Cryptology ePrint Archive: Listing for 2000s
Regex
2009/637 (PDF ) Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers Xiao-shan Gao, Zhenyu Huang
2009/636 (PDF ) Obtaining More Karatsuba-Like Formulae over The Binary Field Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam
2009/635 (PDF ) Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara
2009/634 (PDF ) Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512} Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
2009/633 (PDF ) Traitor-Tracing on Binary Strings Michael J. Collins
2009/632 (PDF ) Cryptanalysis of Secure Message Transmission Protocols with Feedback Qiushi Yang, Yvo Desmedt
2009/631 (PDF ) Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks DaeHun Nyang, Mun-Kyu Lee
2009/630 (PDF ) Information-Theoretically Secure Protocols and Security Under Composition Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
2009/629 (PDF ) A Comparative Analysis of Delay Based PUF Implementations on FPGA Sergey Morozov, Abhranil Maiti, Patrick Schaumont
2009/628 (PDF ) Using Sphinx to Improve Onion Routing Circuit Construction Aniket Kate, Ian Goldberg
2009/627 (PDF ) A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong
2009/626 (PDF ) Approximate Integer Common Divisor Problem relates to Implicit Factorization Santanu Sarkar, Subhamoy Maitra
2009/625 (PDF ) Cryptographic Accumulators for Authenticated Hash Tables Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2009/624 (PDF ) Security Analysis of the PACE Key-Agreement Protocol Jens Bender, Marc Fischlin, Dennis Kuegler
2009/623 (PDF ) Universally Constructing 12-th Degree Extension Field for Ate Pairing Masaaki Shirase
2009/622 (PDF ) A Strong Blind Signature Scheme over Braid Groups WEI Yun, XIONG Guo-Hua, BAO Wan-Su, ZHANG Xing-Kai
2009/621 (PDF ) On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager, Jörg Schwenk
2009/620 (PDF ) Security of ECQV-Certified ECDSA Against Passive Adversaries Daniel R. L. Brown, Matthew J. Campagna, Scott A. Vanstone
2009/619 (PDF ) A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
2009/618 (PDF ) Data-Depend Hash Algorithm ZiJie Xu, Ke Xu
2009/617 (PDF ) An efficient ID- based directed signature scheme from bilinear pairings B. Umaprasada Rao, P. Vasudeva Reddy, T. Gowri
2009/616 (PDF ) Fully Homomorphic Encryption over the Integers Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2009/615 (PDF ) Faster Pairing Computations on Curves with High-Degree Twists Craig Costello, Tanja Lange, Michael Naehrig
2009/614 (PDF ) Secure Multiparty AES (full paper) Ivan Damgård, Marcel Keller
2009/613 (PDF ) Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2009/612 (PDF ) On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho, Alejandro Hevia
2009/611 (PDF ) Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules Lan Luo, QiongHai Dai, ZhiGuang Qin, ChunXiang Xu
2009/610 (PDF ) Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc, Kwangjo Kim
2009/609 (PDF ) Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc, Kwangjo Kim
2009/608 (PDF ) Non-Malleable Codes Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
2009/606 (PDF ) On a weakness of the Tu-Deng function and its repair Claude Carlet
2009/605 (PDF ) Solving the Shortest Lattice Vector Problem in Time 2^2.465n Xavier Pujol, Damien Stehle
2009/604 (PDF ) Composition of Zero-Knowledge Proofs with Efficient Provers Eleanor Birrell, Salil Vadhan
2009/603 (PDF ) An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations Brian Baldwin, William P. Marnane
2009/602 (PDF ) Secure Ranging With Message Temporal Integrity Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun
2009/601 (PDF ) Parallel Shortest Lattice Vector Enumeration on Graphics Cards Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
2009/600 (PDF ) Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement D. Fiore, R. Gennaro, N. P. Smart
2009/599 (PDF ) Groth--Sahai proofs revisited E. Ghadafi, N. P. Smart, B. Warinschi
2009/598 (PDF ) On the Design and Implementation of an Efficient DAA Scheme L. Chen, D. Page, N. P. Smart
2009/597 (PDF ) Twisted Jacobi Intersections Curves Rongquan Feng, Menglong Nie, Hongfeng Wu
2009/596 (PDF ) Could SFLASH be repaired? Jintai Ding, Vivien Dubois, Bo-Yin Yang, Owen Chia-Hsin Chen, Chen-Mou Cheng
2009/595 (PDF ) Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms Endre Bangerter, Jan Camenisch, Stephan Krenn
2009/594 (PDF ) Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay, Kobbi Nissim
2009/593 (PDF ) Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
2009/592 (PDF ) From Passive to Covert Security at Low Cost Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
2009/591 (PDF ) Embedded SFE: Offloading Server and Network using Hardware Tokens Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/590 (PDF ) More Constructions of Lossy and Correlation-Secure Trapdoor Functions David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
2009/589 (PDF ) Information-set decoding for linear codes over Fq Christiane Peters
2009/588 (PDF ) Confidential Signatures and Deterministic Signcryption Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schroder
2009/587 (PDF ) Poly-Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P. Singh, A. Saikia, B. K. Sarma
2009/586 (PDF ) A mean value formula for elliptic curves Rongquan Feng, Hongfeng Wu
2009/585 (PDF ) An Improved Differential Fault Attack on Camellia ZHAO Xin-jie, WANG Tao
2009/584 (PDF ) Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers Yu Liu, Kaijie Wu, Ramesh Karri
2009/583 (PDF ) Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2009/582 (PDF ) A Game-Based Definition of Coercion-Resistance and its Applications Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2009/581 (PDF ) A Diagonal Fault Attack on the Advanced Encryption Standard Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2009/580 (PDF ) A complete set of addition laws\\for incomplete Edwards curves Daniel J. Bernstein, Tanja Lange
2009/579 (PDF ) Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Sherman S. -M. Chow, Qian Wang, Kui Ren, Wenjing Lou
2009/578 (PDF ) Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps Wenjian Xie, Zhang Zhang
2009/577 (PDF ) On the nonlinearity profile of the Dillon function Claude Carlet
2009/576 (PDF ) Public-Key Cryptographic Primitives Provably as Secure as Subset Sum Vadim Lyubashevsky, Adriana Palacio, Gil Segev
2009/575 (PDF ) Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault Michael Tunstall, Debdeep Mukhopadhyay
2009/574 (PDF ) Voting with unconditional privacy: CFSY for booth voting Jeroen van de Graaf
2009/573 (PDF ) New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields Leibo Li, Mingqiang Wang, Zhanjiang Xia
2009/571 (PDF ) Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes N. P. Smart, F. Vercauteren
2009/570 (PDF ) Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2009/569 (PDF ) Secure Network Coding Over the Integers Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009/568 (PDF ) Ephemeral key compromise attack on the IB-KA protocol Qingfeng Cheng, Chuangui Ma
2009/567 (PDF ) Properties of the Discrete Differential with Cryptographic Applications Daniel Smith-Tone
2009/566 (PDF ) New Cryptosystems From CSP-Based Self-Distributive Systems Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
2009/565 (PDF ) Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions Robert Granger, Michael Scott
2009/564 (PDF ) Optimal pairing revisited Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng
2009/563 (PDF ) A Family of $p$-ary Binomial Bent Functions Dabin Zheng, Xiangyong Zeng, Lei Hu
2009/562 (PDF ) How to pair with a human Stefan Dziembowski
2009/561 (PDF ) Improvements on two password-based authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2009/560 (PDF ) On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme Manoj Kumar
2009/559 (PDF ) New Integral Distinguisher for Rijndael-256 Yuechuan Wei, Bing Sun, Chao Li
2009/556 (PDF ) Constructing Tower Extensions for the implementation of Pairing-Based Cryptography Naomi Benger, Michael Scott
2009/554 (PDF ) ON A COMBINATORIAL CONJECTURE T. W. CUSICK, YUAN LI, PANTELIMON STANICA
2009/553 (PDF ) Cryptanalysis of a key exchange scheme based on block matrices Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Pedro Taborda Duarte
2009/552 (PDF ) Preimage Attacks on Reduced DHA-256 Jinmin Zhong, Xuejia Lai
2009/551 (PDF ) A Novel Design Method of Stream Ciphers Based on Table-Element Permutation Hongbo Zou
2009/550 (PDF ) How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models Yusuke Naito, Lei Wang, Kazuo Ohta
2009/549 (PDF ) Making Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida
2009/548 (PDF ) A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS Stéphane BALLET, Robert ROLLAND
2009/547 (PDF ) Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro, Craig Gentry, Bryan Parno
2009/546 (PDF ) Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC Masao Kasahara
2009/545 (PDF ) Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel
2009/544 (PDF ) Connections between Quaternary and Binary Bent Functions Patrick Solé, Natalia Tokareva
2009/542 (PDF ) Analysis of Intermediate Field Systems Olivier Billet, Jacques Patarin, Yannick Seurin
2009/541 (PDF ) Breaking ECC2K-130 Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang
2009/540 (PDF ) Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman
2009/539 (PDF ) Covering Radius of Two-dimensional Lattices Yupeng Jiang, Yingpu Deng, Yanbin Pan
2009/538 (PDF ) Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
2009/537 (PDF ) Cryptanalysis of two knapsack public-key cryptosystems Jingguo Bi, Xianmeng Meng, Lidong Han
2009/533 (PDF ) Finding composite order ordinary elliptic curves using the Cocks-Pinch method D. Boneh, K. Rubin, A. Silverberg
2009/532 (PDF ) Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
2009/531 (PDF ) Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations Henri Gilbert, Thomas Peyrin
2009/530 (PDF ) A New Proposal Against the Main of Generic Attacks Xigen. Yao
2009/529 (PDF ) Oblivious Transfer with Access Control Jan Camenisch, Maria Dubovitskaya, Gregory Neven
2009/528 (PDF ) New Fault Attack on Elliptic Curve Scalar Multiplication Alexey Chilikov, Oleg Taraskin
2009/527 (PDF ) An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme Seiko Arita
2009/526 (PDF ) Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 Jiazhe Chen, Keting Jia
2009/525 (PDF ) On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks Somindu C. Ramanna, Palash Sarkar
2009/524 (PDF ) Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions Petros Mol, Scott Yilek
2009/523 (PDF ) Differential Addition in generalized Edwards Coordinates Benjamin Justus, Daniel Loebenberger
2009/522 (PDF ) Isogenies of Elliptic Curves: A Computational Approach Daniel Shumow
2009/521 (PDF ) An Efficient Secure Oblivious Transfer Hung-Min Sun, Yalin Chen, Jue-Sam Chou
2009/520 (PDF ) Universally Composable Incoercibility Dominique Unruh, Jörn Müller-Quade
2009/519 (PDF ) Secure Message Transmission with Small Public Discussion Juan Garay, Clint Givens, Rafail Ostrovsky
2009/518 (PDF ) Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2009/517 (PDF ) New Constructions of Convertible Undeniable Signature Schemes without Random Oracles Qiong Huang, Duncan S. Wong
2009/516 (PDF ) Lightweight Cryptography - Cryptographic Engineering for a Pervasive World Axel Poschmann
2009/515 (PDF ) Blake-Wilson, Johnson and Menezes Protocol Revisited Hai Huang, Zhenfu Cao
2009/514 (PDF ) Generic One Round Group Key Exchange in the Standard Model M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzalez Nieto, Mark Manulis
2009/513 (PDF ) On the round complexity of black-box constructions of commitments secure against selective opening attacks David Xiao
2009/512 (PDF ) Public-Key Encryption in the Bounded-Retrieval Model Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
2009/511 (PDF ) Bounded Key-Dependent Message Security Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
2009/510 (PDF ) High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely
2009/509 (PDF ) Practical Key Recovery Attacks On Two McEliece Variants Valerie Gauthier Umana, Gregor Leander
2009/508 (PDF ) On the Efficiency of Classical and Quantum Oblivious Transfer Reductions Severin Winkler, Juerg Wullschleger
2009/507 (PDF ) Efficient Privacy-Preserving Face Recognition Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2009/506 (PDF ) An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/505 (PDF ) Authenticated Key Exchange Protocols with Enhanced Freshness Properties Hai Huang, Zhenfu Cao
2009/504 (PDF ) Insecure ``Provable Secure Network Coding'' Yongge Wang
2009/503 (PDF ) Fault Attacks Against EMV Signatures Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2009/502 (PDF ) On second order nonlinearities of cubic monomial Boolean functions Ruchi Gode, Sugata Gangopadhyay
2009/501 (PDF ) Fast Implementations of AES on Various Platforms Joppe W. Bos, Dag Arne Osvik, Deian Stefan
2009/500 (PDF ) Key Recovery Attack on QuiSci Nils Reimers
2009/499 (PDF ) Underlying Assumptions and Designated Verifier Signatures Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2009/498 (PDF ) NTRU based group oriented signature Chunbo Ma, Jun Ao
2009/497 (PDF ) Cube Attack on Courtois Toy Cipher Piotr Mroczkowski, Janusz Szmidt
2009/496 (PDF ) Anonymous Fuzzy Identity-based Encryption for Similarity Search Ye Zhang, Nikos Mamoulis, David W. Cheung, S. M. Yiu, W. K. Wong
2009/495 (PDF ) Security Weakness in Two Authenticated Key Exchange Protocols Qingfeng Cheng, Chuangui Ma
2009/494 (PDF ) A Framework for Universally Composable Non-Committing Blind Signatures Masayuki Abe, Miyako Ohkubo
2009/493 (PDF ) Remarks on Some Quantum Cryptographic Schemes Zhengjun Cao
2009/492 (PDF ) Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/491 (PDF ) Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity Emiliano De Cristofaro, Gene Tsudik
2009/490 (PDF ) Cryptanalysis of Multiple-Server Password-Authenticated Key Sang-Gon Lee
2009/489 (PDF ) Impossible Boomerang Attack for Block Cipher Structures Jiali Choy, Huihui Yap
2009/488 (PDF ) Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A. Saikia, B. K. Sarma
2009/487 (PDF ) Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2009/486 (PDF ) Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison Lewko, Brent Waters
2009/485 (PDF ) Black-Box Circular-Secure Encryption Beyond Affine Functions Zvika Brakerski, Shafi Goldwasser, Yael Kalai
2009/484 (PDF ) New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256 Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
2009/483 (PDF ) On the Security of UOV Jean-Charles Faugère, Ludovic Perret
2009/482 (PDF ) New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Allison Lewko, Brent Waters
2009/481 (PDF ) PPS: Privacy Preserving Statistics using RFID Tags Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2009/480 (PDF ) On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited Sanjit Chatterjee, Alfred Menezes
2009/479 (PDF ) Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512 Yu Sasaki, Lei Wang, Kazumaro Aoki
2009/478 (PDF ) Pseudo-cryptanalysis of the Original Blue Midnight Wish Søren S. Thomsen
2009/477 (PDF ) Preimages for Step-Reduced SHA-2 Jian Guo, Krystian Matusiewicz
2009/476 (PDF ) On the Security of PAS (Predicate-based Authentication Service) Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang
2009/475 (PDF ) Double-Exponentiation in Factor-4 Groups and its Applications Koray Karabina
2009/474 (PDF ) Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine Scott Yilek
2009/473 (PDF ) A Simple Power Analysis Attack on the Serpent Key Schedule Kevin J. Compton, Brian Timm, Joel VanLaven
2009/472 (PDF ) Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson Madeline Gonzalez, Rainer Steinwandt
2009/471 (PDF ) Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$ Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo, Liang Cui
2009/470 (PDF ) On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/469 (PDF ) Additive Combinatorics and Discrete Logarithm Based Range Protocols Rafik Chaabouni, Helger Lipmaa, abhi shelat
2009/468 (PDF ) Password Based Key Exchange with Hidden Elliptic Curve Public Parameters Julien Bringer, Herve Chabanne, Thomas Icart
2009/466 (PDF ) The Certicom Challenges ECC2-X Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
2009/465 (PDF ) Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2009/464 (PDF ) On Key Authentic Degree of Cryptosystem WANG Yong, WANG Huangdeng
2009/463 (PDF ) On Linear Cryptanalysis with Many Linear Approximations Benoit Gérard, Jean-Pierre Tillich
2009/462 (PDF ) Certificateless KEM and Hybrid Signcryption Schemes Revisited S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/461 (PDF ) A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC) Bruce Kapron, Lior Malka, Venkatesh Srinivasan
2009/460 (PDF ) Asymptotic enumeration of correlation-immune boolean functions E. Rodney Canfield, Zhicheng Gao, Catherine Greenhill, Brendan D. McKay, Robert W. Robinson
2009/459 (PDF ) Efficient Oblivious Polynomial Evaluation with Simulation-Based Security Carmit Hazay, Yehuda Lindell
2009/458 (PDF ) Security Analysis and Design of Proxy Signature Schemes over Braid Groups Wei Yun, Xiong Guo-hua, Zhang Xing-kai, Bao Wan-su
2009/457 (PDF ) A remark on the computation of cube roots in finite fields Nozomu Nishihara, Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2009/455 (PDF ) Identity-Based Hybrid Signcryption Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/454 (PDF ) An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification Jacob C. N. Schuldt, Kanta Matsuura
2009/453 (PDF ) A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function Vlastimil Klima, Petr Susil
2009/452 (PDF ) Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes Christian Wieschebrink
2009/451 (PDF ) Efficient Certificateless KEM in the Standard Model Georg Lippold, Colin Boyd, Juan González Nieto
2009/450 (PDF ) On Hierarchical Threshold Secret Sharing Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak
2009/449 (PDF ) One for All - All for One: Unifying Standard DPA Attacks Stefan Mangard, Elisabeth Oswald, Francois-Xavier Standaert
2009/448 (PDF ) Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds Ning Ding, Dawu Gu, Bart Preneel
2009/447 (PDF ) ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS Sunil Pandey, Praveen Kaushik, Dr. S. C. Shrivastava
2009/446 (PDF ) Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian, Ali Zakerolhosseini
2009/445 (PDF ) Computing Hilbert class polynomials with the Chinese Remainder Theorem Andrew V. Sutherland
2009/444 (PDF ) Secure and Efficient HB-CM Entity Authentication Protocol Zhijun Li, Guang Gong, Zhiguang Qin
2009/443 (PDF ) Rebound Attack on the Full LANE Compression Function Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
2009/442 (PDF ) Fuzzy Privacy Preserving Peer-to-Peer Reputation Management Rishab Nithyanand, Karthik Raman
2009/441 (PDF ) An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP Jayaprakash Kar, Banshidhar Majhi
2009/440 (PDF ) A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt, Johannes Buchmann
2009/439 (PDF ) A Fast Mental Poker Protocol Tzer-jen Wei, Lih-Chung Wang
2009/438 (PDF ) Improved Cryptanalysis of Skein Jean-Philippe Aumasson, Cagdas Calik, Willi Meier, Onur Ozen, Raphael C. -W. Phan, Kerem Varici
2009/437 (PDF ) On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings Shengbao Wang
2009/436 (PDF ) On the Connection between Signcryption and One-pass Key Establishment M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/435 (PDF ) Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm Laila El Aimani
2009/434 (PDF ) Tight Bounds for Protocols with Hybrid Security Matthias Fitzi, Dominik Raub
2009/433 (PDF ) Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience Arpita Patra, C. Pandu Rangan
2009/431 (PDF ) On the Design of Trivium Yun Tian, Gongliang Chen, Jianhua Li
2009/430 (PDF ) One-time-password-authenticated key exchange Kenneth G. Paterson, Douglas Stebila
2009/429 (PDF ) Precise Time and Space Simulatable Zero-Knowledge Ning Ding, Dawu Gu
2009/428 (PDF ) Efficiently from Semi-honest to Malicious OT via OLFE Jürg Wullschleger
2009/427 (PDF ) Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware Stephen R. Tate, Roopa Vishwanathan
2009/426 (PDF ) Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasaila, Vlad Alexa, Sorin Iftene
2009/425 (PDF ) Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
2009/424 (PDF ) Double Voter Perceptible Blind Signature Based Electronic Voting Protocol Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
2009/423 (PDF ) Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu
2009/422 (PDF ) Attacks on {RFID}-Based Electronic Voting Systems Yossef Oren, Avishai Wool
2009/421 (PDF ) How to Construct Identity-Based Signatures without the Key Escrow Problem Tsz Hon Yuen, Willy Susilo, Yi Mu
2009/420 (PDF ) Higher-order Masking and Shuffling for Software Implementations of Block Ciphers Matthieu Rivain, Emmanuel Prouff, Julien Doget
2009/419 (PDF ) An Efficient Method for Random Delay Generation in Embedded Software Jean-Sébastien Coron, Ilya Kizhvatov
2009/418 (PDF ) Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? Mihir Bellare, Dennis Hofheinz, Eike Kiltz
2009/417 (PDF ) More Differential Paths of TIB3 Harry Wiggins, Philip Hawkes, Gregory G. Rose, Cameron McDonald
2009/416 (PDF ) KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem Carsten Elsner, Martin Schmidt
2009/415 (PDF ) Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman
2009/414 (PDF ) Security Bounds for the Design of Code-based Cryptosystems Matthieu Finiasz, Nicolas Sendrier
2009/413 (PDF ) Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission Jiang Wu, Douglas R. Stinson
2009/412 (PDF ) Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words Nathan Keller, Stephen D. Miller
2009/411 (PDF ) Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/410 (PDF ) Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
2009/409 (PDF ) A Tree Based Recursive Scheme for Space Efficient Secret Sharing Abhishek Parakh, Subhash Kak
2009/408 (PDF ) A Secure and Efficient Authenticated Diffie–Hellman Protocol Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2009/407 (PDF ) Single Block Attacks and Statistical Tests on CubeHash Benjamin Bloom, Alan Kaminsky
2009/406 (PDF ) On-line Non-transferable Signatures Revisited Jacob C. N. Schuldt, Kanta Matsuura
2009/405 (PDF ) Generic Attacks on Misty Schemes -5 rounds is not enough- Valerie Nachef, Jacques Patarin, Joana Treger
2009/403 (PDF ) On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited) Laila El Aimani
2009/402 (PDF ) AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time Michael Vielhaber
2009/401 (PDF ) Longest Common Subsequence as Private Search Mark Gondree, Payman Mohassel
2009/400 (PDF ) Identity-Based Chameleon Hash Scheme Without Key Exposure Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim
2009/399 (PDF ) Leakage-Resilient Storage Francesco Davì, Stefan Dziembowski, Daniele Venturi
2009/398 (PDF ) Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/397 (PDF ) Linear Cryptanalysis of Reduced-Round PRESENT Joo Yeon Cho
2009/396 (PDF ) Computational Indistinguishability Amplification: Tight Product Theorems for System Composition Ueli Maurer, Stefano Tessaro
2009/395 (PDF ) First CPIR Protocol with Data-Dependent Computation Helger Lipmaa
2009/394 (PDF ) Provably Secure Convertible Undeniable Signatures with Unambiguity Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
2009/393 (PDF ) Permutation Polynomials modulo $p^n$} Rajesh P Singh, Soumen Maity
2009/392 (PDF ) Computational Soundness for Key Exchange Protocols with Symmetric Encryption Ralf Kuesters, Max Tuengerthal
2009/391 (PDF ) Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems Rikke Bendlin, Ivan Damgård
2009/390 (PDF ) Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments Jens Groth
2009/389 (PDF ) On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2009/387 (PDF ) Securing Plastic Money Using an RFID Based Protocol Stack Rishab Nithyanand
2009/386 (PDF ) QTRU: A Lattice Attack Resistant Version of NTRU Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan
2009/385 (PDF ) Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions Brent Waters
2009/384 (PDF ) Practical Attacks on NESHA-256 Orr Dunkelman, Tor E. Bjørstad
2009/383 (PDF ) A Registration Scheme to Allocate a Unique Identification Number Manoj Kumar
2009/382 (PDF ) Linearization Framework for Collision Attacks: Application to CubeHash and MD6 Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
2009/380 (PDF ) Untraceable Tags based on Mild Assumptions Carlo Blundo, Angelo De Caro, Giuseppe Persiano
2009/379 (PDF ) Protecting Circuits from Computationally Bounded and Noisy Leakage Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
2009/378 (PDF ) Detectable correlations in Edon-R Peter Novotney, Niels Ferguson
2009/377 (PDF ) Chosen-Ciphertext Secure RSA-type Cryptosystems Benoit Chevallier-Mames, Marc Joye
2009/376 (PDF ) Cryptanalysis of the Tillich-Zémor hash function Markus Grassl, Ivana Ilic, Spyros Magliveras, Rainer Steinwandt
2009/375 (PDF ) Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes Masao KASAHARA
2009/374 (PDF ) Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
2009/373 (PDF ) Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov, Yehuda Lindell
2009/372 (PDF ) More on Key Wrapping Rosario Gennaro, Shai Halevi
2009/371 (PDF ) Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
2009/370 (PDF ) A study of pairing computation for elliptic curves with embedding degree 15 Nadia El Mrabet, Nicolas Guillermin, Sorina Ionica
2009/369 (PDF ) Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets Boris Skoric
2009/368 (PDF ) A Simulation-Based Treatment of Authenticated Message Exchange Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/367 (PDF ) Non-delegatable Identity-based Designated Verifier Signature Qiong Huang, Willy Susilo, Duncan S. Wong
2009/366 (PDF ) Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer Yehuda Lindell, Hila Zarosim
2009/365 (PDF ) Space Efficient Secret Sharing: A Recursive Approach Abhishek Parakh, Subhash Kak
2009/364 (PDF ) Position Based Cryptography Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2009/363 (PDF ) Some Lattices Attacks on DSA and ECDSA Dimitrios Poulakis
2009/362 (PDF ) Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures Laila El Aimani
2009/361 (PDF ) On the Security of a Proxy Blind Signature Scheme over Braid Groups Manoj Kumar
2009/360 (PDF ) Cryptanalysis of a Generalized Unbalanced Feistel Network Structure Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
2009/359 (PDF ) Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography) Chris Peikert
2009/358 (PDF ) MAC Precomputation with Applications to Secure Memory Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
2009/357 (PDF ) Impossible Differential Cryptanalysis of FOX Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo
2009/356 (PDF ) A Domain Extender for the Ideal Cipher Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
2009/355 (PDF ) Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate, Ian Goldberg
2009/354 (PDF ) Cache Timing Attacks on Camellia Block Cipher ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
2009/353 (PDF ) Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version) Berkant Ustaoglu
2009/352 (PDF ) On the Duality of Probing and Fault Attacks Berndt M. Gammel, Stefan Mangard
2009/351 (PDF ) How to Delegate a Lattice Basis David Cash, Dennis Hofheinz, Eike Kiltz
2009/350 (PDF ) Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
2009/349 (PDF ) Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer
2009/348 (PDF ) A provably secure really source hiding designated verifier signature scheme based on random oracle model Huang-Ta Huang, Jue-Sam Chou
2009/347 (PDF ) An Efficient Concurrent Repetition Theorem Douglas Wikström
2009/346 (PDF ) Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
2009/345 (PDF ) Anonymous ID Based Signcryption Scheme for Multiple Receivers Sunder Lal, Prashant Kushwah
2009/344 (PDF ) Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009 Xi Zhang, Min-Rong Chen, Xia Li
2009/343 (PDF ) Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis
2009/342 (PDF ) FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane
2009/341 (PDF ) Leakage Resilient Cryptography in Practice Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
2009/340 (PDF ) Efficient Indifferentiable Hashing into Ordinary Elliptic Curves Eric Brier, Jean-Sebastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
2009/339 (PDF ) A Novel ID-based Electronic Cash System from Pairings Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun
2009/338 (PDF ) Security weaknesses in two multi-server password based authentication protocols Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding
2009/337 (PDF ) A New Lattice-Based Cryptosystem Mixed with a Knapsack Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
2009/336 (PDF ) Partial Signatures and their Applications Mihir Bellare, Shanshan Duan
2009/335 (PDF ) Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/334 (PDF ) Attacking Reduced Rounds of the ARIA Block Cipher Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/333 (PDF ) Hard Fault Analysis of Trivium Yupu Hu, Fengrong Zhang, Yiwei Zhang
2009/332 (PDF ) Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC Ton van Deursen, Sasa Radomirovic
2009/331 (PDF ) Security Notions and Generic Constructions for Client Puzzles L. Chen, P. Morrissey, N. P. Smart, B. Warinschi
2009/328 (PDF ) Flowchart description of security primitives for Controlled Physical Unclonable Functions Boris Skoric, Marc X. Makkes
2009/327 (PDF ) Simple Adaptive Oblivious Transfer Without Random Oracle Kaoru Kurosawa, Ryo Nojima
2009/326 (PDF ) The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property Gregory V. Bard
2009/325 (PDF ) Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi
2009/324 (PDF ) Group-Oriented Fair Exchange of Signatures Qiong Huang, Duncan S. Wong, Willy Susilo
2009/323 (PDF ) Factoring Unbalanced Moduli with Known Bits Eric Brier, David Naccache, Mehdi Tibouchi
2009/322 (PDF ) Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS Reynald Affeldt, David Nowak, Kiyoshi Yamada
2009/321 (PDF ) Tweakable Enciphering Schemes From Stream Ciphers With IV Palash Sarkar
2009/320 (PDF ) Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures Georg Fuchsbauer
2009/319 (PDF ) Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring Xiaofeng Chen, Haibo Tian, Fangguo Zhang
2009/318 (PDF ) The Fermat factorization method revisited Robert ERRA, Christophe GRENIER
2009/317 (PDF ) Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov, Dmitry Khovratovich
2009/316 (PDF ) An Efficient Password Security of Key Exchange Protocol based on ECDLP Jayaprakash Kar, Banshidhar Majhi
2009/315 (PDF ) Breaking RSA-based PIN Encryption with thirty ciphertext validity queries N. P. Smart
2009/314 (PDF ) Secure Two-Party Computation is Practical B. Pinkas, T. Schneider, N. P. Smart, S. Williams
2009/313 (PDF ) Identity Based Group Signatures from Hierarchical Identity-Based Encryption Nigel P. Smart, Bogdan Warinschi
2009/312 (PDF ) Jacobi Quartic Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2009/311 (PDF ) Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
2009/310 (PDF ) RFID distance bounding protocol with mixed challenges to prevent relay attacks Chong Hee Kim, Gildas Avoine
2009/309 (PDF ) Fault Attacks on RSA Signatures with Partially Unknown Messages Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
2009/308 (PDF ) A note on the Certificateless Multi-receiver Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/307 (PDF ) Anonymous Signatures Revisited Vishal Saraswat, Aaram Yun
2009/306 (PDF ) Authentic Time-Stamps for Archival Storage Alina Oprea, Kevin D. Bowers
2009/305 (PDF ) Improved generic algorithms for 3-collisions Antoine Joux, Stefan Lucks
2009/304 (PDF ) Factor-4 and 6 Compression of Cyclotomic Subgroups Koray Karabina
2009/303 (PDF ) Key extraction from general non-discrete signals E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, B. Skoric
2009/302 (PDF ) Cryptanalysis of ESSENCE Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
2009/301 (PDF ) A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure Yuyin Yu, Mingsheng Wang
2009/300 (PDF ) Universally Composable Contributory Group Key Exchange M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzàlez Nieto
2009/299 (PDF ) On the security of oscillator-based random number generators Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux
2009/298 (PDF ) Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/296 (PDF ) Perfectly Balanced Functions in Symbolic Dynamics O. A. Logachev, A. A. Salnikov, S. V. Smyshlyaev, V. V. Yashchenko
2009/295 (PDF ) Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
2009/294 (PDF ) Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing Roman Schlegel, Duncan S. Wong
2009/293 (PDF ) Enhancing Attribute-based Encryption with Attribute Hierarchy Jin Li, Qian Wang, Cong Wang, Kui Ren
2009/292 (PDF ) Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
2009/291 (PDF ) Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/290 (PDF ) Security Analysis of Aggregate signature and Batch verification signature schemes S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan
2009/289 (PDF ) Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks Erik Zenner
2009/288 (PDF ) Efficient Key Exchange with Tight Security Reduction Jiang Wu, Berkant Ustaoglu
2009/287 (PDF ) Generic Attacks on Alternating Unbalanced Feistel Schemes Valerie Nachef
2009/286 (PDF ) On Privacy Losses in the Trusted Agent Model (Abstract) Paulo Mateus, Serge Vaudenay
2009/285 (PDF ) Efficient Public Key Encryption Based on Ideal Lattices Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
2009/284 (PDF ) Privacy-aware Attribute-based Encryption with User Accountability Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
2009/283 (PDF ) Short and Stateless Signatures from the RSA Assumption Susan Hohenberger, Brent Waters
2009/282 (PDF ) Leakage-Resilient Signatures Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
2009/281 (PDF ) Enabling Public Verifiability and Data Dynamics for Storage Security Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
2009/280 (PDF ) Universally Anonymous IBE based on the Quadratic Residuosity Assumption Giuseppe Ateniese, Paolo Gasti
2009/279 (PDF ) Algebraic Side-Channel Attacks Mathieu Renauld, Francois-Xavier Standaert
2009/278 (PDF ) Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rührmair, Qingqing Chen, Paolo Lugli, Ulf Schlichtmann, Martin Stutzmann, György Csaba
2009/277 (PDF ) On the Foundations of Physical Unclonable Functions Ulrich Rührmair, Jan Sölter, Frank Sehnke
2009/276 (PDF ) Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
2009/275 (PDF ) Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit) Thomas Dullien
2009/274 (PDF ) A Collision-resistance Hash Function DIHA2 Xigen. Yao
2009/273 (PDF ) Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/272 (PDF ) A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu, Yingpu Deng
2009/271 (PDF ) Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/270 (PDF ) Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento
2009/269 (PDF ) Side-channel attacks based on linear approximations Thomas Roche, Cédric Tavernier
2009/267 (PDF ) Simulation based security in the applied pi calculus Stéphanie Delaune, Steve Kremer, Olivier Pereira
2009/266 (PDF ) Pseudorandomness Analysis of the Lai-Massey Scheme Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu
2009/265 (PDF ) Revisiting the Indifferentiability of PGV Hash Functions Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai
2009/264 (PDF ) Proposal of PPS Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, Masao Kasahara
2009/263 (PDF ) General Error Decodable Secret Sharing Scheme and Its Application Kaoru Kurosawa
2009/262 (PDF ) Computationally Secure Two-Round Authenticated Message Exchange Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/261 (PDF ) Security of Cyclic Double Block Length Hash Functions including Abreast-DM Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/260 (PDF ) A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs Kota Ideguchi, Toru Owada, Hirotaka Yoshida
2009/258 (PDF ) FACTORIZATION WITH GENUS 2 CURVES Romain COSSET
2009/257 (PDF ) FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION Ulf T. Mattsson
2009/256 (PDF ) Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher Zhiqiang Liu, Dawu Gu, Jing Zhang
2009/255 (PDF ) SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions Ulrich Rührmair
2009/254 (PDF ) Improvement of One Quantum Encryption Scheme Zhengjun Cao
2009/253 (PDF ) Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange Cas J. F. Cremers
2009/252 (PDF ) Sparse Boolean equations and circuit lattices Igor Semaev
2009/251 (PDF ) Format-Preserving Encryption Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
2009/249 (PDF ) Symbolic Encryption with Pseudorandom Keys Daniele Micciancio
2009/248 (PDF ) Cryptanalysis of the MST_3 Public Key Cryptosystem Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2009/247 (PDF ) On the Necessary and Sufficient Assumptions for UC Computation Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2009/246 (PDF ) On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions György Csaba, Xueming Ju, Qingqing Chen, Wolfgang Porod, Jürgen Schmidhuber, Ulf Schlichtmann, Paolo Lugli, Ulrich Rührmair
2009/245 (PDF ) Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring Naoki Ogura, Shigenori Uchiyama
2009/244 (PDF ) Tardos Fingerprinting Codes in the Combined Digit Model Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet U. Celik
2009/243 (PDF ) Faster Pairings on Special Weierstrass Curves Craig Costello, Huseyin Hisil, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2009/242 (PDF ) Examples of differential multicollisions for 13 and 14 rounds of AES-256 Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/241 (PDF ) Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/240 (PDF ) Group Testing and Batch Verification Gregory M. Zaverucha, Douglas R. Stinson
2009/239 (PDF ) Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations Julien Bringer, Herve Chabanne, Jean-Luc Danger
2009/238 (PDF ) Attacks on Round-Reduced BLAKE LI Ji, XU Liangyu
2009/237 (PDF ) Remarks on One Arbitrated Quantum-signature Scheme Zhengjun Cao
2009/236 (PDF ) Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics Fumiyuki Momose, Jinhui Chao
2009/235 (PDF ) Breaking and Fixing of an Identity Based Multi-Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/234 (PDF ) On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function Rune Steinsmo Ødegård, Danilo Gligoroski
2009/233 (PDF ) A strategy for recovering roots of bivariate polynomials modulo a prime Paula Bustillo, Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2009/232 (PDF ) MeshHash2 Björn Fay
2009/231 (PDF ) Practical DPA Attacks on MDPL Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2009/230 (PDF ) Adaptively Secure Broadcast Martin Hirt, Vassilis Zikas
2009/229 (PDF ) Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater
2009/228 (PDF ) Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2009/227 (PDF ) Computational soundness, co-induction, and encryption cycles Daniele Micciancio
2009/226 (PDF ) How to Hash into Elliptic Curves Thomas Icart
2009/225 (PDF ) The Security of Abreast-DM in the Ideal Cipher Model Jooyoung Lee, Daesung Kwon
2009/224 (PDF ) Pseudo-Cryptanalysis of Luffa Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
2009/223 (PDF ) How To Find Weak Input Differences For MD5 Collision Attacks Tao Xie, Dengguo Feng
2009/222 (PDF ) PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
2009/221 (PDF ) Boneh-Boyen signatures and the Strong Diffie-Hellman problem David Jao, Kayo Yoshida
2009/220 (PDF ) Signature Schemes with Bounded Leakage Resilience Jonathan Katz
2009/219 (PDF ) Strongly Secure Certificateless Key Agreement Georg Lippold, Colin Boyd, Juan González Nieto
2009/218 (PDF ) Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128 Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
2009/217 (PDF ) Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher Palash Sarkar
2009/216 (PDF ) Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher Palash Sarkar
2009/215 (PDF ) A Simple and Generic Construction of Authenticated Encryption With Associated Data Palash Sarkar
2009/214 (PDF ) An Optimally Fair Coin Toss Tal Moran, Moni Naor, Gil Segev
2009/213 (PDF ) Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion Richard Moloney, Gary McGuire, Michael Markowitz
2009/211 (PDF ) Bringing Zero-Knowledge Proofs of Knowledge to Practice Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
2009/210 (PDF ) Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2009/209 (PDF ) On Directed Transitive Signature Jia Xu, Ee-Chien Chang, Jianying Zhou
2009/208 (PDF ) PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS Rajesh P Singh, B. K. Sarma, A. Saikia
2009/206 (PDF ) On Optimized FPGA Implementations of the SHA-3 Candidate Groestl Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
2009/205 (PDF ) Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo
2009/204 (PDF ) GUC-Secure Join Operator in Distributed Relational Database TIAN Yuan
2009/203 (PDF ) Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
2009/202 (PDF ) A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES Alawi A. Al-Saggaf, Acharya H. S.
2009/201 (PDF ) Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128) Mohamed Abo El-Fotouh, Klaus Diepold
2009/200 (PDF ) A Survey on the Evolution of Cryptographic Protocols in ePassports Rishab Nithyanand
2009/199 (PDF ) Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers Emmanuel Bresson, Anne Canteaut, Benoit Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-Francois Misarsky, Maria Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-Rene Reinhard, Celine Thuillet, Marion Videau
2009/197 (PDF ) Practical pseudo-collisions for hash functions ARIRANG-224/384 Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
2009/196 (PDF ) Analysis of one quantum bit string commitment Zhengjun Cao
2009/195 (PDF ) Secure Evaluation of Private Linear Branching Programs with Medical Applications Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
2009/194 (PDF ) Analysis and Enhance of Anonymous Signcryption Scheme Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang
2009/193 (PDF ) Generalization of Barreto et al ID based Signcryption Scheme Sunder Lal, Prashant Kushwah
2009/192 (PDF ) Linkability of Blind Signature Schemes over Braid Groups Manoj Kumar
2009/191 (PDF ) New logic minimization techniques with applications to cryptology. Joan Boyar, Rene Peralta
2009/190 (PDF ) The discrete logarithm problem in the group of non-singular circulant matrices Ayan Mahalanobis
2009/189 (PDF ) Efficient Unidirectional Proxy Re-Encryption Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
2009/188 (PDF ) Breaking and Building of Group Inside Signature S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopinath, C. Pandu Rangan
2009/187 (PDF ) Compact McEliece Keys from Goppa Codes Rafael Misoczki, Paulo S. L. M. Barreto
2009/186 (PDF ) Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers Nicolas T. Courtois, Gregory V. Bard, Shaun V. Ault
2009/185 (PDF ) All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane
2009/184 (PDF ) Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
2009/183 (PDF ) Proactive Linear Integer Secret Sharing Rune Thorbek
2009/182 (PDF ) Extended Substitution Cipher Chaining mode (ESCC) Mohamed Abo El-Fotouh, Klaus Diepold
2009/181 (PDF ) PSP: Private and Secure Payment with RFID Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe
2009/180 (PDF ) Collaborative, Privacy-Preserving Data Aggregation at Scale Haakon Ringberg, Benny Applebaum, Michael J. Freedman, Matthew Caesar, Jennifer Rexford
2009/179 (PDF ) Near-Collision Attack on the Compression Function of Dynamic SHA2 Hongbo Yu, Xiaoyun Wang
2009/178 (PDF ) Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version) Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
2009/177 (PDF ) Salvaging Merkle-Damgard for Practical Applications Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
2009/176 (PDF ) A novel multi-server authentication protocol Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2009/175 (PDF ) Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper) Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
2009/174 (PDF ) Making the Diffie-Hellman Protocol Identity-Based Dario Fiore, Rosario Gennaro
2009/173 (PDF ) Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication Patrick Longa, Catherine Gebotys
2009/172 (PDF ) A new Protocol for 1-2 Oblivious Transfer Bjoern Grohmann
2009/171 (PDF ) On the Theory and Practice of Personal Digital Signatures Ivan Damgård, Gert Læssøe Mikkelsen
2009/170 (PDF ) Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/169 (PDF ) Floating Fault analysis of Trivium under Weaker Assumptions Hu Yupu, Gao Juntao, Liu Qing
2009/168 (PDF ) A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH) Michael A. Halcrow, Niels Ferguson
2009/167 (PDF ) A new approach for FCSRs François Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
2009/166 (PDF ) I shall love you up to the death Valerie Nachef, Jacques Patarin
2009/165 (PDF ) Securing RSA against Fault Analysis by Double Addition Chain Exponentiation Matthieu Rivain
2009/164 (PDF ) CCA-Secure Proxy Re-Encryption without Pairings Jun Shao, Zhenfu Cao
2009/163 (PDF ) A New Key-Agreement-Protocol Bjoern Grohmann
2009/162 (PDF ) Certificateless Hybrid Signcryption Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/161 (PDF ) Built-in Determined Sub-key Correlation Power Analysis Yuichi Komano, Hideo Shimizu, Shinichi Kawamura
2009/160 (PDF ) Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model Joel Alwen, Yevgeniy Dodis, Daniel Wichs
2009/159 (PDF ) Hardware Implementation of the SHA-3 Candidate Skein Stefan Tillich
2009/158 (PDF ) Security Analysis of a Proxy Signature Scheme over Braid Groups Manoj Kumar
2009/157 (PDF ) Efficient Halving for Genus 3 Curves over Binary Fields Peter Birkner, Nicolas Thériault
2009/156 (PDF ) A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution Anupam Pattanayak, B. Majhi
2009/155 (PDF ) Faster Computation of the Tate Pairing Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler
2009/154 (PDF ) Algorithms to solve massively under-defined systems of multivariate quadratic equations Yasufumi Hashimoto
2009/153 (PDF ) A new bound for t−wise almost universal hash functions Long Hoang Nguyen, A. W. Roscoe
2009/151 (PDF ) Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm Shaohua Zhang
2009/150 (PDF ) Efficient group authentication protocols based on human interaction Long Hoang Nguyen, A. W. Roscoe
2009/149 (PDF ) Secure EPC Gen2 compliant Radio Frequency Identification Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
2009/148 (PDF ) Secret Handshake: Strong Anonymity Definition and Construction Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
2009/147 (PDF ) Preimage Attack on ARIRANG Deukjo Hong, Woo-Hwan Kim, Bonwook Koo
2009/146 (PDF ) Transferable Constant-Size Fair E-Cash Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
2009/145 (PDF ) Security of Permutation-based Compression Function lp 231 Jooyoung Lee, Daesung Kwon
2009/144 (PDF ) On the security of Identity Based Ring Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/143 (PDF ) Multiple and Unlinkable Public Key Encryption without Certificates Soyoung Park, Sang-Ho Lee, Joohan Lee
2009/142 (PDF ) Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2009/141 (PDF ) Ideal Hierarchical Secret Sharing Schemes Oriol Farras, Carles Padro
2009/140 (PDF ) The Analysis of Galois Substitution Counter Mode (GSCM) Mohamed Abo El-Fotouh, Klaus Diepold
2009/139 (PDF ) Certificateless Group Oriented Signature Secure Against Key Replacement Attack Chunbo Ma, Jun Ao
2009/138 (PDF ) A Hybrid RFID Protocol against Tracking Attacks Jen-Chun Chang, Hsin-Lung Wu
2009/137 (PDF ) The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime Nicolas T. Courtois
2009/136 (PDF ) How to Extract and Expand Randomness: A Summary and Explanation of Existing Results Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
2009/135 (PDF ) Practical Key Recovery Attack against Secret-prefix Edon-R Gaëtan Leurent
2009/134 (PDF ) A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity Yindong Chen, Peizhong Lu
2009/131 (PDF ) Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited Anupam Pattanayak, B. Majhi
2009/130 (PDF ) Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity Yindong Chen, Peizhong Lu
2009/129 (PDF ) Faster and Timing-Attack Resistant AES-GCM Emilia Kasper, Peter Schwabe
2009/128 (PDF ) Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao, Gregory G. Rose
2009/127 (PDF ) Side Channel Cube Attacks on Block Ciphers Itai Dinur, Adi Shamir
2009/126 (PDF ) Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems Siamak F Shahandashti, Reihaneh Safavi-Naini
2009/125 (PDF ) A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki
2009/124 (PDF ) Practical Secure Evaluation of Semi-Private Functions Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
2009/123 (PDF ) On the Complexity of Integer Factorization N. A. Carella
2009/122 (PDF ) Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/120 (PDF ) On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R Danilo Gligoroski, Rune Steinsmo Ødegård
2009/119 (PDF ) A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate Marcel Medwed
2009/118 (PDF ) A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control Jin Li, Kui Ren, Kwangjo Kim
2009/117 (PDF ) Changing probabilities of differentials and linear sums via isomorphisms of ciphers Alexander Rostovtsev
2009/116 (PDF ) Information Theoretically Secure Multi Party Set Intersection Re-Visited Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/115 (PDF ) Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan
2009/114 (PDF ) Weakness of Key Predistribution Scheme Proposed by J. Dong et al. Anupam Pattanayak, B. Majhi
2009/113 (PDF ) Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform Niels Ferguson, Stefan Lucks
2009/112 (PDF ) A 2nd-Preimage Attack on AURORA-512 Yu Sasaki
2009/111 (PDF ) Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
2009/110 (PDF ) On the Security of Stream Cipher CryptMT v3 Haina Zhang, Xiaoyun Wang
2009/109 (PDF ) Cryptanalysis of Stream Cipher Grain Family Haina Zhang, Xiaoyun Wang
2009/108 (PDF ) Further Results on Implicit Factoring in Polynomial Time Santanu Sarkar, Subhamoy Maitra
2009/107 (PDF ) Compact E-Cash and Simulatable VRFs Revisited Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2009/106 (PDF ) A Collision Attack on AURORA-512 Yu Sasaki
2009/105 (PDF ) Public-Key Cryptosystems Resilient to Key Leakage Moni Naor, Gil Segev
2009/104 (PDF ) 1024 - A High Security Software Oriented Block Cipher Dieter Schmidt
2009/103 (PDF ) Constructing pairing-friendly hyperelliptic curves using Weil restriction David Mandell Freeman, Takakazu Satoh
2009/102 (PDF ) A Step Towards QC Blind Signatures Raphael Overbeck
2009/101 (PDF ) Encryption Schemes Secure under Selective Opening Attack Mihir Bellare, Scott Yilek
2009/100 (PDF ) Computing the endomorphism ring of an ordinary elliptic curve over a finite field Gaetan Bisson, Andrew V. Sutherland
2009/099 (PDF ) A Single Initialization Server for Multi-Party Cryptography Hugue Blier, Alain Tapp
2009/098 (PDF ) Attacking Cryptographic Schemes Based on "Perturbation Polynomials" Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz
2009/097 (PDF ) Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures Brian J. Matt
2009/096 (PDF ) A note on the security of MST3 M. I. Gonzalez Vasco, A. L. Perez del Pozo, P. Taborda Duarte
2009/095 (PDF ) Enhanced Privacy ID from Bilinear Pairing Ernie Brickell, Jiangtao Li
2009/094 (PDF ) On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
2009/093 (PDF ) Cascade Encryption Revisited Peter Gazi, Ueli Maurer
2009/092 (PDF ) Reducing RFID Reader Load with the Meet-in-the-Middle Strategy Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
2009/091 (PDF ) Knapsack Cryptosystem on Elliptic Curves Koichiro Noro, Kunikatsu Kobayashi
2009/090 (PDF ) A Brief History of Provably-Secure Public-Key Encryption Alexander W. Dent
2009/089 (PDF ) A Provably Secure And Efficient Countermeasure Against Timing Attacks Boris Köpf, Markus Dürmuth
2009/088 (PDF ) Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud
2009/086 (PDF ) Point Compression for Koblitz Elliptic Curves P. N. J. Eagle, Steven D. Galbraith, John Ong
2009/085 (PDF ) UC-Secure Source Routing Protocol Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li
2009/084 (PDF ) Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme Mihir Bellare, Thomas Ristenpart
2009/083 (PDF ) Multi-authority attribute based encryption with honest-but-curious central authority Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktoria I. Villanyi
2009/082 (PDF ) The Case for Quantum Key Distribution Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
2009/081 (PDF ) Ensuring Data Storage Security in Cloud Computing Cong Wang, Qian Wang, Kui Ren, Wenjing Lou
2009/080 (PDF ) CoSP: A General Framework For Computational Soundness Proofs Michael Backes, Dennis Hofheinz, Dominique Unruh
2009/079 (PDF ) From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries David Basin, Cas Cremers
2009/078 (PDF ) Attacks on the DECT authentication mechanisms Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
2009/077 (PDF ) On the Security of Iterated Hashing based on Forgery-resistant Compression Functions Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux
2009/076 (PDF ) Construction of large families of pseudorandom subsets using elliptic curves Zhixiong Chen, Chenhuang Wu
2009/075 (PDF ) Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/074 (PDF ) Computational Oblivious Transfer and Interactive Hashing Kirill Morozov, George Savvides
2009/073 (PDF ) Automatic Approach of Provable Security and its Application for OAEP+ GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
2009/072 (PDF ) Implementing cryptographic pairings: a magma tutorial Luis J Dominguez Perez, Ezekiel J Kachisa, Michael Scott
2009/071 (PDF ) Secret sharing on trees: problem solved Laszlo Csirmaz, Gabor Tardos
2009/070 (PDF ) Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis Omran Ahmadi, Francisco Rodríguez-Henriquez
2009/069 (PDF ) Optimistic Fair Exchange with Multiple Arbiters Alptekin Kupcu, Anna Lysyanskaya
2009/068 (PDF ) Overview of Turbo-Code Reconstruction Techniques Johann Barbier, Eric Filiol
2009/067 (PDF ) On fractional correlation immunity of majority functions Chuan-Kun Wu
2009/066 (PDF ) Adaptive Preimage Resistance and Permutation-based Hash Functions Jooyoung Lee, Je Hong Park
2009/065 (PDF ) Foundations of Non-Malleable Hash and One-Way Functions Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
2009/064 (PDF ) On the Data Complexity of Statistical Attacks Against Block Ciphers (full version) Céline Blondeau, Benoît Gérard
2009/063 (PDF ) CCZ-equivalence and Boolean functions Lilya Budaghyan, Claude Carlet
2009/062 (PDF ) On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring Subhamoy Maitra, Santanu Sarkar
2009/061 (PDF ) Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko
2009/060 (PDF ) Comparing Two Pairing-Based Aggregate Signature Schemes Sanjit Chatterjee, Darrel Hankerson, Edward Knapp, Alfred Menezes
2009/059 (PDF ) On the impossibility of graph secret sharing Laszlo Csirmaz
2009/058 (PDF ) On Generalization of Cheon's Algorithm Takakazu Satoh
2009/057 (PDF ) Anonymity in Shared Symmetric Key Primitives Gregory M. Zaverucha, Douglas R. Stinson
2009/056 (PDF ) Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rainer Leupers, Rudolf Mathar, Heinrich Meyr
2009/055 (PDF ) Universally Composable Symmetric Encryption Ralf Kuesters, Max Tuengerthal
2009/054 (PDF ) On the Security of Tandem-DM Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/053 (PDF ) New commutative semifields defined by PN multinomials Lilya Budaghyan, Tor Helleseth
2009/052 (PDF ) ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2009/051 (PDF ) Enhanced Target Collision Resistant Hash Functions Revisited Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/050 (PDF ) On the Portability of Generalized Schnorr Proofs Jan Camenisch, Aggelos Kiayias, Moti Yung
2009/049 (PDF ) Extensions of the Cube Attack based on Low Degree Annihilators Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei, Josef Pieprzyk
2009/048 (PDF ) A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials Palash Sarkar
2009/047 (PDF ) On Approximating Addition by Exclusive OR Palash Sarkar
2009/046 (PDF ) Traceability Codes Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2009/045 (PDF ) Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Carmit Hazay, Yehuda Lindell
2009/044 (PDF ) Un-Trusted-HB: Security Vulnerabilities of Trusted-HB Dmitry Frumkin, Adi Shamir
2009/043 (PDF ) Image Encryption by Pixel Property Separation Karthik Chandrashekar Iyer, Aravinda Subramanya
2009/042 (PDF ) On CCZ-equivalence and its use in secondary constructions of bent functions Lilya Budaghyan, Claude Carlet
2009/041 (PDF ) Proofs of Retrievability via Hardness Amplification Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
2009/040 (PDF ) How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/039 (PDF ) Key Insulation and Intrusion Resilience Over a Public Channel Mihir Bellare, Shanshan Duan, Adriana Palacio
2009/038 (PDF ) On Algebraic Relations of Serpent S-Boxes Bhupendra Singh, Lexy Alexander, Sanjay Burman
2009/037 (PDF ) Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice) M. Jason Hinek, Charles C. Y. Lam
2009/036 (PDF ) Constructions of Truly Practical Secure Protocols using Standard Smartcards Carmit Hazay, Yehuda Lindell
2009/035 (PDF ) Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim
2009/034 (PDF ) On a Conditional Collision Attack on NaSHA-512 S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski
2009/033 (PDF ) NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract) Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
2009/032 (PDF ) A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor MITSUNARI Shigeo
2009/031 (PDF ) Adaptively Secure Two-Party Computation with Erasures Yehuda Lindell
2009/030 (PDF ) An efficient fuzzy extractor for limited noise B. Skoric, P. Tuyls
2009/029 (PDF ) Nofish - A new stream cipher Marius Oliver Gheorghita
2009/028 (PDF ) Realizing Hash-and-Sign Signatures under Standard Assumptions Susan Hohenberger, Brent Waters
2009/027 (PDF ) Security of Verifiably Encrypted Signatures Markus Rückert, Dominique Schröder
2009/026 (PDF ) Collision Attacks on NaSHA-384/512 Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
2009/025 (PDF ) Short Redactable Signatures Using Random Trees Ee-Chien Chang, Chee Liang Lim, Jia Xu
2009/024 (PDF ) On Second-Order Fault Analysis Resistance for CRT-RSA Implementations Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
2009/023 (PDF ) Polynomial Runtime and Composability Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
2009/022 (PDF ) Correctness of Li Generalization of RSA Cryptosystem Roman Popovych
2009/021 (PDF ) Comparing With RSA Julien Cathalo, David Naccache, Jean-Jacques Quisquater
2009/020 (PDF ) Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
2009/019 (PDF ) Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark Gondree, Payman Mohassel
2009/018 (PDF ) Huge 2ndpreimages and collisions of khichidi-1 prasanth Kumar Thandra, S. A. V. Satya Murty
2009/017 (PDF ) Anonymous signature scheme Chunbo Ma, Jun Ao
2009/016 (PDF ) Fast elliptic-curve cryptography on the Cell Broadband Engine Neil Costigan, Peter Schwabe
2009/015 (PDF ) Cube Attacks on Trivium S S Bedi, N Rajesh Pillai
2009/014 (PDF ) Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
2009/013 (PDF ) Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 Yehuda Lindell
2009/012 (PDF ) Avoid Mask Re-use in Masked Galois Multipliers D. Canright
2009/011 (PDF ) A Very Compact "Perfectly Masked" S-Box for AES (corrected) D. Canright, Lejla Batina
2009/010 (PDF ) Optimal Multicast Group Communication Zhibin Zhou, Dijiang Huang
2009/009 (PDF ) Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy Christoph Lucas, Dominik Raub, Ueli Maurer
2009/008 (PDF ) A note on Agrawal conjecture Roman Popovych
2009/007 (PDF ) Homomorphic Trapdoor Commitments to Group Elements Jens Groth
2009/006 (PDF ) Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n Vlastimil Klima
2009/005 (PDF ) Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES Wei Wang, Xiaoyun Wang, Guangwu Xu
2009/003 (PDF ) Separating two roles of hashing in one-way message authentication L. H. Nguyen, A. W. Roscoe
2009/002 (PDF ) Thermocommunication Julien Brouchier, Nora Dabbous, Tom Kean, Carol Marsh, David Naccache
2009/001 (PDF ) A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem Brian Baldwin, Richard Moloney, Andrew Byrne, Gary McGuire, William P. Marnane
2008/545 (PDF ) Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal, Amit Sahai
2008/544 (PDF ) Comments on two multi-server authentication protocols Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2008/543 (PDF ) Odd-Char Multivariate Hidden Field Equations Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang
2008/542 (PDF ) Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
2008/541 (PDF ) Resettably-Sound Resettable Zero Knowledge Arguments for NP Yi Deng
2008/540 (PDF ) New Impossible Differential Attacks on AES Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
2008/539 (PDF ) An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
2008/538 (PDF ) Supporting Non-membership Proofs with Bilinear-map Accumulators Ivan Damgård, Nikos Triandopoulos
2008/537 (PDF ) A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai
2008/536 (PDF ) Predicate Privacy in Encryption Systems Emily Shen, Elaine Shi, Brent Waters
2008/535 (PDF ) A Recursive Threshold Visual Cryptography Scheme Abhishek Parakh, Subhash Kak
2008/534 (PDF ) Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
2008/533 (PDF ) Collusion-Free Multiparty Computation in the Mediated Model Jonathan Katz, Yehuda Lindell
2008/532 (PDF ) Semi-free start collision attack on Blender Xu Liangyu, Li Ji
2008/531 (PDF ) Collision Attack on the Waterfall Hash Function Scott Fluhrer
2008/530 (PDF ) Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/529 (PDF ) A Hardware Interface for Hashing Algorithms Zhimin Chen, Sergey Morozov, Patrick Schaumont
2008/528 (PDF ) Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures Georg Fuchsbauer, David Pointcheval
2008/527 (PDF ) Properties of Cryptographic Hash Functions Michal Rjaško
2008/526 (PDF ) Novel Precomputation Schemes for Elliptic Curve Cryptosystems Patrick Longa, Catherine Gebotys
2008/525 (PDF ) On The Diffie-Hellman Assumption R. Bhaskar, K. Chandrasekaran, S. Lokam, P. L. Montgomery, R. Venkatesan, Y. Yacobi
2008/524 (PDF ) Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li Hongda, Feng dengguo, Li Bao, Xue Haixia
2008/522 (PDF ) Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2008/521 (PDF ) Generating Shorter Bases for Hard Random Lattices Joel Alwen, Chris Peikert
2008/520 (PDF ) Cryptanalysis of the Hash Function LUX-256 Shuang Wu, Dengguo Feng, Wenling Wu
2008/519 (PDF ) Collision attack on NaSHA-512 Li Ji, Xu Liangyu, Guan Xu
2008/517 (PDF ) Improving the Rules of the DPA Contest Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon
2008/516 (PDF ) Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang
2008/515 (PDF ) Cryptanalysis of RadioGatun Thomas Fuhr, Thomas Peyrin
2008/514 (PDF ) Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai, Stanislav Bulygin
2008/513 (PDF ) Improved Cryptanalysis of SHAMATA-BC Adem Atalay, Orhun Kara, Ferhat Karakoç
2008/512 (PDF ) A new class of Bent functions in Polynomial Forms Sihem Mesnager
2008/511 (PDF ) Classification of the SHA-3 Candidates Ewan Fleischmann, Christian Forler, Michael Gorski
2008/510 (PDF ) Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger, Hovav Shacham
2008/509 (PDF ) Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang
2008/508 (PDF ) Some Formal Solutions in Side-channel Cryptanalysis - An Introduction Fabrice J. P. R. Pautot
2008/507 (PDF ) A non-delegatable identity-based strong designated verifier signature scheme Bin Wang
2008/506 (PDF ) Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/505 (PDF ) --Withdrawn-- removed
2008/504 (PDF ) The $n^c$-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky
2008/503 (PDF ) Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis, Daniel Wichs
2008/502 (PDF ) Extended Access Structures and Their Cryptographic Applications Vanesa Daza, Javier Herranz, Paz Morillo, Carla Rafols
2008/501 (PDF ) Some Observations on SHAMATA Ewan Fleischmann, Michael Gorski
2008/500 (PDF ) Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang, Zhenfu Cao
2008/499 (PDF ) Some Observations on HC-128 Subhamoy Maitra, Goutam Paul, Shashwat Raizada
2008/498 (PDF ) Small Odd Prime Field Multivariate PKCs Anna Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Kuo, Frost Li, Bo-Yin Yang
2008/497 (PDF ) On the Correctness of An Approach Against Side-channel attacks Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
2008/496 (PDF ) Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Debra L. Cook, Moti Yung, Angelos Keromytis
2008/495 (PDF ) Non-Malleable Obfuscation Ran Canetti, Mayank Varia
2008/494 (PDF ) Key Agreement from Close Secrets over Unsecured Channels Bhavana Kanukurthi, Leonid Reyzin
2008/493 (PDF ) Secure Parameters for SWIFFT Johannes Buchmann, Richard Lindner
2008/492 (PDF ) Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2008/491 (PDF ) A CM construction for curves of genus 2 with p-rank 1 Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, Marco Streng
2008/490 (PDF ) On the final exponentiation for calculating pairings on ordinary elliptic curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/489 (PDF ) HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers, Ari Juels, Alina Oprea
2008/488 (PDF ) Efficient Rational Secret Sharing in Standard Communication Networks Georg Fuchsbauer, Jonathan Katz, David Naccache
2008/487 (PDF ) Secure Certificateless Public Key Encryption without Redundancy Yinxia Sun, Futai Zhang
2008/486 (PDF ) Inside the Hypercube Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
2008/484 (PDF ) Sharp lower bounds on the extractable randomness from non-uniform sources Boris Skoric, Chibuzo Obi, Evgeny Verbitskiy, Berry Schoenmakers
2008/483 (PDF ) Sharing DSS by the Chinese Remainder Theorem Kamer Kaya, Ali Aydın Selçuk
2008/482 (PDF ) The Generic Hardness of Subset Membership Problems under the Factoring Assumption Tibor Jager, Jörg Schwenk
2008/481 (PDF ) Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem Chris Peikert
2008/480 (PDF ) ECM on Graphics Cards Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
2008/479 (PDF ) Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
2008/478 (PDF ) Attribute-Based Encryption with Key Cloning Protection M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti
2008/477 (PDF ) On a New Formal Proof Model for RFID Location Privacy (Extended Version) Ton van Deursen, Sasa Radomirovic
2008/476 (PDF ) The $F_f$-Family of Protocols for RFID-Privacy and Authentication Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa
2008/475 (PDF ) Sphinx: A Compact and Provably Secure Mix Format George Danezis, Ian Goldberg
2008/474 (PDF ) Access Controls for Oblivious and Anonymous Systems Scott Coull, Matthew Green, Susan Hohenberger
2008/473 (PDF ) Exploring Cipherspace: Combining stream ciphers and block ciphers Sandy Harris
2008/472 (PDF ) Practical attacks against WEP and WPA Martin Beck, Erik Tews
2008/471 (PDF ) Automatic Generation of Sound Zero-Knowledge Protocols Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2008/470 (PDF ) From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol Paolo D'Arco, Alfredo De Santis
2008/469 (PDF ) Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1 Stephane Manuel
2008/468 (PDF ) A CCA2 Secure Variant of the McEliece Cryptosystem Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/467 (PDF ) Cryptanalysis of EnRUPT Dmitry Khovratovich, Ivica Nikolic
2008/466 (PDF ) Combined (identity-based) public key schemes Maria Isabel Gonzalez Vasco, Florian Hess, Rainer Steinwandt
2008/465 (PDF ) Secure Arithmetic Computation with No Honest Majority Yuval Ishai, Manoj Prabhakaran, Amit Sahai
2008/464 (PDF ) Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication Michael Kounavis, Shay Gueron
2008/463 (PDF ) Key-Private Proxy Re-Encryption Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
2008/462 (PDF ) Unconditionally Secure Multiparty Set Intersection Re-Visited Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/460 (PDF ) Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
2008/459 (PDF ) A variant of Wiener's attack on RSA Andrej Dujella
2008/458 (PDF ) Complete Fairness in Multi-Party Computation Without an Honest Majority S. Dov Gordon, Jonathan Katz
2008/457 (PDF ) On the Composability of Statistically Secure Bit Commitments Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/456 (PDF ) The Diffie-Hellman problem and generalization of Verheul's theorem Dustin Moody
2008/455 (PDF ) New hash function designs Igor Semaev
2008/454 (PDF ) Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2008/453 (PDF ) Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification Ahmad-Reza Sadeghi, Thomas Schneider
2008/451 (PDF ) Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
2008/450 (PDF ) On the Security of Fully Collusion Resistant Traitor Tracing Schemes Yongdong WU, Robert H. Deng
2008/449 (PDF ) A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
2008/448 (PDF ) Authenticated Adversarial Routing Yair Amir, Paul Bunn, Rafail Ostrovsky
2008/447 (PDF ) Divisible On-line/Off-line Signatures Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
2008/446 (PDF ) Secure Random Key Pre-Distribution Against Semi-Honest Adversaries Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban
2008/445 (PDF ) Cryptanalysis of the Improved Cellular Message Encryption Algorithm Thomas Chardin, Raphaël Marinier
2008/444 (PDF ) Elliptic divisibility sequences and the elliptic curve discrete logarithm problem Rachel Shipsey, Christine Swart
2008/443 (PDF ) Key differentiation attacks on stream ciphers Enes Pasalic
2008/442 (PDF ) Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography Anton Kargl, Stefan Pyka, Hermann Seuschek
2008/441 (PDF ) How Risky is the Random-Oracle Model? Gaetan Leurent, Phong Q. Nguyen
2008/440 (PDF ) Robust Encryption Michel Abdalla, Mihir Bellare, Gregory Neven
2008/439 (PDF ) Linear equivalence between elliptic curves in Weierstrass and Hesse form Alexander Rostovtsev
2008/438 (PDF ) New Related-Key Boomerang Attacks on AES Michael Gorski, Stefan Lucks
2008/437 (PDF ) Divisibility, Smoothness and Cryptographic Applications David Naccache, Igor Shparlinski
2008/435 (PDF ) Obtaining and solving systems of equations in key variables only for the small variants of AES Stanislav Bulygin, Michael Brickenstein
2008/434 (PDF ) The computational SLR: a logic for reasoning about computational indistinguishability Yu Zhang
2008/433 (PDF ) On differences of quadratic residues Guillermo Morales-Luna
2008/432 (PDF ) Dynamic Provable Data Possession C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia
2008/431 (PDF ) Usable Optimistic Fair Exchange Alptekin Kupcu, Anna Lysyanskaya
2008/430 (PDF ) Cryptographic Protocol Composition via the Authentication Tests Joshua D. Guttman
2008/429 (PDF ) Public-Key Encryption with Efficient Amortized Updates Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
2008/428 (PDF ) Delegatable Anonymous Credentials Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
2008/427 (PDF ) LEGO for Two Party Secure Computation Jesper Buus Nielsen, Claudio Orlandi
2008/426 (PDF ) On Kasami Bent Functions Deepmala Sharma, Sugata Gangopadhyay
2008/425 (PDF ) Efficient Asynchronous Multiparty Computation with Optimal Resilience Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/424 (PDF ) Asynchronous Byzantine Agreement with Optimal Resilience Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/423 (PDF ) Searchable encryption with decryption in the standard model Dennis Hofheinz, Enav Weinreb
2008/422 (PDF ) A New Approach for Algebraically Homomorphic Encryption Frederik Armknecht, Ahmad-Reza Sadeghi
2008/421 (PDF ) Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme Kaoru Kurosawa, Kazuhiro Suzuki
2008/420 (PDF ) Oblivious Transfer from Weak Noisy Channels Jürg Wullschleger
2008/419 (PDF ) Parsing ambiguities in authentication and key establishment protocols Liqun Chen, Chris J. Mitchell
2008/418 (PDF ) Privacy-Enhancing First-Price Auctions Using Rational Cryptography Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2008/417 (PDF ) On the security of pairing-friendly abelian varieties over non-prime fields Naomi Benger, Manuel Charlemagne, David Freeman
2008/416 (PDF ) Almost-Asynchronous MPC with Faulty Minority Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
2008/415 (PDF ) Asynchronous Multiparty Computation: Theory and Implementation Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
2008/414 (PDF ) On the Number of Synchronous Rounds Required for Byzantine Agreement Matthias Fitzi, Jesper Buus Nielsen
2008/413 (PDF ) Password Mistyping in Two-Factor-Authenticated Key Exchange Vladimir Kolesnikov, Charles Rackoff
2008/412 (PDF ) Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2008/411 (PDF ) Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen
2008/410 (PDF ) On the Role of PKG for Proxy Re-encryption in Identity Based Setting Xu an Wang, Xiaoyuan Yang, Fagen Li
2008/409 (PDF ) A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
2008/408 (PDF ) The Enigmatique Toolkit Christopher Billings
2008/407 (PDF ) Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/406 (PDF ) An asymptotically optimal RFID protocol against relay attacks Gildas Avoine, Aslan Tchamkerten
2008/405 (PDF ) Slid Pairs in Salsa20 and Trivium Deike Priemuth-Schmid, Alex Biryukov
2008/404 (PDF ) Pairing with Supersingular Trace Zero Varieties Revisited Emanuele Cesena
2008/403 (PDF ) SPICE Simulation of a "Provably Secure" True Random Number Generator Markus Dichtl, Bernd Meyer, Hermann Seuschek
2008/402 (PDF ) Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère, Ludovic Perret
2008/401 (PDF ) Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC Mridul Nandi
2008/400 (PDF ) Comments on two password based protocols Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou
2008/399 (PDF ) Round Efficient Unconditionally Secure Multiparty Computation Protocol Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/398 (PDF ) Generating genus two hyperelliptic curves over large characteristic finite fields Takakazu Satoh
2008/396 (PDF ) Analysis of RC4 and Proposal of Additional Layers for Better Security Margin Subhamoy Maitra, Goutam Paul
2008/395 (PDF ) New Applications of Differential Bounds of the SDS Structure Jiali Choy, Khoongming Khoo
2008/394 (PDF ) Attribute-Based Ring Signatures Jin Li, Kwangjo Kim
2008/393 (PDF ) How Far Must You See To Hear Reliably Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli
2008/392 (PDF ) GUC-Secure Set-Intersection Computation TIAN Yuan, WANG Ying
2008/391 (PDF ) Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? Tao Xie, FanBao Liu, DengGuo Feng
2008/390 (PDF ) Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes
2008/389 (PDF ) Optimal Subset-Difference Broadcast Encryption with Free Riders Murat Ak, Kamer Kaya, Ali Aydin Selcuk
2008/388 (PDF ) Double-Base Number System for Multi-Scalar Multiplications Christophe Doche, David R. Kohel, Francesco Sica
2008/386 (PDF ) Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table Michael Lifliand
2008/385 (PDF ) Cube Attacks on Tweakable Black Box Polynomials Itai Dinur, Adi Shamir
2008/384 (PDF ) Improving the Boneh-Franklin Traitor Tracing Scheme Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
2008/383 (PDF ) Hierarchical Identity Based Encryption with Polynomially Many Levels Craig Gentry, Shai Halevi
2008/382 (PDF ) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
2008/381 (PDF ) New AES software speed records Daniel J. Bernstein, Peter Schwabe
2008/380 (PDF ) Dynamic Threshold Cryptosystem without Group Manager Andreas Noack, Stefan Spitz
2008/379 (PDF ) A Characterization of Chameleon Hash Functions and New, Efficient Designs Mihir Bellare, Todor Ristov
2008/378 (PDF ) Additively Homomorphic Encryption with d-Operand Multiplications Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
2008/377 (PDF ) TRIVIUM's output partially autocancels Michael Vielhaber
2008/376 (PDF ) Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol Cas J. F. Cremers
2008/375 (PDF ) A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks Jan Camenisch, Nishanth Chandran, Victor Shoup
2008/374 (PDF ) Chosen Ciphertext Security with Optimal Ciphertext Overhead Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
2008/373 (PDF ) Analysis and Improvement of Authenticatable Ring Signcryption Scheme Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2008/372 (PDF ) Enumeration of Balanced Symmetric Functions over GF(p) Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
2008/371 (PDF ) Unconditionally Reliable Message Transmission in Directed Hypergraphs Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/370 (PDF ) Compartmented Threshold RSA Based on the Chinese Remainder Theorem Sorin Iftene, Stefan Ciobaca, Manuela Grindei
2008/369 (PDF ) New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers Shahram Khazaei, Willi Meier
2008/368 (PDF ) Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting Varad Kirtane, C. Pandu Rangan
2008/367 (PDF ) Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library Peeter Laud, Long Ngo
2008/366 (PDF ) Unique Shortest Vector Problem for max norm is NP-hard Than Quang Khoat, Nguyen Hong Tan
2008/365 (PDF ) Entropy Bounds for Traffic Confirmation Luke O'Connor
2008/364 (PDF ) Zcipher Algorithm Specification Ilya O Levin
2008/363 (PDF ) An argument for Hamiltonicity Vadym Fedyukovych
2008/362 (PDF ) The Cost of False Alarms in Hellman and Rainbow Tradeoffs Jin Hong
2008/360 (PDF ) An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES) Saurabh Dutta, Jyotsna Kumar mandal
2008/359 (PDF ) Argument of knowledge of a bounded error Vadym Fedyukovych
2008/358 (PDF ) History-Independent Cuckoo Hashing Moni Naor, Gil Segev, Udi Wieder
2008/357 (PDF ) A protocol for K-multiple substring matching Vadym Fedyukovych, Vitaliy Sharapov
2008/356 (PDF ) Using Commutative Encryption to Share a Secret Saied Hosseini Khayat
2008/355 (PDF ) An argument for rank metric Vadym Fedyukovych
2008/353 (PDF ) Weaknesses in HENKOS Stream Cipher Prasanth Kumar Thandra, S. A. V. Satya Murty, R Balasubramanian
2008/352 (PDF ) On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles Alexandra Boldyreva, Serge Fehr, Adam O'Neill
2008/351 (PDF ) Flaws in Some Self-Healing Key Distribution Schemes with Revocation Vanesa Daza, Javier Herranz, German Saez
2008/350 (PDF ) Higher Order Differential Cryptanalysis of Multivariate Hash Functions Yiyuan Luo, Xuejia Lai
2008/349 (PDF ) Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
2008/348 (PDF ) Iterative Probabilistic Reconstruction of RC4 Internal States Jovan Golic, Guglielmo Morgari
2008/347 (PDF ) Information Leakage in Optimal Anonymized and Diversified Data Chengfang Fang, Ee-Chien Chang
2008/346 (PDF ) Remote Integrity Check with Dishonest Storage Server Ee-Chien Chang, Jia Xu
2008/345 (PDF ) An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction Jooyoung Lee, Choon Sik Park
2008/344 (PDF ) Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption Jooyoung Lee, Je Hong Park
2008/343 (PDF ) Efficient RFID authentication protocols based on pseudorandom sequence generators Jooyoung Lee, Yongjin Yeom
2008/342 (PDF ) Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran
2008/341 (PDF ) An Efficient Identity-Based Signcryption Scheme for Multiple Receivers S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/339 (PDF ) High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog
2008/338 (PDF ) An improvement of discrete Tardos fingerprinting codes Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai
2008/337 (PDF ) Modified Huang-Wang's Convertible Nominative Signature Scheme Wei Zhao, Dingfeng Ye
2008/336 (PDF ) New attacks on ISO key establishment protocols Anish Mathuria, G. Sriram
2008/335 (PDF ) Public Key Cryptography from Different Assumptions Boaz Barak, Avi Wigderson
2008/334 (PDF ) Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields Darrel Hankerson, Koray Karabina, Alfred Menezes
2008/333 (PDF ) Explicit hard instances of the shortest vector problem Johannes Buchmann, Richard Lindner, Markus Rückert, Michael Schneider
2008/332 (PDF ) Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications Mahalingam Ramkumar
2008/331 (PDF ) A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar
2008/329 (PDF ) SMS4 Encryption Algorithm for Wireless Networks Whitfield Diffie, George Ledin (translators)
2008/328 (PDF ) Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance Hemanta Maji, Manoj Prabhakaran, Mike Rosulek
2008/327 (PDF ) Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption Le Trieu Phong, Wakaha Ogata
2008/326 (PDF ) Two attacks on a sensor network key distribution scheme of Cheng and Agrawal M. B. Paterson, D. R. Stinson
2008/325 (PDF ) Revisit of Group-based Unidirectional Proxy Re-encryption Scheme Chunbo Ma, Jun Ao
2008/324 (PDF ) RSA-TBOS Signcryption with Proxy Re-encryption. Varad Kirtane, C. Pandu Rangan
2008/323 (PDF ) A new identity based proxy signature scheme Bin Wang
2008/322 (PDF ) Lattice-based Blind Signatures Markus Rückert
2008/321 (PDF ) A correction to ``Efficient and Secure Comparison for On-Line Auctions'' Ivan Damgård, Martin Geisler, Mikkel Krøigaard
2008/320 (PDF ) Public Key Block Cipher Based on Multivariate Quadratic Quasigroups Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
2008/319 (PDF ) Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov, Marc Vauclair
2008/318 (PDF ) Attacking and defending the McEliece cryptosystem Daniel J. Bernstein, Tanja Lange, Christiane Peters
2008/316 (PDF ) Signing a Linear Subspace: Signature Schemes for Network Coding Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
2008/315 (PDF ) RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar
2008/314 (PDF ) Scratch, Click & Vote: E2E voting over the Internet Miroslaw Kutylowski, Filip Zagorski
2008/313 (PDF ) A new almost perfect nonlinear function which is not quadratic Yves Edel, Alexander Pott
2008/312 (PDF ) Improved efficiency of Kiltz07-KEM Xianhui Lu, Xuejia Lai, Dake He
2008/311 (PDF ) Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers Orr Dunkelman, Nathan Keller
2008/310 (PDF ) Attacks on RFID Protocols T. van Deursen, S. Radomirovic
2008/309 (PDF ) Revocation Systems with Very Small Private Keys Allison Lewko, Amit Sahai, Brent Waters
2008/308 (PDF ) Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
2008/307 (PDF ) Full Security:Fuzzy Identity Based Encryption Liming Fang, Jinyue Xia
2008/306 (PDF ) Combinatorial batch codes M. B. Paterson, D. R. Stinson, R. Wei
2008/305 (PDF ) Identity-Based Directed Signature Scheme from Bilinear Pairings Xun Sun, Jian-hua Li, Gong-liang Chen, Shu-tang Yang
2008/304 (PDF ) A New Randomness Extraction Paradigm for Hybrid Encryption Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
2008/303 (PDF ) Complete Fairness in Secure Two-Party Computation S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
2008/302 (PDF ) Secure Biometric Authentication With Improved Accuracy M. Barbosa, S. Cauchie, T. Brouard, S. Melo de Sousa
2008/301 (PDF ) Accountability of Perfect Concurrent Signature Yunfeng Li, Dake He, Xianhui Lu
2008/300 (PDF ) Cheon's algorithm, pairing inversion and the discrete logarithm problem David J. Mireles Morales
2008/299 (PDF ) An analysis of the infrastructure in real function fields David J. Mireles Morales
2008/298 (PDF ) Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii
2008/297 (PDF ) Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme Hongzhen Du, Qiaoyan Wen
2008/296 (PDF ) Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
2008/295 (PDF ) Foundations of Group Key Management – Framework, Security Model and a Generic Construction Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/294 (PDF ) A New Message Recognition Protocol for Ad Hoc Pervasive Networks Atefeh Mashatan, Douglas R. Stinson
2008/293 (PDF ) Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
2008/292 (PDF ) Another approach to pairing computation in Edwards coordinates Sorina Ionica, Antoine Joux
2008/291 (PDF ) How to Protect Yourself without Perfect Shredding Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim
2008/290 (PDF ) Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters
2008/289 (PDF ) Sharemind: a framework for fast privacy-preserving computations Dan Bogdanov, Sven Laur, Jan Willemson
2008/288 (PDF ) How to Launch A Birthday Attack Against DES Zhengjun Cao
2008/287 (PDF ) Authenticated Byzantine Generals in Dual Failure Model Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
2008/286 (PDF ) One-Up Problem for (EC)DSA Daniel R. L. Brown
2008/285 (PDF ) Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography Jithra Adikari, Vassil Dimitrov, Laurent Imbert
2008/284 (PDF ) Breaking the Akiyama-Goto cryptosystem P. Ivanov, J. F. Voloch
2008/283 (PDF ) Attacks on Singelee and Preneel's protocol Jorge Munilla, Alberto Peinado
2008/282 (PDF ) Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks Jihye Kim, Gene Tsudik
2008/281 (PDF ) Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher Taehyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung
2008/280 (PDF ) FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
2008/279 (PDF ) Delegating Capabilities in Predicate Encryption Systems Elaine Shi, Brent Waters
2008/278 (PDF ) An Improved Robust Fuzzy Extractor Bhavana Kanukurthi, Leonid Reyzin
2008/277 (PDF ) A strategy for any DAA Issuer and an additional verification by a Host Vadym Fedyukovych
2008/276 (PDF ) Signcryption with Proxy Re-encryption Chandrasekar S., Ambika K., Pandu Rangan C.
2008/275 (PDF ) Certificate-Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
2008/274 (PDF ) Twisted Ate Pairing on Hyperelliptic Curves and Applications Fangguo Zhang
2008/273 (PDF ) White-Box Cryptography: Formal Notions and (Im)possibility Results Amitabh Saxena, Brecht Wyseur, Bart Preneel
2008/272 (PDF ) A New Hash Family Obtained by Modifying the SHA-2 Family Somitra Kumar Sanadhya, Palash Sarkar
2008/271 (PDF ) A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family Somitra Kumar Sanadhya, Palash Sarkar
2008/270 (PDF ) New Collision attacks Against Up To 24-step SHA-2 Somitra Kumar Sanadhya, Palash Sarkar
2008/269 (PDF ) Searching for Low Weight Codewords in Linear Binary Codes Somitra Kumar Sanadhya, Palash Sarkar
2008/268 (PDF ) Adaptive Security in Broadcast Encryption Systems Craig Gentry, Brent Waters
2008/267 (PDF ) Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
2008/266 (PDF ) Information-Theoretically Secure Voting Without an Honest Majority Anne Broadbent, Alain Tapp
2008/265 (PDF ) Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors Steven D. Galbraith, Michael Harrison, David J. Mireles Morales
2008/264 (PDF ) Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security Robin Künzler, Jörn Müller-Quade, Dominik Raub
2008/263 (PDF ) Slide Attacks on a Class of Hash Functions Michael Gorski, Stefan Lucks, Thomas Peyrin
2008/262 (PDF ) Statistically Reliable and Secure Message Transmission in Directed Networks Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/261 (PDF ) The Hidden Root Problem F. Vercauteren
2008/260 (PDF ) Breaking RSA Generically is Equivalent to Factoring Divesh Aggarwal, Ueli Maurer
2008/259 (PDF ) 2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period ZHAO Lu, WEN Qiao-yan
2008/258 (PDF ) ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS JAIYEOLA Temitope Gbolahan, ADENIRAN John Olushola
2008/257 (PDF ) ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY JAIYEOLA Temitope Gbolahan
2008/256 (PDF ) ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES JAIYEOLA Temitope Gbolahan
2008/255 (PDF ) Embedding in Two Least Significant Bits with Wet Paper Coding Xin Liao, Qiao-yan Wen
2008/254 (PDF ) An Efficient Identity-based Ring Signcryption Scheme Zhenchao ZHU, Yuqing ZHANG, Fengjiao WANG
2008/253 (PDF ) Multi-Recipient Signcryption for Secure Wireless Group Communication Yiliang Han, Xiaolin Gui, Xu'an Wang
2008/252 (PDF ) Provable Security of Digital Signatures in the Tamper-Proof Device Model Nick Varnovsky
2008/251 (PDF ) Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
2008/250 (PDF ) Pairings on hyperelliptic curves with a real model Steven Galbraith, Xibin Lin, David Mireles
2008/248 (PDF ) Cryptanalysis of a client-to-client password-authenticated key agreement protocol Fengjiao Wang, Yuqing Zhang
2008/247 (PDF ) Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
2008/246 (PDF ) The Random Oracle Model and the Ideal Cipher Model are Equivalent Jean-Sebastien Coron, Jacques Patarin, Yannick Seurin
2008/245 (PDF ) Cryptanalysis of an Authentication Scheme Using Truncated Polynomials Markus Grassl, Rainer Steinwandt
2008/244 (PDF ) New balanced Boolean functions satisfying all the main cryptographic criteria Claude Carlet, Keqin Feng
2008/243 (PDF ) On the economic payoff of forensic systems when used to trace Counterfeited Software and content Yacov Yacobi
2008/241 (PDF ) Practical Attacks on HB and HB+ Protocols Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada
2008/240 (PDF ) Leakage-Resilient Cryptography in the Standard Model Stefan Dziembowski, Krzysztof Pietrzak
2008/239 (PDF ) Recognition in Ad Hoc Pervasive Networks Atefeh Mashatan, Douglas R. Stinson
2008/238 (PDF ) On the Provable Security of Multi-Receiver Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/237 (PDF ) Local Affinity Based Inversion of Filter Generators O. A. Logachev, D. S. Nazarova
2008/236 (PDF ) A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N. P. Smart, B. Warinschi
2008/235 (PDF ) Constant-Round Concurrent Non-Malleable Commitments and Decommitments Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2008/234 (PDF ) On the CCA1-Security of Elgamal and Damgård's Elgamal Helger Lipmaa
2008/232 (PDF ) Perfectly Secure Message Transmission Tolerating Mixed Adversary Arpita Patra, Ashish Choudhury, Ashwinkumar B. V, Kannan Srinathan, C. Pandu Rangan
2008/231 (PDF ) A Novel Probabilistic Passive Attack on the Protocols HB and HB+ Jose Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento
2008/230 (PDF ) A New Collision Differential For MD5 With Its Full Differential Path Tao Xie, DengGuo Feng, FanBao Liu
2008/229 (PDF ) Identification and Privacy: Zero-Knowledge is not Enough Julien Bringer, Herve Chabanne, Thomas Icart
2008/228 (PDF ) Revisiting Wiener's Attack -- New Weak Keys in RSA Subhamoy Maitra, Santanu Sarkar
2008/227 (PDF ) New Impossible Differential Cryptanalysis of ARIA Ruilin Li, Bing Sun, Peng Zhang, Chao Li
2008/226 (PDF ) Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma, Jun Ao
2008/225 (PDF ) Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/224 (PDF ) An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem Hai Huang, Zhenfu Cao
2008/223 (PDF ) On the Security of a Visual Cryptography Scheme for Color Images Bert W. Leung, Felix Y. Ng, Duncan S. Wong
2008/222 (PDF ) Encryption-On-Demand: Practical and Theoretical Considerations Gideon Samid
2008/221 (PDF ) Efficient Conversion of Secret-shared Values Between Different Fields Ivan Damgard, Rune Thorbek
2008/220 (PDF ) Essentially Optimal Universally Composable Oblivious Transfer Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2008/218 (PDF ) Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation Wouter Castryck, Steven Galbraith, Reza Rezaeian Farashahi
2008/217 (PDF ) Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé
2008/216 (PDF ) A New Multi-Linear Universal Hash Family Palash Sarkar
2008/215 (PDF ) On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
2008/214 (PDF ) Multi-Factor Password-Authenticated Key Exchange Douglas Stebila, Poornaprajna Udupi, Sheueling Chang
2008/213 (PDF ) The Multireceiver Commitment Schemes Shuhong Wang
2008/212 (PDF ) Reducing the Complexity of the Weil Pairing Computation Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2008/211 (PDF ) Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption Goichiro Hanaoka, Kaoru Kurosawa
2008/210 (PDF ) Complexity Analysis of a Fast Modular Multiexponentiation Algorithm Haimin Jin, Duncan S. Wong, Yinlong Xu
2008/209 (PDF ) Computing Bilinear Pairings on Elliptic Curves with Automorphisms Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Bing-Long Chen
2008/208 (PDF ) Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme Naoki Ogura, Shigenori Uchiyama
2008/207 (PDF ) Efficient Receipt-Free Ballot Casting Resistant to Covert Channels Ben Adida, C. Andrew Neff
2008/206 (PDF ) Partial Fairness in Secure Two-Party Computation Dov Gordon, Jonathan Katz
2008/205 (PDF ) On Software Parallel Implementation of Cryptographic Pairings Philipp Grabher, Johann Groszschaedl, Dan Page
2008/204 (PDF ) Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem Yanbin Pan, Yingpu Deng
2008/203 (PDF ) Privacy-Preserving Matching of DNA Profiles Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls
2008/202 (PDF ) Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing Zhitu Su, Hui Li, JianFeng Ma
2008/201 (PDF ) How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG J. Wu, D. R. Stinson
2008/200 (PDF ) On The Security of The ElGamal Encryption Scheme and Damgard’s Variant J. Wu, D. R. Stinson
2008/199 (PDF ) Simultaneous field divisions: an extension of Montgomery's trick David G. Harris
2008/198 (PDF ) Security needs in embedded systems Anoop MS
2008/197 (PDF ) Secure Multiparty Computation for Privacy-Preserving Data Mining Yehuda Lindell, Benny Pinkas
2008/196 (PDF ) A New Family of Perfect Nonlinear Binomials Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang
2008/195 (PDF ) An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs Jin Zhengping, Zuo Huijuan, Du hongzhen, Wen Qiaoyan
2008/194 (PDF ) Endomorphisms for faster elliptic curve cryptography on a large class of curves Steven D. Galbraith, Xibin Lin, Michael Scott
2008/192 (PDF ) Investigating the DPA-Resistance Property of Charge Recovery Logics Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/190 (PDF ) User-Sure-and-Safe Key Retrieval Daniel R. L. Brown
2008/189 (PDF ) How to Build a Hash Function from any Collision-Resistant Function Thomas Ristenpart, Thomas Shrimpton
2008/188 (PDF ) Information Leakage of Flip-Flops in DPA-Resistant Logic Styles Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
2008/187 (PDF ) An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme Fagen Li, Yong Yu
2008/186 (PDF ) Privacy-Preserving Audit and Extraction of Digital Contents Mehul A. Shah, Ram Swaminathan, Mary Baker
2008/185 (PDF ) A New Approach to Secure Logging Di Ma, Gene Tsudik
2008/184 (PDF ) On the Secure Obfuscation of Deterministic Finite Automata W. Erik Anderson
2008/183 (PDF ) Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 Jean-Philippe Aumasson, Willi Meier, Florian Mendel
2008/182 (PDF ) Restricted Adaptive Oblivious Transfer Javier Herranz
2008/181 (PDF ) Proofs of Knowledge with Several Challenge Values Grzegorz Stachowiak
2008/180 (PDF ) Imaginary quadratic orders with given prime factor of class number Alexander Rostovtsev
2008/178 (PDF ) Optimal Discretization for High-Entropy Graphical Passwords Kemal Bicakci
2008/177 (PDF ) Algebraic Techniques in Differential Cryptanalysis Martin Albrecht, Carlos Cid
2008/176 (PDF ) New construction of Boolean functions with maximun algebraic immunity Wang yongjuan, Fan shuqin, Han wenbao
2008/175 (PDF ) Proofs of Retrievability: Theory and Implementation Kevin D. Bowers, Ari Juels, Alina Oprea
2008/174 (PDF ) Non-Linear Reduced Round Attacks Against SHA-2 Hash family Somitra Kumar Sanadhya, Palash Sarkar
2008/173 (PDF ) Full Cryptanalysis of LPS and Morgenstern Hash Function Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
2008/172 (PDF ) The Round Complexity of Verifiable Secret Sharing Revisited Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
2008/171 (PDF ) Binary Edwards Curves Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
2008/170 (PDF ) Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem Simon R. Blackburn
2008/169 (PDF ) Understanding Phase Shifting Equivalent Keys and Exhaustive Search Côme Berbain, Aline Gouget, Hervé Sibert
2008/168 (PDF ) Possibility and impossibility results for selective decommitments Dennis Hofheinz
2008/167 (PDF ) Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols Omkant Pandey
2008/166 (PDF ) Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Courtois, Karsten Nohl, Sean O'Neil
2008/165 (PDF ) Improved lower bound on the number of balanced symmetric functions over GF(p) Pinhui Ke
2008/164 (PDF ) On the (Im)Possibility of Key Dependent Encryption Iftach Haitner, Thomas Holenstein
2008/163 (PDF ) Universally Composable Adaptive Oblivious Transfer Matthew Green, Susan Hohenberger
2008/162 (PDF ) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks Michael Backes, Boris Köpf
2008/161 (PDF ) Modular polynomials for genus 2 Reinier Broker, Kristin Lauter
2008/160 (PDF ) A Proxy Signature Scheme over Braid Groups Girraj Kumar Verma
2008/159 (PDF ) A non-interactive deniable authentication scheme based on designated verifier proofs Bin Wang
2008/158 (PDF ) DISH: Distributed Self-Healing in Unattended Sensor Networks Di Ma, Gene Tsudik
2008/157 (PDF ) Secure Online Elections in Practice Lucie Langer, Axel Schmidt, Johannes Buchmann
2008/156 (PDF ) On Black-Box Ring Extraction and Integer Factorization Kristina Altmann, Tibor Jager, Andy Rupp
2008/155 (PDF ) A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties David Freeman
2008/153 (PDF ) Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour Clemens Heuberger
2008/152 (PDF ) Computational soundness of symbolic zero-knowledge proofs Michael Backes, Dominique Unruh
2008/150 (PDF ) Robust Combiners for Software Hardening Amir Herzberg, Haya Shulman
2008/149 (PDF ) Toy Factoring by Newton's Method Daniel R. L. Brown
2008/148 (PDF ) Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2008/147 (PDF ) A Real-World Attack Breaking A5/1 within Hours Timo Gendrullis, Martin Novotny, Andy Rupp
2008/146 (PDF ) Dynamic SHA-2 Xu Zijie
2008/145 (PDF ) Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System Jithra Adikari, Vassil S. Dimitrov, Pradeep K. Mishra
2008/143 (PDF ) Certificateless Signcryption M. Barbosa, P. Farshim
2008/142 (PDF ) Attacking Reduced Round SHA-256 Somitra Kumar Sanadhya, Palash Sarkar
2008/141 (PDF ) Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
2008/140 (PDF ) Reducing Complexity Assumptions for Oblivious Transfer K. Y. Cheong, Takeshi Koshiba
2008/139 (PDF ) Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian
2008/138 (PDF ) Oblivious Transfer Based on the McEliece Assumptions Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/137 (PDF ) More Discriminants with the Brezing-Weng Method Gaetan Bisson, Takakazu Satoh
2008/136 (PDF ) Constant-Size Dynamic $k$-TAA Man Ho Au, Willy Susilo, Yi Mu
2008/135 (PDF ) Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations Clemens Heuberger, James A. Muir
2008/134 (PDF ) Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption Alon Rosen, Gil Segev
2008/133 (PDF ) The arithmetic of characteristic 2 Kummer surfaces P. Gaudry, D. Lubicz
2008/132 (PDF ) A Framework for the Sound Specification of Cryptographic Tasks Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
2008/131 (PDF ) Collisions and other Non-Random Properties for Step-Reduced SHA-256 Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
2008/130 (PDF ) Analysis of Step-Reduced SHA-256 Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2008/129 (PDF ) Controlling access to personal data through Accredited Symmetrically Private Information Retrieval Mohamed Layouni
2008/128 (PDF ) A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2 Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
2008/127 (PDF ) A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation Nidia Cortez-Duarte, Francisco Rodríguez-Henríquez, Jean-Luc Beuchat, Eiji Okamoto
2008/126 (PDF ) Machine Learning Attacks Against the ASIRRA CAPTCHA Philippe Golle
2008/125 (PDF ) Pairing Lattices Florian Hess
2008/124 (PDF ) A Simple Derivation for the Frobenius Pseudoprime Test Daniel Loebenberger
2008/123 (PDF ) Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style Mehrdad Khatir, Amir Moradi
2008/122 (PDF ) TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote Seog Chung Seo, Dong-Guk Han, Seokhie Hong
2008/121 (PDF ) New proofs for old modes Mark Wooding
2008/120 (PDF ) Public key encryption and encryption emulation attacks Denis Osin, Vladimir Shpilrain
2008/119 (PDF ) Linear Bandwidth Naccache-Stern Encryption Benoit Chevallier-Mames, David Naccache, Jacques Stern
2008/118 (PDF ) Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication Patrick Longa, Catherine Gebotys
2008/117 (PDF ) Exponentiation in pairing-friendly groups using homomorphisms Steven D. Galbraith, Michael Scott
2008/116 (PDF ) Chosen-Ciphertext Security via Correlated Products Alon Rosen, Gil Segev
2008/115 (PDF ) A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$ Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
2008/114 (PDF ) Scalable and Efficient Provable Data Possession Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
2008/113 (PDF ) Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132 Daniel Mall, Qing Zhong
2008/112 (PDF ) Democratic Group Signatures with Threshold Traceability Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li
2008/111 (PDF ) THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD Yuriy Izbenko, Vladislav Kovtun, Alexandr Kuznetsov
2008/109 (PDF ) Collisions for Round-Reduced LAKE Florian Mendel, Martin Schläffer
2008/108 (PDF ) New Differential-Algebraic Attacks and Reparametrization of Rainbow Jintai Ding, Bo-Yin Yang, Owen Chen, Ming-Shing Chen, Doug Cheng
2008/107 (PDF ) Private Branching Programs: On Communication-Efficient Cryptocomputing Helger Lipmaa
2008/106 (PDF ) Knapsack cryptosystems built on NP-hard instances Laurent Evain
2008/105 (PDF ) Cryptanalysis of White-Box Implementations W. Michiels, P. Gorissen, H. D. L. Hollmann
2008/104 (PDF ) Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell, Liqun Chen, Jiangtao Li
2008/102 (PDF ) Degradation and Amplification of Computational Hardness Shai Halevi, Tal Rabin
2008/100 (PDF ) Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields Patrick Longa
2008/099 (PDF ) The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin E. Lauter, Katherine E. Stange
2008/098 (PDF ) On Security Notions for Verifiable Encrypted Signature Xu-An Wang, Xiaoyuan Yang, Yiliang Han
2008/097 (PDF ) Fairness with an Honest Minority and a Rational Majority Shien Jin Ong, David Parkes, Alon Rosen, Salil Vadhan
2008/096 (PDF ) Optimal Pairings F. Vercauteren
2008/095 (PDF ) Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2008/094 (PDF ) Universally Composable Undeniable Signature Kaoru Kurosawa, Jun Furukawa
2008/093 (PDF ) New ID-based Fair Blind Signatures Girraj Kumar Verma
2008/092 (PDF ) An Efficient SPRP-secure Construction based on Pseudo Random Involution Mridul Nandi
2008/091 (PDF ) A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation Mridul Nandi
2008/090 (PDF ) Improving upon HCTR and matching attacks for Hash-Counter-Hash approach Mridul Nandi
2008/089 (PDF ) An improved preimage attack on MD2 Søren S. Thomsen
2008/088 (PDF ) A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm Mahabir Prasad Jhanwar, Rana Barua
2008/087 (PDF ) Towards a Theory of White-Box Security Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
2008/086 (PDF ) Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan
2008/085 (PDF ) All Pairings Are in a Group Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2008/084 (PDF ) ID based generalized signcryption Sunder Lal, Prashant Kushwah
2008/083 (PDF ) On the Security of Chien's Ultralightweight RFID Authentication Protocol Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
2008/082 (PDF ) Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes Roberto Araujo, Peter Y. A. Ryan
2008/081 (PDF ) Template Attacks on ECDSA Marcel Medwed, Elisabeth Oswald
2008/080 (PDF ) Pairing-Based Onion Routing with Improved Forward Secrecy Aniket Kate, Greg Zaverucha, Ian Goldberg
2008/079 (PDF ) Homomorphic Encryption with CCA Security Manoj Prabhakaran, Mike Rosulek
2008/078 (PDF ) A Short Proof of the PRP/PRF Switching Lemma Donghoon Chang, Mridul Nandi
2008/077 (PDF ) Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2008/076 (PDF ) Results from a Search for the Best Linear Approximation of a Block Cipher Kashif Ali, Howard M. Heys
2008/075 (PDF ) On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak Jonathan J. Hoch, Adi Shamir
2008/074 (PDF ) On the Chikazawa-Inoue ID based key system Bae Eun Jung, Hee Jean Kim
2008/073 (PDF ) Compact Proofs of Retrievability Hovav Shacham, Brent Waters
2008/072 (PDF ) The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption Alexandre M. Deusajute, Paulo S. L. M. Barreto
2008/071 (PDF ) Blockcipher Based Hashing Revisited Martijn Stam
2008/070 (PDF ) Generators of Jacobians of Genus Two Curves Christian Robenhagen Ravnshoj
2008/069 (PDF ) HENKOS Cryptanalysis-Related keys attack Marius Oliver Gheorghita
2008/068 (PDF ) Multiparty Computation Goes Live Peter Bogetoft, Dan Lund Christensen, Ivan Damgard, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft
2008/067 (PDF ) The Twin Diffie-Hellman Problem and Applications David Cash, Eike Kiltz, Victor Shoup
2008/066 (PDF ) High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m) Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng
2008/065 (PDF ) Infringing and Improving Password Security of a Three-Party Key Exchange Protocol Junghyun Nam
2008/064 (PDF ) Remarks on the NFS complexity Pavol Zajac
2008/063 (PDF ) Efficient Sequential Aggregate Signed Data Gregory Neven
2008/062 (PDF ) Computing Hilbert Class Polynomials Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter
2008/061 (PDF ) Abelian varieties with prescribed embedding degree David Freeman, Peter Stevenhagen, Marco Streng
2008/060 (PDF ) Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields Nicholas T. Sullivan
2008/059 (PDF ) Buying random votes is as hard as buying no-votes Stefan Popoveniuc, Jonathan Stanton
2008/058 (PDF ) Physical Cryptanalysis of KeeLoq Code Hopping Applications Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/057 (PDF ) Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields Vladislav Kovtun, Jan Pelzl, Alexandr Kuznetsov
2008/056 (PDF ) Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated) Vladislav Kovtun, Thomas Wollinger
2008/054 (PDF ) Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version) Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
2008/053 (PDF ) Breaking One-Round Key-Agreement Protocols in the Random Oracle Model Miroslava Sotakova
2008/052 (PDF ) New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version) Patrick Longa, Ali Miri
2008/051 (PDF ) New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version) Patrick Longa, Ali Miri
2008/050 (PDF ) Multi-PKG ID based signcryption Sunder Lal, Prashant Kushwah
2008/049 (PDF ) An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Yehuda Lindell, Benny Pinkas
2008/048 (PDF ) Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/047 (PDF ) Fair Traceable Multi-Group Signatures Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
2008/046 (PDF ) David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran, Gil Segev
2008/045 (PDF ) Threshold RSA for Dynamic and Ad-Hoc Groups Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
2008/044 (PDF ) Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels, Ravikanth Pappu, Bryan Parno
2008/043 (PDF ) Cryptanalysis of CRUSH hash structure Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
2008/042 (PDF ) Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks Julien Bringer, Herve Chabanne
2008/041 (PDF ) A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights Hassan Elkamchouchi, Yasmine Abouelseoud
2008/040 (PDF ) Efficient and Generalized Pairing Computation on Abelian Varieties Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2008/039 (PDF ) New Results on Unconditionally Secure Multireceiver Manual Authentication Shuhong Wang, Reihaneh Safavi-Naini
2008/038 (PDF ) A New Blind Identity-Based Signature Scheme with Message Recovery Hassan Elkamchouchi, Yasmine Abouelseoud
2008/037 (PDF ) Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures Georg Fuchsbauer, David Pointcheval
2008/036 (PDF ) Generic Attacks on Feistel Schemes Jacques Patarin
2008/035 (PDF ) Efficient Fully-Simulatable Oblivious Transfer Yehuda Lindell
2008/034 (PDF ) Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang
2008/033 (PDF ) Lower Bounds on Signatures From Symmetric Primitives Boaz Barak, Mohammad Mahmoody
2008/032 (PDF ) Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any Key Agreement from Random Oracles Boaz Barak, Mohammad Mahmoody
2008/031 (PDF ) Authenticating with Attributes Dalia Khader
2008/030 (PDF ) Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
2008/029 (PDF ) Non-Cyclic Subgroups of Jacobians of Genus Two Curves Christian Robenhagen Ravnshoj
2008/028 (PDF ) HB#: Increasing the Security and Efficiency of HB+ Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
2008/027 (PDF ) Blind Signature Scheme over Braid Groups Girraj Kumar Verma
2008/026 (PDF ) Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$ Mitsuru Kawazoe, Tetsuya Takahashi
2008/025 (PDF ) Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication Christian Robenhagen Ravnshoj
2008/024 (PDF ) Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes Sunder Lal, Vandani Verma
2008/023 (PDF ) General Certificateless Encryption and Timed-Release Encryption Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
2008/022 (PDF ) Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods M. Gebhardt, G. Illies, W. Schindler
2008/021 (PDF ) Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008/020 (PDF ) CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption Eike Kiltz, Yevgeniy Vahlis
2008/019 (PDF ) Computing Pairings Using x-Coordinates Only Steven D. Galbraith, Xibin Lin
2008/018 (PDF ) Disjunctive Multi-Level Secret Sharing Mira Belenkiy
2008/017 (PDF ) New State Recovery Attack on RC4 Alexander Maximov, Dmitry Khovratovich
2008/016 (PDF ) ECM using Edwards curves Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2008/015 (PDF ) Practical Short Signature Batch Verification Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
2008/014 (PDF ) Simulatable Adaptive Oblivious Transfer Jan Camenisch, Gregory Neven, abhi shelat
2008/013 (PDF ) Twisted Edwards Curves Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
2008/012 (PDF ) The Encrypted Elliptic Curve Hash Daniel R. L. Brown
2008/011 (PDF ) A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II Ayan Mahalanobis
2008/010 (PDF ) A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''-- Jacques Patarin
2008/009 (PDF ) Generic Attacks for the Xor of k random permutations Jacques Patarin
2008/008 (PDF ) Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves Zhitu su, Hui Li, Jianfeng Ma
2008/007 (PDF ) Efficient One-round Key Exchange in the Standard Model Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
2008/006 (PDF ) Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation Ralf Kuesters, Max Tuengerthal
2008/005 (PDF ) Information Theoretic Evaluation of Side-Channel Resistant Logic Styles Francois Mace, Francois-Xavier Standaert, Jean-Jacques Quisquater
2008/004 (PDF ) Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions Palash Sarkar
2008/003 (PDF ) On Collisions of Hash Functions Turbo SHA-2 Vlastimil Klima
2008/002 (PDF ) Fuzzy Identity Based Signature Piyi Yang, Zhenfu Cao, Xiaolei Dong
2008/001 (PDF ) Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang
2007/482 (PDF ) TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab
2007/480 (PDF ) Differential Fault Analysis on the AES Key Schedule Junko Takahashi, Toshinori Fukunaga
2007/479 (PDF ) An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu, D. R. Stinson
2007/478 (PDF ) Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs Dafna Kidron, Yehuda Lindell
2007/477 (PDF ) Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov, Andrey Pyshkin
2007/476 (PDF ) Dynamic SHA Xu Zijie
2007/475 (PDF ) Obtaining Universally Composable Security: Towards the Bare Bones of Trust Ran Canetti
2007/474 (PDF ) Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path Martin Cochran
2007/473 (PDF ) Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto
2007/472 (PDF ) New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
2007/471 (PDF ) Attacks on the WEP protocol Erik Tews
2007/470 (PDF ) Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo Möller, Andy Rupp
2007/469 (PDF ) ID-Based Group Password-Authenticated Key Exchange Xun Yi, Raylin Tso, Eiji Okamoto
2007/467 (PDF ) Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
2007/466 (PDF ) Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang, Xiaoyun Wang
2007/465 (PDF ) A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions Zheng Gong, Xuejia Lai, Kefei Chen
2007/464 (PDF ) Secure Computation Without Authentication Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
2007/463 (PDF ) Efficient GF(3m) Multiplication Algorithm for eta T Pairing Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi
2007/462 (PDF ) Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures Siamak F Shahandashti, Reihaneh Safavi-Naini
2007/461 (PDF ) Verifiable Attribute-based Encryption Qiang Tang, Dongyao Ji
2007/460 (PDF ) Guarantees for Customers of Incentive Anonymizing Networks Timothy Atkinson, Marius Silaghi
2007/459 (PDF ) Practical Anonymous Divisible E-Cash From Bounded Accumulators Man Ho Au, Willy Susilo, Yi Mu
2007/458 (PDF ) Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedic, Danny Harnik, Leonid Reyzin
2007/457 (PDF ) Comparing Implementation Efficiency of Ordinary and Squared Pairings Christine Abegail Antonio, Tanaka Satoru, Ken Nakamula
2007/455 (PDF ) Analysis and optimization of elliptic-curve single-scalar multiplication Daniel J. Bernstein, Tanja Lange
2007/454 (PDF ) Efficient Certificateless Signatures Suitable for Aggregation Rafael Castro, Ricardo Dahab
2007/453 (PDF ) On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson, Sriramkrishnan Srinivasan
2007/452 (PDF ) Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott
2007/451 (PDF ) Precise Concurrent Zero Knowledge Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2007/450 (PDF ) Short Group Signature without Random Oracles Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
2007/449 (PDF ) Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin, Valérie Nachef, Côme Berbain
2007/448 (PDF ) Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description Sergiy Pometun
2007/447 (PDF ) Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/446 (PDF ) A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol Carlos AGUILAR MELCHOR, Philippe GABORIT
2007/445 (PDF ) Proposal of a new efficient public key system for encryption and digital signatures Gerold Grünauer
2007/444 (PDF ) Tight bounds between algebraic immunity and nonlinearities of high orders Lobanov Mikhail
2007/443 (PDF ) Template Attacks with a Power Model Moulay Abdelaziz EL AABID, Sylvain GUILLEY, Philippe HOOGVORST
2007/442 (PDF ) Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems Neal Koblitz, Alfred Menezes
2007/441 (PDF ) Faster Group Operations on Elliptic Curves Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2007/440 (PDF ) An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lal, K. K. Goyal
2007/439 (PDF ) Multiparty Key Agreement Using Bilinear Map Nam-Su Jho, Myung-Hwan Kim, Do Won Hong, Byung-Gil Lee
2007/438 (PDF ) Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
2007/437 (PDF ) Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty, Francisco Rodriguez-Henriquez
2007/436 (PDF ) New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/435 (PDF ) Irreducibility to the One-More Evaluation Problems: More May Be Less Daniel R. L. Brown
2007/434 (PDF ) Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$ Xibin Lin, Chang-An Zhao, Fangguo Zhang, Yanming Wang
2007/433 (PDF ) An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Fabien Coelho
2007/432 (PDF ) Trapdoors for Hard Lattices and New Cryptographic Constructions Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
2007/431 (PDF ) Notions of Efficiency in Simulation Paradigm Tzer-jen Wei
2007/430 (PDF ) Cryptanalysis of LASH Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang
2007/429 (PDF ) On compressible pairings and their computation Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
2007/428 (PDF ) Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves Benjamin Smith
2007/427 (PDF ) Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros Sumanta Sarkar, Subhamoy Maitra
2007/426 (PDF ) Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10 Christine Abegail Antonio, Satoru Tanaka, Ken Nakamula
2007/425 (PDF ) On prime-order elliptic curves with embedding degrees k=3,4 and 6 Koray Karabina, Edlyn Teske
2007/424 (PDF ) When e-th Roots Become Easier Than Factoring Antoine Joux, David Naccache, Emmanuel Thomé
2007/423 (PDF ) Finding Low Weight Polynomial Multiples Using Lattices Laila El Aimani, Joachim von zur Gathen
2007/422 (PDF ) Structural Identity-Based Encryption Man Ho Au, Siu-Ming Yiu
2007/421 (PDF ) The role of help in Classical and Quantum Zero-Knowledge André Chailloux, Iordanis Kerenidis
2007/420 (PDF ) A Critical Analysis and Improvement of AACS Drive-Host Authentication Jiayuan Sui, Douglas R. Stinson
2007/419 (PDF ) Cryptanalysis of the Random Number Generator of the Windows Operating System Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
2007/417 (PDF ) Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
2007/416 (PDF ) Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong
2007/415 (PDF ) Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/414 (PDF ) Optimizing double-base elliptic-curve single-scalar multiplication Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2007/413 (PDF ) Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack Michael Vielhaber
2007/412 (PDF ) Proposing a Master One-Way Function Gideon Samid
2007/411 (PDF ) Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/410 (PDF ) Inverted Edwards coordinates Daniel J. Bernstein, Tanja Lange
2007/409 (PDF ) Building a Collision-Resistant Compression Function from Non-Compressing Primitives Thomas Shrimpton, Martijn Stam
2007/408 (PDF ) Differential Cryptanalysis of PRESENT Meiqin Wang
2007/406 (PDF ) Modeling Computational Security in Long-Lived Systems Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2007/405 (PDF ) Secure PRNGs from Specialized Polynomial Maps over Any $F_q$ Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding
2007/404 (PDF ) Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz, Amit Sahai, Brent Waters
2007/403 (PDF ) Turbo SHA-2 Danilo Gligoroski, Svein Johan Knapskog
2007/402 (PDF ) Robust, Anonymous RFID Authentication with Constant Key-Lookup Mike Burmester, Breno de Medeiros, Rossana Motta
2007/401 (PDF ) Another Look at Automated Theorem-Proving Neal Koblitz
2007/400 (PDF ) REMARKS ON IBE SCHEME OF WANG AND CAO Sunder Lal, Priyam Sharma
2007/399 (PDF ) Ceremony Design and Analysis Carl Ellison
2007/397 (PDF ) On the security defects of an image encryption scheme Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
2007/396 (PDF ) Proxy Re-Signature Schemes without Random Oracles Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
2007/395 (PDF ) Second Preimage Attacks on Dithered Hash Functions Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sebastien Zimmer
2007/394 (PDF ) Almost-everywhere Secure Computation Juan A. Garay, Rafail Ostrovsky
2007/393 (PDF ) Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms Haining Fan, Jiaguang Sun, Ming Gu, Kwok-Yan Lam
2007/392 (PDF ) Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups Jonathan Trostle, Andy Parrish
2007/391 (PDF ) A novel public key crypto system based on semi-modules over quotient semi-rings Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
2007/390 (PDF ) Implementing Cryptographic Pairings over Barreto-Naehrig Curves Augusto Jun Devegili, Michael Scott, Ricardo Dahab
2007/389 (PDF ) Interactive and Noninteractive Zero Knowledge Coincide in the Help Model Dragos Florin Ciocan, Salil Vadhan
2007/388 (PDF ) On Ciphertext Undetectability Peter Gazi, Martin Stanek
2007/386 (PDF ) (Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
2007/385 (PDF ) On the insecurity of interchanged use of OFB and CBC modes of operation Danilo Gligoroski
2007/384 (PDF ) Non-Interactive Anonymous Credentials Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2007/383 (PDF ) Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
2007/382 (PDF ) Oblivious Transfer via McEliece's PKC and Permuted Kernels K. Kobara, K. Morozov, R. Overbeck
2007/381 (PDF ) Cryptanalysis of Two New Instances of TTM Cryptosystem Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding
2007/380 (PDF ) X-FCSR: a new software oriented stream cipher based upon FCSRs Francois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier
2007/379 (PDF ) On The Inequivalence Of Ness-Helleseth APN Functions Xiangyong Zeng, Lei Hu, Yang Yang, Wenfeng Jiang
2007/378 (PDF ) Algebraic Structure Defectoscopy Sean O'Neil
2007/376 (PDF ) An Efficient Range-Bounded Commitment Scheme Zhengjun Cao
2007/375 (PDF ) Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose Gregory Hirshman
2007/374 (PDF ) On Factoring Arbitrary Integers with Known Bits Mathias Herrmann, Alexander May
2007/373 (PDF ) A Meet-in-the-Middle Collision Attack Against the New FORK-256 Markku-Juhani O. Saarinen
2007/372 (PDF ) On the Authentication of One Popular Signcryption Scheme Zhengjun Cao
2007/371 (PDF ) Group-oriented encryption secure against collude attack Chunbo Ma, Jun Ao, Jianhua Li
2007/370 (PDF ) FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu
2007/369 (PDF ) Universally Composable Multi-Party Computation with an Unreliable Common Reference String Vipul Goyal, Jonathan Katz
2007/368 (PDF ) Reducing Trust in the PKG in Identity Based Cryptosystems Vipul Goyal
2007/367 (PDF ) Cryptanalysis of Rational Multivariate Public Key Cryptosystems Jintai Ding, John Wagner
2007/366 (PDF ) Breaking the Symmetry: a Way to Resist the New Differential Attack Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, Vivien Dubois
2007/365 (PDF ) Pairings on Jacobians of Hyperelliptic Curves Christian Robenhagen Ravnshoj
2007/364 (PDF ) A Proof of Security of a Mesh Security Architecture Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
2007/363 (PDF ) Fuzzy Private Matching (Extended Abstract) Łukasz Chmielewski, Jaap-Henk Hoepman
2007/362 (PDF ) Statistical Testing for Disk Encryption Modes of Operations Mohamed Abo El-Fotouh, Klaus Diepold
2007/361 (PDF ) Proxy Re-encryption Systems for Identity-based Encryption Toshihiko Matsuo
2007/360 (PDF ) Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent
2007/359 (PDF ) Intrusion-Resilient Secret Sharing Stefan Dziembowski, Krzysztof Pietrzak
2007/358 (PDF ) Improving the Round Complexity of VSS in Point-to-Point Networks Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan
2007/357 (PDF ) A Note on Signature Standards Michael Braun, Anton Kargl
2007/356 (PDF ) A Block Cipher based PRNG Secure Against Side-Channel Key Recovery Christophe Petit, Francois-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung
2007/355 (PDF ) Secret sharing on the infinite ladder Laszlo Csirmaz
2007/354 (PDF ) Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures Cheng-Kang Chu, Wen-Guey Tzeng
2007/353 (PDF ) Multiparty Computation to Generate Secret Permutations Chris Studholme, Ian Blake
2007/352 (PDF ) New Local Collisions for the SHA-2 Hash Family Somitra Kumar Sanadhya, Palash Sarkar
2007/351 (PDF ) A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval Iftach Haitner, Jonathan J. Hoch, Gil Segev
2007/350 (PDF ) On Tweaking Luby-Rackoff Blockciphers David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
2007/349 (PDF ) Statistically Hiding Sets Manoj Prabhakaran, Rui Xue
2007/348 (PDF ) A Framework for Efficient and Composable Oblivious Transfer Chris Peikert, Vinod Vaikuntanathan, Brent Waters
2007/347 (PDF ) Lai-Massey Scheme and Quasi-Feistel Networks Aaram Yun, Je Hong Park, Jooyoung Lee
2007/345 (PDF ) Analysis of Underlying Assumptions in NIST DRBGs Wilson Kan
2007/344 (PDF ) Security Analysis of WAPI Authentication and Key Exchange Protocol Liufei Wu, Yuqing Zhang, FengjiaoWang
2007/343 (PDF ) Updated standards for validating elliptic curves Laura Hitt
2007/342 (PDF ) A New Security Model for Cross-Realm C2C-PAKE Protocol Fengjiao Wang, Yuqing Zhang
2007/341 (PDF ) Multi-Party Indirect Indexing and Applications Matthew Franklin, Mark Gondree, Payman Mohassel
2007/340 (PDF ) Efficient Implementation of the Pairing on Mobilephones using BREW Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
2007/339 (PDF ) On the security of a class of image encryption schemes Chengqing Li, Guanrong Chen
2007/338 (PDF ) VHASH Security Wei Dai, Ted Krovetz
2007/337 (PDF ) Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised) W. Bamberger, O. Welter, S. Spitz, M. Marhöfer
2007/336 (PDF ) A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat Onur Aciicmez, Werner Schindler
2007/335 (PDF ) Encryption Techniques for Secure Database Outsourcing Sergei Evdokimov, Oliver Guenther
2007/334 (PDF ) New Constructions for UC Secure Computation using Tamper-proof Hardware Nishanth Chandran, Vipul Goyal, Amit Sahai
2007/333 (PDF ) Towards Key-Dependent Message Security in the Standard Model Dennis Hofheinz, Dominique Unruh
2007/332 (PDF ) Universally Composable Multiparty Computation with Partially Isolated Parties Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
2007/331 (PDF ) Isolated Proofs of Knowledge and Isolated Zero Knowledge Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
2007/330 (PDF ) Remote Power Analysis of {RFID} Tags Yossi Oren
2007/329 (PDF ) A Tunable Broadcast Encryption Scheme David Lubicz, Thomas Sirvent
2007/328 (PDF ) A Tight High-Order Entropic Quantum Uncertainty Relation With Applications Ivan Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
2007/327 (PDF ) Secure Identification and QKD in the Bounded-Quantum-Storage Model Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2007/326 (PDF ) Efficient Password-based Authenticated Key Exchange without Public Information Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
2007/325 (PDF ) Faster and Shorter Password-Authenticated Key Exchange Rosario Gennaro
2007/324 (PDF ) Towards provable security for route discovery protocols in mobile ad hoc networks Mike Burmester, Breno de Medeiros
2007/323 (PDF ) Attribute-Based Encryption with Non-Monotonic Access Structures Rafail Ostrovsky, Amit Sahai, Brent Waters
2007/322 (PDF ) Identifying Ideal Lattices Jintai Ding, Richard Lindner
2007/321 (PDF ) Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2} Selcuk Kavut, Melek Diker Yucel
2007/320 (PDF ) On the Big Gap Between $|p|$ and $|q|$ in DSA Zhengjun Cao
2007/319 (PDF ) A New Security Definition for Public Key Encryption Schemes and Its Applications Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng
2007/318 (PDF ) On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks Michael Neve, Kris Tiri
2007/317 (PDF ) Improving Upon the TET Mode of Operation Palash Sarkar
2007/316 (PDF ) SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME Sunder Lal, Priyam Sharma
2007/315 (PDF ) Security under Key-Dependent Inputs Shai Halevi, Hugo Krawczyk
2007/313 (PDF ) Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, Kim-Kwang Raymond Choo
2007/312 (PDF ) Secure Similarity Search Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan
2007/311 (PDF ) A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007/310 (PDF ) A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields Kwang Ho Kim
2007/309 (PDF ) Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra
2007/308 (PDF ) Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242 Selcuk Kavut, Melek Diker Yucel
2007/307 (PDF ) Locally Invertible Boolean Mappings Oleg A. Logachev
2007/306 (PDF ) Novel Approaches for Improving the Power Consumption Models in Correlation Analysis Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière
2007/305 (PDF ) On Non-Randomness of the Permutation after RC4 Key Scheduling Goutam Paul, Subhamoy Maitra, Rohit Srivastava
2007/304 (PDF ) A Bound on the Size of Separating Hash Families Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson, Gregory M. Zaverucha
2007/303 (PDF ) A Forward Secure Remote User Authentication Scheme Manoj Kumar
2007/302 (PDF ) Compression Functions Suitable for the Multi-Property-Preserving Transform Hidenori Kuwakado, Masakatu Morii
2007/301 (PDF ) On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials Yuri Borissov, Moon Ho Lee, Svetla Nikova
2007/300 (PDF ) A Note on Automata-based Dynamic Convolutional Cryptosystems Renji Tao
2007/299 (PDF ) Optimizing Multiprecision Multiplication for Public Key Cryptography Michael Scott, Piotr Szczechowiak
2007/298 (PDF ) The Security of the Extended Codebook (XCB) Mode of Operation David A. McGrew, Scott R. Fluhrer
2007/297 (PDF ) Secret sharing on infinite graphs Laszlo Csirmaz
2007/296 (PDF ) Construction of Efficient and Secure Pairing Algorithm and its Application Doo Ho Choi, Dong-Guk Han, Howon Kim
2007/295 (PDF ) Linearization Attacks Against Syndrome Based Hashes Markku-Juhani O. Saarinen
2007/294 (PDF ) Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function Julien Bringer, Herve Chabanne, Thomas Icart
2007/293 (PDF ) Fully Resilient Traitor Tracing Scheme using Key Update Eun Sun Yoo, Koutarou Suzuki, Myung-Hwan Kim
2007/292 (PDF ) Improved security analysis of OMAC Mridul Nandi
2007/291 (PDF ) Relations Among Notions of Plaintext Awareness James Birkett, Alexander W. Dent
2007/290 (PDF ) Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables Sumanta Sarkar, Subhamoy Maitra
2007/289 (PDF ) Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol Michael Backes, Matteo Maffei, Dominique Unruh
2007/288 (PDF ) Secure Hybrid Encryption from Weakened Key Encapsulation Dennis Hofheinz, Eike Kiltz
2007/287 (PDF ) The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui
2007/286 (PDF ) Faster addition and doubling on elliptic curves Daniel J. Bernstein, Tanja Lange
2007/285 (PDF ) Solving MRHS linear equations Håvard Raddum, Igor Semaev
2007/283 (PDF ) Provably Secure Framework for Information Aggregation is Sensor Networks Mark Manulis, Joerg Schwenk
2007/282 (PDF ) Analysis of countermeasures against access driven cache attacks on AES Johannes Blömer, Volker Krummel
2007/281 (PDF ) A Pollard-like pseudorandom number generator over EC Grzegorz Wojtenko
2007/280 (PDF ) On solving sparse algebraic equations over finite fields II Igor Semaev
2007/279 (PDF ) Lossy Trapdoor Functions and Their Applications Chris Peikert, Brent Waters
2007/278 (PDF ) A Framework for Iterative Hash Functions - HAIFA Eli Biham, Orr Dunkelman
2007/277 (PDF ) Cryptanalysis of a class of cryptographic hash functions Praveen Gauravaram, John Kelsey
2007/276 (PDF ) Prolific Codes with the Identifiable Parent Property Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2007/275 (PDF ) `Good' Pseudo-Random Binary Sequences from Elliptic Curves Zhixiong CHEN, Guozhen XIAO
2007/274 (PDF ) Group-based Proxy Re-encryption scheme Chunbo Ma, Jun Ao, Jianhua Li
2007/273 (PDF ) Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles Mihir Bellare, Sarah Shoup
2007/272 (PDF ) Cryptanalysis of a Hash Function Proposed at ICISC 2006 Willi Geiselmann, Rainer Steinwandt
2007/271 (PDF ) Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms Mihir Bellare, Thomas Ristenpart
2007/270 (PDF ) Secret Ballot Elections with Unconditional Integrity David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora
2007/269 (PDF ) Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan Jeroen van de Graaf
2007/268 (PDF ) Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
2007/267 (PDF ) CRUST: Cryptographic Remote Untrusted Storage without Public Keys Erel Geron, Avishai Wool
2007/266 (PDF ) Filling the Gap between Voters and Cryptography in e-Voting Wei Han, Dong Zheng, Ke-fei Chen
2007/265 (PDF ) Which Languages Have 4-Round Zero-Knowledge Proofs? Jonathan Katz
2007/264 (PDF ) The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks Thomas Ristenpart, Scott Yilek
2007/262 (PDF ) Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
2007/261 (PDF ) New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 Subhamoy Maitra, Goutam Paul
2007/260 (PDF ) An Efficient One-move Nominative Signature Scheme Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong
2007/259 (PDF ) Algebraic Immunity Hierarchy of Boolean Functions Ziran Tu, Yingpu Deng
2007/258 (PDF ) UICE: A High-Performance Cryptographic Module for SoC and RFID Applications Ulrich Kaiser
2007/257 (PDF ) A Forward-Secure Signature with Backward-Secure Detection Dai-Rui Lin, Chih-I Wang
2007/256 (PDF ) Aspects of Pairing Inversion S. D. Galbraith, F. Hess, F. Vercauteren
2007/253 (PDF ) Choosing the correct elliptic curve in the CM method K. Rubin, A. Silverberg
2007/252 (PDF ) A Verifiable Voting Protocol based on Farnel Roberto Araujo, Ricardo Felipe Custodio, Jeroen van de Graaf
2007/251 (PDF ) A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols Vëronique Cortier, Ralf Kuesters, Bogdan Warinschi
2007/250 (PDF ) Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings Hongzhen Du, Qiaoyan Wen
2007/249 (PDF ) Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker Serge Fehr, Christian Schaffner
2007/248 (PDF ) 1. AES seems weak. 2. Linear time secure cryptography Warren D. Smith
2007/247 (PDF ) A Note on the Ate Pairing Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2007/246 (PDF ) BEDA: Button-Enabled Device Pairing Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/245 (PDF ) Incorporating Temporal Capabilities in Existing Key Management Schemes Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2007/244 (PDF ) A Note on the Relay Attacks on e-passports: The Case of Czech e-passports Martin Hlavac, Tomas Rosa
2007/242 (PDF ) Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee
2007/241 (PDF ) Attribute Based Group Signature with Revocation Dalia Khader
2007/240 (PDF ) A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms George I. Davida, Jeremy A. Hansen
2007/239 (PDF ) Making Large Hash Functions From Small Compression Functions William R. Speirs, Ian Molloy
2007/238 (PDF ) Long-lived digital integrity using short-lived hash functions Stuart Haber
2007/237 (PDF ) Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski, Mirosław Kutyłowski, Michał Ren, Katarzyna Rybarczyk
2007/236 (PDF ) Certificateless Ring Signatures Sherman S. M. Chow, Wun-She Yap
2007/235 (PDF ) Blind Identity-Based Encryption and Simulatable Oblivious Transfer Matthew Green, Susan Hohenberger
2007/234 (PDF ) Provable-Security Analysis of Authenticated Encryption in Kerberos Alexandra Boldyreva, Virendra Kumar
2007/233 (PDF ) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography Michael Backes, Markus Duermuth, Ralf Kuesters
2007/231 (PDF ) Secure Two-Party k-Means Clustering Paul Bunn, Rafail Ostrovsky
2007/230 (PDF ) New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/229 (PDF ) Domain Extension of Public Random Functions: Beyond the Birthday Barrier Ueli Maurer, Stefano Tessaro
2007/228 (PDF ) AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek El-Ghazawi
2007/227 (PDF ) Related-Key Statistical Cryptanalysis Darakhshan J. Mir, Poorvi L. Vora
2007/226 (PDF ) Generalized mix functions and orthogonal equitable rectangles Douglas R. Stinson
2007/225 (PDF ) On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Shengli Liu, Xiaofeng Chen, Fangguo Zhang
2007/224 (PDF ) A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan
2007/223 (PDF ) On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions John Black, Martin Cochran, Thomas Shrimpton
2007/222 (PDF ) Towards Security Limits in Side-Channel Attacks Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater
2007/221 (PDF ) Generalized Key Delegation for Hierarchical Identity-Based Encryption Michel Abdalla, Eike Kiltz, Gregory Neven
2007/220 (PDF ) A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography Fengjiao WANG, Yuqing ZHANG
2007/219 (PDF ) A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC Liufei Wu, Yuqing Zhang, Fengjiao Wang
2007/218 (PDF ) Differential Cryptanalysis in Stream Ciphers Eli Biham, Orr Dunkelman
2007/217 (PDF ) Identity-Based Broadcast Encryption Ryuichi Sakai, Jun Furukawa
2007/216 (PDF ) Unlinkable Divisible Digital Cash without Trusted Third Party Pawel Pszona, Grzegorz Stachowiak
2007/215 (PDF ) Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free Jesper Buus Nielsen
2007/214 (PDF ) Matrix Power S-Box Construction Eligijus Sakalauskas, Kestutis Luksys
2007/213 (PDF ) Unlinkable Randomizable Signature and Its Application in Group Signature Sujing Zhou, Dongdai Lin
2007/212 (PDF ) The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$. Andrey Khalyavin
2007/211 (PDF ) Scalable Storage Scheme from Forward Key Rotation Chunbo Ma, Jun Ao, Jianhua Li
2007/209 (PDF ) Bilateral Unknown Key-Share Attacks in Key Agreement Protocols Liqun Chen, Qiang Tang
2007/208 (PDF ) RC4 State Information at Any Stage Reveals the Secret Key Goutam Paul, Subhamoy Maitra
2007/207 (PDF ) On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
2007/206 (PDF ) Automatic Search of Differential Path in MD4 Pierre-Alain Fouque, Gaetan Leurent, Phong Nguyen
2007/205 (PDF ) A kilobit special number field sieve factorization Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen Lenstra, Dag Arne Osvik
2007/204 (PDF ) Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption Shu Yun Lim, Chuan Chin Pu, Hyo Taek Lim, Hoon Jae Lee
2007/203 (PDF ) Kipnis-Shamir's Attack on HFE Revisited Xin Jiang, Jintai Ding, Lei Hu
2007/202 (PDF ) Provable Data Possession at Untrusted Stores Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song
2007/201 (PDF ) The BBG HIBE Has Limited Delegation Hovav Shacham
2007/200 (PDF ) ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures Philip Atzemoglou, Tal Malkin
2007/199 (PDF ) A Framework for Game-Based Security Proofs David Nowak
2007/198 (PDF ) Mutual Information Analysis -- A Universal Differential Side-Channel Attack Benedikt Gierlichs, Lejla Batina, Pim Tuyls
2007/197 (PDF ) On-Line Ciphers and the Hash-CBC Constructions Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
2007/195 (PDF ) Verifying Statistical Zero Knowledge with Approximate Implementations Ling Cheung, Sayan Mitra, Olivier Pereira
2007/194 (PDF ) Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities Ernie Brickell, Jiangtao Li
2007/193 (PDF ) Some Identity Based Strong Bi-Designated Verifier Signature Schemes Sunder Lal, Vandani Verma
2007/192 (PDF ) Optimal Irreducible Polynomials for GF(2^m) Arithmetic Michael Scott
2007/191 (PDF ) Deniable Internet Key-Exchange Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
2007/190 (PDF ) Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption Tian Yuan
2007/189 (PDF ) An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol Meng-Hui Lim, Sanggon Lee
2007/188 (PDF ) A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model Kim-Kwang Raymond Choo
2007/187 (PDF ) Executing Modular Exponentiation on a Graphics Accelerator Andrew Moss, Dan Page, Nigel Smart
2007/186 (PDF ) Fully Anonymous Group Signatures without Random Oracles Jens Groth
2007/185 (PDF ) New FORK-256 Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee
2007/184 (PDF ) Provable password-based tripartite key agreement protocol Chunbo Ma, Jun Ao, Jianhua Li
2007/183 (PDF ) Provably Secure Ciphertext Policy ABE Ling Cheung, Calvin Newport
2007/182 (PDF ) Optimistic Fair Exchange in a Multi-user Setting Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
2007/181 (PDF ) A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields Kwang Ho Kim, So In Kim
2007/180 (PDF ) A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen
2007/179 (PDF ) New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three Kwang Ho Kim, So In Kim, Ju Song Choe
2007/178 (PDF ) Utility Sampling for Trust Metrics in PKI Dakshi Agrawal, Charanjit Jutla
2007/177 (PDF ) Space-Efficient Identity Based Encryption Without Pairings Dan Boneh, Craig Gentry, Michael Hamburg
2007/176 (PDF ) Seven-Property-Preserving Iterated Hashing: ROX Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
2007/175 (PDF ) Embedding Degree of Hyperelliptic Curves with Complex Multiplication Christian Robenhagen Ravnshoj
2007/174 (PDF ) Counting hyperelliptic curves that admit a Koblitz model Cevahir Demirkiran, Enric Nart
2007/173 (PDF ) Provable Secure Generalized Signcryption Xu An Wang, Xiaoyuan Yang, Yiliang Han
2007/172 (PDF ) Batch Verification of Short Signatures Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
2007/171 (PDF ) Chosen-Ciphertext Secure Proxy Re-Encryption Ran Canetti, Susan Hohenberger
2007/170 (PDF ) Clone Resistant Mutual Authentication for Low-Cost RFID Technology Stephane Lemieux, Adrian Tang
2007/169 (PDF ) On the Security of Protocols with Logarithmic Communication Complexity Michael Backes, Dominique Unruh
2007/168 (PDF ) Random Oracles and Auxiliary Input Dominique Unruh
2007/167 (PDF ) Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2) Yi-Ru Liu, Wen-Guey Tzeng
2007/166 (PDF ) Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords Junghyun Nam
2007/165 (PDF ) Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2007/164 (PDF ) Yet Another MicroArchitectural Attack: Exploiting I-cache Onur Aciicmez
2007/163 (PDF ) Secure Deniable Authenticated Key Establishment for Internet Protocols Meng-Hui Lim, Sanggon Lee, Youngho Park, Sangjae Moon
2007/162 (PDF ) Bingo Voting: Secure and coercion-free voting using a trusted random number generator Jens-Matthias Bohli, Joern Mueller-Quade, Stefan Roehrich
2007/161 (PDF ) Collusion-Resistant Group Key Management Using Attribute-Based Encryption Ling Cheung, Joseph A. Cooley, Roger Khazan, Calvin Newport
2007/160 (PDF ) Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing Muxiang Zhang
2007/159 (PDF ) Attribute Based Group Signatures Dalia Khader
2007/158 (PDF ) A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher Mridul Nandi
2007/157 (PDF ) ConSum v0: An Experimental Cipher David A. Madore
2007/156 (PDF ) Computational Semantics for Basic Protocol Logic - A Stochastic Approach Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2007/155 (PDF ) Efficient Non-interactive Proof Systems for Bilinear Groups Jens Groth, Amit Sahai
2007/154 (PDF ) Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions Danilo Gligoroski, Svein Johan Knapskog
2007/153 (PDF ) Cryptographic Hardness based on the Decoding of Reed-Solomon Codes Aggelos Kiayias, Moti Yung
2007/152 (PDF ) CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited Nicolas T. Courtois
2007/151 (PDF ) Deterministic History-Independent Strategies for Storing Information on Write-Once Memories Tal Moran, Moni Naor, Gil Segev
2007/150 (PDF ) Generators of Jacobians of Hyperelliptic Curves Christian Robenhagen Ravnshoj
2007/149 (PDF ) Towards Generating Secure Keys for Braid Cryptography Ki Hyoung Ko, Jang Won Lee, Tony Thomas
2007/148 (PDF ) Practical Compact E-Cash Man Ho Au, Willy Susilo, Yi Mu
2007/147 (PDF ) Using decision problems in public key cryptography Vladimir Shpilrain, Gabriel Zapata
2007/146 (PDF ) Time Capsule Signature: Efficient and Provably Secure Constructions Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
2007/145 (PDF ) Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
2007/144 (PDF ) Two New Examples of TTM T. Moh
2007/143 (PDF ) Offline/Online Mixing Ben Adida, Douglas Wikström
2007/142 (PDF ) An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
2007/141 (PDF ) Practical Cryptanalysis of SFLASH Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
2007/140 (PDF ) Hidden Identity-Based Signatures Aggelos Kiayias, Hong-Sheng Zhou
2007/139 (PDF ) The Delivery and Evidences Layer Amir Herzberg, Igal Yoffe
2007/138 (PDF ) Efficient Pairing Computation on Curves Rongquan Feng, Hongfeng Wu
2007/137 (PDF ) Multivariates Polynomials for Hashing Jintai Ding, Bo-yin Yang
2007/135 (PDF ) Efficient ID-based Signature Without Trusted PKG Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
2007/134 (PDF ) Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift Osman Kocar
2007/133 (PDF ) New Communication-Efficient Oblivious Transfer Protocols Based on Pairings Helger Lipmaa
2007/132 (PDF ) Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias, Hong-Sheng Zhou
2007/131 (PDF ) Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
2007/130 (PDF ) Some Results on Anonymity in Hybrid Encryption Tian Yuan, Chen Zhi-Yu, Jin Yuee, Jin Feng, Ma Huihui
2007/129 (PDF ) An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem Cameron McDonald, Chris Charnes, Josef Pieprzyk
2007/128 (PDF ) Computationally Sound Mechanized Proofs of Correspondence Assertions Bruno Blanchet
2007/127 (PDF ) CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
2007/126 (PDF ) An Interesting Member ID-based Group Signature Sujing Zhou, Dongdai Lin
2007/125 (PDF ) Attacking the IPsec Standards in Encryption-only Configurations Jean Paul Degabriele, Kenneth G. Paterson
2007/124 (PDF ) Rebuttal of overtaking VEST Benjamin Gittins, Howard Landman
2007/123 (PDF ) Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS Berkant Ustaoglu
2007/122 (PDF ) On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan Qiang Tang
2007/121 (PDF ) Certificateless Encryption Schemes Strongly Secure in the Standard Model Alexander W. Dent, Benoit Libert, Kenneth G. Paterson
2007/120 (PDF ) Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
2007/119 (PDF ) Rerandomizable RCCA Encryption Manoj Prabhakaran, Mike Rosulek
2007/118 (PDF ) Smooth Projective Hashing and Two-Message Oblivious Transfer Shai Halevi, Yael Tauman Kalai
2007/117 (PDF ) Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity Sihem Mesnager
2007/116 (PDF ) A Zero-Knowledge Identification and Key Agreement Protocol D. R. Stinson, J. Wu
2007/115 (PDF ) Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
2007/114 (PDF ) High Efficiency Feedback Shift Register: $\sigma-$LFSR Guang Zeng, Wenbao Han, Kaicheng He
2007/113 (PDF ) An Enhanced ID-based Deniable Authentication Protocol on Pairings Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
2007/112 (PDF ) Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field Koh-ichi Nagao
2007/111 (PDF ) Privacy-Preserving Distributed Set Intersection Qingsong Ye, Huaxiong Wang, Christophe Tartary
2007/110 (PDF ) Construction of Pairing-Friendly Elliptic Curves Woo Sug Kang
2007/109 (PDF ) How to Enrich the Message Space of a Cipher Thomas Ristenpart, Phillip Rogaway
2007/108 (PDF ) An Improved Distinguisher for Dragon Joo Yeon Cho, Josef Pieprzyk
2007/107 (PDF ) Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem Yasuyuki MURAKAMI, Takeshi NASAKO
2007/106 (PDF ) A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA Masao KASAHARA
2007/105 (PDF ) Isodual Reduction of Lattices Nicholas A. Howgrave-Graham
2007/104 (PDF ) Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
2007/103 (PDF ) Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic Roberto Avanzi
2007/102 (PDF ) On the Role of Scheduling in Simulation-Based Security Ran Canetti, Ling Cheung, Nancy Lynch, Olivier Pereira
2007/101 (PDF ) Practical Password Recovery on an MD5 Challenge and Response Yu Sasaki, Go Yamamoto, Kazumaro Aoki
2007/100 (PDF ) Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications Shengbao Wang, Zhenfu Cao
2007/099 (PDF ) Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits Jaime Gutierrez, Alvar Ibeas
2007/098 (PDF ) Classes of Quadratic APN Trinomials and Hexanomials and Related Structures Lilya Budaghyan, Claude Carlet
2007/097 (PDF ) Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves Christian Robenhagen Ravnshøj
2007/096 (PDF ) Somos Sequence Near-Addition Formulas and Modular Theta Functions R. Wm. Gosper, Rich Schroeppel
2007/095 (PDF ) Generic Certificateless Encryption in the Standard Model Qiong Huang, Duncan S. Wong
2007/094 (PDF ) Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants Xavier Boyen
2007/093 (PDF ) HAPADEP: Human Asisted Pure Audio Device Pairing Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/092 (PDF ) PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP Grzegorz Wojtenko
2007/091 (PDF ) Arithmetic Operators for Pairing-Based Cryptography Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
2007/089 (PDF ) Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations Ueli Maurer, Dominik Raub
2007/088 (PDF ) An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2007/087 (PDF ) Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy Jie Liu, Jianhua Li
2007/086 (PDF ) Non-Interactive Proofs for Integer Multiplication Ivan Damgard, Rune Thorbek
2007/085 (PDF ) MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL Hongbo Yu, Xiaoyun Wang
2007/084 (PDF ) Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions Sanjit Chatterjee, Palash Sarkar
2007/083 (PDF ) Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code Brett Hemenway, Rafail Ostrovsky
2007/082 (PDF ) Deniable Authentication on the Internet Shaoquan Jiang
2007/081 (PDF ) Revisiting an Efficient Elliptic Curve Key Agreement Protocol Maurizio Adriano Strangio
2007/079 (PDF ) How To Find Many Collisions of 3-Pass HAVAL Kazuhiro Suzuki, Kaoru Kurosawa
2007/078 (PDF ) MPC vs. SFE: Perfect Security in a Unified Corruption Model Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
2007/076 (PDF ) Almost Secure (1-Round, n-Channel) Message Transmission Scheme Kaoru Kurosawa, Kazuhiro Suzuki
2007/075 (PDF ) Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy Gautham Sekar, Souradyuti Paul, Bart Preneel
2007/074 (PDF ) A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants Hovav Shacham
2007/073 (PDF ) Public Key Encryption that Allows PIR Queries Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
2007/071 (PDF ) Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version) Ahto Buldas, Sven Laur
2007/070 (PDF ) Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected) Alexander Maximov
2007/069 (PDF ) Nominative Signature: Application, Security Model and Construction Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
2007/066 (PDF ) Low-Density Attack Revisited Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
2007/065 (PDF ) How to Derive Lower Bound on Oblivious Transfer Reduction Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
2007/064 (PDF ) Algebraic Lower Bounds for Computing on Encrypted Data Rafail Ostrovsky, William E. Skeith III
2007/063 (PDF ) Constructing new APN functions from known ones Lilya Budaghyan, Claude Carlet, Gregor Leander
2007/062 (PDF ) Algebraic and Slide Attacks on KeeLoq Nicolas T. Courtois, Gregory V. Bard, David Wagner
2007/061 (PDF ) Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3 Neil Costigan, Michael Scott
2007/060 (PDF ) Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries Yonatan Aumann, Yehuda Lindell
2007/059 (PDF ) A Survey of Single Database PIR: Techniques and Applications Rafail Ostrovsky, William E. Skeith III
2007/058 (PDF ) The simplest method for constructing APN polynomials EA-inequivalent to power functions Lilya Budaghyan
2007/057 (PDF ) Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians David Freeman
2007/056 (PDF ) Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
2007/055 (PDF ) Cryptanalysis of the KeeLoq block cipher Andrey Bogdanov
2007/054 (PDF ) Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Souradyuti Paul
2007/053 (PDF ) Compiler Assisted Elliptic Curve Cryptography M. Barbosa, A. Moss, D. Page
2007/052 (PDF ) Forward-Secure Sequential Aggregate Authentication Di Ma, Gene Tsudik
2007/051 (PDF ) Forward-secure RFID Authentication and Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros
2007/050 (PDF ) Special block cipher family DN and new generation SNMAC-type hash function family HDN Vlastimil KLIMA
2007/049 (PDF ) Security Arguments for a Class of ID-based Signatures jin zhou, ya-juan zhang, yue-fei zhu
2007/048 (PDF ) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator Daniel R. L. Brown, Kristian Gjøsteen
2007/047 (PDF ) New Constructions of Fuzzy Identity-Based Encryption Joonsang Baek, Willy Susilo, Jianying Zhou
2007/046 (PDF ) Direct Reduction of String (1,2)-OT to Rabin's OT Kaoru Kurosawa, Takeshi Koshiba
2007/045 (PDF ) A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007/044 (PDF ) Design and Primitive Specification for Shannon Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory Rose, Miriam Wiggers de Vries
2007/043 (PDF ) Reflection Attacks on Product Ciphers Orhun Kara
2007/042 (PDF ) Authorship Proof for Textual Document J. Wu, D. R. Stinson
2007/041 (PDF ) Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes B. Skoric, S. Katzenbeisser, M. U. Celik
2007/040 (PDF ) Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation Pradeep Kumar Mishra, Vassil Dimitrov
2007/039 (PDF ) New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Onur Aciicmez, Shay Gueron, Jean-Pierre Seifert
2007/038 (PDF ) Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 Joo Yeon Cho, Josef Pieprzyk
2007/037 (PDF ) Best Quadratic Approximations of Cubic Boolean Functions Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
2007/036 (PDF ) Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman Eike Kiltz
2007/035 (PDF ) Cryptanalysis of white box DES implementations Louis Goubin, Jean-Michel Masereel, Michael Quisquater
2007/034 (PDF ) A New Type of Cipher: DICING_CSB Li An-Ping
2007/033 (PDF ) From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme Eike Kiltz
2007/032 (PDF ) An improved collision probability for CBC-MAC and PMAC Avradip Mandal, Mridul Nandi
2007/031 (PDF ) Improved Security Analysis of PMAC Mridul Nandi, Avradip Mandal
2007/030 (PDF ) Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2007/029 (PDF ) A General Construction of Tweakable Block Ciphers and Different Modes of Operations Debrup Chakraborty, Palash Sarkar
2007/028 (PDF ) HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach Debrup Chakraborty, Palash Sarkar
2007/026 (PDF ) Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang
2007/025 (PDF ) Private Locally Decodable Codes Rafail Ostrovsky, Omkant Pandey, Amit Sahai
2007/024 (PDF ) Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson.
2007/023 (PDF ) Efficient Hybrid Encryption from ID-Based Encryption Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
2007/022 (PDF ) On Perfectly Balanced Boolean Functions O. A. Logachev
2007/021 (PDF ) Two Trivial Attacks on Trivium Alexander Maximov, Alex Biryukov
2007/020 (PDF ) TinyTate: Identity-Based Encryption for Sensor Networks Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio Lo'pez, Ricardo Dahab
2007/019 (PDF ) Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions Changshe Ma, Jian Weng, Dong Zheng
2007/018 (PDF ) Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S. M. Chow, Kim-Kwang Raymond Choo
2007/017 (PDF ) Group Decryption Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
2007/015 (PDF ) Group Encryption Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2007/014 (PDF ) Invertible Universal Hashing and the TET Encryption Mode Shai Halevi
2007/013 (PDF ) Optimised versions of the Ate and Twisted Ate Pairings Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
2007/012 (PDF ) Interactive two-channel message authentication based on interactive-collision Resistant hash functions Atefeh Mashatan, Douglas R. Stinson
2007/011 (PDF ) Universally Composable Key-evolving Signature Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2007/010 (PDF ) Computing endomorphism rings of Jacobians of genus 2 curves over finite fields David Freeman, Kristin Lauter
2007/009 (PDF ) New Public Key Cryptosystems Using Polynomials over Non-commutative Rings Zhenfu Cao, Xiaolei Dong, Licheng Wang
2007/008 (PDF ) Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006 Dong Hoon Lee, Je Hong Park, Jaewoo Han
2007/007 (PDF ) One-Round ID-Based Blind Signature Scheme without ROS Assumption Wei Gao, Xueli Wang, Guilin Wang, Fei Li
2007/006 (PDF ) Efficient Dynamic k-Times Anonymous Authentication Lan Nguyen
2007/005 (PDF ) Privacy-Protecting Coupon System Revisited Lan Nguyen
2007/004 (PDF ) Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
2007/003 (PDF ) The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks Johann Groszschaedl, Alexander Szekely, Stefan Tillich
2007/001 (PDF ) Families of genus 2 curves with small embedding degree Laura Hitt
2006/486 (PDF ) Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2006/485 (PDF ) Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado, Masakatu Morii
2006/483 (PDF ) New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/482 (PDF ) Countermeasures for the Simple Branch Prediction Analysis Giovanni Agosta, Gerardo Pelosi
2006/481 (PDF ) A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang
2006/480 (PDF ) Cryptanalysis of REESSE1+ Public Key Cryptosystem Shengli Liu, Fangguo Zhang
2006/479 (PDF ) Efficient Provably-Secure Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/478 (PDF ) Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang
2006/477 (PDF ) Dynamic Cryptographic Hash Functions William R. Speirs II, Samuel S. Wagstaff Jr.
2006/476 (PDF ) Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee
2006/475 (PDF ) New Technique for Solving Sparse Equation Systems Håvard Raddum, Igor Semaev
2006/474 (PDF ) Speeding up the Bilinear Pairings Computation on Curves with Automorphisms Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2006/473 (PDF ) Identity-Based Proxy Re-encryption Matthew Green, Giuseppe Ateniese
2006/472 (PDF ) A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment Luis Teixeira d'Aguiar Norton Brandao
2006/471 (PDF ) Multiplication and Squaring on Pairing-Friendly Fields Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab
2006/470 (PDF ) On the security of a group key agreement protocol Qiang Tang
2006/469 (PDF ) An Attack on Disguised Elliptic Curves David Mireles
2006/468 (PDF ) White Box Cryptography: Another Attempt Julien Bringer, Herve Chabanne, Emmanuelle Dottax
2006/467 (PDF ) Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions) Donghoon Chang, Moti Yung
2006/466 (PDF ) Prime Order Primitive Subgroups in Torus-Based Cryptography Jason E. Gower
2006/465 (PDF ) Security and Composition of Cryptographic Protocols: A Tutorial Ran Canetti
2006/464 (PDF ) Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006 Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
2006/463 (PDF ) Obfuscation for Cryptographic Purposes Dennis Hofheinz, John Malone-Lee, Martijn Stam
2006/462 (PDF ) Improved Collision and Preimage Resistance Bounds on PGV Schemes Lei Duo, Chao Li
2006/461 (PDF ) On Post-Modern Cryptography Oded Goldreich
2006/460 (PDF ) Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang
2006/459 (PDF ) Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications Claude Carlet
2006/458 (PDF ) Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias, Moti Yung
2006/457 (PDF ) Linear Approximating to Integer Addition Li An-Ping
2006/456 (PDF ) Indistinguishability Amplification Ueli Maurer, Krzysztof Pietrzak, Renato Renner
2006/455 (PDF ) On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation Jonathan Katz
2006/454 (PDF ) How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
2006/453 (PDF ) Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng
2006/452 (PDF ) Hybrid Protocol For Password-based Key Exchange in Three-party Setting TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
2006/451 (PDF ) Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms Jongsung Kim
2006/450 (PDF ) Secure Cryptographic Workflow in the Standard Model M. Barbosa, P. Farshim
2006/449 (PDF ) Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare, Phillip Rogaway
2006/448 (PDF ) Universally Composable and Forward Secure RFID Authentication and Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros
2006/447 (PDF ) Towards a Separation of Semantic and CCA Security for Public Key Encryption Yael Gertner, Tal Malkin, Steven Myers
2006/446 (PDF ) New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles) Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo
2006/445 (PDF ) A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/444 (PDF ) Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors Chris Peikert, Alon Rosen
2006/443 (PDF ) Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups Yvo Desmedt, Tanja Lange, Mike Burmester
2006/442 (PDF ) An attack on the certificateless signature scheme from EUC Workshops 2006 Je Hong Park
2006/441 (PDF ) General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity Donghoon Chang, Mridul Nandi
2006/440 (PDF ) A New Type of Group Signature Scheme Jun Zhong Dake He
2006/439 (PDF ) A New Type of Group Blind Signature Scheme Based on Bilinear Pairings Jun Zhong Dake He
2006/438 (PDF ) On the pseudo-random generator ISAAC Jean-Philippe Aumasson
2006/437 (PDF ) On Zigzag Functions and Related Objects in New Metric An Braeken, Ventzislav Nikov, Svetla Nikova
2006/436 (PDF ) Statistically-Hiding Commitment from Any One-Way Function Iftach Haitner, Omer Reingold
2006/435 (PDF ) Searching for Shapes in Cryptographic Protocols (extended version) Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
2006/434 (PDF ) Balanced Boolean Functions with (more than) Maximum Algebraic Immunity Deepak Kumar Dalai, Subhamoy Maitra
2006/433 (PDF ) Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini, Peter Wild
2006/432 (PDF ) Universally Composable Security with Global Setup Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
2006/431 (PDF ) Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/430 (PDF ) From Weak to Strong Watermarking Nicholas Hopper, David Molnar, David Wagner
2006/429 (PDF ) On a new invariant of Boolean functions Sugata Gangopadhyay, Deepmala Sharma
2006/428 (PDF ) Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4 Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/427 (PDF ) Pairing-friendly elliptic curves with small security loss by Cheon's algorithm Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
2006/424 (PDF ) Security Analysis of Voice-over-IP Protocols Prateek Gupta, Vitaly Shmatikov
2006/423 (PDF ) Perfect NIZK with Adaptive Soundness Masayuki Abe, Serge Fehr
2006/422 (PDF ) Long-term Security and Universal Composability Joern Mueller-Quade, Dominique Unruh
2006/421 (PDF ) Universally Composable Three-Party Key Distribution Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2006/420 (PDF ) The REESSE1+ Public Key Cryptosystem v 2.21 Shenghui Su, Shuwang Lv
2006/419 (PDF ) Some New Hidden Ideal Cryptosystems Ilia Toli
2006/418 (PDF ) Analysis of Privacy-Preserving Element Reduction of Multiset Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong
2006/417 (PDF ) The Recent Attack of Nie et al On TTM is Faulty T. Moh
2006/416 (PDF ) Authenticated Interleaved Encryption Claude Castelluccia
2006/415 (PDF ) On the Minimal Embedding Field Laura Hitt
2006/414 (PDF ) Zero Knowledge and Soundness are Symmetric Shien Jin Ong, Salil Vadhan
2006/413 (PDF ) Preimage Attack on Parallel FFT-Hashing Donghoon Chang
2006/412 (PDF ) Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash Donghoon Chang
2006/411 (PDF ) Preimage Attack on Hashing with Polynomials proposed at ICISC'06 Donghoon Chang
2006/410 (PDF ) Galois Field Commitment Scheme Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
2006/409 (PDF ) A NEW MAC: LAMA Li An-Ping
2006/408 (PDF ) A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries Goichiro Hanaoka, Hideki Imai
2006/407 (PDF ) Cryptography in the Multi-string Model Jens Groth, Rafail Ostrovsky
2006/406 (PDF ) Redundancy of the Wang-Yu Sufficient Conditions Yuto Nakano, Hidenori Kuwakado, Masakatu Morii
2006/405 (PDF ) Universally Composable Blind Signatures in the Plain Model Aslak Bakke Buan, Kristian Gøsteen, Lillian Kråkmo
2006/404 (PDF ) Faugere's F5 Algorithm Revisited Till Stegers
2006/403 (PDF ) Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit Willi Geiselmann, Rainer Steinwandt
2006/402 (PDF ) Algebraic Cryptanalysis of the Data Encryption Standard Nicolas T. Courtois, Gregory V. Bard
2006/400 (PDF ) Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
2006/399 (PDF ) Multi-Property-Preserving Hash Domain Extension and the EMD Transform Mihir Bellare, Thomas Ristenpart
2006/398 (PDF ) The Layered Games Framework for Specifications and Analysis of Security Protocols Amir Herzberg, Igal Yoffe
2006/397 (PDF ) Revisiting the Efficiency of Malicious Two-Party Computation David P. Woodruff
2006/396 (PDF ) Security Protocols with Isotropic Channels Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
2006/395 (PDF ) Security-Focused Survey on Group Key Exchange Protocols Mark Manulis
2006/394 (PDF ) Identity Based Strong Designated Verifier Proxy Signature Schemes Sunder Lal, Vandani Verma
2006/392 (PDF ) The Tate Pairing via Elliptic Nets Katherine E. Stange
2006/391 (PDF ) A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2006/389 (PDF ) Traceable Ring Signature Eiichiro Fujisaki, Koutarou Suzuki
2006/388 (PDF ) Survey on Security Requirements and Models for Group Key Exchange Mark Manulis
2006/387 (PDF ) A Note on the Security of NTRUSign Phong Q. Nguyen
2006/386 (PDF ) The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange Mark Wooding
2006/385 (PDF ) On Security Models and Compilers for Group Key Exchange Protocols Emmanuel Bresson, Mark Manulis, Joerg Schwenk
2006/384 (PDF ) Design and Analysis of a Hash Ring-iterative Structure Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang
2006/383 (PDF ) Traitor tracing scheme with constant ciphertext rate against powerful pirates Thomas Sirvent
2006/382 (PDF ) Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks E-yong Kim, Hwangnam Kim, Kunsoo Park
2006/381 (PDF ) Cryptanalysis on an Algorithm for Efficient Digital Signatures Fuw-Yi Yang
2006/380 (PDF ) On Security of Sovereign Joins Einar Mykletun, Gene Tsudik
2006/379 (PDF ) Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna
2006/378 (PDF ) A New Key Exchange Primitive Based on the Triple Decomposition Problem Yesem Kurt
2006/377 (PDF ) Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards James Birkett, Alexander W. Dent, Gregory Neven, Jacob Schuldt
2006/376 (PDF ) A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions Vlastimil KLIMA
2006/375 (PDF ) Distortion maps for genus two curves Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin Smith
2006/374 (PDF ) Robust Final-Round Cache-Trace Attacks Against AES Joseph Bonneau
2006/373 (PDF ) Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model Joseph K. Liu, Man Ho Au, Willy Susilo
2006/372 (PDF ) A taxonomy of pairing-friendly elliptic curves David Freeman, Michael Scott, Edlyn Teske
2006/371 (PDF ) Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3 Robert Ronan, Colm o hEigeartaigh, Colin Murphy, Tim Kerins, Paulo S. L. M. Barreto
2006/370 (PDF ) A DoS Attack Against the Integrity-Less ESP (IPSec) Ventzislav Nikov
2006/369 (PDF ) RadioGatún, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2006/368 (PDF ) Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
2006/367 (PDF ) An Attack on a Certificateless Signature Scheme Xuefei Cao, Kenneth G. Paterson, Weidong Kou
2006/366 (PDF ) A Latency-Free Election Scheme Kristian Gjøsteen
2006/364 (PDF ) Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric Gregory V. Bard
2006/362 (PDF ) Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks Palash Sarkar, Sanjit Chatterjee
2006/361 (PDF ) Generic Construction of (Identity-based) Perfect Concurrent Signatures Sherman S. M. Chow, Willy Susilo
2006/360 (PDF ) Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens, Arjen Lenstra, Benne de Weger
2006/359 (PDF ) On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge Mihir Bellare, Oded Goldreich
2006/358 (PDF ) Public Key Encryption with Keyword Search based on K-Resilient IBE Dalia Khader
2006/357 (PDF ) Cryptanalysis of a homomorphic public-key cryptosystem over a finite group Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild
2006/356 (PDF ) Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds Emilia Käsper, Sven Laur, Helger Lipmaa
2006/355 (PDF ) Concurrent Non-Malleable Zero Knowledge Boaz Barak, Manoj Prabhakaran, Amit Sahai
2006/354 (PDF ) A new stream cipher: DICING Li An-Ping
2006/353 (PDF ) Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes Zhenjie Huang, Kefei Chen, Yumin Wang
2006/352 (PDF ) Foundations of Secure E-Commerce: The Order Layer Amir Herzberg, Igal Yoffe
2006/351 (PDF ) On the Power of Simple Branch Prediction Analysis Onur Aciicmez, Cetin Kaya Koc, Jean-Pierre Seifert
2006/350 (PDF ) Impossible Differential Cryptanalysis of ARIA and Camellia Wenling Wu, Wentao Zhang, Dengguo Feng
2006/349 (PDF ) A Note On Side-Channels Resulting From Dynamic Compilation D. Page
2006/348 (PDF ) Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist Krzysztof Pietrzak
2006/347 (PDF ) Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1 Fumiyuki Momose, Jinhui Chao
2006/346 (PDF ) Generic Transformation to Strongly Unforgeable Signatures Qiong Huang, Duncan S. Wong, Yiming Zhao
2006/345 (PDF ) Private and Efficient Stable Marriages (Matching) T. Atkinson, R. Bartak, M. -C. Silaghi, E. Tuleu, M. Zanker
2006/344 (PDF ) A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/343 (PDF ) Verifiably Encrypted Signature Scheme with Threshold Adjudication M. Choudary Gorantla, Ashutosh Saxena
2006/342 (PDF ) A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/341 (PDF ) MV3: A new word based stream cipher using rapid mixing and revolving buffers Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
2006/340 (PDF ) Cryptanalyses of Some Multimedia Encryption Schemes Chengqing Li
2006/338 (PDF ) Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings Fagen Li, Yupu Hu, Shuanggen Liu
2006/337 (PDF ) An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol D. R. Stinson, J. Wu
2006/336 (PDF ) High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
2006/335 (PDF ) A ID-Based Deniable Authentication Protocol on pairings Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/334 (PDF ) Colliding Message Pair for 53-Step HAS-160 Florian Mendel
2006/333 (PDF ) Discrete Logarithms in Generalized Jacobians S. D. Galbraith, B. A. Smith
2006/332 (PDF ) Improved Efficiency for Private Stable Matching Matthew Franklin, Mark Gondree, Payman Mohassel
2006/331 (PDF ) On the Security of Generalized Jacobian Cryptosystems Isabelle Dechene
2006/330 (PDF ) Extended Double-Base Number System with applications to Elliptic Curve Cryptography Christophe Doche, Laurent Imbert
2006/329 (PDF ) Designated Verifier Signature Scheme Based on Braid Groups Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan
2006/328 (PDF ) Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/327 (PDF ) An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/326 (PDF ) Analyzing the HB and HB+ Protocols in the ``Large Error'' Case Jonathan Katz, Adam Smith
2006/325 (PDF ) Invisible Designated Confirmer Signatures without Random Oracles Victor K. Wei
2006/324 (PDF ) The Average Transmission Overhead of Broadcast Encryption Sarang Aravamuthan, Sachin Lodha
2006/323 (PDF ) Computational Soundness of Formal Indistinguishability and Static Equivalence Gergei Bana, Payman Mohassel, Till Stegers
2006/322 (PDF ) Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2006/321 (PDF ) Efficient Pseudorandom Generators Based on the DDH Assumption Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
2006/320 (PDF ) CMSS -- An Improved Merkle Signature Scheme Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin Doering, Elena Klintsevich
2006/319 (PDF ) Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions Scott Contini, Yiqun Lisa Yin
2006/318 (PDF ) Chameleon-Based Deniable Authenticated Key Agreement Protocol Chunbo Ma, Jun Ao, Jianhua Li
2006/317 (PDF ) Weaknesses of the FORK-256 compression function Krystian Matusiewicz, Scott Contini, Josef Pieprzyk
2006/316 (PDF ) A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks Sarang Aravamuthan, Viswanatha Rao Thumparthy
2006/315 (PDF ) On the Necessity of Rewinding in Secure Multiparty Computation Michael Backes, Joern-Mueller Quade, Dominique Unruh
2006/314 (PDF ) Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
2006/313 (PDF ) Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields Lars Elmegaard-Fessel
2006/312 (PDF ) ElGamal type signature schemes for n-dimensional vector spaces Iwan M. Duursma, SeungKook Park
2006/310 (PDF ) A d-Sequence based Recursive Random Number Generator Abhishek Parakh
2006/309 (PDF ) Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
2006/308 (PDF ) Efficient ID-based Threshold Signature Schemes without Pairings Jun Shao, Zhenfu Cao, Licheng Wang
2006/307 (PDF ) Note on Design Criteria for Rainbow-Type Multivariates Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen
2006/306 (PDF ) Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability Alexander W. Dent, Qiang Tang
2006/305 (PDF ) Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation V. S. Dimitrov, K. U. Jaervinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
2006/304 (PDF ) Identity-Based Encryption Gone Wild Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
2006/303 (PDF ) Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption Eric Filiol
2006/302 (PDF ) Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. Atefeh Mashatan, Douglas R. Stinson
2006/301 (PDF ) New features for JPEG Steganalysis Johann Barbier, Éric Filiol, Kichenakoumar Mayoura
2006/299 (PDF ) Efficient Implementation of Tate Pairing on a Mobile Phone using Java Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
2006/298 (PDF ) A Fully Collusion Resistant Broadcast, Trace, and Revoke System Dan Boneh, Brent Waters
2006/297 (PDF ) Forward-Secure Signatures with Untrusted Update Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
2006/296 (PDF ) On the Generic Construction of Identity-Based Signatures with Additional Properties David Galindo, Javier Herranz, Eike Kiltz
2006/295 (PDF ) Visual secret sharing scheme with autostereogram Feng Yi, Daoshun Wang, Yiqi Dai
2006/294 (PDF ) The Collision Intractability of MDC-2 in the Ideal Cipher Model John P Steinberger
2006/293 (PDF ) Fast Algorithms for the Free Riders Problem in Broadcast Encryption Zulfikar Ramzan, David P. Woodruff
2006/292 (PDF ) Ideal Multipartite Secret Sharing Schemes Oriol Farras, Jaume Marti-Farre, Carles Padro
2006/291 (PDF ) Hard Homogeneous Spaces Jean-Marc Couveignes
2006/290 (PDF ) On Authentication with HMAC and Non-Random Properties Christian Rechberger, Vincent Rijmen
2006/289 (PDF ) Efficient Ring Signatures without Random Oracles Hovav Shacham, Brent Waters
2006/288 (PDF ) Predicting Secret Keys via Branch Prediction Onur Aciicmez, Jean-Pierre Seifert, Cetin Kaya Koc
2006/287 (PDF ) Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh, Brent Waters
2006/286 (PDF ) Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps Sujing Zhou, Dongdai Lin
2006/285 (PDF ) Unrestricted Aggregate Signatures Mihir Bellare, Chanathip Namprempre, Gregory Neven
2006/284 (PDF ) Constant Round Group Key Exchange with Logarithmic Computational Complexity Junghyun Nam, Youngsook Lee, Dongho Won
2006/283 (PDF ) Does Privacy Require True Randomness? Carl Bosley, Yevgeniy Dodis
2006/281 (PDF ) Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys Phillip Rogaway
2006/280 (PDF ) Deniable Authentication and Key Exchange Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
2006/279 (PDF ) On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique) Sanjit Chatterjee, Palash Sarkar
2006/278 (PDF ) Fundamental problems in provable security and cryptography Alexander W. Dent
2006/277 (PDF ) On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits Oded Goldreich
2006/276 (PDF ) Mitigating Dictionary Attacks on Password-Protected Local Storage Ran Canetti, Shai Halevi, Michael Steiner
2006/275 (PDF ) A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random Debrup Chakraborty, Palash Sarkar
2006/274 (PDF ) An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri, P. D. Srivastava
2006/273 (PDF ) Secure Positioning of Mobile Terminals with Simplex Radio Communication Mikio Fujii
2006/272 (PDF ) Efficient Use of Random Delays Olivier Benoit, Michael Tunstall
2006/271 (PDF ) Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard
2006/270 (PDF ) Formal Analysis and Systematic Construction of Two-factor Authentication Scheme Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
2006/269 (PDF ) An Analysis of the Hermes8 Stream Ciphers Steve Babbage, Carlos Cid, Norbert Pramstaller, Havard Raddum
2006/268 (PDF ) On the Equivalence of Several Security Notions of Key Encapsulation Mechanism Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
2006/267 (PDF ) Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation Mihir Bellare, Tadayoshi Kohno, Victor Shoup
2006/266 (PDF ) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis Michael Backes, Peeter Laud
2006/265 (PDF ) Some (in)sufficient conditions for secure hybrid encryption. Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/264 (PDF ) A Simple and Unified Method of Proving Unpredictability Mridul Nandi
2006/263 (PDF ) Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems Dragos Trinca
2006/262 (PDF ) Logical Concepts in Cryptography Simon Kramer
2006/261 (PDF ) Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks Frederic Didier
2006/260 (PDF ) A Note On Game-Hopping Proofs Alexander W. Dent
2006/259 (PDF ) Simplified Submission of Inputs to Protocols Douglas Wikstrom
2006/258 (PDF ) Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, David Wagner
2006/257 (PDF ) Efficient Divisor Class Halving on Genus Two Curves Peter Birkner
2006/256 (PDF ) Constant-Round Concurrent NMWI and its relation to NMZK Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2006/255 (PDF ) Malicious KGC Attacks in Certificateless Cryptography Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang
2006/254 (PDF ) Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov, Lintao Zhang
2006/253 (PDF ) Hard Instances of the Constrained Discrete Logarithm Problem Ilya Mironov, Anton Mityagin, Kobbi Nissim
2006/252 (PDF ) On the Resilience of Key Agreement Protocols to Key Compromise Impersonation Maurizio A. Strangio
2006/251 (PDF ) Accelerating Cryptanalysis with the Method of Four Russians Gregory V. Bard
2006/250 (PDF ) Linear Cryptanalysis of CTC Orr Dunkelman, Nathan Keller
2006/249 (PDF ) Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240 Selcuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yucel
2006/248 (PDF ) Disguising tori and elliptic curves Steven D. Galbraith
2006/246 (PDF ) ON THE POSTQUANTUM CIPHER SCHEME Jaroslav HRUBY
2006/245 (PDF ) Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/244 (PDF ) Length-based cryptanalysis: The case of Thompson's Group Dima Ruinskiy, Adi Shamir, Boaz Tsaban
2006/243 (PDF ) Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
2006/242 (PDF ) The Probability Advantages of Two Linear Expressions in Symmetric Ciphers Haina Zhang, Shaohui Wang, Xiaoyun Wang
2006/241 (PDF ) A Stronger Definition for Anonymous Electronic Cash Marten Trolin
2006/240 (PDF ) Computing Zeta Functions of Nondegenerate Curves W. Castryck, J. Denef, F. Vercauteren
2006/239 (PDF ) Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption Yi Deng, Dongdai Lin
2006/237 (PDF ) Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure? Claire Whelan, Mike Scott
2006/236 (PDF ) Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
2006/235 (PDF ) Application of ECM to a Class of RSA keys Abderrahmane Nitaj
2006/234 (PDF ) RFID Security: Tradeoffs between Security and Efficiency Ivan Damgård, Michael Østergaard
2006/233 (PDF ) A simple generalization of El-Gamal cryptosystem to non-abelian groups Ayan Mahalanobis
2006/232 (PDF ) Improvement to AKS algorithm Roman Popovych
2006/231 (PDF ) A handy multi-coupon system Sebastien Canard, Aline Gouget, Emeline Hufschmitt
2006/230 (PDF ) Another Look at Generic Groups Neal Koblitz, Alfred Menezes
2006/229 (PDF ) Another Look at "Provable Security". II Neal Koblitz, Alfred Menezes
2006/228 (PDF ) Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization Mihir Bellare, Amit Sahai
2006/227 (PDF ) An Elliptic Curve Processor Suitable For RFID-Tags L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
2006/226 (PDF ) The Fairness of Perfect Concurrent Signatures Guilin Wang, Feng Bao, Jianying Zhou
2006/225 (PDF ) Provably-Secure Time-Bound Hierarchical Key Assignment Schemes Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/224 (PDF ) Generalizations of the Karatsuba Algorithm for Efficient Implementations André Weimerskirch, Christof Paar
2006/223 (PDF ) What Hashes Make RSA-OAEP Secure? Daniel R. L. Brown
2006/222 (PDF ) Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants R. Overbeck
2006/221 (PDF ) Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway, Thomas Shrimpton
2006/220 (PDF ) Multi-Dimensional Montgomery Ladders for Elliptic Curves Daniel R. L. Brown
2006/219 (PDF ) Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
2006/218 (PDF ) Computationally Sound Symbolic Secrecy in the Presence of Hash Functions Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
2006/217 (PDF ) Statistical Analysis of the MARS Block Cipher Andrey Pestunov
2006/216 (PDF ) Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains Meloni Nicolas
2006/215 (PDF ) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion Shujun Li, Chengqing Li, Kowk-Tung Lo, Guanrong Chen
2006/214 (PDF ) Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2006/213 (PDF ) Luby-Rackoff Ciphers from Weak Round Functions? Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
2006/212 (PDF ) Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes Kemal BICAKCI, Bruno Crispo, Andrew S. Tanenbaum
2006/211 (PDF ) A Survey of Certificateless Encryption Schemes and Security Models Alexander W. Dent
2006/210 (PDF ) Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky
2006/209 (PDF ) Minimal Weight and Colexicographically Minimal Integer Representations Clemens Heuberger, James A. Muir
2006/208 (PDF ) Private Information Retrieval Using Trusted Hardware Shuhong Wang, Xuhua Ding, Robert Deng, Feng Bao
2006/207 (PDF ) The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/206 (PDF ) On the Provable Security of an Efficient RSA-Based Pseudorandom Generator Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
2006/204 (PDF ) Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar.
2006/203 (PDF ) Generalization of the Selective-ID Security Model for HIBE Protocols Sanjit Chatterjee, Palash Sarkar
2006/202 (PDF ) Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/201 (PDF ) Efficient Tate Pairing Computation Using Double-Base Chains Chang'an Zhao, Fangguo Zhang, Jiwu Huang
2006/200 (PDF ) Improvement of recently proposed Remote User Authentication Schemes Guanfei Fang, Genxun huang
2006/199 (PDF ) Identity-based Key Agreement Protocols From Pairings L. Chen, Z. Cheng, N. P. Smart
2006/198 (PDF ) Cryptographically Private Support Vector Machines Sven Laur, Helger Lipmaa, Taneli Mielikäinen
2006/197 (PDF ) A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
2006/196 (PDF ) On ZK-Crypt, Book Stack, and Statistical Tests S. Doroshenko, A. Fionov, A. Lubkin, V. Monarev, B. Ryabko
2006/195 (PDF ) An Efficient ID-based Digital Signature with Message Recovery Based on Pairing Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
2006/193 (PDF ) (Hierarchical Identity-Based) Threshold Ring Signatures Victor K. Wei, Tsz Hon Yuen
2006/192 (PDF ) DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior Osman Kocar
2006/191 (PDF ) A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION Sahadeo Padhye
2006/190 (PDF ) Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator Berry Schoenmakers, Andrey Sidorenko
2006/189 (PDF ) Unconditionally secure chaffing and winnowing with short authentication tags D. R. Stinson
2006/188 (PDF ) New Blockcipher Modes of Operation with Beyond the Birthday Bound Security Tetsu Iwata
2006/187 (PDF ) On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
2006/186 (PDF ) Deterministic and Efficiently Searchable Encryption Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
2006/185 (PDF ) Statistical Zero-Knowledge Arguments for NP from Any One-Way Function Minh-Huyen Nguyen, Shien Jin Ong, Salil Vadhan
2006/184 (PDF ) On Signatures of Knowledge Melissa Chase, Anna Lysyanskaya
2006/183 (PDF ) Information-Theoretic Conditions for Two-Party Secure Function Evaluation Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
2006/182 (PDF ) On the Limits of Point Function Obfuscation Arvind Narayanan, Vitaly Shmatikov
2006/181 (PDF ) There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$ Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
2006/180 (PDF ) Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions Dmitry Khovratovich
2006/179 (PDF ) FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields Chang Shu, Soonhak Kwon, Kris Gaj
2006/178 (PDF ) A New Cryptosystem Based On Hidden Order Groups Amitabh Saxena, Ben Soh
2006/177 (PDF ) On the (Im-)Possibility of Extending Coin Toss Dennis Hofheinz, Joern Mueller-Quade, Dominique Unruh
2006/176 (PDF ) Counting points on elliptic curves in medium characteristic Antoine Joux, Reynald Lercier
2006/175 (PDF ) Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models Moni Naor, Gil Segev, Adam Smith
2006/173 (PDF ) Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model Le Trieu Phong, Ogata Wakaha
2006/172 (PDF ) On Computing Products of Pairings R Granger, N. P. Smart
2006/171 (PDF ) Key confirmation and adaptive corruptions in the protocol security logic Prateek Gupta, Vitaly Shmatikov
2006/170 (PDF ) Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato, Alfredo De Santis
2006/169 (PDF ) Simplified pairing computation and security implications Steven D. Galbraith, Colm O hEigeartaigh, Caroline Sheedy
2006/168 (PDF ) How Fast can be Algebraic Attacks on Block Ciphers ? Nicolas T. Courtois
2006/167 (PDF ) Towards Trustworthy e-Voting using Paper Receipts Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
2006/166 (PDF ) General Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene
2006/165 (PDF ) Pairings for Cryptographers S. D. Galbraith, K. G. Paterson, N. P. Smart
2006/164 (PDF ) Classification of Signature-only Signature Models Zhengjun Cao
2006/163 (PDF ) Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods Gregory V. Bard
2006/162 (PDF ) A Summary of McEliece-Type Cryptosystems and their Security D. Engelbert, R. Overbeck, A. Schmidt
2006/161 (PDF ) Cryptanalysis of 4-Pass HAVAL Zhangyi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng
2006/158 (PDF ) An Efficient ID-based Proxy Signature Scheme from Pairings Chunxiang Gu, Yuefei Zhu
2006/157 (PDF ) An efficient way to access an array at a secret index Timothy Atkinson, Marius C. Silaghi
2006/156 (PDF ) The Hardness of the DHK Problem in the Generic Group Model Alexander W. Dent
2006/155 (PDF ) Independent Zero-Knowledge Sets Rosario Gennaro, Silvio Micali
2006/154 (PDF ) New Public Key Authentication Frameworks with Lite Certification Authority Xiaolei Dong, Licheng Wang, Zhenfu Cao
2006/153 (PDF ) On the Relationships Between Notions of Simulation-Based Security Anupam Datta, Ralf Kuesters, John C. Mitchell, Ajith Ramanathan
2006/152 (PDF ) Pairing based Mutual Authentication Scheme Using Smart Cards G. Shailaja, K. Phani Kumar, Ashutosh Saxena
2006/151 (PDF ) Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Kuesters
2006/150 (PDF ) Demonstrating data possession and uncheatable data transfer Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto
2006/149 (PDF ) A method of construction of balanced functions with optimum algebraic immunity C. Carlet
2006/148 (PDF ) Computational Indistinguishability between Quantum States and Its Cryptographic Application Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
2006/147 (PDF ) New Integrated proof Method on Iterated Hash Structure and New Structures Duo Lei
2006/146 (PDF ) Completeness of Formal Hashes in the Standard Model Flavio D. Garcia, Peter van Rossum
2006/145 (PDF ) PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES Alexander Rostovtsev, Anton Stolbunov
2006/144 (PDF ) Implementing Cryptographic Pairings on Smartcards Michael Scott, Neil Costigan, Wesam Abdulwahab
2006/143 (PDF ) Blinded Fault Resistant Exponentiation Guillaume Fumaroli, David Vigilant
2006/142 (PDF ) Rational Secret Sharing, Revisited S. Dov Gordon, Jonathan Katz
2006/141 (PDF ) Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei
2006/140 (PDF ) GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks Jiejun Kong
2006/139 (PDF ) A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) Francois-Xavier Standaert, Tal G. Malkin, Moti Yung
2006/138 (PDF ) Trace-Driven Cache Attacks on AES Onur Ac\i{}içmez, Çetin Kaya Koç
2006/137 (PDF ) Defining Strong Privacy for RFID Ari Juels, Stephen A. Weis
2006/136 (PDF ) A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL Gregory V. Bard
2006/135 (PDF ) The Design Principle of Hash Function with Merkle-Damgård Construction Duo Lei, Da Lin, Li Chao, Keqin Feng, Longjiang Qu
2006/134 (PDF ) Identity Based Strong Designated Verifier Signature Scheme K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/133 (PDF ) Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio López-Hernández
2006/132 (PDF ) Conditional Reactive Simulatability Michael Backes, Markus Duermuth, Dennis Hofheinz, Ralf Kuesters
2006/131 (PDF ) Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols Mike Burmester, Tri van Le, Breno de Medeiros
2006/130 (PDF ) Simulatable Security and Polynomially Bounded Concurrent Composition Dennis Hofheinz, Dominique Unruh
2006/129 (PDF ) Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i Wei Han, Dong Zheng, Ke-fei Chen
2006/128 (PDF ) On the existence of distortion maps on ordinary elliptic curves Denis Charles
2006/127 (PDF ) A New Cryptanalytic Time/Memory/Data Trade-off Algorithm Sourav Mukhopadhyay, Palash Sarkar
2006/126 (PDF ) ECGSC: Elliptic Curve based Generalized Signcryption Scheme Yiliang Han, Xiaoyuan Yang
2006/125 (PDF ) Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee
2006/124 (PDF ) Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving K. W. Wong, Edward C. W. Lee, L. M. Cheng, Xiaofeng Liao
2006/123 (PDF ) Designated Confirmer Signatures Revisited Douglas Wikström
2006/122 (PDF ) Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts Eike Kiltz
2006/121 (PDF ) Counting Prime Numbers with Short Binary Signed Representation José de Jesús Angel Angel, Guillermo Morales-Luna
2006/120 (PDF ) Key Privacy for Identity Based Encryption Jason E. Holt
2006/118 (PDF ) On construction of non-normal Boolean functions Sugata Gangopadhyay, Deepmala Sharma
2006/117 (PDF ) Conjectured Security of the ANSI-NIST Elliptic Curve RNG Daniel R. L. Brown
2006/116 (PDF ) Second Preimages for Iterated Hash Functions Based on a b-Block Bypass Mario Lamberger, Norbert Pramstaller, Vincent Rijmen
2006/115 (PDF ) Fast exponentiation via prime finite field isomorphism Alexander Rostovtsev
2006/114 (PDF ) Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/113 (PDF ) A New Construction of Time Capsule Signature Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian
2006/112 (PDF ) Entity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer
2006/111 (PDF ) Attacking LCCC Batch Verification of RSA Signatures Martin Stanek
2006/110 (PDF ) The Eta Pairing Revisited F. Hess, N. P. Smart, F. Vercauteren
2006/109 (PDF ) A Simpler Sieving Device: Combining ECM and TWIRL Willi Geiselmann, Fabian Januszewski, Hubert Koepfer, Jan Pelzl, Rainer Steinwandt
2006/108 (PDF ) Efficient Public Key Encryption with Keyword Search Schemes from Pairings Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
2006/107 (PDF ) The number field sieve for integers of low weight Oliver Schirokauer
2006/106 (PDF ) Further Refinement of Pairing Computation Based on Miller's Algorithm Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
2006/105 (PDF ) Tunnels in Hash Functions: MD5 Collisions Within a Minute Vlastimil Klima
2006/104 (PDF ) Fast Collision Attack on MD5 Marc Stevens
2006/103 (PDF ) Security of VSH in the Real World Markku-Juhani O. Saarinen
2006/102 (PDF ) Efficient Blind and Partially Blind Signatures Without Random Oracles Tatsuaki Okamoto
2006/101 (PDF ) Information-theoretic analysis of coating PUFs B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls
2006/100 (PDF ) A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability Zhou Sujing, Lin Dongdai
2006/099 (PDF ) An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families Dongvu Tonien, Reihaneh Safavi-Naini
2006/098 (PDF ) Gröbner Basis Based Cryptanalysis of SHA-1 Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
2006/097 (PDF ) A Cryptographic Tour of the IPsec Standards Kenneth G. Paterson
2006/096 (PDF ) Sequential Aggregate Signatures and Multisignatures without Random Oracles Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2006/095 (PDF ) MAC Reforgeability John Black, Martin Cochran
2006/094 (PDF ) Cryptanalysis of the MEM Mode of Operation Peng Wang, Dengguo Feng, Wenling Wu
2006/093 (PDF ) RSA and a higher degree diophantine equation Abderrahmane Nitaj
2006/092 (PDF ) Cryptanalysis of RSA with constrained keys Abderrahmane Nitaj
2006/091 (PDF ) The Complexity of Online Memory Checking Moni Naor, Guy Rothblum
2006/090 (PDF ) Secure Sketch for Multi-Sets Ee-Chien Chang, Vadym Fedyukovych, Qiming Li
2006/089 (PDF ) A Tree-based Model of Unicast Stream Authentication Goce Jakimoski, Yvo Desmedt
2006/088 (PDF ) On the Feasibility of Consistent Computations Sven Laur, Helger Lipmaa
2006/087 (PDF ) Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons Barath Raghavan, Saurabh Panjwani, Anton Mityagin
2006/086 (PDF ) Analysis of the Linux Random Number Generator Zvi Gutterman, Benny Pinkas, Tzachy Reinman
2006/085 (PDF ) Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) Xavier Boyen, Brent Waters
2006/084 (PDF ) Cryptography from Anonymity Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2006/083 (PDF ) Browsers Defenses Against Phishing, Spoofing and Malware Amir Herzberg
2006/082 (PDF ) Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast HariGovind V. Ramasamy, Christian Cachin
2006/081 (PDF ) Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
2006/080 (PDF ) Efficient Identity-based Signatures Secure in the Standard Model Kenneth G. Paterson, Jacob C. N. Schuldt
2006/079 (PDF ) Towards Provably Secure Group Key Agreement Building on Group Theory Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
2006/078 (PDF ) Verifiable Random Permutations Yevgeniy Dodis, Prashant Puniya
2006/077 (PDF ) On Secret Sharing Schemes, Matroids and Polymatroids Jaume Marti-Farre, Carles Padro
2006/075 (PDF ) ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM TOMOHIRO HARAYAMA
2006/074 (PDF ) How to Construct Sufficient Condition in Searching Collisions of MD5 Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
2006/073 (PDF ) Stronger Security of Authenticated Key Exchange Brian LaMacchia, Kristin Lauter, Anton Mityagin
2006/072 (PDF ) Cryptanalysis of the Bluetooth E0 Cipher using OBDD's Yaniv Shaked, Avishai Wool
2006/071 (PDF ) A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security Ueli Maurer, Johan Sjödin
2006/070 (PDF ) The experimental distinguishing attack on RC4 Sergey Doroshenko, Boris Ryabko
2006/069 (PDF ) Automated Security Proofs with Sequences of Games Bruno Blanchet, David Pointcheval
2006/068 (PDF ) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes Michael Backes, Birgit Pfitzmann, Michael Waidner
2006/067 (PDF ) Scalar Multiplication on Koblitz Curves using Double Bases Roberto Avanzi, Francesco Sica
2006/066 (PDF ) Simple and Flexible Private Revocation Checking John Solis, Gene Tsudik
2006/065 (PDF ) On Expected Constant-Round Protocols for Byzantine Agreement Jonathan Katz, Chiu-Yuen Koo
2006/064 (PDF ) Perturbing and Protecting a Traceable Block Cipher Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
2006/063 (PDF ) Provably Secure Universal Steganographic Systems Boris Ryabko, Daniil Ryabko
2006/059 (PDF ) High Security Pairing-Based Cryptography Revisited R. Granger, D. Page, N. P. Smart
2006/058 (PDF ) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
2006/057 (PDF ) Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov, Charles Rackoff
2006/056 (PDF ) Key Exchange Protocols: Security Definition, Proof Method and Applications Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
2006/055 (PDF ) Multicollision Attacks on some Generalized Sequential Hash Functions M. Nandi, D. R. Stinson
2006/054 (PDF ) How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum, Avishai Wool
2006/053 (PDF ) Cryptanalysis of the CFVZ cryptosystem J. J. Climent, E. Gorla, J. Rosenthal
2006/052 (PDF ) Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
2006/051 (PDF ) Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2006/050 (PDF ) Secure Device Pairing based on a Visual Channel Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
2006/049 (PDF ) Crossword Puzzle Attack on NLS Joo Yeon Cho, Josef Pieprzyk
2006/048 (PDF ) New Results on Multipartite Access Structures Javier Herranz, German Saez
2006/047 (PDF ) Cryptographically Sound Theorem Proving Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
2006/046 (PDF ) Efficient Primitives from Exponentiation in Zp Shaoquan Jiang
2006/045 (PDF ) Fully Collusion Resistant Traitor Tracing Dan Boneh, Amit Sahai, Brent Waters
2006/044 (PDF ) Linear Integer Secret Sharing and Distributed Exponentiation Ivan Damgard, Rune Thorbek
2006/043 (PDF ) New Proofs for NMAC and HMAC: Security Without Collision-Resistance Mihir Bellare
2006/042 (PDF ) Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms Sourav Mukhopadhyay, Palash Sarkar
2006/041 (PDF ) Reactively Simulatable Certified Mail Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2006/040 (PDF ) Linkable Democratic Group Signatures Mark Manulis, Ahmad-Reza Sadeghi, Joerg Schwenk
2006/039 (PDF ) Two-Round AES Differentials Joan Daemen, Vincent Rijmen
2006/038 (PDF ) Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field Jintai Ding, Jason E. Gower, Dieter S. Schmidt
2006/037 (PDF ) Message Authentication on 64-bit Architectures Ted Krovetz
2006/036 (PDF ) Vector Stream Cipher Instant Key Recovery Sean O'Neil
2006/035 (PDF ) Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar A. Saqib, Nareli Cruz-Cortés
2006/034 (PDF ) Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles Eike Kiltz, David Galindo
2006/033 (PDF ) Arithmetic of Generalized Jacobians Isabelle Déchène
2006/032 (PDF ) Reducing the Number of Homogeneous Linear Equations in Finding Annihilators Deepak Kumar Dalai, Subhamoy Maitra
2006/031 (PDF ) On a Variation of Kurosawa-Desmedt Encryption Scheme Le Trieu Phong, Wakaha Ogata
2006/030 (PDF ) Improved cryptanalysis of Py Paul Crowley
2006/029 (PDF ) Authenticated Hybrid Encryption for Multiple Recipients Stéphanie Alt
2006/028 (PDF ) Cryptanalysis of recently proposed Remote User Authentication Schemes Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena
2006/027 (PDF ) Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev
2006/026 (PDF ) Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10 David Freeman
2006/025 (PDF ) Signatures for Network Coding Denis Charles, Kamal Jain, Kristin Lauter
2006/024 (PDF ) Improving the Decoding Efficiency of Private Search George Danezis, Claudia Diaz
2006/023 (PDF ) A Method to Implement Direct Anonymous Attestation HE GE
2006/021 (PDF ) Cryptographic hash functions from expander graphs Denis Charles, Eyal Goren, Kristin Lauter
2006/020 (PDF ) Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes Adam Smith
2006/019 (PDF ) Hermes8 : A Low-Complexity Low-Power Stream Cipher Ulrich Kaiser
2006/018 (PDF ) Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
2006/017 (PDF ) Threshold and Proactive Pseudo-Random Permutations Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
2006/016 (PDF ) Message Modification for Step 21-23 on SHA-0 Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
2006/015 (PDF ) A Family of Dunces: Trivial RFID Identification and Authentication Protocols Gene Tsudik
2006/014 (PDF ) Sound Computational Interpretation of Symbolic Hashes in the Standard Model Flavio D. Garcia, Peter van Rossum
2006/013 (PDF ) Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings Hung-Yu Chien
2006/012 (PDF ) Certificate-Based Encryption Without Random Oracles Paz Morillo, Carla Ràfols
2006/011 (PDF ) Formal Proof for the Correctness of RSA-PSS Christina Lindenberg, Kai Wirt, Johannes Buchmann
2006/010 (PDF ) Finding Characteristic Polynomials with Jump Indices Steve Babbage, Matthew Dodd
2006/009 (PDF ) Breaking and Fixing Public-Key Kerberos Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kay Tsay, Christopher Walstad
2006/008 (PDF ) A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers James A. Muir
2006/007 (PDF ) Further Discussions on the Security of a Nominative Signature Scheme Lifeng Guo, Guilin Wang, Duncan S. Wong
2006/006 (PDF ) Group Key Agreement for Ad Hoc Networks Lijun Liao
2006/005 (PDF ) Pairing Calculation on Supersingular Genus 2 Curves Colm O hEigeartaigh, Michael Scott
2006/004 (PDF ) Provably Secure Subsitution of Cryptographic Tools Lea Kissner, David Molnar
2006/003 (PDF ) Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography Dragos Trinca
2006/002 (PDF ) Geometric constructions of optimal linear perfect hash families S. G. Barwick, W. -A. Jackson.
2006/001 (PDF ) Homomorphic Cryptosystems and their Applications Doerte K. Rappe
2005/469 (PDF ) A lower bound on the higher order nonlinearity of algebraic immune functions C. Carlet
2005/468 (PDF ) Blind Attacks on Engineering Samples Vanessa Gratzer, David Naccache
2005/467 (PDF ) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version) Ricardo Corin, Jerry den Hartog
2005/466 (PDF ) Cryptanalysis of the Yang -Wang's password authentication schemes Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee
2005/465 (PDF ) A sequence approach to constructing perfect hash families S. G. Barwick, W. -A. Jackson
2005/464 (PDF ) Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf, Bart Preneel
2005/463 (PDF ) More short signatures without random oracles Victor K. Wei, Tsz Hon Yuen
2005/462 (PDF ) A Simplified Quadratic Frobenius Primality Test Martin Seysen
2005/461 (PDF ) Parallel and Concurrent Security of the HB and HB+ Protocols Jonathan Katz, Ji Sun Shin
2005/460 (PDF ) One-Time HNP or Attacks on a Flawed El Gamal Revisited Tomas Rosa
2005/459 (PDF ) A Practical Attack on the Root Problem in Braid Groups Anja Groch, Dennis Hofheinz, Rainer Steinwandt
2005/458 (PDF ) Seifert's RSA Fault Attack: Simplified Analysis and Generalizations James A. Muir
2005/457 (PDF ) Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
2005/456 (PDF ) A Secure Scheme for Authenticated Encryption Fuw-Yi Yang
2005/455 (PDF ) Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, Duncan S. Wong
2005/454 (PDF ) Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
2005/453 (PDF ) Further Constructions of Almost Resilient Functions Pinhui Ke, Jie Zhang, Qiaoyan Wen
2005/452 (PDF ) Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
2005/451 (PDF ) Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou, Yalin Chen, Ming-De Yang
2005/450 (PDF ) Improvement of Manik et al.¡¦s remote user authentication scheme Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
2005/449 (PDF ) On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count Longjiang Qu, Guozhu Feng, Chao Li
2005/448 (PDF ) On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version) Souradyuti Paul, Bart Preneel
2005/447 (PDF ) A new key exchange protocol based on the decomposition problem Vladimir Shpilrain, Alexander Ushakov
2005/446 (PDF ) Democratic Group Signatures on Example of Joint Ventures Mark Manulis
2005/445 (PDF ) An Anonymous Authentication Scheme for Trusted Computing Platform HE GE
2005/444 (PDF ) Privacy-Preserving Polling using Playing Cards Sid Stamm, Markus Jakobsson
2005/443 (PDF ) Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei
2005/442 (PDF ) One-Time Signatures Revisited: Have They Become Practical? Dalit Naor, Amir Shenhav, Avishai Wool
2005/441 (PDF ) Tight bound between nonlinearity and algebraic immunity Mikhail Lobanov
2005/439 (PDF ) A note on the n-spendable extension of Ferguson's single-term off-line coins T. C. Lam
2005/438 (PDF ) Minimal Assumptions for Efficient Mercurial Commitments Yevgeniy Dodis
2005/436 (PDF ) A Note on the Kasami Power Function Doreen Hertel
2005/435 (PDF ) Concurrent Blind Signatures without Random Oracles Aggelos Kiayias, Hong-Sheng Zhou
2005/434 (PDF ) Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown
2005/433 (PDF ) Proxy Re-Signatures: New Definitions, Algorithms, and Applications Giuseppe Ateniese, Susan Hohenberger
2005/432 (PDF ) On the Security of Kaweichel Dieter Schmidt
2005/431 (PDF ) Is it possible to have CBE from CL-PKE? Bo Gyeong Kang, Je Hong Park
2005/430 (PDF ) F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei
2005/429 (PDF ) Signature from a New Subgroup Assumption Victor K. Wei
2005/428 (PDF ) Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
2005/427 (PDF ) Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu, Duncan S. Wong
2005/426 (PDF ) On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng
2005/425 (PDF ) Improved Collision Attack on Hash Function MD5 Jie Liang, Xuejia Lai
2005/424 (PDF ) Efficient Mutual Data Authentication Using Manually Authenticated Strings Sven Laur, N. Asokan, Kaisa Nyberg
2005/422 (PDF ) On Anonymity of Group Signatures Zhou Sujing, Lin Dongdai
2005/421 (PDF ) Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles Michael Backes, Birgit Pfitzmann, Andre Scedrov
2005/420 (PDF ) Efficient Scalar Multiplication by Isogeny Decompositions Christophe Doche, Thomas Icart, David R. Kohel
2005/419 (PDF ) Unified Point Addition Formulæ and Side-Channel Attacks Douglas Stebila, Nicolas Thériault
2005/418 (PDF ) Generic On-Line/Off-Line Threshold Signatures Chris Crutchfield, David Molnar, David Turner, David Wagner
2005/417 (PDF ) Correlation-Resistant Storage via Keyword-Searchable Encryption Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose
2005/416 (PDF ) Cryptography in Theory and Practice: The Case of Encryption in IPsec Kenneth G. Paterson, Arnold K. L. Yau
2005/412 (PDF ) Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles Tsz Hon Yuen, Victor K. Wei
2005/411 (PDF ) More Compact E-Cash with Efficient Coin Tracing Victor K. Wei
2005/410 (PDF ) Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows Victor K. Wei
2005/408 (PDF ) Compartmented Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene
2005/407 (PDF ) Anonymous Signature Schemes Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
2005/406 (PDF ) Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited Dominique Unruh
2005/405 (PDF ) Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad, Alexander W. Dent
2005/404 (PDF ) Preventing Attacks on Machine Readable Travel Documents (MRTDs) Gaurav S. Kc, Paul A. Karger
2005/403 (PDF ) Collisions in the Original Version of a Chaotic Hash Function Scott Contini
2005/402 (PDF ) Some Analysis of Radix-r Representations Dong-Guk Han, Tsuyoshi Takagi
2005/401 (PDF ) A Computationally Sound Mechanized Prover for Security Protocols Bruno Blanchet
2005/400 (PDF ) Improved Collision Attack on MD5 Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta
2005/399 (PDF ) On affine rank of spectrum support for plateaued function Yuriy Tarannikov
2005/397 (PDF ) Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms Neil Kauer, Tony Suarez, Yuliang Zheng
2005/396 (PDF ) Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/395 (PDF ) Secure Group Key Establishment Revisited Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/394 (PDF ) How to Shuffle in Public Ben Adida, Douglas Wikström
2005/393 (PDF ) Multivariate Quadratic Polynomials in Public Key Cryptography Christopher Wolf
2005/392 (PDF ) An Efficient Variant of RSA Cryptosystem Sahadeo Padhye
2005/391 (PDF ) Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto
2005/390 (PDF ) 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto, Edward Dawson
2005/389 (PDF ) How to Generate Universally Verifiable Signatures in Ad-Hoc Networks KyungKeun Lee, JoongHyo Oh, SangJae Moon
2005/388 (PDF ) Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng
2005/387 (PDF ) On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version) C. Carlet
2005/386 (PDF ) A New Short Signature Scheme Without Random Oracles from Bilinear Pairings Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
2005/385 (PDF ) Practical Group Signatures without Random Oracles Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros
2005/384 (PDF ) Some Explicit Formulae of NAF and its Left-to-Right Analogue Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi
2005/383 (PDF ) Key Mixing in Block Ciphers through Addition modulo $2^n$ Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/382 (PDF ) One-Wayness Equivalent to General Factoring Kaoru Kurosawa, Tsuyoshi Takagi
2005/381 (PDF ) Compact Group Signatures Without Random Oracles Xavier Boyen, Brent Waters
2005/380 (PDF ) Breaking RSA May Be As Difficult As Factoring Daniel R. L. Brown
2005/379 (PDF ) Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs Jonathan Katz, Yehuda Lindell
2005/378 (PDF ) A New Protocol for Conditional Disclosure of Secrets And Its Applications Sven Laur, Helger Lipmaa
2005/377 (PDF ) Exclusion-Intersection Encryption Sherman S. M. Chow, Siu-Ming Yiu
2005/376 (PDF ) Representing small identically self-dual matroids by self-dual codes Carles Padro, Ignacio Gracia
2005/375 (PDF ) Truncated differential cryptanalysis of five rounds of Salsa20 Paul Crowley
2005/374 (PDF ) Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7 Kunpeng Wang, Bao Li
2005/373 (PDF ) Efficient Broadcast Encryption Scheme with Log-Key Storage Yong Ho Hwang, Pil Joong Lee
2005/372 (PDF ) Secret color images sharing schemes based on XOR operation Dao-Shun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang
2005/371 (PDF ) On a Traitor Tracing Scheme from ACISP 2003 Dongvu Tonien
2005/370 (PDF ) Resource Fairness and Composability of Cryptographic Protocols Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
2005/369 (PDF ) Secure and {\sl Practical} Identity-Based Encryption David Naccache
2005/368 (PDF ) The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks David Molnar, Matt Piotrowski, David Schultz, David Wagner
2005/367 (PDF ) Searchable Keyword-Based Encryption Dong Jin Park, Juyoung Cha, Pil Joong Lee
2005/366 (PDF ) Efficient Compilers for Authenticated Group Key Exchange Qiang Tang, Chris J. Mitchell
2005/365 (PDF ) Derandomization in Cryptography Boaz Barak, Shien Jin Ong, Salil Vadhan
2005/364 (PDF ) Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs Amitabh Saxena
2005/363 (PDF ) Elliptic Curves with Low Embedding Degree Florian Luca, Igor E. Shparlinski
2005/362 (PDF ) On a (Flawed) Proposal to Build More Pairing-Friendly Curves Michael Scott, Paulo S. L. M. Barreto
2005/361 (PDF ) Strict Avalanche Criterion Over Finite Fields Yuan Li, T. W. Cusick
2005/360 (PDF ) Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security Jens Matthias-Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/359 (PDF ) An infinite class of quadratic APN functions which are not equivalent to power mappings L. Budaghyan, C. Carlet, P. Felke, G. Leander
2005/358 (PDF ) Normal Basis Multiplication Algorithms for GF(2n) (Full Version) Haining Fan, Duo Liu, Yiqi Dai
2005/357 (PDF ) Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings Kyung-Ah Shim
2005/356 (PDF ) Exponential Memory-Bound Functions for Proof of Work Protocols Fabien Coelho
2005/355 (PDF ) ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks Rongxing Lu, Zhenfu Cao
2005/354 (PDF ) Pairing-Based Two-Party Authenticated Key Agreement Protocol Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao
2005/353 (PDF ) On the Security of A Group Signature Scheme Jianhong Zhang, Wei Zou
2005/352 (PDF ) Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations Danilo Gligoroski
2005/351 (PDF ) Errors in Computational Complexity Proofs for Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/350 (PDF ) Is SHA-1 conceptually sound? Charanjit S. Jutla, Anindya C. Patthak
2005/349 (PDF ) Oblivious Transfer and Linear Functions Ivan B. Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2005/346 (PDF ) Batch Verification of Validity of Bids in Homomorphic E-auction Kun Peng, Colin Boyd, Ed Dawson
2005/345 (PDF ) Group Signatures with Efficient Concurrent Join Aggelos Kiayias, Moti Yung
2005/344 (PDF ) Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems. Tapan Rai
2005/343 (PDF ) Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings Amitabh Saxena, Serguey Priymak, Ben Soh
2005/342 (PDF ) Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems Pu Duan, Shi Cui, Choong Wah Chan
2005/341 (PDF ) A Universally Composable Scheme for Electronic Cash Marten Trolin
2005/339 (PDF ) Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
2005/338 (PDF ) An Improved Power Analysis Attack Against Camellia's Key Schedule Lu Xiao, Howard M. Heys
2005/337 (PDF ) Statistical Multiparty Computation Based on Random Walks on Graphs Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/336 (PDF ) Pairing-based identification schemes David Freeman
2005/335 (PDF ) One-Way Signature Chaining - A New Paradigm For Group Cryptosystems Amitabh Saxena, Ben Soh
2005/334 (PDF ) Secure Key-Updating for Lazy Revocation Michael Backes, Christian Cachin, Alina Oprea
2005/333 (PDF ) Universally Composable Disk Encryption Schemes Ivan Damgård, Kasper Dupont
2005/332 (PDF ) Classification of Cubic $(n-4)$-resilient Boolean Functions An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2005/331 (PDF ) A Fuzzy Sketch with Trapdoor Julien Bringer, Hervé Chabanne, Quoc Dung Do
2005/330 (PDF ) A Dedicated Processor for the eta Pairing Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins, W. P. Marnane
2005/329 (PDF ) Cryptographic Protocols to Prevent Spam Amir Herzberg
2005/328 (PDF ) On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions Jonathan Katz, Chiu-Yuen Koo
2005/327 (PDF ) On the Security of Encryption Modes of MD4, MD5 and HAVAL Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
2005/326 (PDF ) A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2005/325 (PDF ) An Effective Method to Implement Group Signature with Revocation HE GE
2005/324 (PDF ) Extracting bits from coordinates of a point of an elliptic curve Nicolas Gürel
2005/323 (PDF ) The Weil pairing on elliptic curves over C Steven D. Galbraith
2005/322 (PDF ) Evolutionary Design of Trace Form Bent Functions Min yang, Qingshu Meng, Huanguo Zhang
2005/321 (PDF ) Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES) Liam Keliher, Jiayuan Sui
2005/320 (PDF ) Efficient Identity-Based Encryption with Tight Security Reduction Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2005/319 (PDF ) ID-based Restrictive Partially Blind Signatures and Applications Xiaofeng Chen, Fangguo Zhang, Shengli Liu
2005/318 (PDF ) Bounds on Birthday Attack Times Michael J. Wiener
2005/317 (PDF ) Ring Signatures without Random Oracles Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen
2005/316 (PDF ) Collision Attack on XTR and a Countermeasure with a Fixed Pattern Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
2005/315 (PDF ) A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags David Molnar, Andrea Soppera, David Wagner
2005/314 (PDF ) Fast genus 2 arithmetic based on Theta functions P. Gaudry
2005/313 (PDF ) Deterministic Identity-Based Signatures for Partial Aggregation Javier Herranz
2005/312 (PDF ) A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations Xijin Tang, Yong Feng
2005/311 (PDF ) What do S-boxes Say in Differential Side Channel Attacks? Cecile Canovas, Jessy Clediere
2005/310 (PDF ) Meta Ring Signature Hiroyuki OKAZAKI, Ryuichi SAKAI, Masao KASAHARA
2005/309 (PDF ) A New Efficient ID-Based Authenticated Key Agreement Protocol Quan Yuan, Songping Li
2005/308 (PDF ) Adaptable Group-Oriented Signature Chunbo Ma, Jun Ao, Dake He
2005/307 (PDF ) The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited K. Bentahar
2005/306 (PDF ) Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes--- Yasuyuki MURAKAMI, Masao KASAHARA
2005/305 (PDF ) Steganography with Imperfect Samplers Anna Lysyanskaya, Maria Meyerovich
2005/304 (PDF ) Ring Signatures: Stronger Definitions, and Constructions without Random Oracles Adam Bender, Jonathan Katz, Ruggero Morselli
2005/303 (PDF ) Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage Kevin Fu, Seny Kamara, Tadayoshi Kohno
2005/302 (PDF ) Elliptic Curves for Pairing Applications Angela Murphy, Noel Fitzpatrick
2005/301 (PDF ) On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos
2005/300 (PDF ) Towards Security Two-part Authenticated Key Agreement Protocols Songping Li, Quan Yuan, Jin Li
2005/299 (PDF ) Nonlinearity of the Round Function Marcin Kontak, Janusz Szmidt
2005/298 (PDF ) Keeping Denial-of-Service Attackers in the Dark Gal Badishi, Amir Herzberg, Idit Keidar
2005/297 (PDF ) DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining Maithili Narasimha, Gene Tsudik
2005/296 (PDF ) A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer, Sebastian Wallner
2005/295 (PDF ) Hidden Exponent RSA and Efficient Key Distribution HE GE
2005/294 (PDF ) On Fairness in Simulatability-based Cryptographic Systems Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
2005/293 (PDF ) Speeding Up Pairing Computation Colm O hEigeartaigh
2005/292 (PDF ) Improved Integral Cryptanalysis of FOX Block Cipher Wu Wenling, Zhang Wentao, Feng Dengguo
2005/291 (PDF ) Cryptography In the Bounded Quantum-Storage Model Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
2005/290 (PDF ) Perfect Non-Interactive Zero Knowledge for NP Jens Groth, Rafail Ostrovsky, Amit Sahai
2005/289 (PDF ) Overview of Key Agreement Protocols Ratna Dutta, Rana Barua
2005/288 (PDF ) Direct Chosen Ciphertext Security from Identity-Based Techniques Xavier Boyen, Qixiang Mei, Brent Waters
2005/287 (PDF ) Provable Efficient Certificateless Public Key Encryption Yijuan Shi, Jianhua Li
2005/286 (PDF ) Concurrent Zero Knowledge without Complexity Assumptions Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
2005/285 (PDF ) Generalizations of RSA public key cryptosystems Li Banghe
2005/284 (PDF ) Foundations and Applications for Secure Triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
2005/283 (PDF ) Revisiting Oblivious Signature-Based Envelopes Samad Nasserian, Gene Tsudik
2005/282 (PDF ) Spreading Alerts Quietly and the Subgroup Escape Problem James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
2005/281 (PDF ) Herding Hash Functions and the Nostradamus Attack John Kelsey, Tadayoshi Kohno
2005/280 (PDF ) Partitioned Cache Architecture as a Side-Channel Defence Mechanism D. Page
2005/279 (PDF ) Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model Bao Li, Hongda Li, Guangwu Xu, Haixia Xu
2005/278 (PDF ) A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications Katja Schmidt-Samoa
2005/277 (PDF ) Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions Fumiyuki Momose, Jinhui Chao
2005/276 (PDF ) Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations Jung Hee Cheon, Dong Hoon Lee
2005/275 (PDF ) Explicit Construction of Secure Frameproof Codes Dongvu Tonien, Reihaneh Safavi-Naini
2005/274 (PDF ) Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
2005/273 (PDF ) CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III P G Vaidya, Sajini Anand
2005/272 (PDF ) An Authentication Protocol For Mobile Agents Using Bilinear Pairings Amitabh Saxena, Ben Soh
2005/271 (PDF ) Cache attacks and Countermeasures: the Case of AES Dag Arne Osvik, Adi Shamir, Eran Tromer
2005/270 (PDF ) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/269 (PDF ) Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing Junghyun Nam, Seungjoo Kim, Dongho Won
2005/268 (PDF ) Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI Shujun Li, Heung-Yeung Shum
2005/267 (PDF ) Stream Cipher Design based on Jumping Finite State Machines Cees J. A. Jansen
2005/266 (PDF ) A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code Charanjit S. Jutla, Anindya C. Patthak
2005/265 (PDF ) Security Analysis of KEA Authenticated Key Exchange Protocol Kristin Lauter, Anton Mityagin
2005/264 (PDF ) On an authentication scheme based on the Root Problem in the braid group Boaz Tsaban
2005/263 (PDF ) Wang's sufficient conditions of MD5 are not sufficient Jun Yajima, Takeshi Shimoyama
2005/262 (PDF ) Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator Ivan Damgård, Yuval Ishai
2005/261 (PDF ) The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model Alexander W. Dent
2005/260 (PDF ) Powered Tate Pairing Computation Bo Gyeong Kang, Je Hong Park
2005/259 (PDF ) Efficient Delegation of Pairing Computation Bo Gyeong Kang, Moon Sung Lee, Je Hong Park
2005/258 (PDF ) Relations Among Notions of Security for Identity Based Encryption Schemes Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang
2005/257 (PDF ) TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY Jin Hong, Woo-Hwan Kim
2005/256 (PDF ) Fuzzy Universal Hashing and Approximate Authentication Reihaneh Safavi-Naini, Dongvu Tonien
2005/255 (PDF ) Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding, Jason E. Gower
2005/254 (PDF ) Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
2005/253 (PDF ) Security Notions for Identity Based Encryption David Galindo, Ichiro Hasuo
2005/252 (PDF ) Faster Pairings using an Elliptic Curve with an Efficient Endomorphism Michael Scott
2005/251 (PDF ) Feistel Schemes and Bi-Linear Cryptanalysis Nicolas Courtois
2005/250 (PDF ) The topology of covert conflict Shishir Nagaraja, Ross Anderson
2005/248 (PDF ) Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing Michael Szydlo, Yiqun Lisa Yin
2005/247 (PDF ) A Simple and Provably Good Code for SHA Message Expansion Charanjit S. Jutla, Anindya C. Patthak
2005/246 (PDF ) A Verifiable Secret Shuffle of Homomorphic Encryptions Jens Groth
2005/245 (PDF ) On the Algebraic Immunity of Symmetric Boolean Functions An Braeken, Bart Preneel
2005/244 (PDF ) Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1 Boaz Tsaban
2005/243 (PDF ) Cryptanalysis of Sfinks Nicolas T. Courtois
2005/242 (PDF ) Private Searching On Streaming Data Rafail Ostrovsky, William E. Skeith III
2005/241 (PDF ) On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities Hao Chen, Liqing Xu
2005/240 (PDF ) Attack on Okamoto et al.'s New Short Signature Schemes Fangguo Zhang, Xiaofeng Chen
2005/239 (PDF ) A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
2005/237 (PDF ) An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol Henri Gilbert, Matt Robshaw, Herve Sibert
2005/236 (PDF ) Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves Pu Duan, Shi Cui, Choong Wah Chan
2005/235 (PDF ) Tree Parity Machine Rekeying Architectures for Embedded Security Markus Volkmer, Sebastian Wallner
2005/234 (PDF ) LILI-II is not Broken William Millan, Ed Dawson
2005/233 (PDF ) On the Entropy of Arcfour Keys Luke O'Connor
2005/232 (PDF ) Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines Markus Volkmer, Sebastian Wallner
2005/231 (PDF ) Fast generators for the Diffie-Hellman key agreement protocol and malicious standards Boaz Tsaban
2005/229 (PDF ) Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
2005/228 (PDF ) Efficient Doubling on Genus 3 Curves over Binary Fields Xinxin Fan, Thomas Wollinger, Yumin Wang
2005/227 (PDF ) Threshold Ring Signatures Efficient for Large Sets of Signers K. Maneva-Jakimoska, G. Jakimoski, M. Burmester
2005/226 (PDF ) Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme Liqun Chen, Zhaohui Cheng
2005/225 (PDF ) Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2005/224 (PDF ) An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction L. Chen, Z. Cheng, J. Malone-Lee, N. P. Smart
2005/223 (PDF ) Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups Ayan Mahalanobis
2005/222 (PDF ) Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis Min Feng, Bin B. Zhu, Maozhi Xu, Shipeng Li
2005/221 (PDF ) Constant Round Dynamic Group Key Agreement Ratna Dutta, Rana Barua
2005/220 (PDF ) Limits of the Cryptographic Realization of Dolev-Yao-style XOR Michael Backes, Birgit Pfitzmann
2005/219 (PDF ) Cryptanalysis of a 32-bit RC4-like Stream Cipher Hongjun Wu
2005/218 (PDF ) The conjugacy problem and related problems in lattice-ordered groups W. Charles Holland, Boaz Tsaban
2005/217 (PDF ) Efficient Identity-Based Key Encapsulation to Multiple Parties M. Barbosa, P. Farshim
2005/216 (PDF ) A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret Hassan Jameel, Sungyoung Lee
2005/215 (PDF ) Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes Jason E. Holt
2005/214 (PDF ) TMTO With Multiple Data: Analysis and New Single Table Trade-offs Sourav Mukhopadhyay, Palash Sarkar
2005/212 (PDF ) Probability distributions of Correlation and Differentials in Block Ciphers Joan Daemen, Vincent Rijmen
2005/211 (PDF ) Games and the Impossibility of Realizable Ideal Functionality Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
2005/210 (PDF ) The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function John Black
2005/209 (PDF ) Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols Jin Wook Byun, Dong Hoon Lee
2005/207 (PDF ) Some Thoughts on Time-Memory-Data Tradeoffs Alex Biryukov
2005/206 (PDF ) On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/205 (PDF ) Another look at HMQV Alfred Menezes
2005/204 (PDF ) An Algebraic Masking Method to Protect AES Against Power Attacks Nicolas Courtois, Louis Goubin
2005/203 (PDF ) On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions Nicolas Courtois, Blandine Debraize, Eric Garrido
2005/202 (PDF ) The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES Nicolas Courtois
2005/201 (PDF ) On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants Zhaohui Cheng, Liqun Chen
2005/200 (PDF ) Block ciphers sensitive to Groebner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann
2005/198 (PDF ) Universally Composable Time-Stamping Schemes with Audit Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
2005/197 (PDF ) Weaknesses in two group Diffie-Hellman key exchange protocols Qiang Tang, Liqun Chen
2005/196 (PDF ) Universally Composable Password-Based Key Exchange Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip MacKenzie
2005/195 (PDF ) Twin RSA Arjen K. Lenstra, Benjamin M. M. de Weger
2005/194 (PDF ) Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
2005/193 (PDF ) VSH, an Efficient and Provable Collision Resistant Hash Function Scott Contini, Arjen K. Lenstra, Ron Steinfeld
2005/192 (PDF ) On the security and the efficiency of the Merkle signature scheme Carlos Coronado
2005/191 (PDF ) Public Key Encryption with Keyword Search Revisited Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005/190 (PDF ) Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA" SeongHan Shin, Kazukuni Kobara, Hideki Imai
2005/189 (PDF ) A Weak-Randomizer Attack on RSA-OAEP with e = 3 Daniel R. L. Brown
2005/188 (PDF ) Group Signature where Group Manager, Members and Open Authority are Identity-Based Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
2005/187 (PDF ) How To Exchange Secrets with Oblivious Transfer Michael O. Rabin
2005/185 (PDF ) Security properties of two provably secure conference key agreement protocols Qiang Tang, Chris J. Mitchell
2005/184 (PDF ) Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families Dongvu Tonien, Reihaneh Safavi-Naini
2005/183 (PDF ) PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications Thierry Moreau
2005/182 (PDF ) Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol Chih-I Wang, Chun-I Fan, D. J. Guan
2005/181 (PDF ) A plausible approach to computer-aided cryptographic proofs Shai Halevi
2005/180 (PDF ) A Note on Secure Key Issuing in ID-based Cryptography XU Chunxiang, ZHOU Junhui, QIN Zhiguang
2005/179 (PDF ) Intrusion-Resilience via the Bounded-Storage Model Stefan Dziembowski
2005/178 (PDF ) Analyzing Unlinkability of Some Group Signatures Zhou Sujing, Lin Dongdai
2005/177 (PDF ) Secret sharing on the $d$-dimensional cube Laszlo Csirmaz
2005/176 (PDF ) HMQV: A High-Performance Secure Diffie-Hellman Protocol Hugo Krawczyk
2005/175 (PDF ) A 32-bit RC4-like Keystream Generator Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2005/174 (PDF ) On the Automatic Construction of Indistinguishable Operations Manuel Barbosa, Dan Page
2005/173 (PDF ) Weaknesses in a leakage-resilient authenticated key transport protocol Qiang Tang, Chris J. Mitchell
2005/171 (PDF ) Towards computationally sound symbolic analysis of key exchange protocols Prateek Gupta, Vitaly Shmatikov
2005/170 (PDF ) Unclonable Group Identification Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
2005/169 (PDF ) Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control Shai Halevi, Paul A. Karger, Dalit Naor
2005/168 (PDF ) Dynamic k-Times Anonymous Authentication Lan Nguyen, Rei Safavi-Naini
2005/166 (PDF ) Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems Eunjeong Lee, Yoonjin Lee
2005/165 (PDF ) CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito
2005/164 (PDF ) A Distinguish attack on COSvd Ciphers Mohammad Ali Orumiehchi ha, Dr. R. Mirghadri
2005/163 (PDF ) Modeling Insider Attacks on Group Key-Exchange Protocols Jonathan Katz, Ji Sun Shin
2005/162 (PDF ) A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
2005/161 (PDF ) Multiple forgery attacks against Message Authentication Codes David A. McGrew, Scott R. Fluhrer
2005/160 (PDF ) First Steps Toward a Cryptography-Aware Language and Compiler M. Barbosa, R. Noad, D. Page, N. P. Smart
2005/159 (PDF ) On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola
2005/158 (PDF ) Geometric Cryptosystem Arkady Berenstein, Leon Chernyak
2005/157 (PDF ) FOX Algorithm Implementation: a hardware design approach Colm O'Keeffe, Emanuel Popovici
2005/156 (PDF ) On the security of some password-based key agreement schemes Qiang Tang, Chris J. Mitchell
2005/155 (PDF ) Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays Eli Biham, Jennifer Seberry
2005/154 (PDF ) Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol Marius C. Silaghi, Gerhard Friedrich
2005/153 (PDF ) On Security of Koyama Schemes Sahadeo Padhye
2005/152 (PDF ) On High-Rate Cryptographic Compression Functions Richard Ostertag, Martin Stanek
2005/151 (PDF ) Improved Collision Attack on MD4 Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
2005/150 (PDF ) Secure Delegation of Elliptic-Curve Pairing Benoit Chevallier-Mames, Jean-Sebastien Coron, Noel McCullagh, David Naccache, Michael Scott
2005/149 (PDF ) Conditionally Verifiable Signatures Aldar C-F. Chan, Ian F. Blake
2005/148 (PDF ) On Universal Composable Security of Time-Stamping Protocols Toshihiko Matsuo, Shin'ichiro Matsuo
2005/147 (PDF ) Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl Choi, Philippe Golle, Markus Jakobsson
2005/146 (PDF ) A High Speed Architecture for Galois/Counter Mode of Operation (GCM) Bo Yang, Sambit Mishra, Ramesh Karri
2005/145 (PDF ) Small Secure Sketch for Point-Set Difference Ee-Chien Chang, Qiming Li
2005/144 (PDF ) Kaweichel, an Extension of Blowfish for 64-Bit Architectures Dieter Schmidt
2005/143 (PDF ) Multiparty Computation Based on Connectivity of Graphs Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/142 (PDF ) Broadcast Encryption with Random Key Pre-distribution Schemes Mahalingam Ramkumar
2005/141 (PDF ) Enhanced password-based key establishment protocol Qiang Tang, Chris J. Mitchell
2005/140 (PDF ) How to Split a Shared Secret into Shared Bits in Constant-Round Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft
2005/139 (PDF ) Scaling security in pairing-based protocols Michael Scott
2005/138 (PDF ) I-HARPS: An Efficient Key Pre-distribution Scheme Mahalingam Ramkumar
2005/137 (PDF ) A Sender Verifiable Mix-Net and a New Proof of a Shuffle Douglas Wikström
2005/136 (PDF ) Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption Jung Hee Cheon, Nam-su Jho, Myung-Hwan Kim, Eun Sun Yoo
2005/135 (PDF ) Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model Jacques Patarin, Paul Camion
2005/134 (PDF ) Broadcast Authentication With Hashed Random Preloaded Subsets Mahalingam Ramkumar
2005/133 (PDF ) Pairing-Friendly Elliptic Curves of Prime Order Paulo S. L. M. Barreto, Michael Naehrig
2005/132 (PDF ) Formal Notions of Anonymity for Peer-to-peer Networks Jiejun Kong
2005/131 (PDF ) Dynamic Group Key Agreement in Tree-Based Setting Ratna Dutta, Rana Barua
2005/129 (PDF ) On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu
2005/127 (PDF ) Browser Model for Security Analysis of Browser-Based Protocols Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
2005/126 (PDF ) On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator Shahram Khazaei, Mahmood Salmasizadeh, Javad Mohajeri
2005/125 (PDF ) SPA Resistant Left-to-Right Integer Recodings Nicolas Thériault
2005/124 (PDF ) Append-Only Signatures Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan
2005/123 (PDF ) Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation Lan Nguyen
2005/122 (PDF ) Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004 Xinyi Huang, Willy Susilo, Yi Mu
2005/121 (PDF ) Pass-thoughts: Authenticating With Our Minds Julie Thorpe, P. C. van Oorschot, Anil Somayaji
2005/120 (PDF ) On Designatedly Verified (Non-interactive) Watermarking Schemes Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamato
2005/119 (PDF ) Index Calculus in Class Groups of Plane Curves of Small Degree Claus Diem
2005/118 (PDF ) Results on Rotation Symmetric Bent Functions Deepak Kumar Dalai, Subhamoy Maitra
2005/117 (PDF ) Boneh-Franklin Identity Based Encryption Revisited David Galindo
2005/116 (PDF ) On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems Nigel Smart, Frederik Vercauteren
2005/115 (PDF ) Characteristics of Key-Dependent S-Boxes: the Case of Twofish Marco Macchetti
2005/114 (PDF ) Intrusion-Resilient Secure Channels Gene Itkis, Robert McNerney Jr., Scott W. Russell
2005/113 (PDF ) Partially Fixed Point Multiplication Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava
2005/112 (PDF ) On the relationship between squared pairings and plain pairings Bo Gyeong Kang, Je Hong Park
2005/111 (PDF ) Weak Composite Diffie-Hellman is not Weaker than Factoring Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh
2005/110 (PDF ) Diffie-Hellman key exchange protocol and non-abelian nilpotent groups. Ayan Mahalanobis
2005/109 (PDF ) A Public Key Cryptosystem Based on Singular Cubic Curve Sahadeo Padhye
2005/108 (PDF ) Efficient Identity-Based and Authenticated Key Agreement Protocol Yongge Wang
2005/107 (PDF ) A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher Ophir Levy, Avishai Wool
2005/106 (PDF ) How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation Boaz Barak, Amit Sahai
2005/105 (PDF ) On Error Correction in the Exponent Chris Peikert
2005/104 (PDF ) On estimating the lattice security of NTRU Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, William Whyte
2005/103 (PDF ) Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 Fangguo Zhang, Xiaofeng Chen
2005/102 (PDF ) Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications Vlastimil Klima
2005/101 (PDF ) Soundness and Completeness of Formal Logics of Symmetric Encryption Gergei Bana
2005/100 (PDF ) almost enumeration of 8-variable bent functions Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang
2005/099 (PDF ) Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
2005/098 (PDF ) Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme Yassine Lakhnech, Laurent Mazare
2005/097 (PDF ) Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation Yassine Lakhnech, Laurent Mazare
2005/096 (PDF ) Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$ David Jedlicka
2005/095 (PDF ) Security and Privacy Issues in E-passports Ari Juels, David Molnar, David Wagner
2005/094 (PDF ) A Survey on ID-Based Cryptographic Primitives M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena
2005/093 (PDF ) An ID-Based Key Agreement Scheme from pairing Guohong Xie
2005/092 (PDF ) PRF Domain Extension Using DAGs Charanjit Jutla
2005/091 (PDF ) Distributed Phishing Attacks Markus Jakobsson, Adam Young
2005/090 (PDF ) Rediscovery of Time Memory Tradeoffs Jin Hong, Palash Sarkar
2005/089 (PDF ) Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions Hans Dobbertin, Gregor Leander
2005/088 (PDF ) The MAC function Pelican 2.0 Joan Daemen, Vincent Rijmen
2005/087 (PDF ) AES side channel attack protection using random isomorphisms A. G. Rostovtsev, O. V. Shemyakina
2005/086 (PDF ) Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) Henry Ng
2005/084 (PDF ) On Resistance of DES to Related-Key Differential Cryptanalysis Goce Jakimoski, Yvo Desmedt
2005/083 (PDF ) Security notions for disk encryption Kristian Gjøsteen
2005/082 (PDF ) Some properties of an FSE 2005 Hash Proposal Lars R. Knudsen
2005/080 (PDF ) A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan
2005/079 (PDF ) Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism Marius C Silaghi
2005/078 (PDF ) Duality between Multiplication and Modular Reduction Wieland Fischer, Jean-Pierre Seifert
2005/077 (PDF ) Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations Christopher Wolf, Bart Preneel
2005/076 (PDF ) Pairing-Based Cryptography at High Security Levels Neal Koblitz, Alfred Menezes
2005/075 (PDF ) Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klima
2005/074 (PDF ) Computationally sound implementations of equational theories against passive adversaries Mathieu Baudet, Vëronique Cortier, Steve Kremer
2005/073 (PDF ) BROADCAST ENCRYPTION $\pi$ Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo
2005/072 (PDF ) Practical Lattice Basis Sampling Reduction Johannes Buchmann, Christoph Ludwig
2005/070 (PDF ) On public-key cryptosystems based on combinatorial group theory Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka
2005/069 (PDF ) Fast Elliptic Curve Point Multiplication using Double-Base Chains V. S. Dimitrov, L. Imbert, P. K. Mishra
2005/068 (PDF ) N-adic Summation-Shrinking Generator. Basic properties and empirical evidences. Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov
2005/067 (PDF ) Colliding X.509 Certificates Arjen Lenstra, Xiaoyun Wang, Benne de Weger
2005/066 (PDF ) Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation Eike Kiltz
2005/065 (PDF ) Efficient hardware for the Tate pairing calculation in characteristic three T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
2005/064 (PDF ) On Efficient Key Agreement Protocols Anish Mathuria, Vipul Jain
2005/061 (PDF ) Key Derivation and Randomness Extraction Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
2005/060 (PDF ) Compact E-Cash Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
2005/059 (PDF ) Secret sharing schemes on graphs Laszlo Csirmaz
2005/058 (PDF ) Generic Constructions of Identity-Based and Certificateless KEMs K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
2005/057 (PDF ) Tight Reductions among Strong Diffie-Hellman Assumptions Victor K. Wei
2005/056 (PDF ) Deniable Authentication with RSA and Multicasting Daniel R. L. Brown
2005/055 (PDF ) Untraceability of Two Group Signature Schemes Zhengjun Cao
2005/053 (PDF ) An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun, Mu-En Wu
2005/052 (PDF ) Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems Ziv Kfir, Avishai Wool
2005/051 (PDF ) A Note on Shor's Quantum Algorithm for Prime Factorization Zhengjun Cao
2005/050 (PDF ) David Chaum's Voter Verification using Encrypted Paper Receipts Poorvi L. Vora
2005/049 (PDF ) Adversarial Model for Radio Frequency Identification Gildas Avoine
2005/048 (PDF ) Cryptanalysis of two identification schemes based on an ID-based cryptosystem Qiang Tang, Chris J. Mitchell
2005/047 (PDF ) Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme Qiang Tang, Chris J. Mitchell
2005/046 (PDF ) New Approaches for Deniable Authentication Mario Di Raimondo, Rosario Gennaro
2005/045 (PDF ) Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
2005/044 (PDF ) On the affine classification of cubic bent functions Sergey Agievich
2005/043 (PDF ) An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption Hsiao-Ying Lin, Wen-Guey Tzeng
2005/042 (PDF ) Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications O. A. Logachev, A. A. Salnikov, V. V. Yaschenko
2005/041 (PDF ) On the Security of a Group Signature Scheme with Strong Separability Lihua Liu, Zhengjun Cao
2005/040 (PDF ) Unfairness of a protocol for certified delivery Juan M. Estevez-Tapiador, Almudena Alcaide
2005/039 (PDF ) Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen, Gilles Van Assche
2005/037 (PDF ) Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes Claude Castelluccia, Einar Mykletun, Gene Tsudik
2005/036 (PDF ) Concurrent Composition of Secure Protocols in the Timing Model Yael Kalai, Yehuda Lindell, Manoj Prabhakaran
2005/035 (PDF ) An Efficient CDH-based Signature Scheme With a Tight Security Reduction Benoit Chevallier-Mames
2005/034 (PDF ) Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication) Gene Tsudik, Shouhuai Xu
2005/033 (PDF ) An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister, Robert Zuccherato
2005/032 (PDF ) On the Notion of Statistical Security in Simulatability Definitions Dennis Hofheinz, Dominique Unruh
2005/031 (PDF ) The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves Iwan Duursma, Negar Kiyavash
2005/030 (PDF ) Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves. A. A. Kalele, V. R. Sule
2005/029 (PDF ) A model and architecture for pseudo-random generation with applications to /dev/random Boaz Barak, Shai Halevi
2005/028 (PDF ) Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
2005/027 (PDF ) Tag-KEM/DEM: A New Framework for Hybrid Encryption Masayuki ABE, Rosario Gennaro, Kaoru Kurosawa
2005/026 (PDF ) Techniques for random maskin in hardware Jovan Dj. Golic
2005/025 (PDF ) Analysis of Affinely Equivalent Boolean Functions Meng Qing-shu, Yang min, Zhang Huan-guo, Liu Yu-zhen
2005/024 (PDF ) Weak keys of the Diffe Hellman key exchange I A. A. Kalele, V. R. Sule
2005/023 (PDF ) A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness Masao Kasahara
2005/022 (PDF ) An Improved and Efficient Countermeasure against Power Analysis Attacks ChangKyun Kim, JaeCheol Ha, SangJae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim
2005/021 (PDF ) Partial Hiding in Public-Key Cryptography Eabhnat N\'ı Fhloinn, Michael Purser
2005/020 (PDF ) (De)Compositions of Cryptographic Schemes and their Applications to Protocols R. Janvier, Y. Lakhnech, L. Mazare
2005/019 (PDF ) The Full Abstraction of the UC Framework Jesüs F. Almansa
2005/018 (PDF ) Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys Dan Boneh, Craig Gentry, Brent Waters
2005/017 (PDF ) Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives Roberto M. Avanzi
2005/016 (PDF ) Narrow T-functions Magnus Daum
2005/015 (PDF ) Hierarchical Identity Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen, Eu-Jin Goh
2005/014 (PDF ) A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words Ludovic Perret
2005/013 (PDF ) Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols Hung-Yu Chien
2005/012 (PDF ) Efficient Certificateless Public Key Encryption Zhaohui Cheng, Richard Comley
2005/011 (PDF ) An Improved Elegant Method to Re-initialize Hash Chains Yuanchao Zhao, Daoben Li
2005/010 (PDF ) Update on SHA-1 Vincent Rijmen, Elisabeth Oswald
2005/009 (PDF ) Mixing properties of triangular feedback shift registers Bernd Schomburg
2005/008 (PDF ) Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 J. Wu, R. Wei
2005/007 (PDF ) The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu
2005/006 (PDF ) A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$. Pradeep Kumar Mishra, Kishan Chand Gupta
2005/005 (PDF ) A sufficient condition for key-privacy Shai Halevi
2005/004 (PDF ) Benes and Butterfly schemes revisited Jacques Patarin, Audrey Montreuil
2005/003 (PDF ) Cryptanalysis of Hiji-bij-bij (HBB) Vlastimil Klima
2005/002 (PDF ) Logcrypt: Forward Security and Public Verification for Secure Audit Logs Jason E. Holt, Kent E. Seamons
2005/001 (PDF ) On Obfuscating Point Functions Hoeteck Wee
2004/377 (PDF ) New Distributed Ring Signatures for General Families of Signing Subsets Javier Herranz, Germán Sáez
2004/376 (PDF ) Cryptanalysis of RCES/RSES Image Encryption Scheme Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo
2004/375 (PDF ) Efficient Pairing Computation on Supersingular Abelian Varieties Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott
2004/374 (PDF ) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo
2004/373 (PDF ) Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang, Dingyi Pei, Zhuojun Liu
2004/371 (PDF ) Construction and Traversal of Hash Chain with Public Links Vipul Goyal
2004/370 (PDF ) Tracing-by-Linking Group Signautres Victor K. Wei
2004/369 (PDF ) SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks Filipe Rosado da-Fonseca
2004/368 (PDF ) Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
2004/367 (PDF ) On the Affine Transformations of HFE-Cryptosystems and Systems with Branches Patrick Felke
2004/366 (PDF ) Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2004/365 (PDF ) Ordinary abelian varieties having small embedding degree Steven D. Galbraith, J. McKee, P. Valenca
2004/364 (PDF ) Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz, Josef Pieprzyk
2004/363 (PDF ) Rethinking the security of some authenticated group key agreement schemes Qiang Tang, Chris J. Mitchell
2004/362 (PDF ) A new security proof for Damgård's ElGamal Kristian Gjøsteen
2004/361 (PDF ) Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf, Bart Preneel
2004/360 (PDF ) Equivalent Keys in HFE, C$^*$, and variations Christopher Wolf, Bart Preneel
2004/359 (PDF ) Secure Computation of the Mean and Related Statistics Eike Kiltz, Gregor Leander, John Malone-Lee
2004/358 (PDF ) Reusable Cryptographic Fuzzy Extractors Xavier Boyen
2004/357 (PDF ) MD5 To Be Considered Harmful Someday Dan Kaminsky
2004/356 (PDF ) Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle
2004/355 (PDF ) A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting, Po-Yueh Hung
2004/354 (PDF ) Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra Alexander Maximov
2004/353 (PDF ) Direct Division in Factor Rings Patrick Fitzpatrick, Christopher Wolf
2004/352 (PDF ) Practical Cryptography in High Dimensional Tori Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
2004/350 (PDF ) Multivariable public--key cryptosystems Jintai Ding, Dieter Schmidt
2004/349 (PDF ) A DPA Attack on the Improved Ha-Moon Algorithm Dong Jin PARK, Pil Joong LEE
2004/348 (PDF ) A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords Junghyun Nam, Seungjoo Kim, Dongho Won
2004/347 (PDF ) Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields'' Marco Macchetti
2004/346 (PDF ) Random Switching Logic: A Countermeasure against DPA based on Transition Probability Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
2004/345 (PDF ) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
2004/344 (PDF ) Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2004/343 (PDF ) Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo
2004/342 (PDF ) A comb method to render ECC resistant against Side Channel Attacks Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
2004/341 (PDF ) Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli
2004/340 (PDF ) Request for Review of Key Wrap Algorithms Morris Dworkin
2004/339 (PDF ) Divisors in Residue Classes, Constructively Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj
2004/338 (PDF ) Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2004/337 (PDF ) Security on Generalized Feistel Scheme with SP Round Function Wu Wenling, Zhang Wentao, Lin Dongdai
2004/336 (PDF ) Oblivious Transfer Is Symmetric Stefan Wolf, Jürg Wullschleger
2004/335 (PDF ) Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions Haitner Iftach, Shaltiel Ronen
2004/334 (PDF ) Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange) Ran Canetti, Jonathan Herzog
2004/333 (PDF ) Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem Marius-Calin Silaghi
2004/332 (PDF ) Sequences of games: a tool for taming complexity in security proofs Victor Shoup
2004/331 (PDF ) Code-Based Game-Playing Proofs and the Security of Triple Encryption Mihir Bellare, Phillip Rogaway
2004/330 (PDF ) Multicollision Attacks on Generalized Hash Functions M. Nandi, D. R. Stinson
2004/329 (PDF ) Hardness amplification of weakly verifiable puzzles Ran Canetti, Shai Halevi, Michael Steiner
2004/327 (PDF ) Efficient Identity Based Ring Signature Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui
2004/326 (PDF ) Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme Zhengjun Cao
2004/325 (PDF ) Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules Mitsuhiro HATTORI, Shoichi HIROSE, Susumu YOSHIDA
2004/324 (PDF ) On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions G. Laccetti, G. Schmid
2004/323 (PDF ) A note on López-Dahab coordinates Tanja Lange
2004/322 (PDF ) Separable and Anonymous Identity-Based Key Issuing Ai-fen Sui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, H. W. Chan
2004/321 (PDF ) The conjugacy search problem in public key cryptography: unnecessary and insufficient Vladimir Shpilrain, Alexander Ushakov
2004/320 (PDF ) Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults Alfonso De Gregorio
2004/319 (PDF ) Badger - A Fast and Provably Secure MAC Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner
2004/318 (PDF ) Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation Martin Hirt, Jesper Buus Nielsen
2004/317 (PDF ) Adaptively-Secure, Non-Interactive Public-Key Encryption Ran Canetti, Shai Halevi, Jonathan Katz
2004/316 (PDF ) On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao
2004/315 (PDF ) Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes Qin Wang, Zhenfu Cao
2004/314 (PDF ) A Technical Comparison of IPSec and SSL AbdelNasir Alshamsi, Takamichi Saito
2004/313 (PDF ) Cryptanalysis of a threshold proxy signature with known signers Fuw-Yi Yang, Jinn-Ke Jan, Woei-Jiunn Jeng
2004/312 (PDF ) Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves David Jao, Stephen D. Miller, Ramarathnam Venkatesan
2004/311 (PDF ) Hierarchical Group Signatures Marten Trolin, Douglas Wikstrom
2004/310 (PDF ) A Verifiable Random Function With Short Proofs and Keys Yevgeniy Dodis, Aleksandr Yampolskiy
2004/309 (PDF ) The Power of Verification Queries in Message Authentication and Authenticated Encryption Mihir Bellare, Oded Goldreich, Anton Mityagin
2004/308 (PDF ) Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement Guohong Xie
2004/307 (PDF ) Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme Zhengjun Cao
2004/306 (PDF ) The Static Diffie-Hellman Problem Daniel R. L. Brown, Robert P. Gallant
2004/305 (PDF ) A note on efficient computation of cube roots in characteristic 3 Paulo S. L. M. Barreto
2004/304 (PDF ) Second Preimages on n-bit Hash Functions for Much Less than 2^n Work John Kelsey, Bruce Schneier
2004/303 (PDF ) Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields Soonhak Kwon
2004/302 (PDF ) Security of Wang-Li Threshold Signature Scheme Lifeng Guo
2004/301 (PDF ) VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme Bartosz Zoltak
2004/300 (PDF ) Relating Symbolic and Cryptographic Secrecy Michael Backes, Birgit Pfitzmann
2004/299 (PDF ) Security Flaws in a Pairing-based Group Signature Scheme Zhengjun Cao, Sherman S. M. Chow
2004/298 (PDF ) Nominative Proxy Signature Schemes Zuo-Wen Tan, Zhuo-Jun Liu
2004/297 (PDF ) Post-Quantum Signatures Johannes Buchmann, Carlos Coronado, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann
2004/296 (PDF ) Designs of Efficient Secure Large Hash Values Mridul Nandi
2004/295 (PDF ) An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security Jiang Wu, Ruizhong Wei
2004/294 (PDF ) Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher Souradyuti Paul, Bart Preneel
2004/293 (PDF ) Provably Secure Authentication of Digital Media Through Invertible Watermarks Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
2004/292 (PDF ) Asynchronous Proactive RSA Ruishan Zhang, Kefei Chen
2004/291 (PDF ) The Rabbit Stream Cipher - Design and Security Analysis Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner
2004/290 (PDF ) The Security of the FDH Variant of Chaum's Undeniable Signature Scheme Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
2004/289 (PDF ) Fault attack on the DVB Common Scrambling Algorithm Kai Wirt
2004/287 (PDF ) Almost Ideal Contrast Visual Cryptography with Reversing Duong Quang Viet, Kaoru Kurosawa
2004/286 (PDF ) Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions Daniele Micciancio
2004/285 (PDF ) Generation of random Picard curves for cryptography Annegret Weng
2004/284 (PDF ) ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
2004/283 (PDF ) Fault and Side-Channel Attacks on Pairing Based Cryptography D. Page, F. Vercauteren
2004/282 (PDF ) New Monotone Span Programs from Old Ventzislav Nikov, Svetla Nikova
2004/281 (PDF ) Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation Patrick P. Tsang, Victor K. Wei
2004/280 (PDF ) Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme Zhengjun Cao
2004/279 (PDF ) Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien
2004/278 (PDF ) The Extended Codebook (XCB) Mode of Operation David A. McGrew, Scott R. Fluhrer
2004/277 (PDF ) Experimenting with Faults, Lattices and the DSA David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
2004/276 (PDF ) Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions C. Carlet
2004/275 (PDF ) An e-Voting Scheme with Improved Resistance to Bribe and Coercion Wei-Chi Ku, Chun-Ming Ho
2004/274 (PDF ) A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS Meng Qing-shu, Yang min, Zhang huan-guo, Cui jing-song
2004/273 (PDF ) Cryptanalysis of Threshold-Multisignature schemes Lifeng Guo
2004/272 (PDF ) A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security Tom Shrimpton
2004/271 (PDF ) The Mundja Streaming MAC Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/270 (PDF ) An Enhanced and Secure Protocol for Authenticated Key Exchange Fuw-Yi Yang, Jinn-Ke Jan
2004/269 (PDF ) Cryptanalysis of Threshold-Multisignature Schemes Lifeng Guo
2004/268 (PDF ) Untraceability of Wang-Fu Group Signature Scheme Zhengjun Cao, Lihua Liu
2004/267 (PDF ) Separable Linkable Threshold Ring Signatures Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
2004/266 (PDF ) A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods M. Khabbazian, T. A. Gulliver
2004/265 (PDF ) sSCADA: Securing SCADA Infrastructure Communications Yongge Wang, Bei-Tseng Chu
2004/264 (PDF ) Musings on the Wang et al. MD5 Collision Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/263 (PDF ) Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems Christopher Wolf, Bart Preneel
2004/262 (PDF ) Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. Lihua Liu, Zhengjun Cao
2004/261 (PDF ) Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption Dan Boneh, Jonathan Katz
2004/260 (PDF ) Secure Group Communications over Combined Wired/Wireless Networks Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won
2004/259 (PDF ) On Boolean Functions with Generalized Cryptographic Properties An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
2004/258 (PDF ) Escrow-Free Encryption Supporting Cryptographic Workflow S. S. Al-Riyami, J. Malone-Lee, N. P. Smart
2004/257 (PDF ) A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme Junghyun Nam, Seungjoo Kim, Dongho Won
2004/256 (PDF ) On the supports of the Walsh transforms of Boolean functions Claude Carlet, Sihem Mesnager
2004/255 (PDF ) A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
2004/254 (PDF ) New paradigms for digital generation and post-processing of random data Jovan Dj. Golic
2004/253 (PDF ) Design Principles for Iterated Hash Functions Stefan Lucks
2004/252 (PDF ) Security Proofs for Identity-Based Identification and Signature Schemes Mihir Bellare, Chanathip Namprempre, Gregory Neven
2004/251 (PDF ) Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices Junghyun Nam, Seungjoo Kim, Dongho Won
2004/250 (PDF ) Identity Based Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/249 (PDF ) Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng, Richard Comley
2004/248 (PDF ) Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2004/247 (PDF ) Vectorial fast correlation attacks Jovan Dj. Golic, Guglielmo Morgari
2004/246 (PDF ) Upper and Lower Bounds on Black-Box Steganography Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
2004/245 (PDF ) On codes, matroids and secure multi-party computation from linear secret sharing schemes Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimenez Urroz, Gregor Leander, Jaume Marti-Farre, Carles Padro
2004/244 (PDF ) Signcryption in Hierarchical Identity Based Cryptosystem Sherman S. M. Chow, Tsz Hon Yuen, Lucas C. K. Hui, S. M. Yiu
2004/243 (PDF ) On the Key Exposure Problem in Chameleon Hashes Giuseppe Ateniese, Breno de Medeiros
2004/242 (PDF ) Combinatorial group theory and public key cryptography Vladimir Shpilrain, Gabriel Zapata
2004/241 (PDF ) A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2 Colm O hEigeartaigh
2004/240 (PDF ) A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura
2004/239 (PDF ) Geometric Key Establishment Arkady Berenstein, Leon Chernyak
2004/238 (PDF ) Security Analysis of A Dynamic ID-based Remote User Authentication Scheme Amit K Awasthi, Sunder Lal
2004/237 (PDF ) Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC Christopher Wolf, An Braeken, Bart Preneel
2004/236 (PDF ) Forgery Attacks on Chang et al.'s signature scheme with message recovery FU Xiaotong, XU Chunxiang, XIAO Guozhen
2004/235 (PDF ) Cryptographic Implications of Hess' Generalized GHS Attack Alfred Menezes, Edlyn Teske
2004/234 (PDF ) On the security of some nonrepudiable threshold proxy signature schemes with known signers Zuo-Wen Tan, Zhuo-Jun Liu
2004/233 (PDF ) Password-Based Authenticated Key Exchange in the Three-Party Setting Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
2004/232 (PDF ) Extending the Resynchronization Attack Frederik Armknecht, Joseph Lano, Bart Preneel
2004/231 (PDF ) Timed-Release and Key-Insulated Public Key Encryption Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
2004/230 (PDF ) A Provable Secure Scheme for Partially Blind Signatures Fuw-Yi Yang, Jinn-Ke Jan
2004/229 (PDF ) Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes Xin Lu, Zhi Ma, Dengguo Feng
2004/228 (PDF ) DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$ Honggang Hu, Dengguo Feng
2004/227 (PDF ) Sign Change Fault Attacks On Elliptic Curve Cryptosystems Johannes Blömer, Martin Otto, Jean-Pierre Seifert
2004/226 (PDF ) Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak, Yehuda Lindell, Salil Vadhan
2004/225 (PDF ) Vectorial Boolean functions and induced algebraic equations Jovan Dj. Golic
2004/224 (PDF ) The Polynomial Composition Problem in (Z/nZ)[X] Marc Joye, David Naccache, Stephanie Porte
2004/223 (PDF ) Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves Xinxin Fan, Yumin Wang
2004/222 (PDF ) A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes An Braeken, Christopher Wolf, Bart Preneel
2004/221 (PDF ) Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare, Adriana Palacio
2004/220 (PDF ) On Oleshchuk's Public Key Cryptosystem Heiko Stamer, Friedrich Otto
2004/219 (PDF ) Entropic Security and the Encryption of High Entropy Messages Yevgeniy Dodis, Adam Smith
2004/218 (PDF ) Plaintext-Simulatability Eiichiro Fujisaki
2004/217 (PDF ) Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice Aggelos Kiayias, Moti Yung
2004/216 (PDF ) Tree Parity Machine Rekeying Architectures Markus Volkmer, Sebastian Wallner
2004/215 (PDF ) Transitive Signatures: New Schemes and Proofs Mihir Bellare, Gregory Neven
2004/214 (PDF ) Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality An Braeken, Christopher Wolf, Bart Preneel
2004/213 (PDF ) Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery Fangguo Zhang
2004/212 (PDF ) ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
2004/211 (PDF ) Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing Ian F. Blake, Aldar C-F. Chan
2004/210 (PDF ) Hybrid Cryptography Alexander W. Dent
2004/209 (PDF ) The Security and Efficiency of Micciancio's Cryptosystem Christoph Ludwig
2004/208 (PDF ) Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sebastien Coron, Alexander May
2004/207 (PDF ) On Corrective Patterns for the SHA-2 Family Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/206 (PDF ) ID-Based Proxy Signature Using Bilinear Pairings Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/205 (PDF ) Direct Anonymous Attestation Ernie Brickell, Jan Camenisch, Liqun Chen
2004/204 (PDF ) Authenticated tree parity machine key exchange Markus Volkmer, Andre Schaumburg
2004/203 (PDF ) How to Cheat at Chess: A Security Analysis of the Internet Chess Club John Black, Martin Cochran, Ryan Gardner
2004/202 (PDF ) Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions Yuri Borissov, An Braeken, Svetla Nikova
2004/201 (PDF ) Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He
2004/200 (PDF ) On Cheating Immune Secret Sharing An Braeken, Svetla Nikova, Ventzislav Nikov
2004/199 (PDF ) Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
2004/198 (PDF ) Long Modular Multiplication for Cryptographic Applications Laszlo Hars
2004/197 (PDF ) SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation Helmut Kahl
2004/196 (PDF ) Password Based Key Exchange with Mutual Authentication Shaoquan Jiang, Guang Gong
2004/195 (PDF ) Signed Binary Representations Revisited Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
2004/194 (PDF ) A Note on An Encryption Scheme of Kurosawa and Desmedt Rosario Gennaro, Victor Shoup
2004/193 (PDF ) The Security and Performance of the Galois/Counter Mode of Operation (Full Version) David A. McGrew, John Viega
2004/191 (PDF ) Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations Pradeep Kumar Mishra
2004/190 (PDF ) Distributed Ring Signatures for Identity-Based Scenarios Javier Herranz, Germán Sáez
2004/189 (PDF ) Computing Modular Polynomials Denis Charles, Kristin Lauter
2004/188 (PDF ) Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
2004/187 (PDF ) Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater
2004/185 (PDF ) On the Existence of low-degree Equations for Algebraic Attacks Frederik Armknecht
2004/184 (PDF ) ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings Amit K Awasthi, Sunder Lal
2004/183 (PDF ) A New Forward Secure Signature Scheme Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
2004/182 (PDF ) Simpler Session-Key Generation from Short Random Passwords Minh-Huyen Nguyen, Salil Vadhan
2004/181 (PDF ) On the Composition of Authenticated Byzantine Agreement Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
2004/180 (PDF ) Efficient Identity-Based Encryption Without Random Oracles Brent R. Waters
2004/179 (PDF ) Identity Based Threshold Ring Signature Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2004/178 (PDF ) Optimal Updating of Ideal Threshold Schemes S. G. Barwick, W. -A. Jackson, K. M. Martin, C. M. O'Keefe
2004/177 (PDF ) Updating the Parameters of a Threshold Scheme by Minimal Broadcast S. G. Barwick, W. -A. Jackson, K. M. Martin
2004/176 (PDF ) A Biometric Identity Based Signature Scheme Andrew Burnett, Adam Duffy, Tom Dowling
2004/175 (PDF ) A Proof of Yao's Protocol for Secure Two-Party Computation Yehuda Lindell, Benny Pinkas
2004/174 (PDF ) Short Group Signatures Dan Boneh, Xavier Boyen, Hovav Shacham
2004/173 (PDF ) Secure Identity Based Encryption Without Random Oracles Dan Boneh, Xavier Boyen
2004/172 (PDF ) Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles Dan Boneh, Xavier Boyen
2004/171 (PDF ) Short Signatures Without Random Oracles Dan Boneh, Xavier Boyen
2004/170 (PDF ) Efficient Consistency Proofs for Generalized Queries on a Committed Database Rafail Ostrovsky, Charles Rackoff, Adam Smith
2004/169 (PDF ) Regional Blackouts: Protection of Broadcast Content on 3G Networks. Alexander W. Dent, Allan Tomlinson
2004/168 (PDF ) Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack T. Moh, J. M. Chen, Boyin Yang
2004/167 (PDF ) A Secure and Efficient Key Exchange Protocol for Mobile Communications Fuw-Yi Yang, Jinn-Ke Jan
2004/166 (PDF ) FRMAC, a Fast Randomized Message Authentication Code Eliane Jaulmes, Reynald Lercier
2004/165 (PDF ) A comparison of MNT curves and supersingular curves D. Page, N. P. Smart, F. Vercauteren
2004/164 (PDF ) ID-based Cryptography from Composite Degree Residuosity Man Ho Au, Victor K. Wei
2004/162 (PDF ) On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission Ivan Damgaard, Thomas Pedersen, Louis Salvail
2004/161 (PDF ) Improvement of Thériault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus Ko-ichi Nagao
2004/160 (PDF ) Scalable Public-Key Tracing and Revoking Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
2004/159 (PDF ) Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks Gergely Acs, Levente Buttyan, Istvan Vajda
2004/158 (PDF ) Mobile Terminal Security Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan
2004/157 (PDF ) Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three R. Granger, D. Page, M. Stam
2004/156 (PDF ) Quantum cryptography: a practical information security perspective Kenneth G. Paterson, Fred Piper, Ruediger Schack
2004/155 (PDF ) Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks Amir Herzberg, Ahmad Gbara
2004/154 (PDF ) Controlling Spam by Secure Internet Content Selection Amir Herzberg
2004/153 (PDF ) A double large prime variation for small genus hyperelliptic index calculus P. Gaudry, E. Thomë, N. Thëriault, C. Diem
2004/152 (PDF ) Another Look at ``Provable Security'' Neal Koblitz, Alfred Menezes
2004/151 (PDF ) Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$ Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi
2004/150 (PDF ) An Authenticated Certificateless Public Key Encryption Scheme Young-Ran Lee, Hyang-Sook Lee
2004/149 (PDF ) Secure and Efficient AES Software Implementation for Smart Caards E. Trichina, L. Korkishko
2004/148 (PDF ) Provably Secure Delegation-by-Certification Proxy Signature Schemes Zuowen Tan, Zhuojun Liu
2004/147 (PDF ) Key Recovery Method for CRT Implementation of RSA Matthew J. Campagna, Amit Sethi
2004/146 (PDF ) Near-Collisions of SHA-0 Eli Biham, Rafi Chen
2004/145 (PDF ) Electromagnetic Side Channels of an FPGA Implementation of AES Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
2004/144 (PDF ) Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables Alexander Maximov, Martin Hell, Subhamoy Maitra
2004/143 (PDF ) Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash Nicolas T. Courtois
2004/141 (PDF ) Elastic AES Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/139 (PDF ) New Notions of Security: Achieving Universal Composability without Trusted Setup Manoj Prabhakaran, Amit Sahai
2004/138 (PDF ) How to Disembed a Program? Benoit Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004/137 (PDF ) New GF(2n) Parallel Multiplier Using Redundant Representation Haining Fan, Yiqi Dai
2004/136 (PDF ) CompChall: Addressing Password Guessing Attacks Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
2004/135 (PDF ) More Efficient Server Assisted One Time Signatures Vipul Goyal
2004/134 (PDF ) Secure and Efficient Masking of AES - A Mission Impossible? Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller
2004/133 (PDF ) Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
2004/132 (PDF ) On Small Characteristic Algebraic Tori in Pairing-Based Cryptography R. Granger, D. Page, M. Stam
2004/131 (PDF ) A New ID-based Signature with Batch Verification Jung Hee Cheon, Yongdae Kim, Hyo Jin Yoon
2004/130 (PDF ) Private Inference Control David Woodruff, Jessica Staddon
2004/129 (PDF ) Generalizing Kedlaya's order counting based on Miura Theory Joe Suzuki
2004/128 (PDF ) Elastic Block Ciphers Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/127 (PDF ) DDH-based Group Key Agreement in a Mobile Environment Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
2004/126 (PDF ) Two Software Normal Basis Multiplication Algorithms for GF(2n) Haining Fan, Yiqi Dai
2004/125 (PDF ) EME*: extending EME to handle arbitrary-length messages with associated data Shai Halevi
2004/124 (PDF ) Universally Composable DKG with Linear Number of Exponentiations Douglas Wikström
2004/123 (PDF ) On security of XTR public key cryptosystems against Side Channel Attacks Dong-Guk Han, Jongin Lim, Kouichi Sakurai
2004/122 (PDF ) A New Two-Party Identity-Based Authenticated Key Agreement Noel McCullagh, Paulo S. L. M. Barreto
2004/121 (PDF ) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings Tsz Hon Yuen, Victor K. Wei
2004/120 (PDF ) Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup Bartosz Zoltak
2004/119 (PDF ) Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography Masayuki Abe, Serge Fehr
2004/118 (PDF ) Fast addition on non-hyperelliptic genus $3$ curves Stéphane Flon, Roger Oyono, Christophe Ritzenthaler
2004/117 (PDF ) Efficient and Forward-Secure Identity-Based Signcryption Noel McCullagh, Paulo S. L. M. Barreto
2004/116 (PDF ) On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
2004/115 (PDF ) Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won
2004/114 (PDF ) Improved Identity-Based Signcryption Liqun Chen, John Malone-Lee
2004/113 (PDF ) On the Security and Composability of the One Time Pad Dominik Raub, Rainer Steinwandt, Joern Mueller-Quade
2004/112 (PDF ) Relation between XL algorithm and Groebner Bases Algorithms M. Sugita, M. Kawazoe, H. Imai
2004/111 (PDF ) The Vulnerability of SSL to Chosen Plaintext Attack Gregory V. Bard
2004/110 (PDF ) Designing Against the `Overdefined System of Equations' Attack Carlisle Adams
2004/109 (PDF ) Concealing Complex Policies with Hidden Credentials Robert Bradshaw, Jason Holt, Kent Seamons
2004/108 (PDF ) Two Improved Partially Blind Signature Schemes from Bilinear Pairings Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2004/107 (PDF ) Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic Bertrand BYRAMJEE, Sylvain DUQUESNE
2004/106 (PDF ) Capacity and Examples of Template Protecting Biometric Authentication Systems P. Tuyls, J. Goseling
2004/105 (PDF ) Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti
2004/104 (PDF ) Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings Lan Nguyen, Rei Safavi-Naini
2004/103 (PDF ) Cryptanalysis of SFlash v3 Jintai Ding, Dieter Schmidt
2004/102 (PDF ) The Exact Security of an Identity Based Signature and its Applications Benoît Libert, Jean-Jacques Quisquater
2004/101 (PDF ) Provably Secure Masking of AES Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel
2004/100 (PDF ) The Sorcerer’s Apprentice Guide to Fault Attacks Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan
2004/099 (PDF ) Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2004/098 (PDF ) Attacking a Public Key Cryptosystem Based on Tree Replacement María Isabel González Vasco, David Pérez García
2004/097 (PDF ) How To Re-initialize a Hash Chain Vipul Goyal
2004/095 (PDF ) GNFS Factoring Statistics of RSA-100, 110, ..., 150 Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda
2004/094 (PDF ) Block Ciphers and Stream Ciphers: The State of the Art Alex Biryukov
2004/093 (PDF ) A Provably Secure Nyberg-Rueppel Signature Variant with Applications Giuseppe Ateniese, Breno de Medeiros
2004/092 (PDF ) A New Stream Cipher HC-256 Hongjun Wu
2004/091 (PDF ) Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili Narasimha, Gene Tsudik
2004/090 (PDF ) Provably Secure Authenticated Tree Based Group Key Agreement Protocol Ratna Dutta, Rana Barua, Palash Sarkar
2004/089 (PDF ) Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance Mahalingam Ramkumar, Nasir Memon
2004/087 (PDF ) Using primitive subgroups to do more with fewer bits K. Rubin, A. Silverberg
2004/086 (PDF ) Fuzzy Identity Based Encryption Amit Sahai, Brent Waters
2004/085 (PDF ) The CS2 Block Cipher Tom St Denis
2004/084 (PDF ) Evaluating elliptic curve based KEMs in the light of pairings David Galindo, Sebastia Martin, Jorge L. Villar
2004/083 (PDF ) Scan Based Side Channel Attack on Data Encryption Standard Bo Yang, Kaijie Wu, Ramesh Karri
2004/082 (PDF ) The Reactive Simulatability (RSIM) Framework for Asynchronous Systems Michael Backes, Birgit Pfitzmann, Michael Waidner
2004/081 (PDF ) Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers Philip Hawkes, Gregory G. Rose
2004/080 (PDF ) HENKOS Stream Cipher Marius Oliver Gheorghita
2004/079 (PDF ) Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng, Luminita Vasiu, Richard Comley
2004/078 (PDF ) Analysis of the WinZip encryption method Tadayoshi Kohno
2004/077 (PDF ) Foundations of Group Signatures: The Case of Dynamic Groups Mihir Bellare, Haixia Shi, Chong Zhang
2004/076 (PDF ) Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders Aggelos Kiayias, Moti Yung
2004/075 (PDF ) An Hybrid Mode of Operation Alexis W. Machado
2004/074 (PDF ) Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael Liam Keliher, Henk Meijer, Stafford Tavares
2004/073 (PDF ) Index calculus for abelian varieties and the elliptic curve discrete logarithm problem Pierrick Gaudry
2004/072 (PDF ) Asymmetric Cryptography: Hidden Field Equations Christopher Wolf, Bart Preneel
2004/071 (PDF ) An IBE Scheme to Exchange Authenticated Secret Keys Waldyr Benits Jr, Routo Terada
2004/070 (PDF ) Easy decision-Diffie-Hellman groups Steven D Galbraith, Victor Rotger
2004/069 (PDF ) A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
2004/068 (PDF ) Synthesis of Secure FPGA Implementations Kris Tiri, Ingrid Verbauwhede
2004/067 (PDF ) Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis Kris Tiri, Ingrid Verbauwhede
2004/066 (PDF ) A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s. Kris Tiri, Ingrid Verbauwhede
2004/065 (PDF ) Refinements of Miller's Algorithm for Computing Weil/Tate Pairing Ian Blake, Kumar Murty, Guangwu Xu
2004/064 (PDF ) Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua, Palash Sarkar
2004/063 (PDF ) An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa
2004/062 (PDF ) On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions John Black, Martin Cochran, Thomas Shrimpton
2004/061 (PDF ) TTS: Rank Attacks in Tame-Like Multivariate PKCs Bo-Yin Yang, Jiun-Ming Chen
2004/060 (PDF ) Positive Results and Techniques for Obfuscation Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
2004/059 (PDF ) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library Michael Backes, Birgit Pfitzmann
2004/058 (PDF ) Generating more MNT elliptic curves Michael Scott, Paulo S. L. M Barreto
2004/057 (PDF ) On Multiple Linear Approximations Alex Biryukov, Christophe De Cannière, Michael Quisquater
2004/055 (PDF ) Redundant Trinomials for Finite Fields of Characteristic $2$ Christophe Doche
2004/054 (PDF ) Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2004/053 (PDF ) Efficient and Universally Composable Committed Oblivious Transfer and Applications Juan Garay, Philip MacKenzie, Ke Yang
2004/052 (PDF ) The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Tal Malkin, Satoshi Obana, Moti Yung
2004/051 (PDF ) Privacy Preserving Keyword Searches on Remote Encrypted Data Yan-Cheng Chang, Michael Mitzenmacher
2004/050 (PDF ) Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1 Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
2004/049 (PDF ) Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm Christophe Clavier
2004/048 (PDF ) Tail-MAC: A Message Authentication Scheme for Stream Ciphers Bartosz Zoltak
2004/047 (PDF ) On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes Yodai Watanabe
2004/046 (PDF ) Revision of Tractable Rational Map Cryptosystem Lih-Chung Wang, Fei-Hwang Chang
2004/045 (PDF ) Lower Bounds and Impossibility Results for Concurrent Self Composition Yehuda Lindell
2004/044 (PDF ) Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing
2004/043 (PDF ) Multi-sequences with d-perfect property Xiutao Feng, Quanlong Wang, Zongduo Dai
2004/041 (PDF ) Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries Cheng-Kang Chu, Wen-Guey Tzeng
2004/040 (PDF ) Cryptanalysis of a timestamp-based password authentication scheme Lizhen Yang, Kefei Chen
2004/039 (PDF ) A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups Victor K. Wei
2004/038 (PDF ) Chameleon Hashing without Key Exposure Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2004/037 (PDF ) A Provably Secure Scheme for Restrictive Partially Blind Signatures Fuw-Yi Yang, Jinn-Ke Jan
2004/036 (PDF ) Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang
2004/035 (PDF ) Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance Phillip Rogaway, Thomas Shrimpton
2004/034 (PDF ) s(n) An Arithmetic Function of Some Interest, and Related Arithmetic Gideon Samid
2004/033 (PDF ) New Approaches to Password Authenticated Key Exchange based on RSA Muxiang Zhang
2004/032 (PDF ) Compressed Pairings Michael Scott, Paulo S. L. M. Barreto
2004/031 (PDF ) Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev
2004/030 (PDF ) Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$. Colin Stahlke
2004/029 (PDF ) Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems Guido Bertoni, Luca Breveglieri, Thomas Wollinger, Christof Paar
2004/028 (PDF ) Custodian-Hiding Verifiable Encryption Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/027 (PDF ) Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/026 (PDF ) The CSQUARE Transform Tom St Denis
2004/025 (PDF ) Clarifying Obfuscation: Improving the Security of White-Box Encoding Hamilton E. Link, William D. Neumann
2004/024 (PDF ) Exponential S-boxes Sergey Agievich, Andrey Afonenko
2004/023 (PDF ) RDS: Remote Distributed Scheme for Protecting Mobile Agents Asnat Dadon-Elichai
2004/022 (PDF ) Privacy-Enhanced Searches Using Encrypted Bloom Filters Steven M. Bellovin, William R. Cheswick
2004/021 (PDF ) Externalized Fingerprint Matching Claude Barral, Jean-Sébastien Coron, David Naccache
2004/020 (PDF ) Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
2004/019 (PDF ) New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms Tetsu Iwata, Tadayoshi Kohno
2004/018 (PDF ) Corrections of the NIST Statistical Test Suite for Randomness Song-Ju Kim, Ken Umeno, Akio Hasegawa
2004/017 (PDF ) Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints M. Scott
2004/016 (PDF ) A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer Dennis Hofheinz, Joern Mueller-Quade
2004/015 (PDF ) An AGM-type elliptic curve point counting algorithm in characteristic three Trond Stølen Gustavsen, Kristian Ranestad
2004/014 (PDF ) Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions Sugata Gangopadhyay, Subhamoy Maitra
2004/013 (PDF ) Cryptanalysis of a Provably Secure Cryptographic Hash Function Jean-Sebastien Coron, Antoine Joux
2004/012 (PDF ) Pitfalls in public key cryptosystems based on free partially commutative monoids and groups Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2004/011 (PDF ) Known-Plaintext Attack Against a Permutation Based Video Adam J. Slagell
2004/010 (PDF ) Fast Pseudo-Hadamard Transforms Tom St Denis
2004/009 (PDF ) Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay, Philip MacKenzie, Ke Yang
2004/008 (PDF ) The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols Mihir Bellare, Adriana Palacio
2004/007 (PDF ) Traceable Signatures Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2004/006 (PDF ) Protocol Initialization for the Framework of Universal Composability Boaz Barak, Yehuda Lindell, Tal Rabin
2004/005 (PDF ) Universal Undeniable Signatures Huafei Zhu
2004/003 (PDF ) On the Role of the Inner State Size in Stream Ciphers Erik Zenner
2004/002 (PDF ) Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation Yuichi Komano, Kazuo Ohta
2003/265 (PDF ) Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications Yunlei ZHAO
2003/264 (PDF ) Inversion of Several Field Elements: A New Parallel Algorithm Pradeep Kumar Mishra, Palash Sarkar
2003/263 (PDF ) Security Analysis of Lal and Awasthi's Proxy Signature Schemes Manik Lal Das, Ashutosh Saxena, V P Gulati
2003/262 (PDF ) A Secure Modified ID-Based Undeniable Signature Scheme Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2003/261 (PDF ) A provably secure ID-based ring signature scheme Javier Herranz, Germán Sáez
2003/260 (PDF ) An Improved ID-based Authenticated Group Key Agreement Scheme Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/259 (PDF ) Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang, Xiaofeng Chen
2003/258 (PDF ) Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices. Marcin Rogawski
2003/257 (PDF ) Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
2003/255 (PDF ) Improved Constructions for Universal Re-encryption. Peter Fairbrother
2003/254 (PDF ) Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner, Amir Herzberg
2003/253 (PDF ) Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations Roberto Maria Avanzi
2003/252 (PDF ) On Simulation-Sound Trapdoor Commitments Philip MacKenzie, Ke Yang
2003/251 (PDF ) Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields EunKyung Jeong
2003/250 (PDF ) Breaking the Stream Cipher Whitenoise Hongjun Wu
2003/249 (PDF ) Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004) Stephen Boren, Andre Brisson
2003/248 (PDF ) Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n) Izuru Kitamura, Masanobu Katagi
2003/247 (PDF ) ID-based Authenticated Two Round Multi-Party Key Agreement Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/246 (PDF ) Quantum Digital Signature Based on Quantum One-way Functions Xin L¨¹, Deng-Guo Feng
2003/245 (PDF ) A Key Substitution Attack on SFLASH^{v3} Willi Geiselmann, Rainer Steinwandt
2003/244 (PDF ) Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le, Kaoru Kurosawa
2003/243 (PDF ) An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures Guilin Wang
2003/242 (PDF ) Improved Weil and Tate pairings for elliptic and hyperelliptic curves Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2003/241 (PDF ) Hybrid Broadcast Encryption and Security Analysis Shaoquan Jiang, Guang Gong
2003/240 (PDF ) How to Break and Repair a Universally Composable Signature Functionality Michael Backes, Dennis Hofheinz
2003/239 (PDF ) Universally Composable Signatures, Certification and Authentication Ran Canetti
2003/238 (PDF ) Chameleon Signature from Bilinear Pairing Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/237 (PDF ) Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity Benoit Chevallier-Mames, Mathieu Ciet, Marc Joye
2003/236 (PDF ) Combinational Logic Design for AES SubByte Transformation on Masked Data Elena Trichina
2003/235 (PDF ) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
2003/234 (PDF ) Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary Gene Itkis, Peng Xie
2003/233 (PDF ) Public Key Steganography Luis von Ahn, Nicholas J. Hopper
2003/232 (PDF ) The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm Chunming Tang, Zhuojun Liu, Jinwang Liu
2003/231 (PDF ) Public-Key Steganography with Active Attacks Michael Backes, Christian Cachin
2003/230 (PDF ) A Fast Provably Secure Cryptographic Hash Function Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
2003/229 (PDF ) Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
2003/228 (PDF ) Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu
2003/227 (PDF ) Attacks on a Secure Group Communication Scheme With Hierarchical Access Control Willi Geiselmann, Rainer Steinwandt
2003/226 (PDF ) On the Security of a Group Signature Scheme with Forward Security Guilin Wang
2003/225 (PDF ) Masking Based Domain Extenders for UOWHFs: Bounds and Constructions Palash Sarkar
2003/223 (PDF ) Cryptanalysis of a Cryptosystem based on Drinfeld modules Simon R. Blackburn, Carlos Cid, Steven D. Galbraith
2003/222 (PDF ) A Verifiable Secret Sharing Scheme with Statistical zero-knowledge Chunming Tang, Zhuojun Liu, Mingsheng Wang
2003/221 (PDF ) A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism Jung Hee Cheon, Hyun Soo Nam
2003/220 (PDF ) A short comment on the affine parts of SFLASH^{v3} Willi Geiselmann, Rainer Steinwandt
2003/219 (PDF ) Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron
2003/218 (PDF ) A Security Evaluation of Whitenoise David Wagner
2003/217 (PDF ) Chemical Combinatorial Attacks on Keyboards Eric Brier, David Naccache, Pascal Paillier
2003/216 (PDF ) Secure Indexes Eu-Jin Goh
2003/215 (PDF ) Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC Bo Yang, Ramesh Karri, David Mcgrew
2003/214 (PDF ) Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols Rosario Gennaro
2003/213 (PDF ) Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$ Y. Choie, E. Jeong
2003/212 (PDF ) High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two Jan Pelzl, Thomas Wollinger, Christof Paar
2003/211 (PDF ) SFLASHv3, a fast asymmetric signature scheme Nicolas T. Courtois, Louis Goubin, Jacques Patarin
2003/210 (PDF ) On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes Ventzislav Nikov, Svetla Nikova
2003/209 (PDF ) Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003 Daniel Augot, Matthieu Finiasz, Pierre Loidreau
2003/208 (PDF ) ID-Based Chameleon Hashes from Bilinear Pairings Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/207 (PDF ) Security Flaws in Several Group Signatures Proposed by Popescu Guilin Wang, Sihan Qing
2003/206 (PDF ) Identity Based Undeniable Signatures Benoît Libert, Jean-Jacques Quisquater
2003/205 (PDF ) Improved Cryptanalysis of SecurID Scott Contini, Yiqun Lisa Yin
2003/204 (PDF ) A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials ZENG Xiangyong, HU Lei
2003/203 (PDF ) Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
2003/202 (PDF ) Yet Another Sieving Device Willi Geiselmann, Rainer Steinwandt
2003/201 (PDF ) an attack on a multisignature scheme Zheng Dong, Kefei Chen
2003/200 (PDF ) Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature Zheng Dong, Shengli Liu, kefei Chen
2003/199 (PDF ) Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Simon R. Blackburn, Kenneth G. Paterson
2003/198 (PDF ) Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria Kishan Chand Gupta, Palash Sarkar
2003/197 (PDF ) Revisiting fully distributed proxy signature schemes Javier Herranz, German Saez
2003/196 (PDF ) Security Analysis of Some Proxy Signatures Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2003/195 (PDF ) Public Key Encryption with keyword Search Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
2003/194 (PDF ) Security Analysis of Several Group Signature Schemes Guilin Wang
2003/193 (PDF ) Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
2003/192 (PDF ) Universal Designated-Verifier Signatures Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
2003/191 (PDF ) Projective Coordinates Leak David Naccache, Nigel Smart, Jacques Stern
2003/189 (PDF ) Cryptanalysis of publicly verifiable authenticated encryption Zuhua Shao
2003/188 (PDF ) A New Forward Secure Signature Scheme using Bilinear Maps Fei Hu, Chwan-Hwa Wu, J. D. Irwin
2003/187 (PDF ) Resource Bounded Unprovability of Computational Lower Bounds Tatsuaki Okamoto, Ryo Kashima
2003/186 (PDF ) Safe Prime Generation with a Combined Sieve Michael J. Wiener
2003/185 (PDF ) VMPC Stream Cipher Bartosz Zoltak
2003/184 (PDF ) What do DES S-boxes Say to Each Other ? Nicolas T. Courtois, Guilhem Castagnos, Louis Goubin
2003/183 (PDF ) Certificate-Based Encryption and the Certificate Revocation Problem Craig Gentry
2003/182 (PDF ) Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti, Shai Halevi, Jonathan Katz
2003/181 (PDF ) On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2003/180 (PDF ) Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra, Palash Sarkar
2003/179 (PDF ) VMPC One-Way Function Bartosz Zoltak
2003/178 (PDF ) Constructing Optimistic Fair Exchange Protocols from Committed Signatures Huafei Zhu
2003/177 (PDF ) Building Secure Cryptographic Transforms, or How to Encrypt and MAC Tadayoshi Kohno, Adriana Palacio, John Black
2003/176 (PDF ) Patterson-Wiedemann Construction Revisited S. Gangopadhyay, P. H. Keskar, S. Maitra
2003/175 (PDF ) Double-Speed Safe Prime Generation David Naccache
2003/174 (PDF ) Relaxing Chosen-Ciphertext Security Ran Canetti, Hugo Krawczyk, Jesper Nielsen
2003/173 (PDF ) Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration Palash Sarkar
2003/172 (PDF ) NAEP: Provable Security in the Presence of Decryption Failures Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2003/171 (PDF ) Scalable Protocols for Authenticated Group Key Exchange Jonathan Katz, Moti Yung
2003/170 (PDF ) HARPS: HAshed Random Preloaded Subset Key Distribution Mahalingam Ramkumar, Nasir Memon
2003/169 (PDF ) Properties of the Transformation Semigroup of the Solitaire Stream Cipher Boris Pogorelov, Marina Pudovkina
2003/168 (PDF ) Robust discretization, with an application to graphical passwords Jean-Camille Birget, Dawei Hong, Nasir Memon
2003/167 (PDF ) Identity-based Chameleon Hash and Applications Giuseppe Ateniese, Breno de Medeiros
2003/166 (PDF ) A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves Igor Semaev
2003/165 (PDF ) Commitment Capacity of Discrete Memoryless Channels Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
2003/164 (PDF ) Identity-Based Threshold Decryption Joonsang Baek, Yuliang Zheng
2003/163 (PDF ) Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography Xavier Boyen
2003/162 (PDF ) Cryptanalysis of the Alleged SecurID Hash Function Alex Biryukov, Joseph Lano, Bart Preneel
2003/161 (PDF ) Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology Ueli Maurer, Renato Renner, Clemens Holenstein
2003/160 (PDF ) A More Secure and Efficacious TTS Signature Scheme Jiun-Ming Chen, Bo-Yin Yang
2003/159 (PDF ) An efficient variant of the RSA cryptosystem Cesar Alison Monteiro Paixão
2003/158 (PDF ) A Sufficient Condition and Optimal Domain Extension of UOWHF Mridul Nandi
2003/157 (PDF ) Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa, Tsuyoshi Takagi
2003/156 (PDF ) Efficient Provably Secure Public Key Steganography Tri Van Le
2003/155 (PDF ) A Formal Proof of Zhu's Signature Scheme huafei zhu
2003/154 (PDF ) ManTiCore: Encryption with Joint Cipher-State Authentication Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
2003/153 (PDF ) Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem Zhen-Feng ZHANG, Jing XU, Deng-Guo FENG
2003/152 (PDF ) Optimal Statistical Power Analysis Eric Brier, Christophe Clavier, Francis Olivier
2003/151 (PDF ) Secret sharing schemes on sparse homogeneous access structures with rank three Jaume Martí-Farré, Carles Padró
2003/150 (PDF ) On the random-oracle methodology as applied to length-restricted signature schemes Ran Canetti, Oded Goldreich, Shai Halevi
2003/148 (PDF ) A Tweakable Enciphering Mode Shai Halevi, Phillip Rogaway
2003/147 (PDF ) A Parallelizable Enciphering Mode Shai Halevi, Phillip Rogaway
2003/146 (PDF ) Breaking and Repairing Optimistic Fair Exchange from PODC 2003 Yevgeniy Dodis, Leonid Reyzin
2003/145 (PDF ) Symmetric Authentication Within a Simulatable Cryptographic Library Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/144 (PDF ) ID-based tripartite key agreement with signatures Divya Nalla
2003/143 (PDF ) Elliptic curves suitable for pairing based cryptography Friederike Brezing, Annegret Weng
2003/142 (PDF ) A New Tree based Domain Extension of UOWHF Mridul Nandi
2003/141 (PDF ) General Composition and Universal Composability in Secure Multiparty Computation Yehuda Lindell
2003/140 (PDF ) Trading-Off Type-Inference Memory Complexity Against Communication Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
2003/139 (PDF ) On the Randomness of the Editing Generator Enjian Bai, Guozhen Xiao
2003/138 (PDF ) Permutation graphs, fast forward permutations, and Boaz Tsaban
2003/137 (PDF ) Bernoulli numbers and the probability of a birthday surprise Boaz Tsaban
2003/136 (PDF ) Efficient linear feedback shift registers with maximal period Boaz Tsaban, Uzi Vishne
2003/135 (PDF ) Collision Attack on Reduced-Round Camellia Wen-Ling Wu, Deng-Guo Feng
2003/133 (PDF ) Minimum Distance between Bent and 1-resilient Boolean Functions Soumen Maity, Subhamoy Maitra
2003/132 (PDF ) Guaranteeing the diversity of number generators Adi Shamir, Boaz Tsaban
2003/131 (PDF ) Homomorphic public-key systems based on subgroup membership problems Kristian Gjøsteen
2003/130 (PDF ) On the Pseudorandomness of KASUMI Type Permutations Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
2003/129 (PDF ) Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/128 (PDF ) Weak Fields for ECC Alfred Menezes, Edlyn Teske, Annegret Weng
2003/127 (PDF ) Using Information Theory Approach to Randomness Testing B. Ya. Ryabko, V. A. Monarev
2003/126 (PDF ) Certificateless Public Key Cryptography Sattam S. Al-Riyami, Kenneth G. Paterson
2003/125 (PDF ) Algebraic Attacks on Combiners with Memory and Several Outputs Nicolas T. Courtois
2003/124 (PDF ) A General Correlation Theorem Kishan Chand Gupta, Palash Sarkar
2003/123 (PDF ) Assessing security of some group based cryptosystems Vladimir Shpilrain
2003/122 (PDF ) Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols Kyungah Shim
2003/121 (PDF ) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol Michael Backes, Birgit Pfitzmann
2003/120 (PDF ) Physically Observable Cryptography Silvio Micali, Leonid Reyzin
2003/119 (PDF ) How Secure Are FPGAs in Cryptographic Applications? Thomas Wollinger, Christof Paar
2003/118 (PDF ) Visual Crypto Displays Enabling Secure Communications Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
2003/117 (PDF ) An identity-based ring signature scheme from bilinear pairings Chih-Yin Lin, Tzong-Chen Wu
2003/116 (PDF ) A New ID-based Group Signature Scheme from Bilinear Pairings Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2003/115 (PDF ) Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols Kyungah Shim
2003/114 (PDF ) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions Michael Backes
2003/113 (PDF ) Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings Hung-Min Sun, Bin-Tsan Hsieh
2003/112 (PDF ) Accumulating Composites and Improved Group Signing Gene Tsudik, Shouhuai Xu
2003/110 (PDF ) Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key Yukio Itakura, Shigeo Tsujii
2003/109 (PDF ) Crytanalysis of SAFER++ Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
2003/108 (PDF ) Novel Cyclic and Algebraic Properties of AES Tri Van Le
2003/107 (PDF ) Fujisaki-Okamoto IND-CCA hybrid encryption revisited David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2003/106 (PDF ) CWC: A high-performance conventional authenticated encryption mode Tadayoshi Kohno, John Viega, Doug Whiting
2003/105 (PDF ) On Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa
2003/104 (PDF ) New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin
2003/103 (PDF ) Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols Zhongliang Chen
2003/102 (PDF ) Length-Based Attacks for Certain Group Based Encryption Rewriting Systems J. Hughes, A. Tannenbaum
2003/100 (PDF ) Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell
2003/099 (PDF ) Algorithms in Braid Groups Matthew J. Campagna
2003/098 (PDF ) Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klima, Tomas Rosa
2003/097 (PDF ) Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves Jan Pelzl, Thomas Wollinger, Christof Paar
2003/096 (PDF ) Secure Proxy Signature Schemes for Delegation of Signing Rights Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi
2003/095 (PDF ) Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack Yevgeniy Dodis, Nelly Fazio
2003/094 (PDF ) Trace Zero Subvariety for Cryptosystems Tanja Lange
2003/093 (PDF ) Simple Stateless Steganography Leonid Reyzin, Scott Russell
2003/092 (PDF ) Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol Muxiang Zhang
2003/091 (PDF ) Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2003/090 (PDF ) A Structured Multisignature Scheme from the Gap Diffie-Hellman Group Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang
2003/089 (PDF ) Efficient Public Key Generation for Multivariate Cryptosystems Christopher Wolf
2003/088 (PDF ) Elliptic Curve Point Multiplication A. G. Rostovtsev, E. B. Makhovenko
2003/087 (PDF ) A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack huafei zhu
2003/086 (PDF ) On the Selection of Pairing-Friendly Groups Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2003/085 (PDF ) A defect of the implementation schemes of the TTM cryptosystem Jintai Ding, Dieter Schmidt
2003/084 (PDF ) Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem Jintai Ding, Timonthy Hodges
2003/083 (PDF ) A Forward-Secure Public-Key Encryption Scheme Ran Canetti, Shai Halevi, Jonathan Katz
2003/082 (PDF ) Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata, Kaoru Kurosawa
2003/081 (PDF ) Primitive Specification for SOBER-128 Philip Hawkes, Greg Rose
2003/080 (PDF ) Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård, Jens Groth
2003/079 (PDF ) Fast arithmetic on Jacobians of Picard curves Stéphane Flon, Roger Oyono
2003/078 (PDF ) Relation among simulator-based and comparison-based definitions of semantic security Yodai Watanabe, Junji Shikata
2003/077 (PDF ) An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
2003/076 (PDF ) Goldbach’s Conjecture on ECDSA Protocols N. Vijayarangan, Nitin Agarwal, S. Kasilingam
2003/075 (PDF ) Almost Security of Cryptographic Boolean Functions Kaoru Kurosawa
2003/074 (PDF ) Divisible Voting Scheme Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
2003/073 (PDF ) A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures Sunder Lal, Amit K Awasthi
2003/072 (PDF ) Proxy Blind Signature Scheme Amit K Awasthi, Sunder Lal
2003/071 (PDF ) How to Protect Against a Militant Spammer Markus Jakobsson, John Linn, Joy Algesheimer
2003/070 (PDF ) A Critique of CCM P. Rogaway, D. Wagner
2003/069 (PDF ) EAX: A Conventional Authenticated-Encryption Mode M. Bellare, P. Rogaway, D. Wagner
2003/068 (PDF ) On the Security of Some Proxy Signature Schemes Hung-Min Sun, Bin-Tsan Hsieh
2003/067 (PDF ) Forking Lemmas in the Ring Signatures' Scenario Javier Herranz, Germán Sáez
2003/066 (PDF ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K. C. Reddy
2003/065 (PDF ) Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare, Tadayoshi Kohno
2003/064 (PDF ) On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod
2003/063 (PDF ) Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/062 (PDF ) Extending Joux's Protocol to Multi Party Key Agreement Rana Barua, Ratna Dutta, Palash Sarkar
2003/061 (PDF ) Hidden Polynomial Cryptosystems Ilia Toli
2003/060 (PDF ) Isomorphism Classes of Picard Curves over Finite Fields Jong Won Lee
2003/058 (PDF ) An Elliptic Curve Trapdoor System Edlyn Teske
2003/057 (PDF ) Secure Multiplication of Shared Secrets in the Exponent Mario Di Raimondo, Rosario Gennaro
2003/056 (PDF ) Computing of Trust in Distributed Networks Huafei Zhu, Bao Feng, Robert H. Deng
2003/055 (PDF ) A New Approach to Prevent Blackmailing in E-Cash Xiaofeng Chen, Fangguo Zhang, Yumin Wang
2003/054 (PDF ) ID based Cryptosystems with Pairing on Elliptic Curve Ryuichi SAKAI, Masao KASAHARA
2003/053 (PDF ) Tate-pairing implementations for tripartite key agreement Iwan Duursma, Hyang-Sook Lee
2003/052 (PDF ) Attacking RSA-based Sessions in SSL/TLS Vlastimil Klima, Ondrej Pokorny, Tomas Rosa
2003/051 (PDF ) How to Predict the Output of a Hardware Random Number Generator Markus Dichtl
2003/050 (PDF ) Concealment and its Applications to Authenticated Encryption Yevgeniy Dodis, Jee Hea An
2003/049 (PDF ) Hidden Number Problem in Small Subgroups Igor Shparlinski, Arne Winterhof
2003/048 (PDF ) Compounding Secret Sharing Schemes E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
2003/047 (PDF ) A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme Masao KASAHARA, Ryuichi SAKAI
2003/046 (PDF ) Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers Guilin Wang, Bo Zhu
2003/045 (PDF ) An algorithm to obtain an RSA modulus with a large private key L. Hernández Encinas, J. Muñoz Masqué, A. Queiruga Dios
2003/042 (PDF ) Timed Fair Exchange of Standard Signatures Juan A. Garay, Carl Pomerance
2003/041 (PDF ) A new statistical distinguisher for the shrinking generator Jovan Dj. Golic, Renato Menicocci
2003/040 (PDF ) Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function Kishan Chand Gupta, Palash Sarkar
2003/039 (PDF ) Torus-based cryptography Karl Rubin, Alice Silverberg
2003/038 (PDF ) Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions Kazukuni Kobara, Hideki Imai
2003/037 (PDF ) Strengthening Zero-Knowledge Protocols using Signatures Juan A. Garay, Philip MacKenzie, Ke Yang
2003/036 (PDF ) Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem Jean-Sebastien Coron
2003/035 (PDF ) On alternative approach for verifiable secret sharing Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
2003/034 (PDF ) On the (In)security of the Fiat-Shamir Paradigm Shafi Goldwasser, Yael Tauman
2003/033 (PDF ) Integral Cryptanalysis on reduced-round Safer++ Gilles Piret, Jean-Jacques Quisquater
2003/032 (PDF ) A Framework for Password-Based Authenticated Key Exchange Rosario Gennaro, Yehuda Lindell
2003/031 (PDF ) Cryptographic Tamper Evidence Gene Itkis
2003/030 (PDF ) Efficient Multi-Party Computation over Rings Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
2003/028 (PDF ) Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults Mathieu Ciet, Marc Joye
2003/027 (PDF ) Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, Helger Lipmaa
2003/026 (PDF ) Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update) Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar
2003/025 (PDF ) Homomorphic public-key cryptosystems and encrypting boolean circuits D. Grigoriev., I. Ponomarenko
2003/024 (PDF ) On Modeling IND-CCA Security in Cryptographic Protocols Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/023 (PDF ) New identity based signcryption schemes from pairings Benoît Libert, Jean-Jacques Quisquater
2003/022 (PDF ) Did Filiol Break AES ? Nicolas T. Courtois, Robert T. Johnson, Pascal Junod, Thomas Pornin, Michael Scott
2003/021 (PDF ) Interleaving Cryptography and Mechanism Design: The Case of Online Auctions Edith Elkind, Helger Lipmaa
2003/020 (PDF ) Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard Löhlein
2003/019 (PDF ) A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem Jung Hee Cheon, Byungheup Jun
2003/018 (PDF ) An Authenticated Group Key Agreement Protocol on Braid groups HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
2003/017 (PDF ) Perfect Hash Families with Few Functions Simon R. Blackburn
2003/016 (PDF ) A Threshold GQ Signature Scheme Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng
2003/015 (PDF ) A Universally Composable Cryptographic Library Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/014 (PDF ) Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation Palash Sarkar
2003/013 (PDF ) Security Constraints on the Oswald-Aigner Exponentiation Algorithm Colin D. Walter
2003/012 (PDF ) The number of initial states of the RC4 cipher with the same cycle structure Marina Pudovkina
2003/011 (PDF ) Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme Fangguo Zhang, Kwangjo Kim
2003/010 (PDF ) Differential Fault Analysis on A.E.S. O. Vivolo, P. Dusart, G. Letourneux
2003/009 (PDF ) Domain Extenders for UOWHF: A Finite Binary Tree Algorithm Palash Sarkar
2003/008 (PDF ) DFA on AES Christophe Giraud
2003/006 (PDF ) Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005 (PDF ) Distributing the Encryption and Decryption of a Block Cipher Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
2003/004 (PDF ) ID-based tripartite Authenticated Key Agreement Protocols from pairings Divya Nalla, K. C. Reddy
2003/003 (PDF ) Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case Eric FILIOL
2003/002 (PDF ) Imperfect Decryption and an Attack on the NTRU Encryption Scheme John Proos
2003/001 (PDF ) A Mode of Operation with Partial Encryption and Message Integrity Philip Hawkes, Gregory G. Rose
2002/195 (PDF ) An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen, P. Tuyls
2002/194 (PDF ) A polarisation based Visual Crypto System and its Secret Sharing Schemes P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen
2002/193 (PDF ) A Note on Ideal Tripartite Access Structures Michael J. Collins
2002/192 (PDF ) Security Proofs for an Efficient Password-Based Key Exchange Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2002/191 (PDF ) A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht
2002/190 (PDF ) Parallelizable Authentication Trees Eric Hall, Charanjit S. Jutla
2002/189 (PDF ) Bit-Slice Auction Circuit Kaoru Kurosawa, Wakaha Ogata
2002/188 (PDF ) Key recovery attacks on NTRU without ciphertext validation routine Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
2002/187 (PDF ) Entity Authentication Schemes Using Braid Word Reduction Hervé SIBERT, Patrick DEHORNOY, Marc GIRAULT
2002/186 (PDF ) Zero-Knowledge twenty years after its invention Oded Goldreich
2002/185 (PDF ) Turing, a fast stream cipher Greg Rose, Philip Hawkes
2002/184 (PDF ) Identity Based Authenticated Key Agreement Protocols from Pairings Liqun Chen, Caroline Kudla
2002/183 (PDF ) Simple backdoors to RSA key generation Claude Crépeau, Alain Slakmon
2002/182 (PDF ) Oblivious Keyword Search Wakaha Ogata, Kaoru Kurosawa
2002/181 (PDF ) Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
2002/180 (PDF ) OMAC: One-Key CBC MAC Tetsu Iwata, Kaoru Kurosawa
2002/179 (PDF ) Parallel Algorithm for Multiplication on Elliptic Curves Juan Manuel Garcia Garcia, Rolando Menchaca Garcia
2002/178 (PDF ) Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433) Fangguo Zhang, Shengli Liu, Kwangjo Kim
2002/177 (PDF ) two attacks on xia-you Group Signature Jianhong Zhang, Jilin Wang, Yumin Wang
2002/176 (PDF ) Theoretical Analysis of ``Correlations in RC6'' Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
2002/175 (PDF ) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
2002/174 (PDF ) A Designer's Guide to KEMs Alexander W. Dent
2002/173 (PDF ) Efficient Group Signatures without Trapdoors Giuseppe Ateniese, Breno de Medeiros
2002/172 (PDF ) PECDSA. How to build a DL-based digital signature scheme with the best proven security Louis Granboulan
2002/171 (PDF ) Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina
2002/170 (PDF ) An Analysis of RMAC Jack Lloyd
2002/169 (PDF ) Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel D. Page
2002/168 (PDF ) New Signature Scheme Using Conjugacy Problem Ki Hyoung Ko, Doo Ho Choi, Mi Sung Cho, Jang Won Lee
2002/167 (PDF ) Cryptanalysis of Two New Signature Schemes Fangguo Zhang, Kwangjo Kim
2002/166 (PDF ) Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms Ho-Kyu Lee, Hyang-Sook Lee, Young-Ran Lee
2002/165 (PDF ) Coercion-Resistant Electronic Elections Ari Juels, Dario Catalano, Markus Jakobsson
2002/164 (PDF ) Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number Mike Scott
2002/163 (PDF ) Man-in-the-Middle in Tunnelled Authentication Protocols N. Asokan, Valtteri Niemi, Kaisa Nyberg
2002/162 (PDF ) On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model Salil P. Vadhan
2002/161 (PDF ) Practical Verifiable Encryption and Decryption of Discrete Logarithms Jan Camenisch, Victor Shoup
2002/160 (PDF ) Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze
2002/159 (PDF ) Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno
2002/158 (PDF ) The Book of Rijndaels Elad Barkan, Eli Biham
2002/157 (PDF ) In How Many Ways Can You Write Rijndael? Elad Barkan, Eli Biham
2002/155 (PDF ) Secure Bilinear Diffie-Hellman Bits Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
2002/154 (PDF ) On multi-exponentiation in cryptography Roberto M. Avanzi
2002/153 (PDF ) Weighted Coordinates on Genus 2 Hyperelliptic Curves Tanja Lange
2002/152 (PDF ) A note on Weak Keys of PES, IDEA and some Extended Variants Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
2002/151 (PDF ) Selective disclosure credential sets Jason E. Holt, Kent E. Seamons
2002/150 (PDF ) Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes Guilin Wang, Jianying Zhou, Robert H. Deng
2002/149 (PDF ) About Filliol's Observations on DES, AES and Hash Functions (draft) Nicolas T. Courtois
2002/148 (PDF ) The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP) Phillip Rogaway
2002/147 (PDF ) Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves Tanja Lange
2002/146 (PDF ) Bauer-Berson-Feiertag attack revisited Jun-Bum Shin, Kwang H. Lee
2002/145 (PDF ) Cryptanalysis of MQV with partially known nonces P. J. Leadbitter, N. P. Smart
2002/144 (PDF ) On Some Algebraic Structures in the AES Round Function A. M. Youssef, S. E. Tavares
2002/143 (PDF ) An Attack on the Isomorphisms of Polynomials Problem with One Secret Willi Geiselmann, Willi Meier, Rainer Steinwandt
2002/142 (PDF ) On the Applicability of Distinguishing Attacks Against Stream Ciphers Greg Rose, Philip Hawkes
2002/141 (PDF ) Applying General Access Structure to Proactive Secret Sharing Schemes Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
2002/140 (PDF ) Universally Composable Two-Party and Multi-Party Secure Computation Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
2002/139 (PDF ) Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2002/138 (PDF ) On the Security of HFE, HFEv- and Quartz Nicolas T. Courtois, Magnus Daum, Patrick Felke
2002/137 (PDF ) Provably Secure Steganography Nicholas J. Hopper, John Langford, Luis von Ahn
2002/136 (PDF ) Practical Non-Interactive Key Distribution Based on Pairings Régis Dupont, Andreas Enge
2002/135 (PDF ) Folklore, Practice and Theory of Robust Combiners Amir Herzberg
2002/134 (PDF ) Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
2002/133 (PDF ) Efficient Construction of (Distributed) Verifiable Random Functions Yevgeniy Dodis
2002/132 (PDF ) Tight Lower Bound on Linear Authenticated Encryption Charanjit S. Jutla
2002/131 (PDF ) An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedic, Leonid Reyzin, Salil Vadhan
2002/130 (PDF ) OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives Kazukuni Kobara, Hideki Imai
2002/129 (PDF ) Key-collisions in (EC)DSA: Attacking Non-repudiation Tomas Rosa
2002/128 (PDF ) Perfectly Secure Message Transmission Revisited Yvo Desmedt, Yongge Wang
2002/127 (PDF ) Power of a Public Random Permutation and its Application to Authenticated-Encryption Kaoru Kurosawa
2002/126 (PDF ) Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference Ahmad-Reza Sadeghi, Michael Steiner
2002/125 (PDF ) The Jacobi Model of an Elliptic Curve and Side-Channel Analysis Olivier Billet, Marc Joye
2002/124 (PDF ) On Optimal Hash Tree Traversal for Interval Time-Stamping Helger Lipmaa
2002/123 (PDF ) New covering radius of Reed-Muller codes for $t$-resilient functions Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara
2002/122 (PDF ) ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings Fangguo Zhang, Shengli Liu, Kwangjo Kim
2002/121 (PDF ) Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae Tanja Lange
2002/120 (PDF ) Security Analysis of IKE's Signature-based Key-Exchange Protocol Ran Canetti, Hugo Krawczyk
2002/119 (PDF ) Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo Möller
2002/118 (PDF ) Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme Alexandra Boldyreva
2002/117 (PDF ) Diffie-Hellman Problems and Bilinear Maps Jung Hee Cheon, Dong Hoon Lee
2002/116 (PDF ) How to convert any ID-based Signature Schemes Claude Castelluccia
2002/115 (PDF ) Universal Padding Schemes for RSA Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
2002/114 (PDF ) Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three N. P. Smart, J. Westwood
2002/113 (PDF ) A Note on the Bilinear Diffie-Hellman Assumption Yacov Yacobi
2002/112 (PDF ) An Efficient Procedure to Double and Add Points on an Elliptic Curve Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2002/111 (PDF ) On Linear Redundancy in the AES S-Box Joanne Fuller, William Millan
2002/110 (PDF ) The GGM Construction does NOT yield Correlation Intractable Function Ensembles Oded Goldreich
2002/109 (PDF ) A New Class of Unsafe Primes Qi Cheng
2002/107 (PDF ) Efficient Arithmetic on Hyperelliptic Curves Tanja Lange
2002/106 (PDF ) Secret sharing schemes on access structures with intersection number equal to one Jaume Marti-Farre, Carles Padro
2002/105 (PDF ) An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 Jan Denef, Frederik Vercauteren
2002/104 (PDF ) Forward-Secure Signatures with Fast Key Update Anton Kozlov, Leonid Reyzin
2002/103 (PDF ) On the Power of Claw-Free Permutations Yevgeniy Dodis, Leonid Reyzin
2002/102 (PDF ) Applying General Access Structure to Metering Schemes Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
2002/101 (PDF ) An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property Simon R. Blackburn
2002/100 (PDF ) Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black, P. Rogaway, T. Shrimpton
2002/099 (PDF ) A New Statistical Testing for Symmetric Ciphers and Hash Functions Eric Filiol
2002/098 (PDF ) Identity-Based Signcryption John Malone-Lee
2002/096 (PDF ) Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank James Xiao, Yongxin Zhou
2002/094 (PDF ) Building curves with arbitrary small MOV degree over finite prime fields R. Dupont, A. Enge, F. Morain
2002/093 (PDF ) A Fuzzy Vault Scheme Ari Juels, Madhu Sudan
2002/092 (PDF ) TMAC: Two-Key CBC MAC Kaoru Kurosawa, Tetsu Iwata
2002/091 (PDF ) Multiplicative Masking and Power Analysis of AES Jovan Dj. Golić
2002/090 (PDF ) Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol Daniele Micciancio, Erez Petrank
2002/089 (PDF ) On Chosen Ciphertext Security of Multiple Encryptions Oded Goldreich, Yoad Lustig, Moni Naor
2002/088 (PDF ) Constructing Elliptic Curves with Prescribed Embedding Degrees Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2002/087 (PDF ) Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt Nicolas T. Courtois
2002/086 (PDF ) Adapting the weaknesses of the Random Oracle model to the Generic Group model. Alexander W. Dent
2002/085 (PDF ) Efficient and Player-Optimal Strong Consensus Matthias Fitzi, Juan A. Garay
2002/084 (PDF ) Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer Amir Herzberg
2002/083 (PDF ) A semantically secure elliptic curve RSA scheme with small expansion factor David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2002/082 (PDF ) Authentication of Quantum Messages Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp
2002/081 (PDF ) Some Applications of Threshold Signature Schemes to Distributed Protocols Vanesa Daza, Javier Herranz, Germán Sáez
2002/080 (PDF ) Applications of Multilinear Forms to Cryptography Dan Boneh, Alice Silverberg
2002/079 (PDF ) On the efficiency of the Clock Control Guessing Attack Erik Zenner
2002/078 (PDF ) Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
2002/077 (PDF ) Key-Insulated Public-Key Cryptosystems Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
2002/076 (PDF ) Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP Vlastimil Klima, Tomas Rosa
2002/075 (PDF ) Fault based cryptanalysis of the Advanced Encryption Standard J. Blöemer, J. -P. Seifert
2002/074 (PDF ) How to repair ESIGN Louis Granboulan
2002/073 (PDF ) Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, J. -P. Seifert
2002/072 (PDF ) Authenticated Identity-Based Encryption Ben Lynn
2002/071 (PDF ) Further Results and Considerations on Side Channel Attacks on RSA Vlastimil Klima, Tomas Rosa
2002/070 (PDF ) Weak Keys in MST1 Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
2002/069 (PDF ) A Distributed and Computationally Secure Key Distribution Scheme Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
2002/068 (PDF ) Improved key recovery of level 1 of the Bluetooth Encryption System Scott Fluhrer
2002/067 (PDF ) (Not So) Random Shuffles of RC4 Ilya Mironov
2002/066 (PDF ) Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV John Black, Phillip Rogaway, Thomas Shrimpton
2002/065 (PDF ) Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization Chanathip Namprempre
2002/064 (PDF ) Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold Mihir Bellare, Adriana Palacio
2002/063 (PDF ) On some Attacks on Multi-prime RSA M Jason Hinek, Mo King Low, Edlyn Teske
2002/062 (PDF ) ABC - A Block Cipher Dieter Schmidt
2002/061 (PDF ) Strengthened Encryption in the CBC Mode Vlastimil Klima, Tomas Rosa
2002/060 (PDF ) A Forward-Secure Public-Key Encryption Scheme Jonathan Katz
2002/059 (PDF ) Universally Composable Notions of Key Exchange and Secure Channels Ran Canetti, Hugo Krawczyk
2002/058 (PDF ) Construction of UOWHF: Tree Hashing Revisited Palash Sarkar
2002/057 (PDF ) A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions Yehuda Lindell
2002/056 (PDF ) Hierarchical ID-Based Cryptography Craig Gentry, Alice Silverberg
2002/055 (PDF ) Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity Manoj Prabhakaran, Amit Sahai
2002/054 (PDF ) SiBIR: Signer-Base Intrusion-Resilient Signatures Gene Itkis, Leonid Reyzin
2002/053 (PDF ) Extended Validity and Consistency in Byzantine Agreement Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
2002/052 (PDF ) A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order Stefan Lucks
2002/051 (PDF ) Fully Distributed Proxy Signature Schemes Javier Herranz, Germán Sáez
2002/050 (PDF ) Secret sharing schemes with three or four minimal qualified subsets Jaume Martí-Farré, Carles Padró
2002/049 (PDF ) Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties Alexander Kholosha, Henk C. A. van Tilborg
2002/048 (PDF ) Towards a Uniform Description of Several Group Based Cryptographic Primitives Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
2002/047 (PDF ) Universal Composition with Joint State Ran Canetti, Tal Rabin
2002/046 (PDF ) On the Security of Joint Signature and Encryption Jee Hea An, Yevgeniy Dodis, Tal Rabin
2002/045 (PDF ) Cryptanalysis of S-DES Dr. K. S. Ooi, Brain Chin Vito
2002/044 (PDF ) Cryptanalysis of Block Ciphers with Overdefined Systems of Equations Nicolas Courtois, Josef Pieprzyk
2002/043 (PDF ) Strict Polynomial-time in Simulation and Extraction Boaz Barak, Yehuda Lindell
2002/042 (PDF ) A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack Edith Elkind, Amit Sahai
2002/041 (PDF ) New Results on Boomerang and Rectangle Attack Eli Biham, Orr Dunkelman, Nathan Keller
2002/040 (PDF ) Secure Computation Without Agreement Shafi Goldwasser, Yehuda Lindell
2002/039 (PDF ) Partial Key Escrow Monitoring Scheme Jiang Shaoquan, Zhang Yufeng
2002/037 (PDF ) An efficient semantically secure elliptic curve cryptosystem based on KMOV David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2002/036 (PDF ) Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer, Serge Fehr
2002/035 (PDF ) Tripartite Authenticated Key Agreement Protocols from Pairings Sattam S. Al-Riyami, Kenneth G. Paterson
2002/034 (PDF ) An OAEP Variant With a Tight Security Proof Jakob Jonsson
2002/033 (PDF ) Equivalence between semantic security and indistinguishability against chosen ciphertext attacks Yodai Watanabe, Junji Shikata, Hideki Imai
2002/032 (PDF ) Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields Y. Choie, E. Jeong, E. Lee
2002/031 (PDF ) A Parallelizable Design Principle for Cryptographic Hash Functions Palash Sarkar, Paul J. Schellenberg
2002/030 (PDF ) Adaptive chi-square test and its application to some cryptographic problems. Boris Ryabko
2002/029 (PDF ) Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products Joy Algesheimer, Jan Camenisch, Victor Shoup
2002/028 (PDF ) A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack Jung Hee Cheon
2002/027 (PDF ) Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications Jonathan Katz
2002/026 (PDF ) Generic Groups, Collision Resistance, and ECDSA Daniel R. L. Brown
2002/025 (PDF ) Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking Markus Jakobsson, Ari Juels, Ron Rivest
2002/023 (PDF ) Almost Optimal Hash Sequence Traversal Don Coppersmith, Markus Jakobsson
2002/022 (PDF ) From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
2002/021 (PDF ) Spectral Analysis of Boolean Functions under Non-uniformity of Arguments Kanstantsin Miranovich
2002/020 (PDF ) Cryptanalysis of stream ciphers with linear masking Don Coppersmith, Shai Halevi, Charanjit Jutla
2002/019 (PDF ) Scream: a software-efficient stream cipher Shai Halevi, Don Coppersmith, Charanjit Jutla
2002/018 (PDF ) An Identity-Based Signature from Gap Diffie-Hellman Groups Jae Choon Cha, Jung Hee Cheon
2002/017 (PDF ) The Cramer-Shoup Strong-RSA Signature Scheme Revisited Marc Fischlin
2002/016 (PDF ) Content Extraction Signatures Ron Steinfeld, Laurence Bull, Yuliang Zheng
2002/015 (PDF ) Security proofs of cryptographic protocols Eva Jencusova
2002/014 (PDF ) Better than BiBa: Short One-time Signatures with Fast Signing and Verifying Leonid Reyzin, Natan Reyzin
2002/013 (PDF ) Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups Ivan Damgard, Maciej Koprowski
2002/012 (PDF ) Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings F. Hess
2002/011 (PDF ) Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
2002/010 (PDF ) Cut and Paste Attacks with Java Serge Lefranc, David Naccache
2002/009 (PDF ) Tree-based Group Key Agreement Yongdae Kim, Adrian Perrig, Gene Tsudik
2002/008 (PDF ) Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto, Hae Y. Kim, Ben Lynn, Michael Scott
2002/007 (PDF ) Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert
2002/006 (PDF ) The best and worst of supersingular abelian varieties in cryptology Karl Rubin, Alice Silverberg
2002/005 (PDF ) Cryptanalysis of Stream Cipher COS (2,128) Mode I Hongjun Wu, Feng Bao
2002/004 (PDF ) ID-based Signatures from Pairings on Elliptic Curves Kenneth G. Paterson
2002/003 (PDF ) Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
2002/002 (PDF ) Evaluating Security of Voting Schemes in the Universal Composability Framework Jens Groth
2002/001 (PDF ) Fractal Hash Sequence Representation and Traversal Markus Jakobsson
2001/113 (PDF ) Efficient Revocation of Anonymous Group Membership Jan Camenisch, Anna Lysyanskaya
2001/112 (PDF ) A Proposal for an ISO Standard for Public Key Encryption Victor Shoup
2001/111 (PDF ) An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing N. P. Smart
2001/110 (PDF ) RSA hybrid encryption schemes Louis Granboulan
2001/109 (PDF ) New Notions of Soundness and Simultaneous Resettability in the Public-Key Model Yunlei ZHAO
2001/108 (PDF ) Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer, Victor Shoup
2001/107 (PDF ) Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Yehuda Lindell
2001/106 (PDF ) Cryptanalysis of the COS (2,128) Stream Ciphers Steve Babbage
2001/105 (PDF ) Universal Arguments and their Applications Boaz Barak, Oded Goldreich
2001/104 (PDF ) Concurrent Zero-Knowledge With Timing, Revisited Oded Goldreich
2001/103 (PDF ) Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems Antonio Bellezza
2001/102 (PDF ) An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates Ivan Damgård, Gudmund Frandsen
2001/101 (PDF ) Quasi-Efficient Revocation of Group Signatures Giuseppe Ateniese, Dawn Song, Gene Tsudik
2001/100 (PDF ) A Note on Girault's Self-Certified Model Shahrokh Saeednia
2001/099 (PDF ) Linear Code Implies Public-Key Traitor Tracing Kaoru Kurosawa, Takuya Yoshida
2001/098 (PDF ) Fast hashing onto elliptic curves over fields of characteristic 3 Paulo S. L. M. Barreto, Hae Yong Kim
2001/097 (PDF ) An Efficient MAC for Short Messages Sarvar Patel
2001/096 (PDF ) Constructing elliptic curves with a given number of points over a finite field Amod Agashe, Kristin Lauter, Ramarathnam Venkatesan
2001/095 (PDF ) Secure Vickrey Auctions without Threshold Trust Helger Lipmaa, N. Asokan, Valtteri Niemi
2001/094 (PDF ) Slope packings and coverings, and generic algorithms for the discrete logarithm problem M. Chateauneuf, A. C. H. Ling, D. R. Stinson
2001/093 (PDF ) Threshold Cryptosystems Based on Factoring Jonathan Katz, Moti Yung
2001/092 (PDF ) BDD-based Cryptanalysis of Keystream Generators Matthias Krause
2001/091 (PDF ) Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor Ivan Damgård, Jesper B. Nielsen
2001/090 (PDF ) Identity Based Encryption From the Weil Pairing Dan Boneh, Matthew Franklin
2001/089 (PDF ) Linear broadcast encryption schemes Carles Padró, Ignacio Gracia, Sebastià Martín, Paz Morillo
2001/088 (PDF ) Improving the trade-off between storage and communication in broadcast encryption schemes Ignacio Gracia, Sebastià Martín, Carles Padró
2001/087 (PDF ) A Linear Algebraic Approach to Metering Schemes C. Blundo, S. Martìn, B. Masucci, C. Padrò
2001/086 (PDF ) Statistical Zero-Knowledge Proofs from Diophantine Equations Helger Lipmaa
2001/085 (PDF ) Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer, Victor Shoup
2001/084 (PDF ) Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree Markus Maurer, Alfred Menezes, Edlyn Teske
2001/083 (PDF ) On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices Maria Fedorova, Yuriy Tarannikov
2001/082 (PDF ) A Description of Protocols for Private Credentials Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic
2001/081 (PDF ) A Sufficient Condition for Secure Ping--Pong Protocols Masao Mori
2001/080 (PDF ) COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers Eric Filiol, Caroline Fontaine
2001/079 (PDF ) Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses Jee Hea An
2001/078 (PDF ) The COS Stream Ciphers are Extremely Weak Steve Babbage
2001/077 (PDF ) A Time-Memory Tradeoff Attack Against LILI-128 Markku-Juhani Olavi Saarinen
2001/076 (PDF ) Communication Complexity and Secure Function Evaluation Moni Naor, Kobbi Nissim
2001/075 (PDF ) Pseudo-Random Functions and Factoring Moni Naor, Omer Reingold, Alon Rosen
2001/074 (PDF ) On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction Eliane Jaulmes, Antoine Joux, Frederic Valette
2001/073 (PDF ) Efficient oblivious transfer schemes Wen-Guey Tzeng
2001/072 (PDF ) On the Goubin-Courtois Attack on TTM T. Moh, Jiun-Ming Chen
2001/071 (PDF ) Multi-Recipient Public-Key Encryption with Shortened Ciphertext Kaoru Kurosawa
2001/070 (PDF ) Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract) Kenji Ohkuma, Hideo Shimizu, Fumihiko Sano, Shinichi Kawamura
2001/069 (PDF ) On the (Im)possibility of Obfuscating Programs Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang
2001/068 (PDF ) SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers J. Nakahara Jr, P. S. L. M. Barreto, B. Preneel, J. Vandewalle, H. Y. Kim
2001/067 (PDF ) An Attack on A Traitor Tracing Scheme Jeff Jianxin Yan, Yongdong Wu
2001/066 (PDF ) IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS SEONG-HUN PAENG, DAESUNG KWON, KIL-CHAN HA, JAE HEON KIM
2001/065 (PDF ) Analysis of chosen plaintext attacks on the WAKE Stream Cipher Marina Pudovkina
2001/064 (PDF ) An Integer Commitment Scheme based on Groups with Hidden Order Ivan Damgard, Eiichiro Fujisaki
2001/063 (PDF ) Resettably-Sound Zero-Knowledge and its Applications Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell
2001/062 (PDF ) Optimal security proofs for PSS and other signature schemes Jean-Sébastien Coron
2001/061 (PDF ) Clock-Controlled Shift Registers for Key-Stream Generation Alexander Kholosha
2001/060 (PDF ) The Security of Practical Two-Party RSA Signature Schemes Mihir Bellare, Ravi Sandhu
2001/059 (PDF ) Revocation and Tracing Schemes for Stateless Receivers Dalit Naor, Moni Naor, Jeff Lotspiech
2001/058 (PDF ) Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank Nicolas T. Courtois
2001/057 (PDF ) On the Security of the SPEKE Password-Authenticated Key Exchange Protocol Philip MacKenzie
2001/056 (PDF ) On the Complexity of Matsui's Attack P. Junod
2001/055 (PDF ) Universally Composable Commitments Ran Canetti, Marc Fischlin
2001/054 (PDF ) Extending the GHS Weil Descent Attack S. D. Galbraith, F. Hess, N. P. Smart
2001/053 (PDF ) Security Proofs for the RSA-PSS Signature Scheme and Its Variants Jakob Jonsson
2001/052 (PDF ) Differential Probability of Modular Addition with a Constant Operand Alexis Warner Machado
2001/051 (PDF ) Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
2001/050 (PDF ) Elliptic curve Paillier schemes Steven D Galbraith
2001/049 (PDF ) A known plaintext attack on the ISAAC keystream generator Marina Pudovkina
2001/048 (PDF ) Forward-Secure Signatures with Optimal Signing and Verifying Gene Itkis, Leonid Reyzin
2001/047 (PDF ) ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM T. MOH
2001/046 (PDF ) The simple ideal cipher system Boris Ryabko
2001/045 (PDF ) The order of encryption and authentication for protecting communications (Or: how secure is SSL?) Hugo Krawczyk
2001/044 (PDF ) Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds Birgit Baum-Waidner
2001/043 (PDF ) Cryptanalysis of the Vesta-2M Stream Cipher Marina Pudovkina
2001/042 (PDF ) Simple Forward-Secure Signatures From Any Signature Scheme Hugo Krawczyk
2001/041 (PDF ) Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent Michael Jacobson, Alfred Menezes, Andreas Stein
2001/040 (PDF ) Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels Ran Canetti, Hugo Krawczyk
2001/039 (PDF ) Robust Software Tokens: Towards Securing a Digital Identity Taekyoung Kwon
2001/038 (PDF ) Flaws in differential cryptanalysis of Skipjack Louis Granboulan
2001/037 (PDF ) EMpowering Side-Channel Attacks Josyula R. Rao, Pankaj Rohatgi
2001/036 (PDF ) Anti-persistence: History Independent Data Structures Moni Naor, Vanessa Teague
2001/035 (PDF ) Forward-Security in Private-Key Cryptography Mihir Bellare, Bennet Yee
2001/034 (PDF ) Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures Tal Malkin, Daniele Micciancio, Sara Miner
2001/033 (PDF ) Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs Liam Keliher, Henk Meijer, Stafford Tavares
2001/032 (PDF ) Efficient and Non-Interactive Non-Malleable Commitment Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith
2001/031 (PDF ) Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords Jonathan Katz, Rafail Ostrovsky, Moti Yung
2001/030 (PDF ) On the Power of Nonlinear Secret-Sharing Amos Beimel, Yuval Ishai
2001/029 (PDF ) On multivariate signature-only public key cryptosystems Nicolas T. Courtois
2001/028 (PDF ) Efficient Encryption for Rich Message Spaces Under General Assumptions Alexander Russell, Hong Wang
2001/027 (PDF ) A Block-Cipher Mode of Operation for Parallelizable Message Authentication John Black, Phillip Rogaway
2001/026 (PDF ) OCB Mode Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
2001/024 (PDF ) Secure Multiparty Computation of Approximations Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
2001/023 (PDF ) Robustness for Free in Unconditional Multi-Party Computation Martin Hirt, Ueli Maurer
2001/022 (PDF ) Optimistic Asynchronous Atomic Broadcast Klaus Kursawe, Victor Shoup
2001/021 (PDF ) The Rectangle Attack - Rectangling the Serpent Biham Eli, Orr Dunkelman, Nathan Keller
2001/020 (PDF ) Some observations on the theory of cryptographic hash functions D. R. Stinson
2001/019 (PDF ) An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation Jan Camenisch, Anna Lysyanskaya
2001/018 (PDF ) Analysis of a Subset Sum Randomizer Peter Gemmell, Anna Johnston
2001/017 (PDF ) On adaptive vs. non-adaptive security of multiparty protocols Ran Canetti, Ivan Damgard, Stefan Dziembowski, Yuval Ishai, Tal Malkin
2001/016 (PDF ) Efficient Traitor Tracing Algorithms using List Decoding Alice Silverberg, Jessica Staddon, Judy Walker
2001/015 (PDF ) An observation regarding Jutla's modes of operation Shai Halevi
2001/014 (PDF ) Timed-Release Cryptography Wenbo Mao
2001/013 (PDF ) Digitally Watermarking RSA Moduli Anna M. Johnston
2001/012 (PDF ) Ciphers with Arbitrary Finite Domains John Black, Phillip Rogaway
2001/011 (PDF ) New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation Wenbo Mao
2001/010 (PDF ) How to achieve a McEliece-based Digital Signature Scheme Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
2001/009 (PDF ) Robust key-evolving public key encryption schemes Wen-Guey Tzeng, Zhi-Jia Tzeng
2001/008 (PDF ) Fully Distributed Threshold RSA under Standard Assumptions Pierre-Alain Fouque, Jacques Stern
2001/007 (PDF ) Are 'Strong' Primes Needed for RSA Ron Rivest, Robert Silverman
2001/006 (PDF ) Secure and Efficient Asynchronous Broadcast Protocols Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup
2001/005 (PDF ) A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme Ilya Mironov
2001/003 (PDF ) Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups Antoine Joux, Kim Nguyen
2001/002 (PDF ) The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme M. Bellare, C. Namprempre, D. Pointcheval, M. Semanko
2001/001 (PDF ) Efficient Algorithms for Computing Differential Properties of Addition Helger Lipmaa, Shiho Moriai
2000/069 (PDF ) New constructions of resilient Boolean functions with maximal nonlinearity Yuriy Tarannikov
2000/068 (PDF ) A Content Certified E-mail Protocol with a Public Mailbox Tak-Ming Law
2000/067 (PDF ) Universally Composable Security: A New Paradigm for Cryptographic Protocols Ran Canetti
2000/066 (PDF ) A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission Birgit Pfitzmann, Michael Waidner
2000/065 (PDF ) How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes Masashi Mitomo, Kaoru Kurosawa
2000/064 (PDF ) On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators Oded Goldreich, Vered Rosen
2000/063 (PDF ) Candidate One-Way Functions Based on Expander Graphs Oded Goldreich
2000/061 (PDF ) RSA-OAEP is Secure under the RSA Assumption Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
2000/060 (PDF ) OAEP Reconsidered Victor Shoup
2000/059 (PDF ) Essential Shannon Security with Keys Smaller Than the Encrypted Message Gideon Samid
2000/058 (PDF ) Graph-Based Authentication of Digital Streams Sara Miner, Jessica Staddon
2000/057 (PDF ) Session-Key Generation using Human Passwords Only Oded Goldreich, Yehuda Lindell
2000/056 (PDF ) A Complete Problem for Statistical Zero Knowledge Amit Sahai, Salil Vadhan
2000/055 (PDF ) Multiparty Computation from Threshold Homomorphic Encryption Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen
2000/054 (PDF ) Correlation Immune Boolean Functions with Very High Nonlinearity Subhamoy Maitra
2000/053 (PDF ) A Construction of Resilient Functions with High Nonlinearity Thomas Johansson, Enes Pasalic
2000/052 (PDF ) CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic, Amparo Fúster-Sabater
2000/051 (PDF ) Reducing the Gate Count of Bitslice DES Matthew Kwan
2000/050 (PDF ) Spectral Analysis of High Order Correlation Immune Functions Yuriy Tarannikov, Denis Kirienko
2000/049 (PDF ) Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions Palash Sarkar
2000/048 (PDF ) New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar
2000/047 (PDF ) Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property Subhamoy Maitra
2000/046 (PDF ) The Saturation Attack - a Bait for Twofish Stefan Lucks
2000/045 (PDF ) Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions Ronald Cramer, Ivan Damgård, Philip MacKenzie
2000/044 (PDF ) Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman Victor Boyko, Philip MacKenzie, Sarvar Patel
2000/043 (PDF ) Constructions and Bounds for Unconditionally Secure Commitment Schemes C. Blundo, B. Masucci, D. R. Stinson, R. Wei
2000/042 (PDF ) Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor, Omer Reingold
2000/041 (PDF ) On Symmetrically Private Information Retrieval Sanjeev Kumar Mishra
2000/040 (PDF ) Decimation Attack of Stream Ciphers Eric FILIOL
2000/039 (PDF ) Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla
2000/038 (PDF ) On the Complexity of Verifiable Secret Sharing and Multi-Party Computation Ronald Cramer, Ivan Damgård, Stefan Dziembowski
2000/037 (PDF ) General Secure Multi-Party Computation from any Linear Secret Sharing Scheme Ronald Cramer, Ivan Damgård, Ueli Maurer
2000/036 (PDF ) Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation Jean-Pierre Seifert
2000/035 (PDF ) Electronic Jury Voting Protocols Alejandro Hevia, Marcos Kiwi
2000/034 (PDF ) Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography Christian Cachin, Klaus Kursawe, Victor Shoup
2000/033 (PDF ) The Complete Distribution of Linear Probabilities of MARS' s-box Kazumaro Aoki
2000/032 (PDF ) Anonymous Fingerprinting with Direct Non-Repudiation Birgit Pfitzmann, Ahmad-Reza Sadeghi
2000/031 (PDF ) Forward Security in Threshold Signature Schemes Michel Abdalla, Sara Miner, Chanathip Namprempre
2000/029 (PDF ) Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications Anand Desai, Sara Miner
2000/028 (PDF ) An Information-Theoretic Model for Steganography Christian Cachin
2000/027 (PDF ) Accountable Certificate Management using Undeniable Attestations Ahto Buldas, Peeter Laud, Helger Lipmaa
2000/026 (PDF ) Authentication and Key Agreement via Memorable Password Taekyoung Kwon
2000/025 (PDF ) Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm Mihir Bellare, Chanathip Namprempre
2000/024 (PDF ) Security of the Most Significant Bits of the Shamir Message Passing Scheme Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
2000/023 (PDF ) Security of Polynomial Transformations of the Diffie--Hellman Key Igor Shparlinski
2000/022 (PDF ) ACE: The Advanced Cryptographic Engine Thomas Schweinberger, Victor Shoup
2000/021 (PDF ) An Efficient Identification Scheme Based on Permuted Patterns Shahrokh Saeednia
2000/020 (PDF ) On the Security of Diffie--Hellman Bits Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
2000/019 (PDF ) Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently Anna Lysyanskaya
2000/017 (PDF ) Lower Bounds on the Efficiency of Generic Cryptographic Constructions Rosario Gennaro, Luca Trevisan
2000/015 (PDF ) Identification Protocols Secure Against Reset Attacks Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
2000/014 (PDF ) Authenticated Key Exchange Secure Against Dictionary Attacks Mihir Bellare, David Pointcheval, Phillip Rogaway
2000/013 (PDF ) Concurrent Zero-Knowledge in Poly-logarithmic Rounds Joe Kilian, Erez Petrank
2000/011 (PDF ) Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext Gideon Samid
2000/010 (PDF ) The Security of Chaffing and Winnowing Mihir Bellare, Alexandra Boldyreva
2000/009 (PDF ) New Directions in Design of Resilient Boolean Functions Palash Sarkar, Subhamoy Maitra
2000/008 (PDF ) Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes Ivan Damgård, Mads Jurik
2000/007 (PDF ) Public Electronic Contract Protocol Tak-Ming Law
2000/006 (PDF ) An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure Tak-Ming Law
2000/005 (PDF ) On Resilient Boolean Functions with Maximal Possible Nonlinearity Yuriy Tarannikov
2000/004 (PDF ) Combinatorial Properties of Frameproof and Traceability Codes J. N. Staddon, D. R. Stinson, R. Wei
2000/002 (PDF ) A New Forward-Secure Digital Signature Scheme Michel Abdalla, Leonid Reyzin
2000/001 (PDF ) On Security Preserving Reductions -- Revised Terminology Oded Goldreich
[ Cryptology ePrint archive ]