchforaClassofGoodSBoxeswithI..> 22-Dec-2014 11:11 562K
548-EfficientModularNIZKArgumentsfromShiftandPr..> 22-Dec-2014 11:11 645K
549-Fasterbatchforgeryidentification.pdf 22-Dec-2014 11:11 412K
550-DynamicProofsofRetrievabilityviaObliviousRA..> 22-Dec-2014 11:11 543K
551-FasterPairingComputationonJacobiquarticCurv..> 22-Dec-2014 11:11 373K
552-ProvablySecureConcurrentErrorDetectionAgain..> 22-Dec-2014 11:10 1M
553-Bellcoreattackinpractice.pdf 22-Dec-2014 11:10 124K
554-SecurityweaknessintheProofofStoragewithDedu..> 22-Dec-2014 11:10 279K
555-NewImpossibilityResultsforConcurrentComposi..> 22-Dec-2014 11:10 492K
556-ResourcebasedCorruptionsandtheCombinatorics..> 22-Dec-2014 11:10 290K
557-PUFsMythFactorBustedASecurityEvaluationofPh..> 22-Dec-2014 11:10 5M
558-DomainSpecificPseudonymousSignaturesfortheG..> 22-Dec-2014 11:10 410K
559-PlaintextAwarenessinIdentityBasedKeyEncapsu..> 22-Dec-2014 11:10 561K
560-ComputationalSoundnessofCoinductiveSymbolic..> 22-Dec-2014 11:10 905K
561-AnAttackonaFullyHomomorphicEncryptionScheme..> 22-Dec-2014 11:10 162K
562-AggregatingCLSignaturesRevisitedExtendedFun..> 22-Dec-2014 11:10 279K
563-ConstantRoundConcurrentZeroKnowledgeFromFal..> 22-Dec-2014 11:10 568K
564-AdaptivelySecureGarblingwithApplicationstoO..> 22-Dec-2014 11:10 587K
565-PackedCiphertextsinLWEbasedHomomorphicEncry..> 22-Dec-2014 11:10 269K
566-QuantizationinContinuousSourceZeroSecrecyLe..> 22-Dec-2014 11:10 494K
567-LeakageSqueezingofOrderTwo.pdf 22-Dec-2014 11:10 309K
568-OnTransactionPseudonymswithImplicitAttribut..> 22-Dec-2014 11:10 559K
569-ImprovedZeroknowledgeProofsofKnowledgeforth..> 22-Dec-2014 11:10 614K
570-ZeroCorrelationLinearCryptanalysisofReduced..> 22-Dec-2014 11:10 433K
571-ImprovedsidechannelattackontheblockcipherNO..> 22-Dec-2014 11:10 287K
572-OnConstantRoundConcurrentZeroKnowledgefroma..> 22-Dec-2014 11:09 594K
573-LimitsontheUsefulnessofRandomOracles.pdf 22-Dec-2014 11:09 434K
574-Quantumalgorithmforthediscretelogarithmprob..> 22-Dec-2014 11:09 273K
575-NanoelectronicSolutionsforHardwareSecurity.pdf 22-Dec-2014 11:09 795K
576-ConcurrentSignaturewithoutRandomOracles.pdf 22-Dec-2014 11:09 477K
577-AFrameworkforUniqueRingSignatures.pdf 22-Dec-2014 11:09 490K
578-SecurityEvaluationsBeyondComputingPowerHowt..> 22-Dec-2014 11:09 448K
579-DefendingAgainsttheUnknownEnemyApplyingFlip..> 22-Dec-2014 11:09 291K
580-CryptanalysisoftheOKHAuthenticatedEncryptio..> 22-Dec-2014 11:09 118K
581-Ontheinsecurityofsomesmartcardbasedpassword..> 22-Dec-2014 11:09 113K
582-UsingRandomizersforBatchVerificationofECDSA..> 22-Dec-2014 11:09 43K
582-UsingRandomizersforBatchVerificationofECDSA..> 22-Dec-2014 11:09 178K
583-NewConstructionsandProofMethodsforLargeUniv..> 22-Dec-2014 11:09 488K
584-QuantitativeAnalysisoftheFullBitcoinTransac..> 22-Dec-2014 11:09 2M
585-OnProvablySecureCodebasedSignatureandSigncr..> 22-Dec-2014 11:09 242K
586-SHADESecureHAmmingDistancEcomputationfromob..> 22-Dec-2014 11:09 342K
587-Symboliccomputationinblockcipherwithapplica..> 22-Dec-2014 11:09 308K
588-BreakingPublicKeysHowtoDetermineanUnknownRS..> 22-Dec-2014 11:09 19K
589-withdrawn.pdf 20-Jan-2023 14:20 207
590-withdrawn.pdf 20-Jan-2023 14:20 207
591-BicliqueCryptanalysisOfPRESENTLEDAndKLEIN.pdf 22-Dec-2014 11:09 4M
592-AttributeBasedEncryptionforCircuitsfromMult..> 22-Dec-2014 11:09 242K
593-Factor4and6DecompressionforValuesofPairings..> 22-Dec-2014 11:09 246K
594-ImprovedImpossibleDifferentialAttackonReduc..> 22-Dec-2014 11:09 260K
595-ExtendingBrickellDavenportTheoremtoNonPerfe..> 22-Dec-2014 11:09 259K
596-EvaluatingUserPrivacyinBitcoin.pdf 22-Dec-2014 11:09 940K
597-ANovelPermutationbasedHashModeofOperationFP..> 22-Dec-2014 11:08 453K
598-Takingproofbasedverifiedcomputationafewstep..> 22-Dec-2014 11:08 507K
599-Onthecoefficientsofthepolynomialinthenumber..> 22-Dec-2014 11:08 220K
600-TheLEDBlockCipher.pdf 22-Dec-2014 11:08 512K
601-HowtoGarbleRAMPrograms.pdf 22-Dec-2014 11:08 213K
601-HowtoGarbleRAMPrograms.ps 22-Dec-2014 11:08 335K
602-Anoteoninvariantlineartransformationsinmult..> 22-Dec-2014 11:08 181K
603-CollectingDatawhilePreservingIndividuals39P..> 20-Jan-2023 08:32 64K
603-CollectingDatawhilePreservingIndividualsPri..> 22-Dec-2014 11:08 64K
604-LeakageResilientCryptographyfromMinimalAssu..> 22-Dec-2014 11:08 261K
605-SecureOutsourcedAttributeBasedSignatures.pdf 22-Dec-2014 11:08 147K
606-QuantumSecureMessageAuthenticationCodes.pdf 22-Dec-2014 11:08 487K
607-GraphTheoreticAlgorithmsfortheIsomorphismof..> 20-Jan-2023 08:32 2M
607-GraphTheoreticAlgorithmsfortheIsomorphismof..> 22-Dec-2014 11:08 2M
608-OntheNonReusabilityofFuzzySketchesandExtrac..> 22-Dec-2014 11:08 294K
609-ANEWAPPROACHTOTHEDISCRETELOGARITHMPROBLEMWI..> 22-Dec-2014 11:08 410K
610-CandidateMultilinearMapsfromIdealLattices.pdf 22-Dec-2014 11:08 665K
611-Acodingtheoryfoundationfortheanalysisofgene..> 22-Dec-2014 11:08 390K
612-AnalysisoftheNonPerfectTableFuzzyRainbowTra..> 22-Dec-2014 11:08 332K
613-ResourceRestrictedIndifferentiability.pdf 22-Dec-2014 11:08 388K
614-Anarithmeticintersectionformulafordenominat..> 22-Dec-2014 11:08 482K
615-Polynomialtimesolutionsofcomputationalprobl..> 22-Dec-2014 11:08 372K
616-BalancingOutputLengthandQueryBoundinHardnes..> 20-Jan-2023 08:32 445K
616-HardnessPreservingConstructionsofPseudorand..> 22-Dec-2014 11:08 357K
617-SecurityAnalysisofanOpenCarImmobilizerProto..> 22-Dec-2014 11:08 441K
618-AnultralightweightIDbasedpairwisekeyestabli..> 20-Jan-2023 14:20 207
619-AsynchronousComputationalVSSwithReducedComm..> 22-Dec-2014 11:08 389K
620-SolvingSubsetSumProblemsofDensiotycloseto1b..> 20-Jan-2023 08:32 239K
620-SolvingSubsetSumProblemsofDensiotycloseto1b..> 22-Dec-2014 11:08 239K
621-BicliqueCryptanalysisofLightweightBlockCiph..> 22-Dec-2014 11:07 1M
622-Resolvingtheconflictbetweengeneralityandpla..> 22-Dec-2014 11:07 459K
623-Impossibleplaintextcryptanalysisandprobable..> 22-Dec-2014 11:07 277K
624-OrderPreservingSymmetricEncryption.pdf 22-Dec-2014 11:07 351K
625-OrderPreservingEncryptionRevisitedImprovedS..> 22-Dec-2014 11:07 451K
626-BitParallelGF2nSquarerUsingShiftedPolynomia..> 22-Dec-2014 11:07 275K
627-EfficientGroupSignaturesintheStandardModel.pdf 22-Dec-2014 11:07 487K
628-EfficientGroupKeyManagementSchemesforMultic..> 22-Dec-2014 11:07 1M
629-SCAPITheSecureComputationApplicationProgram..> 22-Dec-2014 11:07 330K
630-OntheSecurityofTLSRenegotiation.pdf 22-Dec-2014 11:07 689K
631-MessageLockedEncryptionandSecureDeduplicati..> 22-Dec-2014 11:07 547K
632-PairingsonGeneralizedHuffCurves.pdf 22-Dec-2014 11:07 110K
633-NewPreimageAttackonMDC4.pdf 22-Dec-2014 11:07 183K
634-CryptanalysisofDoubleBlockLengthHashModeMJH..> 22-Dec-2014 11:07 146K
635-SecureOutsourcedAttributebasedEncryption.pdf 20-Jan-2023 14:20 207
636-OntheComplexityoftheBKWAlgorithmonLWE.pdf 22-Dec-2014 11:07 437K
637-EfficientMethodsforPracticalFullyHomomorphi..> 22-Dec-2014 11:07 907K
638-CryptanalysisandImprovementofaMultiReceiver..> 22-Dec-2014 11:07 180K
639-CoarsegrainedintegerSmoothRoughBoth.pdf 22-Dec-2014 11:07 602K
640-PreimageandPseudoCollisionAttacksonStepRedu..> 22-Dec-2014 11:07 175K
641-Aunidirectionalconditionalproxyreencryption..> 22-Dec-2014 11:07 180K
642-PracticalCovertlySecureMPCforDishonestMajor..> 22-Dec-2014 11:07 407K
643-ProtocolsforMultipartyCoinTossWithDishonest..> 22-Dec-2014 11:07 395K
644-ImpossibilityResultsforIndifferentiabilityw..> 22-Dec-2014 11:07 233K
645-SimpleEfficientandStronglyKISecureHierarchi..> 22-Dec-2014 11:07 333K
646-GalindoGarciaIdentityBasedSignatureRevisite..> 22-Dec-2014 11:06 559K
647-AMeasureofDependenceforCryptographicPrimiti..> 22-Dec-2014 11:06 196K
648-SearchinEncryptedDataTheoreticalModelsandPr..> 22-Dec-2014 11:06 207K
649-ARobustandPlaintextAwareVariantofSignedElGa..> 22-Dec-2014 11:06 683K
650-FormalanalysisofprivacyinDirectAnonymousAtt..> 22-Dec-2014 11:06 477K
651-TAACTemporalAttributebasedAccessControlforM..> 20-Jan-2023 14:20 207
652-RoundEfficientConcurrentlyComposableSecureC..> 22-Dec-2014 11:06 541K
653-HowpowerfularetheDDHhardgroups.pdf 22-Dec-2014 11:06 452K
654-RefinetheConceptofPublicKeyEncryptionwithDe..> 22-Dec-2014 11:06 162K
655-PrivacyPreservingRevocablePredicateEncrypti..> 22-Dec-2014 11:06 257K
656-SecurityEvaluationofRakaposhiStreamCipher.pdf 22-Dec-2014 11:06 330K
657-FixedArgumentPairingInversiononEllipticCurv..> 22-Dec-2014 11:06 310K
658-DigitalSignatureswithMinimalOverheadfromInd..> 22-Dec-2014 11:06 482K
659-DoesCountingStillCountRevisitingtheSecurity..> 22-Dec-2014 11:06 822K
660-DesignofSecureImageTransmissionInMANETusing..> 20-Jan-2023 14:20 207
660-DesignofSecureImageTransmissioninMANETusing..> 22-Dec-2014 11:06 229K
661-BreakingAnotherQuasigroupBasedCryptographic..> 22-Dec-2014 11:06 719K
662-AsynchronousPhysicalUnclonableFunctionsAsyn..> 22-Dec-2014 11:06 921K
663-VirtualisomorphismsofciphersisAESsecureagai..> 22-Dec-2014 11:06 269K
664-PREStrongerSecurityNotionandEfficientConstr..> 22-Dec-2014 11:06 234K
665-UniformCompressionFunctionsCanFailtoPreserv..> 22-Dec-2014 11:06 96K
666-Estimatingthe934nofUpperLowerBoundinitsRSAC..> 22-Dec-2014 11:06 107K
666-Estimatingthe934nofUpperLowerBoundinitsRSAC..> 22-Dec-2014 11:06 220K
666-EstimatingthenofUpperLowerBoundinitsRSACryp..> 20-Jan-2023 08:32 102K
667-FalseNegativeprobabilitiesinTardoscodes.pdf 22-Dec-2014 11:06 1M
668-ConstructionofDifferentialCharacteristicsin..> 22-Dec-2014 11:06 583K
669-BlackboxTraceableCPABEHowtoCatchPeopleLeaki..> 22-Dec-2014 11:05 460K
670-FastCryptographyinGenus2.pdf 22-Dec-2014 11:05 705K
671-FullySecureUnboundedInnerProductandAttribut..> 22-Dec-2014 11:05 760K
672-CollisionAttacksonUpto5RoundsofSHA3UsingGen..> 22-Dec-2014 11:05 399K
673-RobustEncryptionRevisited.pdf 22-Dec-2014 11:05 487K
674-LectureNotesinSecretSharing.pdf 22-Dec-2014 11:05 257K
675-Minkowskisumbasedlatticeconstructionformult..> 20-Jan-2023 08:32 299K
675-Minkowskisumbasedlatticeconstructionformult..> 22-Dec-2014 11:05 299K
676-MixedintegerLinearProgrammingintheAnalysiso..> 22-Dec-2014 11:05 296K
677-WhatistheEffectiveKeyLengthforaBlockCiphera..> 22-Dec-2014 11:05 316K
678-InfectiveComputationandDummyRoundsFaultProt..> 22-Dec-2014 11:05 277K
679-HidingtheInputSizeinSecureTwoPartyComputati..> 22-Dec-2014 11:05 760K
680-NaturalGeneralizationsofThresholdSecretShar..> 22-Dec-2014 11:05 174K
681-ResiliencetoDistinguishingAttacksonWG7Ciphe..> 22-Dec-2014 11:05 306K
682-ProofsofRetrievabilitywithPublicVerifiabili..> 22-Dec-2014 11:05 191K
683-FingerprintTablesAGeneralizationofRainbowTa..> 20-Jan-2023 14:20 207
684-GenericRelatedkeyAttacksforHMAC.pdf 22-Dec-2014 11:05 446K
685-Squarerootcomputationoverevenextensionfield..> 22-Dec-2014 11:05 423K
686-ImprovedPseudoPreimageAttackandSecondPreima..> 22-Dec-2014 11:05 1M
686-ImprovedPseudoPreimageAttackandSecondPreima..> 20-Jan-2023 08:32 1M
687-ThekBDHAssumptionFamilyBilinearMapCryptogra..> 22-Dec-2014 11:05 495K
688-ASimpleProvablySecureKeyExchangeSchemeBased..> 22-Dec-2014 11:05 359K
689-CryptographyUsingCAPTCHAPuzzles.pdf 22-Dec-2014 11:05 540K
690-TheWeaknessofIntegrityProtectionforLTE.pdf 22-Dec-2014 11:05 352K
691-RootOptimizationofPolynomialsintheNumberFie..> 22-Dec-2014 11:05 236K
692-GenericConstructionsofIntegratedPKEandPEKS.pdf 22-Dec-2014 11:05 432K
693-EncodingFunctionswithConstantOnlineRateorHo..> 22-Dec-2014 11:04 510K
694-Cryptanalysisofmatrixconjugationschemes.pdf 22-Dec-2014 11:04 305K
695-FullyAutomatedAnalysisofPaddingBasedEncrypt..> 22-Dec-2014 11:04 551K
696-CryptanalysisofRAKAPOSHIStreamCipher.pdf 22-Dec-2014 11:04 184K
697-VerifiableElectionsThatScaleforFree.pdf 22-Dec-2014 11:04 478K
698-5PMSecurePatternMatching.pdf 22-Dec-2014 11:04 653K
699-HowPracticalisPublicKeyEncryptionBasedonLPN..> 22-Dec-2014 11:04 352K
700-EfficientAdaptivelySecureandComposableObliv..> 22-Dec-2014 11:04 586K
701-RecoveringRSASecretKeysfromNoisyKeyBitswith..> 22-Dec-2014 11:04 189K
702-CryptanalysisofRAPPanRFIDAuthenticationProt..> 22-Dec-2014 11:04 1M
703-ProfiledModelBasedPowerSimulatorforSideChan..> 22-Dec-2014 11:04 637K
704-OntheNonmalleabilityoftheFiatShamirTransfor..> 22-Dec-2014 11:04 538K
705-Why34FiatShamirforProofs34LacksaProof.pdf 20-Jan-2023 08:31 463K
705-WhyFiatShamirforProofsLacksaProof.pdf 22-Dec-2014 11:04 463K
706-OntheInsecurityoftheFiatShamirParadigmRevis..> 22-Dec-2014 11:04 356K
707-CryptanalysisofWIDEA.pdf 22-Dec-2014 11:04 498K
708-CallingoutCheatersCovertSecurityWithPublicV..> 22-Dec-2014 11:04 536K
709-Furtherresultsonthedistinctnessofbinarysequ..> 22-Dec-2014 11:04 248K
710-NonObservabilityintheRandomOracleModel.pdf 22-Dec-2014 11:04 305K
711-UnprovableSecurityof2MessageZeroKnowledge.pdf 20-Jan-2023 08:31 390K
711-UnprovableSecurityofTwoMessageZeroKnowledge..> 22-Dec-2014 11:04 351K
712-OntheSecurityoftheCoreofPRINCEAgainstBicliq..> 22-Dec-2014 11:04 1M
713-SystematicTreatmentofRemoteAttestation.pdf 22-Dec-2014 11:04 283K
714-DiscreteGaussianLeftoverHashLemmaoverInfini..> 22-Dec-2014 11:04 463K
715-NewImpossibleDifferentialAttackontextSAFER_..> 22-Dec-2014 11:04 1M
716-AttributeBasedFunctionalEncryptiononLattice..> 22-Dec-2014 11:03 503K
717-PracticalYetUniversallyComposableTwoServerP..> 22-Dec-2014 11:03 536K
718-SuccinctNonInteractiveArgumentsviaLinearInt..> 22-Dec-2014 11:03 842K
719-Anidealmultisecretsharingschemebasedonminim..> 22-Dec-2014 11:03 264K
720-FasterindexcalculusforthemediumprimecaseApp..> 22-Dec-2014 11:03 277K
721-OntheInsecurityofFischlin39sParadigm.pdf 20-Jan-2023 08:31 372K
721-OntheInsecurityofFischlinsParadigm.pdf 22-Dec-2014 11:03 372K
722-HardnessPreservingReductionsviaCuckooHashin..> 22-Dec-2014 11:03 546K
723-TwoExponentiationAlgorithmsResistanttoCross..> 22-Dec-2014 11:03 257K
724-ACodingTheoreticApproachtoRecoveringNoisyRS..> 22-Dec-2014 11:03 794K
725-Cryptanalysisofanefficientcertificatelesstw..> 22-Dec-2014 11:03 158K
726-ApplicationsofPolynomialPropertiestoVerifia..> 22-Dec-2014 11:03 360K
727-OntheImpossibilityofSenderDeniablePublicKey..> 22-Dec-2014 11:03 359K
728-DefensiveLeakageCamouflage.pdf 22-Dec-2014 11:03 530K
729-OntheImpossibilityofApproximateObfuscationa..> 22-Dec-2014 11:03 585K
730-TwistedEdwardsFormEllipticCurveCryptography..> 22-Dec-2014 11:03 155K
730-TwistedEdwardsFormEllipticCurveCryptography..> 22-Dec-2014 11:03 326K
731-TimememoryTradeoffsforNearcollisions.pdf 22-Dec-2014 11:03 100K
732-NonInteractiveKeyExchange.pdf 22-Dec-2014 11:03 482K
733-ReusableGarbledCircuitsandSuccinctFunctiona..> 22-Dec-2014 11:03 521K