Index of /2013/


../
001-Shieldingcircuitswithgroups.pdf                22-Dec-2014 12:14    350K
002-GeneralizedIdentityBasedHashProofSystemandI..> 22-Dec-2014 12:14    457K
003-OnFormalExpressionsofBRWpolynomials.pdf        22-Dec-2014 12:14    219K
004-MakingNTRUEncryptandNTRUSignasSecureasStand..> 22-Dec-2014 12:14    522K
005-EfficientMultiplierforpairingsoverBarretoNa..> 22-Dec-2014 12:14    189K
006-Cryptanalysisofapairingfreeidentitybasedaut..> 22-Dec-2014 12:13     36K
007-AMatrixApproachforConstructingQuadraticAPNF..> 22-Dec-2014 12:13    361K
008-NonBlackBoxSimulationfromOneWayFunctionsAnd..> 22-Dec-2014 12:13    610K
009-AchievingAnonymityAgainstMajorFaceRecogniti..> 22-Dec-2014 12:13    276K
010-SimultaneousResettableWIfromOnewayFunctions..> 22-Dec-2014 12:13    261K
011-EvolvingbalancedBooleanfunctionswithoptimal..> 22-Dec-2014 12:13    332K
012-Tropicalcryptography.pdf                       22-Dec-2014 12:13    168K
013-EfficientlyOutsourcingMultipartyComputation..> 22-Dec-2014 12:13    320K
014-OnformalandautomaticsecurityverificationofW..> 22-Dec-2014 12:13      1M
015-CompleteandUnifiedGroupLawsarenotEnoughforE..> 22-Dec-2014 12:13    161K
016-RevocableIdentityBasedEncryptionRevisitedSe..> 22-Dec-2014 12:13    230K
017-ProvableSecurityofSBGPandotherPathVectorPro..> 22-Dec-2014 12:13    909K
018-EfficientDelegationofKeyGenerationandRevoca..> 22-Dec-2014 12:13    333K
019-PlainversusRandomizedCascadingBasedKeyLengt..> 22-Dec-2014 12:13    448K
020-AggregateandVerifiablyEncryptedSignaturesfr..> 22-Dec-2014 12:13    293K
021-RateLimitedSecureFunctionEvaluation.pdf        20-Jan-2023 08:31    737K
021-RateLimitedSecureFunctionEvaluationDefiniti..> 22-Dec-2014 12:13    594K
022-NonlinearcryptanalysisofreducedroundSerpent..> 22-Dec-2014 12:13    959K
023-ANewPracticalIdentityBasedEncryptionSystem.pdf 22-Dec-2014 12:13    183K
024-NewCubeRootAlgorithmBasedonThirdOrderLinear..> 22-Dec-2014 12:13    111K
025-TheIITMModelaSimpleandExpressiveModelforUni..> 22-Dec-2014 12:13      1M
026-RSAprivatekeyreconstructionfromrandombitsus..> 22-Dec-2014 12:13    253K
027-AnonymityGuaranteesoftheUMTSLTEAuthenticati..> 22-Dec-2014 12:13    295K
028-MoreonlinearhullsofPRESENTlikeciphersandacr..> 22-Dec-2014 12:13    372K
029-ImprovedDifferentialFaultAttackonMICKEY20.pdf  22-Dec-2014 12:13    455K
030-Onthesecurityofanidentitybasedauthenticated..> 22-Dec-2014 12:13     80K
031-AnAnalysisoftheEMVChannelEstablishmentProto..> 22-Dec-2014 12:12    464K
032-DetectionofCheatersinNoninteractivePolynomi..> 22-Dec-2014 12:12    142K
033-CCASecureIBKEMfromIdentityBasedExtractableH..> 22-Dec-2014 12:12    673K
034-NewSmoothProjectiveHashFunctionsandOneRound..> 22-Dec-2014 12:12    725K
035-ImprovementstoNFCMobileTransactionandAuthen..> 20-Jan-2023 14:20     207
036-BatchFullyHomomorphicEncryptionovertheInteg..> 22-Dec-2014 12:12    560K
037-ProvablySecureIdentityBasedAggregateSigncry..> 22-Dec-2014 12:12    137K
038-VerifiableDataStreaming.pdf                    22-Dec-2014 12:12    449K
039-CreatingaChallengeforIdealLattices.pdf         22-Dec-2014 12:12    440K
040-AnEfficientCCA2SecureVariantoftheMcElieceCr..> 22-Dec-2014 12:12    363K
041-TraceExpressionofrthRootoverFiniteField.pdf    22-Dec-2014 12:12    105K
042-ComplexityofMultiPartyComputationFunctional..> 22-Dec-2014 12:12    744K
043-DifferentialFaultAttackonthePRINCEBlockCiph..> 22-Dec-2014 12:12    366K
044-EfficientComputationOutsourcingforInverting..> 22-Dec-2014 12:12    158K
045-TowardsEfficientVerifiableSQLQueryforOutsou..> 20-Jan-2023 14:20     207
046-FastandMaliciouslySecureTwoPartyComputation..> 22-Dec-2014 12:12    405K
047-LowerBoundsontheInformationRatioofLinearSec..> 22-Dec-2014 12:12     78K
048-PowerBalancedCircuitsforLeakagePowerAttacks..> 22-Dec-2014 12:12    233K
049-LessonsLearnedFromPreviousSSLTLSAttacksABri..> 22-Dec-2014 12:12      2M
050-CryptanalysisandImprovementofAkleyleketal39..> 20-Jan-2023 08:31    158K
050-CryptanalysisandImprovementofAkleyleketalsc..> 22-Dec-2014 12:12    228K
050-CryptanalysisandImprovementofAkleyleketalsc..> 22-Dec-2014 12:12    801K
051-GarbledCircuitsCheckingGarbledCircuitsMoreE..> 22-Dec-2014 12:12    388K
052-SomeComplexityResultsandBitUnpredictablefor..> 22-Dec-2014 12:12    270K
053-Arevocablecertificatelesssignaturescheme.pdf   22-Dec-2014 12:12    284K
054-JointCompartmentedThresholdAccessStructures..> 22-Dec-2014 12:12    316K
055-Secrecywithoutonewayfunctions.pdf              22-Dec-2014 12:12    215K
056-OnConstructionsofMDSMatricesfromCompanionMa..> 22-Dec-2014 12:11    370K
057-CRTbasedFullyHomomorphicEncryptionovertheIn..> 22-Dec-2014 12:11    350K
058-CryptanalysisoftheDragonflyKeyExchangeProto..> 22-Dec-2014 12:11    384K
059-OptimizedGPUImplementationandPerformanceAna..> 22-Dec-2014 12:11    512K
060-OnFHEwithoutbootstrapping.pdf                  22-Dec-2014 12:11    362K
061-OntheIndifferentiabilityofKeyAlternatingCip..> 22-Dec-2014 12:11    718K
061-OntheIndifferentiabilityofKeyAlternatingCip..> 22-Dec-2014 12:11      2M
062-SymbolicUniversalComposability.pdf             22-Dec-2014 12:11    995K
063-AVerifiable1outofnDistributedObliviousTrans..> 22-Dec-2014 12:11    398K
064-LightweightZeroKnowledgeProofsforCryptoComp..> 22-Dec-2014 12:11    453K
065-InstantiatingTreelessSignatureSchemes.pdf      22-Dec-2014 12:11    448K
066-AnalysisandImprovementofthesecuringRFIDsyst..> 22-Dec-2014 12:11     97K
067-PowerAnalysisofHardwareImplementationsProte..> 22-Dec-2014 12:11    360K
068-WhyProvingHIBESystemsSecureisDifficult.pdf     22-Dec-2014 12:11    310K
069-HardnessofSISandLWEwithSmallParameters.pdf     22-Dec-2014 12:11    368K
070-RelatedkeyAttacksAgainstFullHummingbird2.pdf   22-Dec-2014 12:11    325K
071-RelationcollectionfortheFunctionFieldSieve.pdf 22-Dec-2014 12:11    329K
072-TheUCapproachanapplicationview.pdf             22-Dec-2014 12:11    249K
073-ZeroKnowledgeUsingGarbledCircuitsHowToProve..> 22-Dec-2014 12:11    438K
074-OntheFunctionFieldSieveandtheImpactofHigher..> 22-Dec-2014 12:11    228K
075-ImprovedSecurityforaRingBasedFullyHomomorph..> 22-Dec-2014 12:11    502K
076-DesignSpaceExplorationandOptimizationofPath..> 22-Dec-2014 12:11      3M
077-UCSecureMultiSessionOTUsingTamperProofHardw..> 22-Dec-2014 12:10    139K
078-BroadcastSteganography.pdf                     22-Dec-2014 12:10    684K
079-FastCutandChooseBasedProtocolsforMaliciousa..> 22-Dec-2014 12:10    864K
080-AnefficientattackofaMcEliececryptosystemvar..> 22-Dec-2014 12:10    380K
081-EfficientSecureTwoPartyComputationUsingSymm..> 22-Dec-2014 12:10    151K
082-SecretSharingRankInequalitiesandInformation..> 22-Dec-2014 12:10    131K
083-ASecurityFrameworkforAnalysisandDesignofSof..> 22-Dec-2014 12:10    526K
084-SecurityofQuantumReadoutPUFsagainstquadratu..> 22-Dec-2014 12:10    232K
085-BetweenaRockandaHardPlaceInterpolatingBetwe..> 22-Dec-2014 12:10    406K
086-EfficientPrivateFileRetrievalbyCombiningORA..> 22-Dec-2014 12:10    408K
087-SquareRootAlgorithminF_qforq2s1mod2s1.pdf      22-Dec-2014 12:10     77K
088-SecureSignaturesandChosenCiphertextSecurity..> 22-Dec-2014 12:10    582K
089-Filterednonlinearcryptanalysisofreducedroun..> 22-Dec-2014 12:10    433K
090-FunctionalEncryptionSupportingRecursiveLang..> 20-Jan-2023 14:20     207
091-SystematicConstructionandComprehensiveEvalu..> 22-Dec-2014 12:10    707K
092-ManintheMiddleSecureAuthenticationSchemesfr..> 22-Dec-2014 12:10    383K
093-Onthesecurityofacertificatelessaggregatesig..> 22-Dec-2014 12:10     55K
094-OntheFlyMultipartyComputationontheCloudviaM..> 22-Dec-2014 12:10    545K
095-AnewindexcalculusalgorithmwithcomplexityL14..> 22-Dec-2014 12:10    411K
096-Stateconvergenceinbitbasedstreamciphers.pdf    22-Dec-2014 12:10    564K
097-BicliqueCryptanalysisoftheFullRoundKLEINBlo..> 22-Dec-2014 12:10    839K
098-LearningwithRoundingRevisitedNewReductionPr..> 22-Dec-2014 12:10    574K
099-Constantroundsecuretwopartycomputationfroma..> 22-Dec-2014 12:09    246K
100-AttacksandCommentsonSeveralRecentlyProposed..> 22-Dec-2014 12:09    345K
101-NotionsofBlackBoxReductionsRevisited.pdf       22-Dec-2014 12:09    532K
102-OntheNegativeEffectsofTrendNoiseandItsAppli..> 22-Dec-2014 12:09    280K
103-OntheComplexityofBroadcastSetup.pdf            22-Dec-2014 12:09    277K
104-ATutorialonWhiteboxAES.pdf                     22-Dec-2014 12:09    727K
105-LossyChainsandFractionalSecretSharing.pdf      22-Dec-2014 12:09    618K
106-URDPGeneralFrameworkforDirectCCA2Securityfr..> 20-Jan-2023 14:20     207
107-OntheArithmeticComplexityofStrassenLikeMatr..> 22-Dec-2014 12:09    415K
108-UnconditionallySecureandUniversallyComposab..> 22-Dec-2014 12:09    742K
109-ShorterQuasiAdaptiveNIZKProofsforLinearSubs..> 22-Dec-2014 12:09    592K
110-FullCharacterizationofFunctionsthatImplyFai..> 22-Dec-2014 12:09    258K
111-MessageAuthenticationCodesSecureagainstAddi..> 22-Dec-2014 12:09    115K
112-PUFModelingAttacksonSimulatedandSiliconData..> 22-Dec-2014 12:09    559K
113-CompactHardwareImplementationsofChaChaBLAKE..> 22-Dec-2014 12:09      2M
114-PublicKeyExchangeUsingMatricesOverGroupRing..> 22-Dec-2014 12:09    434K
115-AConditionalProxyBroadcastReEncryptionSchem..> 22-Dec-2014 12:09    764K
116-TheAlgorithmofAAES.pdf                         22-Dec-2014 12:09    214K
117-OnrthRootExtractionAlgorithminF_qForqlrs1mo..> 22-Dec-2014 12:09     97K
118-ThroughputOptimizedImplementationsofQUAD.pdf   22-Dec-2014 12:09    288K
119-SpeedingupAtePairingComputationinAffineCoor..> 22-Dec-2014 12:09    360K
120-AnAttackAgainstFixedValueDiscreteLogarithmR..> 22-Dec-2014 12:09     83K
121-SuccinctNonInteractiveZeroKnowledgeArgument..> 22-Dec-2014 12:09    659K
122-Practicalcollisionattackon40stepRIPEMD128.pdf  22-Dec-2014 12:08    124K
123-AnalysisandImprovementofLindell39sUCSecureC..> 20-Jan-2023 08:31    351K
123-AnalysisandImprovementofLindellsUCSecureCom..> 22-Dec-2014 12:08    351K
124-TamperResilientCryptographyWithoutSelfDestr..> 20-Jan-2023 14:20     207
125-DeterministicPublicKeyEncryptionforAdaptive..> 22-Dec-2014 12:08    480K
126-DirectProofofSecurityofWegmanCarterAuthenti..> 22-Dec-2014 12:08    287K
127-ObliviousPAKEEfficientHandlingofPasswordTri..> 22-Dec-2014 12:08    521K
128-AttributeBasedEncryptionforCircuitsfromMult..> 22-Dec-2014 12:08    407K
129-AnIdealSecurityProtocolforOrderPreservingEn..> 22-Dec-2014 12:08    739K
130-BlankDigitalSignatures.pdf                     22-Dec-2014 12:08    409K
131-Twoisthefastestprimelambdacoordinatesforbin..> 22-Dec-2014 12:08    400K
132-YetAnotherAttackOntheChineseRemainderTheore..> 22-Dec-2014 12:08    688K
133-NewLatticeBasedSignatureUsingTheJordanNorma..> 22-Dec-2014 12:08     86K
134-HardCorePredicatesforaDiffieHellmanProblemo..> 22-Dec-2014 12:08    548K
135-AnMQCodeCryptosystemProposal.pdf               22-Dec-2014 12:08    312K
136-2048XKSF4096XKSFTwoSoftwareOrientedHighSecu..> 22-Dec-2014 12:08    233K
136-2048XKSFamp4096XKSFTwoSoftwareOrientedHighS..> 20-Jan-2023 08:31    233K
137-HowtoHideCircuitsinMPCAnEfficientFrameworkf..> 22-Dec-2014 12:08    667K
138-Multibithomomorphicencryptionbasedonlearnin..> 22-Dec-2014 12:08    239K
139-RethinkingDefinitionsofSecurityforSessionKe..> 22-Dec-2014 12:08    339K
140-LimitationsoftheMetaReductionTechniqueTheCa..> 22-Dec-2014 12:08    393K
141-NonisomorphicBicliqueCryptanalysisandItsApp..> 22-Dec-2014 12:08      1M
142-ANEWMETHODOFCHOOSINGPRIMITIVEELEMENTSFORBRE..> 22-Dec-2014 12:08    391K
143-AnarchitectureforpracticalactivelysecureMPC..> 22-Dec-2014 12:08    353K
144-OnWeakKeysandForgeryAttacksagainstPolynomia..> 22-Dec-2014 12:08    433K
145-KeyWrappingwithaFixedPermutation.pdf           22-Dec-2014 12:08    379K
146-HighPerformanceScalarMultiplicationusing8Di..> 22-Dec-2014 12:08    694K
147-AnoteonthepracticalcomplexityoftheNFSinthem..> 22-Dec-2014 12:07    482K
148-AESlikeciphersarespecialSboxesbetterthenran..> 22-Dec-2014 12:07    176K
149-SecureandConstantCostPublicCloudStorageAudi..> 22-Dec-2014 12:07    248K
150-PracticalSecondPreimageAttacksonTCS_SHA3.pdf   22-Dec-2014 12:07    192K
151-SomeFixesToSSH.pdf                             22-Dec-2014 12:07    144K
152-PolicybasedSecureDeletion.pdf                  22-Dec-2014 12:07    401K
153-Onthesecurityofacerticatelesssignatureschem..> 22-Dec-2014 12:07     88K
154-OptimalSuspicionFunctionsforTardosTraitorTr..> 22-Dec-2014 12:07      5M
155-MiniLEGOEfficientSecureTwoPartyComputationF..> 22-Dec-2014 12:07    769K
156-IncentivizingOutsourcedComputation.pdf         22-Dec-2014 12:07    175K
157-ThefragilityofAESGCMauthenticationalgorithm..> 22-Dec-2014 12:07    419K
158-EfficientandSecureAlgorithmsforGLVBasedScal..> 22-Dec-2014 12:07    492K
159-ImprovingtheMessageciphertextRateofLewko39s..> 20-Jan-2023 08:31    333K
159-ImprovingtheMessageciphertextRateofLewkosFu..> 22-Dec-2014 12:07    333K
160-InteractiveCodingRevisited.pdf                 22-Dec-2014 12:07    489K
161-CompletenessTheoremsforAllFiniteStateless2P..> 22-Dec-2014 12:07    737K
162-ANonAsymptoticAnalysisofInformationSetDecod..> 22-Dec-2014 12:07    346K
163-SearchPatternLeakageinSearchableEncryptionA..> 22-Dec-2014 12:07    387K
164-ProvablySecureLWEEncryptionwithSmallishUnif..> 22-Dec-2014 12:07    379K
165-ANewSecurityandPrivacyFrameworkforRFIDInClo..> 20-Jan-2023 14:20     207
166-OngeneralizedsemibentandpartiallybentBoolea..> 22-Dec-2014 12:07    159K
167-SinglePasswordAuthentication.pdf               22-Dec-2014 12:07    660K
168-OnsecureembeddedtokendesignLongVersionQuasi..> 22-Dec-2014 12:07    498K
169-HighlyScalableSearchableSymmetricEncryption..> 22-Dec-2014 12:06    493K
170-FastCollisionAttackonMD5.pdf                   22-Dec-2014 12:06    296K
171-ConfinedGuessingNewSignaturesFromStandardAs..> 22-Dec-2014 12:06    473K
172-OntheApplicabilityofTimeDrivenCacheAttackso..> 22-Dec-2014 12:06    754K
173-OntheClassificationofDifferentialInvariants..> 22-Dec-2014 12:06    118K
173-OntheClassificationofDifferentialInvariants..> 20-Jan-2023 08:31    118K
174-CryptanalysisofSomeDoubleBlockLengthHashMod..> 22-Dec-2014 12:06    232K
175-MachineGeneratedAlgorithmsProofsandSoftware..> 22-Dec-2014 12:06      2M
176-DistinguishingAttacksonRC4andANewImprovemen..> 22-Dec-2014 12:06    224K
177-Agenericconstructionforvotingcorrectnessatm..> 22-Dec-2014 12:06    431K
178-CryptanalysisofRC4nmStreamCipher.pdf           22-Dec-2014 12:06    492K
179-MalleableSignaturesComplexUnaryTransformati..> 22-Dec-2014 12:06    509K
180-ANewClassofProductsumTypePublicKeyCryptosys..> 22-Dec-2014 12:06    194K
181-Ontheevaluationofmodularpolynomials.pdf        22-Dec-2014 12:06    467K
182-CollusionResistantDomainSpecificPseudonymou..> 22-Dec-2014 12:06      2M
183-PracticalMultilinearMapsovertheIntegers.pdf    22-Dec-2014 12:06    491K
184-TheVernamcipherisrobusttosmalldeviationsfro..> 22-Dec-2014 12:06    234K
185-SecurityAnalysisofLinearlyFilteredNLFSRs.pdf   22-Dec-2014 12:06    575K
186-OntheImpossibilityofProjectingPropertyinPri..> 22-Dec-2014 12:06    488K
187-EnhancedOwnershipTransferProtocolforRFIDina..> 22-Dec-2014 12:06    216K
188-Afamilyof6to4bitSboxeswithlargelinearbranch..> 22-Dec-2014 12:06    213K
189-IdealandPerfectHierarchicalSecretSharingSch..> 22-Dec-2014 12:06    280K
190-PowerAnalysisAttacksagainstFPGAImplementati..> 22-Dec-2014 12:06    959K
191-ImprovedDifferentialFaultAnalysisonARIAusin..> 22-Dec-2014 12:05    182K
192-AgeneralisationofMiller39salgorithmandappli..> 20-Jan-2023 08:31    605K
192-AgeneralisationofMillersalgorithmandapplica..> 22-Dec-2014 12:05    605K
193-CertificatelessSignaturesStructuralExtensio..> 22-Dec-2014 12:05    286K
194-OntheImpossibilityofCryptographywithTampera..> 22-Dec-2014 12:05    660K
195-OntheredesignofanFPGAbasedPUF.pdf              22-Dec-2014 12:05    342K
196-FastTwoPartySecureComputationwithMinimalAss..> 22-Dec-2014 12:05    345K
197-DiscretelogarithminGF2809withFFS.pdf           22-Dec-2014 12:05    498K
198-OnEvaluatingCircuitswithInputsEncryptedbyDi..> 22-Dec-2014 12:05    383K
199-Quantumalgorithmsforthesubsetsumproblem.pdf    22-Dec-2014 12:05    365K
200-SelectingpolynomialsfortheFunctionFieldSiev..> 22-Dec-2014 12:05    633K
201-NonmalleableCodesfromAdditiveCombinatorics.pdf 22-Dec-2014 12:05    430K
202-BreakingNLMMACGenerator.pdf                    22-Dec-2014 12:05    265K
203-FromobliviousAEStoefficientandsecuredatabas..> 22-Dec-2014 12:05    426K
204-ComputingPrivacyPreservingEditDistanceandSm..> 22-Dec-2014 12:05    631K
205-PracticalandEmployableProtocolsforUCSecureC..> 22-Dec-2014 12:05    621K
206-PrivacyPreservingBillingforeTicketingSystem..> 22-Dec-2014 12:05    292K
207-SelfblindableCredentialTowardsLightWeightAn..> 22-Dec-2014 12:05    254K
208-CloudHKAACryptographicApproachforHierarchic..> 22-Dec-2014 12:05    798K
209-Newmodularmultiplicationanddivisionalgorith..> 22-Dec-2014 12:05    265K
210-Cryptophia39sShortCombinerforCollisionResis..> 20-Jan-2023 08:31    537K
210-CryptophiasShortCombinerforCollisionResista..> 22-Dec-2014 12:05    537K
211-Anewcriterionforavoidingthepropagationoflin..> 22-Dec-2014 12:05    439K
212-ACloserLookatHMAC.pdf                          22-Dec-2014 12:05    224K
213-OntheImpactsofMathematicalRealizationoverPr..> 22-Dec-2014 12:04    266K
214-RemotegrityDesignandUseofanEndtoEndVerifiab..> 22-Dec-2014 12:04    614K
215-OpticalPUFsReloaded.pdf                        22-Dec-2014 12:04      1M
216-ElectionVerifiabilityorBallotPrivacyDoWeNee..> 22-Dec-2014 12:04    447K
217-ComputingonAuthenticatedDataforAdjustablePr..> 22-Dec-2014 12:04    399K
218-ComparingthePairingEfficiencyoverCompositeO..> 22-Dec-2014 12:04    497K
219-DesigningaHybridAttributeBasedEncryptionSch..> 22-Dec-2014 12:04    405K
220-TowardsEfficientPrivateDistributedComputati..> 22-Dec-2014 12:04    403K
221-IdentitybasedAggregateSignatureswithVerifia..> 22-Dec-2014 12:04    317K
222-Tightsecurityboundsforkeyalternatingciphers..> 22-Dec-2014 12:04    281K
223-ThePACEAAProtocolforMachineReadableTravelDo..> 22-Dec-2014 12:04    425K
224-OntheNeedofPhysicalSecurityforSmallEmbedded..> 22-Dec-2014 12:04      1M
225-TransparentDistributedandReplicatedDynamicP..> 22-Dec-2014 12:04    542K
226-Publickeyexchangeusingsemidirectproductofse..> 22-Dec-2014 12:04    287K
227-Analysisofauthenticationandkeyestablishment..> 22-Dec-2014 12:04      2M
228-PublicKeyRevocationandTracingSchemeswithSub..> 22-Dec-2014 12:04    291K
229-HowtoRunTuringMachinesonEncryptedData.pdf      22-Dec-2014 12:04    329K
230-RelationsamongPrivacyNotionsforSigncryption..> 20-Jan-2023 08:31    434K
230-RelationsamongPrivacyNotionsforSigncryption..> 22-Dec-2014 12:04    434K
231-Sakuraaflexiblecodingfortreehashing.pdf        22-Dec-2014 12:04    287K
232-QuantumalgorithmstocheckResiliencySymmetrya..> 22-Dec-2014 12:04    416K
233-AttacksonJHGrostlandSMASHHashFunctions.pdf     22-Dec-2014 12:04    281K
233-AttacksonJHGrstlandSMASHHashFunctions.pdf      20-Jan-2023 08:31    281K
234-ACryptographicAnalysisofOPACITY.pdf            22-Dec-2014 12:04    767K
235-Ballotsecrecyandballotindependencedefinitio..> 22-Dec-2014 12:03    403K
236-ACiphertextPolicyAttributeBasedProxyReEncry..> 22-Dec-2014 12:03    891K
237-TypeBasedAnalysisofGenericKeyManagementAPIs..> 22-Dec-2014 12:03    429K
238-AnonymitypreservingPublicKeyEncryptionACons..> 22-Dec-2014 12:03    467K
239-OptimizingORAMandUsingitEfficientlyforSecur..> 22-Dec-2014 12:03    298K
240-AlgebraicanalysisofTriviumlikeciphers.pdf      22-Dec-2014 12:03    278K
241-ThePerilsofRepeatingPatternsObservationofSo..> 22-Dec-2014 12:03    108K
242-AE5SecurityNotionsDefinitionsImplicitintheC..> 22-Dec-2014 12:03    252K
243-ASimpleORAM.pdf                                22-Dec-2014 12:03    316K
244-Cryptographicschemeskeyexchangepublickey.pdf   22-Dec-2014 12:03    352K
245-TheFiatShamirTransformationinaQuantumWorld.pdf 22-Dec-2014 12:03    584K
246-ALeverFunctiontoaNewCodomainwithAdequateInd..> 22-Dec-2014 12:03    372K
246-ANewLeverFunctionwithAdequateIndeterminacy.pdf 20-Jan-2023 08:31    333K
247-LeakageresilientAttributebasedEncryptionswi..> 22-Dec-2014 12:03    497K
248-AnotherLookatSecurityTheoremsfor1KeyNestedM..> 22-Dec-2014 12:03    207K
249-HowtoFactorN_1andN_2Whenp_1p_2mod2t.pdf        22-Dec-2014 12:03    218K
250-FullyHomomorphicEncryptionforMathematicians..> 22-Dec-2014 12:03    294K
251-PermutationPolynomialsandTheirDifferentialP..> 22-Dec-2014 12:03    372K
252-OnthePrimitivityofsomeTrinomialsoverFiniteF..> 22-Dec-2014 12:03    135K
253-CacheAuditAToolfortheStaticAnalysisofCacheS..> 22-Dec-2014 12:03    489K
254-TowardsAdoptionofDNSSECAvailabilityandSecur..> 22-Dec-2014 12:03    380K
255-HowtoConstructanIdealCipherfromaSmallSetofP..> 22-Dec-2014 12:03    788K
256-OntheLossinessoftheRabinTrapdoorFunction.pdf   22-Dec-2014 12:03    563K
257-Securetwopartycomputationavisualway.pdf        22-Dec-2014 12:03      3M
258-WitnessEncryptionanditsApplications.pdf        22-Dec-2014 12:02    466K
259-PrivateInteractiveCommunicationAcrossanAdve..> 22-Dec-2014 12:02    451K
260-FromWeaktoStrongZeroKnowledgeandApplication..> 22-Dec-2014 12:02    458K
261-Secureinformationtransmissionbasedonphysica..> 22-Dec-2014 12:02    124K
262-AnefficientFHEbasedonthehardnessofsolvingsy..> 22-Dec-2014 12:02    257K
263-SpeedingupQUAD.pdf                             22-Dec-2014 12:02    171K
264-EncryptedSecretSharingandAnalysisbyPlaintex..> 22-Dec-2014 12:02    154K
265-AttributeBasedEncryptionwithFastDecryption.pdf 22-Dec-2014 12:02    328K
266-LPStatesofRC4StreamCipher.pdf                  22-Dec-2014 12:02    275K
267-MultiPartyComputationofPolynomialsandBranch..> 22-Dec-2014 12:02    516K
268-DynamicCubeAttackonGrainv1.pdf                 22-Dec-2014 12:02     99K
269-CMCCMisuseResistantAuthenticatedEncryptionw..> 22-Dec-2014 12:02    437K
270-PseudorandomGeneratorsfromRegularOnewayFunc..> 22-Dec-2014 12:02    438K
271-TheLegalClassificationofIdentityBasedSignat..> 22-Dec-2014 12:02    191K
272-CryptographyChallengesforComputationalPriva..> 22-Dec-2014 12:02    108K
273-ComputingtheRankofIncidenceMatrixandtheAlge..> 22-Dec-2014 12:02    349K
274-Atimeseriesapproachforprofilingattack.pdf      22-Dec-2014 12:02    607K
275-ThePotentialofanIndividualizedSetoftrustedC..> 22-Dec-2014 12:02    418K
276-TowardsaPracticalCryptographicVotingSchemeB..> 22-Dec-2014 12:02    411K
277-ESPOONEnforcingEncryptedSecurityPoliciesinO..> 22-Dec-2014 12:02    434K
278-AFrequencyLeakageModelanditsapplicationtoCP..> 22-Dec-2014 12:02    682K
279-PinocchioNearlyPracticalVerifiableComputati..> 22-Dec-2014 12:02    454K
280-PathORAMAnExtremelySimpleObliviousRAMProtoc..> 22-Dec-2014 12:02    610K
281-AdaptingLyubashevskysSignatureSchemestotheR..> 22-Dec-2014 12:01    407K
282-ThreeSnakesinOneHoleTheFirstSystematicHardw..> 22-Dec-2014 12:01    680K
283-FunctionPrivateIdentityBasedEncryptionHidin..> 22-Dec-2014 12:01    403K
284-ASecurePaperBasedElectronicVotingWithNoEncr..> 22-Dec-2014 12:01    257K
285-ANovelProofonWeilPairing.pdf                   22-Dec-2014 12:01    212K
286-SalvagingIndifferentiabilityinaMultistageSe..> 22-Dec-2014 12:01    942K
287-ThefailureofMcEliecePKCbasedonReedMullercod..> 22-Dec-2014 12:01    298K
288-KeyClassificationAttackonBlockCiphers.pdf      22-Dec-2014 12:01    354K
289-SecureSecondPriceAuctionswithaRationalAucti..> 22-Dec-2014 12:01    308K
290-MassiveGroupMessageAuthenticationwithRevoca..> 22-Dec-2014 12:01    264K
291-SecurityrankingamongassumptionswithintheUbe..> 22-Dec-2014 12:01    261K
292-ALeakageResilientMAC.pdf                       22-Dec-2014 12:01    379K
293-AToolkitforRingLWECryptography.pdf             22-Dec-2014 12:01    588K
294-SynchronousSamplingandClockRecoveryofIntern..> 22-Dec-2014 12:01      5M
295-SurveyandBenchmarkofLightweightBlockCiphers..> 22-Dec-2014 12:01    319K
296-UniversallyComposableSymbolicAnalysisforTwo..> 22-Dec-2014 12:01    990K
297-ImprovementandEfficientImplementationofaLat..> 22-Dec-2014 12:01    424K
298-DoesMyDeviceLeakInformationAnaprioriStatist..> 22-Dec-2014 12:01    652K
299-Computingclasspolynomialsforabeliansurfaces..> 22-Dec-2014 12:01    242K
300-AProfitableSubPrimeLoanObtainingtheAdvantag..> 22-Dec-2014 12:01    525K
301-ImpossibleDifferentialLinearCryptanalysisof..> 22-Dec-2014 12:01    256K
302-CryptanalysisofGrigorievShpilrainPhysicalAs..> 22-Dec-2014 12:00     52K
303-Theoryofmaskingwithcodewordsinhardwarelowwe..> 22-Dec-2014 12:00    691K
304-SecurePRNGSeedingonCommercialOfftheShelfMic..> 22-Dec-2014 12:00    473K
305-TowardsFreshReKeyingwithLeakageResilientPRF..> 22-Dec-2014 12:00      2M
306-Solvinga6120bitDLPonaDesktopComputer.pdf       22-Dec-2014 12:00    326K
307-MaliciouslyCircuitPrivateFHE.pdf               22-Dec-2014 12:00    451K
308-LatticeBasedGroupSignatureswithLogarithmicS..> 22-Dec-2014 12:00    553K
309-BypassingPasskeyAuthenticationinBluetoothLo..> 22-Dec-2014 12:00     35K
310-MinimaLTMinimallatencyNetworkingThroughBett..> 22-Dec-2014 12:00    606K
311-FourdimensionalGLVviatheWeilrestriction.pdf    22-Dec-2014 12:00    488K
312-FamiliesoffastellipticcurvesfromQcurves.pdf    22-Dec-2014 12:00    166K
313-PairingInversionviaNondegenerateAuxiliaryPa..> 22-Dec-2014 12:00    201K
314-KeyedSideChannelBasedHashingforIPProtection..> 22-Dec-2014 12:00    326K
315-HybridApproachfortheFastVerificationforImpr..> 22-Dec-2014 12:00    215K
316-Certifiedcomputeraidedcryptographyefficient..> 22-Dec-2014 12:00    472K
317-AnonPassPracticalAnonymousSubscriptions.pdf    22-Dec-2014 12:00    487K
318-FullyAnonymousFunctionalProxyReEncryption.pdf  22-Dec-2014 12:00    751K
319-Ontheuseofcontinuedfractionsforstreamcipher..> 22-Dec-2014 12:00    197K
320-InstantaneousFrequencyAnalysis.pdf             22-Dec-2014 12:00    839K
321-GenericConstructionsofSecureChannelFreeSear..> 22-Dec-2014 12:00    216K
322-BLAKE2simplersmallerfastasMD5.pdf              22-Dec-2014 12:00    291K
323-EncryptionSchemeswithPostChallengeAuxiliary..> 22-Dec-2014 12:00    241K
323-EncryptionSchemeswithPostChallengeAuxiliary..> 22-Dec-2014 12:00    851K
324-SieveintheMiddleImprovedMITMAttacksFullVers..> 22-Dec-2014 11:59    678K
325-ElligatorEllipticcurvepointsindistinguishab..> 22-Dec-2014 11:59    485K
326-KeyVersatileSignaturesandApplicationsRKAKDM..> 22-Dec-2014 11:59    469K
327-ALightweightHashFunctionResistingBirthdayAt..> 22-Dec-2014 11:59    403K
328-TowardsFindingOptimalDifferentialCharacteri..> 22-Dec-2014 11:59    235K
329-ProtocolVariantsandElectronicIdentification..> 22-Dec-2014 11:59    284K
330-TrapdoorPrivacyinAsymmetricSearchableEncryp..> 22-Dec-2014 11:59    448K
331-NewConstructionsandApplicationsofTrapdoorDD..> 22-Dec-2014 11:59    567K
332-Amethodforobtaininglowerboundsonthehigheror..> 22-Dec-2014 11:59     65K
333-Doubleauthenticationpreventingsignatures.pdf   22-Dec-2014 11:59    502K
334-ProtectingPUFErrorCorrectionbyCodewordMaski..> 22-Dec-2014 11:59    597K
335-ParallelandDynamicSearchableSymmetricEncryp..> 22-Dec-2014 11:59    315K
336-ANovelTechniqueinLinearCryptanalysis.pdf       20-Jan-2023 14:20     207
337-AttributeBasedEncryptionforCircuits.pdf        22-Dec-2014 11:59    478K
338-SecurityAnalysisofPseudoRandomNumberGenerat..> 22-Dec-2014 11:59    755K
339-OntheSecurityoftheTLSProtocolASystematicAna..> 22-Dec-2014 11:59    287K
340-HomomorphicEncryptionfromLearningwithErrors..> 22-Dec-2014 11:59    412K
341-TrapdoorSmoothProjectiveHashFunctions.pdf      22-Dec-2014 11:59    876K
342-AttributeBasedEncryptionforaSubclassofCircu..> 22-Dec-2014 11:59    388K
343-Quantumonetimeprograms.pdf                     22-Dec-2014 11:59    369K
344-Limitsofprovablesecurityforhomomorphicencry..> 22-Dec-2014 11:59    313K
345-AnalysisandImprovementoftheGenericHigherOrd..> 22-Dec-2014 11:59    429K
346-UsingBleichenbacher39sSolutiontotheHiddenNu..> 20-Jan-2023 08:31    437K
346-UsingBleichenbachersSolutiontotheHiddenNumb..> 22-Dec-2014 11:59    437K
347-STESAStreamCipherBasedLowCostSchemeforSecur..> 22-Dec-2014 11:59    774K
348-Multifileproofsofretrievabilityforcloudstor..> 22-Dec-2014 11:58    288K
349-ADynamicTradeoffBetweenActiveandPassiveCorr..> 22-Dec-2014 11:58    221K
350-IdealCipherIrreducibilityforBlockcipherBase..> 22-Dec-2014 11:58    495K
351-TimeOptimalInteractiveProofsforCircuitEvalu..> 22-Dec-2014 11:58      1M
352-ConstrainedPseudorandomFunctionsandTheirApp..> 22-Dec-2014 11:58    316K
353-ProfilingDPAEfficacyandefficiencytradeoffs.pdf 22-Dec-2014 11:58    538K
354-ProgrammableHashFunctionsintheMultilinearSe..> 22-Dec-2014 11:58    556K
355-NewAttacksagainstTransformationBasedPrivacy..> 22-Dec-2014 11:58    261K
356-VerifyingComputationswithStateExtendedVersi..> 22-Dec-2014 11:58    542K
357-TheLOCALattackCryptanalysisoftheauthenticat..> 22-Dec-2014 11:58    400K
358-Countercryptanalysis.pdf                       22-Dec-2014 11:58    634K
359-Aheuristicforfindingcompatibledifferentialp..> 22-Dec-2014 11:58    364K
360-Achievingthelimitsofthenoisystoragemodelusi..> 22-Dec-2014 11:58    345K
361-LinearlyHomomorphicStructurePreservingSigna..> 22-Dec-2014 11:58    271K
362-AFastImplementationoftheOptimalAtePairingov..> 22-Dec-2014 11:58     70K
363-ANewClassofPublicKeyCryptosystemsConstructe..> 22-Dec-2014 11:58    256K
364-OntheAchievabilityofSimulationBasedSecurity..> 22-Dec-2014 11:58    424K
365-EfficienteCKsecureAuthenticatedKeyExchangeP..> 22-Dec-2014 11:58    571K
366-StructuralEvaluationofAESandChosenKeyDistin..> 22-Dec-2014 11:58    868K
367-OntheSecurityofTLSDHandTLSRSAintheStandardM..> 22-Dec-2014 11:58    460K
368-SecurityinO2nfortheXorofTwoRandomPermutatio..> 22-Dec-2014 11:58    393K
369-BlockCiphersthatareEasiertoMaskHowFarCanweG..> 22-Dec-2014 11:58      1M
370-LeakageResilientSymmetricCryptographyUnderE..> 22-Dec-2014 11:57      1M
371-DomainPolymorphicProgrammingofPrivacyPreser..> 22-Dec-2014 11:57    378K
372-PracticalBootstrappinginQuasilinearTime.pdf    22-Dec-2014 11:57    368K
373-InjectiveEncodingtoEllipticCurves.pdf          22-Dec-2014 11:57    417K
374-ASecureandefficientellipticcurvebasedauthen..> 22-Dec-2014 11:57    278K
375-NaClon8BitAVRMicrocontrollers.pdf              22-Dec-2014 11:57    377K
376-AnAccurateProbabilisticReliabilityModelforS..> 22-Dec-2014 11:57    602K
377-AnAlgebraicFrameworkforDiffieHellmanAssumpt..> 22-Dec-2014 11:57    659K
378-Anoteonquantumrelatedkeyattacks.pdf            22-Dec-2014 11:57    112K
379-DelegatablePseudorandomFunctionsandApplicat..> 22-Dec-2014 11:57    581K
380-CommentsonThreeMultiServerAuthenticationPro..> 22-Dec-2014 11:57    502K
381-BreakingtheEvenMansourHashFunctionCollision..> 20-Jan-2023 14:19     207
382-ToHashorNottoHashAgainIndifferentiabilityRe..> 22-Dec-2014 11:57    663K
383-LatticeSignaturesandBimodalGaussians.pdf       22-Dec-2014 11:57    747K
384-SequentialAggregateSignaturesMadeShorter.pdf   22-Dec-2014 11:57    266K
385-CryptanalysisofultralightweightRFIDauthenti..> 20-Jan-2023 14:19     207
386-SideChannelAttacksagainstPairingoverThetaFu..> 22-Dec-2014 11:57    428K
387-CryptographicallyProtectedPrefixesforLocati..> 22-Dec-2014 11:57    352K
388-ParallelGaussSieveAlgorithmSolvingtheSVPint..> 22-Dec-2014 11:57    317K
389-ACapacityAchievingSimpleDecoderforBiasBased..> 22-Dec-2014 11:57     11M
390-ChosenCiphertextSecureKeyedHomomorphicPubli..> 22-Dec-2014 11:56    375K
391-KeyRecoveryAttackson3roundEvenMansour8stepL..> 22-Dec-2014 11:56    424K
392-EfficientSimultaneousPrivatelyandPubliclyVe..> 22-Dec-2014 11:56    713K
393-StronglySecureOneroundGroupAuthenticatedKey..> 22-Dec-2014 11:56    578K
394-APublicKeyCryptoschemeUsingBitpairShadows.pdf  22-Dec-2014 11:56    395K
396-OnthePracticalSecurityofaLeakageResilientMa..> 22-Dec-2014 11:56    354K
397-PracticalSecureLoggingSeekableSequentialKey..> 22-Dec-2014 11:56    418K
398-ASICSAuthenticatedKeyExchangeSecurityIncorp..> 22-Dec-2014 11:56    534K
399-AttackonLiaoandHsiao39sSecureECCbasedRFIDAu..> 20-Jan-2023 08:31     78K
399-AttackonLiaoandHsiaosSecureECCbasedRFIDAuth..> 22-Dec-2014 11:56     78K
400-Aquasipolynomialalgorithmfordiscretelogarit..> 22-Dec-2014 11:56    461K
401-FunctionalSignaturesandPseudorandomFunction..> 22-Dec-2014 11:56    474K
402-EfficientTwoPassAnonymousIdentityAuthentica..> 22-Dec-2014 11:56    382K
403-FunctionPrivateSubspaceMembershipEncryption..> 22-Dec-2014 11:56    159K
404-TheSIMONandSPECKFamiliesofLightweightBlockC..> 22-Dec-2014 11:56    279K
405-NewQuadraticBentFunctionsinPolynomialFormsw..> 22-Dec-2014 11:56    121K
406-AttributeBasedServerAidedVerificationSignat..> 20-Jan-2023 14:19     207
407-AutomatedSecurityProofsforAlmostUniversalHa..> 22-Dec-2014 11:56    423K
408-DelegatableFunctionalSignatures.pdf            22-Dec-2014 11:56    903K
409-OrderPreservingEncryptionSecureBeyondOneWay..> 22-Dec-2014 11:56    547K
410-PlugandPlayIPSecurityAnonymityInfrastructur..> 22-Dec-2014 11:56    535K
411-SecurityAnalysisofLightweightAuthentication..> 22-Dec-2014 11:56     88K
412-ModuarFormAprroachtoSolvingLatticeProblems.pdf 22-Dec-2014 11:56    493K
413-PolicyBasedSignatures.pdf                      22-Dec-2014 11:55    566K
414-Anovelcertificatelessdeniableauthentication..> 22-Dec-2014 11:55    172K
415-SL2homomorphichashfunctionsWorstcasetoavera..> 20-Jan-2023 08:31    421K
415-ShortcollisionsearchinarbitrarySL2homomorph..> 22-Dec-2014 11:55    414K
416-ComputationalFuzzyExtractors.pdf               22-Dec-2014 11:55    366K
417-TheImprovedCubeAttackonGrainv1.pdf             22-Dec-2014 11:55    178K
418-OnTightSecurityProofsforSchnorrSignatures.pdf  22-Dec-2014 11:55    362K
419-HowtoShareaLatticeTrapdoorThresholdProtocol..> 22-Dec-2014 11:55    442K
420-TheHoleyGrailAspecialscorefunctionfornonbin..> 22-Dec-2014 11:55    778K
421-LightweightprimitivefeatherweightsecurityAc..> 22-Dec-2014 11:55    333K
422-PrivateDatabaseQueriesUsingSomewhatHomomorp..> 22-Dec-2014 11:55    281K
423-LocallyComputableUOWHFwithLinearShrinkage.pdf  22-Dec-2014 11:55    467K
424-InstantiatingRandomOraclesviaUCEs.pdf          22-Dec-2014 11:55    689K
425-BreakWEPFasterwithStatisticalAnalysis.pdf      22-Dec-2014 11:55    325K
426-EfficientGarblingfromaFixedKeyBlockcipher.pdf  22-Dec-2014 11:55    462K
427-ToeplitzmatrixvectorproductbasedGF2nshifted..> 22-Dec-2014 11:55    289K
428-Faster128EEA3and128EIA3Software.pdf            22-Dec-2014 11:55    286K
429-DupLESSServerAidedEncryptionforDeduplicated..> 22-Dec-2014 11:55    243K
430-SecurityoftheMistyStructureBeyondtheBirthda..> 22-Dec-2014 11:55    378K
431-PracticalTimeAttacksAgainstReducedVariantso..> 22-Dec-2014 11:55    272K
432-HowtoSignPaperContractsConjecturesEvidenceR..> 22-Dec-2014 11:55    233K
432-HowtoSignPaperContractsConjecturesampEviden..> 20-Jan-2023 08:31    233K
433-OnSymmetricEncryptionwithDistinguishableDec..> 22-Dec-2014 11:55    457K
434-FullDomainHashfromLeveledMultilinearMapsand..> 22-Dec-2014 11:55    311K
435-EfficientCryptosystemsFrom2kthPowerResidueS..> 22-Dec-2014 11:55    301K
436-FastExhaustiveSearchforQuadraticSystemsinma..> 22-Dec-2014 11:55    378K
437-AUniformMinMaxTheoremwithApplicationsinCryp..> 22-Dec-2014 11:55    279K
438-ClusteringAlgorithmsforNonProfiledSingleExe..> 22-Dec-2014 11:54    585K
439-PushingtheLimitsofSHA3HardwareImplementatio..> 22-Dec-2014 11:54    451K
440-RevisitingConditionalRenyiEntropiesandGener..> 22-Dec-2014 11:54    310K
440-RevisitingConditionalRnyiEntropiesandGenera..> 20-Jan-2023 08:31    310K
441-OnStochasticSecurityofJavaCryptoandNISTDRBG..> 20-Jan-2023 14:19     207
442-OnFairExchangeFairCoinsandFairSampling.pdf     22-Dec-2014 11:54    663K
443-OptimallyAnonymousandTransferableConditiona..> 22-Dec-2014 11:54    450K
444-Sequentialmessageauthenticationcodewithoutr..> 22-Dec-2014 11:54    204K
445-ImplementingLightweightBlockCiphersonx86Arc..> 22-Dec-2014 11:54    364K
446-WeaknessofF_36509forDiscreteLogarithmCrypto..> 22-Dec-2014 11:54    270K
447-DynamicRuntimeMethodstoEnhancePrivateKeyBli..> 22-Dec-2014 11:54    189K
448-FlushReloadaHighResolutionLowNoiseL3CacheSi..> 22-Dec-2014 11:54    213K
449-ANoteOntheStorageRequirementforAKSPrimality..> 22-Dec-2014 11:54     52K
450-RevisitingtheBGEAttackonaWhiteBoxAESImpleme..> 22-Dec-2014 11:54    349K
451-CandidateIndistinguishabilityObfuscationand..> 22-Dec-2014 11:54    633K
452-SecureChannelCodingSchemesbasedonPolarCodes..> 22-Dec-2014 11:54    796K
453-SecretDisclosureattackonKazahayaaYokingProo..> 22-Dec-2014 11:54    287K
454-HowtoUseIndistinguishabilityObfuscationDeni..> 22-Dec-2014 11:54    356K
455-AnotherNailintheCoffinofWhiteBoxAESImplemen..> 22-Dec-2014 11:54    347K
456-OntheSecurityofGroupbasedProxyReencryptionS..> 22-Dec-2014 11:54    243K
457-DeductionSoundnessProveOneGetFiveforFree.pdf   22-Dec-2014 11:54    622K
458-ExponentiatinginPairingGroups.pdf              22-Dec-2014 11:54    580K
459-ResetIndifferentiabilityanditsConsequences.pdf 22-Dec-2014 11:54    428K
460-SolvingTerminalRevocationinEACbyAugmentingT..> 22-Dec-2014 11:54    237K
461-HPAZaHighthroughputPipelineArchitectureofZU..> 22-Dec-2014 11:54    259K
462-VABKSVerifiableAttributebasedKeywordSearcho..> 22-Dec-2014 11:54    370K
463-SecretKeyCryptosystembasedonPolarCodesoverB..> 22-Dec-2014 11:53    505K
464-TowardsAPracticalJCJCivitasImplementation.pdf  22-Dec-2014 11:53    309K
465-PracticalProvablySecureDistanceBounding.pdf    22-Dec-2014 11:53    205K
465-PracticalampProvablySecureDistanceBounding.pdf 20-Jan-2023 08:31    205K
466-Efficientcomputationofadditionsubtractionch..> 22-Dec-2014 11:53    236K
467-AnalysisofBLAKE2.pdf                           22-Dec-2014 11:53    397K
468-HowToConstructExtractableOneWayFunctionsAga..> 22-Dec-2014 11:53    256K
469-VerifiableDelegationofComputationonOutsourc..> 22-Dec-2014 11:53    537K
470-PracticalCryptanalysisofaPublicKeyEncryptio..> 22-Dec-2014 11:53    390K
471-ObfuscatingConjunctions.pdf                    22-Dec-2014 11:53    472K
472-Partiallyblindpasswordbasedsignaturesusinge..> 22-Dec-2014 11:53    332K
473-TheNorwegianInternetVotingProtocol.pdf         22-Dec-2014 11:53    478K
474-EavesdroppingorDisruptingaCommunicationOnth..> 22-Dec-2014 11:53     48K
475-AnoteonverifyingtheAPNproperty.pdf             22-Dec-2014 11:53     76K
476-DependenceinIVrelatedbytesofRC4keyenhancesv..> 22-Dec-2014 11:53    495K
477-GoldenSequenceforthePPSSBroadcastEncryption..> 22-Dec-2014 11:53    513K
478-EnablingEndtoEndSecureCommunicationwithAnon..> 22-Dec-2014 11:53      1M
479-SecurityanalysisofQuantumReadoutPUFsintheca..> 22-Dec-2014 11:53    566K
480-EfficientMultipartyProtocolsviaLogDepthThre..> 22-Dec-2014 11:53    723K
481-CryptanalysisoftheHuangLiuYangCryptosystemf..> 22-Dec-2014 11:53     58K
482-BoundsinShallowsandinMiseries.pdf              22-Dec-2014 11:53    414K
483-AVariantofCoppersmith39sAlgorithmwithImprov..> 20-Jan-2023 08:31    416K
483-AVariantofCoppersmithsAlgorithmwithImproved..> 22-Dec-2014 11:53    416K
484-EfficientPublicIntegrityCheckingforCloudDat..> 20-Jan-2023 14:19     207
485-ANewObjectSearchingProtocolforMultitagRFID.pdf 20-Jan-2023 14:19     207
486-HandlingAuthenticationandDetectionProbabili..> 20-Jan-2023 14:19     207
487-ClassificationofElliptichyperellipticCurves..> 22-Dec-2014 11:53    182K
488-AdaptivelySecureBroadcastEncryptionunderSta..> 22-Dec-2014 11:53    271K
489-AnEfficientSchemeforCentralizedGroupKeyMana..> 22-Dec-2014 11:53    223K
490-ForanEPCC1G2RFIDcompliantProtocolCRCwithCon..> 22-Dec-2014 11:53    391K
491-ImprovedOTExtensionforTransferringShortSecr..> 22-Dec-2014 11:52    338K
492-CryptographicallyEnforcedRBAC.pdf              22-Dec-2014 11:52    439K
493-AnewclassofsemibentquadraticBooleanfunction..> 22-Dec-2014 11:52    126K
494-DifferentialFaultAttackagainstGrainfamilywi..> 22-Dec-2014 11:52    408K
495-RevocableIBESystemswithAlmostConstantsizeKe..> 22-Dec-2014 11:52    416K
496-RationalProtocolDesignCryptographyAgainstIn..> 22-Dec-2014 11:52    585K
497-ImprovementofCamenischNevenShelatObliviousT..> 22-Dec-2014 11:52     90K
498-NonMalleableCodesfromTwoSourceExtractors.pdf   22-Dec-2014 11:52    413K
499-LimitsonthePowerofCryptographicCheapTalk.pdf   22-Dec-2014 11:52    395K
500-ObfuscatingBranchingProgramsUsingBlackBoxPs..> 22-Dec-2014 11:52    423K
501-TypeBasedAnalysisofProtectedStorageintheTPM..> 22-Dec-2014 11:52    296K
502-ProvingTLSattackrelatedopenbiasesofRC4.pdf     22-Dec-2014 11:52    711K
503-Onsecretsharingwithnonlinearproductreconstr..> 22-Dec-2014 11:52    345K
504-AComparisonofDoublePointMultiplicationAlgor..> 22-Dec-2014 11:52    442K
505-ImprovementofOneAnonymousIdentityBasedEncry..> 22-Dec-2014 11:52    100K
506-AFormalProofofCountermeasuresAgainstFaultIn..> 22-Dec-2014 11:52    221K
507-SNARKsforCVerifyingProgramExecutionsSuccinc..> 22-Dec-2014 11:52      5M
508-MultiKeySearchableEncryption.pdf               22-Dec-2014 11:52    340K
509-ReplacingaRandomOracleFullDomainHashFromInd..> 22-Dec-2014 11:52    459K
510-DiscreteZigguratATimeMemoryTradeoffforSampl..> 22-Dec-2014 11:52    967K
511-LowDataComplexityBicliqueCryptanalysisofBlo..> 22-Dec-2014 11:52      2M
512-RoundingLLLFindingFasterSmallRootsofUnivari..> 22-Dec-2014 11:51    261K
513-EnforcingLanguageSemanticsUsingProofCarryin..> 22-Dec-2014 11:51    476K
514-LeakageResilientProofsofOwnershipinCloudSto..> 22-Dec-2014 11:51    588K
515-WhenPrivateSetIntersectionMeetsBigDataAnEff..> 22-Dec-2014 11:51    399K
516-AlgebraicMACsandKeyedVerificationAnonymousC..> 22-Dec-2014 11:51    513K
517-ImprovementofOneAdaptiveObliviousTransferSc..> 22-Dec-2014 11:51    125K
518-UniversalLeakyRandomOracleModel.pdf            20-Jan-2023 08:31    157K
519-MontgomeryMultiplicationUsingVectorInstruct..> 22-Dec-2014 11:51    464K
520-LocallyUpdatableandLocallyDecodableCodes.pdf   22-Dec-2014 11:51    577K
521-MultipleLimitedBirthdayDistinguishersandApp..> 22-Dec-2014 11:51    609K
522-TheResistanceofPRESENT80AgainstRelatedKeyDi..> 22-Dec-2014 11:51      3M
523-WhiteBoxSecurityNotionsforSymmetricEncrypti..> 22-Dec-2014 11:51    487K
524-ThresholdSecretImageSharing.pdf                22-Dec-2014 11:51    563K
525-CatenaAMemoryConsumingPasswordScramblingFra..> 22-Dec-2014 11:51    458K
526-DifferentialandLinearCryptanalysisofReduced..> 22-Dec-2014 11:51      1M
527-TheSpammedCodeOffsetMethod.pdf                 22-Dec-2014 11:51    316K
528-AnonymousHIBEfromStandardAssumptionsoverTyp..> 22-Dec-2014 11:51    429K
529-HowtoWithstandMobileVirusAttacksRevisited.pdf  22-Dec-2014 11:51    585K
530-TheParallelCutMeetInTheMiddleAttack.pdf        22-Dec-2014 11:51    415K
531-OntheLimitsofProvableAnonymity.pdf             22-Dec-2014 11:51    511K
532-OnaRelationbetweentheAtePairingandtheWeilPa..> 22-Dec-2014 11:51    108K
533-GossipLatinSquareandTheMeetAllGossipersProb..> 22-Dec-2014 11:51    348K
534-EfficientUnobservableAnonymousReportingagai..> 22-Dec-2014 11:50    406K
535-AcceleratingScalarConversionforKoblitzCurve..> 22-Dec-2014 11:50    166K
536-AThreeLevelSieveAlgorithmfortheShortestVect..> 22-Dec-2014 11:50    203K
537-InterFSPFundsTransferProtocol.pdf              22-Dec-2014 11:50      1M
538-PracticalIssueswithTLSClientCertificateAuth..> 22-Dec-2014 11:50    397K
539-ReboundattacksonStribog.pdf                    22-Dec-2014 11:50      3M
540-Onthesecurityofapasswordonlyauthenticatedth..> 22-Dec-2014 11:50     81K
541-LatticeBasedFHEasSecureasPKE.pdf               22-Dec-2014 11:50    407K
542-SearchingforNonlinearFeedbackShiftRegisters..> 22-Dec-2014 11:50    136K
543-CryptanalysisoftheSIMONFamilyofBlockCiphers..> 22-Dec-2014 11:50    568K
544-WarrantHidingDelegationbyCertificateProxySi..> 22-Dec-2014 11:50    406K
545-PrivateOverthresholdAggregationProtocolsove..> 22-Dec-2014 11:50    447K
546-TRS80withagrainofsalt.pdf                      22-Dec-2014 11:50    200K
547-AutomaticSecurityEvaluationofBlockCipherswi..> 22-Dec-2014 11:50    732K
548-DecompositionformulaoftheJacobiangroupofpla..> 22-Dec-2014 11:50    164K
549-EquationsSystemcomingfromWeildescentandsube..> 22-Dec-2014 11:50    138K
550-MoreEfficientCryptosystemsFromkthPowerResid..> 20-Jan-2023 08:31    556K
551-PuzzleEncryptionAlgorithm.pdf                  22-Dec-2014 11:50      1M
552-MoreEfficientObliviousTransferandExtensions..> 22-Dec-2014 11:50    742K
553-MultiValuedByzantineBroadcastthetltnCase.pdf   20-Jan-2023 08:30    371K
553-MultiValuedByzantineBroadcastthetnCase.pdf     22-Dec-2014 11:50    371K
554-FormallyProvedSecurityofAssemblyCodeAgainst..> 22-Dec-2014 11:50    897K
555-KeyExchangewithUnilateralAuthenticationComp..> 22-Dec-2014 11:50    314K
556-AlgebraicAspectsoftheRussianHashStandardGOS..> 22-Dec-2014 11:50    359K
557-BlackBoxObfuscationfordCNFs.pdf                22-Dec-2014 11:49    482K
558-Practicalapproachestovaryingnetworksizeinco..> 22-Dec-2014 11:49    367K
559-AConstructiveApproachtoFunctionalEncryption..> 22-Dec-2014 11:49    367K
559-ADefinitionalFrameworkforFunctionalEncrypti..> 20-Jan-2023 08:30    790K
560-SometimesRecurseShuffleAlmostRandomPermutat..> 22-Dec-2014 11:49    179K
561-PreimageattacksontheroundreducedKeccakwitht..> 22-Dec-2014 11:49    485K
562-Selfpairingsonsupersingularellipticcurveswi..> 22-Dec-2014 11:49    138K
563-VirtualBlackBoxObfuscationforAllCircuitsvia..> 22-Dec-2014 11:49    481K
564-CapacityofNonMalleableCodes.pdf                22-Dec-2014 11:49    416K
565-NonMalleableCodingAgainstBitwiseandSplitSta..> 22-Dec-2014 11:49    445K
566-AttackingPUFBasedPatternMatchingKeyGenerato..> 22-Dec-2014 11:49    633K
567-KDMSecurityintheHybridFramework.pdf            22-Dec-2014 11:49    405K
568-CryptanalysisoftheSpeckFamilyofBlockCiphers..> 22-Dec-2014 11:49    685K
569-MoreEfficientCryptosystemsFromkthPowerResid..> 22-Dec-2014 11:49    571K
570-NewEfficientIdentityBasedEncryptionFromFact..> 22-Dec-2014 11:49    297K
571-EfficientGeneralAdversaryMultiPartyComputat..> 22-Dec-2014 11:49    342K
572-QuadRC4MergingFourRC4Statestowardsa32bitStr..> 22-Dec-2014 11:49    309K
573-ImprovedMeetintheMiddleAttacksonAES192andPR..> 22-Dec-2014 11:49    418K
574-OntheMinimumNumberofMultiplicationsNecessar..> 22-Dec-2014 11:49    465K
575-EquivalencebetweenMACandPRFforBlockcipherba..> 22-Dec-2014 11:49    486K
576-ExtendedCriterionforAbsenceofFixedPoints.pdf   22-Dec-2014 11:49    311K
577-SecureTwoPartyComputationwithReusableBitCom..> 22-Dec-2014 11:49      2M
578-AMethodForGenerationOfHighNonlinearSBoxesBa..> 22-Dec-2014 11:49    164K
579-OnMeasurableSideChannelLeaksinsideASICDesig..> 22-Dec-2014 11:49      2M
580-RandomProjectionsGraphSparsificationandDiff..> 22-Dec-2014 11:48    271K
581-PriWhisperEnablingKeylessSecureAcousticComm..> 22-Dec-2014 11:48      3M
582-TheSpecialNumberFieldSieveinF_pnApplication..> 22-Dec-2014 11:48    809K
583-PolynomialSelectionfortheNumberFieldSievein..> 20-Jan-2023 08:30    256K
583-polynomialselectionforthenumberfieldsievein..> 22-Dec-2014 11:48    256K
584-CryptanalysisofGOSTRHashFunction.pdf           22-Dec-2014 11:48    551K
585-OnAlgebraicImmunityofTraceInverseFunctionso..> 22-Dec-2014 11:48    324K
586-GenericrelatedkeyandinducedchosenIVattacksu..> 22-Dec-2014 11:48    239K
587-ESPOONERBACEnforcingSecurityPoliciesinOutso..> 22-Dec-2014 11:48    649K
588-SPHFFriendlyNonInteractiveCommitments.pdf      22-Dec-2014 11:48      1M
589-SmashingMASH1.pdf                              22-Dec-2014 11:48    162K
590-EyeDecryptPrivateInteractionsinPlainSight.pdf  22-Dec-2014 11:48      5M
591-AnalysisoftheRainbowTradeoffAlgorithmUsedin..> 22-Dec-2014 11:48    373K
592-CryptanalysisoftheTooraniFalahatiHillCipher..> 22-Dec-2014 11:48    178K
593-EfficientOneSidedAdaptivelySecureComputatio..> 20-Jan-2023 08:30    489K
593-OneSidedAdaptivelySecureTwoPartyComputation..> 22-Dec-2014 11:48    523K
594-ALocalGlobalApproachtoSolvingIdealLatticePr..> 22-Dec-2014 11:48    419K
595-Enhancedcertificatetransparencyandendtoende..> 22-Dec-2014 11:48    233K
596-SolvingtheEllipticCurveDiscreteLogarithmPro..> 22-Dec-2014 11:48    316K
597-EfficientPairingsComputationonJacobiQuartic..> 22-Dec-2014 11:48    470K
598-FumingAcidandCryptanalysisHandyToolsforOver..> 22-Dec-2014 11:47      1M
599-FactoringRSAkeysfromcertifiedsmartcardsCopp..> 22-Dec-2014 11:47    360K
600-ImprovedCryptanalysisofReducedRIPEMD160.pdf    22-Dec-2014 11:47    451K
601-TworoundsecureMPCfromIndistinguishabilityOb..> 22-Dec-2014 11:47    453K
602-OntheEfficacyofSolvingLWEbyReductiontoUniqu..> 22-Dec-2014 11:47    455K
603-InvarianceBasedConcurrentErrorDetectionforA..> 22-Dec-2014 11:47    483K
604-ModellingTimeorAStepTowardsReductionbasedSe..> 22-Dec-2014 11:47    325K
605-Presentationofanewclassofpublickeycryptosys..> 22-Dec-2014 11:47    112K
606-Revocablequantumtimedreleaseencryption.pdf     22-Dec-2014 11:47    924K
607-CryptanalysisofFullRIPEMD128.pdf               22-Dec-2014 11:47    757K
608-TowardsOptimalLeakageExploitationRateinTemp..> 22-Dec-2014 11:47    149K
609-UltraLowPowerimplementationofECContheARMCor..> 22-Dec-2014 11:47    180K
610-KeyrecoveryAttacksonVariousROPUFConstructio..> 22-Dec-2014 11:47    658K
611-LimitedbirthdayDistinguishersforHashFunctio..> 22-Dec-2014 11:47    481K
612-SublinearBlindRingSignatureswithoutRandomOr..> 22-Dec-2014 11:47    296K
613-RecomputingwithPermutedOperandsAConcurrentE..> 22-Dec-2014 11:47      1M
614-Isextractingdatathesameaspossessingdata.pdf    22-Dec-2014 11:47    294K
615-PrivacyandVerifiabilityinVotingSystemsMetho..> 22-Dec-2014 11:47    563K
616-AcceleratingFullyHomomorphicEncryptionovert..> 22-Dec-2014 11:47    596K
617-Someresultsconcerningglobalavalanchecharact..> 22-Dec-2014 11:47    313K
618-SecurityAmplificationagainstMeetintheMiddle..> 22-Dec-2014 11:47    228K
619-FaultInjectionModelingAttackson65nmArbitera..> 22-Dec-2014 11:47    391K
620-DoIknowyouEfficientandPrivacyPreservingComm..> 22-Dec-2014 11:47      1M
621-MultiLHLprotocol.pdf                           22-Dec-2014 11:46    363K
622-DecentralizedAnonymousCredentials.pdf          22-Dec-2014 11:46    595K
623-OffPathHackingTheIllusionofChallengeRespons..> 22-Dec-2014 11:46    561K
624-NewIntegerFFTMultiplicationArchitecturesand..> 20-Jan-2023 14:19     207
625-PillarBoxCombatingnextgenerationmalwarewith..> 22-Dec-2014 11:46      1M
626-ImprovedLinearAttacksontheChineseBlockCiphe..> 22-Dec-2014 11:46    229K
627-FlexibleandPubliclyVerifiableAggregationQue..> 22-Dec-2014 11:46    416K
628-ParallelizableRate1AuthenticatedEncryptionf..> 22-Dec-2014 11:46    939K
629-SecureKeyManagementintheCloud.pdf              22-Dec-2014 11:46    990K
630-EstimatingKeySizesForHighDimensionalLattice..> 22-Dec-2014 11:46    214K
631-ProtectingObfuscationAgainstAlgebraicAttack..> 22-Dec-2014 11:46    510K
632-CombinedModelingandSideChannelAttacksonStro..> 22-Dec-2014 11:46    183K
633-FourMeasuresofNonlinearity.pdf                 22-Dec-2014 11:46    508K
634-ImprovedLinearSievingTechniqueswithApplicat..> 22-Dec-2014 11:46    388K
635-Universalsecurityfrombitsandmipstopoolslake..> 22-Dec-2014 11:46    199K
636-SCAREofSecretCipherswithSPNStructures.pdf      22-Dec-2014 11:46    660K
637-DetectionofAlgebraicManipulationinthePresen..> 22-Dec-2014 11:46    500K
638-DFABasedFunctionalEncryptionAdaptiveSecurit..> 22-Dec-2014 11:46    462K
639-Differentially4UniformBijectionsbyPermuting..> 22-Dec-2014 11:46    279K
640-CommunicationEfficientMPCforGeneralAdversar..> 22-Dec-2014 11:46    360K
641-IndistinguishabilityObfuscationvsAuxiliaryI..> 22-Dec-2014 11:46    409K
642-MultipartyKeyExchangeEfficientTraitorTracin..> 22-Dec-2014 11:46    658K
643-ThereisnoIndistinguishabilityObfuscationinP..> 22-Dec-2014 11:46    101K
644-EllipticandHyperellipticCurvesaPracticalSec..> 22-Dec-2014 11:45    495K
645-FlexDPDPFlexListbasedOptimizedDynamicProvab..> 22-Dec-2014 11:45      3M
646-DirectChosenCiphertextSecureAttributeBasedK..> 22-Dec-2014 11:45    381K
647-Anoteonhighsecuritygeneralpurposeellipticcu..> 22-Dec-2014 11:45    371K
648-IntegralDistinguishersforReducedroundStribo..> 22-Dec-2014 11:45      4M
649-SecurityAnalysisofPasswordAuthenticatedKeyR..> 22-Dec-2014 11:45    229K
650-OnExtractabilityakaDifferingInputsObfuscati..> 22-Dec-2014 11:45    520K
651-ACloserLookatMultipleForkingLeveragingIndep..> 22-Dec-2014 11:45    479K
652-EfficientModularArithmeticforSIMDDevices.pdf   22-Dec-2014 11:45    261K
653-RKAKDMsecureencryptionfrompublickeyencrypti..> 22-Dec-2014 11:45    443K
654-LeakageResilientChosenCiphertextSecurePubli..> 22-Dec-2014 11:45    600K
655-PrivacyPreservingMultiPartyReconciliationSe..> 22-Dec-2014 11:45    506K
656-BiasbasedmodelingandentropyanalysisofPUFs.pdf  22-Dec-2014 11:45      3M
657-NewTrapdoorProjectionMapsforCompositeOrderB..> 22-Dec-2014 11:45    510K
658-Parallelauthenticatedencryptionwiththeduple..> 22-Dec-2014 11:45    341K
659-Aprovablesecureanonymousproxysignatureschem..> 22-Dec-2014 11:45    467K
660-DiscreteLogarithmsandMordellWeilGroups.pdf     22-Dec-2014 11:45    288K
661-Privateaggregationonuntrustedserverswithcus..> 22-Dec-2014 11:45    367K
662-FineTuningGrothSahaiProofs.pdf                 22-Dec-2014 11:44    389K
663-LinearCryptanalysisofRoundReducedSIMON.pdf     22-Dec-2014 11:44    582K
664-TUCTimesensitiveandModularAnalysisofAnonymo..> 22-Dec-2014 11:44    781K
665-TheImpossibilityofObfuscationwithaUniversal..> 22-Dec-2014 11:44    270K
666-AnOfflineDictionaryAttackagainstaThreeParty..> 22-Dec-2014 11:44    109K
667-ATPMDiffieHellmanOracle.pdf                    22-Dec-2014 11:44    196K
668-ObfuscationforEvasiveFunctions.pdf             22-Dec-2014 11:44    421K
669-AttributeBasedEncryptionforArithmeticCircui..> 22-Dec-2014 11:44    477K
670-SwitchingLemmaforBilinearTestsandConstantsi..> 22-Dec-2014 11:44    545K
671-RobustPseudorandomGenerators.pdf               22-Dec-2014 11:44    441K
672-Easyscalardecompositionsforefficientscalarm..> 22-Dec-2014 11:44    336K
673-TrapstotheBGJTAlgorithmforDiscreteLogarithm..> 22-Dec-2014 11:44    245K
674-CryptanalysisofIteratedEvenMansourSchemeswi..> 22-Dec-2014 11:44    387K
675-APracticalRelatedKeyBoomerangAttackfortheFu..> 22-Dec-2014 11:44    216K
676-AutomaticSecurityEvaluationandRelatedkeyDif..> 22-Dec-2014 11:44    787K
677-BoundedTamperResilienceHowtogobeyondtheAlge..> 22-Dec-2014 11:44    494K
678-Universallycomposableprivacypreservingfinit..> 22-Dec-2014 11:44    375K
679-Formalverificationofasoftwarecountermeasure..> 22-Dec-2014 11:44    391K
680-ABlackBoxConstructionofaCCA2EncryptionSchem..> 22-Dec-2014 11:44    362K
681-PublicKeyEncryptionwithWeakRandomnessSecuri..> 22-Dec-2014 11:44    335K
682-SecretKeyCryptosystembasedonNonSystematicPo..> 22-Dec-2014 11:44    706K
683-SeparationsinCircularSecurityforArbitraryLe..> 22-Dec-2014 11:44    265K
684-FullyBideniablePublicKeyEncryption.pdf         22-Dec-2014 11:44    306K
685-SolvingshortestandclosestvectorproblemsThed..> 22-Dec-2014 11:44      1M
686-Newabstractionsinappliedpicalculusandautoma..> 22-Dec-2014 11:43    334K
687-HowtoCompressReusableGarbledCircuits.pdf       22-Dec-2014 11:43    465K
688-UnbalancingPairingBasedKeyExchangeProtocols..> 22-Dec-2014 11:43     96K
689-DifferingInputsObfuscationandApplications.pdf  22-Dec-2014 11:43    491K
690-ObfuscationINDCPASecurityCircularSecurity.pdf  22-Dec-2014 11:43    343K
690-ObfuscationgtINDCPASecuritygtCircularSecuri..> 20-Jan-2023 08:30    343K
691-NonMalleabilityfromMalleabilitySimulationSo..> 22-Dec-2014 11:43    600K
692-FasterCompactDiffieHellmanEndomorphismsonth..> 22-Dec-2014 11:43    311K
693-SecureKeyExchangeandSessionsWithoutCredenti..> 22-Dec-2014 11:43    462K
694-WriteOnlyObliviousRAMbasedPrivacyPreservedA..> 22-Dec-2014 11:43   1023K
695-AEGISAFastAuthenticatedEncryptionAlgorithm.pdf 22-Dec-2014 11:43    135K
696-ExaminationofaNewDefenseMechanismHoneywords..> 22-Dec-2014 11:43     65K
697-AMoreEfficientAESThresholdImplementation.pdf   22-Dec-2014 11:43      8M
698-Cryptanalysisandimprovementofadynamicandsec..> 22-Dec-2014 11:43     79K
699-BootstrappingObfuscatorsviaFastPseudorandom..> 22-Dec-2014 11:43    331K
700-HigherOrderMaskingofLookupTables.pdf           22-Dec-2014 11:43    413K
701-MoreontheImpossibilityofVirtualBlackBoxObfu..> 22-Dec-2014 11:43    265K
702-EfficientNonMalleableCodesandKeyDerivationf..> 22-Dec-2014 11:43    463K
703-LimitsofExtractabilityAssumptionswithDistri..> 22-Dec-2014 11:43    468K
704-AdaptiveWitnessEncryptionandAsymmetricPassw..> 22-Dec-2014 11:43    483K
705-SymmetricDigitSetsforEllipticCurveScalarMul..> 22-Dec-2014 11:43    382K
706-HowtoCertifytheLeakageofaChip.pdf              22-Dec-2014 11:42    759K
707-AreductionofSemigroupDLPtoclassicDLP.pdf       20-Jan-2023 08:30    278K
707-AreductionofsemigroupDLPtoclassicDLP.pdf       22-Dec-2014 11:42    255K
708-KeyDerivationWithoutEntropyWaste.pdf           22-Dec-2014 11:42    494K
709-EfficientStatisticalZeroKnowledgeAuthentica..> 22-Dec-2014 11:42    792K
709-EfficientStatisticalZeroKnowledgeAuthentica..> 20-Jan-2023 08:30    812K
710-AnApproachtoReduceStorageforHomomorphicComp..> 22-Dec-2014 11:42    442K
711-AmbiguousOneMoveNominativeSignatureWithoutR..> 22-Dec-2014 11:42    494K
712-PUFBasedRFIDAuthenticationSecureandPrivateu..> 22-Dec-2014 11:42    151K
713-CryptanalysisofZorro.pdf                       22-Dec-2014 11:42    419K
714-Methodtosecuredatainthecloudwhilepreserving..> 22-Dec-2014 11:42    262K
715-PracticalForwardSecureRangeandSortQuerieswi..> 22-Dec-2014 11:42    312K
716-ASecureObfuscatorforEncryptedBlindSignature..> 22-Dec-2014 11:42    157K
717-NICVNormalizedInterClassVarianceforDetectio..> 22-Dec-2014 11:42    645K
718-NTRUKEALatticebasedPublicKeyExchangeProtoco..> 22-Dec-2014 11:42    161K
719-ConstructingConfidentialChannelsfromAuthent..> 22-Dec-2014 11:42    502K
720-OutsourcedSymmetricPrivateInformationRetrie..> 22-Dec-2014 11:42    573K
721-DeepAttacksofaCertificatelessSignatureSchem..> 22-Dec-2014 11:42     63K
722-TheRealmofthePairings.pdf                      22-Dec-2014 11:42    534K
723-AmplifyingPrivacyinPrivacyAmplification.pdf    22-Dec-2014 11:42    365K
724-VerifiableSetOperationsoverOutsourcedDataba..> 22-Dec-2014 11:42    483K
725-MobileTransactionoverNFCandGSM.pdf             20-Jan-2023 14:19     207
726-HomomorphicAuthenticatedEncryptionSecureAga..> 22-Dec-2014 11:42    344K
727-MultiInputFunctionalEncryption.pdf             22-Dec-2014 11:42    519K
728-ModifiedAlternatingStepGenerators.pdf          22-Dec-2014 11:42    587K
729-FunctionalEncryptionforRandomizedFunctional..> 22-Dec-2014 11:42    408K
730-StampExtendInstantbutUndeniableTimestamping..> 22-Dec-2014 11:42    505K
730-StampampExtendInstantbutUndeniableTimestamp..> 20-Jan-2023 08:30    505K
731-ConstructingDifferentially4uniformPermutati..> 22-Dec-2014 11:41    372K
732-SSSV2SecureSimilaritySearch.pdf                22-Dec-2014 11:41    394K
733-AKeyCompromiseImpersonationattackagainstWan..> 20-Jan-2023 08:30     80K
734-EllipticCurveCryptographyinPractice.pdf        22-Dec-2014 11:41    576K
735-MaskingTablesAnUnderestimatedSecurityRisk.pdf  22-Dec-2014 11:41    348K
736-TRS80WithAKeccakSpongeCake.pdf                 22-Dec-2014 11:41    353K
737-WeaknessofF_361429andF_243041forDiscreteLog..> 22-Dec-2014 11:41    218K
738-OntheResilienceandUniquenessofCPAforSecureB..> 22-Dec-2014 11:41    415K
739-NEWDIGITALSIGNATURESCHEMEUSINGMULTIPLEPRIVA..> 22-Dec-2014 11:41     95K
740-AnefficientFHEproposalbasedonthehardnessofs..> 22-Dec-2014 11:41    230K
741-FastSoftwareImplementationofBinaryEllipticC..> 22-Dec-2014 11:41    502K
742-CODINGStreamCipherMethodsbyVaryingComponent..> 22-Dec-2014 11:41    234K
743-PrivacyPreservingUniqueStatisticsinaSmartGr..> 20-Jan-2023 08:30    365K
744-FunctionPrivateFunctionalEncryptionandPrope..> 22-Dec-2014 11:41    654K
744-FunctionalEncryptionandPropertyPreservingEn..> 20-Jan-2023 08:30    559K
745-AsynchronousMPCwithaStrictHonestMajorityUsi..> 22-Dec-2014 11:41    487K
746-AsymptoticallyEfficientLatticeBasedDigitalS..> 22-Dec-2014 11:41    370K
747-AuthenticatedMultipleKeyEstablishmentProtoc..> 22-Dec-2014 11:41    104K
748-PlaintextRecoveryAttacksAgainstWPATKIP.pdf     22-Dec-2014 11:41      2M
749-EfficientCCAsecureThresholdPublicKeyEncrypt..> 22-Dec-2014 11:41     92K
750-FullyDeniableMutualAuthenticationProtocolBa..> 22-Dec-2014 11:41     74K
751-UsingHamiltonianTotemsasPasswords.pdf          22-Dec-2014 11:41      1M
752-OnthePowerofRewindingSimulatorsinFunctional..> 22-Dec-2014 11:41    580K
753-DietaryRecommendationsforLightweightBlockCi..> 22-Dec-2014 11:41    362K
754-ObfuscationbasedNonblackboxSimulationandFou..> 22-Dec-2014 11:41    547K
755-Improvingsecurityandefficiencyformultiautho..> 20-Jan-2023 14:19     207
756-AMeetintheMiddleAttackonRoundReducedmCrypto..> 20-Jan-2023 08:30      3M
756-AMeetinthemiddleAttackonRoundReducedmCrypto..> 22-Dec-2014 11:41      3M
757-PracticalSignaturesfromthePartialFourierRec..> 22-Dec-2014 11:40    410K
758-ARevocableOnlineOfflineCertificatelessSigna..> 22-Dec-2014 11:40    361K
759-VectorizationofChaChaStreamCipher.pdf          22-Dec-2014 11:40    705K
760-OncrossjoiningdeBruijnsequences.pdf            22-Dec-2014 11:40    227K
761-MultiusercollisionsApplicationstoDiscreteLo..> 22-Dec-2014 11:40    395K
762-SelfUpdatableEncryptionTimeConstrainedAcces..> 22-Dec-2014 11:40    505K
763-PredicateandAttributeHidingInnerProductEncr..> 22-Dec-2014 11:40    443K
764-DynamicCountermeasureAgainsttheZeroPowerAna..> 22-Dec-2014 11:40    511K
765-KurosawaDesmedtKeyEncapsulationMechanismRev..> 22-Dec-2014 11:40      1M
766-RankSignanefficientsignaturealgorithmbasedo..> 22-Dec-2014 11:40    392K
767-MisuseResistantParallelAuthenticatedEncrypt..> 22-Dec-2014 11:40    691K
768-VMPCRCryptographicallySecurePseudoRandomNum..> 22-Dec-2014 11:40    260K
769-BroadcastAmplification.pdf                     22-Dec-2014 11:40    394K
770-EfficientTemplateAttacks.pdf                   22-Dec-2014 11:40      1M
771-TOTaFastMultivariatePublicKeyCryptosystemwi..> 22-Dec-2014 11:40    327K
772-BeyondModesBuildingaSecureRecordProtocolfro..> 22-Dec-2014 11:40    290K
773-CBEAMEfficientAuthenticatedEncryptionfromFe..> 22-Dec-2014 11:40    461K
774-MultiInputFunctionalEncryption.pdf             22-Dec-2014 11:40    527K
775-DifferentialCryptanalysisandLinearDistingui..> 22-Dec-2014 11:39    485K
776-LocationLeakageinDistanceBoundingWhyLocatio..> 22-Dec-2014 11:39    266K
777-ConstructionofMultiplicativeMonotoneSpanPro..> 22-Dec-2014 11:39    301K
778-MultiStageFaultAttacksonBlockCiphers.pdf       22-Dec-2014 11:39    381K
779-DistributedGroupAuthenticationforRFIDSupply..> 22-Dec-2014 11:39    345K
780-ADistinguishattackonRabbitStreamCipherBased..> 22-Dec-2014 11:39    109K
781-IndistinguishabilityObfuscationfromSemantic..> 22-Dec-2014 11:39    843K
782-HowDidDreadPirateRobertsAcquireandProtectHi..> 22-Dec-2014 11:39      1M
783-ECCBasedNonInteractiveDeniableAuthenticatio..> 22-Dec-2014 11:39    396K
784-SecureMultipartyComputationsonBitcoin.pdf      22-Dec-2014 11:39    394K
785-EfficientLeakageResilientSignatureSchemesin..> 22-Dec-2014 11:39    415K
786-TreeBasedSymmetricKeyBroadcastEncryption.pdf   22-Dec-2014 11:39    569K
787-WideweakPrivacyPreservingRFIDMutualAuthenti..> 22-Dec-2014 11:39    383K
788-ImprovementofLinTzengSolutiontoYao39sMillio..> 20-Jan-2023 08:30     87K
788-ImprovementofLinTzengSolutiontoYaosMilliona..> 22-Dec-2014 11:39     87K
789-ProofsofDataPossessionandRetrievabilityBase..> 22-Dec-2014 11:39    440K
790-ParallelizableandAuthenticatedOnlineCiphers..> 22-Dec-2014 11:39    389K
791-APEAuthenticatedPermutationBasedEncryptionf..> 22-Dec-2014 11:39    334K
792-ImprovedAuthenticityBoundofEAXandRefinement..> 22-Dec-2014 11:39    267K
793-Afastintegerbasedbatchfullhomomorphicencryp..> 22-Dec-2014 11:39    240K
794-BehindtheSceneofSideChannelAttacks.pdf         22-Dec-2014 11:39      2M
795-InsecurityofAnAnonymousAuthenticationForPri..> 22-Dec-2014 11:39     84K
796-ProofsofSpace.pdf                              22-Dec-2014 11:39    494K
797-TamperResilientCircuitsTheAdversaryattheGat..> 22-Dec-2014 11:39    524K
798-AGenericChosenCiphertextKeyLeakageSecurePub..> 20-Jan-2023 14:19     207
799-NewInsightintotheIsomorphismofPolynomialspr..> 22-Dec-2014 11:38    326K
800-AlgebraicPropertiesoftheCubeAttack.pdf         22-Dec-2014 11:38    601K
801-AuthenticatingComputationonGroupsNewHomomor..> 22-Dec-2014 11:38    467K
802-CryptosystemsResilienttoBothContinualKeyLea..> 22-Dec-2014 11:38    170K
803-FullyAlmostTightlySecureIBEfromStandardAssu..> 22-Dec-2014 11:38    223K
804-GroupSignaturewithrelaxedprivacyandrevocabi..> 22-Dec-2014 11:38    401K
805-ProofsofSpaceWhenSpaceisoftheEssence.pdf       22-Dec-2014 11:38    510K
806-EfficientAnonymousCompactHIBEFromStandardAs..> 22-Dec-2014 11:38    491K
807-DistributedKeyGenerationforSecureEncryptedD..> 22-Dec-2014 11:38    286K
808-SecrecywithoutPerfectRandomnessCryptography..> 22-Dec-2014 11:38    545K
809-RidingtheSaddlePointasymptoticsofthecapacit..> 22-Dec-2014 11:38    243K
810-FormalAnalysisofCRTRSAVigilant39sCountermea..> 20-Jan-2023 08:30    468K
810-FormalAnalysisofCRTRSAVigilantsCountermeasu..> 22-Dec-2014 11:38    468K
811-ConstantRoundBlackBoxConstructionofComposab..> 22-Dec-2014 11:38    630K
812-ANoteonBilinearGroupsofaLargeCompositeOrder..> 22-Dec-2014 11:38     57K
813-MulticiphersuitesecurityoftheSecureShellSSH..> 22-Dec-2014 11:38    516K
814-RDASASymmetricKeySchemeforAuthenticatedQuer..> 22-Dec-2014 11:38    344K
815-Iteratedgroupproductsandleakageresilienceag..> 22-Dec-2014 11:38    180K
816-FastPrimeFieldEllipticCurveCryptographywith..> 22-Dec-2014 11:38    765K
817-InteractiveEncryptionandMessageAuthenticati..> 22-Dec-2014 11:38    500K
818-OntheRelationofRandomGridProbabilisticandDe..> 22-Dec-2014 11:38    437K
819-Safeenclosurestowardscryptographictechnique..> 22-Dec-2014 11:38    337K
820-OntheSecurityofRecentlyProposedRFIDProtocol..> 20-Jan-2023 14:19     207
821-ExactSmoothProjectiveHashFunctionbasedonLWE..> 20-Jan-2023 14:19     207
822-LeakageResilientFullyHomomorphicEncryption.pdf 22-Dec-2014 11:38    437K
823-AnotherLookatXCB.pdf                           22-Dec-2014 11:37    718K
824-FairandEfficientSecureMultipartyComputation..> 22-Dec-2014 11:37    475K
825-EPCGen2PseudorandomNumberGeneratorsAnalysis..> 20-Jan-2023 14:19     207
826-Securemultipartydataanalysisenduservalidati..> 22-Dec-2014 11:37    969K
827-LowerBoundsintheHardwareTokenModel.pdf         22-Dec-2014 11:37    655K
828-DecentralizedTraceableAttributeBasedSignatu..> 22-Dec-2014 11:37    351K
829-IsBitcoinaDecentralizedCurrency.pdf            22-Dec-2014 11:37    154K
830-PropertyPreservingSymmetricEncryptionRevisi..> 22-Dec-2014 11:37    412K
831-ProvableSecurityProofsandtheirInterpretatio..> 22-Dec-2014 11:37    283K
832-PracticalDynamicSearchableEncryptionwithSma..> 22-Dec-2014 11:37    570K
833-VerifierBasedPasswordAuthenticatedKeyExchan..> 22-Dec-2014 11:37    808K
834-KeylessSignatures39InfrastructureHowtoBuild..> 20-Jan-2023 08:30    562K
834-KeylessSignaturesInfrastructureHowtoBuildGl..> 22-Dec-2014 11:37    562K
835-AModularFrameworkforBuildingVariableInputLe..> 22-Dec-2014 11:37    705K
836-IdentityBasedKeyEncapsulationMechanismfromM..> 22-Dec-2014 11:37    248K
837-FairTwoPartyComputationsviaBitcoinDeposits.pdf 22-Dec-2014 11:37    295K
838-Animprovedcompressiontechniqueforsignatures..> 22-Dec-2014 11:37    445K
839-LatticeDecodingAttacksonBinaryLWE.pdf          22-Dec-2014 11:37    203K
840-EfficientUniversallyComposableObliviousTran..> 22-Dec-2014 11:37    498K
841-TrustViewsfortheWebPKI.pdf                     22-Dec-2014 11:37    384K
842-DetectingHiddenLeakages.pdf                    22-Dec-2014 11:37      2M
843-AStudyofGoldbach39sconjectureandPolignac39s..> 20-Jan-2023 08:30     63K
843-AStudyofGoldbachsconjectureandPolignacsconj..> 22-Dec-2014 11:37     63K
844-Agenericviewontraceandrevokebroadcastencryp..> 22-Dec-2014 11:37    450K
845-HowtoKeepaSecretLeakageDeterringPublickeyCr..> 22-Dec-2014 11:37    313K
846-AnewattackonRSAwithacomposeddecryptionexpon..> 20-Jan-2023 08:30    187K
847-UltralightweightcryptographyforpassiveRFIDs..> 20-Jan-2023 14:19     207
848-WeaknessofSeveralIdentitybasedTripartiteAut..> 22-Dec-2014 11:36     82K
849-PushingtheLimitofNonProfilingDPAusingMultiv..> 22-Dec-2014 11:36    341K
850-SecureFloatingPointArithmeticandPrivateSate..> 22-Dec-2014 11:36      1M
851-PowerandTimingSideChannelsforPUFsandtheirEf..> 22-Dec-2014 11:36    342K
852-ImprovedBoomerangAttacksonRoundReducedSM3an..> 22-Dec-2014 11:36    276K
853-AutomaticSearchforDifferentialTrailsinARXCi..> 22-Dec-2014 11:36    374K
854-MultipleUseTransferableECash.pdf               22-Dec-2014 11:36    125K
855-WeaknessesinaRecentlyProposedRFIDAuthentica..> 22-Dec-2014 11:36    257K
856-TightlySecureSignaturesFromLossyIdentificat..> 22-Dec-2014 11:36    464K
857-RSAKeyExtractionviaLowBandwidthAcousticCryp..> 22-Dec-2014 11:36      8M
858-PracticalDualReceiverEncryptionSoundnessCom..> 22-Dec-2014 11:36    523K
859-UsingtheJointDistributionsofaCryptographicF..> 22-Dec-2014 11:36    223K
860-OntheImplausibilityofDifferingInputsObfusca..> 22-Dec-2014 11:36    375K
861-PrivacyPreservingEnforcementofSensitivePoli..> 22-Dec-2014 11:36      2M
862-HowtoDelegateComputationsThePowerofNoSignal..> 22-Dec-2014 11:36   1008K
863-FormalTreatmentofDistributedTrustinElectron..> 22-Dec-2014 11:36    450K
864-NearlineartimeLeakageresilientKeyEvolutionS..> 22-Dec-2014 11:36    217K
865-SNRtoSuccessRateReachingtheLimitofNonProfil..> 22-Dec-2014 11:36    686K
866-CompactRingLWEbasedCryptoprocessor.pdf         22-Dec-2014 11:35    238K
867-LHashALightweightHashFunctionFullVersion.pdf   22-Dec-2014 11:35      1M
868-TheoreticalBitcoinAttackswithlessthanHalfof..> 22-Dec-2014 11:35    313K
869-HowtoFakeAuxiliaryInput.pdf                    22-Dec-2014 11:35    306K
870-AnewclassofhyperbentfunctionsandKloosterman..> 22-Dec-2014 11:35    163K
871-AUnifiedSecurityModelofAuthenticatedKeyExch..> 22-Dec-2014 11:35    207K
872-Withdrawn.pdf                                  18-Aug-2023 00:00     207
873-PolyManyHardcoreBitsforAnyOneWayFunctionand..> 22-Dec-2014 11:35    446K
874-ConstantRoundRationalSecretSharingwithOptim..> 22-Dec-2014 11:35    188K
874-GeneralConstructionsofRationalSecretSharing..> 20-Jan-2023 08:30    187K
875-PolicyBasedNoninteractiveOutsourcingofCompu..> 22-Dec-2014 11:35    421K
876-PublicKeyEncryptionwithLazyParties.pdf         22-Dec-2014 11:35    144K
877-MQSignatureandProxySignatureSchemeswithExac..> 22-Dec-2014 11:35    459K
878-EfficientHardwareImplementationofMQAsymmetr..> 22-Dec-2014 11:35    345K
879-SuccinctNonInteractiveZeroKnowledgeforavonN..> 22-Dec-2014 11:35      1M
880-NewConstructionsofRevocableIdentityBasedEnc..> 22-Dec-2014 11:35    378K
881-AcceleratingBitcoin39sTransactionProcessing..> 20-Jan-2023 08:30    261K
881-AcceleratingBitcoinsTransactionProcessingFa..> 22-Dec-2014 11:35    214K
882-NewSpeedRecordsforMontgomeryModularMultipli..> 22-Dec-2014 11:35    364K