Cryptology ePrint Archive: Listing for 2007
- 2007/482 (PDF)
- TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
- Leonardo B. Oliveira, Michael Scott, Julio López, Ricardo Dahab
- 2007/480 (PDF)
- Differential Fault Analysis on the AES Key Schedule
- Junko Takahashi, Toshinori Fukunaga
- 2007/479 (PDF)
- An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
- J. Wu, D. R. Stinson
- 2007/478 (PDF)
- Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
- Dafna Kidron, Yehuda Lindell
- 2007/477 (PDF)
- Algebraic Side-Channel Collision Attacks on AES
- Andrey Bogdanov, Andrey Pyshkin
- 2007/476 (PDF)
- Dynamic SHA
- Xu Zijie
- 2007/475 (PDF)
- Obtaining Universally Composable Security: Towards the Bare Bones of Trust
- Ran Canetti
- 2007/474 (PDF)
- Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
- Martin Cochran
- 2007/473 (PDF)
- Authenticated Key Exchange and Key Encapsulation Without Random Oracles
- Tatsuaki Okamoto
- 2007/472 (PDF)
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
- 2007/471 (PDF)
- Attacks on the WEP protocol
- Erik Tews
- 2007/470 (PDF)
- Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
- Bodo Möller, Andy Rupp
- 2007/469 (PDF)
- ID-Based Group Password-Authenticated Key Exchange
- Xun Yi, Raylin Tso, Eiji Okamoto
- 2007/467 (PDF)
- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
- André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
- 2007/466 (PDF)
- Improved Impossible Differential Cryptanalysis of CLEFIA
- Wei Wang, Xiaoyun Wang
- 2007/465 (PDF)
- A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
- Zheng Gong, Xuejia Lai, Kefei Chen
- 2007/464 (PDF)
- Secure Computation Without Authentication
- Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
- 2007/463 (PDF)
- Efficient GF(3m) Multiplication Algorithm for eta T Pairing
- Gen Takahashi, Fumitaka Hoshino, Tetsutaro Kobayashi
- 2007/462 (PDF)
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- Siamak F Shahandashti, Reihaneh Safavi-Naini
- 2007/461 (PDF)
- Verifiable Attribute-based Encryption
- Qiang Tang, Dongyao Ji
- 2007/460 (PDF)
- Guarantees for Customers of Incentive Anonymizing Networks
- Timothy Atkinson, Marius Silaghi
- 2007/459 (PDF)
- Practical Anonymous Divisible E-Cash From Bounded Accumulators
- Man Ho Au, Willy Susilo, Yi Mu
- 2007/458 (PDF)
- Saving Private Randomness in One-Way Functions and Pseudorandom Generators
- Nenad Dedic, Danny Harnik, Leonid Reyzin
- 2007/457 (PDF)
- Comparing Implementation Efficiency of Ordinary and Squared Pairings
- Christine Abegail Antonio, Tanaka Satoru, Ken Nakamula
- 2007/455 (PDF)
- Analysis and optimization of elliptic-curve single-scalar multiplication
- Daniel J. Bernstein, Tanja Lange
- 2007/454 (PDF)
- Efficient Certificateless Signatures Suitable for Aggregation
- Rafael Castro, Ricardo Dahab
- 2007/453 (PDF)
- On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
- Kenneth G. Paterson, Sriramkrishnan Srinivasan
- 2007/452 (PDF)
- Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
- Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott
- 2007/451 (PDF)
- Precise Concurrent Zero Knowledge
- Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
- 2007/450 (PDF)
- Short Group Signature without Random Oracles
- Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
- 2007/449 (PDF)
- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
- Jacques Patarin, Valérie Nachef, Côme Berbain
- 2007/448 (PDF)
- Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
- Sergiy Pometun
- 2007/447 (PDF)
- Weak adaptive chosen ciphertext secure hybrid encryption scheme
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
- 2007/446 (PDF)
- A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
- Carlos AGUILAR MELCHOR, Philippe GABORIT
- 2007/445 (PDF)
- Proposal of a new efficient public key system for encryption and digital signatures
- Gerold Grünauer
- 2007/444 (PDF)
- Tight bounds between algebraic immunity and nonlinearities of high orders
- Lobanov Mikhail
- 2007/443 (PDF)
- Template Attacks with a Power Model
- Moulay Abdelaziz EL AABID, Sylvain GUILLEY, Philippe HOOGVORST
- 2007/442 (PDF)
- Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
- Neal Koblitz, Alfred Menezes
- 2007/441 (PDF)
- Faster Group Operations on Elliptic Curves
- Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
- 2007/440 (PDF)
- An Improved Remote User Authentication Scheme using Bilinear Pairings
- Sunder Lal, K. K. Goyal
- 2007/439 (PDF)
- Multiparty Key Agreement Using Bilinear Map
- Nam-Su Jho, Myung-Hwan Kim, Do Won Hong, Byung-Gil Lee
- 2007/438 (PDF)
- Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
- Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum
- 2007/437 (PDF)
- Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
- Cuauhtemoc Mancillas-Lopez, Debrup Chakraborty, Francisco Rodriguez-Henriquez
- 2007/436 (PDF)
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- Gautham Sekar, Souradyuti Paul, Bart Preneel
- 2007/435 (PDF)
- Irreducibility to the One-More Evaluation Problems: More May Be Less
- Daniel R. L. Brown
- 2007/434 (PDF)
- Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
- Xibin Lin, Chang-An Zhao, Fangguo Zhang, Yanming Wang
- 2007/433 (PDF)
- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
- Fabien Coelho
- 2007/432 (PDF)
- Trapdoors for Hard Lattices and New Cryptographic Constructions
- Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
- 2007/431 (PDF)
- Notions of Efficiency in Simulation Paradigm
- Tzer-jen Wei
- 2007/430 (PDF)
- Cryptanalysis of LASH
- Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Jian Guo, San Ling, Huaxiong Wang
- 2007/429 (PDF)
- On compressible pairings and their computation
- Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
- 2007/428 (PDF)
- Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
- Benjamin Smith
- 2007/427 (PDF)
- Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
- Sumanta Sarkar, Subhamoy Maitra
- 2007/426 (PDF)
- Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
- Christine Abegail Antonio, Satoru Tanaka, Ken Nakamula
- 2007/425 (PDF)
- On prime-order elliptic curves with embedding degrees k=3,4 and 6
- Koray Karabina, Edlyn Teske
- 2007/424 (PDF)
- When e-th Roots Become Easier Than Factoring
- Antoine Joux, David Naccache, Emmanuel Thomé
- 2007/423 (PDF)
- Finding Low Weight Polynomial Multiples Using Lattices
- Laila El Aimani, Joachim von zur Gathen
- 2007/422 (PDF)
- Structural Identity-Based Encryption
- Man Ho Au, Siu-Ming Yiu
- 2007/421 (PDF)
- The role of help in Classical and Quantum Zero-Knowledge
- André Chailloux, Iordanis Kerenidis
- 2007/420 (PDF)
- A Critical Analysis and Improvement of AACS Drive-Host Authentication
- Jiayuan Sui, Douglas R. Stinson
- 2007/419 (PDF)
- Cryptanalysis of the Random Number Generator of the Windows Operating System
- Leo Dorrendorf, Zvi Gutterman, Benny Pinkas
- 2007/417 (PDF)
- Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi
- 2007/416 (PDF)
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong
- 2007/415 (PDF)
- Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
- Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
- 2007/414 (PDF)
- Optimizing double-base elliptic-curve single-scalar multiplication
- Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
- 2007/413 (PDF)
- Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
- Michael Vielhaber
- 2007/412 (PDF)
- Proposing a Master One-Way Function
- Gideon Samid
- 2007/411 (PDF)
- Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
- Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
- 2007/410 (PDF)
- Inverted Edwards coordinates
- Daniel J. Bernstein, Tanja Lange
- 2007/409 (PDF)
- Building a Collision-Resistant Compression Function from Non-Compressing Primitives
- Thomas Shrimpton, Martijn Stam
- 2007/408 (PDF)
- Differential Cryptanalysis of PRESENT
- Meiqin Wang
- 2007/406 (PDF)
- Modeling Computational Security in Long-Lived Systems
- Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
- 2007/405 (PDF)
- Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
- Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding
- 2007/404 (PDF)
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Jonathan Katz, Amit Sahai, Brent Waters
- 2007/403 (PDF)
- Turbo SHA-2
- Danilo Gligoroski, Svein Johan Knapskog
- 2007/402 (PDF)
- Robust, Anonymous RFID Authentication with Constant Key-Lookup
- Mike Burmester, Breno de Medeiros, Rossana Motta
- 2007/401 (PDF)
- Another Look at Automated Theorem-Proving
- Neal Koblitz
- 2007/400 (PDF)
- REMARKS ON IBE SCHEME OF WANG AND CAO
- Sunder Lal, Priyam Sharma
- 2007/399 (PDF)
- Ceremony Design and Analysis
- Carl Ellison
- 2007/397 (PDF)
- On the security defects of an image encryption scheme
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen
- 2007/396 (PDF)
- Proxy Re-Signature Schemes without Random Oracles
- Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
- 2007/395 (PDF)
- Second Preimage Attacks on Dithered Hash Functions
- Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sebastien Zimmer
- 2007/394 (PDF)
- Almost-everywhere Secure Computation
- Juan A. Garay, Rafail Ostrovsky
- 2007/393 (PDF)
- Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
- Haining Fan, Jiaguang Sun, Ming Gu, Kwok-Yan Lam
- 2007/392 (PDF)
- Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
- Jonathan Trostle, Andy Parrish
- 2007/391 (PDF)
- A novel public key crypto system based on semi-modules over quotient semi-rings
- Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
- 2007/390 (PDF)
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves
- Augusto Jun Devegili, Michael Scott, Ricardo Dahab
- 2007/389 (PDF)
- Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
- Dragos Florin Ciocan, Salil Vadhan
- 2007/388 (PDF)
- On Ciphertext Undetectability
- Peter Gazi, Martin Stanek
- 2007/386 (PDF)
- (Convertible) Undeniable Signatures without Random Oracles
- Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
- 2007/385 (PDF)
- On the insecurity of interchanged use of OFB and CBC modes of operation
- Danilo Gligoroski
- 2007/384 (PDF)
- Non-Interactive Anonymous Credentials
- Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
- 2007/383 (PDF)
- Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
- Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
- 2007/382 (PDF)
- Oblivious Transfer via McEliece's PKC and Permuted Kernels
- K. Kobara, K. Morozov, R. Overbeck
- 2007/381 (PDF)
- Cryptanalysis of Two New Instances of TTM Cryptosystem
- Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding
- 2007/380 (PDF)
- X-FCSR: a new software oriented stream cipher based upon FCSRs
- Francois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier
- 2007/379 (PDF)
- On The Inequivalence Of Ness-Helleseth APN Functions
- Xiangyong Zeng, Lei Hu, Yang Yang, Wenfeng Jiang
- 2007/378 (PDF)
- Algebraic Structure Defectoscopy
- Sean O'Neil
- 2007/376 (PDF)
- An Efficient Range-Bounded Commitment Scheme
- Zhengjun Cao
- 2007/375 (PDF)
- Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
- Gregory Hirshman
- 2007/374 (PDF)
- On Factoring Arbitrary Integers with Known Bits
- Mathias Herrmann, Alexander May
- 2007/373 (PDF)
- A Meet-in-the-Middle Collision Attack Against the New FORK-256
- Markku-Juhani O. Saarinen
- 2007/372 (PDF)
- On the Authentication of One Popular Signcryption Scheme
- Zhengjun Cao
- 2007/371 (PDF)
- Group-oriented encryption secure against collude attack
- Chunbo Ma, Jun Ao, Jianhua Li
- 2007/370 (PDF)
- FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
- Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu
- 2007/369 (PDF)
- Universally Composable Multi-Party Computation with an Unreliable Common Reference String
- Vipul Goyal, Jonathan Katz
- 2007/368 (PDF)
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Vipul Goyal
- 2007/367 (PDF)
- Cryptanalysis of Rational Multivariate Public Key Cryptosystems
- Jintai Ding, John Wagner
- 2007/366 (PDF)
- Breaking the Symmetry: a Way to Resist the New Differential Attack
- Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, Vivien Dubois
- 2007/365 (PDF)
- Pairings on Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshoj
- 2007/364 (PDF)
- A Proof of Security of a Mesh Security Architecture
- Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara
- 2007/363 (PDF)
- Fuzzy Private Matching (Extended Abstract)
- Łukasz Chmielewski, Jaap-Henk Hoepman
- 2007/362 (PDF)
- Statistical Testing for Disk Encryption Modes of Operations
- Mohamed Abo El-Fotouh, Klaus Diepold
- 2007/361 (PDF)
- Proxy Re-encryption Systems for Identity-based Encryption
- Toshihiko Matsuo
- 2007/360 (PDF)
- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
- Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent
- 2007/359 (PDF)
- Intrusion-Resilient Secret Sharing
- Stefan Dziembowski, Krzysztof Pietrzak
- 2007/358 (PDF)
- Improving the Round Complexity of VSS in Point-to-Point Networks
- Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan
- 2007/357 (PDF)
- A Note on Signature Standards
- Michael Braun, Anton Kargl
- 2007/356 (PDF)
- A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
- Christophe Petit, Francois-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti Yung
- 2007/355 (PDF)
- Secret sharing on the infinite ladder
- Laszlo Csirmaz
- 2007/354 (PDF)
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
- Cheng-Kang Chu, Wen-Guey Tzeng
- 2007/353 (PDF)
- Multiparty Computation to Generate Secret Permutations
- Chris Studholme, Ian Blake
- 2007/352 (PDF)
- New Local Collisions for the SHA-2 Hash Family
- Somitra Kumar Sanadhya, Palash Sarkar
- 2007/351 (PDF)
- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
- Iftach Haitner, Jonathan J. Hoch, Gil Segev
- 2007/350 (PDF)
- On Tweaking Luby-Rackoff Blockciphers
- David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu
- 2007/349 (PDF)
- Statistically Hiding Sets
- Manoj Prabhakaran, Rui Xue
- 2007/348 (PDF)
- A Framework for Efficient and Composable Oblivious Transfer
- Chris Peikert, Vinod Vaikuntanathan, Brent Waters
- 2007/347 (PDF)
- Lai-Massey Scheme and Quasi-Feistel Networks
- Aaram Yun, Je Hong Park, Jooyoung Lee
- 2007/345 (PDF)
- Analysis of Underlying Assumptions in NIST DRBGs
- Wilson Kan
- 2007/344 (PDF)
- Security Analysis of WAPI Authentication and Key Exchange Protocol
- Liufei Wu, Yuqing Zhang, FengjiaoWang
- 2007/343 (PDF)
- Updated standards for validating elliptic curves
- Laura Hitt
- 2007/342 (PDF)
- A New Security Model for Cross-Realm C2C-PAKE Protocol
- Fengjiao Wang, Yuqing Zhang
- 2007/341 (PDF)
- Multi-Party Indirect Indexing and Applications
- Matthew Franklin, Mark Gondree, Payman Mohassel
- 2007/340 (PDF)
- Efficient Implementation of the Pairing on Mobilephones using BREW
- Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
- 2007/339 (PDF)
- On the security of a class of image encryption schemes
- Chengqing Li, Guanrong Chen
- 2007/338 (PDF)
- VHASH Security
- Wei Dai, Ted Krovetz
- 2007/337 (PDF)
- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
- W. Bamberger, O. Welter, S. Spitz, M. Marhöfer
- 2007/336 (PDF)
- A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
- Onur Aciicmez, Werner Schindler
- 2007/335 (PDF)
- Encryption Techniques for Secure Database Outsourcing
- Sergei Evdokimov, Oliver Guenther
- 2007/334 (PDF)
- New Constructions for UC Secure Computation using Tamper-proof Hardware
- Nishanth Chandran, Vipul Goyal, Amit Sahai
- 2007/333 (PDF)
- Towards Key-Dependent Message Security in the Standard Model
- Dennis Hofheinz, Dominique Unruh
- 2007/332 (PDF)
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
- 2007/331 (PDF)
- Isolated Proofs of Knowledge and Isolated Zero Knowledge
- Ivan Damgaard, Jesper Buus Nielsen, Daniel Wichs
- 2007/330 (PDF)
- Remote Power Analysis of {RFID} Tags
- Yossi Oren
- 2007/329 (PDF)
- A Tunable Broadcast Encryption Scheme
- David Lubicz, Thomas Sirvent
- 2007/328 (PDF)
- A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
- Ivan Damgaard, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner
- 2007/327 (PDF)
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Ivan Damgaard, Serge Fehr, Louis Salvail, Christian Schaffner
- 2007/326 (PDF)
- Efficient Password-based Authenticated Key Exchange without Public Information
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
- 2007/325 (PDF)
- Faster and Shorter Password-Authenticated Key Exchange
- Rosario Gennaro
- 2007/324 (PDF)
- Towards provable security for route discovery protocols in mobile ad hoc networks
- Mike Burmester, Breno de Medeiros
- 2007/323 (PDF)
- Attribute-Based Encryption with Non-Monotonic Access Structures
- Rafail Ostrovsky, Amit Sahai, Brent Waters
- 2007/322 (PDF)
- Identifying Ideal Lattices
- Jintai Ding, Richard Lindner
- 2007/321 (PDF)
- Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
- Selcuk Kavut, Melek Diker Yucel
- 2007/320 (PDF)
- On the Big Gap Between $|p|$ and $|q|$ in DSA
- Zhengjun Cao
- 2007/319 (PDF)
- A New Security Definition for Public Key Encryption Schemes and Its Applications
- Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng
- 2007/318 (PDF)
- On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
- Michael Neve, Kris Tiri
- 2007/317 (PDF)
- Improving Upon the TET Mode of Operation
- Palash Sarkar
- 2007/316 (PDF)
- SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
- Sunder Lal, Priyam Sharma
- 2007/315 (PDF)
- Security under Key-Dependent Inputs
- Shai Halevi, Hugo Krawczyk
- 2007/313 (PDF)
- Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
- Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, Kim-Kwang Raymond Choo
- 2007/312 (PDF)
- Secure Similarity Search
- Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan
- 2007/311 (PDF)
- A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
- Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
- 2007/310 (PDF)
- A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
- Kwang Ho Kim
- 2007/309 (PDF)
- Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
- Subhamoy Maitra
- 2007/308 (PDF)
- Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
- Selcuk Kavut, Melek Diker Yucel
- 2007/307 (PDF)
- Locally Invertible Boolean Mappings
- Oleg A. Logachev
- 2007/306 (PDF)
- Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
- Thanh-Ha Le, Quoc-Thinh Nguyen-Vuong, Cécile Canovas, Jessy Clédière
- 2007/305 (PDF)
- On Non-Randomness of the Permutation after RC4 Key Scheduling
- Goutam Paul, Subhamoy Maitra, Rohit Srivastava
- 2007/304 (PDF)
- A Bound on the Size of Separating Hash Families
- Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson, Gregory M. Zaverucha
- 2007/303 (PDF)
- A Forward Secure Remote User Authentication Scheme
- Manoj Kumar
- 2007/302 (PDF)
- Compression Functions Suitable for the Multi-Property-Preserving Transform
- Hidenori Kuwakado, Masakatu Morii
- 2007/301 (PDF)
- On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
- Yuri Borissov, Moon Ho Lee, Svetla Nikova
- 2007/300 (PDF)
- A Note on Automata-based Dynamic Convolutional Cryptosystems
- Renji Tao
- 2007/299 (PDF)
- Optimizing Multiprecision Multiplication for Public Key Cryptography
- Michael Scott, Piotr Szczechowiak
- 2007/298 (PDF)
- The Security of the Extended Codebook (XCB) Mode of Operation
- David A. McGrew, Scott R. Fluhrer
- 2007/297 (PDF)
- Secret sharing on infinite graphs
- Laszlo Csirmaz
- 2007/296 (PDF)
- Construction of Efficient and Secure Pairing Algorithm and its Application
- Doo Ho Choi, Dong-Guk Han, Howon Kim
- 2007/295 (PDF)
- Linearization Attacks Against Syndrome Based Hashes
- Markku-Juhani O. Saarinen
- 2007/294 (PDF)
- Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
- Julien Bringer, Herve Chabanne, Thomas Icart
- 2007/293 (PDF)
- Fully Resilient Traitor Tracing Scheme using Key Update
- Eun Sun Yoo, Koutarou Suzuki, Myung-Hwan Kim
- 2007/292 (PDF)
- Improved security analysis of OMAC
- Mridul Nandi
- 2007/291 (PDF)
- Relations Among Notions of Plaintext Awareness
- James Birkett, Alexander W. Dent
- 2007/290 (PDF)
- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
- Sumanta Sarkar, Subhamoy Maitra
- 2007/289 (PDF)
- Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
- Michael Backes, Matteo Maffei, Dominique Unruh
- 2007/288 (PDF)
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Dennis Hofheinz, Eike Kiltz
- 2007/287 (PDF)
- The Effectiveness of Receipt-Based Attacks on ThreeBallot
- Kevin Henry, Douglas R. Stinson, Jiayuan Sui
- 2007/286 (PDF)
- Faster addition and doubling on elliptic curves
- Daniel J. Bernstein, Tanja Lange
- 2007/285 (PDF)
- Solving MRHS linear equations
- Håvard Raddum, Igor Semaev
- 2007/283 (PDF)
- Provably Secure Framework for Information Aggregation is Sensor Networks
- Mark Manulis, Joerg Schwenk
- 2007/282 (PDF)
- Analysis of countermeasures against access driven cache attacks on AES
- Johannes Blömer, Volker Krummel
- 2007/281 (PDF)
- A Pollard-like pseudorandom number generator over EC
- Grzegorz Wojtenko
- 2007/280 (PDF)
- On solving sparse algebraic equations over finite fields II
- Igor Semaev
- 2007/279 (PDF)
- Lossy Trapdoor Functions and Their Applications
- Chris Peikert, Brent Waters
- 2007/278 (PDF)
- A Framework for Iterative Hash Functions - HAIFA
- Eli Biham, Orr Dunkelman
- 2007/277 (PDF)
- Cryptanalysis of a class of cryptographic hash functions
- Praveen Gauravaram, John Kelsey
- 2007/276 (PDF)
- Prolific Codes with the Identifiable Parent Property
- Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
- 2007/275 (PDF)
- `Good' Pseudo-Random Binary Sequences from Elliptic Curves
- Zhixiong CHEN, Guozhen XIAO
- 2007/274 (PDF)
- Group-based Proxy Re-encryption scheme
- Chunbo Ma, Jun Ao, Jianhua Li
- 2007/273 (PDF)
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
- Mihir Bellare, Sarah Shoup
- 2007/272 (PDF)
- Cryptanalysis of a Hash Function Proposed at ICISC 2006
- Willi Geiselmann, Rainer Steinwandt
- 2007/271 (PDF)
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Mihir Bellare, Thomas Ristenpart
- 2007/270 (PDF)
- Secret Ballot Elections with Unconditional Integrity
- David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora
- 2007/269 (PDF)
- Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
- Jeroen van de Graaf
- 2007/268 (PDF)
- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
- Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
- 2007/267 (PDF)
- CRUST: Cryptographic Remote Untrusted Storage without Public Keys
- Erel Geron, Avishai Wool
- 2007/266 (PDF)
- Filling the Gap between Voters and Cryptography in e-Voting
- Wei Han, Dong Zheng, Ke-fei Chen
- 2007/265 (PDF)
- Which Languages Have 4-Round Zero-Knowledge Proofs?
- Jonathan Katz
- 2007/264 (PDF)
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Thomas Ristenpart, Scott Yilek
- 2007/262 (PDF)
- Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
- Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
- 2007/261 (PDF)
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Subhamoy Maitra, Goutam Paul
- 2007/260 (PDF)
- An Efficient One-move Nominative Signature Scheme
- Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong
- 2007/259 (PDF)
- Algebraic Immunity Hierarchy of Boolean Functions
- Ziran Tu, Yingpu Deng
- 2007/258 (PDF)
- UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
- Ulrich Kaiser
- 2007/257 (PDF)
- A Forward-Secure Signature with Backward-Secure Detection
- Dai-Rui Lin, Chih-I Wang
- 2007/256 (PDF)
- Aspects of Pairing Inversion
- S. D. Galbraith, F. Hess, F. Vercauteren
- 2007/253 (PDF)
- Choosing the correct elliptic curve in the CM method
- K. Rubin, A. Silverberg
- 2007/252 (PDF)
- A Verifiable Voting Protocol based on Farnel
- Roberto Araujo, Ricardo Felipe Custodio, Jeroen van de Graaf
- 2007/251 (PDF)
- A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
- Vëronique Cortier, Ralf Kuesters, Bogdan Warinschi
- 2007/250 (PDF)
- Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
- Hongzhen Du, Qiaoyan Wen
- 2007/249 (PDF)
- Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
- Serge Fehr, Christian Schaffner
- 2007/248 (PDF)
- 1. AES seems weak. 2. Linear time secure cryptography
- Warren D. Smith
- 2007/247 (PDF)
- A Note on the Ate Pairing
- Chang-An Zhao, Fangguo Zhang, Jiwu Huang
- 2007/246 (PDF)
- BEDA: Button-Enabled Device Pairing
- Claudio Soriente, Gene Tsudik, Ersin Uzun
- 2007/245 (PDF)
- Incorporating Temporal Capabilities in Existing Key Management Schemes
- Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
- 2007/244 (PDF)
- A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
- Martin Hlavac, Tomas Rosa
- 2007/242 (PDF)
- Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
- Khoongming Khoo, Guanhan Chew, Guang Gong, Hian-Kiat Lee
- 2007/241 (PDF)
- Attribute Based Group Signature with Revocation
- Dalia Khader
- 2007/240 (PDF)
- A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
- George I. Davida, Jeremy A. Hansen
- 2007/239 (PDF)
- Making Large Hash Functions From Small Compression Functions
- William R. Speirs, Ian Molloy
- 2007/238 (PDF)
- Long-lived digital integrity using short-lived hash functions
- Stuart Haber
- 2007/237 (PDF)
- Forward-secure Key Evolution in Wireless Sensor Networks
- Marek Klonowski, Mirosław Kutyłowski, Michał Ren, Katarzyna Rybarczyk
- 2007/236 (PDF)
- Certificateless Ring Signatures
- Sherman S. M. Chow, Wun-She Yap
- 2007/235 (PDF)
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Matthew Green, Susan Hohenberger
- 2007/234 (PDF)
- Provable-Security Analysis of Authenticated Encryption in Kerberos
- Alexandra Boldyreva, Virendra Kumar
- 2007/233 (PDF)
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
- Michael Backes, Markus Duermuth, Ralf Kuesters
- 2007/231 (PDF)
- Secure Two-Party k-Means Clustering
- Paul Bunn, Rafail Ostrovsky
- 2007/230 (PDF)
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Gautham Sekar, Souradyuti Paul, Bart Preneel
- 2007/229 (PDF)
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Ueli Maurer, Stefano Tessaro
- 2007/228 (PDF)
- AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
- Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek El-Ghazawi
- 2007/227 (PDF)
- Related-Key Statistical Cryptanalysis
- Darakhshan J. Mir, Poorvi L. Vora
- 2007/226 (PDF)
- Generalized mix functions and orthogonal equitable rectangles
- Douglas R. Stinson
- 2007/225 (PDF)
- On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
- Shengli Liu, Xiaofeng Chen, Fangguo Zhang
- 2007/224 (PDF)
- A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
- Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan
- 2007/223 (PDF)
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- John Black, Martin Cochran, Thomas Shrimpton
- 2007/222 (PDF)
- Towards Security Limits in Side-Channel Attacks
- Francois-Xavier Standaert, Eric Peeters, Cedric Archambeau, Jean-Jacques Quisquater
- 2007/221 (PDF)
- Generalized Key Delegation for Hierarchical Identity-Based Encryption
- Michel Abdalla, Eike Kiltz, Gregory Neven
- 2007/220 (PDF)
- A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
- Fengjiao WANG, Yuqing ZHANG
- 2007/219 (PDF)
- A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
- Liufei Wu, Yuqing Zhang, Fengjiao Wang
- 2007/218 (PDF)
- Differential Cryptanalysis in Stream Ciphers
- Eli Biham, Orr Dunkelman
- 2007/217 (PDF)
- Identity-Based Broadcast Encryption
- Ryuichi Sakai, Jun Furukawa
- 2007/216 (PDF)
- Unlinkable Divisible Digital Cash without Trusted Third Party
- Pawel Pszona, Grzegorz Stachowiak
- 2007/215 (PDF)
- Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
- Jesper Buus Nielsen
- 2007/214 (PDF)
- Matrix Power S-Box Construction
- Eligijus Sakalauskas, Kestutis Luksys
- 2007/213 (PDF)
- Unlinkable Randomizable Signature and Its Application in Group Signature
- Sujing Zhou, Dongdai Lin
- 2007/212 (PDF)
- The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
- Andrey Khalyavin
- 2007/211 (PDF)
- Scalable Storage Scheme from Forward Key Rotation
- Chunbo Ma, Jun Ao, Jianhua Li
- 2007/209 (PDF)
- Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
- Liqun Chen, Qiang Tang
- 2007/208 (PDF)
- RC4 State Information at Any Stage Reveals the Secret Key
- Goutam Paul, Subhamoy Maitra
- 2007/207 (PDF)
- On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
- 2007/206 (PDF)
- Automatic Search of Differential Path in MD4
- Pierre-Alain Fouque, Gaetan Leurent, Phong Nguyen
- 2007/205 (PDF)
- A kilobit special number field sieve factorization
- Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen Lenstra, Dag Arne Osvik
- 2007/204 (PDF)
- Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
- Shu Yun Lim, Chuan Chin Pu, Hyo Taek Lim, Hoon Jae Lee
- 2007/203 (PDF)
- Kipnis-Shamir's Attack on HFE Revisited
- Xin Jiang, Jintai Ding, Lei Hu
- 2007/202 (PDF)
- Provable Data Possession at Untrusted Stores
- Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn Song
- 2007/201 (PDF)
- The BBG HIBE Has Limited Delegation
- Hovav Shacham
- 2007/200 (PDF)
- ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
- Philip Atzemoglou, Tal Malkin
- 2007/199 (PDF)
- A Framework for Game-Based Security Proofs
- David Nowak
- 2007/198 (PDF)
- Mutual Information Analysis -- A Universal Differential Side-Channel Attack
- Benedikt Gierlichs, Lejla Batina, Pim Tuyls
- 2007/197 (PDF)
- On-Line Ciphers and the Hash-CBC Constructions
- Mihir Bellare, Alexandra Boldyreva, Lars Knudsen, Chanathip Namprempre
- 2007/195 (PDF)
- Verifying Statistical Zero Knowledge with Approximate Implementations
- Ling Cheung, Sayan Mitra, Olivier Pereira
- 2007/194 (PDF)
- Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
- Ernie Brickell, Jiangtao Li
- 2007/193 (PDF)
- Some Identity Based Strong Bi-Designated Verifier Signature Schemes
- Sunder Lal, Vandani Verma
- 2007/192 (PDF)
- Optimal Irreducible Polynomials for GF(2^m) Arithmetic
- Michael Scott
- 2007/191 (PDF)
- Deniable Internet Key-Exchange
- Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
- 2007/190 (PDF)
- Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
- Tian Yuan
- 2007/189 (PDF)
- An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
- Meng-Hui Lim, Sanggon Lee
- 2007/188 (PDF)
- A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
- Kim-Kwang Raymond Choo
- 2007/187 (PDF)
- Executing Modular Exponentiation on a Graphics Accelerator
- Andrew Moss, Dan Page, Nigel Smart
- 2007/186 (PDF)
- Fully Anonymous Group Signatures without Random Oracles
- Jens Groth
- 2007/185 (PDF)
- New FORK-256
- Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee
- 2007/184 (PDF)
- Provable password-based tripartite key agreement protocol
- Chunbo Ma, Jun Ao, Jianhua Li
- 2007/183 (PDF)
- Provably Secure Ciphertext Policy ABE
- Ling Cheung, Calvin Newport
- 2007/182 (PDF)
- Optimistic Fair Exchange in a Multi-user Setting
- Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
- 2007/181 (PDF)
- A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
- Kwang Ho Kim, So In Kim
- 2007/180 (PDF)
- A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
- Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen
- 2007/179 (PDF)
- New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
- Kwang Ho Kim, So In Kim, Ju Song Choe
- 2007/178 (PDF)
- Utility Sampling for Trust Metrics in PKI
- Dakshi Agrawal, Charanjit Jutla
- 2007/177 (PDF)
- Space-Efficient Identity Based Encryption Without Pairings
- Dan Boneh, Craig Gentry, Michael Hamburg
- 2007/176 (PDF)
- Seven-Property-Preserving Iterated Hashing: ROX
- Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
- 2007/175 (PDF)
- Embedding Degree of Hyperelliptic Curves with Complex Multiplication
- Christian Robenhagen Ravnshoj
- 2007/174 (PDF)
- Counting hyperelliptic curves that admit a Koblitz model
- Cevahir Demirkiran, Enric Nart
- 2007/173 (PDF)
- Provable Secure Generalized Signcryption
- Xu An Wang, Xiaoyuan Yang, Yiliang Han
- 2007/172 (PDF)
- Batch Verification of Short Signatures
- Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
- 2007/171 (PDF)
- Chosen-Ciphertext Secure Proxy Re-Encryption
- Ran Canetti, Susan Hohenberger
- 2007/170 (PDF)
- Clone Resistant Mutual Authentication for Low-Cost RFID Technology
- Stephane Lemieux, Adrian Tang
- 2007/169 (PDF)
- On the Security of Protocols with Logarithmic Communication Complexity
- Michael Backes, Dominique Unruh
- 2007/168 (PDF)
- Random Oracles and Auxiliary Input
- Dominique Unruh
- 2007/167 (PDF)
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
- Yi-Ru Liu, Wen-Guey Tzeng
- 2007/166 (PDF)
- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
- Junghyun Nam
- 2007/165 (PDF)
- Inductive Proof Method for Computational Secrecy
- Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
- 2007/164 (PDF)
- Yet Another MicroArchitectural Attack: Exploiting I-cache
- Onur Aciicmez
- 2007/163 (PDF)
- Secure Deniable Authenticated Key Establishment for Internet Protocols
- Meng-Hui Lim, Sanggon Lee, Youngho Park, Sangjae Moon
- 2007/162 (PDF)
- Bingo Voting: Secure and coercion-free voting using a trusted random number generator
- Jens-Matthias Bohli, Joern Mueller-Quade, Stefan Roehrich
- 2007/161 (PDF)
- Collusion-Resistant Group Key Management Using Attribute-Based Encryption
- Ling Cheung, Joseph A. Cooley, Roger Khazan, Calvin Newport
- 2007/160 (PDF)
- Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
- Muxiang Zhang
- 2007/159 (PDF)
- Attribute Based Group Signatures
- Dalia Khader
- 2007/158 (PDF)
- A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
- Mridul Nandi
- 2007/157 (PDF)
- ConSum v0: An Experimental Cipher
- David A. Madore
- 2007/156 (PDF)
- Computational Semantics for Basic Protocol Logic - A Stochastic Approach
- Gergei Bana, Koji Hasebe, Mitsuhiro Okada
- 2007/155 (PDF)
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Jens Groth, Amit Sahai
- 2007/154 (PDF)
- Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
- Danilo Gligoroski, Svein Johan Knapskog
- 2007/153 (PDF)
- Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
- Aggelos Kiayias, Moti Yung
- 2007/152 (PDF)
- CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
- Nicolas T. Courtois
- 2007/151 (PDF)
- Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
- Tal Moran, Moni Naor, Gil Segev
- 2007/150 (PDF)
- Generators of Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshoj
- 2007/149 (PDF)
- Towards Generating Secure Keys for Braid Cryptography
- Ki Hyoung Ko, Jang Won Lee, Tony Thomas
- 2007/148 (PDF)
- Practical Compact E-Cash
- Man Ho Au, Willy Susilo, Yi Mu
- 2007/147 (PDF)
- Using decision problems in public key cryptography
- Vladimir Shpilrain, Gabriel Zapata
- 2007/146 (PDF)
- Time Capsule Signature: Efficient and Provably Secure Constructions
- Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng
- 2007/145 (PDF)
- Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
- Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
- 2007/144 (PDF)
- Two New Examples of TTM
- T. Moh
- 2007/143 (PDF)
- Offline/Online Mixing
- Ben Adida, Douglas Wikström
- 2007/142 (PDF)
- An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
- Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
- 2007/141 (PDF)
- Practical Cryptanalysis of SFLASH
- Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern
- 2007/140 (PDF)
- Hidden Identity-Based Signatures
- Aggelos Kiayias, Hong-Sheng Zhou
- 2007/139 (PDF)
- The Delivery and Evidences Layer
- Amir Herzberg, Igal Yoffe
- 2007/138 (PDF)
- Efficient Pairing Computation on Curves
- Rongquan Feng, Hongfeng Wu
- 2007/137 (PDF)
- Multivariates Polynomials for Hashing
- Jintai Ding, Bo-yin Yang
- 2007/135 (PDF)
- Efficient ID-based Signature Without Trusted PKG
- Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang
- 2007/134 (PDF)
- Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
- Osman Kocar
- 2007/133 (PDF)
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Helger Lipmaa
- 2007/132 (PDF)
- Equivocal Blind Signatures and Adaptive UC-Security
- Aggelos Kiayias, Hong-Sheng Zhou
- 2007/131 (PDF)
- Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
- Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
- 2007/130 (PDF)
- Some Results on Anonymity in Hybrid Encryption
- Tian Yuan, Chen Zhi-Yu, Jin Yuee, Jin Feng, Ma Huihui
- 2007/129 (PDF)
- An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
- Cameron McDonald, Chris Charnes, Josef Pieprzyk
- 2007/128 (PDF)
- Computationally Sound Mechanized Proofs of Correspondence Assertions
- Bruno Blanchet
- 2007/127 (PDF)
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
- 2007/126 (PDF)
- An Interesting Member ID-based Group Signature
- Sujing Zhou, Dongdai Lin
- 2007/125 (PDF)
- Attacking the IPsec Standards in Encryption-only Configurations
- Jean Paul Degabriele, Kenneth G. Paterson
- 2007/124 (PDF)
- Rebuttal of overtaking VEST
- Benjamin Gittins, Howard Landman
- 2007/123 (PDF)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Berkant Ustaoglu
- 2007/122 (PDF)
- On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
- Qiang Tang
- 2007/121 (PDF)
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Alexander W. Dent, Benoit Libert, Kenneth G. Paterson
- 2007/120 (PDF)
- Breaking 104 bit WEP in less than 60 seconds
- Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
- 2007/119 (PDF)
- Rerandomizable RCCA Encryption
- Manoj Prabhakaran, Mike Rosulek
- 2007/118 (PDF)
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- Shai Halevi, Yael Tauman Kalai
- 2007/117 (PDF)
- Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
- Sihem Mesnager
- 2007/116 (PDF)
- A Zero-Knowledge Identification and Key Agreement Protocol
- D. R. Stinson, J. Wu
- 2007/115 (PDF)
- Quadratic Almost Perfect Nonlinear Functions With Many Terms
- Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
- 2007/114 (PDF)
- High Efficiency Feedback Shift Register: $\sigma-$LFSR
- Guang Zeng, Wenbao Han, Kaicheng He
- 2007/113 (PDF)
- An Enhanced ID-based Deniable Authentication Protocol on Pairings
- Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee
- 2007/112 (PDF)
- Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
- Koh-ichi Nagao
- 2007/111 (PDF)
- Privacy-Preserving Distributed Set Intersection
- Qingsong Ye, Huaxiong Wang, Christophe Tartary
- 2007/110 (PDF)
- Construction of Pairing-Friendly Elliptic Curves
- Woo Sug Kang
- 2007/109 (PDF)
- How to Enrich the Message Space of a Cipher
- Thomas Ristenpart, Phillip Rogaway
- 2007/108 (PDF)
- An Improved Distinguisher for Dragon
- Joo Yeon Cho, Josef Pieprzyk
- 2007/107 (PDF)
- Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
- Yasuyuki MURAKAMI, Takeshi NASAKO
- 2007/106 (PDF)
- A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
- Masao KASAHARA
- 2007/105 (PDF)
- Isodual Reduction of Lattices
- Nicholas A. Howgrave-Graham
- 2007/104 (PDF)
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
- 2007/103 (PDF)
- Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
- Roberto Avanzi
- 2007/102 (PDF)
- On the Role of Scheduling in Simulation-Based Security
- Ran Canetti, Ling Cheung, Nancy Lynch, Olivier Pereira
- 2007/101 (PDF)
- Practical Password Recovery on an MD5 Challenge and Response
- Yu Sasaki, Go Yamamoto, Kazumaro Aoki
- 2007/100 (PDF)
- Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
- Shengbao Wang, Zhenfu Cao
- 2007/099 (PDF)
- Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
- Jaime Gutierrez, Alvar Ibeas
- 2007/098 (PDF)
- Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
- Lilya Budaghyan, Claude Carlet
- 2007/097 (PDF)
- Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshøj
- 2007/096 (PDF)
- Somos Sequence Near-Addition Formulas and Modular Theta Functions
- R. Wm. Gosper, Rich Schroeppel
- 2007/095 (PDF)
- Generic Certificateless Encryption in the Standard Model
- Qiong Huang, Duncan S. Wong
- 2007/094 (PDF)
- Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
- Xavier Boyen
- 2007/093 (PDF)
- HAPADEP: Human Asisted Pure Audio Device Pairing
- Claudio Soriente, Gene Tsudik, Ersin Uzun
- 2007/092 (PDF)
- PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
- Grzegorz Wojtenko
- 2007/091 (PDF)
- Arithmetic Operators for Pairing-Based Cryptography
- Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto
- 2007/089 (PDF)
- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
- Ueli Maurer, Dominik Raub
- 2007/088 (PDF)
- An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
- Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
- 2007/087 (PDF)
- Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
- Jie Liu, Jianhua Li
- 2007/086 (PDF)
- Non-Interactive Proofs for Integer Multiplication
- Ivan Damgard, Rune Thorbek
- 2007/085 (PDF)
- MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- Hongbo Yu, Xiaoyun Wang
- 2007/084 (PDF)
- Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
- Sanjit Chatterjee, Palash Sarkar
- 2007/083 (PDF)
- Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
- Brett Hemenway, Rafail Ostrovsky
- 2007/082 (PDF)
- Deniable Authentication on the Internet
- Shaoquan Jiang
- 2007/081 (PDF)
- Revisiting an Efficient Elliptic Curve Key Agreement Protocol
- Maurizio Adriano Strangio
- 2007/079 (PDF)
- How To Find Many Collisions of 3-Pass HAVAL
- Kazuhiro Suzuki, Kaoru Kurosawa
- 2007/078 (PDF)
- MPC vs. SFE: Perfect Security in a Unified Corruption Model
- Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
- 2007/076 (PDF)
- Almost Secure (1-Round, n-Channel) Message Transmission Scheme
- Kaoru Kurosawa, Kazuhiro Suzuki
- 2007/075 (PDF)
- Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
- Gautham Sekar, Souradyuti Paul, Bart Preneel
- 2007/074 (PDF)
- A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
- Hovav Shacham
- 2007/073 (PDF)
- Public Key Encryption that Allows PIR Queries
- Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
- 2007/071 (PDF)
- Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
- Ahto Buldas, Sven Laur
- 2007/070 (PDF)
- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
- Alexander Maximov
- 2007/069 (PDF)
- Nominative Signature: Application, Security Model and Construction
- Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
- 2007/066 (PDF)
- Low-Density Attack Revisited
- Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
- 2007/065 (PDF)
- How to Derive Lower Bound on Oblivious Transfer Reduction
- Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
- 2007/064 (PDF)
- Algebraic Lower Bounds for Computing on Encrypted Data
- Rafail Ostrovsky, William E. Skeith III
- 2007/063 (PDF)
- Constructing new APN functions from known ones
- Lilya Budaghyan, Claude Carlet, Gregor Leander
- 2007/062 (PDF)
- Algebraic and Slide Attacks on KeeLoq
- Nicolas T. Courtois, Gregory V. Bard, David Wagner
- 2007/061 (PDF)
- Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
- Neil Costigan, Michael Scott
- 2007/060 (PDF)
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Yonatan Aumann, Yehuda Lindell
- 2007/059 (PDF)
- A Survey of Single Database PIR: Techniques and Applications
- Rafail Ostrovsky, William E. Skeith III
- 2007/058 (PDF)
- The simplest method for constructing APN polynomials EA-inequivalent to power functions
- Lilya Budaghyan
- 2007/057 (PDF)
- Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
- David Freeman
- 2007/056 (PDF)
- Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
- Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney
- 2007/055 (PDF)
- Cryptanalysis of the KeeLoq block cipher
- Andrey Bogdanov
- 2007/054 (PDF)
- Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
- Souradyuti Paul
- 2007/053 (PDF)
- Compiler Assisted Elliptic Curve Cryptography
- M. Barbosa, A. Moss, D. Page
- 2007/052 (PDF)
- Forward-Secure Sequential Aggregate Authentication
- Di Ma, Gene Tsudik
- 2007/051 (PDF)
- Forward-secure RFID Authentication and Key Exchange
- Tri van Le, Mike Burmester, Breno de Medeiros
- 2007/050 (PDF)
- Special block cipher family DN and new generation SNMAC-type hash function family HDN
- Vlastimil KLIMA
- 2007/049 (PDF)
- Security Arguments for a Class of ID-based Signatures
- jin zhou, ya-juan zhang, yue-fei zhu
- 2007/048 (PDF)
- A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
- Daniel R. L. Brown, Kristian Gjøsteen
- 2007/047 (PDF)
- New Constructions of Fuzzy Identity-Based Encryption
- Joonsang Baek, Willy Susilo, Jianying Zhou
- 2007/046 (PDF)
- Direct Reduction of String (1,2)-OT to Rabin's OT
- Kaoru Kurosawa, Takeshi Koshiba
- 2007/045 (PDF)
- A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
- 2007/044 (PDF)
- Design and Primitive Specification for Shannon
- Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory Rose, Miriam Wiggers de Vries
- 2007/043 (PDF)
- Reflection Attacks on Product Ciphers
- Orhun Kara
- 2007/042 (PDF)
- Authorship Proof for Textual Document
- J. Wu, D. R. Stinson
- 2007/041 (PDF)
- Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
- B. Skoric, S. Katzenbeisser, M. U. Celik
- 2007/040 (PDF)
- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
- Pradeep Kumar Mishra, Vassil Dimitrov
- 2007/039 (PDF)
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Onur Aciicmez, Shay Gueron, Jean-Pierre Seifert
- 2007/038 (PDF)
- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
- Joo Yeon Cho, Josef Pieprzyk
- 2007/037 (PDF)
- Best Quadratic Approximations of Cubic Boolean Functions
- Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
- 2007/036 (PDF)
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Eike Kiltz
- 2007/035 (PDF)
- Cryptanalysis of white box DES implementations
- Louis Goubin, Jean-Michel Masereel, Michael Quisquater
- 2007/034 (PDF)
- A New Type of Cipher: DICING_CSB
- Li An-Ping
- 2007/033 (PDF)
- From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
- Eike Kiltz
- 2007/032 (PDF)
- An improved collision probability for CBC-MAC and PMAC
- Avradip Mandal, Mridul Nandi
- 2007/031 (PDF)
- Improved Security Analysis of PMAC
- Mridul Nandi, Avradip Mandal
- 2007/030 (PDF)
- Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
- Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
- 2007/029 (PDF)
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Debrup Chakraborty, Palash Sarkar
- 2007/028 (PDF)
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Debrup Chakraborty, Palash Sarkar
- 2007/026 (PDF)
- Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
- Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang
- 2007/025 (PDF)
- Private Locally Decodable Codes
- Rafail Ostrovsky, Omkant Pandey, Amit Sahai
- 2007/024 (PDF)
- Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
- Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson.
- 2007/023 (PDF)
- Efficient Hybrid Encryption from ID-Based Encryption
- Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz
- 2007/022 (PDF)
- On Perfectly Balanced Boolean Functions
- O. A. Logachev
- 2007/021 (PDF)
- Two Trivial Attacks on Trivium
- Alexander Maximov, Alex Biryukov
- 2007/020 (PDF)
- TinyTate: Identity-Based Encryption for Sensor Networks
- Leonardo B. Oliveira, Diego Aranha, Eduardo Morais, Felipe Daguano, Julio Lo'pez, Ricardo Dahab
- 2007/019 (PDF)
- Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
- Changshe Ma, Jian Weng, Dong Zheng
- 2007/018 (PDF)
- Strongly-Secure Identity-based Key Agreement and Anonymous Extension
- Sherman S. M. Chow, Kim-Kwang Raymond Choo
- 2007/017 (PDF)
- Group Decryption
- Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang
- 2007/015 (PDF)
- Group Encryption
- Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
- 2007/014 (PDF)
- Invertible Universal Hashing and the TET Encryption Mode
- Shai Halevi
- 2007/013 (PDF)
- Optimised versions of the Ate and Twisted Ate Pairings
- Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
- 2007/012 (PDF)
- Interactive two-channel message authentication based on interactive-collision Resistant hash functions
- Atefeh Mashatan, Douglas R. Stinson
- 2007/011 (PDF)
- Universally Composable Key-evolving Signature
- Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
- 2007/010 (PDF)
- Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
- David Freeman, Kristin Lauter
- 2007/009 (PDF)
- New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
- Zhenfu Cao, Xiaolei Dong, Licheng Wang
- 2007/008 (PDF)
- Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
- Dong Hoon Lee, Je Hong Park, Jaewoo Han
- 2007/007 (PDF)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- Wei Gao, Xueli Wang, Guilin Wang, Fei Li
- 2007/006 (PDF)
- Efficient Dynamic k-Times Anonymous Authentication
- Lan Nguyen
- 2007/005 (PDF)
- Privacy-Protecting Coupon System Revisited
- Lan Nguyen
- 2007/004 (PDF)
- Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
- Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
- 2007/003 (PDF)
- The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
- Johann Groszschaedl, Alexander Szekely, Stefan Tillich
- 2007/001 (PDF)
- Families of genus 2 curves with small embedding degree
- Laura Hitt
[ Cryptology ePrint archive]