Index of /2013/
../
001-Shieldingcircuitswithgroups.pdf 22-Dec-2014 12:14 350K
002-GeneralizedIdentityBasedHashProofSystemandI..> 22-Dec-2014 12:14 457K
003-OnFormalExpressionsofBRWpolynomials.pdf 22-Dec-2014 12:14 219K
004-MakingNTRUEncryptandNTRUSignasSecureasStand..> 22-Dec-2014 12:14 522K
005-EfficientMultiplierforpairingsoverBarretoNa..> 22-Dec-2014 12:14 189K
006-Cryptanalysisofapairingfreeidentitybasedaut..> 22-Dec-2014 12:13 36K
007-AMatrixApproachforConstructingQuadraticAPNF..> 22-Dec-2014 12:13 361K
008-NonBlackBoxSimulationfromOneWayFunctionsAnd..> 22-Dec-2014 12:13 610K
009-AchievingAnonymityAgainstMajorFaceRecogniti..> 22-Dec-2014 12:13 276K
010-SimultaneousResettableWIfromOnewayFunctions..> 22-Dec-2014 12:13 261K
011-EvolvingbalancedBooleanfunctionswithoptimal..> 22-Dec-2014 12:13 332K
012-Tropicalcryptography.pdf 22-Dec-2014 12:13 168K
013-EfficientlyOutsourcingMultipartyComputation..> 22-Dec-2014 12:13 320K
014-OnformalandautomaticsecurityverificationofW..> 22-Dec-2014 12:13 1M
015-CompleteandUnifiedGroupLawsarenotEnoughforE..> 22-Dec-2014 12:13 161K
016-RevocableIdentityBasedEncryptionRevisitedSe..> 22-Dec-2014 12:13 230K
017-ProvableSecurityofSBGPandotherPathVectorPro..> 22-Dec-2014 12:13 909K
018-EfficientDelegationofKeyGenerationandRevoca..> 22-Dec-2014 12:13 333K
019-PlainversusRandomizedCascadingBasedKeyLengt..> 22-Dec-2014 12:13 448K
020-AggregateandVerifiablyEncryptedSignaturesfr..> 22-Dec-2014 12:13 293K
021-RateLimitedSecureFunctionEvaluation.pdf 20-Jan-2023 08:31 737K
021-RateLimitedSecureFunctionEvaluationDefiniti..> 22-Dec-2014 12:13 594K
022-NonlinearcryptanalysisofreducedroundSerpent..> 22-Dec-2014 12:13 959K
023-ANewPracticalIdentityBasedEncryptionSystem.pdf 22-Dec-2014 12:13 183K
024-NewCubeRootAlgorithmBasedonThirdOrderLinear..> 22-Dec-2014 12:13 111K
025-TheIITMModelaSimpleandExpressiveModelforUni..> 22-Dec-2014 12:13 1M
026-RSAprivatekeyreconstructionfromrandombitsus..> 22-Dec-2014 12:13 253K
027-AnonymityGuaranteesoftheUMTSLTEAuthenticati..> 22-Dec-2014 12:13 295K
028-MoreonlinearhullsofPRESENTlikeciphersandacr..> 22-Dec-2014 12:13 372K
029-ImprovedDifferentialFaultAttackonMICKEY20.pdf 22-Dec-2014 12:13 455K
030-Onthesecurityofanidentitybasedauthenticated..> 22-Dec-2014 12:13 80K
031-AnAnalysisoftheEMVChannelEstablishmentProto..> 22-Dec-2014 12:12 464K
032-DetectionofCheatersinNoninteractivePolynomi..> 22-Dec-2014 12:12 142K
033-CCASecureIBKEMfromIdentityBasedExtractableH..> 22-Dec-2014 12:12 673K
034-NewSmoothProjectiveHashFunctionsandOneRound..> 22-Dec-2014 12:12 725K
035-ImprovementstoNFCMobileTransactionandAuthen..> 20-Jan-2023 14:20 207
036-BatchFullyHomomorphicEncryptionovertheInteg..> 22-Dec-2014 12:12 560K
037-ProvablySecureIdentityBasedAggregateSigncry..> 22-Dec-2014 12:12 137K
038-VerifiableDataStreaming.pdf 22-Dec-2014 12:12 449K
039-CreatingaChallengeforIdealLattices.pdf 22-Dec-2014 12:12 440K
040-AnEfficientCCA2SecureVariantoftheMcElieceCr..> 22-Dec-2014 12:12 363K
041-TraceExpressionofrthRootoverFiniteField.pdf 22-Dec-2014 12:12 105K
042-ComplexityofMultiPartyComputationFunctional..> 22-Dec-2014 12:12 744K
043-DifferentialFaultAttackonthePRINCEBlockCiph..> 22-Dec-2014 12:12 366K
044-EfficientComputationOutsourcingforInverting..> 22-Dec-2014 12:12 158K
045-TowardsEfficientVerifiableSQLQueryforOutsou..> 20-Jan-2023 14:20 207
046-FastandMaliciouslySecureTwoPartyComputation..> 22-Dec-2014 12:12 405K
047-LowerBoundsontheInformationRatioofLinearSec..> 22-Dec-2014 12:12 78K
048-PowerBalancedCircuitsforLeakagePowerAttacks..> 22-Dec-2014 12:12 233K
049-LessonsLearnedFromPreviousSSLTLSAttacksABri..> 22-Dec-2014 12:12 2M
050-CryptanalysisandImprovementofAkleyleketal39..> 20-Jan-2023 08:31 158K
050-CryptanalysisandImprovementofAkleyleketalsc..> 22-Dec-2014 12:12 228K
050-CryptanalysisandImprovementofAkleyleketalsc..> 22-Dec-2014 12:12 801K
051-GarbledCircuitsCheckingGarbledCircuitsMoreE..> 22-Dec-2014 12:12 388K
052-SomeComplexityResultsandBitUnpredictablefor..> 22-Dec-2014 12:12 270K
053-Arevocablecertificatelesssignaturescheme.pdf 22-Dec-2014 12:12 284K
054-JointCompartmentedThresholdAccessStructures..> 22-Dec-2014 12:12 316K
055-Secrecywithoutonewayfunctions.pdf 22-Dec-2014 12:12 215K
056-OnConstructionsofMDSMatricesfromCompanionMa..> 22-Dec-2014 12:11 370K
057-CRTbasedFullyHomomorphicEncryptionovertheIn..> 22-Dec-2014 12:11 350K
058-CryptanalysisoftheDragonflyKeyExchangeProto..> 22-Dec-2014 12:11 384K
059-OptimizedGPUImplementationandPerformanceAna..> 22-Dec-2014 12:11 512K
060-OnFHEwithoutbootstrapping.pdf 22-Dec-2014 12:11 362K
061-OntheIndifferentiabilityofKeyAlternatingCip..> 22-Dec-2014 12:11 718K
061-OntheIndifferentiabilityofKeyAlternatingCip..> 22-Dec-2014 12:11 2M
062-SymbolicUniversalComposability.pdf 22-Dec-2014 12:11 995K
063-AVerifiable1outofnDistributedObliviousTrans..> 22-Dec-2014 12:11 398K
064-LightweightZeroKnowledgeProofsforCryptoComp..> 22-Dec-2014 12:11 453K
065-InstantiatingTreelessSignatureSchemes.pdf 22-Dec-2014 12:11 448K
066-AnalysisandImprovementofthesecuringRFIDsyst..> 22-Dec-2014 12:11 97K
067-PowerAnalysisofHardwareImplementationsProte..> 22-Dec-2014 12:11 360K
068-WhyProvingHIBESystemsSecureisDifficult.pdf 22-Dec-2014 12:11 310K
069-HardnessofSISandLWEwithSmallParameters.pdf 22-Dec-2014 12:11 368K
070-RelatedkeyAttacksAgainstFullHummingbird2.pdf 22-Dec-2014 12:11 325K
071-RelationcollectionfortheFunctionFieldSieve.pdf 22-Dec-2014 12:11 329K
072-TheUCapproachanapplicationview.pdf 22-Dec-2014 12:11 249K
073-ZeroKnowledgeUsingGarbledCircuitsHowToProve..> 22-Dec-2014 12:11 438K
074-OntheFunctionFieldSieveandtheImpactofHigher..> 22-Dec-2014 12:11 228K
075-ImprovedSecurityforaRingBasedFullyHomomorph..> 22-Dec-2014 12:11 502K
076-DesignSpaceExplorationandOptimizationofPath..> 22-Dec-2014 12:11 3M
077-UCSecureMultiSessionOTUsingTamperProofHardw..> 22-Dec-2014 12:10 139K
078-BroadcastSteganography.pdf 22-Dec-2014 12:10 684K
079-FastCutandChooseBasedProtocolsforMaliciousa..> 22-Dec-2014 12:10 864K
080-AnefficientattackofaMcEliececryptosystemvar..> 22-Dec-2014 12:10 380K
081-EfficientSecureTwoPartyComputationUsingSymm..> 22-Dec-2014 12:10 151K
082-SecretSharingRankInequalitiesandInformation..> 22-Dec-2014 12:10 131K
083-ASecurityFrameworkforAnalysisandDesignofSof..> 22-Dec-2014 12:10 526K
084-SecurityofQuantumReadoutPUFsagainstquadratu..> 22-Dec-2014 12:10 232K
085-BetweenaRockandaHardPlaceInterpolatingBetwe..> 22-Dec-2014 12:10 406K
086-EfficientPrivateFileRetrievalbyCombiningORA..> 22-Dec-2014 12:10 408K
087-SquareRootAlgorithminF_qforq2s1mod2s1.pdf 22-Dec-2014 12:10 77K
088-SecureSignaturesandChosenCiphertextSecurity..> 22-Dec-2014 12:10 582K
089-Filterednonlinearcryptanalysisofreducedroun..> 22-Dec-2014 12:10 433K
090-FunctionalEncryptionSupportingRecursiveLang..> 20-Jan-2023 14:20 207
091-SystematicConstructionandComprehensiveEvalu..> 22-Dec-2014 12:10 707K
092-ManintheMiddleSecureAuthenticationSchemesfr..> 22-Dec-2014 12:10 383K
093-Onthesecurityofacertificatelessaggregatesig..> 22-Dec-2014 12:10 55K
094-OntheFlyMultipartyComputationontheCloudviaM..> 22-Dec-2014 12:10 545K
095-AnewindexcalculusalgorithmwithcomplexityL14..> 22-Dec-2014 12:10 411K
096-Stateconvergenceinbitbasedstreamciphers.pdf 22-Dec-2014 12:10 564K
097-BicliqueCryptanalysisoftheFullRoundKLEINBlo..> 22-Dec-2014 12:10 839K
098-LearningwithRoundingRevisitedNewReductionPr..> 22-Dec-2014 12:10 574K
099-Constantroundsecuretwopartycomputationfroma..> 22-Dec-2014 12:09 246K
100-AttacksandCommentsonSeveralRecentlyProposed..> 22-Dec-2014 12:09 345K
101-NotionsofBlackBoxReductionsRevisited.pdf 22-Dec-2014 12:09 532K
102-OntheNegativeEffectsofTrendNoiseandItsAppli..> 22-Dec-2014 12:09 280K
103-OntheComplexityofBroadcastSetup.pdf 22-Dec-2014 12:09 277K
104-ATutorialonWhiteboxAES.pdf 22-Dec-2014 12:09 727K
105-LossyChainsandFractionalSecretSharing.pdf 22-Dec-2014 12:09 618K
106-URDPGeneralFrameworkforDirectCCA2Securityfr..> 20-Jan-2023 14:20 207
107-OntheArithmeticComplexityofStrassenLikeMatr..> 22-Dec-2014 12:09 415K
108-UnconditionallySecureandUniversallyComposab..> 22-Dec-2014 12:09 742K
109-ShorterQuasiAdaptiveNIZKProofsforLinearSubs..> 22-Dec-2014 12:09 592K
110-FullCharacterizationofFunctionsthatImplyFai..> 22-Dec-2014 12:09 258K
111-MessageAuthenticationCodesSecureagainstAddi..> 22-Dec-2014 12:09 115K
112-PUFModelingAttacksonSimulatedandSiliconData..> 22-Dec-2014 12:09 559K
113-CompactHardwareImplementationsofChaChaBLAKE..> 22-Dec-2014 12:09 2M
114-PublicKeyExchangeUsingMatricesOverGroupRing..> 22-Dec-2014 12:09 434K
115-AConditionalProxyBroadcastReEncryptionSchem..> 22-Dec-2014 12:09 764K
116-TheAlgorithmofAAES.pdf 22-Dec-2014 12:09 214K
117-OnrthRootExtractionAlgorithminF_qForqlrs1mo..> 22-Dec-2014 12:09 97K
118-ThroughputOptimizedImplementationsofQUAD.pdf 22-Dec-2014 12:09 288K
119-SpeedingupAtePairingComputationinAffineCoor..> 22-Dec-2014 12:09 360K
120-AnAttackAgainstFixedValueDiscreteLogarithmR..> 22-Dec-2014 12:09 83K
121-SuccinctNonInteractiveZeroKnowledgeArgument..> 22-Dec-2014 12:09 659K
122-Practicalcollisionattackon40stepRIPEMD128.pdf 22-Dec-2014 12:08 124K
123-AnalysisandImprovementofLindell39sUCSecureC..> 20-Jan-2023 08:31 351K
123-AnalysisandImprovementofLindellsUCSecureCom..> 22-Dec-2014 12:08 351K
124-TamperResilientCryptographyWithoutSelfDestr..> 20-Jan-2023 14:20 207
125-DeterministicPublicKeyEncryptionforAdaptive..> 22-Dec-2014 12:08 480K
126-DirectProofofSecurityofWegmanCarterAuthenti..> 22-Dec-2014 12:08 287K
127-ObliviousPAKEEfficientHandlingofPasswordTri..> 22-Dec-2014 12:08 521K
128-AttributeBasedEncryptionforCircuitsfromMult..> 22-Dec-2014 12:08 407K
129-AnIdealSecurityProtocolforOrderPreservingEn..> 22-Dec-2014 12:08 739K
130-BlankDigitalSignatures.pdf 22-Dec-2014 12:08 409K
131-Twoisthefastestprimelambdacoordinatesforbin..> 22-Dec-2014 12:08 400K
132-YetAnotherAttackOntheChineseRemainderTheore..> 22-Dec-2014 12:08 688K
133-NewLatticeBasedSignatureUsingTheJordanNorma..> 22-Dec-2014 12:08 86K
134-HardCorePredicatesforaDiffieHellmanProblemo..> 22-Dec-2014 12:08 548K
135-AnMQCodeCryptosystemProposal.pdf 22-Dec-2014 12:08 312K
136-2048XKSF4096XKSFTwoSoftwareOrientedHighSecu..> 22-Dec-2014 12:08 233K
136-2048XKSFamp4096XKSFTwoSoftwareOrientedHighS..> 20-Jan-2023 08:31 233K
137-HowtoHideCircuitsinMPCAnEfficientFrameworkf..> 22-Dec-2014 12:08 667K
138-Multibithomomorphicencryptionbasedonlearnin..> 22-Dec-2014 12:08 239K
139-RethinkingDefinitionsofSecurityforSessionKe..> 22-Dec-2014 12:08 339K
140-LimitationsoftheMetaReductionTechniqueTheCa..> 22-Dec-2014 12:08 393K
141-NonisomorphicBicliqueCryptanalysisandItsApp..> 22-Dec-2014 12:08 1M
142-ANEWMETHODOFCHOOSINGPRIMITIVEELEMENTSFORBRE..> 22-Dec-2014 12:08 391K
143-AnarchitectureforpracticalactivelysecureMPC..> 22-Dec-2014 12:08 353K
144-OnWeakKeysandForgeryAttacksagainstPolynomia..> 22-Dec-2014 12:08 433K
145-KeyWrappingwithaFixedPermutation.pdf 22-Dec-2014 12:08 379K
146-HighPerformanceScalarMultiplicationusing8Di..> 22-Dec-2014 12:08 694K
147-AnoteonthepracticalcomplexityoftheNFSinthem..> 22-Dec-2014 12:07 482K
148-AESlikeciphersarespecialSboxesbetterthenran..> 22-Dec-2014 12:07 176K
149-SecureandConstantCostPublicCloudStorageAudi..> 22-Dec-2014 12:07 248K
150-PracticalSecondPreimageAttacksonTCS_SHA3.pdf 22-Dec-2014 12:07 192K
151-SomeFixesToSSH.pdf 22-Dec-2014 12:07 144K
152-PolicybasedSecureDeletion.pdf 22-Dec-2014 12:07 401K
153-Onthesecurityofacerticatelesssignatureschem..> 22-Dec-2014 12:07 88K
154-OptimalSuspicionFunctionsforTardosTraitorTr..> 22-Dec-2014 12:07 5M
155-MiniLEGOEfficientSecureTwoPartyComputationF..> 22-Dec-2014 12:07 769K
156-IncentivizingOutsourcedComputation.pdf 22-Dec-2014 12:07 175K
157-ThefragilityofAESGCMauthenticationalgorithm..> 22-Dec-2014 12:07 419K
158-EfficientandSecureAlgorithmsforGLVBasedScal..> 22-Dec-2014 12:07 492K
159-ImprovingtheMessageciphertextRateofLewko39s..> 20-Jan-2023 08:31 333K
159-ImprovingtheMessageciphertextRateofLewkosFu..> 22-Dec-2014 12:07 333K
160-InteractiveCodingRevisited.pdf 22-Dec-2014 12:07 489K
161-CompletenessTheoremsforAllFiniteStateless2P..> 22-Dec-2014 12:07 737K
162-ANonAsymptoticAnalysisofInformationSetDecod..> 22-Dec-2014 12:07 346K
163-SearchPatternLeakageinSearchableEncryptionA..> 22-Dec-2014 12:07 387K
164-ProvablySecureLWEEncryptionwithSmallishUnif..> 22-Dec-2014 12:07 379K
165-ANewSecurityandPrivacyFrameworkforRFIDInClo..> 20-Jan-2023 14:20 207
166-OngeneralizedsemibentandpartiallybentBoolea..> 22-Dec-2014 12:07 159K
167-SinglePasswordAuthentication.pdf 22-Dec-2014 12:07 660K
168-OnsecureembeddedtokendesignLongVersionQuasi..> 22-Dec-2014 12:07 498K
169-HighlyScalableSearchableSymmetricEncryption..> 22-Dec-2014 12:06 493K
170-FastCollisionAttackonMD5.pdf 22-Dec-2014 12:06 296K
171-ConfinedGuessingNewSignaturesFromStandardAs..> 22-Dec-2014 12:06 473K
172-OntheApplicabilityofTimeDrivenCacheAttackso..> 22-Dec-2014 12:06 754K
173-OntheClassificationofDifferentialInvariants..> 22-Dec-2014 12:06 118K
173-OntheClassificationofDifferentialInvariants..> 20-Jan-2023 08:31 118K
174-CryptanalysisofSomeDoubleBlockLengthHashMod..> 22-Dec-2014 12:06 232K
175-MachineGeneratedAlgorithmsProofsandSoftware..> 22-Dec-2014 12:06 2M
176-DistinguishingAttacksonRC4andANewImprovemen..> 22-Dec-2014 12:06 224K
177-Agenericconstructionforvotingcorrectnessatm..> 22-Dec-2014 12:06 431K
178-CryptanalysisofRC4nmStreamCipher.pdf 22-Dec-2014 12:06 492K
179-MalleableSignaturesComplexUnaryTransformati..> 22-Dec-2014 12:06 509K
180-ANewClassofProductsumTypePublicKeyCryptosys..> 22-Dec-2014 12:06 194K
181-Ontheevaluationofmodularpolynomials.pdf 22-Dec-2014 12:06 467K
182-CollusionResistantDomainSpecificPseudonymou..> 22-Dec-2014 12:06 2M
183-PracticalMultilinearMapsovertheIntegers.pdf 22-Dec-2014 12:06 491K
184-TheVernamcipherisrobusttosmalldeviationsfro..> 22-Dec-2014 12:06 234K
185-SecurityAnalysisofLinearlyFilteredNLFSRs.pdf 22-Dec-2014 12:06 575K
186-OntheImpossibilityofProjectingPropertyinPri..> 22-Dec-2014 12:06 488K
187-EnhancedOwnershipTransferProtocolforRFIDina..> 22-Dec-2014 12:06 216K
188-Afamilyof6to4bitSboxeswithlargelinearbranch..> 22-Dec-2014 12:06 213K
189-IdealandPerfectHierarchicalSecretSharingSch..> 22-Dec-2014 12:06 280K
190-PowerAnalysisAttacksagainstFPGAImplementati..> 22-Dec-2014 12:06 959K
191-ImprovedDifferentialFaultAnalysisonARIAusin..> 22-Dec-2014 12:05 182K
192-AgeneralisationofMiller39salgorithmandappli..> 20-Jan-2023 08:31 605K
192-AgeneralisationofMillersalgorithmandapplica..> 22-Dec-2014 12:05 605K
193-CertificatelessSignaturesStructuralExtensio..> 22-Dec-2014 12:05 286K
194-OntheImpossibilityofCryptographywithTampera..> 22-Dec-2014 12:05 660K
195-OntheredesignofanFPGAbasedPUF.pdf 22-Dec-2014 12:05 342K
196-FastTwoPartySecureComputationwithMinimalAss..> 22-Dec-2014 12:05 345K
197-DiscretelogarithminGF2809withFFS.pdf 22-Dec-2014 12:05 498K
198-OnEvaluatingCircuitswithInputsEncryptedbyDi..> 22-Dec-2014 12:05 383K
199-Quantumalgorithmsforthesubsetsumproblem.pdf 22-Dec-2014 12:05 365K
200-SelectingpolynomialsfortheFunctionFieldSiev..> 22-Dec-2014 12:05 633K
201-NonmalleableCodesfromAdditiveCombinatorics.pdf 22-Dec-2014 12:05 430K
202-BreakingNLMMACGenerator.pdf 22-Dec-2014 12:05 265K
203-FromobliviousAEStoefficientandsecuredatabas..> 22-Dec-2014 12:05 426K
204-ComputingPrivacyPreservingEditDistanceandSm..> 22-Dec-2014 12:05 631K
205-PracticalandEmployableProtocolsforUCSecureC..> 22-Dec-2014 12:05 621K
206-PrivacyPreservingBillingforeTicketingSystem..> 22-Dec-2014 12:05 292K
207-SelfblindableCredentialTowardsLightWeightAn..> 22-Dec-2014 12:05 254K
208-CloudHKAACryptographicApproachforHierarchic..> 22-Dec-2014 12:05 798K
209-Newmodularmultiplicationanddivisionalgorith..> 22-Dec-2014 12:05 265K
210-Cryptophia39sShortCombinerforCollisionResis..> 20-Jan-2023 08:31 537K
210-CryptophiasShortCombinerforCollisionResista..> 22-Dec-2014 12:05 537K
211-Anewcriterionforavoidingthepropagationoflin..> 22-Dec-2014 12:05 439K
212-ACloserLookatHMAC.pdf 22-Dec-2014 12:05 224K
213-OntheImpactsofMathematicalRealizationoverPr..> 22-Dec-2014 12:04 266K
214-RemotegrityDesignandUseofanEndtoEndVerifiab..> 22-Dec-2014 12:04 614K
215-OpticalPUFsReloaded.pdf 22-Dec-2014 12:04 1M
216-ElectionVerifiabilityorBallotPrivacyDoWeNee..> 22-Dec-2014 12:04 447K
217-ComputingonAuthenticatedDataforAdjustablePr..> 22-Dec-2014 12:04 399K
218-ComparingthePairingEfficiencyoverCompositeO..> 22-Dec-2014 12:04 497K
219-DesigningaHybridAttributeBasedEncryptionSch..> 22-Dec-2014 12:04 405K
220-TowardsEfficientPrivateDistributedComputati..> 22-Dec-2014 12:04 403K
221-IdentitybasedAggregateSignatureswithVerifia..> 22-Dec-2014 12:04 317K
222-Tightsecurityboundsforkeyalternatingciphers..> 22-Dec-2014 12:04 281K
223-ThePACEAAProtocolforMachineReadableTravelDo..> 22-Dec-2014 12:04 425K
224-OntheNeedofPhysicalSecurityforSmallEmbedded..> 22-Dec-2014 12:04 1M
225-TransparentDistributedandReplicatedDynamicP..> 22-Dec-2014 12:04 542K
226-Publickeyexchangeusingsemidirectproductofse..> 22-Dec-2014 12:04 287K
227-Analysisofauthenticationandkeyestablishment..> 22-Dec-2014 12:04 2M
228-PublicKeyRevocationandTracingSchemeswithSub..> 22-Dec-2014 12:04 291K
229-HowtoRunTuringMachinesonEncryptedData.pdf 22-Dec-2014 12:04 329K
230-RelationsamongPrivacyNotionsforSigncryption..> 20-Jan-2023 08:31 434K
230-RelationsamongPrivacyNotionsforSigncryption..> 22-Dec-2014 12:04 434K
231-Sakuraaflexiblecodingfortreehashing.pdf 22-Dec-2014 12:04 287K
232-QuantumalgorithmstocheckResiliencySymmetrya..> 22-Dec-2014 12:04 416K
233-AttacksonJHGrostlandSMASHHashFunctions.pdf 22-Dec-2014 12:04 281K
233-AttacksonJHGrstlandSMASHHashFunctions.pdf 20-Jan-2023 08:31 281K
234-ACryptographicAnalysisofOPACITY.pdf 22-Dec-2014 12:04 767K
235-Ballotsecrecyandballotindependencedefinitio..> 22-Dec-2014 12:03 403K
236-ACiphertextPolicyAttributeBasedProxyReEncry..> 22-Dec-2014 12:03 891K
237-TypeBasedAnalysisofGenericKeyManagementAPIs..> 22-Dec-2014 12:03 429K
238-AnonymitypreservingPublicKeyEncryptionACons..> 22-Dec-2014 12:03 467K
239-OptimizingORAMandUsingitEfficientlyforSecur..> 22-Dec-2014 12:03 298K
240-AlgebraicanalysisofTriviumlikeciphers.pdf 22-Dec-2014 12:03 278K
241-ThePerilsofRepeatingPatternsObservationofSo..> 22-Dec-2014 12:03 108K
242-AE5SecurityNotionsDefinitionsImplicitintheC..> 22-Dec-2014 12:03 252K
243-ASimpleORAM.pdf 22-Dec-2014 12:03 316K
244-Cryptographicschemeskeyexchangepublickey.pdf 22-Dec-2014 12:03 352K
245-TheFiatShamirTransformationinaQuantumWorld.pdf 22-Dec-2014 12:03 584K
246-ALeverFunctiontoaNewCodomainwithAdequateInd..> 22-Dec-2014 12:03 372K
246-ANewLeverFunctionwithAdequateIndeterminacy.pdf 20-Jan-2023 08:31 333K
247-LeakageresilientAttributebasedEncryptionswi..> 22-Dec-2014 12:03 497K
248-AnotherLookatSecurityTheoremsfor1KeyNestedM..> 22-Dec-2014 12:03 207K
249-HowtoFactorN_1andN_2Whenp_1p_2mod2t.pdf 22-Dec-2014 12:03 218K
250-FullyHomomorphicEncryptionforMathematicians..> 22-Dec-2014 12:03 294K
251-PermutationPolynomialsandTheirDifferentialP..> 22-Dec-2014 12:03 372K
252-OnthePrimitivityofsomeTrinomialsoverFiniteF..> 22-Dec-2014 12:03 135K
253-CacheAuditAToolfortheStaticAnalysisofCacheS..> 22-Dec-2014 12:03 489K
254-TowardsAdoptionofDNSSECAvailabilityandSecur..> 22-Dec-2014 12:03 380K
255-HowtoConstructanIdealCipherfromaSmallSetofP..> 22-Dec-2014 12:03 788K
256-OntheLossinessoftheRabinTrapdoorFunction.pdf 22-Dec-2014 12:03 563K
257-Securetwopartycomputationavisualway.pdf 22-Dec-2014 12:03 3M
258-WitnessEncryptionanditsApplications.pdf 22-Dec-2014 12:02 466K
259-PrivateInteractiveCommunicationAcrossanAdve..> 22-Dec-2014 12:02 451K
260-FromWeaktoStrongZeroKnowledgeandApplication..> 22-Dec-2014 12:02 458K
261-Secureinformationtransmissionbasedonphysica..> 22-Dec-2014 12:02 124K
262-AnefficientFHEbasedonthehardnessofsolvingsy..> 22-Dec-2014 12:02 257K
263-SpeedingupQUAD.pdf 22-Dec-2014 12:02 171K
264-EncryptedSecretSharingandAnalysisbyPlaintex..> 22-Dec-2014 12:02 154K
265-AttributeBasedEncryptionwithFastDecryption.pdf 22-Dec-2014 12:02 328K
266-LPStatesofRC4StreamCipher.pdf 22-Dec-2014 12:02 275K
267-MultiPartyComputationofPolynomialsandBranch..> 22-Dec-2014 12:02 516K
268-DynamicCubeAttackonGrainv1.pdf 22-Dec-2014 12:02 99K
269-CMCCMisuseResistantAuthenticatedEncryptionw..> 22-Dec-2014 12:02 437K
270-PseudorandomGeneratorsfromRegularOnewayFunc..> 22-Dec-2014 12:02 438K
271-TheLegalClassificationofIdentityBasedSignat..> 22-Dec-2014 12:02 191K
272-CryptographyChallengesforComputationalPriva..> 22-Dec-2014 12:02 108K
273-ComputingtheRankofIncidenceMatrixandtheAlge..> 22-Dec-2014 12:02 349K
274-Atimeseriesapproachforprofilingattack.pdf 22-Dec-2014 12:02 607K
275-ThePotentialofanIndividualizedSetoftrustedC..> 22-Dec-2014 12:02 418K
276-TowardsaPracticalCryptographicVotingSchemeB..> 22-Dec-2014 12:02 411K
277-ESPOONEnforcingEncryptedSecurityPoliciesinO..> 22-Dec-2014 12:02 434K
278-AFrequencyLeakageModelanditsapplicationtoCP..> 22-Dec-2014 12:02 682K
279-PinocchioNearlyPracticalVerifiableComputati..> 22-Dec-2014 12:02 454K
280-PathORAMAnExtremelySimpleObliviousRAMProtoc..> 22-Dec-2014 12:02 610K
281-AdaptingLyubashevskysSignatureSchemestotheR..> 22-Dec-2014 12:01 407K
282-ThreeSnakesinOneHoleTheFirstSystematicHardw..> 22-Dec-2014 12:01 680K
283-FunctionPrivateIdentityBasedEncryptionHidin..> 22-Dec-2014 12:01 403K
284-ASecurePaperBasedElectronicVotingWithNoEncr..> 22-Dec-2014 12:01 257K
285-ANovelProofonWeilPairing.pdf 22-Dec-2014 12:01 212K
286-SalvagingIndifferentiabilityinaMultistageSe..> 22-Dec-2014 12:01 942K
287-ThefailureofMcEliecePKCbasedonReedMullercod..> 22-Dec-2014 12:01 298K
288-KeyClassificationAttackonBlockCiphers.pdf 22-Dec-2014 12:01 354K
289-SecureSecondPriceAuctionswithaRationalAucti..> 22-Dec-2014 12:01 308K
290-MassiveGroupMessageAuthenticationwithRevoca..> 22-Dec-2014 12:01 264K
291-SecurityrankingamongassumptionswithintheUbe..> 22-Dec-2014 12:01 261K
292-ALeakageResilientMAC.pdf 22-Dec-2014 12:01 379K
293-AToolkitforRingLWECryptography.pdf 22-Dec-2014 12:01 588K
294-SynchronousSamplingandClockRecoveryofIntern..> 22-Dec-2014 12:01 5M
295-SurveyandBenchmarkofLightweightBlockCiphers..> 22-Dec-2014 12:01 319K
296-UniversallyComposableSymbolicAnalysisforTwo..> 22-Dec-2014 12:01 990K
297-ImprovementandEfficientImplementationofaLat..> 22-Dec-2014 12:01 424K
298-DoesMyDeviceLeakInformationAnaprioriStatist..> 22-Dec-2014 12:01 652K
299-Computingclasspolynomialsforabeliansurfaces..> 22-Dec-2014 12:01 242K
300-AProfitableSubPrimeLoanObtainingtheAdvantag..> 22-Dec-2014 12:01 525K
301-ImpossibleDifferentialLinearCryptanalysisof..> 22-Dec-2014 12:01 256K
302-CryptanalysisofGrigorievShpilrainPhysicalAs..> 22-Dec-2014 12:00 52K
303-Theoryofmaskingwithcodewordsinhardwarelowwe..> 22-Dec-2014 12:00 691K
304-SecurePRNGSeedingonCommercialOfftheShelfMic..> 22-Dec-2014 12:00 473K
305-TowardsFreshReKeyingwithLeakageResilientPRF..> 22-Dec-2014 12:00 2M
306-Solvinga6120bitDLPonaDesktopComputer.pdf 22-Dec-2014 12:00 326K
307-MaliciouslyCircuitPrivateFHE.pdf 22-Dec-2014 12:00 451K
308-LatticeBasedGroupSignatureswithLogarithmicS..> 22-Dec-2014 12:00 553K
309-BypassingPasskeyAuthenticationinBluetoothLo..> 22-Dec-2014 12:00 35K
310-MinimaLTMinimallatencyNetworkingThroughBett..> 22-Dec-2014 12:00 606K
311-FourdimensionalGLVviatheWeilrestriction.pdf 22-Dec-2014 12:00 488K
312-FamiliesoffastellipticcurvesfromQcurves.pdf 22-Dec-2014 12:00 166K
313-PairingInversionviaNondegenerateAuxiliaryPa..> 22-Dec-2014 12:00 201K
314-KeyedSideChannelBasedHashingforIPProtection..> 22-Dec-2014 12:00 326K
315-HybridApproachfortheFastVerificationforImpr..> 22-Dec-2014 12:00 215K
316-Certifiedcomputeraidedcryptographyefficient..> 22-Dec-2014 12:00 472K
317-AnonPassPracticalAnonymousSubscriptions.pdf 22-Dec-2014 12:00 487K
318-FullyAnonymousFunctionalProxyReEncryption.pdf 22-Dec-2014 12:00 751K
319-Ontheuseofcontinuedfractionsforstreamcipher..> 22-Dec-2014 12:00 197K
320-InstantaneousFrequencyAnalysis.pdf 22-Dec-2014 12:00 839K
321-GenericConstructionsofSecureChannelFreeSear..> 22-Dec-2014 12:00 216K
322-BLAKE2simplersmallerfastasMD5.pdf 22-Dec-2014 12:00 291K
323-EncryptionSchemeswithPostChallengeAuxiliary..> 22-Dec-2014 12:00 241K
323-EncryptionSchemeswithPostChallengeAuxiliary..> 22-Dec-2014 12:00 851K
324-SieveintheMiddleImprovedMITMAttacksFullVers..> 22-Dec-2014 11:59 678K
325-ElligatorEllipticcurvepointsindistinguishab..> 22-Dec-2014 11:59 485K
326-KeyVersatileSignaturesandApplicationsRKAKDM..> 22-Dec-2014 11:59 469K
327-ALightweightHashFunctionResistingBirthdayAt..> 22-Dec-2014 11:59 403K
328-TowardsFindingOptimalDifferentialCharacteri..> 22-Dec-2014 11:59 235K
329-ProtocolVariantsandElectronicIdentification..> 22-Dec-2014 11:59 284K
330-TrapdoorPrivacyinAsymmetricSearchableEncryp..> 22-Dec-2014 11:59 448K
331-NewConstructionsandApplicationsofTrapdoorDD..> 22-Dec-2014 11:59 567K
332-Amethodforobtaininglowerboundsonthehigheror..> 22-Dec-2014 11:59 65K
333-Doubleauthenticationpreventingsignatures.pdf 22-Dec-2014 11:59 502K
334-ProtectingPUFErrorCorrectionbyCodewordMaski..> 22-Dec-2014 11:59 597K
335-ParallelandDynamicSearchableSymmetricEncryp..> 22-Dec-2014 11:59 315K
336-ANovelTechniqueinLinearCryptanalysis.pdf 20-Jan-2023 14:20 207
337-AttributeBasedEncryptionforCircuits.pdf 22-Dec-2014 11:59 478K
338-SecurityAnalysisofPseudoRandomNumberGenerat..> 22-Dec-2014 11:59 755K
339-OntheSecurityoftheTLSProtocolASystematicAna..> 22-Dec-2014 11:59 287K
340-HomomorphicEncryptionfromLearningwithErrors..> 22-Dec-2014 11:59 412K
341-TrapdoorSmoothProjectiveHashFunctions.pdf 22-Dec-2014 11:59 876K
342-AttributeBasedEncryptionforaSubclassofCircu..> 22-Dec-2014 11:59 388K
343-Quantumonetimeprograms.pdf 22-Dec-2014 11:59 369K
344-Limitsofprovablesecurityforhomomorphicencry..> 22-Dec-2014 11:59 313K
345-AnalysisandImprovementoftheGenericHigherOrd..> 22-Dec-2014 11:59 429K
346-UsingBleichenbacher39sSolutiontotheHiddenNu..> 20-Jan-2023 08:31 437K
346-UsingBleichenbachersSolutiontotheHiddenNumb..> 22-Dec-2014 11:59 437K
347-STESAStreamCipherBasedLowCostSchemeforSecur..> 22-Dec-2014 11:59 774K
348-Multifileproofsofretrievabilityforcloudstor..> 22-Dec-2014 11:58 288K
349-ADynamicTradeoffBetweenActiveandPassiveCorr..> 22-Dec-2014 11:58 221K
350-IdealCipherIrreducibilityforBlockcipherBase..> 22-Dec-2014 11:58 495K
351-TimeOptimalInteractiveProofsforCircuitEvalu..> 22-Dec-2014 11:58 1M
352-ConstrainedPseudorandomFunctionsandTheirApp..> 22-Dec-2014 11:58 316K
353-ProfilingDPAEfficacyandefficiencytradeoffs.pdf 22-Dec-2014 11:58 538K
354-ProgrammableHashFunctionsintheMultilinearSe..> 22-Dec-2014 11:58 556K
355-NewAttacksagainstTransformationBasedPrivacy..> 22-Dec-2014 11:58 261K
356-VerifyingComputationswithStateExtendedVersi..> 22-Dec-2014 11:58 542K
357-TheLOCALattackCryptanalysisoftheauthenticat..> 22-Dec-2014 11:58 400K
358-Countercryptanalysis.pdf 22-Dec-2014 11:58 634K
359-Aheuristicforfindingcompatibledifferentialp..> 22-Dec-2014 11:58 364K
360-Achievingthelimitsofthenoisystoragemodelusi..> 22-Dec-2014 11:58 345K
361-LinearlyHomomorphicStructurePreservingSigna..> 22-Dec-2014 11:58 271K
362-AFastImplementationoftheOptimalAtePairingov..> 22-Dec-2014 11:58 70K
363-ANewClassofPublicKeyCryptosystemsConstructe..> 22-Dec-2014 11:58 256K
364-OntheAchievabilityofSimulationBasedSecurity..> 22-Dec-2014 11:58 424K
365-EfficienteCKsecureAuthenticatedKeyExchangeP..> 22-Dec-2014 11:58 571K
366-StructuralEvaluationofAESandChosenKeyDistin..> 22-Dec-2014 11:58 868K
367-OntheSecurityofTLSDHandTLSRSAintheStandardM..> 22-Dec-2014 11:58 460K
368-SecurityinO2nfortheXorofTwoRandomPermutatio..> 22-Dec-2014 11:58 393K
369-BlockCiphersthatareEasiertoMaskHowFarCanweG..> 22-Dec-2014 11:58 1M
370-LeakageResilientSymmetricCryptographyUnderE..> 22-Dec-2014 11:57 1M
371-DomainPolymorphicProgrammingofPrivacyPreser..> 22-Dec-2014 11:57 378K
372-PracticalBootstrappinginQuasilinearTime.pdf 22-Dec-2014 11:57 368K
373-InjectiveEncodingtoEllipticCurves.pdf 22-Dec-2014 11:57 417K
374-ASecureandefficientellipticcurvebasedauthen..> 22-Dec-2014 11:57 278K
375-NaClon8BitAVRMicrocontrollers.pdf 22-Dec-2014 11:57 377K
376-AnAccurateProbabilisticReliabilityModelforS..> 22-Dec-2014 11:57 602K
377-AnAlgebraicFrameworkforDiffieHellmanAssumpt..> 22-Dec-2014 11:57 659K
378-Anoteonquantumrelatedkeyattacks.pdf 22-Dec-2014 11:57 112K
379-DelegatablePseudorandomFunctionsandApplicat..> 22-Dec-2014 11:57 581K
380-CommentsonThreeMultiServerAuthenticationPro..> 22-Dec-2014 11:57 502K
381-BreakingtheEvenMansourHashFunctionCollision..> 20-Jan-2023 14:19 207
382-ToHashorNottoHashAgainIndifferentiabilityRe..> 22-Dec-2014 11:57 663K
383-LatticeSignaturesandBimodalGaussians.pdf 22-Dec-2014 11:57 747K
384-SequentialAggregateSignaturesMadeShorter.pdf 22-Dec-2014 11:57 266K
385-CryptanalysisofultralightweightRFIDauthenti..> 20-Jan-2023 14:19 207
386-SideChannelAttacksagainstPairingoverThetaFu..> 22-Dec-2014 11:57 428K
387-CryptographicallyProtectedPrefixesforLocati..> 22-Dec-2014 11:57 352K
388-ParallelGaussSieveAlgorithmSolvingtheSVPint..> 22-Dec-2014 11:57 317K
389-ACapacityAchievingSimpleDecoderforBiasBased..> 22-Dec-2014 11:57 11M
390-ChosenCiphertextSecureKeyedHomomorphicPubli..> 22-Dec-2014 11:56 375K
391-KeyRecoveryAttackson3roundEvenMansour8stepL..> 22-Dec-2014 11:56 424K
392-EfficientSimultaneousPrivatelyandPubliclyVe..> 22-Dec-2014 11:56 713K
393-StronglySecureOneroundGroupAuthenticatedKey..> 22-Dec-2014 11:56 578K
394-APublicKeyCryptoschemeUsingBitpairShadows.pdf 22-Dec-2014 11:56 395K
396-OnthePracticalSecurityofaLeakageResilientMa..> 22-Dec-2014 11:56 354K
397-PracticalSecureLoggingSeekableSequentialKey..> 22-Dec-2014 11:56 418K
398-ASICSAuthenticatedKeyExchangeSecurityIncorp..> 22-Dec-2014 11:56 534K
399-AttackonLiaoandHsiao39sSecureECCbasedRFIDAu..> 20-Jan-2023 08:31 78K
399-AttackonLiaoandHsiaosSecureECCbasedRFIDAuth..> 22-Dec-2014 11:56 78K
400-Aquasipolynomialalgorithmfordiscretelogarit..> 22-Dec-2014 11:56 461K
401-FunctionalSignaturesandPseudorandomFunction..> 22-Dec-2014 11:56 474K
402-EfficientTwoPassAnonymousIdentityAuthentica..> 22-Dec-2014 11:56 382K
403-FunctionPrivateSubspaceMembershipEncryption..> 22-Dec-2014 11:56 159K
404-TheSIMONandSPECKFamiliesofLightweightBlockC..> 22-Dec-2014 11:56 279K
405-NewQuadraticBentFunctionsinPolynomialFormsw..> 22-Dec-2014 11:56 121K
406-AttributeBasedServerAidedVerificationSignat..> 20-Jan-2023 14:19 207
407-AutomatedSecurityProofsforAlmostUniversalHa..> 22-Dec-2014 11:56 423K
408-DelegatableFunctionalSignatures.pdf 22-Dec-2014 11:56 903K
409-OrderPreservingEncryptionSecureBeyondOneWay..> 22-Dec-2014 11:56 547K
410-PlugandPlayIPSecurityAnonymityInfrastructur..> 22-Dec-2014 11:56 535K
411-SecurityAnalysisofLightweightAuthentication..> 22-Dec-2014 11:56 88K
412-ModuarFormAprroachtoSolvingLatticeProblems.pdf 22-Dec-2014 11:56 493K
413-PolicyBasedSignatures.pdf 22-Dec-2014 11:55 566K
414-Anovelcertificatelessdeniableauthentication..> 22-Dec-2014 11:55 172K
415-SL2homomorphichashfunctionsWorstcasetoavera..> 20-Jan-2023 08:31 421K
415-ShortcollisionsearchinarbitrarySL2homomorph..> 22-Dec-2014 11:55 414K
416-ComputationalFuzzyExtractors.pdf 22-Dec-2014 11:55 366K
417-TheImprovedCubeAttackonGrainv1.pdf 22-Dec-2014 11:55 178K
418-OnTightSecurityProofsforSchnorrSignatures.pdf 22-Dec-2014 11:55 362K
419-HowtoShareaLatticeTrapdoorThresholdProtocol..> 22-Dec-2014 11:55 442K
420-TheHoleyGrailAspecialscorefunctionfornonbin..> 22-Dec-2014 11:55 778K
421-LightweightprimitivefeatherweightsecurityAc..> 22-Dec-2014 11:55 333K
422-PrivateDatabaseQueriesUsingSomewhatHomomorp..> 22-Dec-2014 11:55 281K
423-LocallyComputableUOWHFwithLinearShrinkage.pdf 22-Dec-2014 11:55 467K
424-InstantiatingRandomOraclesviaUCEs.pdf 22-Dec-2014 11:55 689K
425-BreakWEPFasterwithStatisticalAnalysis.pdf 22-Dec-2014 11:55 325K
426-EfficientGarblingfromaFixedKeyBlockcipher.pdf 22-Dec-2014 11:55 462K
427-ToeplitzmatrixvectorproductbasedGF2nshifted..> 22-Dec-2014 11:55 289K
428-Faster128EEA3and128EIA3Software.pdf 22-Dec-2014 11:55 286K
429-DupLESSServerAidedEncryptionforDeduplicated..> 22-Dec-2014 11:55 243K
430-SecurityoftheMistyStructureBeyondtheBirthda..> 22-Dec-2014 11:55 378K
431-PracticalTimeAttacksAgainstReducedVariantso..> 22-Dec-2014 11:55 272K
432-HowtoSignPaperContractsConjecturesEvidenceR..> 22-Dec-2014 11:55 233K
432-HowtoSignPaperContractsConjecturesampEviden..> 20-Jan-2023 08:31 233K
433-OnSymmetricEncryptionwithDistinguishableDec..> 22-Dec-2014 11:55 457K
434-FullDomainHashfromLeveledMultilinearMapsand..> 22-Dec-2014 11:55 311K
435-EfficientCryptosystemsFrom2kthPowerResidueS..> 22-Dec-2014 11:55 301K
436-FastExhaustiveSearchforQuadraticSystemsinma..> 22-Dec-2014 11:55 378K
437-AUniformMinMaxTheoremwithApplicationsinCryp..> 22-Dec-2014 11:55 279K
438-ClusteringAlgorithmsforNonProfiledSingleExe..> 22-Dec-2014 11:54 585K
439-PushingtheLimitsofSHA3HardwareImplementatio..> 22-Dec-2014 11:54 451K
440-RevisitingConditionalRenyiEntropiesandGener..> 22-Dec-2014 11:54 310K
440-RevisitingConditionalRnyiEntropiesandGenera..> 20-Jan-2023 08:31 310K
441-OnStochasticSecurityofJavaCryptoandNISTDRBG..> 20-Jan-2023 14:19 207
442-OnFairExchangeFairCoinsandFairSampling.pdf 22-Dec-2014 11:54 663K
443-OptimallyAnonymousandTransferableConditiona..> 22-Dec-2014 11:54 450K
444-Sequentialmessageauthenticationcodewithoutr..> 22-Dec-2014 11:54 204K
445-ImplementingLightweightBlockCiphersonx86Arc..> 22-Dec-2014 11:54 364K
446-WeaknessofF_36509forDiscreteLogarithmCrypto..> 22-Dec-2014 11:54 270K
447-DynamicRuntimeMethodstoEnhancePrivateKeyBli..> 22-Dec-2014 11:54 189K
448-FlushReloadaHighResolutionLowNoiseL3CacheSi..> 22-Dec-2014 11:54 213K
449-ANoteOntheStorageRequirementforAKSPrimality..> 22-Dec-2014 11:54 52K
450-RevisitingtheBGEAttackonaWhiteBoxAESImpleme..> 22-Dec-2014 11:54 349K
451-CandidateIndistinguishabilityObfuscationand..> 22-Dec-2014 11:54 633K
452-SecureChannelCodingSchemesbasedonPolarCodes..> 22-Dec-2014 11:54 796K
453-SecretDisclosureattackonKazahayaaYokingProo..> 22-Dec-2014 11:54 287K
454-HowtoUseIndistinguishabilityObfuscationDeni..> 22-Dec-2014 11:54 356K
455-AnotherNailintheCoffinofWhiteBoxAESImplemen..> 22-Dec-2014 11:54 347K
456-OntheSecurityofGroupbasedProxyReencryptionS..> 22-Dec-2014 11:54 243K
457-DeductionSoundnessProveOneGetFiveforFree.pdf 22-Dec-2014 11:54 622K
458-ExponentiatinginPairingGroups.pdf 22-Dec-2014 11:54 580K
459-ResetIndifferentiabilityanditsConsequences.pdf 22-Dec-2014 11:54 428K
460-SolvingTerminalRevocationinEACbyAugmentingT..> 22-Dec-2014 11:54 237K
461-HPAZaHighthroughputPipelineArchitectureofZU..> 22-Dec-2014 11:54 259K
462-VABKSVerifiableAttributebasedKeywordSearcho..> 22-Dec-2014 11:54 370K
463-SecretKeyCryptosystembasedonPolarCodesoverB..> 22-Dec-2014 11:53 505K
464-TowardsAPracticalJCJCivitasImplementation.pdf 22-Dec-2014 11:53 309K
465-PracticalProvablySecureDistanceBounding.pdf 22-Dec-2014 11:53 205K
465-PracticalampProvablySecureDistanceBounding.pdf 20-Jan-2023 08:31 205K
466-Efficientcomputationofadditionsubtractionch..> 22-Dec-2014 11:53 236K
467-AnalysisofBLAKE2.pdf 22-Dec-2014 11:53 397K
468-HowToConstructExtractableOneWayFunctionsAga..> 22-Dec-2014 11:53 256K
469-VerifiableDelegationofComputationonOutsourc..> 22-Dec-2014 11:53 537K
470-PracticalCryptanalysisofaPublicKeyEncryptio..> 22-Dec-2014 11:53 390K
471-ObfuscatingConjunctions.pdf 22-Dec-2014 11:53 472K
472-Partiallyblindpasswordbasedsignaturesusinge..> 22-Dec-2014 11:53 332K
473-TheNorwegianInternetVotingProtocol.pdf 22-Dec-2014 11:53 478K
474-EavesdroppingorDisruptingaCommunicationOnth..> 22-Dec-2014 11:53 48K
475-AnoteonverifyingtheAPNproperty.pdf 22-Dec-2014 11:53 76K
476-DependenceinIVrelatedbytesofRC4keyenhancesv..> 22-Dec-2014 11:53 495K
477-GoldenSequenceforthePPSSBroadcastEncryption..> 22-Dec-2014 11:53 513K
478-EnablingEndtoEndSecureCommunicationwithAnon..> 22-Dec-2014 11:53 1M
479-SecurityanalysisofQuantumReadoutPUFsintheca..> 22-Dec-2014 11:53 566K
480-EfficientMultipartyProtocolsviaLogDepthThre..> 22-Dec-2014 11:53 723K
481-CryptanalysisoftheHuangLiuYangCryptosystemf..> 22-Dec-2014 11:53 58K
482-BoundsinShallowsandinMiseries.pdf 22-Dec-2014 11:53 414K
483-AVariantofCoppersmith39sAlgorithmwithImprov..> 20-Jan-2023 08:31 416K
483-AVariantofCoppersmithsAlgorithmwithImproved..> 22-Dec-2014 11:53 416K
484-EfficientPublicIntegrityCheckingforCloudDat..> 20-Jan-2023 14:19 207
485-ANewObjectSearchingProtocolforMultitagRFID.pdf 20-Jan-2023 14:19 207
486-HandlingAuthenticationandDetectionProbabili..> 20-Jan-2023 14:19 207
487-ClassificationofElliptichyperellipticCurves..> 22-Dec-2014 11:53 182K
488-AdaptivelySecureBroadcastEncryptionunderSta..> 22-Dec-2014 11:53 271K
489-AnEfficientSchemeforCentralizedGroupKeyMana..> 22-Dec-2014 11:53 223K
490-ForanEPCC1G2RFIDcompliantProtocolCRCwithCon..> 22-Dec-2014 11:53 391K
491-ImprovedOTExtensionforTransferringShortSecr..> 22-Dec-2014 11:52 338K
492-CryptographicallyEnforcedRBAC.pdf 22-Dec-2014 11:52 439K
493-AnewclassofsemibentquadraticBooleanfunction..> 22-Dec-2014 11:52 126K
494-DifferentialFaultAttackagainstGrainfamilywi..> 22-Dec-2014 11:52 408K
495-RevocableIBESystemswithAlmostConstantsizeKe..> 22-Dec-2014 11:52 416K
496-RationalProtocolDesignCryptographyAgainstIn..> 22-Dec-2014 11:52 585K
497-ImprovementofCamenischNevenShelatObliviousT..> 22-Dec-2014 11:52 90K
498-NonMalleableCodesfromTwoSourceExtractors.pdf 22-Dec-2014 11:52 413K
499-LimitsonthePowerofCryptographicCheapTalk.pdf 22-Dec-2014 11:52 395K
500-ObfuscatingBranchingProgramsUsingBlackBoxPs..> 22-Dec-2014 11:52 423K
501-TypeBasedAnalysisofProtectedStorageintheTPM..> 22-Dec-2014 11:52 296K
502-ProvingTLSattackrelatedopenbiasesofRC4.pdf 22-Dec-2014 11:52 711K
503-Onsecretsharingwithnonlinearproductreconstr..> 22-Dec-2014 11:52 345K
504-AComparisonofDoublePointMultiplicationAlgor..> 22-Dec-2014 11:52 442K
505-ImprovementofOneAnonymousIdentityBasedEncry..> 22-Dec-2014 11:52 100K
506-AFormalProofofCountermeasuresAgainstFaultIn..> 22-Dec-2014 11:52 221K
507-SNARKsforCVerifyingProgramExecutionsSuccinc..> 22-Dec-2014 11:52 5M
508-MultiKeySearchableEncryption.pdf 22-Dec-2014 11:52 340K
509-ReplacingaRandomOracleFullDomainHashFromInd..> 22-Dec-2014 11:52 459K
510-DiscreteZigguratATimeMemoryTradeoffforSampl..> 22-Dec-2014 11:52 967K
511-LowDataComplexityBicliqueCryptanalysisofBlo..> 22-Dec-2014 11:52 2M
512-RoundingLLLFindingFasterSmallRootsofUnivari..> 22-Dec-2014 11:51 261K
513-EnforcingLanguageSemanticsUsingProofCarryin..> 22-Dec-2014 11:51 476K
514-LeakageResilientProofsofOwnershipinCloudSto..> 22-Dec-2014 11:51 588K
515-WhenPrivateSetIntersectionMeetsBigDataAnEff..> 22-Dec-2014 11:51 399K
516-AlgebraicMACsandKeyedVerificationAnonymousC..> 22-Dec-2014 11:51 513K
517-ImprovementofOneAdaptiveObliviousTransferSc..> 22-Dec-2014 11:51 125K
518-UniversalLeakyRandomOracleModel.pdf 20-Jan-2023 08:31 157K
519-MontgomeryMultiplicationUsingVectorInstruct..> 22-Dec-2014 11:51 464K
520-LocallyUpdatableandLocallyDecodableCodes.pdf 22-Dec-2014 11:51 577K
521-MultipleLimitedBirthdayDistinguishersandApp..> 22-Dec-2014 11:51 609K
522-TheResistanceofPRESENT80AgainstRelatedKeyDi..> 22-Dec-2014 11:51 3M
523-WhiteBoxSecurityNotionsforSymmetricEncrypti..> 22-Dec-2014 11:51 487K
524-ThresholdSecretImageSharing.pdf 22-Dec-2014 11:51 563K
525-CatenaAMemoryConsumingPasswordScramblingFra..> 22-Dec-2014 11:51 458K
526-DifferentialandLinearCryptanalysisofReduced..> 22-Dec-2014 11:51 1M
527-TheSpammedCodeOffsetMethod.pdf 22-Dec-2014 11:51 316K
528-AnonymousHIBEfromStandardAssumptionsoverTyp..> 22-Dec-2014 11:51 429K
529-HowtoWithstandMobileVirusAttacksRevisited.pdf 22-Dec-2014 11:51 585K
530-TheParallelCutMeetInTheMiddleAttack.pdf 22-Dec-2014 11:51 415K
531-OntheLimitsofProvableAnonymity.pdf 22-Dec-2014 11:51 511K
532-OnaRelationbetweentheAtePairingandtheWeilPa..> 22-Dec-2014 11:51 108K
533-GossipLatinSquareandTheMeetAllGossipersProb..> 22-Dec-2014 11:51 348K
534-EfficientUnobservableAnonymousReportingagai..> 22-Dec-2014 11:50 406K
535-AcceleratingScalarConversionforKoblitzCurve..> 22-Dec-2014 11:50 166K
536-AThreeLevelSieveAlgorithmfortheShortestVect..> 22-Dec-2014 11:50 203K
537-InterFSPFundsTransferProtocol.pdf 22-Dec-2014 11:50 1M
538-PracticalIssueswithTLSClientCertificateAuth..> 22-Dec-2014 11:50 397K
539-ReboundattacksonStribog.pdf 22-Dec-2014 11:50 3M
540-Onthesecurityofapasswordonlyauthenticatedth..> 22-Dec-2014 11:50 81K
541-LatticeBasedFHEasSecureasPKE.pdf 22-Dec-2014 11:50 407K
542-SearchingforNonlinearFeedbackShiftRegisters..> 22-Dec-2014 11:50 136K
543-CryptanalysisoftheSIMONFamilyofBlockCiphers..> 22-Dec-2014 11:50 568K
544-WarrantHidingDelegationbyCertificateProxySi..> 22-Dec-2014 11:50 406K
545-PrivateOverthresholdAggregationProtocolsove..> 22-Dec-2014 11:50 447K
546-TRS80withagrainofsalt.pdf 22-Dec-2014 11:50 200K
547-AutomaticSecurityEvaluationofBlockCipherswi..> 22-Dec-2014 11:50 732K
548-DecompositionformulaoftheJacobiangroupofpla..> 22-Dec-2014 11:50 164K
549-EquationsSystemcomingfromWeildescentandsube..> 22-Dec-2014 11:50 138K
550-MoreEfficientCryptosystemsFromkthPowerResid..> 20-Jan-2023 08:31 556K
551-PuzzleEncryptionAlgorithm.pdf 22-Dec-2014 11:50 1M
552-MoreEfficientObliviousTransferandExtensions..> 22-Dec-2014 11:50 742K
553-MultiValuedByzantineBroadcastthetltnCase.pdf 20-Jan-2023 08:30 371K
553-MultiValuedByzantineBroadcastthetnCase.pdf 22-Dec-2014 11:50 371K
554-FormallyProvedSecurityofAssemblyCodeAgainst..> 22-Dec-2014 11:50 897K
555-KeyExchangewithUnilateralAuthenticationComp..> 22-Dec-2014 11:50 314K
556-AlgebraicAspectsoftheRussianHashStandardGOS..> 22-Dec-2014 11:50 359K
557-BlackBoxObfuscationfordCNFs.pdf 22-Dec-2014 11:49 482K
558-Practicalapproachestovaryingnetworksizeinco..> 22-Dec-2014 11:49 367K
559-AConstructiveApproachtoFunctionalEncryption..> 22-Dec-2014 11:49 367K
559-ADefinitionalFrameworkforFunctionalEncrypti..> 20-Jan-2023 08:30 790K
560-SometimesRecurseShuffleAlmostRandomPermutat..> 22-Dec-2014 11:49 179K
561-PreimageattacksontheroundreducedKeccakwitht..> 22-Dec-2014 11:49 485K
562-Selfpairingsonsupersingularellipticcurveswi..> 22-Dec-2014 11:49 138K
563-VirtualBlackBoxObfuscationforAllCircuitsvia..> 22-Dec-2014 11:49 481K
564-CapacityofNonMalleableCodes.pdf 22-Dec-2014 11:49 416K
565-NonMalleableCodingAgainstBitwiseandSplitSta..> 22-Dec-2014 11:49 445K
566-AttackingPUFBasedPatternMatchingKeyGenerato..> 22-Dec-2014 11:49 633K
567-KDMSecurityintheHybridFramework.pdf 22-Dec-2014 11:49 405K
568-CryptanalysisoftheSpeckFamilyofBlockCiphers..> 22-Dec-2014 11:49 685K
569-MoreEfficientCryptosystemsFromkthPowerResid..> 22-Dec-2014 11:49 571K
570-NewEfficientIdentityBasedEncryptionFromFact..> 22-Dec-2014 11:49 297K
571-EfficientGeneralAdversaryMultiPartyComputat..> 22-Dec-2014 11:49 342K
572-QuadRC4MergingFourRC4Statestowardsa32bitStr..> 22-Dec-2014 11:49 309K
573-ImprovedMeetintheMiddleAttacksonAES192andPR..> 22-Dec-2014 11:49 418K
574-OntheMinimumNumberofMultiplicationsNecessar..> 22-Dec-2014 11:49 465K
575-EquivalencebetweenMACandPRFforBlockcipherba..> 22-Dec-2014 11:49 486K
576-ExtendedCriterionforAbsenceofFixedPoints.pdf 22-Dec-2014 11:49 311K
577-SecureTwoPartyComputationwithReusableBitCom..> 22-Dec-2014 11:49 2M
578-AMethodForGenerationOfHighNonlinearSBoxesBa..> 22-Dec-2014 11:49 164K
579-OnMeasurableSideChannelLeaksinsideASICDesig..> 22-Dec-2014 11:49 2M
580-RandomProjectionsGraphSparsificationandDiff..> 22-Dec-2014 11:48 271K
581-PriWhisperEnablingKeylessSecureAcousticComm..> 22-Dec-2014 11:48 3M
582-TheSpecialNumberFieldSieveinF_pnApplication..> 22-Dec-2014 11:48 809K
583-PolynomialSelectionfortheNumberFieldSievein..> 20-Jan-2023 08:30 256K
583-polynomialselectionforthenumberfieldsievein..> 22-Dec-2014 11:48 256K
584-CryptanalysisofGOSTRHashFunction.pdf 22-Dec-2014 11:48 551K
585-OnAlgebraicImmunityofTraceInverseFunctionso..> 22-Dec-2014 11:48 324K
586-GenericrelatedkeyandinducedchosenIVattacksu..> 22-Dec-2014 11:48 239K
587-ESPOONERBACEnforcingSecurityPoliciesinOutso..> 22-Dec-2014 11:48 649K
588-SPHFFriendlyNonInteractiveCommitments.pdf 22-Dec-2014 11:48 1M
589-SmashingMASH1.pdf 22-Dec-2014 11:48 162K
590-EyeDecryptPrivateInteractionsinPlainSight.pdf 22-Dec-2014 11:48 5M
591-AnalysisoftheRainbowTradeoffAlgorithmUsedin..> 22-Dec-2014 11:48 373K
592-CryptanalysisoftheTooraniFalahatiHillCipher..> 22-Dec-2014 11:48 178K
593-EfficientOneSidedAdaptivelySecureComputatio..> 20-Jan-2023 08:30 489K
593-OneSidedAdaptivelySecureTwoPartyComputation..> 22-Dec-2014 11:48 523K
594-ALocalGlobalApproachtoSolvingIdealLatticePr..> 22-Dec-2014 11:48 419K
595-Enhancedcertificatetransparencyandendtoende..> 22-Dec-2014 11:48 233K
596-SolvingtheEllipticCurveDiscreteLogarithmPro..> 22-Dec-2014 11:48 316K
597-EfficientPairingsComputationonJacobiQuartic..> 22-Dec-2014 11:48 470K
598-FumingAcidandCryptanalysisHandyToolsforOver..> 22-Dec-2014 11:47 1M
599-FactoringRSAkeysfromcertifiedsmartcardsCopp..> 22-Dec-2014 11:47 360K
600-ImprovedCryptanalysisofReducedRIPEMD160.pdf 22-Dec-2014 11:47 451K
601-TworoundsecureMPCfromIndistinguishabilityOb..> 22-Dec-2014 11:47 453K
602-OntheEfficacyofSolvingLWEbyReductiontoUniqu..> 22-Dec-2014 11:47 455K
603-InvarianceBasedConcurrentErrorDetectionforA..> 22-Dec-2014 11:47 483K
604-ModellingTimeorAStepTowardsReductionbasedSe..> 22-Dec-2014 11:47 325K
605-Presentationofanewclassofpublickeycryptosys..> 22-Dec-2014 11:47 112K
606-Revocablequantumtimedreleaseencryption.pdf 22-Dec-2014 11:47 924K
607-CryptanalysisofFullRIPEMD128.pdf 22-Dec-2014 11:47 757K
608-TowardsOptimalLeakageExploitationRateinTemp..> 22-Dec-2014 11:47 149K
609-UltraLowPowerimplementationofECContheARMCor..> 22-Dec-2014 11:47 180K
610-KeyrecoveryAttacksonVariousROPUFConstructio..> 22-Dec-2014 11:47 658K
611-LimitedbirthdayDistinguishersforHashFunctio..> 22-Dec-2014 11:47 481K
612-SublinearBlindRingSignatureswithoutRandomOr..> 22-Dec-2014 11:47 296K
613-RecomputingwithPermutedOperandsAConcurrentE..> 22-Dec-2014 11:47 1M
614-Isextractingdatathesameaspossessingdata.pdf 22-Dec-2014 11:47 294K
615-PrivacyandVerifiabilityinVotingSystemsMetho..> 22-Dec-2014 11:47 563K
616-AcceleratingFullyHomomorphicEncryptionovert..> 22-Dec-2014 11:47 596K
617-Someresultsconcerningglobalavalanchecharact..> 22-Dec-2014 11:47 313K
618-SecurityAmplificationagainstMeetintheMiddle..> 22-Dec-2014 11:47 228K
619-FaultInjectionModelingAttackson65nmArbitera..> 22-Dec-2014 11:47 391K
620-DoIknowyouEfficientandPrivacyPreservingComm..> 22-Dec-2014 11:47 1M
621-MultiLHLprotocol.pdf 22-Dec-2014 11:46 363K
622-DecentralizedAnonymousCredentials.pdf 22-Dec-2014 11:46 595K
623-OffPathHackingTheIllusionofChallengeRespons..> 22-Dec-2014 11:46 561K
624-NewIntegerFFTMultiplicationArchitecturesand..> 20-Jan-2023 14:19 207
625-PillarBoxCombatingnextgenerationmalwarewith..> 22-Dec-2014 11:46 1M
626-ImprovedLinearAttacksontheChineseBlockCiphe..> 22-Dec-2014 11:46 229K
627-FlexibleandPubliclyVerifiableAggregationQue..> 22-Dec-2014 11:46 416K
628-ParallelizableRate1AuthenticatedEncryptionf..> 22-Dec-2014 11:46 939K
629-SecureKeyManagementintheCloud.pdf 22-Dec-2014 11:46 990K
630-EstimatingKeySizesForHighDimensionalLattice..> 22-Dec-2014 11:46 214K
631-ProtectingObfuscationAgainstAlgebraicAttack..> 22-Dec-2014 11:46 510K
632-CombinedModelingandSideChannelAttacksonStro..> 22-Dec-2014 11:46 183K
633-FourMeasuresofNonlinearity.pdf 22-Dec-2014 11:46 508K
634-ImprovedLinearSievingTechniqueswithApplicat..> 22-Dec-2014 11:46 388K
635-Universalsecurityfrombitsandmipstopoolslake..> 22-Dec-2014 11:46 199K
636-SCAREofSecretCipherswithSPNStructures.pdf 22-Dec-2014 11:46 660K
637-DetectionofAlgebraicManipulationinthePresen..> 22-Dec-2014 11:46 500K
638-DFABasedFunctionalEncryptionAdaptiveSecurit..> 22-Dec-2014 11:46 462K
639-Differentially4UniformBijectionsbyPermuting..> 22-Dec-2014 11:46 279K
640-CommunicationEfficientMPCforGeneralAdversar..> 22-Dec-2014 11:46 360K
641-IndistinguishabilityObfuscationvsAuxiliaryI..> 22-Dec-2014 11:46 409K
642-MultipartyKeyExchangeEfficientTraitorTracin..> 22-Dec-2014 11:46 658K
643-ThereisnoIndistinguishabilityObfuscationinP..> 22-Dec-2014 11:46 101K
644-EllipticandHyperellipticCurvesaPracticalSec..> 22-Dec-2014 11:45 495K
645-FlexDPDPFlexListbasedOptimizedDynamicProvab..> 22-Dec-2014 11:45 3M
646-DirectChosenCiphertextSecureAttributeBasedK..> 22-Dec-2014 11:45 381K
647-Anoteonhighsecuritygeneralpurposeellipticcu..> 22-Dec-2014 11:45 371K
648-IntegralDistinguishersforReducedroundStribo..> 22-Dec-2014 11:45 4M
649-SecurityAnalysisofPasswordAuthenticatedKeyR..> 22-Dec-2014 11:45 229K
650-OnExtractabilityakaDifferingInputsObfuscati..> 22-Dec-2014 11:45 520K
651-ACloserLookatMultipleForkingLeveragingIndep..> 22-Dec-2014 11:45 479K
652-EfficientModularArithmeticforSIMDDevices.pdf 22-Dec-2014 11:45 261K
653-RKAKDMsecureencryptionfrompublickeyencrypti..> 22-Dec-2014 11:45 443K
654-LeakageResilientChosenCiphertextSecurePubli..> 22-Dec-2014 11:45 600K
655-PrivacyPreservingMultiPartyReconciliationSe..> 22-Dec-2014 11:45 506K
656-BiasbasedmodelingandentropyanalysisofPUFs.pdf 22-Dec-2014 11:45 3M
657-NewTrapdoorProjectionMapsforCompositeOrderB..> 22-Dec-2014 11:45 510K
658-Parallelauthenticatedencryptionwiththeduple..> 22-Dec-2014 11:45 341K
659-Aprovablesecureanonymousproxysignatureschem..> 22-Dec-2014 11:45 467K
660-DiscreteLogarithmsandMordellWeilGroups.pdf 22-Dec-2014 11:45 288K
661-Privateaggregationonuntrustedserverswithcus..> 22-Dec-2014 11:45 367K
662-FineTuningGrothSahaiProofs.pdf 22-Dec-2014 11:44 389K
663-LinearCryptanalysisofRoundReducedSIMON.pdf 22-Dec-2014 11:44 582K
664-TUCTimesensitiveandModularAnalysisofAnonymo..> 22-Dec-2014 11:44 781K
665-TheImpossibilityofObfuscationwithaUniversal..> 22-Dec-2014 11:44 270K
666-AnOfflineDictionaryAttackagainstaThreeParty..> 22-Dec-2014 11:44 109K
667-ATPMDiffieHellmanOracle.pdf 22-Dec-2014 11:44 196K
668-ObfuscationforEvasiveFunctions.pdf 22-Dec-2014 11:44 421K
669-AttributeBasedEncryptionforArithmeticCircui..> 22-Dec-2014 11:44 477K
670-SwitchingLemmaforBilinearTestsandConstantsi..> 22-Dec-2014 11:44 545K
671-RobustPseudorandomGenerators.pdf 22-Dec-2014 11:44 441K
672-Easyscalardecompositionsforefficientscalarm..> 22-Dec-2014 11:44 336K
673-TrapstotheBGJTAlgorithmforDiscreteLogarithm..> 22-Dec-2014 11:44 245K
674-CryptanalysisofIteratedEvenMansourSchemeswi..> 22-Dec-2014 11:44 387K
675-APracticalRelatedKeyBoomerangAttackfortheFu..> 22-Dec-2014 11:44 216K
676-AutomaticSecurityEvaluationandRelatedkeyDif..> 22-Dec-2014 11:44 787K
677-BoundedTamperResilienceHowtogobeyondtheAlge..> 22-Dec-2014 11:44 494K
678-Universallycomposableprivacypreservingfinit..> 22-Dec-2014 11:44 375K
679-Formalverificationofasoftwarecountermeasure..> 22-Dec-2014 11:44 391K
680-ABlackBoxConstructionofaCCA2EncryptionSchem..> 22-Dec-2014 11:44 362K
681-PublicKeyEncryptionwithWeakRandomnessSecuri..> 22-Dec-2014 11:44 335K
682-SecretKeyCryptosystembasedonNonSystematicPo..> 22-Dec-2014 11:44 706K
683-SeparationsinCircularSecurityforArbitraryLe..> 22-Dec-2014 11:44 265K
684-FullyBideniablePublicKeyEncryption.pdf 22-Dec-2014 11:44 306K
685-SolvingshortestandclosestvectorproblemsThed..> 22-Dec-2014 11:44 1M
686-Newabstractionsinappliedpicalculusandautoma..> 22-Dec-2014 11:43 334K
687-HowtoCompressReusableGarbledCircuits.pdf 22-Dec-2014 11:43 465K
688-UnbalancingPairingBasedKeyExchangeProtocols..> 22-Dec-2014 11:43 96K
689-DifferingInputsObfuscationandApplications.pdf 22-Dec-2014 11:43 491K
690-ObfuscationINDCPASecurityCircularSecurity.pdf 22-Dec-2014 11:43 343K
690-ObfuscationgtINDCPASecuritygtCircularSecuri..> 20-Jan-2023 08:30 343K
691-NonMalleabilityfromMalleabilitySimulationSo..> 22-Dec-2014 11:43 600K
692-FasterCompactDiffieHellmanEndomorphismsonth..> 22-Dec-2014 11:43 311K
693-SecureKeyExchangeandSessionsWithoutCredenti..> 22-Dec-2014 11:43 462K
694-WriteOnlyObliviousRAMbasedPrivacyPreservedA..> 22-Dec-2014 11:43 1023K
695-AEGISAFastAuthenticatedEncryptionAlgorithm.pdf 22-Dec-2014 11:43 135K
696-ExaminationofaNewDefenseMechanismHoneywords..> 22-Dec-2014 11:43 65K
697-AMoreEfficientAESThresholdImplementation.pdf 22-Dec-2014 11:43 8M
698-Cryptanalysisandimprovementofadynamicandsec..> 22-Dec-2014 11:43 79K
699-BootstrappingObfuscatorsviaFastPseudorandom..> 22-Dec-2014 11:43 331K
700-HigherOrderMaskingofLookupTables.pdf 22-Dec-2014 11:43 413K
701-MoreontheImpossibilityofVirtualBlackBoxObfu..> 22-Dec-2014 11:43 265K
702-EfficientNonMalleableCodesandKeyDerivationf..> 22-Dec-2014 11:43 463K
703-LimitsofExtractabilityAssumptionswithDistri..> 22-Dec-2014 11:43 468K
704-AdaptiveWitnessEncryptionandAsymmetricPassw..> 22-Dec-2014 11:43 483K
705-SymmetricDigitSetsforEllipticCurveScalarMul..> 22-Dec-2014 11:43 382K
706-HowtoCertifytheLeakageofaChip.pdf 22-Dec-2014 11:42 759K
707-AreductionofSemigroupDLPtoclassicDLP.pdf 20-Jan-2023 08:30 278K
707-AreductionofsemigroupDLPtoclassicDLP.pdf 22-Dec-2014 11:42 255K
708-KeyDerivationWithoutEntropyWaste.pdf 22-Dec-2014 11:42 494K
709-EfficientStatisticalZeroKnowledgeAuthentica..> 22-Dec-2014 11:42 792K
709-EfficientStatisticalZeroKnowledgeAuthentica..> 20-Jan-2023 08:30 812K
710-AnApproachtoReduceStorageforHomomorphicComp..> 22-Dec-2014 11:42 442K
711-AmbiguousOneMoveNominativeSignatureWithoutR..> 22-Dec-2014 11:42 494K
712-PUFBasedRFIDAuthenticationSecureandPrivateu..> 22-Dec-2014 11:42 151K
713-CryptanalysisofZorro.pdf 22-Dec-2014 11:42 419K
714-Methodtosecuredatainthecloudwhilepreserving..> 22-Dec-2014 11:42 262K
715-PracticalForwardSecureRangeandSortQuerieswi..> 22-Dec-2014 11:42 312K
716-ASecureObfuscatorforEncryptedBlindSignature..> 22-Dec-2014 11:42 157K
717-NICVNormalizedInterClassVarianceforDetectio..> 22-Dec-2014 11:42 645K
718-NTRUKEALatticebasedPublicKeyExchangeProtoco..> 22-Dec-2014 11:42 161K
719-ConstructingConfidentialChannelsfromAuthent..> 22-Dec-2014 11:42 502K
720-OutsourcedSymmetricPrivateInformationRetrie..> 22-Dec-2014 11:42 573K
721-DeepAttacksofaCertificatelessSignatureSchem..> 22-Dec-2014 11:42 63K
722-TheRealmofthePairings.pdf 22-Dec-2014 11:42 534K
723-AmplifyingPrivacyinPrivacyAmplification.pdf 22-Dec-2014 11:42 365K
724-VerifiableSetOperationsoverOutsourcedDataba..> 22-Dec-2014 11:42 483K
725-MobileTransactionoverNFCandGSM.pdf 20-Jan-2023 14:19 207
726-HomomorphicAuthenticatedEncryptionSecureAga..> 22-Dec-2014 11:42 344K
727-MultiInputFunctionalEncryption.pdf 22-Dec-2014 11:42 519K
728-ModifiedAlternatingStepGenerators.pdf 22-Dec-2014 11:42 587K
729-FunctionalEncryptionforRandomizedFunctional..> 22-Dec-2014 11:42 408K
730-StampExtendInstantbutUndeniableTimestamping..> 22-Dec-2014 11:42 505K
730-StampampExtendInstantbutUndeniableTimestamp..> 20-Jan-2023 08:30 505K
731-ConstructingDifferentially4uniformPermutati..> 22-Dec-2014 11:41 372K
732-SSSV2SecureSimilaritySearch.pdf 22-Dec-2014 11:41 394K
733-AKeyCompromiseImpersonationattackagainstWan..> 20-Jan-2023 08:30 80K
734-EllipticCurveCryptographyinPractice.pdf 22-Dec-2014 11:41 576K
735-MaskingTablesAnUnderestimatedSecurityRisk.pdf 22-Dec-2014 11:41 348K
736-TRS80WithAKeccakSpongeCake.pdf 22-Dec-2014 11:41 353K
737-WeaknessofF_361429andF_243041forDiscreteLog..> 22-Dec-2014 11:41 218K
738-OntheResilienceandUniquenessofCPAforSecureB..> 22-Dec-2014 11:41 415K
739-NEWDIGITALSIGNATURESCHEMEUSINGMULTIPLEPRIVA..> 22-Dec-2014 11:41 95K
740-AnefficientFHEproposalbasedonthehardnessofs..> 22-Dec-2014 11:41 230K
741-FastSoftwareImplementationofBinaryEllipticC..> 22-Dec-2014 11:41 502K
742-CODINGStreamCipherMethodsbyVaryingComponent..> 22-Dec-2014 11:41 234K
743-PrivacyPreservingUniqueStatisticsinaSmartGr..> 20-Jan-2023 08:30 365K
744-FunctionPrivateFunctionalEncryptionandPrope..> 22-Dec-2014 11:41 654K
744-FunctionalEncryptionandPropertyPreservingEn..> 20-Jan-2023 08:30 559K
745-AsynchronousMPCwithaStrictHonestMajorityUsi..> 22-Dec-2014 11:41 487K
746-AsymptoticallyEfficientLatticeBasedDigitalS..> 22-Dec-2014 11:41 370K
747-AuthenticatedMultipleKeyEstablishmentProtoc..> 22-Dec-2014 11:41 104K
748-PlaintextRecoveryAttacksAgainstWPATKIP.pdf 22-Dec-2014 11:41 2M
749-EfficientCCAsecureThresholdPublicKeyEncrypt..> 22-Dec-2014 11:41 92K
750-FullyDeniableMutualAuthenticationProtocolBa..> 22-Dec-2014 11:41 74K
751-UsingHamiltonianTotemsasPasswords.pdf 22-Dec-2014 11:41 1M
752-OnthePowerofRewindingSimulatorsinFunctional..> 22-Dec-2014 11:41 580K
753-DietaryRecommendationsforLightweightBlockCi..> 22-Dec-2014 11:41 362K
754-ObfuscationbasedNonblackboxSimulationandFou..> 22-Dec-2014 11:41 547K
755-Improvingsecurityandefficiencyformultiautho..> 20-Jan-2023 14:19 207
756-AMeetintheMiddleAttackonRoundReducedmCrypto..> 20-Jan-2023 08:30 3M
756-AMeetinthemiddleAttackonRoundReducedmCrypto..> 22-Dec-2014 11:41 3M
757-PracticalSignaturesfromthePartialFourierRec..> 22-Dec-2014 11:40 410K
758-ARevocableOnlineOfflineCertificatelessSigna..> 22-Dec-2014 11:40 361K
759-VectorizationofChaChaStreamCipher.pdf 22-Dec-2014 11:40 705K
760-OncrossjoiningdeBruijnsequences.pdf 22-Dec-2014 11:40 227K
761-MultiusercollisionsApplicationstoDiscreteLo..> 22-Dec-2014 11:40 395K
762-SelfUpdatableEncryptionTimeConstrainedAcces..> 22-Dec-2014 11:40 505K
763-PredicateandAttributeHidingInnerProductEncr..> 22-Dec-2014 11:40 443K
764-DynamicCountermeasureAgainsttheZeroPowerAna..> 22-Dec-2014 11:40 511K
765-KurosawaDesmedtKeyEncapsulationMechanismRev..> 22-Dec-2014 11:40 1M
766-RankSignanefficientsignaturealgorithmbasedo..> 22-Dec-2014 11:40 392K
767-MisuseResistantParallelAuthenticatedEncrypt..> 22-Dec-2014 11:40 691K
768-VMPCRCryptographicallySecurePseudoRandomNum..> 22-Dec-2014 11:40 260K
769-BroadcastAmplification.pdf 22-Dec-2014 11:40 394K
770-EfficientTemplateAttacks.pdf 22-Dec-2014 11:40 1M
771-TOTaFastMultivariatePublicKeyCryptosystemwi..> 22-Dec-2014 11:40 327K
772-BeyondModesBuildingaSecureRecordProtocolfro..> 22-Dec-2014 11:40 290K
773-CBEAMEfficientAuthenticatedEncryptionfromFe..> 22-Dec-2014 11:40 461K
774-MultiInputFunctionalEncryption.pdf 22-Dec-2014 11:40 527K
775-DifferentialCryptanalysisandLinearDistingui..> 22-Dec-2014 11:39 485K
776-LocationLeakageinDistanceBoundingWhyLocatio..> 22-Dec-2014 11:39 266K
777-ConstructionofMultiplicativeMonotoneSpanPro..> 22-Dec-2014 11:39 301K
778-MultiStageFaultAttacksonBlockCiphers.pdf 22-Dec-2014 11:39 381K
779-DistributedGroupAuthenticationforRFIDSupply..> 22-Dec-2014 11:39 345K
780-ADistinguishattackonRabbitStreamCipherBased..> 22-Dec-2014 11:39 109K
781-IndistinguishabilityObfuscationfromSemantic..> 22-Dec-2014 11:39 843K
782-HowDidDreadPirateRobertsAcquireandProtectHi..> 22-Dec-2014 11:39 1M
783-ECCBasedNonInteractiveDeniableAuthenticatio..> 22-Dec-2014 11:39 396K
784-SecureMultipartyComputationsonBitcoin.pdf 22-Dec-2014 11:39 394K
785-EfficientLeakageResilientSignatureSchemesin..> 22-Dec-2014 11:39 415K
786-TreeBasedSymmetricKeyBroadcastEncryption.pdf 22-Dec-2014 11:39 569K
787-WideweakPrivacyPreservingRFIDMutualAuthenti..> 22-Dec-2014 11:39 383K
788-ImprovementofLinTzengSolutiontoYao39sMillio..> 20-Jan-2023 08:30 87K
788-ImprovementofLinTzengSolutiontoYaosMilliona..> 22-Dec-2014 11:39 87K
789-ProofsofDataPossessionandRetrievabilityBase..> 22-Dec-2014 11:39 440K
790-ParallelizableandAuthenticatedOnlineCiphers..> 22-Dec-2014 11:39 389K
791-APEAuthenticatedPermutationBasedEncryptionf..> 22-Dec-2014 11:39 334K
792-ImprovedAuthenticityBoundofEAXandRefinement..> 22-Dec-2014 11:39 267K
793-Afastintegerbasedbatchfullhomomorphicencryp..> 22-Dec-2014 11:39 240K
794-BehindtheSceneofSideChannelAttacks.pdf 22-Dec-2014 11:39 2M
795-InsecurityofAnAnonymousAuthenticationForPri..> 22-Dec-2014 11:39 84K
796-ProofsofSpace.pdf 22-Dec-2014 11:39 494K
797-TamperResilientCircuitsTheAdversaryattheGat..> 22-Dec-2014 11:39 524K
798-AGenericChosenCiphertextKeyLeakageSecurePub..> 20-Jan-2023 14:19 207
799-NewInsightintotheIsomorphismofPolynomialspr..> 22-Dec-2014 11:38 326K
800-AlgebraicPropertiesoftheCubeAttack.pdf 22-Dec-2014 11:38 601K
801-AuthenticatingComputationonGroupsNewHomomor..> 22-Dec-2014 11:38 467K
802-CryptosystemsResilienttoBothContinualKeyLea..> 22-Dec-2014 11:38 170K
803-FullyAlmostTightlySecureIBEfromStandardAssu..> 22-Dec-2014 11:38 223K
804-GroupSignaturewithrelaxedprivacyandrevocabi..> 22-Dec-2014 11:38 401K
805-ProofsofSpaceWhenSpaceisoftheEssence.pdf 22-Dec-2014 11:38 510K
806-EfficientAnonymousCompactHIBEFromStandardAs..> 22-Dec-2014 11:38 491K
807-DistributedKeyGenerationforSecureEncryptedD..> 22-Dec-2014 11:38 286K
808-SecrecywithoutPerfectRandomnessCryptography..> 22-Dec-2014 11:38 545K
809-RidingtheSaddlePointasymptoticsofthecapacit..> 22-Dec-2014 11:38 243K
810-FormalAnalysisofCRTRSAVigilant39sCountermea..> 20-Jan-2023 08:30 468K
810-FormalAnalysisofCRTRSAVigilantsCountermeasu..> 22-Dec-2014 11:38 468K
811-ConstantRoundBlackBoxConstructionofComposab..> 22-Dec-2014 11:38 630K
812-ANoteonBilinearGroupsofaLargeCompositeOrder..> 22-Dec-2014 11:38 57K
813-MulticiphersuitesecurityoftheSecureShellSSH..> 22-Dec-2014 11:38 516K
814-RDASASymmetricKeySchemeforAuthenticatedQuer..> 22-Dec-2014 11:38 344K
815-Iteratedgroupproductsandleakageresilienceag..> 22-Dec-2014 11:38 180K
816-FastPrimeFieldEllipticCurveCryptographywith..> 22-Dec-2014 11:38 765K
817-InteractiveEncryptionandMessageAuthenticati..> 22-Dec-2014 11:38 500K
818-OntheRelationofRandomGridProbabilisticandDe..> 22-Dec-2014 11:38 437K
819-Safeenclosurestowardscryptographictechnique..> 22-Dec-2014 11:38 337K
820-OntheSecurityofRecentlyProposedRFIDProtocol..> 20-Jan-2023 14:19 207
821-ExactSmoothProjectiveHashFunctionbasedonLWE..> 20-Jan-2023 14:19 207
822-LeakageResilientFullyHomomorphicEncryption.pdf 22-Dec-2014 11:38 437K
823-AnotherLookatXCB.pdf 22-Dec-2014 11:37 718K
824-FairandEfficientSecureMultipartyComputation..> 22-Dec-2014 11:37 475K
825-EPCGen2PseudorandomNumberGeneratorsAnalysis..> 20-Jan-2023 14:19 207
826-Securemultipartydataanalysisenduservalidati..> 22-Dec-2014 11:37 969K
827-LowerBoundsintheHardwareTokenModel.pdf 22-Dec-2014 11:37 655K
828-DecentralizedTraceableAttributeBasedSignatu..> 22-Dec-2014 11:37 351K
829-IsBitcoinaDecentralizedCurrency.pdf 22-Dec-2014 11:37 154K
830-PropertyPreservingSymmetricEncryptionRevisi..> 22-Dec-2014 11:37 412K
831-ProvableSecurityProofsandtheirInterpretatio..> 22-Dec-2014 11:37 283K
832-PracticalDynamicSearchableEncryptionwithSma..> 22-Dec-2014 11:37 570K
833-VerifierBasedPasswordAuthenticatedKeyExchan..> 22-Dec-2014 11:37 808K
834-KeylessSignatures39InfrastructureHowtoBuild..> 20-Jan-2023 08:30 562K
834-KeylessSignaturesInfrastructureHowtoBuildGl..> 22-Dec-2014 11:37 562K
835-AModularFrameworkforBuildingVariableInputLe..> 22-Dec-2014 11:37 705K
836-IdentityBasedKeyEncapsulationMechanismfromM..> 22-Dec-2014 11:37 248K
837-FairTwoPartyComputationsviaBitcoinDeposits.pdf 22-Dec-2014 11:37 295K
838-Animprovedcompressiontechniqueforsignatures..> 22-Dec-2014 11:37 445K
839-LatticeDecodingAttacksonBinaryLWE.pdf 22-Dec-2014 11:37 203K
840-EfficientUniversallyComposableObliviousTran..> 22-Dec-2014 11:37 498K
841-TrustViewsfortheWebPKI.pdf 22-Dec-2014 11:37 384K
842-DetectingHiddenLeakages.pdf 22-Dec-2014 11:37 2M
843-AStudyofGoldbach39sconjectureandPolignac39s..> 20-Jan-2023 08:30 63K
843-AStudyofGoldbachsconjectureandPolignacsconj..> 22-Dec-2014 11:37 63K
844-Agenericviewontraceandrevokebroadcastencryp..> 22-Dec-2014 11:37 450K
845-HowtoKeepaSecretLeakageDeterringPublickeyCr..> 22-Dec-2014 11:37 313K
846-AnewattackonRSAwithacomposeddecryptionexpon..> 20-Jan-2023 08:30 187K
847-UltralightweightcryptographyforpassiveRFIDs..> 20-Jan-2023 14:19 207
848-WeaknessofSeveralIdentitybasedTripartiteAut..> 22-Dec-2014 11:36 82K
849-PushingtheLimitofNonProfilingDPAusingMultiv..> 22-Dec-2014 11:36 341K
850-SecureFloatingPointArithmeticandPrivateSate..> 22-Dec-2014 11:36 1M
851-PowerandTimingSideChannelsforPUFsandtheirEf..> 22-Dec-2014 11:36 342K
852-ImprovedBoomerangAttacksonRoundReducedSM3an..> 22-Dec-2014 11:36 276K
853-AutomaticSearchforDifferentialTrailsinARXCi..> 22-Dec-2014 11:36 374K
854-MultipleUseTransferableECash.pdf 22-Dec-2014 11:36 125K
855-WeaknessesinaRecentlyProposedRFIDAuthentica..> 22-Dec-2014 11:36 257K
856-TightlySecureSignaturesFromLossyIdentificat..> 22-Dec-2014 11:36 464K
857-RSAKeyExtractionviaLowBandwidthAcousticCryp..> 22-Dec-2014 11:36 8M
858-PracticalDualReceiverEncryptionSoundnessCom..> 22-Dec-2014 11:36 523K
859-UsingtheJointDistributionsofaCryptographicF..> 22-Dec-2014 11:36 223K
860-OntheImplausibilityofDifferingInputsObfusca..> 22-Dec-2014 11:36 375K
861-PrivacyPreservingEnforcementofSensitivePoli..> 22-Dec-2014 11:36 2M
862-HowtoDelegateComputationsThePowerofNoSignal..> 22-Dec-2014 11:36 1008K
863-FormalTreatmentofDistributedTrustinElectron..> 22-Dec-2014 11:36 450K
864-NearlineartimeLeakageresilientKeyEvolutionS..> 22-Dec-2014 11:36 217K
865-SNRtoSuccessRateReachingtheLimitofNonProfil..> 22-Dec-2014 11:36 686K
866-CompactRingLWEbasedCryptoprocessor.pdf 22-Dec-2014 11:35 238K
867-LHashALightweightHashFunctionFullVersion.pdf 22-Dec-2014 11:35 1M
868-TheoreticalBitcoinAttackswithlessthanHalfof..> 22-Dec-2014 11:35 313K
869-HowtoFakeAuxiliaryInput.pdf 22-Dec-2014 11:35 306K
870-AnewclassofhyperbentfunctionsandKloosterman..> 22-Dec-2014 11:35 163K
871-AUnifiedSecurityModelofAuthenticatedKeyExch..> 22-Dec-2014 11:35 207K
872-Withdrawn.pdf 18-Aug-2023 00:00 207
873-PolyManyHardcoreBitsforAnyOneWayFunctionand..> 22-Dec-2014 11:35 446K
874-ConstantRoundRationalSecretSharingwithOptim..> 22-Dec-2014 11:35 188K
874-GeneralConstructionsofRationalSecretSharing..> 20-Jan-2023 08:30 187K
875-PolicyBasedNoninteractiveOutsourcingofCompu..> 22-Dec-2014 11:35 421K
876-PublicKeyEncryptionwithLazyParties.pdf 22-Dec-2014 11:35 144K
877-MQSignatureandProxySignatureSchemeswithExac..> 22-Dec-2014 11:35 459K
878-EfficientHardwareImplementationofMQAsymmetr..> 22-Dec-2014 11:35 345K
879-SuccinctNonInteractiveZeroKnowledgeforavonN..> 22-Dec-2014 11:35 1M
880-NewConstructionsofRevocableIdentityBasedEnc..> 22-Dec-2014 11:35 378K
881-AcceleratingBitcoin39sTransactionProcessing..> 20-Jan-2023 08:30 261K
881-AcceleratingBitcoinsTransactionProcessingFa..> 22-Dec-2014 11:35 214K
882-NewSpeedRecordsforMontgomeryModularMultipli..> 22-Dec-2014 11:35 364K