Index of /2015/
../
001-AnoteonthesecurityofHigherOrderThresholdImp..> 06-Jan-2015 13:36 166K
002-CharacterizationofMDSmappings.pdf 06-Jan-2015 13:05 56K
003-ContinuousNonMalleableKeyDerivationandItsAp..> 06-Jan-2015 13:05 513K
004-ObliviousPolynomialEvaluationandSecureSetIn..> 06-Jan-2015 13:05 271K
005-OnionORAMAConstantBandwidthBlowupObliviousR..> 08-Jun-2015 22:00 495K
005-OnionORAMAConstantBandwidthORAMusingAdditiv..> 24-Feb-2015 23:00 487K
005-OnionORAMAConstantBandwidthandConstantClien..> 06-Jan-2015 13:05 519K
006-TwoServerPasswordAuthenticatedSecretSharing..> 06-Jan-2015 13:05 597K
007-BalloonAForwardSecureAppendOnlyPersistentAu..> 06-Jan-2015 13:05 364K
008-PostQuantumForwardSecureOnionRoutingFutureA..> 28-Jan-2015 23:00 461K
008-PostQuantumSecureOnionRoutingFutureAnonymit..> 06-Jan-2015 13:05 457K
009-RigAsimplesecureandflexibledesignforPasswor..> 07-Jan-2015 23:00 542K
010-SimulationbasedSelectiveOpeningCCASecurityf..> 07-Jan-2015 23:00 616K
011-BlockCipherSpeedandEnergyEfficiencyRecordso..> 08-Jan-2015 23:00 7M
012-CryptanalysisofaSomewhatAdditivelyHomomorph..> 12-Jan-2015 23:00 430K
013-LowNoiseLPNKDMSecurePublicKeyEncryptionandS..> 12-Jan-2015 23:00 404K
014-GroupSignaturesfromLatticesSimplerTighterSh..> 12-Jan-2015 23:00 610K
015-OneRoundKeyExchangewithStrongSecurityAnEffi..> 12-Jan-2015 23:00 469K
016-EfficientStaticallySecureLargeUniverseMulti..> 12-Jan-2015 23:00 451K
017-SimpleFunctionalEncryptionSchemesforInnerPr..> 12-Jan-2015 23:00 353K
018-ALINEARATTACKONAKEYEXCHANGEPROTOCOLUSINGEXT..> 14-Jan-2015 23:00 108K
018-AlinearattackonKahrobaeiLamShpilrainkeyexch..> 12-Jan-2015 23:00 106K
019-StronglyOptimalStructurePreservingSignature..> 12-Jan-2015 23:00 370K
020-SimplerEfficientGroupSignaturesfromLattices..> 12-Jan-2015 23:00 630K
021-NonMalleableCondensersforArbitraryMinEntrop..> 12-Jan-2015 23:00 563K
022-TMSUIATrustManagementSchemeofUSBStorageDevi..> 12-Jan-2015 23:00 771K
023-MultilinearMapsUsingIdealLatticeswithoutEnc..> 12-Jan-2015 23:00 224K
024-NonAbelianAnalogsofLatticeRounding.pdf 12-Jan-2015 23:00 417K
025-ObfuscatingCircuitsviaCompositeOrderGradedE..> 14-Jan-2015 23:00 542K
026-AMoreExplicitFormulaforLinearProbabilitieso..> 14-Jan-2015 23:00 510K
027-OntheRegularityofLossyRSAImprovedBoundsandA..> 14-Jan-2015 23:00 170K
028-OptimalsoftwareimplementedItohTsujiiinversi..> 14-Jan-2015 23:00 877K
029-PredicateEncryptionforCircuitsfromLWE.pdf 14-Jan-2015 23:00 514K
030-CryptanalysisofAscon.pdf 14-Jan-2015 23:00 341K
031-TightParallelRepetitionTheoremsforPublicCoi..> 14-Jan-2015 23:00 181K
032-ConstrainedKeyHomomorphicPRFsfromStandardLa..> 14-Jan-2015 23:00 492K
033-OntheSecurityofFreshRekeyingtoCounteractSid..> 15-Jan-2015 23:00 255K
034-SuitupMadetoMeasureHardwareImplementationso..> 15-Jan-2015 23:00 379K
035-CryptographicallySecureCRCforLightweightMes..> 15-Jan-2015 23:00 127K
036-Fastersoftwareforfastendomorphisms.pdf 15-Jan-2015 23:00 415K
037-AnalysisandEnhancementofDesynchronizationAt..> 15-Jan-2015 23:00 126K
038-AggregatablePseudorandomFunctionsandConnect..> 15-Jan-2015 23:00 562K
038-AggregatePseudorandomFunctionsandConnection..> 16-Jan-2015 23:00 562K
039-TypeBasedVerificationofElectronicVotingProt..> 17-Jan-2015 23:00 343K
040-AutomatedDynamicCubeAttackonBlockCiphersCry..> 17-Jan-2015 23:00 401K
041-ParallelprobablelockfreeHashSieveapractical..> 17-Jan-2015 23:00 547K
042-HighPerformanceLatticebasedCCAsecureEncrypt..> 17-Jan-2015 23:00 600K
043-GroupSignaturewithDeniabilityHowtoDisavowaS..> 20-Jan-2015 23:00 180K
044-UseofSIMDBasedDataParallelismtoSpeedupSievi..> 20-Jan-2015 23:00 219K
045-ReliableInformationExtractionforSingleTrace..> 20-Jan-2015 23:00 1M
046-OntheconcretehardnessofLearningwithErrors.pdf 20-Jan-2015 23:00 526K
047-LinearlyHomomorphicEncryptionSchemefromDDH.pdf 22-Jan-2015 23:00 451K
047-LinearlyHomomorphicEncryptionfromDDH.pdf 26-Jan-2015 23:00 451K
048-OnObfuscationwithRandomOracles.pdf 22-Jan-2015 23:00 238K
049-OnSolvingLpnusingBKWandVariants.pdf 22-Jan-2015 23:00 300K
050-StretchingGrothSahaiNIZKProofsofPartialSati..> 22-Jan-2015 23:00 443K
051-ImprovedMeetintheMiddleDistinguisheronFeist..> 22-Jan-2015 23:00 1M
052-InteractiveMessageLockedEncryptionandSecure..> 22-Jan-2015 23:00 504K
053-TightBoundsforKeyedSpongesandTruncatedCBC.pdf 22-Jan-2015 23:00 562K
054-NoncommittingencryptionfromPhihiding.pdf 23-Jan-2015 23:00 432K
055-RicherEfficiencySecurityTradeoffsin2PC.pdf 23-Jan-2015 23:00 518K
056-BetterAlgorithmsforLWEandLWR.pdf 23-Jan-2015 23:00 377K
057-ColdBootAttacksintheDiscreteLogarithmSettin..> 26-Jan-2015 23:00 450K
058-UniversallyVerifiableMultipartyComputationf..> 26-Jan-2015 23:00 608K
059-SecurityofSymmetricEncryptioninthePresenceo..> 26-Jan-2015 23:00 417K
060-VerifiedProofsofHigherOrderMasking.pdf 27-Jan-2015 23:00 544K
061-MoreEfficientObliviousTransferExtensionswit..> 27-Jan-2015 23:00 934K
062-EvaluationandCryptanalysisofthePandakaLight..> 27-Jan-2015 23:00 173K
063-CamlCrushAPKCS11FilteringProxy.pdf 29-Jan-2015 23:00 197K
064-OptimallyEfficientMultiPartyFairExchangeand..> 29-Jan-2015 23:00 637K
065-AlightweightfriendlymodifcationofGOSTblockc..> 29-Jan-2015 23:00 273K
066-ArithmeticAdditionoverBooleanMaskingTowards..> 29-Jan-2015 23:00 1M
067-AnAlternativeApproachtoNonblackboxSimulatio..> 29-Jan-2015 23:00 200K
067-NonblackboxSimulationintheFullyConcurrentSe..> 20-Jan-2023 08:25 270K
068-AGenericApproachtoInvariantSubspaceAttacksC..> 29-Jan-2015 23:00 446K
069-OntheProvableSecurityoftheIteratedEvenManso..> 29-Jan-2015 23:00 711K
070-TheSumCanBeWeakerThanEachPart.pdf 10-Feb-2015 23:00 419K
071-FactoringNprqsforLargerands.pdf 10-Feb-2015 23:00 395K
072-NonInteractiveZeroKnowledgeProofsofNonMembe..> 10-Feb-2015 23:00 472K
073-ObliviousNetworkRAM.pdf 10-Feb-2015 23:00 412K
073-ObliviousNetworkRAMandLeveragingParallelism..> 20-Jan-2023 08:25 540K
074-MindtheGapModularMachinecheckedProofsofOneR..> 10-Feb-2015 23:00 680K
075-EquivalentKeyRecoveryAttacksagainstHMACandN..> 10-Feb-2015 23:00 375K
076-FullyStructurePreservingSignaturesandShrink..> 10-Feb-2015 23:00 516K
077-OntheExistenceandConstructionsofVectorialBo..> 10-Feb-2015 23:00 352K
077-OnthePrimaryConstructionsofVectorialBoolean..> 23-Aug-2015 22:00 523K
078-FullyHomomorphicEncryptionfromRingLWE65306I..> 10-Feb-2015 23:00 258K
078-FullyHomomorphicEncryptionfromRingLWEIdenti..> 20-Jan-2023 08:25 258K
079-OntheSecurityoftheCOPAandMarbleAuthenticate..> 10-Feb-2015 23:00 265K
080-TheFairyRingDancePasswordAuthenticatedKeyEx..> 10-Feb-2015 23:00 381K
081-AmortizingGarbledCircuits.pdf 10-Feb-2015 23:00 649K
082-OntheDifficultyofSecuringWebApplicationsusi..> 11-Feb-2015 23:00 246K
083-KeyRecoveryAttackagainstanNTRUtypeSomewhatH..> 14-Feb-2015 23:00 249K
083-KeyRecoveryAttacksagainstNTRUbasedSomewhatH..> 08-May-2015 22:00 386K
084-OntheDisadvantagesofPairingbasedCryptograph..> 14-Feb-2015 23:00 254K
085-OnthebehaviorsofaffineequivalentSboxesregar..> 14-Feb-2015 23:00 620K
086-PracticalCompactECashwithArbitraryWalletSiz..> 14-Feb-2015 23:00 390K
087-RevisitingCryptographicAccumulatorsAddition..> 14-Feb-2015 23:00 501K
088-StructuralWeaknessesintheOpenSmartGridProto..> 14-Feb-2015 23:00 304K
089-OnthesecuritymarginofMACstriping.pdf 16-Feb-2015 23:00 276K
090-StructuralEvaluationbyGeneralizedIntegralPr..> 16-Feb-2015 23:00 561K
091-RelatedKeyForgeriesforPrstOTR.pdf 16-Feb-2015 23:00 312K
092-TOWARDSTHEGENERATIONOFADYNAMICKEYDEPENDENTS..> 23-Feb-2015 23:00 308K
093-GeneralizationofStatisticalCriteriaforSboxe..> 23-Feb-2015 23:00 80K
094-SomeNewResultsonBinaryPolynomialMultiplicat..> 23-Feb-2015 23:00 334K
095-RotationalCryptanalysisofARXRevisited.pdf 23-Feb-2015 23:00 365K
096-AMeetintheMiddleAttackonReducedRoundKuznyec..> 18-Apr-2015 22:00 369K
096-MeetintheMiddleAttacksonReducedRoundKuznyec..> 23-Feb-2015 23:00 514K
097-SurreptitiouslyWeakeningCryptographicSystem..> 23-Feb-2015 23:00 399K
098-AdaptiveIDSecureRevocableIdentityBasedEncry..> 23-Feb-2015 23:00 674K
099-UniversallyComposableFirewallArchitecturesu..> 23-Feb-2015 23:00 342K
100-InfluenceofElectricalCircuitsofECCDesignson..> 23-Feb-2015 23:00 506K
1000-FactoringasaService.pdf 15-Oct-2015 22:00 412K
1001-DismantlingrealworldECCwithHorizontalandVe..> 15-Oct-2015 22:00 2M
1002-gotHWcryptoOntheinsecurityofaSelfEncryptin..> 15-Oct-2015 22:00 2M
1003-Resultsonpolynomialinterpolationwithmixedm..> 16-Oct-2015 22:00 300K
1004-SecurityAnalysisofCryptosystemsUsingShortG..> 16-Oct-2015 22:00 504K
1005-CryptanalysisofYasudaTakagiandSakurai39sSi..> 20-Jan-2023 08:21 359K
1005-CryptanalysisofYasudaTakagiandSakuraisSign..> 16-Oct-2015 22:00 359K
1006-ConfidentialBenchmarkingbasedonMultipartyC..> 16-Oct-2015 22:00 446K
1007-HowtoVotePrivatelyUsingBitcoin.pdf 16-Oct-2015 22:00 306K
1008-ProvisionsPrivacypreservingproofsofsolvenc..> 19-Oct-2015 22:00 467K
1009-ApplicationsofKeyRecoveryCubeattacklike.pdf 19-Oct-2015 22:00 494K
101-MultiKeySecurityTheEvenMansourConstructionR..> 23-Feb-2015 23:00 186K
1010-TWORAMRoundOptimalObliviousRAMwithApplicat..> 19-Oct-2015 22:00 543K
1011-HierarchicalFunctionalEncryption.pdf 19-Oct-2015 22:00 507K
1012-AnEfficientMultiplePKGCompatibleIdentityBa..> 20-Jan-2023 08:21 411K
1012-AnEfficientMultiplePKGCompatibleIdentityBa..> 19-Oct-2015 22:00 420K
1013-InceptionMakesNonmalleableCodesStronger.pdf 19-Oct-2015 22:00 419K
1014-FastFourierOrthogonalization.pdf 19-Oct-2015 22:00 610K
1015-OnBitcoinasapublicrandomnesssource.pdf 19-Oct-2015 22:00 427K
1016-LiftingtheSecurityofNIMACBeyondBirthdayBou..> 21-Oct-2015 22:00 404K
1016-OneKeyCompressionFunctionBasedMACwithSecur..> 20-Jan-2023 08:21 521K
1017-FunctionalEncryptionDecentralisedandDelega..> 21-Oct-2015 22:00 454K
1018-ARiddleWrappedinanEnigma.pdf 21-Oct-2015 22:00 203K
1019-SpeedSecurityTradeoffsinBlockchainProtocol..> 23-Oct-2015 22:00 454K
102-GCMSIVFullNonceMisuseResistantAuthenticated..> 23-Feb-2015 23:00 393K
1020-AttackingtheNetworkTimeProtocol.pdf 23-Oct-2015 22:00 1M
1021-NewProofTechniquesforDLINBasedAdaptivelySe..> 20-Jan-2023 08:21 401K
1021-NewProofTechniquesforDLINBasedAdaptivelySe..> 23-Oct-2015 22:00 363K
1022-Recentprogressontheellipticcurvediscretelo..> 23-Oct-2015 22:00 327K
1023-IndistinguishabilityObfuscationforTuringMa..> 20-Jan-2023 08:21 321K
1023-IndistinguishabilityObfuscationwithConstan..> 23-Oct-2015 22:00 553K
1024-ParallelImplementationofNumberTheoreticTra..> 23-Oct-2015 22:00 99K
1025-PAGESPAGESandPAGESThreeFamiliesofBlockCiph..> 26-Oct-2015 23:00 261K
1026-HardnessEstimationofLWEviaBandPruning.pdf 26-Oct-2015 23:00 235K
1027-ExtendedTowerNumberFieldSieveANewComplexit..> 26-Oct-2015 23:00 316K
1027-ExtendedTowerNumberFieldSieveANewComplexit..> 20-Jan-2023 08:21 466K
1028-RevivingtheIdeaofIncrementalCryptographyfo..> 26-Oct-2015 23:00 2M
1029-TheEnergyBudgetforWirelessSecurityExtended..> 26-Oct-2015 23:00 181K
103-MergeableFunctionalEncryption.pdf 23-Feb-2015 23:00 405K
1030-SECONDCOORDINATESEQUENCEOFMPLRSOVERNONTRIV..> 26-Oct-2015 23:00 275K
1031-SecureDatingwithFourorFewerCards.pdf 26-Oct-2015 23:00 156K
1032-EssentiallyOptimalRobustSecretSharingwithM..> 26-Oct-2015 23:00 604K
1033-TheUltimateTranspositionCipherUTC.pdf 27-Oct-2015 23:00 323K
1034-Realtimedetectionofcachebasedsidechannelat..> 27-Oct-2015 23:00 3M
1035-CARIBEAdaptingTraditionalIBEfortheModernKe..> 28-Oct-2015 23:00 377K
1035-CARIBECascadedIBEforMaximumFlexibilityandU..> 20-Jan-2023 08:21 442K
1036-PattersonWiedemanntypefunctionson21variabl..> 28-Oct-2015 23:00 236K
1037-CryptanalysisofGGH15MultilinearMaps.pdf 28-Oct-2015 23:00 214K
1038-RevisitingLEGOsOptimizationsAnalysisandthe..> 28-Oct-2015 23:00 763K
1039-MaturityandPerformanceofProgrammableSecure..> 28-Oct-2015 23:00 564K
104-WeakeningtheIsolationAssumptionofTamperproo..> 23-Feb-2015 23:00 328K
1040-FullyHomomorphicEncryptionwithCompositeNum..> 28-Oct-2015 23:00 1M
1041-TheNumberofBooleanFunctionswithMultiplicat..> 28-Oct-2015 23:00 314K
1042-ARMedSPHINCSComputinga41KBsignaturein16KBo..> 28-Oct-2015 23:00 513K
1043-TheIndexjinRC4isnotPseudorandomduetoNonexi..> 28-Oct-2015 23:00 168K
1044-Homomorphicevaluationrequiresdepth.pdf 28-Oct-2015 23:00 263K
1045-ExploitingTransformationsoftheGaloisConfig..> 29-Oct-2015 23:00 494K
1046-FromPrivateSimultaneousMessagestoZeroInfor..> 29-Oct-2015 23:00 368K
1047-ReconfigurableCryptographyAflexibleapproac..> 29-Oct-2015 23:00 536K
1048-VerifiableRandomFunctionsfromStandardAssum..> 29-Oct-2015 23:00 467K
1049-CounterinTweakAuthenticatedEncryptionModes..> 29-Oct-2015 23:00 661K
105-InnerProductMaskingRevisited.pdf 24-Feb-2015 23:00 535K
1050-ComparisonBetweenIrreducibleandSeparableGo..> 30-Oct-2015 23:00 1M
1051-CryptanalysisandImprovementofIdentitybased..> 30-Oct-2015 23:00 103K
1052-PLayPUFProgrammableLogicallyErasablePUFsfo..> 30-Oct-2015 23:00 1M
1053-ObliviousParallelRAMImprovedEfficiencyandG..> 30-Oct-2015 23:00 457K
1054-ComputationalSoundnessofUniformityProperti..> 30-Oct-2015 23:00 248K
1055-MakingtheBestofaLeakySituationZeroKnowledg..> 30-Oct-2015 23:00 512K
1056-InformationtheoreticLocalNonmalleableCodes..> 30-Oct-2015 23:00 533K
1057-TheComplexityofComputingtheOptimalComposit..> 30-Oct-2015 23:00 415K
1058-RationalSumchecks.pdf 30-Oct-2015 23:00 361K
1059-AGeneralFrameworkforRedactableSignaturesan..> 30-Oct-2015 23:00 466K
106-ProvablyweakinstancesofRingLWE.pdf 24-Feb-2015 23:00 430K
1060-Completeadditionformulasforprimeorderellip..> 30-Oct-2015 23:00 371K
1061-OnBasingCryptographyonNPhardnessTheCaseofS..> 30-Oct-2015 23:00 145K
1061-OnBasingPrivateInformationRetrievalonNPHar..> 03-Nov-2015 23:00 119K
1062-LowerBoundsonAssumptionsbehindIndistinguis..> 30-Oct-2015 23:00 469K
1063-OptimalComputationalSplitstateNonmalleable..> 30-Oct-2015 23:00 722K
1064-DjQEncoreUnPetitIBE.pdf 02-Nov-2015 23:00 111K
1065-BucketORAMSingleOnlineRoundtripConstantBan..> 02-Nov-2015 23:00 551K
1066-CryptanalysisofAPrivacyPreservingSmartMete..> 02-Nov-2015 23:00 270K
1067-PublicVerifiabilityintheCovertModelAlmostf..> 03-Nov-2015 23:00 745K
1068-BlackBoxParallelGarbledRAM.pdf 03-Nov-2015 23:00 444K
1069-FeistelNetworksIndifferentiabilityat8Round..> 03-Nov-2015 23:00 1M
1069-Indifferentiabilityof8RoundFeistelNetworks..> 17-Dec-2015 23:00 720K
107-DynamicSearchableSymmetricEncryptionwithMin..> 24-Feb-2015 23:00 454K
1070-BarrierstoBlackBoxConstructionsofTraitorTr..> 04-Nov-2015 23:00 430K
1071-FairnessinSecureTwoPartyComputationwithRat..> 05-Nov-2015 23:00 288K
1071-RevisitingSecureTwoPartyComputationwithRat..> 20-Jan-2023 08:21 368K
1072-QuantumOneTimeMemoriesfromStatelessHardwar..> 05-Nov-2015 23:00 309K
1073-PracticalWitnessEncryptionforAlgebraicLang..> 05-Nov-2015 23:00 492K
1073-PracticalWitnessEncryptionforAlgebraicLang..> 20-Jan-2023 08:21 474K
1074-SuccinctAdaptiveGarbledRAM.pdf 05-Nov-2015 23:00 506K
1075-Cybersecurityinanerawithquantumcomputerswi..> 05-Nov-2015 23:00 63K
1076-AnappendixforarecentpaperofKim.pdf 05-Nov-2015 23:00 223K
1077-FaultAnalysisontheStreamCiphersLILI128andA..> 05-Nov-2015 23:00 195K
1078-OntheExactCryptographicHardnessofFindingaN..> 06-Nov-2015 23:00 491K
1078-RevisitingtheCryptographicHardnessofFindin..> 20-Jan-2023 08:21 504K
1079-DeBruijnSequencesfromSymmetricShiftRegiste..> 06-Nov-2015 23:00 298K
108-TRACINGATTACKSONUPROVEWITHREVOCATIONMECHANI..> 24-Feb-2015 23:00 406K
1080-VARIATIONSTOTHECRYPTOGRAPHICSALGORITHMSAES..> 09-Nov-2015 23:00 254K
1080-VariationstothecryptographicsalgorithmsAES..> 20-Jan-2023 08:21 243K
1081-NEONPQCrytoFastandParallelRingLWEEncryptio..> 09-Nov-2015 23:00 288K
1082-DelegatingRAMComputationswithAdaptiveSound..> 09-Nov-2015 23:00 724K
1083-ImplementationAttacksonPostQuantumCryptogr..> 09-Nov-2015 23:00 260K
1084-PatchableIndistinguishabilityObfuscationiO..> 20-Jan-2023 08:21 739K
1084-PatchableObfuscation.pdf 09-Nov-2015 23:00 715K
1085-MaliciousKeccak.pdf 09-Nov-2015 23:00 239K
1086-ChickenortheEggComputationalDataAttacksorP..> 09-Nov-2015 23:00 3M
1087-EfficientSignatureSchemesfromRLWE.pdf 09-Nov-2015 23:00 610K
1088-NoteontheRKAsecurityofContinuouslyNonMalle..> 09-Nov-2015 23:00 254K
1089-LinearSecretSharingSchemesfromErrorCorrect..> 09-Nov-2015 23:00 370K
1090-DoDistributedDifferentiallyPrivateProtocol..> 10-Nov-2015 23:00 555K
1091-ConstructionfordeBruijnSequenceswithLargeO..> 10-Nov-2015 23:00 338K
1092-Postquantumkeyexchangeanewhope.pdf 10-Nov-2015 23:00 549K
1093-CemptysetCemptysetAFrameworkforBuildingCom..> 20-Jan-2023 08:21 998K
1093-HowtoUseSNARKsinUniversallyComposableProto..> 10-Nov-2015 23:00 445K
1094-AffinemalleableExtractorsSpectrumDoublinga..> 10-Nov-2015 23:00 464K
1095-NonMalleableMultiProverInteractiveProofsan..> 20-Jan-2023 08:21 731K
1095-WitnessSignaturesandNonMalleableMultiProve..> 10-Nov-2015 23:00 682K
1096-WatermarkingCryptographicCapabilities.pdf 10-Nov-2015 23:00 281K
1097-OntheCommunicationrequiredforUnconditional..> 11-Nov-2015 23:00 384K
1098-RingSIgnatureConfidentialTransactionsforMo..> 11-Nov-2015 23:00 345K
1098-RingSignatureConfidentialTransactionsforMo..> 17-Dec-2015 23:00 489K
1099-DeviceEnhancedPasswordProtocolswithOptimal..> 12-Nov-2015 23:00 383K
110-sHMQVAnEfficientKeyExchangeProtocolforPower..> 24-Feb-2015 23:00 343K
1100-AreaEfficientHardwareImplementationoftheOp..> 14-Nov-2015 23:00 655K
1101-VirtualSmartCardsHowtoSignwithaPasswordand..> 14-Nov-2015 23:00 640K
1102-APracticalCryptanalysisoftheAlgebraicErase..> 14-Nov-2015 23:00 247K
1103-Linearcodeswithfewweightsfromweaklyregular..> 14-Nov-2015 23:00 338K
1104-ComputingJacobi39sthetainquasilineartime.pdf 20-Jan-2023 08:21 572K
1104-ComputingJacobisthetainquasilineartime.pdf 14-Nov-2015 23:00 571K
1105-SeleneVotingwithTransparentVerifiabilityan..> 14-Nov-2015 23:00 324K
1106-POPEPartialOrderPreservingEncoding.pdf 18-Nov-2015 23:00 618K
1107-ConcurrentSecureComputationviaNonBlackBoxS..> 18-Nov-2015 23:00 510K
1108-RecommenderSystemsandtheirSecurityConcerns..> 18-Nov-2015 23:00 549K
1109-EfficientandLowcomplexityHardwareArchitect..> 18-Nov-2015 23:00 745K
111-TheMultivariateHiddenNumberProblem.pdf 24-Feb-2015 23:00 315K
1110-PrivacyAwareAuthenticationintheInternetofT..> 18-Nov-2015 23:00 664K
1111-ComparisonofTEROcellimplementationsandchar..> 18-Nov-2015 23:00 220K
1112-EfficientCulpablySoundNIZKShuffleArgumentw..> 18-Nov-2015 23:00 607K
1113-MultiInputFunctionalEncryptionwithUnbounde..> 18-Nov-2015 23:00 1M
1114-FasterarithmeticonellipticcurvesusingFp2Ap..> 18-Nov-2015 23:00 189K
1115-EfficientThresholdSecretSharingSchemesSecu..> 18-Nov-2015 23:00 458K
1116-CHfORAMAConstantCommunicationORAMwithoutHo..> 20-Jan-2023 08:21 464K
1116-ConstantCommunicationORAMwithoutEncryption..> 18-Nov-2015 23:00 411K
1117-EfficientimplementationofANDORandNOToperat..> 18-Nov-2015 23:00 421K
1118-BitslicedImplementationsofthePRINCELEDandR..> 18-Nov-2015 23:00 275K
1119-OnthePossibilityofNonInteractiveEVotingint..> 19-Nov-2015 23:00 418K
112-ReencryptionVeri64257abilityHowtoDetectMali..> 24-Feb-2015 23:00 227K
112-ReencryptionVeriabilityHowtoDetectMalicious..> 20-Jan-2023 08:25 227K
1120-EvenMorePracticalKeyExchangesfortheInterne..> 19-Nov-2015 23:00 398K
1121-OntheFirstFallDegreeofAlgebraicEquations.pdf 19-Nov-2015 23:00 427K
1121-OntheFirstFallDegreeofSummationPolynomials..> 27-Nov-2015 23:00 392K
1122-SchnorrSignaturesintheMultiUserSetting.pdf 19-Nov-2015 23:00 510K
1123-PracticalPredictableLatticeBasisReduction.pdf 19-Nov-2015 23:00 504K
1124-ALinearCodeanditsApplicationintoSecretShar..> 22-Nov-2015 23:00 316K
1124-SecretSharingSchemesBasedonResilientBoolea..> 20-Jan-2023 08:21 295K
1125-PracticalOrderRevealingEncryptionwithLimit..> 22-Nov-2015 23:00 171K
1126-APracticalObliviousMapDataStructurewithSec..> 22-Nov-2015 23:00 525K
1127-PseudoFreeFamiliesofFiniteComputationalEle..> 23-Nov-2015 23:00 186K
1128-Newdirectionsinnearestneighborsearchingwit..> 23-Nov-2015 23:00 703K
1129-LuckyMicrosecondsATimingAttackonAmazon39ss..> 20-Jan-2023 08:21 403K
1129-LuckyMicrosecondsATimingAttackonAmazonss2n..> 23-Nov-2015 23:00 399K
113-HowtoCompressHomomorphicCiphertexts.pdf 24-Feb-2015 23:00 547K
113-StreamciphersAPracticalSolutionforEfficient..> 29-Nov-2015 23:00 570K
1130-ANoteonPerfectCorrectnessbyDerandomization..> 26-Nov-2015 23:00 315K
1131-OntheUsabilityofTwoFactorAuthentication.pdf 26-Nov-2015 23:00 184K
1132-TighterSecurityforEfficientLatticeCryptogr..> 26-Nov-2015 23:00 462K
1132-TighterSecurityforEfficientLatticeCryptogr..> 20-Jan-2023 08:21 462K
1133-CommentonRealizationofascalableShoralgorit..> 26-Nov-2015 23:00 439K
1133-CommentonRealizationofascalableShoralgorit..> 20-Jan-2023 08:21 439K
1134-LambdacirclambdaAFunctionalLibraryforLatti..> 26-Nov-2015 23:00 542K
1134-LambdacirclambdaFunctionalLatticeCryptogra..> 20-Jan-2023 08:21 605K
1135-OntheSecurityoftheSchnorrSignatureSchemean..> 26-Nov-2015 23:00 137K
1136-MultiInputFunctionalEncryptionforUnbounded..> 26-Nov-2015 23:00 449K
1137-ANewFactoringAttackonMultiPrimeRSAwithSmal..> 26-Nov-2015 23:00 172K
1137-ImprovedFactoringAttacksonMultiPrimeRSAwit..> 20-Jan-2023 08:21 411K
1138-LightweightCRCbasedAuthentication.pdf 08-Dec-2015 23:00 330K
1138-LightweightCRCbasedMessageAuthentication.pdf 26-Nov-2015 23:00 330K
1139-SecretSharingSchemeswithGeneralAccessStruc..> 26-Nov-2015 23:00 403K
114-WeakIdealFunctionalitiesforDesigningRandomO..> 24-Feb-2015 23:00 110K
1140-ModularInversionHiddenNumberProblemALattic..> 26-Nov-2015 23:00 287K
1141-AmplifyingSideChannelsThroughPerformanceDe..> 26-Nov-2015 23:00 384K
1142-MidoriABlockCipherforLowEnergyExtendedVers..> 27-Nov-2015 23:00 565K
1143-AMultiBitFullyHomomorphicEncryptionwithSho..> 27-Nov-2015 23:00 295K
1144-MitigatingServerBreachesinPasswordBasedAut..> 27-Nov-2015 23:00 400K
1145-LatticeAttacksontheDGHVHomomorphicEncrypti..> 27-Nov-2015 23:00 397K
1146-libgroupsigAnextensibleClibraryforgroupsig..> 27-Nov-2015 23:00 285K
1147-CollusionResistantAggregationfromConvertib..> 27-Nov-2015 23:00 433K
1148-AnInversefreeSingleKeyedTweakableEncipheri..> 27-Nov-2015 23:00 501K
1149-AnAsymptoticallyOptimalMethodforConverting..> 27-Nov-2015 23:00 415K
115-ComprehensiveEfficientImplementationsofECCo..> 24-Feb-2015 23:00 666K
1150-FromStatelesstoStatefulGenericAuthenticati..> 29-Nov-2015 23:00 416K
1151-FullyLeakageResilientCodes.pdf 29-Nov-2015 23:00 464K
1152-PrivacypreservingFriendshipbasedRecommende..> 29-Nov-2015 23:00 5M
1153-OblivCALanguageforExtensibleDataObliviousC..> 30-Nov-2015 23:00 195K
1154-NORX8andNORX16AuthenticatedEncryptionforLo..> 30-Nov-2015 23:00 261K
1155-CrossProcessorCacheAttacks.pdf 30-Nov-2015 23:00 673K
1156-AnIdentityBasedEncryptionSchemeResilientto..> 30-Nov-2015 23:00 574K
1157-DoubleAuthenticationPreventingSignaturesan..> 30-Nov-2015 23:00 385K
1157-DoubleAuthenticationPreventingSignaturesfr..> 01-Dec-2015 23:00 385K
1157-FromIdentificationtoSignaturesTightlyAFram..> 20-Jan-2023 08:21 479K
1157-TheDoubleHashTransformFromIdentificationto..> 11-Dec-2015 23:00 425K
1158-Anoteontheoptimalityoffrequencyanalysisvse..> 30-Nov-2015 23:00 59K
1159-StudentsandTaxesaPrivacyPreservingSocialSt..> 02-Dec-2015 23:00 670K
116-EfficientHardwareDesignforComputingPairings..> 24-Feb-2015 23:00 209K
1160-CryptanalysisofmultiHFE.pdf 02-Dec-2015 23:00 214K
1161-CyberandPhysicalAccessControlinLegacySyste..> 02-Dec-2015 23:00 1M
1162-TheMoralCharacterofCryptographicWork.pdf 02-Dec-2015 23:00 436K
1163-AGuessandDetermineAttackonReducedRoundKhud..> 02-Dec-2015 23:00 436K
1164-BeyondBitcoinPartIAcriticallookatblockchai..> 02-Dec-2015 23:00 574K
1165-MeetintheMiddleAttacksonReducedRoundMidori..> 05-Dec-2015 23:00 3M
1166-CeremoniesforEndtoEndVerifiableElections.pdf 05-Dec-2015 23:00 933K
1167-ConstrainingPseudorandomFunctionsPrivately..> 05-Dec-2015 23:00 652K
1168-SCPAComputationallyScalableByzantineConsen..> 05-Dec-2015 23:00 466K
1169-StrengthinNumbersThresholdECDSAtoProtectKe..> 05-Dec-2015 23:00 436K
117-NonuniformIndistinguishabilityandUnpredicta..> 24-Feb-2015 23:00 400K
1170-CharacterizingNTRUVariantsUsingGroupRingan..> 05-Dec-2015 23:00 132K
1171-OntheSecurityofaaccesspolynomialbasedselfh..> 08-Dec-2015 23:00 276K
1172-AnApplicationSpecificInstructionSetProcess..> 08-Dec-2015 23:00 807K
1173-SecureMultipartyComputationwithGeneralInte..> 08-Dec-2015 23:00 705K
1174-OnDataComplexityofDistinguishingAttacksvsM..> 08-Dec-2015 23:00 337K
1175-ImprovedDataConfidentialityofAuditTrailDat..> 08-Dec-2015 23:00 733K
1176-OntheEfficiencyofFHEbasedPrivateQueries.pdf 10-Dec-2015 23:00 374K
1177-OntheCCAinsecurityofMTProto.pdf 10-Dec-2015 23:00 226K
1178-TextbookNonMalleableCommitments.pdf 10-Dec-2015 23:00 505K
1179-Aconstructionof3dimensionallatticesievefor..> 10-Dec-2015 23:00 265K
118-ConstructingandUnderstandingChosenCiphertex..> 24-Feb-2015 23:00 250K
1180-SecureComparatoraZKPBasedAuthenticationSys..> 10-Dec-2015 23:00 119K
1181-ConstructionofTransitionMatricesforBinaryF..> 13-Dec-2015 23:00 366K
1182-ChaskeyaMACAlgorithmforMicrocontrollersSta..> 13-Dec-2015 23:00 105K
1183-AuthenticatedRangeClosestPointQueriesinZer..> 13-Dec-2015 23:00 512K
1183-AuthenticatedRangeampClosestPointQueriesin..> 20-Jan-2023 08:20 512K
1184-ExtensionFieldCancellationaNewCentralTrapd..> 13-Dec-2015 23:00 299K
1185-EfficientPseudorandomFunctionsviaOntheFlyA..> 13-Dec-2015 23:00 423K
1186-Restrictedlinearcongruences.pdf 13-Dec-2015 23:00 298K
1187-Onanalmostuniversalhashfunctionfamilywitha..> 13-Dec-2015 23:00 348K
1188-CompactAttributeBasedEncryptionandSigncryp..> 16-Dec-2015 23:00 599K
1189-InvariantSubspaceAttackAgainstFullMidori64..> 16-Dec-2015 23:00 355K
119-MakingMaskingSecurityProofsConcreteOrHowtoE..> 26-Feb-2015 23:00 1M
119-MakingMaskingSecurityProofsConcreteorHowtoE..> 20-Jan-2023 08:25 1M
1190-PrivateLargeScaleDatabaseswithDistributedS..> 16-Dec-2015 23:00 565K
1191-AFormalAnalysisofPrefetchinginProfiledCach..> 16-Dec-2015 23:00 310K
1192-AGuidetoFullyHomomorphicEncryption.pdf 16-Dec-2015 23:00 425K
1193-CollisionAttacksagainstCAESARCandidatesFor..> 16-Dec-2015 23:00 417K
1194-HOMOMORPHICAUTOCOMPLETE.pdf 16-Dec-2015 23:00 330K
1195-ARITHMETICUSINGWORDWISEHOMOMORPHICENCRYPTI..> 20-Jan-2023 08:20 435K
1195-AnInvestigationofComplexOperationswithWord..> 16-Dec-2015 23:00 409K
1196-SecureDistributedComputationonPrivateInput..> 16-Dec-2015 23:00 476K
1197-OntheflyHomomorphicBatchingUnbatching.pdf 16-Dec-2015 23:00 279K
1198-SymmetricandDualPRFsfromStandardAssumption..> 23-Feb-2024 00:00 385K
1198-SymmetricandDualPRFsfromStandardAssumption..> 16-Dec-2015 23:00 358K
1199-Acompressionmethodforhomomorphicciphertext..> 18-Dec-2015 23:00 624K
120-ReconfigurableLUTADoubleEdgedSwordforSecuri..> 22-Dec-2015 23:00 475K
120-ReconfigurableLUTBoonorBaneforSecureApplica..> 26-Feb-2015 23:00 449K
1200-HeuristicToolforLinearCryptanalysiswithApp..> 18-Dec-2015 23:00 353K
1201-AStarbasedIndependentBicliqueAttackonFullR..> 18-Dec-2015 23:00 510K
1202-CCASecurityforSelfUpdatableEncryptionProte..> 18-Dec-2015 23:00 317K
1203-Thegraphofminimaldistancesofbentfunctionsa..> 18-Dec-2015 23:00 302K
1204-Constructingsecretverifiableauctionschemes..> 18-Dec-2015 23:00 395K
1204-Secretverifiableauctionsfromelections.pdf 20-Jan-2023 08:20 671K
1205-DeniableFunctionalEncryption.pdf 18-Dec-2015 23:00 476K
1206-SimplePhotonicEmissionAttackwithReducedDat..> 19-Dec-2015 23:00 1M
1207-CommentonDemonstrationsofShor39sAlgorithmi..> 20-Jan-2023 08:20 1M
1207-CommentonDemonstrationsofShorsAlgorithmint..> 19-Dec-2015 23:00 1M
1208-TwoKindsofBicliqueAttacksonLightweightBloc..> 19-Dec-2015 23:00 100K
1209-FastOptimisticallyFairCutandChoose2PC.pdf 19-Dec-2015 23:00 485K
121-MultiClientObliviousRAMsecureagainstMalicio..> 15-Oct-2015 22:00 280K
121-MultiUserObliviousRAMSecureAgainstMalicious..> 26-Feb-2015 23:00 347K
1210-QuantumSecurityoftheFujisakiOkamotoandOAEP..> 19-Dec-2015 23:00 591K
1211-LogAnalysisofEstonianInternetVoting2013201..> 20-Dec-2015 23:00 723K
1212-Choosingandgeneratingparametersforlowlevel..> 20-Dec-2015 23:00 479K
1213-FootprintschedulingforDiningCryptographern..> 20-Dec-2015 23:00 529K
1214-SimpleSecurityDefinitionsforandConstructio..> 20-Jan-2023 08:20 517K
1214-SpeedingOnLowLatencyKeyExchange.pdf 20-Dec-2015 23:00 524K
1215-SimplerFasterandMoreRobustTtestBasedLeakag..> 21-Dec-2015 23:01 570K
1216-NonTransferableProxyReEncryption.pdf 20-Jan-2023 08:20 319K
1217-TwofacedprocessesandexistenceofRNGwithprov..> 21-Dec-2015 23:00 272K
1218-AreaTimeEfficientHardwareImplementationofE..> 21-Dec-2015 23:00 925K
1219-RobustPseudoRandomNumberGeneratorswithInpu..> 21-Dec-2015 23:00 678K
122-ConstructingMixedintegerProgrammingModelswh..> 26-Feb-2015 23:00 182K
1220-TwoRoundManintheMiddleSecurityfromLPN.pdf 23-Dec-2015 23:00 473K
1221-Unclonableencryptionrevisited4times28.pdf 23-Dec-2015 23:00 723K
1222-OntheAsymptoticComplexityofSolvingLWE.pdf 23-Dec-2015 23:00 628K
1223-ChosenCiphertextSecurityfromSubsetSum.pdf 23-Dec-2015 23:00 313K
1224-TwistedPolynomialsandForgeryAttacksonGCM.pdf 23-Dec-2015 23:00 2M
1225-ECConYourFingertipsASingleInstructionAppro..> 23-Dec-2015 23:00 404K
1226-CryptoleqAHeterogeneousAbstractMachineforE..> 23-Dec-2015 23:00 403K
1227-SingleKeyRecoveryAttackson9roundKalyna1282..> 23-Dec-2015 23:00 750K
1228-Privacyprotectioninelectroniceducationbase..> 23-Dec-2015 23:00 202K
1229-Cryptanalysisofapublickeycryptosystembased..> 23-Dec-2015 23:00 189K
123-Identitybasedencryptionwithalmosttightsecur..> 26-Feb-2015 23:00 458K
1230-IndistinguishableProofsofWorkorKnowledge.pdf 23-Dec-2015 23:00 527K
1231-WhenareIdentificationProtocolswithSparseCh..> 28-Dec-2015 23:00 574K
1232-ExtendFHEWtoGeneralCase.pdf 28-Dec-2015 23:00 751K
1233-DegenerateCurveAttacks.pdf 28-Dec-2015 23:00 267K
1234-OnCryptographicAnonimityandUnpredicatbilit..> 28-Dec-2015 23:00 245K
1235-ConstantroundLeakageresilientZeroknowledge..> 28-Dec-2015 23:00 235K
1236-ABoundedSpaceNearOptimalKeyEnumerationAlgo..> 28-Dec-2015 23:00 494K
1237-OntheSecurityofOnePasswordAuthenticatedKey..> 31-Dec-2015 23:00 764K
1238-AsynchronousSecureMultipartyComputationinC..> 31-Dec-2015 23:00 534K
1239-SecureGoodsSupplyChainandKeyExchangewithVi..> 31-Dec-2015 23:00 695K
124-GliFreDGlitchFreeDuplicationTowardsPowerEqu..> 26-Feb-2015 23:00 1M
1240-ExploitingPUFUnreliabilitytoSecureWireless..> 20-Jan-2023 14:19 207
1240-ExploitingUnreliabilityofthePUFtoSecureRem..> 31-Dec-2015 23:00 447K
1241-Verifiablesidechannelsecurityofcryptograph..> 31-Dec-2015 23:00 565K
1242-QuantumCryptographyBeyondQuantumKeyDistrib..> 31-Dec-2015 23:00 519K
1243-VerifiableASICs.pdf 31-Dec-2015 23:00 352K
1244-OnvaluesofvectorialBooleanfunctionsandrela..> 31-Dec-2015 23:00 222K
1245-VariationofGGH15MultilinearMaps.pdf 01-Jan-2016 23:00 211K
1246-UniversallyComposableDirectAnonymousAttest..> 01-Jan-2016 23:00 620K
1247-MissingatrickKaratsubarevisited.pdf 01-Jan-2016 23:00 120K
1247-MissingatrickKaratsubavariations.pdf 20-Jan-2023 08:20 317K
1248-GenericTransformationofaCCA2SecurePublicKe..> 01-Jan-2016 23:00 446K
1249-TrapMeIfYouCanMillionDollarCurve.pdf 01-Jan-2016 23:00 625K
125-MultilinearPseudorandomFunctions.pdf 26-Feb-2015 23:00 388K
1250-AdaptivelySecureGarbledCircuitsfromOneWayF..> 02-Jan-2016 23:00 698K
1251-CommentonQuantumCryptographyWhichisMoreImp..> 02-Jan-2016 23:00 233K
1252-ImprovedTestPatternGenerationforHardwareTr..> 02-Jan-2016 23:00 863K
1253-NonMalleableFunctionsandTheirApplications.pdf 02-Jan-2016 23:00 448K
1254-IdentitybasedHierarchicalKeyinsulatedEncry..> 02-Jan-2016 23:00 260K
1255-FunctionalEncryptionforInnerProductwithFul..> 02-Jan-2016 23:00 821K
1256-MitigatingMultiTargetAttacksinHashbasedSig..> 02-Jan-2016 23:00 853K
1257-SecurityAttackonCloudBIPracticalprivacypre..> 02-Jan-2016 23:00 166K
126-PerfectStructureontheEdgeofChaos.pdf 26-Feb-2015 23:00 364K
127-AdaptivekeyrecoveryattacksonNTRUbasedsomewh..> 26-Feb-2015 23:00 260K
128-SelfbilinearMaponUnknownOrderGroupsfromIndi..> 26-Feb-2015 23:00 419K
129-BlockwiseNonMalleableCodes.pdf 26-Feb-2015 23:00 646K
130-HowtoBootstrapAnonymousCommunication.pdf 26-Feb-2015 23:00 382K
131-OnLightweightStreamCipherswithShorterIntern..> 26-Feb-2015 23:00 408K
132-HomomorphicComputationofEditDistance.pdf 26-Feb-2015 23:00 447K
133-PrivateComputationonEncryptedGenomicData.pdf 26-Feb-2015 23:00 382K
134-FromRelatedKeyDistinguisherstoRelatedKeyRec..> 26-Feb-2015 23:00 187K
135-GeneralizingEfficientMultipartyComputation.pdf 26-Feb-2015 23:00 455K
136-Lyra2EfficientPasswordHashingwithHighSecuri..> 20-Jan-2023 08:24 6M
136-Lyra2PasswordHashingSchemewithimprovedsecur..> 27-Feb-2015 23:01 4M
137-MultikeywordSimilaritySearchOverEncryptedCl..> 27-Feb-2015 23:01 264K
138-APracticalKeyExchangefortheInternetusingLat..> 27-Feb-2015 23:01 457K
139-PerformanceAnalysisofSomePasswordHashingSch..> 27-Feb-2015 23:01 199K
140-TheRandomOracleModelATwentyYearRetrospectiv..> 27-Feb-2015 23:01 276K
141-AnalysisofImpossibleIntegralandZeroCorrelat..> 27-Feb-2015 23:01 556K
142-MultiClientVerifiableComputationwithStronge..> 27-Feb-2015 23:01 454K
143-HarderBetterFasterStrongerEllipticCurveDisc..> 27-Feb-2015 23:01 574K
144-SecurityoftheAESwithaSecretSbox.pdf 27-Feb-2015 23:01 461K
145-ObservationsontheSIMONblockcipherfamily.pdf 27-Feb-2015 23:01 483K
146-NewAttacksonFeistelStructureswithImprovedMe..> 27-Feb-2015 23:01 351K
147-HighPrecisionFaultInjectionsontheInstructio..> 27-Feb-2015 23:01 6M
148-OntheEffectivenessoftheRemanenceDecaySideCh..> 27-Feb-2015 23:00 4M
149-CryptanalysisofHMACNMACWhirlpool.pdf 27-Feb-2015 23:00 431K
150-InsyndImprovedPrivacyPreservingTransparency..> 20-Jan-2023 08:24 394K
150-InsyndPrivacyPreservingSecureOneWayMessagin..> 27-Feb-2015 23:00 406K
150-InsyndPrivacyPreservingTransparencyLoggingU..> 16-May-2015 22:00 419K
151-Baddirectionsincryptographichashfunctions.pdf 27-Feb-2015 23:00 358K
152-InvertingtheFinalexponentiationofTatepairin..> 27-Feb-2015 23:00 341K
153-FunctionalEncryptionfromSmallHardwaeTokens.pdf 27-Feb-2015 23:00 407K
153-FunctionalEncryptionfromSmallHardwareTokens..> 04-May-2015 22:00 407K
154-CircuitsResilienttoAdditiveAttackswithAppli..> 27-Feb-2015 23:00 1M
155-OnPowerSplittingGamesinDistributedComputati..> 27-Feb-2015 23:00 503K
156-BuildingLossyTrapdoorFunctionsfromLossyEncr..> 27-Feb-2015 23:00 399K
157-DualityinABEConvertingAttributeBasedEncrypt..> 27-Feb-2015 23:00 467K
158-FromSingleInputtoMultiInputFunctionalEncryp..> 27-Feb-2015 23:00 381K
158-MultiInputFunctionalEncryptioninthePrivateK..> 08-Oct-2015 22:00 391K
159-LeakedStateForgeryAttackAgainstTheAuthentic..> 27-Feb-2015 23:00 1M
160-DifferentialLinearCryptanalysisofICEPOLE.pdf 27-Feb-2015 23:00 391K
161-ExploringtheResilienceofSomeLightweightCiph..> 02-Apr-2015 22:00 296K
161-ExploringtheResilienceofSomeLightweightCiph..> 27-Feb-2015 23:00 296K
162-NewMultilinearMapsovertheIntegers.pdf 27-Feb-2015 23:00 502K
163-IndistinguishabilityObfuscationfromFunction..> 27-Feb-2015 23:00 366K
164-ConstantSizeRingSignatureWithoutRandomOracl..> 27-Feb-2015 23:00 429K
165-TheCryptographicHardnessofRandomLocalFuncti..> 27-Feb-2015 23:00 598K
166-NaturallyRehearsingPasswords.pdf 27-Feb-2015 23:00 438K
167-PostZeroizingObfuscationThecaseofEvasiveCir..> 27-Feb-2015 23:00 460K
168-MorePSandHlikebentfunctions.pdf 27-Feb-2015 23:00 216K
169-ShortSchnorrsignaturesrequireahashfunctionw..> 27-Feb-2015 23:00 186K
170-StealingKeysfromPCsbyRadioCheapElectromagne..> 27-Feb-2015 23:00 2M
170-StealingKeysfromPCsusingaRadioCheapElectrom..> 03-Mar-2015 23:00 2M
171-AuthenticatedNetworkTimeSynchronization.pdf 27-Feb-2015 23:00 325K
172-SilentSimonAThresholdImplementationunder100..> 28-Feb-2015 23:00 1M
173-IndistinguishabilityObfuscationfromCompactF..> 28-Feb-2015 23:00 611K
174-APracticalChosenMessagePowerAnalysisApproac..> 20-Jan-2023 08:24 2M
174-APracticalChosenMessagePowerAnalysisMethodo..> 28-Feb-2015 23:00 2M
175-TrivialNonceMisusingAttackonPureOMD.pdf 28-Feb-2015 23:00 203K
176-KeyRecoveryforLWEinPolynomialTime.pdf 01-Mar-2015 23:00 477K
177-OntheSecurityofanEfficientGroupKeyAgreement..> 01-Mar-2015 23:00 205K
178-HowtoIncentivizeDataDrivenCollaborationAmon..> 24-Oct-2015 22:00 808K
178-OnTimeandOrderinMultipartyComputation.pdf 02-Mar-2015 23:00 736K
179-ASimpleMethodforObtainingRelationsAmongFact..> 02-Mar-2015 23:00 340K
180-KeyHomomorphicConstrainedPseudorandomFuncti..> 04-Mar-2015 23:00 440K
181-LinksamongImpossibleDifferentialIntegraland..> 04-Mar-2015 23:00 421K
182-TweakableBlockcipherswithAsymptoticallyOpti..> 04-Mar-2015 23:00 594K
183-NewLinksBetweenDifferentialandLinearCryptan..> 04-Mar-2015 23:00 209K
184-LinksBetweenTruncatedDifferentialandMultidi..> 04-Mar-2015 23:00 404K
185-RemotelyManagedLogicBuiltInSelfTestforSecur..> 04-Mar-2015 23:00 292K
186-HigherOrderDifferentialAnalysisofNORX.pdf 04-Mar-2015 23:00 267K
187-HowFairisYourProtocolAUtilitybasedApproacht..> 04-Mar-2015 23:00 509K
188-NewTechniquesforSPHFsandEfficientOneRoundPA..> 04-Mar-2015 23:00 672K
189-OnlineAuthenticatedEncryptionanditsNonceReu..> 04-Mar-2015 23:00 724K
190-MultiClientNonInteractiveVerifiableComputat..> 04-Mar-2015 23:00 411K
191-iDASHSecureGenomeAnalysisCompetitionUsingOb..> 04-Mar-2015 23:00 218K
192-Memorysavingcomputationofthepairingfinalexp..> 04-Mar-2015 23:00 342K
193-ImprovingModularInversioninRNSusingthePlusM..> 04-Mar-2015 23:00 528K
194-PracticalHomomorphicMACsforArithmeticCircui..> 04-Mar-2015 23:00 487K
195-ZeroknowledgeArgumentforPolynomialEvaluatio..> 04-Mar-2015 23:00 297K
196-TighterReductionsforForwardSecureSignatureS..> 04-Mar-2015 23:00 435K
197-SCAResistanceAnalysisofMACPHOTON.pdf 05-Mar-2015 23:00 853K
197-SCAResistanceAnalysisofSpongebasedMACPHOTON..> 04-Mar-2015 23:00 853K
197-SCAResistanceAnalysisonFPGAImplementationso..> 30-Apr-2015 22:00 956K
198-SideChannelProtectionbyRandomizingLookUpTab..> 04-Mar-2015 23:00 543K
199-SideChannelSecurityAnalysisofUltraLowPowerF..> 04-Mar-2015 23:00 4M
200-EvaluatingtheDuplicationofDualRailPrecharge..> 04-Mar-2015 23:00 637K
201-StatisticalPropertiesofMultiplicationmod2n.pdf 06-Mar-2015 23:00 84K
202-AdaptivelySecureCoinFlippingRevisited.pdf 06-Mar-2015 23:00 314K
203-AchievingSideChannelProtectionwithDynamicLo..> 06-Mar-2015 23:00 7M
204-LeakageResilientSymmetricEncryptionviaRekey..> 06-Mar-2015 23:00 549K
205-TowardsKeyLengthExtensionwithOptimalSecurit..> 06-Mar-2015 23:00 431K
206-EfficientandSecureDelegationofGroupExponent..> 06-Mar-2015 23:00 138K
207-LeakageAssessmentMethodologyaclearroadmapfo..> 06-Mar-2015 23:00 714K
208-TowardsSecureDistanceBounding.pdf 06-Mar-2015 23:00 171K
209-TriathlonofLightweightBlockCiphersfortheInt..> 06-Mar-2015 23:00 356K
210-SecureandEfficientInitializationandAuthenti..> 06-Mar-2015 23:00 1M
211-Fastersievingforshortestlatticevectorsusing..> 06-Mar-2015 23:00 463K
212-AnalyzingPermutationsforAESlikeCiphersUnder..> 06-Mar-2015 23:00 444K
213-AttributeBasedVersionsofSchnorrandElGamal.pdf 06-Mar-2015 23:00 530K
214-GCMSecurityBoundsReconsidered.pdf 08-Mar-2015 23:00 280K
215-ArevocableanonymityinTor.pdf 08-Mar-2015 23:00 180K
216-QuasiAdaptiveNIZKforLinearSubspacesRevisite..> 08-Mar-2015 23:00 181K
217-Salsa20CryptanalysisNewMovesandRevisitingOl..> 08-Mar-2015 23:00 300K
218-Efficientkoutofnoblivioustransferprotocol.pdf 08-Mar-2015 23:00 195K
219-EfficientFormatPreservingEncryptedDatabases..> 08-Mar-2015 23:00 255K
220-KeyHomomorphicPRFsandTheirApplications.pdf 09-Mar-2015 23:00 608K
221-Tighterfastersimplersidechannelsecurityeval..> 09-Mar-2015 23:00 2M
222-TowardsUnderstandingtheKnownKeySecurityofBl..> 09-Mar-2015 23:00 609K
223-NewDistinguishersforReducedRoundTriviumandT..> 09-Mar-2015 23:00 320K
224-GORAMGroupORAMforPrivacyandAccessControlinO..> 25-Aug-2015 22:00 2M
224-PrivacyandAccessControlforOutsourcedPersona..> 09-Mar-2015 23:00 2M
225-BitwiseLinearMappingswithGoodCryptographicP..> 09-Mar-2015 23:00 88K
226-SecurePhysicalComputationusingDisposableCir..> 11-Mar-2015 23:00 382K
227-TradeoffCryptanalysisofMemoryHardFunctions.pdf 11-Mar-2015 23:00 396K
228-LeakageResilientCryptographywithKeyDerivedf..> 11-Mar-2015 23:00 654K
229-ImprovingGGHPublicKeySchemeUsingLowDensityL..> 12-Mar-2015 23:00 419K
230-WSPSDesigningaWideAreaSecurePositioningSyst..> 12-Mar-2015 23:00 3M
231-ARelatedKeyChosenIVDistinguishingAttackonFu..> 12-Mar-2015 23:00 223K
232-CryptanalysisofFullSprout.pdf 12-Mar-2015 23:00 491K
233-ComputationalElectionVerifiabilityDefinitio..> 12-Mar-2015 23:00 362K
233-ElectionVerifiabilityCryptographicDefinitio..> 20-Jan-2023 08:24 759K
233-ElectionVerifiabilityCryptographicDefinitio..> 07-Aug-2015 22:00 363K
234-CollisionAttackon4branchType2GFNbasedHashFu..> 13-Mar-2015 23:00 559K
235-PerformanceandSecurityImprovementsforTorASu..> 13-Mar-2015 23:00 454K
236-KeyRecoveryfromStateInformationofSproutAppl..> 13-Mar-2015 23:00 631K
237-FastRevocationofAttributeBasedCredentialsfo..> 13-Mar-2015 23:00 336K
238-OneTimeProgramswithLimitedMemory.pdf 13-Mar-2015 23:00 448K
239-MeetintheMiddleAttacksandStructuralAnalysis..> 19-Mar-2015 23:00 528K
240-DifferentialAnalysisandMeetintheMiddleAttac..> 19-Mar-2015 23:00 703K
241-EspressoAStreamCipherfor5GWirelessCommunica..> 19-Mar-2015 23:00 190K
242-CompactlyHidingLinearSpansTightlySecureCons..> 19-Mar-2015 23:00 750K
243-ReliableMessageTransmissionunderPartialKnow..> 19-Mar-2015 23:00 268K
243-Reliablecommunicationviasemilatticeproperti..> 20-Jan-2023 08:24 336K
244-InternalDifferentialBoomerangsPracticalAnal..> 19-Mar-2015 23:00 644K
245-PracticalAttacksontheRoundreducedPRINCE.pdf 19-Mar-2015 23:00 330K
246-ImplicitZeroKnowledgeArgumentsandApplicatio..> 19-Mar-2015 23:00 940K
247-Subgroupsecurityinpairingbasedcryptography.pdf 19-Mar-2015 23:00 377K
248-VerifiablyEncryptedSignatureswithShortKeysb..> 19-Mar-2015 23:00 377K
249-ImprovedHierarchicalInnerProductEncryptionf..> 19-Mar-2015 23:00 348K
250-DesignandAnalysisofInformationTheoretically..> 19-Mar-2015 23:00 249K
251-HowtoConstructUCSecureSearchableSymmetricEn..> 19-Mar-2015 23:00 777K
252-LinearizationofMultivaluedNonlinearFeedback..> 19-Mar-2015 23:00 232K
253-StabilityandLinearizationofMultivaluedNonli..> 19-Mar-2015 23:00 284K
254-TornadoAttackonRC4withApplicationstoWEPWPA.pdf 19-Mar-2015 23:00 715K
254-TornadoAttackonRC4withApplicationstoWEPandW..> 26-Dec-2015 23:00 654K
255-Acomprehensiveanalysisofgamebasedballotpriv..> 19-Mar-2015 23:00 447K
256-CryptanalysisofThreeCertificateBasedAuthent..> 19-Mar-2015 23:00 317K
257-QuadraticTimeLinearSpaceAlgorithmsforGramSc..> 20-Mar-2015 23:00 508K
258-LightweightMDSInvolutionMatrices.pdf 22-Mar-2015 23:00 639K
259-ExhaustingDemirciSelukMeetintheMiddleAttack..> 22-Mar-2015 23:00 419K
260-ComputationalAspectsofCorrelationPowerAnaly..> 22-Mar-2015 23:00 742K
261-ResearchPerspectivesandChallengesforBitcoin..> 22-Mar-2015 23:00 309K
262-AlookatthePGPecosystemthroughthekeyserverda..> 22-Mar-2015 23:00 149K
263-EclipseAttacksonBitcoinsPeertoPeerNetwork.pdf 22-Mar-2015 23:00 860K
264-BlindBoxDeepPacketInspectionoverEncryptedTr..> 23-Mar-2015 23:00 513K
265-PasswordHashingCompetitionSurveyandBenchmar..> 23-Mar-2015 23:00 382K
266-GRECSGraphEncryptionforApproximateShortestD..> 23-Mar-2015 23:00 858K
267-TheSimplestProtocolforObliviousTransfer.pdf 23-Mar-2015 23:00 373K
268-ImprovedTopDownTechniquesinDifferentialCryp..> 23-Mar-2015 23:00 403K
269-IdealMultilinearMapsBasedonIdealLattices.pdf 23-Mar-2015 23:00 159K
270-FibonacciRingOscillatorsasTrueRandomNumberG..> 23-Mar-2015 23:00 6M
271-TowardSecureImplementationofMcElieceDecrypt..> 23-Mar-2015 23:00 452K
272-LeakageFlexibleCCAsecurePublicKeyEncryption..> 25-Mar-2015 23:00 415K
273-DualSystemEncryptionviaPredicateEncodings.pdf 25-Mar-2015 23:00 113K
274-LowDepthCircuitsforEfficientHomomorphicSort..> 25-Mar-2015 23:00 398K
275-MQChallengeHardnessEvaluationofSolvingMulti..> 25-Mar-2015 23:00 216K
276-AnImprovmentoftheEllipticNetAlgorithm.pdf 25-Mar-2015 23:00 199K
277-OneSidedDeviceIndependentQKDandPositionbase..> 25-Mar-2015 23:00 565K
278-EfficientDelegationofZeroKnowledgeProofsofK..> 25-Mar-2015 23:00 344K
279-ImprovedCryptanalysisofAESlikePermutations.pdf 25-Mar-2015 23:00 867K
280-FeasibilityandInfeasibilityofAdaptivelySecu..> 25-Mar-2015 23:00 405K
281-FromStatisticalZeroKnowledgetoSecretSharing..> 25-Mar-2015 23:00 443K
281-SecretSharingandStatisticalZeroKnowledge.pdf 07-Sep-2015 22:00 401K
282-NonInteractiveSecureComputationBasedonCutan..> 25-Mar-2015 23:00 371K
283-FullyDynamicVerifiableZeroKnowledgeOrderQue..> 26-Mar-2015 23:00 682K
284-ANoteonScalarMultiplicationUsingDivisionPol..> 26-Mar-2015 23:00 67K
285-ImprovedLinearTrailsfortheBlockCipherSimon.pdf 26-Mar-2015 23:00 184K
286-ImpossibleDifferentialCryptanalysisofReduce..> 26-Mar-2015 23:00 182K
287-AquantumsafecircuitextensionhandshakeforTor..> 01-Apr-2015 22:00 409K
287-CircuitextensionhandshakesforTorachievingfo..> 20-Jan-2023 08:24 565K
288-PrecomputationMethodsforFasterandGreenerPos..> 01-Apr-2015 22:00 2M
289-PracticalCryptanalysisofFullSproutwithTMDTr..> 01-Apr-2015 22:00 332K
290-AutomatingFastandSecureTranslationsfromType..> 01-Apr-2015 22:00 634K
291-TwoOperandsofMultipliersinSideChannelAttack..> 01-Apr-2015 22:00 239K
292-SecretSharedRandomAccessMachine.pdf 01-Apr-2015 22:00 448K
293-AdaptivelySecureUnrestrictedAttributeBasedE..> 20-Jan-2023 08:24 818K
293-FullySecureUnboundedRevocableAttributeBased..> 01-Apr-2015 22:00 816K
294-AcceleratingSomewhatHomomorphicEvaluationus..> 01-Apr-2015 22:00 391K
295-SecurityAnalysisofReEncryptionRPCMixNets.pdf 01-Apr-2015 22:00 387K
296-TheUniformDistributionofSequencesGeneratedb..> 01-Apr-2015 22:00 315K
297-IdentityBasedEncryptionSecureAgainstSelecti..> 01-Apr-2015 22:00 336K
298-QuantumResistantRandomLinearCodeBasedPublic..> 20-Jan-2023 08:24 118K
298-RandomLinearCodeBasedPublicKeyEncryptionSch..> 02-Sep-2015 22:00 251K
298-SecureRandomLinearCodeBasedPublicKeyEncrypt..> 01-Apr-2015 22:00 214K
299-ANoteontheLindellWaisbardPrivateWebSearchSc..> 01-Apr-2015 22:00 252K
300-ScalableDivisibleEcash.pdf 01-Apr-2015 22:00 518K
301-CryptanalysisofGGHMap.pdf 07-Apr-2015 22:00 135K
302-BoostingOMDforAlmostFreeAuthenticationofAss..> 07-Apr-2015 22:00 910K
303-TheDesignSpaceofLightweightCryptography.pdf 07-Apr-2015 22:00 283K
304-CommunicationOptimalProactiveSecretSharingf..> 07-Apr-2015 22:00 171K
305-FoundationsofReconfigurablePUFsFullVersion.pdf 07-Apr-2015 22:00 412K
306-AnalysisofVAES3FF2.pdf 07-Apr-2015 22:00 184K
307-BlackBoxGarbledRAM.pdf 07-Apr-2015 22:00 498K
308-AuthenticatedKeyExchangeoverBitcoin.pdf 07-Apr-2015 22:00 514K
309-TinyLEGOAnInteractiveGarblingSchemeforMalic..> 27-Aug-2015 22:00 860K
309-TinyLEGOAnInteractiveGarblingSchemeforMalic..> 07-Apr-2015 22:00 976K
310-Newalgorithmforthediscretelogarithmproblemo..> 07-Apr-2015 22:00 259K
311-TaggedOneTimeSignaturesTightSecurityandOpti..> 07-Apr-2015 22:00 404K
312-ImprovingKeyRecoveryto784and799roundsofTriv..> 07-Apr-2015 22:00 395K
313-RecoveringShortGeneratorsofPrincipalIdealsi..> 07-Apr-2015 22:00 319K
314-CertificateBasedEncryptionResilienttoKeyLea..> 11-Apr-2015 22:00 465K
315-QueryComplexityAmplificationforRandomOracle..> 11-Apr-2015 22:00 593K
316-NonmalleabilityunderSelectiveOpeningAttacks..> 11-Apr-2015 22:00 478K
317-LeakageResilientCryptographyoverLargeFinite..> 11-Apr-2015 22:00 391K
318-PracticalDivisibleECash.pdf 11-Apr-2015 22:00 852K
319-PointDecompositionProbleminBinaryEllipticCu..> 11-Apr-2015 22:00 311K
320-HybridPubliclyVerifiableComputation.pdf 11-Apr-2015 22:00 670K
321-SizeHidinginPrivateSetIntersectionwhatcanbe..> 11-Apr-2015 22:00 403K
322-TransformationBasedOutsourcingofLinearEquat..> 11-Apr-2015 22:00 270K
323-EfficientPairingFreeOneRoundAttributeBasedA..> 11-Apr-2015 22:00 431K
324-ANoteonLowerBoundsforNoninteractiveMessageA..> 11-Apr-2015 22:00 358K
325-SecureMultiPartyComputationwithIdentifiable..> 13-Apr-2015 22:00 573K
326-CryptanalysisOfAnAuthenticatedImageEncrypti..> 13-Apr-2015 22:00 457K
326-CryptanalysisofanAuthenticatedImageEncrypti..> 20-Jan-2023 08:24 1M
327-SomeresultsonSprout.pdf 13-Apr-2015 22:00 347K
328-StronglySecureAuthenticatedKeyExchangefromI..> 13-Apr-2015 22:00 249K
329-PAGESAFamilyofBlockCiiphers.pdf 19-Apr-2015 22:00 192K
330-SpongebasedCCA2secureasymmetricencryptionfo..> 19-Apr-2015 22:00 608K
331-ANewAuthenticatedEncryptionTechniqueforHand..> 20-Apr-2015 22:00 806K
331-spAELMSpongebasedAuthenticatedEncryptionSch..> 19-Apr-2015 22:00 802K
332-SecurityIntelligenceforBroadcastThreatAnaly..> 19-Apr-2015 22:00 212K
333-NearlyOptimalVerifiableDataStreamingFullVer..> 19-Apr-2015 22:00 1M
334-OntheCorrelationIntractabilityofObfuscatedP..> 19-Apr-2015 22:00 341K
335-ContinuousAfterthefactLeakageResilienteCKse..> 19-Apr-2015 22:00 425K
336-ArithmeticCryptography.pdf 19-Apr-2015 22:00 933K
337-ModularHardwareArchitectureforSomewhatHomom..> 19-Apr-2015 22:00 423K
338-Cryptanalysisofafairanonymityforthetornetwo..> 19-Apr-2015 22:00 168K
339-CertificateValidationinSecureComputationand..> 21-Dec-2015 23:01 657K
339-GuaranteeingCorrectnessinPrivacyFriendlyOut..> 20-Apr-2015 22:00 627K
340-ANewDistinguisheronGrainv1for106rounds.pdf 20-Apr-2015 22:00 300K
341-LimitsonthePowerofIndistinguishabilityObfus..> 20-Apr-2015 22:00 354K
342-IdentitySetbasedBroadcastEncryptionsupporti..> 20-Apr-2015 22:00 597K
343-HighspeedCurve25519on8bit16bitand32bitmicro..> 20-Apr-2015 22:00 391K
344-WatermarkingCryptographicProgramsAgainstArb..> 22-Apr-2015 22:00 423K
345-TwoRoundMPCfromLWEviaMultiKeyFHE.pdf 22-Apr-2015 22:00 408K
345-TwoRoundMultipartyComputationviaMultiKeyFHE..> 20-Jan-2023 08:24 473K
345-TwoRoundMutlipartyComputationviaMultiKeyFHE..> 03-Sep-2015 22:00 471K
346-EndtoEndVerifiableElectionsintheStandardMod..> 20-Jan-2023 08:24 481K
346-EndtoEndVerifiableElectionsintheStandardMod..> 22-Apr-2015 22:00 481K
347-FaultAnalysisofKuznyechik.pdf 23-Apr-2015 22:01 267K
348-AHardwarebasedCountermeasuretoReduceSideCha..> 23-Apr-2015 22:01 3M
349-EfficientSearchableSymmetricEncryptionforSt..> 23-Apr-2015 22:00 166K
350-ImprovingLocalCollisionsNewAttacksonReduced..> 23-Apr-2015 22:00 320K
351-DatabaseOutsourcingwithHierarchicalAuthenti..> 23-Apr-2015 22:00 903K
352-BroadcastfromMinicastSecureAgainstGeneralAd..> 23-Apr-2015 22:00 553K
353-MatrixComputationalAssumptionsinMultilinear..> 23-Apr-2015 22:00 556K
354-SEMAandMESDLeakageofTinyECC20onaLOTUSSensor..> 23-Apr-2015 22:00 2M
355-SemanticSecurityandIndistinguishabilityinth..> 23-Apr-2015 22:00 576K
356-SuccinctRandomizedEncodingsandtheirApplicat..> 23-Apr-2015 22:00 788K
357-AGrouptheoryMethodtoTheCycleStructuresofFee..> 23-Apr-2015 22:00 249K
358-OnGeneralizedFirstFallDegreeAssumptions.pdf 23-Apr-2015 22:00 414K
359-HigherOrderSideChannelSecurityandMaskRefres..> 23-Apr-2015 22:00 381K
360-AchievingDifferentialPrivacywithBiasControl..> 01-May-2015 22:00 204K
360-AchievingDifferentialPrivacywithNewImperfec..> 23-Apr-2015 22:00 211K
361-Computationallybindingquantumcommitments.pdf 23-Apr-2015 22:00 684K
362-ObliviousTransferfromweaklyRandomSelfReduci..> 23-Apr-2015 22:00 352K
363-OptimallySecureTweakableBlockciphers.pdf 23-Apr-2015 22:00 563K
364-PrivacypreservingContextawareRecommenderSys..> 23-Apr-2015 22:00 122K
365-Ontheimpossibilityofreceivingsecuritybeyond..> 23-Apr-2015 22:00 358K
366-Arandomzooslothunicornandtrx.pdf 23-Apr-2015 22:00 379K
367-ImprovedHigherOrderDifferentialAttacksonMIS..> 23-Apr-2015 22:00 425K
368-BreakingtheRabinWilliamsdigitalsignaturesys..> 23-Apr-2015 22:00 231K
369-OnNonBlackBoxSimulationandtheImpossibilityo..> 23-Apr-2015 22:00 719K
370-FinancialCryptographyDiscriminatoryPricingM..> 23-Apr-2015 22:00 334K
371-ConstantRoundMPCwithFairnessandGuaranteeofO..> 23-Apr-2015 22:00 455K
372-SecurityAnalysisofPRINCE.pdf 24-Apr-2015 22:00 416K
373-PubliclyVerifiableSoftwareWatermarking.pdf 24-Apr-2015 22:00 422K
374-OntheImpossibilityofTightCryptographicReduc..> 24-Apr-2015 22:00 529K
375-Boundsonsurmisingremixedkeys.pdf 24-Apr-2015 22:00 341K
376-CryptographyfromPostQuantumAssumptions.pdf 24-Apr-2015 22:00 419K
377-ClusterComputinginZeroKnowledge.pdf 27-Apr-2015 22:00 5M
378-PACLearningofArbiterPUFs.pdf 29-Apr-2015 22:00 1M
379-MMBcloudtreeAuthenticatedIndexforVerifiable..> 29-Apr-2015 22:00 3M
380-ProtectingagainstMultidimensionalLinearandT..> 29-Apr-2015 22:00 340K
381-FinancialCryptographyAlgorithmicMechanismsf..> 29-Apr-2015 22:00 297K
382-HighPerformanceIdealLatticeBasedCryptograph..> 19-Jun-2015 22:00 752K
382-SpeedRecordsforIdealLatticeBasedCryptograph..> 29-Apr-2015 22:00 721K
383-ImpossibilityofVBBObfuscationwithIdealConst..> 29-Apr-2015 22:00 204K
384-CondensedUnpredictability.pdf 29-Apr-2015 22:00 513K
385-FeasibilityandCompletenessofCryptographicTa..> 29-Apr-2015 22:00 363K
386-PrivatelyEvaluatingDecisionTreesandRandomFo..> 29-Apr-2015 22:00 879K
387-MethodtoProtectPasswordsinDatabasesforWebAp..> 29-Apr-2015 22:00 108K
388-FullySuccinctGarbledRAM.pdf 29-Apr-2015 22:00 463K
388-SuccinctGarbledRAM.pdf 01-Oct-2015 22:00 481K
389-Keccak.pdf 29-Apr-2015 22:00 122K
390-DualSystemEncryptionFrameworkinPrimeOrderGr..> 29-Apr-2015 22:00 649K
391-OntheCommunicationComplexityofSecureComputa..> 29-Apr-2015 22:00 469K
392-ForgeryAttacksonroundreducedICEPOLE128.pdf 29-Apr-2015 22:00 278K
393-BicliquecryptanalysisofMIBS80andPRESENT80.pdf 29-Apr-2015 22:00 313K
394-AugmentedSecureChannelsandtheGoaloftheTLS13..> 01-May-2015 22:00 656K
395-EfficientUnlinkableSanitizableSignaturesfro..> 20-Jan-2023 08:24 674K
395-EfficientUnlinkableSanitizableSignaturesfro..> 01-May-2015 22:00 442K
396-GeneralizingHomomorphicMACsforArithmeticCir..> 01-May-2015 22:00 390K
397-RelaxingFullCodebookSecurityARefinedAnalysi..> 01-May-2015 22:00 745K
398-FactoringRSAmoduliwithweakprimefactors.pdf 01-May-2015 22:00 357K
399-NewattacksonRSAwithModuliNprq.pdf 01-May-2015 22:00 326K
400-ExpirationandRevocationofKeysforAttributeba..> 01-May-2015 22:00 249K
400-ExpirationandRevocationofKeysforAttributeba..> 13-Jul-2015 22:00 296K
401-SimpleChosenCiphertextSecurityfromLowNoiseL..> 01-May-2015 22:00 404K
402-SuccessthroughconfidenceEvaluatingtheeffect..> 01-May-2015 22:00 1M
402-SuccessthroughconfidenceEvaluatingtheeffect..> 04-May-2015 22:00 1M
403-SequentialSecretSharingasaNewHierarchicalAc..> 01-May-2015 22:00 161K
404-ZeroKnowledgeAccumulatorsandSetOperations.pdf 01-May-2015 22:00 380K
405-FeasibilityandInfeasibilityofSecureComputat..> 01-May-2015 22:00 362K
406-ComputationTraceIndistinguishabilityObfusca..> 01-May-2015 22:00 1M
406-CryptographyforParallelRAMfromIndistinguish..> 31-Dec-2015 23:00 1M
407-HigherOrderCryptanalysisofLowMC.pdf 20-Jan-2023 08:24 307K
407-HigherordercryptanalysisofLowMC.pdf 01-May-2015 22:00 290K
408-RevisitingAtomicPatternsforScalarMultiplica..> 01-May-2015 22:00 537K
409-ImprovedDualSystemABEinPrimeOrderGroupsviaP..> 01-May-2015 22:00 370K
410-EfficientRingLWEEncryptionon8bitAVRProcesso..> 01-May-2015 22:00 556K
411-SideChannelAnalysisofMACKeccakHardwareImple..> 01-May-2015 22:00 481K
412-SurveyonCryptographicObfuscation.pdf 05-May-2015 22:00 858K
412-TheBirthofCryptographicObfuscationASurvey.pdf 20-Jan-2023 08:24 2M
413-AStudyofPairEncodingsPredicateEncryptioninP..> 20-Jan-2023 08:24 558K
413-AstudyofPairEncodingsPredicateEncryptioninp..> 05-May-2015 22:00 472K
414-OntheOptimalityofNonLinearComputationsofLen..> 05-May-2015 22:00 449K
415-STRIBOBWHIRLBOBSecurityAnalysisAddendum.pdf 05-May-2015 22:00 247K
416-HETestAHomomorphicEncryptionTestingFramewor..> 05-May-2015 22:00 920K
417-OrderRevealingEncryptionandtheHardnessofPri..> 05-May-2015 22:00 382K
418-OptimizedInterpolationAttacksonLowMC.pdf 05-May-2015 22:00 399K
419-NoninvasiveSpoofingAttacksforAntilockBrakin..> 05-May-2015 22:00 6M
420-WhatInformationisLeakedunderConcurrentCompo..> 05-May-2015 22:00 633K
421-VLSIImplementationofDoubleBaseScalarMultipl..> 05-May-2015 22:00 450K
422-EfficientServerAidedSecureTwoPartyFunctionE..> 05-May-2015 22:00 571K
423-OntheImplementationofUnifiedArithmeticonBin..> 05-May-2015 22:00 623K
424-FIDESLightweightAuthenticatedCipherwithSide..> 05-May-2015 22:00 671K
425-SmallerKeysforCodeBasedCryptographyQCMDPCMc..> 05-May-2015 22:00 347K
426-ComplementingFeistelCiphers.pdf 05-May-2015 22:00 354K
427-AHighReliabilityPUFUsingHotCarrierInjection..> 05-May-2015 22:00 5M
428-DumbCryptoinSmartGridsPracticalCryptanalysi..> 06-May-2015 22:00 564K
429-CryptanalysisofRoundReducedLED.pdf 06-May-2015 22:00 1M
430-FastandTradeoffResilientMemoryHardFunctions..> 06-May-2015 22:00 417K
431-ConversionsamongSeveralClassesofPredicateEn..> 13-Jul-2015 22:00 467K
431-ConversionsamongSeveralClassesofPredicateEn..> 06-May-2015 22:00 475K
432-NonRepudiableProofsofStorageinCloud.pdf 16-Jun-2015 22:00 4M
432-NonRepudiableProvableDataPossessioninCloudS..> 06-May-2015 22:00 4M
433-ANewClassificationof4bitOptimalSboxesandits..> 06-May-2015 22:00 132K
434-DicksonPolynomialsthatareInvolutions.pdf 06-May-2015 22:00 299K
435-OntheFastAlgebraicImmunityofBooleanPowerFun..> 07-May-2015 22:00 336K
436-OntheResistanceofPrimevariableRotationSymme..> 07-May-2015 22:00 389K
437-ANoteontheUnsoundnessofvnTinyRAM39sSNARK.pdf 20-Jan-2023 08:24 162K
437-ANoteontheUnsoundnessofvnTinyRAMsSNARK.pdf 07-May-2015 22:00 162K
438-AHybridApproachforProvingNoninterferenceofJ..> 08-May-2015 22:00 292K
439-OnConcurrentlySecureComputationintheMultipl..> 08-May-2015 22:00 403K
440-MessageLockedEncryptionforLockDependentMess..> 08-May-2015 22:00 411K
441-EnhancingTrustinReconfigurableBasedHardware..> 08-May-2015 22:00 489K
441-FIDESEnhancingTrustinReconfigurableBasedHar..> 25-May-2015 22:00 377K
442-IndividualizingElectricalCircuitsofCryptogr..> 09-May-2015 22:00 378K
443-SecurityEvaluationandEnhancementofBistableR..> 09-May-2015 22:00 1M
444-RevisitingSecurityClaimsofXLSandCOPA.pdf 09-May-2015 22:00 541K
445-XLSisnotaStrongPseudorandomPermutation.pdf 09-May-2015 22:00 432K
446-OntheAmortizedComplexityofZeroknowledgeProt..> 09-May-2015 22:00 354K
447-ANewModelforErrorTolerantSideChannelCubeAtt..> 10-May-2015 22:00 315K
448-ACommentonGuMap1.pdf 11-May-2015 22:00 75K
449-OnConstructionsofaSortofMDSBlockDiffusionMa..> 12-May-2015 22:00 331K
450-AdaptivelySecureComputationwithPartialErasu..> 12-May-2015 22:00 420K
451-OntheSystematicConstructionsofRotationSymme..> 12-May-2015 22:00 192K
452-MaskswillFallOffHigherOrderOptimalDistingui..> 13-May-2015 22:00 737K
453-AnOptimizationofGuMap1.pdf 13-May-2015 22:00 74K
454-Acomprehensiveandlightweightsecurityarchite..> 13-May-2015 22:00 345K
455-SecureDeduplicationofEncryptedDatawithoutAd..> 13-May-2015 22:00 669K
456-CollateraldamageofFacebookAppsanenhancedpri..> 13-May-2015 22:00 307K
457-GenericConversionsfromCPAtoCCAsecureFunctio..> 14-May-2015 22:00 630K
458-AHYBRIDAPPROACHFORTHESECURETRANSMISSIONOFH2..> 14-May-2015 22:00 605K
459-ImprovedIntegralCryptanalysisofFeistelStruc..> 14-May-2015 22:00 196K
459-NewObservationonDivisionProperty.pdf 23-May-2015 22:00 194K
460-StepbyStepTowardsCreatingaSafeSmartContract..> 14-May-2015 22:00 333K
461-ApproximateAlgorithmsonLatticeswithSmallDet..> 20-Jan-2023 08:24 110K
461-Cryptanalysisofthemultilinearmapontheideall..> 14-May-2015 22:00 372K
462-AcceleratingSWHEbasedPIRsusingGPUs.pdf 15-May-2015 22:00 461K
463-MultilinearMapsUsingRandomMatrix.pdf 15-May-2015 22:00 133K
464-BitcoinandBeyondATechnicalSurveyonDecentral..> 17-May-2015 22:00 706K
465-EfficientArithmeticonARMNEONandItsApplicati..> 17-May-2015 22:00 421K
466-EfficientFullyHomomorphicEncryptionwithCirc..> 17-May-2015 22:00 231K
467-TheObliviousMachineorHowtoPuttheCintoMPC.pdf 18-May-2015 22:00 422K
468-PracticalFullyHomomorphicEncryptionwithoutN..> 18-May-2015 22:00 340K
469-ShadowBitcoinScalableSimulationviaDirectExe..> 19-May-2015 22:01 416K
470-OnthePowerofPublickeyFunctionalEncryptionwi..> 20-May-2015 22:00 403K
470-OnthepowerofPublickeyFunctionalEncryptionwi..> 19-May-2015 22:01 403K
471-AChallengeObfuscationMethodforThwartingMode..> 19-May-2015 22:01 530K
472-HighPerformanceMultiPartyComputationforBina..> 19-May-2015 22:01 1M
473-VARIANTSOFDIFFERENTIALANDLINEARCRYPTANALYSI..> 19-May-2015 22:01 433K
474-FullyHomomorphicEncryptionwithoutbootstrapp..> 19-May-2015 22:01 2M
475-RandomizingScalarMultiplicationUsingExactCo..> 19-May-2015 22:01 579K
475-Randomizingscalarmultiplicationusingexactco..> 20-Jan-2023 08:24 436K
476-XPXGeneralizedTweakableEvenMansourwithImpro..> 19-May-2015 22:01 787K
477-AuthenticationKeyRecoveryinGaloisCounterMod..> 19-May-2015 22:00 7M
477-AuthenticationKeyRecoveryonGaloisCounterMod..> 20-Jan-2023 08:24 498K
478-HowtoBuildTimeLockEncryption.pdf 19-May-2015 22:00 313K
479-AProvablySecureGroupSignatureSchemefromCode..> 20-May-2015 22:00 569K
480-TrinocchioPrivacyFriendlyOutsourcingbyDistr..> 20-May-2015 22:00 518K
481-AdvancedDifferentialCryptanalysisofReducedR..> 20-May-2015 22:00 255K
482-Howtobuildtimelockencryption.pdf 20-Jan-2023 08:24 720K
482-TimereleaseProtocolfromBitcoinandWitnessEnc..> 21-May-2015 22:00 366K
483-Improvedsecurityproofsinlatticebasedcryptog..> 21-May-2015 22:00 512K
483-Improvedsecurityproofsinlatticebasedcryptog..> 20-Jan-2023 08:23 586K
484-MoreRoundsLessSecurity.pdf 21-May-2015 22:00 195K
485-TurningOnlineCiphersOff.pdf 21-May-2015 22:00 645K
486-DECIMDetectingEndpointCompromiseInMessaging..> 20-Jan-2023 08:23 313K
486-Howtodetectunauthorisedusageofakey.pdf 21-May-2015 22:00 316K
487-ContentioninCryptolandObfuscationLeakageand..> 22-May-2015 22:00 516K
488-OnBlackBoxComplexityofUniversallyComposable..> 22-May-2015 22:00 495K
489-ScalableandprivatemediaconsumptionwithPopco..> 22-May-2015 22:00 509K
490-CryptanalysisOfDynamicIDBasedRemoteUserAuth..> 25-May-2015 22:00 167K
491-Reencryptionfunctionalreencryptionandmultih..> 25-May-2015 22:00 308K
492-MaskingvsMultipartyComputationHowLargeisthe..> 25-May-2015 22:00 357K
493-FaultTolerantInfectiveCountermeasureforAES.pdf 25-May-2015 22:00 476K
494-CryptanalysisoftheLSHandSHAVHashFunctions.pdf 25-May-2015 22:00 459K
495-Improvingalgebraicattacksonstreamciphersbas..> 20-Jan-2023 08:23 325K
495-PowersofSubfieldPolynomialsandAlgebraicAtta..> 25-May-2015 22:00 490K
496-QuantifyingLocationPrivacyLeakagefromTransa..> 26-May-2015 22:00 353K
497-EfficientZeroKnowledgeProofsofNonAlgebraicS..> 26-May-2015 22:00 432K
498-LowSpaceComplexityCRTbasedBitParallelGF2nPo..> 26-May-2015 22:00 163K
499-AlgebraicpartitioningFullycompactandalmostt..> 26-May-2015 22:00 293K
500-FaultCryptanalysisofCHES2014SymmetricInfect..> 26-May-2015 22:00 374K
501-MultiProverCommitmentsAgainstNonSignalingAt..> 26-May-2015 22:00 364K
502-CentrallyBankedCryptocurrencies.pdf 26-May-2015 22:00 431K
503-TheNorwegianInternetVotingProtocolAnewInsta..> 27-May-2015 22:00 330K
504-TheIteratedRandomPermutationProblemwithAppl..> 27-May-2015 22:00 493K
505-TheTowerNumberFieldSieve.pdf 27-May-2015 22:00 638K
506-CompositionalVerificationofHigherOrderMaski..> 27-May-2015 22:00 659K
506-StrongNonInterferenceandTypeDirectedHigherO..> 20-Jan-2023 08:23 530K
507-DecomposingtheASASABlockCipherConstruction.pdf 27-May-2015 22:00 478K
508-ProbabilisticSignatureBasedFrameworkforDiff..> 27-May-2015 22:00 554K
509-AflawinatheoremaboutSchnorrsignatures.pdf 27-May-2015 22:00 234K
510-EquivoeTTranspositionEquivocationCryptograp..> 27-May-2015 22:00 460K
511-NearCollisionSideChannelAttacks.pdf 27-May-2015 22:00 1M
512-EfficientKeyExtractionfromthePrimarySideofa..> 28-May-2015 22:00 4M
512-KeyExtractionfromthePrimarySideofaSwitchedM..> 20-Jan-2023 08:23 1021K
513-ComputingIndividualDiscreteLogarithmsFaster..> 29-May-2015 22:00 398K
514-TimeLockPuzzlesfromRandomizedEncodings.pdf 29-May-2015 22:00 459K
515-HigherOrderDifferentialMeetinTheMiddlePreim..> 29-May-2015 22:00 576K
516-KeyRecoveryAttacksonASASA.pdf 29-May-2015 22:00 618K
517-SubversionResilientSignatureSchemes.pdf 30-May-2015 22:00 484K
517-SubversionResilientSignaturesDefinitionsCon..> 30-Oct-2015 23:00 525K
518-BroadcastingIntermediateBlocksasaDefenseMec..> 30-May-2015 22:00 260K
519-NotesonTwoFullyHomomorphicEncryptionSchemes..> 30-May-2015 22:00 146K
520-AConstantTimeSingleRoundAttributeBasedAuthe..> 18-Oct-2015 22:00 503K
520-EfficientPairingFreeOneRoundAttributeBasedA..> 31-May-2015 22:00 493K
521-DemocoinAPubliclyVerifiableandJointlyServic..> 31-May-2015 22:00 388K
522-Speedinguplatticesievingwithoutincreasingth..> 31-May-2015 22:00 498K
523-EfficientConstantRoundMultiPartyComputation..> 31-May-2015 22:00 423K
524-SecureKeyExchangeProtocolbasedonVirtualProo..> 02-Jun-2015 22:00 332K
525-ShortRandomizableSignatures.pdf 02-Jun-2015 22:00 415K
526-GenericKeyRecoveryAttackonFeistelScheme.pdf 02-Jun-2015 22:00 288K
527-RobustProfilingforDPAStyleAttacks.pdf 02-Jun-2015 22:00 546K
528-SpaceMintACryptocurrencyBasedonProofsofSpac..> 20-Jan-2023 08:23 586K
528-SpacecoinACryptocurrencyBasedonProofsofSpac..> 05-Jun-2015 22:00 428K
528-SpacemintACryptocurrencyBasedonProofsofSpac..> 17-Nov-2015 23:00 496K
529-PowerAnalysisAttacksagainstIEEE802154Nodes.pdf 05-Jun-2015 22:00 2M
530-PracticalFreeStartCollisionAttackson76stepS..> 05-Jun-2015 22:00 378K
531-ReproducibleCircularlySecureBitEncryptionAp..> 05-Jun-2015 22:00 413K
532-PICOAnUltralightweightandLowpowerencryption..> 05-Jun-2015 22:00 269K
533-RelatedKeyRectangleAttackonRoundreducedtext..> 05-Jun-2015 22:00 701K
534-Problemssolutionsandexperienceofthefirstint..> 20-Jan-2023 08:23 3M
534-Problemssolutionsandexperienceofthefirstint..> 08-Jun-2015 22:00 3M
535-ASCASASCAandDPAwithEnumerationWhichOneBeats..> 08-Jun-2015 22:00 442K
536-FromImprovedLeakageDetectiontotheDetectiono..> 08-Jun-2015 22:00 783K
537-TowardsEasyLeakageCertification.pdf 08-Jun-2015 22:00 900K
538-PairingBasedMutualHealinginWirelessSensorNe..> 08-Jun-2015 22:00 375K
539-TweakingEvenMansourCiphers.pdf 08-Jun-2015 22:00 828K
540-PICOAnUltralightweightandLowpowerencryption..> 08-Jun-2015 22:00 279K
541-SecurityofFullStateKeyedSpongeandDuplexAppl..> 23-Sep-2015 22:00 833K
541-SecurityofFullStateKeyedandDuplexSpongeAppl..> 08-Jun-2015 22:00 645K
542-ImprovedSideChannelAnalysisofFiniteFieldMul..> 08-Jun-2015 22:00 616K
543-BloomFiltersinAdversarialEnvironments.pdf 08-Jun-2015 22:00 505K
544-Alternativecubics39ruleswithanalgebraicappe..> 20-Jan-2023 08:23 307K
544-Alternativecubicsruleswithanalgebraicappeal..> 08-Jun-2015 22:00 290K
545-FROPUFHowtoExtractMoreEntropyfromTwoRingOsc..> 08-Jun-2015 22:00 407K
546-ActivelySecureOTExtensionwithOptimalOverhea..> 08-Jun-2015 22:00 300K
547-SecureComputationofMIPSMachineCode.pdf 08-Jun-2015 22:00 462K
548-MessageTransmissionwithReverseFirewallsSecu..> 08-Jun-2015 22:00 623K
549-ILTRUAnNTRULikePublicKeyCryptosystemOverIde..> 08-Jun-2015 22:00 556K
550-UpendingStockMarketStructureUsingSecureMult..> 08-Jun-2015 22:00 179K
551-Quantumhomomorphicencryptionforcircuitsoflo..> 12-Jun-2015 22:00 731K
552-AnImprovedBKWAlgorithmforLWEwithApplication..> 14-Jun-2015 22:00 1M
553-RoundOptimalBlackBoxTwoPartyComputation.pdf 14-Jun-2015 22:00 665K
554-AnAlgebraicFrameworkforPseudorandomFunction..> 15-Jun-2015 22:00 438K
555-AttributeBasedSigncryptionSignerPrivacyStro..> 15-Jun-2015 22:00 593K
556-LightweightCoprocessorforKoblitzCurves283bi..> 15-Jun-2015 22:00 358K
557-ImprovedAllSubkeysRecoveryAttacksonFOXKATAN..> 15-Jun-2015 22:00 257K
558-EfficiencyEvaluationofCryptographicProtocol..> 17-Jun-2015 22:00 381K
559-ConcurrentSecureComputationwithOptimalQuery..> 17-Jun-2015 22:00 434K
560-GenericConstructionofUCSecureObliviousTrans..> 17-Jun-2015 22:00 431K
561-SoCittoEMelectromagneticsidechannelattackso..> 17-Jun-2015 22:00 5M
562-PUAPrivacyandUnforgeabilityforAggregation.pdf 17-Jun-2015 22:00 403K
562-PUDAPrivacyandUnforgeabilityforDataAggregat..> 19-Jun-2015 22:00 412K
563-PrivacyintheGenomicEra.pdf 17-Jun-2015 22:00 3M
564-SanctumMinimalHardwareExtensionsforStrongSo..> 13-Oct-2015 22:00 393K
564-SanctumMinimalRISCExtensionsforIsolatedExec..> 17-Jun-2015 22:00 332K
565-FourQfourdimensionaldecompositionsonaQcurve..> 17-Jun-2015 22:00 467K
566-AFrameworkforIdentityBasedEncryptionwithAlm..> 17-Jun-2015 22:00 730K
567-KeyRecoveryAttackontheASASACryptosystemwith..> 17-Jun-2015 22:00 2M
568-CryptanalysisofReducedRoundWhirlwindFullVer..> 17-Jun-2015 22:00 3M
569-ImprovedPseudoPreimageAttacksonReducedRound..> 17-Jun-2015 22:00 1M
570-ConstantCommunicationORAMwithSmallBlocksize..> 13-Aug-2015 22:00 439K
570-ConstantCommunicationObliviousRAM.pdf 17-Jun-2015 22:00 420K
571-RobustandOnePassParallelComputationofCorrel..> 17-Jun-2015 22:00 418K
571-RobustandOnePassParallelComputationofCorrel..> 20-Jan-2023 08:23 406K
572-OnPublicKeyEncryptionfromNoisyCodewords.pdf 17-Jun-2015 22:00 417K
573-LastfalldegreeHFEandWeildescentattacksonECD..> 17-Jun-2015 22:00 408K
574-FairandRobustMultiPartyComputationusingaGlo..> 17-Jun-2015 22:00 441K
575-KnownkeyDistinguisheronFullPRESENT.pdf 17-Jun-2015 22:00 403K
576-TheCarnacprotocolorhowtoreadthecontentsofas..> 17-Jun-2015 22:00 107K
577-TwistInsecurity.pdf 17-Jun-2015 22:00 278K
578-TamperingwiththeDeliveryofBlocksandTransact..> 17-Jun-2015 22:00 791K
579-ASimpleProofofaDistinguishingBoundofIterate..> 18-Jun-2015 22:00 256K
580-ComposableModularAnonymousCredentialsDefini..> 21-Jun-2015 22:01 581K
580-ComposableampModularAnonymousCredentialsDef..> 20-Jan-2023 08:23 581K
581-UniversalComputationalExtractorsandtheSuper..> 21-Jun-2015 22:00 863K
582-HowSecureandQuickisQUICProvableSecurityandP..> 21-Jun-2015 22:00 476K
583-SecureKeyGenerationfromBiasedPUFs.pdf 21-Jun-2015 22:00 906K
584-HowtoSecurelyProlongtheComputationalBinding..> 21-Jun-2015 22:00 363K
585-SIMONandSPECKBlockCiphersfortheInternetofTh..> 21-Jun-2015 22:00 613K
586-SCLPVSecureCertificatelessPublicVerificatio..> 21-Jun-2015 22:00 502K
587-ANENHANCEDBIOMETRICBASEDREMOTEUSERAUTHENTIC..> 21-Jun-2015 22:00 1M
588-AnanalysisoftheCclassofbentfunctions.pdf 21-Jun-2015 22:00 348K
589-GeneratingSBoxMultivariateQuadraticEquation..> 21-Jun-2015 22:00 383K
590-TriviAAFastandSecureAuthenticatedEncryption..> 21-Jun-2015 22:00 1M
591-Howmuchrandomnesscanbeextractedfrommemoryle..> 21-Jun-2015 22:00 415K
592-OblivionMitigatingPrivacyLeaksbyControlling..> 21-Jun-2015 22:00 3M
593-APhysicalApproachforStochasticModelingofTER..> 21-Jun-2015 22:00 1M
594-DiskEncryptionDoWeNeedtoPreserveLength.pdf 21-Jun-2015 22:00 291K
595-DifferentialFaultIntensityAnalysis.pdf 21-Jun-2015 22:00 1016K
596-ZeroizingWithoutLowLevelZeroesNewMMAPAttack..> 21-Jun-2015 22:00 533K
597-AssessmentofHidingtheHigherOrderLeakagesinH..> 21-Jun-2015 22:00 2M
598-CombiningDifferentialPrivacyandSecureMultip..> 21-Jun-2015 22:00 353K
599-TheChainRuleforHILLPseudoentropyRevisited.pdf 21-Jun-2015 22:00 433K
600-PredictiveModelsforMinEntropyEstimation.pdf 21-Jun-2015 22:00 604K
601-ASecureObliviousTransferProtocolfromIndisti..> 28-Jun-2015 22:00 146K
602-CombinedSideChannelandFaultAnalysisAttackon..> 28-Jun-2015 22:00 316K
603-ComplementaryDualCodesforCountermeasurestoS..> 28-Jun-2015 22:00 501K
604-StructurePreservingSignaturesfromStandardAs..> 28-Jun-2015 22:00 434K
605-ComputingEllipticCurveDiscreteLogarithmswit..> 28-Jun-2015 22:00 867K
606-ConstructingEfficientPAKEProtocolsfromIdent..> 28-Jun-2015 22:00 376K
607-NetcoinATraceableP2PElectronicCashSystem.pdf 28-Jun-2015 22:00 554K
608-FullySecureFunctionalEncryptionforInnerProd..> 28-Jun-2015 22:00 474K
609-ExperimentalStudyofDIGIPASSGO3andtheSecurit..> 28-Jun-2015 22:00 289K
610-McBitsfastconstanttimecodebasedcryptography..> 28-Jun-2015 22:00 395K
611-AUnifiedSecurityAnalysisofTwophaseKeyExchan..> 28-Jun-2015 22:00 468K
612-TheSimeckFamilyofLightweightBlockCiphers.pdf 30-Jun-2015 22:01 571K
613-AccountableAuthorityCiphertextPolicyAttribu..> 30-Jun-2015 22:01 429K
614-BitSecurityoftheHyperellipticCurvesDiffieHe..> 30-Jun-2015 22:01 196K
615-SecurityAnalysisofNiuetalAuthenticationandO..> 30-Jun-2015 22:01 253K
616-TheleakingbatteryAprivacyanalysisoftheHTML5..> 30-Jun-2015 22:01 234K
617-Generalisedtallybaseddecodersfortraitortrac..> 30-Jun-2015 22:01 762K
618-AnAuthenticationCodeoverGaloisRingswithOpti..> 30-Jun-2015 22:01 388K
619-ConstructionofArithmeticSecretSharingScheme..> 30-Jun-2015 22:00 291K
620-StatisticalConcurrentNonmalleableZeroknowle..> 30-Jun-2015 22:00 184K
621-WhowatchesthewatchmenUtilizingPerformanceMo..> 30-Jun-2015 22:00 704K
622-RandomDigitRepresentationofIntegers.pdf 30-Jun-2015 22:00 321K
623-DesignEvaluationandOptimizationofPhysicalUn..> 30-Jun-2015 22:00 986K
624-AutomatedAnalysisandSynthesisofAuthenticate..> 30-Jun-2015 22:00 769K
625-Ed448Goldilocksanewellipticcurve.pdf 30-Jun-2015 22:00 249K
626-PracticalRoundOptimalBlindSignaturesintheSt..> 30-Jun-2015 22:00 482K
627-OnNecessaryPaddingwithIO.pdf 30-Jun-2015 22:00 251K
628-AnUnconditionallyHidingandLongTermBindingPo..> 30-Jun-2015 22:00 419K
629-BeleniosRFANoninteractiveReceiptFreeElectro..> 20-Jan-2023 08:23 500K
629-BeleniosRFAStronglyReceiptFreeElectronicVot..> 30-Jun-2015 22:00 374K
630-UnconditionallySecureComputationwithReduced..> 30-Jun-2015 22:00 329K
631-AcceleratingHomomorphicEvaluationonReconfig..> 30-Jun-2015 22:00 2M
632-MoreonImpossibilityofVirtualBlackBoxObfusca..> 30-Jun-2015 22:00 540K
632-OntheImpossibilityofVirtualBlackBoxObfuscat..> 20-Jan-2023 08:23 550K
633-AnEfficientIDBasedMessageRecoverablePrivacy..> 30-Jun-2015 22:00 239K
634-PhasingPrivateSetIntersectionusingPermutati..> 30-Jun-2015 22:00 354K
635-MicrocashEfficientOffLineSmallPayments.pdf 30-Jun-2015 22:00 81K
636-AnalyzingConstructionsforkeyalternatingPseu..> 30-Jun-2015 22:00 590K
636-OnStreamCipherswithProvableBeyondtheBirthda..> 20-Jan-2023 08:23 584K
637-ANovelCyberspaceOrientedAccessControlModel.pdf 30-Jun-2015 22:00 990K
638-AnEfficientManyCoreArchitectureforEllipticC..> 30-Jun-2015 22:00 612K
639-PolynomialTimeReductionfromApproximateShort..> 15-Nov-2015 23:00 254K
639-Polynomialtimereductionfromapproximateshort..> 30-Jun-2015 22:00 232K
639-Polynomialtimereductionfromapproximateshort..> 01-Jul-2015 22:00 233K
640-Veryefficientsimulatableflippingofmanycoins..> 30-Jun-2015 22:00 1M
641-NoiseFreeSymmetricFullyHomomorphicEncryptio..> 13-Oct-2015 22:00 163K
641-NoisefreeSymmetricFullyHomomorphicEncryptio..> 30-Jun-2015 22:00 135K
642-ANewPartialKeyExposureAttackonMultipowerRSA..> 30-Jun-2015 22:00 447K
643-ShortAccountableRingSignaturesBasedonDDH.pdf 30-Jun-2015 22:00 290K
644-ThePythiaPRFService.pdf 01-Jul-2015 22:00 501K
645-EfficientDynamicProvableDataPossessionProto..> 29-Oct-2015 23:00 479K
645-ImprovementsonEfficientDynamicProvableDataP..> 01-Jul-2015 22:00 414K
645-NewDynamicProvableDataPossessionProtocolswi..> 20-Jan-2023 14:19 207
646-DecompositionattackonSASASASAS.pdf 01-Jul-2015 22:00 258K
647-Efficientephemeralellipticcurvecryptographi..> 01-Jul-2015 22:00 389K
648-AdaptiveProofsofKnowledgeintheRandomOracleM..> 01-Jul-2015 22:00 684K
649-OntheHardnessofProvingCCAsecurityofSignedEl..> 01-Jul-2015 22:00 424K
650-ANewEncryptionStandardofUkraineTheKalynaBlo..> 01-Jul-2015 22:00 528K
651-SecureExecutionArchitecturebasedonPUFdriven..> 01-Jul-2015 22:00 631K
652-Modellingciphersuiteandversionnegotiationin..> 01-Jul-2015 22:00 403K
653-HomomorphicSignatureSchemesAsurvey.pdf 01-Jul-2015 22:00 406K
654-DAATZAnEfficientDAASchemeforMobileDevicesus..> 02-Jul-2015 22:00 921K
655-AnEfficientMultiMessageMultiReceiverSigncry..> 02-Jul-2015 22:00 154K
656-CryptanalysisofaMarkovChainBasedUserAuthent..> 02-Jul-2015 22:00 83K
657-RandomizingtheMontgomeryPoweringLadder.pdf 02-Jul-2015 22:00 277K
658-SingleCycleImplementationsofBlockCiphers.pdf 02-Jul-2015 22:00 309K
659-DiversityandTransparencyforECC.pdf 02-Jul-2015 22:00 589K
660-AHybridGaussianSamplerforLatticesoverRings.pdf 02-Jul-2015 22:00 696K
661-Cryptanalysisofamodernrotormachineinamultic..> 02-Jul-2015 22:00 284K
662-StrongSecurityoftheStronglyMultiplicativeRa..> 02-Jul-2015 22:00 91K
663-AnalyzingtheEfficiencyofBiasedFaultBasedAtt..> 04-Jul-2015 22:00 930K
664-SecureMultiPartyShuffling.pdf 05-Jul-2015 22:00 717K
665-CommunicationComplexityofConditionalDisclos..> 05-Jul-2015 22:00 238K
666-ImprovedLinearHullAttackonRoundReducedSimon..> 05-Jul-2015 22:00 576K
666-ImprovedLinearHullAttackonRoundReducedtexts..> 20-Jan-2023 08:23 748K
667-DeBruijnSequencesfromJoiningCyclesofNonline..> 20-Jan-2023 08:23 441K
667-DeBruijnSequencesfromNonlinearFeedbackShift..> 05-Jul-2015 22:00 253K
668-TheFallacyofCompositionofObliviousRAMandSea..> 05-Jul-2015 22:00 882K
669-GMUHardwareAPIforAuthenticatedCiphers.pdf 05-Jul-2015 22:00 623K
670-SmartSecurityManagementinSecureDevices.pdf 05-Jul-2015 22:00 477K
671-PrivacypreservingFrequentItemsetMiningforSp..> 05-Jul-2015 22:00 237K
672-FunctionHidingInnerProductEncryption.pdf 05-Jul-2015 22:00 316K
673-DecafEliminatingcofactorsthroughpointcompre..> 05-Jul-2015 22:00 325K
674-PreprocessingBasedVerificationofMultipartyP..> 05-Jul-2015 22:00 428K
675-HawkTheBlockchainModelofCryptographyandPriv..> 05-Jul-2015 22:00 719K
676-QuantumCryptanalysisofNTRU.pdf 05-Jul-2015 22:00 176K
677-EdDSAformorecurves.pdf 05-Jul-2015 22:00 144K
678-OptimizingMAKWAonGPUandCPU.pdf 06-Jul-2015 22:00 213K
679-AnotherLookatNormalApproximationsinCryptana..> 06-Jul-2015 22:00 410K
680-IndifferentiabilityofConfusionDiffusionNetw..> 06-Jul-2015 22:00 637K
681-ANONIZEALargeScaleAnonymousSurveySystem.pdf 07-Jul-2015 22:00 323K
682-IntegralCryptanalysisonFullMISTY1.pdf 07-Jul-2015 22:00 597K
683-SecurityofLinearSecretSharingSchemesagainst..> 07-Jul-2015 22:00 411K
684-AOnetimeStegosystemandApplicationstoEfficie..> 08-Jul-2015 22:00 538K
685-Onthediscretelogarithmprobleminfinitefields..> 13-Jul-2015 22:00 291K
686-CryptanalysisforSecureandEfficientSmartCard..> 13-Jul-2015 22:00 63K
687-ClassicalCryptographicProtocolsinaQuantumWo..> 13-Jul-2015 22:00 591K
688-BinaryFieldMultiplicationonARMv8.pdf 13-Jul-2015 22:00 85K
689-CountingKeysinParallelAfteraSideChannelAtta..> 04-Sep-2015 22:00 1M
689-HowtoEnumerateYourKeysAccuratelyandEfficien..> 13-Jul-2015 22:00 708K
690-SystematicReverseEngineeringofCacheSliceSel..> 13-Jul-2015 22:00 604K
691-SpecTreATinySideChannelResistantSpeckCorefo..> 13-Jul-2015 22:00 874K
692-FastandSecureLinearRegressionandBiometricAu..> 13-Jul-2015 22:00 529K
693-FoundationsofReactiveGarblingSchemes.pdf 13-Jul-2015 22:00 805K
694-OntheComplexityofAdditivelyHomomorphicUCCom..> 13-Jul-2015 22:00 624K
695-CliptographyClippingthePowerofKleptographic..> 13-Jul-2015 22:00 333K
696-NovelalgorithmsandhardwarearchitecturesforM..> 13-Jul-2015 22:00 996K
697-OntheSecurityofaSelfhealingGroupKeyDistribu..> 13-Jul-2015 22:00 278K
698-ChosenIVCryptanalysisonReducedRoundChaChaan..> 14-Jul-2015 22:00 454K
699-FURISCFHEEncryptedURISCDesign.pdf 14-Jul-2015 22:00 289K
700-FourNeighbourhoodCellularAutomataasBetterCr..> 14-Jul-2015 22:00 174K
701-DifferentialPrivacyindistributionandinstanc..> 14-Jul-2015 22:00 301K
701-Differentiallyprivateinstancebasednoisemech..> 20-Jan-2023 08:23 526K
702-Demystifyingincentivesintheconsensuscompute..> 14-Jul-2015 22:00 403K
703-PointFunctionObfuscationAFrameworkandGeneri..> 14-Jul-2015 22:00 180K
704-IndistinguishabilityObfuscationfromApproxim..> 14-Jul-2015 22:00 455K
705-LinearOverheadOptimallyresilientRobustMPCUs..> 20-Jan-2023 08:23 514K
705-LinearOverheadRobustMPCwithHonestMajorityUs..> 14-Jul-2015 22:00 498K
706-ABriefComparisonofSimonandSimeck.pdf 18-Jul-2015 22:01 440K
707-ReconcilingUserPrivacyandImplicitAuthentica..> 18-Jul-2015 22:01 731K
708-ChoosingParametersforNTRUEncrypt.pdf 18-Jul-2015 22:01 456K
709-DetectingMobileApplicationSpoofingAttacksby..> 18-Jul-2015 22:00 3M
710-PrivacyPreservingContentBasedImageRetrieval..> 18-Jul-2015 22:00 4M
711-ConstructionofLightweightSBoxesusingFeistel..> 18-Jul-2015 22:00 428K
712-AdaptiveProofshaveStraightlineExtractorsint..> 20-Jan-2023 08:23 486K
712-OnLimitationsoftheFiatShamirTransformation.pdf 18-Jul-2015 22:00 595K
713-LighthHBANewVersionofhHBwithImprovedSession..> 18-Jul-2015 22:00 282K
714-NewclassesofpublickeycryptosystemKXVISE1PKC..> 19-Jul-2015 22:00 206K
714-NewclassesofpublickeycryptosystemKXVISE1PKC..> 18-Jul-2015 22:00 207K
715-NewCircularSecurityCounterexamplesfromDecis..> 18-Jul-2015 22:00 512K
716-LinearCryptanalysisofReducedRoundSIMECKVari..> 20-Jul-2015 22:00 306K
717-TowardsSecureCryptographicSoftwareImplement..> 20-Jul-2015 22:00 481K
718-EfficientAsynchronousAccumulatorsforDistrib..> 20-Jul-2015 22:00 426K
719-Consolidatingmaskingschemes.pdf 20-Jul-2015 22:00 457K
720-OutputCompressingRandomizedEncodingsandAppl..> 20-Jul-2015 22:00 493K
721-KDMSecurityviaHomomorphicSmoothProjectiveHa..> 21-Jul-2015 22:00 101K
722-ObliviousSubstringSearchwithUpdates.pdf 21-Jul-2015 22:00 546K
723-CryptanalysisofFeistelNetworkswithSecretRou..> 21-Jul-2015 22:00 584K
724-AmaskedringLWEimplementation.pdf 21-Jul-2015 22:00 5M
725-TheselfblindableUProveschemebyHanzlikandKlu..> 21-Jul-2015 22:00 332K
725-TheselfblindableUProveschemefromFC3914isfor..> 20-Jan-2023 08:23 312K
726-Compositionsoflinearfunctionsandapplication..> 21-Jul-2015 22:00 57K
727-DPABitslicingandMaskingat1GHz.pdf 21-Jul-2015 22:00 2M
728-ProvableVirusDetectionUsingtheUncertaintyPr..> 21-Jul-2015 22:00 376K
729-ProvablySecureRemoteMemoryAttestationtoPrev..> 29-Dec-2015 23:00 328K
729-TowardsProvablySecureRemoteMemoryAttestatio..> 21-Jul-2015 22:00 321K
730-AchievingCompactnessGenericallyIndistinguis..> 24-Jul-2015 22:00 444K
730-IndistinguishabilityObfuscationfromFunction..> 28-Oct-2015 23:00 462K
730-IndistinguishabilityObfuscationfromFunction..> 21-Oct-2015 22:00 466K
731-SameValueAnalysisonEdwardsCurves.pdf 24-Jul-2015 22:00 372K
732-CompactImplementationsofLEABlockCipherforLo..> 24-Jul-2015 22:00 235K
733-FullyHomomorphicEncryptiononOctonionRing.pdf 24-Jul-2015 22:00 1M
734-OntheSecurityofExtendedGeneralizedFeistelNe..> 24-Jul-2015 22:00 139K
735-CuttingEdgeCryptographyThroughtheLensofSecr..> 21-Oct-2015 22:00 1M
735-ModernCryptographyThroughtheLensofSecretSha..> 24-Jul-2015 22:00 1M
736-SolvingLWEviaListDecoding.pdf 24-Jul-2015 22:00 295K
737-Newmultilinearmapsfromideallattices.pdf 24-Jul-2015 22:00 161K
738-AuthenticatedEncryptionwithSmallStretchorHo..> 20-Jan-2023 08:23 280K
738-AuthenticatedEncryptionwithoutTagExpansiono..> 24-Jul-2015 22:00 232K
739-Finegrainedsharingofencryptedsensordataover..> 24-Jul-2015 22:00 2M
739-PracticalandScalableSharingofEncryptedDatai..> 20-Jan-2023 14:19 207
740-PredictableArgumentsofKnowledge.pdf 24-Jul-2015 22:00 348K
741-OnGenericConstructionsofCircularlySecureLea..> 24-Jul-2015 22:00 471K
742-AMatrixDecompositionMethodforOptimalNormalB..> 24-Jul-2015 22:00 214K
743-ShortGroupSignaturesviaStructurePreservingS..> 24-Jul-2015 22:00 826K
744-BitCryptorBitSerializedCompactCryptoEngineo..> 24-Jul-2015 22:00 1M
745-FasterECCoverF2571featPMULL.pdf 20-Jan-2023 08:23 85K
745-FasterECCoverF_2571featPMULL.pdf 24-Jul-2015 22:00 96K
746-A270AttackontheFullMISTY1.pdf 30-Jul-2015 22:00 411K
747-SelfbilinearMapfromOneWayEncodingSystemandI..> 30-Jul-2015 22:00 192K
748-AMoreCautiousApproachtoSecurityAgainstMassS..> 30-Jul-2015 22:00 478K
749-AffineEquivalenceanditsApplicationtoTighten..> 30-Jul-2015 22:00 698K
750-AnonymousTraitorTracingHowtoEmbedArbitraryI..> 30-Jul-2015 22:00 526K
751-FastGarblingofCircuitsUnderStandardAssumpti..> 30-Jul-2015 22:00 575K
752-OnConstructingOneWayPermutationsfromIndisti..> 30-Jul-2015 22:00 750K
753-DifferentialComputationAnalysisHidingyourWh..> 30-Jul-2015 22:00 562K
754-RelatedKeyAttackonFullRoundPICARO.pdf 30-Jul-2015 22:00 463K
755-RevisitingTESLAinthequantumrandomoraclemode..> 20-Jan-2023 08:23 734K
755-TESLATightlySecureEfficientSignaturesfromSt..> 30-Jul-2015 22:00 728K
756-CryptanalysisofanImprovedOneWayHashChainSel..> 30-Jul-2015 22:00 269K
757-StreamCipherOperationModeswithImprovedSecur..> 30-Jul-2015 22:00 409K
758-RingLWECryptographyfortheNumberTheorist.pdf 30-Jul-2015 22:00 367K
759-CryptanalysisofGu39sidealmultilinearmap.pdf 20-Jan-2023 08:22 384K
759-CryptanalysisofGusidealmultilinearmap.pdf 30-Jul-2015 22:00 384K
760-InvestigatingSRAMPUFsinlargeCPUsandGPUs.pdf 31-Jul-2015 22:01 2M
761-ImplementationoftheSCREAMTweakableBlockCiph..> 31-Jul-2015 22:00 46K
762-AMeetintheMiddleAttackonReducedRoundKalynab..> 31-Jul-2015 22:00 712K
763-HighlyEfficientGF28InversionCircuitBasedonR..> 31-Jul-2015 22:00 276K
764-ANoteonGeneratingCosetRepresentativesofPGL_..> 31-Jul-2015 22:00 286K
764-OnGeneratingCosetRepresentativesofPGL_2F_qi..> 08-Aug-2015 22:00 328K
765-SanitizableSigncryptionSanitizationoverEncr..> 31-Jul-2015 22:00 720K
766-RelateKeyAlmostUniversalHashFunctionsDefini..> 31-Jul-2015 22:00 337K
766-RelatedKeyAlmostUniversalHashFunctionsDefin..> 20-Nov-2015 23:00 360K
767-DualECAStandardizedBackDoor.pdf 31-Jul-2015 22:00 386K
768-InterdictioninPracticeHardwareTrojanAgainst..> 31-Jul-2015 22:00 2M
769-OntheHardnessofLearningwithRoundingoverSmal..> 31-Jul-2015 22:00 333K
770-ATransformforNIZKAlmostasEfficientandGenera..> 03-Aug-2015 22:00 405K
771-ASATbasedPublicKeyCryptographyScheme.pdf 11-Aug-2015 22:00 362K
771-ASATbasedpublickeyencryptionscheme.pdf 03-Aug-2015 22:00 355K
772-NonMalleableEncryptionSimplerShorterStronge..> 03-Aug-2015 22:00 561K
773-Distinguishingatruncatedrandompermutationfr..> 03-Aug-2015 22:00 371K
774-RevisitingPrimePowerRSA.pdf 03-Aug-2015 22:00 245K
775-EfficientMDSDiffusionLayersThroughDecomposi..> 03-Aug-2015 22:00 481K
776-FunctionalEncryptionforTuringMachines.pdf 04-Aug-2015 22:00 784K
777-ArithmeticWalshTransformofBooleanFunctionsw..> 04-Aug-2015 22:00 112K
778-ModularInversionHiddenNumberProblemCorrecti..> 04-Aug-2015 22:00 378K
779-ASimpleSchemeforStrengtheningProductsumType..> 05-Aug-2015 22:00 71K
780-MultilinearMapsfromObfuscation.pdf 05-Aug-2015 22:00 347K
781-TwistedHessiancurves.pdf 06-Aug-2015 22:00 922K
782-Securetwopartycomputationinappliedpicalculu..> 06-Aug-2015 22:00 621K
783-CryptanalysisoftheAuthenticatedEncryptionAl..> 06-Aug-2015 22:00 451K
784-ThresholdFlipThemWhenthewinnerdoesnotneedto..> 06-Aug-2015 22:00 329K
785-DoubleSpeedBarrettModuli.pdf 07-Aug-2015 22:00 495K
786-BuyingAESDesignResistancewithSpeedandEnergy..> 07-Aug-2015 22:00 318K
787-BacktrackingAssistedMultiplication.pdf 07-Aug-2015 22:00 534K
788-CrackingResistantPasswordVaultsusingNatural..> 07-Aug-2015 22:00 527K
789-EfficientHardwareImplementationsoftheWarble..> 10-Aug-2015 22:00 249K
790-Onweakandstrong2kbentBooleanfunctions.pdf 10-Aug-2015 22:00 373K
791-OntheEquivalenceofObfuscationandMultilinear..> 13-Aug-2015 22:00 320K
791-Ontheequivalenceofobfuscationandmultilinear..> 10-Aug-2015 22:00 320K
792-StandardSecurityDoesNotImplyIndistinguishab..> 10-Aug-2015 22:00 393K
793-AlgorithmicInformationTheoryforObfuscationS..> 10-Aug-2015 22:00 281K
794-SafeErrorsonSPAProtectedimplementationswith..> 10-Aug-2015 22:00 495K
795-FastandMemoryEfficientKeyRecoveryinSideChan..> 10-Aug-2015 22:00 554K
796-StubbornMiningGeneralizingSelfishMiningandC..> 10-Aug-2015 22:00 2M
797-WhatSecurityCanWeAchievewithin4Rounds.pdf 20-Jan-2023 08:22 330K
797-WhatSecuritycanweAchievein4Rounds.pdf 10-Aug-2015 22:00 242K
798-AStatelessCryptographicallySecurePhysicalUn..> 10-Aug-2015 22:00 1M
799-SecureBinaryFieldMultiplication.pdf 10-Aug-2015 22:00 1M
800-HybridWBCSecureandefficientencryptionscheme..> 10-Aug-2015 22:00 644K
801-ScalarBlindingonEllipticCurvesbasedonPrimes..> 10-Aug-2015 22:00 176K
802-CiphertextonlyattackonddHillinOd13d.pdf 10-Aug-2015 22:00 367K
803-StatisticalandAlgebraicPropertiesofDES.pdf 12-Aug-2015 22:00 366K
804-SECUREMULTIPARTYCOMPUTATIONHOWTOSOLVETHECON..> 24-Sep-2015 22:00 410K
804-SECUREMULTIPARTYCOMPUTATIONHOWTOSOLVETHECON..> 20-Jan-2023 08:22 410K
804-SecureMultipartyComputationHowtoSolvethePro..> 13-Aug-2015 22:00 455K
805-Aclassificationofellipticcurveswithrespectt..> 13-Aug-2015 22:00 135K
806-FaultSpaceTransformationAGenericApproachtoC..> 20-Jan-2023 08:22 971K
806-UsingStateSpaceEncodingToCounterBiasedFault..> 13-Aug-2015 22:00 865K
807-FairDistributedComputationofReactiveFunctio..> 13-Aug-2015 22:00 485K
808-MasssurveillancewithouttheStateStronglyUnde..> 14-Aug-2015 22:00 333K
809-NewTechniquesforElectronicVoting.pdf 14-Aug-2015 22:00 370K
810-ImprovedORCompositionofSigmaProtocols.pdf 14-Aug-2015 22:00 516K
811-KeyrecoveryattacksagainsttheMACalgorithmCha..> 14-Aug-2015 22:00 297K
812-TheSecretStructureoftheSBoxofStreebogKuznec..> 14-Aug-2015 22:00 229K
813-RevisitingTurningOnlineCipherOff.pdf 17-Aug-2015 22:00 365K
814-CLKSCertificatelessKeywordSearchonEncrypted..> 17-Aug-2015 22:00 326K
815-OnthePowerofHierarchicalIdentityBasedEncryp..> 17-Aug-2015 22:00 558K
816-AnalysisofKeylessMassiveMIMObasedCryptosyst..> 18-Aug-2015 22:00 542K
817-SecureMultipartyComputationofaSocialNetwork..> 28-Oct-2015 23:00 232K
817-SecureMultipartyGraphComputation.pdf 18-Aug-2015 22:00 466K
818-cuHEAHomomorphicEncryptionAcceleratorLibrar..> 18-Aug-2015 22:00 592K
819-ImprovingtheBigMacAttackonEllipticCurveCryp..> 18-Aug-2015 22:00 513K
820-ExtendedNestedDualSystemGroupsRevisited.pdf 21-Aug-2015 22:00 560K
821-Ageneralframeworkforbuildingnoisefreehomomo..> 21-Aug-2015 22:00 181K
822-EfficientlyObfuscatingReEncryptionProgramun..> 21-Aug-2015 22:00 415K
823-Efficientideallatticesievingusingcrosspolyt..> 24-Aug-2015 22:00 592K
824-EfficientFullyStructurePreservingSignatures..> 24-Aug-2015 22:00 381K
825-TheEmperor39sNewPasswordCreationPolicies.pdf 20-Jan-2023 08:22 544K
825-TheEmperorsNewPasswordCreationPolicies.pdf 24-Aug-2015 22:00 544K
826-ProgrammableHashFunctionsgoPrivateConstruct..> 26-Aug-2015 22:00 651K
827-UnboundedHierarchicalIdentityBasedEncryptio..> 26-Aug-2015 22:00 235K
828-StaterecoveryanalysisofSpritz.pdf 26-Aug-2015 22:00 295K
829-ReducingDepthinConstrainedPRFsFromBitFixing..> 31-Dec-2015 23:00 536K
829-ReducingMultilinearMapLevelsinConstrainedPR..> 26-Aug-2015 22:00 601K
830-UniqueSignaturewithShortOutputfromCDHAssump..> 26-Aug-2015 22:00 400K
831-MMAPMultiFactorMemoryAuthenticationforSecur..> 26-Aug-2015 22:00 893K
832-CharacterisingandComparingtheEnergyConsumpt..> 28-Aug-2015 22:00 238K
833-EfficientKeyAuthenticationServiceforSecureE..> 28-Aug-2015 22:00 325K
834-AuthenticationUsingSideChannelInformation.pdf 28-Aug-2015 22:00 413K
835-Onnearprimeorderellipticcurveswithsmallembe..> 28-Aug-2015 22:00 281K
835-Onnearprimeorderellipticcurveswithsmallembe..> 20-Jan-2023 08:22 282K
836-CiphertextPolicyAttributeBasedBroadcastEncr..> 28-Aug-2015 22:00 398K
837-MultiVariateHighOrderAttacksofShuffledTable..> 31-Aug-2015 22:00 718K
838-OfflineWitnessEncryption.pdf 31-Aug-2015 22:00 439K
839-TimingandLatticeAttacksonaRemoteECDSAOpenSS..> 31-Aug-2015 22:00 1M
840-RelatedkeyImpossibleDifferentialAnalysisofF..> 31-Aug-2015 22:00 448K
841-AnEfficientCPABEwithConstantSizeSecretKeysu..> 31-Aug-2015 22:00 286K
842-OnLinkabilityandMalleabilityinSelfblindable..> 31-Aug-2015 22:00 447K
843-RethinkingPrivacyforExtendedSanitizableSign..> 31-Aug-2015 22:00 570K
844-DAEncryptHomomorphicEncryptionviaNonArchime..> 31-Aug-2015 22:00 149K
845-CryptanalysisoftheQuadraticZeroTestingofGGH..> 01-Sep-2015 22:00 241K
846-CharacterizationofSecureMultipartyComputati..> 02-Sep-2015 22:00 467K
847-ExploringEnergyEfficiencyofLightweightBlock..> 02-Sep-2015 22:00 344K
848-TheMultiplicativeComplexityofBooleanFunctio..> 02-Sep-2015 22:00 272K
849-RegulatingthePaceofvonNeumannCorrectors.pdf 02-Sep-2015 22:00 504K
850-TraceableCPABEonPrimeOrderGroupsFullySecure..> 02-Sep-2015 22:00 572K
851-BeyondBirthdayBoundSecurityforTweakableEven..> 02-Sep-2015 22:00 617K
852-Analysisofakeyexchangeprotocolbasedontropic..> 03-Sep-2015 22:00 207K
853-StandardSecurityDoesImplySecurityAgainstSel..> 06-Sep-2015 22:00 405K
854-EfficientFuzzyExtractionofPUFInducedSecrets..> 20-Jan-2023 08:22 600K
854-SecureSketchMetamorphosisTightUnifiedBounds..> 06-Sep-2015 22:00 501K
855-AnewframeworkforkeystreamgeneratorsagainstC..> 06-Sep-2015 22:00 207K
856-MGRHASHFUNCTION.pdf 06-Sep-2015 22:00 718K
857-UnifyingLeakageClassesSimulatableLeakageand..> 06-Sep-2015 22:00 405K
858-GroupSignaturesWithoutqAssumptions.pdf 06-Sep-2015 22:00 376K
858-SkippingtheqinGroupSignatures.pdf 20-Jan-2023 08:22 533K
859-FactorBaseDiscreteLogarithmsinKummerExtensi..> 06-Sep-2015 22:00 357K
860-SelectiveOpeningSecurityforReceivers.pdf 06-Sep-2015 22:00 413K
861-ASyntheticIndifferentiabilityAnalysisofInte..> 06-Sep-2015 22:00 480K
862-IdealizingIdentityBasedEncryption.pdf 08-Sep-2015 22:00 876K
863-IsThereanObliviousRAMLowerBound.pdf 08-Sep-2015 22:00 703K
864-EncryptionPerformanceImprovementsofthePaill..> 08-Sep-2015 22:00 285K
865-CardbasedCryptographicProtocolsUsingaMinima..> 08-Sep-2015 22:00 707K
866-GradedEncodingVariationsonaScheme.pdf 08-Sep-2015 22:00 395K
867-MultilinearandAggregatePseudorandomFunction..> 08-Sep-2015 22:00 718K
868-OptimallySecureBlockCiphersfromIdealPrimiti..> 08-Sep-2015 22:00 537K
869-NewRealizationsofSomewhereStatisticallyBind..> 08-Sep-2015 22:00 566K
870-GamblingComputationalInformationandEncrypti..> 08-Sep-2015 22:00 323K
871-ACompleteandLinearPhysicalCharacterizationM..> 13-Sep-2015 22:01 8M
871-PhotonicSideChannelAnalysisofArbiterPUFs.pdf 20-Jan-2023 08:22 8M
872-TraceabilityImprovementsofaNewRFIDProtocolB..> 13-Sep-2015 22:01 636K
873-OntheDiffusionPropertyofIteratedFunctions.pdf 14-Sep-2015 22:00 374K
873-OntheDiffusionpropertyofiteratedfunctions.pdf 13-Sep-2015 22:01 374K
874-FeistelNetworksIndifferentiabilityat10Round..> 13-Sep-2015 22:01 574K
874-Indifferentiabilityof10RoundFeistelNetworks..> 17-Dec-2015 23:00 582K
875-BentandSemibentFunctionsviaLinearTranslator..> 13-Sep-2015 22:00 139K
876-10RoundFeistelisIndifferentiablefromanIdeal..> 13-Sep-2015 22:00 492K
877-StudyofaParityCheckBasedFaultDetectionCount..> 13-Sep-2015 22:00 378K
878-MakingExistentialUnforgeableSignaturesStron..> 13-Sep-2015 22:00 558K
879-Computinginformationondomainparametersfromp..> 13-Sep-2015 22:00 298K
880-GenericEfficientDynamicProofsofRetrievabili..> 13-Sep-2015 22:00 368K
881-GenericSecurityofNMACandHMACwithInputWhiten..> 13-Sep-2015 22:00 565K
882-AGenericCountermeasureAgainstFaultInjection..> 13-Sep-2015 22:00 1M
882-UsingModularExtensiontoProvablyProtectECCAg..> 03-Oct-2015 22:00 1022K
882-UsingModularExtensiontoProvablyProtectEdwar..> 20-Jan-2023 08:22 610K
883-RevisitingSumofCBCMACsandExtendingNI2MACtoA..> 13-Sep-2015 22:00 474K
884-GeneralCircuitRealizingCompactRevocableAttr..> 13-Sep-2015 22:00 582K
885-ANewStandardofUkraineTheKupynaHashFunction.pdf 13-Sep-2015 22:00 407K
886-ApplyingCryptographicAccelerationTechniques..> 13-Sep-2015 22:00 440K
887-ComposableSecurityintheTamperProofHardwareM..> 20-Jan-2023 08:22 345K
887-RoundOptimalTokenBasedSecureComputation.pdf 13-Sep-2015 22:00 314K
888-TweakLengthExtensionforTweakableBlockcipher..> 14-Sep-2015 22:00 223K
889-WhichRingBasedSomewhatHomomorphicEncryption..> 14-Sep-2015 22:00 408K
890-MITHFEaNewMultivariateSignatureScheme.pdf 15-Sep-2015 22:00 289K
891-PrivateCiphertextPolicyAttributebasedEncryp..> 15-Sep-2015 22:00 382K
892-SecurityAgainstRelatedRandomnessAttacksviaR..> 15-Sep-2015 22:00 409K
893-RobustAuthenticatedEncryptionandtheLimitsof..> 15-Sep-2015 22:00 674K
894-Comparisonofcubeattacksoverdi64256erentvect..> 15-Sep-2015 22:00 396K
894-Comparisonofcubeattacksoverdierentvectorspa..> 20-Jan-2023 08:22 396K
895-RogueDecryptionFailuresReconcilingAERobustn..> 15-Sep-2015 22:00 333K
896-ImprovedAttacksonReducedRoundCamellia128192..> 15-Sep-2015 22:00 825K
897-IntegrityAwareParallelizableCipherFeedbackM..> 15-Sep-2015 22:00 925K
898-SeriouslygetoffmycloudCrossVMRSAKeyRecovery..> 16-Sep-2015 22:00 393K
899-PrivacypreservingAttributeBasedSearchableEn..> 16-Sep-2015 22:00 736K
900-NewResultsonIdentitybasedEncryptionfromQuad..> 16-Sep-2015 22:00 154K
901-AUnifiedApproachtoMPCwithPreprocessingusing..> 16-Sep-2015 22:00 765K
902-DifferentialAnalysisonSimeckandSIMONwithDyn..> 20-Jan-2023 08:22 398K
902-DifferentialSecurityEvaluationofSimeckwithD..> 17-Sep-2015 22:00 373K
903-ANoteontheIndifferentiabilityofthe10RoundFe..> 17-Sep-2015 22:00 406K
904-AlmosttightIdentityBasedEncryptionagainstSe..> 17-Sep-2015 22:00 323K
905-MappingtheIntelLastLevelCache.pdf 17-Sep-2015 22:00 284K
906-RoadRunneRASmallAndFastBitsliceBlockCipherF..> 17-Sep-2015 22:00 535K
907-CryptographicAssumptionsAPositionPaper.pdf 17-Sep-2015 22:00 123K
908-LinearDistinguishersintheKeylessSettingAppl..> 17-Sep-2015 22:00 491K
909-OntheImpactofKnownKeyAttacksonHashFunctions..> 17-Sep-2015 22:00 865K
910-QANIZKArgumentsinAsymmetricGroupsNewToolsan..> 17-Sep-2015 22:00 634K
911-SecurityEvaluationonSimeckagainstZeroCorrel..> 22-Sep-2015 22:00 113K
912-ExtractionofintrinsicstructureforHardwareTr..> 22-Sep-2015 22:00 2M
913-FunctionalSigncryptionNotionConstructionand..> 22-Sep-2015 22:00 727K
914-ACryptographicAnalysisoftheTLS13HandshakePr..> 22-Sep-2015 22:00 825K
915-AGenericConstructionforVerifiableAttributeb..> 22-Sep-2015 22:00 809K
916-RigorousUpperBoundsonDataComplexitiesofBloc..> 22-Sep-2015 22:00 424K
917-PrivateProximityTestingonSteroidsAnNTRUbase..> 22-Sep-2015 22:00 263K
918-FindingStateCollisionsintheAuthenticatedEnc..> 22-Sep-2015 22:00 331K
919-PRAMODAPrivacyPreservingFrameworkforSupport..> 29-Sep-2015 22:00 412K
919-PrivacyPreservingDataManagementforOutsource..> 22-Sep-2015 22:00 383K
919-Privacypreservingcomputationwithtrustedcomp..> 20-Jan-2023 14:19 207
920-LeakageResilientIdentificationSchemesfromZe..> 22-Sep-2015 22:00 431K
921-IdentityBasedRevocationfromSubsetDifference..> 22-Sep-2015 22:00 279K
922-LocalisedMultisecretSharing.pdf 22-Sep-2015 22:00 331K
923-DYNAMICKEYAGGREGATECRYPTOSYSTEMONELLIPTICCU..> 22-Sep-2015 22:00 721K
924-MaskingLargeKeysinHardwareAMaskedImplementa..> 22-Sep-2015 22:00 850K
925-ExploitingtheOrderofMultiplierOperandsALowC..> 22-Sep-2015 22:00 505K
925-ExploitingtheOrderofMultiplierOperandsaLowC..> 27-Nov-2015 23:00 3M
926-CRITERIONOFMAXIMALPERIODOFATRINOMIALOVERNON..> 25-Sep-2015 22:00 295K
927-RichQueriesonEncryptedDataBeyondExactMatche..> 26-Sep-2015 22:00 605K
928-HLDCAWSNHomomorphicLightweightDataConfident..> 27-Sep-2015 22:00 508K
929-AreyouTheOnetoShareSecretTransferwithAccess..> 27-Sep-2015 22:00 362K
930-NearlySparseLinearAlgebra.pdf 27-Sep-2015 22:00 381K
930-NearlySparseLinearAlgebraandapplicationtoDi..> 20-Jan-2023 08:22 557K
931-FastandSecureThreepartyComputationTheGarble..> 27-Sep-2015 22:00 458K
932-UsingTweaksToDesignFaultResistantCiphers.pdf 27-Sep-2015 22:00 395K
933-CryptanalysisofProvablySecureCerticatelessS..> 27-Sep-2015 22:00 77K
934-CryptanalysisoftheNewCLTMultilinearMaps.pdf 27-Sep-2015 22:00 334K
935-JointDataandKeyDistributionofSimpleMultiple..> 20-Jan-2023 08:22 474K
935-JointDataandKeyDistributionoftheLinearCrypt..> 28-Sep-2015 22:00 473K
936-APrivacyPreservingImprovementforSRTAinTelec..> 28-Sep-2015 22:00 651K
937-EndtoendDesignofaPUFbasedPrivacyPreservingA..> 28-Sep-2015 22:00 843K
938-LatticeBasedCryptographyforBeginners.pdf 28-Sep-2015 22:00 606K
939-ADecadeofLatticeCryptography.pdf 28-Sep-2015 22:00 664K
940-SecureAssociationfortheInternetofThings.pdf 28-Sep-2015 22:00 2M
941-CryptanalysisoftheNewMultilinearMapovertheI..> 28-Sep-2015 22:00 474K
942-BallotsecrecySecuritydefinitionsufficientco..> 20-Jan-2023 08:22 472K
942-Secrecyandindependenceforelectionschemes.pdf 28-Sep-2015 22:00 405K
943-Sandy2xNewCurve25519SpeedRecords.pdf 28-Sep-2015 22:00 361K
944-NewComplexityTradeOffsfortheMultipleNumberF..> 28-Sep-2015 22:00 469K
945-SecureSetbasedPolicyCheckingandItsApplicati..> 28-Sep-2015 22:00 475K
946-AsymmetricproofofworkbasedontheGeneralizedB..> 28-Sep-2015 22:00 411K
946-EquihashAsymmetricProofofWorkBasedontheGene..> 20-Jan-2023 08:22 469K
947-WeaveElGamalEncryptionforSecureOutsourcingA..> 28-Sep-2015 22:00 723K
948-AProvablySecureShortSignatureSchemefromCodi..> 28-Sep-2015 22:00 440K
949-PrivateProcessingofOutsourcedNetworkFunctio..> 30-Sep-2015 22:00 1M
950-ACompilerofTwoPartyProtocolsforComposablean..> 30-Sep-2015 22:00 151K
951-NearlyOptimalRobustSecretSharing.pdf 30-Sep-2015 22:00 346K
952-CommitmentandObliviousTransferintheBoundedS..> 01-Oct-2015 22:00 358K
953-GaussianSamplingPrecisionandInformationLeak..> 05-Oct-2015 22:00 120K
953-GaussianSamplingPrecisioninLatticeCryptogra..> 23-Nov-2015 23:00 141K
953-LeakagefromGaussianQuantisationandtheTiming..> 01-Oct-2015 22:00 114K
953-LeakagefromGaussianQuantisationandtheTiming..> 02-Oct-2015 22:00 118K
954-OnlineOfflineHomomorphicSignaturesforPolyno..> 01-Oct-2015 22:00 374K
955-OnthePowerofPairEncodingsFrameworksforPredi..> 01-Oct-2015 22:00 830K
956-AnalysisoftheKupyna256HashFunction.pdf 01-Oct-2015 22:00 335K
957-DelegatingRAMComputations.pdf 02-Oct-2015 22:00 448K
958-BuildingSingleKeyBeyondBirthdayBoundMessage..> 20-Jan-2023 14:19 207
958-OnekeyDoubleSumMACwithBeyondBirthdaySecurit..> 02-Oct-2015 22:00 703K
959-CryptanalysisoftheRoundReducedKupynaHashFun..> 02-Oct-2015 22:00 1M
960-MoreEfficientSecureOutsourcingMethodsforBil..> 05-Oct-2015 22:00 731K
961-ShortStructurePreservingSignatures.pdf 05-Oct-2015 22:00 262K
962-SOMEREMARKSONTHELOGARITHMICSIGNATURESOFFINI..> 06-Oct-2015 22:00 280K
963-WhenOrganizedCrimeAppliesAcademicResultsAFo..> 06-Oct-2015 22:00 12M
964-ImprovedLinearhullCryptanalysisofRoundreduc..> 08-Oct-2015 22:00 290K
964-LinearhullCryptanalysisofRoundreducedVersio..> 22-Oct-2015 22:00 318K
965-PrivateGenomeAnalysisthroughHomomorphicEncr..> 08-Oct-2015 22:00 461K
966-VulnerabilitiesofMcElieceintheWorldofEscher..> 09-Oct-2015 22:00 352K
966-VulnerabilitiesofMcElieceintheWorldofEscher..> 20-Jan-2023 08:22 364K
967-FreestartcollisionforfullSHA1.pdf 20-Jan-2023 08:22 377K
967-FreestartcollisiononfullSHA1.pdf 09-Oct-2015 22:00 417K
968-DifferentialandLinearCryptanalysisofARXwith..> 09-Oct-2015 22:00 392K
968-ImprovedDifferentialLinearCryptanalysisof7r..> 20-Jan-2023 08:22 409K
969-ZeroKnowledgeInteractiveProofSystemsforNewL..> 09-Oct-2015 22:00 396K
970-MultilinearMapsovertheIntegersUsingModulusS..> 09-Oct-2015 22:00 199K
971-AttacksonSearchRLWE.pdf 09-Oct-2015 22:00 477K
971-AttacksontheSearchRLWEproblemwithsmallerror..> 20-Jan-2023 08:22 493K
972-CutDowntheTreetoAchieveConstantComplexityin..> 09-Oct-2015 22:00 578K
973-SomeCryptanalyticResultsonZipperHashandConc..> 09-Oct-2015 22:00 435K
974-TheConjoinedMicroprocessor.pdf 11-Oct-2015 22:00 639K
975-ExtendedFunctionalityinVerifiableSearchable..> 12-Oct-2015 22:00 534K
976-OnReverseEngineeringSBoxeswithHiddenDesignC..> 12-Oct-2015 22:00 939K
977-FasterpointscalarmultiplicationonNISTellipt..> 12-Oct-2015 22:00 422K
978-TheOPTLSProtocolandTLS13.pdf 12-Oct-2015 22:00 169K
979-GuidelinesforUsingtheCryptDBSystemSecurely.pdf 13-Oct-2015 22:00 128K
979-GuidelinesforUsingtheCryptDBSystemsSecurely..> 12-Oct-2015 22:00 128K
980-AnalysisofanRFIDAuthenticationProtocolinAcc..> 12-Oct-2015 22:00 1M
981-SearchingandSortingofFullyHomomorphicEncryp..> 12-Oct-2015 22:00 552K
982-Anoteonconstructionsofbentfunctionsfrominvo..> 12-Oct-2015 22:00 249K
983-Fastuniformandcompactscalarmultiplicationfo..> 12-Oct-2015 22:00 439K
984-ComplexityofECDLPundertheFirstFallDegreeAss..> 12-Oct-2015 22:00 218K
985-Polynomialtimereductionfrom3SATtosolvinglow..> 12-Oct-2015 22:00 162K
986-BitCoincidenceMiningAlgorithm.pdf 12-Oct-2015 22:00 237K
987-BlazingFast2PCintheOfflineOnlineSettingwith..> 13-Oct-2015 22:00 488K
988-ImprovedLinearCryptanalysisofreducedroundSI..> 13-Oct-2015 22:00 531K
989-FastObliviousAESAdecicatedapplicationoftheM..> 13-Oct-2015 22:00 494K
989-FastObliviousAESAdedicatedapplicationoftheM..> 14-Oct-2015 22:00 494K
990-EncryptionSwitchingProtocols.pdf 13-Oct-2015 22:00 972K
991-Ed3363HighFiveAnalternativeEllipticCurve.pdf 13-Oct-2015 22:00 99K
992-MultilinearMapviaScaleInvariantFHEEnhancing..> 13-Oct-2015 22:00 980K
993-BiDeniableInnerProductEncryptionfromLWE.pdf 13-Oct-2015 22:00 480K
994-AnEfficientSchemetoReduceSideChannelLeakage..> 13-Oct-2015 22:00 669K
995-UpdatesonSortingofFullyHomomorphicEncrypted..> 14-Oct-2015 22:00 220K
996-MultiuserSchnorrsecurityrevisited.pdf 14-Oct-2015 22:00 323K
997-IncrementalProgramObfuscation.pdf 14-Oct-2015 22:00 484K
998-AllorNothingatAll.pdf 14-Oct-2015 22:00 300K
999-ImprovedMaskingforTweakableBlockcipherswith..> 14-Oct-2015 22:00 797K