Index of /2015/


../
001-AnoteonthesecurityofHigherOrderThresholdImp..> 06-Jan-2015 13:36    166K
002-CharacterizationofMDSmappings.pdf              06-Jan-2015 13:05     56K
003-ContinuousNonMalleableKeyDerivationandItsAp..> 06-Jan-2015 13:05    513K
004-ObliviousPolynomialEvaluationandSecureSetIn..> 06-Jan-2015 13:05    271K
005-OnionORAMAConstantBandwidthBlowupObliviousR..> 08-Jun-2015 22:00    495K
005-OnionORAMAConstantBandwidthORAMusingAdditiv..> 24-Feb-2015 23:00    487K
005-OnionORAMAConstantBandwidthandConstantClien..> 06-Jan-2015 13:05    519K
006-TwoServerPasswordAuthenticatedSecretSharing..> 06-Jan-2015 13:05    597K
007-BalloonAForwardSecureAppendOnlyPersistentAu..> 06-Jan-2015 13:05    364K
008-PostQuantumForwardSecureOnionRoutingFutureA..> 28-Jan-2015 23:00    461K
008-PostQuantumSecureOnionRoutingFutureAnonymit..> 06-Jan-2015 13:05    457K
009-RigAsimplesecureandflexibledesignforPasswor..> 07-Jan-2015 23:00    542K
010-SimulationbasedSelectiveOpeningCCASecurityf..> 07-Jan-2015 23:00    616K
011-BlockCipherSpeedandEnergyEfficiencyRecordso..> 08-Jan-2015 23:00      7M
012-CryptanalysisofaSomewhatAdditivelyHomomorph..> 12-Jan-2015 23:00    430K
013-LowNoiseLPNKDMSecurePublicKeyEncryptionandS..> 12-Jan-2015 23:00    404K
014-GroupSignaturesfromLatticesSimplerTighterSh..> 12-Jan-2015 23:00    610K
015-OneRoundKeyExchangewithStrongSecurityAnEffi..> 12-Jan-2015 23:00    469K
016-EfficientStaticallySecureLargeUniverseMulti..> 12-Jan-2015 23:00    451K
017-SimpleFunctionalEncryptionSchemesforInnerPr..> 12-Jan-2015 23:00    353K
018-ALINEARATTACKONAKEYEXCHANGEPROTOCOLUSINGEXT..> 14-Jan-2015 23:00    108K
018-AlinearattackonKahrobaeiLamShpilrainkeyexch..> 12-Jan-2015 23:00    106K
019-StronglyOptimalStructurePreservingSignature..> 12-Jan-2015 23:00    370K
020-SimplerEfficientGroupSignaturesfromLattices..> 12-Jan-2015 23:00    630K
021-NonMalleableCondensersforArbitraryMinEntrop..> 12-Jan-2015 23:00    563K
022-TMSUIATrustManagementSchemeofUSBStorageDevi..> 12-Jan-2015 23:00    771K
023-MultilinearMapsUsingIdealLatticeswithoutEnc..> 12-Jan-2015 23:00    224K
024-NonAbelianAnalogsofLatticeRounding.pdf         12-Jan-2015 23:00    417K
025-ObfuscatingCircuitsviaCompositeOrderGradedE..> 14-Jan-2015 23:00    542K
026-AMoreExplicitFormulaforLinearProbabilitieso..> 14-Jan-2015 23:00    510K
027-OntheRegularityofLossyRSAImprovedBoundsandA..> 14-Jan-2015 23:00    170K
028-OptimalsoftwareimplementedItohTsujiiinversi..> 14-Jan-2015 23:00    877K
029-PredicateEncryptionforCircuitsfromLWE.pdf      14-Jan-2015 23:00    514K
030-CryptanalysisofAscon.pdf                       14-Jan-2015 23:00    341K
031-TightParallelRepetitionTheoremsforPublicCoi..> 14-Jan-2015 23:00    181K
032-ConstrainedKeyHomomorphicPRFsfromStandardLa..> 14-Jan-2015 23:00    492K
033-OntheSecurityofFreshRekeyingtoCounteractSid..> 15-Jan-2015 23:00    255K
034-SuitupMadetoMeasureHardwareImplementationso..> 15-Jan-2015 23:00    379K
035-CryptographicallySecureCRCforLightweightMes..> 15-Jan-2015 23:00    127K
036-Fastersoftwareforfastendomorphisms.pdf         15-Jan-2015 23:00    415K
037-AnalysisandEnhancementofDesynchronizationAt..> 15-Jan-2015 23:00    126K
038-AggregatablePseudorandomFunctionsandConnect..> 15-Jan-2015 23:00    562K
038-AggregatePseudorandomFunctionsandConnection..> 16-Jan-2015 23:00    562K
039-TypeBasedVerificationofElectronicVotingProt..> 17-Jan-2015 23:00    343K
040-AutomatedDynamicCubeAttackonBlockCiphersCry..> 17-Jan-2015 23:00    401K
041-ParallelprobablelockfreeHashSieveapractical..> 17-Jan-2015 23:00    547K
042-HighPerformanceLatticebasedCCAsecureEncrypt..> 17-Jan-2015 23:00    600K
043-GroupSignaturewithDeniabilityHowtoDisavowaS..> 20-Jan-2015 23:00    180K
044-UseofSIMDBasedDataParallelismtoSpeedupSievi..> 20-Jan-2015 23:00    219K
045-ReliableInformationExtractionforSingleTrace..> 20-Jan-2015 23:00      1M
046-OntheconcretehardnessofLearningwithErrors.pdf  20-Jan-2015 23:00    526K
047-LinearlyHomomorphicEncryptionSchemefromDDH.pdf 22-Jan-2015 23:00    451K
047-LinearlyHomomorphicEncryptionfromDDH.pdf       26-Jan-2015 23:00    451K
048-OnObfuscationwithRandomOracles.pdf             22-Jan-2015 23:00    238K
049-OnSolvingLpnusingBKWandVariants.pdf            22-Jan-2015 23:00    300K
050-StretchingGrothSahaiNIZKProofsofPartialSati..> 22-Jan-2015 23:00    443K
051-ImprovedMeetintheMiddleDistinguisheronFeist..> 22-Jan-2015 23:00      1M
052-InteractiveMessageLockedEncryptionandSecure..> 22-Jan-2015 23:00    504K
053-TightBoundsforKeyedSpongesandTruncatedCBC.pdf  22-Jan-2015 23:00    562K
054-NoncommittingencryptionfromPhihiding.pdf       23-Jan-2015 23:00    432K
055-RicherEfficiencySecurityTradeoffsin2PC.pdf     23-Jan-2015 23:00    518K
056-BetterAlgorithmsforLWEandLWR.pdf               23-Jan-2015 23:00    377K
057-ColdBootAttacksintheDiscreteLogarithmSettin..> 26-Jan-2015 23:00    450K
058-UniversallyVerifiableMultipartyComputationf..> 26-Jan-2015 23:00    608K
059-SecurityofSymmetricEncryptioninthePresenceo..> 26-Jan-2015 23:00    417K
060-VerifiedProofsofHigherOrderMasking.pdf         27-Jan-2015 23:00    544K
061-MoreEfficientObliviousTransferExtensionswit..> 27-Jan-2015 23:00    934K
062-EvaluationandCryptanalysisofthePandakaLight..> 27-Jan-2015 23:00    173K
063-CamlCrushAPKCS11FilteringProxy.pdf             29-Jan-2015 23:00    197K
064-OptimallyEfficientMultiPartyFairExchangeand..> 29-Jan-2015 23:00    637K
065-AlightweightfriendlymodifcationofGOSTblockc..> 29-Jan-2015 23:00    273K
066-ArithmeticAdditionoverBooleanMaskingTowards..> 29-Jan-2015 23:00      1M
067-AnAlternativeApproachtoNonblackboxSimulatio..> 29-Jan-2015 23:00    200K
067-NonblackboxSimulationintheFullyConcurrentSe..> 20-Jan-2023 08:25    270K
068-AGenericApproachtoInvariantSubspaceAttacksC..> 29-Jan-2015 23:00    446K
069-OntheProvableSecurityoftheIteratedEvenManso..> 29-Jan-2015 23:00    711K
070-TheSumCanBeWeakerThanEachPart.pdf              10-Feb-2015 23:00    419K
071-FactoringNprqsforLargerands.pdf                10-Feb-2015 23:00    395K
072-NonInteractiveZeroKnowledgeProofsofNonMembe..> 10-Feb-2015 23:00    472K
073-ObliviousNetworkRAM.pdf                        10-Feb-2015 23:00    412K
073-ObliviousNetworkRAMandLeveragingParallelism..> 20-Jan-2023 08:25    540K
074-MindtheGapModularMachinecheckedProofsofOneR..> 10-Feb-2015 23:00    680K
075-EquivalentKeyRecoveryAttacksagainstHMACandN..> 10-Feb-2015 23:00    375K
076-FullyStructurePreservingSignaturesandShrink..> 10-Feb-2015 23:00    516K
077-OntheExistenceandConstructionsofVectorialBo..> 10-Feb-2015 23:00    352K
077-OnthePrimaryConstructionsofVectorialBoolean..> 23-Aug-2015 22:00    523K
078-FullyHomomorphicEncryptionfromRingLWE65306I..> 10-Feb-2015 23:00    258K
078-FullyHomomorphicEncryptionfromRingLWEIdenti..> 20-Jan-2023 08:25    258K
079-OntheSecurityoftheCOPAandMarbleAuthenticate..> 10-Feb-2015 23:00    265K
080-TheFairyRingDancePasswordAuthenticatedKeyEx..> 10-Feb-2015 23:00    381K
081-AmortizingGarbledCircuits.pdf                  10-Feb-2015 23:00    649K
082-OntheDifficultyofSecuringWebApplicationsusi..> 11-Feb-2015 23:00    246K
083-KeyRecoveryAttackagainstanNTRUtypeSomewhatH..> 14-Feb-2015 23:00    249K
083-KeyRecoveryAttacksagainstNTRUbasedSomewhatH..> 08-May-2015 22:00    386K
084-OntheDisadvantagesofPairingbasedCryptograph..> 14-Feb-2015 23:00    254K
085-OnthebehaviorsofaffineequivalentSboxesregar..> 14-Feb-2015 23:00    620K
086-PracticalCompactECashwithArbitraryWalletSiz..> 14-Feb-2015 23:00    390K
087-RevisitingCryptographicAccumulatorsAddition..> 14-Feb-2015 23:00    501K
088-StructuralWeaknessesintheOpenSmartGridProto..> 14-Feb-2015 23:00    304K
089-OnthesecuritymarginofMACstriping.pdf           16-Feb-2015 23:00    276K
090-StructuralEvaluationbyGeneralizedIntegralPr..> 16-Feb-2015 23:00    561K
091-RelatedKeyForgeriesforPrstOTR.pdf              16-Feb-2015 23:00    312K
092-TOWARDSTHEGENERATIONOFADYNAMICKEYDEPENDENTS..> 23-Feb-2015 23:00    308K
093-GeneralizationofStatisticalCriteriaforSboxe..> 23-Feb-2015 23:00     80K
094-SomeNewResultsonBinaryPolynomialMultiplicat..> 23-Feb-2015 23:00    334K
095-RotationalCryptanalysisofARXRevisited.pdf      23-Feb-2015 23:00    365K
096-AMeetintheMiddleAttackonReducedRoundKuznyec..> 18-Apr-2015 22:00    369K
096-MeetintheMiddleAttacksonReducedRoundKuznyec..> 23-Feb-2015 23:00    514K
097-SurreptitiouslyWeakeningCryptographicSystem..> 23-Feb-2015 23:00    399K
098-AdaptiveIDSecureRevocableIdentityBasedEncry..> 23-Feb-2015 23:00    674K
099-UniversallyComposableFirewallArchitecturesu..> 23-Feb-2015 23:00    342K
100-InfluenceofElectricalCircuitsofECCDesignson..> 23-Feb-2015 23:00    506K
1000-FactoringasaService.pdf                       15-Oct-2015 22:00    412K
1001-DismantlingrealworldECCwithHorizontalandVe..> 15-Oct-2015 22:00      2M
1002-gotHWcryptoOntheinsecurityofaSelfEncryptin..> 15-Oct-2015 22:00      2M
1003-Resultsonpolynomialinterpolationwithmixedm..> 16-Oct-2015 22:00    300K
1004-SecurityAnalysisofCryptosystemsUsingShortG..> 16-Oct-2015 22:00    504K
1005-CryptanalysisofYasudaTakagiandSakurai39sSi..> 20-Jan-2023 08:21    359K
1005-CryptanalysisofYasudaTakagiandSakuraisSign..> 16-Oct-2015 22:00    359K
1006-ConfidentialBenchmarkingbasedonMultipartyC..> 16-Oct-2015 22:00    446K
1007-HowtoVotePrivatelyUsingBitcoin.pdf            16-Oct-2015 22:00    306K
1008-ProvisionsPrivacypreservingproofsofsolvenc..> 19-Oct-2015 22:00    467K
1009-ApplicationsofKeyRecoveryCubeattacklike.pdf   19-Oct-2015 22:00    494K
101-MultiKeySecurityTheEvenMansourConstructionR..> 23-Feb-2015 23:00    186K
1010-TWORAMRoundOptimalObliviousRAMwithApplicat..> 19-Oct-2015 22:00    543K
1011-HierarchicalFunctionalEncryption.pdf          19-Oct-2015 22:00    507K
1012-AnEfficientMultiplePKGCompatibleIdentityBa..> 20-Jan-2023 08:21    411K
1012-AnEfficientMultiplePKGCompatibleIdentityBa..> 19-Oct-2015 22:00    420K
1013-InceptionMakesNonmalleableCodesStronger.pdf   19-Oct-2015 22:00    419K
1014-FastFourierOrthogonalization.pdf              19-Oct-2015 22:00    610K
1015-OnBitcoinasapublicrandomnesssource.pdf        19-Oct-2015 22:00    427K
1016-LiftingtheSecurityofNIMACBeyondBirthdayBou..> 21-Oct-2015 22:00    404K
1016-OneKeyCompressionFunctionBasedMACwithSecur..> 20-Jan-2023 08:21    521K
1017-FunctionalEncryptionDecentralisedandDelega..> 21-Oct-2015 22:00    454K
1018-ARiddleWrappedinanEnigma.pdf                  21-Oct-2015 22:00    203K
1019-SpeedSecurityTradeoffsinBlockchainProtocol..> 23-Oct-2015 22:00    454K
102-GCMSIVFullNonceMisuseResistantAuthenticated..> 23-Feb-2015 23:00    393K
1020-AttackingtheNetworkTimeProtocol.pdf           23-Oct-2015 22:00      1M
1021-NewProofTechniquesforDLINBasedAdaptivelySe..> 20-Jan-2023 08:21    401K
1021-NewProofTechniquesforDLINBasedAdaptivelySe..> 23-Oct-2015 22:00    363K
1022-Recentprogressontheellipticcurvediscretelo..> 23-Oct-2015 22:00    327K
1023-IndistinguishabilityObfuscationforTuringMa..> 20-Jan-2023 08:21    321K
1023-IndistinguishabilityObfuscationwithConstan..> 23-Oct-2015 22:00    553K
1024-ParallelImplementationofNumberTheoreticTra..> 23-Oct-2015 22:00     99K
1025-PAGESPAGESandPAGESThreeFamiliesofBlockCiph..> 26-Oct-2015 23:00    261K
1026-HardnessEstimationofLWEviaBandPruning.pdf     26-Oct-2015 23:00    235K
1027-ExtendedTowerNumberFieldSieveANewComplexit..> 26-Oct-2015 23:00    316K
1027-ExtendedTowerNumberFieldSieveANewComplexit..> 20-Jan-2023 08:21    466K
1028-RevivingtheIdeaofIncrementalCryptographyfo..> 26-Oct-2015 23:00      2M
1029-TheEnergyBudgetforWirelessSecurityExtended..> 26-Oct-2015 23:00    181K
103-MergeableFunctionalEncryption.pdf              23-Feb-2015 23:00    405K
1030-SECONDCOORDINATESEQUENCEOFMPLRSOVERNONTRIV..> 26-Oct-2015 23:00    275K
1031-SecureDatingwithFourorFewerCards.pdf          26-Oct-2015 23:00    156K
1032-EssentiallyOptimalRobustSecretSharingwithM..> 26-Oct-2015 23:00    604K
1033-TheUltimateTranspositionCipherUTC.pdf         27-Oct-2015 23:00    323K
1034-Realtimedetectionofcachebasedsidechannelat..> 27-Oct-2015 23:00      3M
1035-CARIBEAdaptingTraditionalIBEfortheModernKe..> 28-Oct-2015 23:00    377K
1035-CARIBECascadedIBEforMaximumFlexibilityandU..> 20-Jan-2023 08:21    442K
1036-PattersonWiedemanntypefunctionson21variabl..> 28-Oct-2015 23:00    236K
1037-CryptanalysisofGGH15MultilinearMaps.pdf       28-Oct-2015 23:00    214K
1038-RevisitingLEGOsOptimizationsAnalysisandthe..> 28-Oct-2015 23:00    763K
1039-MaturityandPerformanceofProgrammableSecure..> 28-Oct-2015 23:00    564K
104-WeakeningtheIsolationAssumptionofTamperproo..> 23-Feb-2015 23:00    328K
1040-FullyHomomorphicEncryptionwithCompositeNum..> 28-Oct-2015 23:00      1M
1041-TheNumberofBooleanFunctionswithMultiplicat..> 28-Oct-2015 23:00    314K
1042-ARMedSPHINCSComputinga41KBsignaturein16KBo..> 28-Oct-2015 23:00    513K
1043-TheIndexjinRC4isnotPseudorandomduetoNonexi..> 28-Oct-2015 23:00    168K
1044-Homomorphicevaluationrequiresdepth.pdf        28-Oct-2015 23:00    263K
1045-ExploitingTransformationsoftheGaloisConfig..> 29-Oct-2015 23:00    494K
1046-FromPrivateSimultaneousMessagestoZeroInfor..> 29-Oct-2015 23:00    368K
1047-ReconfigurableCryptographyAflexibleapproac..> 29-Oct-2015 23:00    536K
1048-VerifiableRandomFunctionsfromStandardAssum..> 29-Oct-2015 23:00    467K
1049-CounterinTweakAuthenticatedEncryptionModes..> 29-Oct-2015 23:00    661K
105-InnerProductMaskingRevisited.pdf               24-Feb-2015 23:00    535K
1050-ComparisonBetweenIrreducibleandSeparableGo..> 30-Oct-2015 23:00      1M
1051-CryptanalysisandImprovementofIdentitybased..> 30-Oct-2015 23:00    103K
1052-PLayPUFProgrammableLogicallyErasablePUFsfo..> 30-Oct-2015 23:00      1M
1053-ObliviousParallelRAMImprovedEfficiencyandG..> 30-Oct-2015 23:00    457K
1054-ComputationalSoundnessofUniformityProperti..> 30-Oct-2015 23:00    248K
1055-MakingtheBestofaLeakySituationZeroKnowledg..> 30-Oct-2015 23:00    512K
1056-InformationtheoreticLocalNonmalleableCodes..> 30-Oct-2015 23:00    533K
1057-TheComplexityofComputingtheOptimalComposit..> 30-Oct-2015 23:00    415K
1058-RationalSumchecks.pdf                         30-Oct-2015 23:00    361K
1059-AGeneralFrameworkforRedactableSignaturesan..> 30-Oct-2015 23:00    466K
106-ProvablyweakinstancesofRingLWE.pdf             24-Feb-2015 23:00    430K
1060-Completeadditionformulasforprimeorderellip..> 30-Oct-2015 23:00    371K
1061-OnBasingCryptographyonNPhardnessTheCaseofS..> 30-Oct-2015 23:00    145K
1061-OnBasingPrivateInformationRetrievalonNPHar..> 03-Nov-2015 23:00    119K
1062-LowerBoundsonAssumptionsbehindIndistinguis..> 30-Oct-2015 23:00    469K
1063-OptimalComputationalSplitstateNonmalleable..> 30-Oct-2015 23:00    722K
1064-DjQEncoreUnPetitIBE.pdf                       02-Nov-2015 23:00    111K
1065-BucketORAMSingleOnlineRoundtripConstantBan..> 02-Nov-2015 23:00    551K
1066-CryptanalysisofAPrivacyPreservingSmartMete..> 02-Nov-2015 23:00    270K
1067-PublicVerifiabilityintheCovertModelAlmostf..> 03-Nov-2015 23:00    745K
1068-BlackBoxParallelGarbledRAM.pdf                03-Nov-2015 23:00    444K
1069-FeistelNetworksIndifferentiabilityat8Round..> 03-Nov-2015 23:00      1M
1069-Indifferentiabilityof8RoundFeistelNetworks..> 17-Dec-2015 23:00    720K
107-DynamicSearchableSymmetricEncryptionwithMin..> 24-Feb-2015 23:00    454K
1070-BarrierstoBlackBoxConstructionsofTraitorTr..> 04-Nov-2015 23:00    430K
1071-FairnessinSecureTwoPartyComputationwithRat..> 05-Nov-2015 23:00    288K
1071-RevisitingSecureTwoPartyComputationwithRat..> 20-Jan-2023 08:21    368K
1072-QuantumOneTimeMemoriesfromStatelessHardwar..> 05-Nov-2015 23:00    309K
1073-PracticalWitnessEncryptionforAlgebraicLang..> 05-Nov-2015 23:00    492K
1073-PracticalWitnessEncryptionforAlgebraicLang..> 20-Jan-2023 08:21    474K
1074-SuccinctAdaptiveGarbledRAM.pdf                05-Nov-2015 23:00    506K
1075-Cybersecurityinanerawithquantumcomputerswi..> 05-Nov-2015 23:00     63K
1076-AnappendixforarecentpaperofKim.pdf            05-Nov-2015 23:00    223K
1077-FaultAnalysisontheStreamCiphersLILI128andA..> 05-Nov-2015 23:00    195K
1078-OntheExactCryptographicHardnessofFindingaN..> 06-Nov-2015 23:00    491K
1078-RevisitingtheCryptographicHardnessofFindin..> 20-Jan-2023 08:21    504K
1079-DeBruijnSequencesfromSymmetricShiftRegiste..> 06-Nov-2015 23:00    298K
108-TRACINGATTACKSONUPROVEWITHREVOCATIONMECHANI..> 24-Feb-2015 23:00    406K
1080-VARIATIONSTOTHECRYPTOGRAPHICSALGORITHMSAES..> 09-Nov-2015 23:00    254K
1080-VariationstothecryptographicsalgorithmsAES..> 20-Jan-2023 08:21    243K
1081-NEONPQCrytoFastandParallelRingLWEEncryptio..> 09-Nov-2015 23:00    288K
1082-DelegatingRAMComputationswithAdaptiveSound..> 09-Nov-2015 23:00    724K
1083-ImplementationAttacksonPostQuantumCryptogr..> 09-Nov-2015 23:00    260K
1084-PatchableIndistinguishabilityObfuscationiO..> 20-Jan-2023 08:21    739K
1084-PatchableObfuscation.pdf                      09-Nov-2015 23:00    715K
1085-MaliciousKeccak.pdf                           09-Nov-2015 23:00    239K
1086-ChickenortheEggComputationalDataAttacksorP..> 09-Nov-2015 23:00      3M
1087-EfficientSignatureSchemesfromRLWE.pdf         09-Nov-2015 23:00    610K
1088-NoteontheRKAsecurityofContinuouslyNonMalle..> 09-Nov-2015 23:00    254K
1089-LinearSecretSharingSchemesfromErrorCorrect..> 09-Nov-2015 23:00    370K
1090-DoDistributedDifferentiallyPrivateProtocol..> 10-Nov-2015 23:00    555K
1091-ConstructionfordeBruijnSequenceswithLargeO..> 10-Nov-2015 23:00    338K
1092-Postquantumkeyexchangeanewhope.pdf            10-Nov-2015 23:00    549K
1093-CemptysetCemptysetAFrameworkforBuildingCom..> 20-Jan-2023 08:21    998K
1093-HowtoUseSNARKsinUniversallyComposableProto..> 10-Nov-2015 23:00    445K
1094-AffinemalleableExtractorsSpectrumDoublinga..> 10-Nov-2015 23:00    464K
1095-NonMalleableMultiProverInteractiveProofsan..> 20-Jan-2023 08:21    731K
1095-WitnessSignaturesandNonMalleableMultiProve..> 10-Nov-2015 23:00    682K
1096-WatermarkingCryptographicCapabilities.pdf     10-Nov-2015 23:00    281K
1097-OntheCommunicationrequiredforUnconditional..> 11-Nov-2015 23:00    384K
1098-RingSIgnatureConfidentialTransactionsforMo..> 11-Nov-2015 23:00    345K
1098-RingSignatureConfidentialTransactionsforMo..> 17-Dec-2015 23:00    489K
1099-DeviceEnhancedPasswordProtocolswithOptimal..> 12-Nov-2015 23:00    383K
110-sHMQVAnEfficientKeyExchangeProtocolforPower..> 24-Feb-2015 23:00    343K
1100-AreaEfficientHardwareImplementationoftheOp..> 14-Nov-2015 23:00    655K
1101-VirtualSmartCardsHowtoSignwithaPasswordand..> 14-Nov-2015 23:00    640K
1102-APracticalCryptanalysisoftheAlgebraicErase..> 14-Nov-2015 23:00    247K
1103-Linearcodeswithfewweightsfromweaklyregular..> 14-Nov-2015 23:00    338K
1104-ComputingJacobi39sthetainquasilineartime.pdf  20-Jan-2023 08:21    572K
1104-ComputingJacobisthetainquasilineartime.pdf    14-Nov-2015 23:00    571K
1105-SeleneVotingwithTransparentVerifiabilityan..> 14-Nov-2015 23:00    324K
1106-POPEPartialOrderPreservingEncoding.pdf        18-Nov-2015 23:00    618K
1107-ConcurrentSecureComputationviaNonBlackBoxS..> 18-Nov-2015 23:00    510K
1108-RecommenderSystemsandtheirSecurityConcerns..> 18-Nov-2015 23:00    549K
1109-EfficientandLowcomplexityHardwareArchitect..> 18-Nov-2015 23:00    745K
111-TheMultivariateHiddenNumberProblem.pdf         24-Feb-2015 23:00    315K
1110-PrivacyAwareAuthenticationintheInternetofT..> 18-Nov-2015 23:00    664K
1111-ComparisonofTEROcellimplementationsandchar..> 18-Nov-2015 23:00    220K
1112-EfficientCulpablySoundNIZKShuffleArgumentw..> 18-Nov-2015 23:00    607K
1113-MultiInputFunctionalEncryptionwithUnbounde..> 18-Nov-2015 23:00      1M
1114-FasterarithmeticonellipticcurvesusingFp2Ap..> 18-Nov-2015 23:00    189K
1115-EfficientThresholdSecretSharingSchemesSecu..> 18-Nov-2015 23:00    458K
1116-CHfORAMAConstantCommunicationORAMwithoutHo..> 20-Jan-2023 08:21    464K
1116-ConstantCommunicationORAMwithoutEncryption..> 18-Nov-2015 23:00    411K
1117-EfficientimplementationofANDORandNOToperat..> 18-Nov-2015 23:00    421K
1118-BitslicedImplementationsofthePRINCELEDandR..> 18-Nov-2015 23:00    275K
1119-OnthePossibilityofNonInteractiveEVotingint..> 19-Nov-2015 23:00    418K
112-ReencryptionVeri64257abilityHowtoDetectMali..> 24-Feb-2015 23:00    227K
112-ReencryptionVeriabilityHowtoDetectMalicious..> 20-Jan-2023 08:25    227K
1120-EvenMorePracticalKeyExchangesfortheInterne..> 19-Nov-2015 23:00    398K
1121-OntheFirstFallDegreeofAlgebraicEquations.pdf  19-Nov-2015 23:00    427K
1121-OntheFirstFallDegreeofSummationPolynomials..> 27-Nov-2015 23:00    392K
1122-SchnorrSignaturesintheMultiUserSetting.pdf    19-Nov-2015 23:00    510K
1123-PracticalPredictableLatticeBasisReduction.pdf 19-Nov-2015 23:00    504K
1124-ALinearCodeanditsApplicationintoSecretShar..> 22-Nov-2015 23:00    316K
1124-SecretSharingSchemesBasedonResilientBoolea..> 20-Jan-2023 08:21    295K
1125-PracticalOrderRevealingEncryptionwithLimit..> 22-Nov-2015 23:00    171K
1126-APracticalObliviousMapDataStructurewithSec..> 22-Nov-2015 23:00    525K
1127-PseudoFreeFamiliesofFiniteComputationalEle..> 23-Nov-2015 23:00    186K
1128-Newdirectionsinnearestneighborsearchingwit..> 23-Nov-2015 23:00    703K
1129-LuckyMicrosecondsATimingAttackonAmazon39ss..> 20-Jan-2023 08:21    403K
1129-LuckyMicrosecondsATimingAttackonAmazonss2n..> 23-Nov-2015 23:00    399K
113-HowtoCompressHomomorphicCiphertexts.pdf        24-Feb-2015 23:00    547K
113-StreamciphersAPracticalSolutionforEfficient..> 29-Nov-2015 23:00    570K
1130-ANoteonPerfectCorrectnessbyDerandomization..> 26-Nov-2015 23:00    315K
1131-OntheUsabilityofTwoFactorAuthentication.pdf   26-Nov-2015 23:00    184K
1132-TighterSecurityforEfficientLatticeCryptogr..> 26-Nov-2015 23:00    462K
1132-TighterSecurityforEfficientLatticeCryptogr..> 20-Jan-2023 08:21    462K
1133-CommentonRealizationofascalableShoralgorit..> 26-Nov-2015 23:00    439K
1133-CommentonRealizationofascalableShoralgorit..> 20-Jan-2023 08:21    439K
1134-LambdacirclambdaAFunctionalLibraryforLatti..> 26-Nov-2015 23:00    542K
1134-LambdacirclambdaFunctionalLatticeCryptogra..> 20-Jan-2023 08:21    605K
1135-OntheSecurityoftheSchnorrSignatureSchemean..> 26-Nov-2015 23:00    137K
1136-MultiInputFunctionalEncryptionforUnbounded..> 26-Nov-2015 23:00    449K
1137-ANewFactoringAttackonMultiPrimeRSAwithSmal..> 26-Nov-2015 23:00    172K
1137-ImprovedFactoringAttacksonMultiPrimeRSAwit..> 20-Jan-2023 08:21    411K
1138-LightweightCRCbasedAuthentication.pdf         08-Dec-2015 23:00    330K
1138-LightweightCRCbasedMessageAuthentication.pdf  26-Nov-2015 23:00    330K
1139-SecretSharingSchemeswithGeneralAccessStruc..> 26-Nov-2015 23:00    403K
114-WeakIdealFunctionalitiesforDesigningRandomO..> 24-Feb-2015 23:00    110K
1140-ModularInversionHiddenNumberProblemALattic..> 26-Nov-2015 23:00    287K
1141-AmplifyingSideChannelsThroughPerformanceDe..> 26-Nov-2015 23:00    384K
1142-MidoriABlockCipherforLowEnergyExtendedVers..> 27-Nov-2015 23:00    565K
1143-AMultiBitFullyHomomorphicEncryptionwithSho..> 27-Nov-2015 23:00    295K
1144-MitigatingServerBreachesinPasswordBasedAut..> 27-Nov-2015 23:00    400K
1145-LatticeAttacksontheDGHVHomomorphicEncrypti..> 27-Nov-2015 23:00    397K
1146-libgroupsigAnextensibleClibraryforgroupsig..> 27-Nov-2015 23:00    285K
1147-CollusionResistantAggregationfromConvertib..> 27-Nov-2015 23:00    433K
1148-AnInversefreeSingleKeyedTweakableEncipheri..> 27-Nov-2015 23:00    501K
1149-AnAsymptoticallyOptimalMethodforConverting..> 27-Nov-2015 23:00    415K
115-ComprehensiveEfficientImplementationsofECCo..> 24-Feb-2015 23:00    666K
1150-FromStatelesstoStatefulGenericAuthenticati..> 29-Nov-2015 23:00    416K
1151-FullyLeakageResilientCodes.pdf                29-Nov-2015 23:00    464K
1152-PrivacypreservingFriendshipbasedRecommende..> 29-Nov-2015 23:00      5M
1153-OblivCALanguageforExtensibleDataObliviousC..> 30-Nov-2015 23:00    195K
1154-NORX8andNORX16AuthenticatedEncryptionforLo..> 30-Nov-2015 23:00    261K
1155-CrossProcessorCacheAttacks.pdf                30-Nov-2015 23:00    673K
1156-AnIdentityBasedEncryptionSchemeResilientto..> 30-Nov-2015 23:00    574K
1157-DoubleAuthenticationPreventingSignaturesan..> 30-Nov-2015 23:00    385K
1157-DoubleAuthenticationPreventingSignaturesfr..> 01-Dec-2015 23:00    385K
1157-FromIdentificationtoSignaturesTightlyAFram..> 20-Jan-2023 08:21    479K
1157-TheDoubleHashTransformFromIdentificationto..> 11-Dec-2015 23:00    425K
1158-Anoteontheoptimalityoffrequencyanalysisvse..> 30-Nov-2015 23:00     59K
1159-StudentsandTaxesaPrivacyPreservingSocialSt..> 02-Dec-2015 23:00    670K
116-EfficientHardwareDesignforComputingPairings..> 24-Feb-2015 23:00    209K
1160-CryptanalysisofmultiHFE.pdf                   02-Dec-2015 23:00    214K
1161-CyberandPhysicalAccessControlinLegacySyste..> 02-Dec-2015 23:00      1M
1162-TheMoralCharacterofCryptographicWork.pdf      02-Dec-2015 23:00    436K
1163-AGuessandDetermineAttackonReducedRoundKhud..> 02-Dec-2015 23:00    436K
1164-BeyondBitcoinPartIAcriticallookatblockchai..> 02-Dec-2015 23:00    574K
1165-MeetintheMiddleAttacksonReducedRoundMidori..> 05-Dec-2015 23:00      3M
1166-CeremoniesforEndtoEndVerifiableElections.pdf  05-Dec-2015 23:00    933K
1167-ConstrainingPseudorandomFunctionsPrivately..> 05-Dec-2015 23:00    652K
1168-SCPAComputationallyScalableByzantineConsen..> 05-Dec-2015 23:00    466K
1169-StrengthinNumbersThresholdECDSAtoProtectKe..> 05-Dec-2015 23:00    436K
117-NonuniformIndistinguishabilityandUnpredicta..> 24-Feb-2015 23:00    400K
1170-CharacterizingNTRUVariantsUsingGroupRingan..> 05-Dec-2015 23:00    132K
1171-OntheSecurityofaaccesspolynomialbasedselfh..> 08-Dec-2015 23:00    276K
1172-AnApplicationSpecificInstructionSetProcess..> 08-Dec-2015 23:00    807K
1173-SecureMultipartyComputationwithGeneralInte..> 08-Dec-2015 23:00    705K
1174-OnDataComplexityofDistinguishingAttacksvsM..> 08-Dec-2015 23:00    337K
1175-ImprovedDataConfidentialityofAuditTrailDat..> 08-Dec-2015 23:00    733K
1176-OntheEfficiencyofFHEbasedPrivateQueries.pdf   10-Dec-2015 23:00    374K
1177-OntheCCAinsecurityofMTProto.pdf               10-Dec-2015 23:00    226K
1178-TextbookNonMalleableCommitments.pdf           10-Dec-2015 23:00    505K
1179-Aconstructionof3dimensionallatticesievefor..> 10-Dec-2015 23:00    265K
118-ConstructingandUnderstandingChosenCiphertex..> 24-Feb-2015 23:00    250K
1180-SecureComparatoraZKPBasedAuthenticationSys..> 10-Dec-2015 23:00    119K
1181-ConstructionofTransitionMatricesforBinaryF..> 13-Dec-2015 23:00    366K
1182-ChaskeyaMACAlgorithmforMicrocontrollersSta..> 13-Dec-2015 23:00    105K
1183-AuthenticatedRangeClosestPointQueriesinZer..> 13-Dec-2015 23:00    512K
1183-AuthenticatedRangeampClosestPointQueriesin..> 20-Jan-2023 08:20    512K
1184-ExtensionFieldCancellationaNewCentralTrapd..> 13-Dec-2015 23:00    299K
1185-EfficientPseudorandomFunctionsviaOntheFlyA..> 13-Dec-2015 23:00    423K
1186-Restrictedlinearcongruences.pdf               13-Dec-2015 23:00    298K
1187-Onanalmostuniversalhashfunctionfamilywitha..> 13-Dec-2015 23:00    348K
1188-CompactAttributeBasedEncryptionandSigncryp..> 16-Dec-2015 23:00    599K
1189-InvariantSubspaceAttackAgainstFullMidori64..> 16-Dec-2015 23:00    355K
119-MakingMaskingSecurityProofsConcreteOrHowtoE..> 26-Feb-2015 23:00      1M
119-MakingMaskingSecurityProofsConcreteorHowtoE..> 20-Jan-2023 08:25      1M
1190-PrivateLargeScaleDatabaseswithDistributedS..> 16-Dec-2015 23:00    565K
1191-AFormalAnalysisofPrefetchinginProfiledCach..> 16-Dec-2015 23:00    310K
1192-AGuidetoFullyHomomorphicEncryption.pdf        16-Dec-2015 23:00    425K
1193-CollisionAttacksagainstCAESARCandidatesFor..> 16-Dec-2015 23:00    417K
1194-HOMOMORPHICAUTOCOMPLETE.pdf                   16-Dec-2015 23:00    330K
1195-ARITHMETICUSINGWORDWISEHOMOMORPHICENCRYPTI..> 20-Jan-2023 08:20    435K
1195-AnInvestigationofComplexOperationswithWord..> 16-Dec-2015 23:00    409K
1196-SecureDistributedComputationonPrivateInput..> 16-Dec-2015 23:00    476K
1197-OntheflyHomomorphicBatchingUnbatching.pdf     16-Dec-2015 23:00    279K
1198-SymmetricandDualPRFsfromStandardAssumption..> 23-Feb-2024 00:00    385K
1198-SymmetricandDualPRFsfromStandardAssumption..> 16-Dec-2015 23:00    358K
1199-Acompressionmethodforhomomorphicciphertext..> 18-Dec-2015 23:00    624K
120-ReconfigurableLUTADoubleEdgedSwordforSecuri..> 22-Dec-2015 23:00    475K
120-ReconfigurableLUTBoonorBaneforSecureApplica..> 26-Feb-2015 23:00    449K
1200-HeuristicToolforLinearCryptanalysiswithApp..> 18-Dec-2015 23:00    353K
1201-AStarbasedIndependentBicliqueAttackonFullR..> 18-Dec-2015 23:00    510K
1202-CCASecurityforSelfUpdatableEncryptionProte..> 18-Dec-2015 23:00    317K
1203-Thegraphofminimaldistancesofbentfunctionsa..> 18-Dec-2015 23:00    302K
1204-Constructingsecretverifiableauctionschemes..> 18-Dec-2015 23:00    395K
1204-Secretverifiableauctionsfromelections.pdf     20-Jan-2023 08:20    671K
1205-DeniableFunctionalEncryption.pdf              18-Dec-2015 23:00    476K
1206-SimplePhotonicEmissionAttackwithReducedDat..> 19-Dec-2015 23:00      1M
1207-CommentonDemonstrationsofShor39sAlgorithmi..> 20-Jan-2023 08:20      1M
1207-CommentonDemonstrationsofShorsAlgorithmint..> 19-Dec-2015 23:00      1M
1208-TwoKindsofBicliqueAttacksonLightweightBloc..> 19-Dec-2015 23:00    100K
1209-FastOptimisticallyFairCutandChoose2PC.pdf     19-Dec-2015 23:00    485K
121-MultiClientObliviousRAMsecureagainstMalicio..> 15-Oct-2015 22:00    280K
121-MultiUserObliviousRAMSecureAgainstMalicious..> 26-Feb-2015 23:00    347K
1210-QuantumSecurityoftheFujisakiOkamotoandOAEP..> 19-Dec-2015 23:00    591K
1211-LogAnalysisofEstonianInternetVoting2013201..> 20-Dec-2015 23:00    723K
1212-Choosingandgeneratingparametersforlowlevel..> 20-Dec-2015 23:00    479K
1213-FootprintschedulingforDiningCryptographern..> 20-Dec-2015 23:00    529K
1214-SimpleSecurityDefinitionsforandConstructio..> 20-Jan-2023 08:20    517K
1214-SpeedingOnLowLatencyKeyExchange.pdf           20-Dec-2015 23:00    524K
1215-SimplerFasterandMoreRobustTtestBasedLeakag..> 21-Dec-2015 23:01    570K
1216-NonTransferableProxyReEncryption.pdf          20-Jan-2023 08:20    319K
1217-TwofacedprocessesandexistenceofRNGwithprov..> 21-Dec-2015 23:00    272K
1218-AreaTimeEfficientHardwareImplementationofE..> 21-Dec-2015 23:00    925K
1219-RobustPseudoRandomNumberGeneratorswithInpu..> 21-Dec-2015 23:00    678K
122-ConstructingMixedintegerProgrammingModelswh..> 26-Feb-2015 23:00    182K
1220-TwoRoundManintheMiddleSecurityfromLPN.pdf     23-Dec-2015 23:00    473K
1221-Unclonableencryptionrevisited4times28.pdf     23-Dec-2015 23:00    723K
1222-OntheAsymptoticComplexityofSolvingLWE.pdf     23-Dec-2015 23:00    628K
1223-ChosenCiphertextSecurityfromSubsetSum.pdf     23-Dec-2015 23:00    313K
1224-TwistedPolynomialsandForgeryAttacksonGCM.pdf  23-Dec-2015 23:00      2M
1225-ECConYourFingertipsASingleInstructionAppro..> 23-Dec-2015 23:00    404K
1226-CryptoleqAHeterogeneousAbstractMachineforE..> 23-Dec-2015 23:00    403K
1227-SingleKeyRecoveryAttackson9roundKalyna1282..> 23-Dec-2015 23:00    750K
1228-Privacyprotectioninelectroniceducationbase..> 23-Dec-2015 23:00    202K
1229-Cryptanalysisofapublickeycryptosystembased..> 23-Dec-2015 23:00    189K
123-Identitybasedencryptionwithalmosttightsecur..> 26-Feb-2015 23:00    458K
1230-IndistinguishableProofsofWorkorKnowledge.pdf  23-Dec-2015 23:00    527K
1231-WhenareIdentificationProtocolswithSparseCh..> 28-Dec-2015 23:00    574K
1232-ExtendFHEWtoGeneralCase.pdf                   28-Dec-2015 23:00    751K
1233-DegenerateCurveAttacks.pdf                    28-Dec-2015 23:00    267K
1234-OnCryptographicAnonimityandUnpredicatbilit..> 28-Dec-2015 23:00    245K
1235-ConstantroundLeakageresilientZeroknowledge..> 28-Dec-2015 23:00    235K
1236-ABoundedSpaceNearOptimalKeyEnumerationAlgo..> 28-Dec-2015 23:00    494K
1237-OntheSecurityofOnePasswordAuthenticatedKey..> 31-Dec-2015 23:00    764K
1238-AsynchronousSecureMultipartyComputationinC..> 31-Dec-2015 23:00    534K
1239-SecureGoodsSupplyChainandKeyExchangewithVi..> 31-Dec-2015 23:00    695K
124-GliFreDGlitchFreeDuplicationTowardsPowerEqu..> 26-Feb-2015 23:00      1M
1240-ExploitingPUFUnreliabilitytoSecureWireless..> 20-Jan-2023 14:19     207
1240-ExploitingUnreliabilityofthePUFtoSecureRem..> 31-Dec-2015 23:00    447K
1241-Verifiablesidechannelsecurityofcryptograph..> 31-Dec-2015 23:00    565K
1242-QuantumCryptographyBeyondQuantumKeyDistrib..> 31-Dec-2015 23:00    519K
1243-VerifiableASICs.pdf                           31-Dec-2015 23:00    352K
1244-OnvaluesofvectorialBooleanfunctionsandrela..> 31-Dec-2015 23:00    222K
1245-VariationofGGH15MultilinearMaps.pdf           01-Jan-2016 23:00    211K
1246-UniversallyComposableDirectAnonymousAttest..> 01-Jan-2016 23:00    620K
1247-MissingatrickKaratsubarevisited.pdf           01-Jan-2016 23:00    120K
1247-MissingatrickKaratsubavariations.pdf          20-Jan-2023 08:20    317K
1248-GenericTransformationofaCCA2SecurePublicKe..> 01-Jan-2016 23:00    446K
1249-TrapMeIfYouCanMillionDollarCurve.pdf          01-Jan-2016 23:00    625K
125-MultilinearPseudorandomFunctions.pdf           26-Feb-2015 23:00    388K
1250-AdaptivelySecureGarbledCircuitsfromOneWayF..> 02-Jan-2016 23:00    698K
1251-CommentonQuantumCryptographyWhichisMoreImp..> 02-Jan-2016 23:00    233K
1252-ImprovedTestPatternGenerationforHardwareTr..> 02-Jan-2016 23:00    863K
1253-NonMalleableFunctionsandTheirApplications.pdf 02-Jan-2016 23:00    448K
1254-IdentitybasedHierarchicalKeyinsulatedEncry..> 02-Jan-2016 23:00    260K
1255-FunctionalEncryptionforInnerProductwithFul..> 02-Jan-2016 23:00    821K
1256-MitigatingMultiTargetAttacksinHashbasedSig..> 02-Jan-2016 23:00    853K
1257-SecurityAttackonCloudBIPracticalprivacypre..> 02-Jan-2016 23:00    166K
126-PerfectStructureontheEdgeofChaos.pdf           26-Feb-2015 23:00    364K
127-AdaptivekeyrecoveryattacksonNTRUbasedsomewh..> 26-Feb-2015 23:00    260K
128-SelfbilinearMaponUnknownOrderGroupsfromIndi..> 26-Feb-2015 23:00    419K
129-BlockwiseNonMalleableCodes.pdf                 26-Feb-2015 23:00    646K
130-HowtoBootstrapAnonymousCommunication.pdf       26-Feb-2015 23:00    382K
131-OnLightweightStreamCipherswithShorterIntern..> 26-Feb-2015 23:00    408K
132-HomomorphicComputationofEditDistance.pdf       26-Feb-2015 23:00    447K
133-PrivateComputationonEncryptedGenomicData.pdf   26-Feb-2015 23:00    382K
134-FromRelatedKeyDistinguisherstoRelatedKeyRec..> 26-Feb-2015 23:00    187K
135-GeneralizingEfficientMultipartyComputation.pdf 26-Feb-2015 23:00    455K
136-Lyra2EfficientPasswordHashingwithHighSecuri..> 20-Jan-2023 08:24      6M
136-Lyra2PasswordHashingSchemewithimprovedsecur..> 27-Feb-2015 23:01      4M
137-MultikeywordSimilaritySearchOverEncryptedCl..> 27-Feb-2015 23:01    264K
138-APracticalKeyExchangefortheInternetusingLat..> 27-Feb-2015 23:01    457K
139-PerformanceAnalysisofSomePasswordHashingSch..> 27-Feb-2015 23:01    199K
140-TheRandomOracleModelATwentyYearRetrospectiv..> 27-Feb-2015 23:01    276K
141-AnalysisofImpossibleIntegralandZeroCorrelat..> 27-Feb-2015 23:01    556K
142-MultiClientVerifiableComputationwithStronge..> 27-Feb-2015 23:01    454K
143-HarderBetterFasterStrongerEllipticCurveDisc..> 27-Feb-2015 23:01    574K
144-SecurityoftheAESwithaSecretSbox.pdf            27-Feb-2015 23:01    461K
145-ObservationsontheSIMONblockcipherfamily.pdf    27-Feb-2015 23:01    483K
146-NewAttacksonFeistelStructureswithImprovedMe..> 27-Feb-2015 23:01    351K
147-HighPrecisionFaultInjectionsontheInstructio..> 27-Feb-2015 23:01      6M
148-OntheEffectivenessoftheRemanenceDecaySideCh..> 27-Feb-2015 23:00      4M
149-CryptanalysisofHMACNMACWhirlpool.pdf           27-Feb-2015 23:00    431K
150-InsyndImprovedPrivacyPreservingTransparency..> 20-Jan-2023 08:24    394K
150-InsyndPrivacyPreservingSecureOneWayMessagin..> 27-Feb-2015 23:00    406K
150-InsyndPrivacyPreservingTransparencyLoggingU..> 16-May-2015 22:00    419K
151-Baddirectionsincryptographichashfunctions.pdf  27-Feb-2015 23:00    358K
152-InvertingtheFinalexponentiationofTatepairin..> 27-Feb-2015 23:00    341K
153-FunctionalEncryptionfromSmallHardwaeTokens.pdf 27-Feb-2015 23:00    407K
153-FunctionalEncryptionfromSmallHardwareTokens..> 04-May-2015 22:00    407K
154-CircuitsResilienttoAdditiveAttackswithAppli..> 27-Feb-2015 23:00      1M
155-OnPowerSplittingGamesinDistributedComputati..> 27-Feb-2015 23:00    503K
156-BuildingLossyTrapdoorFunctionsfromLossyEncr..> 27-Feb-2015 23:00    399K
157-DualityinABEConvertingAttributeBasedEncrypt..> 27-Feb-2015 23:00    467K
158-FromSingleInputtoMultiInputFunctionalEncryp..> 27-Feb-2015 23:00    381K
158-MultiInputFunctionalEncryptioninthePrivateK..> 08-Oct-2015 22:00    391K
159-LeakedStateForgeryAttackAgainstTheAuthentic..> 27-Feb-2015 23:00      1M
160-DifferentialLinearCryptanalysisofICEPOLE.pdf   27-Feb-2015 23:00    391K
161-ExploringtheResilienceofSomeLightweightCiph..> 02-Apr-2015 22:00    296K
161-ExploringtheResilienceofSomeLightweightCiph..> 27-Feb-2015 23:00    296K
162-NewMultilinearMapsovertheIntegers.pdf          27-Feb-2015 23:00    502K
163-IndistinguishabilityObfuscationfromFunction..> 27-Feb-2015 23:00    366K
164-ConstantSizeRingSignatureWithoutRandomOracl..> 27-Feb-2015 23:00    429K
165-TheCryptographicHardnessofRandomLocalFuncti..> 27-Feb-2015 23:00    598K
166-NaturallyRehearsingPasswords.pdf               27-Feb-2015 23:00    438K
167-PostZeroizingObfuscationThecaseofEvasiveCir..> 27-Feb-2015 23:00    460K
168-MorePSandHlikebentfunctions.pdf                27-Feb-2015 23:00    216K
169-ShortSchnorrsignaturesrequireahashfunctionw..> 27-Feb-2015 23:00    186K
170-StealingKeysfromPCsbyRadioCheapElectromagne..> 27-Feb-2015 23:00      2M
170-StealingKeysfromPCsusingaRadioCheapElectrom..> 03-Mar-2015 23:00      2M
171-AuthenticatedNetworkTimeSynchronization.pdf    27-Feb-2015 23:00    325K
172-SilentSimonAThresholdImplementationunder100..> 28-Feb-2015 23:00      1M
173-IndistinguishabilityObfuscationfromCompactF..> 28-Feb-2015 23:00    611K
174-APracticalChosenMessagePowerAnalysisApproac..> 20-Jan-2023 08:24      2M
174-APracticalChosenMessagePowerAnalysisMethodo..> 28-Feb-2015 23:00      2M
175-TrivialNonceMisusingAttackonPureOMD.pdf        28-Feb-2015 23:00    203K
176-KeyRecoveryforLWEinPolynomialTime.pdf          01-Mar-2015 23:00    477K
177-OntheSecurityofanEfficientGroupKeyAgreement..> 01-Mar-2015 23:00    205K
178-HowtoIncentivizeDataDrivenCollaborationAmon..> 24-Oct-2015 22:00    808K
178-OnTimeandOrderinMultipartyComputation.pdf      02-Mar-2015 23:00    736K
179-ASimpleMethodforObtainingRelationsAmongFact..> 02-Mar-2015 23:00    340K
180-KeyHomomorphicConstrainedPseudorandomFuncti..> 04-Mar-2015 23:00    440K
181-LinksamongImpossibleDifferentialIntegraland..> 04-Mar-2015 23:00    421K
182-TweakableBlockcipherswithAsymptoticallyOpti..> 04-Mar-2015 23:00    594K
183-NewLinksBetweenDifferentialandLinearCryptan..> 04-Mar-2015 23:00    209K
184-LinksBetweenTruncatedDifferentialandMultidi..> 04-Mar-2015 23:00    404K
185-RemotelyManagedLogicBuiltInSelfTestforSecur..> 04-Mar-2015 23:00    292K
186-HigherOrderDifferentialAnalysisofNORX.pdf      04-Mar-2015 23:00    267K
187-HowFairisYourProtocolAUtilitybasedApproacht..> 04-Mar-2015 23:00    509K
188-NewTechniquesforSPHFsandEfficientOneRoundPA..> 04-Mar-2015 23:00    672K
189-OnlineAuthenticatedEncryptionanditsNonceReu..> 04-Mar-2015 23:00    724K
190-MultiClientNonInteractiveVerifiableComputat..> 04-Mar-2015 23:00    411K
191-iDASHSecureGenomeAnalysisCompetitionUsingOb..> 04-Mar-2015 23:00    218K
192-Memorysavingcomputationofthepairingfinalexp..> 04-Mar-2015 23:00    342K
193-ImprovingModularInversioninRNSusingthePlusM..> 04-Mar-2015 23:00    528K
194-PracticalHomomorphicMACsforArithmeticCircui..> 04-Mar-2015 23:00    487K
195-ZeroknowledgeArgumentforPolynomialEvaluatio..> 04-Mar-2015 23:00    297K
196-TighterReductionsforForwardSecureSignatureS..> 04-Mar-2015 23:00    435K
197-SCAResistanceAnalysisofMACPHOTON.pdf           05-Mar-2015 23:00    853K
197-SCAResistanceAnalysisofSpongebasedMACPHOTON..> 04-Mar-2015 23:00    853K
197-SCAResistanceAnalysisonFPGAImplementationso..> 30-Apr-2015 22:00    956K
198-SideChannelProtectionbyRandomizingLookUpTab..> 04-Mar-2015 23:00    543K
199-SideChannelSecurityAnalysisofUltraLowPowerF..> 04-Mar-2015 23:00      4M
200-EvaluatingtheDuplicationofDualRailPrecharge..> 04-Mar-2015 23:00    637K
201-StatisticalPropertiesofMultiplicationmod2n.pdf 06-Mar-2015 23:00     84K
202-AdaptivelySecureCoinFlippingRevisited.pdf      06-Mar-2015 23:00    314K
203-AchievingSideChannelProtectionwithDynamicLo..> 06-Mar-2015 23:00      7M
204-LeakageResilientSymmetricEncryptionviaRekey..> 06-Mar-2015 23:00    549K
205-TowardsKeyLengthExtensionwithOptimalSecurit..> 06-Mar-2015 23:00    431K
206-EfficientandSecureDelegationofGroupExponent..> 06-Mar-2015 23:00    138K
207-LeakageAssessmentMethodologyaclearroadmapfo..> 06-Mar-2015 23:00    714K
208-TowardsSecureDistanceBounding.pdf              06-Mar-2015 23:00    171K
209-TriathlonofLightweightBlockCiphersfortheInt..> 06-Mar-2015 23:00    356K
210-SecureandEfficientInitializationandAuthenti..> 06-Mar-2015 23:00      1M
211-Fastersievingforshortestlatticevectorsusing..> 06-Mar-2015 23:00    463K
212-AnalyzingPermutationsforAESlikeCiphersUnder..> 06-Mar-2015 23:00    444K
213-AttributeBasedVersionsofSchnorrandElGamal.pdf  06-Mar-2015 23:00    530K
214-GCMSecurityBoundsReconsidered.pdf              08-Mar-2015 23:00    280K
215-ArevocableanonymityinTor.pdf                   08-Mar-2015 23:00    180K
216-QuasiAdaptiveNIZKforLinearSubspacesRevisite..> 08-Mar-2015 23:00    181K
217-Salsa20CryptanalysisNewMovesandRevisitingOl..> 08-Mar-2015 23:00    300K
218-Efficientkoutofnoblivioustransferprotocol.pdf  08-Mar-2015 23:00    195K
219-EfficientFormatPreservingEncryptedDatabases..> 08-Mar-2015 23:00    255K
220-KeyHomomorphicPRFsandTheirApplications.pdf     09-Mar-2015 23:00    608K
221-Tighterfastersimplersidechannelsecurityeval..> 09-Mar-2015 23:00      2M
222-TowardsUnderstandingtheKnownKeySecurityofBl..> 09-Mar-2015 23:00    609K
223-NewDistinguishersforReducedRoundTriviumandT..> 09-Mar-2015 23:00    320K
224-GORAMGroupORAMforPrivacyandAccessControlinO..> 25-Aug-2015 22:00      2M
224-PrivacyandAccessControlforOutsourcedPersona..> 09-Mar-2015 23:00      2M
225-BitwiseLinearMappingswithGoodCryptographicP..> 09-Mar-2015 23:00     88K
226-SecurePhysicalComputationusingDisposableCir..> 11-Mar-2015 23:00    382K
227-TradeoffCryptanalysisofMemoryHardFunctions.pdf 11-Mar-2015 23:00    396K
228-LeakageResilientCryptographywithKeyDerivedf..> 11-Mar-2015 23:00    654K
229-ImprovingGGHPublicKeySchemeUsingLowDensityL..> 12-Mar-2015 23:00    419K
230-WSPSDesigningaWideAreaSecurePositioningSyst..> 12-Mar-2015 23:00      3M
231-ARelatedKeyChosenIVDistinguishingAttackonFu..> 12-Mar-2015 23:00    223K
232-CryptanalysisofFullSprout.pdf                  12-Mar-2015 23:00    491K
233-ComputationalElectionVerifiabilityDefinitio..> 12-Mar-2015 23:00    362K
233-ElectionVerifiabilityCryptographicDefinitio..> 20-Jan-2023 08:24    759K
233-ElectionVerifiabilityCryptographicDefinitio..> 07-Aug-2015 22:00    363K
234-CollisionAttackon4branchType2GFNbasedHashFu..> 13-Mar-2015 23:00    559K
235-PerformanceandSecurityImprovementsforTorASu..> 13-Mar-2015 23:00    454K
236-KeyRecoveryfromStateInformationofSproutAppl..> 13-Mar-2015 23:00    631K
237-FastRevocationofAttributeBasedCredentialsfo..> 13-Mar-2015 23:00    336K
238-OneTimeProgramswithLimitedMemory.pdf           13-Mar-2015 23:00    448K
239-MeetintheMiddleAttacksandStructuralAnalysis..> 19-Mar-2015 23:00    528K
240-DifferentialAnalysisandMeetintheMiddleAttac..> 19-Mar-2015 23:00    703K
241-EspressoAStreamCipherfor5GWirelessCommunica..> 19-Mar-2015 23:00    190K
242-CompactlyHidingLinearSpansTightlySecureCons..> 19-Mar-2015 23:00    750K
243-ReliableMessageTransmissionunderPartialKnow..> 19-Mar-2015 23:00    268K
243-Reliablecommunicationviasemilatticeproperti..> 20-Jan-2023 08:24    336K
244-InternalDifferentialBoomerangsPracticalAnal..> 19-Mar-2015 23:00    644K
245-PracticalAttacksontheRoundreducedPRINCE.pdf    19-Mar-2015 23:00    330K
246-ImplicitZeroKnowledgeArgumentsandApplicatio..> 19-Mar-2015 23:00    940K
247-Subgroupsecurityinpairingbasedcryptography.pdf 19-Mar-2015 23:00    377K
248-VerifiablyEncryptedSignatureswithShortKeysb..> 19-Mar-2015 23:00    377K
249-ImprovedHierarchicalInnerProductEncryptionf..> 19-Mar-2015 23:00    348K
250-DesignandAnalysisofInformationTheoretically..> 19-Mar-2015 23:00    249K
251-HowtoConstructUCSecureSearchableSymmetricEn..> 19-Mar-2015 23:00    777K
252-LinearizationofMultivaluedNonlinearFeedback..> 19-Mar-2015 23:00    232K
253-StabilityandLinearizationofMultivaluedNonli..> 19-Mar-2015 23:00    284K
254-TornadoAttackonRC4withApplicationstoWEPWPA.pdf 19-Mar-2015 23:00    715K
254-TornadoAttackonRC4withApplicationstoWEPandW..> 26-Dec-2015 23:00    654K
255-Acomprehensiveanalysisofgamebasedballotpriv..> 19-Mar-2015 23:00    447K
256-CryptanalysisofThreeCertificateBasedAuthent..> 19-Mar-2015 23:00    317K
257-QuadraticTimeLinearSpaceAlgorithmsforGramSc..> 20-Mar-2015 23:00    508K
258-LightweightMDSInvolutionMatrices.pdf           22-Mar-2015 23:00    639K
259-ExhaustingDemirciSelukMeetintheMiddleAttack..> 22-Mar-2015 23:00    419K
260-ComputationalAspectsofCorrelationPowerAnaly..> 22-Mar-2015 23:00    742K
261-ResearchPerspectivesandChallengesforBitcoin..> 22-Mar-2015 23:00    309K
262-AlookatthePGPecosystemthroughthekeyserverda..> 22-Mar-2015 23:00    149K
263-EclipseAttacksonBitcoinsPeertoPeerNetwork.pdf  22-Mar-2015 23:00    860K
264-BlindBoxDeepPacketInspectionoverEncryptedTr..> 23-Mar-2015 23:00    513K
265-PasswordHashingCompetitionSurveyandBenchmar..> 23-Mar-2015 23:00    382K
266-GRECSGraphEncryptionforApproximateShortestD..> 23-Mar-2015 23:00    858K
267-TheSimplestProtocolforObliviousTransfer.pdf    23-Mar-2015 23:00    373K
268-ImprovedTopDownTechniquesinDifferentialCryp..> 23-Mar-2015 23:00    403K
269-IdealMultilinearMapsBasedonIdealLattices.pdf   23-Mar-2015 23:00    159K
270-FibonacciRingOscillatorsasTrueRandomNumberG..> 23-Mar-2015 23:00      6M
271-TowardSecureImplementationofMcElieceDecrypt..> 23-Mar-2015 23:00    452K
272-LeakageFlexibleCCAsecurePublicKeyEncryption..> 25-Mar-2015 23:00    415K
273-DualSystemEncryptionviaPredicateEncodings.pdf  25-Mar-2015 23:00    113K
274-LowDepthCircuitsforEfficientHomomorphicSort..> 25-Mar-2015 23:00    398K
275-MQChallengeHardnessEvaluationofSolvingMulti..> 25-Mar-2015 23:00    216K
276-AnImprovmentoftheEllipticNetAlgorithm.pdf      25-Mar-2015 23:00    199K
277-OneSidedDeviceIndependentQKDandPositionbase..> 25-Mar-2015 23:00    565K
278-EfficientDelegationofZeroKnowledgeProofsofK..> 25-Mar-2015 23:00    344K
279-ImprovedCryptanalysisofAESlikePermutations.pdf 25-Mar-2015 23:00    867K
280-FeasibilityandInfeasibilityofAdaptivelySecu..> 25-Mar-2015 23:00    405K
281-FromStatisticalZeroKnowledgetoSecretSharing..> 25-Mar-2015 23:00    443K
281-SecretSharingandStatisticalZeroKnowledge.pdf   07-Sep-2015 22:00    401K
282-NonInteractiveSecureComputationBasedonCutan..> 25-Mar-2015 23:00    371K
283-FullyDynamicVerifiableZeroKnowledgeOrderQue..> 26-Mar-2015 23:00    682K
284-ANoteonScalarMultiplicationUsingDivisionPol..> 26-Mar-2015 23:00     67K
285-ImprovedLinearTrailsfortheBlockCipherSimon.pdf 26-Mar-2015 23:00    184K
286-ImpossibleDifferentialCryptanalysisofReduce..> 26-Mar-2015 23:00    182K
287-AquantumsafecircuitextensionhandshakeforTor..> 01-Apr-2015 22:00    409K
287-CircuitextensionhandshakesforTorachievingfo..> 20-Jan-2023 08:24    565K
288-PrecomputationMethodsforFasterandGreenerPos..> 01-Apr-2015 22:00      2M
289-PracticalCryptanalysisofFullSproutwithTMDTr..> 01-Apr-2015 22:00    332K
290-AutomatingFastandSecureTranslationsfromType..> 01-Apr-2015 22:00    634K
291-TwoOperandsofMultipliersinSideChannelAttack..> 01-Apr-2015 22:00    239K
292-SecretSharedRandomAccessMachine.pdf            01-Apr-2015 22:00    448K
293-AdaptivelySecureUnrestrictedAttributeBasedE..> 20-Jan-2023 08:24    818K
293-FullySecureUnboundedRevocableAttributeBased..> 01-Apr-2015 22:00    816K
294-AcceleratingSomewhatHomomorphicEvaluationus..> 01-Apr-2015 22:00    391K
295-SecurityAnalysisofReEncryptionRPCMixNets.pdf   01-Apr-2015 22:00    387K
296-TheUniformDistributionofSequencesGeneratedb..> 01-Apr-2015 22:00    315K
297-IdentityBasedEncryptionSecureAgainstSelecti..> 01-Apr-2015 22:00    336K
298-QuantumResistantRandomLinearCodeBasedPublic..> 20-Jan-2023 08:24    118K
298-RandomLinearCodeBasedPublicKeyEncryptionSch..> 02-Sep-2015 22:00    251K
298-SecureRandomLinearCodeBasedPublicKeyEncrypt..> 01-Apr-2015 22:00    214K
299-ANoteontheLindellWaisbardPrivateWebSearchSc..> 01-Apr-2015 22:00    252K
300-ScalableDivisibleEcash.pdf                     01-Apr-2015 22:00    518K
301-CryptanalysisofGGHMap.pdf                      07-Apr-2015 22:00    135K
302-BoostingOMDforAlmostFreeAuthenticationofAss..> 07-Apr-2015 22:00    910K
303-TheDesignSpaceofLightweightCryptography.pdf    07-Apr-2015 22:00    283K
304-CommunicationOptimalProactiveSecretSharingf..> 07-Apr-2015 22:00    171K
305-FoundationsofReconfigurablePUFsFullVersion.pdf 07-Apr-2015 22:00    412K
306-AnalysisofVAES3FF2.pdf                         07-Apr-2015 22:00    184K
307-BlackBoxGarbledRAM.pdf                         07-Apr-2015 22:00    498K
308-AuthenticatedKeyExchangeoverBitcoin.pdf        07-Apr-2015 22:00    514K
309-TinyLEGOAnInteractiveGarblingSchemeforMalic..> 27-Aug-2015 22:00    860K
309-TinyLEGOAnInteractiveGarblingSchemeforMalic..> 07-Apr-2015 22:00    976K
310-Newalgorithmforthediscretelogarithmproblemo..> 07-Apr-2015 22:00    259K
311-TaggedOneTimeSignaturesTightSecurityandOpti..> 07-Apr-2015 22:00    404K
312-ImprovingKeyRecoveryto784and799roundsofTriv..> 07-Apr-2015 22:00    395K
313-RecoveringShortGeneratorsofPrincipalIdealsi..> 07-Apr-2015 22:00    319K
314-CertificateBasedEncryptionResilienttoKeyLea..> 11-Apr-2015 22:00    465K
315-QueryComplexityAmplificationforRandomOracle..> 11-Apr-2015 22:00    593K
316-NonmalleabilityunderSelectiveOpeningAttacks..> 11-Apr-2015 22:00    478K
317-LeakageResilientCryptographyoverLargeFinite..> 11-Apr-2015 22:00    391K
318-PracticalDivisibleECash.pdf                    11-Apr-2015 22:00    852K
319-PointDecompositionProbleminBinaryEllipticCu..> 11-Apr-2015 22:00    311K
320-HybridPubliclyVerifiableComputation.pdf        11-Apr-2015 22:00    670K
321-SizeHidinginPrivateSetIntersectionwhatcanbe..> 11-Apr-2015 22:00    403K
322-TransformationBasedOutsourcingofLinearEquat..> 11-Apr-2015 22:00    270K
323-EfficientPairingFreeOneRoundAttributeBasedA..> 11-Apr-2015 22:00    431K
324-ANoteonLowerBoundsforNoninteractiveMessageA..> 11-Apr-2015 22:00    358K
325-SecureMultiPartyComputationwithIdentifiable..> 13-Apr-2015 22:00    573K
326-CryptanalysisOfAnAuthenticatedImageEncrypti..> 13-Apr-2015 22:00    457K
326-CryptanalysisofanAuthenticatedImageEncrypti..> 20-Jan-2023 08:24      1M
327-SomeresultsonSprout.pdf                        13-Apr-2015 22:00    347K
328-StronglySecureAuthenticatedKeyExchangefromI..> 13-Apr-2015 22:00    249K
329-PAGESAFamilyofBlockCiiphers.pdf                19-Apr-2015 22:00    192K
330-SpongebasedCCA2secureasymmetricencryptionfo..> 19-Apr-2015 22:00    608K
331-ANewAuthenticatedEncryptionTechniqueforHand..> 20-Apr-2015 22:00    806K
331-spAELMSpongebasedAuthenticatedEncryptionSch..> 19-Apr-2015 22:00    802K
332-SecurityIntelligenceforBroadcastThreatAnaly..> 19-Apr-2015 22:00    212K
333-NearlyOptimalVerifiableDataStreamingFullVer..> 19-Apr-2015 22:00      1M
334-OntheCorrelationIntractabilityofObfuscatedP..> 19-Apr-2015 22:00    341K
335-ContinuousAfterthefactLeakageResilienteCKse..> 19-Apr-2015 22:00    425K
336-ArithmeticCryptography.pdf                     19-Apr-2015 22:00    933K
337-ModularHardwareArchitectureforSomewhatHomom..> 19-Apr-2015 22:00    423K
338-Cryptanalysisofafairanonymityforthetornetwo..> 19-Apr-2015 22:00    168K
339-CertificateValidationinSecureComputationand..> 21-Dec-2015 23:01    657K
339-GuaranteeingCorrectnessinPrivacyFriendlyOut..> 20-Apr-2015 22:00    627K
340-ANewDistinguisheronGrainv1for106rounds.pdf     20-Apr-2015 22:00    300K
341-LimitsonthePowerofIndistinguishabilityObfus..> 20-Apr-2015 22:00    354K
342-IdentitySetbasedBroadcastEncryptionsupporti..> 20-Apr-2015 22:00    597K
343-HighspeedCurve25519on8bit16bitand32bitmicro..> 20-Apr-2015 22:00    391K
344-WatermarkingCryptographicProgramsAgainstArb..> 22-Apr-2015 22:00    423K
345-TwoRoundMPCfromLWEviaMultiKeyFHE.pdf           22-Apr-2015 22:00    408K
345-TwoRoundMultipartyComputationviaMultiKeyFHE..> 20-Jan-2023 08:24    473K
345-TwoRoundMutlipartyComputationviaMultiKeyFHE..> 03-Sep-2015 22:00    471K
346-EndtoEndVerifiableElectionsintheStandardMod..> 20-Jan-2023 08:24    481K
346-EndtoEndVerifiableElectionsintheStandardMod..> 22-Apr-2015 22:00    481K
347-FaultAnalysisofKuznyechik.pdf                  23-Apr-2015 22:01    267K
348-AHardwarebasedCountermeasuretoReduceSideCha..> 23-Apr-2015 22:01      3M
349-EfficientSearchableSymmetricEncryptionforSt..> 23-Apr-2015 22:00    166K
350-ImprovingLocalCollisionsNewAttacksonReduced..> 23-Apr-2015 22:00    320K
351-DatabaseOutsourcingwithHierarchicalAuthenti..> 23-Apr-2015 22:00    903K
352-BroadcastfromMinicastSecureAgainstGeneralAd..> 23-Apr-2015 22:00    553K
353-MatrixComputationalAssumptionsinMultilinear..> 23-Apr-2015 22:00    556K
354-SEMAandMESDLeakageofTinyECC20onaLOTUSSensor..> 23-Apr-2015 22:00      2M
355-SemanticSecurityandIndistinguishabilityinth..> 23-Apr-2015 22:00    576K
356-SuccinctRandomizedEncodingsandtheirApplicat..> 23-Apr-2015 22:00    788K
357-AGrouptheoryMethodtoTheCycleStructuresofFee..> 23-Apr-2015 22:00    249K
358-OnGeneralizedFirstFallDegreeAssumptions.pdf    23-Apr-2015 22:00    414K
359-HigherOrderSideChannelSecurityandMaskRefres..> 23-Apr-2015 22:00    381K
360-AchievingDifferentialPrivacywithBiasControl..> 01-May-2015 22:00    204K
360-AchievingDifferentialPrivacywithNewImperfec..> 23-Apr-2015 22:00    211K
361-Computationallybindingquantumcommitments.pdf   23-Apr-2015 22:00    684K
362-ObliviousTransferfromweaklyRandomSelfReduci..> 23-Apr-2015 22:00    352K
363-OptimallySecureTweakableBlockciphers.pdf       23-Apr-2015 22:00    563K
364-PrivacypreservingContextawareRecommenderSys..> 23-Apr-2015 22:00    122K
365-Ontheimpossibilityofreceivingsecuritybeyond..> 23-Apr-2015 22:00    358K
366-Arandomzooslothunicornandtrx.pdf               23-Apr-2015 22:00    379K
367-ImprovedHigherOrderDifferentialAttacksonMIS..> 23-Apr-2015 22:00    425K
368-BreakingtheRabinWilliamsdigitalsignaturesys..> 23-Apr-2015 22:00    231K
369-OnNonBlackBoxSimulationandtheImpossibilityo..> 23-Apr-2015 22:00    719K
370-FinancialCryptographyDiscriminatoryPricingM..> 23-Apr-2015 22:00    334K
371-ConstantRoundMPCwithFairnessandGuaranteeofO..> 23-Apr-2015 22:00    455K
372-SecurityAnalysisofPRINCE.pdf                   24-Apr-2015 22:00    416K
373-PubliclyVerifiableSoftwareWatermarking.pdf     24-Apr-2015 22:00    422K
374-OntheImpossibilityofTightCryptographicReduc..> 24-Apr-2015 22:00    529K
375-Boundsonsurmisingremixedkeys.pdf               24-Apr-2015 22:00    341K
376-CryptographyfromPostQuantumAssumptions.pdf     24-Apr-2015 22:00    419K
377-ClusterComputinginZeroKnowledge.pdf            27-Apr-2015 22:00      5M
378-PACLearningofArbiterPUFs.pdf                   29-Apr-2015 22:00      1M
379-MMBcloudtreeAuthenticatedIndexforVerifiable..> 29-Apr-2015 22:00      3M
380-ProtectingagainstMultidimensionalLinearandT..> 29-Apr-2015 22:00    340K
381-FinancialCryptographyAlgorithmicMechanismsf..> 29-Apr-2015 22:00    297K
382-HighPerformanceIdealLatticeBasedCryptograph..> 19-Jun-2015 22:00    752K
382-SpeedRecordsforIdealLatticeBasedCryptograph..> 29-Apr-2015 22:00    721K
383-ImpossibilityofVBBObfuscationwithIdealConst..> 29-Apr-2015 22:00    204K
384-CondensedUnpredictability.pdf                  29-Apr-2015 22:00    513K
385-FeasibilityandCompletenessofCryptographicTa..> 29-Apr-2015 22:00    363K
386-PrivatelyEvaluatingDecisionTreesandRandomFo..> 29-Apr-2015 22:00    879K
387-MethodtoProtectPasswordsinDatabasesforWebAp..> 29-Apr-2015 22:00    108K
388-FullySuccinctGarbledRAM.pdf                    29-Apr-2015 22:00    463K
388-SuccinctGarbledRAM.pdf                         01-Oct-2015 22:00    481K
389-Keccak.pdf                                     29-Apr-2015 22:00    122K
390-DualSystemEncryptionFrameworkinPrimeOrderGr..> 29-Apr-2015 22:00    649K
391-OntheCommunicationComplexityofSecureComputa..> 29-Apr-2015 22:00    469K
392-ForgeryAttacksonroundreducedICEPOLE128.pdf     29-Apr-2015 22:00    278K
393-BicliquecryptanalysisofMIBS80andPRESENT80.pdf  29-Apr-2015 22:00    313K
394-AugmentedSecureChannelsandtheGoaloftheTLS13..> 01-May-2015 22:00    656K
395-EfficientUnlinkableSanitizableSignaturesfro..> 20-Jan-2023 08:24    674K
395-EfficientUnlinkableSanitizableSignaturesfro..> 01-May-2015 22:00    442K
396-GeneralizingHomomorphicMACsforArithmeticCir..> 01-May-2015 22:00    390K
397-RelaxingFullCodebookSecurityARefinedAnalysi..> 01-May-2015 22:00    745K
398-FactoringRSAmoduliwithweakprimefactors.pdf     01-May-2015 22:00    357K
399-NewattacksonRSAwithModuliNprq.pdf              01-May-2015 22:00    326K
400-ExpirationandRevocationofKeysforAttributeba..> 01-May-2015 22:00    249K
400-ExpirationandRevocationofKeysforAttributeba..> 13-Jul-2015 22:00    296K
401-SimpleChosenCiphertextSecurityfromLowNoiseL..> 01-May-2015 22:00    404K
402-SuccessthroughconfidenceEvaluatingtheeffect..> 01-May-2015 22:00      1M
402-SuccessthroughconfidenceEvaluatingtheeffect..> 04-May-2015 22:00      1M
403-SequentialSecretSharingasaNewHierarchicalAc..> 01-May-2015 22:00    161K
404-ZeroKnowledgeAccumulatorsandSetOperations.pdf  01-May-2015 22:00    380K
405-FeasibilityandInfeasibilityofSecureComputat..> 01-May-2015 22:00    362K
406-ComputationTraceIndistinguishabilityObfusca..> 01-May-2015 22:00      1M
406-CryptographyforParallelRAMfromIndistinguish..> 31-Dec-2015 23:00      1M
407-HigherOrderCryptanalysisofLowMC.pdf            20-Jan-2023 08:24    307K
407-HigherordercryptanalysisofLowMC.pdf            01-May-2015 22:00    290K
408-RevisitingAtomicPatternsforScalarMultiplica..> 01-May-2015 22:00    537K
409-ImprovedDualSystemABEinPrimeOrderGroupsviaP..> 01-May-2015 22:00    370K
410-EfficientRingLWEEncryptionon8bitAVRProcesso..> 01-May-2015 22:00    556K
411-SideChannelAnalysisofMACKeccakHardwareImple..> 01-May-2015 22:00    481K
412-SurveyonCryptographicObfuscation.pdf           05-May-2015 22:00    858K
412-TheBirthofCryptographicObfuscationASurvey.pdf  20-Jan-2023 08:24      2M
413-AStudyofPairEncodingsPredicateEncryptioninP..> 20-Jan-2023 08:24    558K
413-AstudyofPairEncodingsPredicateEncryptioninp..> 05-May-2015 22:00    472K
414-OntheOptimalityofNonLinearComputationsofLen..> 05-May-2015 22:00    449K
415-STRIBOBWHIRLBOBSecurityAnalysisAddendum.pdf    05-May-2015 22:00    247K
416-HETestAHomomorphicEncryptionTestingFramewor..> 05-May-2015 22:00    920K
417-OrderRevealingEncryptionandtheHardnessofPri..> 05-May-2015 22:00    382K
418-OptimizedInterpolationAttacksonLowMC.pdf       05-May-2015 22:00    399K
419-NoninvasiveSpoofingAttacksforAntilockBrakin..> 05-May-2015 22:00      6M
420-WhatInformationisLeakedunderConcurrentCompo..> 05-May-2015 22:00    633K
421-VLSIImplementationofDoubleBaseScalarMultipl..> 05-May-2015 22:00    450K
422-EfficientServerAidedSecureTwoPartyFunctionE..> 05-May-2015 22:00    571K
423-OntheImplementationofUnifiedArithmeticonBin..> 05-May-2015 22:00    623K
424-FIDESLightweightAuthenticatedCipherwithSide..> 05-May-2015 22:00    671K
425-SmallerKeysforCodeBasedCryptographyQCMDPCMc..> 05-May-2015 22:00    347K
426-ComplementingFeistelCiphers.pdf                05-May-2015 22:00    354K
427-AHighReliabilityPUFUsingHotCarrierInjection..> 05-May-2015 22:00      5M
428-DumbCryptoinSmartGridsPracticalCryptanalysi..> 06-May-2015 22:00    564K
429-CryptanalysisofRoundReducedLED.pdf             06-May-2015 22:00      1M
430-FastandTradeoffResilientMemoryHardFunctions..> 06-May-2015 22:00    417K
431-ConversionsamongSeveralClassesofPredicateEn..> 13-Jul-2015 22:00    467K
431-ConversionsamongSeveralClassesofPredicateEn..> 06-May-2015 22:00    475K
432-NonRepudiableProofsofStorageinCloud.pdf        16-Jun-2015 22:00      4M
432-NonRepudiableProvableDataPossessioninCloudS..> 06-May-2015 22:00      4M
433-ANewClassificationof4bitOptimalSboxesandits..> 06-May-2015 22:00    132K
434-DicksonPolynomialsthatareInvolutions.pdf       06-May-2015 22:00    299K
435-OntheFastAlgebraicImmunityofBooleanPowerFun..> 07-May-2015 22:00    336K
436-OntheResistanceofPrimevariableRotationSymme..> 07-May-2015 22:00    389K
437-ANoteontheUnsoundnessofvnTinyRAM39sSNARK.pdf   20-Jan-2023 08:24    162K
437-ANoteontheUnsoundnessofvnTinyRAMsSNARK.pdf     07-May-2015 22:00    162K
438-AHybridApproachforProvingNoninterferenceofJ..> 08-May-2015 22:00    292K
439-OnConcurrentlySecureComputationintheMultipl..> 08-May-2015 22:00    403K
440-MessageLockedEncryptionforLockDependentMess..> 08-May-2015 22:00    411K
441-EnhancingTrustinReconfigurableBasedHardware..> 08-May-2015 22:00    489K
441-FIDESEnhancingTrustinReconfigurableBasedHar..> 25-May-2015 22:00    377K
442-IndividualizingElectricalCircuitsofCryptogr..> 09-May-2015 22:00    378K
443-SecurityEvaluationandEnhancementofBistableR..> 09-May-2015 22:00      1M
444-RevisitingSecurityClaimsofXLSandCOPA.pdf       09-May-2015 22:00    541K
445-XLSisnotaStrongPseudorandomPermutation.pdf     09-May-2015 22:00    432K
446-OntheAmortizedComplexityofZeroknowledgeProt..> 09-May-2015 22:00    354K
447-ANewModelforErrorTolerantSideChannelCubeAtt..> 10-May-2015 22:00    315K
448-ACommentonGuMap1.pdf                           11-May-2015 22:00     75K
449-OnConstructionsofaSortofMDSBlockDiffusionMa..> 12-May-2015 22:00    331K
450-AdaptivelySecureComputationwithPartialErasu..> 12-May-2015 22:00    420K
451-OntheSystematicConstructionsofRotationSymme..> 12-May-2015 22:00    192K
452-MaskswillFallOffHigherOrderOptimalDistingui..> 13-May-2015 22:00    737K
453-AnOptimizationofGuMap1.pdf                     13-May-2015 22:00     74K
454-Acomprehensiveandlightweightsecurityarchite..> 13-May-2015 22:00    345K
455-SecureDeduplicationofEncryptedDatawithoutAd..> 13-May-2015 22:00    669K
456-CollateraldamageofFacebookAppsanenhancedpri..> 13-May-2015 22:00    307K
457-GenericConversionsfromCPAtoCCAsecureFunctio..> 14-May-2015 22:00    630K
458-AHYBRIDAPPROACHFORTHESECURETRANSMISSIONOFH2..> 14-May-2015 22:00    605K
459-ImprovedIntegralCryptanalysisofFeistelStruc..> 14-May-2015 22:00    196K
459-NewObservationonDivisionProperty.pdf           23-May-2015 22:00    194K
460-StepbyStepTowardsCreatingaSafeSmartContract..> 14-May-2015 22:00    333K
461-ApproximateAlgorithmsonLatticeswithSmallDet..> 20-Jan-2023 08:24    110K
461-Cryptanalysisofthemultilinearmapontheideall..> 14-May-2015 22:00    372K
462-AcceleratingSWHEbasedPIRsusingGPUs.pdf         15-May-2015 22:00    461K
463-MultilinearMapsUsingRandomMatrix.pdf           15-May-2015 22:00    133K
464-BitcoinandBeyondATechnicalSurveyonDecentral..> 17-May-2015 22:00    706K
465-EfficientArithmeticonARMNEONandItsApplicati..> 17-May-2015 22:00    421K
466-EfficientFullyHomomorphicEncryptionwithCirc..> 17-May-2015 22:00    231K
467-TheObliviousMachineorHowtoPuttheCintoMPC.pdf   18-May-2015 22:00    422K
468-PracticalFullyHomomorphicEncryptionwithoutN..> 18-May-2015 22:00    340K
469-ShadowBitcoinScalableSimulationviaDirectExe..> 19-May-2015 22:01    416K
470-OnthePowerofPublickeyFunctionalEncryptionwi..> 20-May-2015 22:00    403K
470-OnthepowerofPublickeyFunctionalEncryptionwi..> 19-May-2015 22:01    403K
471-AChallengeObfuscationMethodforThwartingMode..> 19-May-2015 22:01    530K
472-HighPerformanceMultiPartyComputationforBina..> 19-May-2015 22:01      1M
473-VARIANTSOFDIFFERENTIALANDLINEARCRYPTANALYSI..> 19-May-2015 22:01    433K
474-FullyHomomorphicEncryptionwithoutbootstrapp..> 19-May-2015 22:01      2M
475-RandomizingScalarMultiplicationUsingExactCo..> 19-May-2015 22:01    579K
475-Randomizingscalarmultiplicationusingexactco..> 20-Jan-2023 08:24    436K
476-XPXGeneralizedTweakableEvenMansourwithImpro..> 19-May-2015 22:01    787K
477-AuthenticationKeyRecoveryinGaloisCounterMod..> 19-May-2015 22:00      7M
477-AuthenticationKeyRecoveryonGaloisCounterMod..> 20-Jan-2023 08:24    498K
478-HowtoBuildTimeLockEncryption.pdf               19-May-2015 22:00    313K
479-AProvablySecureGroupSignatureSchemefromCode..> 20-May-2015 22:00    569K
480-TrinocchioPrivacyFriendlyOutsourcingbyDistr..> 20-May-2015 22:00    518K
481-AdvancedDifferentialCryptanalysisofReducedR..> 20-May-2015 22:00    255K
482-Howtobuildtimelockencryption.pdf               20-Jan-2023 08:24    720K
482-TimereleaseProtocolfromBitcoinandWitnessEnc..> 21-May-2015 22:00    366K
483-Improvedsecurityproofsinlatticebasedcryptog..> 21-May-2015 22:00    512K
483-Improvedsecurityproofsinlatticebasedcryptog..> 20-Jan-2023 08:23    586K
484-MoreRoundsLessSecurity.pdf                     21-May-2015 22:00    195K
485-TurningOnlineCiphersOff.pdf                    21-May-2015 22:00    645K
486-DECIMDetectingEndpointCompromiseInMessaging..> 20-Jan-2023 08:23    313K
486-Howtodetectunauthorisedusageofakey.pdf         21-May-2015 22:00    316K
487-ContentioninCryptolandObfuscationLeakageand..> 22-May-2015 22:00    516K
488-OnBlackBoxComplexityofUniversallyComposable..> 22-May-2015 22:00    495K
489-ScalableandprivatemediaconsumptionwithPopco..> 22-May-2015 22:00    509K
490-CryptanalysisOfDynamicIDBasedRemoteUserAuth..> 25-May-2015 22:00    167K
491-Reencryptionfunctionalreencryptionandmultih..> 25-May-2015 22:00    308K
492-MaskingvsMultipartyComputationHowLargeisthe..> 25-May-2015 22:00    357K
493-FaultTolerantInfectiveCountermeasureforAES.pdf 25-May-2015 22:00    476K
494-CryptanalysisoftheLSHandSHAVHashFunctions.pdf  25-May-2015 22:00    459K
495-Improvingalgebraicattacksonstreamciphersbas..> 20-Jan-2023 08:23    325K
495-PowersofSubfieldPolynomialsandAlgebraicAtta..> 25-May-2015 22:00    490K
496-QuantifyingLocationPrivacyLeakagefromTransa..> 26-May-2015 22:00    353K
497-EfficientZeroKnowledgeProofsofNonAlgebraicS..> 26-May-2015 22:00    432K
498-LowSpaceComplexityCRTbasedBitParallelGF2nPo..> 26-May-2015 22:00    163K
499-AlgebraicpartitioningFullycompactandalmostt..> 26-May-2015 22:00    293K
500-FaultCryptanalysisofCHES2014SymmetricInfect..> 26-May-2015 22:00    374K
501-MultiProverCommitmentsAgainstNonSignalingAt..> 26-May-2015 22:00    364K
502-CentrallyBankedCryptocurrencies.pdf            26-May-2015 22:00    431K
503-TheNorwegianInternetVotingProtocolAnewInsta..> 27-May-2015 22:00    330K
504-TheIteratedRandomPermutationProblemwithAppl..> 27-May-2015 22:00    493K
505-TheTowerNumberFieldSieve.pdf                   27-May-2015 22:00    638K
506-CompositionalVerificationofHigherOrderMaski..> 27-May-2015 22:00    659K
506-StrongNonInterferenceandTypeDirectedHigherO..> 20-Jan-2023 08:23    530K
507-DecomposingtheASASABlockCipherConstruction.pdf 27-May-2015 22:00    478K
508-ProbabilisticSignatureBasedFrameworkforDiff..> 27-May-2015 22:00    554K
509-AflawinatheoremaboutSchnorrsignatures.pdf      27-May-2015 22:00    234K
510-EquivoeTTranspositionEquivocationCryptograp..> 27-May-2015 22:00    460K
511-NearCollisionSideChannelAttacks.pdf            27-May-2015 22:00      1M
512-EfficientKeyExtractionfromthePrimarySideofa..> 28-May-2015 22:00      4M
512-KeyExtractionfromthePrimarySideofaSwitchedM..> 20-Jan-2023 08:23   1021K
513-ComputingIndividualDiscreteLogarithmsFaster..> 29-May-2015 22:00    398K
514-TimeLockPuzzlesfromRandomizedEncodings.pdf     29-May-2015 22:00    459K
515-HigherOrderDifferentialMeetinTheMiddlePreim..> 29-May-2015 22:00    576K
516-KeyRecoveryAttacksonASASA.pdf                  29-May-2015 22:00    618K
517-SubversionResilientSignatureSchemes.pdf        30-May-2015 22:00    484K
517-SubversionResilientSignaturesDefinitionsCon..> 30-Oct-2015 23:00    525K
518-BroadcastingIntermediateBlocksasaDefenseMec..> 30-May-2015 22:00    260K
519-NotesonTwoFullyHomomorphicEncryptionSchemes..> 30-May-2015 22:00    146K
520-AConstantTimeSingleRoundAttributeBasedAuthe..> 18-Oct-2015 22:00    503K
520-EfficientPairingFreeOneRoundAttributeBasedA..> 31-May-2015 22:00    493K
521-DemocoinAPubliclyVerifiableandJointlyServic..> 31-May-2015 22:00    388K
522-Speedinguplatticesievingwithoutincreasingth..> 31-May-2015 22:00    498K
523-EfficientConstantRoundMultiPartyComputation..> 31-May-2015 22:00    423K
524-SecureKeyExchangeProtocolbasedonVirtualProo..> 02-Jun-2015 22:00    332K
525-ShortRandomizableSignatures.pdf                02-Jun-2015 22:00    415K
526-GenericKeyRecoveryAttackonFeistelScheme.pdf    02-Jun-2015 22:00    288K
527-RobustProfilingforDPAStyleAttacks.pdf          02-Jun-2015 22:00    546K
528-SpaceMintACryptocurrencyBasedonProofsofSpac..> 20-Jan-2023 08:23    586K
528-SpacecoinACryptocurrencyBasedonProofsofSpac..> 05-Jun-2015 22:00    428K
528-SpacemintACryptocurrencyBasedonProofsofSpac..> 17-Nov-2015 23:00    496K
529-PowerAnalysisAttacksagainstIEEE802154Nodes.pdf 05-Jun-2015 22:00      2M
530-PracticalFreeStartCollisionAttackson76stepS..> 05-Jun-2015 22:00    378K
531-ReproducibleCircularlySecureBitEncryptionAp..> 05-Jun-2015 22:00    413K
532-PICOAnUltralightweightandLowpowerencryption..> 05-Jun-2015 22:00    269K
533-RelatedKeyRectangleAttackonRoundreducedtext..> 05-Jun-2015 22:00    701K
534-Problemssolutionsandexperienceofthefirstint..> 20-Jan-2023 08:23      3M
534-Problemssolutionsandexperienceofthefirstint..> 08-Jun-2015 22:00      3M
535-ASCASASCAandDPAwithEnumerationWhichOneBeats..> 08-Jun-2015 22:00    442K
536-FromImprovedLeakageDetectiontotheDetectiono..> 08-Jun-2015 22:00    783K
537-TowardsEasyLeakageCertification.pdf            08-Jun-2015 22:00    900K
538-PairingBasedMutualHealinginWirelessSensorNe..> 08-Jun-2015 22:00    375K
539-TweakingEvenMansourCiphers.pdf                 08-Jun-2015 22:00    828K
540-PICOAnUltralightweightandLowpowerencryption..> 08-Jun-2015 22:00    279K
541-SecurityofFullStateKeyedSpongeandDuplexAppl..> 23-Sep-2015 22:00    833K
541-SecurityofFullStateKeyedandDuplexSpongeAppl..> 08-Jun-2015 22:00    645K
542-ImprovedSideChannelAnalysisofFiniteFieldMul..> 08-Jun-2015 22:00    616K
543-BloomFiltersinAdversarialEnvironments.pdf      08-Jun-2015 22:00    505K
544-Alternativecubics39ruleswithanalgebraicappe..> 20-Jan-2023 08:23    307K
544-Alternativecubicsruleswithanalgebraicappeal..> 08-Jun-2015 22:00    290K
545-FROPUFHowtoExtractMoreEntropyfromTwoRingOsc..> 08-Jun-2015 22:00    407K
546-ActivelySecureOTExtensionwithOptimalOverhea..> 08-Jun-2015 22:00    300K
547-SecureComputationofMIPSMachineCode.pdf         08-Jun-2015 22:00    462K
548-MessageTransmissionwithReverseFirewallsSecu..> 08-Jun-2015 22:00    623K
549-ILTRUAnNTRULikePublicKeyCryptosystemOverIde..> 08-Jun-2015 22:00    556K
550-UpendingStockMarketStructureUsingSecureMult..> 08-Jun-2015 22:00    179K
551-Quantumhomomorphicencryptionforcircuitsoflo..> 12-Jun-2015 22:00    731K
552-AnImprovedBKWAlgorithmforLWEwithApplication..> 14-Jun-2015 22:00      1M
553-RoundOptimalBlackBoxTwoPartyComputation.pdf    14-Jun-2015 22:00    665K
554-AnAlgebraicFrameworkforPseudorandomFunction..> 15-Jun-2015 22:00    438K
555-AttributeBasedSigncryptionSignerPrivacyStro..> 15-Jun-2015 22:00    593K
556-LightweightCoprocessorforKoblitzCurves283bi..> 15-Jun-2015 22:00    358K
557-ImprovedAllSubkeysRecoveryAttacksonFOXKATAN..> 15-Jun-2015 22:00    257K
558-EfficiencyEvaluationofCryptographicProtocol..> 17-Jun-2015 22:00    381K
559-ConcurrentSecureComputationwithOptimalQuery..> 17-Jun-2015 22:00    434K
560-GenericConstructionofUCSecureObliviousTrans..> 17-Jun-2015 22:00    431K
561-SoCittoEMelectromagneticsidechannelattackso..> 17-Jun-2015 22:00      5M
562-PUAPrivacyandUnforgeabilityforAggregation.pdf  17-Jun-2015 22:00    403K
562-PUDAPrivacyandUnforgeabilityforDataAggregat..> 19-Jun-2015 22:00    412K
563-PrivacyintheGenomicEra.pdf                     17-Jun-2015 22:00      3M
564-SanctumMinimalHardwareExtensionsforStrongSo..> 13-Oct-2015 22:00    393K
564-SanctumMinimalRISCExtensionsforIsolatedExec..> 17-Jun-2015 22:00    332K
565-FourQfourdimensionaldecompositionsonaQcurve..> 17-Jun-2015 22:00    467K
566-AFrameworkforIdentityBasedEncryptionwithAlm..> 17-Jun-2015 22:00    730K
567-KeyRecoveryAttackontheASASACryptosystemwith..> 17-Jun-2015 22:00      2M
568-CryptanalysisofReducedRoundWhirlwindFullVer..> 17-Jun-2015 22:00      3M
569-ImprovedPseudoPreimageAttacksonReducedRound..> 17-Jun-2015 22:00      1M
570-ConstantCommunicationORAMwithSmallBlocksize..> 13-Aug-2015 22:00    439K
570-ConstantCommunicationObliviousRAM.pdf          17-Jun-2015 22:00    420K
571-RobustandOnePassParallelComputationofCorrel..> 17-Jun-2015 22:00    418K
571-RobustandOnePassParallelComputationofCorrel..> 20-Jan-2023 08:23    406K
572-OnPublicKeyEncryptionfromNoisyCodewords.pdf    17-Jun-2015 22:00    417K
573-LastfalldegreeHFEandWeildescentattacksonECD..> 17-Jun-2015 22:00    408K
574-FairandRobustMultiPartyComputationusingaGlo..> 17-Jun-2015 22:00    441K
575-KnownkeyDistinguisheronFullPRESENT.pdf         17-Jun-2015 22:00    403K
576-TheCarnacprotocolorhowtoreadthecontentsofas..> 17-Jun-2015 22:00    107K
577-TwistInsecurity.pdf                            17-Jun-2015 22:00    278K
578-TamperingwiththeDeliveryofBlocksandTransact..> 17-Jun-2015 22:00    791K
579-ASimpleProofofaDistinguishingBoundofIterate..> 18-Jun-2015 22:00    256K
580-ComposableModularAnonymousCredentialsDefini..> 21-Jun-2015 22:01    581K
580-ComposableampModularAnonymousCredentialsDef..> 20-Jan-2023 08:23    581K
581-UniversalComputationalExtractorsandtheSuper..> 21-Jun-2015 22:00    863K
582-HowSecureandQuickisQUICProvableSecurityandP..> 21-Jun-2015 22:00    476K
583-SecureKeyGenerationfromBiasedPUFs.pdf          21-Jun-2015 22:00    906K
584-HowtoSecurelyProlongtheComputationalBinding..> 21-Jun-2015 22:00    363K
585-SIMONandSPECKBlockCiphersfortheInternetofTh..> 21-Jun-2015 22:00    613K
586-SCLPVSecureCertificatelessPublicVerificatio..> 21-Jun-2015 22:00    502K
587-ANENHANCEDBIOMETRICBASEDREMOTEUSERAUTHENTIC..> 21-Jun-2015 22:00      1M
588-AnanalysisoftheCclassofbentfunctions.pdf       21-Jun-2015 22:00    348K
589-GeneratingSBoxMultivariateQuadraticEquation..> 21-Jun-2015 22:00    383K
590-TriviAAFastandSecureAuthenticatedEncryption..> 21-Jun-2015 22:00      1M
591-Howmuchrandomnesscanbeextractedfrommemoryle..> 21-Jun-2015 22:00    415K
592-OblivionMitigatingPrivacyLeaksbyControlling..> 21-Jun-2015 22:00      3M
593-APhysicalApproachforStochasticModelingofTER..> 21-Jun-2015 22:00      1M
594-DiskEncryptionDoWeNeedtoPreserveLength.pdf     21-Jun-2015 22:00    291K
595-DifferentialFaultIntensityAnalysis.pdf         21-Jun-2015 22:00   1016K
596-ZeroizingWithoutLowLevelZeroesNewMMAPAttack..> 21-Jun-2015 22:00    533K
597-AssessmentofHidingtheHigherOrderLeakagesinH..> 21-Jun-2015 22:00      2M
598-CombiningDifferentialPrivacyandSecureMultip..> 21-Jun-2015 22:00    353K
599-TheChainRuleforHILLPseudoentropyRevisited.pdf  21-Jun-2015 22:00    433K
600-PredictiveModelsforMinEntropyEstimation.pdf    21-Jun-2015 22:00    604K
601-ASecureObliviousTransferProtocolfromIndisti..> 28-Jun-2015 22:00    146K
602-CombinedSideChannelandFaultAnalysisAttackon..> 28-Jun-2015 22:00    316K
603-ComplementaryDualCodesforCountermeasurestoS..> 28-Jun-2015 22:00    501K
604-StructurePreservingSignaturesfromStandardAs..> 28-Jun-2015 22:00    434K
605-ComputingEllipticCurveDiscreteLogarithmswit..> 28-Jun-2015 22:00    867K
606-ConstructingEfficientPAKEProtocolsfromIdent..> 28-Jun-2015 22:00    376K
607-NetcoinATraceableP2PElectronicCashSystem.pdf   28-Jun-2015 22:00    554K
608-FullySecureFunctionalEncryptionforInnerProd..> 28-Jun-2015 22:00    474K
609-ExperimentalStudyofDIGIPASSGO3andtheSecurit..> 28-Jun-2015 22:00    289K
610-McBitsfastconstanttimecodebasedcryptography..> 28-Jun-2015 22:00    395K
611-AUnifiedSecurityAnalysisofTwophaseKeyExchan..> 28-Jun-2015 22:00    468K
612-TheSimeckFamilyofLightweightBlockCiphers.pdf   30-Jun-2015 22:01    571K
613-AccountableAuthorityCiphertextPolicyAttribu..> 30-Jun-2015 22:01    429K
614-BitSecurityoftheHyperellipticCurvesDiffieHe..> 30-Jun-2015 22:01    196K
615-SecurityAnalysisofNiuetalAuthenticationandO..> 30-Jun-2015 22:01    253K
616-TheleakingbatteryAprivacyanalysisoftheHTML5..> 30-Jun-2015 22:01    234K
617-Generalisedtallybaseddecodersfortraitortrac..> 30-Jun-2015 22:01    762K
618-AnAuthenticationCodeoverGaloisRingswithOpti..> 30-Jun-2015 22:01    388K
619-ConstructionofArithmeticSecretSharingScheme..> 30-Jun-2015 22:00    291K
620-StatisticalConcurrentNonmalleableZeroknowle..> 30-Jun-2015 22:00    184K
621-WhowatchesthewatchmenUtilizingPerformanceMo..> 30-Jun-2015 22:00    704K
622-RandomDigitRepresentationofIntegers.pdf        30-Jun-2015 22:00    321K
623-DesignEvaluationandOptimizationofPhysicalUn..> 30-Jun-2015 22:00    986K
624-AutomatedAnalysisandSynthesisofAuthenticate..> 30-Jun-2015 22:00    769K
625-Ed448Goldilocksanewellipticcurve.pdf           30-Jun-2015 22:00    249K
626-PracticalRoundOptimalBlindSignaturesintheSt..> 30-Jun-2015 22:00    482K
627-OnNecessaryPaddingwithIO.pdf                   30-Jun-2015 22:00    251K
628-AnUnconditionallyHidingandLongTermBindingPo..> 30-Jun-2015 22:00    419K
629-BeleniosRFANoninteractiveReceiptFreeElectro..> 20-Jan-2023 08:23    500K
629-BeleniosRFAStronglyReceiptFreeElectronicVot..> 30-Jun-2015 22:00    374K
630-UnconditionallySecureComputationwithReduced..> 30-Jun-2015 22:00    329K
631-AcceleratingHomomorphicEvaluationonReconfig..> 30-Jun-2015 22:00      2M
632-MoreonImpossibilityofVirtualBlackBoxObfusca..> 30-Jun-2015 22:00    540K
632-OntheImpossibilityofVirtualBlackBoxObfuscat..> 20-Jan-2023 08:23    550K
633-AnEfficientIDBasedMessageRecoverablePrivacy..> 30-Jun-2015 22:00    239K
634-PhasingPrivateSetIntersectionusingPermutati..> 30-Jun-2015 22:00    354K
635-MicrocashEfficientOffLineSmallPayments.pdf     30-Jun-2015 22:00     81K
636-AnalyzingConstructionsforkeyalternatingPseu..> 30-Jun-2015 22:00    590K
636-OnStreamCipherswithProvableBeyondtheBirthda..> 20-Jan-2023 08:23    584K
637-ANovelCyberspaceOrientedAccessControlModel.pdf 30-Jun-2015 22:00    990K
638-AnEfficientManyCoreArchitectureforEllipticC..> 30-Jun-2015 22:00    612K
639-PolynomialTimeReductionfromApproximateShort..> 15-Nov-2015 23:00    254K
639-Polynomialtimereductionfromapproximateshort..> 30-Jun-2015 22:00    232K
639-Polynomialtimereductionfromapproximateshort..> 01-Jul-2015 22:00    233K
640-Veryefficientsimulatableflippingofmanycoins..> 30-Jun-2015 22:00      1M
641-NoiseFreeSymmetricFullyHomomorphicEncryptio..> 13-Oct-2015 22:00    163K
641-NoisefreeSymmetricFullyHomomorphicEncryptio..> 30-Jun-2015 22:00    135K
642-ANewPartialKeyExposureAttackonMultipowerRSA..> 30-Jun-2015 22:00    447K
643-ShortAccountableRingSignaturesBasedonDDH.pdf   30-Jun-2015 22:00    290K
644-ThePythiaPRFService.pdf                        01-Jul-2015 22:00    501K
645-EfficientDynamicProvableDataPossessionProto..> 29-Oct-2015 23:00    479K
645-ImprovementsonEfficientDynamicProvableDataP..> 01-Jul-2015 22:00    414K
645-NewDynamicProvableDataPossessionProtocolswi..> 20-Jan-2023 14:19     207
646-DecompositionattackonSASASASAS.pdf             01-Jul-2015 22:00    258K
647-Efficientephemeralellipticcurvecryptographi..> 01-Jul-2015 22:00    389K
648-AdaptiveProofsofKnowledgeintheRandomOracleM..> 01-Jul-2015 22:00    684K
649-OntheHardnessofProvingCCAsecurityofSignedEl..> 01-Jul-2015 22:00    424K
650-ANewEncryptionStandardofUkraineTheKalynaBlo..> 01-Jul-2015 22:00    528K
651-SecureExecutionArchitecturebasedonPUFdriven..> 01-Jul-2015 22:00    631K
652-Modellingciphersuiteandversionnegotiationin..> 01-Jul-2015 22:00    403K
653-HomomorphicSignatureSchemesAsurvey.pdf         01-Jul-2015 22:00    406K
654-DAATZAnEfficientDAASchemeforMobileDevicesus..> 02-Jul-2015 22:00    921K
655-AnEfficientMultiMessageMultiReceiverSigncry..> 02-Jul-2015 22:00    154K
656-CryptanalysisofaMarkovChainBasedUserAuthent..> 02-Jul-2015 22:00     83K
657-RandomizingtheMontgomeryPoweringLadder.pdf     02-Jul-2015 22:00    277K
658-SingleCycleImplementationsofBlockCiphers.pdf   02-Jul-2015 22:00    309K
659-DiversityandTransparencyforECC.pdf             02-Jul-2015 22:00    589K
660-AHybridGaussianSamplerforLatticesoverRings.pdf 02-Jul-2015 22:00    696K
661-Cryptanalysisofamodernrotormachineinamultic..> 02-Jul-2015 22:00    284K
662-StrongSecurityoftheStronglyMultiplicativeRa..> 02-Jul-2015 22:00     91K
663-AnalyzingtheEfficiencyofBiasedFaultBasedAtt..> 04-Jul-2015 22:00    930K
664-SecureMultiPartyShuffling.pdf                  05-Jul-2015 22:00    717K
665-CommunicationComplexityofConditionalDisclos..> 05-Jul-2015 22:00    238K
666-ImprovedLinearHullAttackonRoundReducedSimon..> 05-Jul-2015 22:00    576K
666-ImprovedLinearHullAttackonRoundReducedtexts..> 20-Jan-2023 08:23    748K
667-DeBruijnSequencesfromJoiningCyclesofNonline..> 20-Jan-2023 08:23    441K
667-DeBruijnSequencesfromNonlinearFeedbackShift..> 05-Jul-2015 22:00    253K
668-TheFallacyofCompositionofObliviousRAMandSea..> 05-Jul-2015 22:00    882K
669-GMUHardwareAPIforAuthenticatedCiphers.pdf      05-Jul-2015 22:00    623K
670-SmartSecurityManagementinSecureDevices.pdf     05-Jul-2015 22:00    477K
671-PrivacypreservingFrequentItemsetMiningforSp..> 05-Jul-2015 22:00    237K
672-FunctionHidingInnerProductEncryption.pdf       05-Jul-2015 22:00    316K
673-DecafEliminatingcofactorsthroughpointcompre..> 05-Jul-2015 22:00    325K
674-PreprocessingBasedVerificationofMultipartyP..> 05-Jul-2015 22:00    428K
675-HawkTheBlockchainModelofCryptographyandPriv..> 05-Jul-2015 22:00    719K
676-QuantumCryptanalysisofNTRU.pdf                 05-Jul-2015 22:00    176K
677-EdDSAformorecurves.pdf                         05-Jul-2015 22:00    144K
678-OptimizingMAKWAonGPUandCPU.pdf                 06-Jul-2015 22:00    213K
679-AnotherLookatNormalApproximationsinCryptana..> 06-Jul-2015 22:00    410K
680-IndifferentiabilityofConfusionDiffusionNetw..> 06-Jul-2015 22:00    637K
681-ANONIZEALargeScaleAnonymousSurveySystem.pdf    07-Jul-2015 22:00    323K
682-IntegralCryptanalysisonFullMISTY1.pdf          07-Jul-2015 22:00    597K
683-SecurityofLinearSecretSharingSchemesagainst..> 07-Jul-2015 22:00    411K
684-AOnetimeStegosystemandApplicationstoEfficie..> 08-Jul-2015 22:00    538K
685-Onthediscretelogarithmprobleminfinitefields..> 13-Jul-2015 22:00    291K
686-CryptanalysisforSecureandEfficientSmartCard..> 13-Jul-2015 22:00     63K
687-ClassicalCryptographicProtocolsinaQuantumWo..> 13-Jul-2015 22:00    591K
688-BinaryFieldMultiplicationonARMv8.pdf           13-Jul-2015 22:00     85K
689-CountingKeysinParallelAfteraSideChannelAtta..> 04-Sep-2015 22:00      1M
689-HowtoEnumerateYourKeysAccuratelyandEfficien..> 13-Jul-2015 22:00    708K
690-SystematicReverseEngineeringofCacheSliceSel..> 13-Jul-2015 22:00    604K
691-SpecTreATinySideChannelResistantSpeckCorefo..> 13-Jul-2015 22:00    874K
692-FastandSecureLinearRegressionandBiometricAu..> 13-Jul-2015 22:00    529K
693-FoundationsofReactiveGarblingSchemes.pdf       13-Jul-2015 22:00    805K
694-OntheComplexityofAdditivelyHomomorphicUCCom..> 13-Jul-2015 22:00    624K
695-CliptographyClippingthePowerofKleptographic..> 13-Jul-2015 22:00    333K
696-NovelalgorithmsandhardwarearchitecturesforM..> 13-Jul-2015 22:00    996K
697-OntheSecurityofaSelfhealingGroupKeyDistribu..> 13-Jul-2015 22:00    278K
698-ChosenIVCryptanalysisonReducedRoundChaChaan..> 14-Jul-2015 22:00    454K
699-FURISCFHEEncryptedURISCDesign.pdf              14-Jul-2015 22:00    289K
700-FourNeighbourhoodCellularAutomataasBetterCr..> 14-Jul-2015 22:00    174K
701-DifferentialPrivacyindistributionandinstanc..> 14-Jul-2015 22:00    301K
701-Differentiallyprivateinstancebasednoisemech..> 20-Jan-2023 08:23    526K
702-Demystifyingincentivesintheconsensuscompute..> 14-Jul-2015 22:00    403K
703-PointFunctionObfuscationAFrameworkandGeneri..> 14-Jul-2015 22:00    180K
704-IndistinguishabilityObfuscationfromApproxim..> 14-Jul-2015 22:00    455K
705-LinearOverheadOptimallyresilientRobustMPCUs..> 20-Jan-2023 08:23    514K
705-LinearOverheadRobustMPCwithHonestMajorityUs..> 14-Jul-2015 22:00    498K
706-ABriefComparisonofSimonandSimeck.pdf           18-Jul-2015 22:01    440K
707-ReconcilingUserPrivacyandImplicitAuthentica..> 18-Jul-2015 22:01    731K
708-ChoosingParametersforNTRUEncrypt.pdf           18-Jul-2015 22:01    456K
709-DetectingMobileApplicationSpoofingAttacksby..> 18-Jul-2015 22:00      3M
710-PrivacyPreservingContentBasedImageRetrieval..> 18-Jul-2015 22:00      4M
711-ConstructionofLightweightSBoxesusingFeistel..> 18-Jul-2015 22:00    428K
712-AdaptiveProofshaveStraightlineExtractorsint..> 20-Jan-2023 08:23    486K
712-OnLimitationsoftheFiatShamirTransformation.pdf 18-Jul-2015 22:00    595K
713-LighthHBANewVersionofhHBwithImprovedSession..> 18-Jul-2015 22:00    282K
714-NewclassesofpublickeycryptosystemKXVISE1PKC..> 19-Jul-2015 22:00    206K
714-NewclassesofpublickeycryptosystemKXVISE1PKC..> 18-Jul-2015 22:00    207K
715-NewCircularSecurityCounterexamplesfromDecis..> 18-Jul-2015 22:00    512K
716-LinearCryptanalysisofReducedRoundSIMECKVari..> 20-Jul-2015 22:00    306K
717-TowardsSecureCryptographicSoftwareImplement..> 20-Jul-2015 22:00    481K
718-EfficientAsynchronousAccumulatorsforDistrib..> 20-Jul-2015 22:00    426K
719-Consolidatingmaskingschemes.pdf                20-Jul-2015 22:00    457K
720-OutputCompressingRandomizedEncodingsandAppl..> 20-Jul-2015 22:00    493K
721-KDMSecurityviaHomomorphicSmoothProjectiveHa..> 21-Jul-2015 22:00    101K
722-ObliviousSubstringSearchwithUpdates.pdf        21-Jul-2015 22:00    546K
723-CryptanalysisofFeistelNetworkswithSecretRou..> 21-Jul-2015 22:00    584K
724-AmaskedringLWEimplementation.pdf               21-Jul-2015 22:00      5M
725-TheselfblindableUProveschemebyHanzlikandKlu..> 21-Jul-2015 22:00    332K
725-TheselfblindableUProveschemefromFC3914isfor..> 20-Jan-2023 08:23    312K
726-Compositionsoflinearfunctionsandapplication..> 21-Jul-2015 22:00     57K
727-DPABitslicingandMaskingat1GHz.pdf              21-Jul-2015 22:00      2M
728-ProvableVirusDetectionUsingtheUncertaintyPr..> 21-Jul-2015 22:00    376K
729-ProvablySecureRemoteMemoryAttestationtoPrev..> 29-Dec-2015 23:00    328K
729-TowardsProvablySecureRemoteMemoryAttestatio..> 21-Jul-2015 22:00    321K
730-AchievingCompactnessGenericallyIndistinguis..> 24-Jul-2015 22:00    444K
730-IndistinguishabilityObfuscationfromFunction..> 28-Oct-2015 23:00    462K
730-IndistinguishabilityObfuscationfromFunction..> 21-Oct-2015 22:00    466K
731-SameValueAnalysisonEdwardsCurves.pdf           24-Jul-2015 22:00    372K
732-CompactImplementationsofLEABlockCipherforLo..> 24-Jul-2015 22:00    235K
733-FullyHomomorphicEncryptiononOctonionRing.pdf   24-Jul-2015 22:00      1M
734-OntheSecurityofExtendedGeneralizedFeistelNe..> 24-Jul-2015 22:00    139K
735-CuttingEdgeCryptographyThroughtheLensofSecr..> 21-Oct-2015 22:00      1M
735-ModernCryptographyThroughtheLensofSecretSha..> 24-Jul-2015 22:00      1M
736-SolvingLWEviaListDecoding.pdf                  24-Jul-2015 22:00    295K
737-Newmultilinearmapsfromideallattices.pdf        24-Jul-2015 22:00    161K
738-AuthenticatedEncryptionwithSmallStretchorHo..> 20-Jan-2023 08:23    280K
738-AuthenticatedEncryptionwithoutTagExpansiono..> 24-Jul-2015 22:00    232K
739-Finegrainedsharingofencryptedsensordataover..> 24-Jul-2015 22:00      2M
739-PracticalandScalableSharingofEncryptedDatai..> 20-Jan-2023 14:19     207
740-PredictableArgumentsofKnowledge.pdf            24-Jul-2015 22:00    348K
741-OnGenericConstructionsofCircularlySecureLea..> 24-Jul-2015 22:00    471K
742-AMatrixDecompositionMethodforOptimalNormalB..> 24-Jul-2015 22:00    214K
743-ShortGroupSignaturesviaStructurePreservingS..> 24-Jul-2015 22:00    826K
744-BitCryptorBitSerializedCompactCryptoEngineo..> 24-Jul-2015 22:00      1M
745-FasterECCoverF2571featPMULL.pdf                20-Jan-2023 08:23     85K
745-FasterECCoverF_2571featPMULL.pdf               24-Jul-2015 22:00     96K
746-A270AttackontheFullMISTY1.pdf                  30-Jul-2015 22:00    411K
747-SelfbilinearMapfromOneWayEncodingSystemandI..> 30-Jul-2015 22:00    192K
748-AMoreCautiousApproachtoSecurityAgainstMassS..> 30-Jul-2015 22:00    478K
749-AffineEquivalenceanditsApplicationtoTighten..> 30-Jul-2015 22:00    698K
750-AnonymousTraitorTracingHowtoEmbedArbitraryI..> 30-Jul-2015 22:00    526K
751-FastGarblingofCircuitsUnderStandardAssumpti..> 30-Jul-2015 22:00    575K
752-OnConstructingOneWayPermutationsfromIndisti..> 30-Jul-2015 22:00    750K
753-DifferentialComputationAnalysisHidingyourWh..> 30-Jul-2015 22:00    562K
754-RelatedKeyAttackonFullRoundPICARO.pdf          30-Jul-2015 22:00    463K
755-RevisitingTESLAinthequantumrandomoraclemode..> 20-Jan-2023 08:23    734K
755-TESLATightlySecureEfficientSignaturesfromSt..> 30-Jul-2015 22:00    728K
756-CryptanalysisofanImprovedOneWayHashChainSel..> 30-Jul-2015 22:00    269K
757-StreamCipherOperationModeswithImprovedSecur..> 30-Jul-2015 22:00    409K
758-RingLWECryptographyfortheNumberTheorist.pdf    30-Jul-2015 22:00    367K
759-CryptanalysisofGu39sidealmultilinearmap.pdf    20-Jan-2023 08:22    384K
759-CryptanalysisofGusidealmultilinearmap.pdf      30-Jul-2015 22:00    384K
760-InvestigatingSRAMPUFsinlargeCPUsandGPUs.pdf    31-Jul-2015 22:01      2M
761-ImplementationoftheSCREAMTweakableBlockCiph..> 31-Jul-2015 22:00     46K
762-AMeetintheMiddleAttackonReducedRoundKalynab..> 31-Jul-2015 22:00    712K
763-HighlyEfficientGF28InversionCircuitBasedonR..> 31-Jul-2015 22:00    276K
764-ANoteonGeneratingCosetRepresentativesofPGL_..> 31-Jul-2015 22:00    286K
764-OnGeneratingCosetRepresentativesofPGL_2F_qi..> 08-Aug-2015 22:00    328K
765-SanitizableSigncryptionSanitizationoverEncr..> 31-Jul-2015 22:00    720K
766-RelateKeyAlmostUniversalHashFunctionsDefini..> 31-Jul-2015 22:00    337K
766-RelatedKeyAlmostUniversalHashFunctionsDefin..> 20-Nov-2015 23:00    360K
767-DualECAStandardizedBackDoor.pdf                31-Jul-2015 22:00    386K
768-InterdictioninPracticeHardwareTrojanAgainst..> 31-Jul-2015 22:00      2M
769-OntheHardnessofLearningwithRoundingoverSmal..> 31-Jul-2015 22:00    333K
770-ATransformforNIZKAlmostasEfficientandGenera..> 03-Aug-2015 22:00    405K
771-ASATbasedPublicKeyCryptographyScheme.pdf       11-Aug-2015 22:00    362K
771-ASATbasedpublickeyencryptionscheme.pdf         03-Aug-2015 22:00    355K
772-NonMalleableEncryptionSimplerShorterStronge..> 03-Aug-2015 22:00    561K
773-Distinguishingatruncatedrandompermutationfr..> 03-Aug-2015 22:00    371K
774-RevisitingPrimePowerRSA.pdf                    03-Aug-2015 22:00    245K
775-EfficientMDSDiffusionLayersThroughDecomposi..> 03-Aug-2015 22:00    481K
776-FunctionalEncryptionforTuringMachines.pdf      04-Aug-2015 22:00    784K
777-ArithmeticWalshTransformofBooleanFunctionsw..> 04-Aug-2015 22:00    112K
778-ModularInversionHiddenNumberProblemCorrecti..> 04-Aug-2015 22:00    378K
779-ASimpleSchemeforStrengtheningProductsumType..> 05-Aug-2015 22:00     71K
780-MultilinearMapsfromObfuscation.pdf             05-Aug-2015 22:00    347K
781-TwistedHessiancurves.pdf                       06-Aug-2015 22:00    922K
782-Securetwopartycomputationinappliedpicalculu..> 06-Aug-2015 22:00    621K
783-CryptanalysisoftheAuthenticatedEncryptionAl..> 06-Aug-2015 22:00    451K
784-ThresholdFlipThemWhenthewinnerdoesnotneedto..> 06-Aug-2015 22:00    329K
785-DoubleSpeedBarrettModuli.pdf                   07-Aug-2015 22:00    495K
786-BuyingAESDesignResistancewithSpeedandEnergy..> 07-Aug-2015 22:00    318K
787-BacktrackingAssistedMultiplication.pdf         07-Aug-2015 22:00    534K
788-CrackingResistantPasswordVaultsusingNatural..> 07-Aug-2015 22:00    527K
789-EfficientHardwareImplementationsoftheWarble..> 10-Aug-2015 22:00    249K
790-Onweakandstrong2kbentBooleanfunctions.pdf      10-Aug-2015 22:00    373K
791-OntheEquivalenceofObfuscationandMultilinear..> 13-Aug-2015 22:00    320K
791-Ontheequivalenceofobfuscationandmultilinear..> 10-Aug-2015 22:00    320K
792-StandardSecurityDoesNotImplyIndistinguishab..> 10-Aug-2015 22:00    393K
793-AlgorithmicInformationTheoryforObfuscationS..> 10-Aug-2015 22:00    281K
794-SafeErrorsonSPAProtectedimplementationswith..> 10-Aug-2015 22:00    495K
795-FastandMemoryEfficientKeyRecoveryinSideChan..> 10-Aug-2015 22:00    554K
796-StubbornMiningGeneralizingSelfishMiningandC..> 10-Aug-2015 22:00      2M
797-WhatSecurityCanWeAchievewithin4Rounds.pdf      20-Jan-2023 08:22    330K
797-WhatSecuritycanweAchievein4Rounds.pdf          10-Aug-2015 22:00    242K
798-AStatelessCryptographicallySecurePhysicalUn..> 10-Aug-2015 22:00      1M
799-SecureBinaryFieldMultiplication.pdf            10-Aug-2015 22:00      1M
800-HybridWBCSecureandefficientencryptionscheme..> 10-Aug-2015 22:00    644K
801-ScalarBlindingonEllipticCurvesbasedonPrimes..> 10-Aug-2015 22:00    176K
802-CiphertextonlyattackonddHillinOd13d.pdf        10-Aug-2015 22:00    367K
803-StatisticalandAlgebraicPropertiesofDES.pdf     12-Aug-2015 22:00    366K
804-SECUREMULTIPARTYCOMPUTATIONHOWTOSOLVETHECON..> 24-Sep-2015 22:00    410K
804-SECUREMULTIPARTYCOMPUTATIONHOWTOSOLVETHECON..> 20-Jan-2023 08:22    410K
804-SecureMultipartyComputationHowtoSolvethePro..> 13-Aug-2015 22:00    455K
805-Aclassificationofellipticcurveswithrespectt..> 13-Aug-2015 22:00    135K
806-FaultSpaceTransformationAGenericApproachtoC..> 20-Jan-2023 08:22    971K
806-UsingStateSpaceEncodingToCounterBiasedFault..> 13-Aug-2015 22:00    865K
807-FairDistributedComputationofReactiveFunctio..> 13-Aug-2015 22:00    485K
808-MasssurveillancewithouttheStateStronglyUnde..> 14-Aug-2015 22:00    333K
809-NewTechniquesforElectronicVoting.pdf           14-Aug-2015 22:00    370K
810-ImprovedORCompositionofSigmaProtocols.pdf      14-Aug-2015 22:00    516K
811-KeyrecoveryattacksagainsttheMACalgorithmCha..> 14-Aug-2015 22:00    297K
812-TheSecretStructureoftheSBoxofStreebogKuznec..> 14-Aug-2015 22:00    229K
813-RevisitingTurningOnlineCipherOff.pdf           17-Aug-2015 22:00    365K
814-CLKSCertificatelessKeywordSearchonEncrypted..> 17-Aug-2015 22:00    326K
815-OnthePowerofHierarchicalIdentityBasedEncryp..> 17-Aug-2015 22:00    558K
816-AnalysisofKeylessMassiveMIMObasedCryptosyst..> 18-Aug-2015 22:00    542K
817-SecureMultipartyComputationofaSocialNetwork..> 28-Oct-2015 23:00    232K
817-SecureMultipartyGraphComputation.pdf           18-Aug-2015 22:00    466K
818-cuHEAHomomorphicEncryptionAcceleratorLibrar..> 18-Aug-2015 22:00    592K
819-ImprovingtheBigMacAttackonEllipticCurveCryp..> 18-Aug-2015 22:00    513K
820-ExtendedNestedDualSystemGroupsRevisited.pdf    21-Aug-2015 22:00    560K
821-Ageneralframeworkforbuildingnoisefreehomomo..> 21-Aug-2015 22:00    181K
822-EfficientlyObfuscatingReEncryptionProgramun..> 21-Aug-2015 22:00    415K
823-Efficientideallatticesievingusingcrosspolyt..> 24-Aug-2015 22:00    592K
824-EfficientFullyStructurePreservingSignatures..> 24-Aug-2015 22:00    381K
825-TheEmperor39sNewPasswordCreationPolicies.pdf   20-Jan-2023 08:22    544K
825-TheEmperorsNewPasswordCreationPolicies.pdf     24-Aug-2015 22:00    544K
826-ProgrammableHashFunctionsgoPrivateConstruct..> 26-Aug-2015 22:00    651K
827-UnboundedHierarchicalIdentityBasedEncryptio..> 26-Aug-2015 22:00    235K
828-StaterecoveryanalysisofSpritz.pdf              26-Aug-2015 22:00    295K
829-ReducingDepthinConstrainedPRFsFromBitFixing..> 31-Dec-2015 23:00    536K
829-ReducingMultilinearMapLevelsinConstrainedPR..> 26-Aug-2015 22:00    601K
830-UniqueSignaturewithShortOutputfromCDHAssump..> 26-Aug-2015 22:00    400K
831-MMAPMultiFactorMemoryAuthenticationforSecur..> 26-Aug-2015 22:00    893K
832-CharacterisingandComparingtheEnergyConsumpt..> 28-Aug-2015 22:00    238K
833-EfficientKeyAuthenticationServiceforSecureE..> 28-Aug-2015 22:00    325K
834-AuthenticationUsingSideChannelInformation.pdf  28-Aug-2015 22:00    413K
835-Onnearprimeorderellipticcurveswithsmallembe..> 28-Aug-2015 22:00    281K
835-Onnearprimeorderellipticcurveswithsmallembe..> 20-Jan-2023 08:22    282K
836-CiphertextPolicyAttributeBasedBroadcastEncr..> 28-Aug-2015 22:00    398K
837-MultiVariateHighOrderAttacksofShuffledTable..> 31-Aug-2015 22:00    718K
838-OfflineWitnessEncryption.pdf                   31-Aug-2015 22:00    439K
839-TimingandLatticeAttacksonaRemoteECDSAOpenSS..> 31-Aug-2015 22:00      1M
840-RelatedkeyImpossibleDifferentialAnalysisofF..> 31-Aug-2015 22:00    448K
841-AnEfficientCPABEwithConstantSizeSecretKeysu..> 31-Aug-2015 22:00    286K
842-OnLinkabilityandMalleabilityinSelfblindable..> 31-Aug-2015 22:00    447K
843-RethinkingPrivacyforExtendedSanitizableSign..> 31-Aug-2015 22:00    570K
844-DAEncryptHomomorphicEncryptionviaNonArchime..> 31-Aug-2015 22:00    149K
845-CryptanalysisoftheQuadraticZeroTestingofGGH..> 01-Sep-2015 22:00    241K
846-CharacterizationofSecureMultipartyComputati..> 02-Sep-2015 22:00    467K
847-ExploringEnergyEfficiencyofLightweightBlock..> 02-Sep-2015 22:00    344K
848-TheMultiplicativeComplexityofBooleanFunctio..> 02-Sep-2015 22:00    272K
849-RegulatingthePaceofvonNeumannCorrectors.pdf    02-Sep-2015 22:00    504K
850-TraceableCPABEonPrimeOrderGroupsFullySecure..> 02-Sep-2015 22:00    572K
851-BeyondBirthdayBoundSecurityforTweakableEven..> 02-Sep-2015 22:00    617K
852-Analysisofakeyexchangeprotocolbasedontropic..> 03-Sep-2015 22:00    207K
853-StandardSecurityDoesImplySecurityAgainstSel..> 06-Sep-2015 22:00    405K
854-EfficientFuzzyExtractionofPUFInducedSecrets..> 20-Jan-2023 08:22    600K
854-SecureSketchMetamorphosisTightUnifiedBounds..> 06-Sep-2015 22:00    501K
855-AnewframeworkforkeystreamgeneratorsagainstC..> 06-Sep-2015 22:00    207K
856-MGRHASHFUNCTION.pdf                            06-Sep-2015 22:00    718K
857-UnifyingLeakageClassesSimulatableLeakageand..> 06-Sep-2015 22:00    405K
858-GroupSignaturesWithoutqAssumptions.pdf         06-Sep-2015 22:00    376K
858-SkippingtheqinGroupSignatures.pdf              20-Jan-2023 08:22    533K
859-FactorBaseDiscreteLogarithmsinKummerExtensi..> 06-Sep-2015 22:00    357K
860-SelectiveOpeningSecurityforReceivers.pdf       06-Sep-2015 22:00    413K
861-ASyntheticIndifferentiabilityAnalysisofInte..> 06-Sep-2015 22:00    480K
862-IdealizingIdentityBasedEncryption.pdf          08-Sep-2015 22:00    876K
863-IsThereanObliviousRAMLowerBound.pdf            08-Sep-2015 22:00    703K
864-EncryptionPerformanceImprovementsofthePaill..> 08-Sep-2015 22:00    285K
865-CardbasedCryptographicProtocolsUsingaMinima..> 08-Sep-2015 22:00    707K
866-GradedEncodingVariationsonaScheme.pdf          08-Sep-2015 22:00    395K
867-MultilinearandAggregatePseudorandomFunction..> 08-Sep-2015 22:00    718K
868-OptimallySecureBlockCiphersfromIdealPrimiti..> 08-Sep-2015 22:00    537K
869-NewRealizationsofSomewhereStatisticallyBind..> 08-Sep-2015 22:00    566K
870-GamblingComputationalInformationandEncrypti..> 08-Sep-2015 22:00    323K
871-ACompleteandLinearPhysicalCharacterizationM..> 13-Sep-2015 22:01      8M
871-PhotonicSideChannelAnalysisofArbiterPUFs.pdf   20-Jan-2023 08:22      8M
872-TraceabilityImprovementsofaNewRFIDProtocolB..> 13-Sep-2015 22:01    636K
873-OntheDiffusionPropertyofIteratedFunctions.pdf  14-Sep-2015 22:00    374K
873-OntheDiffusionpropertyofiteratedfunctions.pdf  13-Sep-2015 22:01    374K
874-FeistelNetworksIndifferentiabilityat10Round..> 13-Sep-2015 22:01    574K
874-Indifferentiabilityof10RoundFeistelNetworks..> 17-Dec-2015 23:00    582K
875-BentandSemibentFunctionsviaLinearTranslator..> 13-Sep-2015 22:00    139K
876-10RoundFeistelisIndifferentiablefromanIdeal..> 13-Sep-2015 22:00    492K
877-StudyofaParityCheckBasedFaultDetectionCount..> 13-Sep-2015 22:00    378K
878-MakingExistentialUnforgeableSignaturesStron..> 13-Sep-2015 22:00    558K
879-Computinginformationondomainparametersfromp..> 13-Sep-2015 22:00    298K
880-GenericEfficientDynamicProofsofRetrievabili..> 13-Sep-2015 22:00    368K
881-GenericSecurityofNMACandHMACwithInputWhiten..> 13-Sep-2015 22:00    565K
882-AGenericCountermeasureAgainstFaultInjection..> 13-Sep-2015 22:00      1M
882-UsingModularExtensiontoProvablyProtectECCAg..> 03-Oct-2015 22:00   1022K
882-UsingModularExtensiontoProvablyProtectEdwar..> 20-Jan-2023 08:22    610K
883-RevisitingSumofCBCMACsandExtendingNI2MACtoA..> 13-Sep-2015 22:00    474K
884-GeneralCircuitRealizingCompactRevocableAttr..> 13-Sep-2015 22:00    582K
885-ANewStandardofUkraineTheKupynaHashFunction.pdf 13-Sep-2015 22:00    407K
886-ApplyingCryptographicAccelerationTechniques..> 13-Sep-2015 22:00    440K
887-ComposableSecurityintheTamperProofHardwareM..> 20-Jan-2023 08:22    345K
887-RoundOptimalTokenBasedSecureComputation.pdf    13-Sep-2015 22:00    314K
888-TweakLengthExtensionforTweakableBlockcipher..> 14-Sep-2015 22:00    223K
889-WhichRingBasedSomewhatHomomorphicEncryption..> 14-Sep-2015 22:00    408K
890-MITHFEaNewMultivariateSignatureScheme.pdf      15-Sep-2015 22:00    289K
891-PrivateCiphertextPolicyAttributebasedEncryp..> 15-Sep-2015 22:00    382K
892-SecurityAgainstRelatedRandomnessAttacksviaR..> 15-Sep-2015 22:00    409K
893-RobustAuthenticatedEncryptionandtheLimitsof..> 15-Sep-2015 22:00    674K
894-Comparisonofcubeattacksoverdi64256erentvect..> 15-Sep-2015 22:00    396K
894-Comparisonofcubeattacksoverdierentvectorspa..> 20-Jan-2023 08:22    396K
895-RogueDecryptionFailuresReconcilingAERobustn..> 15-Sep-2015 22:00    333K
896-ImprovedAttacksonReducedRoundCamellia128192..> 15-Sep-2015 22:00    825K
897-IntegrityAwareParallelizableCipherFeedbackM..> 15-Sep-2015 22:00    925K
898-SeriouslygetoffmycloudCrossVMRSAKeyRecovery..> 16-Sep-2015 22:00    393K
899-PrivacypreservingAttributeBasedSearchableEn..> 16-Sep-2015 22:00    736K
900-NewResultsonIdentitybasedEncryptionfromQuad..> 16-Sep-2015 22:00    154K
901-AUnifiedApproachtoMPCwithPreprocessingusing..> 16-Sep-2015 22:00    765K
902-DifferentialAnalysisonSimeckandSIMONwithDyn..> 20-Jan-2023 08:22    398K
902-DifferentialSecurityEvaluationofSimeckwithD..> 17-Sep-2015 22:00    373K
903-ANoteontheIndifferentiabilityofthe10RoundFe..> 17-Sep-2015 22:00    406K
904-AlmosttightIdentityBasedEncryptionagainstSe..> 17-Sep-2015 22:00    323K
905-MappingtheIntelLastLevelCache.pdf              17-Sep-2015 22:00    284K
906-RoadRunneRASmallAndFastBitsliceBlockCipherF..> 17-Sep-2015 22:00    535K
907-CryptographicAssumptionsAPositionPaper.pdf     17-Sep-2015 22:00    123K
908-LinearDistinguishersintheKeylessSettingAppl..> 17-Sep-2015 22:00    491K
909-OntheImpactofKnownKeyAttacksonHashFunctions..> 17-Sep-2015 22:00    865K
910-QANIZKArgumentsinAsymmetricGroupsNewToolsan..> 17-Sep-2015 22:00    634K
911-SecurityEvaluationonSimeckagainstZeroCorrel..> 22-Sep-2015 22:00    113K
912-ExtractionofintrinsicstructureforHardwareTr..> 22-Sep-2015 22:00      2M
913-FunctionalSigncryptionNotionConstructionand..> 22-Sep-2015 22:00    727K
914-ACryptographicAnalysisoftheTLS13HandshakePr..> 22-Sep-2015 22:00    825K
915-AGenericConstructionforVerifiableAttributeb..> 22-Sep-2015 22:00    809K
916-RigorousUpperBoundsonDataComplexitiesofBloc..> 22-Sep-2015 22:00    424K
917-PrivateProximityTestingonSteroidsAnNTRUbase..> 22-Sep-2015 22:00    263K
918-FindingStateCollisionsintheAuthenticatedEnc..> 22-Sep-2015 22:00    331K
919-PRAMODAPrivacyPreservingFrameworkforSupport..> 29-Sep-2015 22:00    412K
919-PrivacyPreservingDataManagementforOutsource..> 22-Sep-2015 22:00    383K
919-Privacypreservingcomputationwithtrustedcomp..> 20-Jan-2023 14:19     207
920-LeakageResilientIdentificationSchemesfromZe..> 22-Sep-2015 22:00    431K
921-IdentityBasedRevocationfromSubsetDifference..> 22-Sep-2015 22:00    279K
922-LocalisedMultisecretSharing.pdf                22-Sep-2015 22:00    331K
923-DYNAMICKEYAGGREGATECRYPTOSYSTEMONELLIPTICCU..> 22-Sep-2015 22:00    721K
924-MaskingLargeKeysinHardwareAMaskedImplementa..> 22-Sep-2015 22:00    850K
925-ExploitingtheOrderofMultiplierOperandsALowC..> 22-Sep-2015 22:00    505K
925-ExploitingtheOrderofMultiplierOperandsaLowC..> 27-Nov-2015 23:00      3M
926-CRITERIONOFMAXIMALPERIODOFATRINOMIALOVERNON..> 25-Sep-2015 22:00    295K
927-RichQueriesonEncryptedDataBeyondExactMatche..> 26-Sep-2015 22:00    605K
928-HLDCAWSNHomomorphicLightweightDataConfident..> 27-Sep-2015 22:00    508K
929-AreyouTheOnetoShareSecretTransferwithAccess..> 27-Sep-2015 22:00    362K
930-NearlySparseLinearAlgebra.pdf                  27-Sep-2015 22:00    381K
930-NearlySparseLinearAlgebraandapplicationtoDi..> 20-Jan-2023 08:22    557K
931-FastandSecureThreepartyComputationTheGarble..> 27-Sep-2015 22:00    458K
932-UsingTweaksToDesignFaultResistantCiphers.pdf   27-Sep-2015 22:00    395K
933-CryptanalysisofProvablySecureCerticatelessS..> 27-Sep-2015 22:00     77K
934-CryptanalysisoftheNewCLTMultilinearMaps.pdf    27-Sep-2015 22:00    334K
935-JointDataandKeyDistributionofSimpleMultiple..> 20-Jan-2023 08:22    474K
935-JointDataandKeyDistributionoftheLinearCrypt..> 28-Sep-2015 22:00    473K
936-APrivacyPreservingImprovementforSRTAinTelec..> 28-Sep-2015 22:00    651K
937-EndtoendDesignofaPUFbasedPrivacyPreservingA..> 28-Sep-2015 22:00    843K
938-LatticeBasedCryptographyforBeginners.pdf       28-Sep-2015 22:00    606K
939-ADecadeofLatticeCryptography.pdf               28-Sep-2015 22:00    664K
940-SecureAssociationfortheInternetofThings.pdf    28-Sep-2015 22:00      2M
941-CryptanalysisoftheNewMultilinearMapovertheI..> 28-Sep-2015 22:00    474K
942-BallotsecrecySecuritydefinitionsufficientco..> 20-Jan-2023 08:22    472K
942-Secrecyandindependenceforelectionschemes.pdf   28-Sep-2015 22:00    405K
943-Sandy2xNewCurve25519SpeedRecords.pdf           28-Sep-2015 22:00    361K
944-NewComplexityTradeOffsfortheMultipleNumberF..> 28-Sep-2015 22:00    469K
945-SecureSetbasedPolicyCheckingandItsApplicati..> 28-Sep-2015 22:00    475K
946-AsymmetricproofofworkbasedontheGeneralizedB..> 28-Sep-2015 22:00    411K
946-EquihashAsymmetricProofofWorkBasedontheGene..> 20-Jan-2023 08:22    469K
947-WeaveElGamalEncryptionforSecureOutsourcingA..> 28-Sep-2015 22:00    723K
948-AProvablySecureShortSignatureSchemefromCodi..> 28-Sep-2015 22:00    440K
949-PrivateProcessingofOutsourcedNetworkFunctio..> 30-Sep-2015 22:00      1M
950-ACompilerofTwoPartyProtocolsforComposablean..> 30-Sep-2015 22:00    151K
951-NearlyOptimalRobustSecretSharing.pdf           30-Sep-2015 22:00    346K
952-CommitmentandObliviousTransferintheBoundedS..> 01-Oct-2015 22:00    358K
953-GaussianSamplingPrecisionandInformationLeak..> 05-Oct-2015 22:00    120K
953-GaussianSamplingPrecisioninLatticeCryptogra..> 23-Nov-2015 23:00    141K
953-LeakagefromGaussianQuantisationandtheTiming..> 01-Oct-2015 22:00    114K
953-LeakagefromGaussianQuantisationandtheTiming..> 02-Oct-2015 22:00    118K
954-OnlineOfflineHomomorphicSignaturesforPolyno..> 01-Oct-2015 22:00    374K
955-OnthePowerofPairEncodingsFrameworksforPredi..> 01-Oct-2015 22:00    830K
956-AnalysisoftheKupyna256HashFunction.pdf         01-Oct-2015 22:00    335K
957-DelegatingRAMComputations.pdf                  02-Oct-2015 22:00    448K
958-BuildingSingleKeyBeyondBirthdayBoundMessage..> 20-Jan-2023 14:19     207
958-OnekeyDoubleSumMACwithBeyondBirthdaySecurit..> 02-Oct-2015 22:00    703K
959-CryptanalysisoftheRoundReducedKupynaHashFun..> 02-Oct-2015 22:00      1M
960-MoreEfficientSecureOutsourcingMethodsforBil..> 05-Oct-2015 22:00    731K
961-ShortStructurePreservingSignatures.pdf         05-Oct-2015 22:00    262K
962-SOMEREMARKSONTHELOGARITHMICSIGNATURESOFFINI..> 06-Oct-2015 22:00    280K
963-WhenOrganizedCrimeAppliesAcademicResultsAFo..> 06-Oct-2015 22:00     12M
964-ImprovedLinearhullCryptanalysisofRoundreduc..> 08-Oct-2015 22:00    290K
964-LinearhullCryptanalysisofRoundreducedVersio..> 22-Oct-2015 22:00    318K
965-PrivateGenomeAnalysisthroughHomomorphicEncr..> 08-Oct-2015 22:00    461K
966-VulnerabilitiesofMcElieceintheWorldofEscher..> 09-Oct-2015 22:00    352K
966-VulnerabilitiesofMcElieceintheWorldofEscher..> 20-Jan-2023 08:22    364K
967-FreestartcollisionforfullSHA1.pdf              20-Jan-2023 08:22    377K
967-FreestartcollisiononfullSHA1.pdf               09-Oct-2015 22:00    417K
968-DifferentialandLinearCryptanalysisofARXwith..> 09-Oct-2015 22:00    392K
968-ImprovedDifferentialLinearCryptanalysisof7r..> 20-Jan-2023 08:22    409K
969-ZeroKnowledgeInteractiveProofSystemsforNewL..> 09-Oct-2015 22:00    396K
970-MultilinearMapsovertheIntegersUsingModulusS..> 09-Oct-2015 22:00    199K
971-AttacksonSearchRLWE.pdf                        09-Oct-2015 22:00    477K
971-AttacksontheSearchRLWEproblemwithsmallerror..> 20-Jan-2023 08:22    493K
972-CutDowntheTreetoAchieveConstantComplexityin..> 09-Oct-2015 22:00    578K
973-SomeCryptanalyticResultsonZipperHashandConc..> 09-Oct-2015 22:00    435K
974-TheConjoinedMicroprocessor.pdf                 11-Oct-2015 22:00    639K
975-ExtendedFunctionalityinVerifiableSearchable..> 12-Oct-2015 22:00    534K
976-OnReverseEngineeringSBoxeswithHiddenDesignC..> 12-Oct-2015 22:00    939K
977-FasterpointscalarmultiplicationonNISTellipt..> 12-Oct-2015 22:00    422K
978-TheOPTLSProtocolandTLS13.pdf                   12-Oct-2015 22:00    169K
979-GuidelinesforUsingtheCryptDBSystemSecurely.pdf 13-Oct-2015 22:00    128K
979-GuidelinesforUsingtheCryptDBSystemsSecurely..> 12-Oct-2015 22:00    128K
980-AnalysisofanRFIDAuthenticationProtocolinAcc..> 12-Oct-2015 22:00      1M
981-SearchingandSortingofFullyHomomorphicEncryp..> 12-Oct-2015 22:00    552K
982-Anoteonconstructionsofbentfunctionsfrominvo..> 12-Oct-2015 22:00    249K
983-Fastuniformandcompactscalarmultiplicationfo..> 12-Oct-2015 22:00    439K
984-ComplexityofECDLPundertheFirstFallDegreeAss..> 12-Oct-2015 22:00    218K
985-Polynomialtimereductionfrom3SATtosolvinglow..> 12-Oct-2015 22:00    162K
986-BitCoincidenceMiningAlgorithm.pdf              12-Oct-2015 22:00    237K
987-BlazingFast2PCintheOfflineOnlineSettingwith..> 13-Oct-2015 22:00    488K
988-ImprovedLinearCryptanalysisofreducedroundSI..> 13-Oct-2015 22:00    531K
989-FastObliviousAESAdecicatedapplicationoftheM..> 13-Oct-2015 22:00    494K
989-FastObliviousAESAdedicatedapplicationoftheM..> 14-Oct-2015 22:00    494K
990-EncryptionSwitchingProtocols.pdf               13-Oct-2015 22:00    972K
991-Ed3363HighFiveAnalternativeEllipticCurve.pdf   13-Oct-2015 22:00     99K
992-MultilinearMapviaScaleInvariantFHEEnhancing..> 13-Oct-2015 22:00    980K
993-BiDeniableInnerProductEncryptionfromLWE.pdf    13-Oct-2015 22:00    480K
994-AnEfficientSchemetoReduceSideChannelLeakage..> 13-Oct-2015 22:00    669K
995-UpdatesonSortingofFullyHomomorphicEncrypted..> 14-Oct-2015 22:00    220K
996-MultiuserSchnorrsecurityrevisited.pdf          14-Oct-2015 22:00    323K
997-IncrementalProgramObfuscation.pdf              14-Oct-2015 22:00    484K
998-AllorNothingatAll.pdf                          14-Oct-2015 22:00    300K
999-ImprovedMaskingforTweakableBlockcipherswith..> 14-Oct-2015 22:00    797K