Index of /2014/


../
001-CommentsonEIBASanefficientidentitybroadcast..> 02-Jan-2015 10:42    188K
002-PseudorandomGeneratorBasedonHardLatticeProb..> 02-Jan-2015 10:42    255K
003-GF2nBitParallelSquarerUsingGeneralizedPolyn..> 02-Jan-2015 10:42    215K
004-MaxMinMaxproblemandsparseequationsoverfinit..> 02-Jan-2015 10:42    341K
005-TheanalysisoftheKeccakwiththenewmethodcalle..> 20-Jan-2023 14:19     207
006-EfficientNonInteractiveZeroKnowledgeArgumen..> 02-Jan-2015 10:42    415K
007-OneWeirdTricktoStopSelfishMinersFreshBitcoi..> 02-Jan-2015 10:42    203K
008-ATheoreticalStudyofKolmogorovSmirnovDisting..> 02-Jan-2015 10:42    598K
009-CharacterizationofEMEwithLinearMixing.pdf      02-Jan-2015 10:42    413K
010-ACertificateBasedProxySignaturewithMessageR..> 02-Jan-2015 10:42    415K
011-ConstructionofNewFamiliesof8206MDS8206Diffu..> 02-Jan-2015 10:42    108K
011-ConstructionofNewFamiliesofMDSDiffusionLaye..> 20-Jan-2023 08:30    108K
012-MaximalInformationCoefficientAnalysis.pdf      02-Jan-2015 10:42      2M
013-ANovelModularAdderforOneThousandBitsandMore..> 20-Jan-2023 14:19     207
014-LinkableMessageTaggingSolvingtheKeyDistribu..> 20-Jan-2023 08:30    528K
014-LinkableMessageTaggingSolvingthekeydistribu..> 02-Jan-2015 10:41    511K
015-TightSecurityBoundsforTripleEncryption.pdf     02-Jan-2015 10:41    428K
016-TripleandQuadrupleEncryptionBridgingtheGaps..> 02-Jan-2015 10:41    509K
017-Tworoundpasswordonlyauthenticatedkeyexchang..> 20-Jan-2023 08:30    188K
018-CompletenessforSymmetricTwoPartyFunctionali..> 02-Jan-2015 10:41    177K
019-LazyModulusSwitchingfortheBKWAlgorithmonLWE..> 02-Jan-2015 10:41    528K
020-DeConstructingTLS.pdf                          02-Jan-2015 10:41    654K
021-OnlineOfflineAttributeBasedEncryption.pdf      02-Jan-2015 10:41    327K
022-Ultralightweight8bitMultiplicativeInverseBa..> 02-Jan-2015 10:41    238K
023-SolvingRandomSubsetSumProblembyl_pnormSVPOr..> 02-Jan-2015 10:41    194K
024-AnEfficientPseudoRandomGeneratorwithApplica..> 02-Jan-2015 10:41    237K
025-SideChannelLeakagethroughStaticPowerShouldW..> 02-Jan-2015 10:41    804K
026-StudyingPotentialSideChannelLeakagesonanEmb..> 02-Jan-2015 10:41      1M
027-TwistingEdwardscurveswithisogenies.pdf         02-Jan-2015 10:41    159K
028-ChannelEqualizationforSideChannelAttacks.pdf   02-Jan-2015 10:41    455K
029-GeneralImpossibilityofGroupHomomorphicEncry..> 02-Jan-2015 10:41    406K
030-LyraPasswordBasedKeyDerivationwithTunableMe..> 02-Jan-2015 10:41   1020K
031-OntheDesignofLILTestsforPseudoRandomGenerat..> 02-Jan-2015 10:41    601K
032-ScaleInvariantFullyHomomorphicEncryptionove..> 02-Jan-2015 10:41    456K
033-LatticebasedGroupSignatureSchemewithVerierl..> 20-Jan-2023 08:30    527K
033-LatticebasedGroupSignatureSchemewithVerifie..> 02-Jan-2015 10:41    518K
034-AuthenticatedEncryptionwithSPECK.pdf           02-Jan-2015 10:41    149K
035-AnewattackonRSAwithacomposeddecryptionexpon..> 02-Jan-2015 10:41    187K
036-ASecureTextMessagingProtocol.pdf               02-Jan-2015 10:41    275K
037-OntheSecurityofthePreSharedKeyCiphersuiteso..> 02-Jan-2015 10:41    695K
038-ExtendingandApplyingaFrameworkfortheCryptog..> 02-Jan-2015 10:40    378K
039-HomomorphicAESEvaluationusingNTRU.pdf          02-Jan-2015 10:40    354K
040-AFastModularReductionMethod.pdf                02-Jan-2015 10:40    110K
041-Cryptanalysisviaalgebraicspans.pdf             20-Jan-2023 08:29    338K
041-Practicalpolynomialtimesolutionsofseveralma..> 02-Jan-2015 10:40    285K
042-ANewAlgorithmforSolvingtheGeneralApproximat..> 02-Jan-2015 10:40    299K
043-ElligatorSquaredUniformPointsonEllipticCurv..> 02-Jan-2015 10:40    415K
044-rPIRRampSecretSharingbasedCommunicationEffi..> 02-Jan-2015 10:40    961K
045-HumanAssistedRandomnessGenerationUsingVideo..> 02-Jan-2015 10:40    649K
046-Cryptoanalysesonuserefficientrecoverableoff..> 02-Jan-2015 10:40    229K
047-DowntheRabbitHoleRevisitingtheShrinkingMeth..> 02-Jan-2015 10:40    450K
048-WhenaBooleanFunctioncanbeExpressedastheSumo..> 02-Jan-2015 10:40    119K
049-DataSecurityinCloudArchitectureBasedonDiffi..> 02-Jan-2015 10:40    560K
050-SomeTheoreticalConditionsforMenezesQuVansto..> 02-Jan-2015 10:40    675K
051-AnEquivalencePreservingTransformationofShif..> 02-Jan-2015 10:40    160K
052-DAArelatedAPIsinTPM20Revisited.pdf             02-Jan-2015 10:40    319K
053-MaskingandLeakageResilientPrimitivesOnetheO..> 02-Jan-2015 10:40      3M
054-TheFourierEntropyInfluenceconjectureholdsfo..> 02-Jan-2015 10:40    378K
055-SecurityEnhancedAnonymousMultiServerAuthent..> 02-Jan-2015 10:40      2M
056-LowProbabilityDifferentialsandtheCryptanaly..> 02-Jan-2015 10:40    378K
057-ComputingDiscreteLogarithmsinF_36137andF_36..> 02-Jan-2015 10:40    233K
058-CryptanalysisofFIDES.pdf                       02-Jan-2015 10:40    758K
059-CuckooCycleagraphtheoreticproofofworksystem..> 22-Dec-2014 12:57    285K
059-CuckooCycleamemoryboundgraphtheoreticproofo..> 02-Jan-2015 10:39    291K
060-VerifiableComputationinMultipartyProtocolsw..> 02-Jan-2015 10:39    469K
061-BoundedCollusionIdentityBasedEncryptionfrom..> 02-Jan-2015 10:39    404K
062-AComparisonoftheHomomorphicEncryptionScheme..> 02-Jan-2015 10:39   1007K
063-CryptanalysisonSecureuntraceableofflineelec..> 02-Jan-2015 10:39     60K
064-APolynomialTimeAttackagainstAlgebraicGeomet..> 02-Jan-2015 10:39    416K
065-FineTuningtheFunctionFieldSieveAlgorithmfor..> 02-Jan-2015 10:39    393K
066-ASubexponentialConstructionofGraphColoringf..> 02-Jan-2015 10:39    757K
067-EfficientandStronglySecureDynamicDomainSpec..> 02-Jan-2015 10:39    507K
068-SomesecurityboundsfortheDGHVscheme.pdf         02-Jan-2015 10:39    277K
069-OnePassAuthenticatedKeyEstablishmentProtoco..> 02-Jan-2015 10:39    131K
070-LatticeCryptographyfortheInternet.pdf          02-Jan-2015 10:39    353K
071-ImplementingPairingBasedCryptosystemsinUSBT..> 02-Jan-2015 10:39    368K
072-EfficientPrivacyPreservingBigDataProcessing..> 02-Jan-2015 10:39    637K
073-AnonymousAuthenticationwithSharedSecrets.pdf   02-Jan-2015 10:39    500K
074-NewandImprovedKeyHomomorphicPseudorandomFun..> 02-Jan-2015 10:39    373K
075-PubliclyAuditableSecureMultiPartyComputatio..> 02-Jan-2015 10:39    687K
076-CertifiedBitcoins.pdf                          02-Jan-2015 10:39    506K
077-MixcoinAnonymityforBitcoinwithaccountablemi..> 02-Jan-2015 10:39    367K
078-ImplementationandComparisonofLatticebasedId..> 02-Jan-2015 10:39    573K
079-UnifyingLeakageModelsfromProbingAttackstoNo..> 02-Jan-2015 10:39    271K
080-AFullCharacterizationofCompletenessforTwopa..> 02-Jan-2015 10:39    519K
081-EfficientRoundOptimalBlindSignatures.pdf       02-Jan-2015 10:39    447K
082-GarbledRAMRevisitedPartI.pdf                   02-Jan-2015 10:39    653K
083-GarbledRAMRevisitedPartII.pdf                  02-Jan-2015 10:38    265K
084-RECTANGLEABitsliceLightweightBlockCipherSui..> 20-Jan-2023 08:29    211K
084-RECTANGLEABitsliceUltraLightweightBlockCiph..> 02-Jan-2015 10:38    215K
085-MultipermutationsinCryptoWorldDifferentFace..> 02-Jan-2015 10:38    337K
086-RandomizedandEfficientAuthenticationinMobil..> 02-Jan-2015 10:38    222K
087-AnoAAFrameworkForAnalyzingAnonymousCommunic..> 02-Jan-2015 10:38    726K
088-ABoundForMultipartySecretKeyAgreementAndImp..> 02-Jan-2015 10:38    354K
089-MultipleDifferentialCryptanalysisofRoundRed..> 02-Jan-2015 10:38    533K
090-CryptanalysisofKLEINFullversion.pdf            02-Jan-2015 10:38    423K
091-OnCryptographicApplicationsofMatricesActing..> 02-Jan-2015 10:38    482K
092-AnewclassofsystemorientedPKCKISOPKC.pdf        02-Jan-2015 10:38    206K
093-TheRelatedKeyAnalysisofFeistelConstructions..> 02-Jan-2015 10:38    947K
094-FasterBootstrappingwithPolynomialError.pdf     02-Jan-2015 10:38    339K
095-UnifiedMinimalandSelectivelyRandomizableStr..> 02-Jan-2015 10:38    430K
096-Tightsecurityboundsformultipleencryption.pdf   02-Jan-2015 10:38    329K
097-ASimpleFrameworkforNoiseFreeConstructionofF..> 02-Jan-2015 10:38    108K
097-TowardsConstructingFullyHomomorphicEncrypti..> 20-Jan-2023 08:29    195K
098-TowardsCharacterizingCompleteFairnessinSecu..> 02-Jan-2015 10:38    321K
099-IndistinguishabilityObfuscationandUCEsTheCa..> 02-Jan-2015 10:38    499K
100-ImprovedSlendersetLinearCryptanalysis.pdf      02-Jan-2015 10:38    206K
1000-CompleteCharacterizationofFairnessinSecure..> 02-Jan-2015 09:58    486K
1001-RobustlySecureTwoPartyAuthenticatedKeyExch..> 02-Jan-2015 09:58    128K
1002-ExperimentsinEncryptedandSearchableNetwork..> 02-Jan-2015 09:58    470K
1003-COFFECiphertextOutputFeedbackFaithfulEncry..> 02-Jan-2015 09:58    293K
1004-CONIKSAPrivacyPreservingConsistentKeyServi..> 02-Jan-2015 09:58    588K
1004-CONIKSBringingKeyTransparencytoEndUsers.pdf   20-Jan-2023 08:25    469K
1005-Apureblockchainbaseddecentralizedexchange.pdf 02-Jan-2015 09:58    542K
1006-Simplecompositiontheoremsofonewayfunctions..> 02-Jan-2015 09:58    288K
1007-FairMultiplebankEcashintheStandardModel.pdf   02-Jan-2015 09:58    394K
1008-DTLSHIMMOEfficientlySecuringaPostQuantumWo..> 02-Jan-2015 09:58    836K
1009-APreliminaryFPGAImplementationandAnalysiso..> 02-Jan-2015 09:58    268K
101-DishonestMajorityMultiPartyComputationforBi..> 02-Jan-2015 10:38    577K
1010-OnContinuousAftertheFactLeakageResilientKe..> 02-Jan-2015 09:58    357K
1011-ProofofWorkasAnonymousMicropaymentRewardin..> 02-Jan-2015 09:58    344K
1012-TheBoomerangAttacksonBLAKEandBLAKE2.pdf       02-Jan-2015 09:58    366K
1013-ComputationalIndependence.pdf                 02-Jan-2015 09:57    316K
1014-DoubleandAddwithRelativeJacobianCoordinate..> 02-Jan-2015 09:57    286K
1015-CompactAccumulatorusingLattices.pdf           02-Jan-2015 09:57    414K
1016-ModifiedSIMONandSPECKLightweightHybridDesi..> 20-Jan-2023 14:19     207
1017-SortingandSearchingBehindtheCurtainPrivate..> 02-Jan-2015 09:57    791K
1018-AlgebraicAlgorithmsforLWE.pdf                 20-Jan-2023 08:25    438K
1018-AlgebraicAlgorithmsforLWEProblems.pdf         02-Jan-2015 09:57    455K
1019-RelatedKeyDifferentialCryptanalysisofReduc..> 02-Jan-2015 09:57    324K
102-ActivelySecurePrivateFunctionEvaluation.pdf    02-Jan-2015 10:38    383K
1020-SideChannelLeakageandTraceCompressionusing..> 02-Jan-2015 09:57    793K
1021-TightlySecureSignaturesfromChameleonHashFu..> 02-Jan-2015 09:57    629K
1022-TopologyHidingComputation.pdf                 02-Jan-2015 09:57    202K
1023-HowtoGenerateRepeatableKeysUsingPhysicalUn..> 20-Jan-2023 08:25    341K
1024-CryptanalysisoftheCoACDAssumption.pdf         20-Jan-2023 08:25    367K
1025-XPIRPrivateInformationRetrievalforEveryone..> 20-Jan-2023 08:25    535K
1026-LatticeswithSymmetry.pdf                      20-Jan-2023 08:25    423K
1027-SimpleLatticeTrapdoorSamplingfromaBroadCla..> 20-Jan-2023 08:25    375K
1028-SecurityWeaknessesofan34AnonymousAttribute..> 20-Jan-2023 08:25    250K
1029-OntheCryptographicHardnessofFindingaNashEq..> 20-Jan-2023 08:25    386K
103-SHipherFamiliesofBlockCiphersbasedonSubSetS..> 02-Jan-2015 10:38    206K
104-Spaceefficientbytewiseincrementalandperfect..> 02-Jan-2015 10:38    442K
105-ReducingtheOverheadofMPCoveraLargePopulatio..> 02-Jan-2015 10:38    410K
106-AlgorithmsinHElib.pdf                          02-Jan-2015 10:38    561K
107-KeyIndistinguishableMessageAuthenticationCo..> 02-Jan-2015 10:37    488K
108-MJHAFasterAlternativetoMDC2.pdf                02-Jan-2015 10:37      1M
109-DiffusionProgrammableDeviceThedevicetopreve..> 02-Jan-2015 10:37    432K
110-HalkaALightweightSoftwareFriendlyBlockCiphe..> 02-Jan-2015 10:37    263K
111-ANoteontheCLRW2TweakableBlockCipherConstruc..> 02-Jan-2015 10:37    436K
112-PolynomialTimeAttackonWildMcElieceOverQuadr..> 02-Jan-2015 10:37    440K
113-SecureCompressionTheoryPractice.pdf            02-Jan-2015 10:37    614K
113-SecureCompressionTheoryampPractice.pdf         20-Jan-2023 08:29    614K
114-ProverAnonymousandDeniableDistanceBoundingA..> 02-Jan-2015 10:37    658K
115-Commentsonanoveluserauthenticationandkeyagr..> 02-Jan-2015 10:37    198K
116-OptimalAlgebraicManipulationDetectionCodesi..> 02-Jan-2015 10:37    149K
117-AnApplicablePublicKeyCryptosystemBasedonNPC..> 02-Jan-2015 10:37    203K
118-Quantumpositionverificationintherandomoracl..> 02-Jan-2015 10:37    614K
119-Breaking128bitSecure39SupersingularBinaryCu..> 20-Jan-2023 08:29    453K
119-Breaking128bitSecureSupersingularBinaryCurv..> 02-Jan-2015 10:37    453K
120-AutomatedProofforAuthorizationProtocolsofTP..> 02-Jan-2015 10:37    668K
121-ObliviousRadixSortAnEfficientSortingAlgorit..> 02-Jan-2015 10:37    123K
122-NewWaytoConstructCryptographicHashFunction.pdf 02-Jan-2015 10:37    290K
123-FORSAKESAForwardSecureAuthenticatedKeyExcha..> 02-Jan-2015 10:37    617K
124-OntheInformationRatioofNonPerfectSecretShar..> 20-Jan-2023 08:29    343K
124-OptimalNonPerfectUniformSecretSharingScheme..> 02-Jan-2015 10:37    312K
125-RemovingErasureswithExplainableHashProofSys..> 02-Jan-2015 10:37    858K
126-PublicKeyEncryptionResilientAgainstLinearRe..> 20-Jan-2023 08:29    285K
127-AlgebraicPropertiesofModularAdditionModuloa..> 02-Jan-2015 10:37    502K
128-EfficientThreePartyComputationfromCutandCho..> 02-Jan-2015 10:37    572K
129-HowtoUseBitcointoDesignFairProtocols.pdf       02-Jan-2015 10:37    494K
130-SelectingEllipticCurvesforCryptographyAnEff..> 02-Jan-2015 10:37    577K
131-ModellingAfterthefactLeakageforKeyExchange.pdf 02-Jan-2015 10:36    493K
132-EfficientRevocableIdentityBasedEncryptionvi..> 02-Jan-2015 10:36    352K
133-EfficientSecureandVerifiableOutsourcingofMa..> 02-Jan-2015 10:36    518K
134-KummerstrikesbacknewDHspeedrecords.pdf         02-Jan-2015 10:36    421K
135-AnonymousTwoFactorAuthenticationinDistribut..> 02-Jan-2015 10:36    683K
136-IsolatedExecutiononManycoreArchitectures.pdf   02-Jan-2015 10:36    227K
137-EfficientObliviousDataStructuresforMPC.pdf     02-Jan-2015 10:36    408K
138-ShortSignaturesfromDiffieHellmanRevisitedSu..> 02-Jan-2015 10:36    421K
139-OnthePhaseSpaceofBlockHidingStrategies.pdf     02-Jan-2015 10:36    437K
140-RecoveringOpenSSLECDSANoncesUsingtheFLUSHRE..> 02-Jan-2015 10:36    186K
141-UnrestrictedIdentityBasedAggregateSigncrypt..> 02-Jan-2015 10:36    322K
142-FPGABasedHighPerformanceAESGCMUsingEfficien..> 20-Jan-2023 14:19     207
143-StatisticalConcurrentNonMalleableZeroKnowle..> 02-Jan-2015 10:36    573K
144-HowtoSecurelyReleaseUnverifiedPlaintextinAu..> 02-Jan-2015 10:36    382K
145-CalculatingCryptographicDegreeofanSBox.pdf     20-Jan-2023 14:19     207
146-Untappablecommunicationchannelsoveropticalf..> 02-Jan-2015 10:36      2M
147-TheMultipleNumberFieldSieveforMediumandHigh..> 02-Jan-2015 10:36    660K
147-TheMultipleNumberFieldSieveforMediumandHigh..> 20-Jan-2023 08:29    718K
148-OutsourcingPrivateRAMComputation.pdf           02-Jan-2015 10:36    555K
149-MillionsofMillionairesMultipartyComputation..> 02-Jan-2015 10:36    955K
150-OntheEffectivePreventionofTLSManInTheMiddle..> 20-Jan-2023 08:29    906K
151-SecurityAnalysisofKeyAlternatingFeistelCiph..> 02-Jan-2015 10:36    765K
152-AStatisticsbasedFundamentalModelforSidechan..> 02-Jan-2015 10:36      1M
153-VerifiableObliviousStorage.pdf                 02-Jan-2015 10:36    446K
154-NonInteractiveCryptographyintheRAMModelofCo..> 20-Jan-2023 14:19     207
155-HoneyEncryptionSecurityBeyondtheBruteForceB..> 02-Jan-2015 10:35    279K
156-NonMalleableExtractorswithShorterSeedsandPr..> 02-Jan-2015 10:35    182K
156-NonMalleableExtractorswithShorterSeedsandTh..> 20-Jan-2023 08:29    186K
157-CLOCAuthenticatedEncryptionforShortInput.pdf   02-Jan-2015 10:35    424K
158-Pointcompressionforthetracezerosubgroupover..> 02-Jan-2015 10:35    446K
159-WeakKeyLeakageResilientCryptography.pdf        02-Jan-2015 10:35    353K
160-TrueSetFasterVerifiableSetComputations.pdf     02-Jan-2015 10:35      3M
161-OohAahJustaLittleBit3939Asmallamountofsidec..> 20-Jan-2023 08:29    225K
161-OohAahJustaLittleBitAsmallamountofsidechann..> 02-Jan-2015 10:35    225K
162-TOWARDCERTIFICATELESSSIGNCRYPTIONSCHEMEWITH..> 02-Jan-2015 10:35    230K
163-ImprovedSecureImplementationofCodeBasedSign..> 02-Jan-2015 10:35    350K
164-Generalizedpropermatricesandconstructingofm..> 02-Jan-2015 10:35    243K
165-ANEWSCALARPOINTMULTIPLICATIONSCHEMEINECCBAS..> 20-Jan-2023 14:19     207
166-Tupledecodersfortraitortracingschemes.pdf      02-Jan-2015 10:35    428K
167-HowtoEatYourEntropyandHaveitTooOptimalRecov..> 02-Jan-2015 10:35    689K
168-PrivacyFailuresinEncryptedMessagingServices..> 02-Jan-2015 10:35    719K
169-EncryptionQualityAnalysisoftheRCBCBlockCiph..> 02-Jan-2015 10:35    368K
170-Parallelizedhashingviajlanesandjpointerstre..> 02-Jan-2015 10:35    791K
171-AnEffectiveRC4StreamCipher.pdf                 02-Jan-2015 10:35    737K
172-AnovelPUFScheme.pdf                            20-Jan-2023 14:19     207
173-ContinuousNonmalleableCodes.pdf                02-Jan-2015 10:35    488K
174-AnalysisofaModifiedRC4Algorithm.pdf            02-Jan-2015 10:35    645K
175-SecrecyandPerformanceAnalysisofSymmetricKey..> 02-Jan-2015 10:35    769K
176-OneRoundWitnessIndistinguishabilityfromIndi..> 20-Jan-2023 14:19     207
177-PragmatismvsElegancecomparingtwoapproachest..> 02-Jan-2015 10:35    275K
178-VerifiableDelegatedSetIntersectionOperation..> 02-Jan-2015 10:35    368K
179-OptimalconstructionsforIDbasedonewayfunctio..> 02-Jan-2015 10:35    262K
180-ImprovingthroughputofRC4algorithmusingmulti..> 02-Jan-2015 10:34    657K
181-AFrameworkandCompactConstructionsforNonmono..> 02-Jan-2015 10:34    511K
182-ProvingtheTLSHandshakeSecureasitis.pdf         02-Jan-2015 10:34    920K
183-ImpactofANSIX92412009KeyCheckValueonISOIEC9..> 02-Jan-2015 10:34    276K
184-SETUPinSecretSharingSchemesusingRandomValue..> 02-Jan-2015 10:34    295K
185-ObliviousDataStructures.pdf                    02-Jan-2015 10:34      1M
186-AESBasedAuthenticatedEncryptionModesinParal..> 02-Jan-2015 10:34    586K
187-FFTBasedKeyRecoveryfortheIntegralAttack.pdf    02-Jan-2015 10:34    314K
188-ASecondLookatFischlin39sTransformation.pdf     20-Jan-2023 08:29    420K
188-ASecondLookatFischlinsTransformation.pdf       02-Jan-2015 10:34    420K
189-PracticalReceiptFreeSealedBidAuctionintheCo..> 02-Jan-2015 10:34    250K
190-TheTemperatureSideChannelandHeatingFaultAtt..> 02-Jan-2015 10:34      2M
191-SideChannelAnalysisonBlindedRegularScalarMu..> 02-Jan-2015 10:34    392K
192-TwosourcesRandomnessExtractorsforEllipticCu..> 02-Jan-2015 10:34     98K
193-JHAEANovelPermutationBasedAuthenticatedEncr..> 20-Jan-2023 08:29    536K
193-JHAEAnAuthenticatedEncryptionModeBasedonJH.pdf 02-Jan-2015 10:34    556K
194-CryptanalysisandSecurityEnhancementofTwoAdv..> 02-Jan-2015 10:34    264K
195-LowOverheadBroadcastEncryptionfromMultiline..> 02-Jan-2015 10:34    528K
196-CryptoMultimedia.pdf                           20-Jan-2023 14:19     207
197-BreakingPOETAuthenticationwithaSingleQuery.pdf 02-Jan-2015 10:34    239K
198-FastGPGPUBasedEllipticCurveScalarMultiplica..> 02-Jan-2015 10:34    237K
199-DoublySpatialEncryptionfromDBDH.pdf            02-Jan-2015 10:34    148K
200-AutomaticProtocolSelectioninSecureTwoPartyC..> 02-Jan-2015 10:34      2M
201-FromInputPrivatetoUniversallyComposableSecu..> 02-Jan-2015 10:34    454K
202-EfficientlyVerifiableComputationonEncrypted..> 02-Jan-2015 10:34    583K
203-PrivacyPreservingImplicitAuthentication.pdf    02-Jan-2015 10:33    437K
204-ChipWhispererAnOpenSourcePlatformforHardwar..> 02-Jan-2015 10:33      1M
205-UnifiedObliviousRAMImprovingRecursiveORAMwi..> 02-Jan-2015 10:33      1M
206-ReconsideringGenericComposition.pdf            02-Jan-2015 10:33    339K
207-ExpressiveAttributeBasedEncryptionwithConst..> 02-Jan-2015 10:33    438K
208-OfflineDictionaryAttackonPasswordAuthentica..> 02-Jan-2015 10:33    794K
209-ALittleHonestyGoesaLongWayTheTwoTierModelfo..> 02-Jan-2015 10:33      2M
210-StructuralCryptanalysisofMcElieceSchemeswit..> 02-Jan-2015 10:33    404K
211-SomeRandomnessExperimentsonTRIVIUM.pdf         02-Jan-2015 10:33    337K
212-RemarksonthePocklingtonandPadrSezCubeRootAl..> 20-Jan-2023 08:29     84K
212-RemarksonthePocklingtonandPadroSaezCubeRoot..> 02-Jan-2015 10:33     84K
213-SecretSharingforNP.pdf                         02-Jan-2015 10:33    535K
214-SquaringAlgorithmswithDelayedCarryMethodand..> 02-Jan-2015 10:33    538K
215-AttackOntheMarkovProblem.pdf                   02-Jan-2015 10:33    107K
216-ImplementationandImprovementofthePartialSum..> 20-Jan-2023 08:29    173K
216-ImplementationandimprovementofthePartialSum..> 02-Jan-2015 10:33    316K
217-AForgeryAttackagainstPANDAs.pdf                02-Jan-2015 10:33    299K
218-APracticalUniversalForgeryAttackagainstPAES..> 02-Jan-2015 10:33    439K
219-DynamicSearchableEncryptionviaBlindStorage.pdf 02-Jan-2015 10:33    828K
220-TotalBreakofZorrousingLinearandDifferential..> 02-Jan-2015 10:33    360K
221-HybridModelofFixedandFloatingPointNumbersin..> 02-Jan-2015 10:33    220K
222-OptimizingObfuscationAvoidingBarrington39sT..> 20-Jan-2023 08:29    553K
222-OptimizingObfuscationAvoidingBarringtonsThe..> 02-Jan-2015 10:33    553K
223-CollisionSpectrumEntropyLossTSpongesandCryp..> 02-Jan-2015 10:33    456K
224-WhitewashOutsourcingGarbledCircuitGeneratio..> 02-Jan-2015 10:32    897K
225-AdaptivelySecureFunctionalEncryptionforFini..> 02-Jan-2015 10:32    587K
226-WeakKeyAnalysisofPOET.pdf                      02-Jan-2015 10:32    845K
227-CKEFAClusterbasedKeyEstablishmentFrameworkf..> 20-Jan-2023 14:19     207
228-CryptanalysisofSPNetworkswithPartialNonLine..> 20-Jan-2023 08:29    530K
228-ImprovedAnalysisofZorroLikeCiphers.pdf         02-Jan-2015 10:32    396K
229-InvestigatingtheFeasibilityofLEAPinZigBeeSp..> 20-Jan-2023 14:19     207
230-Isogenygraphswithmaximalrealmultiplication.pdf 02-Jan-2015 10:32    520K
231-SelfUpdatableEncryptionwithShortPublicParam..> 02-Jan-2015 10:32    365K
232-BandwidthEfficientPIRfromNTRU.pdf              02-Jan-2015 10:32    385K
233-TowardPracticalHomomorphicEvaluationofBlock..> 02-Jan-2015 10:32    385K
234-EnhancingObliviousRAMPerformanceUsingDynami..> 02-Jan-2015 10:32    582K
235-EfficientFuzzySearchonEncryptedData.pdf        02-Jan-2015 10:32    510K
236-LinearSequentialCircuitApproximationofActer..> 02-Jan-2015 10:32    405K
237-SIMONSaysBreaktheAreaRecordsforSymmetricKey..> 02-Jan-2015 10:32      1M
238-HighParallelComplexityGraphsandMemoryHardFu..> 02-Jan-2015 10:32    439K
239-LogicalReasoningtoDetectWeaknessesAboutSHA1..> 02-Jan-2015 10:32    639K
240-AutomaticProofsofPrivacyofSecureMultiPartyC..> 02-Jan-2015 10:32    403K
241-ANewWaytoPreventUKSAttacksUsingTrustedCompu..> 02-Jan-2015 10:32    340K
242-ZeroKnowledgePasswordPolicyChecksandVerifie..> 02-Jan-2015 10:32    492K
243-KeyDerivationFromNoisySourcesWithMoreErrors..> 02-Jan-2015 10:32    381K
243-ReusableFuzzyExtractorsforLowEntropyDistrib..> 20-Jan-2023 08:29    483K
244-bitcoinBitMintReconcilingBitcoinwithCentral..> 02-Jan-2015 10:32      5M
245-Apracticalstaterecoveryattackonthestreamcip..> 02-Jan-2015 10:32    378K
246-SecurityAnalysisofanIdentityBasedStronglyUn..> 02-Jan-2015 10:31    166K
247-IntroducingFaultToleranceintoThresholdPassw..> 02-Jan-2015 10:31    470K
248-FinegrainCrossVMAttacksonXenandVMwarearepos..> 02-Jan-2015 10:31    736K
249-LinearExtensionCubeAttackonStreamCiphers.pdf   02-Jan-2015 10:31    326K
250-CryptanalysisoftheMOREsymmetrickeyfullyhomo..> 02-Jan-2015 10:31    240K
251-ForgeryonStatelessCMCC.pdf                     02-Jan-2015 10:31    226K
252-MakingRSAPSSProvablySecureAgainstNonRandomF..> 02-Jan-2015 10:31    471K
253-PracticalandSecureQueryProcessingforLargesc..> 20-Jan-2023 14:19     207
254-EnhancedLatticeBasedSignaturesonReconfigura..> 02-Jan-2015 10:31      1M
255-CertificationandEfficientProofsofCommittedT..> 02-Jan-2015 10:31    502K
256-PrivateandDynamicTimeSeriesDataAggregationw..> 02-Jan-2015 10:31    345K
257-HandycipheraLowtechRandomizedSymmetrickeyCr..> 02-Jan-2015 10:31    300K
258-Arealtimekeyrecoveryattackontheauthenticate..> 02-Jan-2015 10:31    260K
259-PracticalComplexityCubeAttacksonRoundReduce..> 02-Jan-2015 10:31    385K
260-LocallyDecodableCodesforeditdistance.pdf       02-Jan-2015 10:31    442K
261-FaultAnalysisofGrainFamilyofStreamCiphers.pdf  02-Jan-2015 10:31    294K
262-DifferentialFaultAnalysisofMICKEYFamilyofSt..> 02-Jan-2015 10:31    264K
263-AGenericScanAttackonHardwarebasedeStreamWin..> 02-Jan-2015 10:31    307K
264-ContinuousAfterthefactLeakageResilientKeyEx..> 02-Jan-2015 10:31    406K
265-DualSystemGroupsanditsApplicationsCompactHI..> 02-Jan-2015 10:31    246K
266-ICEPOLEHighspeedHardwareorientedAuthenticat..> 02-Jan-2015 10:31    506K
267-DifferentialFaultAnalysisonthefamiliesofSIM..> 02-Jan-2015 10:31    838K
268-AlowcomplexitybitparallelMontgomerymultipli..> 02-Jan-2015 10:31    209K
268-NewbitparallelMontgomerymultiplierfortrinom..> 20-Jan-2023 08:29    419K
269-ChosenCiphertextSecurityviaPointObfuscation..> 02-Jan-2015 10:31    362K
270-FasterMaliciouslySecureTwoPartyComputationU..> 02-Jan-2015 10:31    613K
271-STRIBOBAuthenticatedEncryptionfromGOSTR3411..> 02-Jan-2015 10:30    284K
272-ImpossibledifferentialcryptanalysisofLBlock..> 02-Jan-2015 10:30    458K
273-WitnessEncryptionfromInstanceIndependentAss..> 02-Jan-2015 10:30    548K
274-Anoteontheconstructionofpairingfriendlyelli..> 20-Jan-2023 08:29    330K
274-Weakinstancesofcompositeorderprotocols.pdf     02-Jan-2015 10:30    400K
275-Identitybasedencryptionanddigitalsignatures..> 02-Jan-2015 10:30     96K
276-Designofidentitybaseddigitalsignaturescheme..> 02-Jan-2015 10:30     84K
277-NewTreatmentoftheBSWSamplingandItsApplicati..> 02-Jan-2015 10:30    277K
278-StrongerSecurityNotionsforDecentralizedTrac..> 02-Jan-2015 10:30    333K
279-ImprovedImpossibleDifferentialAttacksagains..> 02-Jan-2015 10:30    436K
280-MSEAModifiedSymmetricEncryptionAlgorithm.pdf   02-Jan-2015 10:30    345K
281-WCFBatweakablewideblockcipher.pdf              02-Jan-2015 10:30    450K
282-OnTheOrthogonalVectorProblemandTheFeasibili..> 02-Jan-2015 10:30    514K
283-StructuralLatticeReductionGeneralizedWorstC..> 02-Jan-2015 10:30    601K
283-StructuralLatticeReductionGeneralizedWorstC..> 20-Jan-2023 08:29    646K
284-ResettablySoundZeroKnoweldgeArgumentsfromOW..> 02-Jan-2015 10:30    933K
285-PrivacyEnhancingProxySignaturesfromNonInter..> 02-Jan-2015 10:30    438K
286-WeaknessesofPasswordAuthenticationSchemeBas..> 02-Jan-2015 10:30    264K
287-ActiveandPassiveSideChannelAttacksonDelayBa..> 02-Jan-2015 10:30    702K
288-ResilientAggregationinSimpleLinearSensorNet..> 02-Jan-2015 10:30    377K
289-AnEmpiricalStudyandsomeImprovementsoftheMin..> 02-Jan-2015 10:30    372K
290-ReliableBroadcastwithRespecttoTopologyKnowl..> 02-Jan-2015 10:30    340K
291-TrialmultiplicationisnotoptimalbutOnthesymm..> 20-Jan-2023 08:29    215K
291-TrialmultiplicationisnotoptimalbutOnthesymm..> 02-Jan-2015 10:30    215K
292-ImprovedMeetintheMiddleAttacksonReducedRoun..> 02-Jan-2015 10:30    414K
293-AnEfficientAbuseFreeFairContractSigningProt..> 20-Jan-2023 14:19     207
294-TheM3lcryptPasswordBasedKeyDerivationFuncti..> 02-Jan-2015 10:30    323K
295-ZAPsandNonInteractiveWitnessIndistinguishab..> 02-Jan-2015 10:30    399K
296-QuantumAttacksonClassicalProofSystemsTheHar..> 02-Jan-2015 10:29    880K
297-PipelineableOnLineEncryption.pdf               02-Jan-2015 10:29    395K
298-TorsionLimitsandRiemannRochSystemsforFuncti..> 02-Jan-2015 10:29    680K
299-OptimalityofNonAdaptiveStrategiesTheCaseofP..> 02-Jan-2015 10:29    454K
300-OnthePowersof2.pdf                             02-Jan-2015 10:29    417K
301-HowtoAvoidObfuscationUsingWitnessPRFs.pdf      02-Jan-2015 10:29    667K
302-BranchingHeuristicsinDifferentialCollisionS..> 02-Jan-2015 10:29    313K
303-OnthesecurityofXuetal39sauthenticationandke..> 20-Jan-2023 14:19     207
304-ActivelyPrivateandCorrectMPCSchemeintltn2fr..> 20-Jan-2023 08:29    110K
304-ActivelyPrivateandCorrectMPCSchemeintn2from..> 02-Jan-2015 10:29    110K
305-CollisionAttackon5RoundsofGrstl.pdf            02-Jan-2015 10:29    362K
306-PubliclyEvaluablePseudorandomFunctionsandTh..> 02-Jan-2015 10:29    519K
307-SimulationTimeSecurityMarginAssessmentagain..> 02-Jan-2015 10:29      7M
308-TheLocalityofSearchableSymmetricEncryption.pdf 02-Jan-2015 10:29    350K
309-IndistinguishabilityObfuscationfromtheMulti..> 02-Jan-2015 10:29    409K
310-SakaiOhgishiKasaharaIdentityBasedNonInterac..> 02-Jan-2015 10:29    485K
311-ExponentinversionSignaturesandIBEunderStati..> 02-Jan-2015 10:29    555K
312-StructurePreservingSignaturesfromTypeIIPair..> 02-Jan-2015 10:29    374K
313-OntheComplexityofFindingLowLevelSolutions.pdf  02-Jan-2015 10:29    175K
314-ImprovedLeakageModelBasedonGeneticAlgorithm..> 02-Jan-2015 10:29      1M
315-Statisticalweaknessesin20RC4likealgorithmsa..> 02-Jan-2015 10:29    272K
316-ExplicitNonMalleableCodesResistanttoPermuta..> 02-Jan-2015 10:29    773K
317-AnalysisofNORXInvestigatingDifferentialandR..> 02-Jan-2015 10:28    556K
318-Indexcalculusinthetracezerovariety.pdf         02-Jan-2015 10:28    449K
319-PreimageattacksonReducedroundStribog.pdf       02-Jan-2015 10:28      2M
320-ImprovedDifferentialCryptanalysisofRoundRed..> 02-Jan-2015 10:28    359K
321-EfficientQuantumImmuneKeylessSignatureswith..> 02-Jan-2015 10:28    599K
322-CodingTheoreticConstructionofQuantumRampSec..> 02-Jan-2015 10:28    138K
323-SomeRemarksonHoneywordBasedPasswordCracking..> 02-Jan-2015 10:28    335K
324-FromSingleBittoMultiBitPublicKeyEncryptionv..> 02-Jan-2015 10:28    575K
325-Apracticalforgeryandstaterecoveryattackonth..> 02-Jan-2015 10:28    383K
326-FeWALightweightBlockCipher.pdf                 02-Jan-2015 10:28    217K
327-AnOptimalStrongPasswordAuthenticationProtoc..> 02-Jan-2015 10:28    433K
328-AffineevasiveSetsModuloaPrime.pdf              02-Jan-2015 10:28    282K
329-ExplicitOptimalBinaryPebblingforOneWayHashC..> 02-Jan-2015 10:28    368K
330-NoncentralizedCryptocurrencywtihNoBlockchai..> 20-Jan-2023 08:29    202K
330-PoSCryptocurrencywtihNoBlockchain.pdf          02-Jan-2015 10:28    164K
331-MachineLearningClassificationoverEncryptedD..> 02-Jan-2015 10:28    607K
332-HowtoChooseInterestingPointsforTemplateAtta..> 02-Jan-2015 10:28    171K
333-Anoptimalrepresentationforthetracezerosubgr..> 02-Jan-2015 10:28    438K
334-LCPRHighPerformanceCompressionAlgorithmforL..> 20-Jan-2023 08:28    588K
334-LCPRHighPerformanceCompressionAlgorithmforL..> 02-Jan-2015 10:28    709K
335-SHADOWNUMBERSPUBLICKEYENCRYPTION.pdf           02-Jan-2015 10:28    187K
336-PrivatePredictiveAnalysisonEncryptedMedical..> 02-Jan-2015 10:28      2M
337-RelatedRandomnessAttacksforPublicKeyEncrypt..> 02-Jan-2015 10:28    505K
338-ATamperandLeakageResilientRandomAccessMachi..> 02-Jan-2015 10:28    941K
338-ATamperandLeakageResilientvonNeumannArchite..> 20-Jan-2023 08:28    807K
339-PublicCoinConcurrentZeroKnowledgeinLogarith..> 20-Jan-2023 14:19     207
340-AStrongandEfficientCertificatelessDigitalSi..> 02-Jan-2015 10:27    355K
341-FormalAnalysisofChaumianMixNetswithRandomiz..> 02-Jan-2015 10:27    403K
342-ProposingIndividualizationofthedesignofcryp..> 02-Jan-2015 10:27    508K
343-NewResultsonSolvingLinearEquationsModuloUnk..> 02-Jan-2015 10:27    376K
343-SolvingLinearEquationsModuloUnknownDivisors..> 20-Jan-2023 08:28    438K
344-TowardRobustHiddenVolumesusingWriteOnlyObli..> 02-Jan-2015 10:27    479K
345-PrivateDatabaseAccessWithHEoverORAMArchitec..> 02-Jan-2015 10:27    523K
346-TimeMemoryTradeoffsforIndexCalculusinGenus3..> 02-Jan-2015 10:27      1M
347-OneWayFunctionsandImperfectObfuscation.pdf     02-Jan-2015 10:27    577K
348-ASimpleCastasIntendedEVotingProtocolbyUsing..> 02-Jan-2015 10:27    310K
349-ZerocashDecentralizedAnonymousPaymentsfromB..> 02-Jan-2015 10:27    839K
350-DistributedSmoothProjectiveHashinganditsApp..> 02-Jan-2015 10:27    436K
351-SecretandVerifiableDelegatedVotingforWideRe..> 02-Jan-2015 10:27    137K
352-MultiVendorPayWordwithPaymentApproval.pdf      02-Jan-2015 10:27    349K
353-FoldingAlternantandGoppaCodeswithNonTrivial..> 02-Jan-2015 10:27    319K
354-OptimizingInformationSetDecodingAlgorithmst..> 02-Jan-2015 10:27    258K
355-Graphtheoreticdesignandanalysisofkeypredist..> 02-Jan-2015 10:27    235K
356-FullyKeyHomomorphicEncryptionArithmeticCirc..> 02-Jan-2015 10:27    600K
357-SimulatableLeakageAnalysisPitfallsandnewCon..> 02-Jan-2015 10:27      2M
358-Amechanicalapproachtoderiveidentitybasedpro..> 02-Jan-2015 10:27    280K
359-ExplicitendomorphismoftheJacobianofahyperel..> 02-Jan-2015 10:27    144K
360-McElieceintheworldofEscher.pdf                 02-Jan-2015 10:27    622K
361-NewResultsintheLinearCryptanalysisofDES.pdf    02-Jan-2015 10:27    219K
362-NothingisforFreeSecurityinSearchingSharedEn..> 02-Jan-2015 10:26    184K
362-NothingisforFreeSecurityinSearchingSharedam..> 20-Jan-2023 08:28    184K
363-ForgingAttacksontwoAuthenticatedEncryptions..> 02-Jan-2015 10:26    477K
364-DeletingSecretDatawithPublicVerifiability.pdf  02-Jan-2015 10:26    322K
365-MultitargetDPAattacksPushingDPAbeyondthelim..> 02-Jan-2015 10:26    448K
366-CryptanalysisandImprovementonRobustThreeFac..> 02-Jan-2015 10:26      1M
367-RedefiningtheTransparencyOrder.pdf             02-Jan-2015 10:26    479K
368-SolvingtheDiscreteLogarithmofa113bitKoblitz..> 02-Jan-2015 10:26    687K
369-OntheLimitsofAuthenticatedKeyExchangeSecuri..> 02-Jan-2015 10:26    706K
370-CompactVSSandEfficientHomomorphicUCCommitme..> 02-Jan-2015 10:26    551K
371-OntheEnumerationofDoubleBaseChainswithAppli..> 02-Jan-2015 10:26    449K
372-Fullysecureconstrainedpseudorandomfunctions..> 02-Jan-2015 10:26    467K
373-Beyond2c2SecurityinSpongeBasedAuthenticated..> 02-Jan-2015 10:26    514K
374-OptimalContractsforOutsourcedComputation.pdf   02-Jan-2015 10:26    413K
375-ImprovedCryptanalysisonReducedRoundGOSTandW..> 02-Jan-2015 10:26    498K
376-HowSecureisDeterministicEncryption.pdf         02-Jan-2015 10:26    409K
377-LogicSynthesisbasedPublicKeyScheme.pdf         02-Jan-2015 10:26    141K
378-AttacksonLin39sMobileDynamicIdentitybasedAu..> 20-Jan-2023 14:19     207
378-AttacksonLinsMobileDynamicIdentitybasedAuth..> 02-Jan-2015 10:26     82K
379-Hyperandellipticcurvecryptography.pdf          02-Jan-2015 10:26    412K
380-EfficientAdaptivelySecureIBBEfromStandardAs..> 02-Jan-2015 10:26    405K
381-UsingIndistinguishabilityObfuscationviaUCEs..> 02-Jan-2015 10:26    626K
382-PrivacyEnhancedParticipatorySensingwithColl..> 02-Jan-2015 10:26    890K
383-CryptanalysisofandImprovementonBiometricbas..> 02-Jan-2015 10:26    888K
384-Yao39smillionaires39problemanddecoybasedpub..> 20-Jan-2023 08:28     87K
384-Yaosmillionairesproblemanddecoybasedpublick..> 02-Jan-2015 10:26     87K
385-JacobianCoordinatesonGenus2Curves.pdf          02-Jan-2015 10:25    274K
386-ChaskeyAnEfficientMACAlgorithmfor32bitMicro..> 02-Jan-2015 10:25    245K
387-Newcandidatesformultivariatetrapdoorfunctio..> 02-Jan-2015 10:25    378K
388-FindingcollisionsforMD4hashalgorithmusinghy..> 02-Jan-2015 10:25    202K
389-AcceleratingNTRUbasedHomomorphicEncryptionu..> 02-Jan-2015 10:25    304K
390-BlackBoxNonBlackBoxZeroKnowledge.pdf           02-Jan-2015 10:25    936K
391-MuRDPATopdownLevelledMultireplicaMerkleHash..> 02-Jan-2015 10:25      1M
392-TheRandomizedIterateRevisitedAlmostLinearSe..> 02-Jan-2015 10:25    572K
393-AlmostOptimalConstructionsofUOWHFsfrom1to1R..> 02-Jan-2015 10:25    605K
394-RelationalHash.pdf                             02-Jan-2015 10:25    593K
395-LightweightandPrivacyPreservingDelegatableP..> 02-Jan-2015 10:25    701K
396-EfficientShortAdaptiveNIZKforNP.pdf            02-Jan-2015 10:25    636K
396-ProverEfficientCommitAndProveZeroKnowledgeS..> 20-Jan-2023 08:28    511K
397-CofactorizationonGraphicsProcessingUnits.pdf   02-Jan-2015 10:25    392K
398-DifferentialPropertiesoftheHFECryptosystem.pdf 02-Jan-2015 10:25    336K
399-AnAsymptoticallyOptimalStructuralAttackonth..> 02-Jan-2015 10:25    298K
400-ComposableObliviousExtendedPermutations.pdf    02-Jan-2015 10:25    500K
401-SoftwareimplementationofanAttributeBasedEnc..> 02-Jan-2015 10:25    415K
402-OntheExistenceofExtractableOneWayFunctions.pdf 02-Jan-2015 10:25    479K
403-GenericUniversalForgeryAttackonIterativeHas..> 02-Jan-2015 10:25    392K
404-LargeScaleSecureComputation.pdf                02-Jan-2015 10:25    652K
405-IndistinguishabilityObfuscationversusMultiB..> 02-Jan-2015 10:25    608K
406-NewGenericAttacksAgainstHashbasedMACs.pdf      02-Jan-2015 10:24    612K
407-TowardsSymmetricFunctionalEncryptionforRegu..> 02-Jan-2015 10:24    412K
408-BootstrappingBGVCiphertextsWithAWiderChoice..> 02-Jan-2015 10:24    320K
408-BootstrappingBGVCiphertextswithaWiderChoice..> 20-Jan-2023 08:28    268K
409-MomentsCorrelatingDPA.pdf                      02-Jan-2015 10:24      9M
410-SoftAnalyticalSideChannelAttacks.pdf           02-Jan-2015 10:24    402K
411-CombiningLeakageResilientPRFsandShufflingTo..> 02-Jan-2015 10:24    613K
412-EfficientSelectionofTimeSamplesforHigherOrd..> 02-Jan-2015 10:24    448K
413-OntheCostofLazyEngineeringforMaskedSoftware..> 02-Jan-2015 10:24      2M
414-ASecurityProofofKCDSAusinganextendedRandomO..> 02-Jan-2015 10:24    268K
415-VirtualProofsofReality.pdf                     02-Jan-2015 10:24      3M
416-AdaptiveSecurityofConstrainedPRFs.pdf          02-Jan-2015 10:24    458K
417-UsingRandomErrorCorrectingCodesinNearCollis..> 02-Jan-2015 10:24    351K
418-ASimpleRecursiveTreeObliviousRAM.pdf           02-Jan-2015 10:24    286K
419-FFSFactoryAdaptingCoppersmith39s34Factoriza..> 20-Jan-2023 08:28    683K
419-FFSFactoryAdaptingCoppersmithsFactorization..> 02-Jan-2015 10:24    683K
420-BoundedFullyHomomorphicSignatureSchemes.pdf    02-Jan-2015 10:24    483K
421-FNRArbitrarylengthsmalldomainblockcipherpro..> 02-Jan-2015 10:24    373K
422-Systemlevelnoninterferenceforconstanttimecr..> 02-Jan-2015 10:24    440K
423-TheHashFunction34Fugue34.pdf                   20-Jan-2023 08:28    692K
423-TheHashFunctionFugue.pdf                       02-Jan-2015 10:24    692K
424-ConstructingAbelianSurfacesforCryptographyv..> 02-Jan-2015 10:23    536K
425-NoteofMultidimensionalMITMAttackon25RoundTW..> 02-Jan-2015 10:23    331K
426-EfficientAuthenticationfromPRGRevisited.pdf    02-Jan-2015 10:23    493K
426-TowardsOptimallyEfficientSecretKeyAuthentic..> 20-Jan-2023 08:28    510K
427-Fastpointmultiplicationalgorithmsforbinarye..> 02-Jan-2015 10:23    396K
428-DualSystemEncryptionviaDoublySelectiveSecur..> 02-Jan-2015 10:23    960K
429-MementoHowtoReconstructyourSecretsfromaSing..> 02-Jan-2015 10:23    501K
430-RevisitingtheGentrySzydloAlgorithm.pdf         02-Jan-2015 10:23    361K
431-ALowLatencyLowAreaHardwareObliviousRAMContr..> 20-Jan-2023 08:28      1M
431-TinyORAMALowLatencyLowAreaHardwareORAMContr..> 02-Jan-2015 10:23      2M
432-UniversallyComposableAuthenticationandKeyex..> 02-Jan-2015 10:23    298K
433-AStatisticalModelforHigherOrderDPAonMaskedD..> 02-Jan-2015 10:23    589K
434-JustaLittleBitMore.pdf                         02-Jan-2015 10:23    252K
435-WaitaminuteAfastCrossVMattackonAES.pdf         02-Jan-2015 10:23    478K
436-SynthesisofFaultAttacksonCryptographicImple..> 02-Jan-2015 10:23    456K
437-RoundingandChainingLLLFindingFasterSmallRoo..> 02-Jan-2015 10:23    525K
438-SecurityofSymmetricEncryptionagainstMassSur..> 02-Jan-2015 10:23    403K
439-EfficientNonInteractiveVerifiableOutsourced..> 02-Jan-2015 10:23    324K
440-DoubleLevelMontgomeryCoxRowerArchitectureNe..> 02-Jan-2015 10:23    412K
441-ImprovedGenericAttacksAgainstHashbasedMACsa..> 02-Jan-2015 10:23    547K
442-SecureOutsourcedComputationoftheCharacteris..> 02-Jan-2015 10:23    251K
443-MinimizingtheTwoRoundEvenMansourCipher.pdf     02-Jan-2015 10:23    860K
444-RPKIvsROVERComparingtheRisksofBGPSecuritySo..> 02-Jan-2015 10:23      1M
445-PolynomialSpacesANewFrameworkforCompositeto..> 02-Jan-2015 10:22    623K
446-4pointAttackswithStandardDeviationAnalysiso..> 02-Jan-2015 10:22    437K
447-FasterPrivateSetIntersectionbasedonOTExtens..> 02-Jan-2015 10:22    346K
448-DifferentialAttacksonReducedSIMONVersionswi..> 20-Jan-2023 08:28    386K
448-ImprovedDifferentialAttacksonReducedSIMONVe..> 02-Jan-2015 10:22    375K
449-RelatedKeySecurePKEfromHashProofSystems.pdf    20-Jan-2023 08:28    336K
450-OptimizedImplementationofGeneralSecretShari..> 20-Jan-2023 14:19     207
451-LeveledFullyHomomorphicSignaturesfromStanda..> 02-Jan-2015 10:22    482K
452-ProofofActivityExtendingBitcoinsProofofWork..> 02-Jan-2015 10:22    476K
453-BlockCiphersFocusOnTheLinearLayerfeatPRIDEF..> 02-Jan-2015 10:22    593K
454-EarlyPropagationandImbalancedRoutingHowtoDi..> 02-Jan-2015 10:22      5M
455-Singleshotsecurityforonetimememoriesintheis..> 02-Jan-2015 10:22    334K
456-VerifiedImplementationsforSecureandVerifiab..> 02-Jan-2015 10:22    378K
457-TranscriptSecureSignaturesBasedonModularLat..> 02-Jan-2015 10:22    335K
457-Transcriptsecuresignaturesbasedonmodularlat..> 20-Jan-2023 08:28    407K
458-AutomatedAnalysisofCryptographicAssumptions..> 02-Jan-2015 10:22    480K
459-TemplateAttacksonDifferentDevices.pdf          02-Jan-2015 10:22    788K
460-FleXORFlexiblegarblingforXORgatesthatbeatsf..> 02-Jan-2015 10:22    527K
461-Provablysecureandefficientcertificatelesssi..> 20-Jan-2023 14:19     207
462-EfficientKeypolicyAttributebasedEncryptionf..> 02-Jan-2015 10:22    323K
463-LeveledFullyHomomorphicSignaturesfromLattic..> 02-Jan-2015 10:22    298K
464-ProvidingRootofTrustforARMTrustZoneusingOnC..> 02-Jan-2015 10:22      1M
465-SemiAdaptiveAttributeBasedEncryptionandImpr..> 02-Jan-2015 10:22    238K
466-Onanewpropertiesofnumbersequencesarandomnes..> 20-Jan-2023 08:28    350K
466-Onanewpropertiesofnumbersequencesarandomnes..> 02-Jan-2015 10:22    350K
467-AdHocSecureTwoPartyComputationonMobileDevic..> 02-Jan-2015 10:22    727K
468-PrivacyPreservingAuditingforAttributeBasedC..> 02-Jan-2015 10:22    407K
469-HomomorphicSignatureswithEfficientVerificat..> 02-Jan-2015 10:21    385K
470-PPDCPABEPrivacyPreservingDecentralizedCiphe..> 02-Jan-2015 10:21    335K
471-LargeUniverseCiphertextPolicyAttributeBased..> 02-Jan-2015 10:21    417K
472-HowtoWatermarkCryptographicFunctions.pdf       02-Jan-2015 10:21    447K
473-AnEfficientCloudbasedRevocableIdentitybased..> 20-Jan-2023 14:19     207
474-CryptographicSchemesBasedontheASASAStructur..> 02-Jan-2015 10:21    567K
475-AKeyRecoveryAttackonErrorCorrectingCodeBase..> 02-Jan-2015 10:21    363K
476-Simon39sCircuit.pdf                            20-Jan-2023 08:28     99K
476-SimonsCircuit.pdf                              02-Jan-2015 10:21     99K
477-RelaxedTwotooneRecodingSchemes.pdf             02-Jan-2015 10:21    239K
478-RelatedKeySecurePseudorandomFunctionsTheCas..> 02-Jan-2015 10:21    394K
479-EvenmorepracticalsecureloggingTreebasedSeek..> 02-Jan-2015 10:21    419K
480-CryptographicAgentsTowardsaUnifiedTheoryofC..> 20-Jan-2023 08:28    584K
480-TowardsaUnifiedTheoryofCryptographicAgents.pdf 02-Jan-2015 10:21    851K
481-UniversallyComposableNonInteractiveKeyExcha..> 02-Jan-2015 10:21    487K
482-DifferentiallyPrivateDataAggregationwithOpt..> 02-Jan-2015 10:21   1007K
483-DisjunctionsforHashProofSystemsNewConstruct..> 02-Jan-2015 10:21    568K
484-SealingtheLeakonClassicalNTRUSignatures.pdf    02-Jan-2015 10:21    444K
485-AnImprovedTruncatedDifferentialCryptanalysi..> 02-Jan-2015 10:21    457K
486-BinaryElligatorSquared.pdf                     02-Jan-2015 10:21    321K
487-GGHLiteMoreEfficientMultilinearMapsfromIdea..> 02-Jan-2015 10:21    716K
488-RelatedKeySecurityforPseudorandomFunctionsB..> 02-Jan-2015 10:21    938K
489-AGeneticAlgorithmforSearchingShortestLattic..> 02-Jan-2015 10:21    500K
490-UniversallyComposablesecureTNCprotocolbased..> 02-Jan-2015 10:21    359K
491-BootstrappableIdentityBasedFullyHomomorphic..> 02-Jan-2015 10:21    454K
492-Faultattacksonpairingbasedprotocolsrevisite..> 02-Jan-2015 10:20    206K
493-ArithmeticonAbelianandKummerVarieties.pdf      02-Jan-2015 10:20    539K
494-HardnessofkLWEandApplicationsinTraitorTraci..> 02-Jan-2015 10:20    729K
495-ImprovedShortLatticeSignaturesintheStandard..> 02-Jan-2015 10:20    600K
496-SecurityPitfallsofaProvablySecureIdentityba..> 02-Jan-2015 10:20    255K
497-NREPONormalBasisRecomputingwithPermutedOper..> 02-Jan-2015 10:20    711K
498-LightweightDiffusionLayerfromthekthrootofth..> 02-Jan-2015 10:20    375K
499-SecurityandEfficiencyAnalysisofTheHammingDi..> 02-Jan-2015 10:20    681K
500-VerifiableandSecureOutsourcingSchemesofModu..> 02-Jan-2015 10:20    416K
501-LighterFasterandConstantTimeWhirlBobtheWhir..> 02-Jan-2015 10:20    899K
501-WHIRLBOBtheWhirlpoolbasedVariantofSTRIBOBLi..> 20-Jan-2023 08:28    482K
502-What39stheGistPrivacyPreservingAggregationo..> 20-Jan-2023 08:28    994K
502-WhatstheGistPrivacyPreservingAggregationofU..> 02-Jan-2015 10:20    994K
503-EfficientHiddenVectorEncryptionwithConstant..> 02-Jan-2015 10:20    225K
504-AProvableSecurityAnalysisofIntel39sSecureKe..> 20-Jan-2023 08:28    613K
504-AProvableSecurityAnalysisofIntelsSecureKeyR..> 02-Jan-2015 10:20    665K
505-Onthequaternionellisogenypathproblem.pdf       02-Jan-2015 10:20    891K
506-FindingRootsinGFpnwiththeSuccessiveResultan..> 02-Jan-2015 10:20    570K
507-HowtoGenerateanduseUniversalParameters.pdf     02-Jan-2015 10:20    840K
507-HowtoGenerateanduseUniversalSamplers.pdf       20-Jan-2023 08:28    892K
508-ReversingStealthyDopantLevelCircuits.pdf       02-Jan-2015 10:20      6M
509-Privacypreservingdelegatedwordsearchinthecl..> 02-Jan-2015 10:20    217K
510-AProbabilisticAlgebraicAttackontheGrainFami..> 02-Jan-2015 10:20    341K
511-ConstructingCCAsecurepredicateencapsulation..> 02-Jan-2015 10:19    369K
512-Rmindatoolforcryptographicallysecurestatist..> 02-Jan-2015 10:19      1M
513-RSAmeetsDPARecoveringRSASecretKeysfromNoisy..> 02-Jan-2015 10:19    250K
514-OnConstrainedImplementationofLatticebasedCr..> 02-Jan-2015 10:19      2M
515-IdealSocialSecretSharingUsingBirkhoffInterp..> 02-Jan-2015 10:19    148K
516-OntheClassificationofFiniteBooleanFunctions..> 02-Jan-2015 10:19    234K
517-OntheConnectionbetweenLeakageToleranceandAd..> 02-Jan-2015 10:19    360K
518-CryptographyfromCompressionFunctionsTheUCEB..> 02-Jan-2015 10:19    614K
519-RealizingPicoFinallyNoMorePasswords.pdf        02-Jan-2015 10:19      1M
520-Onpowersofcodes.pdf                            22-Dec-2014 12:36    400K
520-SquaresofRandomLinearCodes.pdf                 20-Jan-2023 08:28    393K
520-Squaresofrandomlinearcodes.pdf                 02-Jan-2015 10:19    382K
521-AdaptivelySecurePuncturablePseudorandomFunc..> 02-Jan-2015 10:19    514K
522-ConstrainedPseudorandomFunctionsVerifiablea..> 02-Jan-2015 10:19    488K
523-FullySecureandFastSigningfromObfuscation.pdf   02-Jan-2015 10:19    288K
524-ConstructinghyperbentfunctionsfromBooleanfu..> 02-Jan-2015 10:19    109K
525-DifferentialAnalysisonBlockCipherPRIDE.pdf     02-Jan-2015 10:19    366K
526-Curve41417Karatsubarevisited.pdf               02-Jan-2015 10:19    375K
527-GoodisNotGoodEnoughDerivingOptimalDistingui..> 02-Jan-2015 10:19      1M
528-GroupsWithTwoGeneratorsHavingUnsolvableWord..> 02-Jan-2015 10:19    235K
529-LeakageResilientSignatureswithGracefulDegra..> 02-Jan-2015 10:19    369K
530-FOAMSearchingforHardwareOptimalSPNStructure..> 02-Jan-2015 10:19    693K
531-SpatialBloomFiltersEnablingPrivacyinLocatio..> 02-Jan-2015 10:19    387K
532-OnthePitfallsofusingArbiterPUFsasBuildingBl..> 20-Jan-2023 08:28    589K
533-IndifferentiabilityResultsandProofsforSomeP..> 02-Jan-2015 10:19    689K
534-DifferentialPowerAnalysisofaMcElieceCryptos..> 02-Jan-2015 10:18    743K
535-OnKeyRecoveryAttacksagainstExistingSomewhat..> 02-Jan-2015 10:18    498K
536-ASurveyandNewResultsontheDecompositionofanN..> 20-Jan-2023 08:27    187K
536-OnDecompositionofanNFSRintoaCascadeConnecti..> 02-Jan-2015 10:18    183K
537-ConstrainedVerifiableRandomFunctions.pdf       02-Jan-2015 10:18    440K
538-ASecureCloudbasedNFCMobilePaymentProtocol.pdf  20-Jan-2023 14:19     207
539-FasterSecureArithmeticComputationUsingSwitc..> 02-Jan-2015 10:18    484K
540-OptimizedArchitectureforAES.pdf                02-Jan-2015 10:18    635K
541-EMAttackIsNonInvasiveDesignMethodologyandVa..> 02-Jan-2015 10:18      2M
542-OntheMultioutputFilteringModelandItsApplica..> 02-Jan-2015 10:18    454K
543-APracticalSecondOrderFaultAttackagainstaRea..> 02-Jan-2015 10:18    417K
544-SecureMutualTestingStrategyforCryptographic..> 02-Jan-2015 10:18    339K
545-Solvingclosestvectorinstancesusinganapproxi..> 02-Jan-2015 10:18    115K
546-AnonymousandPubliclyLinkableReputationSyste..> 02-Jan-2015 10:18    488K
547-AuthenticationCodesBasedonResilientBooleanM..> 20-Jan-2023 08:27    310K
547-AuthenticationSchemesBasedonResilientMaps.pdf  02-Jan-2015 10:18    301K
548-ImplicitfactorizationofunbalancedRSAmoduli.pdf 02-Jan-2015 10:18    420K
549-NewAttacksontheRSACryptosystem.pdf             02-Jan-2015 10:18    393K
550-FunctionPrivateFunctionalEncryptioninthePri..> 02-Jan-2015 10:18    157K
551-DiffusionMatricesfromAlgebraicGeometryCodes..> 02-Jan-2015 10:18    276K
552-EfficientRecordLevelKeylessSignaturesforAud..> 02-Jan-2015 10:18    264K
553-ASimplerVariantofUniversallyComposableSecur..> 02-Jan-2015 10:18      1M
554-OnVirtualGreyBoxObfuscationforGeneralCircui..> 02-Jan-2015 10:18    631K
555-GeneralStatisticallySecureComputationwithBo..> 02-Jan-2015 10:18    539K
556-SecuringCloudDataintheNewAttackerModel.pdf     02-Jan-2015 10:18    339K
557-RoundEfficientBlackBoxConstructionofComposa..> 02-Jan-2015 10:18    271K
558-DoubleshieldedPublicKeyCryptosystems.pdf       02-Jan-2015 10:17    282K
559-CountermeasuresAgainstHighOrderFaultInjecti..> 02-Jan-2015 10:17    486K
560-AnInvestigationofSomeForwardSecurityPropert..> 02-Jan-2015 10:17    148K
560-TowardsForwardSecurityPropertiesforPEKSandI..> 20-Jan-2023 08:27    146K
561-PerformanceIncreasingApproachesForBinaryFie..> 02-Jan-2015 10:17    272K
562-hHBaHarderHBProtocol.pdf                       02-Jan-2015 10:17    268K
563-AnalysisofBoomerangDifferentialTrailsviaaSA..> 02-Jan-2015 10:17    332K
564-ASecurityDefinitionforMultiSecretSharingand..> 02-Jan-2015 10:17      3M
565-KangaroosinSideChannelAttacks.pdf              02-Jan-2015 10:17    467K
566-DirectConstructionofRecursiveMDSDiffusionLa..> 02-Jan-2015 10:17    370K
567-AttributeBasedSignatureswithoutPairingsbyth..> 20-Jan-2023 08:27    459K
568-NewClassesofPublicKeyCryptosystemsoverF_28C..> 02-Jan-2015 10:17    149K
569-FastLatticePointEnumerationwithMinimalOverh..> 02-Jan-2015 10:17    720K
570-DejaQUsingDualSystemstoRevisitqTypeAssumpti..> 02-Jan-2015 10:17    501K
571-Howtomanipulatecurvestandardsawhitepaperfor..> 02-Jan-2015 10:17    316K
572-OntheOptimalityofDifferentialFaultAnalyseso..> 02-Jan-2015 10:17    495K
573-AnewpublickeysystembasedonPolynomialsoverfi..> 02-Jan-2015 10:17    154K
574-SecurityAnalysisofMultilinearMapsovertheInt..> 02-Jan-2015 10:17    492K
575-SimpleAEADHardwareInterfaceSAEHIinaSoCImple..> 02-Jan-2015 10:17    875K
575-SimpleAEADHardwareInterfaceSHIinaSoCImpleme..> 20-Jan-2023 08:27    875K
576-VernamTwo.pdf                                  02-Jan-2015 10:17    490K
577-ReducingCommunicationOverheadoftheSubsetDif..> 02-Jan-2015 10:17    402K
578-TheExactPRFSecurityofNMACandHMAC.pdf           02-Jan-2015 10:17    481K
579-ScanBasedSideChannelAttackonGrainv1.pdf        20-Jan-2023 14:19     207
580-TheHuntingoftheSNARK.pdf                       02-Jan-2015 10:17    809K
581-HierarchicalIdentityBasedEncryptionfromAffi..> 02-Jan-2015 10:17    861K
582-NSEC5ProvablyPreventingDNSSECZoneEnumeratio..> 02-Jan-2015 10:16    421K
583-TemplateAttacksBasedOnPrioriKnowledge.pdf      02-Jan-2015 10:16    150K
584-UniversallyComposableEfficientPricedOblivio..> 02-Jan-2015 10:16    472K
585-TheSPEKEProtocolRevisited.pdf                  02-Jan-2015 10:16    264K
586-AnAlgebraicApproachtoNonMalleability.pdf       02-Jan-2015 10:16    516K
587-Noninteractivezeroknowledgeproofsinthequant..> 02-Jan-2015 10:16    761K
588-APuncturedProgrammingApproachtoAdaptivelySe..> 02-Jan-2015 10:16    340K
589-AuthenticatedKeyExchangefromIdealLattices.pdf  02-Jan-2015 10:16    500K
590-Automatedalgebraicanalysisofstructurepreser..> 02-Jan-2015 10:16    330K
591-CompactandSideChannelSecureDiscreteGaussian..> 02-Jan-2015 10:16    223K
592-MultiprecisionmultiplicationonAVRrevisited.pdf 02-Jan-2015 10:16    241K
593-ImprovedExponentialtimeAlgorithmsforInhomog..> 02-Jan-2015 10:16    398K
594-ObliviousParallelRAM.pdf                       02-Jan-2015 10:16    448K
594-ObliviousParallelRAMandApplications.pdf        20-Jan-2023 08:27    565K
595-ScalableZeroKnowledgeviaCyclesofEllipticCur..> 02-Jan-2015 10:16    735K
596-SecureandObliviousMaximumBipartiteMatchingS..> 02-Jan-2015 10:16    329K
597-InvisibleAdaptiveAttacks.pdf                   02-Jan-2015 10:16    486K
598-PrivacyFreeGarbledCircuitswithApplicationsT..> 02-Jan-2015 10:16    706K
599-PostquantumkeyexchangefortheTLSprotocolfrom..> 02-Jan-2015 10:16    561K
600-DTKIanewformalizedPKIwithnotrustedparties.pdf  20-Jan-2023 14:19     207
601-AdaptiveversusStaticSecurityintheUCModel.pdf   02-Jan-2015 10:16    386K
602-ACryptographicStudyofTokenizationSystems.pdf   02-Jan-2015 10:16    294K
603-RecursiveTreesforPracticalORAM.pdf             02-Jan-2015 10:16    430K
604-PrivateWebSearchwithConstantRoundEfficiency..> 02-Jan-2015 10:16    235K
605-OntheLimitationsofComputationalFuzzyExtract..> 20-Jan-2023 08:27     93K
605-OntheLimitsofComputationalFuzzyExtractors.pdf  02-Jan-2015 10:16     88K
606-AMultiFunctionProvableDataPossessionSchemei..> 02-Jan-2015 10:16      1M
607-AddingControllableLinkabilitytoPairingBased..> 02-Jan-2015 10:15    411K
608-KeypolicyAttributebasedEncryptionforBoolean..> 02-Jan-2015 10:15    341K
609-PublicKeyEncryptionIndistinguishableUnderPl..> 20-Jan-2023 08:27    791K
609-StructurePreservingEncryptionIndistinguisha..> 02-Jan-2015 10:15    699K
610-ComputingontheEdgeofChaosStructureandRandom..> 02-Jan-2015 10:15    302K
611-AccumulatingAutomataandCascadedEquationsAut..> 02-Jan-2015 10:15    144K
612-AttributeBasedEncryptionOptimizedforCloudCo..> 02-Jan-2015 10:15    377K
613-ASecurityAnalysisoftheCompositionofChaCha20..> 02-Jan-2015 10:15    329K
614-ExpressiveandSecureSearchableEncryptioninth..> 02-Jan-2015 10:15    323K
615-OptimallyResilientandAdaptivelySecureMultiP..> 02-Jan-2015 10:15    493K
615-TheHiddenGraphModelCommunicationLocalityand..> 20-Jan-2023 08:27    496K
616-PracticalAttributeBasedEncryptionTraitorTra..> 02-Jan-2015 10:15    614K
617-ADSNARKNearlyPracticalandPrivacyPreservingP..> 02-Jan-2015 10:15    944K
618-ProvingCorrectnessandSecurityofTwoPartyComp..> 02-Jan-2015 10:15    392K
619-THENEWHEURISTICGUESSANDDETERMINEATTACKONSNO..> 02-Jan-2015 10:15    393K
620-TheM3dcryptPasswordHashingFunction.pdf         20-Jan-2023 08:27    430K
620-TheM3dcryptPasswordScheme.pdf                  02-Jan-2015 10:15    339K
621-NothingelseMATorsMonitoringtheAnonymityofTo..> 20-Jan-2023 08:27      1M
621-NothingelseMATorsMonitoringtheAnonymityofTo..> 02-Jan-2015 10:15      1M
622-FullySecureAttributeBasedEncryptionfromMult..> 02-Jan-2015 10:15    432K
623-PrivacyandImperfectRandomness.pdf              02-Jan-2015 10:15    482K
623-PrivacywithImperfectRandomness.pdf             20-Jan-2023 08:27    501K
624-KTORAMABandwidthefficientORAMBuiltonKaryTre..> 02-Jan-2015 10:15    310K
625-PrettyUnderstandableDemocracy20.pdf            02-Jan-2015 10:15      1M
626-GetYourHandsOffMyLaptopPhysicalSideChannelK..> 02-Jan-2015 10:15      5M
627-OnModesofOperationsofaBlockCipherforAuthent..> 02-Jan-2015 10:14    563K
628-AnEfficienttCheaterIdentifiableSecretSharin..> 02-Jan-2015 10:14    315K
629-TwofactorauthenticationfortheBitcoinprotoco..> 02-Jan-2015 10:14    359K
630-PrivacyPreservingMinimumSpanningTreesthroug..> 02-Jan-2015 10:14    317K
631-ZipfsLawinPasswords.pdf                        02-Jan-2015 10:14    997K
632-VerifiableOrderQueriesandOrderStatisticsona..> 02-Jan-2015 10:14    320K
633-ClientServerConcurrentZeroKnowledgewithCons..> 02-Jan-2015 10:14    263K
634-ConstantRoundLeakageResilientZeroKnowledgeA..> 02-Jan-2015 10:14    377K
635-Type2StructurePreservingSignatureSchemesRev..> 02-Jan-2015 10:14    146K
636-ImprovedTimingAttacksonECDSA.pdf               02-Jan-2015 10:14    287K
637-GenericHardnessoftheMultipleDiscreteLogarit..> 02-Jan-2015 10:14    341K
638-PatternMatchingEncryption.pdf                  02-Jan-2015 10:14    433K
638-SubstringSearchableSymmetricEncryption.pdf     20-Jan-2023 08:27    480K
639-AutomatedDesignImplementationandEvaluationo..> 02-Jan-2015 10:14    942K
640-RevocationinPubliclyVerifiableOutsourcedCom..> 02-Jan-2015 10:14    505K
641-TheMultipleNumberFieldSievewithConjugationM..> 02-Jan-2015 10:14    597K
642-BalancedpermutationsEvenMansourciphers.pdf     02-Jan-2015 10:14    424K
643-OntheSecurityofAnEfficientBiometricAuthenti..> 02-Jan-2015 10:14    155K
643-OntheSecurityofAnEfficientBiometricAuthenti..> 20-Jan-2023 08:27    155K
644-SideChannelAttacksVulnerabilityAnalysisofPR..> 02-Jan-2015 10:14    979K
645-GraphInducedMultilinearMapsfromLattices.pdf    02-Jan-2015 10:14    432K
646-HighspeedPolynomialMultiplicationArchitectu..> 02-Jan-2015 10:14    356K
647-UniversallyComposableSecureGroupCommunicati..> 02-Jan-2015 10:14    134K
648-AnEquivalentConditionontheSwitchingConstruc..> 02-Jan-2015 10:14    279K
649-FPGATrojansthroughDetectingandWeakeningofCr..> 02-Jan-2015 10:14      2M
650-RoundOptimalPasswordProtectedSecretSharinga..> 02-Jan-2015 10:13    638K
651-AnoteonCCA2protectedMcElieceCryptosystemwit..> 02-Jan-2015 10:13    195K
652-ADynamicCubeAttackon105roundGrainv1.pdf        02-Jan-2015 10:13    498K
653-Mersennefactorizationfactory.pdf               02-Jan-2015 10:13    366K
654-MultiBitDifferentialFaultAnalysisofGrain128..> 02-Jan-2015 10:13    335K
655-PlecoandPlectronTwoProvablySecurePasswordHa..> 02-Jan-2015 10:13    322K
656-CryptanalyticTimeMemoryDataTradeoffsforFXCo..> 02-Jan-2015 10:13    394K
657-OnthecycledecompositionoftheWGNLFSR.pdf        02-Jan-2015 10:13    308K
658-AClassofFSRsandTheirAdjacencyGraphs.pdf        02-Jan-2015 10:13    297K
658-TheAdjacencyGraphsofSomeFeedbackShiftRegist..> 20-Jan-2023 08:27    297K
659-OnthePrimitivityofTrinomialsoverSmallFinite..> 02-Jan-2015 10:13    356K
660-InteractiveProofsunderContinualMemoryLeakag..> 02-Jan-2015 10:13    608K
661-OneRoundDeniableKeyExchangewithPerfectForwa..> 02-Jan-2015 10:13    152K
662-OutsourcedPatternMatching.pdf                  02-Jan-2015 10:13    459K
663-LocallyDecodableandUpdatableNonMalleableCod..> 02-Jan-2015 10:13    493K
664-OntheOptimalPreComputationofWindowtauNAFfor..> 02-Jan-2015 10:13    316K
665-OrthogonalDirectSumMaskingASmartcardFriendl..> 02-Jan-2015 10:13    481K
666-FullySecureFunctionalEncryptionwithoutObfus..> 02-Jan-2015 10:13    475K
666-FunctionalEncryptionWithoutObfuscation.pdf     20-Jan-2023 08:27    476K
667-CutandChooseBasedTwoPartyComputationintheOn..> 02-Jan-2015 10:13    676K
668-FairnessVersusGuaranteedOutputDeliveryinSec..> 02-Jan-2015 10:13    337K
668-FairnessversusGuaranteedOutputDeliveryinSec..> 20-Jan-2023 08:27    429K
669-OntheCommunicationComplexityofSecureFunctio..> 02-Jan-2015 10:13    481K
670-DoubleModandSingleModSimpleRandomizedSecret..> 02-Jan-2015 10:13    188K
671-SCORAMObliviousRAMforSecureComputation.pdf     02-Jan-2015 10:13    604K
672-CircuitORAMOnTightnessoftheGoldreichOstrovs..> 02-Jan-2015 10:13    994K
673-HowtoEstimatetheSuccessRateofHigherOrderSid..> 02-Jan-2015 10:12      2M
674-EfficientRAMandcontrolflowinverifiableoutso..> 02-Jan-2015 10:12    331K
675-TheUsageofCounterRevisitedSecondPreimageAtt..> 02-Jan-2015 10:12    374K
676-FullyCollusionResistantTraceableKeyPolicyAt..> 02-Jan-2015 10:12    411K
677-AttacksinStreamCiphersASurvey.pdf              02-Jan-2015 10:12    253K
678-ACounterexampletotheChainRuleforConditional..> 02-Jan-2015 10:12    472K
679-ANoteontheBellareRivestProtocolforTransluce..> 02-Jan-2015 10:12    191K
680-RemarksontheCryptographicPrimitiveofAttribu..> 02-Jan-2015 10:12    307K
681-ImprovedLinearCryptanalysisofReducedroundSI..> 02-Jan-2015 10:12    865K
682-AUnifiedFormalismforPhysicalAttacks.pdf        02-Jan-2015 10:12      1M
683-ErrorTolerantAlgebraicSideChannelAttacksUsi..> 02-Jan-2015 10:12    161K
684-TowardsaFullFeaturedImplementationofAttribu..> 02-Jan-2015 10:12    274K
685-BitSecurityoftheCDHProblemsoverFiniteField.pdf 20-Jan-2023 08:27    439K
685-BitsSecurityoftheCDHProblemsoverFiniteField..> 02-Jan-2015 10:12    490K
686-ARecursiveRelationBetweenTheAdjacencyGrapho..> 02-Jan-2015 10:12    349K
687-ReducingtheComplexityofNormalBasisMultiplic..> 02-Jan-2015 10:12    205K
688-AnalyticToolboxforWhiteBoxImplementationsLi..> 02-Jan-2015 10:12    706K
688-WhiteBoxAESImplementationRevisited.pdf         20-Jan-2023 08:27    689K
689-EfficientImplementationofKeylessSignaturesw..> 02-Jan-2015 10:12    482K
690-EfficientIntervalCheckinthePresenceofMalici..> 02-Jan-2015 10:12    371K
691-IntegrationofhardwaretokensintheIdemixlibra..> 02-Jan-2015 10:12    333K
692-ExtendingObliviousTransferEfficientlyorHowt..> 02-Jan-2015 10:12    330K
693-OptimalProximityProofs.pdf                     02-Jan-2015 10:12    298K
694-MaliciousHashingEve39sVariantofSHA1.pdf        20-Jan-2023 08:27    433K
694-MaliciousHashingEvesVariantofSHA1.pdf          02-Jan-2015 10:12    433K
695-ProofofProximityofKnowledge.pdf                02-Jan-2015 10:12    127K
696-SecurityProofsfortheBLTSignatureScheme.pdf     02-Jan-2015 10:11    586K
697-AFullyHomomorphicEncryptionSchemewithBetter..> 02-Jan-2015 10:11    306K
698-HIMMOALightweightFullyCollusionResistantKey..> 02-Jan-2015 10:11    496K
698-HIMMOAlightweightcollusionresistantkeypredi..> 20-Jan-2023 08:27    891K
699-ScrutinizingandImprovingImpossibleDifferent..> 02-Jan-2015 10:11      3M
700-BoundedPreImageAwarenessandtheSecurityofHas..> 02-Jan-2015 10:11    389K
701-APracticalIterativeSideChannelCubeAttackonA..> 20-Jan-2023 14:19     207
702-DefeatingISO97971MACAlgo3byCombiningSideCha..> 02-Jan-2015 10:11      2M
703-LinearityMeasuresforMQCryptography.pdf         02-Jan-2015 10:11    388K
704-A128bitBlockCipherBasedonThreeGroupArithmet..> 02-Jan-2015 10:11    157K
705-StructurePreservingSignaturesonEquivalenceC..> 02-Jan-2015 10:11    494K
706-TheFeasibilityofOutsourcedDatabaseSearchint..> 02-Jan-2015 10:11    260K
707-AnalysisOfVarianceandCPAinSCA.pdf              02-Jan-2015 10:11      2M
708-FormalTreatmentofPrivacyEnhancingCredential..> 02-Jan-2015 10:11    748K
709-ANoteonQuantumSecurityforPostQuantumCryptog..> 02-Jan-2015 10:11    234K
710-AnEfficientTransformfromSigmaProtocolstoNIZ..> 02-Jan-2015 10:11    398K
711-NewClassofMultivariatePublicKeyCryptosystem..> 02-Jan-2015 10:11    111K
712-HybridAnomalyDetectionusingKMeansClustering..> 02-Jan-2015 10:11    935K
713-CoLocationResistantClouds.pdf                  02-Jan-2015 10:11    577K
714-Acomprehensiveempiricalcomparisonofparallel..> 02-Jan-2015 10:11    494K
715-CryptanalysisonRobustBiometricsBasedAuthent..> 02-Jan-2015 10:11    168K
715-CryptanalysisonRobustBiometricsBasedAuthent..> 20-Jan-2023 08:27    168K
716-WireTapCodesasSideChannelCountermeasureanFP..> 02-Jan-2015 10:11      2M
717-HowtoSplitaSecretintoUnknownShares.pdf         02-Jan-2015 10:10    269K
718-SquareSpanProgramswithApplicationstoSuccinc..> 02-Jan-2015 10:10    398K
719-BivariatePolynomialsModuloCompositesandthei..> 02-Jan-2015 10:10    246K
720-AdaptivelySecureConstrainedPseudorandomFunc..> 02-Jan-2015 10:10    358K
721-OnShor39sFactoringAlgorithmwithMoreRegister..> 20-Jan-2023 08:27    371K
721-OnShorsFactoringAlgorithmwithMoreRegistersa..> 02-Jan-2015 10:10    371K
722-DifferentialCryptanalysisofSipHash.pdf         02-Jan-2015 10:10    300K
723-Cryptoanalysesonsecureandefficientprivacypr..> 02-Jan-2015 10:10     56K
724-ProtectingEncryptedCookiesfromCompressionSi..> 02-Jan-2015 10:10    453K
725-EfficientSoftwareImplementationofRingLWEEnc..> 02-Jan-2015 10:10    246K
726-CIARPARISCProcessorForCryptographyApplicati..> 20-Jan-2023 14:19     207
727-TheQcurveConstructionforEndomorphismAcceler..> 02-Jan-2015 10:10    417K
728-UnpickingPLAIDACryptographicAnalysisofanISO..> 02-Jan-2015 10:10    605K
729-FasterBinaryFieldMultiplicationandFasterBin..> 02-Jan-2015 10:10    359K
730-DifferentiallyPrivateLinearAlgebraintheStre..> 02-Jan-2015 10:10    506K
731-Securemodularpasswordauthenticationforthewe..> 02-Jan-2015 10:10    690K
732-ResizableTreeBasedObliviousRAM.pdf             02-Jan-2015 10:10    337K
733-AugmentedLearningwithErrorsTheUntappedPoten..> 02-Jan-2015 10:10    706K
734-Sboxpipeliningusinggeneticalgorithmsforhigh..> 02-Jan-2015 10:10    196K
735-DealerLeakageResilientVerifiableSecretShari..> 02-Jan-2015 10:10    303K
736-CubeAttacksandCubeattacklikeCryptanalysison..> 02-Jan-2015 10:10    526K
737-Designandanalysisofoneroundcertificatelessa..> 20-Jan-2023 14:19     207
738-AVeryCompactFPGAImplementationofLEDandPHOTO..> 02-Jan-2015 10:10    494K
739-SBIMQaMultivariatePolynomialTrapdoorFunctio..> 02-Jan-2015 10:10     98K
740-Nonexistenceofn5typeGeneralizedBentfunction..> 02-Jan-2015 10:10    201K
741-EliminatingLeakageinReverseFuzzyExtractors.pdf 02-Jan-2015 10:10      5M
742-AsurveyofFaultAttacksinPairingBasedCryptogr..> 02-Jan-2015 10:09    503K
743-ConciseMultiChallengeCCASecureEncryptionand..> 02-Jan-2015 10:09    622K
744-Sievingforshortestvectorsinlatticesusingang..> 02-Jan-2015 10:09      9M
745-UniversalSignatureAggregators.pdf              02-Jan-2015 10:09    636K
746-Decoybasedinformationsecurity.pdf              02-Jan-2015 10:09    120K
747-AutomaticEnumerationofRelatedkeyDifferentia..> 02-Jan-2015 10:09    496K
747-TowardsFindingtheBestCharacteristicsofSomeB..> 20-Jan-2023 08:26    568K
748-EfficientandVerifiableAlgorithmsforSecureOu..> 02-Jan-2015 10:09    318K
749-BitlinePUFBuildingNativeChallengeResponsePU..> 02-Jan-2015 10:09   1002K
750-HardwareTrojanHorsesinCryptographicIPCores.pdf 02-Jan-2015 10:09      1M
751-HigherOrderThresholdImplementations.pdf        02-Jan-2015 10:09      1M
752-KeyIndistinguishabilityvsStrongKeyIndisting..> 02-Jan-2015 10:09    287K
753-OnlineDeniabilityforMultipartyProtocolswith..> 02-Jan-2015 10:09    510K
754-BilinearEntropyExpansionfromtheDecisionalLi..> 02-Jan-2015 10:09    471K
755-ComputingModWithoutMod.pdf                     02-Jan-2015 10:09    328K
756-TwoHalvesMakeaWholeReducingDataTransferinGa..> 02-Jan-2015 10:09    379K
757-AdaptivelySecureBroadcastEncryptionwithSmal..> 02-Jan-2015 10:09    482K
758-CryptographicReverseFirewalls.pdf              02-Jan-2015 10:09    693K
759-HowtoEfficientlyEvaluateRAMProgramswithMali..> 02-Jan-2015 10:09    537K
760-MontgomeryModularMultiplicationonARMNEONRev..> 02-Jan-2015 10:09    480K
761-CryptanalysisofReducedroundSIMON32andSIMON4..> 02-Jan-2015 10:08    394K
762-AccessControlinPubliclyVerifiableOutsourced..> 02-Jan-2015 10:08    472K
763-OnthePrivacyProvisionsofBloomFiltersinLight..> 02-Jan-2015 10:08    355K
764-OneoutofManyProofsOrHowtoLeakaSecretandSpen..> 02-Jan-2015 10:08    420K
765-TheBitcoinBackboneProtocolAnalysisandApplic..> 02-Jan-2015 10:08    906K
766-SuccinctGarblingSchemesandApplications.pdf     02-Jan-2015 10:08    616K
767-AlgebraicAttacksonHumanIdentificationProtoc..> 02-Jan-2015 10:08    622K
768-CutandChooseBilateralObliviousTransferandIt..> 02-Jan-2015 10:08    323K
769-IndistinguishabilityObfuscationofIteratedCi..> 02-Jan-2015 10:08    591K
770-AESCipherKeysSuitableforEfficientSideChanne..> 02-Jan-2015 10:08    179K
771-SuccinctRandomizedEncodingsandtheirApplicat..> 02-Jan-2015 10:08    537K
772-FullySecureandSuccinctAttributeBasedEncrypt..> 02-Jan-2015 10:08    623K
773-ObfuscatingLowRankMatrixBranchingPrograms.pdf  02-Jan-2015 10:08    566K
774-AutomatedAnalysisandSynthesisofBlockCipherM..> 02-Jan-2015 10:08    412K
775-LockfreeGaussSieveforLinearSpeedupsinParall..> 02-Jan-2015 10:08    492K
776-HowtoObfuscateProgramsDirectly.pdf             02-Jan-2015 10:08    815K
777-BatchFullyHomomorphicEncryptionoverIntegers..> 02-Jan-2015 10:08    172K
778-AnonymousIBEfromQuadraticResiduositywithImp..> 02-Jan-2015 10:08    387K
779-ImplementingCryptographicProgramObfuscation..> 02-Jan-2015 10:08    663K
780-DeterministicPublicKeyEncryptionunderContin..> 02-Jan-2015 10:08    536K
781-Tallybasedsimpledecodersfortraitortracingan..> 02-Jan-2015 10:08    724K
782-PreciseFaultInjectionsusingVoltageandTemper..> 02-Jan-2015 10:08    231K
783-ParametricTrojansforFaultInjectionAttackson..> 02-Jan-2015 10:07    910K
784-WeakInstancesofPLWE.pdf                        02-Jan-2015 10:07    301K
785-DivisibleECashMadePractical.pdf                02-Jan-2015 10:07    495K
786-OntheIndifferentiabilityofKeyAlternatingFei..> 22-Dec-2014 12:24    353K
787-AnotherTorispossible.pdf                       02-Jan-2015 10:07    197K
788-TuningGaussSieveforSpeed.pdf                   02-Jan-2015 10:07    486K
789-StatisticalPropertiesoftheSquareMapModuloaP..> 02-Jan-2015 10:07    693K
790-FaultAttackrevealingSecretKeysofExponentiat..> 02-Jan-2015 10:07    222K
791-QuantumBitCommitmentwithApplicationinQuantu..> 02-Jan-2015 10:07    241K
792-ClassificationoftheCAESARCandidates.pdf        02-Jan-2015 10:07    317K
792-GeneralClassificationoftheAuthenticatedEncr..> 20-Jan-2023 08:26    666K
793-RobustAuthenticatedEncryptionAEZandtheProbl..> 02-Jan-2015 10:07    393K
794-EfficientIdentityBasedEncryptionoverNTRULat..> 02-Jan-2015 10:07    540K
795-SPHINCSpracticalstatelesshashbasedsignature..> 02-Jan-2015 10:07    669K
796-DistributedCryptographyBasedontheProofsofWo..> 02-Jan-2015 10:07    504K
797-TightlySecureAuthenticatedKeyExchange.pdf      02-Jan-2015 10:07    511K
798-MultiIdentityandMultiKeyLeveledFHEfromLearn..> 02-Jan-2015 10:07    564K
799-VerifiableRandomFunctionsfromWeakerAssumpti..> 02-Jan-2015 10:07    348K
800-EfficientPairingsandECCforEmbeddedSystems.pdf  02-Jan-2015 10:07    693K
801-ReversedGeneticAlgorithmsforGenerationofBij..> 02-Jan-2015 10:07    371K
802-PhysicalCharacterizationofArbiterPUFs.pdf      02-Jan-2015 10:07      6M
803-ADecentralizedPublicKeyInfrastructurewithId..> 02-Jan-2015 10:07    251K
804-ShortSignaturesWithShortPublicKeysFromHomom..> 02-Jan-2015 10:06    327K
804-ShortSignaturesfromHomomorphicTrapdoorFunct..> 22-Dec-2014 12:23    323K
805-DualSystemSimulationSoundnesswithApplicatio..> 02-Jan-2015 10:06    372K
806-Summationpolynomialalgorithmsforellipticcur..> 02-Jan-2015 10:06    349K
807-Leakageresilientnonmalleablecodes.pdf          02-Jan-2015 10:06    522K
808-OnlineOfflineRingSignatureSchemewithProvabl..> 02-Jan-2015 10:06    135K
809-ServerAidedTwoPartyComputationwithMinimalCo..> 20-Jan-2023 08:26    345K
809-ServerAidedTwoPartyComputationwithSimultane..> 02-Jan-2015 10:06    387K
810-SimulationBasedSecureFunctionalEncryptionin..> 02-Jan-2015 10:06    515K
811-APolynomialTimeKeyRecoveryAttackonMQQCrypto..> 02-Jan-2015 10:06    487K
812-SearchandcomputeonEncryptedData.pdf            02-Jan-2015 10:06    430K
813-BoostingLinearlyHomomorphicEncryptiontoEval..> 02-Jan-2015 10:06    463K
814-NavigatingintheCayleygraphofSL_2F_pandappli..> 02-Jan-2015 10:06     74K
815-ANewMethodforDecompositionintheJacobianofSm..> 02-Jan-2015 10:06    281K
816-FHEBootstrappinginlessthanasecond.pdf          02-Jan-2015 10:06    371K
816-FHEWBootstrappingHomomorphicEncryptioninles..> 20-Jan-2023 08:26    450K
817-OptimizedKaratsubaSquaringon8bitAVRProcesso..> 02-Jan-2015 10:06      2M
818-CirculantMatricesandDifferentialPrivacy.pdf    02-Jan-2015 10:06    355K
819-RidingonAsymmetryEfficientABEforBranchingPr..> 02-Jan-2015 10:06    392K
820-OperationalSignatureSchemes.pdf                02-Jan-2015 10:06    568K
821-NonmalleableReductionsandApplications.pdf      02-Jan-2015 10:06    614K
822-Ballotsecrecywithmaliciousbulletinboards.pdf   02-Jan-2015 10:06    265K
823-OntheObliviousTransferCapacityofGeneralized..> 02-Jan-2015 10:06    329K
824-AccountableTracingSignatures.pdf               02-Jan-2015 10:06    595K
825-TowardsOptimalBoundsforImplicitFactorizatio..> 02-Jan-2015 10:06    337K
826-LearningwithErrorsintheExponent.pdf            02-Jan-2015 10:06    533K
827-InteractiveCodingforInteractiveProofs.pdf      02-Jan-2015 10:06    303K
828-RemarksonQuantumModularExponentiationandSom..> 20-Jan-2023 08:26      1M
828-RemarksonQuantumModularExponentiationandSom..> 02-Jan-2015 10:05      1M
829-AdditivelyHomomorphicUCcommitmentswithOptim..> 02-Jan-2015 10:05    504K
830-AdaptivelySecureMultiPartyComputationfromLW..> 20-Jan-2023 08:26    555K
830-AdaptivelySecureUCConstantRoundMultiPartyCo..> 02-Jan-2015 10:05    506K
831-TweaksandKeysforBlockCipherstheTWEAKEYFrame..> 02-Jan-2015 10:05    496K
832-RequirementsforStandardEllipticCurves.pdf      02-Jan-2015 10:05    106K
833-EfficientDistributedTagBasedEncryptionandit..> 02-Jan-2015 10:05    335K
834-SemanticallySecureOrderRevealingEncryptionM..> 02-Jan-2015 10:05    730K
835-ImplementationandEvaluationofaLeakageResili..> 02-Jan-2015 10:05    426K
835-ImplementationofaLeakageResilientElGamalKey..> 20-Jan-2023 08:26    218K
836-ATightTransformationbetweenHILLandMetricCon..> 20-Jan-2023 08:26    378K
836-AnImprovedTransformationbetweenHILLandMetri..> 02-Jan-2015 10:05    365K
837-TrueRandomNumberGeneratorsSecureinaChanging..> 02-Jan-2015 10:05    320K
838-SHIELDScalableHomomorphicImplementationofEn..> 02-Jan-2015 10:05    694K
839-ASimpleandImprovedAlgorithmforIntegerFactor..> 02-Jan-2015 10:05    159K
840-ConstrainedPRFsforUnboundedInputs.pdf          02-Jan-2015 10:05    474K
841-ExplicitNonmalleableCodesResistanttoPermuta..> 02-Jan-2015 10:05    764K
842-ARateOptimizingCompilerforNonmalleableCodes..> 20-Jan-2023 08:26    558K
842-ExplicitOptimalRateNonmalleableCodesAgainst..> 02-Jan-2015 10:05    552K
843-FindingSmallSolutionsofaClassofSimultaneous..> 02-Jan-2015 10:05    361K
843-SolvingaClassofModularPolynomialEquationsan..> 20-Jan-2023 08:26    499K
844-TwoRoundAdaptivelySecureMPCfromIndistinguis..> 02-Jan-2015 10:05    445K
845-AdaptivelySecureTwopartyComputationFromIndi..> 02-Jan-2015 10:05    263K
845-Adaptivelysecuretwopartycomputationfromindi..> 20-Jan-2023 08:26    392K
846-Verifiablecomputationusingmultipleprovers.pdf  02-Jan-2015 10:05    509K
847-ReflectionsonSlidewithaTwistAttacks.pdf        02-Jan-2015 10:05    242K
848-PrivateKeyRecoveryCombinationAttacksOnExtre..> 02-Jan-2015 10:05      1M
849-AProxyReEncryptionSchemewiththeUnforgeabili..> 02-Jan-2015 10:05    195K
850-BRUTUSIdentifyingCryptanalyticWeaknessesinC..> 02-Jan-2015 10:05    126K
850-TheBRUTUSautomaticcryptanalyticframeworkTes..> 20-Jan-2023 08:26    739K
851-NearOptimalRateHomomorphicEncryptionforBran..> 02-Jan-2015 10:04    687K
852-FasterECCovermathbbF_25211.pdf                 02-Jan-2015 10:04    126K
853-DynamicSearchableEncryptioninVeryLargeDatab..> 02-Jan-2015 10:04    460K
854-PowerAnalysisAttackonHardwareImplementation..> 02-Jan-2015 10:04    446K
855-RelatingUndisturbedBitstoOtherPropertiesofS..> 02-Jan-2015 10:04    358K
856-LeakageResilientCircuitsRevisitedOptimalNum..> 02-Jan-2015 10:04    448K
857-PseudonymousBroadcastandSecureComputationfr..> 20-Jan-2023 08:26    343K
857-PseudonymousSecureComputationfromTimeLockPu..> 02-Jan-2015 10:04    381K
858-AdaptivelySecureUniversallyComposableMultiP..> 02-Jan-2015 10:04    181K
859-Provablysecurepairingfreeidentitybasedparti..> 20-Jan-2023 14:19     207
860-DifferentialFactorsImprovedAttacksonSERPENT..> 02-Jan-2015 10:04    324K
861-CatsandDogsAnIntegrityforVotingSystemsBased..> 02-Jan-2015 10:04    300K
862-LowLatencyECDSASignatureVerificationARoadTo..> 02-Jan-2015 10:04      1M
863-AUnifiedApproachtoIdealizedModelSeparations..> 02-Jan-2015 10:04    577K
864-HowtoChooseInterestingPointsforTemplateAtta..> 02-Jan-2015 10:04    145K
865-ImpossibilityResultsforLeakageResilientZero..> 02-Jan-2015 10:04    458K
865-ImpossibilityofBlackBoxSimulationAgainstLea..> 20-Jan-2023 08:26    470K
866-SelfDestructNonMalleability.pdf                02-Jan-2015 10:04    542K
867-RandomOracleUninstantiabilityfromIndistingu..> 02-Jan-2015 10:04    678K
868-FunctionalEncryptionforRandomizedFunctional..> 02-Jan-2015 10:04    636K
869-ExclusiveExponentBlindingMayNotSufficetoPre..> 20-Jan-2023 08:26    373K
869-ExponentBlindingMayNotPreventTimingAttackso..> 02-Jan-2015 10:04    395K
870-DynamicBehaviorofRSlatchesusingFIBprocessin..> 02-Jan-2015 10:04    416K
871-AnalgorithmforMD5singleblockcollisionattack..> 02-Jan-2015 10:04     84K
872-RecentResultsinScalableMultiPartyComputatio..> 02-Jan-2015 10:04    608K
873-BootstrappingforHElib.pdf                      02-Jan-2015 10:04    473K
874-AcceleratingBlissthegeometryofternarypolyno..> 02-Jan-2015 10:04    357K
875-SidechannelPowerAnalysisofDifferentProtecti..> 02-Jan-2015 10:04    471K
876-ResistingRandomnessSubversionFastDeterminis..> 20-Jan-2023 08:26    733K
876-UCELTDFsEfficientSubversionResistantPKEinth..> 02-Jan-2015 10:03    729K
877-CM55specialprimefieldellipticcurvesalmostop..> 20-Jan-2023 08:26    539K
877-CM55specialprimefieldellipticcurvesalmostop..> 02-Jan-2015 10:03    522K
878-Protectingobfuscationagainstarithmeticattac..> 02-Jan-2015 10:03    284K
879-WatchyourConstantsMaliciousStreebog.pdf        02-Jan-2015 10:03    896K
880-SievingforShortestVectorsinIdealLatticesaPr..> 02-Jan-2015 10:03    473K
881-OverviewoftheCandidatesforthePasswordHashin..> 20-Jan-2023 08:26    259K
881-OverviewoftheCandidatesforthePasswordHashin..> 02-Jan-2015 10:03    227K
882-ObfuscationofProbabilisticCircuitsandApplic..> 02-Jan-2015 10:03    623K
883-FaultyClockDetectionforCryptoCircuitsAgains..> 02-Jan-2015 10:03    367K
884-FaultyClockDetectionforCryptoCircuitsAgains..> 20-Jan-2023 14:19     207
885-EfficientStochasticMethodsProfiledAttacksBe..> 02-Jan-2015 10:03    760K
886-AccountableStorage.pdf                         02-Jan-2015 10:03    784K
887-HardwareImplementationofSecureShamir39sSecr..> 20-Jan-2023 08:26    356K
887-HardwareImplementationofSecureShamirsSecret..> 02-Jan-2015 10:03    356K
888-DistanceLowerBounding.pdf                      02-Jan-2015 10:03    547K
889-EfficientZeroKnowledgeProofsforCommitmentsf..> 02-Jan-2015 10:03    483K
890-FastEvaluationofPolynomialsoverBinaryFinite..> 02-Jan-2015 10:03    439K
891-ConversionfromArithmetictoBooleanMaskingwit..> 02-Jan-2015 10:03    330K
892-BreakingExistentialUnforgeabilityofaSignatu..> 02-Jan-2015 10:03    235K
893-AdvancedAlgebraicAttackonTrivium.pdf           02-Jan-2015 10:03    268K
894-THEUBERCRYPTFRAMEWORKANEWAPPROACHINCRYPTOSY..> 02-Jan-2015 10:03    357K
895-AnalysisofARXFunctionsPseudolinearMethodsfo..> 02-Jan-2015 10:03    544K
896-EfficientlyMakingSecureTwoPartyComputationF..> 02-Jan-2015 10:03    407K
897-LeveledFullyHomomorphicSignaturesfromStanda..> 02-Jan-2015 10:03    521K
898-AkeyrecoveryattacktothescaleinvariantNTRUba..> 02-Jan-2015 10:03    206K
899-SideChannelPowerAnalysisofanAES256Bootloade..> 02-Jan-2015 10:03      3M
900-SomeSecurityResultsoftheRC4StreamCipher.pdf    02-Jan-2015 10:02    244K
901-APracticalAttackAgainsttheHIVEHiddenVolumeE..> 02-Jan-2015 10:02    313K
901-APracticalAttackAgainsttheUseofRC4intheHIVE..> 20-Jan-2023 08:26    313K
902-ThePowerofNegationsinCryptography.pdf          02-Jan-2015 10:02    481K
903-FalconCodesFastAuthenticatedLTCodes.pdf        02-Jan-2015 10:02    875K
903-FalconCodesFastAuthenticatedLTCodesOrMaking..> 20-Jan-2023 08:26    875K
904-HowSecureisTextSecure.pdf                      02-Jan-2015 10:02   1013K
905-PrimarySecondaryResolverMembershipProofSyst..> 02-Jan-2015 10:02    801K
906-CryptanalysisoftheMultilinearMapovertheInte..> 02-Jan-2015 10:02    308K
906-CryptanalysisontheMultilinearMapovertheInte..> 20-Jan-2023 08:26    439K
907-Findingshortestlatticevectorsfasterusingqua..> 02-Jan-2015 10:02    282K
908-PracticalUCsecuritywithaGlobalRandomOracle.pdf 02-Jan-2015 10:02    738K
909-RobustSecretSharingSchemesAgainstLocalAdver..> 02-Jan-2015 10:02    410K
910-AdaptiveMultipartyNoninteractiveKeyExchange..> 02-Jan-2015 10:02      1M
911-ADenialofServiceAttackagainstFairComputatio..> 02-Jan-2015 10:02    207K
912-LowCostConcurrentErrorDetectionforGCMandCCM..> 02-Jan-2015 10:02      1M
913-FullyLeakageResilientSignaturesRevisitedGra..> 20-Jan-2023 08:26    706K
913-MindYourCoinsFullyLeakageResilientSignature..> 02-Jan-2015 10:02    662K
914-CryptographywithOneWayCommunication.pdf        02-Jan-2015 10:02    526K
915-CryptanalysisoftheStructurePreservingSignat..> 20-Jan-2023 08:25    351K
915-TheSecurityoftheHanserSlamanigSignatureSche..> 02-Jan-2015 10:02    213K
916-AdaptivelySecureFullyHomomorphicSignaturesB..> 02-Jan-2015 10:02    373K
917-FromSelectivetoAdaptiveSecurityinFunctional..> 20-Jan-2023 08:25    443K
917-TheTrojanMethodinFunctionalEncryptionFromSe..> 02-Jan-2015 10:02    427K
918-WebTapPaymentAuthenticationandEncryptionWit..> 02-Jan-2015 10:02     63K
919-ExperimentingwithShuffleBlockCipherandSMTSo..> 02-Jan-2015 10:02    802K
920-SimplerandMoreEfficientRankEstimationforSid..> 02-Jan-2015 10:02    397K
921-BatchNFS.pdf                                   02-Jan-2015 10:01    540K
922-DifferentialAnalysisofBlockCiphersSIMONandS..> 02-Jan-2015 10:01      3M
923-NewCryptosystemUsingTheCRTAndTheJordanNorma..> 02-Jan-2015 10:01     76K
924-ImprovingthePolynomialtimePrecomputationofF..> 02-Jan-2015 10:01    420K
925-IndistinguishabilityObfuscationforTuringMac..> 02-Jan-2015 10:01    814K
926-RoadtoVehicleCommunicationswithTimeDependen..> 02-Jan-2015 10:01    320K
927-Physicalfunctionsthecommonfactorofsidechann..> 02-Jan-2015 10:01    838K
928-ImplementingCandidateGradedEncodingSchemesf..> 20-Jan-2023 08:25    532K
928-ImprovedParametersandanImplementationofGrad..> 02-Jan-2015 10:01    492K
929-ZeroizingwithoutzeroesCryptanalyzingmultili..> 02-Jan-2015 10:01    337K
930-ImmunizingMultilinearMapsAgainstZeroizingAt..> 02-Jan-2015 10:01    563K
931-CryptanalysisofJAMBU.pdf                       02-Jan-2015 10:01    747K
932-BicliqueswithMinimalDataandTimeComplexityfo..> 02-Jan-2015 10:01      1M
933-CertificatelessProxyReEncryptionWithoutPair..> 22-Dec-2014 12:17    432K
933-CertificatelessProxyReEncryptionWithoutPair..> 02-Jan-2015 10:01    469K
934-EfficientGenericZeroKnowledgeProofsfromComm..> 02-Jan-2015 10:01    388K
935-BoostingHigherOrderCorrelationAttacksbyDime..> 02-Jan-2015 10:01    974K
936-OutsourcingSecureTwoPartyComputationasaBlac..> 02-Jan-2015 10:01    534K
937-AnalysisofLewkoSahaiWatersRevocationSystem.pdf 02-Jan-2015 10:01    297K
938-TrapdoorComputationalFuzzyExtractors.pdf       02-Jan-2015 10:01    984K
938-TrapdoorComputationalFuzzyExtractorsandStat..> 20-Jan-2023 08:25      1M
939-SecurityAnalysisofanAuthenticationSchemeUsi..> 02-Jan-2015 10:01    375K
940-FullySecureSelfUpdatableEncryptioninPrimeOr..> 02-Jan-2015 10:01    468K
941-GarbledRAMFromOneWayFunctions.pdf              02-Jan-2015 10:01    480K
942-PublicCoinDifferingInputsObfuscationandItsA..> 02-Jan-2015 10:00    438K
943-AdvancingtheStateoftheArtinHardwareTrojansD..> 20-Jan-2023 08:25      3M
943-HaTChHardwareTrojanCatcher.pdf                 02-Jan-2015 10:00      3M
944-EUFCMASecureStructurePreservingSignatureson..> 02-Jan-2015 10:00    275K
944-StructurePreservingSignaturesonEquivalenceC..> 20-Jan-2023 08:25    543K
945-BoomerangAttackonStepReducedSHA512.pdf         02-Jan-2015 10:00    287K
946-Onanewfastpublickeycryptosystem.pdf            02-Jan-2015 10:00    175K
947-TheSIMONandSPECKBlockCiphersonAVR8bitMicroc..> 02-Jan-2015 10:00    313K
948-LatticePointEnumerationonBlockReducedBases.pdf 02-Jan-2015 10:00    462K
949-Simplificationcomplicationofthebasisofprime..> 02-Jan-2015 10:00    111K
950-TreeStructuredCompositionofHomomorphicEncry..> 02-Jan-2015 10:00    261K
951-ModifiedAlternatingStepGeneratorswithNonLin..> 02-Jan-2015 10:00    692K
952-BalancedEncodingtoMitigatePowerAnalysisACas..> 02-Jan-2015 10:00    592K
953-TheRelatedKeySecurityofIteratedEvenMansourC..> 02-Jan-2015 10:00    539K
954-AlgebraicFaultAnalysisofKatan.pdf              02-Jan-2015 10:00    340K
955-OntheAsymptoticIdealnessoftheAsmuthBloomThr..> 02-Jan-2015 10:00    256K
956-TamperDetectionandContinuousNonMalleableCod..> 02-Jan-2015 10:00    535K
957-BlackBoxSeparationsforDifferentiallyPrivate..> 02-Jan-2015 10:00    604K
958-AuthenticatedEncryptionHowReorderingcanImpa..> 02-Jan-2015 10:00      1M
959-AttackingSuggestBoxesinWebApplicationsOverH..> 02-Jan-2015 10:00    502K
960-NonInteractiveSecureMultipartyComputation.pdf  02-Jan-2015 10:00    481K
961-WhenareFuzzyExtractorsPossible.pdf             02-Jan-2015 10:00    338K
961-WhereareFuzzyExtractorsPossible.pdf            22-Dec-2014 12:16    421K
962-SolvingPolynomialSystemswithNoiseoverF_2Rev..> 02-Jan-2015 10:00    512K
963-MaliciousClientSecurityinBlindSeerAScalable..> 02-Jan-2015 10:00    831K
964-Ontwowindowsmultivariatecryptosystemdependi..> 02-Jan-2015 09:59    303K
965-PredicateEncryptionforMultiDimensionalRange..> 02-Jan-2015 09:59    269K
966-PrivacyPreservingDataPublishSubscribeServic..> 02-Jan-2015 09:59    311K
967-AComprehensiveComparisonofShannonEntropyand..> 02-Jan-2015 09:59    333K
968-AttacksonSecureOwnershipTransferforMultiTag..> 02-Jan-2015 09:59    171K
969-PrivacyPreservingFaceRecognitionwithOutsour..> 02-Jan-2015 09:59    308K
970-JackpotStealingInformationFromLargeCachesvi..> 02-Jan-2015 09:59    794K
971-KeyrecoveryattacksonGrainfamilyusingBSWsamp..> 02-Jan-2015 09:59    151K
972-AChineseRemainderTheoremApproachtoBitParall..> 02-Jan-2015 09:59    138K
973-ImprovedLinearhullCryptanalysisofRoundreduc..> 02-Jan-2015 09:59    496K
974-NonLinearityandAffineEquivalenceofPermutati..> 02-Jan-2015 09:59    292K
975-CryptanalysisofTwoCandidateFixesofMultiline..> 02-Jan-2015 09:59    295K
976-GeppettoVersatileVerifiableComputation.pdf     02-Jan-2015 09:59    622K
977-ASurveyonLightweightEntityAuthenticationwit..> 20-Jan-2023 08:25    563K
977-SecureLightweightEntityAuthenticationwithSt..> 02-Jan-2015 09:59    351K
978-ImprovedDifferentialAnalysisofBlockCipherPR..> 02-Jan-2015 09:59    376K
979-TheChainingLemmaanditsapplication.pdf          02-Jan-2015 09:59    496K
980-AFastPhaseBasedEnumerationAlgorithmforSVPCh..> 02-Jan-2015 09:59    484K
981-PubliclyVerifiableNonInteractiveArgumentsfo..> 02-Jan-2015 09:59    773K
982-OutlierPrivacy.pdf                             02-Jan-2015 09:59    377K
983-PublicVerificationofPrivateEffort.pdf          02-Jan-2015 09:59    434K
984-UnderminingIsolationthroughCovertChannelsin..> 02-Jan-2015 09:59    441K
985-StatisticalweaknessinSpritzagainstVMPCRinse..> 02-Jan-2015 09:59    272K
986-RelatedKeyDifferentialAttackonRoundReducedR..> 02-Jan-2015 09:59    320K
987-CryptanalysisofFullPRIDEBlockCipher.pdf        02-Jan-2015 09:59    198K
988-Armadilloacompilationchainforprivacypreserv..> 02-Jan-2015 09:59    314K
989-ControlledHomomorphicEncryptionDefinitionan..> 02-Jan-2015 09:59    346K
990-CombiningSecretSharingandGarbledCircuitsfor..> 02-Jan-2015 09:58    596K
991-ConstantRoundConcurrentZeroknowledgefromInd..> 02-Jan-2015 09:58    503K
992-IncentivizedOutsourcedComputationResistantt..> 02-Jan-2015 09:58    618K
993-HowDifferentElectricalCircuitsofECCDesignsI..> 02-Jan-2015 09:58    480K
994-KeyPolicyMultiauthorityAttributeBasedEncryp..> 20-Jan-2023 08:25    139K
994-TwonovelapplicationsofbilineargroupstoABEen..> 02-Jan-2015 09:58    217K
995-PartialGarblingSchemesandTheirApplications.pdf 02-Jan-2015 09:58    118K
996-SomeexperimentsinvestigatingapossibleL14alg..> 02-Jan-2015 09:58    351K
997-ConstantsCountPracticalImprovementstoOblivi..> 20-Jan-2023 08:25      1M
997-RingORAMClosingtheGapBetweenSmallandLargeCl..> 02-Jan-2015 09:58      2M
998-HierarchicaldeterministicBitcoinwalletsthat..> 02-Jan-2015 09:58    215K
999-FirstExperimentalResultofPowerAnalysisAttac..> 02-Jan-2015 09:58      1M