Index of /2014/
../
001-CommentsonEIBASanefficientidentitybroadcast..> 02-Jan-2015 10:42 188K
002-PseudorandomGeneratorBasedonHardLatticeProb..> 02-Jan-2015 10:42 255K
003-GF2nBitParallelSquarerUsingGeneralizedPolyn..> 02-Jan-2015 10:42 215K
004-MaxMinMaxproblemandsparseequationsoverfinit..> 02-Jan-2015 10:42 341K
005-TheanalysisoftheKeccakwiththenewmethodcalle..> 20-Jan-2023 14:19 207
006-EfficientNonInteractiveZeroKnowledgeArgumen..> 02-Jan-2015 10:42 415K
007-OneWeirdTricktoStopSelfishMinersFreshBitcoi..> 02-Jan-2015 10:42 203K
008-ATheoreticalStudyofKolmogorovSmirnovDisting..> 02-Jan-2015 10:42 598K
009-CharacterizationofEMEwithLinearMixing.pdf 02-Jan-2015 10:42 413K
010-ACertificateBasedProxySignaturewithMessageR..> 02-Jan-2015 10:42 415K
011-ConstructionofNewFamiliesof8206MDS8206Diffu..> 02-Jan-2015 10:42 108K
011-ConstructionofNewFamiliesofMDSDiffusionLaye..> 20-Jan-2023 08:30 108K
012-MaximalInformationCoefficientAnalysis.pdf 02-Jan-2015 10:42 2M
013-ANovelModularAdderforOneThousandBitsandMore..> 20-Jan-2023 14:19 207
014-LinkableMessageTaggingSolvingtheKeyDistribu..> 20-Jan-2023 08:30 528K
014-LinkableMessageTaggingSolvingthekeydistribu..> 02-Jan-2015 10:41 511K
015-TightSecurityBoundsforTripleEncryption.pdf 02-Jan-2015 10:41 428K
016-TripleandQuadrupleEncryptionBridgingtheGaps..> 02-Jan-2015 10:41 509K
017-Tworoundpasswordonlyauthenticatedkeyexchang..> 20-Jan-2023 08:30 188K
018-CompletenessforSymmetricTwoPartyFunctionali..> 02-Jan-2015 10:41 177K
019-LazyModulusSwitchingfortheBKWAlgorithmonLWE..> 02-Jan-2015 10:41 528K
020-DeConstructingTLS.pdf 02-Jan-2015 10:41 654K
021-OnlineOfflineAttributeBasedEncryption.pdf 02-Jan-2015 10:41 327K
022-Ultralightweight8bitMultiplicativeInverseBa..> 02-Jan-2015 10:41 238K
023-SolvingRandomSubsetSumProblembyl_pnormSVPOr..> 02-Jan-2015 10:41 194K
024-AnEfficientPseudoRandomGeneratorwithApplica..> 02-Jan-2015 10:41 237K
025-SideChannelLeakagethroughStaticPowerShouldW..> 02-Jan-2015 10:41 804K
026-StudyingPotentialSideChannelLeakagesonanEmb..> 02-Jan-2015 10:41 1M
027-TwistingEdwardscurveswithisogenies.pdf 02-Jan-2015 10:41 159K
028-ChannelEqualizationforSideChannelAttacks.pdf 02-Jan-2015 10:41 455K
029-GeneralImpossibilityofGroupHomomorphicEncry..> 02-Jan-2015 10:41 406K
030-LyraPasswordBasedKeyDerivationwithTunableMe..> 02-Jan-2015 10:41 1020K
031-OntheDesignofLILTestsforPseudoRandomGenerat..> 02-Jan-2015 10:41 601K
032-ScaleInvariantFullyHomomorphicEncryptionove..> 02-Jan-2015 10:41 456K
033-LatticebasedGroupSignatureSchemewithVerierl..> 20-Jan-2023 08:30 527K
033-LatticebasedGroupSignatureSchemewithVerifie..> 02-Jan-2015 10:41 518K
034-AuthenticatedEncryptionwithSPECK.pdf 02-Jan-2015 10:41 149K
035-AnewattackonRSAwithacomposeddecryptionexpon..> 02-Jan-2015 10:41 187K
036-ASecureTextMessagingProtocol.pdf 02-Jan-2015 10:41 275K
037-OntheSecurityofthePreSharedKeyCiphersuiteso..> 02-Jan-2015 10:41 695K
038-ExtendingandApplyingaFrameworkfortheCryptog..> 02-Jan-2015 10:40 378K
039-HomomorphicAESEvaluationusingNTRU.pdf 02-Jan-2015 10:40 354K
040-AFastModularReductionMethod.pdf 02-Jan-2015 10:40 110K
041-Cryptanalysisviaalgebraicspans.pdf 20-Jan-2023 08:29 338K
041-Practicalpolynomialtimesolutionsofseveralma..> 02-Jan-2015 10:40 285K
042-ANewAlgorithmforSolvingtheGeneralApproximat..> 02-Jan-2015 10:40 299K
043-ElligatorSquaredUniformPointsonEllipticCurv..> 02-Jan-2015 10:40 415K
044-rPIRRampSecretSharingbasedCommunicationEffi..> 02-Jan-2015 10:40 961K
045-HumanAssistedRandomnessGenerationUsingVideo..> 02-Jan-2015 10:40 649K
046-Cryptoanalysesonuserefficientrecoverableoff..> 02-Jan-2015 10:40 229K
047-DowntheRabbitHoleRevisitingtheShrinkingMeth..> 02-Jan-2015 10:40 450K
048-WhenaBooleanFunctioncanbeExpressedastheSumo..> 02-Jan-2015 10:40 119K
049-DataSecurityinCloudArchitectureBasedonDiffi..> 02-Jan-2015 10:40 560K
050-SomeTheoreticalConditionsforMenezesQuVansto..> 02-Jan-2015 10:40 675K
051-AnEquivalencePreservingTransformationofShif..> 02-Jan-2015 10:40 160K
052-DAArelatedAPIsinTPM20Revisited.pdf 02-Jan-2015 10:40 319K
053-MaskingandLeakageResilientPrimitivesOnetheO..> 02-Jan-2015 10:40 3M
054-TheFourierEntropyInfluenceconjectureholdsfo..> 02-Jan-2015 10:40 378K
055-SecurityEnhancedAnonymousMultiServerAuthent..> 02-Jan-2015 10:40 2M
056-LowProbabilityDifferentialsandtheCryptanaly..> 02-Jan-2015 10:40 378K
057-ComputingDiscreteLogarithmsinF_36137andF_36..> 02-Jan-2015 10:40 233K
058-CryptanalysisofFIDES.pdf 02-Jan-2015 10:40 758K
059-CuckooCycleagraphtheoreticproofofworksystem..> 22-Dec-2014 12:57 285K
059-CuckooCycleamemoryboundgraphtheoreticproofo..> 02-Jan-2015 10:39 291K
060-VerifiableComputationinMultipartyProtocolsw..> 02-Jan-2015 10:39 469K
061-BoundedCollusionIdentityBasedEncryptionfrom..> 02-Jan-2015 10:39 404K
062-AComparisonoftheHomomorphicEncryptionScheme..> 02-Jan-2015 10:39 1007K
063-CryptanalysisonSecureuntraceableofflineelec..> 02-Jan-2015 10:39 60K
064-APolynomialTimeAttackagainstAlgebraicGeomet..> 02-Jan-2015 10:39 416K
065-FineTuningtheFunctionFieldSieveAlgorithmfor..> 02-Jan-2015 10:39 393K
066-ASubexponentialConstructionofGraphColoringf..> 02-Jan-2015 10:39 757K
067-EfficientandStronglySecureDynamicDomainSpec..> 02-Jan-2015 10:39 507K
068-SomesecurityboundsfortheDGHVscheme.pdf 02-Jan-2015 10:39 277K
069-OnePassAuthenticatedKeyEstablishmentProtoco..> 02-Jan-2015 10:39 131K
070-LatticeCryptographyfortheInternet.pdf 02-Jan-2015 10:39 353K
071-ImplementingPairingBasedCryptosystemsinUSBT..> 02-Jan-2015 10:39 368K
072-EfficientPrivacyPreservingBigDataProcessing..> 02-Jan-2015 10:39 637K
073-AnonymousAuthenticationwithSharedSecrets.pdf 02-Jan-2015 10:39 500K
074-NewandImprovedKeyHomomorphicPseudorandomFun..> 02-Jan-2015 10:39 373K
075-PubliclyAuditableSecureMultiPartyComputatio..> 02-Jan-2015 10:39 687K
076-CertifiedBitcoins.pdf 02-Jan-2015 10:39 506K
077-MixcoinAnonymityforBitcoinwithaccountablemi..> 02-Jan-2015 10:39 367K
078-ImplementationandComparisonofLatticebasedId..> 02-Jan-2015 10:39 573K
079-UnifyingLeakageModelsfromProbingAttackstoNo..> 02-Jan-2015 10:39 271K
080-AFullCharacterizationofCompletenessforTwopa..> 02-Jan-2015 10:39 519K
081-EfficientRoundOptimalBlindSignatures.pdf 02-Jan-2015 10:39 447K
082-GarbledRAMRevisitedPartI.pdf 02-Jan-2015 10:39 653K
083-GarbledRAMRevisitedPartII.pdf 02-Jan-2015 10:38 265K
084-RECTANGLEABitsliceLightweightBlockCipherSui..> 20-Jan-2023 08:29 211K
084-RECTANGLEABitsliceUltraLightweightBlockCiph..> 02-Jan-2015 10:38 215K
085-MultipermutationsinCryptoWorldDifferentFace..> 02-Jan-2015 10:38 337K
086-RandomizedandEfficientAuthenticationinMobil..> 02-Jan-2015 10:38 222K
087-AnoAAFrameworkForAnalyzingAnonymousCommunic..> 02-Jan-2015 10:38 726K
088-ABoundForMultipartySecretKeyAgreementAndImp..> 02-Jan-2015 10:38 354K
089-MultipleDifferentialCryptanalysisofRoundRed..> 02-Jan-2015 10:38 533K
090-CryptanalysisofKLEINFullversion.pdf 02-Jan-2015 10:38 423K
091-OnCryptographicApplicationsofMatricesActing..> 02-Jan-2015 10:38 482K
092-AnewclassofsystemorientedPKCKISOPKC.pdf 02-Jan-2015 10:38 206K
093-TheRelatedKeyAnalysisofFeistelConstructions..> 02-Jan-2015 10:38 947K
094-FasterBootstrappingwithPolynomialError.pdf 02-Jan-2015 10:38 339K
095-UnifiedMinimalandSelectivelyRandomizableStr..> 02-Jan-2015 10:38 430K
096-Tightsecurityboundsformultipleencryption.pdf 02-Jan-2015 10:38 329K
097-ASimpleFrameworkforNoiseFreeConstructionofF..> 02-Jan-2015 10:38 108K
097-TowardsConstructingFullyHomomorphicEncrypti..> 20-Jan-2023 08:29 195K
098-TowardsCharacterizingCompleteFairnessinSecu..> 02-Jan-2015 10:38 321K
099-IndistinguishabilityObfuscationandUCEsTheCa..> 02-Jan-2015 10:38 499K
100-ImprovedSlendersetLinearCryptanalysis.pdf 02-Jan-2015 10:38 206K
1000-CompleteCharacterizationofFairnessinSecure..> 02-Jan-2015 09:58 486K
1001-RobustlySecureTwoPartyAuthenticatedKeyExch..> 02-Jan-2015 09:58 128K
1002-ExperimentsinEncryptedandSearchableNetwork..> 02-Jan-2015 09:58 470K
1003-COFFECiphertextOutputFeedbackFaithfulEncry..> 02-Jan-2015 09:58 293K
1004-CONIKSAPrivacyPreservingConsistentKeyServi..> 02-Jan-2015 09:58 588K
1004-CONIKSBringingKeyTransparencytoEndUsers.pdf 20-Jan-2023 08:25 469K
1005-Apureblockchainbaseddecentralizedexchange.pdf 02-Jan-2015 09:58 542K
1006-Simplecompositiontheoremsofonewayfunctions..> 02-Jan-2015 09:58 288K
1007-FairMultiplebankEcashintheStandardModel.pdf 02-Jan-2015 09:58 394K
1008-DTLSHIMMOEfficientlySecuringaPostQuantumWo..> 02-Jan-2015 09:58 836K
1009-APreliminaryFPGAImplementationandAnalysiso..> 02-Jan-2015 09:58 268K
101-DishonestMajorityMultiPartyComputationforBi..> 02-Jan-2015 10:38 577K
1010-OnContinuousAftertheFactLeakageResilientKe..> 02-Jan-2015 09:58 357K
1011-ProofofWorkasAnonymousMicropaymentRewardin..> 02-Jan-2015 09:58 344K
1012-TheBoomerangAttacksonBLAKEandBLAKE2.pdf 02-Jan-2015 09:58 366K
1013-ComputationalIndependence.pdf 02-Jan-2015 09:57 316K
1014-DoubleandAddwithRelativeJacobianCoordinate..> 02-Jan-2015 09:57 286K
1015-CompactAccumulatorusingLattices.pdf 02-Jan-2015 09:57 414K
1016-ModifiedSIMONandSPECKLightweightHybridDesi..> 20-Jan-2023 14:19 207
1017-SortingandSearchingBehindtheCurtainPrivate..> 02-Jan-2015 09:57 791K
1018-AlgebraicAlgorithmsforLWE.pdf 20-Jan-2023 08:25 438K
1018-AlgebraicAlgorithmsforLWEProblems.pdf 02-Jan-2015 09:57 455K
1019-RelatedKeyDifferentialCryptanalysisofReduc..> 02-Jan-2015 09:57 324K
102-ActivelySecurePrivateFunctionEvaluation.pdf 02-Jan-2015 10:38 383K
1020-SideChannelLeakageandTraceCompressionusing..> 02-Jan-2015 09:57 793K
1021-TightlySecureSignaturesfromChameleonHashFu..> 02-Jan-2015 09:57 629K
1022-TopologyHidingComputation.pdf 02-Jan-2015 09:57 202K
1023-HowtoGenerateRepeatableKeysUsingPhysicalUn..> 20-Jan-2023 08:25 341K
1024-CryptanalysisoftheCoACDAssumption.pdf 20-Jan-2023 08:25 367K
1025-XPIRPrivateInformationRetrievalforEveryone..> 20-Jan-2023 08:25 535K
1026-LatticeswithSymmetry.pdf 20-Jan-2023 08:25 423K
1027-SimpleLatticeTrapdoorSamplingfromaBroadCla..> 20-Jan-2023 08:25 375K
1028-SecurityWeaknessesofan34AnonymousAttribute..> 20-Jan-2023 08:25 250K
1029-OntheCryptographicHardnessofFindingaNashEq..> 20-Jan-2023 08:25 386K
103-SHipherFamiliesofBlockCiphersbasedonSubSetS..> 02-Jan-2015 10:38 206K
104-Spaceefficientbytewiseincrementalandperfect..> 02-Jan-2015 10:38 442K
105-ReducingtheOverheadofMPCoveraLargePopulatio..> 02-Jan-2015 10:38 410K
106-AlgorithmsinHElib.pdf 02-Jan-2015 10:38 561K
107-KeyIndistinguishableMessageAuthenticationCo..> 02-Jan-2015 10:37 488K
108-MJHAFasterAlternativetoMDC2.pdf 02-Jan-2015 10:37 1M
109-DiffusionProgrammableDeviceThedevicetopreve..> 02-Jan-2015 10:37 432K
110-HalkaALightweightSoftwareFriendlyBlockCiphe..> 02-Jan-2015 10:37 263K
111-ANoteontheCLRW2TweakableBlockCipherConstruc..> 02-Jan-2015 10:37 436K
112-PolynomialTimeAttackonWildMcElieceOverQuadr..> 02-Jan-2015 10:37 440K
113-SecureCompressionTheoryPractice.pdf 02-Jan-2015 10:37 614K
113-SecureCompressionTheoryampPractice.pdf 20-Jan-2023 08:29 614K
114-ProverAnonymousandDeniableDistanceBoundingA..> 02-Jan-2015 10:37 658K
115-Commentsonanoveluserauthenticationandkeyagr..> 02-Jan-2015 10:37 198K
116-OptimalAlgebraicManipulationDetectionCodesi..> 02-Jan-2015 10:37 149K
117-AnApplicablePublicKeyCryptosystemBasedonNPC..> 02-Jan-2015 10:37 203K
118-Quantumpositionverificationintherandomoracl..> 02-Jan-2015 10:37 614K
119-Breaking128bitSecure39SupersingularBinaryCu..> 20-Jan-2023 08:29 453K
119-Breaking128bitSecureSupersingularBinaryCurv..> 02-Jan-2015 10:37 453K
120-AutomatedProofforAuthorizationProtocolsofTP..> 02-Jan-2015 10:37 668K
121-ObliviousRadixSortAnEfficientSortingAlgorit..> 02-Jan-2015 10:37 123K
122-NewWaytoConstructCryptographicHashFunction.pdf 02-Jan-2015 10:37 290K
123-FORSAKESAForwardSecureAuthenticatedKeyExcha..> 02-Jan-2015 10:37 617K
124-OntheInformationRatioofNonPerfectSecretShar..> 20-Jan-2023 08:29 343K
124-OptimalNonPerfectUniformSecretSharingScheme..> 02-Jan-2015 10:37 312K
125-RemovingErasureswithExplainableHashProofSys..> 02-Jan-2015 10:37 858K
126-PublicKeyEncryptionResilientAgainstLinearRe..> 20-Jan-2023 08:29 285K
127-AlgebraicPropertiesofModularAdditionModuloa..> 02-Jan-2015 10:37 502K
128-EfficientThreePartyComputationfromCutandCho..> 02-Jan-2015 10:37 572K
129-HowtoUseBitcointoDesignFairProtocols.pdf 02-Jan-2015 10:37 494K
130-SelectingEllipticCurvesforCryptographyAnEff..> 02-Jan-2015 10:37 577K
131-ModellingAfterthefactLeakageforKeyExchange.pdf 02-Jan-2015 10:36 493K
132-EfficientRevocableIdentityBasedEncryptionvi..> 02-Jan-2015 10:36 352K
133-EfficientSecureandVerifiableOutsourcingofMa..> 02-Jan-2015 10:36 518K
134-KummerstrikesbacknewDHspeedrecords.pdf 02-Jan-2015 10:36 421K
135-AnonymousTwoFactorAuthenticationinDistribut..> 02-Jan-2015 10:36 683K
136-IsolatedExecutiononManycoreArchitectures.pdf 02-Jan-2015 10:36 227K
137-EfficientObliviousDataStructuresforMPC.pdf 02-Jan-2015 10:36 408K
138-ShortSignaturesfromDiffieHellmanRevisitedSu..> 02-Jan-2015 10:36 421K
139-OnthePhaseSpaceofBlockHidingStrategies.pdf 02-Jan-2015 10:36 437K
140-RecoveringOpenSSLECDSANoncesUsingtheFLUSHRE..> 02-Jan-2015 10:36 186K
141-UnrestrictedIdentityBasedAggregateSigncrypt..> 02-Jan-2015 10:36 322K
142-FPGABasedHighPerformanceAESGCMUsingEfficien..> 20-Jan-2023 14:19 207
143-StatisticalConcurrentNonMalleableZeroKnowle..> 02-Jan-2015 10:36 573K
144-HowtoSecurelyReleaseUnverifiedPlaintextinAu..> 02-Jan-2015 10:36 382K
145-CalculatingCryptographicDegreeofanSBox.pdf 20-Jan-2023 14:19 207
146-Untappablecommunicationchannelsoveropticalf..> 02-Jan-2015 10:36 2M
147-TheMultipleNumberFieldSieveforMediumandHigh..> 02-Jan-2015 10:36 660K
147-TheMultipleNumberFieldSieveforMediumandHigh..> 20-Jan-2023 08:29 718K
148-OutsourcingPrivateRAMComputation.pdf 02-Jan-2015 10:36 555K
149-MillionsofMillionairesMultipartyComputation..> 02-Jan-2015 10:36 955K
150-OntheEffectivePreventionofTLSManInTheMiddle..> 20-Jan-2023 08:29 906K
151-SecurityAnalysisofKeyAlternatingFeistelCiph..> 02-Jan-2015 10:36 765K
152-AStatisticsbasedFundamentalModelforSidechan..> 02-Jan-2015 10:36 1M
153-VerifiableObliviousStorage.pdf 02-Jan-2015 10:36 446K
154-NonInteractiveCryptographyintheRAMModelofCo..> 20-Jan-2023 14:19 207
155-HoneyEncryptionSecurityBeyondtheBruteForceB..> 02-Jan-2015 10:35 279K
156-NonMalleableExtractorswithShorterSeedsandPr..> 02-Jan-2015 10:35 182K
156-NonMalleableExtractorswithShorterSeedsandTh..> 20-Jan-2023 08:29 186K
157-CLOCAuthenticatedEncryptionforShortInput.pdf 02-Jan-2015 10:35 424K
158-Pointcompressionforthetracezerosubgroupover..> 02-Jan-2015 10:35 446K
159-WeakKeyLeakageResilientCryptography.pdf 02-Jan-2015 10:35 353K
160-TrueSetFasterVerifiableSetComputations.pdf 02-Jan-2015 10:35 3M
161-OohAahJustaLittleBit3939Asmallamountofsidec..> 20-Jan-2023 08:29 225K
161-OohAahJustaLittleBitAsmallamountofsidechann..> 02-Jan-2015 10:35 225K
162-TOWARDCERTIFICATELESSSIGNCRYPTIONSCHEMEWITH..> 02-Jan-2015 10:35 230K
163-ImprovedSecureImplementationofCodeBasedSign..> 02-Jan-2015 10:35 350K
164-Generalizedpropermatricesandconstructingofm..> 02-Jan-2015 10:35 243K
165-ANEWSCALARPOINTMULTIPLICATIONSCHEMEINECCBAS..> 20-Jan-2023 14:19 207
166-Tupledecodersfortraitortracingschemes.pdf 02-Jan-2015 10:35 428K
167-HowtoEatYourEntropyandHaveitTooOptimalRecov..> 02-Jan-2015 10:35 689K
168-PrivacyFailuresinEncryptedMessagingServices..> 02-Jan-2015 10:35 719K
169-EncryptionQualityAnalysisoftheRCBCBlockCiph..> 02-Jan-2015 10:35 368K
170-Parallelizedhashingviajlanesandjpointerstre..> 02-Jan-2015 10:35 791K
171-AnEffectiveRC4StreamCipher.pdf 02-Jan-2015 10:35 737K
172-AnovelPUFScheme.pdf 20-Jan-2023 14:19 207
173-ContinuousNonmalleableCodes.pdf 02-Jan-2015 10:35 488K
174-AnalysisofaModifiedRC4Algorithm.pdf 02-Jan-2015 10:35 645K
175-SecrecyandPerformanceAnalysisofSymmetricKey..> 02-Jan-2015 10:35 769K
176-OneRoundWitnessIndistinguishabilityfromIndi..> 20-Jan-2023 14:19 207
177-PragmatismvsElegancecomparingtwoapproachest..> 02-Jan-2015 10:35 275K
178-VerifiableDelegatedSetIntersectionOperation..> 02-Jan-2015 10:35 368K
179-OptimalconstructionsforIDbasedonewayfunctio..> 02-Jan-2015 10:35 262K
180-ImprovingthroughputofRC4algorithmusingmulti..> 02-Jan-2015 10:34 657K
181-AFrameworkandCompactConstructionsforNonmono..> 02-Jan-2015 10:34 511K
182-ProvingtheTLSHandshakeSecureasitis.pdf 02-Jan-2015 10:34 920K
183-ImpactofANSIX92412009KeyCheckValueonISOIEC9..> 02-Jan-2015 10:34 276K
184-SETUPinSecretSharingSchemesusingRandomValue..> 02-Jan-2015 10:34 295K
185-ObliviousDataStructures.pdf 02-Jan-2015 10:34 1M
186-AESBasedAuthenticatedEncryptionModesinParal..> 02-Jan-2015 10:34 586K
187-FFTBasedKeyRecoveryfortheIntegralAttack.pdf 02-Jan-2015 10:34 314K
188-ASecondLookatFischlin39sTransformation.pdf 20-Jan-2023 08:29 420K
188-ASecondLookatFischlinsTransformation.pdf 02-Jan-2015 10:34 420K
189-PracticalReceiptFreeSealedBidAuctionintheCo..> 02-Jan-2015 10:34 250K
190-TheTemperatureSideChannelandHeatingFaultAtt..> 02-Jan-2015 10:34 2M
191-SideChannelAnalysisonBlindedRegularScalarMu..> 02-Jan-2015 10:34 392K
192-TwosourcesRandomnessExtractorsforEllipticCu..> 02-Jan-2015 10:34 98K
193-JHAEANovelPermutationBasedAuthenticatedEncr..> 20-Jan-2023 08:29 536K
193-JHAEAnAuthenticatedEncryptionModeBasedonJH.pdf 02-Jan-2015 10:34 556K
194-CryptanalysisandSecurityEnhancementofTwoAdv..> 02-Jan-2015 10:34 264K
195-LowOverheadBroadcastEncryptionfromMultiline..> 02-Jan-2015 10:34 528K
196-CryptoMultimedia.pdf 20-Jan-2023 14:19 207
197-BreakingPOETAuthenticationwithaSingleQuery.pdf 02-Jan-2015 10:34 239K
198-FastGPGPUBasedEllipticCurveScalarMultiplica..> 02-Jan-2015 10:34 237K
199-DoublySpatialEncryptionfromDBDH.pdf 02-Jan-2015 10:34 148K
200-AutomaticProtocolSelectioninSecureTwoPartyC..> 02-Jan-2015 10:34 2M
201-FromInputPrivatetoUniversallyComposableSecu..> 02-Jan-2015 10:34 454K
202-EfficientlyVerifiableComputationonEncrypted..> 02-Jan-2015 10:34 583K
203-PrivacyPreservingImplicitAuthentication.pdf 02-Jan-2015 10:33 437K
204-ChipWhispererAnOpenSourcePlatformforHardwar..> 02-Jan-2015 10:33 1M
205-UnifiedObliviousRAMImprovingRecursiveORAMwi..> 02-Jan-2015 10:33 1M
206-ReconsideringGenericComposition.pdf 02-Jan-2015 10:33 339K
207-ExpressiveAttributeBasedEncryptionwithConst..> 02-Jan-2015 10:33 438K
208-OfflineDictionaryAttackonPasswordAuthentica..> 02-Jan-2015 10:33 794K
209-ALittleHonestyGoesaLongWayTheTwoTierModelfo..> 02-Jan-2015 10:33 2M
210-StructuralCryptanalysisofMcElieceSchemeswit..> 02-Jan-2015 10:33 404K
211-SomeRandomnessExperimentsonTRIVIUM.pdf 02-Jan-2015 10:33 337K
212-RemarksonthePocklingtonandPadrSezCubeRootAl..> 20-Jan-2023 08:29 84K
212-RemarksonthePocklingtonandPadroSaezCubeRoot..> 02-Jan-2015 10:33 84K
213-SecretSharingforNP.pdf 02-Jan-2015 10:33 535K
214-SquaringAlgorithmswithDelayedCarryMethodand..> 02-Jan-2015 10:33 538K
215-AttackOntheMarkovProblem.pdf 02-Jan-2015 10:33 107K
216-ImplementationandImprovementofthePartialSum..> 20-Jan-2023 08:29 173K
216-ImplementationandimprovementofthePartialSum..> 02-Jan-2015 10:33 316K
217-AForgeryAttackagainstPANDAs.pdf 02-Jan-2015 10:33 299K
218-APracticalUniversalForgeryAttackagainstPAES..> 02-Jan-2015 10:33 439K
219-DynamicSearchableEncryptionviaBlindStorage.pdf 02-Jan-2015 10:33 828K
220-TotalBreakofZorrousingLinearandDifferential..> 02-Jan-2015 10:33 360K
221-HybridModelofFixedandFloatingPointNumbersin..> 02-Jan-2015 10:33 220K
222-OptimizingObfuscationAvoidingBarrington39sT..> 20-Jan-2023 08:29 553K
222-OptimizingObfuscationAvoidingBarringtonsThe..> 02-Jan-2015 10:33 553K
223-CollisionSpectrumEntropyLossTSpongesandCryp..> 02-Jan-2015 10:33 456K
224-WhitewashOutsourcingGarbledCircuitGeneratio..> 02-Jan-2015 10:32 897K
225-AdaptivelySecureFunctionalEncryptionforFini..> 02-Jan-2015 10:32 587K
226-WeakKeyAnalysisofPOET.pdf 02-Jan-2015 10:32 845K
227-CKEFAClusterbasedKeyEstablishmentFrameworkf..> 20-Jan-2023 14:19 207
228-CryptanalysisofSPNetworkswithPartialNonLine..> 20-Jan-2023 08:29 530K
228-ImprovedAnalysisofZorroLikeCiphers.pdf 02-Jan-2015 10:32 396K
229-InvestigatingtheFeasibilityofLEAPinZigBeeSp..> 20-Jan-2023 14:19 207
230-Isogenygraphswithmaximalrealmultiplication.pdf 02-Jan-2015 10:32 520K
231-SelfUpdatableEncryptionwithShortPublicParam..> 02-Jan-2015 10:32 365K
232-BandwidthEfficientPIRfromNTRU.pdf 02-Jan-2015 10:32 385K
233-TowardPracticalHomomorphicEvaluationofBlock..> 02-Jan-2015 10:32 385K
234-EnhancingObliviousRAMPerformanceUsingDynami..> 02-Jan-2015 10:32 582K
235-EfficientFuzzySearchonEncryptedData.pdf 02-Jan-2015 10:32 510K
236-LinearSequentialCircuitApproximationofActer..> 02-Jan-2015 10:32 405K
237-SIMONSaysBreaktheAreaRecordsforSymmetricKey..> 02-Jan-2015 10:32 1M
238-HighParallelComplexityGraphsandMemoryHardFu..> 02-Jan-2015 10:32 439K
239-LogicalReasoningtoDetectWeaknessesAboutSHA1..> 02-Jan-2015 10:32 639K
240-AutomaticProofsofPrivacyofSecureMultiPartyC..> 02-Jan-2015 10:32 403K
241-ANewWaytoPreventUKSAttacksUsingTrustedCompu..> 02-Jan-2015 10:32 340K
242-ZeroKnowledgePasswordPolicyChecksandVerifie..> 02-Jan-2015 10:32 492K
243-KeyDerivationFromNoisySourcesWithMoreErrors..> 02-Jan-2015 10:32 381K
243-ReusableFuzzyExtractorsforLowEntropyDistrib..> 20-Jan-2023 08:29 483K
244-bitcoinBitMintReconcilingBitcoinwithCentral..> 02-Jan-2015 10:32 5M
245-Apracticalstaterecoveryattackonthestreamcip..> 02-Jan-2015 10:32 378K
246-SecurityAnalysisofanIdentityBasedStronglyUn..> 02-Jan-2015 10:31 166K
247-IntroducingFaultToleranceintoThresholdPassw..> 02-Jan-2015 10:31 470K
248-FinegrainCrossVMAttacksonXenandVMwarearepos..> 02-Jan-2015 10:31 736K
249-LinearExtensionCubeAttackonStreamCiphers.pdf 02-Jan-2015 10:31 326K
250-CryptanalysisoftheMOREsymmetrickeyfullyhomo..> 02-Jan-2015 10:31 240K
251-ForgeryonStatelessCMCC.pdf 02-Jan-2015 10:31 226K
252-MakingRSAPSSProvablySecureAgainstNonRandomF..> 02-Jan-2015 10:31 471K
253-PracticalandSecureQueryProcessingforLargesc..> 20-Jan-2023 14:19 207
254-EnhancedLatticeBasedSignaturesonReconfigura..> 02-Jan-2015 10:31 1M
255-CertificationandEfficientProofsofCommittedT..> 02-Jan-2015 10:31 502K
256-PrivateandDynamicTimeSeriesDataAggregationw..> 02-Jan-2015 10:31 345K
257-HandycipheraLowtechRandomizedSymmetrickeyCr..> 02-Jan-2015 10:31 300K
258-Arealtimekeyrecoveryattackontheauthenticate..> 02-Jan-2015 10:31 260K
259-PracticalComplexityCubeAttacksonRoundReduce..> 02-Jan-2015 10:31 385K
260-LocallyDecodableCodesforeditdistance.pdf 02-Jan-2015 10:31 442K
261-FaultAnalysisofGrainFamilyofStreamCiphers.pdf 02-Jan-2015 10:31 294K
262-DifferentialFaultAnalysisofMICKEYFamilyofSt..> 02-Jan-2015 10:31 264K
263-AGenericScanAttackonHardwarebasedeStreamWin..> 02-Jan-2015 10:31 307K
264-ContinuousAfterthefactLeakageResilientKeyEx..> 02-Jan-2015 10:31 406K
265-DualSystemGroupsanditsApplicationsCompactHI..> 02-Jan-2015 10:31 246K
266-ICEPOLEHighspeedHardwareorientedAuthenticat..> 02-Jan-2015 10:31 506K
267-DifferentialFaultAnalysisonthefamiliesofSIM..> 02-Jan-2015 10:31 838K
268-AlowcomplexitybitparallelMontgomerymultipli..> 02-Jan-2015 10:31 209K
268-NewbitparallelMontgomerymultiplierfortrinom..> 20-Jan-2023 08:29 419K
269-ChosenCiphertextSecurityviaPointObfuscation..> 02-Jan-2015 10:31 362K
270-FasterMaliciouslySecureTwoPartyComputationU..> 02-Jan-2015 10:31 613K
271-STRIBOBAuthenticatedEncryptionfromGOSTR3411..> 02-Jan-2015 10:30 284K
272-ImpossibledifferentialcryptanalysisofLBlock..> 02-Jan-2015 10:30 458K
273-WitnessEncryptionfromInstanceIndependentAss..> 02-Jan-2015 10:30 548K
274-Anoteontheconstructionofpairingfriendlyelli..> 20-Jan-2023 08:29 330K
274-Weakinstancesofcompositeorderprotocols.pdf 02-Jan-2015 10:30 400K
275-Identitybasedencryptionanddigitalsignatures..> 02-Jan-2015 10:30 96K
276-Designofidentitybaseddigitalsignaturescheme..> 02-Jan-2015 10:30 84K
277-NewTreatmentoftheBSWSamplingandItsApplicati..> 02-Jan-2015 10:30 277K
278-StrongerSecurityNotionsforDecentralizedTrac..> 02-Jan-2015 10:30 333K
279-ImprovedImpossibleDifferentialAttacksagains..> 02-Jan-2015 10:30 436K
280-MSEAModifiedSymmetricEncryptionAlgorithm.pdf 02-Jan-2015 10:30 345K
281-WCFBatweakablewideblockcipher.pdf 02-Jan-2015 10:30 450K
282-OnTheOrthogonalVectorProblemandTheFeasibili..> 02-Jan-2015 10:30 514K
283-StructuralLatticeReductionGeneralizedWorstC..> 02-Jan-2015 10:30 601K
283-StructuralLatticeReductionGeneralizedWorstC..> 20-Jan-2023 08:29 646K
284-ResettablySoundZeroKnoweldgeArgumentsfromOW..> 02-Jan-2015 10:30 933K
285-PrivacyEnhancingProxySignaturesfromNonInter..> 02-Jan-2015 10:30 438K
286-WeaknessesofPasswordAuthenticationSchemeBas..> 02-Jan-2015 10:30 264K
287-ActiveandPassiveSideChannelAttacksonDelayBa..> 02-Jan-2015 10:30 702K
288-ResilientAggregationinSimpleLinearSensorNet..> 02-Jan-2015 10:30 377K
289-AnEmpiricalStudyandsomeImprovementsoftheMin..> 02-Jan-2015 10:30 372K
290-ReliableBroadcastwithRespecttoTopologyKnowl..> 02-Jan-2015 10:30 340K
291-TrialmultiplicationisnotoptimalbutOnthesymm..> 20-Jan-2023 08:29 215K
291-TrialmultiplicationisnotoptimalbutOnthesymm..> 02-Jan-2015 10:30 215K
292-ImprovedMeetintheMiddleAttacksonReducedRoun..> 02-Jan-2015 10:30 414K
293-AnEfficientAbuseFreeFairContractSigningProt..> 20-Jan-2023 14:19 207
294-TheM3lcryptPasswordBasedKeyDerivationFuncti..> 02-Jan-2015 10:30 323K
295-ZAPsandNonInteractiveWitnessIndistinguishab..> 02-Jan-2015 10:30 399K
296-QuantumAttacksonClassicalProofSystemsTheHar..> 02-Jan-2015 10:29 880K
297-PipelineableOnLineEncryption.pdf 02-Jan-2015 10:29 395K
298-TorsionLimitsandRiemannRochSystemsforFuncti..> 02-Jan-2015 10:29 680K
299-OptimalityofNonAdaptiveStrategiesTheCaseofP..> 02-Jan-2015 10:29 454K
300-OnthePowersof2.pdf 02-Jan-2015 10:29 417K
301-HowtoAvoidObfuscationUsingWitnessPRFs.pdf 02-Jan-2015 10:29 667K
302-BranchingHeuristicsinDifferentialCollisionS..> 02-Jan-2015 10:29 313K
303-OnthesecurityofXuetal39sauthenticationandke..> 20-Jan-2023 14:19 207
304-ActivelyPrivateandCorrectMPCSchemeintltn2fr..> 20-Jan-2023 08:29 110K
304-ActivelyPrivateandCorrectMPCSchemeintn2from..> 02-Jan-2015 10:29 110K
305-CollisionAttackon5RoundsofGrstl.pdf 02-Jan-2015 10:29 362K
306-PubliclyEvaluablePseudorandomFunctionsandTh..> 02-Jan-2015 10:29 519K
307-SimulationTimeSecurityMarginAssessmentagain..> 02-Jan-2015 10:29 7M
308-TheLocalityofSearchableSymmetricEncryption.pdf 02-Jan-2015 10:29 350K
309-IndistinguishabilityObfuscationfromtheMulti..> 02-Jan-2015 10:29 409K
310-SakaiOhgishiKasaharaIdentityBasedNonInterac..> 02-Jan-2015 10:29 485K
311-ExponentinversionSignaturesandIBEunderStati..> 02-Jan-2015 10:29 555K
312-StructurePreservingSignaturesfromTypeIIPair..> 02-Jan-2015 10:29 374K
313-OntheComplexityofFindingLowLevelSolutions.pdf 02-Jan-2015 10:29 175K
314-ImprovedLeakageModelBasedonGeneticAlgorithm..> 02-Jan-2015 10:29 1M
315-Statisticalweaknessesin20RC4likealgorithmsa..> 02-Jan-2015 10:29 272K
316-ExplicitNonMalleableCodesResistanttoPermuta..> 02-Jan-2015 10:29 773K
317-AnalysisofNORXInvestigatingDifferentialandR..> 02-Jan-2015 10:28 556K
318-Indexcalculusinthetracezerovariety.pdf 02-Jan-2015 10:28 449K
319-PreimageattacksonReducedroundStribog.pdf 02-Jan-2015 10:28 2M
320-ImprovedDifferentialCryptanalysisofRoundRed..> 02-Jan-2015 10:28 359K
321-EfficientQuantumImmuneKeylessSignatureswith..> 02-Jan-2015 10:28 599K
322-CodingTheoreticConstructionofQuantumRampSec..> 02-Jan-2015 10:28 138K
323-SomeRemarksonHoneywordBasedPasswordCracking..> 02-Jan-2015 10:28 335K
324-FromSingleBittoMultiBitPublicKeyEncryptionv..> 02-Jan-2015 10:28 575K
325-Apracticalforgeryandstaterecoveryattackonth..> 02-Jan-2015 10:28 383K
326-FeWALightweightBlockCipher.pdf 02-Jan-2015 10:28 217K
327-AnOptimalStrongPasswordAuthenticationProtoc..> 02-Jan-2015 10:28 433K
328-AffineevasiveSetsModuloaPrime.pdf 02-Jan-2015 10:28 282K
329-ExplicitOptimalBinaryPebblingforOneWayHashC..> 02-Jan-2015 10:28 368K
330-NoncentralizedCryptocurrencywtihNoBlockchai..> 20-Jan-2023 08:29 202K
330-PoSCryptocurrencywtihNoBlockchain.pdf 02-Jan-2015 10:28 164K
331-MachineLearningClassificationoverEncryptedD..> 02-Jan-2015 10:28 607K
332-HowtoChooseInterestingPointsforTemplateAtta..> 02-Jan-2015 10:28 171K
333-Anoptimalrepresentationforthetracezerosubgr..> 02-Jan-2015 10:28 438K
334-LCPRHighPerformanceCompressionAlgorithmforL..> 20-Jan-2023 08:28 588K
334-LCPRHighPerformanceCompressionAlgorithmforL..> 02-Jan-2015 10:28 709K
335-SHADOWNUMBERSPUBLICKEYENCRYPTION.pdf 02-Jan-2015 10:28 187K
336-PrivatePredictiveAnalysisonEncryptedMedical..> 02-Jan-2015 10:28 2M
337-RelatedRandomnessAttacksforPublicKeyEncrypt..> 02-Jan-2015 10:28 505K
338-ATamperandLeakageResilientRandomAccessMachi..> 02-Jan-2015 10:28 941K
338-ATamperandLeakageResilientvonNeumannArchite..> 20-Jan-2023 08:28 807K
339-PublicCoinConcurrentZeroKnowledgeinLogarith..> 20-Jan-2023 14:19 207
340-AStrongandEfficientCertificatelessDigitalSi..> 02-Jan-2015 10:27 355K
341-FormalAnalysisofChaumianMixNetswithRandomiz..> 02-Jan-2015 10:27 403K
342-ProposingIndividualizationofthedesignofcryp..> 02-Jan-2015 10:27 508K
343-NewResultsonSolvingLinearEquationsModuloUnk..> 02-Jan-2015 10:27 376K
343-SolvingLinearEquationsModuloUnknownDivisors..> 20-Jan-2023 08:28 438K
344-TowardRobustHiddenVolumesusingWriteOnlyObli..> 02-Jan-2015 10:27 479K
345-PrivateDatabaseAccessWithHEoverORAMArchitec..> 02-Jan-2015 10:27 523K
346-TimeMemoryTradeoffsforIndexCalculusinGenus3..> 02-Jan-2015 10:27 1M
347-OneWayFunctionsandImperfectObfuscation.pdf 02-Jan-2015 10:27 577K
348-ASimpleCastasIntendedEVotingProtocolbyUsing..> 02-Jan-2015 10:27 310K
349-ZerocashDecentralizedAnonymousPaymentsfromB..> 02-Jan-2015 10:27 839K
350-DistributedSmoothProjectiveHashinganditsApp..> 02-Jan-2015 10:27 436K
351-SecretandVerifiableDelegatedVotingforWideRe..> 02-Jan-2015 10:27 137K
352-MultiVendorPayWordwithPaymentApproval.pdf 02-Jan-2015 10:27 349K
353-FoldingAlternantandGoppaCodeswithNonTrivial..> 02-Jan-2015 10:27 319K
354-OptimizingInformationSetDecodingAlgorithmst..> 02-Jan-2015 10:27 258K
355-Graphtheoreticdesignandanalysisofkeypredist..> 02-Jan-2015 10:27 235K
356-FullyKeyHomomorphicEncryptionArithmeticCirc..> 02-Jan-2015 10:27 600K
357-SimulatableLeakageAnalysisPitfallsandnewCon..> 02-Jan-2015 10:27 2M
358-Amechanicalapproachtoderiveidentitybasedpro..> 02-Jan-2015 10:27 280K
359-ExplicitendomorphismoftheJacobianofahyperel..> 02-Jan-2015 10:27 144K
360-McElieceintheworldofEscher.pdf 02-Jan-2015 10:27 622K
361-NewResultsintheLinearCryptanalysisofDES.pdf 02-Jan-2015 10:27 219K
362-NothingisforFreeSecurityinSearchingSharedEn..> 02-Jan-2015 10:26 184K
362-NothingisforFreeSecurityinSearchingSharedam..> 20-Jan-2023 08:28 184K
363-ForgingAttacksontwoAuthenticatedEncryptions..> 02-Jan-2015 10:26 477K
364-DeletingSecretDatawithPublicVerifiability.pdf 02-Jan-2015 10:26 322K
365-MultitargetDPAattacksPushingDPAbeyondthelim..> 02-Jan-2015 10:26 448K
366-CryptanalysisandImprovementonRobustThreeFac..> 02-Jan-2015 10:26 1M
367-RedefiningtheTransparencyOrder.pdf 02-Jan-2015 10:26 479K
368-SolvingtheDiscreteLogarithmofa113bitKoblitz..> 02-Jan-2015 10:26 687K
369-OntheLimitsofAuthenticatedKeyExchangeSecuri..> 02-Jan-2015 10:26 706K
370-CompactVSSandEfficientHomomorphicUCCommitme..> 02-Jan-2015 10:26 551K
371-OntheEnumerationofDoubleBaseChainswithAppli..> 02-Jan-2015 10:26 449K
372-Fullysecureconstrainedpseudorandomfunctions..> 02-Jan-2015 10:26 467K
373-Beyond2c2SecurityinSpongeBasedAuthenticated..> 02-Jan-2015 10:26 514K
374-OptimalContractsforOutsourcedComputation.pdf 02-Jan-2015 10:26 413K
375-ImprovedCryptanalysisonReducedRoundGOSTandW..> 02-Jan-2015 10:26 498K
376-HowSecureisDeterministicEncryption.pdf 02-Jan-2015 10:26 409K
377-LogicSynthesisbasedPublicKeyScheme.pdf 02-Jan-2015 10:26 141K
378-AttacksonLin39sMobileDynamicIdentitybasedAu..> 20-Jan-2023 14:19 207
378-AttacksonLinsMobileDynamicIdentitybasedAuth..> 02-Jan-2015 10:26 82K
379-Hyperandellipticcurvecryptography.pdf 02-Jan-2015 10:26 412K
380-EfficientAdaptivelySecureIBBEfromStandardAs..> 02-Jan-2015 10:26 405K
381-UsingIndistinguishabilityObfuscationviaUCEs..> 02-Jan-2015 10:26 626K
382-PrivacyEnhancedParticipatorySensingwithColl..> 02-Jan-2015 10:26 890K
383-CryptanalysisofandImprovementonBiometricbas..> 02-Jan-2015 10:26 888K
384-Yao39smillionaires39problemanddecoybasedpub..> 20-Jan-2023 08:28 87K
384-Yaosmillionairesproblemanddecoybasedpublick..> 02-Jan-2015 10:26 87K
385-JacobianCoordinatesonGenus2Curves.pdf 02-Jan-2015 10:25 274K
386-ChaskeyAnEfficientMACAlgorithmfor32bitMicro..> 02-Jan-2015 10:25 245K
387-Newcandidatesformultivariatetrapdoorfunctio..> 02-Jan-2015 10:25 378K
388-FindingcollisionsforMD4hashalgorithmusinghy..> 02-Jan-2015 10:25 202K
389-AcceleratingNTRUbasedHomomorphicEncryptionu..> 02-Jan-2015 10:25 304K
390-BlackBoxNonBlackBoxZeroKnowledge.pdf 02-Jan-2015 10:25 936K
391-MuRDPATopdownLevelledMultireplicaMerkleHash..> 02-Jan-2015 10:25 1M
392-TheRandomizedIterateRevisitedAlmostLinearSe..> 02-Jan-2015 10:25 572K
393-AlmostOptimalConstructionsofUOWHFsfrom1to1R..> 02-Jan-2015 10:25 605K
394-RelationalHash.pdf 02-Jan-2015 10:25 593K
395-LightweightandPrivacyPreservingDelegatableP..> 02-Jan-2015 10:25 701K
396-EfficientShortAdaptiveNIZKforNP.pdf 02-Jan-2015 10:25 636K
396-ProverEfficientCommitAndProveZeroKnowledgeS..> 20-Jan-2023 08:28 511K
397-CofactorizationonGraphicsProcessingUnits.pdf 02-Jan-2015 10:25 392K
398-DifferentialPropertiesoftheHFECryptosystem.pdf 02-Jan-2015 10:25 336K
399-AnAsymptoticallyOptimalStructuralAttackonth..> 02-Jan-2015 10:25 298K
400-ComposableObliviousExtendedPermutations.pdf 02-Jan-2015 10:25 500K
401-SoftwareimplementationofanAttributeBasedEnc..> 02-Jan-2015 10:25 415K
402-OntheExistenceofExtractableOneWayFunctions.pdf 02-Jan-2015 10:25 479K
403-GenericUniversalForgeryAttackonIterativeHas..> 02-Jan-2015 10:25 392K
404-LargeScaleSecureComputation.pdf 02-Jan-2015 10:25 652K
405-IndistinguishabilityObfuscationversusMultiB..> 02-Jan-2015 10:25 608K
406-NewGenericAttacksAgainstHashbasedMACs.pdf 02-Jan-2015 10:24 612K
407-TowardsSymmetricFunctionalEncryptionforRegu..> 02-Jan-2015 10:24 412K
408-BootstrappingBGVCiphertextsWithAWiderChoice..> 02-Jan-2015 10:24 320K
408-BootstrappingBGVCiphertextswithaWiderChoice..> 20-Jan-2023 08:28 268K
409-MomentsCorrelatingDPA.pdf 02-Jan-2015 10:24 9M
410-SoftAnalyticalSideChannelAttacks.pdf 02-Jan-2015 10:24 402K
411-CombiningLeakageResilientPRFsandShufflingTo..> 02-Jan-2015 10:24 613K
412-EfficientSelectionofTimeSamplesforHigherOrd..> 02-Jan-2015 10:24 448K
413-OntheCostofLazyEngineeringforMaskedSoftware..> 02-Jan-2015 10:24 2M
414-ASecurityProofofKCDSAusinganextendedRandomO..> 02-Jan-2015 10:24 268K
415-VirtualProofsofReality.pdf 02-Jan-2015 10:24 3M
416-AdaptiveSecurityofConstrainedPRFs.pdf 02-Jan-2015 10:24 458K
417-UsingRandomErrorCorrectingCodesinNearCollis..> 02-Jan-2015 10:24 351K
418-ASimpleRecursiveTreeObliviousRAM.pdf 02-Jan-2015 10:24 286K
419-FFSFactoryAdaptingCoppersmith39s34Factoriza..> 20-Jan-2023 08:28 683K
419-FFSFactoryAdaptingCoppersmithsFactorization..> 02-Jan-2015 10:24 683K
420-BoundedFullyHomomorphicSignatureSchemes.pdf 02-Jan-2015 10:24 483K
421-FNRArbitrarylengthsmalldomainblockcipherpro..> 02-Jan-2015 10:24 373K
422-Systemlevelnoninterferenceforconstanttimecr..> 02-Jan-2015 10:24 440K
423-TheHashFunction34Fugue34.pdf 20-Jan-2023 08:28 692K
423-TheHashFunctionFugue.pdf 02-Jan-2015 10:24 692K
424-ConstructingAbelianSurfacesforCryptographyv..> 02-Jan-2015 10:23 536K
425-NoteofMultidimensionalMITMAttackon25RoundTW..> 02-Jan-2015 10:23 331K
426-EfficientAuthenticationfromPRGRevisited.pdf 02-Jan-2015 10:23 493K
426-TowardsOptimallyEfficientSecretKeyAuthentic..> 20-Jan-2023 08:28 510K
427-Fastpointmultiplicationalgorithmsforbinarye..> 02-Jan-2015 10:23 396K
428-DualSystemEncryptionviaDoublySelectiveSecur..> 02-Jan-2015 10:23 960K
429-MementoHowtoReconstructyourSecretsfromaSing..> 02-Jan-2015 10:23 501K
430-RevisitingtheGentrySzydloAlgorithm.pdf 02-Jan-2015 10:23 361K
431-ALowLatencyLowAreaHardwareObliviousRAMContr..> 20-Jan-2023 08:28 1M
431-TinyORAMALowLatencyLowAreaHardwareORAMContr..> 02-Jan-2015 10:23 2M
432-UniversallyComposableAuthenticationandKeyex..> 02-Jan-2015 10:23 298K
433-AStatisticalModelforHigherOrderDPAonMaskedD..> 02-Jan-2015 10:23 589K
434-JustaLittleBitMore.pdf 02-Jan-2015 10:23 252K
435-WaitaminuteAfastCrossVMattackonAES.pdf 02-Jan-2015 10:23 478K
436-SynthesisofFaultAttacksonCryptographicImple..> 02-Jan-2015 10:23 456K
437-RoundingandChainingLLLFindingFasterSmallRoo..> 02-Jan-2015 10:23 525K
438-SecurityofSymmetricEncryptionagainstMassSur..> 02-Jan-2015 10:23 403K
439-EfficientNonInteractiveVerifiableOutsourced..> 02-Jan-2015 10:23 324K
440-DoubleLevelMontgomeryCoxRowerArchitectureNe..> 02-Jan-2015 10:23 412K
441-ImprovedGenericAttacksAgainstHashbasedMACsa..> 02-Jan-2015 10:23 547K
442-SecureOutsourcedComputationoftheCharacteris..> 02-Jan-2015 10:23 251K
443-MinimizingtheTwoRoundEvenMansourCipher.pdf 02-Jan-2015 10:23 860K
444-RPKIvsROVERComparingtheRisksofBGPSecuritySo..> 02-Jan-2015 10:23 1M
445-PolynomialSpacesANewFrameworkforCompositeto..> 02-Jan-2015 10:22 623K
446-4pointAttackswithStandardDeviationAnalysiso..> 02-Jan-2015 10:22 437K
447-FasterPrivateSetIntersectionbasedonOTExtens..> 02-Jan-2015 10:22 346K
448-DifferentialAttacksonReducedSIMONVersionswi..> 20-Jan-2023 08:28 386K
448-ImprovedDifferentialAttacksonReducedSIMONVe..> 02-Jan-2015 10:22 375K
449-RelatedKeySecurePKEfromHashProofSystems.pdf 20-Jan-2023 08:28 336K
450-OptimizedImplementationofGeneralSecretShari..> 20-Jan-2023 14:19 207
451-LeveledFullyHomomorphicSignaturesfromStanda..> 02-Jan-2015 10:22 482K
452-ProofofActivityExtendingBitcoinsProofofWork..> 02-Jan-2015 10:22 476K
453-BlockCiphersFocusOnTheLinearLayerfeatPRIDEF..> 02-Jan-2015 10:22 593K
454-EarlyPropagationandImbalancedRoutingHowtoDi..> 02-Jan-2015 10:22 5M
455-Singleshotsecurityforonetimememoriesintheis..> 02-Jan-2015 10:22 334K
456-VerifiedImplementationsforSecureandVerifiab..> 02-Jan-2015 10:22 378K
457-TranscriptSecureSignaturesBasedonModularLat..> 02-Jan-2015 10:22 335K
457-Transcriptsecuresignaturesbasedonmodularlat..> 20-Jan-2023 08:28 407K
458-AutomatedAnalysisofCryptographicAssumptions..> 02-Jan-2015 10:22 480K
459-TemplateAttacksonDifferentDevices.pdf 02-Jan-2015 10:22 788K
460-FleXORFlexiblegarblingforXORgatesthatbeatsf..> 02-Jan-2015 10:22 527K
461-Provablysecureandefficientcertificatelesssi..> 20-Jan-2023 14:19 207
462-EfficientKeypolicyAttributebasedEncryptionf..> 02-Jan-2015 10:22 323K
463-LeveledFullyHomomorphicSignaturesfromLattic..> 02-Jan-2015 10:22 298K
464-ProvidingRootofTrustforARMTrustZoneusingOnC..> 02-Jan-2015 10:22 1M
465-SemiAdaptiveAttributeBasedEncryptionandImpr..> 02-Jan-2015 10:22 238K
466-Onanewpropertiesofnumbersequencesarandomnes..> 20-Jan-2023 08:28 350K
466-Onanewpropertiesofnumbersequencesarandomnes..> 02-Jan-2015 10:22 350K
467-AdHocSecureTwoPartyComputationonMobileDevic..> 02-Jan-2015 10:22 727K
468-PrivacyPreservingAuditingforAttributeBasedC..> 02-Jan-2015 10:22 407K
469-HomomorphicSignatureswithEfficientVerificat..> 02-Jan-2015 10:21 385K
470-PPDCPABEPrivacyPreservingDecentralizedCiphe..> 02-Jan-2015 10:21 335K
471-LargeUniverseCiphertextPolicyAttributeBased..> 02-Jan-2015 10:21 417K
472-HowtoWatermarkCryptographicFunctions.pdf 02-Jan-2015 10:21 447K
473-AnEfficientCloudbasedRevocableIdentitybased..> 20-Jan-2023 14:19 207
474-CryptographicSchemesBasedontheASASAStructur..> 02-Jan-2015 10:21 567K
475-AKeyRecoveryAttackonErrorCorrectingCodeBase..> 02-Jan-2015 10:21 363K
476-Simon39sCircuit.pdf 20-Jan-2023 08:28 99K
476-SimonsCircuit.pdf 02-Jan-2015 10:21 99K
477-RelaxedTwotooneRecodingSchemes.pdf 02-Jan-2015 10:21 239K
478-RelatedKeySecurePseudorandomFunctionsTheCas..> 02-Jan-2015 10:21 394K
479-EvenmorepracticalsecureloggingTreebasedSeek..> 02-Jan-2015 10:21 419K
480-CryptographicAgentsTowardsaUnifiedTheoryofC..> 20-Jan-2023 08:28 584K
480-TowardsaUnifiedTheoryofCryptographicAgents.pdf 02-Jan-2015 10:21 851K
481-UniversallyComposableNonInteractiveKeyExcha..> 02-Jan-2015 10:21 487K
482-DifferentiallyPrivateDataAggregationwithOpt..> 02-Jan-2015 10:21 1007K
483-DisjunctionsforHashProofSystemsNewConstruct..> 02-Jan-2015 10:21 568K
484-SealingtheLeakonClassicalNTRUSignatures.pdf 02-Jan-2015 10:21 444K
485-AnImprovedTruncatedDifferentialCryptanalysi..> 02-Jan-2015 10:21 457K
486-BinaryElligatorSquared.pdf 02-Jan-2015 10:21 321K
487-GGHLiteMoreEfficientMultilinearMapsfromIdea..> 02-Jan-2015 10:21 716K
488-RelatedKeySecurityforPseudorandomFunctionsB..> 02-Jan-2015 10:21 938K
489-AGeneticAlgorithmforSearchingShortestLattic..> 02-Jan-2015 10:21 500K
490-UniversallyComposablesecureTNCprotocolbased..> 02-Jan-2015 10:21 359K
491-BootstrappableIdentityBasedFullyHomomorphic..> 02-Jan-2015 10:21 454K
492-Faultattacksonpairingbasedprotocolsrevisite..> 02-Jan-2015 10:20 206K
493-ArithmeticonAbelianandKummerVarieties.pdf 02-Jan-2015 10:20 539K
494-HardnessofkLWEandApplicationsinTraitorTraci..> 02-Jan-2015 10:20 729K
495-ImprovedShortLatticeSignaturesintheStandard..> 02-Jan-2015 10:20 600K
496-SecurityPitfallsofaProvablySecureIdentityba..> 02-Jan-2015 10:20 255K
497-NREPONormalBasisRecomputingwithPermutedOper..> 02-Jan-2015 10:20 711K
498-LightweightDiffusionLayerfromthekthrootofth..> 02-Jan-2015 10:20 375K
499-SecurityandEfficiencyAnalysisofTheHammingDi..> 02-Jan-2015 10:20 681K
500-VerifiableandSecureOutsourcingSchemesofModu..> 02-Jan-2015 10:20 416K
501-LighterFasterandConstantTimeWhirlBobtheWhir..> 02-Jan-2015 10:20 899K
501-WHIRLBOBtheWhirlpoolbasedVariantofSTRIBOBLi..> 20-Jan-2023 08:28 482K
502-What39stheGistPrivacyPreservingAggregationo..> 20-Jan-2023 08:28 994K
502-WhatstheGistPrivacyPreservingAggregationofU..> 02-Jan-2015 10:20 994K
503-EfficientHiddenVectorEncryptionwithConstant..> 02-Jan-2015 10:20 225K
504-AProvableSecurityAnalysisofIntel39sSecureKe..> 20-Jan-2023 08:28 613K
504-AProvableSecurityAnalysisofIntelsSecureKeyR..> 02-Jan-2015 10:20 665K
505-Onthequaternionellisogenypathproblem.pdf 02-Jan-2015 10:20 891K
506-FindingRootsinGFpnwiththeSuccessiveResultan..> 02-Jan-2015 10:20 570K
507-HowtoGenerateanduseUniversalParameters.pdf 02-Jan-2015 10:20 840K
507-HowtoGenerateanduseUniversalSamplers.pdf 20-Jan-2023 08:28 892K
508-ReversingStealthyDopantLevelCircuits.pdf 02-Jan-2015 10:20 6M
509-Privacypreservingdelegatedwordsearchinthecl..> 02-Jan-2015 10:20 217K
510-AProbabilisticAlgebraicAttackontheGrainFami..> 02-Jan-2015 10:20 341K
511-ConstructingCCAsecurepredicateencapsulation..> 02-Jan-2015 10:19 369K
512-Rmindatoolforcryptographicallysecurestatist..> 02-Jan-2015 10:19 1M
513-RSAmeetsDPARecoveringRSASecretKeysfromNoisy..> 02-Jan-2015 10:19 250K
514-OnConstrainedImplementationofLatticebasedCr..> 02-Jan-2015 10:19 2M
515-IdealSocialSecretSharingUsingBirkhoffInterp..> 02-Jan-2015 10:19 148K
516-OntheClassificationofFiniteBooleanFunctions..> 02-Jan-2015 10:19 234K
517-OntheConnectionbetweenLeakageToleranceandAd..> 02-Jan-2015 10:19 360K
518-CryptographyfromCompressionFunctionsTheUCEB..> 02-Jan-2015 10:19 614K
519-RealizingPicoFinallyNoMorePasswords.pdf 02-Jan-2015 10:19 1M
520-Onpowersofcodes.pdf 22-Dec-2014 12:36 400K
520-SquaresofRandomLinearCodes.pdf 20-Jan-2023 08:28 393K
520-Squaresofrandomlinearcodes.pdf 02-Jan-2015 10:19 382K
521-AdaptivelySecurePuncturablePseudorandomFunc..> 02-Jan-2015 10:19 514K
522-ConstrainedPseudorandomFunctionsVerifiablea..> 02-Jan-2015 10:19 488K
523-FullySecureandFastSigningfromObfuscation.pdf 02-Jan-2015 10:19 288K
524-ConstructinghyperbentfunctionsfromBooleanfu..> 02-Jan-2015 10:19 109K
525-DifferentialAnalysisonBlockCipherPRIDE.pdf 02-Jan-2015 10:19 366K
526-Curve41417Karatsubarevisited.pdf 02-Jan-2015 10:19 375K
527-GoodisNotGoodEnoughDerivingOptimalDistingui..> 02-Jan-2015 10:19 1M
528-GroupsWithTwoGeneratorsHavingUnsolvableWord..> 02-Jan-2015 10:19 235K
529-LeakageResilientSignatureswithGracefulDegra..> 02-Jan-2015 10:19 369K
530-FOAMSearchingforHardwareOptimalSPNStructure..> 02-Jan-2015 10:19 693K
531-SpatialBloomFiltersEnablingPrivacyinLocatio..> 02-Jan-2015 10:19 387K
532-OnthePitfallsofusingArbiterPUFsasBuildingBl..> 20-Jan-2023 08:28 589K
533-IndifferentiabilityResultsandProofsforSomeP..> 02-Jan-2015 10:19 689K
534-DifferentialPowerAnalysisofaMcElieceCryptos..> 02-Jan-2015 10:18 743K
535-OnKeyRecoveryAttacksagainstExistingSomewhat..> 02-Jan-2015 10:18 498K
536-ASurveyandNewResultsontheDecompositionofanN..> 20-Jan-2023 08:27 187K
536-OnDecompositionofanNFSRintoaCascadeConnecti..> 02-Jan-2015 10:18 183K
537-ConstrainedVerifiableRandomFunctions.pdf 02-Jan-2015 10:18 440K
538-ASecureCloudbasedNFCMobilePaymentProtocol.pdf 20-Jan-2023 14:19 207
539-FasterSecureArithmeticComputationUsingSwitc..> 02-Jan-2015 10:18 484K
540-OptimizedArchitectureforAES.pdf 02-Jan-2015 10:18 635K
541-EMAttackIsNonInvasiveDesignMethodologyandVa..> 02-Jan-2015 10:18 2M
542-OntheMultioutputFilteringModelandItsApplica..> 02-Jan-2015 10:18 454K
543-APracticalSecondOrderFaultAttackagainstaRea..> 02-Jan-2015 10:18 417K
544-SecureMutualTestingStrategyforCryptographic..> 02-Jan-2015 10:18 339K
545-Solvingclosestvectorinstancesusinganapproxi..> 02-Jan-2015 10:18 115K
546-AnonymousandPubliclyLinkableReputationSyste..> 02-Jan-2015 10:18 488K
547-AuthenticationCodesBasedonResilientBooleanM..> 20-Jan-2023 08:27 310K
547-AuthenticationSchemesBasedonResilientMaps.pdf 02-Jan-2015 10:18 301K
548-ImplicitfactorizationofunbalancedRSAmoduli.pdf 02-Jan-2015 10:18 420K
549-NewAttacksontheRSACryptosystem.pdf 02-Jan-2015 10:18 393K
550-FunctionPrivateFunctionalEncryptioninthePri..> 02-Jan-2015 10:18 157K
551-DiffusionMatricesfromAlgebraicGeometryCodes..> 02-Jan-2015 10:18 276K
552-EfficientRecordLevelKeylessSignaturesforAud..> 02-Jan-2015 10:18 264K
553-ASimplerVariantofUniversallyComposableSecur..> 02-Jan-2015 10:18 1M
554-OnVirtualGreyBoxObfuscationforGeneralCircui..> 02-Jan-2015 10:18 631K
555-GeneralStatisticallySecureComputationwithBo..> 02-Jan-2015 10:18 539K
556-SecuringCloudDataintheNewAttackerModel.pdf 02-Jan-2015 10:18 339K
557-RoundEfficientBlackBoxConstructionofComposa..> 02-Jan-2015 10:18 271K
558-DoubleshieldedPublicKeyCryptosystems.pdf 02-Jan-2015 10:17 282K
559-CountermeasuresAgainstHighOrderFaultInjecti..> 02-Jan-2015 10:17 486K
560-AnInvestigationofSomeForwardSecurityPropert..> 02-Jan-2015 10:17 148K
560-TowardsForwardSecurityPropertiesforPEKSandI..> 20-Jan-2023 08:27 146K
561-PerformanceIncreasingApproachesForBinaryFie..> 02-Jan-2015 10:17 272K
562-hHBaHarderHBProtocol.pdf 02-Jan-2015 10:17 268K
563-AnalysisofBoomerangDifferentialTrailsviaaSA..> 02-Jan-2015 10:17 332K
564-ASecurityDefinitionforMultiSecretSharingand..> 02-Jan-2015 10:17 3M
565-KangaroosinSideChannelAttacks.pdf 02-Jan-2015 10:17 467K
566-DirectConstructionofRecursiveMDSDiffusionLa..> 02-Jan-2015 10:17 370K
567-AttributeBasedSignatureswithoutPairingsbyth..> 20-Jan-2023 08:27 459K
568-NewClassesofPublicKeyCryptosystemsoverF_28C..> 02-Jan-2015 10:17 149K
569-FastLatticePointEnumerationwithMinimalOverh..> 02-Jan-2015 10:17 720K
570-DejaQUsingDualSystemstoRevisitqTypeAssumpti..> 02-Jan-2015 10:17 501K
571-Howtomanipulatecurvestandardsawhitepaperfor..> 02-Jan-2015 10:17 316K
572-OntheOptimalityofDifferentialFaultAnalyseso..> 02-Jan-2015 10:17 495K
573-AnewpublickeysystembasedonPolynomialsoverfi..> 02-Jan-2015 10:17 154K
574-SecurityAnalysisofMultilinearMapsovertheInt..> 02-Jan-2015 10:17 492K
575-SimpleAEADHardwareInterfaceSAEHIinaSoCImple..> 02-Jan-2015 10:17 875K
575-SimpleAEADHardwareInterfaceSHIinaSoCImpleme..> 20-Jan-2023 08:27 875K
576-VernamTwo.pdf 02-Jan-2015 10:17 490K
577-ReducingCommunicationOverheadoftheSubsetDif..> 02-Jan-2015 10:17 402K
578-TheExactPRFSecurityofNMACandHMAC.pdf 02-Jan-2015 10:17 481K
579-ScanBasedSideChannelAttackonGrainv1.pdf 20-Jan-2023 14:19 207
580-TheHuntingoftheSNARK.pdf 02-Jan-2015 10:17 809K
581-HierarchicalIdentityBasedEncryptionfromAffi..> 02-Jan-2015 10:17 861K
582-NSEC5ProvablyPreventingDNSSECZoneEnumeratio..> 02-Jan-2015 10:16 421K
583-TemplateAttacksBasedOnPrioriKnowledge.pdf 02-Jan-2015 10:16 150K
584-UniversallyComposableEfficientPricedOblivio..> 02-Jan-2015 10:16 472K
585-TheSPEKEProtocolRevisited.pdf 02-Jan-2015 10:16 264K
586-AnAlgebraicApproachtoNonMalleability.pdf 02-Jan-2015 10:16 516K
587-Noninteractivezeroknowledgeproofsinthequant..> 02-Jan-2015 10:16 761K
588-APuncturedProgrammingApproachtoAdaptivelySe..> 02-Jan-2015 10:16 340K
589-AuthenticatedKeyExchangefromIdealLattices.pdf 02-Jan-2015 10:16 500K
590-Automatedalgebraicanalysisofstructurepreser..> 02-Jan-2015 10:16 330K
591-CompactandSideChannelSecureDiscreteGaussian..> 02-Jan-2015 10:16 223K
592-MultiprecisionmultiplicationonAVRrevisited.pdf 02-Jan-2015 10:16 241K
593-ImprovedExponentialtimeAlgorithmsforInhomog..> 02-Jan-2015 10:16 398K
594-ObliviousParallelRAM.pdf 02-Jan-2015 10:16 448K
594-ObliviousParallelRAMandApplications.pdf 20-Jan-2023 08:27 565K
595-ScalableZeroKnowledgeviaCyclesofEllipticCur..> 02-Jan-2015 10:16 735K
596-SecureandObliviousMaximumBipartiteMatchingS..> 02-Jan-2015 10:16 329K
597-InvisibleAdaptiveAttacks.pdf 02-Jan-2015 10:16 486K
598-PrivacyFreeGarbledCircuitswithApplicationsT..> 02-Jan-2015 10:16 706K
599-PostquantumkeyexchangefortheTLSprotocolfrom..> 02-Jan-2015 10:16 561K
600-DTKIanewformalizedPKIwithnotrustedparties.pdf 20-Jan-2023 14:19 207
601-AdaptiveversusStaticSecurityintheUCModel.pdf 02-Jan-2015 10:16 386K
602-ACryptographicStudyofTokenizationSystems.pdf 02-Jan-2015 10:16 294K
603-RecursiveTreesforPracticalORAM.pdf 02-Jan-2015 10:16 430K
604-PrivateWebSearchwithConstantRoundEfficiency..> 02-Jan-2015 10:16 235K
605-OntheLimitationsofComputationalFuzzyExtract..> 20-Jan-2023 08:27 93K
605-OntheLimitsofComputationalFuzzyExtractors.pdf 02-Jan-2015 10:16 88K
606-AMultiFunctionProvableDataPossessionSchemei..> 02-Jan-2015 10:16 1M
607-AddingControllableLinkabilitytoPairingBased..> 02-Jan-2015 10:15 411K
608-KeypolicyAttributebasedEncryptionforBoolean..> 02-Jan-2015 10:15 341K
609-PublicKeyEncryptionIndistinguishableUnderPl..> 20-Jan-2023 08:27 791K
609-StructurePreservingEncryptionIndistinguisha..> 02-Jan-2015 10:15 699K
610-ComputingontheEdgeofChaosStructureandRandom..> 02-Jan-2015 10:15 302K
611-AccumulatingAutomataandCascadedEquationsAut..> 02-Jan-2015 10:15 144K
612-AttributeBasedEncryptionOptimizedforCloudCo..> 02-Jan-2015 10:15 377K
613-ASecurityAnalysisoftheCompositionofChaCha20..> 02-Jan-2015 10:15 329K
614-ExpressiveandSecureSearchableEncryptioninth..> 02-Jan-2015 10:15 323K
615-OptimallyResilientandAdaptivelySecureMultiP..> 02-Jan-2015 10:15 493K
615-TheHiddenGraphModelCommunicationLocalityand..> 20-Jan-2023 08:27 496K
616-PracticalAttributeBasedEncryptionTraitorTra..> 02-Jan-2015 10:15 614K
617-ADSNARKNearlyPracticalandPrivacyPreservingP..> 02-Jan-2015 10:15 944K
618-ProvingCorrectnessandSecurityofTwoPartyComp..> 02-Jan-2015 10:15 392K
619-THENEWHEURISTICGUESSANDDETERMINEATTACKONSNO..> 02-Jan-2015 10:15 393K
620-TheM3dcryptPasswordHashingFunction.pdf 20-Jan-2023 08:27 430K
620-TheM3dcryptPasswordScheme.pdf 02-Jan-2015 10:15 339K
621-NothingelseMATorsMonitoringtheAnonymityofTo..> 20-Jan-2023 08:27 1M
621-NothingelseMATorsMonitoringtheAnonymityofTo..> 02-Jan-2015 10:15 1M
622-FullySecureAttributeBasedEncryptionfromMult..> 02-Jan-2015 10:15 432K
623-PrivacyandImperfectRandomness.pdf 02-Jan-2015 10:15 482K
623-PrivacywithImperfectRandomness.pdf 20-Jan-2023 08:27 501K
624-KTORAMABandwidthefficientORAMBuiltonKaryTre..> 02-Jan-2015 10:15 310K
625-PrettyUnderstandableDemocracy20.pdf 02-Jan-2015 10:15 1M
626-GetYourHandsOffMyLaptopPhysicalSideChannelK..> 02-Jan-2015 10:15 5M
627-OnModesofOperationsofaBlockCipherforAuthent..> 02-Jan-2015 10:14 563K
628-AnEfficienttCheaterIdentifiableSecretSharin..> 02-Jan-2015 10:14 315K
629-TwofactorauthenticationfortheBitcoinprotoco..> 02-Jan-2015 10:14 359K
630-PrivacyPreservingMinimumSpanningTreesthroug..> 02-Jan-2015 10:14 317K
631-ZipfsLawinPasswords.pdf 02-Jan-2015 10:14 997K
632-VerifiableOrderQueriesandOrderStatisticsona..> 02-Jan-2015 10:14 320K
633-ClientServerConcurrentZeroKnowledgewithCons..> 02-Jan-2015 10:14 263K
634-ConstantRoundLeakageResilientZeroKnowledgeA..> 02-Jan-2015 10:14 377K
635-Type2StructurePreservingSignatureSchemesRev..> 02-Jan-2015 10:14 146K
636-ImprovedTimingAttacksonECDSA.pdf 02-Jan-2015 10:14 287K
637-GenericHardnessoftheMultipleDiscreteLogarit..> 02-Jan-2015 10:14 341K
638-PatternMatchingEncryption.pdf 02-Jan-2015 10:14 433K
638-SubstringSearchableSymmetricEncryption.pdf 20-Jan-2023 08:27 480K
639-AutomatedDesignImplementationandEvaluationo..> 02-Jan-2015 10:14 942K
640-RevocationinPubliclyVerifiableOutsourcedCom..> 02-Jan-2015 10:14 505K
641-TheMultipleNumberFieldSievewithConjugationM..> 02-Jan-2015 10:14 597K
642-BalancedpermutationsEvenMansourciphers.pdf 02-Jan-2015 10:14 424K
643-OntheSecurityofAnEfficientBiometricAuthenti..> 02-Jan-2015 10:14 155K
643-OntheSecurityofAnEfficientBiometricAuthenti..> 20-Jan-2023 08:27 155K
644-SideChannelAttacksVulnerabilityAnalysisofPR..> 02-Jan-2015 10:14 979K
645-GraphInducedMultilinearMapsfromLattices.pdf 02-Jan-2015 10:14 432K
646-HighspeedPolynomialMultiplicationArchitectu..> 02-Jan-2015 10:14 356K
647-UniversallyComposableSecureGroupCommunicati..> 02-Jan-2015 10:14 134K
648-AnEquivalentConditionontheSwitchingConstruc..> 02-Jan-2015 10:14 279K
649-FPGATrojansthroughDetectingandWeakeningofCr..> 02-Jan-2015 10:14 2M
650-RoundOptimalPasswordProtectedSecretSharinga..> 02-Jan-2015 10:13 638K
651-AnoteonCCA2protectedMcElieceCryptosystemwit..> 02-Jan-2015 10:13 195K
652-ADynamicCubeAttackon105roundGrainv1.pdf 02-Jan-2015 10:13 498K
653-Mersennefactorizationfactory.pdf 02-Jan-2015 10:13 366K
654-MultiBitDifferentialFaultAnalysisofGrain128..> 02-Jan-2015 10:13 335K
655-PlecoandPlectronTwoProvablySecurePasswordHa..> 02-Jan-2015 10:13 322K
656-CryptanalyticTimeMemoryDataTradeoffsforFXCo..> 02-Jan-2015 10:13 394K
657-OnthecycledecompositionoftheWGNLFSR.pdf 02-Jan-2015 10:13 308K
658-AClassofFSRsandTheirAdjacencyGraphs.pdf 02-Jan-2015 10:13 297K
658-TheAdjacencyGraphsofSomeFeedbackShiftRegist..> 20-Jan-2023 08:27 297K
659-OnthePrimitivityofTrinomialsoverSmallFinite..> 02-Jan-2015 10:13 356K
660-InteractiveProofsunderContinualMemoryLeakag..> 02-Jan-2015 10:13 608K
661-OneRoundDeniableKeyExchangewithPerfectForwa..> 02-Jan-2015 10:13 152K
662-OutsourcedPatternMatching.pdf 02-Jan-2015 10:13 459K
663-LocallyDecodableandUpdatableNonMalleableCod..> 02-Jan-2015 10:13 493K
664-OntheOptimalPreComputationofWindowtauNAFfor..> 02-Jan-2015 10:13 316K
665-OrthogonalDirectSumMaskingASmartcardFriendl..> 02-Jan-2015 10:13 481K
666-FullySecureFunctionalEncryptionwithoutObfus..> 02-Jan-2015 10:13 475K
666-FunctionalEncryptionWithoutObfuscation.pdf 20-Jan-2023 08:27 476K
667-CutandChooseBasedTwoPartyComputationintheOn..> 02-Jan-2015 10:13 676K
668-FairnessVersusGuaranteedOutputDeliveryinSec..> 02-Jan-2015 10:13 337K
668-FairnessversusGuaranteedOutputDeliveryinSec..> 20-Jan-2023 08:27 429K
669-OntheCommunicationComplexityofSecureFunctio..> 02-Jan-2015 10:13 481K
670-DoubleModandSingleModSimpleRandomizedSecret..> 02-Jan-2015 10:13 188K
671-SCORAMObliviousRAMforSecureComputation.pdf 02-Jan-2015 10:13 604K
672-CircuitORAMOnTightnessoftheGoldreichOstrovs..> 02-Jan-2015 10:13 994K
673-HowtoEstimatetheSuccessRateofHigherOrderSid..> 02-Jan-2015 10:12 2M
674-EfficientRAMandcontrolflowinverifiableoutso..> 02-Jan-2015 10:12 331K
675-TheUsageofCounterRevisitedSecondPreimageAtt..> 02-Jan-2015 10:12 374K
676-FullyCollusionResistantTraceableKeyPolicyAt..> 02-Jan-2015 10:12 411K
677-AttacksinStreamCiphersASurvey.pdf 02-Jan-2015 10:12 253K
678-ACounterexampletotheChainRuleforConditional..> 02-Jan-2015 10:12 472K
679-ANoteontheBellareRivestProtocolforTransluce..> 02-Jan-2015 10:12 191K
680-RemarksontheCryptographicPrimitiveofAttribu..> 02-Jan-2015 10:12 307K
681-ImprovedLinearCryptanalysisofReducedroundSI..> 02-Jan-2015 10:12 865K
682-AUnifiedFormalismforPhysicalAttacks.pdf 02-Jan-2015 10:12 1M
683-ErrorTolerantAlgebraicSideChannelAttacksUsi..> 02-Jan-2015 10:12 161K
684-TowardsaFullFeaturedImplementationofAttribu..> 02-Jan-2015 10:12 274K
685-BitSecurityoftheCDHProblemsoverFiniteField.pdf 20-Jan-2023 08:27 439K
685-BitsSecurityoftheCDHProblemsoverFiniteField..> 02-Jan-2015 10:12 490K
686-ARecursiveRelationBetweenTheAdjacencyGrapho..> 02-Jan-2015 10:12 349K
687-ReducingtheComplexityofNormalBasisMultiplic..> 02-Jan-2015 10:12 205K
688-AnalyticToolboxforWhiteBoxImplementationsLi..> 02-Jan-2015 10:12 706K
688-WhiteBoxAESImplementationRevisited.pdf 20-Jan-2023 08:27 689K
689-EfficientImplementationofKeylessSignaturesw..> 02-Jan-2015 10:12 482K
690-EfficientIntervalCheckinthePresenceofMalici..> 02-Jan-2015 10:12 371K
691-IntegrationofhardwaretokensintheIdemixlibra..> 02-Jan-2015 10:12 333K
692-ExtendingObliviousTransferEfficientlyorHowt..> 02-Jan-2015 10:12 330K
693-OptimalProximityProofs.pdf 02-Jan-2015 10:12 298K
694-MaliciousHashingEve39sVariantofSHA1.pdf 20-Jan-2023 08:27 433K
694-MaliciousHashingEvesVariantofSHA1.pdf 02-Jan-2015 10:12 433K
695-ProofofProximityofKnowledge.pdf 02-Jan-2015 10:12 127K
696-SecurityProofsfortheBLTSignatureScheme.pdf 02-Jan-2015 10:11 586K
697-AFullyHomomorphicEncryptionSchemewithBetter..> 02-Jan-2015 10:11 306K
698-HIMMOALightweightFullyCollusionResistantKey..> 02-Jan-2015 10:11 496K
698-HIMMOAlightweightcollusionresistantkeypredi..> 20-Jan-2023 08:27 891K
699-ScrutinizingandImprovingImpossibleDifferent..> 02-Jan-2015 10:11 3M
700-BoundedPreImageAwarenessandtheSecurityofHas..> 02-Jan-2015 10:11 389K
701-APracticalIterativeSideChannelCubeAttackonA..> 20-Jan-2023 14:19 207
702-DefeatingISO97971MACAlgo3byCombiningSideCha..> 02-Jan-2015 10:11 2M
703-LinearityMeasuresforMQCryptography.pdf 02-Jan-2015 10:11 388K
704-A128bitBlockCipherBasedonThreeGroupArithmet..> 02-Jan-2015 10:11 157K
705-StructurePreservingSignaturesonEquivalenceC..> 02-Jan-2015 10:11 494K
706-TheFeasibilityofOutsourcedDatabaseSearchint..> 02-Jan-2015 10:11 260K
707-AnalysisOfVarianceandCPAinSCA.pdf 02-Jan-2015 10:11 2M
708-FormalTreatmentofPrivacyEnhancingCredential..> 02-Jan-2015 10:11 748K
709-ANoteonQuantumSecurityforPostQuantumCryptog..> 02-Jan-2015 10:11 234K
710-AnEfficientTransformfromSigmaProtocolstoNIZ..> 02-Jan-2015 10:11 398K
711-NewClassofMultivariatePublicKeyCryptosystem..> 02-Jan-2015 10:11 111K
712-HybridAnomalyDetectionusingKMeansClustering..> 02-Jan-2015 10:11 935K
713-CoLocationResistantClouds.pdf 02-Jan-2015 10:11 577K
714-Acomprehensiveempiricalcomparisonofparallel..> 02-Jan-2015 10:11 494K
715-CryptanalysisonRobustBiometricsBasedAuthent..> 02-Jan-2015 10:11 168K
715-CryptanalysisonRobustBiometricsBasedAuthent..> 20-Jan-2023 08:27 168K
716-WireTapCodesasSideChannelCountermeasureanFP..> 02-Jan-2015 10:11 2M
717-HowtoSplitaSecretintoUnknownShares.pdf 02-Jan-2015 10:10 269K
718-SquareSpanProgramswithApplicationstoSuccinc..> 02-Jan-2015 10:10 398K
719-BivariatePolynomialsModuloCompositesandthei..> 02-Jan-2015 10:10 246K
720-AdaptivelySecureConstrainedPseudorandomFunc..> 02-Jan-2015 10:10 358K
721-OnShor39sFactoringAlgorithmwithMoreRegister..> 20-Jan-2023 08:27 371K
721-OnShorsFactoringAlgorithmwithMoreRegistersa..> 02-Jan-2015 10:10 371K
722-DifferentialCryptanalysisofSipHash.pdf 02-Jan-2015 10:10 300K
723-Cryptoanalysesonsecureandefficientprivacypr..> 02-Jan-2015 10:10 56K
724-ProtectingEncryptedCookiesfromCompressionSi..> 02-Jan-2015 10:10 453K
725-EfficientSoftwareImplementationofRingLWEEnc..> 02-Jan-2015 10:10 246K
726-CIARPARISCProcessorForCryptographyApplicati..> 20-Jan-2023 14:19 207
727-TheQcurveConstructionforEndomorphismAcceler..> 02-Jan-2015 10:10 417K
728-UnpickingPLAIDACryptographicAnalysisofanISO..> 02-Jan-2015 10:10 605K
729-FasterBinaryFieldMultiplicationandFasterBin..> 02-Jan-2015 10:10 359K
730-DifferentiallyPrivateLinearAlgebraintheStre..> 02-Jan-2015 10:10 506K
731-Securemodularpasswordauthenticationforthewe..> 02-Jan-2015 10:10 690K
732-ResizableTreeBasedObliviousRAM.pdf 02-Jan-2015 10:10 337K
733-AugmentedLearningwithErrorsTheUntappedPoten..> 02-Jan-2015 10:10 706K
734-Sboxpipeliningusinggeneticalgorithmsforhigh..> 02-Jan-2015 10:10 196K
735-DealerLeakageResilientVerifiableSecretShari..> 02-Jan-2015 10:10 303K
736-CubeAttacksandCubeattacklikeCryptanalysison..> 02-Jan-2015 10:10 526K
737-Designandanalysisofoneroundcertificatelessa..> 20-Jan-2023 14:19 207
738-AVeryCompactFPGAImplementationofLEDandPHOTO..> 02-Jan-2015 10:10 494K
739-SBIMQaMultivariatePolynomialTrapdoorFunctio..> 02-Jan-2015 10:10 98K
740-Nonexistenceofn5typeGeneralizedBentfunction..> 02-Jan-2015 10:10 201K
741-EliminatingLeakageinReverseFuzzyExtractors.pdf 02-Jan-2015 10:10 5M
742-AsurveyofFaultAttacksinPairingBasedCryptogr..> 02-Jan-2015 10:09 503K
743-ConciseMultiChallengeCCASecureEncryptionand..> 02-Jan-2015 10:09 622K
744-Sievingforshortestvectorsinlatticesusingang..> 02-Jan-2015 10:09 9M
745-UniversalSignatureAggregators.pdf 02-Jan-2015 10:09 636K
746-Decoybasedinformationsecurity.pdf 02-Jan-2015 10:09 120K
747-AutomaticEnumerationofRelatedkeyDifferentia..> 02-Jan-2015 10:09 496K
747-TowardsFindingtheBestCharacteristicsofSomeB..> 20-Jan-2023 08:26 568K
748-EfficientandVerifiableAlgorithmsforSecureOu..> 02-Jan-2015 10:09 318K
749-BitlinePUFBuildingNativeChallengeResponsePU..> 02-Jan-2015 10:09 1002K
750-HardwareTrojanHorsesinCryptographicIPCores.pdf 02-Jan-2015 10:09 1M
751-HigherOrderThresholdImplementations.pdf 02-Jan-2015 10:09 1M
752-KeyIndistinguishabilityvsStrongKeyIndisting..> 02-Jan-2015 10:09 287K
753-OnlineDeniabilityforMultipartyProtocolswith..> 02-Jan-2015 10:09 510K
754-BilinearEntropyExpansionfromtheDecisionalLi..> 02-Jan-2015 10:09 471K
755-ComputingModWithoutMod.pdf 02-Jan-2015 10:09 328K
756-TwoHalvesMakeaWholeReducingDataTransferinGa..> 02-Jan-2015 10:09 379K
757-AdaptivelySecureBroadcastEncryptionwithSmal..> 02-Jan-2015 10:09 482K
758-CryptographicReverseFirewalls.pdf 02-Jan-2015 10:09 693K
759-HowtoEfficientlyEvaluateRAMProgramswithMali..> 02-Jan-2015 10:09 537K
760-MontgomeryModularMultiplicationonARMNEONRev..> 02-Jan-2015 10:09 480K
761-CryptanalysisofReducedroundSIMON32andSIMON4..> 02-Jan-2015 10:08 394K
762-AccessControlinPubliclyVerifiableOutsourced..> 02-Jan-2015 10:08 472K
763-OnthePrivacyProvisionsofBloomFiltersinLight..> 02-Jan-2015 10:08 355K
764-OneoutofManyProofsOrHowtoLeakaSecretandSpen..> 02-Jan-2015 10:08 420K
765-TheBitcoinBackboneProtocolAnalysisandApplic..> 02-Jan-2015 10:08 906K
766-SuccinctGarblingSchemesandApplications.pdf 02-Jan-2015 10:08 616K
767-AlgebraicAttacksonHumanIdentificationProtoc..> 02-Jan-2015 10:08 622K
768-CutandChooseBilateralObliviousTransferandIt..> 02-Jan-2015 10:08 323K
769-IndistinguishabilityObfuscationofIteratedCi..> 02-Jan-2015 10:08 591K
770-AESCipherKeysSuitableforEfficientSideChanne..> 02-Jan-2015 10:08 179K
771-SuccinctRandomizedEncodingsandtheirApplicat..> 02-Jan-2015 10:08 537K
772-FullySecureandSuccinctAttributeBasedEncrypt..> 02-Jan-2015 10:08 623K
773-ObfuscatingLowRankMatrixBranchingPrograms.pdf 02-Jan-2015 10:08 566K
774-AutomatedAnalysisandSynthesisofBlockCipherM..> 02-Jan-2015 10:08 412K
775-LockfreeGaussSieveforLinearSpeedupsinParall..> 02-Jan-2015 10:08 492K
776-HowtoObfuscateProgramsDirectly.pdf 02-Jan-2015 10:08 815K
777-BatchFullyHomomorphicEncryptionoverIntegers..> 02-Jan-2015 10:08 172K
778-AnonymousIBEfromQuadraticResiduositywithImp..> 02-Jan-2015 10:08 387K
779-ImplementingCryptographicProgramObfuscation..> 02-Jan-2015 10:08 663K
780-DeterministicPublicKeyEncryptionunderContin..> 02-Jan-2015 10:08 536K
781-Tallybasedsimpledecodersfortraitortracingan..> 02-Jan-2015 10:08 724K
782-PreciseFaultInjectionsusingVoltageandTemper..> 02-Jan-2015 10:08 231K
783-ParametricTrojansforFaultInjectionAttackson..> 02-Jan-2015 10:07 910K
784-WeakInstancesofPLWE.pdf 02-Jan-2015 10:07 301K
785-DivisibleECashMadePractical.pdf 02-Jan-2015 10:07 495K
786-OntheIndifferentiabilityofKeyAlternatingFei..> 22-Dec-2014 12:24 353K
787-AnotherTorispossible.pdf 02-Jan-2015 10:07 197K
788-TuningGaussSieveforSpeed.pdf 02-Jan-2015 10:07 486K
789-StatisticalPropertiesoftheSquareMapModuloaP..> 02-Jan-2015 10:07 693K
790-FaultAttackrevealingSecretKeysofExponentiat..> 02-Jan-2015 10:07 222K
791-QuantumBitCommitmentwithApplicationinQuantu..> 02-Jan-2015 10:07 241K
792-ClassificationoftheCAESARCandidates.pdf 02-Jan-2015 10:07 317K
792-GeneralClassificationoftheAuthenticatedEncr..> 20-Jan-2023 08:26 666K
793-RobustAuthenticatedEncryptionAEZandtheProbl..> 02-Jan-2015 10:07 393K
794-EfficientIdentityBasedEncryptionoverNTRULat..> 02-Jan-2015 10:07 540K
795-SPHINCSpracticalstatelesshashbasedsignature..> 02-Jan-2015 10:07 669K
796-DistributedCryptographyBasedontheProofsofWo..> 02-Jan-2015 10:07 504K
797-TightlySecureAuthenticatedKeyExchange.pdf 02-Jan-2015 10:07 511K
798-MultiIdentityandMultiKeyLeveledFHEfromLearn..> 02-Jan-2015 10:07 564K
799-VerifiableRandomFunctionsfromWeakerAssumpti..> 02-Jan-2015 10:07 348K
800-EfficientPairingsandECCforEmbeddedSystems.pdf 02-Jan-2015 10:07 693K
801-ReversedGeneticAlgorithmsforGenerationofBij..> 02-Jan-2015 10:07 371K
802-PhysicalCharacterizationofArbiterPUFs.pdf 02-Jan-2015 10:07 6M
803-ADecentralizedPublicKeyInfrastructurewithId..> 02-Jan-2015 10:07 251K
804-ShortSignaturesWithShortPublicKeysFromHomom..> 02-Jan-2015 10:06 327K
804-ShortSignaturesfromHomomorphicTrapdoorFunct..> 22-Dec-2014 12:23 323K
805-DualSystemSimulationSoundnesswithApplicatio..> 02-Jan-2015 10:06 372K
806-Summationpolynomialalgorithmsforellipticcur..> 02-Jan-2015 10:06 349K
807-Leakageresilientnonmalleablecodes.pdf 02-Jan-2015 10:06 522K
808-OnlineOfflineRingSignatureSchemewithProvabl..> 02-Jan-2015 10:06 135K
809-ServerAidedTwoPartyComputationwithMinimalCo..> 20-Jan-2023 08:26 345K
809-ServerAidedTwoPartyComputationwithSimultane..> 02-Jan-2015 10:06 387K
810-SimulationBasedSecureFunctionalEncryptionin..> 02-Jan-2015 10:06 515K
811-APolynomialTimeKeyRecoveryAttackonMQQCrypto..> 02-Jan-2015 10:06 487K
812-SearchandcomputeonEncryptedData.pdf 02-Jan-2015 10:06 430K
813-BoostingLinearlyHomomorphicEncryptiontoEval..> 02-Jan-2015 10:06 463K
814-NavigatingintheCayleygraphofSL_2F_pandappli..> 02-Jan-2015 10:06 74K
815-ANewMethodforDecompositionintheJacobianofSm..> 02-Jan-2015 10:06 281K
816-FHEBootstrappinginlessthanasecond.pdf 02-Jan-2015 10:06 371K
816-FHEWBootstrappingHomomorphicEncryptioninles..> 20-Jan-2023 08:26 450K
817-OptimizedKaratsubaSquaringon8bitAVRProcesso..> 02-Jan-2015 10:06 2M
818-CirculantMatricesandDifferentialPrivacy.pdf 02-Jan-2015 10:06 355K
819-RidingonAsymmetryEfficientABEforBranchingPr..> 02-Jan-2015 10:06 392K
820-OperationalSignatureSchemes.pdf 02-Jan-2015 10:06 568K
821-NonmalleableReductionsandApplications.pdf 02-Jan-2015 10:06 614K
822-Ballotsecrecywithmaliciousbulletinboards.pdf 02-Jan-2015 10:06 265K
823-OntheObliviousTransferCapacityofGeneralized..> 02-Jan-2015 10:06 329K
824-AccountableTracingSignatures.pdf 02-Jan-2015 10:06 595K
825-TowardsOptimalBoundsforImplicitFactorizatio..> 02-Jan-2015 10:06 337K
826-LearningwithErrorsintheExponent.pdf 02-Jan-2015 10:06 533K
827-InteractiveCodingforInteractiveProofs.pdf 02-Jan-2015 10:06 303K
828-RemarksonQuantumModularExponentiationandSom..> 20-Jan-2023 08:26 1M
828-RemarksonQuantumModularExponentiationandSom..> 02-Jan-2015 10:05 1M
829-AdditivelyHomomorphicUCcommitmentswithOptim..> 02-Jan-2015 10:05 504K
830-AdaptivelySecureMultiPartyComputationfromLW..> 20-Jan-2023 08:26 555K
830-AdaptivelySecureUCConstantRoundMultiPartyCo..> 02-Jan-2015 10:05 506K
831-TweaksandKeysforBlockCipherstheTWEAKEYFrame..> 02-Jan-2015 10:05 496K
832-RequirementsforStandardEllipticCurves.pdf 02-Jan-2015 10:05 106K
833-EfficientDistributedTagBasedEncryptionandit..> 02-Jan-2015 10:05 335K
834-SemanticallySecureOrderRevealingEncryptionM..> 02-Jan-2015 10:05 730K
835-ImplementationandEvaluationofaLeakageResili..> 02-Jan-2015 10:05 426K
835-ImplementationofaLeakageResilientElGamalKey..> 20-Jan-2023 08:26 218K
836-ATightTransformationbetweenHILLandMetricCon..> 20-Jan-2023 08:26 378K
836-AnImprovedTransformationbetweenHILLandMetri..> 02-Jan-2015 10:05 365K
837-TrueRandomNumberGeneratorsSecureinaChanging..> 02-Jan-2015 10:05 320K
838-SHIELDScalableHomomorphicImplementationofEn..> 02-Jan-2015 10:05 694K
839-ASimpleandImprovedAlgorithmforIntegerFactor..> 02-Jan-2015 10:05 159K
840-ConstrainedPRFsforUnboundedInputs.pdf 02-Jan-2015 10:05 474K
841-ExplicitNonmalleableCodesResistanttoPermuta..> 02-Jan-2015 10:05 764K
842-ARateOptimizingCompilerforNonmalleableCodes..> 20-Jan-2023 08:26 558K
842-ExplicitOptimalRateNonmalleableCodesAgainst..> 02-Jan-2015 10:05 552K
843-FindingSmallSolutionsofaClassofSimultaneous..> 02-Jan-2015 10:05 361K
843-SolvingaClassofModularPolynomialEquationsan..> 20-Jan-2023 08:26 499K
844-TwoRoundAdaptivelySecureMPCfromIndistinguis..> 02-Jan-2015 10:05 445K
845-AdaptivelySecureTwopartyComputationFromIndi..> 02-Jan-2015 10:05 263K
845-Adaptivelysecuretwopartycomputationfromindi..> 20-Jan-2023 08:26 392K
846-Verifiablecomputationusingmultipleprovers.pdf 02-Jan-2015 10:05 509K
847-ReflectionsonSlidewithaTwistAttacks.pdf 02-Jan-2015 10:05 242K
848-PrivateKeyRecoveryCombinationAttacksOnExtre..> 02-Jan-2015 10:05 1M
849-AProxyReEncryptionSchemewiththeUnforgeabili..> 02-Jan-2015 10:05 195K
850-BRUTUSIdentifyingCryptanalyticWeaknessesinC..> 02-Jan-2015 10:05 126K
850-TheBRUTUSautomaticcryptanalyticframeworkTes..> 20-Jan-2023 08:26 739K
851-NearOptimalRateHomomorphicEncryptionforBran..> 02-Jan-2015 10:04 687K
852-FasterECCovermathbbF_25211.pdf 02-Jan-2015 10:04 126K
853-DynamicSearchableEncryptioninVeryLargeDatab..> 02-Jan-2015 10:04 460K
854-PowerAnalysisAttackonHardwareImplementation..> 02-Jan-2015 10:04 446K
855-RelatingUndisturbedBitstoOtherPropertiesofS..> 02-Jan-2015 10:04 358K
856-LeakageResilientCircuitsRevisitedOptimalNum..> 02-Jan-2015 10:04 448K
857-PseudonymousBroadcastandSecureComputationfr..> 20-Jan-2023 08:26 343K
857-PseudonymousSecureComputationfromTimeLockPu..> 02-Jan-2015 10:04 381K
858-AdaptivelySecureUniversallyComposableMultiP..> 02-Jan-2015 10:04 181K
859-Provablysecurepairingfreeidentitybasedparti..> 20-Jan-2023 14:19 207
860-DifferentialFactorsImprovedAttacksonSERPENT..> 02-Jan-2015 10:04 324K
861-CatsandDogsAnIntegrityforVotingSystemsBased..> 02-Jan-2015 10:04 300K
862-LowLatencyECDSASignatureVerificationARoadTo..> 02-Jan-2015 10:04 1M
863-AUnifiedApproachtoIdealizedModelSeparations..> 02-Jan-2015 10:04 577K
864-HowtoChooseInterestingPointsforTemplateAtta..> 02-Jan-2015 10:04 145K
865-ImpossibilityResultsforLeakageResilientZero..> 02-Jan-2015 10:04 458K
865-ImpossibilityofBlackBoxSimulationAgainstLea..> 20-Jan-2023 08:26 470K
866-SelfDestructNonMalleability.pdf 02-Jan-2015 10:04 542K
867-RandomOracleUninstantiabilityfromIndistingu..> 02-Jan-2015 10:04 678K
868-FunctionalEncryptionforRandomizedFunctional..> 02-Jan-2015 10:04 636K
869-ExclusiveExponentBlindingMayNotSufficetoPre..> 20-Jan-2023 08:26 373K
869-ExponentBlindingMayNotPreventTimingAttackso..> 02-Jan-2015 10:04 395K
870-DynamicBehaviorofRSlatchesusingFIBprocessin..> 02-Jan-2015 10:04 416K
871-AnalgorithmforMD5singleblockcollisionattack..> 02-Jan-2015 10:04 84K
872-RecentResultsinScalableMultiPartyComputatio..> 02-Jan-2015 10:04 608K
873-BootstrappingforHElib.pdf 02-Jan-2015 10:04 473K
874-AcceleratingBlissthegeometryofternarypolyno..> 02-Jan-2015 10:04 357K
875-SidechannelPowerAnalysisofDifferentProtecti..> 02-Jan-2015 10:04 471K
876-ResistingRandomnessSubversionFastDeterminis..> 20-Jan-2023 08:26 733K
876-UCELTDFsEfficientSubversionResistantPKEinth..> 02-Jan-2015 10:03 729K
877-CM55specialprimefieldellipticcurvesalmostop..> 20-Jan-2023 08:26 539K
877-CM55specialprimefieldellipticcurvesalmostop..> 02-Jan-2015 10:03 522K
878-Protectingobfuscationagainstarithmeticattac..> 02-Jan-2015 10:03 284K
879-WatchyourConstantsMaliciousStreebog.pdf 02-Jan-2015 10:03 896K
880-SievingforShortestVectorsinIdealLatticesaPr..> 02-Jan-2015 10:03 473K
881-OverviewoftheCandidatesforthePasswordHashin..> 20-Jan-2023 08:26 259K
881-OverviewoftheCandidatesforthePasswordHashin..> 02-Jan-2015 10:03 227K
882-ObfuscationofProbabilisticCircuitsandApplic..> 02-Jan-2015 10:03 623K
883-FaultyClockDetectionforCryptoCircuitsAgains..> 02-Jan-2015 10:03 367K
884-FaultyClockDetectionforCryptoCircuitsAgains..> 20-Jan-2023 14:19 207
885-EfficientStochasticMethodsProfiledAttacksBe..> 02-Jan-2015 10:03 760K
886-AccountableStorage.pdf 02-Jan-2015 10:03 784K
887-HardwareImplementationofSecureShamir39sSecr..> 20-Jan-2023 08:26 356K
887-HardwareImplementationofSecureShamirsSecret..> 02-Jan-2015 10:03 356K
888-DistanceLowerBounding.pdf 02-Jan-2015 10:03 547K
889-EfficientZeroKnowledgeProofsforCommitmentsf..> 02-Jan-2015 10:03 483K
890-FastEvaluationofPolynomialsoverBinaryFinite..> 02-Jan-2015 10:03 439K
891-ConversionfromArithmetictoBooleanMaskingwit..> 02-Jan-2015 10:03 330K
892-BreakingExistentialUnforgeabilityofaSignatu..> 02-Jan-2015 10:03 235K
893-AdvancedAlgebraicAttackonTrivium.pdf 02-Jan-2015 10:03 268K
894-THEUBERCRYPTFRAMEWORKANEWAPPROACHINCRYPTOSY..> 02-Jan-2015 10:03 357K
895-AnalysisofARXFunctionsPseudolinearMethodsfo..> 02-Jan-2015 10:03 544K
896-EfficientlyMakingSecureTwoPartyComputationF..> 02-Jan-2015 10:03 407K
897-LeveledFullyHomomorphicSignaturesfromStanda..> 02-Jan-2015 10:03 521K
898-AkeyrecoveryattacktothescaleinvariantNTRUba..> 02-Jan-2015 10:03 206K
899-SideChannelPowerAnalysisofanAES256Bootloade..> 02-Jan-2015 10:03 3M
900-SomeSecurityResultsoftheRC4StreamCipher.pdf 02-Jan-2015 10:02 244K
901-APracticalAttackAgainsttheHIVEHiddenVolumeE..> 02-Jan-2015 10:02 313K
901-APracticalAttackAgainsttheUseofRC4intheHIVE..> 20-Jan-2023 08:26 313K
902-ThePowerofNegationsinCryptography.pdf 02-Jan-2015 10:02 481K
903-FalconCodesFastAuthenticatedLTCodes.pdf 02-Jan-2015 10:02 875K
903-FalconCodesFastAuthenticatedLTCodesOrMaking..> 20-Jan-2023 08:26 875K
904-HowSecureisTextSecure.pdf 02-Jan-2015 10:02 1013K
905-PrimarySecondaryResolverMembershipProofSyst..> 02-Jan-2015 10:02 801K
906-CryptanalysisoftheMultilinearMapovertheInte..> 02-Jan-2015 10:02 308K
906-CryptanalysisontheMultilinearMapovertheInte..> 20-Jan-2023 08:26 439K
907-Findingshortestlatticevectorsfasterusingqua..> 02-Jan-2015 10:02 282K
908-PracticalUCsecuritywithaGlobalRandomOracle.pdf 02-Jan-2015 10:02 738K
909-RobustSecretSharingSchemesAgainstLocalAdver..> 02-Jan-2015 10:02 410K
910-AdaptiveMultipartyNoninteractiveKeyExchange..> 02-Jan-2015 10:02 1M
911-ADenialofServiceAttackagainstFairComputatio..> 02-Jan-2015 10:02 207K
912-LowCostConcurrentErrorDetectionforGCMandCCM..> 02-Jan-2015 10:02 1M
913-FullyLeakageResilientSignaturesRevisitedGra..> 20-Jan-2023 08:26 706K
913-MindYourCoinsFullyLeakageResilientSignature..> 02-Jan-2015 10:02 662K
914-CryptographywithOneWayCommunication.pdf 02-Jan-2015 10:02 526K
915-CryptanalysisoftheStructurePreservingSignat..> 20-Jan-2023 08:25 351K
915-TheSecurityoftheHanserSlamanigSignatureSche..> 02-Jan-2015 10:02 213K
916-AdaptivelySecureFullyHomomorphicSignaturesB..> 02-Jan-2015 10:02 373K
917-FromSelectivetoAdaptiveSecurityinFunctional..> 20-Jan-2023 08:25 443K
917-TheTrojanMethodinFunctionalEncryptionFromSe..> 02-Jan-2015 10:02 427K
918-WebTapPaymentAuthenticationandEncryptionWit..> 02-Jan-2015 10:02 63K
919-ExperimentingwithShuffleBlockCipherandSMTSo..> 02-Jan-2015 10:02 802K
920-SimplerandMoreEfficientRankEstimationforSid..> 02-Jan-2015 10:02 397K
921-BatchNFS.pdf 02-Jan-2015 10:01 540K
922-DifferentialAnalysisofBlockCiphersSIMONandS..> 02-Jan-2015 10:01 3M
923-NewCryptosystemUsingTheCRTAndTheJordanNorma..> 02-Jan-2015 10:01 76K
924-ImprovingthePolynomialtimePrecomputationofF..> 02-Jan-2015 10:01 420K
925-IndistinguishabilityObfuscationforTuringMac..> 02-Jan-2015 10:01 814K
926-RoadtoVehicleCommunicationswithTimeDependen..> 02-Jan-2015 10:01 320K
927-Physicalfunctionsthecommonfactorofsidechann..> 02-Jan-2015 10:01 838K
928-ImplementingCandidateGradedEncodingSchemesf..> 20-Jan-2023 08:25 532K
928-ImprovedParametersandanImplementationofGrad..> 02-Jan-2015 10:01 492K
929-ZeroizingwithoutzeroesCryptanalyzingmultili..> 02-Jan-2015 10:01 337K
930-ImmunizingMultilinearMapsAgainstZeroizingAt..> 02-Jan-2015 10:01 563K
931-CryptanalysisofJAMBU.pdf 02-Jan-2015 10:01 747K
932-BicliqueswithMinimalDataandTimeComplexityfo..> 02-Jan-2015 10:01 1M
933-CertificatelessProxyReEncryptionWithoutPair..> 22-Dec-2014 12:17 432K
933-CertificatelessProxyReEncryptionWithoutPair..> 02-Jan-2015 10:01 469K
934-EfficientGenericZeroKnowledgeProofsfromComm..> 02-Jan-2015 10:01 388K
935-BoostingHigherOrderCorrelationAttacksbyDime..> 02-Jan-2015 10:01 974K
936-OutsourcingSecureTwoPartyComputationasaBlac..> 02-Jan-2015 10:01 534K
937-AnalysisofLewkoSahaiWatersRevocationSystem.pdf 02-Jan-2015 10:01 297K
938-TrapdoorComputationalFuzzyExtractors.pdf 02-Jan-2015 10:01 984K
938-TrapdoorComputationalFuzzyExtractorsandStat..> 20-Jan-2023 08:25 1M
939-SecurityAnalysisofanAuthenticationSchemeUsi..> 02-Jan-2015 10:01 375K
940-FullySecureSelfUpdatableEncryptioninPrimeOr..> 02-Jan-2015 10:01 468K
941-GarbledRAMFromOneWayFunctions.pdf 02-Jan-2015 10:01 480K
942-PublicCoinDifferingInputsObfuscationandItsA..> 02-Jan-2015 10:00 438K
943-AdvancingtheStateoftheArtinHardwareTrojansD..> 20-Jan-2023 08:25 3M
943-HaTChHardwareTrojanCatcher.pdf 02-Jan-2015 10:00 3M
944-EUFCMASecureStructurePreservingSignatureson..> 02-Jan-2015 10:00 275K
944-StructurePreservingSignaturesonEquivalenceC..> 20-Jan-2023 08:25 543K
945-BoomerangAttackonStepReducedSHA512.pdf 02-Jan-2015 10:00 287K
946-Onanewfastpublickeycryptosystem.pdf 02-Jan-2015 10:00 175K
947-TheSIMONandSPECKBlockCiphersonAVR8bitMicroc..> 02-Jan-2015 10:00 313K
948-LatticePointEnumerationonBlockReducedBases.pdf 02-Jan-2015 10:00 462K
949-Simplificationcomplicationofthebasisofprime..> 02-Jan-2015 10:00 111K
950-TreeStructuredCompositionofHomomorphicEncry..> 02-Jan-2015 10:00 261K
951-ModifiedAlternatingStepGeneratorswithNonLin..> 02-Jan-2015 10:00 692K
952-BalancedEncodingtoMitigatePowerAnalysisACas..> 02-Jan-2015 10:00 592K
953-TheRelatedKeySecurityofIteratedEvenMansourC..> 02-Jan-2015 10:00 539K
954-AlgebraicFaultAnalysisofKatan.pdf 02-Jan-2015 10:00 340K
955-OntheAsymptoticIdealnessoftheAsmuthBloomThr..> 02-Jan-2015 10:00 256K
956-TamperDetectionandContinuousNonMalleableCod..> 02-Jan-2015 10:00 535K
957-BlackBoxSeparationsforDifferentiallyPrivate..> 02-Jan-2015 10:00 604K
958-AuthenticatedEncryptionHowReorderingcanImpa..> 02-Jan-2015 10:00 1M
959-AttackingSuggestBoxesinWebApplicationsOverH..> 02-Jan-2015 10:00 502K
960-NonInteractiveSecureMultipartyComputation.pdf 02-Jan-2015 10:00 481K
961-WhenareFuzzyExtractorsPossible.pdf 02-Jan-2015 10:00 338K
961-WhereareFuzzyExtractorsPossible.pdf 22-Dec-2014 12:16 421K
962-SolvingPolynomialSystemswithNoiseoverF_2Rev..> 02-Jan-2015 10:00 512K
963-MaliciousClientSecurityinBlindSeerAScalable..> 02-Jan-2015 10:00 831K
964-Ontwowindowsmultivariatecryptosystemdependi..> 02-Jan-2015 09:59 303K
965-PredicateEncryptionforMultiDimensionalRange..> 02-Jan-2015 09:59 269K
966-PrivacyPreservingDataPublishSubscribeServic..> 02-Jan-2015 09:59 311K
967-AComprehensiveComparisonofShannonEntropyand..> 02-Jan-2015 09:59 333K
968-AttacksonSecureOwnershipTransferforMultiTag..> 02-Jan-2015 09:59 171K
969-PrivacyPreservingFaceRecognitionwithOutsour..> 02-Jan-2015 09:59 308K
970-JackpotStealingInformationFromLargeCachesvi..> 02-Jan-2015 09:59 794K
971-KeyrecoveryattacksonGrainfamilyusingBSWsamp..> 02-Jan-2015 09:59 151K
972-AChineseRemainderTheoremApproachtoBitParall..> 02-Jan-2015 09:59 138K
973-ImprovedLinearhullCryptanalysisofRoundreduc..> 02-Jan-2015 09:59 496K
974-NonLinearityandAffineEquivalenceofPermutati..> 02-Jan-2015 09:59 292K
975-CryptanalysisofTwoCandidateFixesofMultiline..> 02-Jan-2015 09:59 295K
976-GeppettoVersatileVerifiableComputation.pdf 02-Jan-2015 09:59 622K
977-ASurveyonLightweightEntityAuthenticationwit..> 20-Jan-2023 08:25 563K
977-SecureLightweightEntityAuthenticationwithSt..> 02-Jan-2015 09:59 351K
978-ImprovedDifferentialAnalysisofBlockCipherPR..> 02-Jan-2015 09:59 376K
979-TheChainingLemmaanditsapplication.pdf 02-Jan-2015 09:59 496K
980-AFastPhaseBasedEnumerationAlgorithmforSVPCh..> 02-Jan-2015 09:59 484K
981-PubliclyVerifiableNonInteractiveArgumentsfo..> 02-Jan-2015 09:59 773K
982-OutlierPrivacy.pdf 02-Jan-2015 09:59 377K
983-PublicVerificationofPrivateEffort.pdf 02-Jan-2015 09:59 434K
984-UnderminingIsolationthroughCovertChannelsin..> 02-Jan-2015 09:59 441K
985-StatisticalweaknessinSpritzagainstVMPCRinse..> 02-Jan-2015 09:59 272K
986-RelatedKeyDifferentialAttackonRoundReducedR..> 02-Jan-2015 09:59 320K
987-CryptanalysisofFullPRIDEBlockCipher.pdf 02-Jan-2015 09:59 198K
988-Armadilloacompilationchainforprivacypreserv..> 02-Jan-2015 09:59 314K
989-ControlledHomomorphicEncryptionDefinitionan..> 02-Jan-2015 09:59 346K
990-CombiningSecretSharingandGarbledCircuitsfor..> 02-Jan-2015 09:58 596K
991-ConstantRoundConcurrentZeroknowledgefromInd..> 02-Jan-2015 09:58 503K
992-IncentivizedOutsourcedComputationResistantt..> 02-Jan-2015 09:58 618K
993-HowDifferentElectricalCircuitsofECCDesignsI..> 02-Jan-2015 09:58 480K
994-KeyPolicyMultiauthorityAttributeBasedEncryp..> 20-Jan-2023 08:25 139K
994-TwonovelapplicationsofbilineargroupstoABEen..> 02-Jan-2015 09:58 217K
995-PartialGarblingSchemesandTheirApplications.pdf 02-Jan-2015 09:58 118K
996-SomeexperimentsinvestigatingapossibleL14alg..> 02-Jan-2015 09:58 351K
997-ConstantsCountPracticalImprovementstoOblivi..> 20-Jan-2023 08:25 1M
997-RingORAMClosingtheGapBetweenSmallandLargeCl..> 02-Jan-2015 09:58 2M
998-HierarchicaldeterministicBitcoinwalletsthat..> 02-Jan-2015 09:58 215K
999-FirstExperimentalResultofPowerAnalysisAttac..> 02-Jan-2015 09:58 1M