Cryptology ePrint Archive: Listing for 2005
Regex
2005/469 (PDF ) A lower bound on the higher order nonlinearity of algebraic immune functions C. Carlet
2005/468 (PDF ) Blind Attacks on Engineering Samples Vanessa Gratzer, David Naccache
2005/467 (PDF ) A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version) Ricardo Corin, Jerry den Hartog
2005/466 (PDF ) Cryptanalysis of the Yang -Wang's password authentication schemes Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee
2005/465 (PDF ) A sequence approach to constructing perfect hash families S. G. Barwick, W. -A. Jackson
2005/464 (PDF ) Equivalent Keys in Multivariate Quadratic Public Key Systems Christopher Wolf, Bart Preneel
2005/463 (PDF ) More short signatures without random oracles Victor K. Wei, Tsz Hon Yuen
2005/462 (PDF ) A Simplified Quadratic Frobenius Primality Test Martin Seysen
2005/461 (PDF ) Parallel and Concurrent Security of the HB and HB+ Protocols Jonathan Katz, Ji Sun Shin
2005/460 (PDF ) One-Time HNP or Attacks on a Flawed El Gamal Revisited Tomas Rosa
2005/459 (PDF ) A Practical Attack on the Root Problem in Braid Groups Anja Groch, Dennis Hofheinz, Rainer Steinwandt
2005/458 (PDF ) Seifert's RSA Fault Attack: Simplified Analysis and Generalizations James A. Muir
2005/457 (PDF ) Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu
2005/456 (PDF ) A Secure Scheme for Authenticated Encryption Fuw-Yi Yang
2005/455 (PDF ) Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, Duncan S. Wong
2005/454 (PDF ) Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
2005/453 (PDF ) Further Constructions of Almost Resilient Functions Pinhui Ke, Jie Zhang, Qiaoyan Wen
2005/452 (PDF ) Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol Ran Canetti, Ling Cheung, Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
2005/451 (PDF ) Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou, Yalin Chen, Ming-De Yang
2005/450 (PDF ) Improvement of Manik et al.¡¦s remote user authentication scheme Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
2005/449 (PDF ) On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count Longjiang Qu, Guozhu Feng, Chao Li
2005/448 (PDF ) On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version) Souradyuti Paul, Bart Preneel
2005/447 (PDF ) A new key exchange protocol based on the decomposition problem Vladimir Shpilrain, Alexander Ushakov
2005/446 (PDF ) Democratic Group Signatures on Example of Joint Ventures Mark Manulis
2005/445 (PDF ) An Anonymous Authentication Scheme for Trusted Computing Platform HE GE
2005/444 (PDF ) Privacy-Preserving Polling using Playing Cards Sid Stamm, Markus Jakobsson
2005/443 (PDF ) Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei
2005/442 (PDF ) One-Time Signatures Revisited: Have They Become Practical? Dalit Naor, Amir Shenhav, Avishai Wool
2005/441 (PDF ) Tight bound between nonlinearity and algebraic immunity Mikhail Lobanov
2005/439 (PDF ) A note on the n-spendable extension of Ferguson's single-term off-line coins T. C. Lam
2005/438 (PDF ) Minimal Assumptions for Efficient Mercurial Commitments Yevgeniy Dodis
2005/436 (PDF ) A Note on the Kasami Power Function Doreen Hertel
2005/435 (PDF ) Concurrent Blind Signatures without Random Oracles Aggelos Kiayias, Hong-Sheng Zhou
2005/434 (PDF ) Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown
2005/433 (PDF ) Proxy Re-Signatures: New Definitions, Algorithms, and Applications Giuseppe Ateniese, Susan Hohenberger
2005/432 (PDF ) On the Security of Kaweichel Dieter Schmidt
2005/431 (PDF ) Is it possible to have CBE from CL-PKE? Bo Gyeong Kang, Je Hong Park
2005/430 (PDF ) F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei
2005/429 (PDF ) Signature from a New Subgroup Assumption Victor K. Wei
2005/428 (PDF ) Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
2005/427 (PDF ) Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu, Duncan S. Wong
2005/426 (PDF ) On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng
2005/425 (PDF ) Improved Collision Attack on Hash Function MD5 Jie Liang, Xuejia Lai
2005/424 (PDF ) Efficient Mutual Data Authentication Using Manually Authenticated Strings Sven Laur, N. Asokan, Kaisa Nyberg
2005/422 (PDF ) On Anonymity of Group Signatures Zhou Sujing, Lin Dongdai
2005/421 (PDF ) Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles Michael Backes, Birgit Pfitzmann, Andre Scedrov
2005/420 (PDF ) Efficient Scalar Multiplication by Isogeny Decompositions Christophe Doche, Thomas Icart, David R. Kohel
2005/419 (PDF ) Unified Point Addition Formulæ and Side-Channel Attacks Douglas Stebila, Nicolas Thériault
2005/418 (PDF ) Generic On-Line/Off-Line Threshold Signatures Chris Crutchfield, David Molnar, David Turner, David Wagner
2005/417 (PDF ) Correlation-Resistant Storage via Keyword-Searchable Encryption Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose
2005/416 (PDF ) Cryptography in Theory and Practice: The Case of Encryption in IPsec Kenneth G. Paterson, Arnold K. L. Yau
2005/412 (PDF ) Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles Tsz Hon Yuen, Victor K. Wei
2005/411 (PDF ) More Compact E-Cash with Efficient Coin Tracing Victor K. Wei
2005/410 (PDF ) Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows Victor K. Wei
2005/408 (PDF ) Compartmented Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene
2005/407 (PDF ) Anonymous Signature Schemes Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
2005/406 (PDF ) Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited Dominique Unruh
2005/405 (PDF ) Building Better Signcryption Schemes with Tag-KEMs Tor E. Bjørstad, Alexander W. Dent
2005/404 (PDF ) Preventing Attacks on Machine Readable Travel Documents (MRTDs) Gaurav S. Kc, Paul A. Karger
2005/403 (PDF ) Collisions in the Original Version of a Chaotic Hash Function Scott Contini
2005/402 (PDF ) Some Analysis of Radix-r Representations Dong-Guk Han, Tsuyoshi Takagi
2005/401 (PDF ) A Computationally Sound Mechanized Prover for Security Protocols Bruno Blanchet
2005/400 (PDF ) Improved Collision Attack on MD5 Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta
2005/399 (PDF ) On affine rank of spectrum support for plateaued function Yuriy Tarannikov
2005/397 (PDF ) Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms Neil Kauer, Tony Suarez, Yuliang Zheng
2005/396 (PDF ) Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/395 (PDF ) Secure Group Key Establishment Revisited Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/394 (PDF ) How to Shuffle in Public Ben Adida, Douglas Wikström
2005/393 (PDF ) Multivariate Quadratic Polynomials in Public Key Cryptography Christopher Wolf
2005/392 (PDF ) An Efficient Variant of RSA Cryptosystem Sahadeo Padhye
2005/391 (PDF ) Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto
2005/390 (PDF ) 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function Praveen Gauravaram, William Millan, Juanma Gonzalez Nieto, Edward Dawson
2005/389 (PDF ) How to Generate Universally Verifiable Signatures in Ad-Hoc Networks KyungKeun Lee, JoongHyo Oh, SangJae Moon
2005/388 (PDF ) Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing YongBin Zhou, DengGuo Feng
2005/387 (PDF ) On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version) C. Carlet
2005/386 (PDF ) A New Short Signature Scheme Without Random Oracles from Bilinear Pairings Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
2005/385 (PDF ) Practical Group Signatures without Random Oracles Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros
2005/384 (PDF ) Some Explicit Formulae of NAF and its Left-to-Right Analogue Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi
2005/383 (PDF ) Key Mixing in Block Ciphers through Addition modulo $2^n$ Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2005/382 (PDF ) One-Wayness Equivalent to General Factoring Kaoru Kurosawa, Tsuyoshi Takagi
2005/381 (PDF ) Compact Group Signatures Without Random Oracles Xavier Boyen, Brent Waters
2005/380 (PDF ) Breaking RSA May Be As Difficult As Factoring Daniel R. L. Brown
2005/379 (PDF ) Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs Jonathan Katz, Yehuda Lindell
2005/378 (PDF ) A New Protocol for Conditional Disclosure of Secrets And Its Applications Sven Laur, Helger Lipmaa
2005/377 (PDF ) Exclusion-Intersection Encryption Sherman S. M. Chow, Siu-Ming Yiu
2005/376 (PDF ) Representing small identically self-dual matroids by self-dual codes Carles Padro, Ignacio Gracia
2005/375 (PDF ) Truncated differential cryptanalysis of five rounds of Salsa20 Paul Crowley
2005/374 (PDF ) Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7 Kunpeng Wang, Bao Li
2005/373 (PDF ) Efficient Broadcast Encryption Scheme with Log-Key Storage Yong Ho Hwang, Pil Joong Lee
2005/372 (PDF ) Secret color images sharing schemes based on XOR operation Dao-Shun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang
2005/371 (PDF ) On a Traitor Tracing Scheme from ACISP 2003 Dongvu Tonien
2005/370 (PDF ) Resource Fairness and Composability of Cryptographic Protocols Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
2005/369 (PDF ) Secure and {\sl Practical} Identity-Based Encryption David Naccache
2005/368 (PDF ) The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks David Molnar, Matt Piotrowski, David Schultz, David Wagner
2005/367 (PDF ) Searchable Keyword-Based Encryption Dong Jin Park, Juyoung Cha, Pil Joong Lee
2005/366 (PDF ) Efficient Compilers for Authenticated Group Key Exchange Qiang Tang, Chris J. Mitchell
2005/365 (PDF ) Derandomization in Cryptography Boaz Barak, Shien Jin Ong, Salil Vadhan
2005/364 (PDF ) Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs Amitabh Saxena
2005/363 (PDF ) Elliptic Curves with Low Embedding Degree Florian Luca, Igor E. Shparlinski
2005/362 (PDF ) On a (Flawed) Proposal to Build More Pairing-Friendly Curves Michael Scott, Paulo S. L. M. Barreto
2005/361 (PDF ) Strict Avalanche Criterion Over Finite Fields Yuan Li, T. W. Cusick
2005/360 (PDF ) Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security Jens Matthias-Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2005/359 (PDF ) An infinite class of quadratic APN functions which are not equivalent to power mappings L. Budaghyan, C. Carlet, P. Felke, G. Leander
2005/358 (PDF ) Normal Basis Multiplication Algorithms for GF(2n) (Full Version) Haining Fan, Duo Liu, Yiqi Dai
2005/357 (PDF ) Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings Kyung-Ah Shim
2005/356 (PDF ) Exponential Memory-Bound Functions for Proof of Work Protocols Fabien Coelho
2005/355 (PDF ) ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks Rongxing Lu, Zhenfu Cao
2005/354 (PDF ) Pairing-Based Two-Party Authenticated Key Agreement Protocol Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao
2005/353 (PDF ) On the Security of A Group Signature Scheme Jianhong Zhang, Wei Zou
2005/352 (PDF ) Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations Danilo Gligoroski
2005/351 (PDF ) Errors in Computational Complexity Proofs for Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/350 (PDF ) Is SHA-1 conceptually sound? Charanjit S. Jutla, Anindya C. Patthak
2005/349 (PDF ) Oblivious Transfer and Linear Functions Ivan B. Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
2005/346 (PDF ) Batch Verification of Validity of Bids in Homomorphic E-auction Kun Peng, Colin Boyd, Ed Dawson
2005/345 (PDF ) Group Signatures with Efficient Concurrent Join Aggelos Kiayias, Moti Yung
2005/344 (PDF ) Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems. Tapan Rai
2005/343 (PDF ) Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings Amitabh Saxena, Serguey Priymak, Ben Soh
2005/342 (PDF ) Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems Pu Duan, Shi Cui, Choong Wah Chan
2005/341 (PDF ) A Universally Composable Scheme for Electronic Cash Marten Trolin
2005/339 (PDF ) Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
2005/338 (PDF ) An Improved Power Analysis Attack Against Camellia's Key Schedule Lu Xiao, Howard M. Heys
2005/337 (PDF ) Statistical Multiparty Computation Based on Random Walks on Graphs Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/336 (PDF ) Pairing-based identification schemes David Freeman
2005/335 (PDF ) One-Way Signature Chaining - A New Paradigm For Group Cryptosystems Amitabh Saxena, Ben Soh
2005/334 (PDF ) Secure Key-Updating for Lazy Revocation Michael Backes, Christian Cachin, Alina Oprea
2005/333 (PDF ) Universally Composable Disk Encryption Schemes Ivan Damgård, Kasper Dupont
2005/332 (PDF ) Classification of Cubic $(n-4)$-resilient Boolean Functions An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2005/331 (PDF ) A Fuzzy Sketch with Trapdoor Julien Bringer, Hervé Chabanne, Quoc Dung Do
2005/330 (PDF ) A Dedicated Processor for the eta Pairing Robert Ronan, Colm O hEigeartaigh, Colin Murphy, Michael Scott, Tim Kerins, W. P. Marnane
2005/329 (PDF ) Cryptographic Protocols to Prevent Spam Amir Herzberg
2005/328 (PDF ) On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions Jonathan Katz, Chiu-Yuen Koo
2005/327 (PDF ) On the Security of Encryption Modes of MD4, MD5 and HAVAL Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
2005/326 (PDF ) A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2005/325 (PDF ) An Effective Method to Implement Group Signature with Revocation HE GE
2005/324 (PDF ) Extracting bits from coordinates of a point of an elliptic curve Nicolas Gürel
2005/323 (PDF ) The Weil pairing on elliptic curves over C Steven D. Galbraith
2005/322 (PDF ) Evolutionary Design of Trace Form Bent Functions Min yang, Qingshu Meng, Huanguo Zhang
2005/321 (PDF ) Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES) Liam Keliher, Jiayuan Sui
2005/320 (PDF ) Efficient Identity-Based Encryption with Tight Security Reduction Nuttapong Attrapadung, Benoit Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
2005/319 (PDF ) ID-based Restrictive Partially Blind Signatures and Applications Xiaofeng Chen, Fangguo Zhang, Shengli Liu
2005/318 (PDF ) Bounds on Birthday Attack Times Michael J. Wiener
2005/317 (PDF ) Ring Signatures without Random Oracles Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen
2005/316 (PDF ) Collision Attack on XTR and a Countermeasure with a Fixed Pattern Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung
2005/315 (PDF ) A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags David Molnar, Andrea Soppera, David Wagner
2005/314 (PDF ) Fast genus 2 arithmetic based on Theta functions P. Gaudry
2005/313 (PDF ) Deterministic Identity-Based Signatures for Partial Aggregation Javier Herranz
2005/312 (PDF ) A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations Xijin Tang, Yong Feng
2005/311 (PDF ) What do S-boxes Say in Differential Side Channel Attacks? Cecile Canovas, Jessy Clediere
2005/310 (PDF ) Meta Ring Signature Hiroyuki OKAZAKI, Ryuichi SAKAI, Masao KASAHARA
2005/309 (PDF ) A New Efficient ID-Based Authenticated Key Agreement Protocol Quan Yuan, Songping Li
2005/308 (PDF ) Adaptable Group-Oriented Signature Chunbo Ma, Jun Ao, Dake He
2005/307 (PDF ) The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited K. Bentahar
2005/306 (PDF ) Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes--- Yasuyuki MURAKAMI, Masao KASAHARA
2005/305 (PDF ) Steganography with Imperfect Samplers Anna Lysyanskaya, Maria Meyerovich
2005/304 (PDF ) Ring Signatures: Stronger Definitions, and Constructions without Random Oracles Adam Bender, Jonathan Katz, Ruggero Morselli
2005/303 (PDF ) Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage Kevin Fu, Seny Kamara, Tadayoshi Kohno
2005/302 (PDF ) Elliptic Curves for Pairing Applications Angela Murphy, Noel Fitzpatrick
2005/301 (PDF ) On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos
2005/300 (PDF ) Towards Security Two-part Authenticated Key Agreement Protocols Songping Li, Quan Yuan, Jin Li
2005/299 (PDF ) Nonlinearity of the Round Function Marcin Kontak, Janusz Szmidt
2005/298 (PDF ) Keeping Denial-of-Service Attackers in the Dark Gal Badishi, Amir Herzberg, Idit Keidar
2005/297 (PDF ) DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining Maithili Narasimha, Gene Tsudik
2005/296 (PDF ) A Key Establishment IP-Core for Ubiquitous Computing Markus Volkmer, Sebastian Wallner
2005/295 (PDF ) Hidden Exponent RSA and Efficient Key Distribution HE GE
2005/294 (PDF ) On Fairness in Simulatability-based Cryptographic Systems Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
2005/293 (PDF ) Speeding Up Pairing Computation Colm O hEigeartaigh
2005/292 (PDF ) Improved Integral Cryptanalysis of FOX Block Cipher Wu Wenling, Zhang Wentao, Feng Dengguo
2005/291 (PDF ) Cryptography In the Bounded Quantum-Storage Model Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner
2005/290 (PDF ) Perfect Non-Interactive Zero Knowledge for NP Jens Groth, Rafail Ostrovsky, Amit Sahai
2005/289 (PDF ) Overview of Key Agreement Protocols Ratna Dutta, Rana Barua
2005/288 (PDF ) Direct Chosen Ciphertext Security from Identity-Based Techniques Xavier Boyen, Qixiang Mei, Brent Waters
2005/287 (PDF ) Provable Efficient Certificateless Public Key Encryption Yijuan Shi, Jianhua Li
2005/286 (PDF ) Concurrent Zero Knowledge without Complexity Assumptions Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
2005/285 (PDF ) Generalizations of RSA public key cryptosystems Li Banghe
2005/284 (PDF ) Foundations and Applications for Secure Triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
2005/283 (PDF ) Revisiting Oblivious Signature-Based Envelopes Samad Nasserian, Gene Tsudik
2005/282 (PDF ) Spreading Alerts Quietly and the Subgroup Escape Problem James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
2005/281 (PDF ) Herding Hash Functions and the Nostradamus Attack John Kelsey, Tadayoshi Kohno
2005/280 (PDF ) Partitioned Cache Architecture as a Side-Channel Defence Mechanism D. Page
2005/279 (PDF ) Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model Bao Li, Hongda Li, Guangwu Xu, Haixia Xu
2005/278 (PDF ) A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications Katja Schmidt-Samoa
2005/277 (PDF ) Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions Fumiyuki Momose, Jinhui Chao
2005/276 (PDF ) Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations Jung Hee Cheon, Dong Hoon Lee
2005/275 (PDF ) Explicit Construction of Secure Frameproof Codes Dongvu Tonien, Reihaneh Safavi-Naini
2005/274 (PDF ) Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte
2005/273 (PDF ) CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III P G Vaidya, Sajini Anand
2005/272 (PDF ) An Authentication Protocol For Mobile Agents Using Bilinear Pairings Amitabh Saxena, Ben Soh
2005/271 (PDF ) Cache attacks and Countermeasures: the Case of AES Dag Arne Osvik, Adi Shamir, Eran Tromer
2005/270 (PDF ) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/269 (PDF ) Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing Junghyun Nam, Seungjoo Kim, Dongho Won
2005/268 (PDF ) Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI Shujun Li, Heung-Yeung Shum
2005/267 (PDF ) Stream Cipher Design based on Jumping Finite State Machines Cees J. A. Jansen
2005/266 (PDF ) A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code Charanjit S. Jutla, Anindya C. Patthak
2005/265 (PDF ) Security Analysis of KEA Authenticated Key Exchange Protocol Kristin Lauter, Anton Mityagin
2005/264 (PDF ) On an authentication scheme based on the Root Problem in the braid group Boaz Tsaban
2005/263 (PDF ) Wang's sufficient conditions of MD5 are not sufficient Jun Yajima, Takeshi Shimoyama
2005/262 (PDF ) Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator Ivan Damgård, Yuval Ishai
2005/261 (PDF ) The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model Alexander W. Dent
2005/260 (PDF ) Powered Tate Pairing Computation Bo Gyeong Kang, Je Hong Park
2005/259 (PDF ) Efficient Delegation of Pairing Computation Bo Gyeong Kang, Moon Sung Lee, Je Hong Park
2005/258 (PDF ) Relations Among Notions of Security for Identity Based Encryption Schemes Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang
2005/257 (PDF ) TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY Jin Hong, Woo-Hwan Kim
2005/256 (PDF ) Fuzzy Universal Hashing and Approximate Authentication Reihaneh Safavi-Naini, Dongvu Tonien
2005/255 (PDF ) Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding, Jason E. Gower
2005/254 (PDF ) Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
2005/253 (PDF ) Security Notions for Identity Based Encryption David Galindo, Ichiro Hasuo
2005/252 (PDF ) Faster Pairings using an Elliptic Curve with an Efficient Endomorphism Michael Scott
2005/251 (PDF ) Feistel Schemes and Bi-Linear Cryptanalysis Nicolas Courtois
2005/250 (PDF ) The topology of covert conflict Shishir Nagaraja, Ross Anderson
2005/248 (PDF ) Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing Michael Szydlo, Yiqun Lisa Yin
2005/247 (PDF ) A Simple and Provably Good Code for SHA Message Expansion Charanjit S. Jutla, Anindya C. Patthak
2005/246 (PDF ) A Verifiable Secret Shuffle of Homomorphic Encryptions Jens Groth
2005/245 (PDF ) On the Algebraic Immunity of Symmetric Boolean Functions An Braeken, Bart Preneel
2005/244 (PDF ) Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1 Boaz Tsaban
2005/243 (PDF ) Cryptanalysis of Sfinks Nicolas T. Courtois
2005/242 (PDF ) Private Searching On Streaming Data Rafail Ostrovsky, William E. Skeith III
2005/241 (PDF ) On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities Hao Chen, Liqing Xu
2005/240 (PDF ) Attack on Okamoto et al.'s New Short Signature Schemes Fangguo Zhang, Xiaofeng Chen
2005/239 (PDF ) A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
2005/237 (PDF ) An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol Henri Gilbert, Matt Robshaw, Herve Sibert
2005/236 (PDF ) Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves Pu Duan, Shi Cui, Choong Wah Chan
2005/235 (PDF ) Tree Parity Machine Rekeying Architectures for Embedded Security Markus Volkmer, Sebastian Wallner
2005/234 (PDF ) LILI-II is not Broken William Millan, Ed Dawson
2005/233 (PDF ) On the Entropy of Arcfour Keys Luke O'Connor
2005/232 (PDF ) Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines Markus Volkmer, Sebastian Wallner
2005/231 (PDF ) Fast generators for the Diffie-Hellman key agreement protocol and malicious standards Boaz Tsaban
2005/229 (PDF ) Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
2005/228 (PDF ) Efficient Doubling on Genus 3 Curves over Binary Fields Xinxin Fan, Thomas Wollinger, Yumin Wang
2005/227 (PDF ) Threshold Ring Signatures Efficient for Large Sets of Signers K. Maneva-Jakimoska, G. Jakimoski, M. Burmester
2005/226 (PDF ) Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme Liqun Chen, Zhaohui Cheng
2005/225 (PDF ) Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2005/224 (PDF ) An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction L. Chen, Z. Cheng, J. Malone-Lee, N. P. Smart
2005/223 (PDF ) Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups Ayan Mahalanobis
2005/222 (PDF ) Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis Min Feng, Bin B. Zhu, Maozhi Xu, Shipeng Li
2005/221 (PDF ) Constant Round Dynamic Group Key Agreement Ratna Dutta, Rana Barua
2005/220 (PDF ) Limits of the Cryptographic Realization of Dolev-Yao-style XOR Michael Backes, Birgit Pfitzmann
2005/219 (PDF ) Cryptanalysis of a 32-bit RC4-like Stream Cipher Hongjun Wu
2005/218 (PDF ) The conjugacy problem and related problems in lattice-ordered groups W. Charles Holland, Boaz Tsaban
2005/217 (PDF ) Efficient Identity-Based Key Encapsulation to Multiple Parties M. Barbosa, P. Farshim
2005/216 (PDF ) A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret Hassan Jameel, Sungyoung Lee
2005/215 (PDF ) Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes Jason E. Holt
2005/214 (PDF ) TMTO With Multiple Data: Analysis and New Single Table Trade-offs Sourav Mukhopadhyay, Palash Sarkar
2005/212 (PDF ) Probability distributions of Correlation and Differentials in Block Ciphers Joan Daemen, Vincent Rijmen
2005/211 (PDF ) Games and the Impossibility of Realizable Ideal Functionality Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
2005/210 (PDF ) The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function John Black
2005/209 (PDF ) Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols Jin Wook Byun, Dong Hoon Lee
2005/207 (PDF ) Some Thoughts on Time-Memory-Data Tradeoffs Alex Biryukov
2005/206 (PDF ) On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
2005/205 (PDF ) Another look at HMQV Alfred Menezes
2005/204 (PDF ) An Algebraic Masking Method to Protect AES Against Power Attacks Nicolas Courtois, Louis Goubin
2005/203 (PDF ) On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions Nicolas Courtois, Blandine Debraize, Eric Garrido
2005/202 (PDF ) The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES Nicolas Courtois
2005/201 (PDF ) On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants Zhaohui Cheng, Liqun Chen
2005/200 (PDF ) Block ciphers sensitive to Groebner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann
2005/198 (PDF ) Universally Composable Time-Stamping Schemes with Audit Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
2005/197 (PDF ) Weaknesses in two group Diffie-Hellman key exchange protocols Qiang Tang, Liqun Chen
2005/196 (PDF ) Universally Composable Password-Based Key Exchange Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip MacKenzie
2005/195 (PDF ) Twin RSA Arjen K. Lenstra, Benjamin M. M. de Weger
2005/194 (PDF ) Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu
2005/193 (PDF ) VSH, an Efficient and Provable Collision Resistant Hash Function Scott Contini, Arjen K. Lenstra, Ron Steinfeld
2005/192 (PDF ) On the security and the efficiency of the Merkle signature scheme Carlos Coronado
2005/191 (PDF ) Public Key Encryption with Keyword Search Revisited Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005/190 (PDF ) Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA" SeongHan Shin, Kazukuni Kobara, Hideki Imai
2005/189 (PDF ) A Weak-Randomizer Attack on RSA-OAEP with e = 3 Daniel R. L. Brown
2005/188 (PDF ) Group Signature where Group Manager, Members and Open Authority are Identity-Based Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
2005/187 (PDF ) How To Exchange Secrets with Oblivious Transfer Michael O. Rabin
2005/185 (PDF ) Security properties of two provably secure conference key agreement protocols Qiang Tang, Chris J. Mitchell
2005/184 (PDF ) Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families Dongvu Tonien, Reihaneh Safavi-Naini
2005/183 (PDF ) PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications Thierry Moreau
2005/182 (PDF ) Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol Chih-I Wang, Chun-I Fan, D. J. Guan
2005/181 (PDF ) A plausible approach to computer-aided cryptographic proofs Shai Halevi
2005/180 (PDF ) A Note on Secure Key Issuing in ID-based Cryptography XU Chunxiang, ZHOU Junhui, QIN Zhiguang
2005/179 (PDF ) Intrusion-Resilience via the Bounded-Storage Model Stefan Dziembowski
2005/178 (PDF ) Analyzing Unlinkability of Some Group Signatures Zhou Sujing, Lin Dongdai
2005/177 (PDF ) Secret sharing on the $d$-dimensional cube Laszlo Csirmaz
2005/176 (PDF ) HMQV: A High-Performance Secure Diffie-Hellman Protocol Hugo Krawczyk
2005/175 (PDF ) A 32-bit RC4-like Keystream Generator Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2005/174 (PDF ) On the Automatic Construction of Indistinguishable Operations Manuel Barbosa, Dan Page
2005/173 (PDF ) Weaknesses in a leakage-resilient authenticated key transport protocol Qiang Tang, Chris J. Mitchell
2005/171 (PDF ) Towards computationally sound symbolic analysis of key exchange protocols Prateek Gupta, Vitaly Shmatikov
2005/170 (PDF ) Unclonable Group Identification Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
2005/169 (PDF ) Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control Shai Halevi, Paul A. Karger, Dalit Naor
2005/168 (PDF ) Dynamic k-Times Anonymous Authentication Lan Nguyen, Rei Safavi-Naini
2005/166 (PDF ) Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems Eunjeong Lee, Yoonjin Lee
2005/165 (PDF ) CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito
2005/164 (PDF ) A Distinguish attack on COSvd Ciphers Mohammad Ali Orumiehchi ha, Dr. R. Mirghadri
2005/163 (PDF ) Modeling Insider Attacks on Group Key-Exchange Protocols Jonathan Katz, Ji Sun Shin
2005/162 (PDF ) A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem Lan Nguyen, Rei Safavi-Naini, Kaoru Kurosawa
2005/161 (PDF ) Multiple forgery attacks against Message Authentication Codes David A. McGrew, Scott R. Fluhrer
2005/160 (PDF ) First Steps Toward a Cryptography-Aware Language and Compiler M. Barbosa, R. Noad, D. Page, N. P. Smart
2005/159 (PDF ) On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola
2005/158 (PDF ) Geometric Cryptosystem Arkady Berenstein, Leon Chernyak
2005/157 (PDF ) FOX Algorithm Implementation: a hardware design approach Colm O'Keeffe, Emanuel Popovici
2005/156 (PDF ) On the security of some password-based key agreement schemes Qiang Tang, Chris J. Mitchell
2005/155 (PDF ) Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays Eli Biham, Jennifer Seberry
2005/154 (PDF ) Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol Marius C. Silaghi, Gerhard Friedrich
2005/153 (PDF ) On Security of Koyama Schemes Sahadeo Padhye
2005/152 (PDF ) On High-Rate Cryptographic Compression Functions Richard Ostertag, Martin Stanek
2005/151 (PDF ) Improved Collision Attack on MD4 Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
2005/150 (PDF ) Secure Delegation of Elliptic-Curve Pairing Benoit Chevallier-Mames, Jean-Sebastien Coron, Noel McCullagh, David Naccache, Michael Scott
2005/149 (PDF ) Conditionally Verifiable Signatures Aldar C-F. Chan, Ian F. Blake
2005/148 (PDF ) On Universal Composable Security of Time-Stamping Protocols Toshihiko Matsuo, Shin'ichiro Matsuo
2005/147 (PDF ) Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl Choi, Philippe Golle, Markus Jakobsson
2005/146 (PDF ) A High Speed Architecture for Galois/Counter Mode of Operation (GCM) Bo Yang, Sambit Mishra, Ramesh Karri
2005/145 (PDF ) Small Secure Sketch for Point-Set Difference Ee-Chien Chang, Qiming Li
2005/144 (PDF ) Kaweichel, an Extension of Blowfish for 64-Bit Architectures Dieter Schmidt
2005/143 (PDF ) Multiparty Computation Based on Connectivity of Graphs Liangliang Xiao, Mulan Liu, Zhifang Zhang
2005/142 (PDF ) Broadcast Encryption with Random Key Pre-distribution Schemes Mahalingam Ramkumar
2005/141 (PDF ) Enhanced password-based key establishment protocol Qiang Tang, Chris J. Mitchell
2005/140 (PDF ) How to Split a Shared Secret into Shared Bits in Constant-Round Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft
2005/139 (PDF ) Scaling security in pairing-based protocols Michael Scott
2005/138 (PDF ) I-HARPS: An Efficient Key Pre-distribution Scheme Mahalingam Ramkumar
2005/137 (PDF ) A Sender Verifiable Mix-Net and a New Proof of a Shuffle Douglas Wikström
2005/136 (PDF ) Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption Jung Hee Cheon, Nam-su Jho, Myung-Hwan Kim, Eun Sun Yoo
2005/135 (PDF ) Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model Jacques Patarin, Paul Camion
2005/134 (PDF ) Broadcast Authentication With Hashed Random Preloaded Subsets Mahalingam Ramkumar
2005/133 (PDF ) Pairing-Friendly Elliptic Curves of Prime Order Paulo S. L. M. Barreto, Michael Naehrig
2005/132 (PDF ) Formal Notions of Anonymity for Peer-to-peer Networks Jiejun Kong
2005/131 (PDF ) Dynamic Group Key Agreement in Tree-Based Setting Ratna Dutta, Rana Barua
2005/129 (PDF ) On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu
2005/127 (PDF ) Browser Model for Security Analysis of Browser-Based Protocols Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
2005/126 (PDF ) On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator Shahram Khazaei, Mahmood Salmasizadeh, Javad Mohajeri
2005/125 (PDF ) SPA Resistant Left-to-Right Integer Recodings Nicolas Thériault
2005/124 (PDF ) Append-Only Signatures Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan
2005/123 (PDF ) Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation Lan Nguyen
2005/122 (PDF ) Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004 Xinyi Huang, Willy Susilo, Yi Mu
2005/121 (PDF ) Pass-thoughts: Authenticating With Our Minds Julie Thorpe, P. C. van Oorschot, Anil Somayaji
2005/120 (PDF ) On Designatedly Verified (Non-interactive) Watermarking Schemes Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamato
2005/119 (PDF ) Index Calculus in Class Groups of Plane Curves of Small Degree Claus Diem
2005/118 (PDF ) Results on Rotation Symmetric Bent Functions Deepak Kumar Dalai, Subhamoy Maitra
2005/117 (PDF ) Boneh-Franklin Identity Based Encryption Revisited David Galindo
2005/116 (PDF ) On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems Nigel Smart, Frederik Vercauteren
2005/115 (PDF ) Characteristics of Key-Dependent S-Boxes: the Case of Twofish Marco Macchetti
2005/114 (PDF ) Intrusion-Resilient Secure Channels Gene Itkis, Robert McNerney Jr., Scott W. Russell
2005/113 (PDF ) Partially Fixed Point Multiplication Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava
2005/112 (PDF ) On the relationship between squared pairings and plain pairings Bo Gyeong Kang, Je Hong Park
2005/111 (PDF ) Weak Composite Diffie-Hellman is not Weaker than Factoring Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh
2005/110 (PDF ) Diffie-Hellman key exchange protocol and non-abelian nilpotent groups. Ayan Mahalanobis
2005/109 (PDF ) A Public Key Cryptosystem Based on Singular Cubic Curve Sahadeo Padhye
2005/108 (PDF ) Efficient Identity-Based and Authenticated Key Agreement Protocol Yongge Wang
2005/107 (PDF ) A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher Ophir Levy, Avishai Wool
2005/106 (PDF ) How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation Boaz Barak, Amit Sahai
2005/105 (PDF ) On Error Correction in the Exponent Chris Peikert
2005/104 (PDF ) On estimating the lattice security of NTRU Nick Howgrave-Graham, Jeff Hoffstein, Jill Pipher, William Whyte
2005/103 (PDF ) Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 Fangguo Zhang, Xiaofeng Chen
2005/102 (PDF ) Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications Vlastimil Klima
2005/101 (PDF ) Soundness and Completeness of Formal Logics of Symmetric Encryption Gergei Bana
2005/100 (PDF ) almost enumeration of 8-variable bent functions Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang
2005/099 (PDF ) Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
2005/098 (PDF ) Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme Yassine Lakhnech, Laurent Mazare
2005/097 (PDF ) Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation Yassine Lakhnech, Laurent Mazare
2005/096 (PDF ) Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$ David Jedlicka
2005/095 (PDF ) Security and Privacy Issues in E-passports Ari Juels, David Molnar, David Wagner
2005/094 (PDF ) A Survey on ID-Based Cryptographic Primitives M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena
2005/093 (PDF ) An ID-Based Key Agreement Scheme from pairing Guohong Xie
2005/092 (PDF ) PRF Domain Extension Using DAGs Charanjit Jutla
2005/091 (PDF ) Distributed Phishing Attacks Markus Jakobsson, Adam Young
2005/090 (PDF ) Rediscovery of Time Memory Tradeoffs Jin Hong, Palash Sarkar
2005/089 (PDF ) Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions Hans Dobbertin, Gregor Leander
2005/088 (PDF ) The MAC function Pelican 2.0 Joan Daemen, Vincent Rijmen
2005/087 (PDF ) AES side channel attack protection using random isomorphisms A. G. Rostovtsev, O. V. Shemyakina
2005/086 (PDF ) Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) Henry Ng
2005/084 (PDF ) On Resistance of DES to Related-Key Differential Cryptanalysis Goce Jakimoski, Yvo Desmedt
2005/083 (PDF ) Security notions for disk encryption Kristian Gjøsteen
2005/082 (PDF ) Some properties of an FSE 2005 Hash Proposal Lars R. Knudsen
2005/080 (PDF ) A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan
2005/079 (PDF ) Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism Marius C Silaghi
2005/078 (PDF ) Duality between Multiplication and Modular Reduction Wieland Fischer, Jean-Pierre Seifert
2005/077 (PDF ) Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations Christopher Wolf, Bart Preneel
2005/076 (PDF ) Pairing-Based Cryptography at High Security Levels Neal Koblitz, Alfred Menezes
2005/075 (PDF ) Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klima
2005/074 (PDF ) Computationally sound implementations of equational theories against passive adversaries Mathieu Baudet, Vëronique Cortier, Steve Kremer
2005/073 (PDF ) BROADCAST ENCRYPTION $\pi$ Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo
2005/072 (PDF ) Practical Lattice Basis Sampling Reduction Johannes Buchmann, Christoph Ludwig
2005/070 (PDF ) On public-key cryptosystems based on combinatorial group theory Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka
2005/069 (PDF ) Fast Elliptic Curve Point Multiplication using Double-Base Chains V. S. Dimitrov, L. Imbert, P. K. Mishra
2005/068 (PDF ) N-adic Summation-Shrinking Generator. Basic properties and empirical evidences. Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov
2005/067 (PDF ) Colliding X.509 Certificates Arjen Lenstra, Xiaoyun Wang, Benne de Weger
2005/066 (PDF ) Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation Eike Kiltz
2005/065 (PDF ) Efficient hardware for the Tate pairing calculation in characteristic three T. Kerins, W. P. Marnane, E. M. Popovici, P. S. L. M. Barreto
2005/064 (PDF ) On Efficient Key Agreement Protocols Anish Mathuria, Vipul Jain
2005/061 (PDF ) Key Derivation and Randomness Extraction Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
2005/060 (PDF ) Compact E-Cash Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
2005/059 (PDF ) Secret sharing schemes on graphs Laszlo Csirmaz
2005/058 (PDF ) Generic Constructions of Identity-Based and Certificateless KEMs K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
2005/057 (PDF ) Tight Reductions among Strong Diffie-Hellman Assumptions Victor K. Wei
2005/056 (PDF ) Deniable Authentication with RSA and Multicasting Daniel R. L. Brown
2005/055 (PDF ) Untraceability of Two Group Signature Schemes Zhengjun Cao
2005/053 (PDF ) An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun, Mu-En Wu
2005/052 (PDF ) Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems Ziv Kfir, Avishai Wool
2005/051 (PDF ) A Note on Shor's Quantum Algorithm for Prime Factorization Zhengjun Cao
2005/050 (PDF ) David Chaum's Voter Verification using Encrypted Paper Receipts Poorvi L. Vora
2005/049 (PDF ) Adversarial Model for Radio Frequency Identification Gildas Avoine
2005/048 (PDF ) Cryptanalysis of two identification schemes based on an ID-based cryptosystem Qiang Tang, Chris J. Mitchell
2005/047 (PDF ) Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme Qiang Tang, Chris J. Mitchell
2005/046 (PDF ) New Approaches for Deniable Authentication Mario Di Raimondo, Rosario Gennaro
2005/045 (PDF ) Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
2005/044 (PDF ) On the affine classification of cubic bent functions Sergey Agievich
2005/043 (PDF ) An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption Hsiao-Ying Lin, Wen-Guey Tzeng
2005/042 (PDF ) Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications O. A. Logachev, A. A. Salnikov, V. V. Yaschenko
2005/041 (PDF ) On the Security of a Group Signature Scheme with Strong Separability Lihua Liu, Zhengjun Cao
2005/040 (PDF ) Unfairness of a protocol for certified delivery Juan M. Estevez-Tapiador, Almudena Alcaide
2005/039 (PDF ) Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen, Gilles Van Assche
2005/037 (PDF ) Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes Claude Castelluccia, Einar Mykletun, Gene Tsudik
2005/036 (PDF ) Concurrent Composition of Secure Protocols in the Timing Model Yael Kalai, Yehuda Lindell, Manoj Prabhakaran
2005/035 (PDF ) An Efficient CDH-based Signature Scheme With a Tight Security Reduction Benoit Chevallier-Mames
2005/034 (PDF ) Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication) Gene Tsudik, Shouhuai Xu
2005/033 (PDF ) An Attack on CFB Mode Encryption As Used By OpenPGP Serge Mister, Robert Zuccherato
2005/032 (PDF ) On the Notion of Statistical Security in Simulatability Definitions Dennis Hofheinz, Dominique Unruh
2005/031 (PDF ) The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves Iwan Duursma, Negar Kiyavash
2005/030 (PDF ) Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves. A. A. Kalele, V. R. Sule
2005/029 (PDF ) A model and architecture for pseudo-random generation with applications to /dev/random Boaz Barak, Shai Halevi
2005/028 (PDF ) Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
2005/027 (PDF ) Tag-KEM/DEM: A New Framework for Hybrid Encryption Masayuki ABE, Rosario Gennaro, Kaoru Kurosawa
2005/026 (PDF ) Techniques for random maskin in hardware Jovan Dj. Golic
2005/025 (PDF ) Analysis of Affinely Equivalent Boolean Functions Meng Qing-shu, Yang min, Zhang Huan-guo, Liu Yu-zhen
2005/024 (PDF ) Weak keys of the Diffe Hellman key exchange I A. A. Kalele, V. R. Sule
2005/023 (PDF ) A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness Masao Kasahara
2005/022 (PDF ) An Improved and Efficient Countermeasure against Power Analysis Attacks ChangKyun Kim, JaeCheol Ha, SangJae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim
2005/021 (PDF ) Partial Hiding in Public-Key Cryptography Eabhnat N\'ı Fhloinn, Michael Purser
2005/020 (PDF ) (De)Compositions of Cryptographic Schemes and their Applications to Protocols R. Janvier, Y. Lakhnech, L. Mazare
2005/019 (PDF ) The Full Abstraction of the UC Framework Jesüs F. Almansa
2005/018 (PDF ) Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys Dan Boneh, Craig Gentry, Brent Waters
2005/017 (PDF ) Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives Roberto M. Avanzi
2005/016 (PDF ) Narrow T-functions Magnus Daum
2005/015 (PDF ) Hierarchical Identity Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen, Eu-Jin Goh
2005/014 (PDF ) A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words Ludovic Perret
2005/013 (PDF ) Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols Hung-Yu Chien
2005/012 (PDF ) Efficient Certificateless Public Key Encryption Zhaohui Cheng, Richard Comley
2005/011 (PDF ) An Improved Elegant Method to Re-initialize Hash Chains Yuanchao Zhao, Daoben Li
2005/010 (PDF ) Update on SHA-1 Vincent Rijmen, Elisabeth Oswald
2005/009 (PDF ) Mixing properties of triangular feedback shift registers Bernd Schomburg
2005/008 (PDF ) Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 J. Wu, R. Wei
2005/007 (PDF ) The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu
2005/006 (PDF ) A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$. Pradeep Kumar Mishra, Kishan Chand Gupta
2005/005 (PDF ) A sufficient condition for key-privacy Shai Halevi
2005/004 (PDF ) Benes and Butterfly schemes revisited Jacques Patarin, Audrey Montreuil
2005/003 (PDF ) Cryptanalysis of Hiji-bij-bij (HBB) Vlastimil Klima
2005/002 (PDF ) Logcrypt: Forward Security and Public Verification for Secure Audit Logs Jason E. Holt, Kent E. Seamons
2005/001 (PDF ) On Obfuscating Point Functions Hoeteck Wee
[ Cryptology ePrint archive ]