Index of /2016/


../
001-Improvedonanefficientuserauthenticationsche..> 12-Jan-2016 08:18     90K
002-RemoteCacheTimingAttackwithoutLearningPhase..> 12-Jan-2016 08:18    260K
003-OnSplittingaPointwithSummationPolynomialsin..> 12-Jan-2016 08:18    262K
004-Boundingbasisreductionproperties.pdf           12-Jan-2016 08:18    239K
005-AColumnarTranspositioncipherinacontemporary..> 12-Jan-2016 08:18    543K
006-IndistinguishabilityObfuscationwithNontrivi..> 12-Jan-2016 08:18    364K
007-EasingCoppersmithMethodsusingAnalyticCombin..> 12-Jan-2016 08:18    617K
008-cMixAnonymizationbyHighPerformanceScalableM..> 12-Jan-2016 08:18      5M
008-cMixMixingwithMinimalRealTimeAsymmetricCryp..> 20-Jan-2023 08:20    294K
009-PUFBASEDSOLUTIONSFORSECURECOMMUNICATIONSINA..> 12-Jan-2016 08:18    620K
010-EliminatingDecryptionFailuresfromtheSimpleM..> 12-Jan-2016 08:18    312K
011-BetterSecurityforFunctionalEncryptionforInn..> 12-Jan-2016 08:18    509K
012-CryptographyforBigDataSecurity.pdf             12-Jan-2016 08:18    519K
013-ThresholdoptimalDSAECDSAsignaturesandanappl..> 12-Jan-2016 08:18    900K
014-FoundationsofHardwareBasedAttestedComputati..> 12-Jan-2016 08:17    756K
015-QuantumCollisionResistanceofNonUniformlyDis..> 12-Jan-2016 08:17    300K
016-Atrustlessprivacypreservingreputationsystem..> 12-Jan-2016 08:17    391K
017-Valiant39sUniversalCircuitImprovementsImple..> 20-Jan-2023 08:20    466K
017-ValiantsUniversalCircuitImprovementsImpleme..> 12-Jan-2016 08:17    466K
018-PrivateFunctionalEncryptionIndistinguishabi..> 12-Jan-2016 08:17    614K
019-AnalysisofGongetal39sCCA2SecureHomomorphicE..> 20-Jan-2023 08:20    274K
019-AnalysisofGongetalsCCA2SecureHomomorphicEnc..> 12-Jan-2016 08:17    256K
020-TruncatedDifferentialBasedKnownKeyAttackson..> 12-Jan-2016 08:17    556K
021-QuasiLinearSizeZeroKnowledgefromLinearAlgeb..> 12-Jan-2016 08:17    510K
022-Onderivativesofpolynomialsoverfinitefieldst..> 12-Jan-2016 08:17    327K
023-Improvedonanimprovedremoteuserauthenticatio..> 12-Jan-2016 08:17     77K
024-RefundAttacksonBitcoinsPaymentProtocol.pdf     12-Jan-2016 08:17      1M
024-RefundattacksonBitcoinsPaymentProtocol.pdf     12-Jan-2016 23:00      1M
025-HumanreadableProofoftheRelatedKeySecurityof..> 12-Jan-2016 08:17    512K
026-APracticalTemplateAttackonMICKEY12820UsingP..> 12-Jan-2016 08:17      1M
027-BalloonHashingAMemoryHardFunctionProvidingP..> 06-Sep-2016 22:00    733K
027-BalloonHashingProvablySpaceHardHashFunction..> 12-Jan-2016 08:17    847K
027-BalloonHashingaProvablyMemoryHardFunctionwi..> 07-Aug-2016 22:01    733K
028-SpongesandEnginesAnintroductiontoKeccakandK..> 12-Jan-2016 08:17    768K
029-SimpleSIMONFPGAimplementationsoftheSIMON641..> 12-Jan-2016 08:17    565K
030-AnEfficientLatticeBasedSignatureSchemewithP..> 12-Jan-2016 08:17    569K
031-BeyondtheselectivedisclosureofABCsonRAMcons..> 12-Jan-2016 23:00    416K
032-OntheLeakageResilientKeyExchange.pdf           13-Jan-2016 23:00    723K
033-TowardsaUnifiedSecurityModelforPhysicallyUn..> 13-Jan-2016 23:00    454K
034-UniversalCompositionwithResponsiveEnvironme..> 13-Jan-2016 23:00    831K
035-ProofsofSpaceTimeandRationalProofsofStorage..> 14-Jan-2016 23:00    427K
035-SimpleProofsofSpaceTimeandRationalProofsofS..> 20-Jan-2023 08:20    246K
036-CharacterizationsoftheDegradedBooleanFuncti..> 14-Jan-2016 23:00      2M
037-AFrameworkforOutsourcingofSecureComputation..> 14-Jan-2016 23:00    505K
038-CollateralDamageinOnlineSocialNetworkscompu..> 17-Jan-2016 23:00    412K
039-Standardquantumbitcommitmentanindefinitecom..> 17-Jan-2016 23:00    126K
040-PacketHeaderAnomalyDetectionUsingBayesianTo..> 17-Jan-2016 23:00    433K
041-ANEWUNLINKABLESECRETHANDSHAKESSCHEMEBASEDON..> 17-Jan-2016 23:00    232K
042-NeevaALightweightHashFunction.pdf              19-Jan-2016 23:00    495K
043-StrongContinuousNonmalleableEncodingSchemes..> 19-Jan-2016 23:00    303K
044-DefeatingtheBenZviBlackburnandTsabanAttacko..> 19-Jan-2016 23:00    119K
045-NewApproachesforSecureOutsourcingAlgorithmf..> 19-Jan-2016 23:00    127K
046-HowToSimulateItATutorialontheSimulationProo..> 19-Jan-2016 23:00    645K
047-CombtoPipelineFastSoftwareEncryptionRevisit..> 19-Jan-2016 23:00    482K
048-BetterPreprocessingforSecureMultipartyCompu..> 19-Jan-2016 23:00    732K
049-ImplementingaToolkitforRingLWEBasedCryptogr..> 19-Jan-2016 23:00      1M
050-ImprovedFullyHomomorphicEncryptionwithCompo..> 19-Jan-2016 23:00      1M
051-CapacityandDataComplexityinMultidimensional..> 22-Jan-2016 23:00    561K
052-FaultTolerantAggregateSignatures.pdf           22-Jan-2016 23:00    594K
053-SpeedandAreaOptimizedParallelHigherRadixMod..> 22-Jan-2016 23:00    658K
054-FullyHomomorphicPublicKeyEncryptionwithTwoC..> 30-Nov-2016 23:00      5M
054-FullyHomomorphicPublickeyEncryptionBasedonD..> 25-Jan-2016 23:00      1M
055-AttackingNTP39sAuthenticatedBroadcastMode.pdf  20-Jan-2023 08:20    349K
055-AttackingNTPsAuthenticatedBroadcastMode.pdf    25-Jan-2016 23:00    337K
056-BlindlySignedContractsAnonymousOnBlockchain..> 25-Jan-2016 23:00    419K
057-ArchitecturalBiasaNovelStatisticalMetrictoE..> 25-Jan-2016 23:00    503K
057-OntheArchitecturalAnalysisofArbiterDelayPUF..> 20-Jan-2023 08:20      1M
058-NewLatticeAttacksonDSASchemes.pdf              25-Jan-2016 23:00    222K
059-Securepositioningandquantumnonlocalcorrelat..> 25-Jan-2016 23:00    273K
060-Automatedkeysetupandrecoveryfromkeyexposure..> 20-Jan-2023 08:20    410K
060-CrypTopologyPlugPlayandRecoverKeyManagement..> 01-May-2016 22:00    952K
060-TopologybasedPlugandPlayKeySetup.pdf           25-Jan-2016 23:00    825K
061-AccountablePrivacyforDecentralizedAnonymous..> 25-Jan-2016 23:00    345K
062-VerifiableDynamicSymmetricSearchableEncrypt..> 25-Jan-2016 23:00    643K
063-AnalysingandExploitingtheMantinBiasesinRC4.pdf 25-Jan-2016 23:00    830K
064-UnconditionallySecureRevocableStorageTightB..> 25-Jan-2016 23:00    164K
065-AnoteonTensorSimpleMatrixEncryptionScheme.pdf  25-Jan-2016 23:00    111K
066-LinearHullAttackonRoundReducedSimeckwithDyn..> 25-Jan-2016 23:00    524K
067-OPFEOutsourcingComputationforPrivateFunctio..> 26-Jan-2016 23:00    353K
068-OctonionAlgebraandNoiseFreeFullyHomomorphic..> 26-Jan-2016 23:00    436K
069-VerificationMethodsfortheComputationallyCom..> 26-Jan-2016 23:00    383K
070-DomainSpecificPseudonymousSignaturesRevisit..> 26-Jan-2016 23:00    381K
071-ReverseEngineeringtheSBoxofStreebogKuznyech..> 26-Jan-2016 23:00    975K
071-ReverseEngineeringtheSBoxofStreebogKuznyech..> 18-Feb-2016 23:00    979K
072-DowngradeResilienceinKeyExchangeProtocols.pdf  26-Jan-2016 23:00    718K
073-MUORAMDealingwithStealthyPrivacyAttacksinMu..> 27-Jan-2016 23:00    319K
074-OnthePowerofSecureTwoPartyComputation.pdf      27-Jan-2016 23:00    561K
075-WeaknessesinHadamardBasedSymmetricKeyEncryp..> 28-Jan-2016 23:00    197K
076-NewEfficientandFlexibleAlgorithmsforSecureO..> 28-Jan-2016 23:00    120K
077-ImprovedMultiDimensionalMeetintheMiddleCryp..> 04-Mar-2016 23:00    472K
077-MultidimensionalMeetintheMiddleCryptanalysi..> 28-Jan-2016 23:00    624K
078-NonInteractiveVerifiableSecretSharingForMon..> 28-Jan-2016 23:00    376K
079-ProtectbothIntegrityandConfidentialityinOut..> 28-Jan-2016 23:00    266K
080-CryptanalysisofPRINCEwithMinimalData.pdf       29-Jan-2016 23:00    802K
081-ACryptographicAnalysisoftheTLS13draft10Full..> 29-Jan-2016 23:00    720K
082-NonInteractivePlaintextInEqualityProofsandG..> 29-Jan-2016 23:00    534K
083-NSEC5fromEllipticCurvesProvablyPreventingDN..> 31-Jan-2016 23:00    436K
084-TruncatedDifferentialAnalysisofRoundReduced..> 31-Jan-2016 23:00    513K
085-CryptanalysisofringLWEbasedkeyexchangewithk..> 31-Jan-2016 23:00    140K
086-IntelSGXExplained.pdf                          31-Jan-2016 23:00      2M
087-SafelyExportingKeysfromSecureChannelsOntheS..> 04-Apr-2016 22:00    692K
087-SafelyExportingKeysfromSecureChannelsOnthes..> 02-Feb-2016 23:00    669K
088-OnLinearHullsandTrails.pdf                     04-Oct-2016 22:01    345K
088-OnLinearHullsandTrailsinSimon.pdf              02-Feb-2016 23:00    126K
089-OntheHardnessofLWEwithBinaryErrorRevisiting..> 02-Feb-2016 23:00      3M
090-Spectralcharacterizationofiteratinglossymap..> 02-Feb-2016 23:00    246K
091-OntheSecurityoftheAlgebraicEraserTagAuthent..> 02-Feb-2016 23:00    293K
092-CryptanalysisoftheFullSpritzStreamCipher.pdf   02-Feb-2016 23:00    375K
093-Valiant39sUniversalCircuitisPractical.pdf      20-Jan-2023 08:20      1M
093-ValiantsUniversalCircuitisPractical.pdf        02-Feb-2016 23:00      1M
094-TightlyCCASecureEncryptionwithoutPairings.pdf  25-Mar-2016 23:00    652K
094-TightlySecureCCASecureEncryptionwithoutPair..> 02-Feb-2016 23:00    615K
095-ObfuscationwithoutMultilinearMaps.pdf          05-Feb-2016 23:00    205K
096-ProvableSecurityEvaluationofStructuresagain..> 05-Feb-2016 23:00    267K
097-AMaioranaMcFarlandConstructionofaGBFonGaloi..> 07-Feb-2016 23:00    207K
098-HarakaEfficientShortInputHashingforPostQuan..> 07-Feb-2016 23:00    421K
098-Harakav2EfficientShortInputHashingforPostQu..> 05-Sep-2016 22:00    521K
099-AttributeBasedFullyHomomorphicEncryptionwit..> 07-Feb-2016 23:00    373K
100-OntheComplexityofScryptandProofsofSpaceinth..> 08-Feb-2016 23:00    516K
1000-SolvingTrapdoorBasisofIdealLatticefromPubl..> 20-Oct-2016 22:00    175K
1001-RevisitingRC4KeyCollisionFasterSearchAlgor..> 20-Oct-2016 22:00    357K
1002-DecryptionphaseinNorwegianelectronicvoting..> 26-Oct-2016 22:00    286K
1003-CryptanalysisofIndistinguishabilityObfusca..> 26-Oct-2016 22:00    574K
1004-PrivateCircuitsIIIHardwareTrojanResilience..> 26-Oct-2016 22:00    973K
1005-AtomicAESv20.pdf                              26-Oct-2016 22:00    342K
1006-TheSecurityofNTPsDatagramProtocol.pdf         26-Oct-2016 22:00    869K
1007-AsurveyofattacksonEthereumsmartcontracts.pdf  26-Oct-2016 22:00    295K
1008-KPFixingAvailabilityIssuesonKPOwnershipTra..> 26-Oct-2016 22:00     80K
1009-EfficientResettablySecureTwoPartyComputati..> 26-Oct-2016 22:00    492K
101-SignatureSchemeswithEfficientProtocolsandDy..> 08-Feb-2016 23:00    859K
1010-AreWeThereYetOnRPKI39sDeploymentandSecurit..> 20-Jan-2023 08:17      1M
1010-AreWeThereYetOnRPKIsDeploymentandSecurity.pdf 26-Oct-2016 22:00      1M
1011-ZeroizingAttacksonIndistinguishabilityObfu..> 26-Oct-2016 22:00    444K
1012-Commenton34AttributeBasedSignaturesforSupp..> 20-Jan-2023 08:16    311K
1012-CommentonAttributeBasedSignaturesforSuppor..> 27-Oct-2016 22:00    311K
1013-AFormalSecurityAnalysisoftheSignalMessagin..> 27-Oct-2016 22:00    552K
1014-RevisitingandExtendingtheAONTRSschemeaRobu..> 27-Oct-2016 22:00    396K
1015-MaxLengthConsideredHarmfultotheRPKI.pdf       27-Oct-2016 22:00    354K
1016-DeterringCertificateSubversionEfficientDou..> 27-Oct-2016 22:00    503K
1017-PostQuantumKeyExchangefortheInternetandthe..> 27-Oct-2016 22:00    405K
1018-IKPTurningaPKIAroundwithBlockchains.pdf       27-Oct-2016 22:00    639K
1019-FasterHomomorphicEvaluationofDiscreteFouri..> 27-Oct-2016 22:00    300K
102-BreakingtheSubExponentialBarrierinObfustopi..> 08-Feb-2016 23:00    589K
1020-KDMSecurityforIdentityBasedEncryptionConst..> 01-Nov-2016 23:00    542K
1021-CryptographicRandomnessonaCC2538aCaseStudy..> 01-Nov-2016 23:00    538K
1022-RandomizedMixedRadixScalarMultiplication.pdf  01-Nov-2016 23:00    595K
1023-ConstantTimeHigherOrderBooleantoArithmetic..> 01-Nov-2016 23:00    326K
1024-LDABasedClusteringasaSideChannelDistinguis..> 01-Nov-2016 23:00      3M
1025-AnAlgorithmforCountingtheNumberof2nPeriodi..> 01-Nov-2016 23:00    362K
1026-SharperRingLWESignatures.pdf                  01-Nov-2016 23:00    577K
1027-FormalAbstractionsforAttestedExecutionSecu..> 01-Nov-2016 23:00    637K
1028-RatchetedEncryptionandKeyExchangeTheSecuri..> 01-Nov-2016 23:00    212K
1029-ScalableAttributeBasedEncryptionUndertheSt..> 01-Nov-2016 23:00    307K
103-SpeedOptimizationsinBitcoinKeyRecoveryAttac..> 08-Feb-2016 23:00    291K
1030-NovelInnerProductEncryptionResistanttoPart..> 01-Nov-2016 23:00    262K
1031-AMultiplexerbasedArbiterPUFCompositionwith..> 01-Nov-2016 23:00    503K
1032-EfficientCovertTwoPartyComputation.pdf        01-Nov-2016 23:00    583K
1033-DecentralizedAnonymousMicropayments.pdf       01-Nov-2016 23:00    815K
1034-SignificantlyImprovedMultibitDifferentials..> 01-Nov-2016 23:00    606K
1035-ImprovedEstimationofCollisionEntropyinHigh..> 02-Nov-2016 23:00    332K
1036-DirectConstructionofLightweightRotationalX..> 02-Nov-2016 23:00    403K
1037-ApolloEndtoendVerifiableInternetVotingwith..> 03-Nov-2016 23:00    704K
1038-AnEfficientNonInteractiveMulticlientSearch..> 03-Nov-2016 23:00    590K
1039-AFiatShamirImplementationNote.pdf             04-Nov-2016 23:00    331K
104-OpenSesameThePasswordHashingCompetitionandA..> 10-Feb-2016 23:00    577K
1040-SemiHonestSecureMultipartyComputationCanBe..> 20-Jan-2023 14:19     207
1040-SemiHonestSecureMultipartyComputationCanBe..> 06-Nov-2016 23:00    210K
1041-XDedupEfficientProvablySecureCrossUserChun..> 06-Nov-2016 23:00      1M
1042-34OopsIdiditagain34SecurityofOneTimeSignat..> 20-Jan-2023 08:16    625K
1042-OopsIdiditagainSecurityofOneTimeSignatures..> 06-Nov-2016 23:00    656K
1043-ConcurrentlyComposableSecurityWithShielded..> 06-Nov-2016 23:00    679K
1044-FastHardwareArchitecturesforSupersingularI..> 07-Nov-2016 23:00    503K
1045-OnFastCalculationofAdditionChainsforIsogen..> 07-Nov-2016 23:00    575K
1046-EfficientFinitefieldmultiplicationforisoge..> 07-Nov-2016 23:00    119K
1047-IoTGoesNuclearCreatingaZigBeeChainReaction..> 07-Nov-2016 23:00      7M
1048-TheBitcoinBackboneProtocolwithChainsofVari..> 07-Nov-2016 23:00    727K
1049-Randomizedstoppingtimesandprovablysecureps..> 07-Nov-2016 23:00    708K
105-CantherebeefficientandnaturalFHEschemes.pdf    07-Aug-2016 22:01    337K
105-Fullyhomomorphicencryptionmustbefatorugly.pdf  10-Feb-2016 23:00    320K
1050-CryptographicdecodingoftheLeechlattice.pdf    15-Nov-2016 23:00    406K
1051-SuperStrongRKASecureMACPKEandSEfromTagbase..> 15-Nov-2016 23:00    675K
1052-HickoryHashTMImplementinganInstanceofanAlg..> 15-Nov-2016 23:00    183K
1053-SATbasedCryptanalysisofAuthenticatedCipher..> 15-Nov-2016 23:00    482K
1054-SilentWhispersEnforcingSecurityandPrivacyi..> 15-Nov-2016 23:00    711K
1055-APracticalPostQuantumPublicKeyCryptosystem..> 21-Nov-2016 23:00    470K
1055-Apracticalpostquantumpublickeycryptosystem..> 15-Nov-2016 23:00    462K
1056-AToolKitforPartialKeyExposureAttacksonRSA.pdf 15-Nov-2016 23:00    301K
1057-SecureMultipartyComputationfromSGX.pdf        15-Nov-2016 23:00    840K
1058-RingLWECiphertextCompressionandErrorCorrec..> 15-Nov-2016 23:00    147K
1059-TheINTRUPSecurityofOCBwithIntermediatePari..> 15-Nov-2016 23:00    711K
106-AccessControlEncryptionEnforcingInformation..> 10-Feb-2016 23:00    547K
1060-OnAnalyzingProgramBehaviorUnderFaultInject..> 15-Nov-2016 23:00    254K
1061-ChangingoftheGuardsasimpleandefficientmeth..> 15-Nov-2016 23:00    111K
1062-CatenaEfficientNonequivocationviaBitcoin.pdf  20-Jan-2023 08:16      5M
1062-CatenaPreventingLieswithBitcoin.pdf           15-Nov-2016 23:00      6M
1063-AuthenticatedLSMTreeswithMinimalTrust.pdf     20-Jan-2023 08:16    305K
1063-WriteOptimizedConsistencyVerificationinClo..> 15-Nov-2016 23:00      1M
1064-SignerAnonymousDesignatedVerifierRedactabl..> 15-Nov-2016 23:00    449K
1065-RevisitingtheEfficientKeyGenerationofZHFE.pdf 15-Nov-2016 23:00    161K
1066-OptimizingSemiHonestSecureMultipartyComput..> 15-Nov-2016 23:00    871K
1067-ScalableBiasResistantDistributedRandomness..> 15-Nov-2016 23:00    621K
1068-ASATBasedAlgorithmforFindingShortCyclesinS..> 15-Nov-2016 23:00    364K
1068-OnFindingShortCyclesinCryptographicAlgorit..> 20-Jan-2023 08:16    372K
1069-ConstantRoundMaliciouslySecure2PCwithFunct..> 15-Nov-2016 23:00    483K
107-FullyAnonymousTransferableEcash.pdf            10-Feb-2016 23:00    552K
1070-PreventingCLTAttacksonObfuscationwithLinea..> 20-Jan-2023 08:16    406K
1070-PreventingCLTZeroizingAttacksonObfuscation..> 17-Nov-2016 23:00    382K
1071-FunctionalEncryptionfromSecureEnclaves.pdf    17-Nov-2016 23:00    360K
1071-IronFunctionalEncryptionusingIntelSGX.pdf     20-Jan-2023 08:16   1001K
1072-GameTheoreticSecurityforTwoPartyProtocols.pdf 17-Nov-2016 23:00    124K
1073-GroupSignatureswithLinkingBasedRevocationA..> 17-Nov-2016 23:00    427K
1073-LinkingBasedRevocationforGroupSignaturesAP..> 20-Jan-2023 08:16    431K
1074-SideChannelPlaintextRecoveryAttacksonLeaka..> 17-Nov-2016 23:00    840K
1075-CryptanalysisofSimpleMatrixSchemeforEncryp..> 17-Nov-2016 23:00    218K
1076-ANoteonQuantumSecurePRPs.pdf                  21-Nov-2016 23:00    402K
1077-BlurryORAMAMultiClientObliviousStorageArch..> 21-Nov-2016 23:00    355K
1078-Constructionofnvariablenequiv2bmod4balance..> 21-Nov-2016 23:00    358K
1078-Constructionofnvariablenequiv2bmod4balance..> 20-Jan-2023 08:16    358K
1079-RevisitingtheCubicUOVSignatureScheme.pdf      21-Nov-2016 23:00    319K
108-AnEfficientToolkitforComputingPrivateSetOpe..> 20-Jan-2023 08:20    399K
108-ComputingPrivateSetOperationswithLinearComp..> 10-Feb-2016 23:00    453K
1080-DoesCouplingAffecttheSecurityofMaskedImple..> 21-Nov-2016 23:00      1M
1081-Attackstoaproxymediatedkeyagreementprotoco..> 21-Nov-2016 23:00    465K
1082-Mytraceslearnwhatyoudidinthedarkrecovering..> 21-Nov-2016 23:00    424K
1083-ConstructionsSecureagainstReceiverSelectiv..> 21-Nov-2016 23:00    471K
1084-CircuitOPRAMASomewhatTightObliviousParalle..> 21-Nov-2016 23:00    613K
1084-CircuitOPRAMUnifyingStatisticallyandComput..> 20-Jan-2023 08:16    509K
1085-DigitalSignaturesfromSymmetricKeyPrimitive..> 21-Nov-2016 23:00    725K
1086-AnAttributeBasedAnonymousBroadcastEncrypti..> 21-Nov-2016 23:00    315K
1087-CENCisOptimallySecure.pdf                     21-Nov-2016 23:00    786K
1088-Howtoinfinitelyshareasecretmoreefficiently..> 22-Nov-2016 23:00    542K
1089-HomomorphicPolicyAttributeBasedKeyEncapsul..> 22-Nov-2016 23:00    510K
109-FastMultipartyMultiplicationsfromsharedbits..> 10-Feb-2016 23:00    306K
1090-OleFAnInverseFreeOnlineCipher.pdf             22-Nov-2016 23:00    653K
1091-OntheEntropyofOscillatorBasedTrueRandomNum..> 22-Nov-2016 23:00    338K
1092-ParametrizationsforFamiliesofECMfriendlycu..> 22-Nov-2016 23:00    279K
1093-EnergyOptimizationofUnrolledBlockCiphersus..> 22-Nov-2016 23:00    831K
1094-NewRevocableIBEinPrimeOrderGroupsAdaptivel..> 22-Nov-2016 23:00    223K
1095-ImprovedKeyRecoveryAlgorithmsfromNoisyRSAS..> 22-Nov-2016 23:00    391K
1096-IndistinguishabilityObfuscationfromDDHon5l..> 22-Nov-2016 23:00    768K
1096-IndistinguishabilityObfuscationfromSXDHon5..> 20-Jan-2023 08:16    777K
1097-ProjectiveArithmeticFunctionalEncryptionan..> 22-Nov-2016 23:00    715K
1098-MultikeyAnalysisofTweakableEvenMansourwith..> 22-Nov-2016 23:00    366K
1099-ImprovedParametersfortheRingTESLADigitalSi..> 22-Nov-2016 23:00    306K
110-Three39sCompromisedTooCircularInsecurityfor..> 20-Jan-2023 08:20    359K
110-ThreesCompromisedTooCircularInsecurityforAn..> 10-Feb-2016 23:00    357K
1100-PracticalReusableFuzzyExtractorsfortheSetD..> 23-Nov-2016 23:00    418K
1100-PseudoentropicIsometriesANewFrameworkforFu..> 20-Jan-2023 08:16    479K
1101-MILPAidedBitBasedDivisionPropertyforARXBas..> 23-Nov-2016 23:00    678K
1102-ChallengeswithAssessingtheImpactofNFSAdvan..> 23-Nov-2016 23:00    354K
1103-AFastSingleKeyTwoLevelUniversalHashFunctio..> 23-Nov-2016 23:00    368K
1104-PracticalFunctionalEncryptionforBilinearFo..> 23-Nov-2016 23:00    460K
1105-GenericTransformationsofPredicateEncodings..> 23-Nov-2016 23:00    555K
1106-FunctionalEncryptionforQuadraticFunctionsa..> 23-Nov-2016 23:00    434K
1107-MagicAdversariesVersusIndividualReductionS..> 25-Nov-2016 23:00    452K
1108-SecurityAnalysisofSKINNYunderRelatedTweake..> 25-Nov-2016 23:00      2M
1109-PracticalCCA2SecureandMaskedRingLWEImpleme..> 25-Nov-2016 23:00    651K
111-ScalableandSecureLogisticRegressionviaHomom..> 10-Feb-2016 23:00    757K
1110-EfficientPostQuantumZeroKnowledgeandSignat..> 25-Nov-2016 23:00    401K
1111-HidingHigherOrderSideChannelLeakageRandomi..> 25-Nov-2016 23:00    611K
1112-Directconstructionofquasiinvolutoryrecursi..> 25-Nov-2016 23:00    479K
1113-EfficientConstructionofVisualCryptographic..> 25-Nov-2016 23:00    320K
1114-FullDiskEncryptionBridgingTheoryandPractic..> 25-Nov-2016 23:00    262K
1115-ImpossibleDifferentialCryptanalysisofReduc..> 28-Nov-2016 23:00    230K
1115-ImpossibleDifferentialCryptanalysisofSKINN..> 26-Nov-2016 23:00    229K
1116-EvaluatingEntropyforTRNGsEfficientRobustan..> 01-Dec-2016 23:00    454K
1117-PrivacyfriendlyForecastingfortheSmartGridu..> 01-Dec-2016 23:00    463K
1118-DesigningOptimalImplementationsofLinearLay..> 01-Dec-2016 23:00    557K
1119-ACodeBasedGroupSignatureScheme.pdf            01-Dec-2016 23:00    429K
112-OntheInsecurityofSNARKsinthePresenceofOracl..> 10-Feb-2016 23:00    553K
1120-CryptanalysisofReducedroundSKINNYBlockCiph..> 01-Dec-2016 23:00      1M
1121-InsecurityofRCBLeakageResilientAuthenticat..> 01-Dec-2016 23:00    628K
1122-QuantumKeyRecyclingwitheightstateencodingT..> 01-Dec-2016 23:00      2M
1123-Dudeismycodeconstanttime.pdf                  01-Dec-2016 23:00      1M
1124-IntegrityAnalysisofAuthenticatedEncryption..> 01-Dec-2016 23:00      1M
1125-EstonianVotingVericationMechanismRevisited..> 02-Dec-2016 23:00    639K
1125-EstonianVotingVerificationMechanismRevisit..> 13-Dec-2016 23:00    652K
1126-LizardCutofftheTailPracticalPostQuantumPub..> 02-Dec-2016 23:00    378K
1127-RelatedKeyImpossibleDifferentialAttackonRe..> 02-Dec-2016 23:00    565K
1128-ModifyingShorsalgorithmtocomputeshortdiscr..> 07-Dec-2016 23:00    394K
1129-CertificatelessPublicKeyEncryptionwithEqua..> 07-Dec-2016 23:00      3M
113-OntheCompositionofTwoProverCommitmentsandAp..> 10-Feb-2016 23:00    556K
1130-AreRNGsAchillesheelofRFIDSecurityandPrivac..> 07-Dec-2016 23:00    222K
1131-NewconstructionofsinglecycleTfunctionfamil..> 20-Jan-2023 08:16    577K
1131-OntheConstructionofthelightestCirculantMDS..> 09-Dec-2016 23:00    335K
1131-StructureoftheLightest4x4CirculantMDSMatri..> 08-Dec-2016 23:00    339K
1132-SomeresultsonACORN.pdf                        08-Dec-2016 23:00    221K
1133-ImplementingCompleteFormulasonWeierstrassC..> 08-Dec-2016 23:00    725K
1134-PrivacypreservingHybridRecommenderSystem.pdf  08-Dec-2016 23:00    454K
1135-StaticPowerSideChannelAnalysisofaThreshold..> 08-Dec-2016 23:00    805K
1136-CryptographyDuringtheFrenchandAmericanWars..> 20-Jan-2023 08:16    885K
1136-CryptographyduringtheFrenchandAmericanWars..> 08-Dec-2016 23:00    877K
1137-NewImpossibleDifferentialCharacteristicofS..> 14-Dec-2016 23:00    126K
1138-PairingCryptographyMeetsIsogenyANewFramewo..> 14-Dec-2016 23:00    332K
1139-CommentsonFlawintheSecurityAnalysisofLeaka..> 14-Dec-2016 23:00    562K
114-TheMagicofELFs.pdf                             10-Feb-2016 23:00    787K
1140-AttributeBasedEncryptionTraitorTracingRevo..> 14-Dec-2016 23:00    640K
1141-AnObliviousParallelRAMwithOlog2NParallelRu..> 14-Dec-2016 23:00    331K
1142-NewconstructionofsinglecycleTfunctionfamil..> 14-Dec-2016 23:00    508K
1143-CiphertextandPlaintextLeakageRevealstheEnt..> 14-Dec-2016 23:00      6M
1144-PrivateProjectionsVariants.pdf                14-Dec-2016 23:00    474K
1144-PrivateProjectionsampVariants.pdf             20-Jan-2023 08:16    474K
1145-EvolvingSBoxeswithReducedDifferentialPower..> 21-Dec-2016 23:00    438K
1146-PreventingAdaptiveKeyRecoveryAttacksontheG..> 21-Dec-2016 23:00    340K
1147-Cryptanalysisofacertificatelessaggregatesi..> 21-Dec-2016 23:00    105K
1148-SplinterPracticalPrivateQueriesonPublicDat..> 21-Dec-2016 23:00    535K
1149-ExploitingSafeErrorbasedLeakageofRFIDAuthe..> 21-Dec-2016 23:00    391K
115-EfficientlyComputingDataIndependentMemoryHa..> 11-Feb-2016 23:00      2M
1150-SimpleHomomorphismsofCocksIBEandApplicatio..> 21-Dec-2016 23:00    398K
1151-ANovelMultifactorIDbasedDesignatedVerifier..> 21-Dec-2016 23:00    175K
1152-LeakMeIfYouCanDoesTVLARevealSuccessRate.pdf   20-Jan-2023 08:16    666K
1152-WhatLiesAheadExtendingTVLATestingMethodolo..> 21-Dec-2016 23:00      3M
1153-AttacksagainstsearchPolyLWE.pdf               21-Dec-2016 23:00    176K
1154-IdentificationProtocolsandSignatureSchemes..> 20-Jan-2023 08:16    585K
1154-SignatureSchemesBasedOnSupersingularIsogen..> 21-Dec-2016 23:00    441K
1155-ComparativeStudyofVariousApproximationstot..> 21-Dec-2016 23:00      2M
1156-Scriptingsmartcontractsfordistributedledge..> 21-Dec-2016 23:00    187K
1157-NewHopewithoutreconciliation.pdf              21-Dec-2016 23:00    520K
1158-ActivateLaterCertificatesforV2XCombiningIT..> 21-Dec-2016 23:00    499K
1159-SPECTREAFastandScalableCryptocurrencyProto..> 28-Dec-2016 23:00    561K
116-InteractiveOracleProofs.pdf                    11-Feb-2016 23:00      4M
1160-MeetintheMiddleAttackonQARMABlockCipher.pdf   28-Dec-2016 23:00    484K
1161-ImpossibleDifferentialAttackonSimpirav2.pdf   28-Dec-2016 23:00    602K
1162-MeetintheMiddleAttacksonClassesofContracti..> 28-Dec-2016 23:00    987K
1163-UsingFullyHomomorphicEncryptionforStatisti..> 28-Dec-2016 23:00    594K
1164-AttackingFHEbasedapplicationsbysoftwarefau..> 28-Dec-2016 23:00    323K
1165-EfficientTransparentRedactableSignatureswi..> 28-Dec-2016 23:00    508K
1166-Groupkeyexchangeprotocolswithstandingephem..> 28-Dec-2016 23:00    405K
1167-MobileCommerceSecureMultipartyComputationF..> 28-Dec-2016 23:00    299K
1167-MobileCommerceSecureMultipartyComputationa..> 20-Jan-2023 08:16    299K
1168-GenericZeroKnowledgeandMultivariateQuadrat..> 28-Dec-2016 23:00    510K
1169-LWEfromNoncommutativeGroupRings.pdf           28-Dec-2016 23:00    313K
117-CircularSecurityCounterexamplesforArbitrary..> 11-Feb-2016 23:00    420K
117-CircularSecuritySeparationsforArbitraryLeng..> 07-Aug-2016 22:01    428K
1170-ImpossibleDifferentialandBoomerangCryptana..> 28-Dec-2016 23:00    448K
1171-ASaladofBlockCiphers.pdf                      28-Dec-2016 23:00      3M
1172-OntheProvableSecurityoftheTweakableEvenMan..> 28-Dec-2016 23:00    209K
1173-ConstructionofLightweightMDSMatricesoverMa..> 28-Dec-2016 23:00     56K
1173-ConstructionofLightweightMDSMatricesoverth..> 20-Jan-2023 08:16    360K
1174-RevisitingFullPRFSecurePMACandUsingItforBe..> 28-Dec-2016 23:00    309K
1175-OntheSecurityNotionsforHomomorphicSignatur..> 30-Dec-2016 23:00    374K
1176-LeakageofSignalfunctionwithreusedkeysinRLW..> 30-Dec-2016 23:00    275K
1177-EfficientSlideAttacks.pdf                     30-Dec-2016 23:00    363K
1178-ImplementingandProvingtheTLS13RecordLayer.pdf 30-Dec-2016 23:00      1M
1179-UpdatableFunctionalEncryption.pdf             30-Dec-2016 23:00    387K
118-CircuitABEfromLWEUnboundedAttributesandSemi..> 11-Feb-2016 23:00    431K
1180-HowtoMeetBigDataWhenPrivateSetIntersection..> 30-Dec-2016 23:00    406K
1181-NewImpossibleDifferentialSearchToolfromDes..> 30-Dec-2016 23:00    676K
1182-PublicKeyEncryptionwithEqualityTestintheSt..> 30-Dec-2016 23:00    421K
1183-SomeResultsontheKnownClassesofQuadraticAPN..> 30-Dec-2016 23:00    167K
1184-BitcoinPrivateKeyLockedTransactions.pdf       30-Dec-2016 23:00    257K
1185-ADigitalSignatureSchemeBasedOnSupersingula..> 30-Dec-2016 23:00    368K
1186-OntheComplexityofBreakingPseudoentropy.pdf    01-Jan-2017 23:00    340K
1187-ComputingOptimalAtePairingsonEllipticCurve..> 20-Jan-2023 08:16    415K
1187-OptimalAtePairingonEllipticCurveswithEmbed..> 01-Jan-2017 23:00    376K
1188-Farfalleparallelpermutationbasedcryptograp..> 01-Jan-2017 23:00    249K
1189-OntheBitSecurityofEllipticCurveDiffieHellm..> 01-Jan-2017 23:00    364K
119-LightweightMultiplicationinGF2nwithApplicat..> 14-Feb-2016 23:00    476K
1190-EquivocatingYaoConstantRoundAdaptivelySecu..> 01-Jan-2017 23:00    491K
1191-OntheSecurityofPracticalandCompleteHomomor..> 01-Jan-2017 23:00    281K
1192-NonMalleableCodeswithSplitStateRefresh.pdf    01-Jan-2017 23:00    593K
1193-SuperscalarEncryptedRISCASecretComputerinS..> 01-Jan-2017 23:00    283K
1193-TheSecretProcessorWillGotoTheBallBenchmark..> 20-Jan-2023 08:16    394K
1194-EfficientEncryptionfromRandomQuasiCyclicCo..> 01-Jan-2017 23:00    378K
1195-ConstantTimeCalleeswithVariableTimeCallers..> 01-Jan-2017 23:00    218K
1196-MASCATStoppingMicroarchitecturalAttacksBef..> 20-Jan-2023 08:15    312K
1196-MASScanStoppingMicroarchitecturalAttacksBe..> 01-Jan-2017 23:00    313K
120-ObliviousTransferfromAnyNonTrivialElasticNo..> 14-Feb-2016 23:00    364K
121-TightlySecurePseudorandomFunctionsviaWorkFa..> 14-Feb-2016 23:00    332K
122-SimpiraAFamilyofEfficientPermutationsUsingt..> 14-Feb-2016 23:00    274K
122-Simpirav2AFamilyofEfficientPermutationsUsin..> 06-Mar-2016 23:00    291K
123-RobustPasswordProtectedSecretSharing.pdf       14-Feb-2016 23:00    438K
124-CollectingrelationsfortheNumberFieldSievein..> 14-Feb-2016 23:00    896K
125-CompactIdentityBasedEncryptionfromLWE.pdf      10-Oct-2016 22:00    454K
125-FullySecureLatticeBasedIBEasCompactasPKE.pdf   14-Feb-2016 23:00    471K
126-ServerNotariesAComplementaryApproachtotheWe..> 14-Feb-2016 23:00    363K
127-AsubfieldlatticeattackonoverstretchedNTRUas..> 14-Feb-2016 23:00    454K
128-RemovingtheStrongRSAAssumptionfromArguments..> 14-Feb-2016 23:00    709K
129-ECDHKeyExtractionviaLowBandwidthElectromagn..> 14-Feb-2016 23:00      3M
130-OntheComputationoftheOptimalAtePairingatthe..> 15-Feb-2016 23:00    319K
131-NewAttacksontheConcatenationandXORHashCombi..> 15-Feb-2016 23:00    456K
132-Cryptanalysisof6roundPRINCEusing2KnownPlain..> 15-Feb-2016 23:00    418K
133-OnthenonlinearityofmonotoneBooleanfunctions..> 15-Feb-2016 23:00    192K
134-MorePracticalandSecureHistoryIndependentHas..> 15-Feb-2016 23:00    570K
135-CryptanalysisoftheNewCLTMultilinearMapovert..> 15-Feb-2016 23:00    538K
136-AutomaticExpectationandVarianceComputingfor..> 16-Feb-2016 23:00    429K
137-Rate1LinearTimeandAdditivelyHomomorphicUCCo..> 16-Feb-2016 23:00    536K
138-Anewalgorithmforresiduemultiplicationmodulo..> 16-Feb-2016 23:00    273K
139-AnAlgorithmforCSPRProblemsandCryptanalysiso..> 16-Feb-2016 23:00    323K
139-AnAlgorithmforNTRUProblemsandCryptanalysiso..> 07-Aug-2016 22:00    145K
139-AnAlgorithmforNTRUProblemsandCryptanalysiso..> 06-Apr-2016 22:00    393K
139-AnAlgorithmforNTRUProblemsandCryptanalysiso..> 23-Feb-2016 23:00    134K
140-AdaptivelySecureIdentityBasedEncryptionfrom..> 16-Feb-2016 23:00    481K
141-Onlowdegreepolynomialsin2roundAES.pdf          16-Feb-2016 23:00    134K
142-HashFunctionbasedPRFsAMACanditsMultiUserSec..> 16-Feb-2016 23:00    492K
143-OnthenonexistenceofAPNfunctionsofalgebraicd..> 16-Feb-2016 23:00    162K
143-OnthenonexistenceofAPNnnfunctionsofalgebrai..> 18-Feb-2016 23:00    163K
143-OnupperboundsforalgebraicdegreesofAPNfuncti..> 07-Aug-2016 22:00    139K
144-HighlyEfficientandComposablePasswordProtect..> 16-Feb-2016 23:00    446K
145-DesigningProofofHumanworkPuzzlesforCryptocu..> 16-Feb-2016 23:00    362K
146-ImprovedProgressiveBKZAlgorithmsandtheirPre..> 18-Feb-2016 23:00      2M
147-AnnihilationAttacksforMultilinearMapsCrypta..> 18-Feb-2016 23:00    241K
148-IsogenybasedQuantumresistantUndeniableBlind..> 18-Feb-2016 23:00    473K
149-ImprovedIntegralandZerocorrelationLinearCry..> 18-Feb-2016 23:00      1M
150-OnGarblingSchemesWithAndWithoutPrivacy.pdf     18-Feb-2016 23:00    477K
150-OnGarblingSchemeswithandwithoutPrivacy.pdf     07-Aug-2016 22:00    476K
151-PseudorandomFunctionsinAlmostConstantDepthf..> 18-Feb-2016 23:00    619K
152-AttacksandparameterchoicesinHIMMO.pdf          18-Feb-2016 23:00    376K
153-DifferentiallyPrivatePasswordFrequencyLists..> 18-Feb-2016 23:00    668K
154-FullyAnonymousShortDynamicGroupSignaturesWi..> 18-Feb-2016 23:00    422K
154-HighlyEfficientFullyAnonymousDynamicGroupSi..> 20-Jan-2023 08:20    513K
155-CryptanalysisofMultiPrimePhiHidingAssumptio..> 18-Feb-2016 23:00    412K
156-MoreEfficientConstantRoundMultiPartyComputa..> 18-Feb-2016 23:00    348K
157-KeyDerivationforSquaredFriendlyApplications..> 18-Feb-2016 23:00    597K
158-ASubgradientAlgorithmForComputationalDistan..> 18-Feb-2016 23:00    624K
159-PseudoentropyLowerboundsforChainrulesandTra..> 18-Feb-2016 23:00    664K
160-PolytopicCryptanalysis.pdf                     18-Feb-2016 23:00    494K
161-RevisitingStructureGraphandItsApplicationst..> 18-Feb-2016 23:00    558K
161-RevisitingStructureGraphsApplicationstoCBCM..> 20-Jan-2023 08:20    604K
162-NewNegativeResultsonDifferingInputsObfuscat..> 18-Feb-2016 23:00    241K
163-ZKBooFasterZeroKnowledgeforBooleanCircuits.pdf 18-Feb-2016 23:00    453K
164-SanitizationofFHECiphertexts.pdf               19-Feb-2016 23:00    436K
165-PrAdEnablingPrivacyAwareLocationbasedAdvert..> 19-Feb-2016 23:00    542K
166-PerSessionSecurityPasswordBasedCryptography..> 19-Feb-2016 23:00    665K
167-OnBitcoinSecurityinthePresenceofBrokenCrypt..> 19-Feb-2016 23:00    328K
168-TownCrierAnAuthenticatedDataFeedforSmartCon..> 19-Feb-2016 23:00    345K
169-ProvablyRobustSpongeBasedPRNGsandKDFs.pdf      19-Feb-2016 23:00    699K
170-FastLearningRequiresGoodMemoryATimeSpaceLow..> 19-Feb-2016 23:00    391K
171-CommutativityAssociativityandPublicKeyCrypt..> 22-Feb-2016 23:00    341K
172-AllYourQueriesAreBelongtoUsThePowerofFileIn..> 22-Feb-2016 23:00    468K
173-CircuitCompilerswithO1lognLeakageRate.pdf      22-Feb-2016 23:00    494K
174-HoneyEncryptionBeyondMessageRecoverySecurit..> 22-Feb-2016 23:00    217K
175-OnlineOfflineORCompositionofSigmaProtocols.pdf 22-Feb-2016 23:00    512K
176-AnonymousRoleBasedAccessControlonEHealthRec..> 22-Feb-2016 23:00    662K
177-ReducedMemoryMeetintheMiddleAttackagainstth..> 22-Feb-2016 23:00    553K
178-IntegralsgoStatisticalCryptanalysisofFullSk..> 22-Feb-2016 23:00    420K
179-Computingthetafunctionsinquasilineartimeing..> 22-Feb-2016 23:00    563K
180-PublicKeyEncryptionwithSimulationBasedSelec..> 22-Feb-2016 23:00    498K
181-CryptographicPropertiesofAdditionModulo2n.pdf  23-Feb-2016 23:00     98K
182-SideChannelWatchdogRunTimeEvaluationofSideC..> 23-Feb-2016 23:00    856K
183-ThereisWisdominHarnessingtheStrengthsofyour..> 23-Feb-2016 23:00      2M
184-EfficientlyEnforcingInputValidityinSecureTw..> 23-Feb-2016 23:00    725K
185-OntheInfluenceofMessageLengthinPMAC39sSecur..> 20-Jan-2023 08:20    530K
185-OntheInfluenceofMessageLengthinPMACsSecurit..> 23-Feb-2016 23:00    531K
186-LightweightMDSGeneralizedCirculantMatrices.pdf 23-Feb-2016 23:00    468K
186-LightweightMDSGeneralizedCirculantMatricesF..> 29-Apr-2016 22:00    474K
187-EfficientSecureMultipartyComputationwithIde..> 23-Feb-2016 23:00    393K
188-OnthedivisionpropertyofSboxes.pdf              23-Feb-2016 23:00    325K
189-Compositionsoflinearfunctionsandapplication..> 08-Mar-2016 23:00     65K
189-Yao39smillionaires39problemandpublickeyencr..> 20-Jan-2023 08:20    362K
189-Yaosmillionairesproblemandpublickeyencrypti..> 23-Feb-2016 23:00    136K
190-AMACModeforLightweightBlockCiphers.pdf         23-Feb-2016 23:00    456K
191-OptimalSecurityProofsforSignaturesfromIdent..> 23-Feb-2016 23:00    738K
192-OnNegationComplexityofInjectionsSurjections..> 23-Feb-2016 23:00    226K
193-SecurityconsiderationsforGaloisnondualRLWEf..> 20-Jan-2023 08:20    353K
193-VulnerableGaloisRLWEFamiliesandImprovedAtta..> 24-Feb-2016 23:00    372K
194-HowtoShareaSecretInfinitely.pdf                24-Feb-2016 23:00    843K
195-HowtoGeneralizeRSACryptanalyses.pdf            24-Feb-2016 23:00    589K
196-MultiKeyFHEfromLWERevisited.pdf                24-Feb-2016 23:00    279K
197-PostquantumSecurityoftheCBCCFBOFBCTRandXTSM..> 24-Feb-2016 23:00    489K
198-OptimizingSboxImplementationsforSeveralCrit..> 24-Feb-2016 23:00    361K
199-TheHoneyBadgerofBFTProtocols.pdf               24-Feb-2016 23:00    388K
200-AnAlternativeViewoftheGraphInducedMultiline..> 27-Feb-2016 23:00    415K
200-ToSavetheWiltingMultilinearMaps.pdf            25-Feb-2016 23:00    416K
201-FromStatefulHardwaretoResettableHardwareUsi..> 25-Feb-2016 23:00    366K
202-AnEncryptionSchemebasedonRandomSplitofStGen..> 25-Feb-2016 23:00    466K
203-WhiteBoxCryptographyintheGrayBoxAHardwareIm..> 25-Feb-2016 23:00      5M
204-AMemoryEncryptionEngineSuitableforGeneralPu..> 25-Feb-2016 23:00      2M
205-AddressingtheAlgebraicEraserDiffieHellmanOv..> 25-Feb-2016 23:00     62K
206-ConstructionofFullyCCASecurePredicateEncryp..> 25-Feb-2016 23:00    961K
207-FaultanalysisandweakkeyIVattackonSprout.pdf    25-Feb-2016 23:00    241K
208-ConstantRoundAsynchronousMultiPartyComputat..> 25-Feb-2016 23:00    433K
208-ConstantRoundAsynchronousMultiPartyComputat..> 23-Nov-2016 23:00    438K
209-AutomaticDifferentialAnalysisofARXBlockCiph..> 29-Feb-2016 23:00    253K
210-HopesFearsandSoftwareObfuscationASurvey.pdf    29-Feb-2016 23:00    663K
211-RandomnessComplexityofPrivateCircuitsforMul..> 29-Feb-2016 23:00    806K
212-LowLinearComplexityEstimatesforCoordinateSe..> 29-Feb-2016 23:00    257K
213-3MessageZeroKnowledgeAgainstHumanIgnorance.pdf 29-Feb-2016 23:00    369K
214-AnImprovementofBothSecurityandReliabilityfo..> 29-Feb-2016 23:00    739K
215-AlgorithmsfortheApproximateCommonDivisorPro..> 29-Feb-2016 23:00    221K
216-FairmPSIandmPSICAEfficientConstructionsinPr..> 29-Feb-2016 23:00    531K
217-PracticalbackwardunlinkablerevocationinFIDO..> 29-Feb-2016 23:00    128K
218-SemanticSecurityandKeyPrivacyWithRandomSpli..> 29-Feb-2016 23:00    416K
219-NoncebasedKerberosisaSecureDelegatedAKEProt..> 29-Feb-2016 23:00    620K
220-AlgorithmsonIdealoverComplexMultiplicationo..> 29-Feb-2016 23:00    515K
221-OnPostCompromiseSecurity.pdf                   29-Feb-2016 23:00    549K
221-PostCompromiseSecurity.pdf                     20-Jan-2023 08:20    588K
222-TimeMemoryTradeOffforLatticeEnumerationinaB..> 29-Feb-2016 23:00    386K
223-StillWrongUseofPairingsinCryptography.pdf      29-Feb-2016 23:00    251K
224-CacheBleedATimingAttackonOpenSSLConstantTim..> 01-Mar-2016 23:00    774K
225-ANewBirthdayTypeAlgorithmforAttackingtheFre..> 01-Mar-2016 23:00    419K
226-OnStatisticallySecureObfuscationwithApproxi..> 01-Mar-2016 23:00    447K
227-ProcessTableCovertChannelsExploitationandCo..> 01-Mar-2016 23:00    371K
228-Onadecentralizedtrustlesspseudorandomnumber..> 01-Mar-2016 23:00    263K
229-KeyCompressionforIsogenyBasedCryptosystems.pdf 01-Mar-2016 23:00    392K
230-ECDSAKeyExtractionfromMobileDevicesviaNonin..> 02-Mar-2016 23:00      4M
231-SideChannelAnalysisofWeierstrassandKoblitzC..> 02-Mar-2016 23:00      3M
232-EfficientPrivacyPreservingMatrixFactorizati..> 03-Mar-2016 23:00    895K
233-SmoothNIZKArgumentswithApplicationstoAsymme..> 03-Mar-2016 23:00    591K
233-SmoothNIZKArgumentswithApplicationstoAsymme..> 20-Jan-2023 08:19    677K
234-TrickorTweakOntheInsecurityofOTRsTweaks.pdf    03-Mar-2016 23:00    540K
235-TradingPlaintextAwarenessforSimulatabilityt..> 03-Mar-2016 23:00    288K
236-ADistinguisheronPRESENTLikePermutationswith..> 03-Mar-2016 23:00    416K
237-MayOzerovAlgorithmforNearestNeighborProblem..> 03-Mar-2016 23:00    154K
238-AlgorithmicCountermeasuresAgainstFaultAttac..> 03-Mar-2016 23:00    493K
239-ProvablyWeakInstancesofRingLWERevisited.pdf    04-Mar-2016 23:00    442K
240-OnErrorDistributionsinRingbasedLWE.pdf         07-Aug-2016 22:00    432K
240-OnthetightnessoftheerrorboundinRingLWE.pdf     04-Mar-2016 23:00    359K
241-AtrivialdebiasingschemeforHelperDataSystems..> 04-Mar-2016 23:00    742K
242-AttributeBasedSignaturesforCircuitsfromBili..> 04-Mar-2016 23:00    405K
243-OntheKeyDependentMessageSecurityoftheFujisa..> 05-Mar-2016 23:00    223K
244-CryptanalysisofSimpira.pdf                     05-Mar-2016 23:00    336K
244-CryptanalysisofSimpirav1.pdf                   25-Aug-2016 22:00    356K
245-DEcryptionContractENforcementToolDECENTAPra..> 05-Mar-2016 23:00    236K
246-LINGUISTICCRACKINGOFPASSPHRASESUSINGMARKOVC..> 06-Mar-2016 23:00      1M
247-PublicVeriableFunctionSecretSharing.pdf        06-Mar-2016 23:00    473K
247-PublicVerifiableFunctionSecretSharing.pdf      20-Jan-2023 14:19     207
248-InvariantsubspacesinSimpira.pdf                06-Mar-2016 23:00    342K
249-ImprovedSideChannelAnalysisAttacksonXilinxB..> 07-Mar-2016 23:00      7M
250-FixedPointArithmeticinSHEScheme.pdf            07-Mar-2016 23:00    270K
251-SearchableSymmetricEncryptionOptimalLocalit..> 07-Mar-2016 23:00    246K
252-TheExactRoundComplexityofSecureComputation.pdf 08-Mar-2016 23:00    547K
253-PracticalDRAMPUFsinCommodityDevices.pdf        08-Mar-2016 23:00    913K
253-RuntimeAccessibleDRAMPUFsinCommodityDevices..> 07-Aug-2016 22:00    700K
254-TowardsStreamCiphersforEfficientFHEwithLowN..> 08-Mar-2016 23:00    467K
255-MoreEfficientStructurePreservingSignaturesO..> 08-Mar-2016 23:00    468K
256-SEORAMAStorageEfficientObliviousRAMforPriva..> 08-Mar-2016 23:00    336K
257-IndistinguishabilityObfuscationfromConstant..> 08-Mar-2016 23:00    696K
258-StructurePreservingSmoothProjectiveHashing.pdf 08-Mar-2016 23:00    827K
259-AdaptiveObliviousTransferandGeneralizations..> 08-Mar-2016 23:00    920K
260-OntheSizeofPairingbasedNoninteractiveArgume..> 08-Mar-2016 23:00    396K
261-MEMSbasedGyroscopesasPhysicalUnclonableFunc..> 08-Mar-2016 23:00      7M
262-CollaborativeMultiAuthorityKPABEforShorterK..> 08-Mar-2016 23:00    202K
262-CollaborativeMultiAuthorityKeyPolicyAttribu..> 20-Jan-2023 08:19    167K
263-EfficientZeroKnowledgeArgumentsforArithmeti..> 08-Mar-2016 23:00    580K
264-HowFastCanHigherOrderMaskingBeinSoftware.pdf   08-Mar-2016 23:00    506K
265-MultiproverProofofRetrievability.pdf           08-Mar-2016 23:00    393K
266-ExactErrorBoundofCoxRowerArchitectureforRNS..> 10-Mar-2016 23:00    701K
267-ImprovedMeetintheMiddleAttacksonRoundReduce..> 10-Mar-2016 23:00    840K
268-EfficientLatticebasedAuthenticatedEncryptio..> 10-Mar-2016 23:00      3M
269-TheAdjacencyGraphsofLinearFeedbackShiftRegi..> 10-Mar-2016 23:00    364K
270-AutomatedUnboundedAnalysisofCryptographicCo..> 10-Mar-2016 23:00    539K
271-CryptanalysisoftheFLIPFamilyofStreamCiphers..> 10-Mar-2016 23:00    414K
272-SpookyEncryptionanditsApplications.pdf         10-Mar-2016 23:00    680K
273-OntheweaknessesofPBKDF2.pdf                    10-Mar-2016 23:00    816K
274-WhatusersshouldknowaboutFullDiskEncryptionb..> 10-Mar-2016 23:00      1M
275-FasterAlgorithmsforSolvingLPN.pdf              11-Mar-2016 23:00    318K
276-ArithmeticCodingandBlindingCountermeasuresf..> 07-Aug-2016 22:00    385K
276-ArithmeticCodingandBlindingCountermeasuresf..> 23-Mar-2016 23:00    183K
276-ArithmeticCodingandBlindingforLatticeCrypto..> 14-Mar-2016 23:00    183K
276-Arithmeticcodingandblindingcountermeasuresf..> 20-Jan-2023 08:19    399K
277-PublicKeyEncryptionSupportingEqualityTestan..> 14-Mar-2016 23:00    134K
278-VariousProxyReEncryptionSchemesfromLattices..> 14-Mar-2016 23:00    372K
279-ConstrainedPRFsforUnboundedInputswithShortK..> 14-Mar-2016 23:00    484K
280-LowPowerMontgomeryModularMultiplicationonRe..> 14-Mar-2016 23:00    820K
281-UniversalObfuscationandWitnessEncryptionBoo..> 14-Mar-2016 23:00    703K
282-Detectingflawedmaskingschemeswithleakagedet..> 15-Mar-2016 23:00    489K
283-SecureAuditLogswithVerifiableExcerpts.pdf      15-Mar-2016 23:00    427K
284-ColocationdetectionontheCloud.pdf              15-Mar-2016 23:00    411K
285-BitBasedDivisionPropertyandApplicationtoSim..> 15-Mar-2016 23:00    470K
286-OnaremarkablepropertyofAPNGoldfunctions.pdf    15-Mar-2016 23:00    292K
287-VerifiabilityNotionsforEVotingProtocols.pdf    17-Mar-2016 23:00    372K
288-OptimizationofLPNSolvingAlgorithms.pdf         17-Mar-2016 23:00    246K
289-ObfuscationCombiners.pdf                       17-Mar-2016 23:00    885K
290-NonceBasedCryptographyRetainingSecuritywhen..> 17-Mar-2016 23:00    510K
291-SpookyInteractionanditsDiscontentsCompilers..> 17-Mar-2016 23:00    375K
292-NewBoundsforKeyedSpongeswithExtendableOutpu..> 17-Mar-2016 23:00    324K
293-AParametricFamilyofAttackModelsforProxyReEn..> 17-Mar-2016 23:00    431K
294-EvaluationandImprovementofGenericEmulatingD..> 17-Mar-2016 23:00    779K
295-CollisionAttackonGRINDAHL.pdf                  17-Mar-2016 23:00    438K
296-HowtoSequentializeIndependentParallelAttack..> 17-Mar-2016 23:00    243K
297-AUnifiedMetricforQuantifyingInformationLeak..> 17-Mar-2016 23:00    458K
298-ReverseEngineeringoftheCryptanalyticAttackU..> 17-Mar-2016 23:00    422K
299-EfficientDesignStrategiesBasedontheAESRound..> 17-Mar-2016 23:00    426K
300-FlushGaussandReloadACacheAttackontheBLISSLa..> 17-Mar-2016 23:00    419K
301-ConstrainedPseudorandomFunctionsforUnconstr..> 17-Mar-2016 23:00    709K
302-APolynomialTimeAttackontheBBCRSScheme.pdf      17-Mar-2016 23:00    496K
303-FromObfuscationtotheSecurityofFiatShamirfor..> 17-Mar-2016 23:00    422K
304-AFastAttributeBasedEncryption.pdf              17-Mar-2016 23:00    404K
305-CerticatelessAggregateShortSignatureScheme.pdf 17-Mar-2016 23:00    151K
306-AFormalTreatmentofBackdooredPseudorandomGen..> 18-Mar-2016 23:00    379K
307-NonMalleableCodesforBoundedDepthBoundedFani..> 18-Mar-2016 23:00    670K
308-StronglyLeakageResilientAuthenticatedKeyExc..> 18-Mar-2016 23:00    442K
309-PrivatelyOutsourcingExponentiationtoaSingle..> 18-Mar-2016 23:00    522K
310-CodedBKWSolvingLWEUsingLatticeCodes.pdf        18-Mar-2016 23:00    454K
311-FastCorrelationAttacksoverExtensionFieldsLa..> 21-Mar-2016 23:00    312K
312-RefinementsofthektreeAlgorithmfortheGeneral..> 21-Mar-2016 23:00      1M
313-FiatShamirforHighlySoundProtocolsisInstanti..> 21-Mar-2016 23:00    790K
314-BlindSourceSeparationfromSingleMeasurements..> 21-Mar-2016 23:00      2M
315-FlatteningNTRUforEvaluationKeyFreeHomomorph..> 21-Mar-2016 23:00    399K
316-ANoteonBlackBoxComplexityofIndistinguishabi..> 22-Mar-2016 23:00    365K
316-ANoteonBlackBoxSeparationsforIndistinguisha..> 07-Aug-2016 22:00    410K
317-SemiAdaptiveSecurityandBundlingFunctionalit..> 22-Mar-2016 23:00    435K
318-GenericConstructionofCertificatelessSigncry..> 22-Mar-2016 23:00    171K
319-HighprecisionSecureComputationofSatelliteCo..> 22-Mar-2016 23:00    594K
320-OnMetricstoQuantifytheInterDeviceUniqueness..> 22-Mar-2016 23:00    379K
321-AlgebraicDecompositionforProbingSecurity.pdf   22-Mar-2016 23:00    620K
322-OntheSecurityofPUFProtocolsunderBadPUFsandP..> 30-Mar-2016 22:00    218K
322-PossibilitiesandImpossibilitiesforPUFProtoc..> 22-Mar-2016 23:00    271K
323-AFamilyofScalablePolynomialMultiplierArchit..> 23-Mar-2016 23:00      3M
324-InteractiveOracleProofswithConstantRateandQ..> 20-Jan-2023 08:19    567K
324-ShortInteractiveOracleProofswithConstantQue..> 23-Mar-2016 23:00    553K
325-OptimizedquantizationinZeroLeakageHelperDat..> 25-Mar-2016 23:00    881K
326-SquareAttackon7RoundKiasuBC.pdf                25-Mar-2016 23:00    406K
327-ProxyReEncryptionSchemeswithKeyPrivacyfromL..> 25-Mar-2016 23:00    218K
328-Constructinggenus3hyperellipticJacobianswit..> 25-Mar-2016 23:00    363K
329-AmodifiedblockLanczosalgorithmwithfewervect..> 25-Mar-2016 23:00    372K
330-NaCl39sCrypto_BoxinHardware.pdf                20-Jan-2023 08:19    543K
330-NaClsCrypto_BoxinHardware.pdf                  25-Mar-2016 23:00    543K
331-TRVoteANewTrustworthyandRobustElectronicVot..> 25-Mar-2016 23:00      3M
332-MicropaymentsforDecentralizedCurrencies.pdf    25-Mar-2016 23:00      2M
333-ProofofSpacefromStackedBipartiteGraphs.pdf     25-Mar-2016 23:00    303K
333-ProofofSpacefromStackedExpanders.pdf           07-Aug-2016 22:00      1M
334-Probabilitythatthekgcdofproductsofpositivei..> 07-Aug-2016 22:00     94K
334-Probabilitythatthekgcdofproductsofpositivei..> 30-Mar-2016 22:00    290K
335-Completecharacterizationofgeneralizedbentan..> 30-Mar-2016 22:00    266K
336-NoBotExpectstheDeepCAPTCHAIntroducingImmuta..> 30-Mar-2016 22:00      2M
337-StaterecoveryofRC4andSpritzRevisited.pdf       30-Mar-2016 22:00    431K
338-MixedIntegerProgrammingModelsforFiniteAutom..> 30-Mar-2016 22:00    267K
339-LatticeBasedFullyDynamicMultiKeyFHEwithShor..> 30-Mar-2016 22:00    397K
340-NonMalleableExtractorsandCodeswiththeirMany..> 30-Mar-2016 22:00    494K
341-SemanticallySecureAnonymityFoundationsofRee..> 30-Mar-2016 22:00    354K
342-OntheSelectiveOpeningSecurityofPracticalPub..> 31-Mar-2016 22:00    685K
343-Onthecomplexityofconstructingpseudorandomfu..> 20-Jan-2023 08:19    277K
343-Onthecomplexityofconstructingpseudorandomfu..> 31-Mar-2016 22:00    277K
344-EncodingRationalNumbersforFHEbasedApplicati..> 31-Mar-2016 22:00    394K
345-ProvablySecurePasswordResetProtocolModelDef..> 01-Apr-2016 22:00    188K
346-NewFrameworkforSecureServerDesignationPubli..> 01-Apr-2016 22:00    134K
347-CryptanalysisofSearchableAnonymousAttribute..> 01-Apr-2016 22:00     83K
348-ANoteonNonPerfectSecretSharing.pdf             01-Apr-2016 22:00    239K
349-NoteonImpossibleDifferentialAttacks.pdf        01-Apr-2016 22:00    326K
350-ProbabilisticTerminationandComposabilityofC..> 04-Apr-2016 22:00    709K
351-HowNottoInstantiateRingLWE.pdf                 04-Apr-2016 22:00    566K
352-ClosingtheGapinRFC7748ImplementingCurve448i..> 06-Apr-2016 22:00    765K
353-GeneralBoundsforSmallInverseProblemsandItsA..> 06-Apr-2016 22:00    184K
354-APairingFreeOneRoundIdentityBasedAuthentica..> 06-Apr-2016 22:00    274K
355-FruitUltraLightweightStreamCipherwithShorte..> 11-Apr-2016 22:00    473K
355-Fruitultralightweightstreamcipherwithshorte..> 08-Apr-2016 22:00    457K
355-Fruitv2UltraLightweightStreamCipherwithShor..> 20-Jan-2023 08:19      2M
356-MoreEfficientConstructionsforInnerProductEn..> 08-Apr-2016 22:00    436K
357-StateManagementforHashBasedSignatures.pdf      08-Apr-2016 22:00    365K
358-TheRingofGygesInvestigatingtheFutureofCrimi..> 08-Apr-2016 22:00    994K
359-LessisMoreDimensionalityReductionfromaTheor..> 11-Apr-2016 22:00    595K
360-AnotherLookatTightnessIIPracticalIssuesinCr..> 11-Apr-2016 22:00    326K
361-FunctionalEncryptionforBoundedCollusionsRev..> 07-Aug-2016 22:00    983K
361-OnlineOfflineFunctionalEncryptionforBounded..> 11-Apr-2016 22:00    485K
362-AnEmpiricalStudytowardsRefiningtheAKSPrimal..> 11-Apr-2016 22:00      2M
363-LegallyFairContractSigningWithoutKeystones.pdf 11-Apr-2016 22:00    555K
364-CryptographicAnalysisofthe3GPPAKAProtocol.pdf  11-Apr-2016 22:00    834K
365-FastModularArithmeticontheKalrayMPPA256Proc..> 12-Apr-2016 22:00    396K
366-muKummerefficienthyperellipticsignaturesand..> 12-Apr-2016 22:00    644K
367-AnAnalysisofOpenSSL39sRandomNumberGenerator..> 20-Jan-2023 08:19    439K
367-AnAnalysisofOpenSSLsRandomNumberGenerator.pdf  12-Apr-2016 22:00    439K
368-FoundationsofFullyDynamicGroupSignatures.pdf   12-Apr-2016 22:00    414K
369-EfficientMultiPointLocalDecodingofReedMulle..> 20-Jan-2023 08:19    340K
369-OnMultiPointLocalDecodingofReedMullerCodes.pdf 12-Apr-2016 22:00    343K
370-Malleabilityoftheblockchainsentropy.pdf        14-Apr-2016 22:00    847K
371-ACryptographicAnalysisofUMTSLTEAKA.pdf         14-Apr-2016 22:00    755K
372-NIZKswithanUntrustedCRSSecurityintheFaceofP..> 14-Apr-2016 22:00    517K
373-Adaptivepartitioning.pdf                       14-Apr-2016 22:00    374K
374-AnalysisofSHA512224andSHA512256.pdf            14-Apr-2016 22:00    439K
375-CanPPADHardnessbeBasedonStandardCryptograph..> 14-Apr-2016 22:00    766K
376-ASystematicAnalysisoftheJuniperDualECIncide..> 14-Apr-2016 22:00    340K
377-DifferentialCryptanalysisofSalsaandChaChaAn..> 14-Apr-2016 22:00    629K
378-Usingsemidirectproductofsemigroupsinpublick..> 14-Apr-2016 22:00    113K
379-TwoMoreEfficientVariantsoftheJPAKEProtocol.pdf 14-Apr-2016 22:00    544K
380-ParallelImplementationofBDDenumerationforLW..> 07-Aug-2016 22:00    371K
380-ParallelImplementationofCVPenumerationforLW..> 14-Apr-2016 22:00    371K
381-FHECircuitPrivacyAlmostForFree.pdf             14-Apr-2016 22:00    519K
382-FasterdiscretelogarithmsonFPGAs.pdf            15-Apr-2016 22:00    489K
382-FasterellipticcurvediscretelogarithmsonFPGA..> 28-Dec-2016 23:00    295K
383-ReducingtheKeySizeoftheSRPEncryptionSchemeE..> 15-Apr-2016 22:00    424K
384-AttacksagainstFilterGeneratorsExploitingMon..> 15-Apr-2016 22:00    386K
385-AnoteonRingLWEsecurityinthecaseofFullyHomom..> 15-Apr-2016 22:00    583K
386-CanaryNumbersDesignforLightweightOnlineTest..> 15-Apr-2016 22:00    348K
387-GameBasedCryptanalysisofaLightweightCRCBase..> 19-Apr-2016 22:00    939K
388-TightlySecureAuthenticatedKeyExchangewithou..> 20-Jan-2023 08:19    402K
388-TightlySecureAuthenticatedKeyExchangewithou..> 19-Apr-2016 22:00    402K
389-AQuasipolynomialReductionforGeneralizedSele..> 19-Apr-2016 22:00    494K
390-ObfuscationwithouttheVulnerabilitiesofMulti..> 19-Apr-2016 22:00    576K
391-ADigitalSignatureSchemeBasedonRandomSplitof..> 19-Apr-2016 22:00    423K
392-TowardsaFurtherUnderstandingofBitBasedDivis..> 19-Apr-2016 22:00    753K
393-AdjacencyGraphsIrreduciblePolynomialsandCyc..> 21-Apr-2016 22:00    325K
393-DeBruijnSequencesAdjacencyGraphsandCyclotom..> 20-Jan-2023 08:19    320K
394-StrengtheningtheKnownKeySecurityNotionforBl..> 21-Apr-2016 22:00    653K
395-EfficientBeyondBirthdayBoundSecureDetermini..> 21-Apr-2016 22:00    401K
396-CryptanalysisofHaraka.pdf                      21-Apr-2016 22:00    513K
397-LinearTimeNonMalleableCodesintheBitWiseInde..> 21-Apr-2016 22:00    469K
398-AlgebraicInsightsintotheSecretFeistelNetwor..> 21-Apr-2016 22:00    489K
399-SlowMotionZeroKnowledgeIdentifyingWithColli..> 21-Apr-2016 22:00    473K
400-TowardsSecureQuadraticVoting.pdf               22-Apr-2016 22:00    389K
401-TowerNumberFieldSieveVariantofaRecentPolyno..> 22-Apr-2016 22:00    489K
402-FullyHomomorphicEncryptionforPointNumbers.pdf  25-Apr-2016 22:00    138K
403-OnImplementingPairingBasedProtocolswithElli..> 25-Apr-2016 22:00    364K
403-OnInstantiatingPairingBasedProtocolswithEll..> 11-Nov-2016 23:00    366K
404-ANewTestStatisticforKeyRecoveryAttacksUsing..> 25-Apr-2016 22:00    315K
405-MultipleDifferentialCryptanalysisARigorousA..> 25-Apr-2016 22:00    313K
406-OntheConstructionofLightweightCirculantInvo..> 25-Apr-2016 22:00    327K
407-MILPBasedAutomaticSearchAlgorithmsforDiffer..> 25-Apr-2016 22:00    396K
408-TowardsBitcoinPaymentNetworks.pdf              25-Apr-2016 22:00      1M
409-AutomaticSearchfortheBestTrailsinARXApplica..> 25-Apr-2016 22:00    290K
410-EfficientQuantumResistantTrustInfrastructur..> 11-Oct-2016 22:00    875K
410-EfficientquantumresistanttrustInfrastructur..> 25-Apr-2016 22:00    348K
411-PolymorphicEncryptionandPseudonymisationfor..> 28-Apr-2016 22:00    740K
412-SolvingQuadraticEquationswithXLonParallelAr..> 28-Apr-2016 22:00    559K
413-EfficientalgorithmsforsupersingularisogenyD..> 28-Apr-2016 22:00    531K
414-AutomaticSearchforKeyBridgingTechniqueAppli..> 28-Apr-2016 22:00      1M
415-LatticeBasedSignatureSchemesandtheirSensiti..> 28-Apr-2016 22:00    452K
416-ADecentralizedAnonymityPreservingReputation..> 01-May-2016 22:00    299K
417-NewToolsforMultiPartyComputation.pdf           01-May-2016 22:00      1M
418-ShorterCircuitObfuscationinChallengingSecur..> 01-May-2016 22:00    480K
419-WalshHadamardTransformandCryptographicAppli..> 01-May-2016 22:00    449K
420-Anoteonthesecurityofthresholdimplementation..> 01-May-2016 22:00    185K
421-FloatingPointHomomorphicEncryption.pdf         01-May-2016 22:00    496K
421-HomomorphicEncryptionforArithmeticofApproxi..> 19-Oct-2016 22:00    466K
422-AdeeperunderstandingoftheXORcountdistributi..> 01-May-2016 22:00    363K
423-ModelingRandomOraclesunderUnpredictableQuer..> 01-May-2016 22:00    656K
424-ComputationalSecurityofQuantumEncryption.pdf   01-May-2016 22:00    433K
425-MultiInputInnerProductFunctionalEncryptionf..> 01-May-2016 22:00    411K
426-APracticalFrameworkforExecutingComplexQueri..> 01-May-2016 22:00    718K
427-NetworkDeprivedSNAAnAlternativeToAnonymizat..> 01-May-2016 22:00    361K
427-PrivacyPreservingNetworkAnalysisofDistribut..> 30-Sep-2016 22:00    332K
428-AnEfficientandScalableModelingAttackonLight..> 01-May-2016 22:00    783K
429-InformationTheoreticalAnalysisofTwoShannon3..> 20-Jan-2023 08:19    148K
429-InformationTheoreticalAnalysisofTwoShannons..> 02-May-2016 22:00    148K
430-Partiallyhomomorphicencryptionschemesoverfi..> 02-May-2016 22:00    325K
431-SecurityProofsforParticipationPrivacyReceip..> 20-Jan-2023 08:19    456K
431-SecurityProofsforParticipationPrivacyandStr..> 02-May-2016 22:00    402K
431-SecurityProofsforParticipationPrivacyandVer..> 12-Sep-2016 22:00    412K
432-TwoInputFunctionalEncryptionforInnerProduct..> 02-May-2016 22:00    294K
433-AnalysisofKeyWrappingAPIsGenericPoliciesCom..> 02-May-2016 22:00    612K
434-ATaleofTwoSharesWhyTwoShareThresholdImpleme..> 04-May-2016 22:00    640K
435-TheWholeisLessthantheSumofitsPartsConstruct..> 04-May-2016 22:00    546K
436-CryptanalysisofReducedNORX.pdf                 04-May-2016 22:00      1M
437-ObservationsontheLPNSolvingAlgorithmfromEur..> 04-May-2016 22:00    138K
437-ObservationsontheLPNSolvingAlgorithmfromEur..> 20-Jan-2023 08:19    138K
438-sElectALightweightVerifiableRemoteVotingSys..> 04-May-2016 22:00    992K
439-AMeasureVersionofGaussianHeuristic.pdf         04-May-2016 22:00    314K
440-FunctionHidingInnerProductEncryptionisPract..> 04-May-2016 22:00    457K
441-FaultTolerantImplementationsofDelaybasedPhy..> 04-May-2016 22:00    520K
442-BlindPasswordRegistrationforVerifierbasedPA..> 06-May-2016 22:00    630K
443-ThriftyZeroKnowledgeWhenLinearProgrammingMe..> 06-May-2016 22:00    473K
444-TheQARMABlockCipherFamilyAlmostMDSMatricesO..> 06-May-2016 22:00    302K
445-SecureMedSecureMedicalComputationusingGPUAc..> 06-May-2016 22:00    620K
446-Quantumkeydistributionwithcombinedconjugate..> 06-May-2016 22:00    583K
447-TheoreticalAttacksonE2EVotingSystems.pdf       06-May-2016 22:00    926K
448-ANoteonOutsourcingLargeMatrixInversionCompu..> 06-May-2016 22:00    207K
448-ANoteonOutsourcingLargeMatrixInversionCompu..> 20-Jan-2023 08:19    207K
449-LoopAbortFaultsonLatticeBasedFiatShamirandH..> 07-Aug-2016 22:00    519K
449-LoopabortFaultsonLatticeBasedFiatShamirHash..> 07-May-2016 22:00    504K
450-AProvablySecureCodebasedConcurrentSignature..> 10-May-2016 22:00    317K
451-EfficientZeroKnowledgeContingentPaymentsinC..> 10-May-2016 22:00    438K
452-SecureLoggingSchemesandCertificateTranspare..> 10-May-2016 22:00    452K
453-SQLonStructurallyEncryptedDatabases.pdf        10-May-2016 22:00    790K
454-AnalysisoftheBlockchainProtocolinAsynchrono..> 10-May-2016 22:00    536K
455-ExtractingtheRC4secretkeyoftheOpenSmartGrid..> 14-May-2016 22:00    467K
456-SecureProtocolTransformations.pdf              14-May-2016 22:00    542K
457-DynamicPolicyUpdateforCiphertextPolicyAttri..> 14-May-2016 22:00    461K
457-Withdrawn.pdf                                  20-Jan-2023 08:19    174K
458-CompGCEfficientOfflineOnlineSemihonestTwopa..> 14-May-2016 22:00    815K
459-NonInteractiveRAMandBatchNPDelegationfroman..> 13-May-2016 22:00    587K
460-RevocableHierarchicalIdentityBasedEncryptio..> 13-May-2016 22:00    346K
461-NTRUPrime.pdf                                  13-May-2016 22:00    446K
461-NTRUPrimereducingattacksurfaceatlowcost.pdf    20-Jan-2023 08:19    564K
462-FullyHomomorphicEncryptionwithIsotropicElem..> 13-May-2016 22:00      1M
463-AuthenticatedEncryptionwithVariableStretch.pdf 13-May-2016 22:00    783K
464-BeaverADecentralizedAnonymousMarketplacewit..> 13-May-2016 22:00    310K
465-CanLargeDeviationTheorybeUsedforEstimatingD..> 13-May-2016 22:00    219K
466-AnNotifyAPrivateNotificationService.pdf        20-Jan-2023 08:19      4M
466-AnoNotifyAPrivateNotificationService.pdf       13-May-2016 22:00    684K
467-SpeedingupRLWEpostquantumkeyexchange.pdf       17-May-2016 22:00    279K
468-ChaosMachineDifferentApproachtotheApplicati..> 17-May-2016 22:00    645K
469-IdentityChains.pdf                             17-May-2016 22:00    341K
470-BetterSecurityforQueriesonEncryptedDatabase..> 17-May-2016 22:00    497K
471-NTRUModularLatticeSignatureSchemeonCUDAGPUs..> 17-May-2016 22:00    435K
472-AdequateEllipticCurveforComputingtheProduct..> 17-May-2016 22:00    331K
473-ExploitingthePhysicalDisparitySideChannelAt..> 17-May-2016 22:00      1M
474-TProofSecureCommunicationviaNonAlgorithmicR..> 19-May-2016 22:00    252K
475-NonceDisrespectingAdversariesPracticalForge..> 19-May-2016 22:00    172K
476-GrothSahaiProofsRevisitedAgainABuginOptimiz..> 20-Jan-2023 08:19    488K
476-GrothSahaiProofsRevisitedAgainABuginOptimiz..> 25-May-2016 22:00    488K
476-GrothSahaiProofsRevisitedAgainABuginRandomi..> 19-May-2016 22:00    488K
477-ShorteningtheLibertPetersYungRevocableGroup..> 19-May-2016 22:00    203K
478-CryptographicSolutionsforCredibilityandLiab..> 19-May-2016 22:00      2M
479-SurveyofMicroarchitecturalSideandCovertChan..> 24-May-2016 22:00    409K
480-AchievingBetterPrivacyforthe3GPPAKAProtocol..> 24-May-2016 22:00      1M
481-SideChannelAnalysisProtectionandLowLatencyi..> 21-May-2016 22:00      2M
482-FunctionalEncryptionDeterministictoRandomiz..> 21-May-2016 22:00    481K
483-ProofofKnowledgeonMonotonePredicatesanditsA..> 08-Nov-2016 23:00    545K
483-ProofofKnowledgeonMonotonePredicatesanditsA..> 21-May-2016 22:00    538K
483-ProofsofKnowledgeonMonotonePredicatesandits..> 20-Jan-2023 08:19    367K
484-GhostshellSecureBiometricAuthenticationusin..> 21-May-2016 22:00    490K
485-AGeneralPolynomialSelectionMethodandNewAsym..> 20-May-2016 22:00      1M
486-DomainOrientedMaskingCompactMaskedHardwareI..> 20-May-2016 22:00    454K
487-ASystolicHardwareArchitecturesofMontgomeryM..> 20-May-2016 22:00      2M
488-EfficientHomomorphicIntegerPolynomialEvalua..> 23-Dec-2016 23:00    438K
488-MethodsforEfficientHomomorphicIntegerPolyno..> 20-May-2016 22:00    346K
489-TwoCentsforStrongAnonymityTheAnonymousPosto..> 20-May-2016 22:00      2M
490-TruncatedImpossibleandImprobableDifferentia..> 20-May-2016 22:00    184K
491-CharacterisationandEstimationoftheKeyRankDi..> 24-May-2016 22:00    553K
492-MiMCEfficientEncryptionandCryptographicHash..> 22-May-2016 22:00    480K
493-PartitionBasedTrapdoorCiphers.pdf              22-May-2016 22:00    610K
494-AEPMPracticalAnonymousEPaymentforMobileDevi..> 22-May-2016 22:00      2M
495-CrossCleanAmortizedGarbledCircuitswithConst..> 22-May-2016 22:00    370K
495-CrossampCleanAmortizedGarbledCircuitswithCo..> 20-Jan-2023 08:19    370K
496-AllCompleteFunctionalitiesareReversible.pdf    22-May-2016 22:00    621K
497-SecureComputationfromElasticNoisyChannels.pdf  22-May-2016 22:00      1M
498-TowardsTightlySecureShortSignatureandIBE.pdf   22-May-2016 22:00    515K
499-DroneTargetedCryptography.pdf                  23-May-2016 22:00      3M
500-EfficientIdentityBasedEncryptionandPublicKe..> 23-May-2016 22:00    173K
501-CertificatelessKeyInsulatedEncryptionCrypto..> 23-May-2016 22:00    273K
502-KeyRecoveryAttackagainst25roundpiCipher.pdf    23-May-2016 22:00    554K
503-MQSASAMultivariateSequentialAggregateSignat..> 23-May-2016 22:00    454K
504-SpeedinguptheNumberTheoreticTransformforFas..> 23-May-2016 22:00    390K
505-MASCOTFasterMaliciousArithmeticSecureComput..> 23-May-2016 22:00    436K
506-TORDidacticpluggabletransport.pdf              25-May-2016 22:00    360K
507-Solvingdiscretelogarithmsona170bitMNTcurveb..> 25-May-2016 22:00    453K
508-Collapsebindingquantumcommitmentswithoutran..> 25-May-2016 22:00    684K
509-ChosenKeyDistinguisherson12RoundFeistelSPan..> 07-Aug-2016 22:00    746K
509-ChosenKeyDistinguisherson12RoundFeistelSPan..> 25-May-2016 22:00    752K
510-AFullRNSVariantofFVlikeSomewhatHomomorphicE..> 25-May-2016 22:00    504K
511-OptimalRateNonCommittingEncryptioninaCRSMod..> 07-Aug-2016 22:00    644K
512-SecurityAnalysisofePrintReport201650034Effi..> 20-Jan-2023 08:19    290K
512-SecurityAnalysisofePrintReport2016500Effici..> 07-Aug-2016 22:00    290K
513-ApplyingTVLAtoPublicKeyCryptographicAlgorit..> 07-Aug-2016 22:00    417K
514-CryptographywithAuxiliaryInputandTrapdoorfr..> 07-Aug-2016 22:00    641K
515-RSAWeakPublicKeysavailableontheInternet.pdf    07-Aug-2016 22:00    176K
516-BonehGentryHamburg39sIdentitybasedEncryptio..> 20-Jan-2023 08:19    125K
516-BonehGentryHamburgsIdentitybasedEncryptionS..> 07-Aug-2016 22:00    204K
517-ELMOEmulatingLeaksfortheARMCortexM0withoutA..> 07-Aug-2016 22:00    447K
517-TowardsPracticalToolsforSideChannelAwareSof..> 20-Jan-2023 08:19    405K
518-AttributebasedKeyExchangewithGeneralPolicie..> 07-Aug-2016 22:00    608K
519-OntheRelationshipbetweenStatisticalZeroKnow..> 30-May-2016 22:00    466K
520-UniversallyComposableTwoServerPAKE.pdf         30-May-2016 22:00    549K
521-SATbasedcryptanalysisofACORN.pdf               30-May-2016 22:00    378K
522-ANovelMethodologyforTestingHardwareSecurity..> 30-May-2016 22:00    876K
523-ProgrammableHashFunctionsfromLatticesShortS..> 29-May-2016 22:00    551K
524-SingleKeytoMultiKeyFunctionalEncryptionwith..> 23-Aug-2016 22:00    431K
524-UnifyingSecurityNotionsofFunctionalEncrypti..> 29-May-2016 22:00    415K
525-EWCDMAnEfficientBeyondBirthdaySecureNonceMi..> 29-May-2016 22:00    585K
526-ExtendedTowerNumberFieldSievewithApplicatio..> 29-May-2016 22:00    333K
527-SecureOutsourcingofCircuitManufacturing.pdf    29-May-2016 22:00    417K
528-AdaptiveprecisionLLLandPotentialLLLreductio..> 29-May-2016 22:00    665K
528-Certifiedlatticereduction.pdf                  20-Jan-2023 08:18    648K
529-EfficientPublicKeyCryptographywithBoundedLe..> 29-May-2016 22:00    730K
530-DestroyingSteganographyviaAmalgamationKlept..> 07-Aug-2016 22:00    278K
530-GenericSemanticSecurityagainstaKleptographi..> 20-Jan-2023 08:18    290K
531-ReducingnumberfielddefiningpolynomialsAnapp..> 07-Aug-2016 22:00    414K
532-CryptanalysisofGOST2.pdf                       07-Aug-2016 22:00    304K
533-NewInsightsonAESlikeSPNCiphers.pdf             07-Aug-2016 22:00    275K
534-DamagingSimplifyingandSalvagingpOMD.pdf        07-Aug-2016 22:00    721K
535-ImpossibleDifferentialCryptanalysisofMidori..> 01-Jun-2016 22:00      5M
536-PositionBasedCryptographyandMultipartyCommu..> 31-May-2016 22:00    407K
537-AGeneralisationoftheConjugationMethodforPol..> 31-May-2016 22:00    318K
538-Howtoproveknowledgeofsmallsecrets.pdf          31-May-2016 22:00    504K
539-CryptanalysisofaTheoremDecomposingtheOnlyKn..> 31-May-2016 22:00    684K
540-HorizontalSideChannelAttacksandCountermeasu..> 31-May-2016 22:00    876K
541-BigKeySymmetricEncryptionResistingKeyExfilt..> 31-May-2016 22:00    617K
542-MPCFriendlySymmetricKeyPrimitives.pdf          31-May-2016 22:00    518K
543-ObliviSyncPracticalObliviousFileBackupandSy..> 01-Jun-2016 22:00    501K
544-EfficientSecureComparisonProtocols.pdf         01-Jun-2016 22:00    588K
544-NewProtocolsforSecureEqualityTestandCompari..> 20-Jan-2023 08:18    689K
545-OnTreesChainsandFastTransactionsintheBlockc..> 01-Jun-2016 22:00    731K
546-AnUnconditionallyHidingAuditingProcedurefor..> 02-Jun-2016 22:00    336K
547-EfficientHighSpeedWPA2BruteForceAttacksusin..> 02-Jun-2016 22:00      2M
548-LinicryptAModelforPracticalCryptography.pdf    02-Jun-2016 22:00    563K
549-ShortandAdjustableSignatures.pdf               02-Jun-2016 22:00    376K
550-AntikernelADecentralizedSecureHardwareSoftw..> 02-Jun-2016 22:00    269K
551-ImprovedFactorizationofNprqs.pdf               02-Jun-2016 22:00    264K
552-ProvablySecurePasswordAuthenticatedKeyExcha..> 02-Jun-2016 22:00    433K
553-StorageEfficientSubstringSearchableSymmetri..> 02-Jun-2016 22:00    544K
554-Anotherviewofthedivisionproperty.pdf           07-Aug-2016 22:00    437K
555-OntheSecurityandPerformanceofProofofWorkBlo..> 07-Aug-2016 22:00    393K
556-NetworkHidingCommunicationandApplicationsto..> 07-Aug-2016 22:00    581K
557-OntheMultiplicativeComplexityofBooleanFunct..> 07-Aug-2016 22:00    400K
558-FromCryptomaniatoObfustopiathroughSecretKey..> 07-Aug-2016 22:00    580K
559-Quantumhomomorphicencryptionforpolynomialsi..> 15-Jun-2016 22:00    602K
560-MemoryEfficientAlgorithmsforFindingNeedlesi..> 13-Jun-2016 22:00    452K
561-CompactnessvsCollusionResistanceinFunctiona..> 13-Jun-2016 22:00    368K
562-DeniableAttributeBasedEncryptionforBranchin..> 12-Jun-2016 22:00    445K
563-GarblingSchemeforFormulaswithConstantSizeof..> 12-Jun-2016 22:00    182K
564-TheMultiUserSecurityofAuthenticatedEncrypti..> 12-Jun-2016 22:00    481K
565-BoundedIndistinguishabilityandtheComplexity..> 12-Jun-2016 22:00    415K
566-ConcurrentNonMalleableCommitmentsandMorein3..> 11-Jun-2016 22:00    552K
567-AdversarydependentLossyTrapdoorFunctionfrom..> 05-Jun-2016 22:00    450K
568-ASecureOneRoundtripIndexforRangeQueries.pdf    05-Jun-2016 22:00    435K
569-FourQonFPGANewHardwareSpeedRecordsforEllipt..> 04-Jun-2016 22:00    517K
570-DesigninTypeIRuninTypeIIIFastandScalableBil..> 04-Jun-2016 22:00    820K
571-SimpleKeyEnumerationandRankEstimationusingH..> 04-Jun-2016 22:00    543K
572-FasterEvaluationofSBoxesviaCommonShares.pdf    03-Jun-2016 22:00    580K
573-TowardsSoundFreshReKeyingwithHardPhysicalLe..> 03-Jun-2016 22:00    559K
574-StructurevsHardnessthroughtheObfuscationLen..> 03-Jun-2016 22:00    699K
575-TumbleBitAnUntrustedBitcoinCompatibleAnonym..> 27-Aug-2016 22:00    690K
575-TumbleBitAnUntrustedTumblerforBitcoinCompat..> 03-Jun-2016 22:00    526K
576-IndistinguishabilityObfuscationDoesNotReduc..> 03-Jun-2016 22:00    176K
577-BackdoorsinPseudorandomNumberGeneratorsPoss..> 03-Jun-2016 22:00    843K
578-KeyalternatingCiphersandKeylengthExtensionE..> 03-Jun-2016 22:00    501K
579-AutomaticSearchofMeetintheMiddleandImpossib..> 11-Jun-2016 22:00    490K
580-FinegrainedCryptography.pdf                    11-Jun-2016 22:00    486K
581-UCCommitmentsforModularProtocolDesignandApp..> 11-Jun-2016 22:00    458K
582-TVPUFAFastLightweightAnalogPhysicallyUnclon..> 10-Jun-2016 22:00    455K
583-EfficientZeroKnowledgeProofofAlgebraicandNo..> 06-Jun-2016 22:00    376K
584-NetworkObliviousTransfer.pdf                   06-Jun-2016 22:00    465K
585-BreakingtheCircuitSizeBarrierforSecureCompu..> 06-Jun-2016 22:00    420K
586-AModularTreatmentofCryptographicAPIsTheSymm..> 06-Jun-2016 22:00    323K
587-BashfanotherLRXspongefunction.pdf              06-Jun-2016 22:00    710K
588-Secureobfuscationinaweakmultilinearmapmodel..> 06-Jun-2016 22:00    275K
589-DimensionPreservingReductionsfromLWEtoLWR.pdf  06-Jun-2016 22:00    444K
590-MitigatingSATAttackonLogicLocking.pdf          06-Jun-2016 22:00    441K
591-ArxAStronglyEncryptedDatabaseSystem.pdf        09-Jun-2016 22:00    318K
591-ArxAnEncryptedDatabaseusingSemanticallySecu..> 20-Jan-2023 08:18    990K
592-SubspaceTrailCryptanalysisanditsApplication..> 08-Jun-2016 22:00    527K
592-SubspaceTrailCryptanalysisanditsApplication..> 28-Nov-2016 23:00      1M
593-NoPlacetoHideContactlessProbingofSecretData..> 08-Jun-2016 22:00      2M
594-34MakeSureDSASigningExponentiationsReallyar..> 20-Jan-2023 08:18    507K
594-MakeSureDSASigningExponentiationsReallyareC..> 08-Jun-2016 22:00    473K
595-AHighThroughputGateAESHardwareArchitectureb..> 08-Jun-2016 22:00    481K
596-CacheAttacksEnableBulkKeyRecoveryontheCloud..> 07-Jun-2016 22:00    416K
597-CorrelatedExtraReductionsDefeatBlindedRegul..> 07-Jun-2016 22:00    980K
597-CorrelatedExtraReductionsDefeatBlindedRegul..> 09-Jun-2016 22:00    963K
598-PolynomialBatchCodesforEfficientITPIR.pdf      07-Jun-2016 22:00    423K
599-ObfuscationfromLowNoiseMultilinearMaps.pdf     07-Jun-2016 22:00    678K
600-ADesignMethodologyforStealthyParametricTroj..> 07-Jun-2016 22:00    878K
601-PhysicalLayerGroupKeyAgreementforAutomotive..> 07-Jun-2016 22:00    277K
602-MoreEfficientObliviousTransferExtensions.pdf   07-Jun-2016 22:00    869K
603-Koblitzcurvesoverquadraticfields.pdf           20-Jan-2023 08:18    432K
603-SoftwareimplementationofKoblitzcurvesoverqu..> 10-Jun-2016 22:00    415K
604-FMNVContinuousNonmalleableEncodingSchemeisM..> 10-Jun-2016 22:00    250K
605-ImprovingNFSforthediscretelogarithmproblemi..> 10-Jun-2016 22:00    471K
606-StrongMachineLearningAttackagainstPUFswithN..> 14-Jun-2016 22:00      1M
607-ProtocolsforAuthenticatedObliviousTransfer.pdf 14-Jun-2016 22:00    763K
608-LightSourceUltraLightweightCloneDetectionof..> 14-Jun-2016 22:00    686K
609-HowlowcanyougoUsingsidechanneldatatoenhance..> 14-Jun-2016 22:00    580K
610-TheGGMFunctionFamilyisWeaklyOneWay.pdf         12-Sep-2016 22:00    479K
610-TheGGMPRFisaWeaklyOneWayFamilyofFunctions.pdf  14-Jun-2016 22:00    669K
611-CatchingMPCCheatersIdentificationandOpenabi..> 14-Jun-2016 22:00    506K
612-OrderRevealingEncryptionNewConstructionsApp..> 14-Jun-2016 22:00    646K
613-ASurveyofMicroarchitecturalTimingAttacksand..> 19-Jun-2016 22:00    419K
614-BetterTwoRoundAdaptiveMultiPartyComputation..> 20-Jan-2023 08:18    494K
614-BetterTwoRoundAdaptiveMultipartyComputation..> 16-Jun-2016 22:00    460K
615-ReusingTamperProofHardwareinUCSecureProtoco..> 20-Jan-2023 08:18    473K
615-UniversallyComposableNonInteractiveTwoParty..> 16-Jun-2016 22:00    509K
616-PracticalFaultAttacksonAuthenticatedEncrypt..> 16-Jun-2016 22:00    358K
616-StatisticalFaultAttacksonNonceBasedAuthenti..> 18-Aug-2016 22:00    358K
617-OntheImpossibilityofMerkleMergeHomomorphism..> 16-Jun-2016 22:00     80K
618-CuriouscaseofRowhammerFlippingSecretExponen..> 16-Jun-2016 22:00    286K
619-5GenAFrameworkforPrototypingApplicationsUsi..> 16-Jun-2016 22:00    512K
620-SecureDataExchangeAMarketplaceintheCloud.pdf   16-Jun-2016 22:00    374K
621-4RoundConcurrentNonMalleableCommitments.pdf    08-Aug-2016 22:00    711K
621-4RoundConcurrentNonMalleableCommitmentsfrom..> 09-Sep-2016 22:00    656K
621-OnRoundEfficientNonMalleableProtocols.pdf      19-Jun-2016 22:00    647K
622-FunctionRevealingEncryption.pdf                11-Oct-2016 22:00    507K
622-PracticalTradeOffsforMultiInputFunctionalEn..> 18-Jun-2016 22:00    497K
623-EnCounterOnBreakingtheNonceBarrierinDiffere..> 18-Jun-2016 22:00      3M
624-EquationalSecurityProofsofObliviousTransfer..> 18-Jun-2016 22:00    391K
625-OntheDesignRationaleofSIMONBlockCipherInteg..> 17-Jun-2016 22:00    233K
626-CAESARHardwareAPI.pdf                          17-Jun-2016 22:00    502K
627-CyberPassportPreventingMassiveIdentityTheft..> 17-Jun-2016 22:00    158K
628-OnthepropertiesoftheCTRencryptionmodeoftheM..> 17-Jun-2016 22:00    398K
629-VerifiableFunctionalEncryption.pdf             17-Jun-2016 22:00    534K
630-DecomposedSBoxesandDPAAttacksAQuantitativeC..> 17-Jun-2016 22:00    538K
631-MaskingAESwithd1SharesinHardware.pdf           17-Jun-2016 22:00      2M
632-FasterMalicious2partySecureComputationwithO..> 23-Jun-2016 22:00    811K
633-MakingSmartContractsSmarter.pdf                23-Jun-2016 22:00    522K
634-CompactCCA2secureHierarchicalIdentityBasedB..> 22-Jun-2016 22:00    617K
635-SealedGlassProofsUsingTransparentEnclavesto..> 22-Jun-2016 22:00    410K
636-NewFeasibilityResultsinUnconditionalUCSecur..> 22-Jun-2016 22:00    611K
636-UnconditionalUCSecureComputationwithStronge..> 20-Jan-2023 08:18    622K
637-OntheSecurityandKeyGenerationoftheZHFEEncry..> 21-Jun-2016 22:00    353K
638-ATweakforaPRFModeofaCompressionFunctionandI..> 21-Jun-2016 22:00    130K
639-GameTheoreticFrameworkforIntegrityVericatio..> 21-Jun-2016 22:00    503K
639-GameTheoreticFrameworkforIntegrityVerificat..> 20-Jan-2023 08:18    503K
640-UniversalForgeryandKeyRecoveryAttacksonELmD..> 21-Jun-2016 22:00    967K
641-BitstreamFaultInjectionsBiFIAutomatedFaultA..> 21-Jun-2016 22:00      3M
642-EfficientandProvableWhiteBoxPrimitives.pdf     21-Jun-2016 22:00    644K
643-OntheComputationalOverheadofMPCwithDishones..> 21-Jun-2016 22:00    454K
644-HowtoBackdoorDiffieHellman.pdf                 25-Jun-2016 22:00      2M
645-FourQNEONFasterEllipticCurveScalarMultiplic..> 25-Jun-2016 22:00    355K
646-Computationalintegritywithapublicrandomstri..> 24-Jun-2016 22:00    498K
647-Strong8bitSboxeswithEfficientMaskinginHardw..> 24-Jun-2016 22:00    883K
648-ParTITowardsCombinedHardwareCountermeasures..> 24-Jun-2016 22:00    957K
649-GameBasedPrivacyAnalysisofRFIDSecuritySchem..> 24-Jun-2016 22:00    984K
650-SecuringMultipartyProtocolsagainsttheExposu..> 24-Jun-2016 22:00    797K
651-PenandPaperArgumentsforSIMONandSIMONlikeDes..> 24-Jun-2016 22:00    357K
652-AutomaticSearchforaMaximumProbabilityDiffer..> 24-Jun-2016 22:00    547K
653-FullyHomomorphicEncryptionwithZeroNormCiphe..> 30-Jun-2016 22:00      3M
654-InterpolatingPredicateandFunctionalEncrypti..> 29-Jun-2016 22:00    614K
654-StrongerSecurityforReusableGarbledCircuitsG..> 20-Jan-2023 08:18    747K
655-ATagBasedEncodingAnEfficientEncodingforPred..> 29-Jun-2016 22:00    400K
655-ATagBasedEncodingAnEfficientEncodingforPred..> 20-Jan-2023 08:18    400K
656-ImprovingPracticalUCSecureCommitmentsbasedo..> 29-Jun-2016 22:00    462K
657-BoundedSizeHidingPrivateSetIntersection.pdf    28-Jun-2016 22:00    317K
658-AsymptoticAnalysisofPlausibleTreeHashModesf..> 07-Aug-2016 22:00    356K
658-OnPlausibleTreeHashModesforSHA3.pdf            28-Jun-2016 22:00    337K
659-FrodoTakeofftheringPracticalQuantumSecureKe..> 28-Jun-2016 22:00    690K
660-TheSKINNYFamilyofBlockCiphersanditsLowLaten..> 28-Jun-2016 22:00      1M
661-ReducingtheLeakageinPracticalOrderRevealing..> 28-Jun-2016 22:00    417K
662-PracticalRoundOptimalBlindSignaturesintheSt..> 28-Jun-2016 22:00    531K
663-AnonymousAttestationUsingtheStrongDiffieHel..> 28-Jun-2016 22:00    624K
664-EfficientConversionMethodfromArithmetictoBo..> 01-Jul-2016 22:00    414K
665-BreakingandFixingPrivateSetIntersectionProt..> 01-Jul-2016 22:00      1M
666-AGMMtypeconstructionforresilientSboxeswithh..> 01-Jul-2016 22:00    288K
666-ConstructionofresilientSboxeswithhigherdime..> 13-Sep-2016 22:00    287K
667-MultivariateLinearCryptanalysisThePastandFu..> 01-Jul-2016 22:00    673K
667-MultivariateProfilingofHullsforLinearCrypta..> 20-Jan-2023 08:18    642K
668-AnalysisofaSecureandVerifiablePolicyUpdateO..> 04-Jul-2016 22:00     45K
669-NEONSIDHEfficientImplementationofSupersingu..> 04-Jul-2016 22:00    633K
670-DREipAVerifiableEVotingSchemewithoutTallyin..> 04-Jul-2016 22:00    381K
671-Efficientprobabilisticalgorithmforestimatin..> 07-Jul-2016 22:00    353K
672-FPGASIDHHighPerformanceImplementationofSupe..> 07-Jul-2016 22:00    829K
672-PostQuantumCryptographyonFPGABasedonIsogeni..> 17-Sep-2016 22:00    717K
673-DirichletProductforBooleanFunctions.pdf        06-Jul-2016 22:00    344K
674-APUFbasedSecureCommunicationProtocolforIoT.pdf 06-Jul-2016 22:00    547K
675-AcceleratingHomomorphicComputationsonRation..> 06-Jul-2016 22:00    440K
676-CryptanalysisofReducedRoundMidori64BlockCip..> 06-Jul-2016 22:00    456K
677-BreakingIntotheKeyStoreAPracticalForgeryAtt..> 06-Jul-2016 22:00    479K
678-AnonymousRAM.pdf                               06-Jul-2016 22:00    617K
679-HybridWBCSecureandEfficientWhiteBoxEncrypti..> 06-Jul-2016 22:00      1M
680-FairClientPuzzlesfromtheBitcoinBlockchain.pdf  06-Jul-2016 22:00    371K
681-AmortizedComplexityofZeroKnowledgeProofsRev..> 16-Jul-2016 22:00    368K
682-FindingSignificantFourierCoefficientsClarif..> 16-Jul-2016 22:00    436K
683-EfficientSparseMerkleTreesCachingStrategies..> 12-Jul-2016 22:00    399K
684-Fasterindividualdiscretelogarithmsinfinitef..> 20-Jan-2023 08:18    511K
684-Fasterindividualdiscretelogarithmsinnonprim..> 12-Jul-2016 22:00    628K
685-OverlayingCircuitClausesforSecureComputatio..> 12-Jul-2016 22:00      1M
686-TheLightest4x4MDSMatricesoverGL4mathbbF_2.pdf  12-Jul-2016 22:00    172K
687-CiphersforMPCandFHE.pdf                        12-Jul-2016 22:00    569K
688-BoundedKDMSecurityfromiOandOWF.pdf             12-Jul-2016 22:00    343K
689-NewAutomaticSearchToolforImpossibleDifferen..> 12-Jul-2016 22:00    480K
690-WhenAreThreeVotersEnoughforPrivacyPropertie..> 15-Jul-2016 22:00    466K
691-TargetedHomomorphicAttributeBasedEncryption..> 15-Jul-2016 22:00    496K
692-Cryptanalysisandimprovementofcertificateles..> 14-Jul-2016 22:00    218K
693-IdentityBasedKeyAggregateCryptosystemfromMu..> 14-Jul-2016 22:00    492K
694-MastrovitoFormofNonrecursiveKaratsubaMultip..> 21-Nov-2016 23:00    447K
694-MastrovitoformofKaratsubaMultiplierforAllTr..> 14-Jul-2016 22:00    416K
695-GatescramblingRevisitedorTheTinyTableprotoc..> 14-Jul-2016 22:00    356K
696-SolvingtheSecureStorageDilemmaAnEfficientSc..> 13-Jul-2016 22:00    698K
697-CiphertextForgeryonHANUMAN.pdf                 13-Jul-2016 22:00    505K
698-ANoteonOneSecureAntiCollusionDataSharingSch..> 13-Jul-2016 22:00    198K
699-ANoteonOnePrivacyPreservingMultiKeywordRank..> 13-Jul-2016 22:00    215K
700-SideChannelProtectionsforCryptographicInstr..> 13-Jul-2016 22:00      3M
701-BoltAnonymousPaymentChannelsforDecentralize..> 13-Jul-2016 22:00    473K
702-MirrorTheoryandCryptography.pdf                13-Jul-2016 22:00    456K
703-InSecuremessagingwiththeSilentCircleinstant..> 19-Jul-2016 22:00      5M
704-HighSaturationCompleteGraphApproachforECPoi..> 19-Jul-2016 22:00    810K
705-NewconstructionofsinglecycleTfunctionfamili..> 18-Jul-2016 22:00    679K
706-MemoryErasabilityAmplification.pdf             18-Jul-2016 22:00    870K
707-TowardsaCharacterizationoftheRelatedKeyAtta..> 18-Jul-2016 22:00    369K
708-From5passMQbasedidentificationtoMQbasedsign..> 18-Jul-2016 22:00    787K
709-DifferentialFaultAnalysisofSHA3224andSHA325..> 18-Jul-2016 22:00    495K
710-KeymillSideChannelResilientKeyGenerator.pdf    18-Jul-2016 22:00    589K
711-AUnilateraltoMutualAuthenticationCompilerfo..> 18-Jul-2016 22:00    589K
712-ASurveyofHardwareImplementationsofEllipticC..> 22-Jul-2016 22:00    176K
713-Tuplelatticesieving.pdf                        22-Jul-2016 22:00    258K
714-AlltheAESYouNeedonCortexM3andM4.pdf            22-Jul-2016 22:00    272K
715-UniformFirstOrderThresholdImplementations.pdf  22-Jul-2016 22:00    431K
716-2hopBlockchainCombiningProofofWorkandProofo..> 12-Nov-2016 23:00    711K
716-SecuringBitcoinlikeBackboneProtocolsagainst..> 21-Jul-2016 22:00    426K
717-ComparisonbetweenSubfieldandStraightforward..> 21-Jul-2016 22:00    249K
718-LeakageAbuseAttacksAgainstSearchableEncrypt..> 21-Jul-2016 22:00    398K
719-BridgingtheGapAdvancedToolsforSideChannelLe..> 21-Jul-2016 22:00      2M
720-ABlackBoxConstructionofNonMalleableEncrypti..> 21-Jul-2016 22:00    505K
721-StrongHardnessofPrivacyfromWeakTraitorTraci..> 21-Jul-2016 22:00    325K
722-ImprovedMeetintheMiddleAttacksonReducedRoun..> 21-Jul-2016 22:00      2M
723-RobustMultiPropertyCombinersforHashFunction..> 30-Jul-2016 22:00    353K
724-SPORTSharingProofsofRetrievabilityacrossTen..> 29-Jul-2016 22:00    493K
725-TileBasedModularArchitectureforAccelerating..> 27-Jul-2016 22:00    539K
726-BoundsontheInformationRatiosofSecretSharing..> 27-Jul-2016 22:00    370K
726-LocalBoundsfortheOptimalInformationRatioofS..> 20-Jan-2023 08:18    404K
727-ImprovementsontheIndividualLogarithmComputa..> 23-Aug-2016 22:00    425K
727-ImprovementsontheIndividualLogarithmStepinE..> 02-Sep-2016 22:00    414K
727-ImprovementsontheIndividualLogarithmStepine..> 27-Jul-2016 22:00    446K
728-SophosForwardSecureSearchableEncryption.pdf    27-Jul-2016 22:00    662K
729-AttacksoncMixSomeSmallOverlookedDetails.pdf    27-Jul-2016 22:00    278K
730-LeakageResilientPublicKeyEncryptionfromObfu..> 27-Jul-2016 22:00      1M
731-SRMAPandISLAPAuthenticationProtocolsAttacks..> 27-Jul-2016 22:00    667K
732-NonlinearInvariantAttackPracticalAttackonFu..> 29-Jul-2016 22:00    631K
733-RevisitingtheHybridAttackImprovedAnalysisan..> 28-Jul-2016 22:00    582K
734-EfficientObliviousTransferProtocolsbasedonW..> 28-Jul-2016 22:00    241K
735-EfficientRobustSecretSharingfromExpanderGra..> 28-Jul-2016 22:00    403K
736-EfficientandPrivateScoringofDecisionTreesSu..> 28-Jul-2016 22:00    304K
737-ZeroKnowledgeAuthenticationProtocolsWithAlg..> 28-Jul-2016 22:00    317K
738-FHPKEwithZeroNormNoisesbasedonDLACDH.pdf       28-Jul-2016 22:00      4M
738-FHPKEwithZeroNormNoisesbasedonDLAampCDH.pdf    20-Jan-2023 08:18      4M
739-UnconditionallySecureSignatures.pdf            28-Jul-2016 22:00    327K
740-SoftwareBenchmarkingofthe2textndroundCAESAR..> 29-Jul-2016 22:00      1M
741-MARKOVMODELINGOFMOVINGTARGETDEFENSEGAMES.pdf   23-Sep-2016 22:00      2M
741-MarkovModelingofMovingTargetDefenseGames.pdf   29-Jul-2016 22:00      2M
742-AQKDbaseddigitalarchivingsolutionprovidinge..> 02-Aug-2016 22:00    853K
742-LINCOSAStorageSystemProvidingLongTermIntegr..> 20-Jan-2023 08:18    970K
743-InvestigatingCubeAttacksontheAuthenticatedE..> 02-Aug-2016 22:00    329K
744-ANewMethodtoInvestigatetheCCZEquivalencebet..> 02-Aug-2016 22:00    278K
745-Noveldifferentiallyprivatemechanismsforgrap..> 02-Aug-2016 22:00    302K
746-ImprovedPrivateSetIntersectionagainstMalici..> 02-Aug-2016 22:00    511K
747-BeyondBitcoinPartIIBlockchainbasedsystemswi..> 08-Aug-2016 22:00    475K
748-AGenericDynamicProvableDataPossessionFramew..> 08-Aug-2016 22:00    903K
749-RevocableHierarchicalIdentityBasedEncryptio..> 08-Aug-2016 22:00    370K
750-PublicKeyBasedLightweightSwarmAuthenticatio..> 08-Aug-2016 22:00    455K
751-FeistelLikeConstructionofInvolutoryBinaryMa..> 08-Aug-2016 22:00    377K
752-ELiFAnExtremelyLightweightFlexibleBlockCiph..> 09-Aug-2016 22:00    807K
752-ELiFAnExtremelyLightweightampFlexibleBlockC..> 20-Jan-2023 08:18    807K
753-ImprovedReductionfromtheBoundedDistanceDeco..> 09-Aug-2016 22:00    472K
754-KeyRecoveryforMANTIS5.pdf                      09-Aug-2016 22:00    372K
754-PracticalKeyRecoveryAttackonMANTIS5.pdf        30-Aug-2016 22:00    392K
755-AuditableDataStructures.pdf                    09-Aug-2016 22:00      1M
756-AdaptingHeliosforprovableballotprivacy.pdf     09-Aug-2016 22:00    439K
757-RedactableBlockchainorRewritingHistoryinBit..> 09-Aug-2016 22:00    489K
758-AnewhopeonARMCortexM.pdf                       10-Aug-2016 22:00    427K
758-NewHopeonARMCortexM.pdf                        20-Jan-2023 08:18    633K
759-TowardsPracticalAttacksonArgon2iandBalloonH..> 10-Aug-2016 22:00    481K
760-SimultaneousSecrecyandReliabilityAmplificat..> 10-Aug-2016 22:00    380K
761-Twopartyauthenticatedkeyexchangeprotocolusi..> 10-Aug-2016 22:00    204K
762-FasterSecureTwoPartyComputationintheSingleE..> 20-Jan-2023 08:18    555K
762-FasterTwoPartyComputationSecureAgainstMalic..> 10-Aug-2016 22:00    582K
763-HumanPublicKeyEncryption.pdf                   10-Aug-2016 22:00    700K
764-ANOTELCellularNetworkswithLocationPrivacyEx..> 10-Aug-2016 22:00    377K
765-CryptographicVotingAGentleIntroduction.pdf     10-Aug-2016 22:00    390K
766-FunctionalCommitmentSchemesFromPolynomialCo..> 10-Aug-2016 22:00    194K
767-AconjectureaboutGausssumsandbentnessofbinom..> 12-Aug-2016 22:00    391K
768-HighThroughputSemiHonestSecureThreePartyCom..> 12-Aug-2016 22:00    882K
769-Lowtemperaturedataremanenceattacksagainstin..> 12-Aug-2016 22:00      3M
770-KangarooTwelvefasthashingbasedonKeccakp.pdf    12-Aug-2016 22:00    344K
771-HownottoProveYourselfPitfallsoftheFiatShami..> 12-Aug-2016 22:00    406K
772-TimeFrequencyAnalysisforSecondOrderAttacks.pdf 12-Aug-2016 22:00    729K
773-AlternativeImplementationsofSecureRealNumbe..> 12-Aug-2016 22:00    388K
774-TVPUFAFastLightweightAgingResistantThreshol..> 12-Aug-2016 22:00    509K
775-CryptanalysisofaHomomorphicEncryptionScheme..> 12-Aug-2016 22:00    167K
776-HomomorphicTallyingfortheEstonianInternetVo..> 17-Aug-2016 22:00    266K
777-Fastuniformscalarmultiplicationforgenus2Jac..> 17-Aug-2016 22:00    417K
778-AlgorithmicMechanismConstructionbridgingSec..> 17-Aug-2016 22:00    571K
779-CodebasedStrongDesignatedVerifierSignatures..> 17-Aug-2016 22:00    337K
780-EfficientandProvableSecureAnonymousHierarch..> 17-Aug-2016 22:00    982K
781-PrivatelyMatchingkmers.pdf                     17-Aug-2016 22:00    402K
782-ChallengesforRingLWE.pdf                       17-Aug-2016 22:00    392K
783-OntheMemoryHardnessofDataIndependentPasswor..> 18-Aug-2016 22:00    543K
784-VerifiableandDelegatableConstrainedPseudora..> 18-Aug-2016 22:00      2M
785-OptimizationofBootstrappinginCircuits.pdf      18-Aug-2016 22:00    574K
786-WhatElseisRevealedbyOrderRevealingEncryptio..> 18-Aug-2016 22:00      1M
787-Onthesecurityofnewvinegarlikevariantofmulti..> 18-Aug-2016 22:00    133K
788-OnthesecurityofCubicUOV.pdf                    18-Aug-2016 22:00    108K
788-OnthesecurityofCubicUOVanditsvariants.pdf      20-Jan-2023 08:18    130K
789-AnEfficientHardwaredesignandImplementationo..> 18-Aug-2016 22:00    330K
790-ConditionalCubeAttackonReducedRoundKeccakSp..> 20-Aug-2016 22:00    556K
791-LeakageResilientOneWayFunctionsTheAuxiliary..> 20-Aug-2016 22:00    345K
792-KeyHomomorphicSignaturesDefinitionsandAppli..> 20-Jan-2023 08:17    689K
792-KeyHomomorphicSignaturesandApplicationstoMu..> 20-Aug-2016 22:00    491K
792-KeyHomomorphicSignaturesandApplicationstoMu..> 28-Nov-2016 23:00    540K
793-SideChannelAnalysisofKeymill.pdf               20-Aug-2016 22:00    182K
794-MessagerecoveryattacksonFeistelbasedFormatP..> 20-Aug-2016 22:00    422K
795-IndistinguishabilityObfuscationfromDDHlikeA..> 20-Aug-2016 22:00    679K
796-DigitalSignaturesBasedontheHardnessofIdealL..> 20-Aug-2016 22:00    379K
797-AnMPCbasedPrivacyPreservingProtocolforaLoca..> 24-Aug-2016 22:00    529K
798-OnthePracticalInSecurityof64bitBlockCiphers..> 24-Aug-2016 22:00    509K
799-EfficientBatchedObliviousPRFwithApplication..> 24-Aug-2016 22:00    494K
800-AlmostOptimallyFairMultipartyCoinTossingwit..> 24-Aug-2016 22:00    230K
801-BlindWebSearchHowfararewefromaprivacypreser..> 24-Aug-2016 22:00    556K
802-ProofsofDataResidencyCheckingwhetherYourClo..> 24-Aug-2016 22:00    605K
803-BiometricBasedNetworkSecurityUsingMIPSCrypt..> 24-Aug-2016 22:00    416K
804-MultiKeyHomomorphicAuthenticators.pdf          24-Aug-2016 22:00    572K
805-ConstantRoundMaliciouslySecureTwoPartyCompu..> 24-Aug-2016 22:00    563K
806-HealingtheHillCipherImprovedApproachtoSecur..> 25-Aug-2016 22:00    741K
807-MultilateralWhiteBoxCryptanalysis.pdf          25-Aug-2016 22:00    815K
807-MultilateralWhiteBoxCryptanalysisCasestudyo..> 02-Sep-2016 22:00    817K
808-SimulatingAuxiliaryInputsRevisited.pdf         25-Aug-2016 22:00    535K
809-BinaryAMDCircuitsfromSecureMultipartyComput..> 25-Aug-2016 22:00    734K
810-FaultInjectionusingCrowbarsonEmbeddedSystem..> 25-Aug-2016 22:00      2M
811-MILPAidedBitBasedDivisionPropertyforPrimiti..> 25-Aug-2016 22:00    658K
812-TowardsNonBlackBoxSeparationsofPublicKeyEnc..> 25-Aug-2016 22:00    532K
813-FastPseudorandomFunctionsBasedonExpanderGra..> 25-Aug-2016 22:00    465K
814-AdaptiveSecurityofYao39sGarbledCircuits.pdf    20-Jan-2023 08:17    506K
814-AdaptiveSecurityofYaosGarbledCircuits.pdf      25-Aug-2016 22:00    506K
815-SecureMultipartyRAMComputationinConstantRou..> 26-Aug-2016 22:00    534K
816-ConcentratedDifferentialPrivacySimplificati..> 26-Aug-2016 22:00    427K
817-SecureObfuscationinaWeakMultilinearMapModel..> 26-Aug-2016 22:00    288K
818-ComposableAdaptiveSecureProtocolswithoutSet..> 26-Aug-2016 22:00    405K
819-VirtualGreyBoxesBeyondObfuscationAStatistic..> 26-Aug-2016 22:00    461K
820-SeparatingComputationalandStatisticalDiffer..> 28-Aug-2016 22:00    382K
821-MultivariateCryptographywithMappingsofDiscr..> 28-Aug-2016 22:00    247K
822-ASecureandEfficientAuthenticationTechniquef..> 20-Jan-2023 08:17      2M
822-ProxybasedAuthenticationSchemeforVehicularA..> 28-Aug-2016 22:00    289K
823-PostQuantumAttributeBasedSignaturesfromLatt..> 30-Aug-2016 22:00    488K
824-P2PMixingandUnlinkableBitcoinTransactions.pdf  30-Aug-2016 22:00    458K
825-CascadeCiphersRevisitedIndifferentiabilityA..> 30-Aug-2016 22:00    600K
825-RevisitingCascadeCiphersinIndifferentiabili..> 20-Jan-2023 08:17    592K
826-RotationalCryptanalysisinthePresenceofConst..> 30-Aug-2016 22:00    476K
827-SecurityAnalysisofBLAKE239sModesofOperation..> 20-Jan-2023 08:17    695K
827-SecurityAnalysisofBLAKE2sModesofOperation.pdf  30-Aug-2016 22:00    686K
828-FasterKeyRecoveryAttackonRoundReducedPRINCE..> 30-Aug-2016 22:00    346K
829-EfficientKDMCCASecurePublicKeyEncryptionfor..> 30-Aug-2016 22:00    718K
830-IODSSEScalingDynamicSearchableEncryptiontoM..> 30-Aug-2016 22:00    533K
831-ReducingtheNumberofNonlinearMultiplications..> 30-Aug-2016 22:00    455K
832-IsAEZv41SufficientlyResilientAgainstKeyReco..> 30-Aug-2016 22:00    499K
833-MultiCastKeyDistributionScalableDynamicandP..> 31-Aug-2016 22:00    208K
834-AZooofHomomorphicSignaturesMultiKeyandKeyHo..> 31-Aug-2016 22:00    522K
834-MultiKeyHomomorphicSignaturesUnforgeableund..> 20-Jan-2023 08:17    536K
835-LightweightDiffusionLayerImportanceofToepli..> 31-Aug-2016 22:00    482K
836-TheDiscreteLogarithmProblemoverPrimeFieldsc..> 03-Sep-2016 22:00    167K
837-FullyHomomophicEncryptionovertheIntegersRev..> 03-Sep-2016 22:00    411K
837-FullyHomomorphicEncryptionovertheIntegersRe..> 04-Sep-2016 22:00    411K
838-PassiveSecretDisclosureAttackonanUltralight..> 03-Sep-2016 22:00    374K
839-OntheDivisionPropertyofSIMON48andSIMON64.pdf   06-Sep-2016 22:00    627K
840-DejaQAllOverAgainTighterandBroaderReduction..> 06-Sep-2016 22:00    570K
841-AMethodologyfortheCharacterisationofLeakage..> 06-Sep-2016 22:00    983K
842-ImprovedBlackBoxNonMalleableEncryptionfromS..> 06-Sep-2016 22:00    657K
843-PartitioningviaNonLinearPolynomialFunctions..> 06-Sep-2016 22:00    685K
844-SecureandEfficientConstructionofBroadcastEn..> 06-Sep-2016 22:00    408K
845-SelectiveOpeningSecurityfromSimulatableData..> 06-Sep-2016 22:00    570K
846-SurveyofApproachesandTechniquesforSecurityV..> 20-Jan-2023 08:17      1M
846-SurveyofApproachesforSecurityVerificationof..> 07-Sep-2016 22:00    556K
847-Onthesmallestratioproblemoflatticebases.pdf    07-Sep-2016 22:00    210K
848-FromWeaklySelectivetoSelectiveSecurityinCom..> 07-Sep-2016 22:00    504K
848-FromWeaklySelectivetoSelectiveSecurityinCom..> 20-Jan-2023 08:17    660K
849-AnObliviousRAMwithSublogarithmicBandwidthBl..> 07-Sep-2016 22:00    348K
849-AsymptoticallyTightBoundsforComposingORAMwi..> 20-Oct-2016 22:00    597K
850-LightweightFaultAttackResistanceinSoftwareU..> 07-Sep-2016 22:00    803K
851-ANewAlgorithmfortheUnbalancedMeetintheMiddl..> 07-Sep-2016 22:00    774K
852-FasterLLLtypeReductionofLatticeBases.pdf       07-Sep-2016 22:00    356K
853-StrongerSecurityVariantsofGCMSIV.pdf           07-Sep-2016 22:00      1M
854-AlgebraicSecurityAnalysisofKeyGenerationwit..> 07-Sep-2016 22:00    300K
855-CombinatorialRepairabilityforThresholdSchem..> 07-Sep-2016 22:00    284K
856-SpritzaspongyRC4likestreamcipherandhashfunc..> 07-Sep-2016 22:00    451K
857-ApplyingMILPMethodtoSearchingIntegralDistin..> 08-Sep-2016 22:00    868K
858-AKeyRecoveryAttackonMDPCwithCCASecurityUsin..> 08-Sep-2016 22:00    839K
859-OntheSecurityofSupersingularIsogenyCryptosy..> 08-Sep-2016 22:00    320K
860-EfficientIBEwithTightReductiontoStandardAss..> 10-Sep-2016 22:00    587K
861-SecureStableMatchingatScale.pdf                10-Sep-2016 22:00      4M
862-FlawintheSecurityAnalysisofLeakageresilient..> 10-Sep-2016 22:00    468K
863-MorePowerfulandReliableSecondlevelStatistic..> 10-Sep-2016 22:00    414K
864-SalvagingWeakSecurityBoundsforBlockcipherBa..> 10-Sep-2016 22:00    523K
865-ReverseCycleWalkingandItsApplications.pdf      10-Sep-2016 22:00    422K
866-AShuffleArgumentSecureintheGenericModel.pdf    10-Sep-2016 22:00    668K
867-Asurveyonphysiologicalsignalbasedsecurityfo..> 10-Sep-2016 22:00    213K
868-SelectiveOpeningSecurityinthePresenceofRand..> 10-Sep-2016 22:00    644K
869-CryptographicapplicationsofcapacitytheoryOn..> 20-Jan-2023 08:17    385K
869-CryptographicapplicationsofcapacitytheoryOn..> 10-Sep-2016 22:00    385K
870-FasterFullyHomomorphicEncryptionBootstrappi..> 10-Sep-2016 22:00    607K
871-BlockchainFreeCryptocurrenciesAFrameworkfor..> 20-Jan-2023 08:17    380K
871-BlockchainFreeCryptocurrenciesARationalFram..> 10-Sep-2016 22:00    352K
872-IteratedRandomOracleAUniversalApproachforFi..> 10-Sep-2016 22:00    512K
873-CryptographicReverseFirewallviaMalleableSmo..> 11-Sep-2016 22:00    555K
875-DepthRobustGraphsandTheirCumulativeMemoryCo..> 14-Sep-2016 22:00    605K
876-HowtoBuildFullySecureTweakableBlockciphersf..> 14-Sep-2016 22:00    557K
877-HowtoObtainFullyStructurePreservingAutomorp..> 14-Sep-2016 22:00    212K
878-LinearStructuresApplicationstoCryptanalysis..> 14-Sep-2016 22:00    659K
879-ZeroKnowledgeArgumentsforMatrixVectorRelati..> 14-Sep-2016 22:00    679K
880-NaorYungParadigmwithSharedRandomnessandAppl..> 14-Sep-2016 22:00    498K
881-NearCollisionsintheRC4StreamCipher.pdf         14-Sep-2016 22:00    236K
882-MSKTORAMAConstantBandwidthORAMwithoutHomomo..> 14-Sep-2016 22:00    398K
883-DEMOIntegratingMPCinBigDataWorkflows.pdf       14-Sep-2016 22:00    138K
884-Robustlowcostauditablerandomnumbergeneratio..> 14-Sep-2016 22:00      4M
885-ShortStickelbergerClassRelationsandapplicat..> 14-Sep-2016 22:00    447K
886-ARobustandSpongeLikePRNGwithImprovedEfficie..> 14-Sep-2016 22:00    452K
887-AgeneralisationofDillon39sAPNpermutationwit..> 20-Jan-2023 08:17    415K
887-AgeneralisationofDillonsAPNpermutationwitht..> 14-Sep-2016 22:00    423K
888-Findingclosestlatticevectorsusingapproximat..> 19-Dec-2016 23:00    985K
888-Randomizedlatticesievingfortheclosestvector..> 14-Sep-2016 22:00    930K
889-AProvablySecureProofofStakeBlockchainProtoc..> 14-Sep-2016 22:00    394K
889-OuroborosAProvablySecureProofofStakeBlockch..> 21-Dec-2016 23:00    614K
890-AParallelVariantofLDSievefortheSVPonLattice..> 14-Sep-2016 22:00    481K
891-TightlySecureIBEunderConstantsizeMasterPubl..> 14-Sep-2016 22:00    243K
892-PrivacyPreservingDistributedLinearRegressio..> 20-Jan-2023 08:17    994K
892-SecureLinearRegressiononVerticallyPartition..> 14-Sep-2016 22:00    993K
893-Buildingwebapplicationsontopofencrypteddata..> 14-Sep-2016 22:00    771K
894-Indifferentiabilityof3RoundEvenMansourwithR..> 14-Sep-2016 22:00    816K
895-LeakageAbuseAttacksagainstOrderRevealingEnc..> 14-Sep-2016 22:00    360K
896-SecurityAnalysisofAntiSAT.pdf                  14-Sep-2016 22:00    493K
897-Anefficientsomewhathomomorphicencryptionsch..> 14-Sep-2016 22:00    227K
898-PhysicalUnclonableFunctionsbasedonTemperatu..> 14-Sep-2016 22:00    514K
899-ParallelizedSideChannelAttackResistedScalar..> 15-Sep-2016 22:00    449K
900-QuantifyingWebAdblockerPrivacy.pdf             15-Sep-2016 22:00    407K
901-DistanceBoundingbasedonPUF.pdf                 15-Sep-2016 22:00    252K
902-UniversallyComposableCryptographicRoleBased..> 15-Sep-2016 22:00    414K
903-FromIndifferentiabilitytoConstructiveCrypto..> 15-Sep-2016 22:00    343K
904-SuccinctPredicateandOnlineOfflineMultiInput..> 15-Sep-2016 22:00    967K
905-GeneralizedDesynchronizationAttackonUMAPApp..> 16-Sep-2016 22:00    321K
905-GeneralizedDesynchronizationAttackonUMAPApp..> 19-Sep-2016 22:00    321K
905-GeneralizedDesynchronizationattackonUMAPapp..> 15-Sep-2016 22:00    329K
906-OnBasingSearchSIVPonNPHardness.pdf             16-Sep-2016 22:00    360K
907-CutandChooseforGarbledRAM.pdf                  16-Sep-2016 22:00      1M
908-SecureErrorTolerantGraphMatchingProtocols.pdf  19-Sep-2016 22:00    420K
909-MulticoreFPGAImplementationofECCwithHomogen..> 19-Sep-2016 22:00      3M
910-Theclosestvectorproblemintensoredrootlattic..> 19-Sep-2016 22:00    323K
911-TheShortestSignaturesEver.pdf                  19-Sep-2016 22:00    353K
912-ParallelImplementationsofMaskingSchemesandt..> 19-Sep-2016 22:00      1M
913-SmallFieldAttackandRevisitingRLWEBasedAuthe..> 19-Sep-2016 22:00    667K
913-SmallFieldAttackandRevisitingRLWEBasedAuthe..> 20-Jan-2023 08:17    737K
914-Computingdiscretelogarithmsincryptographica..> 22-Sep-2016 22:00    354K
915-TransparencyOverlaysandApplications.pdf        22-Sep-2016 22:00    595K
916-FruitChainsAFairBlockchain.pdf                 22-Sep-2016 22:00    454K
917-HybridConsensusEfficientConsensusinthePermi..> 22-Sep-2016 22:00    595K
918-TheSleepyModelofConsensus.pdf                  22-Sep-2016 22:00    386K
919-SnowWhiteProvablySecureProofsofStake.pdf       22-Sep-2016 22:00    584K
919-SnowWhiteRobustlyReconfigurableConsensusand..> 20-Jan-2023 08:17    682K
920-BreakingWebApplicationsBuiltOnTopofEncrypte..> 22-Sep-2016 22:00    446K
921-BreakingCryptographicImplementationsUsingDe..> 24-Sep-2016 22:00    633K
922-LeakageCharacterizingandDetectingBasedonCom..> 24-Sep-2016 22:00    783K
922-SideChannelLeakageEvaluationandDetectionBas..> 20-Jan-2023 14:19     207
923-AttackingembeddedECCimplementationsthroughc..> 25-Sep-2016 22:00    648K
924-BitCoincidenceMiningAlgorithmII.pdf            25-Sep-2016 22:00    155K
925-SecureChannelInjectionandAnonymousProofsofA..> 25-Sep-2016 22:00    460K
926-LIZARDALightweightStreamCipherforPowerconst..> 25-Sep-2016 22:00    549K
927-AtomicAESACompactImplementationoftheAESEncr..> 25-Sep-2016 22:00    421K
928-Thecomplexityoftheconnectedgraphaccessstruc..> 27-Sep-2016 22:00    476K
929-AGeneralizedIdealSecretSharingScheme.pdf       27-Sep-2016 22:00    243K
930-ScalablePrivateSetIntersectionBasedonOTExte..> 27-Sep-2016 22:00    495K
931-FeedingTwoCatswithOneBowlOnDesigningaFaulta..> 27-Sep-2016 22:00    221K
931-FeedingTwoCatswithOneBowlOnDesigningaFaulta..> 14-Nov-2016 23:00    233K
932-MistakesAreProofThatYouAreTryingOnVerifying..> 20-Jan-2023 08:17    978K
932-MistakesAreProofThatYouAreTryingOnVerifying..> 27-Sep-2016 22:00    978K
933-ActivelySecure1outofNOTExtensionwithApplica..> 27-Sep-2016 22:00    369K
934-CryptographywithUpdates.pdf                    29-Sep-2016 22:00    692K
935-ConcealingSecretsinEmbeddedProcessorsDesign..> 29-Sep-2016 22:00    751K
936-LinearComplexityofDesignsbasedonCoordinateS..> 29-Sep-2016 22:00    311K
937-AComparativeSIndexinFactoringRSAModulusviaL..> 29-Sep-2016 22:00    622K
938-KummerforGenusOneoverPrimeOrderFields.pdf      29-Sep-2016 22:00    470K
939-KeyReconciliationProtocolsforErrorCorrectio..> 29-Sep-2016 22:00    635K
940-FastActivelySecureOTExtensionforShortSecret..> 29-Sep-2016 22:00    454K
941-ANewClassofDifferentially4uniformPermutatio..> 01-Oct-2016 22:00    260K
942-OptimizingSecureComputationProgramswithPriv..> 01-Oct-2016 22:00    621K
943-StadiumADistributedMetadataPrivateMessaging..> 01-Oct-2016 22:00    997K
944-HighThroughputSecureThreePartyComputationfo..> 01-Oct-2016 22:00    628K
945-HighthroughputinslicesthecaseofPRESENTPRINC..> 01-Oct-2016 22:00      1M
946-BitslicedMaskingandARMFriendsorFoes.pdf        01-Oct-2016 22:00      4M
947-Isogenygraphsofordinaryabelianvarieties.pdf    01-Oct-2016 22:00    499K
948-SecureComputationinOnlineSocialNetworks.pdf    01-Oct-2016 22:00    653K
949-FunctionalEncryptionforComputationalHidingi..> 01-Oct-2016 22:00    466K
950-OrthogonalizedLatticeEnumerationforSolvingS..> 01-Oct-2016 22:00    441K
951-RevisitingCovertMultipartyComputation.pdf      04-Oct-2016 22:01    713K
952-ISAPAuthenticatedEncryptionInherentlySecure..> 04-Oct-2016 22:00    385K
952-ISAPTowardsSideChannelSecureAuthenticatedEn..> 20-Jan-2023 08:17    561K
953-CollusionResistantBroadcastEncryptionwithTi..> 04-Oct-2016 22:00    376K
953-CollusionResistantBroadcastEncryptionwithTi..> 06-Oct-2016 22:00    496K
954-Improvingthelowerboundonthemaximumnonlinear..> 04-Oct-2016 22:00    302K
955-ConstantdepositmultipartylotteriesonBitcoin..> 04-Oct-2016 22:00    442K
956-TwoSimpleCompositionTheoremswithHcoefficien..> 04-Oct-2016 22:00    226K
957-Computinggeneratorincyclotomicintegerrings.pdf 04-Oct-2016 22:00    569K
958-SafeDeflatecompressionwithoutleakingsecrets..> 04-Oct-2016 22:00    433K
959-ImpossibilityofSimulationSecureFunctionalEn..> 04-Oct-2016 22:00    406K
960-QuantumSecureSymmetricKeyCryptographyBasedo..> 05-Oct-2016 22:00    493K
961-AkilobithiddenSNFSdiscretelogarithmcomputat..> 05-Oct-2016 22:00    599K
962-OnRemovingGradedEncodingsfromFunctionalEncr..> 05-Oct-2016 22:00    751K
963-EfficientcompressionofSIDHpublickeys.pdf       05-Oct-2016 22:00    457K
964-Practicallowdatacomplexitysubspacetrailcryp..> 05-Oct-2016 22:00    682K
965-ACryptographicProofofRegularityLemmas.pdf      05-Oct-2016 22:00    376K
965-ACryptographicProofofRegularityLemmasSimple..> 29-Dec-2016 23:00    352K
966-HighspeedVLSIimplementationofDigitserialGau..> 10-Oct-2016 22:00      1M
967-FaultyClockDetectionforCryptoCircuitsAgains..> 10-Oct-2016 22:00    354K
968-SystemClockandPowerSupplyCrossCheckingforGl..> 10-Oct-2016 22:00    306K
969-GarblingGadgetsforBooleanandArithmeticCircu..> 10-Oct-2016 22:00    453K
970-StatisticalAnalysisforAccessDrivenCacheAtta..> 12-Oct-2016 22:00    556K
971-AuthenticatedcommunicationfromQuantumReadou..> 12-Oct-2016 22:00    279K
972-RevealingEncryptionforPartialOrdering.pdf      12-Oct-2016 22:00    477K
973-InvariantSubspaceAttackAgainstMidori64andTh..> 12-Oct-2016 22:00    676K
974-ServerAidedRevocableIdentityBasedEncryption..> 12-Oct-2016 22:00    622K
975-UniversalUnconditionalVerifiabilityinEVotin..> 12-Oct-2016 22:00    550K
976-OnAdaptivelySecureMultipartyComputationwith..> 12-Oct-2016 22:00    661K
977-Sidechannelsindeduplicationtradeoffsbetween..> 12-Oct-2016 22:00    249K
978-TestingtheTrustworthinessofICTestingAnOracl..> 12-Oct-2016 22:00      1M
979-TheReasonWhySomeDivideandConquerAlgorithmsC..> 15-Oct-2016 22:00    333K
980-TruSpyCacheSideChannelInformationLeakagefro..> 15-Oct-2016 22:00      6M
981-EfficientNodictionaryVerifiableSSE.pdf         15-Oct-2016 22:00    141K
982-SecuringSystemswithScarceEntropyLWEBasedLos..> 15-Oct-2016 22:00      1M
983-ExactSecurityAnalysisofHashthenMaskTypeProb..> 15-Oct-2016 22:00    564K
984-DesignStrategiesforARXwithProvableBoundsSPA..> 15-Oct-2016 22:00    454K
985-HashFirstArgueLaterAdaptiveVerifiableComput..> 15-Oct-2016 22:00    511K
986-FastArithmeticModulo2xpypm1.pdf                17-Oct-2016 22:00    420K
987-AKeytoSuccessSuccessExponentsforSideChannel..> 17-Oct-2016 22:00    683K
988-OnProbabilisticCheckinginPerfectZeroKnowled..> 17-Oct-2016 22:00    775K
988-ZeroKnowledgeProtocolsfromSuccinctConstrain..> 20-Jan-2023 08:17    781K
989-ScryptisMaximallyMemoryHard.pdf                17-Oct-2016 22:00    502K
990-RevisitingtheWrongKeyRandomizationHypothesi..> 17-Oct-2016 22:00    700K
991-BootstrappingtheBlockchainDirectly.pdf         17-Oct-2016 22:00    602K
991-BootstrappingtheBlockchainwithApplicationst..> 20-Jan-2023 08:17    668K
992-Estimatingthecostofgenericquantumpreimageat..> 17-Oct-2016 22:00    483K
993-ComparingSboxesofCiphersfromthePerspectiveo..> 17-Oct-2016 22:00    295K
994-ImprovingAuthenticatedDynamicDictionarieswi..> 17-Oct-2016 22:00    313K
995-MeasuringsmallsubgroupattacksagainstDiffieH..> 17-Oct-2016 22:00    318K
996-LeakageResilientandMisuseResistantAuthentic..> 20-Oct-2016 22:00    814K
997-EfficientCommitmentsandZeroKnowledgeProtoco..> 20-Oct-2016 22:00    610K
997-MoreEfficientCommitmentsfromStructuredLatti..> 20-Jan-2023 08:17   1022K
998-CryptanalysesofCandidateBranchingProgramObf..> 20-Oct-2016 22:00    358K
999-IndiscreetLogsPersistentDiffieHellmanBackdo..> 20-Oct-2016 22:00    350K