Index of /2016/
../
001-Improvedonanefficientuserauthenticationsche..> 12-Jan-2016 08:18 90K
002-RemoteCacheTimingAttackwithoutLearningPhase..> 12-Jan-2016 08:18 260K
003-OnSplittingaPointwithSummationPolynomialsin..> 12-Jan-2016 08:18 262K
004-Boundingbasisreductionproperties.pdf 12-Jan-2016 08:18 239K
005-AColumnarTranspositioncipherinacontemporary..> 12-Jan-2016 08:18 543K
006-IndistinguishabilityObfuscationwithNontrivi..> 12-Jan-2016 08:18 364K
007-EasingCoppersmithMethodsusingAnalyticCombin..> 12-Jan-2016 08:18 617K
008-cMixAnonymizationbyHighPerformanceScalableM..> 12-Jan-2016 08:18 5M
008-cMixMixingwithMinimalRealTimeAsymmetricCryp..> 20-Jan-2023 08:20 294K
009-PUFBASEDSOLUTIONSFORSECURECOMMUNICATIONSINA..> 12-Jan-2016 08:18 620K
010-EliminatingDecryptionFailuresfromtheSimpleM..> 12-Jan-2016 08:18 312K
011-BetterSecurityforFunctionalEncryptionforInn..> 12-Jan-2016 08:18 509K
012-CryptographyforBigDataSecurity.pdf 12-Jan-2016 08:18 519K
013-ThresholdoptimalDSAECDSAsignaturesandanappl..> 12-Jan-2016 08:18 900K
014-FoundationsofHardwareBasedAttestedComputati..> 12-Jan-2016 08:17 756K
015-QuantumCollisionResistanceofNonUniformlyDis..> 12-Jan-2016 08:17 300K
016-Atrustlessprivacypreservingreputationsystem..> 12-Jan-2016 08:17 391K
017-Valiant39sUniversalCircuitImprovementsImple..> 20-Jan-2023 08:20 466K
017-ValiantsUniversalCircuitImprovementsImpleme..> 12-Jan-2016 08:17 466K
018-PrivateFunctionalEncryptionIndistinguishabi..> 12-Jan-2016 08:17 614K
019-AnalysisofGongetal39sCCA2SecureHomomorphicE..> 20-Jan-2023 08:20 274K
019-AnalysisofGongetalsCCA2SecureHomomorphicEnc..> 12-Jan-2016 08:17 256K
020-TruncatedDifferentialBasedKnownKeyAttackson..> 12-Jan-2016 08:17 556K
021-QuasiLinearSizeZeroKnowledgefromLinearAlgeb..> 12-Jan-2016 08:17 510K
022-Onderivativesofpolynomialsoverfinitefieldst..> 12-Jan-2016 08:17 327K
023-Improvedonanimprovedremoteuserauthenticatio..> 12-Jan-2016 08:17 77K
024-RefundAttacksonBitcoinsPaymentProtocol.pdf 12-Jan-2016 08:17 1M
024-RefundattacksonBitcoinsPaymentProtocol.pdf 12-Jan-2016 23:00 1M
025-HumanreadableProofoftheRelatedKeySecurityof..> 12-Jan-2016 08:17 512K
026-APracticalTemplateAttackonMICKEY12820UsingP..> 12-Jan-2016 08:17 1M
027-BalloonHashingAMemoryHardFunctionProvidingP..> 06-Sep-2016 22:00 733K
027-BalloonHashingProvablySpaceHardHashFunction..> 12-Jan-2016 08:17 847K
027-BalloonHashingaProvablyMemoryHardFunctionwi..> 07-Aug-2016 22:01 733K
028-SpongesandEnginesAnintroductiontoKeccakandK..> 12-Jan-2016 08:17 768K
029-SimpleSIMONFPGAimplementationsoftheSIMON641..> 12-Jan-2016 08:17 565K
030-AnEfficientLatticeBasedSignatureSchemewithP..> 12-Jan-2016 08:17 569K
031-BeyondtheselectivedisclosureofABCsonRAMcons..> 12-Jan-2016 23:00 416K
032-OntheLeakageResilientKeyExchange.pdf 13-Jan-2016 23:00 723K
033-TowardsaUnifiedSecurityModelforPhysicallyUn..> 13-Jan-2016 23:00 454K
034-UniversalCompositionwithResponsiveEnvironme..> 13-Jan-2016 23:00 831K
035-ProofsofSpaceTimeandRationalProofsofStorage..> 14-Jan-2016 23:00 427K
035-SimpleProofsofSpaceTimeandRationalProofsofS..> 20-Jan-2023 08:20 246K
036-CharacterizationsoftheDegradedBooleanFuncti..> 14-Jan-2016 23:00 2M
037-AFrameworkforOutsourcingofSecureComputation..> 14-Jan-2016 23:00 505K
038-CollateralDamageinOnlineSocialNetworkscompu..> 17-Jan-2016 23:00 412K
039-Standardquantumbitcommitmentanindefinitecom..> 17-Jan-2016 23:00 126K
040-PacketHeaderAnomalyDetectionUsingBayesianTo..> 17-Jan-2016 23:00 433K
041-ANEWUNLINKABLESECRETHANDSHAKESSCHEMEBASEDON..> 17-Jan-2016 23:00 232K
042-NeevaALightweightHashFunction.pdf 19-Jan-2016 23:00 495K
043-StrongContinuousNonmalleableEncodingSchemes..> 19-Jan-2016 23:00 303K
044-DefeatingtheBenZviBlackburnandTsabanAttacko..> 19-Jan-2016 23:00 119K
045-NewApproachesforSecureOutsourcingAlgorithmf..> 19-Jan-2016 23:00 127K
046-HowToSimulateItATutorialontheSimulationProo..> 19-Jan-2016 23:00 645K
047-CombtoPipelineFastSoftwareEncryptionRevisit..> 19-Jan-2016 23:00 482K
048-BetterPreprocessingforSecureMultipartyCompu..> 19-Jan-2016 23:00 732K
049-ImplementingaToolkitforRingLWEBasedCryptogr..> 19-Jan-2016 23:00 1M
050-ImprovedFullyHomomorphicEncryptionwithCompo..> 19-Jan-2016 23:00 1M
051-CapacityandDataComplexityinMultidimensional..> 22-Jan-2016 23:00 561K
052-FaultTolerantAggregateSignatures.pdf 22-Jan-2016 23:00 594K
053-SpeedandAreaOptimizedParallelHigherRadixMod..> 22-Jan-2016 23:00 658K
054-FullyHomomorphicPublicKeyEncryptionwithTwoC..> 30-Nov-2016 23:00 5M
054-FullyHomomorphicPublickeyEncryptionBasedonD..> 25-Jan-2016 23:00 1M
055-AttackingNTP39sAuthenticatedBroadcastMode.pdf 20-Jan-2023 08:20 349K
055-AttackingNTPsAuthenticatedBroadcastMode.pdf 25-Jan-2016 23:00 337K
056-BlindlySignedContractsAnonymousOnBlockchain..> 25-Jan-2016 23:00 419K
057-ArchitecturalBiasaNovelStatisticalMetrictoE..> 25-Jan-2016 23:00 503K
057-OntheArchitecturalAnalysisofArbiterDelayPUF..> 20-Jan-2023 08:20 1M
058-NewLatticeAttacksonDSASchemes.pdf 25-Jan-2016 23:00 222K
059-Securepositioningandquantumnonlocalcorrelat..> 25-Jan-2016 23:00 273K
060-Automatedkeysetupandrecoveryfromkeyexposure..> 20-Jan-2023 08:20 410K
060-CrypTopologyPlugPlayandRecoverKeyManagement..> 01-May-2016 22:00 952K
060-TopologybasedPlugandPlayKeySetup.pdf 25-Jan-2016 23:00 825K
061-AccountablePrivacyforDecentralizedAnonymous..> 25-Jan-2016 23:00 345K
062-VerifiableDynamicSymmetricSearchableEncrypt..> 25-Jan-2016 23:00 643K
063-AnalysingandExploitingtheMantinBiasesinRC4.pdf 25-Jan-2016 23:00 830K
064-UnconditionallySecureRevocableStorageTightB..> 25-Jan-2016 23:00 164K
065-AnoteonTensorSimpleMatrixEncryptionScheme.pdf 25-Jan-2016 23:00 111K
066-LinearHullAttackonRoundReducedSimeckwithDyn..> 25-Jan-2016 23:00 524K
067-OPFEOutsourcingComputationforPrivateFunctio..> 26-Jan-2016 23:00 353K
068-OctonionAlgebraandNoiseFreeFullyHomomorphic..> 26-Jan-2016 23:00 436K
069-VerificationMethodsfortheComputationallyCom..> 26-Jan-2016 23:00 383K
070-DomainSpecificPseudonymousSignaturesRevisit..> 26-Jan-2016 23:00 381K
071-ReverseEngineeringtheSBoxofStreebogKuznyech..> 26-Jan-2016 23:00 975K
071-ReverseEngineeringtheSBoxofStreebogKuznyech..> 18-Feb-2016 23:00 979K
072-DowngradeResilienceinKeyExchangeProtocols.pdf 26-Jan-2016 23:00 718K
073-MUORAMDealingwithStealthyPrivacyAttacksinMu..> 27-Jan-2016 23:00 319K
074-OnthePowerofSecureTwoPartyComputation.pdf 27-Jan-2016 23:00 561K
075-WeaknessesinHadamardBasedSymmetricKeyEncryp..> 28-Jan-2016 23:00 197K
076-NewEfficientandFlexibleAlgorithmsforSecureO..> 28-Jan-2016 23:00 120K
077-ImprovedMultiDimensionalMeetintheMiddleCryp..> 04-Mar-2016 23:00 472K
077-MultidimensionalMeetintheMiddleCryptanalysi..> 28-Jan-2016 23:00 624K
078-NonInteractiveVerifiableSecretSharingForMon..> 28-Jan-2016 23:00 376K
079-ProtectbothIntegrityandConfidentialityinOut..> 28-Jan-2016 23:00 266K
080-CryptanalysisofPRINCEwithMinimalData.pdf 29-Jan-2016 23:00 802K
081-ACryptographicAnalysisoftheTLS13draft10Full..> 29-Jan-2016 23:00 720K
082-NonInteractivePlaintextInEqualityProofsandG..> 29-Jan-2016 23:00 534K
083-NSEC5fromEllipticCurvesProvablyPreventingDN..> 31-Jan-2016 23:00 436K
084-TruncatedDifferentialAnalysisofRoundReduced..> 31-Jan-2016 23:00 513K
085-CryptanalysisofringLWEbasedkeyexchangewithk..> 31-Jan-2016 23:00 140K
086-IntelSGXExplained.pdf 31-Jan-2016 23:00 2M
087-SafelyExportingKeysfromSecureChannelsOntheS..> 04-Apr-2016 22:00 692K
087-SafelyExportingKeysfromSecureChannelsOnthes..> 02-Feb-2016 23:00 669K
088-OnLinearHullsandTrails.pdf 04-Oct-2016 22:01 345K
088-OnLinearHullsandTrailsinSimon.pdf 02-Feb-2016 23:00 126K
089-OntheHardnessofLWEwithBinaryErrorRevisiting..> 02-Feb-2016 23:00 3M
090-Spectralcharacterizationofiteratinglossymap..> 02-Feb-2016 23:00 246K
091-OntheSecurityoftheAlgebraicEraserTagAuthent..> 02-Feb-2016 23:00 293K
092-CryptanalysisoftheFullSpritzStreamCipher.pdf 02-Feb-2016 23:00 375K
093-Valiant39sUniversalCircuitisPractical.pdf 20-Jan-2023 08:20 1M
093-ValiantsUniversalCircuitisPractical.pdf 02-Feb-2016 23:00 1M
094-TightlyCCASecureEncryptionwithoutPairings.pdf 25-Mar-2016 23:00 652K
094-TightlySecureCCASecureEncryptionwithoutPair..> 02-Feb-2016 23:00 615K
095-ObfuscationwithoutMultilinearMaps.pdf 05-Feb-2016 23:00 205K
096-ProvableSecurityEvaluationofStructuresagain..> 05-Feb-2016 23:00 267K
097-AMaioranaMcFarlandConstructionofaGBFonGaloi..> 07-Feb-2016 23:00 207K
098-HarakaEfficientShortInputHashingforPostQuan..> 07-Feb-2016 23:00 421K
098-Harakav2EfficientShortInputHashingforPostQu..> 05-Sep-2016 22:00 521K
099-AttributeBasedFullyHomomorphicEncryptionwit..> 07-Feb-2016 23:00 373K
100-OntheComplexityofScryptandProofsofSpaceinth..> 08-Feb-2016 23:00 516K
1000-SolvingTrapdoorBasisofIdealLatticefromPubl..> 20-Oct-2016 22:00 175K
1001-RevisitingRC4KeyCollisionFasterSearchAlgor..> 20-Oct-2016 22:00 357K
1002-DecryptionphaseinNorwegianelectronicvoting..> 26-Oct-2016 22:00 286K
1003-CryptanalysisofIndistinguishabilityObfusca..> 26-Oct-2016 22:00 574K
1004-PrivateCircuitsIIIHardwareTrojanResilience..> 26-Oct-2016 22:00 973K
1005-AtomicAESv20.pdf 26-Oct-2016 22:00 342K
1006-TheSecurityofNTPsDatagramProtocol.pdf 26-Oct-2016 22:00 869K
1007-AsurveyofattacksonEthereumsmartcontracts.pdf 26-Oct-2016 22:00 295K
1008-KPFixingAvailabilityIssuesonKPOwnershipTra..> 26-Oct-2016 22:00 80K
1009-EfficientResettablySecureTwoPartyComputati..> 26-Oct-2016 22:00 492K
101-SignatureSchemeswithEfficientProtocolsandDy..> 08-Feb-2016 23:00 859K
1010-AreWeThereYetOnRPKI39sDeploymentandSecurit..> 20-Jan-2023 08:17 1M
1010-AreWeThereYetOnRPKIsDeploymentandSecurity.pdf 26-Oct-2016 22:00 1M
1011-ZeroizingAttacksonIndistinguishabilityObfu..> 26-Oct-2016 22:00 444K
1012-Commenton34AttributeBasedSignaturesforSupp..> 20-Jan-2023 08:16 311K
1012-CommentonAttributeBasedSignaturesforSuppor..> 27-Oct-2016 22:00 311K
1013-AFormalSecurityAnalysisoftheSignalMessagin..> 27-Oct-2016 22:00 552K
1014-RevisitingandExtendingtheAONTRSschemeaRobu..> 27-Oct-2016 22:00 396K
1015-MaxLengthConsideredHarmfultotheRPKI.pdf 27-Oct-2016 22:00 354K
1016-DeterringCertificateSubversionEfficientDou..> 27-Oct-2016 22:00 503K
1017-PostQuantumKeyExchangefortheInternetandthe..> 27-Oct-2016 22:00 405K
1018-IKPTurningaPKIAroundwithBlockchains.pdf 27-Oct-2016 22:00 639K
1019-FasterHomomorphicEvaluationofDiscreteFouri..> 27-Oct-2016 22:00 300K
102-BreakingtheSubExponentialBarrierinObfustopi..> 08-Feb-2016 23:00 589K
1020-KDMSecurityforIdentityBasedEncryptionConst..> 01-Nov-2016 23:00 542K
1021-CryptographicRandomnessonaCC2538aCaseStudy..> 01-Nov-2016 23:00 538K
1022-RandomizedMixedRadixScalarMultiplication.pdf 01-Nov-2016 23:00 595K
1023-ConstantTimeHigherOrderBooleantoArithmetic..> 01-Nov-2016 23:00 326K
1024-LDABasedClusteringasaSideChannelDistinguis..> 01-Nov-2016 23:00 3M
1025-AnAlgorithmforCountingtheNumberof2nPeriodi..> 01-Nov-2016 23:00 362K
1026-SharperRingLWESignatures.pdf 01-Nov-2016 23:00 577K
1027-FormalAbstractionsforAttestedExecutionSecu..> 01-Nov-2016 23:00 637K
1028-RatchetedEncryptionandKeyExchangeTheSecuri..> 01-Nov-2016 23:00 212K
1029-ScalableAttributeBasedEncryptionUndertheSt..> 01-Nov-2016 23:00 307K
103-SpeedOptimizationsinBitcoinKeyRecoveryAttac..> 08-Feb-2016 23:00 291K
1030-NovelInnerProductEncryptionResistanttoPart..> 01-Nov-2016 23:00 262K
1031-AMultiplexerbasedArbiterPUFCompositionwith..> 01-Nov-2016 23:00 503K
1032-EfficientCovertTwoPartyComputation.pdf 01-Nov-2016 23:00 583K
1033-DecentralizedAnonymousMicropayments.pdf 01-Nov-2016 23:00 815K
1034-SignificantlyImprovedMultibitDifferentials..> 01-Nov-2016 23:00 606K
1035-ImprovedEstimationofCollisionEntropyinHigh..> 02-Nov-2016 23:00 332K
1036-DirectConstructionofLightweightRotationalX..> 02-Nov-2016 23:00 403K
1037-ApolloEndtoendVerifiableInternetVotingwith..> 03-Nov-2016 23:00 704K
1038-AnEfficientNonInteractiveMulticlientSearch..> 03-Nov-2016 23:00 590K
1039-AFiatShamirImplementationNote.pdf 04-Nov-2016 23:00 331K
104-OpenSesameThePasswordHashingCompetitionandA..> 10-Feb-2016 23:00 577K
1040-SemiHonestSecureMultipartyComputationCanBe..> 20-Jan-2023 14:19 207
1040-SemiHonestSecureMultipartyComputationCanBe..> 06-Nov-2016 23:00 210K
1041-XDedupEfficientProvablySecureCrossUserChun..> 06-Nov-2016 23:00 1M
1042-34OopsIdiditagain34SecurityofOneTimeSignat..> 20-Jan-2023 08:16 625K
1042-OopsIdiditagainSecurityofOneTimeSignatures..> 06-Nov-2016 23:00 656K
1043-ConcurrentlyComposableSecurityWithShielded..> 06-Nov-2016 23:00 679K
1044-FastHardwareArchitecturesforSupersingularI..> 07-Nov-2016 23:00 503K
1045-OnFastCalculationofAdditionChainsforIsogen..> 07-Nov-2016 23:00 575K
1046-EfficientFinitefieldmultiplicationforisoge..> 07-Nov-2016 23:00 119K
1047-IoTGoesNuclearCreatingaZigBeeChainReaction..> 07-Nov-2016 23:00 7M
1048-TheBitcoinBackboneProtocolwithChainsofVari..> 07-Nov-2016 23:00 727K
1049-Randomizedstoppingtimesandprovablysecureps..> 07-Nov-2016 23:00 708K
105-CantherebeefficientandnaturalFHEschemes.pdf 07-Aug-2016 22:01 337K
105-Fullyhomomorphicencryptionmustbefatorugly.pdf 10-Feb-2016 23:00 320K
1050-CryptographicdecodingoftheLeechlattice.pdf 15-Nov-2016 23:00 406K
1051-SuperStrongRKASecureMACPKEandSEfromTagbase..> 15-Nov-2016 23:00 675K
1052-HickoryHashTMImplementinganInstanceofanAlg..> 15-Nov-2016 23:00 183K
1053-SATbasedCryptanalysisofAuthenticatedCipher..> 15-Nov-2016 23:00 482K
1054-SilentWhispersEnforcingSecurityandPrivacyi..> 15-Nov-2016 23:00 711K
1055-APracticalPostQuantumPublicKeyCryptosystem..> 21-Nov-2016 23:00 470K
1055-Apracticalpostquantumpublickeycryptosystem..> 15-Nov-2016 23:00 462K
1056-AToolKitforPartialKeyExposureAttacksonRSA.pdf 15-Nov-2016 23:00 301K
1057-SecureMultipartyComputationfromSGX.pdf 15-Nov-2016 23:00 840K
1058-RingLWECiphertextCompressionandErrorCorrec..> 15-Nov-2016 23:00 147K
1059-TheINTRUPSecurityofOCBwithIntermediatePari..> 15-Nov-2016 23:00 711K
106-AccessControlEncryptionEnforcingInformation..> 10-Feb-2016 23:00 547K
1060-OnAnalyzingProgramBehaviorUnderFaultInject..> 15-Nov-2016 23:00 254K
1061-ChangingoftheGuardsasimpleandefficientmeth..> 15-Nov-2016 23:00 111K
1062-CatenaEfficientNonequivocationviaBitcoin.pdf 20-Jan-2023 08:16 5M
1062-CatenaPreventingLieswithBitcoin.pdf 15-Nov-2016 23:00 6M
1063-AuthenticatedLSMTreeswithMinimalTrust.pdf 20-Jan-2023 08:16 305K
1063-WriteOptimizedConsistencyVerificationinClo..> 15-Nov-2016 23:00 1M
1064-SignerAnonymousDesignatedVerifierRedactabl..> 15-Nov-2016 23:00 449K
1065-RevisitingtheEfficientKeyGenerationofZHFE.pdf 15-Nov-2016 23:00 161K
1066-OptimizingSemiHonestSecureMultipartyComput..> 15-Nov-2016 23:00 871K
1067-ScalableBiasResistantDistributedRandomness..> 15-Nov-2016 23:00 621K
1068-ASATBasedAlgorithmforFindingShortCyclesinS..> 15-Nov-2016 23:00 364K
1068-OnFindingShortCyclesinCryptographicAlgorit..> 20-Jan-2023 08:16 372K
1069-ConstantRoundMaliciouslySecure2PCwithFunct..> 15-Nov-2016 23:00 483K
107-FullyAnonymousTransferableEcash.pdf 10-Feb-2016 23:00 552K
1070-PreventingCLTAttacksonObfuscationwithLinea..> 20-Jan-2023 08:16 406K
1070-PreventingCLTZeroizingAttacksonObfuscation..> 17-Nov-2016 23:00 382K
1071-FunctionalEncryptionfromSecureEnclaves.pdf 17-Nov-2016 23:00 360K
1071-IronFunctionalEncryptionusingIntelSGX.pdf 20-Jan-2023 08:16 1001K
1072-GameTheoreticSecurityforTwoPartyProtocols.pdf 17-Nov-2016 23:00 124K
1073-GroupSignatureswithLinkingBasedRevocationA..> 17-Nov-2016 23:00 427K
1073-LinkingBasedRevocationforGroupSignaturesAP..> 20-Jan-2023 08:16 431K
1074-SideChannelPlaintextRecoveryAttacksonLeaka..> 17-Nov-2016 23:00 840K
1075-CryptanalysisofSimpleMatrixSchemeforEncryp..> 17-Nov-2016 23:00 218K
1076-ANoteonQuantumSecurePRPs.pdf 21-Nov-2016 23:00 402K
1077-BlurryORAMAMultiClientObliviousStorageArch..> 21-Nov-2016 23:00 355K
1078-Constructionofnvariablenequiv2bmod4balance..> 21-Nov-2016 23:00 358K
1078-Constructionofnvariablenequiv2bmod4balance..> 20-Jan-2023 08:16 358K
1079-RevisitingtheCubicUOVSignatureScheme.pdf 21-Nov-2016 23:00 319K
108-AnEfficientToolkitforComputingPrivateSetOpe..> 20-Jan-2023 08:20 399K
108-ComputingPrivateSetOperationswithLinearComp..> 10-Feb-2016 23:00 453K
1080-DoesCouplingAffecttheSecurityofMaskedImple..> 21-Nov-2016 23:00 1M
1081-Attackstoaproxymediatedkeyagreementprotoco..> 21-Nov-2016 23:00 465K
1082-Mytraceslearnwhatyoudidinthedarkrecovering..> 21-Nov-2016 23:00 424K
1083-ConstructionsSecureagainstReceiverSelectiv..> 21-Nov-2016 23:00 471K
1084-CircuitOPRAMASomewhatTightObliviousParalle..> 21-Nov-2016 23:00 613K
1084-CircuitOPRAMUnifyingStatisticallyandComput..> 20-Jan-2023 08:16 509K
1085-DigitalSignaturesfromSymmetricKeyPrimitive..> 21-Nov-2016 23:00 725K
1086-AnAttributeBasedAnonymousBroadcastEncrypti..> 21-Nov-2016 23:00 315K
1087-CENCisOptimallySecure.pdf 21-Nov-2016 23:00 786K
1088-Howtoinfinitelyshareasecretmoreefficiently..> 22-Nov-2016 23:00 542K
1089-HomomorphicPolicyAttributeBasedKeyEncapsul..> 22-Nov-2016 23:00 510K
109-FastMultipartyMultiplicationsfromsharedbits..> 10-Feb-2016 23:00 306K
1090-OleFAnInverseFreeOnlineCipher.pdf 22-Nov-2016 23:00 653K
1091-OntheEntropyofOscillatorBasedTrueRandomNum..> 22-Nov-2016 23:00 338K
1092-ParametrizationsforFamiliesofECMfriendlycu..> 22-Nov-2016 23:00 279K
1093-EnergyOptimizationofUnrolledBlockCiphersus..> 22-Nov-2016 23:00 831K
1094-NewRevocableIBEinPrimeOrderGroupsAdaptivel..> 22-Nov-2016 23:00 223K
1095-ImprovedKeyRecoveryAlgorithmsfromNoisyRSAS..> 22-Nov-2016 23:00 391K
1096-IndistinguishabilityObfuscationfromDDHon5l..> 22-Nov-2016 23:00 768K
1096-IndistinguishabilityObfuscationfromSXDHon5..> 20-Jan-2023 08:16 777K
1097-ProjectiveArithmeticFunctionalEncryptionan..> 22-Nov-2016 23:00 715K
1098-MultikeyAnalysisofTweakableEvenMansourwith..> 22-Nov-2016 23:00 366K
1099-ImprovedParametersfortheRingTESLADigitalSi..> 22-Nov-2016 23:00 306K
110-Three39sCompromisedTooCircularInsecurityfor..> 20-Jan-2023 08:20 359K
110-ThreesCompromisedTooCircularInsecurityforAn..> 10-Feb-2016 23:00 357K
1100-PracticalReusableFuzzyExtractorsfortheSetD..> 23-Nov-2016 23:00 418K
1100-PseudoentropicIsometriesANewFrameworkforFu..> 20-Jan-2023 08:16 479K
1101-MILPAidedBitBasedDivisionPropertyforARXBas..> 23-Nov-2016 23:00 678K
1102-ChallengeswithAssessingtheImpactofNFSAdvan..> 23-Nov-2016 23:00 354K
1103-AFastSingleKeyTwoLevelUniversalHashFunctio..> 23-Nov-2016 23:00 368K
1104-PracticalFunctionalEncryptionforBilinearFo..> 23-Nov-2016 23:00 460K
1105-GenericTransformationsofPredicateEncodings..> 23-Nov-2016 23:00 555K
1106-FunctionalEncryptionforQuadraticFunctionsa..> 23-Nov-2016 23:00 434K
1107-MagicAdversariesVersusIndividualReductionS..> 25-Nov-2016 23:00 452K
1108-SecurityAnalysisofSKINNYunderRelatedTweake..> 25-Nov-2016 23:00 2M
1109-PracticalCCA2SecureandMaskedRingLWEImpleme..> 25-Nov-2016 23:00 651K
111-ScalableandSecureLogisticRegressionviaHomom..> 10-Feb-2016 23:00 757K
1110-EfficientPostQuantumZeroKnowledgeandSignat..> 25-Nov-2016 23:00 401K
1111-HidingHigherOrderSideChannelLeakageRandomi..> 25-Nov-2016 23:00 611K
1112-Directconstructionofquasiinvolutoryrecursi..> 25-Nov-2016 23:00 479K
1113-EfficientConstructionofVisualCryptographic..> 25-Nov-2016 23:00 320K
1114-FullDiskEncryptionBridgingTheoryandPractic..> 25-Nov-2016 23:00 262K
1115-ImpossibleDifferentialCryptanalysisofReduc..> 28-Nov-2016 23:00 230K
1115-ImpossibleDifferentialCryptanalysisofSKINN..> 26-Nov-2016 23:00 229K
1116-EvaluatingEntropyforTRNGsEfficientRobustan..> 01-Dec-2016 23:00 454K
1117-PrivacyfriendlyForecastingfortheSmartGridu..> 01-Dec-2016 23:00 463K
1118-DesigningOptimalImplementationsofLinearLay..> 01-Dec-2016 23:00 557K
1119-ACodeBasedGroupSignatureScheme.pdf 01-Dec-2016 23:00 429K
112-OntheInsecurityofSNARKsinthePresenceofOracl..> 10-Feb-2016 23:00 553K
1120-CryptanalysisofReducedroundSKINNYBlockCiph..> 01-Dec-2016 23:00 1M
1121-InsecurityofRCBLeakageResilientAuthenticat..> 01-Dec-2016 23:00 628K
1122-QuantumKeyRecyclingwitheightstateencodingT..> 01-Dec-2016 23:00 2M
1123-Dudeismycodeconstanttime.pdf 01-Dec-2016 23:00 1M
1124-IntegrityAnalysisofAuthenticatedEncryption..> 01-Dec-2016 23:00 1M
1125-EstonianVotingVericationMechanismRevisited..> 02-Dec-2016 23:00 639K
1125-EstonianVotingVerificationMechanismRevisit..> 13-Dec-2016 23:00 652K
1126-LizardCutofftheTailPracticalPostQuantumPub..> 02-Dec-2016 23:00 378K
1127-RelatedKeyImpossibleDifferentialAttackonRe..> 02-Dec-2016 23:00 565K
1128-ModifyingShorsalgorithmtocomputeshortdiscr..> 07-Dec-2016 23:00 394K
1129-CertificatelessPublicKeyEncryptionwithEqua..> 07-Dec-2016 23:00 3M
113-OntheCompositionofTwoProverCommitmentsandAp..> 10-Feb-2016 23:00 556K
1130-AreRNGsAchillesheelofRFIDSecurityandPrivac..> 07-Dec-2016 23:00 222K
1131-NewconstructionofsinglecycleTfunctionfamil..> 20-Jan-2023 08:16 577K
1131-OntheConstructionofthelightestCirculantMDS..> 09-Dec-2016 23:00 335K
1131-StructureoftheLightest4x4CirculantMDSMatri..> 08-Dec-2016 23:00 339K
1132-SomeresultsonACORN.pdf 08-Dec-2016 23:00 221K
1133-ImplementingCompleteFormulasonWeierstrassC..> 08-Dec-2016 23:00 725K
1134-PrivacypreservingHybridRecommenderSystem.pdf 08-Dec-2016 23:00 454K
1135-StaticPowerSideChannelAnalysisofaThreshold..> 08-Dec-2016 23:00 805K
1136-CryptographyDuringtheFrenchandAmericanWars..> 20-Jan-2023 08:16 885K
1136-CryptographyduringtheFrenchandAmericanWars..> 08-Dec-2016 23:00 877K
1137-NewImpossibleDifferentialCharacteristicofS..> 14-Dec-2016 23:00 126K
1138-PairingCryptographyMeetsIsogenyANewFramewo..> 14-Dec-2016 23:00 332K
1139-CommentsonFlawintheSecurityAnalysisofLeaka..> 14-Dec-2016 23:00 562K
114-TheMagicofELFs.pdf 10-Feb-2016 23:00 787K
1140-AttributeBasedEncryptionTraitorTracingRevo..> 14-Dec-2016 23:00 640K
1141-AnObliviousParallelRAMwithOlog2NParallelRu..> 14-Dec-2016 23:00 331K
1142-NewconstructionofsinglecycleTfunctionfamil..> 14-Dec-2016 23:00 508K
1143-CiphertextandPlaintextLeakageRevealstheEnt..> 14-Dec-2016 23:00 6M
1144-PrivateProjectionsVariants.pdf 14-Dec-2016 23:00 474K
1144-PrivateProjectionsampVariants.pdf 20-Jan-2023 08:16 474K
1145-EvolvingSBoxeswithReducedDifferentialPower..> 21-Dec-2016 23:00 438K
1146-PreventingAdaptiveKeyRecoveryAttacksontheG..> 21-Dec-2016 23:00 340K
1147-Cryptanalysisofacertificatelessaggregatesi..> 21-Dec-2016 23:00 105K
1148-SplinterPracticalPrivateQueriesonPublicDat..> 21-Dec-2016 23:00 535K
1149-ExploitingSafeErrorbasedLeakageofRFIDAuthe..> 21-Dec-2016 23:00 391K
115-EfficientlyComputingDataIndependentMemoryHa..> 11-Feb-2016 23:00 2M
1150-SimpleHomomorphismsofCocksIBEandApplicatio..> 21-Dec-2016 23:00 398K
1151-ANovelMultifactorIDbasedDesignatedVerifier..> 21-Dec-2016 23:00 175K
1152-LeakMeIfYouCanDoesTVLARevealSuccessRate.pdf 20-Jan-2023 08:16 666K
1152-WhatLiesAheadExtendingTVLATestingMethodolo..> 21-Dec-2016 23:00 3M
1153-AttacksagainstsearchPolyLWE.pdf 21-Dec-2016 23:00 176K
1154-IdentificationProtocolsandSignatureSchemes..> 20-Jan-2023 08:16 585K
1154-SignatureSchemesBasedOnSupersingularIsogen..> 21-Dec-2016 23:00 441K
1155-ComparativeStudyofVariousApproximationstot..> 21-Dec-2016 23:00 2M
1156-Scriptingsmartcontractsfordistributedledge..> 21-Dec-2016 23:00 187K
1157-NewHopewithoutreconciliation.pdf 21-Dec-2016 23:00 520K
1158-ActivateLaterCertificatesforV2XCombiningIT..> 21-Dec-2016 23:00 499K
1159-SPECTREAFastandScalableCryptocurrencyProto..> 28-Dec-2016 23:00 561K
116-InteractiveOracleProofs.pdf 11-Feb-2016 23:00 4M
1160-MeetintheMiddleAttackonQARMABlockCipher.pdf 28-Dec-2016 23:00 484K
1161-ImpossibleDifferentialAttackonSimpirav2.pdf 28-Dec-2016 23:00 602K
1162-MeetintheMiddleAttacksonClassesofContracti..> 28-Dec-2016 23:00 987K
1163-UsingFullyHomomorphicEncryptionforStatisti..> 28-Dec-2016 23:00 594K
1164-AttackingFHEbasedapplicationsbysoftwarefau..> 28-Dec-2016 23:00 323K
1165-EfficientTransparentRedactableSignatureswi..> 28-Dec-2016 23:00 508K
1166-Groupkeyexchangeprotocolswithstandingephem..> 28-Dec-2016 23:00 405K
1167-MobileCommerceSecureMultipartyComputationF..> 28-Dec-2016 23:00 299K
1167-MobileCommerceSecureMultipartyComputationa..> 20-Jan-2023 08:16 299K
1168-GenericZeroKnowledgeandMultivariateQuadrat..> 28-Dec-2016 23:00 510K
1169-LWEfromNoncommutativeGroupRings.pdf 28-Dec-2016 23:00 313K
117-CircularSecurityCounterexamplesforArbitrary..> 11-Feb-2016 23:00 420K
117-CircularSecuritySeparationsforArbitraryLeng..> 07-Aug-2016 22:01 428K
1170-ImpossibleDifferentialandBoomerangCryptana..> 28-Dec-2016 23:00 448K
1171-ASaladofBlockCiphers.pdf 28-Dec-2016 23:00 3M
1172-OntheProvableSecurityoftheTweakableEvenMan..> 28-Dec-2016 23:00 209K
1173-ConstructionofLightweightMDSMatricesoverMa..> 28-Dec-2016 23:00 56K
1173-ConstructionofLightweightMDSMatricesoverth..> 20-Jan-2023 08:16 360K
1174-RevisitingFullPRFSecurePMACandUsingItforBe..> 28-Dec-2016 23:00 309K
1175-OntheSecurityNotionsforHomomorphicSignatur..> 30-Dec-2016 23:00 374K
1176-LeakageofSignalfunctionwithreusedkeysinRLW..> 30-Dec-2016 23:00 275K
1177-EfficientSlideAttacks.pdf 30-Dec-2016 23:00 363K
1178-ImplementingandProvingtheTLS13RecordLayer.pdf 30-Dec-2016 23:00 1M
1179-UpdatableFunctionalEncryption.pdf 30-Dec-2016 23:00 387K
118-CircuitABEfromLWEUnboundedAttributesandSemi..> 11-Feb-2016 23:00 431K
1180-HowtoMeetBigDataWhenPrivateSetIntersection..> 30-Dec-2016 23:00 406K
1181-NewImpossibleDifferentialSearchToolfromDes..> 30-Dec-2016 23:00 676K
1182-PublicKeyEncryptionwithEqualityTestintheSt..> 30-Dec-2016 23:00 421K
1183-SomeResultsontheKnownClassesofQuadraticAPN..> 30-Dec-2016 23:00 167K
1184-BitcoinPrivateKeyLockedTransactions.pdf 30-Dec-2016 23:00 257K
1185-ADigitalSignatureSchemeBasedOnSupersingula..> 30-Dec-2016 23:00 368K
1186-OntheComplexityofBreakingPseudoentropy.pdf 01-Jan-2017 23:00 340K
1187-ComputingOptimalAtePairingsonEllipticCurve..> 20-Jan-2023 08:16 415K
1187-OptimalAtePairingonEllipticCurveswithEmbed..> 01-Jan-2017 23:00 376K
1188-Farfalleparallelpermutationbasedcryptograp..> 01-Jan-2017 23:00 249K
1189-OntheBitSecurityofEllipticCurveDiffieHellm..> 01-Jan-2017 23:00 364K
119-LightweightMultiplicationinGF2nwithApplicat..> 14-Feb-2016 23:00 476K
1190-EquivocatingYaoConstantRoundAdaptivelySecu..> 01-Jan-2017 23:00 491K
1191-OntheSecurityofPracticalandCompleteHomomor..> 01-Jan-2017 23:00 281K
1192-NonMalleableCodeswithSplitStateRefresh.pdf 01-Jan-2017 23:00 593K
1193-SuperscalarEncryptedRISCASecretComputerinS..> 01-Jan-2017 23:00 283K
1193-TheSecretProcessorWillGotoTheBallBenchmark..> 20-Jan-2023 08:16 394K
1194-EfficientEncryptionfromRandomQuasiCyclicCo..> 01-Jan-2017 23:00 378K
1195-ConstantTimeCalleeswithVariableTimeCallers..> 01-Jan-2017 23:00 218K
1196-MASCATStoppingMicroarchitecturalAttacksBef..> 20-Jan-2023 08:15 312K
1196-MASScanStoppingMicroarchitecturalAttacksBe..> 01-Jan-2017 23:00 313K
120-ObliviousTransferfromAnyNonTrivialElasticNo..> 14-Feb-2016 23:00 364K
121-TightlySecurePseudorandomFunctionsviaWorkFa..> 14-Feb-2016 23:00 332K
122-SimpiraAFamilyofEfficientPermutationsUsingt..> 14-Feb-2016 23:00 274K
122-Simpirav2AFamilyofEfficientPermutationsUsin..> 06-Mar-2016 23:00 291K
123-RobustPasswordProtectedSecretSharing.pdf 14-Feb-2016 23:00 438K
124-CollectingrelationsfortheNumberFieldSievein..> 14-Feb-2016 23:00 896K
125-CompactIdentityBasedEncryptionfromLWE.pdf 10-Oct-2016 22:00 454K
125-FullySecureLatticeBasedIBEasCompactasPKE.pdf 14-Feb-2016 23:00 471K
126-ServerNotariesAComplementaryApproachtotheWe..> 14-Feb-2016 23:00 363K
127-AsubfieldlatticeattackonoverstretchedNTRUas..> 14-Feb-2016 23:00 454K
128-RemovingtheStrongRSAAssumptionfromArguments..> 14-Feb-2016 23:00 709K
129-ECDHKeyExtractionviaLowBandwidthElectromagn..> 14-Feb-2016 23:00 3M
130-OntheComputationoftheOptimalAtePairingatthe..> 15-Feb-2016 23:00 319K
131-NewAttacksontheConcatenationandXORHashCombi..> 15-Feb-2016 23:00 456K
132-Cryptanalysisof6roundPRINCEusing2KnownPlain..> 15-Feb-2016 23:00 418K
133-OnthenonlinearityofmonotoneBooleanfunctions..> 15-Feb-2016 23:00 192K
134-MorePracticalandSecureHistoryIndependentHas..> 15-Feb-2016 23:00 570K
135-CryptanalysisoftheNewCLTMultilinearMapovert..> 15-Feb-2016 23:00 538K
136-AutomaticExpectationandVarianceComputingfor..> 16-Feb-2016 23:00 429K
137-Rate1LinearTimeandAdditivelyHomomorphicUCCo..> 16-Feb-2016 23:00 536K
138-Anewalgorithmforresiduemultiplicationmodulo..> 16-Feb-2016 23:00 273K
139-AnAlgorithmforCSPRProblemsandCryptanalysiso..> 16-Feb-2016 23:00 323K
139-AnAlgorithmforNTRUProblemsandCryptanalysiso..> 07-Aug-2016 22:00 145K
139-AnAlgorithmforNTRUProblemsandCryptanalysiso..> 06-Apr-2016 22:00 393K
139-AnAlgorithmforNTRUProblemsandCryptanalysiso..> 23-Feb-2016 23:00 134K
140-AdaptivelySecureIdentityBasedEncryptionfrom..> 16-Feb-2016 23:00 481K
141-Onlowdegreepolynomialsin2roundAES.pdf 16-Feb-2016 23:00 134K
142-HashFunctionbasedPRFsAMACanditsMultiUserSec..> 16-Feb-2016 23:00 492K
143-OnthenonexistenceofAPNfunctionsofalgebraicd..> 16-Feb-2016 23:00 162K
143-OnthenonexistenceofAPNnnfunctionsofalgebrai..> 18-Feb-2016 23:00 163K
143-OnupperboundsforalgebraicdegreesofAPNfuncti..> 07-Aug-2016 22:00 139K
144-HighlyEfficientandComposablePasswordProtect..> 16-Feb-2016 23:00 446K
145-DesigningProofofHumanworkPuzzlesforCryptocu..> 16-Feb-2016 23:00 362K
146-ImprovedProgressiveBKZAlgorithmsandtheirPre..> 18-Feb-2016 23:00 2M
147-AnnihilationAttacksforMultilinearMapsCrypta..> 18-Feb-2016 23:00 241K
148-IsogenybasedQuantumresistantUndeniableBlind..> 18-Feb-2016 23:00 473K
149-ImprovedIntegralandZerocorrelationLinearCry..> 18-Feb-2016 23:00 1M
150-OnGarblingSchemesWithAndWithoutPrivacy.pdf 18-Feb-2016 23:00 477K
150-OnGarblingSchemeswithandwithoutPrivacy.pdf 07-Aug-2016 22:00 476K
151-PseudorandomFunctionsinAlmostConstantDepthf..> 18-Feb-2016 23:00 619K
152-AttacksandparameterchoicesinHIMMO.pdf 18-Feb-2016 23:00 376K
153-DifferentiallyPrivatePasswordFrequencyLists..> 18-Feb-2016 23:00 668K
154-FullyAnonymousShortDynamicGroupSignaturesWi..> 18-Feb-2016 23:00 422K
154-HighlyEfficientFullyAnonymousDynamicGroupSi..> 20-Jan-2023 08:20 513K
155-CryptanalysisofMultiPrimePhiHidingAssumptio..> 18-Feb-2016 23:00 412K
156-MoreEfficientConstantRoundMultiPartyComputa..> 18-Feb-2016 23:00 348K
157-KeyDerivationforSquaredFriendlyApplications..> 18-Feb-2016 23:00 597K
158-ASubgradientAlgorithmForComputationalDistan..> 18-Feb-2016 23:00 624K
159-PseudoentropyLowerboundsforChainrulesandTra..> 18-Feb-2016 23:00 664K
160-PolytopicCryptanalysis.pdf 18-Feb-2016 23:00 494K
161-RevisitingStructureGraphandItsApplicationst..> 18-Feb-2016 23:00 558K
161-RevisitingStructureGraphsApplicationstoCBCM..> 20-Jan-2023 08:20 604K
162-NewNegativeResultsonDifferingInputsObfuscat..> 18-Feb-2016 23:00 241K
163-ZKBooFasterZeroKnowledgeforBooleanCircuits.pdf 18-Feb-2016 23:00 453K
164-SanitizationofFHECiphertexts.pdf 19-Feb-2016 23:00 436K
165-PrAdEnablingPrivacyAwareLocationbasedAdvert..> 19-Feb-2016 23:00 542K
166-PerSessionSecurityPasswordBasedCryptography..> 19-Feb-2016 23:00 665K
167-OnBitcoinSecurityinthePresenceofBrokenCrypt..> 19-Feb-2016 23:00 328K
168-TownCrierAnAuthenticatedDataFeedforSmartCon..> 19-Feb-2016 23:00 345K
169-ProvablyRobustSpongeBasedPRNGsandKDFs.pdf 19-Feb-2016 23:00 699K
170-FastLearningRequiresGoodMemoryATimeSpaceLow..> 19-Feb-2016 23:00 391K
171-CommutativityAssociativityandPublicKeyCrypt..> 22-Feb-2016 23:00 341K
172-AllYourQueriesAreBelongtoUsThePowerofFileIn..> 22-Feb-2016 23:00 468K
173-CircuitCompilerswithO1lognLeakageRate.pdf 22-Feb-2016 23:00 494K
174-HoneyEncryptionBeyondMessageRecoverySecurit..> 22-Feb-2016 23:00 217K
175-OnlineOfflineORCompositionofSigmaProtocols.pdf 22-Feb-2016 23:00 512K
176-AnonymousRoleBasedAccessControlonEHealthRec..> 22-Feb-2016 23:00 662K
177-ReducedMemoryMeetintheMiddleAttackagainstth..> 22-Feb-2016 23:00 553K
178-IntegralsgoStatisticalCryptanalysisofFullSk..> 22-Feb-2016 23:00 420K
179-Computingthetafunctionsinquasilineartimeing..> 22-Feb-2016 23:00 563K
180-PublicKeyEncryptionwithSimulationBasedSelec..> 22-Feb-2016 23:00 498K
181-CryptographicPropertiesofAdditionModulo2n.pdf 23-Feb-2016 23:00 98K
182-SideChannelWatchdogRunTimeEvaluationofSideC..> 23-Feb-2016 23:00 856K
183-ThereisWisdominHarnessingtheStrengthsofyour..> 23-Feb-2016 23:00 2M
184-EfficientlyEnforcingInputValidityinSecureTw..> 23-Feb-2016 23:00 725K
185-OntheInfluenceofMessageLengthinPMAC39sSecur..> 20-Jan-2023 08:20 530K
185-OntheInfluenceofMessageLengthinPMACsSecurit..> 23-Feb-2016 23:00 531K
186-LightweightMDSGeneralizedCirculantMatrices.pdf 23-Feb-2016 23:00 468K
186-LightweightMDSGeneralizedCirculantMatricesF..> 29-Apr-2016 22:00 474K
187-EfficientSecureMultipartyComputationwithIde..> 23-Feb-2016 23:00 393K
188-OnthedivisionpropertyofSboxes.pdf 23-Feb-2016 23:00 325K
189-Compositionsoflinearfunctionsandapplication..> 08-Mar-2016 23:00 65K
189-Yao39smillionaires39problemandpublickeyencr..> 20-Jan-2023 08:20 362K
189-Yaosmillionairesproblemandpublickeyencrypti..> 23-Feb-2016 23:00 136K
190-AMACModeforLightweightBlockCiphers.pdf 23-Feb-2016 23:00 456K
191-OptimalSecurityProofsforSignaturesfromIdent..> 23-Feb-2016 23:00 738K
192-OnNegationComplexityofInjectionsSurjections..> 23-Feb-2016 23:00 226K
193-SecurityconsiderationsforGaloisnondualRLWEf..> 20-Jan-2023 08:20 353K
193-VulnerableGaloisRLWEFamiliesandImprovedAtta..> 24-Feb-2016 23:00 372K
194-HowtoShareaSecretInfinitely.pdf 24-Feb-2016 23:00 843K
195-HowtoGeneralizeRSACryptanalyses.pdf 24-Feb-2016 23:00 589K
196-MultiKeyFHEfromLWERevisited.pdf 24-Feb-2016 23:00 279K
197-PostquantumSecurityoftheCBCCFBOFBCTRandXTSM..> 24-Feb-2016 23:00 489K
198-OptimizingSboxImplementationsforSeveralCrit..> 24-Feb-2016 23:00 361K
199-TheHoneyBadgerofBFTProtocols.pdf 24-Feb-2016 23:00 388K
200-AnAlternativeViewoftheGraphInducedMultiline..> 27-Feb-2016 23:00 415K
200-ToSavetheWiltingMultilinearMaps.pdf 25-Feb-2016 23:00 416K
201-FromStatefulHardwaretoResettableHardwareUsi..> 25-Feb-2016 23:00 366K
202-AnEncryptionSchemebasedonRandomSplitofStGen..> 25-Feb-2016 23:00 466K
203-WhiteBoxCryptographyintheGrayBoxAHardwareIm..> 25-Feb-2016 23:00 5M
204-AMemoryEncryptionEngineSuitableforGeneralPu..> 25-Feb-2016 23:00 2M
205-AddressingtheAlgebraicEraserDiffieHellmanOv..> 25-Feb-2016 23:00 62K
206-ConstructionofFullyCCASecurePredicateEncryp..> 25-Feb-2016 23:00 961K
207-FaultanalysisandweakkeyIVattackonSprout.pdf 25-Feb-2016 23:00 241K
208-ConstantRoundAsynchronousMultiPartyComputat..> 25-Feb-2016 23:00 433K
208-ConstantRoundAsynchronousMultiPartyComputat..> 23-Nov-2016 23:00 438K
209-AutomaticDifferentialAnalysisofARXBlockCiph..> 29-Feb-2016 23:00 253K
210-HopesFearsandSoftwareObfuscationASurvey.pdf 29-Feb-2016 23:00 663K
211-RandomnessComplexityofPrivateCircuitsforMul..> 29-Feb-2016 23:00 806K
212-LowLinearComplexityEstimatesforCoordinateSe..> 29-Feb-2016 23:00 257K
213-3MessageZeroKnowledgeAgainstHumanIgnorance.pdf 29-Feb-2016 23:00 369K
214-AnImprovementofBothSecurityandReliabilityfo..> 29-Feb-2016 23:00 739K
215-AlgorithmsfortheApproximateCommonDivisorPro..> 29-Feb-2016 23:00 221K
216-FairmPSIandmPSICAEfficientConstructionsinPr..> 29-Feb-2016 23:00 531K
217-PracticalbackwardunlinkablerevocationinFIDO..> 29-Feb-2016 23:00 128K
218-SemanticSecurityandKeyPrivacyWithRandomSpli..> 29-Feb-2016 23:00 416K
219-NoncebasedKerberosisaSecureDelegatedAKEProt..> 29-Feb-2016 23:00 620K
220-AlgorithmsonIdealoverComplexMultiplicationo..> 29-Feb-2016 23:00 515K
221-OnPostCompromiseSecurity.pdf 29-Feb-2016 23:00 549K
221-PostCompromiseSecurity.pdf 20-Jan-2023 08:20 588K
222-TimeMemoryTradeOffforLatticeEnumerationinaB..> 29-Feb-2016 23:00 386K
223-StillWrongUseofPairingsinCryptography.pdf 29-Feb-2016 23:00 251K
224-CacheBleedATimingAttackonOpenSSLConstantTim..> 01-Mar-2016 23:00 774K
225-ANewBirthdayTypeAlgorithmforAttackingtheFre..> 01-Mar-2016 23:00 419K
226-OnStatisticallySecureObfuscationwithApproxi..> 01-Mar-2016 23:00 447K
227-ProcessTableCovertChannelsExploitationandCo..> 01-Mar-2016 23:00 371K
228-Onadecentralizedtrustlesspseudorandomnumber..> 01-Mar-2016 23:00 263K
229-KeyCompressionforIsogenyBasedCryptosystems.pdf 01-Mar-2016 23:00 392K
230-ECDSAKeyExtractionfromMobileDevicesviaNonin..> 02-Mar-2016 23:00 4M
231-SideChannelAnalysisofWeierstrassandKoblitzC..> 02-Mar-2016 23:00 3M
232-EfficientPrivacyPreservingMatrixFactorizati..> 03-Mar-2016 23:00 895K
233-SmoothNIZKArgumentswithApplicationstoAsymme..> 03-Mar-2016 23:00 591K
233-SmoothNIZKArgumentswithApplicationstoAsymme..> 20-Jan-2023 08:19 677K
234-TrickorTweakOntheInsecurityofOTRsTweaks.pdf 03-Mar-2016 23:00 540K
235-TradingPlaintextAwarenessforSimulatabilityt..> 03-Mar-2016 23:00 288K
236-ADistinguisheronPRESENTLikePermutationswith..> 03-Mar-2016 23:00 416K
237-MayOzerovAlgorithmforNearestNeighborProblem..> 03-Mar-2016 23:00 154K
238-AlgorithmicCountermeasuresAgainstFaultAttac..> 03-Mar-2016 23:00 493K
239-ProvablyWeakInstancesofRingLWERevisited.pdf 04-Mar-2016 23:00 442K
240-OnErrorDistributionsinRingbasedLWE.pdf 07-Aug-2016 22:00 432K
240-OnthetightnessoftheerrorboundinRingLWE.pdf 04-Mar-2016 23:00 359K
241-AtrivialdebiasingschemeforHelperDataSystems..> 04-Mar-2016 23:00 742K
242-AttributeBasedSignaturesforCircuitsfromBili..> 04-Mar-2016 23:00 405K
243-OntheKeyDependentMessageSecurityoftheFujisa..> 05-Mar-2016 23:00 223K
244-CryptanalysisofSimpira.pdf 05-Mar-2016 23:00 336K
244-CryptanalysisofSimpirav1.pdf 25-Aug-2016 22:00 356K
245-DEcryptionContractENforcementToolDECENTAPra..> 05-Mar-2016 23:00 236K
246-LINGUISTICCRACKINGOFPASSPHRASESUSINGMARKOVC..> 06-Mar-2016 23:00 1M
247-PublicVeriableFunctionSecretSharing.pdf 06-Mar-2016 23:00 473K
247-PublicVerifiableFunctionSecretSharing.pdf 20-Jan-2023 14:19 207
248-InvariantsubspacesinSimpira.pdf 06-Mar-2016 23:00 342K
249-ImprovedSideChannelAnalysisAttacksonXilinxB..> 07-Mar-2016 23:00 7M
250-FixedPointArithmeticinSHEScheme.pdf 07-Mar-2016 23:00 270K
251-SearchableSymmetricEncryptionOptimalLocalit..> 07-Mar-2016 23:00 246K
252-TheExactRoundComplexityofSecureComputation.pdf 08-Mar-2016 23:00 547K
253-PracticalDRAMPUFsinCommodityDevices.pdf 08-Mar-2016 23:00 913K
253-RuntimeAccessibleDRAMPUFsinCommodityDevices..> 07-Aug-2016 22:00 700K
254-TowardsStreamCiphersforEfficientFHEwithLowN..> 08-Mar-2016 23:00 467K
255-MoreEfficientStructurePreservingSignaturesO..> 08-Mar-2016 23:00 468K
256-SEORAMAStorageEfficientObliviousRAMforPriva..> 08-Mar-2016 23:00 336K
257-IndistinguishabilityObfuscationfromConstant..> 08-Mar-2016 23:00 696K
258-StructurePreservingSmoothProjectiveHashing.pdf 08-Mar-2016 23:00 827K
259-AdaptiveObliviousTransferandGeneralizations..> 08-Mar-2016 23:00 920K
260-OntheSizeofPairingbasedNoninteractiveArgume..> 08-Mar-2016 23:00 396K
261-MEMSbasedGyroscopesasPhysicalUnclonableFunc..> 08-Mar-2016 23:00 7M
262-CollaborativeMultiAuthorityKPABEforShorterK..> 08-Mar-2016 23:00 202K
262-CollaborativeMultiAuthorityKeyPolicyAttribu..> 20-Jan-2023 08:19 167K
263-EfficientZeroKnowledgeArgumentsforArithmeti..> 08-Mar-2016 23:00 580K
264-HowFastCanHigherOrderMaskingBeinSoftware.pdf 08-Mar-2016 23:00 506K
265-MultiproverProofofRetrievability.pdf 08-Mar-2016 23:00 393K
266-ExactErrorBoundofCoxRowerArchitectureforRNS..> 10-Mar-2016 23:00 701K
267-ImprovedMeetintheMiddleAttacksonRoundReduce..> 10-Mar-2016 23:00 840K
268-EfficientLatticebasedAuthenticatedEncryptio..> 10-Mar-2016 23:00 3M
269-TheAdjacencyGraphsofLinearFeedbackShiftRegi..> 10-Mar-2016 23:00 364K
270-AutomatedUnboundedAnalysisofCryptographicCo..> 10-Mar-2016 23:00 539K
271-CryptanalysisoftheFLIPFamilyofStreamCiphers..> 10-Mar-2016 23:00 414K
272-SpookyEncryptionanditsApplications.pdf 10-Mar-2016 23:00 680K
273-OntheweaknessesofPBKDF2.pdf 10-Mar-2016 23:00 816K
274-WhatusersshouldknowaboutFullDiskEncryptionb..> 10-Mar-2016 23:00 1M
275-FasterAlgorithmsforSolvingLPN.pdf 11-Mar-2016 23:00 318K
276-ArithmeticCodingandBlindingCountermeasuresf..> 07-Aug-2016 22:00 385K
276-ArithmeticCodingandBlindingCountermeasuresf..> 23-Mar-2016 23:00 183K
276-ArithmeticCodingandBlindingforLatticeCrypto..> 14-Mar-2016 23:00 183K
276-Arithmeticcodingandblindingcountermeasuresf..> 20-Jan-2023 08:19 399K
277-PublicKeyEncryptionSupportingEqualityTestan..> 14-Mar-2016 23:00 134K
278-VariousProxyReEncryptionSchemesfromLattices..> 14-Mar-2016 23:00 372K
279-ConstrainedPRFsforUnboundedInputswithShortK..> 14-Mar-2016 23:00 484K
280-LowPowerMontgomeryModularMultiplicationonRe..> 14-Mar-2016 23:00 820K
281-UniversalObfuscationandWitnessEncryptionBoo..> 14-Mar-2016 23:00 703K
282-Detectingflawedmaskingschemeswithleakagedet..> 15-Mar-2016 23:00 489K
283-SecureAuditLogswithVerifiableExcerpts.pdf 15-Mar-2016 23:00 427K
284-ColocationdetectionontheCloud.pdf 15-Mar-2016 23:00 411K
285-BitBasedDivisionPropertyandApplicationtoSim..> 15-Mar-2016 23:00 470K
286-OnaremarkablepropertyofAPNGoldfunctions.pdf 15-Mar-2016 23:00 292K
287-VerifiabilityNotionsforEVotingProtocols.pdf 17-Mar-2016 23:00 372K
288-OptimizationofLPNSolvingAlgorithms.pdf 17-Mar-2016 23:00 246K
289-ObfuscationCombiners.pdf 17-Mar-2016 23:00 885K
290-NonceBasedCryptographyRetainingSecuritywhen..> 17-Mar-2016 23:00 510K
291-SpookyInteractionanditsDiscontentsCompilers..> 17-Mar-2016 23:00 375K
292-NewBoundsforKeyedSpongeswithExtendableOutpu..> 17-Mar-2016 23:00 324K
293-AParametricFamilyofAttackModelsforProxyReEn..> 17-Mar-2016 23:00 431K
294-EvaluationandImprovementofGenericEmulatingD..> 17-Mar-2016 23:00 779K
295-CollisionAttackonGRINDAHL.pdf 17-Mar-2016 23:00 438K
296-HowtoSequentializeIndependentParallelAttack..> 17-Mar-2016 23:00 243K
297-AUnifiedMetricforQuantifyingInformationLeak..> 17-Mar-2016 23:00 458K
298-ReverseEngineeringoftheCryptanalyticAttackU..> 17-Mar-2016 23:00 422K
299-EfficientDesignStrategiesBasedontheAESRound..> 17-Mar-2016 23:00 426K
300-FlushGaussandReloadACacheAttackontheBLISSLa..> 17-Mar-2016 23:00 419K
301-ConstrainedPseudorandomFunctionsforUnconstr..> 17-Mar-2016 23:00 709K
302-APolynomialTimeAttackontheBBCRSScheme.pdf 17-Mar-2016 23:00 496K
303-FromObfuscationtotheSecurityofFiatShamirfor..> 17-Mar-2016 23:00 422K
304-AFastAttributeBasedEncryption.pdf 17-Mar-2016 23:00 404K
305-CerticatelessAggregateShortSignatureScheme.pdf 17-Mar-2016 23:00 151K
306-AFormalTreatmentofBackdooredPseudorandomGen..> 18-Mar-2016 23:00 379K
307-NonMalleableCodesforBoundedDepthBoundedFani..> 18-Mar-2016 23:00 670K
308-StronglyLeakageResilientAuthenticatedKeyExc..> 18-Mar-2016 23:00 442K
309-PrivatelyOutsourcingExponentiationtoaSingle..> 18-Mar-2016 23:00 522K
310-CodedBKWSolvingLWEUsingLatticeCodes.pdf 18-Mar-2016 23:00 454K
311-FastCorrelationAttacksoverExtensionFieldsLa..> 21-Mar-2016 23:00 312K
312-RefinementsofthektreeAlgorithmfortheGeneral..> 21-Mar-2016 23:00 1M
313-FiatShamirforHighlySoundProtocolsisInstanti..> 21-Mar-2016 23:00 790K
314-BlindSourceSeparationfromSingleMeasurements..> 21-Mar-2016 23:00 2M
315-FlatteningNTRUforEvaluationKeyFreeHomomorph..> 21-Mar-2016 23:00 399K
316-ANoteonBlackBoxComplexityofIndistinguishabi..> 22-Mar-2016 23:00 365K
316-ANoteonBlackBoxSeparationsforIndistinguisha..> 07-Aug-2016 22:00 410K
317-SemiAdaptiveSecurityandBundlingFunctionalit..> 22-Mar-2016 23:00 435K
318-GenericConstructionofCertificatelessSigncry..> 22-Mar-2016 23:00 171K
319-HighprecisionSecureComputationofSatelliteCo..> 22-Mar-2016 23:00 594K
320-OnMetricstoQuantifytheInterDeviceUniqueness..> 22-Mar-2016 23:00 379K
321-AlgebraicDecompositionforProbingSecurity.pdf 22-Mar-2016 23:00 620K
322-OntheSecurityofPUFProtocolsunderBadPUFsandP..> 30-Mar-2016 22:00 218K
322-PossibilitiesandImpossibilitiesforPUFProtoc..> 22-Mar-2016 23:00 271K
323-AFamilyofScalablePolynomialMultiplierArchit..> 23-Mar-2016 23:00 3M
324-InteractiveOracleProofswithConstantRateandQ..> 20-Jan-2023 08:19 567K
324-ShortInteractiveOracleProofswithConstantQue..> 23-Mar-2016 23:00 553K
325-OptimizedquantizationinZeroLeakageHelperDat..> 25-Mar-2016 23:00 881K
326-SquareAttackon7RoundKiasuBC.pdf 25-Mar-2016 23:00 406K
327-ProxyReEncryptionSchemeswithKeyPrivacyfromL..> 25-Mar-2016 23:00 218K
328-Constructinggenus3hyperellipticJacobianswit..> 25-Mar-2016 23:00 363K
329-AmodifiedblockLanczosalgorithmwithfewervect..> 25-Mar-2016 23:00 372K
330-NaCl39sCrypto_BoxinHardware.pdf 20-Jan-2023 08:19 543K
330-NaClsCrypto_BoxinHardware.pdf 25-Mar-2016 23:00 543K
331-TRVoteANewTrustworthyandRobustElectronicVot..> 25-Mar-2016 23:00 3M
332-MicropaymentsforDecentralizedCurrencies.pdf 25-Mar-2016 23:00 2M
333-ProofofSpacefromStackedBipartiteGraphs.pdf 25-Mar-2016 23:00 303K
333-ProofofSpacefromStackedExpanders.pdf 07-Aug-2016 22:00 1M
334-Probabilitythatthekgcdofproductsofpositivei..> 07-Aug-2016 22:00 94K
334-Probabilitythatthekgcdofproductsofpositivei..> 30-Mar-2016 22:00 290K
335-Completecharacterizationofgeneralizedbentan..> 30-Mar-2016 22:00 266K
336-NoBotExpectstheDeepCAPTCHAIntroducingImmuta..> 30-Mar-2016 22:00 2M
337-StaterecoveryofRC4andSpritzRevisited.pdf 30-Mar-2016 22:00 431K
338-MixedIntegerProgrammingModelsforFiniteAutom..> 30-Mar-2016 22:00 267K
339-LatticeBasedFullyDynamicMultiKeyFHEwithShor..> 30-Mar-2016 22:00 397K
340-NonMalleableExtractorsandCodeswiththeirMany..> 30-Mar-2016 22:00 494K
341-SemanticallySecureAnonymityFoundationsofRee..> 30-Mar-2016 22:00 354K
342-OntheSelectiveOpeningSecurityofPracticalPub..> 31-Mar-2016 22:00 685K
343-Onthecomplexityofconstructingpseudorandomfu..> 20-Jan-2023 08:19 277K
343-Onthecomplexityofconstructingpseudorandomfu..> 31-Mar-2016 22:00 277K
344-EncodingRationalNumbersforFHEbasedApplicati..> 31-Mar-2016 22:00 394K
345-ProvablySecurePasswordResetProtocolModelDef..> 01-Apr-2016 22:00 188K
346-NewFrameworkforSecureServerDesignationPubli..> 01-Apr-2016 22:00 134K
347-CryptanalysisofSearchableAnonymousAttribute..> 01-Apr-2016 22:00 83K
348-ANoteonNonPerfectSecretSharing.pdf 01-Apr-2016 22:00 239K
349-NoteonImpossibleDifferentialAttacks.pdf 01-Apr-2016 22:00 326K
350-ProbabilisticTerminationandComposabilityofC..> 04-Apr-2016 22:00 709K
351-HowNottoInstantiateRingLWE.pdf 04-Apr-2016 22:00 566K
352-ClosingtheGapinRFC7748ImplementingCurve448i..> 06-Apr-2016 22:00 765K
353-GeneralBoundsforSmallInverseProblemsandItsA..> 06-Apr-2016 22:00 184K
354-APairingFreeOneRoundIdentityBasedAuthentica..> 06-Apr-2016 22:00 274K
355-FruitUltraLightweightStreamCipherwithShorte..> 11-Apr-2016 22:00 473K
355-Fruitultralightweightstreamcipherwithshorte..> 08-Apr-2016 22:00 457K
355-Fruitv2UltraLightweightStreamCipherwithShor..> 20-Jan-2023 08:19 2M
356-MoreEfficientConstructionsforInnerProductEn..> 08-Apr-2016 22:00 436K
357-StateManagementforHashBasedSignatures.pdf 08-Apr-2016 22:00 365K
358-TheRingofGygesInvestigatingtheFutureofCrimi..> 08-Apr-2016 22:00 994K
359-LessisMoreDimensionalityReductionfromaTheor..> 11-Apr-2016 22:00 595K
360-AnotherLookatTightnessIIPracticalIssuesinCr..> 11-Apr-2016 22:00 326K
361-FunctionalEncryptionforBoundedCollusionsRev..> 07-Aug-2016 22:00 983K
361-OnlineOfflineFunctionalEncryptionforBounded..> 11-Apr-2016 22:00 485K
362-AnEmpiricalStudytowardsRefiningtheAKSPrimal..> 11-Apr-2016 22:00 2M
363-LegallyFairContractSigningWithoutKeystones.pdf 11-Apr-2016 22:00 555K
364-CryptographicAnalysisofthe3GPPAKAProtocol.pdf 11-Apr-2016 22:00 834K
365-FastModularArithmeticontheKalrayMPPA256Proc..> 12-Apr-2016 22:00 396K
366-muKummerefficienthyperellipticsignaturesand..> 12-Apr-2016 22:00 644K
367-AnAnalysisofOpenSSL39sRandomNumberGenerator..> 20-Jan-2023 08:19 439K
367-AnAnalysisofOpenSSLsRandomNumberGenerator.pdf 12-Apr-2016 22:00 439K
368-FoundationsofFullyDynamicGroupSignatures.pdf 12-Apr-2016 22:00 414K
369-EfficientMultiPointLocalDecodingofReedMulle..> 20-Jan-2023 08:19 340K
369-OnMultiPointLocalDecodingofReedMullerCodes.pdf 12-Apr-2016 22:00 343K
370-Malleabilityoftheblockchainsentropy.pdf 14-Apr-2016 22:00 847K
371-ACryptographicAnalysisofUMTSLTEAKA.pdf 14-Apr-2016 22:00 755K
372-NIZKswithanUntrustedCRSSecurityintheFaceofP..> 14-Apr-2016 22:00 517K
373-Adaptivepartitioning.pdf 14-Apr-2016 22:00 374K
374-AnalysisofSHA512224andSHA512256.pdf 14-Apr-2016 22:00 439K
375-CanPPADHardnessbeBasedonStandardCryptograph..> 14-Apr-2016 22:00 766K
376-ASystematicAnalysisoftheJuniperDualECIncide..> 14-Apr-2016 22:00 340K
377-DifferentialCryptanalysisofSalsaandChaChaAn..> 14-Apr-2016 22:00 629K
378-Usingsemidirectproductofsemigroupsinpublick..> 14-Apr-2016 22:00 113K
379-TwoMoreEfficientVariantsoftheJPAKEProtocol.pdf 14-Apr-2016 22:00 544K
380-ParallelImplementationofBDDenumerationforLW..> 07-Aug-2016 22:00 371K
380-ParallelImplementationofCVPenumerationforLW..> 14-Apr-2016 22:00 371K
381-FHECircuitPrivacyAlmostForFree.pdf 14-Apr-2016 22:00 519K
382-FasterdiscretelogarithmsonFPGAs.pdf 15-Apr-2016 22:00 489K
382-FasterellipticcurvediscretelogarithmsonFPGA..> 28-Dec-2016 23:00 295K
383-ReducingtheKeySizeoftheSRPEncryptionSchemeE..> 15-Apr-2016 22:00 424K
384-AttacksagainstFilterGeneratorsExploitingMon..> 15-Apr-2016 22:00 386K
385-AnoteonRingLWEsecurityinthecaseofFullyHomom..> 15-Apr-2016 22:00 583K
386-CanaryNumbersDesignforLightweightOnlineTest..> 15-Apr-2016 22:00 348K
387-GameBasedCryptanalysisofaLightweightCRCBase..> 19-Apr-2016 22:00 939K
388-TightlySecureAuthenticatedKeyExchangewithou..> 20-Jan-2023 08:19 402K
388-TightlySecureAuthenticatedKeyExchangewithou..> 19-Apr-2016 22:00 402K
389-AQuasipolynomialReductionforGeneralizedSele..> 19-Apr-2016 22:00 494K
390-ObfuscationwithouttheVulnerabilitiesofMulti..> 19-Apr-2016 22:00 576K
391-ADigitalSignatureSchemeBasedonRandomSplitof..> 19-Apr-2016 22:00 423K
392-TowardsaFurtherUnderstandingofBitBasedDivis..> 19-Apr-2016 22:00 753K
393-AdjacencyGraphsIrreduciblePolynomialsandCyc..> 21-Apr-2016 22:00 325K
393-DeBruijnSequencesAdjacencyGraphsandCyclotom..> 20-Jan-2023 08:19 320K
394-StrengtheningtheKnownKeySecurityNotionforBl..> 21-Apr-2016 22:00 653K
395-EfficientBeyondBirthdayBoundSecureDetermini..> 21-Apr-2016 22:00 401K
396-CryptanalysisofHaraka.pdf 21-Apr-2016 22:00 513K
397-LinearTimeNonMalleableCodesintheBitWiseInde..> 21-Apr-2016 22:00 469K
398-AlgebraicInsightsintotheSecretFeistelNetwor..> 21-Apr-2016 22:00 489K
399-SlowMotionZeroKnowledgeIdentifyingWithColli..> 21-Apr-2016 22:00 473K
400-TowardsSecureQuadraticVoting.pdf 22-Apr-2016 22:00 389K
401-TowerNumberFieldSieveVariantofaRecentPolyno..> 22-Apr-2016 22:00 489K
402-FullyHomomorphicEncryptionforPointNumbers.pdf 25-Apr-2016 22:00 138K
403-OnImplementingPairingBasedProtocolswithElli..> 25-Apr-2016 22:00 364K
403-OnInstantiatingPairingBasedProtocolswithEll..> 11-Nov-2016 23:00 366K
404-ANewTestStatisticforKeyRecoveryAttacksUsing..> 25-Apr-2016 22:00 315K
405-MultipleDifferentialCryptanalysisARigorousA..> 25-Apr-2016 22:00 313K
406-OntheConstructionofLightweightCirculantInvo..> 25-Apr-2016 22:00 327K
407-MILPBasedAutomaticSearchAlgorithmsforDiffer..> 25-Apr-2016 22:00 396K
408-TowardsBitcoinPaymentNetworks.pdf 25-Apr-2016 22:00 1M
409-AutomaticSearchfortheBestTrailsinARXApplica..> 25-Apr-2016 22:00 290K
410-EfficientQuantumResistantTrustInfrastructur..> 11-Oct-2016 22:00 875K
410-EfficientquantumresistanttrustInfrastructur..> 25-Apr-2016 22:00 348K
411-PolymorphicEncryptionandPseudonymisationfor..> 28-Apr-2016 22:00 740K
412-SolvingQuadraticEquationswithXLonParallelAr..> 28-Apr-2016 22:00 559K
413-EfficientalgorithmsforsupersingularisogenyD..> 28-Apr-2016 22:00 531K
414-AutomaticSearchforKeyBridgingTechniqueAppli..> 28-Apr-2016 22:00 1M
415-LatticeBasedSignatureSchemesandtheirSensiti..> 28-Apr-2016 22:00 452K
416-ADecentralizedAnonymityPreservingReputation..> 01-May-2016 22:00 299K
417-NewToolsforMultiPartyComputation.pdf 01-May-2016 22:00 1M
418-ShorterCircuitObfuscationinChallengingSecur..> 01-May-2016 22:00 480K
419-WalshHadamardTransformandCryptographicAppli..> 01-May-2016 22:00 449K
420-Anoteonthesecurityofthresholdimplementation..> 01-May-2016 22:00 185K
421-FloatingPointHomomorphicEncryption.pdf 01-May-2016 22:00 496K
421-HomomorphicEncryptionforArithmeticofApproxi..> 19-Oct-2016 22:00 466K
422-AdeeperunderstandingoftheXORcountdistributi..> 01-May-2016 22:00 363K
423-ModelingRandomOraclesunderUnpredictableQuer..> 01-May-2016 22:00 656K
424-ComputationalSecurityofQuantumEncryption.pdf 01-May-2016 22:00 433K
425-MultiInputInnerProductFunctionalEncryptionf..> 01-May-2016 22:00 411K
426-APracticalFrameworkforExecutingComplexQueri..> 01-May-2016 22:00 718K
427-NetworkDeprivedSNAAnAlternativeToAnonymizat..> 01-May-2016 22:00 361K
427-PrivacyPreservingNetworkAnalysisofDistribut..> 30-Sep-2016 22:00 332K
428-AnEfficientandScalableModelingAttackonLight..> 01-May-2016 22:00 783K
429-InformationTheoreticalAnalysisofTwoShannon3..> 20-Jan-2023 08:19 148K
429-InformationTheoreticalAnalysisofTwoShannons..> 02-May-2016 22:00 148K
430-Partiallyhomomorphicencryptionschemesoverfi..> 02-May-2016 22:00 325K
431-SecurityProofsforParticipationPrivacyReceip..> 20-Jan-2023 08:19 456K
431-SecurityProofsforParticipationPrivacyandStr..> 02-May-2016 22:00 402K
431-SecurityProofsforParticipationPrivacyandVer..> 12-Sep-2016 22:00 412K
432-TwoInputFunctionalEncryptionforInnerProduct..> 02-May-2016 22:00 294K
433-AnalysisofKeyWrappingAPIsGenericPoliciesCom..> 02-May-2016 22:00 612K
434-ATaleofTwoSharesWhyTwoShareThresholdImpleme..> 04-May-2016 22:00 640K
435-TheWholeisLessthantheSumofitsPartsConstruct..> 04-May-2016 22:00 546K
436-CryptanalysisofReducedNORX.pdf 04-May-2016 22:00 1M
437-ObservationsontheLPNSolvingAlgorithmfromEur..> 04-May-2016 22:00 138K
437-ObservationsontheLPNSolvingAlgorithmfromEur..> 20-Jan-2023 08:19 138K
438-sElectALightweightVerifiableRemoteVotingSys..> 04-May-2016 22:00 992K
439-AMeasureVersionofGaussianHeuristic.pdf 04-May-2016 22:00 314K
440-FunctionHidingInnerProductEncryptionisPract..> 04-May-2016 22:00 457K
441-FaultTolerantImplementationsofDelaybasedPhy..> 04-May-2016 22:00 520K
442-BlindPasswordRegistrationforVerifierbasedPA..> 06-May-2016 22:00 630K
443-ThriftyZeroKnowledgeWhenLinearProgrammingMe..> 06-May-2016 22:00 473K
444-TheQARMABlockCipherFamilyAlmostMDSMatricesO..> 06-May-2016 22:00 302K
445-SecureMedSecureMedicalComputationusingGPUAc..> 06-May-2016 22:00 620K
446-Quantumkeydistributionwithcombinedconjugate..> 06-May-2016 22:00 583K
447-TheoreticalAttacksonE2EVotingSystems.pdf 06-May-2016 22:00 926K
448-ANoteonOutsourcingLargeMatrixInversionCompu..> 06-May-2016 22:00 207K
448-ANoteonOutsourcingLargeMatrixInversionCompu..> 20-Jan-2023 08:19 207K
449-LoopAbortFaultsonLatticeBasedFiatShamirandH..> 07-Aug-2016 22:00 519K
449-LoopabortFaultsonLatticeBasedFiatShamirHash..> 07-May-2016 22:00 504K
450-AProvablySecureCodebasedConcurrentSignature..> 10-May-2016 22:00 317K
451-EfficientZeroKnowledgeContingentPaymentsinC..> 10-May-2016 22:00 438K
452-SecureLoggingSchemesandCertificateTranspare..> 10-May-2016 22:00 452K
453-SQLonStructurallyEncryptedDatabases.pdf 10-May-2016 22:00 790K
454-AnalysisoftheBlockchainProtocolinAsynchrono..> 10-May-2016 22:00 536K
455-ExtractingtheRC4secretkeyoftheOpenSmartGrid..> 14-May-2016 22:00 467K
456-SecureProtocolTransformations.pdf 14-May-2016 22:00 542K
457-DynamicPolicyUpdateforCiphertextPolicyAttri..> 14-May-2016 22:00 461K
457-Withdrawn.pdf 20-Jan-2023 08:19 174K
458-CompGCEfficientOfflineOnlineSemihonestTwopa..> 14-May-2016 22:00 815K
459-NonInteractiveRAMandBatchNPDelegationfroman..> 13-May-2016 22:00 587K
460-RevocableHierarchicalIdentityBasedEncryptio..> 13-May-2016 22:00 346K
461-NTRUPrime.pdf 13-May-2016 22:00 446K
461-NTRUPrimereducingattacksurfaceatlowcost.pdf 20-Jan-2023 08:19 564K
462-FullyHomomorphicEncryptionwithIsotropicElem..> 13-May-2016 22:00 1M
463-AuthenticatedEncryptionwithVariableStretch.pdf 13-May-2016 22:00 783K
464-BeaverADecentralizedAnonymousMarketplacewit..> 13-May-2016 22:00 310K
465-CanLargeDeviationTheorybeUsedforEstimatingD..> 13-May-2016 22:00 219K
466-AnNotifyAPrivateNotificationService.pdf 20-Jan-2023 08:19 4M
466-AnoNotifyAPrivateNotificationService.pdf 13-May-2016 22:00 684K
467-SpeedingupRLWEpostquantumkeyexchange.pdf 17-May-2016 22:00 279K
468-ChaosMachineDifferentApproachtotheApplicati..> 17-May-2016 22:00 645K
469-IdentityChains.pdf 17-May-2016 22:00 341K
470-BetterSecurityforQueriesonEncryptedDatabase..> 17-May-2016 22:00 497K
471-NTRUModularLatticeSignatureSchemeonCUDAGPUs..> 17-May-2016 22:00 435K
472-AdequateEllipticCurveforComputingtheProduct..> 17-May-2016 22:00 331K
473-ExploitingthePhysicalDisparitySideChannelAt..> 17-May-2016 22:00 1M
474-TProofSecureCommunicationviaNonAlgorithmicR..> 19-May-2016 22:00 252K
475-NonceDisrespectingAdversariesPracticalForge..> 19-May-2016 22:00 172K
476-GrothSahaiProofsRevisitedAgainABuginOptimiz..> 20-Jan-2023 08:19 488K
476-GrothSahaiProofsRevisitedAgainABuginOptimiz..> 25-May-2016 22:00 488K
476-GrothSahaiProofsRevisitedAgainABuginRandomi..> 19-May-2016 22:00 488K
477-ShorteningtheLibertPetersYungRevocableGroup..> 19-May-2016 22:00 203K
478-CryptographicSolutionsforCredibilityandLiab..> 19-May-2016 22:00 2M
479-SurveyofMicroarchitecturalSideandCovertChan..> 24-May-2016 22:00 409K
480-AchievingBetterPrivacyforthe3GPPAKAProtocol..> 24-May-2016 22:00 1M
481-SideChannelAnalysisProtectionandLowLatencyi..> 21-May-2016 22:00 2M
482-FunctionalEncryptionDeterministictoRandomiz..> 21-May-2016 22:00 481K
483-ProofofKnowledgeonMonotonePredicatesanditsA..> 08-Nov-2016 23:00 545K
483-ProofofKnowledgeonMonotonePredicatesanditsA..> 21-May-2016 22:00 538K
483-ProofsofKnowledgeonMonotonePredicatesandits..> 20-Jan-2023 08:19 367K
484-GhostshellSecureBiometricAuthenticationusin..> 21-May-2016 22:00 490K
485-AGeneralPolynomialSelectionMethodandNewAsym..> 20-May-2016 22:00 1M
486-DomainOrientedMaskingCompactMaskedHardwareI..> 20-May-2016 22:00 454K
487-ASystolicHardwareArchitecturesofMontgomeryM..> 20-May-2016 22:00 2M
488-EfficientHomomorphicIntegerPolynomialEvalua..> 23-Dec-2016 23:00 438K
488-MethodsforEfficientHomomorphicIntegerPolyno..> 20-May-2016 22:00 346K
489-TwoCentsforStrongAnonymityTheAnonymousPosto..> 20-May-2016 22:00 2M
490-TruncatedImpossibleandImprobableDifferentia..> 20-May-2016 22:00 184K
491-CharacterisationandEstimationoftheKeyRankDi..> 24-May-2016 22:00 553K
492-MiMCEfficientEncryptionandCryptographicHash..> 22-May-2016 22:00 480K
493-PartitionBasedTrapdoorCiphers.pdf 22-May-2016 22:00 610K
494-AEPMPracticalAnonymousEPaymentforMobileDevi..> 22-May-2016 22:00 2M
495-CrossCleanAmortizedGarbledCircuitswithConst..> 22-May-2016 22:00 370K
495-CrossampCleanAmortizedGarbledCircuitswithCo..> 20-Jan-2023 08:19 370K
496-AllCompleteFunctionalitiesareReversible.pdf 22-May-2016 22:00 621K
497-SecureComputationfromElasticNoisyChannels.pdf 22-May-2016 22:00 1M
498-TowardsTightlySecureShortSignatureandIBE.pdf 22-May-2016 22:00 515K
499-DroneTargetedCryptography.pdf 23-May-2016 22:00 3M
500-EfficientIdentityBasedEncryptionandPublicKe..> 23-May-2016 22:00 173K
501-CertificatelessKeyInsulatedEncryptionCrypto..> 23-May-2016 22:00 273K
502-KeyRecoveryAttackagainst25roundpiCipher.pdf 23-May-2016 22:00 554K
503-MQSASAMultivariateSequentialAggregateSignat..> 23-May-2016 22:00 454K
504-SpeedinguptheNumberTheoreticTransformforFas..> 23-May-2016 22:00 390K
505-MASCOTFasterMaliciousArithmeticSecureComput..> 23-May-2016 22:00 436K
506-TORDidacticpluggabletransport.pdf 25-May-2016 22:00 360K
507-Solvingdiscretelogarithmsona170bitMNTcurveb..> 25-May-2016 22:00 453K
508-Collapsebindingquantumcommitmentswithoutran..> 25-May-2016 22:00 684K
509-ChosenKeyDistinguisherson12RoundFeistelSPan..> 07-Aug-2016 22:00 746K
509-ChosenKeyDistinguisherson12RoundFeistelSPan..> 25-May-2016 22:00 752K
510-AFullRNSVariantofFVlikeSomewhatHomomorphicE..> 25-May-2016 22:00 504K
511-OptimalRateNonCommittingEncryptioninaCRSMod..> 07-Aug-2016 22:00 644K
512-SecurityAnalysisofePrintReport201650034Effi..> 20-Jan-2023 08:19 290K
512-SecurityAnalysisofePrintReport2016500Effici..> 07-Aug-2016 22:00 290K
513-ApplyingTVLAtoPublicKeyCryptographicAlgorit..> 07-Aug-2016 22:00 417K
514-CryptographywithAuxiliaryInputandTrapdoorfr..> 07-Aug-2016 22:00 641K
515-RSAWeakPublicKeysavailableontheInternet.pdf 07-Aug-2016 22:00 176K
516-BonehGentryHamburg39sIdentitybasedEncryptio..> 20-Jan-2023 08:19 125K
516-BonehGentryHamburgsIdentitybasedEncryptionS..> 07-Aug-2016 22:00 204K
517-ELMOEmulatingLeaksfortheARMCortexM0withoutA..> 07-Aug-2016 22:00 447K
517-TowardsPracticalToolsforSideChannelAwareSof..> 20-Jan-2023 08:19 405K
518-AttributebasedKeyExchangewithGeneralPolicie..> 07-Aug-2016 22:00 608K
519-OntheRelationshipbetweenStatisticalZeroKnow..> 30-May-2016 22:00 466K
520-UniversallyComposableTwoServerPAKE.pdf 30-May-2016 22:00 549K
521-SATbasedcryptanalysisofACORN.pdf 30-May-2016 22:00 378K
522-ANovelMethodologyforTestingHardwareSecurity..> 30-May-2016 22:00 876K
523-ProgrammableHashFunctionsfromLatticesShortS..> 29-May-2016 22:00 551K
524-SingleKeytoMultiKeyFunctionalEncryptionwith..> 23-Aug-2016 22:00 431K
524-UnifyingSecurityNotionsofFunctionalEncrypti..> 29-May-2016 22:00 415K
525-EWCDMAnEfficientBeyondBirthdaySecureNonceMi..> 29-May-2016 22:00 585K
526-ExtendedTowerNumberFieldSievewithApplicatio..> 29-May-2016 22:00 333K
527-SecureOutsourcingofCircuitManufacturing.pdf 29-May-2016 22:00 417K
528-AdaptiveprecisionLLLandPotentialLLLreductio..> 29-May-2016 22:00 665K
528-Certifiedlatticereduction.pdf 20-Jan-2023 08:18 648K
529-EfficientPublicKeyCryptographywithBoundedLe..> 29-May-2016 22:00 730K
530-DestroyingSteganographyviaAmalgamationKlept..> 07-Aug-2016 22:00 278K
530-GenericSemanticSecurityagainstaKleptographi..> 20-Jan-2023 08:18 290K
531-ReducingnumberfielddefiningpolynomialsAnapp..> 07-Aug-2016 22:00 414K
532-CryptanalysisofGOST2.pdf 07-Aug-2016 22:00 304K
533-NewInsightsonAESlikeSPNCiphers.pdf 07-Aug-2016 22:00 275K
534-DamagingSimplifyingandSalvagingpOMD.pdf 07-Aug-2016 22:00 721K
535-ImpossibleDifferentialCryptanalysisofMidori..> 01-Jun-2016 22:00 5M
536-PositionBasedCryptographyandMultipartyCommu..> 31-May-2016 22:00 407K
537-AGeneralisationoftheConjugationMethodforPol..> 31-May-2016 22:00 318K
538-Howtoproveknowledgeofsmallsecrets.pdf 31-May-2016 22:00 504K
539-CryptanalysisofaTheoremDecomposingtheOnlyKn..> 31-May-2016 22:00 684K
540-HorizontalSideChannelAttacksandCountermeasu..> 31-May-2016 22:00 876K
541-BigKeySymmetricEncryptionResistingKeyExfilt..> 31-May-2016 22:00 617K
542-MPCFriendlySymmetricKeyPrimitives.pdf 31-May-2016 22:00 518K
543-ObliviSyncPracticalObliviousFileBackupandSy..> 01-Jun-2016 22:00 501K
544-EfficientSecureComparisonProtocols.pdf 01-Jun-2016 22:00 588K
544-NewProtocolsforSecureEqualityTestandCompari..> 20-Jan-2023 08:18 689K
545-OnTreesChainsandFastTransactionsintheBlockc..> 01-Jun-2016 22:00 731K
546-AnUnconditionallyHidingAuditingProcedurefor..> 02-Jun-2016 22:00 336K
547-EfficientHighSpeedWPA2BruteForceAttacksusin..> 02-Jun-2016 22:00 2M
548-LinicryptAModelforPracticalCryptography.pdf 02-Jun-2016 22:00 563K
549-ShortandAdjustableSignatures.pdf 02-Jun-2016 22:00 376K
550-AntikernelADecentralizedSecureHardwareSoftw..> 02-Jun-2016 22:00 269K
551-ImprovedFactorizationofNprqs.pdf 02-Jun-2016 22:00 264K
552-ProvablySecurePasswordAuthenticatedKeyExcha..> 02-Jun-2016 22:00 433K
553-StorageEfficientSubstringSearchableSymmetri..> 02-Jun-2016 22:00 544K
554-Anotherviewofthedivisionproperty.pdf 07-Aug-2016 22:00 437K
555-OntheSecurityandPerformanceofProofofWorkBlo..> 07-Aug-2016 22:00 393K
556-NetworkHidingCommunicationandApplicationsto..> 07-Aug-2016 22:00 581K
557-OntheMultiplicativeComplexityofBooleanFunct..> 07-Aug-2016 22:00 400K
558-FromCryptomaniatoObfustopiathroughSecretKey..> 07-Aug-2016 22:00 580K
559-Quantumhomomorphicencryptionforpolynomialsi..> 15-Jun-2016 22:00 602K
560-MemoryEfficientAlgorithmsforFindingNeedlesi..> 13-Jun-2016 22:00 452K
561-CompactnessvsCollusionResistanceinFunctiona..> 13-Jun-2016 22:00 368K
562-DeniableAttributeBasedEncryptionforBranchin..> 12-Jun-2016 22:00 445K
563-GarblingSchemeforFormulaswithConstantSizeof..> 12-Jun-2016 22:00 182K
564-TheMultiUserSecurityofAuthenticatedEncrypti..> 12-Jun-2016 22:00 481K
565-BoundedIndistinguishabilityandtheComplexity..> 12-Jun-2016 22:00 415K
566-ConcurrentNonMalleableCommitmentsandMorein3..> 11-Jun-2016 22:00 552K
567-AdversarydependentLossyTrapdoorFunctionfrom..> 05-Jun-2016 22:00 450K
568-ASecureOneRoundtripIndexforRangeQueries.pdf 05-Jun-2016 22:00 435K
569-FourQonFPGANewHardwareSpeedRecordsforEllipt..> 04-Jun-2016 22:00 517K
570-DesigninTypeIRuninTypeIIIFastandScalableBil..> 04-Jun-2016 22:00 820K
571-SimpleKeyEnumerationandRankEstimationusingH..> 04-Jun-2016 22:00 543K
572-FasterEvaluationofSBoxesviaCommonShares.pdf 03-Jun-2016 22:00 580K
573-TowardsSoundFreshReKeyingwithHardPhysicalLe..> 03-Jun-2016 22:00 559K
574-StructurevsHardnessthroughtheObfuscationLen..> 03-Jun-2016 22:00 699K
575-TumbleBitAnUntrustedBitcoinCompatibleAnonym..> 27-Aug-2016 22:00 690K
575-TumbleBitAnUntrustedTumblerforBitcoinCompat..> 03-Jun-2016 22:00 526K
576-IndistinguishabilityObfuscationDoesNotReduc..> 03-Jun-2016 22:00 176K
577-BackdoorsinPseudorandomNumberGeneratorsPoss..> 03-Jun-2016 22:00 843K
578-KeyalternatingCiphersandKeylengthExtensionE..> 03-Jun-2016 22:00 501K
579-AutomaticSearchofMeetintheMiddleandImpossib..> 11-Jun-2016 22:00 490K
580-FinegrainedCryptography.pdf 11-Jun-2016 22:00 486K
581-UCCommitmentsforModularProtocolDesignandApp..> 11-Jun-2016 22:00 458K
582-TVPUFAFastLightweightAnalogPhysicallyUnclon..> 10-Jun-2016 22:00 455K
583-EfficientZeroKnowledgeProofofAlgebraicandNo..> 06-Jun-2016 22:00 376K
584-NetworkObliviousTransfer.pdf 06-Jun-2016 22:00 465K
585-BreakingtheCircuitSizeBarrierforSecureCompu..> 06-Jun-2016 22:00 420K
586-AModularTreatmentofCryptographicAPIsTheSymm..> 06-Jun-2016 22:00 323K
587-BashfanotherLRXspongefunction.pdf 06-Jun-2016 22:00 710K
588-Secureobfuscationinaweakmultilinearmapmodel..> 06-Jun-2016 22:00 275K
589-DimensionPreservingReductionsfromLWEtoLWR.pdf 06-Jun-2016 22:00 444K
590-MitigatingSATAttackonLogicLocking.pdf 06-Jun-2016 22:00 441K
591-ArxAStronglyEncryptedDatabaseSystem.pdf 09-Jun-2016 22:00 318K
591-ArxAnEncryptedDatabaseusingSemanticallySecu..> 20-Jan-2023 08:18 990K
592-SubspaceTrailCryptanalysisanditsApplication..> 08-Jun-2016 22:00 527K
592-SubspaceTrailCryptanalysisanditsApplication..> 28-Nov-2016 23:00 1M
593-NoPlacetoHideContactlessProbingofSecretData..> 08-Jun-2016 22:00 2M
594-34MakeSureDSASigningExponentiationsReallyar..> 20-Jan-2023 08:18 507K
594-MakeSureDSASigningExponentiationsReallyareC..> 08-Jun-2016 22:00 473K
595-AHighThroughputGateAESHardwareArchitectureb..> 08-Jun-2016 22:00 481K
596-CacheAttacksEnableBulkKeyRecoveryontheCloud..> 07-Jun-2016 22:00 416K
597-CorrelatedExtraReductionsDefeatBlindedRegul..> 07-Jun-2016 22:00 980K
597-CorrelatedExtraReductionsDefeatBlindedRegul..> 09-Jun-2016 22:00 963K
598-PolynomialBatchCodesforEfficientITPIR.pdf 07-Jun-2016 22:00 423K
599-ObfuscationfromLowNoiseMultilinearMaps.pdf 07-Jun-2016 22:00 678K
600-ADesignMethodologyforStealthyParametricTroj..> 07-Jun-2016 22:00 878K
601-PhysicalLayerGroupKeyAgreementforAutomotive..> 07-Jun-2016 22:00 277K
602-MoreEfficientObliviousTransferExtensions.pdf 07-Jun-2016 22:00 869K
603-Koblitzcurvesoverquadraticfields.pdf 20-Jan-2023 08:18 432K
603-SoftwareimplementationofKoblitzcurvesoverqu..> 10-Jun-2016 22:00 415K
604-FMNVContinuousNonmalleableEncodingSchemeisM..> 10-Jun-2016 22:00 250K
605-ImprovingNFSforthediscretelogarithmproblemi..> 10-Jun-2016 22:00 471K
606-StrongMachineLearningAttackagainstPUFswithN..> 14-Jun-2016 22:00 1M
607-ProtocolsforAuthenticatedObliviousTransfer.pdf 14-Jun-2016 22:00 763K
608-LightSourceUltraLightweightCloneDetectionof..> 14-Jun-2016 22:00 686K
609-HowlowcanyougoUsingsidechanneldatatoenhance..> 14-Jun-2016 22:00 580K
610-TheGGMFunctionFamilyisWeaklyOneWay.pdf 12-Sep-2016 22:00 479K
610-TheGGMPRFisaWeaklyOneWayFamilyofFunctions.pdf 14-Jun-2016 22:00 669K
611-CatchingMPCCheatersIdentificationandOpenabi..> 14-Jun-2016 22:00 506K
612-OrderRevealingEncryptionNewConstructionsApp..> 14-Jun-2016 22:00 646K
613-ASurveyofMicroarchitecturalTimingAttacksand..> 19-Jun-2016 22:00 419K
614-BetterTwoRoundAdaptiveMultiPartyComputation..> 20-Jan-2023 08:18 494K
614-BetterTwoRoundAdaptiveMultipartyComputation..> 16-Jun-2016 22:00 460K
615-ReusingTamperProofHardwareinUCSecureProtoco..> 20-Jan-2023 08:18 473K
615-UniversallyComposableNonInteractiveTwoParty..> 16-Jun-2016 22:00 509K
616-PracticalFaultAttacksonAuthenticatedEncrypt..> 16-Jun-2016 22:00 358K
616-StatisticalFaultAttacksonNonceBasedAuthenti..> 18-Aug-2016 22:00 358K
617-OntheImpossibilityofMerkleMergeHomomorphism..> 16-Jun-2016 22:00 80K
618-CuriouscaseofRowhammerFlippingSecretExponen..> 16-Jun-2016 22:00 286K
619-5GenAFrameworkforPrototypingApplicationsUsi..> 16-Jun-2016 22:00 512K
620-SecureDataExchangeAMarketplaceintheCloud.pdf 16-Jun-2016 22:00 374K
621-4RoundConcurrentNonMalleableCommitments.pdf 08-Aug-2016 22:00 711K
621-4RoundConcurrentNonMalleableCommitmentsfrom..> 09-Sep-2016 22:00 656K
621-OnRoundEfficientNonMalleableProtocols.pdf 19-Jun-2016 22:00 647K
622-FunctionRevealingEncryption.pdf 11-Oct-2016 22:00 507K
622-PracticalTradeOffsforMultiInputFunctionalEn..> 18-Jun-2016 22:00 497K
623-EnCounterOnBreakingtheNonceBarrierinDiffere..> 18-Jun-2016 22:00 3M
624-EquationalSecurityProofsofObliviousTransfer..> 18-Jun-2016 22:00 391K
625-OntheDesignRationaleofSIMONBlockCipherInteg..> 17-Jun-2016 22:00 233K
626-CAESARHardwareAPI.pdf 17-Jun-2016 22:00 502K
627-CyberPassportPreventingMassiveIdentityTheft..> 17-Jun-2016 22:00 158K
628-OnthepropertiesoftheCTRencryptionmodeoftheM..> 17-Jun-2016 22:00 398K
629-VerifiableFunctionalEncryption.pdf 17-Jun-2016 22:00 534K
630-DecomposedSBoxesandDPAAttacksAQuantitativeC..> 17-Jun-2016 22:00 538K
631-MaskingAESwithd1SharesinHardware.pdf 17-Jun-2016 22:00 2M
632-FasterMalicious2partySecureComputationwithO..> 23-Jun-2016 22:00 811K
633-MakingSmartContractsSmarter.pdf 23-Jun-2016 22:00 522K
634-CompactCCA2secureHierarchicalIdentityBasedB..> 22-Jun-2016 22:00 617K
635-SealedGlassProofsUsingTransparentEnclavesto..> 22-Jun-2016 22:00 410K
636-NewFeasibilityResultsinUnconditionalUCSecur..> 22-Jun-2016 22:00 611K
636-UnconditionalUCSecureComputationwithStronge..> 20-Jan-2023 08:18 622K
637-OntheSecurityandKeyGenerationoftheZHFEEncry..> 21-Jun-2016 22:00 353K
638-ATweakforaPRFModeofaCompressionFunctionandI..> 21-Jun-2016 22:00 130K
639-GameTheoreticFrameworkforIntegrityVericatio..> 21-Jun-2016 22:00 503K
639-GameTheoreticFrameworkforIntegrityVerificat..> 20-Jan-2023 08:18 503K
640-UniversalForgeryandKeyRecoveryAttacksonELmD..> 21-Jun-2016 22:00 967K
641-BitstreamFaultInjectionsBiFIAutomatedFaultA..> 21-Jun-2016 22:00 3M
642-EfficientandProvableWhiteBoxPrimitives.pdf 21-Jun-2016 22:00 644K
643-OntheComputationalOverheadofMPCwithDishones..> 21-Jun-2016 22:00 454K
644-HowtoBackdoorDiffieHellman.pdf 25-Jun-2016 22:00 2M
645-FourQNEONFasterEllipticCurveScalarMultiplic..> 25-Jun-2016 22:00 355K
646-Computationalintegritywithapublicrandomstri..> 24-Jun-2016 22:00 498K
647-Strong8bitSboxeswithEfficientMaskinginHardw..> 24-Jun-2016 22:00 883K
648-ParTITowardsCombinedHardwareCountermeasures..> 24-Jun-2016 22:00 957K
649-GameBasedPrivacyAnalysisofRFIDSecuritySchem..> 24-Jun-2016 22:00 984K
650-SecuringMultipartyProtocolsagainsttheExposu..> 24-Jun-2016 22:00 797K
651-PenandPaperArgumentsforSIMONandSIMONlikeDes..> 24-Jun-2016 22:00 357K
652-AutomaticSearchforaMaximumProbabilityDiffer..> 24-Jun-2016 22:00 547K
653-FullyHomomorphicEncryptionwithZeroNormCiphe..> 30-Jun-2016 22:00 3M
654-InterpolatingPredicateandFunctionalEncrypti..> 29-Jun-2016 22:00 614K
654-StrongerSecurityforReusableGarbledCircuitsG..> 20-Jan-2023 08:18 747K
655-ATagBasedEncodingAnEfficientEncodingforPred..> 29-Jun-2016 22:00 400K
655-ATagBasedEncodingAnEfficientEncodingforPred..> 20-Jan-2023 08:18 400K
656-ImprovingPracticalUCSecureCommitmentsbasedo..> 29-Jun-2016 22:00 462K
657-BoundedSizeHidingPrivateSetIntersection.pdf 28-Jun-2016 22:00 317K
658-AsymptoticAnalysisofPlausibleTreeHashModesf..> 07-Aug-2016 22:00 356K
658-OnPlausibleTreeHashModesforSHA3.pdf 28-Jun-2016 22:00 337K
659-FrodoTakeofftheringPracticalQuantumSecureKe..> 28-Jun-2016 22:00 690K
660-TheSKINNYFamilyofBlockCiphersanditsLowLaten..> 28-Jun-2016 22:00 1M
661-ReducingtheLeakageinPracticalOrderRevealing..> 28-Jun-2016 22:00 417K
662-PracticalRoundOptimalBlindSignaturesintheSt..> 28-Jun-2016 22:00 531K
663-AnonymousAttestationUsingtheStrongDiffieHel..> 28-Jun-2016 22:00 624K
664-EfficientConversionMethodfromArithmetictoBo..> 01-Jul-2016 22:00 414K
665-BreakingandFixingPrivateSetIntersectionProt..> 01-Jul-2016 22:00 1M
666-AGMMtypeconstructionforresilientSboxeswithh..> 01-Jul-2016 22:00 288K
666-ConstructionofresilientSboxeswithhigherdime..> 13-Sep-2016 22:00 287K
667-MultivariateLinearCryptanalysisThePastandFu..> 01-Jul-2016 22:00 673K
667-MultivariateProfilingofHullsforLinearCrypta..> 20-Jan-2023 08:18 642K
668-AnalysisofaSecureandVerifiablePolicyUpdateO..> 04-Jul-2016 22:00 45K
669-NEONSIDHEfficientImplementationofSupersingu..> 04-Jul-2016 22:00 633K
670-DREipAVerifiableEVotingSchemewithoutTallyin..> 04-Jul-2016 22:00 381K
671-Efficientprobabilisticalgorithmforestimatin..> 07-Jul-2016 22:00 353K
672-FPGASIDHHighPerformanceImplementationofSupe..> 07-Jul-2016 22:00 829K
672-PostQuantumCryptographyonFPGABasedonIsogeni..> 17-Sep-2016 22:00 717K
673-DirichletProductforBooleanFunctions.pdf 06-Jul-2016 22:00 344K
674-APUFbasedSecureCommunicationProtocolforIoT.pdf 06-Jul-2016 22:00 547K
675-AcceleratingHomomorphicComputationsonRation..> 06-Jul-2016 22:00 440K
676-CryptanalysisofReducedRoundMidori64BlockCip..> 06-Jul-2016 22:00 456K
677-BreakingIntotheKeyStoreAPracticalForgeryAtt..> 06-Jul-2016 22:00 479K
678-AnonymousRAM.pdf 06-Jul-2016 22:00 617K
679-HybridWBCSecureandEfficientWhiteBoxEncrypti..> 06-Jul-2016 22:00 1M
680-FairClientPuzzlesfromtheBitcoinBlockchain.pdf 06-Jul-2016 22:00 371K
681-AmortizedComplexityofZeroKnowledgeProofsRev..> 16-Jul-2016 22:00 368K
682-FindingSignificantFourierCoefficientsClarif..> 16-Jul-2016 22:00 436K
683-EfficientSparseMerkleTreesCachingStrategies..> 12-Jul-2016 22:00 399K
684-Fasterindividualdiscretelogarithmsinfinitef..> 20-Jan-2023 08:18 511K
684-Fasterindividualdiscretelogarithmsinnonprim..> 12-Jul-2016 22:00 628K
685-OverlayingCircuitClausesforSecureComputatio..> 12-Jul-2016 22:00 1M
686-TheLightest4x4MDSMatricesoverGL4mathbbF_2.pdf 12-Jul-2016 22:00 172K
687-CiphersforMPCandFHE.pdf 12-Jul-2016 22:00 569K
688-BoundedKDMSecurityfromiOandOWF.pdf 12-Jul-2016 22:00 343K
689-NewAutomaticSearchToolforImpossibleDifferen..> 12-Jul-2016 22:00 480K
690-WhenAreThreeVotersEnoughforPrivacyPropertie..> 15-Jul-2016 22:00 466K
691-TargetedHomomorphicAttributeBasedEncryption..> 15-Jul-2016 22:00 496K
692-Cryptanalysisandimprovementofcertificateles..> 14-Jul-2016 22:00 218K
693-IdentityBasedKeyAggregateCryptosystemfromMu..> 14-Jul-2016 22:00 492K
694-MastrovitoFormofNonrecursiveKaratsubaMultip..> 21-Nov-2016 23:00 447K
694-MastrovitoformofKaratsubaMultiplierforAllTr..> 14-Jul-2016 22:00 416K
695-GatescramblingRevisitedorTheTinyTableprotoc..> 14-Jul-2016 22:00 356K
696-SolvingtheSecureStorageDilemmaAnEfficientSc..> 13-Jul-2016 22:00 698K
697-CiphertextForgeryonHANUMAN.pdf 13-Jul-2016 22:00 505K
698-ANoteonOneSecureAntiCollusionDataSharingSch..> 13-Jul-2016 22:00 198K
699-ANoteonOnePrivacyPreservingMultiKeywordRank..> 13-Jul-2016 22:00 215K
700-SideChannelProtectionsforCryptographicInstr..> 13-Jul-2016 22:00 3M
701-BoltAnonymousPaymentChannelsforDecentralize..> 13-Jul-2016 22:00 473K
702-MirrorTheoryandCryptography.pdf 13-Jul-2016 22:00 456K
703-InSecuremessagingwiththeSilentCircleinstant..> 19-Jul-2016 22:00 5M
704-HighSaturationCompleteGraphApproachforECPoi..> 19-Jul-2016 22:00 810K
705-NewconstructionofsinglecycleTfunctionfamili..> 18-Jul-2016 22:00 679K
706-MemoryErasabilityAmplification.pdf 18-Jul-2016 22:00 870K
707-TowardsaCharacterizationoftheRelatedKeyAtta..> 18-Jul-2016 22:00 369K
708-From5passMQbasedidentificationtoMQbasedsign..> 18-Jul-2016 22:00 787K
709-DifferentialFaultAnalysisofSHA3224andSHA325..> 18-Jul-2016 22:00 495K
710-KeymillSideChannelResilientKeyGenerator.pdf 18-Jul-2016 22:00 589K
711-AUnilateraltoMutualAuthenticationCompilerfo..> 18-Jul-2016 22:00 589K
712-ASurveyofHardwareImplementationsofEllipticC..> 22-Jul-2016 22:00 176K
713-Tuplelatticesieving.pdf 22-Jul-2016 22:00 258K
714-AlltheAESYouNeedonCortexM3andM4.pdf 22-Jul-2016 22:00 272K
715-UniformFirstOrderThresholdImplementations.pdf 22-Jul-2016 22:00 431K
716-2hopBlockchainCombiningProofofWorkandProofo..> 12-Nov-2016 23:00 711K
716-SecuringBitcoinlikeBackboneProtocolsagainst..> 21-Jul-2016 22:00 426K
717-ComparisonbetweenSubfieldandStraightforward..> 21-Jul-2016 22:00 249K
718-LeakageAbuseAttacksAgainstSearchableEncrypt..> 21-Jul-2016 22:00 398K
719-BridgingtheGapAdvancedToolsforSideChannelLe..> 21-Jul-2016 22:00 2M
720-ABlackBoxConstructionofNonMalleableEncrypti..> 21-Jul-2016 22:00 505K
721-StrongHardnessofPrivacyfromWeakTraitorTraci..> 21-Jul-2016 22:00 325K
722-ImprovedMeetintheMiddleAttacksonReducedRoun..> 21-Jul-2016 22:00 2M
723-RobustMultiPropertyCombinersforHashFunction..> 30-Jul-2016 22:00 353K
724-SPORTSharingProofsofRetrievabilityacrossTen..> 29-Jul-2016 22:00 493K
725-TileBasedModularArchitectureforAccelerating..> 27-Jul-2016 22:00 539K
726-BoundsontheInformationRatiosofSecretSharing..> 27-Jul-2016 22:00 370K
726-LocalBoundsfortheOptimalInformationRatioofS..> 20-Jan-2023 08:18 404K
727-ImprovementsontheIndividualLogarithmComputa..> 23-Aug-2016 22:00 425K
727-ImprovementsontheIndividualLogarithmStepinE..> 02-Sep-2016 22:00 414K
727-ImprovementsontheIndividualLogarithmStepine..> 27-Jul-2016 22:00 446K
728-SophosForwardSecureSearchableEncryption.pdf 27-Jul-2016 22:00 662K
729-AttacksoncMixSomeSmallOverlookedDetails.pdf 27-Jul-2016 22:00 278K
730-LeakageResilientPublicKeyEncryptionfromObfu..> 27-Jul-2016 22:00 1M
731-SRMAPandISLAPAuthenticationProtocolsAttacks..> 27-Jul-2016 22:00 667K
732-NonlinearInvariantAttackPracticalAttackonFu..> 29-Jul-2016 22:00 631K
733-RevisitingtheHybridAttackImprovedAnalysisan..> 28-Jul-2016 22:00 582K
734-EfficientObliviousTransferProtocolsbasedonW..> 28-Jul-2016 22:00 241K
735-EfficientRobustSecretSharingfromExpanderGra..> 28-Jul-2016 22:00 403K
736-EfficientandPrivateScoringofDecisionTreesSu..> 28-Jul-2016 22:00 304K
737-ZeroKnowledgeAuthenticationProtocolsWithAlg..> 28-Jul-2016 22:00 317K
738-FHPKEwithZeroNormNoisesbasedonDLACDH.pdf 28-Jul-2016 22:00 4M
738-FHPKEwithZeroNormNoisesbasedonDLAampCDH.pdf 20-Jan-2023 08:18 4M
739-UnconditionallySecureSignatures.pdf 28-Jul-2016 22:00 327K
740-SoftwareBenchmarkingofthe2textndroundCAESAR..> 29-Jul-2016 22:00 1M
741-MARKOVMODELINGOFMOVINGTARGETDEFENSEGAMES.pdf 23-Sep-2016 22:00 2M
741-MarkovModelingofMovingTargetDefenseGames.pdf 29-Jul-2016 22:00 2M
742-AQKDbaseddigitalarchivingsolutionprovidinge..> 02-Aug-2016 22:00 853K
742-LINCOSAStorageSystemProvidingLongTermIntegr..> 20-Jan-2023 08:18 970K
743-InvestigatingCubeAttacksontheAuthenticatedE..> 02-Aug-2016 22:00 329K
744-ANewMethodtoInvestigatetheCCZEquivalencebet..> 02-Aug-2016 22:00 278K
745-Noveldifferentiallyprivatemechanismsforgrap..> 02-Aug-2016 22:00 302K
746-ImprovedPrivateSetIntersectionagainstMalici..> 02-Aug-2016 22:00 511K
747-BeyondBitcoinPartIIBlockchainbasedsystemswi..> 08-Aug-2016 22:00 475K
748-AGenericDynamicProvableDataPossessionFramew..> 08-Aug-2016 22:00 903K
749-RevocableHierarchicalIdentityBasedEncryptio..> 08-Aug-2016 22:00 370K
750-PublicKeyBasedLightweightSwarmAuthenticatio..> 08-Aug-2016 22:00 455K
751-FeistelLikeConstructionofInvolutoryBinaryMa..> 08-Aug-2016 22:00 377K
752-ELiFAnExtremelyLightweightFlexibleBlockCiph..> 09-Aug-2016 22:00 807K
752-ELiFAnExtremelyLightweightampFlexibleBlockC..> 20-Jan-2023 08:18 807K
753-ImprovedReductionfromtheBoundedDistanceDeco..> 09-Aug-2016 22:00 472K
754-KeyRecoveryforMANTIS5.pdf 09-Aug-2016 22:00 372K
754-PracticalKeyRecoveryAttackonMANTIS5.pdf 30-Aug-2016 22:00 392K
755-AuditableDataStructures.pdf 09-Aug-2016 22:00 1M
756-AdaptingHeliosforprovableballotprivacy.pdf 09-Aug-2016 22:00 439K
757-RedactableBlockchainorRewritingHistoryinBit..> 09-Aug-2016 22:00 489K
758-AnewhopeonARMCortexM.pdf 10-Aug-2016 22:00 427K
758-NewHopeonARMCortexM.pdf 20-Jan-2023 08:18 633K
759-TowardsPracticalAttacksonArgon2iandBalloonH..> 10-Aug-2016 22:00 481K
760-SimultaneousSecrecyandReliabilityAmplificat..> 10-Aug-2016 22:00 380K
761-Twopartyauthenticatedkeyexchangeprotocolusi..> 10-Aug-2016 22:00 204K
762-FasterSecureTwoPartyComputationintheSingleE..> 20-Jan-2023 08:18 555K
762-FasterTwoPartyComputationSecureAgainstMalic..> 10-Aug-2016 22:00 582K
763-HumanPublicKeyEncryption.pdf 10-Aug-2016 22:00 700K
764-ANOTELCellularNetworkswithLocationPrivacyEx..> 10-Aug-2016 22:00 377K
765-CryptographicVotingAGentleIntroduction.pdf 10-Aug-2016 22:00 390K
766-FunctionalCommitmentSchemesFromPolynomialCo..> 10-Aug-2016 22:00 194K
767-AconjectureaboutGausssumsandbentnessofbinom..> 12-Aug-2016 22:00 391K
768-HighThroughputSemiHonestSecureThreePartyCom..> 12-Aug-2016 22:00 882K
769-Lowtemperaturedataremanenceattacksagainstin..> 12-Aug-2016 22:00 3M
770-KangarooTwelvefasthashingbasedonKeccakp.pdf 12-Aug-2016 22:00 344K
771-HownottoProveYourselfPitfallsoftheFiatShami..> 12-Aug-2016 22:00 406K
772-TimeFrequencyAnalysisforSecondOrderAttacks.pdf 12-Aug-2016 22:00 729K
773-AlternativeImplementationsofSecureRealNumbe..> 12-Aug-2016 22:00 388K
774-TVPUFAFastLightweightAgingResistantThreshol..> 12-Aug-2016 22:00 509K
775-CryptanalysisofaHomomorphicEncryptionScheme..> 12-Aug-2016 22:00 167K
776-HomomorphicTallyingfortheEstonianInternetVo..> 17-Aug-2016 22:00 266K
777-Fastuniformscalarmultiplicationforgenus2Jac..> 17-Aug-2016 22:00 417K
778-AlgorithmicMechanismConstructionbridgingSec..> 17-Aug-2016 22:00 571K
779-CodebasedStrongDesignatedVerifierSignatures..> 17-Aug-2016 22:00 337K
780-EfficientandProvableSecureAnonymousHierarch..> 17-Aug-2016 22:00 982K
781-PrivatelyMatchingkmers.pdf 17-Aug-2016 22:00 402K
782-ChallengesforRingLWE.pdf 17-Aug-2016 22:00 392K
783-OntheMemoryHardnessofDataIndependentPasswor..> 18-Aug-2016 22:00 543K
784-VerifiableandDelegatableConstrainedPseudora..> 18-Aug-2016 22:00 2M
785-OptimizationofBootstrappinginCircuits.pdf 18-Aug-2016 22:00 574K
786-WhatElseisRevealedbyOrderRevealingEncryptio..> 18-Aug-2016 22:00 1M
787-Onthesecurityofnewvinegarlikevariantofmulti..> 18-Aug-2016 22:00 133K
788-OnthesecurityofCubicUOV.pdf 18-Aug-2016 22:00 108K
788-OnthesecurityofCubicUOVanditsvariants.pdf 20-Jan-2023 08:18 130K
789-AnEfficientHardwaredesignandImplementationo..> 18-Aug-2016 22:00 330K
790-ConditionalCubeAttackonReducedRoundKeccakSp..> 20-Aug-2016 22:00 556K
791-LeakageResilientOneWayFunctionsTheAuxiliary..> 20-Aug-2016 22:00 345K
792-KeyHomomorphicSignaturesDefinitionsandAppli..> 20-Jan-2023 08:17 689K
792-KeyHomomorphicSignaturesandApplicationstoMu..> 20-Aug-2016 22:00 491K
792-KeyHomomorphicSignaturesandApplicationstoMu..> 28-Nov-2016 23:00 540K
793-SideChannelAnalysisofKeymill.pdf 20-Aug-2016 22:00 182K
794-MessagerecoveryattacksonFeistelbasedFormatP..> 20-Aug-2016 22:00 422K
795-IndistinguishabilityObfuscationfromDDHlikeA..> 20-Aug-2016 22:00 679K
796-DigitalSignaturesBasedontheHardnessofIdealL..> 20-Aug-2016 22:00 379K
797-AnMPCbasedPrivacyPreservingProtocolforaLoca..> 24-Aug-2016 22:00 529K
798-OnthePracticalInSecurityof64bitBlockCiphers..> 24-Aug-2016 22:00 509K
799-EfficientBatchedObliviousPRFwithApplication..> 24-Aug-2016 22:00 494K
800-AlmostOptimallyFairMultipartyCoinTossingwit..> 24-Aug-2016 22:00 230K
801-BlindWebSearchHowfararewefromaprivacypreser..> 24-Aug-2016 22:00 556K
802-ProofsofDataResidencyCheckingwhetherYourClo..> 24-Aug-2016 22:00 605K
803-BiometricBasedNetworkSecurityUsingMIPSCrypt..> 24-Aug-2016 22:00 416K
804-MultiKeyHomomorphicAuthenticators.pdf 24-Aug-2016 22:00 572K
805-ConstantRoundMaliciouslySecureTwoPartyCompu..> 24-Aug-2016 22:00 563K
806-HealingtheHillCipherImprovedApproachtoSecur..> 25-Aug-2016 22:00 741K
807-MultilateralWhiteBoxCryptanalysis.pdf 25-Aug-2016 22:00 815K
807-MultilateralWhiteBoxCryptanalysisCasestudyo..> 02-Sep-2016 22:00 817K
808-SimulatingAuxiliaryInputsRevisited.pdf 25-Aug-2016 22:00 535K
809-BinaryAMDCircuitsfromSecureMultipartyComput..> 25-Aug-2016 22:00 734K
810-FaultInjectionusingCrowbarsonEmbeddedSystem..> 25-Aug-2016 22:00 2M
811-MILPAidedBitBasedDivisionPropertyforPrimiti..> 25-Aug-2016 22:00 658K
812-TowardsNonBlackBoxSeparationsofPublicKeyEnc..> 25-Aug-2016 22:00 532K
813-FastPseudorandomFunctionsBasedonExpanderGra..> 25-Aug-2016 22:00 465K
814-AdaptiveSecurityofYao39sGarbledCircuits.pdf 20-Jan-2023 08:17 506K
814-AdaptiveSecurityofYaosGarbledCircuits.pdf 25-Aug-2016 22:00 506K
815-SecureMultipartyRAMComputationinConstantRou..> 26-Aug-2016 22:00 534K
816-ConcentratedDifferentialPrivacySimplificati..> 26-Aug-2016 22:00 427K
817-SecureObfuscationinaWeakMultilinearMapModel..> 26-Aug-2016 22:00 288K
818-ComposableAdaptiveSecureProtocolswithoutSet..> 26-Aug-2016 22:00 405K
819-VirtualGreyBoxesBeyondObfuscationAStatistic..> 26-Aug-2016 22:00 461K
820-SeparatingComputationalandStatisticalDiffer..> 28-Aug-2016 22:00 382K
821-MultivariateCryptographywithMappingsofDiscr..> 28-Aug-2016 22:00 247K
822-ASecureandEfficientAuthenticationTechniquef..> 20-Jan-2023 08:17 2M
822-ProxybasedAuthenticationSchemeforVehicularA..> 28-Aug-2016 22:00 289K
823-PostQuantumAttributeBasedSignaturesfromLatt..> 30-Aug-2016 22:00 488K
824-P2PMixingandUnlinkableBitcoinTransactions.pdf 30-Aug-2016 22:00 458K
825-CascadeCiphersRevisitedIndifferentiabilityA..> 30-Aug-2016 22:00 600K
825-RevisitingCascadeCiphersinIndifferentiabili..> 20-Jan-2023 08:17 592K
826-RotationalCryptanalysisinthePresenceofConst..> 30-Aug-2016 22:00 476K
827-SecurityAnalysisofBLAKE239sModesofOperation..> 20-Jan-2023 08:17 695K
827-SecurityAnalysisofBLAKE2sModesofOperation.pdf 30-Aug-2016 22:00 686K
828-FasterKeyRecoveryAttackonRoundReducedPRINCE..> 30-Aug-2016 22:00 346K
829-EfficientKDMCCASecurePublicKeyEncryptionfor..> 30-Aug-2016 22:00 718K
830-IODSSEScalingDynamicSearchableEncryptiontoM..> 30-Aug-2016 22:00 533K
831-ReducingtheNumberofNonlinearMultiplications..> 30-Aug-2016 22:00 455K
832-IsAEZv41SufficientlyResilientAgainstKeyReco..> 30-Aug-2016 22:00 499K
833-MultiCastKeyDistributionScalableDynamicandP..> 31-Aug-2016 22:00 208K
834-AZooofHomomorphicSignaturesMultiKeyandKeyHo..> 31-Aug-2016 22:00 522K
834-MultiKeyHomomorphicSignaturesUnforgeableund..> 20-Jan-2023 08:17 536K
835-LightweightDiffusionLayerImportanceofToepli..> 31-Aug-2016 22:00 482K
836-TheDiscreteLogarithmProblemoverPrimeFieldsc..> 03-Sep-2016 22:00 167K
837-FullyHomomophicEncryptionovertheIntegersRev..> 03-Sep-2016 22:00 411K
837-FullyHomomorphicEncryptionovertheIntegersRe..> 04-Sep-2016 22:00 411K
838-PassiveSecretDisclosureAttackonanUltralight..> 03-Sep-2016 22:00 374K
839-OntheDivisionPropertyofSIMON48andSIMON64.pdf 06-Sep-2016 22:00 627K
840-DejaQAllOverAgainTighterandBroaderReduction..> 06-Sep-2016 22:00 570K
841-AMethodologyfortheCharacterisationofLeakage..> 06-Sep-2016 22:00 983K
842-ImprovedBlackBoxNonMalleableEncryptionfromS..> 06-Sep-2016 22:00 657K
843-PartitioningviaNonLinearPolynomialFunctions..> 06-Sep-2016 22:00 685K
844-SecureandEfficientConstructionofBroadcastEn..> 06-Sep-2016 22:00 408K
845-SelectiveOpeningSecurityfromSimulatableData..> 06-Sep-2016 22:00 570K
846-SurveyofApproachesandTechniquesforSecurityV..> 20-Jan-2023 08:17 1M
846-SurveyofApproachesforSecurityVerificationof..> 07-Sep-2016 22:00 556K
847-Onthesmallestratioproblemoflatticebases.pdf 07-Sep-2016 22:00 210K
848-FromWeaklySelectivetoSelectiveSecurityinCom..> 07-Sep-2016 22:00 504K
848-FromWeaklySelectivetoSelectiveSecurityinCom..> 20-Jan-2023 08:17 660K
849-AnObliviousRAMwithSublogarithmicBandwidthBl..> 07-Sep-2016 22:00 348K
849-AsymptoticallyTightBoundsforComposingORAMwi..> 20-Oct-2016 22:00 597K
850-LightweightFaultAttackResistanceinSoftwareU..> 07-Sep-2016 22:00 803K
851-ANewAlgorithmfortheUnbalancedMeetintheMiddl..> 07-Sep-2016 22:00 774K
852-FasterLLLtypeReductionofLatticeBases.pdf 07-Sep-2016 22:00 356K
853-StrongerSecurityVariantsofGCMSIV.pdf 07-Sep-2016 22:00 1M
854-AlgebraicSecurityAnalysisofKeyGenerationwit..> 07-Sep-2016 22:00 300K
855-CombinatorialRepairabilityforThresholdSchem..> 07-Sep-2016 22:00 284K
856-SpritzaspongyRC4likestreamcipherandhashfunc..> 07-Sep-2016 22:00 451K
857-ApplyingMILPMethodtoSearchingIntegralDistin..> 08-Sep-2016 22:00 868K
858-AKeyRecoveryAttackonMDPCwithCCASecurityUsin..> 08-Sep-2016 22:00 839K
859-OntheSecurityofSupersingularIsogenyCryptosy..> 08-Sep-2016 22:00 320K
860-EfficientIBEwithTightReductiontoStandardAss..> 10-Sep-2016 22:00 587K
861-SecureStableMatchingatScale.pdf 10-Sep-2016 22:00 4M
862-FlawintheSecurityAnalysisofLeakageresilient..> 10-Sep-2016 22:00 468K
863-MorePowerfulandReliableSecondlevelStatistic..> 10-Sep-2016 22:00 414K
864-SalvagingWeakSecurityBoundsforBlockcipherBa..> 10-Sep-2016 22:00 523K
865-ReverseCycleWalkingandItsApplications.pdf 10-Sep-2016 22:00 422K
866-AShuffleArgumentSecureintheGenericModel.pdf 10-Sep-2016 22:00 668K
867-Asurveyonphysiologicalsignalbasedsecurityfo..> 10-Sep-2016 22:00 213K
868-SelectiveOpeningSecurityinthePresenceofRand..> 10-Sep-2016 22:00 644K
869-CryptographicapplicationsofcapacitytheoryOn..> 20-Jan-2023 08:17 385K
869-CryptographicapplicationsofcapacitytheoryOn..> 10-Sep-2016 22:00 385K
870-FasterFullyHomomorphicEncryptionBootstrappi..> 10-Sep-2016 22:00 607K
871-BlockchainFreeCryptocurrenciesAFrameworkfor..> 20-Jan-2023 08:17 380K
871-BlockchainFreeCryptocurrenciesARationalFram..> 10-Sep-2016 22:00 352K
872-IteratedRandomOracleAUniversalApproachforFi..> 10-Sep-2016 22:00 512K
873-CryptographicReverseFirewallviaMalleableSmo..> 11-Sep-2016 22:00 555K
875-DepthRobustGraphsandTheirCumulativeMemoryCo..> 14-Sep-2016 22:00 605K
876-HowtoBuildFullySecureTweakableBlockciphersf..> 14-Sep-2016 22:00 557K
877-HowtoObtainFullyStructurePreservingAutomorp..> 14-Sep-2016 22:00 212K
878-LinearStructuresApplicationstoCryptanalysis..> 14-Sep-2016 22:00 659K
879-ZeroKnowledgeArgumentsforMatrixVectorRelati..> 14-Sep-2016 22:00 679K
880-NaorYungParadigmwithSharedRandomnessandAppl..> 14-Sep-2016 22:00 498K
881-NearCollisionsintheRC4StreamCipher.pdf 14-Sep-2016 22:00 236K
882-MSKTORAMAConstantBandwidthORAMwithoutHomomo..> 14-Sep-2016 22:00 398K
883-DEMOIntegratingMPCinBigDataWorkflows.pdf 14-Sep-2016 22:00 138K
884-Robustlowcostauditablerandomnumbergeneratio..> 14-Sep-2016 22:00 4M
885-ShortStickelbergerClassRelationsandapplicat..> 14-Sep-2016 22:00 447K
886-ARobustandSpongeLikePRNGwithImprovedEfficie..> 14-Sep-2016 22:00 452K
887-AgeneralisationofDillon39sAPNpermutationwit..> 20-Jan-2023 08:17 415K
887-AgeneralisationofDillonsAPNpermutationwitht..> 14-Sep-2016 22:00 423K
888-Findingclosestlatticevectorsusingapproximat..> 19-Dec-2016 23:00 985K
888-Randomizedlatticesievingfortheclosestvector..> 14-Sep-2016 22:00 930K
889-AProvablySecureProofofStakeBlockchainProtoc..> 14-Sep-2016 22:00 394K
889-OuroborosAProvablySecureProofofStakeBlockch..> 21-Dec-2016 23:00 614K
890-AParallelVariantofLDSievefortheSVPonLattice..> 14-Sep-2016 22:00 481K
891-TightlySecureIBEunderConstantsizeMasterPubl..> 14-Sep-2016 22:00 243K
892-PrivacyPreservingDistributedLinearRegressio..> 20-Jan-2023 08:17 994K
892-SecureLinearRegressiononVerticallyPartition..> 14-Sep-2016 22:00 993K
893-Buildingwebapplicationsontopofencrypteddata..> 14-Sep-2016 22:00 771K
894-Indifferentiabilityof3RoundEvenMansourwithR..> 14-Sep-2016 22:00 816K
895-LeakageAbuseAttacksagainstOrderRevealingEnc..> 14-Sep-2016 22:00 360K
896-SecurityAnalysisofAntiSAT.pdf 14-Sep-2016 22:00 493K
897-Anefficientsomewhathomomorphicencryptionsch..> 14-Sep-2016 22:00 227K
898-PhysicalUnclonableFunctionsbasedonTemperatu..> 14-Sep-2016 22:00 514K
899-ParallelizedSideChannelAttackResistedScalar..> 15-Sep-2016 22:00 449K
900-QuantifyingWebAdblockerPrivacy.pdf 15-Sep-2016 22:00 407K
901-DistanceBoundingbasedonPUF.pdf 15-Sep-2016 22:00 252K
902-UniversallyComposableCryptographicRoleBased..> 15-Sep-2016 22:00 414K
903-FromIndifferentiabilitytoConstructiveCrypto..> 15-Sep-2016 22:00 343K
904-SuccinctPredicateandOnlineOfflineMultiInput..> 15-Sep-2016 22:00 967K
905-GeneralizedDesynchronizationAttackonUMAPApp..> 16-Sep-2016 22:00 321K
905-GeneralizedDesynchronizationAttackonUMAPApp..> 19-Sep-2016 22:00 321K
905-GeneralizedDesynchronizationattackonUMAPapp..> 15-Sep-2016 22:00 329K
906-OnBasingSearchSIVPonNPHardness.pdf 16-Sep-2016 22:00 360K
907-CutandChooseforGarbledRAM.pdf 16-Sep-2016 22:00 1M
908-SecureErrorTolerantGraphMatchingProtocols.pdf 19-Sep-2016 22:00 420K
909-MulticoreFPGAImplementationofECCwithHomogen..> 19-Sep-2016 22:00 3M
910-Theclosestvectorproblemintensoredrootlattic..> 19-Sep-2016 22:00 323K
911-TheShortestSignaturesEver.pdf 19-Sep-2016 22:00 353K
912-ParallelImplementationsofMaskingSchemesandt..> 19-Sep-2016 22:00 1M
913-SmallFieldAttackandRevisitingRLWEBasedAuthe..> 19-Sep-2016 22:00 667K
913-SmallFieldAttackandRevisitingRLWEBasedAuthe..> 20-Jan-2023 08:17 737K
914-Computingdiscretelogarithmsincryptographica..> 22-Sep-2016 22:00 354K
915-TransparencyOverlaysandApplications.pdf 22-Sep-2016 22:00 595K
916-FruitChainsAFairBlockchain.pdf 22-Sep-2016 22:00 454K
917-HybridConsensusEfficientConsensusinthePermi..> 22-Sep-2016 22:00 595K
918-TheSleepyModelofConsensus.pdf 22-Sep-2016 22:00 386K
919-SnowWhiteProvablySecureProofsofStake.pdf 22-Sep-2016 22:00 584K
919-SnowWhiteRobustlyReconfigurableConsensusand..> 20-Jan-2023 08:17 682K
920-BreakingWebApplicationsBuiltOnTopofEncrypte..> 22-Sep-2016 22:00 446K
921-BreakingCryptographicImplementationsUsingDe..> 24-Sep-2016 22:00 633K
922-LeakageCharacterizingandDetectingBasedonCom..> 24-Sep-2016 22:00 783K
922-SideChannelLeakageEvaluationandDetectionBas..> 20-Jan-2023 14:19 207
923-AttackingembeddedECCimplementationsthroughc..> 25-Sep-2016 22:00 648K
924-BitCoincidenceMiningAlgorithmII.pdf 25-Sep-2016 22:00 155K
925-SecureChannelInjectionandAnonymousProofsofA..> 25-Sep-2016 22:00 460K
926-LIZARDALightweightStreamCipherforPowerconst..> 25-Sep-2016 22:00 549K
927-AtomicAESACompactImplementationoftheAESEncr..> 25-Sep-2016 22:00 421K
928-Thecomplexityoftheconnectedgraphaccessstruc..> 27-Sep-2016 22:00 476K
929-AGeneralizedIdealSecretSharingScheme.pdf 27-Sep-2016 22:00 243K
930-ScalablePrivateSetIntersectionBasedonOTExte..> 27-Sep-2016 22:00 495K
931-FeedingTwoCatswithOneBowlOnDesigningaFaulta..> 27-Sep-2016 22:00 221K
931-FeedingTwoCatswithOneBowlOnDesigningaFaulta..> 14-Nov-2016 23:00 233K
932-MistakesAreProofThatYouAreTryingOnVerifying..> 20-Jan-2023 08:17 978K
932-MistakesAreProofThatYouAreTryingOnVerifying..> 27-Sep-2016 22:00 978K
933-ActivelySecure1outofNOTExtensionwithApplica..> 27-Sep-2016 22:00 369K
934-CryptographywithUpdates.pdf 29-Sep-2016 22:00 692K
935-ConcealingSecretsinEmbeddedProcessorsDesign..> 29-Sep-2016 22:00 751K
936-LinearComplexityofDesignsbasedonCoordinateS..> 29-Sep-2016 22:00 311K
937-AComparativeSIndexinFactoringRSAModulusviaL..> 29-Sep-2016 22:00 622K
938-KummerforGenusOneoverPrimeOrderFields.pdf 29-Sep-2016 22:00 470K
939-KeyReconciliationProtocolsforErrorCorrectio..> 29-Sep-2016 22:00 635K
940-FastActivelySecureOTExtensionforShortSecret..> 29-Sep-2016 22:00 454K
941-ANewClassofDifferentially4uniformPermutatio..> 01-Oct-2016 22:00 260K
942-OptimizingSecureComputationProgramswithPriv..> 01-Oct-2016 22:00 621K
943-StadiumADistributedMetadataPrivateMessaging..> 01-Oct-2016 22:00 997K
944-HighThroughputSecureThreePartyComputationfo..> 01-Oct-2016 22:00 628K
945-HighthroughputinslicesthecaseofPRESENTPRINC..> 01-Oct-2016 22:00 1M
946-BitslicedMaskingandARMFriendsorFoes.pdf 01-Oct-2016 22:00 4M
947-Isogenygraphsofordinaryabelianvarieties.pdf 01-Oct-2016 22:00 499K
948-SecureComputationinOnlineSocialNetworks.pdf 01-Oct-2016 22:00 653K
949-FunctionalEncryptionforComputationalHidingi..> 01-Oct-2016 22:00 466K
950-OrthogonalizedLatticeEnumerationforSolvingS..> 01-Oct-2016 22:00 441K
951-RevisitingCovertMultipartyComputation.pdf 04-Oct-2016 22:01 713K
952-ISAPAuthenticatedEncryptionInherentlySecure..> 04-Oct-2016 22:00 385K
952-ISAPTowardsSideChannelSecureAuthenticatedEn..> 20-Jan-2023 08:17 561K
953-CollusionResistantBroadcastEncryptionwithTi..> 04-Oct-2016 22:00 376K
953-CollusionResistantBroadcastEncryptionwithTi..> 06-Oct-2016 22:00 496K
954-Improvingthelowerboundonthemaximumnonlinear..> 04-Oct-2016 22:00 302K
955-ConstantdepositmultipartylotteriesonBitcoin..> 04-Oct-2016 22:00 442K
956-TwoSimpleCompositionTheoremswithHcoefficien..> 04-Oct-2016 22:00 226K
957-Computinggeneratorincyclotomicintegerrings.pdf 04-Oct-2016 22:00 569K
958-SafeDeflatecompressionwithoutleakingsecrets..> 04-Oct-2016 22:00 433K
959-ImpossibilityofSimulationSecureFunctionalEn..> 04-Oct-2016 22:00 406K
960-QuantumSecureSymmetricKeyCryptographyBasedo..> 05-Oct-2016 22:00 493K
961-AkilobithiddenSNFSdiscretelogarithmcomputat..> 05-Oct-2016 22:00 599K
962-OnRemovingGradedEncodingsfromFunctionalEncr..> 05-Oct-2016 22:00 751K
963-EfficientcompressionofSIDHpublickeys.pdf 05-Oct-2016 22:00 457K
964-Practicallowdatacomplexitysubspacetrailcryp..> 05-Oct-2016 22:00 682K
965-ACryptographicProofofRegularityLemmas.pdf 05-Oct-2016 22:00 376K
965-ACryptographicProofofRegularityLemmasSimple..> 29-Dec-2016 23:00 352K
966-HighspeedVLSIimplementationofDigitserialGau..> 10-Oct-2016 22:00 1M
967-FaultyClockDetectionforCryptoCircuitsAgains..> 10-Oct-2016 22:00 354K
968-SystemClockandPowerSupplyCrossCheckingforGl..> 10-Oct-2016 22:00 306K
969-GarblingGadgetsforBooleanandArithmeticCircu..> 10-Oct-2016 22:00 453K
970-StatisticalAnalysisforAccessDrivenCacheAtta..> 12-Oct-2016 22:00 556K
971-AuthenticatedcommunicationfromQuantumReadou..> 12-Oct-2016 22:00 279K
972-RevealingEncryptionforPartialOrdering.pdf 12-Oct-2016 22:00 477K
973-InvariantSubspaceAttackAgainstMidori64andTh..> 12-Oct-2016 22:00 676K
974-ServerAidedRevocableIdentityBasedEncryption..> 12-Oct-2016 22:00 622K
975-UniversalUnconditionalVerifiabilityinEVotin..> 12-Oct-2016 22:00 550K
976-OnAdaptivelySecureMultipartyComputationwith..> 12-Oct-2016 22:00 661K
977-Sidechannelsindeduplicationtradeoffsbetween..> 12-Oct-2016 22:00 249K
978-TestingtheTrustworthinessofICTestingAnOracl..> 12-Oct-2016 22:00 1M
979-TheReasonWhySomeDivideandConquerAlgorithmsC..> 15-Oct-2016 22:00 333K
980-TruSpyCacheSideChannelInformationLeakagefro..> 15-Oct-2016 22:00 6M
981-EfficientNodictionaryVerifiableSSE.pdf 15-Oct-2016 22:00 141K
982-SecuringSystemswithScarceEntropyLWEBasedLos..> 15-Oct-2016 22:00 1M
983-ExactSecurityAnalysisofHashthenMaskTypeProb..> 15-Oct-2016 22:00 564K
984-DesignStrategiesforARXwithProvableBoundsSPA..> 15-Oct-2016 22:00 454K
985-HashFirstArgueLaterAdaptiveVerifiableComput..> 15-Oct-2016 22:00 511K
986-FastArithmeticModulo2xpypm1.pdf 17-Oct-2016 22:00 420K
987-AKeytoSuccessSuccessExponentsforSideChannel..> 17-Oct-2016 22:00 683K
988-OnProbabilisticCheckinginPerfectZeroKnowled..> 17-Oct-2016 22:00 775K
988-ZeroKnowledgeProtocolsfromSuccinctConstrain..> 20-Jan-2023 08:17 781K
989-ScryptisMaximallyMemoryHard.pdf 17-Oct-2016 22:00 502K
990-RevisitingtheWrongKeyRandomizationHypothesi..> 17-Oct-2016 22:00 700K
991-BootstrappingtheBlockchainDirectly.pdf 17-Oct-2016 22:00 602K
991-BootstrappingtheBlockchainwithApplicationst..> 20-Jan-2023 08:17 668K
992-Estimatingthecostofgenericquantumpreimageat..> 17-Oct-2016 22:00 483K
993-ComparingSboxesofCiphersfromthePerspectiveo..> 17-Oct-2016 22:00 295K
994-ImprovingAuthenticatedDynamicDictionarieswi..> 17-Oct-2016 22:00 313K
995-MeasuringsmallsubgroupattacksagainstDiffieH..> 17-Oct-2016 22:00 318K
996-LeakageResilientandMisuseResistantAuthentic..> 20-Oct-2016 22:00 814K
997-EfficientCommitmentsandZeroKnowledgeProtoco..> 20-Oct-2016 22:00 610K
997-MoreEfficientCommitmentsfromStructuredLatti..> 20-Jan-2023 08:17 1022K
998-CryptanalysesofCandidateBranchingProgramObf..> 20-Oct-2016 22:00 358K
999-IndiscreetLogsPersistentDiffieHellmanBackdo..> 20-Oct-2016 22:00 350K