Cryptology ePrint Archive: Listing for 2006
Regex
2006/486 (PDF ) Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2006/485 (PDF ) Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado, Masakatu Morii
2006/483 (PDF ) New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/482 (PDF ) Countermeasures for the Simple Branch Prediction Analysis Giovanni Agosta, Gerardo Pelosi
2006/481 (PDF ) A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang
2006/480 (PDF ) Cryptanalysis of REESSE1+ Public Key Cryptosystem Shengli Liu, Fangguo Zhang
2006/479 (PDF ) Efficient Provably-Secure Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/478 (PDF ) Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang
2006/477 (PDF ) Dynamic Cryptographic Hash Functions William R. Speirs II, Samuel S. Wagstaff Jr.
2006/476 (PDF ) Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee
2006/475 (PDF ) New Technique for Solving Sparse Equation Systems Håvard Raddum, Igor Semaev
2006/474 (PDF ) Speeding up the Bilinear Pairings Computation on Curves with Automorphisms Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2006/473 (PDF ) Identity-Based Proxy Re-encryption Matthew Green, Giuseppe Ateniese
2006/472 (PDF ) A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment Luis Teixeira d'Aguiar Norton Brandao
2006/471 (PDF ) Multiplication and Squaring on Pairing-Friendly Fields Augusto Jun Devegili, Colm Ó~hÉigeartaigh, Michael Scott, Ricardo Dahab
2006/470 (PDF ) On the security of a group key agreement protocol Qiang Tang
2006/469 (PDF ) An Attack on Disguised Elliptic Curves David Mireles
2006/468 (PDF ) White Box Cryptography: Another Attempt Julien Bringer, Herve Chabanne, Emmanuelle Dottax
2006/467 (PDF ) Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions) Donghoon Chang, Moti Yung
2006/466 (PDF ) Prime Order Primitive Subgroups in Torus-Based Cryptography Jason E. Gower
2006/465 (PDF ) Security and Composition of Cryptographic Protocols: A Tutorial Ran Canetti
2006/464 (PDF ) Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006 Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
2006/463 (PDF ) Obfuscation for Cryptographic Purposes Dennis Hofheinz, John Malone-Lee, Martijn Stam
2006/462 (PDF ) Improved Collision and Preimage Resistance Bounds on PGV Schemes Lei Duo, Chao Li
2006/461 (PDF ) On Post-Modern Cryptography Oded Goldreich
2006/460 (PDF ) Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang
2006/459 (PDF ) Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications Claude Carlet
2006/458 (PDF ) Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias, Moti Yung
2006/457 (PDF ) Linear Approximating to Integer Addition Li An-Ping
2006/456 (PDF ) Indistinguishability Amplification Ueli Maurer, Krzysztof Pietrzak, Renato Renner
2006/455 (PDF ) On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation Jonathan Katz
2006/454 (PDF ) How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich
2006/453 (PDF ) Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng
2006/452 (PDF ) Hybrid Protocol For Password-based Key Exchange in Three-party Setting TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
2006/451 (PDF ) Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms Jongsung Kim
2006/450 (PDF ) Secure Cryptographic Workflow in the Standard Model M. Barbosa, P. Farshim
2006/449 (PDF ) Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare, Phillip Rogaway
2006/448 (PDF ) Universally Composable and Forward Secure RFID Authentication and Key Exchange Tri van Le, Mike Burmester, Breno de Medeiros
2006/447 (PDF ) Towards a Separation of Semantic and CCA Security for Public Key Encryption Yael Gertner, Tal Malkin, Steven Myers
2006/446 (PDF ) New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles) Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo
2006/445 (PDF ) A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/444 (PDF ) Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors Chris Peikert, Alon Rosen
2006/443 (PDF ) Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups Yvo Desmedt, Tanja Lange, Mike Burmester
2006/442 (PDF ) An attack on the certificateless signature scheme from EUC Workshops 2006 Je Hong Park
2006/441 (PDF ) General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity Donghoon Chang, Mridul Nandi
2006/440 (PDF ) A New Type of Group Signature Scheme Jun Zhong Dake He
2006/439 (PDF ) A New Type of Group Blind Signature Scheme Based on Bilinear Pairings Jun Zhong Dake He
2006/438 (PDF ) On the pseudo-random generator ISAAC Jean-Philippe Aumasson
2006/437 (PDF ) On Zigzag Functions and Related Objects in New Metric An Braeken, Ventzislav Nikov, Svetla Nikova
2006/436 (PDF ) Statistically-Hiding Commitment from Any One-Way Function Iftach Haitner, Omer Reingold
2006/435 (PDF ) Searching for Shapes in Cryptographic Protocols (extended version) Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
2006/434 (PDF ) Balanced Boolean Functions with (more than) Maximum Algebraic Immunity Deepak Kumar Dalai, Subhamoy Maitra
2006/433 (PDF ) Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini, Peter Wild
2006/432 (PDF ) Universally Composable Security with Global Setup Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
2006/431 (PDF ) Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/430 (PDF ) From Weak to Strong Watermarking Nicholas Hopper, David Molnar, David Wagner
2006/429 (PDF ) On a new invariant of Boolean functions Sugata Gangopadhyay, Deepmala Sharma
2006/428 (PDF ) Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4 Lilya Budaghyan, Claude Carlet, Gregor Leander
2006/427 (PDF ) Pairing-friendly elliptic curves with small security loss by Cheon's algorithm Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
2006/424 (PDF ) Security Analysis of Voice-over-IP Protocols Prateek Gupta, Vitaly Shmatikov
2006/423 (PDF ) Perfect NIZK with Adaptive Soundness Masayuki Abe, Serge Fehr
2006/422 (PDF ) Long-term Security and Universal Composability Joern Mueller-Quade, Dominique Unruh
2006/421 (PDF ) Universally Composable Three-Party Key Distribution Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2006/420 (PDF ) The REESSE1+ Public Key Cryptosystem v 2.21 Shenghui Su, Shuwang Lv
2006/419 (PDF ) Some New Hidden Ideal Cryptosystems Ilia Toli
2006/418 (PDF ) Analysis of Privacy-Preserving Element Reduction of Multiset Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong
2006/417 (PDF ) The Recent Attack of Nie et al On TTM is Faulty T. Moh
2006/416 (PDF ) Authenticated Interleaved Encryption Claude Castelluccia
2006/415 (PDF ) On the Minimal Embedding Field Laura Hitt
2006/414 (PDF ) Zero Knowledge and Soundness are Symmetric Shien Jin Ong, Salil Vadhan
2006/413 (PDF ) Preimage Attack on Parallel FFT-Hashing Donghoon Chang
2006/412 (PDF ) Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash Donghoon Chang
2006/411 (PDF ) Preimage Attack on Hashing with Polynomials proposed at ICISC'06 Donghoon Chang
2006/410 (PDF ) Galois Field Commitment Scheme Alexandre Pinto, André Souto, Armando Matos, Luís Antunes
2006/409 (PDF ) A NEW MAC: LAMA Li An-Ping
2006/408 (PDF ) A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries Goichiro Hanaoka, Hideki Imai
2006/407 (PDF ) Cryptography in the Multi-string Model Jens Groth, Rafail Ostrovsky
2006/406 (PDF ) Redundancy of the Wang-Yu Sufficient Conditions Yuto Nakano, Hidenori Kuwakado, Masakatu Morii
2006/405 (PDF ) Universally Composable Blind Signatures in the Plain Model Aslak Bakke Buan, Kristian Gøsteen, Lillian Kråkmo
2006/404 (PDF ) Faugere's F5 Algorithm Revisited Till Stegers
2006/403 (PDF ) Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit Willi Geiselmann, Rainer Steinwandt
2006/402 (PDF ) Algebraic Cryptanalysis of the Data Encryption Standard Nicolas T. Courtois, Gregory V. Bard
2006/400 (PDF ) Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai
2006/399 (PDF ) Multi-Property-Preserving Hash Domain Extension and the EMD Transform Mihir Bellare, Thomas Ristenpart
2006/398 (PDF ) The Layered Games Framework for Specifications and Analysis of Security Protocols Amir Herzberg, Igal Yoffe
2006/397 (PDF ) Revisiting the Efficiency of Malicious Two-Party Computation David P. Woodruff
2006/396 (PDF ) Security Protocols with Isotropic Channels Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan
2006/395 (PDF ) Security-Focused Survey on Group Key Exchange Protocols Mark Manulis
2006/394 (PDF ) Identity Based Strong Designated Verifier Proxy Signature Schemes Sunder Lal, Vandani Verma
2006/392 (PDF ) The Tate Pairing via Elliptic Nets Katherine E. Stange
2006/391 (PDF ) A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2006/389 (PDF ) Traceable Ring Signature Eiichiro Fujisaki, Koutarou Suzuki
2006/388 (PDF ) Survey on Security Requirements and Models for Group Key Exchange Mark Manulis
2006/387 (PDF ) A Note on the Security of NTRUSign Phong Q. Nguyen
2006/386 (PDF ) The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange Mark Wooding
2006/385 (PDF ) On Security Models and Compilers for Group Key Exchange Protocols Emmanuel Bresson, Mark Manulis, Joerg Schwenk
2006/384 (PDF ) Design and Analysis of a Hash Ring-iterative Structure Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang
2006/383 (PDF ) Traitor tracing scheme with constant ciphertext rate against powerful pirates Thomas Sirvent
2006/382 (PDF ) Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks E-yong Kim, Hwangnam Kim, Kunsoo Park
2006/381 (PDF ) Cryptanalysis on an Algorithm for Efficient Digital Signatures Fuw-Yi Yang
2006/380 (PDF ) On Security of Sovereign Joins Einar Mykletun, Gene Tsudik
2006/379 (PDF ) Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator Matthew J. Campagna
2006/378 (PDF ) A New Key Exchange Primitive Based on the Triple Decomposition Problem Yesem Kurt
2006/377 (PDF ) Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards James Birkett, Alexander W. Dent, Gregory Neven, Jacob Schuldt
2006/376 (PDF ) A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions Vlastimil KLIMA
2006/375 (PDF ) Distortion maps for genus two curves Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin Smith
2006/374 (PDF ) Robust Final-Round Cache-Trace Attacks Against AES Joseph Bonneau
2006/373 (PDF ) Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model Joseph K. Liu, Man Ho Au, Willy Susilo
2006/372 (PDF ) A taxonomy of pairing-friendly elliptic curves David Freeman, Michael Scott, Edlyn Teske
2006/371 (PDF ) Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3 Robert Ronan, Colm o hEigeartaigh, Colin Murphy, Tim Kerins, Paulo S. L. M. Barreto
2006/370 (PDF ) A DoS Attack Against the Integrity-Less ESP (IPSec) Ventzislav Nikov
2006/369 (PDF ) RadioGatún, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
2006/368 (PDF ) Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
2006/367 (PDF ) An Attack on a Certificateless Signature Scheme Xuefei Cao, Kenneth G. Paterson, Weidong Kou
2006/366 (PDF ) A Latency-Free Election Scheme Kristian Gjøsteen
2006/364 (PDF ) Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric Gregory V. Bard
2006/362 (PDF ) Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks Palash Sarkar, Sanjit Chatterjee
2006/361 (PDF ) Generic Construction of (Identity-based) Perfect Concurrent Signatures Sherman S. M. Chow, Willy Susilo
2006/360 (PDF ) Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens, Arjen Lenstra, Benne de Weger
2006/359 (PDF ) On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge Mihir Bellare, Oded Goldreich
2006/358 (PDF ) Public Key Encryption with Keyword Search based on K-Resilient IBE Dalia Khader
2006/357 (PDF ) Cryptanalysis of a homomorphic public-key cryptosystem over a finite group Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild
2006/356 (PDF ) Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds Emilia Käsper, Sven Laur, Helger Lipmaa
2006/355 (PDF ) Concurrent Non-Malleable Zero Knowledge Boaz Barak, Manoj Prabhakaran, Amit Sahai
2006/354 (PDF ) A new stream cipher: DICING Li An-Ping
2006/353 (PDF ) Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes Zhenjie Huang, Kefei Chen, Yumin Wang
2006/352 (PDF ) Foundations of Secure E-Commerce: The Order Layer Amir Herzberg, Igal Yoffe
2006/351 (PDF ) On the Power of Simple Branch Prediction Analysis Onur Aciicmez, Cetin Kaya Koc, Jean-Pierre Seifert
2006/350 (PDF ) Impossible Differential Cryptanalysis of ARIA and Camellia Wenling Wu, Wentao Zhang, Dengguo Feng
2006/349 (PDF ) A Note On Side-Channels Resulting From Dynamic Compilation D. Page
2006/348 (PDF ) Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist Krzysztof Pietrzak
2006/347 (PDF ) Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1 Fumiyuki Momose, Jinhui Chao
2006/346 (PDF ) Generic Transformation to Strongly Unforgeable Signatures Qiong Huang, Duncan S. Wong, Yiming Zhao
2006/345 (PDF ) Private and Efficient Stable Marriages (Matching) T. Atkinson, R. Bartak, M. -C. Silaghi, E. Tuleu, M. Zanker
2006/344 (PDF ) A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/343 (PDF ) Verifiably Encrypted Signature Scheme with Threshold Adjudication M. Choudary Gorantla, Ashutosh Saxena
2006/342 (PDF ) A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/341 (PDF ) MV3: A new word based stream cipher using rapid mixing and revolving buffers Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
2006/340 (PDF ) Cryptanalyses of Some Multimedia Encryption Schemes Chengqing Li
2006/338 (PDF ) Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings Fagen Li, Yupu Hu, Shuanggen Liu
2006/337 (PDF ) An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol D. R. Stinson, J. Wu
2006/336 (PDF ) High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
2006/335 (PDF ) A ID-Based Deniable Authentication Protocol on pairings Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang
2006/334 (PDF ) Colliding Message Pair for 53-Step HAS-160 Florian Mendel
2006/333 (PDF ) Discrete Logarithms in Generalized Jacobians S. D. Galbraith, B. A. Smith
2006/332 (PDF ) Improved Efficiency for Private Stable Matching Matthew Franklin, Mark Gondree, Payman Mohassel
2006/331 (PDF ) On the Security of Generalized Jacobian Cryptosystems Isabelle Dechene
2006/330 (PDF ) Extended Double-Base Number System with applications to Elliptic Curve Cryptography Christophe Doche, Laurent Imbert
2006/329 (PDF ) Designated Verifier Signature Scheme Based on Braid Groups Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan
2006/328 (PDF ) Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto
2006/327 (PDF ) An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2006/326 (PDF ) Analyzing the HB and HB+ Protocols in the ``Large Error'' Case Jonathan Katz, Adam Smith
2006/325 (PDF ) Invisible Designated Confirmer Signatures without Random Oracles Victor K. Wei
2006/324 (PDF ) The Average Transmission Overhead of Broadcast Encryption Sarang Aravamuthan, Sachin Lodha
2006/323 (PDF ) Computational Soundness of Formal Indistinguishability and Static Equivalence Gergei Bana, Payman Mohassel, Till Stegers
2006/322 (PDF ) Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction Yassir Nawaz, Kishan Chand Gupta, Guang Gong
2006/321 (PDF ) Efficient Pseudorandom Generators Based on the DDH Assumption Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
2006/320 (PDF ) CMSS -- An Improved Merkle Signature Scheme Johannes Buchmann, Luis Carlos Coronado Garcia, Erik Dahmen, Martin Doering, Elena Klintsevich
2006/319 (PDF ) Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions Scott Contini, Yiqun Lisa Yin
2006/318 (PDF ) Chameleon-Based Deniable Authenticated Key Agreement Protocol Chunbo Ma, Jun Ao, Jianhua Li
2006/317 (PDF ) Weaknesses of the FORK-256 compression function Krystian Matusiewicz, Scott Contini, Josef Pieprzyk
2006/316 (PDF ) A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks Sarang Aravamuthan, Viswanatha Rao Thumparthy
2006/315 (PDF ) On the Necessity of Rewinding in Secure Multiparty Computation Michael Backes, Joern-Mueller Quade, Dominique Unruh
2006/314 (PDF ) Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
2006/313 (PDF ) Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields Lars Elmegaard-Fessel
2006/312 (PDF ) ElGamal type signature schemes for n-dimensional vector spaces Iwan M. Duursma, SeungKook Park
2006/310 (PDF ) A d-Sequence based Recursive Random Number Generator Abhishek Parakh
2006/309 (PDF ) Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
2006/308 (PDF ) Efficient ID-based Threshold Signature Schemes without Pairings Jun Shao, Zhenfu Cao, Licheng Wang
2006/307 (PDF ) Note on Design Criteria for Rainbow-Type Multivariates Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen
2006/306 (PDF ) Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability Alexander W. Dent, Qiang Tang
2006/305 (PDF ) Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation V. S. Dimitrov, K. U. Jaervinen, M. J. Jacobson Jr., W. F. Chan, Z. Huang
2006/304 (PDF ) Identity-Based Encryption Gone Wild Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
2006/303 (PDF ) Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption Eric Filiol
2006/302 (PDF ) Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. Atefeh Mashatan, Douglas R. Stinson
2006/301 (PDF ) New features for JPEG Steganalysis Johann Barbier, Éric Filiol, Kichenakoumar Mayoura
2006/299 (PDF ) Efficient Implementation of Tate Pairing on a Mobile Phone using Java Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
2006/298 (PDF ) A Fully Collusion Resistant Broadcast, Trace, and Revoke System Dan Boneh, Brent Waters
2006/297 (PDF ) Forward-Secure Signatures with Untrusted Update Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
2006/296 (PDF ) On the Generic Construction of Identity-Based Signatures with Additional Properties David Galindo, Javier Herranz, Eike Kiltz
2006/295 (PDF ) Visual secret sharing scheme with autostereogram Feng Yi, Daoshun Wang, Yiqi Dai
2006/294 (PDF ) The Collision Intractability of MDC-2 in the Ideal Cipher Model John P Steinberger
2006/293 (PDF ) Fast Algorithms for the Free Riders Problem in Broadcast Encryption Zulfikar Ramzan, David P. Woodruff
2006/292 (PDF ) Ideal Multipartite Secret Sharing Schemes Oriol Farras, Jaume Marti-Farre, Carles Padro
2006/291 (PDF ) Hard Homogeneous Spaces Jean-Marc Couveignes
2006/290 (PDF ) On Authentication with HMAC and Non-Random Properties Christian Rechberger, Vincent Rijmen
2006/289 (PDF ) Efficient Ring Signatures without Random Oracles Hovav Shacham, Brent Waters
2006/288 (PDF ) Predicting Secret Keys via Branch Prediction Onur Aciicmez, Jean-Pierre Seifert, Cetin Kaya Koc
2006/287 (PDF ) Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh, Brent Waters
2006/286 (PDF ) Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps Sujing Zhou, Dongdai Lin
2006/285 (PDF ) Unrestricted Aggregate Signatures Mihir Bellare, Chanathip Namprempre, Gregory Neven
2006/284 (PDF ) Constant Round Group Key Exchange with Logarithmic Computational Complexity Junghyun Nam, Youngsook Lee, Dongho Won
2006/283 (PDF ) Does Privacy Require True Randomness? Carl Bosley, Yevgeniy Dodis
2006/281 (PDF ) Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys Phillip Rogaway
2006/280 (PDF ) Deniable Authentication and Key Exchange Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
2006/279 (PDF ) On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique) Sanjit Chatterjee, Palash Sarkar
2006/278 (PDF ) Fundamental problems in provable security and cryptography Alexander W. Dent
2006/277 (PDF ) On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits Oded Goldreich
2006/276 (PDF ) Mitigating Dictionary Attacks on Password-Protected Local Storage Ran Canetti, Shai Halevi, Michael Steiner
2006/275 (PDF ) A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random Debrup Chakraborty, Palash Sarkar
2006/274 (PDF ) An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri, P. D. Srivastava
2006/273 (PDF ) Secure Positioning of Mobile Terminals with Simplex Radio Communication Mikio Fujii
2006/272 (PDF ) Efficient Use of Random Delays Olivier Benoit, Michael Tunstall
2006/271 (PDF ) Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack Gregory V. Bard
2006/270 (PDF ) Formal Analysis and Systematic Construction of Two-factor Authentication Scheme Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
2006/269 (PDF ) An Analysis of the Hermes8 Stream Ciphers Steve Babbage, Carlos Cid, Norbert Pramstaller, Havard Raddum
2006/268 (PDF ) On the Equivalence of Several Security Notions of Key Encapsulation Mechanism Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
2006/267 (PDF ) Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation Mihir Bellare, Tadayoshi Kohno, Victor Shoup
2006/266 (PDF ) Computationally Sound Secrecy Proofs by Mechanized Flow Analysis Michael Backes, Peeter Laud
2006/265 (PDF ) Some (in)sufficient conditions for secure hybrid encryption. Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/264 (PDF ) A Simple and Unified Method of Proving Unpredictability Mridul Nandi
2006/263 (PDF ) Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems Dragos Trinca
2006/262 (PDF ) Logical Concepts in Cryptography Simon Kramer
2006/261 (PDF ) Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks Frederic Didier
2006/260 (PDF ) A Note On Game-Hopping Proofs Alexander W. Dent
2006/259 (PDF ) Simplified Submission of Inputs to Protocols Douglas Wikstrom
2006/258 (PDF ) Cryptanalysis of a Cognitive Authentication Scheme Philippe Golle, David Wagner
2006/257 (PDF ) Efficient Divisor Class Halving on Genus Two Curves Peter Birkner
2006/256 (PDF ) Constant-Round Concurrent NMWI and its relation to NMZK Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2006/255 (PDF ) Malicious KGC Attacks in Certificateless Cryptography Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang
2006/254 (PDF ) Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov, Lintao Zhang
2006/253 (PDF ) Hard Instances of the Constrained Discrete Logarithm Problem Ilya Mironov, Anton Mityagin, Kobbi Nissim
2006/252 (PDF ) On the Resilience of Key Agreement Protocols to Key Compromise Impersonation Maurizio A. Strangio
2006/251 (PDF ) Accelerating Cryptanalysis with the Method of Four Russians Gregory V. Bard
2006/250 (PDF ) Linear Cryptanalysis of CTC Orr Dunkelman, Nathan Keller
2006/249 (PDF ) Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240 Selcuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yucel
2006/248 (PDF ) Disguising tori and elliptic curves Steven D. Galbraith
2006/246 (PDF ) ON THE POSTQUANTUM CIPHER SCHEME Jaroslav HRUBY
2006/245 (PDF ) Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/244 (PDF ) Length-based cryptanalysis: The case of Thompson's Group Dima Ruinskiy, Adi Shamir, Boaz Tsaban
2006/243 (PDF ) Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
2006/242 (PDF ) The Probability Advantages of Two Linear Expressions in Symmetric Ciphers Haina Zhang, Shaohui Wang, Xiaoyun Wang
2006/241 (PDF ) A Stronger Definition for Anonymous Electronic Cash Marten Trolin
2006/240 (PDF ) Computing Zeta Functions of Nondegenerate Curves W. Castryck, J. Denef, F. Vercauteren
2006/239 (PDF ) Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption Yi Deng, Dongdai Lin
2006/237 (PDF ) Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure? Claire Whelan, Mike Scott
2006/236 (PDF ) Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
2006/235 (PDF ) Application of ECM to a Class of RSA keys Abderrahmane Nitaj
2006/234 (PDF ) RFID Security: Tradeoffs between Security and Efficiency Ivan Damgård, Michael Østergaard
2006/233 (PDF ) A simple generalization of El-Gamal cryptosystem to non-abelian groups Ayan Mahalanobis
2006/232 (PDF ) Improvement to AKS algorithm Roman Popovych
2006/231 (PDF ) A handy multi-coupon system Sebastien Canard, Aline Gouget, Emeline Hufschmitt
2006/230 (PDF ) Another Look at Generic Groups Neal Koblitz, Alfred Menezes
2006/229 (PDF ) Another Look at "Provable Security". II Neal Koblitz, Alfred Menezes
2006/228 (PDF ) Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization Mihir Bellare, Amit Sahai
2006/227 (PDF ) An Elliptic Curve Processor Suitable For RFID-Tags L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, I. Verbauwhede
2006/226 (PDF ) The Fairness of Perfect Concurrent Signatures Guilin Wang, Feng Bao, Jianying Zhou
2006/225 (PDF ) Provably-Secure Time-Bound Hierarchical Key Assignment Schemes Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2006/224 (PDF ) Generalizations of the Karatsuba Algorithm for Efficient Implementations André Weimerskirch, Christof Paar
2006/223 (PDF ) What Hashes Make RSA-OAEP Secure? Daniel R. L. Brown
2006/222 (PDF ) Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants R. Overbeck
2006/221 (PDF ) Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway, Thomas Shrimpton
2006/220 (PDF ) Multi-Dimensional Montgomery Ladders for Elliptic Curves Daniel R. L. Brown
2006/219 (PDF ) Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
2006/218 (PDF ) Computationally Sound Symbolic Secrecy in the Presence of Hash Functions Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
2006/217 (PDF ) Statistical Analysis of the MARS Block Cipher Andrey Pestunov
2006/216 (PDF ) Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains Meloni Nicolas
2006/215 (PDF ) Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion Shujun Li, Chengqing Li, Kowk-Tung Lo, Guanrong Chen
2006/214 (PDF ) Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2006/213 (PDF ) Luby-Rackoff Ciphers from Weak Round Functions? Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
2006/212 (PDF ) Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes Kemal BICAKCI, Bruno Crispo, Andrew S. Tanenbaum
2006/211 (PDF ) A Survey of Certificateless Encryption Schemes and Security Models Alexander W. Dent
2006/210 (PDF ) Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky
2006/209 (PDF ) Minimal Weight and Colexicographically Minimal Integer Representations Clemens Heuberger, James A. Muir
2006/208 (PDF ) Private Information Retrieval Using Trusted Hardware Shuhong Wang, Xuhua Ding, Robert Deng, Feng Bao
2006/207 (PDF ) The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure Javier Herranz, Dennis Hofheinz, Eike Kiltz
2006/206 (PDF ) On the Provable Security of an Efficient RSA-Based Pseudorandom Generator Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
2006/204 (PDF ) Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar.
2006/203 (PDF ) Generalization of the Selective-ID Security Model for HIBE Protocols Sanjit Chatterjee, Palash Sarkar
2006/202 (PDF ) Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/201 (PDF ) Efficient Tate Pairing Computation Using Double-Base Chains Chang'an Zhao, Fangguo Zhang, Jiwu Huang
2006/200 (PDF ) Improvement of recently proposed Remote User Authentication Schemes Guanfei Fang, Genxun huang
2006/199 (PDF ) Identity-based Key Agreement Protocols From Pairings L. Chen, Z. Cheng, N. P. Smart
2006/198 (PDF ) Cryptographically Private Support Vector Machines Sven Laur, Helger Lipmaa, Taneli Mielikäinen
2006/197 (PDF ) A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
2006/196 (PDF ) On ZK-Crypt, Book Stack, and Statistical Tests S. Doroshenko, A. Fionov, A. Lubkin, V. Monarev, B. Ryabko
2006/195 (PDF ) An Efficient ID-based Digital Signature with Message Recovery Based on Pairing Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
2006/193 (PDF ) (Hierarchical Identity-Based) Threshold Ring Signatures Victor K. Wei, Tsz Hon Yuen
2006/192 (PDF ) DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior Osman Kocar
2006/191 (PDF ) A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION Sahadeo Padhye
2006/190 (PDF ) Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator Berry Schoenmakers, Andrey Sidorenko
2006/189 (PDF ) Unconditionally secure chaffing and winnowing with short authentication tags D. R. Stinson
2006/188 (PDF ) New Blockcipher Modes of Operation with Beyond the Birthday Bound Security Tetsu Iwata
2006/187 (PDF ) On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
2006/186 (PDF ) Deterministic and Efficiently Searchable Encryption Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
2006/185 (PDF ) Statistical Zero-Knowledge Arguments for NP from Any One-Way Function Minh-Huyen Nguyen, Shien Jin Ong, Salil Vadhan
2006/184 (PDF ) On Signatures of Knowledge Melissa Chase, Anna Lysyanskaya
2006/183 (PDF ) Information-Theoretic Conditions for Two-Party Secure Function Evaluation Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
2006/182 (PDF ) On the Limits of Point Function Obfuscation Arvind Narayanan, Vitaly Shmatikov
2006/181 (PDF ) There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$ Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
2006/180 (PDF ) Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions Dmitry Khovratovich
2006/179 (PDF ) FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields Chang Shu, Soonhak Kwon, Kris Gaj
2006/178 (PDF ) A New Cryptosystem Based On Hidden Order Groups Amitabh Saxena, Ben Soh
2006/177 (PDF ) On the (Im-)Possibility of Extending Coin Toss Dennis Hofheinz, Joern Mueller-Quade, Dominique Unruh
2006/176 (PDF ) Counting points on elliptic curves in medium characteristic Antoine Joux, Reynald Lercier
2006/175 (PDF ) Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models Moni Naor, Gil Segev, Adam Smith
2006/173 (PDF ) Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model Le Trieu Phong, Ogata Wakaha
2006/172 (PDF ) On Computing Products of Pairings R Granger, N. P. Smart
2006/171 (PDF ) Key confirmation and adaptive corruptions in the protocol security logic Prateek Gupta, Vitaly Shmatikov
2006/170 (PDF ) Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato, Alfredo De Santis
2006/169 (PDF ) Simplified pairing computation and security implications Steven D. Galbraith, Colm O hEigeartaigh, Caroline Sheedy
2006/168 (PDF ) How Fast can be Algebraic Attacks on Block Ciphers ? Nicolas T. Courtois
2006/167 (PDF ) Towards Trustworthy e-Voting using Paper Receipts Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won
2006/166 (PDF ) General Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene
2006/165 (PDF ) Pairings for Cryptographers S. D. Galbraith, K. G. Paterson, N. P. Smart
2006/164 (PDF ) Classification of Signature-only Signature Models Zhengjun Cao
2006/163 (PDF ) Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods Gregory V. Bard
2006/162 (PDF ) A Summary of McEliece-Type Cryptosystems and their Security D. Engelbert, R. Overbeck, A. Schmidt
2006/161 (PDF ) Cryptanalysis of 4-Pass HAVAL Zhangyi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng
2006/158 (PDF ) An Efficient ID-based Proxy Signature Scheme from Pairings Chunxiang Gu, Yuefei Zhu
2006/157 (PDF ) An efficient way to access an array at a secret index Timothy Atkinson, Marius C. Silaghi
2006/156 (PDF ) The Hardness of the DHK Problem in the Generic Group Model Alexander W. Dent
2006/155 (PDF ) Independent Zero-Knowledge Sets Rosario Gennaro, Silvio Micali
2006/154 (PDF ) New Public Key Authentication Frameworks with Lite Certification Authority Xiaolei Dong, Licheng Wang, Zhenfu Cao
2006/153 (PDF ) On the Relationships Between Notions of Simulation-Based Security Anupam Datta, Ralf Kuesters, John C. Mitchell, Ajith Ramanathan
2006/152 (PDF ) Pairing based Mutual Authentication Scheme Using Smart Cards G. Shailaja, K. Phani Kumar, Ashutosh Saxena
2006/151 (PDF ) Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Kuesters
2006/150 (PDF ) Demonstrating data possession and uncheatable data transfer Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto
2006/149 (PDF ) A method of construction of balanced functions with optimum algebraic immunity C. Carlet
2006/148 (PDF ) Computational Indistinguishability between Quantum States and Its Cryptographic Application Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
2006/147 (PDF ) New Integrated proof Method on Iterated Hash Structure and New Structures Duo Lei
2006/146 (PDF ) Completeness of Formal Hashes in the Standard Model Flavio D. Garcia, Peter van Rossum
2006/145 (PDF ) PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES Alexander Rostovtsev, Anton Stolbunov
2006/144 (PDF ) Implementing Cryptographic Pairings on Smartcards Michael Scott, Neil Costigan, Wesam Abdulwahab
2006/143 (PDF ) Blinded Fault Resistant Exponentiation Guillaume Fumaroli, David Vigilant
2006/142 (PDF ) Rational Secret Sharing, Revisited S. Dov Gordon, Jonathan Katz
2006/141 (PDF ) Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei
2006/140 (PDF ) GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks Jiejun Kong
2006/139 (PDF ) A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) Francois-Xavier Standaert, Tal G. Malkin, Moti Yung
2006/138 (PDF ) Trace-Driven Cache Attacks on AES Onur Ac\i{}içmez, Çetin Kaya Koç
2006/137 (PDF ) Defining Strong Privacy for RFID Ari Juels, Stephen A. Weis
2006/136 (PDF ) A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL Gregory V. Bard
2006/135 (PDF ) The Design Principle of Hash Function with Merkle-Damgård Construction Duo Lei, Da Lin, Li Chao, Keqin Feng, Longjiang Qu
2006/134 (PDF ) Identity Based Strong Designated Verifier Signature Scheme K. Phani Kumar, G. Shailaja, Ashutosh Saxena
2006/133 (PDF ) Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio López-Hernández
2006/132 (PDF ) Conditional Reactive Simulatability Michael Backes, Markus Duermuth, Dennis Hofheinz, Ralf Kuesters
2006/131 (PDF ) Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols Mike Burmester, Tri van Le, Breno de Medeiros
2006/130 (PDF ) Simulatable Security and Polynomially Bounded Concurrent Composition Dennis Hofheinz, Dominique Unruh
2006/129 (PDF ) Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i Wei Han, Dong Zheng, Ke-fei Chen
2006/128 (PDF ) On the existence of distortion maps on ordinary elliptic curves Denis Charles
2006/127 (PDF ) A New Cryptanalytic Time/Memory/Data Trade-off Algorithm Sourav Mukhopadhyay, Palash Sarkar
2006/126 (PDF ) ECGSC: Elliptic Curve based Generalized Signcryption Scheme Yiliang Han, Xiaoyuan Yang
2006/125 (PDF ) Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee
2006/124 (PDF ) Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving K. W. Wong, Edward C. W. Lee, L. M. Cheng, Xiaofeng Liao
2006/123 (PDF ) Designated Confirmer Signatures Revisited Douglas Wikström
2006/122 (PDF ) Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts Eike Kiltz
2006/121 (PDF ) Counting Prime Numbers with Short Binary Signed Representation José de Jesús Angel Angel, Guillermo Morales-Luna
2006/120 (PDF ) Key Privacy for Identity Based Encryption Jason E. Holt
2006/118 (PDF ) On construction of non-normal Boolean functions Sugata Gangopadhyay, Deepmala Sharma
2006/117 (PDF ) Conjectured Security of the ANSI-NIST Elliptic Curve RNG Daniel R. L. Brown
2006/116 (PDF ) Second Preimages for Iterated Hash Functions Based on a b-Block Bypass Mario Lamberger, Norbert Pramstaller, Vincent Rijmen
2006/115 (PDF ) Fast exponentiation via prime finite field isomorphism Alexander Rostovtsev
2006/114 (PDF ) Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2006/113 (PDF ) A New Construction of Time Capsule Signature Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian
2006/112 (PDF ) Entity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer
2006/111 (PDF ) Attacking LCCC Batch Verification of RSA Signatures Martin Stanek
2006/110 (PDF ) The Eta Pairing Revisited F. Hess, N. P. Smart, F. Vercauteren
2006/109 (PDF ) A Simpler Sieving Device: Combining ECM and TWIRL Willi Geiselmann, Fabian Januszewski, Hubert Koepfer, Jan Pelzl, Rainer Steinwandt
2006/108 (PDF ) Efficient Public Key Encryption with Keyword Search Schemes from Pairings Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
2006/107 (PDF ) The number field sieve for integers of low weight Oliver Schirokauer
2006/106 (PDF ) Further Refinement of Pairing Computation Based on Miller's Algorithm Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen
2006/105 (PDF ) Tunnels in Hash Functions: MD5 Collisions Within a Minute Vlastimil Klima
2006/104 (PDF ) Fast Collision Attack on MD5 Marc Stevens
2006/103 (PDF ) Security of VSH in the Real World Markku-Juhani O. Saarinen
2006/102 (PDF ) Efficient Blind and Partially Blind Signatures Without Random Oracles Tatsuaki Okamoto
2006/101 (PDF ) Information-theoretic analysis of coating PUFs B. Skoric, S. Maubach, T. Kevenaar, P. Tuyls
2006/100 (PDF ) A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability Zhou Sujing, Lin Dongdai
2006/099 (PDF ) An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families Dongvu Tonien, Reihaneh Safavi-Naini
2006/098 (PDF ) Gröbner Basis Based Cryptanalysis of SHA-1 Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
2006/097 (PDF ) A Cryptographic Tour of the IPsec Standards Kenneth G. Paterson
2006/096 (PDF ) Sequential Aggregate Signatures and Multisignatures without Random Oracles Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
2006/095 (PDF ) MAC Reforgeability John Black, Martin Cochran
2006/094 (PDF ) Cryptanalysis of the MEM Mode of Operation Peng Wang, Dengguo Feng, Wenling Wu
2006/093 (PDF ) RSA and a higher degree diophantine equation Abderrahmane Nitaj
2006/092 (PDF ) Cryptanalysis of RSA with constrained keys Abderrahmane Nitaj
2006/091 (PDF ) The Complexity of Online Memory Checking Moni Naor, Guy Rothblum
2006/090 (PDF ) Secure Sketch for Multi-Sets Ee-Chien Chang, Vadym Fedyukovych, Qiming Li
2006/089 (PDF ) A Tree-based Model of Unicast Stream Authentication Goce Jakimoski, Yvo Desmedt
2006/088 (PDF ) On the Feasibility of Consistent Computations Sven Laur, Helger Lipmaa
2006/087 (PDF ) Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons Barath Raghavan, Saurabh Panjwani, Anton Mityagin
2006/086 (PDF ) Analysis of the Linux Random Number Generator Zvi Gutterman, Benny Pinkas, Tzachy Reinman
2006/085 (PDF ) Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) Xavier Boyen, Brent Waters
2006/084 (PDF ) Cryptography from Anonymity Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2006/083 (PDF ) Browsers Defenses Against Phishing, Spoofing and Malware Amir Herzberg
2006/082 (PDF ) Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast HariGovind V. Ramasamy, Christian Cachin
2006/081 (PDF ) Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
2006/080 (PDF ) Efficient Identity-based Signatures Secure in the Standard Model Kenneth G. Paterson, Jacob C. N. Schuldt
2006/079 (PDF ) Towards Provably Secure Group Key Agreement Building on Group Theory Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
2006/078 (PDF ) Verifiable Random Permutations Yevgeniy Dodis, Prashant Puniya
2006/077 (PDF ) On Secret Sharing Schemes, Matroids and Polymatroids Jaume Marti-Farre, Carles Padro
2006/075 (PDF ) ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM TOMOHIRO HARAYAMA
2006/074 (PDF ) How to Construct Sufficient Condition in Searching Collisions of MD5 Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
2006/073 (PDF ) Stronger Security of Authenticated Key Exchange Brian LaMacchia, Kristin Lauter, Anton Mityagin
2006/072 (PDF ) Cryptanalysis of the Bluetooth E0 Cipher using OBDD's Yaniv Shaked, Avishai Wool
2006/071 (PDF ) A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security Ueli Maurer, Johan Sjödin
2006/070 (PDF ) The experimental distinguishing attack on RC4 Sergey Doroshenko, Boris Ryabko
2006/069 (PDF ) Automated Security Proofs with Sequences of Games Bruno Blanchet, David Pointcheval
2006/068 (PDF ) Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes Michael Backes, Birgit Pfitzmann, Michael Waidner
2006/067 (PDF ) Scalar Multiplication on Koblitz Curves using Double Bases Roberto Avanzi, Francesco Sica
2006/066 (PDF ) Simple and Flexible Private Revocation Checking John Solis, Gene Tsudik
2006/065 (PDF ) On Expected Constant-Round Protocols for Byzantine Agreement Jonathan Katz, Chiu-Yuen Koo
2006/064 (PDF ) Perturbing and Protecting a Traceable Block Cipher Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
2006/063 (PDF ) Provably Secure Universal Steganographic Systems Boris Ryabko, Daniil Ryabko
2006/059 (PDF ) High Security Pairing-Based Cryptography Revisited R. Granger, D. Page, N. P. Smart
2006/058 (PDF ) Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
2006/057 (PDF ) Key Exchange Using Passwords and Long Keys Vladimir Kolesnikov, Charles Rackoff
2006/056 (PDF ) Key Exchange Protocols: Security Definition, Proof Method and Applications Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
2006/055 (PDF ) Multicollision Attacks on some Generalized Sequential Hash Functions M. Nandi, D. R. Stinson
2006/054 (PDF ) How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum, Avishai Wool
2006/053 (PDF ) Cryptanalysis of the CFVZ cryptosystem J. J. Climent, E. Gorla, J. Rosenthal
2006/052 (PDF ) Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert
2006/051 (PDF ) Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2006/050 (PDF ) Secure Device Pairing based on a Visual Channel Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
2006/049 (PDF ) Crossword Puzzle Attack on NLS Joo Yeon Cho, Josef Pieprzyk
2006/048 (PDF ) New Results on Multipartite Access Structures Javier Herranz, German Saez
2006/047 (PDF ) Cryptographically Sound Theorem Proving Christoph Sprenger, Michael Backes, David Basin, Birgit Pfitzmann, Michael Waidner
2006/046 (PDF ) Efficient Primitives from Exponentiation in Zp Shaoquan Jiang
2006/045 (PDF ) Fully Collusion Resistant Traitor Tracing Dan Boneh, Amit Sahai, Brent Waters
2006/044 (PDF ) Linear Integer Secret Sharing and Distributed Exponentiation Ivan Damgard, Rune Thorbek
2006/043 (PDF ) New Proofs for NMAC and HMAC: Security Without Collision-Resistance Mihir Bellare
2006/042 (PDF ) Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms Sourav Mukhopadhyay, Palash Sarkar
2006/041 (PDF ) Reactively Simulatable Certified Mail Birgit Pfitzmann, Matthias Schunter, Michael Waidner
2006/040 (PDF ) Linkable Democratic Group Signatures Mark Manulis, Ahmad-Reza Sadeghi, Joerg Schwenk
2006/039 (PDF ) Two-Round AES Differentials Joan Daemen, Vincent Rijmen
2006/038 (PDF ) Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field Jintai Ding, Jason E. Gower, Dieter S. Schmidt
2006/037 (PDF ) Message Authentication on 64-bit Architectures Ted Krovetz
2006/036 (PDF ) Vector Stream Cipher Instant Key Recovery Sean O'Neil
2006/035 (PDF ) Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar A. Saqib, Nareli Cruz-Cortés
2006/034 (PDF ) Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles Eike Kiltz, David Galindo
2006/033 (PDF ) Arithmetic of Generalized Jacobians Isabelle Déchène
2006/032 (PDF ) Reducing the Number of Homogeneous Linear Equations in Finding Annihilators Deepak Kumar Dalai, Subhamoy Maitra
2006/031 (PDF ) On a Variation of Kurosawa-Desmedt Encryption Scheme Le Trieu Phong, Wakaha Ogata
2006/030 (PDF ) Improved cryptanalysis of Py Paul Crowley
2006/029 (PDF ) Authenticated Hybrid Encryption for Multiple Recipients Stéphanie Alt
2006/028 (PDF ) Cryptanalysis of recently proposed Remote User Authentication Schemes Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena
2006/027 (PDF ) Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev
2006/026 (PDF ) Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10 David Freeman
2006/025 (PDF ) Signatures for Network Coding Denis Charles, Kamal Jain, Kristin Lauter
2006/024 (PDF ) Improving the Decoding Efficiency of Private Search George Danezis, Claudia Diaz
2006/023 (PDF ) A Method to Implement Direct Anonymous Attestation HE GE
2006/021 (PDF ) Cryptographic hash functions from expander graphs Denis Charles, Eyal Goren, Kristin Lauter
2006/020 (PDF ) Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes Adam Smith
2006/019 (PDF ) Hermes8 : A Low-Complexity Low-Power Stream Cipher Ulrich Kaiser
2006/018 (PDF ) Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
2006/017 (PDF ) Threshold and Proactive Pseudo-Random Permutations Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
2006/016 (PDF ) Message Modification for Step 21-23 on SHA-0 Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
2006/015 (PDF ) A Family of Dunces: Trivial RFID Identification and Authentication Protocols Gene Tsudik
2006/014 (PDF ) Sound Computational Interpretation of Symbolic Hashes in the Standard Model Flavio D. Garcia, Peter van Rossum
2006/013 (PDF ) Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings Hung-Yu Chien
2006/012 (PDF ) Certificate-Based Encryption Without Random Oracles Paz Morillo, Carla Ràfols
2006/011 (PDF ) Formal Proof for the Correctness of RSA-PSS Christina Lindenberg, Kai Wirt, Johannes Buchmann
2006/010 (PDF ) Finding Characteristic Polynomials with Jump Indices Steve Babbage, Matthew Dodd
2006/009 (PDF ) Breaking and Fixing Public-Key Kerberos Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kay Tsay, Christopher Walstad
2006/008 (PDF ) A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers James A. Muir
2006/007 (PDF ) Further Discussions on the Security of a Nominative Signature Scheme Lifeng Guo, Guilin Wang, Duncan S. Wong
2006/006 (PDF ) Group Key Agreement for Ad Hoc Networks Lijun Liao
2006/005 (PDF ) Pairing Calculation on Supersingular Genus 2 Curves Colm O hEigeartaigh, Michael Scott
2006/004 (PDF ) Provably Secure Subsitution of Cryptographic Tools Lea Kissner, David Molnar
2006/003 (PDF ) Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography Dragos Trinca
2006/002 (PDF ) Geometric constructions of optimal linear perfect hash families S. G. Barwick, W. -A. Jackson.
2006/001 (PDF ) Homomorphic Cryptosystems and their Applications Doerte K. Rappe
[ Cryptology ePrint archive ]