Index of /2012/


../
001-DigitalSignaturesfromChallengeDividedSigmaP..> 22-Dec-2014 11:35    132K
002-ECC2K130onNVIDIAGPUs.pdf                       22-Dec-2014 11:35    227K
003-Onthedistinctnessofbinarysequencesderivedfr..> 22-Dec-2014 11:35    240K
004-ThenewSHA3softwareshootout.pdf                 22-Dec-2014 11:35    415K
005-AUnifiedApproachtoDeterministicEncryptionNe..> 22-Dec-2014 11:35    518K
006-DetectingDangerousQueriesANewApproachforCho..> 22-Dec-2014 11:35    244K
007-OptimalMultipleAssignmentswithmmSchemeforGe..> 22-Dec-2014 11:35     92K
008-Securityproofwithdishonestkeys.pdf             22-Dec-2014 11:35    700K
009-OntheIndifferentiabilityoftheIntegratedKeyH..> 22-Dec-2014 11:35      1M
010-PayTree34AmortizedSignature34forFlexibleMic..> 20-Jan-2023 08:33     88K
010-PayTreeAmortizedSignatureforFlexibleMicroPa..> 22-Dec-2014 11:34     88K
011-BicliqueAttackoftheFullARIA256.pdf             22-Dec-2014 11:34    204K
012-MalleableProofSystemsandApplications.pdf       22-Dec-2014 11:34    698K
013-HigherOrderAlgebraicAttacksonStreamCiphers.pdf 20-Jan-2023 14:20     207
014-ResetIndifferentiabilityfromWeakenedRandomO..> 22-Dec-2014 11:34    268K
015-ACryptographicTreatmentoftheWiretapChannel.pdf 22-Dec-2014 11:34    362K
015-ACryptographicTreatmentoftheWiretapChannel.ps  22-Dec-2014 11:34      1M
016-EfficientMixNetVericationbyProofsofRandomBl..> 20-Jan-2023 14:20     207
017-Secondaryconstructionsongeneralizedbentfunc..> 22-Dec-2014 11:34    197K
018-AttacksandSecurityProofsofEAXPrime.pdf         22-Dec-2014 11:34    268K
019-TowardsUnconditionalSoundnessComputationall..> 22-Dec-2014 11:34    393K
020-Dicksonpolynomialshyperellipticcurvesandhyp..> 22-Dec-2014 11:34    507K
021-SecurityAnalysisofJPAKE.pdf                    20-Jan-2023 08:33    220K
022-PolynomialTimeSemanticallySecureEncryptionA..> 22-Dec-2014 11:34    288K
022-PolynomialTimeSemanticallySecureEncryptionA..> 22-Dec-2014 11:34    937K
023-OnthesecurityofLoetalsownershiptransferprot..> 22-Dec-2014 11:34    152K
023-OnthesecurityofLoetalsownershiptransferprot..> 22-Dec-2014 11:34      2M
024-VariantsofWaters39DualSystemPrimitivesUsing..> 20-Jan-2023 08:33    421K
024-VariantsofWatersDualSystemPrimitivesUsingAs..> 22-Dec-2014 11:34    366K
024-VariantsofWatersDualSystemPrimitivesUsingAs..> 22-Dec-2014 11:34    959K
025-Anewremotedataintegritycheckingschemeforclo..> 22-Dec-2014 11:34    222K
026-DecodingRandomBinaryLinearCodesin2n20How110..> 22-Dec-2014 11:34    200K
026-DecodingRandomBinaryLinearCodesin2n20How110..> 22-Dec-2014 11:34    693K
027-BreakingtheprovablysecureSAKECauthenticated..> 20-Jan-2023 14:20     207
028-AFirstOrderLeakFreeMaskingCountermeasure.pdf   22-Dec-2014 11:34    257K
029-OntheExactSecurityofSchnorrTypeSignaturesin..> 22-Dec-2014 11:34    535K
030-FaultAnalysisoftheKATANFamilyofBlockCiphers..> 22-Dec-2014 11:34    333K
031-Anerrorin34OnanewformalproofmodelforRFIDloc..> 20-Jan-2023 08:33    100K
031-AnerrorinOnanewformalproofmodelforRFIDlocat..> 22-Dec-2014 11:34    100K
032-CounterexamplestoHardnessAmplificationBeyon..> 22-Dec-2014 11:34    335K
032-CounterexamplestoHardnessAmplificationBeyon..> 22-Dec-2014 11:34    978K
033-AnoteonhyperbentfunctionsviaDillonlikeexpon..> 22-Dec-2014 11:33    603K
034-AutomaticQuantificationofCacheSideChannels.pdf 22-Dec-2014 11:33    452K
035-KeyAlternatingCiphersinaProvableSettingEncr..> 22-Dec-2014 11:33    485K
036-EfficientLeakagefreeAuthenticationofTreesGr..> 22-Dec-2014 11:33    237K
036-EfficientLeakagefreeAuthenticationofTreesGr..> 22-Dec-2014 11:33    661K
037-Someresultsonqarybentfunctions.pdf             22-Dec-2014 11:33    203K
038-CryptanalysisoftheCHES20092010RandomDelayCo..> 22-Dec-2014 11:33    506K
039-SecurityAnalysisofaMultiFactorAuthenticated..> 22-Dec-2014 11:33    514K
040-SingleblockcollisionattackonMD5.pdf            22-Dec-2014 11:33    411K
041-ANEWDEDICATEDCRYPTOGRAPHICHASHFUNCTION.pdf     20-Jan-2023 14:20     207
042-KeyLengthEstimationofPairingbasedCryptosyst..> 22-Dec-2014 11:33    159K
043-AnovelGroupKeyTransferProtocol.pdf             22-Dec-2014 11:33    156K
044-PSCPAPatientSelfcontrollablePrivacypreservi..> 22-Dec-2014 11:33      6M
045-SignatureSchemesSecureagainstHardtoInvertLe..> 22-Dec-2014 11:33    434K
046-ModifyingBooleanFunctionstoEnsureMaximumAlg..> 22-Dec-2014 11:33    268K
047-IncrementalDeterministicPublicKeyEncryption..> 22-Dec-2014 11:33    248K
048-DesigningIntegratedAcceleratorforStreamCiph..> 22-Dec-2014 11:33      1M
049-2DimensionSumsDistinguishersBeyondThreeRoun..> 22-Dec-2014 11:33    279K
050-InvestigatingthePotentialofCustomInstructio..> 22-Dec-2014 11:33    153K
051-EavesdroppingonSatelliteTelecommunicationSy..> 22-Dec-2014 11:33    212K
052-IdentitybasedEncryptionwithEfficientRevocat..> 22-Dec-2014 11:33    436K
053-BeatingShannonrequiresBOTHefficientadversar..> 22-Dec-2014 11:33     63K
053-BeatingShannonrequiresBOTHefficientadversar..> 22-Dec-2014 11:33    337K
054-OntheperformanceofcertainPrivateSetIntersec..> 22-Dec-2014 11:33    514K
055-CryptanalysisofMunetal39sanonymousauthentic..> 20-Jan-2023 14:20     207
056-ANewPseudorandomGeneratorfromCollisionResis..> 22-Dec-2014 11:32    419K
057-AnonymousConstantSizeCiphertextHIBEFromAsym..> 22-Dec-2014 11:32    393K
058-Keyrecyclinginauthentication.pdf               22-Dec-2014 11:32    245K
058-Keyrecyclinginauthentication.ps                22-Dec-2014 11:32    793K
059-MessageAuthenticationRevisited.pdf             22-Dec-2014 11:32    364K
060-ImprovedSecurityforLinearlyHomomorphicSigna..> 22-Dec-2014 11:32    470K
061-APairingBasedStrongDesignatedVerifierSignat..> 22-Dec-2014 11:32    209K
062-OntheSecurityofAttributeBasedSignatureSchem..> 20-Jan-2023 08:33    417K
063-RandomizedPartialCheckingRevisited.pdf         22-Dec-2014 11:32    256K
064-RonwaswrongWhitisright.pdf                     22-Dec-2014 11:32    464K
065-ModifiedversionofLatinDancesRevisitedNewAna..> 22-Dec-2014 11:32     60K
066-WeakKeysoftheFullMISTY1BlockCipherforRelate..> 22-Dec-2014 11:32    303K
067-Parallelizingmessageschedulestoaccelerateth..> 22-Dec-2014 11:32      1M
068-ExtendedSecurityArgumentsforRingSignatureSc..> 22-Dec-2014 11:32    379K
069-AutomaticSearchofAttacksonroundreducedAESan..> 22-Dec-2014 11:32    631K
070-FindingECMFriendlyCurvesthroughaStudyofGalo..> 22-Dec-2014 11:32    493K
071-FastReductionsfromRAMstoDelegatableSuccinct..> 22-Dec-2014 11:32      2M
072-ParticularlyFriendlyMembersofFamilyTrees.pdf   22-Dec-2014 11:32    543K
073-Efficientidentitybasedthresholdsignaturesch..> 22-Dec-2014 11:32    311K
074-AnotherlookatHMAC.pdf                          22-Dec-2014 11:32    233K
075-Efficientidentitybasedthresholddecryptionsc..> 22-Dec-2014 11:32    165K
076-SecureIdentityBasedEncryptionintheQuantumRa..> 22-Dec-2014 11:32    553K
077-MAGNITUDESQUAREDCOHERENCEBASEDSCA.pdf          22-Dec-2014 11:32    264K
078-FullyHomomorphicEncryptionwithoutModulusSwi..> 22-Dec-2014 11:32    171K
079-PublicKeyCryptosystemsConstructedBasedonRee..> 22-Dec-2014 11:32    121K
080-StronglyUnforgeableProxyReSignaturesintheSt..> 22-Dec-2014 11:31    283K
081-ComputationalSoundnessofSymbolicZeroknowled..> 22-Dec-2014 11:31    566K
082-SemiSupervisedTemplateAttack.pdf               22-Dec-2014 11:31    443K
083-OptimallyRobustPrivateInformationRetrieval.pdf 22-Dec-2014 11:31    218K
084-ImprovedAlgebraicSideChannelAttackonAES.pdf    22-Dec-2014 11:31    295K
085-StudyoftheinvariantcosetattackonPRINTcipher..> 22-Dec-2014 11:31    509K
086-RemarksonAnidealmultisecretsharingschemebas..> 20-Jan-2023 14:20     207
087-CollisionBoundsfortheAdditivePollardRhoAlgo..> 22-Dec-2014 11:31    396K
088-ALatticeBasedTraitorTracingScheme.pdf          20-Jan-2023 14:20     207
089-ECMatWork.pdf                                  22-Dec-2014 11:31    541K
090-WorstCasetoAverageCaseReductionsforModuleLa..> 22-Dec-2014 11:31    620K
091-HardnessofdecisionRLWEforanymodulus.pdf        20-Jan-2023 14:20     207
092-TolerantAlgebraicSideChannelAnalysisofAES.pdf  22-Dec-2014 11:31    407K
093-RecentResultsonBalancedSymmetricBooleanFunc..> 22-Dec-2014 11:31    273K
094-Algebraicattackonlatticebasedcryptosystemsv..> 22-Dec-2014 11:31    108K
095-RecursiveCompositionandBootstrappingforSNAR..> 22-Dec-2014 11:31    879K
096-TheCollisionSecurityofMDC4.pdf                 22-Dec-2014 11:31    226K
097-Analgorithmforfactoringintegers.pdf            22-Dec-2014 11:31    113K
098-CombinedAttacksontheAESKeySchedule.pdf         22-Dec-2014 11:31    179K
098-CombinedAttacksontheAESKeySchedule.ps          22-Dec-2014 11:31    771K
099-HomomorphicEvaluationoftheAESCircuit.pdf       22-Dec-2014 11:31    432K
100-CryptanalysisofaUniversallyVerifiableEffici..> 22-Dec-2014 11:31    270K
101-UnbalancedElementarySymmetricBooleanFunctio..> 20-Jan-2023 14:20     207
102-OntheCircularSecurityofBitEncryption.pdf       22-Dec-2014 11:31    464K
103-FlipItTheGameof34StealthyTakeover34.pdf        20-Jan-2023 08:33    642K
103-FlipItTheGameofStealthyTakeover.pdf            22-Dec-2014 11:31    642K
104-ProvablySecureGenericConstructionofCertific..> 22-Dec-2014 11:31    339K
105-GenericConstructionofCertificateBasedEncryp..> 22-Dec-2014 11:31    316K
106-MoreonCorrectingErrorsinRSAPrivateKeysBreak..> 22-Dec-2014 11:31    335K
107-SecurityAnalysisofASingleSignOnMechanismfor..> 22-Dec-2014 11:31    312K
108-OntheOptimalityofLatticesfortheCoppersmithT..> 22-Dec-2014 11:30    306K
109-ChosenCiphertextSecureEfficientlySearchable..> 20-Jan-2023 14:20     207
110-FindingOptimalFormulaeforBilinearMaps.pdf      22-Dec-2014 11:30    384K
111-OntheImmunityofRotationSymmetricBooleanFunc..> 22-Dec-2014 11:30    257K
112-OnTheNonlinearityofMaximumlengthNFSRFeedbac..> 22-Dec-2014 11:30    289K
113-OntheCollisionandPreimageSecurityofMDC4inth..> 22-Dec-2014 11:30      1M
114-OnHardeningLeakageResilienceofRandomExtract..> 22-Dec-2014 11:30    199K
115-CryptanalysisofauditingprotocolproposedbyWa..> 22-Dec-2014 11:30    911K
116-ClashAttacksontheVerifiabilityofEVotingSyst..> 22-Dec-2014 11:30    289K
117-UniversallyComposableSecurityWithLocalAdver..> 22-Dec-2014 11:30    640K
118-StrongerPublicKeyEncryptionSchemesWithstand..> 22-Dec-2014 11:30    567K
119-AcceleratingtheFinalExponentiationintheComp..> 22-Dec-2014 11:30    328K
120-PasswordProtectedSmartCardandMemoryStickAut..> 22-Dec-2014 11:30    179K
121-AnEfficientMultistageSecretSharingSchemeUsi..> 22-Dec-2014 11:30    325K
122-EfficientArithmeticonEllipticCurvesoverFiel..> 22-Dec-2014 11:30    317K
123-Injectionoftransientfaultsusingelectromagne..> 22-Dec-2014 11:30      2M
124-OnSecuringCommunicationFromProfilers.pdf       22-Dec-2014 11:30    183K
124-OnSecuringCommunicationFromProfilers.ps        22-Dec-2014 11:30    636K
125-ShortandEfficientExpressiveAttributeBasedSi..> 20-Jan-2023 08:33    361K
126-CompactImplementationofThreefishandSkeinonF..> 22-Dec-2014 11:30    664K
127-Additiveautocorrelationofsomeclassesofcubic..> 22-Dec-2014 11:30    199K
128-ProvablySecureDistanceBoundinganAnalysisofP..> 22-Dec-2014 11:30    421K
129-OutsiderAnonymousBroadcastEncryptionwithSub..> 22-Dec-2014 11:30    592K
130-BroadcastandRoundEfficientVerifiableSecretS..> 22-Dec-2014 11:30    183K
131-CompositionTheoremsforCCACryptographicSecur..> 22-Dec-2014 11:30    384K
132-CFSSoftwareImplementation.pdf                  22-Dec-2014 11:29    333K
133-TowardPracticalPrivateAccesstoDataCentersvi..> 22-Dec-2014 11:29    490K
134-ADigitalSignatureSchemeforLongTermSecurity.pdf 22-Dec-2014 11:29    241K
135-DavidGoliathObliviousAffineFunctionEvaluati..> 22-Dec-2014 11:29    751K
135-DavidampGoliathObliviousAffineFunctionEvalu..> 20-Jan-2023 08:33    770K
136-AdaptiveKeyProtectioninComplexCryptosystems..> 22-Dec-2014 11:29    277K
137-UsableassemblylanguageforGPUsasuccessstory.pdf 22-Dec-2014 11:29    141K
138-AnImprovedDifferentialAttackonFullGOST.pdf     22-Dec-2014 11:29    896K
138-AnImprovedDifferentialAttackonFullGOSTexten..> 20-Jan-2023 08:33      1M
139-Formalvericationofsecureadhocnetworkrouting..> 22-Dec-2014 11:29      1M
140-HighlyParallelMontgomeryMultiplicationforMu..> 22-Dec-2014 11:29      1M
141-Bicliquesforpermutationscollisionandpreimag..> 22-Dec-2014 11:29    456K
142-IdentityBasedEncryptionwithMasterKeyDepende..> 22-Dec-2014 11:29    581K
143-UniversallyComposableSecureComputationwithM..> 22-Dec-2014 11:29    653K
144-SomewhatPracticalFullyHomomorphicEncryption..> 22-Dec-2014 11:29    381K
145-ConstructionoftheTsujiiShamirKasaharaTSKTyp..> 22-Dec-2014 11:29     93K
145-ConstructionoftheTsujiiShamirKasaharaTSKTyp..> 20-Jan-2023 08:32     93K
146-OnPolynomialSystemsArisingfromaWeilDescent.pdf 22-Dec-2014 11:29    522K
147-OnSecurityArgumentsoftheSecondRoundSHA3Cand..> 22-Dec-2014 11:29    285K
148-ReplacingUsernamePasswordwithSoftwareOnlyTw..> 22-Dec-2014 11:29    191K
149-AttackingScrambledBurrowsWheelerTransform.pdf  22-Dec-2014 11:29    218K
150-Circularchosenciphertextsecuritywithcompact..> 22-Dec-2014 11:29    507K
151-OnBooleanIdealsandVarietieswithApplicationt..> 22-Dec-2014 11:29    217K
152-OnsecurityofaCertificatelessAggregateSignat..> 22-Dec-2014 11:29    224K
153-AFrameworkfortheCryptographicVerificationof..> 22-Dec-2014 11:29    626K
154-TheJointSignatureandEncryptionRevisited.pdf    22-Dec-2014 11:29    501K
154-TheJointSignatureandEncryptionRevisited.ps     22-Dec-2014 11:28    616K
155-TowardPracticalGroupEncryption.pdf             22-Dec-2014 11:28    343K
155-TowardPracticalGroupEncryption.ps              22-Dec-2014 11:28    391K
156-FastEmbeddedSoftwareHashing.pdf                22-Dec-2014 11:28    327K
157-AttackonFullyHomomorphicEncryptionovertheIn..> 22-Dec-2014 11:28    320K
158-EfficientandOptimallySecureKeyLengthExtensi..> 22-Dec-2014 11:28    326K
159-HybridEncryptionintheMultiUserSetting.pdf      22-Dec-2014 11:28    265K
160-NewConstructionofPerfectSequenceSetandLowCo..> 20-Jan-2023 14:20     207
161-NewConstructionsofLowCorrelationSequenceswi..> 22-Dec-2014 11:28    315K
162-ProvablySecureOnlineOfflineIdentityBasedSig..> 22-Dec-2014 11:28    135K
162-ProvablySecureOnlineOfflineIdentityBasedSig..> 22-Dec-2014 11:28    192K
163-DifferentialpropagationanalysisofKeccak.pdf    22-Dec-2014 11:28    382K
164-OnSecureTwopartyIntegerDivision.pdf            22-Dec-2014 11:28    482K
165-KeyUpdatesforRFIDDistanceBoundingProtocolsA..> 22-Dec-2014 11:28    388K
166-AListofMaximumPeriodNLFSRs.pdf                 22-Dec-2014 11:28     76K
167-Pairingbasedmethodsforgenus2jacobianswithma..> 22-Dec-2014 11:28    550K
168-ADistinguisherBasedAttackofaHomomorphicEncr..> 22-Dec-2014 11:28    308K
169-AnalysisofMinimumNumbersofLinearlyActiveSBo..> 22-Dec-2014 11:28    372K
170-Approachesfortheperformanceincreasingofsoft..> 22-Dec-2014 11:28    119K
171-QuantumMoneyfromHiddenSubspaces.pdf            22-Dec-2014 11:28    426K
171-QuantumMoneyfromHiddenSubspaces.ps             22-Dec-2014 11:28    947K
172-AttackingRSACRTSignatureswithFaultsonMontgo..> 22-Dec-2014 11:28    544K
173-AutomaticallyVerifiedMechanizedProofofOneEn..> 22-Dec-2014 11:28    363K
173-AutomaticallyVerifiedMechanizedProofofOneEn..> 22-Dec-2014 11:28    820K
174-ZeroKnowledgewithRubik39sCubesandNonAbelian..> 20-Jan-2023 08:32    368K
174-ZeroKnowledgewithRubiksCubesandNonAbelianGr..> 22-Dec-2014 11:28    368K
175-OptimalFirstOrderMaskingwithLinearandNonLin..> 22-Dec-2014 11:28    821K
176-ImprovementsofAlgebraicAttacksBasedonStruct..> 22-Dec-2014 11:28    154K
176-ImprovementsofAlgebraicAttacksBasedonStruct..> 22-Dec-2014 11:28    519K
177-EverlastingMultiPartyComputation.pdf           22-Dec-2014 11:27    533K
178-EperioMitigatingTechnicalComplexityinCrypto..> 22-Dec-2014 11:27   1000K
179-BillionGateSecureComputationwithMaliciousAd..> 22-Dec-2014 11:27    266K
180-YetAnotherSHA3Round3FPGAResultsPaper.pdf       22-Dec-2014 11:27    169K
181-AModularFrameworkforMultiFactorAuthenticati..> 22-Dec-2014 11:27    561K
182-HowtoConstructQuantumRandomFunctions.pdf       22-Dec-2014 11:27    524K
183-DifferentiallyPrivateSmartMeteringwithBatte..> 22-Dec-2014 11:27    233K
184-AsymptoticfingerprintingcapacityintheCombin..> 22-Dec-2014 11:27    553K
185-ReplayattacksthatviolateballotsecrecyinHeli..> 22-Dec-2014 11:27    374K
186-Thirdordernonlinearitiesofsomebiquadraticmo..> 22-Dec-2014 11:27    115K
187-SmartTokensDelegableAccessControlwithNFCena..> 22-Dec-2014 11:27    711K
188-NonMalleableExtractorsTwoSourceExtractorsan..> 22-Dec-2014 11:27    550K
188-NonMalleableExtractorsTwoSourceExtractorsan..> 22-Dec-2014 11:27      1M
189-UniversallyComposableKeyManagement.pdf         22-Dec-2014 11:27    585K
190-OntheSecurityofanImprovedPasswordAuthentica..> 22-Dec-2014 11:27    170K
191-SecurityAnalysisandEnhancementforPrefixPres..> 22-Dec-2014 11:27    335K
192-ExtendingOrderPreservingEncryptionforMultiU..> 22-Dec-2014 11:27    202K
193-AnEfficientHomomorphicEncryptionProtocolfor..> 22-Dec-2014 11:27    232K
194-AMultivariatebasedThresholdRingSignatureSch..> 22-Dec-2014 11:27    213K
195-TheBlueJayUltraLightweightHybridCryptosyste..> 22-Dec-2014 11:27    965K
196-MultiInstanceSecurityanditsApplicationtoPas..> 22-Dec-2014 11:27    267K
197-OnTheSecurityofOneWitnessBlindSignatureSche..> 22-Dec-2014 11:27    421K
198-BeyondtheLimitationofPrimeOrderBilinearGrou..> 22-Dec-2014 11:27    538K
199-UsingSymmetriesintheIndexCalculusforEllipti..> 22-Dec-2014 11:26    453K
200-AggregateSigncryption.pdf                      22-Dec-2014 11:26    545K
201-CommentanAnonymousMultireceiverIdentitybase..> 22-Dec-2014 11:26    146K
202-SecureSimilarityCoefficientsComputationwith..> 22-Dec-2014 11:26    177K
203-Robustbiometricbaseduserauthenticationschem..> 22-Dec-2014 11:26    217K
204-UniqueGroupSignatures.pdf                      22-Dec-2014 11:26    390K
205-Informationflowcontrolforprogrammingonencry..> 22-Dec-2014 11:26    591K
206-PseudoPreimageAttackonRoundReducedGrostlHas..> 22-Dec-2014 11:26    390K
206-PseudoPreimageAttackonRoundReducedGrstlHash..> 20-Jan-2023 08:32    390K
207-CryptanalysisofHummingbird2.pdf                20-Jan-2023 14:20     207
208-ANEWGUESSANDDETERMINEATTACKONTHEA51STREAMCI..> 22-Dec-2014 11:26    474K
209-AdaptivePreimageResistanceAnalysisRevisited..> 22-Dec-2014 11:26    201K
209-AdaptivePreimageResistanceAnalysisRevisited..> 22-Dec-2014 11:26      1M
210-OntheExistenceofBooleanFunctionswithOptimal..> 22-Dec-2014 11:26    111K
211-StronglySecureAuthenticatedKeyExchangefromF..> 22-Dec-2014 11:26    513K
212-PerfectAlgebraicImmuneFunctions.pdf            22-Dec-2014 11:26    370K
213-RelationbetweenVerifiableRandomFunctionsand..> 22-Dec-2014 11:26    421K
214-AutomaticSearchofTruncatedImpossibleDiffere..> 22-Dec-2014 11:26    618K
215-QuadraticSpanProgramsandSuccinctNIZKswithou..> 22-Dec-2014 11:26    725K
216-AdaptiveCCABroadcastEncryptionwithConstantS..> 22-Dec-2014 11:26    480K
217-EfficientDissectionofBicompositeProblemswit..> 20-Jan-2023 08:32    518K
217-EfficientDissectionofCompositeProblemswithA..> 22-Dec-2014 11:26    484K
218-DifferentiallyPrivateContinualMonitoringofH..> 22-Dec-2014 11:26    633K
219-PrivateFingerprintMatching.pdf                 22-Dec-2014 11:26    233K
220-HedgedPublickeyEncryptionHowtoProtectagains..> 22-Dec-2014 11:26    537K
221-AlmostEverywhereSecureComputationwithEdgeCo..> 22-Dec-2014 11:26    457K
222-Asecretsharingschemeofprimenumbersbasedonha..> 22-Dec-2014 11:25    726K
223-AGeneralizationoftheRainbowBandSeparationAt..> 22-Dec-2014 11:25    572K
224-ShorterIBEandSignaturesviaAsymmetricPairing..> 22-Dec-2014 11:25    274K
225-WhenHomomorphismBecomesaLiability.pdf          22-Dec-2014 11:25    123K
226-ZKPDLALanguageBasedSystemforEfficientZeroKn..> 22-Dec-2014 11:25    760K
227-Securepasswordbasedremoteuserauthentication..> 20-Jan-2023 14:20     207
228-PhysicalUnclonableFunctionsinCryptographicP..> 22-Dec-2014 11:25    380K
229-LanguageswithEfficientZeroKnowledgePCP39sar..> 20-Jan-2023 08:32    391K
229-LanguageswithEfficientZeroKnowledgePCPsarei..> 22-Dec-2014 11:25    391K
230-OnIdealLatticesandLearningwithErrorsOverRin..> 22-Dec-2014 11:25    478K
231-AGeneralConstructionfor1rounddeltaRMTand0de..> 22-Dec-2014 11:25    410K
232-ImplementingPairingsatthe192bitSecurityLeve..> 22-Dec-2014 11:25    160K
233-ACryptanalysisofHummingBird2TheDifferential..> 22-Dec-2014 11:25    513K
234-SPNHashImprovingtheProvableResistanceAgains..> 22-Dec-2014 11:25    739K
235-RingLWEinPolynomialRings.pdf                   22-Dec-2014 11:25    443K
236-OnNecessaryandSufficientConditionsforPrivat..> 22-Dec-2014 11:25    342K
237-InthepointofviewsecurityAnefficientschemein..> 22-Dec-2014 11:25    206K
237-InthepointofviewsecurityAnefficientschemein..> 22-Dec-2014 11:25    269K
238-TheBoomerangAttacksontheRoundReducedSkein51..> 22-Dec-2014 11:25    491K
239-ZeroKnowledgeforMultivariatePolynomials.pdf    22-Dec-2014 11:25    394K
240-FieldSwitchinginBGVStyleHomomorphicEncrypti..> 22-Dec-2014 11:25    389K
241-Keydistributionsystemandattributebasedencry..> 22-Dec-2014 11:25    507K
242-LessisMoreRelaxedyetComposableSecurityNotio..> 22-Dec-2014 11:25    439K
243-COMPRESSMULTIPLECIPHERTEXTSUSINGELGAMALENCR..> 22-Dec-2014 11:25    329K
244-Cryptographyfromtensorproblems.pdf             22-Dec-2014 11:25    208K
245-OntheEquivalencebetweentheSetCoveringProble..> 22-Dec-2014 11:25     99K
246-ASecretSharingSchemeBasedonGroupPresentatio..> 22-Dec-2014 11:24    162K
247-OnEfficientPairingsonEllipticCurvesoverExte..> 22-Dec-2014 11:24    386K
248-TwoBitcoinsatthePriceofOneDoubleSpendingAtt..> 22-Dec-2014 11:24    529K
249-BinaryandqaryTardoscodesrevisited.pdf          22-Dec-2014 11:24      1M
250-NewIdentityBasedEncryptionAndItsProxyReencr..> 22-Dec-2014 11:24    468K
251-TheLinuxPseudorandomNumberGeneratorRevisite..> 22-Dec-2014 11:24    758K
252-FairPrivateSetIntersectionwithaSemitrustedA..> 22-Dec-2014 11:24    653K
253-Cryptanalysisofpairingfreecertificatelessau..> 22-Dec-2014 11:24    111K
254-FastPRPFastPseudoRandomPermutationsforSmall..> 22-Dec-2014 11:24    630K
255-HowtoGarbleArithmeticCircuits.pdf              22-Dec-2014 11:24    490K
256-ThemythofgenericDPAandthemagicoflearning.pdf   22-Dec-2014 11:24    501K
257-TheTransformationfromtheGaloisNLFSRtotheFib..> 20-Jan-2023 14:20     207
258-FullProofCryptographyVerifiableCompilationo..> 22-Dec-2014 11:24    577K
259-ANovelStrongDesignatedVerifierSignatureSche..> 22-Dec-2014 11:24    209K
260-TranspositionofAESKeySchedule.pdf              22-Dec-2014 11:24    277K
261-DualFormSignaturesAnApproachforProvingSecur..> 22-Dec-2014 11:24    513K
262-ImplementingAESviaanActivelyCovertlySecureD..> 22-Dec-2014 11:24    248K
263-OnewayFunctionsfromChebyshevPolynomials.pdf    22-Dec-2014 11:24      2M
264-OntheInSecurityofIDEAinVariousHashingModes.pdf 22-Dec-2014 11:24    396K
265-FoundationsofGarbledCircuits.pdf               22-Dec-2014 11:24    401K
266-CompilationTechniquesforEfficientEncryptedC..> 22-Dec-2014 11:24      1M
267-SelfpairingsonHyperellipticCurves.pdf          22-Dec-2014 11:24    261K
268-OnaCCA2securevariantofMcElieceinthestandard..> 22-Dec-2014 11:24    239K
268-OntheCCA2SecurityofMcElieceintheStandardMod..> 20-Jan-2023 08:32    359K
269-QuantifyingSideChannelInformationLeakagefro..> 22-Dec-2014 11:24    566K
270-QuoVadisQuaternionCryptanalysisofRainbowove..> 22-Dec-2014 11:23    393K
271-HomomorphicSignatureforIdentityAuthenticati..> 20-Jan-2023 14:20     207
272-PassiveCorruptioninStatisticalMultiPartyCom..> 22-Dec-2014 11:23    253K
272-PassiveCorruptioninStatisticalMultiPartyCom..> 22-Dec-2014 11:23    330K
273-PublicKeyCryptographyfromNewMultivariateQua..> 22-Dec-2014 11:23    528K
274-BoomerangandSlideRotationalAnalysisoftheSM3..> 22-Dec-2014 11:23    264K
275-ImplementingBLAKEwithAVXAVX2andXOP.pdf         22-Dec-2014 11:23    354K
276-OfficialArbitrationwithSecureCloudStorageAp..> 22-Dec-2014 11:23    334K
277-CyptanalysisCDHPBDHPandTatepairingundercert..> 22-Dec-2014 11:23    130K
277-CyptanalysisCDHPBDHPandTatepairingundercert..> 22-Dec-2014 11:23    170K
278-ImprovedIndifferentiabilitySecurityBoundfor..> 22-Dec-2014 11:23    509K
278-ImprovedIndifferentiabilitySecurityBoundfor..> 22-Dec-2014 11:23      5M
279-ConcurrentZeroKnowledgeintheBoundedPlayerMo..> 22-Dec-2014 11:23    490K
280-ImprovedPartialSums34basedSquareAttackonAES..> 20-Jan-2023 08:32    300K
280-ImprovedPartialSumsbasedSquareAttackonAES.pdf  22-Dec-2014 11:23    300K
281-PubliclyVerifiableDelegationofLargePolynomi..> 22-Dec-2014 11:23    304K
282-ALGEBRAICCOUNTERMEASURETOENHANCETHEIMPROVED..> 22-Dec-2014 11:23    322K
283-Somepropertiesofqaryfunctionsbasedonspectra..> 22-Dec-2014 11:23    151K
284-EfficientUCSecureAuthenticatedKeyExchangefo..> 22-Dec-2014 11:23    655K
285-ConstantSizeStructurePreservingSignaturesGe..> 22-Dec-2014 11:23    507K
286-ProtectingLastFourRoundsofCLEFIAisNotEnough..> 22-Dec-2014 11:23    198K
286-ProtectingLastFourRoundsofCLEFIAisNotEnough..> 22-Dec-2014 11:23      2M
287-ComputationallyFairGroupandIdentityBasedKey..> 22-Dec-2014 11:23    136K
288-FairExchangeofShortSignatureswithoutTrusted..> 22-Dec-2014 11:23    311K
289-RingGroupSignatures.pdf                        22-Dec-2014 11:22    276K
289-RingGroupSignatures.ps                         22-Dec-2014 11:22    534K
290-FullyHomomorphicMessageAuthenticators.pdf      22-Dec-2014 11:22    373K
291-EfficientDynamicProvablePossessionofRemoteD..> 22-Dec-2014 11:22    934K
292-AnAdaptiveCiphertextAttackagainst34IoplusC3..> 20-Jan-2023 08:32    251K
292-AnAdaptiveCiphertextAttackagainstIoplusCBlo..> 22-Dec-2014 11:22    251K
293-NewTransferenceTheoremsonLatticesPossessing..> 22-Dec-2014 11:22    234K
294-Twogrumpygiantsandababy.pdf                    22-Dec-2014 11:22    428K
295-Broadcastenhancedkeypredistributionschemes.pdf 22-Dec-2014 11:22    700K
296-IntheblinkofaneyeTheregoesyourAESkey.pdf       22-Dec-2014 11:22    935K
297-TamperandLeakageResilienceintheSplitStateMo..> 22-Dec-2014 11:22    404K
298-AnonymousCredentialsLight.pdf                  22-Dec-2014 11:22    564K
299-DifferentialPowerAnalysisonZUCAlgorithm.pdf    22-Dec-2014 11:22    848K
300-ThresholdImplementationsofall3x3and4x4Sboxe..> 22-Dec-2014 11:22      2M
301-APublicShufflewithoutPrivatePermutations.pdf   22-Dec-2014 11:22    569K
302-OninstanceseparationintheUCframework.pdf       22-Dec-2014 11:22    209K
303-OnTheDistributionofLinearBiasesThreeInstruc..> 22-Dec-2014 11:22      1M
304-ActivelySecureTwoPartyEvaluationofanyQuantu..> 22-Dec-2014 11:22    452K
305-ResistancetoPirates20AMethodfromLeakageResi..> 22-Dec-2014 11:22    515K
306-EfficientThresholdZeroKnowledgewithApplicat..> 22-Dec-2014 11:22    270K
307-MultiChannelBroadcastEncryption.pdf            22-Dec-2014 11:22    367K
308-VerifiedSecurityofRedundancyFreeEncryptionf..> 22-Dec-2014 11:22    447K
309-Fastandcompactellipticcurvecryptography.pdf    22-Dec-2014 11:22    279K
310-Amathematicalproblemforsecurityanalysisofha..> 22-Dec-2014 11:21    169K
311-TightlySecureSignaturesandPublicKeyEncrypti..> 22-Dec-2014 11:21    468K
312-CryptanalysisofaProvablySecureGatewayOrient..> 22-Dec-2014 11:21    124K
313-Ananonymousproxysignatureschemewithoutrando..> 20-Jan-2023 14:20     207
314-GenerationofNonlinearFeedbackShiftRegisters..> 22-Dec-2014 11:21    126K
315-UsingVariancetoAnalyzeVisualCryptographySch..> 22-Dec-2014 11:21     12M
316-ComputationallyCompleteSymbolicAttackerinAc..> 22-Dec-2014 11:21    357K
317-ADoItAllCipherforRFIDDesignRequirementsExte..> 22-Dec-2014 11:21    194K
318-Nonuniformcracksintheconcretethepoweroffree..> 22-Dec-2014 11:21    516K
319-BoundsontheThresholdGapinSecretSharingandit..> 22-Dec-2014 11:21    634K
320-TheDiscreteLogarithmProbleminnonrepresentab..> 22-Dec-2014 11:21    294K
321-DECTSecurityAnalysis.pdf                       22-Dec-2014 11:21    690K
322-RevisitingDedicatedandBlockCipherbasedHashF..> 22-Dec-2014 11:21    419K
323-MLConfidentialMachineLearningonEncryptedDat..> 22-Dec-2014 11:21    372K
324-3DHardwareCanaries.pdf                         22-Dec-2014 11:21      4M
325-AnoteongeneralizedbentcriteriaforBooleanfun..> 22-Dec-2014 11:21    282K
326-NewProofMethodsforAttributeBasedEncryptionA..> 22-Dec-2014 11:21    503K
327-SecurityAnalysisofRAPPAnRFIDAuthenticationP..> 22-Dec-2014 11:20    167K
328-TheMultivariateProbabilisticEncryptionSchem..> 22-Dec-2014 11:20    287K
328-TheMultivariateProbabilisticEncryptionSchem..> 22-Dec-2014 11:20      1M
329-AnAnalysisofZVPAttackonECCCryptosystems.pdf    22-Dec-2014 11:20    516K
330-AWayReduceSignedBitwiseDifferencesthatTrans..> 22-Dec-2014 11:20    449K
331-HomomorphicAuthenticationCodesforNetworkCod..> 22-Dec-2014 11:20    285K
332-ANondelegatableIdentitybasedDesignatedVerif..> 22-Dec-2014 11:20    200K
333-OntheFeasibilityofExtendingObliviousTransfe..> 22-Dec-2014 11:20    422K
334-OntheTraceabilityofTagsinSUAPRFIDAuthentica..> 22-Dec-2014 11:20    213K
335-ConstructingVectorialBooleanFunctionswithHi..> 22-Dec-2014 11:20    128K
336-RSAmodulusgenerationinthetwopartycase.pdf      22-Dec-2014 11:20    184K
337-AnalysisandTradeOffsfortheCompleteTreeLayer..> 22-Dec-2014 11:20    427K
338-CharacterizationsonAlgebraicImmunityforMult..> 22-Dec-2014 11:20    121K
339-PracticalPolynomialTimeKnownPlaintextAttack..> 22-Dec-2014 11:20    292K
340-DecidingEpistemicandStrategicPropertiesofCr..> 22-Dec-2014 11:20    572K
341-FromSelectivetoFullSecuritySemiGenericTrans..> 22-Dec-2014 11:20    591K
342-EnhancingLocationPrivacyforElectricVehicles..> 22-Dec-2014 11:20      1M
343-HighThroughputHardwareArchitecturefortheSWI..> 22-Dec-2014 11:20    957K
344-ConstructionofNewClassesofKnapsackTypePubli..> 22-Dec-2014 11:20    195K
345-Breakingpairingbasedcryptosystemsusingeta_T..> 22-Dec-2014 11:20    373K
346-Edwardsmodelofellipticcurvesdefinedoveranyf..> 22-Dec-2014 11:20    409K
346-Edwardsmodelofellipticcurvesdefinedoveranyf..> 22-Dec-2014 11:20    827K
347-AlgebraicDifferentialFaultAttacksonLEDusing..> 22-Dec-2014 11:20    304K
348-ObliviousTransferwithHiddenAccessControlfro..> 22-Dec-2014 11:20    561K
349-ADifferentialFaultAttackonGrain128ausingMAC..> 22-Dec-2014 11:19    283K
350-ANotefortheIdealOrderPreservingEncryptionOb..> 22-Dec-2014 11:19    333K
351-SipHashafastshortinputPRF.pdf                  22-Dec-2014 11:19    357K
352-OnHashingGraphs.pdf                            22-Dec-2014 11:19    205K
352-OnHashingGraphs.ps                             22-Dec-2014 11:19    746K
353-OnReconfigurableFabricsandGenericSideChanne..> 22-Dec-2014 11:19    443K
354-HashCombinersforSecondPreImageResistanceTar..> 22-Dec-2014 11:19    576K
355-Nevertrustabunny.pdf                           22-Dec-2014 11:19    239K
356-FullyAnonymousAttributeTokensfromLattices.pdf  22-Dec-2014 11:19    507K
357-PubliclyVerifiableCiphertexts.pdf              22-Dec-2014 11:19    476K
358-PICAROABlockCipherAllowingEfficientHigherOr..> 22-Dec-2014 11:19    392K
359-Anotherlookatnonuniformity.pdf                 22-Dec-2014 11:19    189K
360-MultipleDifferentialCryptanalysisusingLLRan..> 22-Dec-2014 11:19    427K
361-QuantumKeyDistributionintheClassicalAuthent..> 22-Dec-2014 11:19    407K
362-AchievingConstantRoundLeakageResilientZeroK..> 22-Dec-2014 11:19    495K
363-AUnifiedIndifferentiabilityProofforPermutat..> 22-Dec-2014 11:19    587K
364-ZeroKnowledgeProofswithLowAmortizedCommunic..> 22-Dec-2014 11:19    357K
365-PublicAuditingforEnsuringCloudDataStorageSe..> 22-Dec-2014 11:19    151K
366-SecuringCircuitsAgainstConstantRateTamperin..> 22-Dec-2014 11:19    552K
367-OnContinualLeakageofDiscreteLogRepresentati..> 22-Dec-2014 11:19    500K
368-ComprehensiveEvaluationofHighSpeedandMedium..> 22-Dec-2014 11:19      3M
369-FactorisationofRSA704withCADONFS.pdf           22-Dec-2014 11:19    175K
370-ImprovedBroadcastEncryptionSchemewithConsta..> 22-Dec-2014 11:19    668K
371-Simultaneoushashingofmultiplemessages.pdf      22-Dec-2014 11:18      1M
372-NewPreimageAttacksonHashModesofAES256.pdf      20-Jan-2023 14:20     207
373-OptimalLowerBoundforDifferentiallyPrivateMu..> 22-Dec-2014 11:18    355K
374-InfiltratetheVaultSecurityAnalysisandDecryp..> 22-Dec-2014 11:18    403K
375-HowtoStoresomeSecrets.pdf                      22-Dec-2014 11:18    151K
376-CombinatorialSolutionsProvidingImprovedSecu..> 22-Dec-2014 11:18    351K
377-DistributedKeyGenerationintheWild.pdf          22-Dec-2014 11:18    492K
378-MultipartyProximityTestingwithDishonestMajo..> 22-Dec-2014 11:18    528K
379-AllButManyEncryptionANewFrameworkforFullyEq..> 22-Dec-2014 11:18    283K
380-SeveralWeakBitCommitmentsUsingSealOnceTampe..> 22-Dec-2014 11:18    209K
381-AStronglySecureAuthenticatedKeyExchangeProt..> 20-Jan-2023 14:20     207
382-OntheJointSecurityofSignatureandEncryptionS..> 22-Dec-2014 11:18    388K
383-FormalizationofInformationTheoreticSecurity..> 22-Dec-2014 11:18    312K
384-FunctionalEncryptionforRegularLanguages.pdf    22-Dec-2014 11:18    223K
385-CCBKESessionKeyNegotiationforFastandSecureS..> 22-Dec-2014 11:18      1M
386-CryptanalysisofSoodetalsAuthenticationSchem..> 22-Dec-2014 11:18    194K
387-Newcryptographicconstructionsusinggeneraliz..> 22-Dec-2014 11:18    109K
388-TheArithmeticCodex.pdf                         22-Dec-2014 11:18    350K
389-WideStrongPrivateRFIDIdentificationbasedonZ..> 22-Dec-2014 11:18    269K
390-RegularTernaryAlgorithmforScalarMultiplicat..> 22-Dec-2014 11:18     94K
391-AnalysisandConstructionofEfficientRFIDAuthe..> 22-Dec-2014 11:18     97K
392-IDBasedSigncryptionSchemeinStandardModel.pdf   22-Dec-2014 11:18    419K
393-ACertificatelessMultiplekeyAgreementProtoco..> 22-Dec-2014 11:18    199K
394-AnIDBasedKeyAgreementProtocolBasedonECCAmon..> 22-Dec-2014 11:18    277K
395-ANewEfficientAuthenticatedIDBasedGroupKeyAg..> 22-Dec-2014 11:18    501K
396-Onsecondordernonlinearityandmaximumalgebrai..> 22-Dec-2014 11:18    137K
397-CrossDomainPasswordBasedAuthenticatedKeyExc..> 22-Dec-2014 11:18      2M
398-PIRMAPEfficientPrivateInformationRetrievalf..> 22-Dec-2014 11:17    116K
399-DifferentialFaultAnalysisonBlockCipherPicco..> 22-Dec-2014 11:17    210K
400-AnAlgebraicFaultAttackontheLEDBlockCipher.pdf  22-Dec-2014 11:17    308K
401-AnAllInOneApproachtoDifferentialCryptanalys..> 22-Dec-2014 11:17    432K
402-ForwardSecureHierarchicalPredicateEncryptio..> 22-Dec-2014 11:17    564K
403-FullyPrivateRevocablePredicateEncryption.pdf   22-Dec-2014 11:17    706K
404-SecretSharingSchemesforVeryDenseGraphs.pdf     22-Dec-2014 11:17    177K
405-SecureComputationonFloatingPointNumbers.pdf    22-Dec-2014 11:17    408K
406-Commentsonfourmultiserverauthenticationprot..> 22-Dec-2014 11:17    151K
407-CrossUnlinkableHierarchicalGroupSignatures.pdf 22-Dec-2014 11:17    357K
408-EfficientImplementationofBilinearPairingson..> 22-Dec-2014 11:17    483K
409-MDPCMcElieceNewMcElieceVariantsfromModerate..> 22-Dec-2014 11:17    407K
410-CryptanalysisofanIdentityBasedMultipleKeyAg..> 22-Dec-2014 11:17    140K
411-InfiniteSecretSharingExamples.pdf              22-Dec-2014 11:17    255K
412-ProbabilisticInfiniteSecretSharing.pdf         22-Dec-2014 11:17    223K
413-HighlySecureStrongPUFbasedonNonlinearityofM..> 22-Dec-2014 11:17    797K
414-LowcomplexitybitparallelGF2mmultiplierforal..> 22-Dec-2014 11:17    276K
415-RevisitingKeySchedule39sDiffusionInRelation..> 20-Jan-2023 08:32    517K
415-RevisitingKeySchedulesDiffusionInRelationWi..> 22-Dec-2014 11:17    517K
416-BeyondeCKPerfectForwardSecrecyunderActorCom..> 22-Dec-2014 11:17    467K
417-EfficientPaddingOracleAttacksonCryptographi..> 22-Dec-2014 11:17    379K
418-WeaknessesofanImprovementAuthenticationSche..> 22-Dec-2014 11:17     58K
419-DACMACSEffectiveDataAccessControlforMultiAu..> 20-Jan-2023 14:20     207
420-APubliclyVeriableMixnetwithEverlastingPriva..> 22-Dec-2014 11:17    376K
421-SecuritymarginevaluationofSHA3contestfinali..> 22-Dec-2014 11:17    178K
422-BicliqueCryptanalysisofTWINE.pdf               22-Dec-2014 11:17    565K
423-Programmableencryptionandkeydependentmessag..> 22-Dec-2014 11:17    610K
424-ScalableGroupSignatureswithRevocation.pdf      22-Dec-2014 11:16    544K
425-TheStreamCipherCoreofthe3GPPEncryptionStand..> 22-Dec-2014 11:16    250K
426-AGeneralisedFormulaforCalculatingtheResilie..> 22-Dec-2014 11:16    327K
427-ConstructingPairingFriendlyGenus2Curveswith..> 22-Dec-2014 11:16    369K
428-Rationalauthenticationprotocolsandtheirusei..> 22-Dec-2014 11:16    442K
429-Simpleconstructionofepsilonbiaseddistributi..> 22-Dec-2014 11:16    445K
430-Aformalstudyoftwophysicalcountermeasuresaga..> 22-Dec-2014 11:16    587K
431-OntheSecurityofDynamicGroupSignaturesPreven..> 22-Dec-2014 11:16    381K
432-TorScanTracingLonglivedConnectionsandDiffer..> 22-Dec-2014 11:16    619K
433-ImpossibilityResultsforStaticInputSecureCom..> 22-Dec-2014 11:16    287K
434-AlgebraicTrapdoorOneWayFunctionsandtheirApp..> 22-Dec-2014 11:16    531K
435-DifferentialPrivacywithImperfectRandomness.pdf 22-Dec-2014 11:16    342K
435-DifferentialPrivacywithImperfectRandomness.ps  22-Dec-2014 11:16    740K
436-SecureDatabaseCommitmentsandUniversalArgume..> 22-Dec-2014 11:16    628K
437-DynamicCredentialsandCiphertextDelegationfo..> 22-Dec-2014 11:16    385K
438-BreakingandRepairingGCMSecurityProofs.pdf      22-Dec-2014 11:16    333K
439-RobustSmartCardbasedPasswordAuthenticationS..> 22-Dec-2014 11:16    671K
440-NewPreimageAttacksAgainstReducedSHA1.pdf       22-Dec-2014 11:16    425K
441-AdaptivelySecureMultiPartyComputationwithDi..> 22-Dec-2014 11:16    253K
442-GroupSignatureswithAlmostforfreeRevocation.pdf 22-Dec-2014 11:16    544K
443-ImprovedCRTAlgorithmforClassPolynomialsinGe..> 22-Dec-2014 11:16    553K
444-Factorizationofa1061bitnumberbytheSpecialNu..> 22-Dec-2014 11:16    149K
445-AnoteonAnefficientcertificatelessaggregates..> 22-Dec-2014 11:16     74K
446-DifferentialFaultAnalysisofAESTowardsReachi..> 22-Dec-2014 11:16    493K
446-DifferentialFaultAnalysisofAESTowardsReachi..> 22-Dec-2014 11:15      4M
447-MultireceiverHomomorphicAuthenticationCodes..> 22-Dec-2014 11:15    302K
448-OntheImpossibilityofConstructingEfficientKe..> 22-Dec-2014 11:15    537K
449-LongTermConfidentialityaSurvey.pdf             22-Dec-2014 11:15    330K
450-TweakableBlockcipherswithBeyondBirthdayBoun..> 22-Dec-2014 11:15    663K
451-Stam39sConjectureandThresholdPhenomenainCol..> 20-Jan-2023 08:32    265K
451-StamsConjectureandThresholdPhenomenainColli..> 22-Dec-2014 11:15    264K
451-StamsConjectureandThresholdPhenomenainColli..> 22-Dec-2014 11:15    945K
452-EPiCEfficientPrivacyPreservingCountingforMa..> 22-Dec-2014 11:15    385K
453-NewLeakageResilientCCASecurePublicKeyEncryp..> 22-Dec-2014 11:15    379K
454-AProbabilisticQuantumKeyTransferProtocol.pdf   22-Dec-2014 11:15    428K
455-Mustyouknowthecodeofftosecurelycomputef.pdf    22-Dec-2014 11:15    409K
456-CrowdBlendingPrivacy.pdf                       22-Dec-2014 11:15    411K
457-HushFunctionsExtendedtoAnySizeInputversusAn..> 22-Dec-2014 11:15      1M
458-Computingsmalldiscretelogarithmsfaster.pdf     22-Dec-2014 11:15    446K
459-BarriersinCryptographywithWeakCorrelatedand..> 22-Dec-2014 11:15    462K
460-InformationTheoreticTimedReleaseSecurityKey..> 22-Dec-2014 11:15    244K
461-SuccinctArgumentsfromMultiProverInteractive..> 22-Dec-2014 11:15    663K
462-PerfectAmbiguousOptimisticFairExchange.pdf     22-Dec-2014 11:15    144K
463-DeterministicPublicKeyEncryptionandIdentity..> 22-Dec-2014 11:15    452K
464-FindingLowerBoundsontheComplexityofSecretSh..> 22-Dec-2014 11:15    182K
465-TMATCHPrivacyPreservingItemMatchingforStora..> 22-Dec-2014 11:14    279K
466-ComputationalEntropyandInformationLeakage.pdf  22-Dec-2014 11:14    285K
467-Newresultsonnonexistenceofgeneralizedbentfu..> 22-Dec-2014 11:14    101K
468-FunctionalEncryptionNewPerspectivesandLower..> 22-Dec-2014 11:14    163K
469-PerfectKeywordPrivacyinPEKSSystems.pdf         22-Dec-2014 11:14    193K
470-SomeConnectionsBetweenPrimitiveRootsandQuad..> 22-Dec-2014 11:14    235K
471-AQuasigroupBasedRandomNumberGeneratorforRes..> 22-Dec-2014 11:14    155K
472-OntheSimplicityofConvertingLeakagesfromMult..> 22-Dec-2014 11:14      6M
473-SenderEquivocableEncryptionSchemesSecureaga..> 22-Dec-2014 11:14    388K
474-OntheSemanticSecurityofFunctionalEncryption..> 22-Dec-2014 11:14    693K
475-EfficientSignaturesofKnowledgeandDAAintheSt..> 22-Dec-2014 11:14    337K
476-AjlanestreehashingmodeandjlanesSHA256.pdf      22-Dec-2014 11:14    130K
477-ImprovedKeyRecoveryAttacksonReducedRoundAES..> 22-Dec-2014 11:14    598K
478-Cryptanalysisonanovelunconditionallysecureo..> 22-Dec-2014 11:14    121K
479-MixCompressMixRevisitedDispensingwithNoninv..> 22-Dec-2014 11:14    350K
480-ShortSignaturesFromDiffieHellmanRealizingSh..> 22-Dec-2014 11:14    463K
481-ImprovedSecurityBoundsforKeyAlternatingCiph..> 22-Dec-2014 11:14    182K
482-ApproachesfortheParallelizationofSoftwareIm..> 22-Dec-2014 11:14    240K
483-AnEfficientSigncryptionSchemefromqDiffieHel..> 22-Dec-2014 11:14    151K
483-AnEfficientSigncryptionSchemefromqDiffieHel..> 22-Dec-2014 11:14    334K
484-CryptanalysisofTwoDynamicIDbasedRemoteUserA..> 22-Dec-2014 11:14    235K
484-CryptanalysisofTwoDynamicIDbasedRemoteUserA..> 22-Dec-2014 11:14    188K
485-ExploitingCollisionsinAdditionChainbasedExp..> 22-Dec-2014 11:13    523K
486-ComputationalSoundnesswithoutProtocolRestri..> 22-Dec-2014 11:13    660K
487-ShortcommunicationAninterpretationoftheLinu..> 22-Dec-2014 11:13    130K
488-DesignatedVerifierThresholdProxySignatureSc..> 22-Dec-2014 11:13    360K
489-RecursiveLinearandDifferentialCryptanalysis..> 22-Dec-2014 11:13    321K
490-DesynchronizationAttackonRAPPUltralightweig..> 22-Dec-2014 11:13     81K
490-DesynchronizationAttackonRAPPUltralightweig..> 22-Dec-2014 11:13     61K
491-OntheMultipleFaultAttackonRSASignatureswith..> 22-Dec-2014 11:13    174K
492-AMethodforGeneratingFullCyclesbyaCompositio..> 22-Dec-2014 11:13    182K
493-EfficientQueryIntegrityforOutsourcedDynamic..> 22-Dec-2014 11:13    214K
494-ProtocolMisidentificationMadeEasywithFormat..> 22-Dec-2014 11:13    696K
495-34Metaproofs34andtheirCryptographicApplicat..> 20-Jan-2023 08:32    230K
495-MetaproofsandtheirCryptographicApplications..> 22-Dec-2014 11:13    230K
496-UpdatingattributeinCPABEANewApproach.pdf       22-Dec-2014 11:13    958K
497-ThelowcalldietAuthenticatedEncryptionforcal..> 22-Dec-2014 11:13    200K
498-AlmostPerfectAlgebraicImmuneFunctionswithGo..> 22-Dec-2014 11:13    209K
499-AuthenticityIntegrityandProofofExistencefor..> 22-Dec-2014 11:13    355K
500-ConstantCiphertextLengthinCPABE.pdf            22-Dec-2014 11:13    668K
501-PrivacyAmplificationwithAsymptoticallyOptim..> 22-Dec-2014 11:13    562K
502-AreWeCompromisedModellingSecurityAssessment..> 22-Dec-2014 11:13    309K
503-HierarchicalIdentityBasedLossyTrapdoorFunct..> 22-Dec-2014 11:13    604K
504-ScalableDeniableGroupKeyEstablishment.pdf      22-Dec-2014 11:13    400K
505-Onpseudorandomizationofinformationtheoretic..> 22-Dec-2014 11:13    235K
506-SuccinctMalleableNIZKsandanApplicationtoCom..> 22-Dec-2014 11:13    498K
507-CompactImplementationandPerformanceEvaluati..> 22-Dec-2014 11:13    374K
508-OnLimitationsofUniversalSimulationConstantR..> 22-Dec-2014 11:13    238K
508-OntheImplausibilityofConstantRoundPublicCoi..> 20-Jan-2023 08:32    244K
509-On3shareThresholdImplementationsfor4bitSbox..> 22-Dec-2014 11:13    933K
510-Enabling3shareThresholdImplementationsforan..> 22-Dec-2014 11:12    364K
511-EntangledCloudStorage.pdf                      22-Dec-2014 11:12    512K
512-ConstantOverheadSecureComputationofBooleanC..> 22-Dec-2014 11:12    433K
513-CommitmentsandEfficientZeroKnowledgeProofsf..> 22-Dec-2014 11:12    281K
513-CommitmentsandEfficientZeroKnowledgeProofsf..> 22-Dec-2014 11:12    875K
514-RKASecuritybeyondtheLinearBarrierIBEEncrypt..> 22-Dec-2014 11:12    593K
515-SemanticallySecureFunctionalEncryptionPossi..> 22-Dec-2014 11:12    351K
516-GarblingXORGatesForFree3939intheStandardMod..> 20-Jan-2023 08:32    423K
516-GarblingXORGatesForFreeintheStandardModel.pdf  22-Dec-2014 11:12    423K
517-UnconditionallySecureAsynchronousMultiparty..> 22-Dec-2014 11:12    544K
518-SequentialAggregateSignatureswithShortPubli..> 22-Dec-2014 11:12    306K
519-Fasterimplementationofscalarmultiplicationo..> 22-Dec-2014 11:12    484K
520-OptimizingSegmentBasedDocumentProtectionCor..> 22-Dec-2014 11:12    302K
521-FunctionalEncryptionwithBoundedCollusionsvi..> 22-Dec-2014 11:12    554K
522-FalsePositiveprobabilitiesinqaryTardoscodes..> 22-Dec-2014 11:12      3M
523-TheCuriousCaseofNonInteractiveCommitments.pdf  22-Dec-2014 11:12    760K
524-TahoeTheLeastAuthorityFilesystem.pdf           22-Dec-2014 11:12    269K
525-Computingendomorphismringsofabelianvarietie..> 22-Dec-2014 11:12    254K
526-InvertiblePolynomialRepresentationforPrivat..> 22-Dec-2014 11:12    662K
527-Cryptanalysisofarecenttwofactorauthenticati..> 22-Dec-2014 11:12     39K
528-AnIDBasedSigncryptionSchemewithCompartmente..> 22-Dec-2014 11:12    157K
529-PRINCEALowlatencyBlockCipherforPervasiveCom..> 22-Dec-2014 11:12    678K
530-DynamicSearchableSymmetricEncryption.pdf       22-Dec-2014 11:11    301K
530-DynamicSearchableSymmetricEncryption.ps        22-Dec-2014 11:11      2M
531-GenericConstructionofTraceandRevokeSchemes.pdf 22-Dec-2014 11:11    488K
532-PairingcomputationonEdwardscurveswithhighde..> 22-Dec-2014 11:11    396K
533-SolvingHardLatticeProblemsandtheSecurityofL..> 22-Dec-2014 11:11    652K
534-ASimpleCombinatorialTreatmentofConstruction..> 22-Dec-2014 11:11    254K
535-ALowAreaUnifiedHardwareArchitecturefortheAE..> 22-Dec-2014 11:11      1M
535-ALowAreaUnifiedHardwareArchitecturefortheAE..> 20-Jan-2023 08:32      1M
536-SecretSharingandSecureComputingfromMonotone..> 22-Dec-2014 11:11    373K
537-InterceptingTokensTheEmpireStrikesBackinthe..> 22-Dec-2014 11:11    373K
538-PrivateTopkAggregationProtocols.pdf            22-Dec-2014 11:11    415K
539-EfficientImplementationofRSAAlgorithmwithMK..> 22-Dec-2014 11:11    954K
540-AComparisonofPerfectTableCryptanalyticTrade..> 22-Dec-2014 11:11    378K
541-2048XKSASoftwareOrientedHighSecurityBlockCi..> 20-Jan-2023 08:32    199K
542-SalusASystemforServerAidedSecureFunctionEva..> 22-Dec-2014 11:11    484K
543-EnhancedChosenCiphertextSecurityandApplicat..> 22-Dec-2014 11:11    473K
544-DifferentialAnalysisoftheLEDBlockCipher.pdf    22-Dec-2014 11:11    406K
545-AVersatileMultiInputMultiplieroverFiniteFie..> 22-Dec-2014 11:11    322K
546-RotationalcryptanalysisofroundreducedKeccak..> 22-Dec-2014 11:11    724K
547-ConstrainedSearchforaClassofGoodSBoxeswithI..> 22-Dec-2014 11:11    562K
548-EfficientModularNIZKArgumentsfromShiftandPr..> 22-Dec-2014 11:11    645K
549-Fasterbatchforgeryidentification.pdf           22-Dec-2014 11:11    412K
550-DynamicProofsofRetrievabilityviaObliviousRA..> 22-Dec-2014 11:11    543K
551-FasterPairingComputationonJacobiquarticCurv..> 22-Dec-2014 11:11    373K
552-ProvablySecureConcurrentErrorDetectionAgain..> 22-Dec-2014 11:10      1M
553-Bellcoreattackinpractice.pdf                   22-Dec-2014 11:10    124K
554-SecurityweaknessintheProofofStoragewithDedu..> 22-Dec-2014 11:10    279K
555-NewImpossibilityResultsforConcurrentComposi..> 22-Dec-2014 11:10    492K
556-ResourcebasedCorruptionsandtheCombinatorics..> 22-Dec-2014 11:10    290K
557-PUFsMythFactorBustedASecurityEvaluationofPh..> 22-Dec-2014 11:10      5M
558-DomainSpecificPseudonymousSignaturesfortheG..> 22-Dec-2014 11:10    410K
559-PlaintextAwarenessinIdentityBasedKeyEncapsu..> 22-Dec-2014 11:10    561K
560-ComputationalSoundnessofCoinductiveSymbolic..> 22-Dec-2014 11:10    905K
561-AnAttackonaFullyHomomorphicEncryptionScheme..> 22-Dec-2014 11:10    162K
562-AggregatingCLSignaturesRevisitedExtendedFun..> 22-Dec-2014 11:10    279K
563-ConstantRoundConcurrentZeroKnowledgeFromFal..> 22-Dec-2014 11:10    568K
564-AdaptivelySecureGarblingwithApplicationstoO..> 22-Dec-2014 11:10    587K
565-PackedCiphertextsinLWEbasedHomomorphicEncry..> 22-Dec-2014 11:10    269K
566-QuantizationinContinuousSourceZeroSecrecyLe..> 22-Dec-2014 11:10    494K
567-LeakageSqueezingofOrderTwo.pdf                 22-Dec-2014 11:10    309K
568-OnTransactionPseudonymswithImplicitAttribut..> 22-Dec-2014 11:10    559K
569-ImprovedZeroknowledgeProofsofKnowledgeforth..> 22-Dec-2014 11:10    614K
570-ZeroCorrelationLinearCryptanalysisofReduced..> 22-Dec-2014 11:10    433K
571-ImprovedsidechannelattackontheblockcipherNO..> 22-Dec-2014 11:10    287K
572-OnConstantRoundConcurrentZeroKnowledgefroma..> 22-Dec-2014 11:09    594K
573-LimitsontheUsefulnessofRandomOracles.pdf       22-Dec-2014 11:09    434K
574-Quantumalgorithmforthediscretelogarithmprob..> 22-Dec-2014 11:09    273K
575-NanoelectronicSolutionsforHardwareSecurity.pdf 22-Dec-2014 11:09    795K
576-ConcurrentSignaturewithoutRandomOracles.pdf    22-Dec-2014 11:09    477K
577-AFrameworkforUniqueRingSignatures.pdf          22-Dec-2014 11:09    490K
578-SecurityEvaluationsBeyondComputingPowerHowt..> 22-Dec-2014 11:09    448K
579-DefendingAgainsttheUnknownEnemyApplyingFlip..> 22-Dec-2014 11:09    291K
580-CryptanalysisoftheOKHAuthenticatedEncryptio..> 22-Dec-2014 11:09    118K
581-Ontheinsecurityofsomesmartcardbasedpassword..> 22-Dec-2014 11:09    113K
582-UsingRandomizersforBatchVerificationofECDSA..> 22-Dec-2014 11:09     43K
582-UsingRandomizersforBatchVerificationofECDSA..> 22-Dec-2014 11:09    178K
583-NewConstructionsandProofMethodsforLargeUniv..> 22-Dec-2014 11:09    488K
584-QuantitativeAnalysisoftheFullBitcoinTransac..> 22-Dec-2014 11:09      2M
585-OnProvablySecureCodebasedSignatureandSigncr..> 22-Dec-2014 11:09    242K
586-SHADESecureHAmmingDistancEcomputationfromob..> 22-Dec-2014 11:09    342K
587-Symboliccomputationinblockcipherwithapplica..> 22-Dec-2014 11:09    308K
588-BreakingPublicKeysHowtoDetermineanUnknownRS..> 22-Dec-2014 11:09     19K
589-withdrawn.pdf                                  20-Jan-2023 14:20     207
590-withdrawn.pdf                                  20-Jan-2023 14:20     207
591-BicliqueCryptanalysisOfPRESENTLEDAndKLEIN.pdf  22-Dec-2014 11:09      4M
592-AttributeBasedEncryptionforCircuitsfromMult..> 22-Dec-2014 11:09    242K
593-Factor4and6DecompressionforValuesofPairings..> 22-Dec-2014 11:09    246K
594-ImprovedImpossibleDifferentialAttackonReduc..> 22-Dec-2014 11:09    260K
595-ExtendingBrickellDavenportTheoremtoNonPerfe..> 22-Dec-2014 11:09    259K
596-EvaluatingUserPrivacyinBitcoin.pdf             22-Dec-2014 11:09    940K
597-ANovelPermutationbasedHashModeofOperationFP..> 22-Dec-2014 11:08    453K
598-Takingproofbasedverifiedcomputationafewstep..> 22-Dec-2014 11:08    507K
599-Onthecoefficientsofthepolynomialinthenumber..> 22-Dec-2014 11:08    220K
600-TheLEDBlockCipher.pdf                          22-Dec-2014 11:08    512K
601-HowtoGarbleRAMPrograms.pdf                     22-Dec-2014 11:08    213K
601-HowtoGarbleRAMPrograms.ps                      22-Dec-2014 11:08    335K
602-Anoteoninvariantlineartransformationsinmult..> 22-Dec-2014 11:08    181K
603-CollectingDatawhilePreservingIndividuals39P..> 20-Jan-2023 08:32     64K
603-CollectingDatawhilePreservingIndividualsPri..> 22-Dec-2014 11:08     64K
604-LeakageResilientCryptographyfromMinimalAssu..> 22-Dec-2014 11:08    261K
605-SecureOutsourcedAttributeBasedSignatures.pdf   22-Dec-2014 11:08    147K
606-QuantumSecureMessageAuthenticationCodes.pdf    22-Dec-2014 11:08    487K
607-GraphTheoreticAlgorithmsfortheIsomorphismof..> 20-Jan-2023 08:32      2M
607-GraphTheoreticAlgorithmsfortheIsomorphismof..> 22-Dec-2014 11:08      2M
608-OntheNonReusabilityofFuzzySketchesandExtrac..> 22-Dec-2014 11:08    294K
609-ANEWAPPROACHTOTHEDISCRETELOGARITHMPROBLEMWI..> 22-Dec-2014 11:08    410K
610-CandidateMultilinearMapsfromIdealLattices.pdf  22-Dec-2014 11:08    665K
611-Acodingtheoryfoundationfortheanalysisofgene..> 22-Dec-2014 11:08    390K
612-AnalysisoftheNonPerfectTableFuzzyRainbowTra..> 22-Dec-2014 11:08    332K
613-ResourceRestrictedIndifferentiability.pdf      22-Dec-2014 11:08    388K
614-Anarithmeticintersectionformulafordenominat..> 22-Dec-2014 11:08    482K
615-Polynomialtimesolutionsofcomputationalprobl..> 22-Dec-2014 11:08    372K
616-BalancingOutputLengthandQueryBoundinHardnes..> 20-Jan-2023 08:32    445K
616-HardnessPreservingConstructionsofPseudorand..> 22-Dec-2014 11:08    357K
617-SecurityAnalysisofanOpenCarImmobilizerProto..> 22-Dec-2014 11:08    441K
618-AnultralightweightIDbasedpairwisekeyestabli..> 20-Jan-2023 14:20     207
619-AsynchronousComputationalVSSwithReducedComm..> 22-Dec-2014 11:08    389K
620-SolvingSubsetSumProblemsofDensiotycloseto1b..> 20-Jan-2023 08:32    239K
620-SolvingSubsetSumProblemsofDensiotycloseto1b..> 22-Dec-2014 11:08    239K
621-BicliqueCryptanalysisofLightweightBlockCiph..> 22-Dec-2014 11:07      1M
622-Resolvingtheconflictbetweengeneralityandpla..> 22-Dec-2014 11:07    459K
623-Impossibleplaintextcryptanalysisandprobable..> 22-Dec-2014 11:07    277K
624-OrderPreservingSymmetricEncryption.pdf         22-Dec-2014 11:07    351K
625-OrderPreservingEncryptionRevisitedImprovedS..> 22-Dec-2014 11:07    451K
626-BitParallelGF2nSquarerUsingShiftedPolynomia..> 22-Dec-2014 11:07    275K
627-EfficientGroupSignaturesintheStandardModel.pdf 22-Dec-2014 11:07    487K
628-EfficientGroupKeyManagementSchemesforMultic..> 22-Dec-2014 11:07      1M
629-SCAPITheSecureComputationApplicationProgram..> 22-Dec-2014 11:07    330K
630-OntheSecurityofTLSRenegotiation.pdf            22-Dec-2014 11:07    689K
631-MessageLockedEncryptionandSecureDeduplicati..> 22-Dec-2014 11:07    547K
632-PairingsonGeneralizedHuffCurves.pdf            22-Dec-2014 11:07    110K
633-NewPreimageAttackonMDC4.pdf                    22-Dec-2014 11:07    183K
634-CryptanalysisofDoubleBlockLengthHashModeMJH..> 22-Dec-2014 11:07    146K
635-SecureOutsourcedAttributebasedEncryption.pdf   20-Jan-2023 14:20     207
636-OntheComplexityoftheBKWAlgorithmonLWE.pdf      22-Dec-2014 11:07    437K
637-EfficientMethodsforPracticalFullyHomomorphi..> 22-Dec-2014 11:07    907K
638-CryptanalysisandImprovementofaMultiReceiver..> 22-Dec-2014 11:07    180K
639-CoarsegrainedintegerSmoothRoughBoth.pdf        22-Dec-2014 11:07    602K
640-PreimageandPseudoCollisionAttacksonStepRedu..> 22-Dec-2014 11:07    175K
641-Aunidirectionalconditionalproxyreencryption..> 22-Dec-2014 11:07    180K
642-PracticalCovertlySecureMPCforDishonestMajor..> 22-Dec-2014 11:07    407K
643-ProtocolsforMultipartyCoinTossWithDishonest..> 22-Dec-2014 11:07    395K
644-ImpossibilityResultsforIndifferentiabilityw..> 22-Dec-2014 11:07    233K
645-SimpleEfficientandStronglyKISecureHierarchi..> 22-Dec-2014 11:07    333K
646-GalindoGarciaIdentityBasedSignatureRevisite..> 22-Dec-2014 11:06    559K
647-AMeasureofDependenceforCryptographicPrimiti..> 22-Dec-2014 11:06    196K
648-SearchinEncryptedDataTheoreticalModelsandPr..> 22-Dec-2014 11:06    207K
649-ARobustandPlaintextAwareVariantofSignedElGa..> 22-Dec-2014 11:06    683K
650-FormalanalysisofprivacyinDirectAnonymousAtt..> 22-Dec-2014 11:06    477K
651-TAACTemporalAttributebasedAccessControlforM..> 20-Jan-2023 14:20     207
652-RoundEfficientConcurrentlyComposableSecureC..> 22-Dec-2014 11:06    541K
653-HowpowerfularetheDDHhardgroups.pdf             22-Dec-2014 11:06    452K
654-RefinetheConceptofPublicKeyEncryptionwithDe..> 22-Dec-2014 11:06    162K
655-PrivacyPreservingRevocablePredicateEncrypti..> 22-Dec-2014 11:06    257K
656-SecurityEvaluationofRakaposhiStreamCipher.pdf  22-Dec-2014 11:06    330K
657-FixedArgumentPairingInversiononEllipticCurv..> 22-Dec-2014 11:06    310K
658-DigitalSignatureswithMinimalOverheadfromInd..> 22-Dec-2014 11:06    482K
659-DoesCountingStillCountRevisitingtheSecurity..> 22-Dec-2014 11:06    822K
660-DesignofSecureImageTransmissionInMANETusing..> 20-Jan-2023 14:20     207
660-DesignofSecureImageTransmissioninMANETusing..> 22-Dec-2014 11:06    229K
661-BreakingAnotherQuasigroupBasedCryptographic..> 22-Dec-2014 11:06    719K
662-AsynchronousPhysicalUnclonableFunctionsAsyn..> 22-Dec-2014 11:06    921K
663-VirtualisomorphismsofciphersisAESsecureagai..> 22-Dec-2014 11:06    269K
664-PREStrongerSecurityNotionandEfficientConstr..> 22-Dec-2014 11:06    234K
665-UniformCompressionFunctionsCanFailtoPreserv..> 22-Dec-2014 11:06     96K
666-Estimatingthe934nofUpperLowerBoundinitsRSAC..> 22-Dec-2014 11:06    107K
666-Estimatingthe934nofUpperLowerBoundinitsRSAC..> 22-Dec-2014 11:06    220K
666-EstimatingthenofUpperLowerBoundinitsRSACryp..> 20-Jan-2023 08:32    102K
667-FalseNegativeprobabilitiesinTardoscodes.pdf    22-Dec-2014 11:06      1M
668-ConstructionofDifferentialCharacteristicsin..> 22-Dec-2014 11:06    583K
669-BlackboxTraceableCPABEHowtoCatchPeopleLeaki..> 22-Dec-2014 11:05    460K
670-FastCryptographyinGenus2.pdf                   22-Dec-2014 11:05    705K
671-FullySecureUnboundedInnerProductandAttribut..> 22-Dec-2014 11:05    760K
672-CollisionAttacksonUpto5RoundsofSHA3UsingGen..> 22-Dec-2014 11:05    399K
673-RobustEncryptionRevisited.pdf                  22-Dec-2014 11:05    487K
674-LectureNotesinSecretSharing.pdf                22-Dec-2014 11:05    257K
675-Minkowskisumbasedlatticeconstructionformult..> 20-Jan-2023 08:32    299K
675-Minkowskisumbasedlatticeconstructionformult..> 22-Dec-2014 11:05    299K
676-MixedintegerLinearProgrammingintheAnalysiso..> 22-Dec-2014 11:05    296K
677-WhatistheEffectiveKeyLengthforaBlockCiphera..> 22-Dec-2014 11:05    316K
678-InfectiveComputationandDummyRoundsFaultProt..> 22-Dec-2014 11:05    277K
679-HidingtheInputSizeinSecureTwoPartyComputati..> 22-Dec-2014 11:05    760K
680-NaturalGeneralizationsofThresholdSecretShar..> 22-Dec-2014 11:05    174K
681-ResiliencetoDistinguishingAttacksonWG7Ciphe..> 22-Dec-2014 11:05    306K
682-ProofsofRetrievabilitywithPublicVerifiabili..> 22-Dec-2014 11:05    191K
683-FingerprintTablesAGeneralizationofRainbowTa..> 20-Jan-2023 14:20     207
684-GenericRelatedkeyAttacksforHMAC.pdf            22-Dec-2014 11:05    446K
685-Squarerootcomputationoverevenextensionfield..> 22-Dec-2014 11:05    423K
686-ImprovedPseudoPreimageAttackandSecondPreima..> 22-Dec-2014 11:05      1M
686-ImprovedPseudoPreimageAttackandSecondPreima..> 20-Jan-2023 08:32      1M
687-ThekBDHAssumptionFamilyBilinearMapCryptogra..> 22-Dec-2014 11:05    495K
688-ASimpleProvablySecureKeyExchangeSchemeBased..> 22-Dec-2014 11:05    359K
689-CryptographyUsingCAPTCHAPuzzles.pdf            22-Dec-2014 11:05    540K
690-TheWeaknessofIntegrityProtectionforLTE.pdf     22-Dec-2014 11:05    352K
691-RootOptimizationofPolynomialsintheNumberFie..> 22-Dec-2014 11:05    236K
692-GenericConstructionsofIntegratedPKEandPEKS.pdf 22-Dec-2014 11:05    432K
693-EncodingFunctionswithConstantOnlineRateorHo..> 22-Dec-2014 11:04    510K
694-Cryptanalysisofmatrixconjugationschemes.pdf    22-Dec-2014 11:04    305K
695-FullyAutomatedAnalysisofPaddingBasedEncrypt..> 22-Dec-2014 11:04    551K
696-CryptanalysisofRAKAPOSHIStreamCipher.pdf       22-Dec-2014 11:04    184K
697-VerifiableElectionsThatScaleforFree.pdf        22-Dec-2014 11:04    478K
698-5PMSecurePatternMatching.pdf                   22-Dec-2014 11:04    653K
699-HowPracticalisPublicKeyEncryptionBasedonLPN..> 22-Dec-2014 11:04    352K
700-EfficientAdaptivelySecureandComposableObliv..> 22-Dec-2014 11:04    586K
701-RecoveringRSASecretKeysfromNoisyKeyBitswith..> 22-Dec-2014 11:04    189K
702-CryptanalysisofRAPPanRFIDAuthenticationProt..> 22-Dec-2014 11:04      1M
703-ProfiledModelBasedPowerSimulatorforSideChan..> 22-Dec-2014 11:04    637K
704-OntheNonmalleabilityoftheFiatShamirTransfor..> 22-Dec-2014 11:04    538K
705-Why34FiatShamirforProofs34LacksaProof.pdf      20-Jan-2023 08:31    463K
705-WhyFiatShamirforProofsLacksaProof.pdf          22-Dec-2014 11:04    463K
706-OntheInsecurityoftheFiatShamirParadigmRevis..> 22-Dec-2014 11:04    356K
707-CryptanalysisofWIDEA.pdf                       22-Dec-2014 11:04    498K
708-CallingoutCheatersCovertSecurityWithPublicV..> 22-Dec-2014 11:04    536K
709-Furtherresultsonthedistinctnessofbinarysequ..> 22-Dec-2014 11:04    248K
710-NonObservabilityintheRandomOracleModel.pdf     22-Dec-2014 11:04    305K
711-UnprovableSecurityof2MessageZeroKnowledge.pdf  20-Jan-2023 08:31    390K
711-UnprovableSecurityofTwoMessageZeroKnowledge..> 22-Dec-2014 11:04    351K
712-OntheSecurityoftheCoreofPRINCEAgainstBicliq..> 22-Dec-2014 11:04      1M
713-SystematicTreatmentofRemoteAttestation.pdf     22-Dec-2014 11:04    283K
714-DiscreteGaussianLeftoverHashLemmaoverInfini..> 22-Dec-2014 11:04    463K
715-NewImpossibleDifferentialAttackontextSAFER_..> 22-Dec-2014 11:04      1M
716-AttributeBasedFunctionalEncryptiononLattice..> 22-Dec-2014 11:03    503K
717-PracticalYetUniversallyComposableTwoServerP..> 22-Dec-2014 11:03    536K
718-SuccinctNonInteractiveArgumentsviaLinearInt..> 22-Dec-2014 11:03    842K
719-Anidealmultisecretsharingschemebasedonminim..> 22-Dec-2014 11:03    264K
720-FasterindexcalculusforthemediumprimecaseApp..> 22-Dec-2014 11:03    277K
721-OntheInsecurityofFischlin39sParadigm.pdf       20-Jan-2023 08:31    372K
721-OntheInsecurityofFischlinsParadigm.pdf         22-Dec-2014 11:03    372K
722-HardnessPreservingReductionsviaCuckooHashin..> 22-Dec-2014 11:03    546K
723-TwoExponentiationAlgorithmsResistanttoCross..> 22-Dec-2014 11:03    257K
724-ACodingTheoreticApproachtoRecoveringNoisyRS..> 22-Dec-2014 11:03    794K
725-Cryptanalysisofanefficientcertificatelesstw..> 22-Dec-2014 11:03    158K
726-ApplicationsofPolynomialPropertiestoVerifia..> 22-Dec-2014 11:03    360K
727-OntheImpossibilityofSenderDeniablePublicKey..> 22-Dec-2014 11:03    359K
728-DefensiveLeakageCamouflage.pdf                 22-Dec-2014 11:03    530K
729-OntheImpossibilityofApproximateObfuscationa..> 22-Dec-2014 11:03    585K
730-TwistedEdwardsFormEllipticCurveCryptography..> 22-Dec-2014 11:03    155K
730-TwistedEdwardsFormEllipticCurveCryptography..> 22-Dec-2014 11:03    326K
731-TimememoryTradeoffsforNearcollisions.pdf       22-Dec-2014 11:03    100K
732-NonInteractiveKeyExchange.pdf                  22-Dec-2014 11:03    482K
733-ReusableGarbledCircuitsandSuccinctFunctiona..> 22-Dec-2014 11:03    521K