Cryptology ePrint Archive: Listing for 2008
Regex
2008/545 (PDF ) Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal, Amit Sahai
2008/544 (PDF ) Comments on two multi-server authentication protocols Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2008/543 (PDF ) Odd-Char Multivariate Hidden Field Equations Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, Bo-Yin Yang
2008/542 (PDF ) Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
2008/541 (PDF ) Resettably-Sound Resettable Zero Knowledge Arguments for NP Yi Deng
2008/540 (PDF ) New Impossible Differential Attacks on AES Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
2008/539 (PDF ) An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
2008/538 (PDF ) Supporting Non-membership Proofs with Bilinear-map Accumulators Ivan Damgård, Nikos Triandopoulos
2008/537 (PDF ) A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai
2008/536 (PDF ) Predicate Privacy in Encryption Systems Emily Shen, Elaine Shi, Brent Waters
2008/535 (PDF ) A Recursive Threshold Visual Cryptography Scheme Abhishek Parakh, Subhash Kak
2008/534 (PDF ) Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
2008/533 (PDF ) Collusion-Free Multiparty Computation in the Mediated Model Jonathan Katz, Yehuda Lindell
2008/532 (PDF ) Semi-free start collision attack on Blender Xu Liangyu, Li Ji
2008/531 (PDF ) Collision Attack on the Waterfall Hash Function Scott Fluhrer
2008/530 (PDF ) Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/529 (PDF ) A Hardware Interface for Hashing Algorithms Zhimin Chen, Sergey Morozov, Patrick Schaumont
2008/528 (PDF ) Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures Georg Fuchsbauer, David Pointcheval
2008/527 (PDF ) Properties of Cryptographic Hash Functions Michal Rjaško
2008/526 (PDF ) Novel Precomputation Schemes for Elliptic Curve Cryptosystems Patrick Longa, Catherine Gebotys
2008/525 (PDF ) On The Diffie-Hellman Assumption R. Bhaskar, K. Chandrasekaran, S. Lokam, P. L. Montgomery, R. Venkatesan, Y. Yacobi
2008/524 (PDF ) Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li Hongda, Feng dengguo, Li Bao, Xue Haixia
2008/522 (PDF ) Twisted Edwards Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2008/521 (PDF ) Generating Shorter Bases for Hard Random Lattices Joel Alwen, Chris Peikert
2008/520 (PDF ) Cryptanalysis of the Hash Function LUX-256 Shuang Wu, Dengguo Feng, Wenling Wu
2008/519 (PDF ) Collision attack on NaSHA-512 Li Ji, Xu Liangyu, Guan Xu
2008/517 (PDF ) Improving the Rules of the DPA Contest Francois-Xavier Standaert, Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon
2008/516 (PDF ) Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang
2008/515 (PDF ) Cryptanalysis of RadioGatun Thomas Fuhr, Thomas Peyrin
2008/514 (PDF ) Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security Tapan Rai, Stanislav Bulygin
2008/513 (PDF ) Improved Cryptanalysis of SHAMATA-BC Adem Atalay, Orhun Kara, Ferhat Karakoç
2008/512 (PDF ) A new class of Bent functions in Polynomial Forms Sihem Mesnager
2008/511 (PDF ) Classification of the SHA-3 Candidates Ewan Fleischmann, Christian Forler, Michael Gorski
2008/510 (PDF ) Reconstructing RSA Private Keys from Random Key Bits Nadia Heninger, Hovav Shacham
2008/509 (PDF ) Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xuan Wang
2008/508 (PDF ) Some Formal Solutions in Side-channel Cryptanalysis - An Introduction Fabrice J. P. R. Pautot
2008/507 (PDF ) A non-delegatable identity-based strong designated verifier signature scheme Bin Wang
2008/506 (PDF ) Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/505 (PDF ) --Withdrawn-- removed
2008/504 (PDF ) The $n^c$-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky
2008/503 (PDF ) Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets Yevgeniy Dodis, Daniel Wichs
2008/502 (PDF ) Extended Access Structures and Their Cryptographic Applications Vanesa Daza, Javier Herranz, Paz Morillo, Carla Rafols
2008/501 (PDF ) Some Observations on SHAMATA Ewan Fleischmann, Michael Gorski
2008/500 (PDF ) Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang, Zhenfu Cao
2008/499 (PDF ) Some Observations on HC-128 Subhamoy Maitra, Goutam Paul, Shashwat Raizada
2008/498 (PDF ) Small Odd Prime Field Multivariate PKCs Anna Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Kuo, Frost Li, Bo-Yin Yang
2008/497 (PDF ) On the Correctness of An Approach Against Side-channel attacks Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
2008/496 (PDF ) Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Debra L. Cook, Moti Yung, Angelos Keromytis
2008/495 (PDF ) Non-Malleable Obfuscation Ran Canetti, Mayank Varia
2008/494 (PDF ) Key Agreement from Close Secrets over Unsecured Channels Bhavana Kanukurthi, Leonid Reyzin
2008/493 (PDF ) Secure Parameters for SWIFFT Johannes Buchmann, Richard Lindner
2008/492 (PDF ) Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch, Olivier Pereira
2008/491 (PDF ) A CM construction for curves of genus 2 with p-rank 1 Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, Marco Streng
2008/490 (PDF ) On the final exponentiation for calculating pairings on ordinary elliptic curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, Ezekiel J. Kachisa
2008/489 (PDF ) HAIL: A High-Availability and Integrity Layer for Cloud Storage Kevin D. Bowers, Ari Juels, Alina Oprea
2008/488 (PDF ) Efficient Rational Secret Sharing in Standard Communication Networks Georg Fuchsbauer, Jonathan Katz, David Naccache
2008/487 (PDF ) Secure Certificateless Public Key Encryption without Redundancy Yinxia Sun, Futai Zhang
2008/486 (PDF ) Inside the Hypercube Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
2008/484 (PDF ) Sharp lower bounds on the extractable randomness from non-uniform sources Boris Skoric, Chibuzo Obi, Evgeny Verbitskiy, Berry Schoenmakers
2008/483 (PDF ) Sharing DSS by the Chinese Remainder Theorem Kamer Kaya, Ali Aydın Selçuk
2008/482 (PDF ) The Generic Hardness of Subset Membership Problems under the Factoring Assumption Tibor Jager, Jörg Schwenk
2008/481 (PDF ) Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem Chris Peikert
2008/480 (PDF ) ECM on Graphics Cards Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
2008/479 (PDF ) Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
2008/478 (PDF ) Attribute-Based Encryption with Key Cloning Protection M. J. Hinek, S. Jiang, R. Safavi-Naini, S. F. Shahandashti
2008/477 (PDF ) On a New Formal Proof Model for RFID Location Privacy (Extended Version) Ton van Deursen, Sasa Radomirovic
2008/476 (PDF ) The $F_f$-Family of Protocols for RFID-Privacy and Authentication Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa
2008/475 (PDF ) Sphinx: A Compact and Provably Secure Mix Format George Danezis, Ian Goldberg
2008/474 (PDF ) Access Controls for Oblivious and Anonymous Systems Scott Coull, Matthew Green, Susan Hohenberger
2008/473 (PDF ) Exploring Cipherspace: Combining stream ciphers and block ciphers Sandy Harris
2008/472 (PDF ) Practical attacks against WEP and WPA Martin Beck, Erik Tews
2008/471 (PDF ) Automatic Generation of Sound Zero-Knowledge Protocols Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2008/470 (PDF ) From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol Paolo D'Arco, Alfredo De Santis
2008/469 (PDF ) Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1 Stephane Manuel
2008/468 (PDF ) A CCA2 Secure Variant of the McEliece Cryptosystem Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/467 (PDF ) Cryptanalysis of EnRUPT Dmitry Khovratovich, Ivica Nikolic
2008/466 (PDF ) Combined (identity-based) public key schemes Maria Isabel Gonzalez Vasco, Florian Hess, Rainer Steinwandt
2008/465 (PDF ) Secure Arithmetic Computation with No Honest Majority Yuval Ishai, Manoj Prabhakaran, Amit Sahai
2008/464 (PDF ) Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication Michael Kounavis, Shay Gueron
2008/463 (PDF ) Key-Private Proxy Re-Encryption Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
2008/462 (PDF ) Unconditionally Secure Multiparty Set Intersection Re-Visited Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/460 (PDF ) Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
2008/459 (PDF ) A variant of Wiener's attack on RSA Andrej Dujella
2008/458 (PDF ) Complete Fairness in Multi-Party Computation Without an Honest Majority S. Dov Gordon, Jonathan Katz
2008/457 (PDF ) On the Composability of Statistically Secure Bit Commitments Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/456 (PDF ) The Diffie-Hellman problem and generalization of Verheul's theorem Dustin Moody
2008/455 (PDF ) New hash function designs Igor Semaev
2008/454 (PDF ) Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2008/453 (PDF ) Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification Ahmad-Reza Sadeghi, Thomas Schneider
2008/451 (PDF ) Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
2008/450 (PDF ) On the Security of Fully Collusion Resistant Traitor Tracing Schemes Yongdong WU, Robert H. Deng
2008/449 (PDF ) A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
2008/448 (PDF ) Authenticated Adversarial Routing Yair Amir, Paul Bunn, Rafail Ostrovsky
2008/447 (PDF ) Divisible On-line/Off-line Signatures Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
2008/446 (PDF ) Secure Random Key Pre-Distribution Against Semi-Honest Adversaries Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban
2008/445 (PDF ) Cryptanalysis of the Improved Cellular Message Encryption Algorithm Thomas Chardin, Raphaël Marinier
2008/444 (PDF ) Elliptic divisibility sequences and the elliptic curve discrete logarithm problem Rachel Shipsey, Christine Swart
2008/443 (PDF ) Key differentiation attacks on stream ciphers Enes Pasalic
2008/442 (PDF ) Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography Anton Kargl, Stefan Pyka, Hermann Seuschek
2008/441 (PDF ) How Risky is the Random-Oracle Model? Gaetan Leurent, Phong Q. Nguyen
2008/440 (PDF ) Robust Encryption Michel Abdalla, Mihir Bellare, Gregory Neven
2008/439 (PDF ) Linear equivalence between elliptic curves in Weierstrass and Hesse form Alexander Rostovtsev
2008/438 (PDF ) New Related-Key Boomerang Attacks on AES Michael Gorski, Stefan Lucks
2008/437 (PDF ) Divisibility, Smoothness and Cryptographic Applications David Naccache, Igor Shparlinski
2008/435 (PDF ) Obtaining and solving systems of equations in key variables only for the small variants of AES Stanislav Bulygin, Michael Brickenstein
2008/434 (PDF ) The computational SLR: a logic for reasoning about computational indistinguishability Yu Zhang
2008/433 (PDF ) On differences of quadratic residues Guillermo Morales-Luna
2008/432 (PDF ) Dynamic Provable Data Possession C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou, Roberto Tamassia
2008/431 (PDF ) Usable Optimistic Fair Exchange Alptekin Kupcu, Anna Lysyanskaya
2008/430 (PDF ) Cryptographic Protocol Composition via the Authentication Tests Joshua D. Guttman
2008/429 (PDF ) Public-Key Encryption with Efficient Amortized Updates Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
2008/428 (PDF ) Delegatable Anonymous Credentials Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham
2008/427 (PDF ) LEGO for Two Party Secure Computation Jesper Buus Nielsen, Claudio Orlandi
2008/426 (PDF ) On Kasami Bent Functions Deepmala Sharma, Sugata Gangopadhyay
2008/425 (PDF ) Efficient Asynchronous Multiparty Computation with Optimal Resilience Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/424 (PDF ) Asynchronous Byzantine Agreement with Optimal Resilience Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/423 (PDF ) Searchable encryption with decryption in the standard model Dennis Hofheinz, Enav Weinreb
2008/422 (PDF ) A New Approach for Algebraically Homomorphic Encryption Frederik Armknecht, Ahmad-Reza Sadeghi
2008/421 (PDF ) Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme Kaoru Kurosawa, Kazuhiro Suzuki
2008/420 (PDF ) Oblivious Transfer from Weak Noisy Channels Jürg Wullschleger
2008/419 (PDF ) Parsing ambiguities in authentication and key establishment protocols Liqun Chen, Chris J. Mitchell
2008/418 (PDF ) Privacy-Enhancing First-Price Auctions Using Rational Cryptography Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos
2008/417 (PDF ) On the security of pairing-friendly abelian varieties over non-prime fields Naomi Benger, Manuel Charlemagne, David Freeman
2008/416 (PDF ) Almost-Asynchronous MPC with Faulty Minority Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
2008/415 (PDF ) Asynchronous Multiparty Computation: Theory and Implementation Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
2008/414 (PDF ) On the Number of Synchronous Rounds Required for Byzantine Agreement Matthias Fitzi, Jesper Buus Nielsen
2008/413 (PDF ) Password Mistyping in Two-Factor-Authenticated Key Exchange Vladimir Kolesnikov, Charles Rackoff
2008/412 (PDF ) Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2008/411 (PDF ) Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen
2008/410 (PDF ) On the Role of PKG for Proxy Re-encryption in Identity Based Setting Xu an Wang, Xiaoyuan Yang, Fagen Li
2008/409 (PDF ) A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
2008/408 (PDF ) The Enigmatique Toolkit Christopher Billings
2008/407 (PDF ) Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/406 (PDF ) An asymptotically optimal RFID protocol against relay attacks Gildas Avoine, Aslan Tchamkerten
2008/405 (PDF ) Slid Pairs in Salsa20 and Trivium Deike Priemuth-Schmid, Alex Biryukov
2008/404 (PDF ) Pairing with Supersingular Trace Zero Varieties Revisited Emanuele Cesena
2008/403 (PDF ) SPICE Simulation of a "Provably Secure" True Random Number Generator Markus Dichtl, Bernd Meyer, Hermann Seuschek
2008/402 (PDF ) Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages Jean-Charles Faugère, Ludovic Perret
2008/401 (PDF ) Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC Mridul Nandi
2008/400 (PDF ) Comments on two password based protocols Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou
2008/399 (PDF ) Round Efficient Unconditionally Secure Multiparty Computation Protocol Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/398 (PDF ) Generating genus two hyperelliptic curves over large characteristic finite fields Takakazu Satoh
2008/396 (PDF ) Analysis of RC4 and Proposal of Additional Layers for Better Security Margin Subhamoy Maitra, Goutam Paul
2008/395 (PDF ) New Applications of Differential Bounds of the SDS Structure Jiali Choy, Khoongming Khoo
2008/394 (PDF ) Attribute-Based Ring Signatures Jin Li, Kwangjo Kim
2008/393 (PDF ) How Far Must You See To Hear Reliably Pranav K Vasishta, Anuj Gupta, Prasant Gopal, Piyush Bansal, Rishabh Mukherjee, Poornima M, Kannan Srinathan, Kishore Kothapalli
2008/392 (PDF ) GUC-Secure Set-Intersection Computation TIAN Yuan, WANG Ying
2008/391 (PDF ) Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? Tao Xie, FanBao Liu, DengGuo Feng
2008/390 (PDF ) Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift Ann Hibner Koblitz, Neal Koblitz, Alfred Menezes
2008/389 (PDF ) Optimal Subset-Difference Broadcast Encryption with Free Riders Murat Ak, Kamer Kaya, Ali Aydin Selcuk
2008/388 (PDF ) Double-Base Number System for Multi-Scalar Multiplications Christophe Doche, David R. Kohel, Francesco Sica
2008/386 (PDF ) Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table Michael Lifliand
2008/385 (PDF ) Cube Attacks on Tweakable Black Box Polynomials Itai Dinur, Adi Shamir
2008/384 (PDF ) Improving the Boneh-Franklin Traitor Tracing Scheme Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
2008/383 (PDF ) Hierarchical Identity Based Encryption with Polynomially Many Levels Craig Gentry, Shai Halevi
2008/382 (PDF ) Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure, Jean-Jacques Quisquater
2008/381 (PDF ) New AES software speed records Daniel J. Bernstein, Peter Schwabe
2008/380 (PDF ) Dynamic Threshold Cryptosystem without Group Manager Andreas Noack, Stefan Spitz
2008/379 (PDF ) A Characterization of Chameleon Hash Functions and New, Efficient Designs Mihir Bellare, Todor Ristov
2008/378 (PDF ) Additively Homomorphic Encryption with d-Operand Multiplications Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
2008/377 (PDF ) TRIVIUM's output partially autocancels Michael Vielhaber
2008/376 (PDF ) Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol Cas J. F. Cremers
2008/375 (PDF ) A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks Jan Camenisch, Nishanth Chandran, Victor Shoup
2008/374 (PDF ) Chosen Ciphertext Security with Optimal Ciphertext Overhead Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
2008/373 (PDF ) Analysis and Improvement of Authenticatable Ring Signcryption Scheme Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2008/372 (PDF ) Enumeration of Balanced Symmetric Functions over GF(p) Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
2008/371 (PDF ) Unconditionally Reliable Message Transmission in Directed Hypergraphs Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008/370 (PDF ) Compartmented Threshold RSA Based on the Chinese Remainder Theorem Sorin Iftene, Stefan Ciobaca, Manuela Grindei
2008/369 (PDF ) New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers Shahram Khazaei, Willi Meier
2008/368 (PDF ) Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting Varad Kirtane, C. Pandu Rangan
2008/367 (PDF ) Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library Peeter Laud, Long Ngo
2008/366 (PDF ) Unique Shortest Vector Problem for max norm is NP-hard Than Quang Khoat, Nguyen Hong Tan
2008/365 (PDF ) Entropy Bounds for Traffic Confirmation Luke O'Connor
2008/364 (PDF ) Zcipher Algorithm Specification Ilya O Levin
2008/363 (PDF ) An argument for Hamiltonicity Vadym Fedyukovych
2008/362 (PDF ) The Cost of False Alarms in Hellman and Rainbow Tradeoffs Jin Hong
2008/360 (PDF ) An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES) Saurabh Dutta, Jyotsna Kumar mandal
2008/359 (PDF ) Argument of knowledge of a bounded error Vadym Fedyukovych
2008/358 (PDF ) History-Independent Cuckoo Hashing Moni Naor, Gil Segev, Udi Wieder
2008/357 (PDF ) A protocol for K-multiple substring matching Vadym Fedyukovych, Vitaliy Sharapov
2008/356 (PDF ) Using Commutative Encryption to Share a Secret Saied Hosseini Khayat
2008/355 (PDF ) An argument for rank metric Vadym Fedyukovych
2008/353 (PDF ) Weaknesses in HENKOS Stream Cipher Prasanth Kumar Thandra, S. A. V. Satya Murty, R Balasubramanian
2008/352 (PDF ) On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles Alexandra Boldyreva, Serge Fehr, Adam O'Neill
2008/351 (PDF ) Flaws in Some Self-Healing Key Distribution Schemes with Revocation Vanesa Daza, Javier Herranz, German Saez
2008/350 (PDF ) Higher Order Differential Cryptanalysis of Multivariate Hash Functions Yiyuan Luo, Xuejia Lai
2008/349 (PDF ) Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf
2008/348 (PDF ) Iterative Probabilistic Reconstruction of RC4 Internal States Jovan Golic, Guglielmo Morgari
2008/347 (PDF ) Information Leakage in Optimal Anonymized and Diversified Data Chengfang Fang, Ee-Chien Chang
2008/346 (PDF ) Remote Integrity Check with Dishonest Storage Server Ee-Chien Chang, Jia Xu
2008/345 (PDF ) An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction Jooyoung Lee, Choon Sik Park
2008/344 (PDF ) Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption Jooyoung Lee, Je Hong Park
2008/343 (PDF ) Efficient RFID authentication protocols based on pseudorandom sequence generators Jooyoung Lee, Yongjin Yeom
2008/342 (PDF ) Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, Pandu Rangan Chandrasekaran
2008/341 (PDF ) An Efficient Identity-Based Signcryption Scheme for Multiple Receivers S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/339 (PDF ) High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog
2008/338 (PDF ) An improvement of discrete Tardos fingerprinting codes Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai
2008/337 (PDF ) Modified Huang-Wang's Convertible Nominative Signature Scheme Wei Zhao, Dingfeng Ye
2008/336 (PDF ) New attacks on ISO key establishment protocols Anish Mathuria, G. Sriram
2008/335 (PDF ) Public Key Cryptography from Different Assumptions Boaz Barak, Avi Wigderson
2008/334 (PDF ) Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields Darrel Hankerson, Koray Karabina, Alfred Menezes
2008/333 (PDF ) Explicit hard instances of the shortest vector problem Johannes Buchmann, Richard Lindner, Markus Rückert, Michael Schneider
2008/332 (PDF ) Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications Mahalingam Ramkumar
2008/331 (PDF ) A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar
2008/329 (PDF ) SMS4 Encryption Algorithm for Wireless Networks Whitfield Diffie, George Ledin (translators)
2008/328 (PDF ) Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance Hemanta Maji, Manoj Prabhakaran, Mike Rosulek
2008/327 (PDF ) Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption Le Trieu Phong, Wakaha Ogata
2008/326 (PDF ) Two attacks on a sensor network key distribution scheme of Cheng and Agrawal M. B. Paterson, D. R. Stinson
2008/325 (PDF ) Revisit of Group-based Unidirectional Proxy Re-encryption Scheme Chunbo Ma, Jun Ao
2008/324 (PDF ) RSA-TBOS Signcryption with Proxy Re-encryption. Varad Kirtane, C. Pandu Rangan
2008/323 (PDF ) A new identity based proxy signature scheme Bin Wang
2008/322 (PDF ) Lattice-based Blind Signatures Markus Rückert
2008/321 (PDF ) A correction to ``Efficient and Secure Comparison for On-Line Auctions'' Ivan Damgård, Martin Geisler, Mikkel Krøigaard
2008/320 (PDF ) Public Key Block Cipher Based on Multivariate Quadratic Quasigroups Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
2008/319 (PDF ) Yet Another Secure Distance-Bounding Protocol Ventzislav Nikov, Marc Vauclair
2008/318 (PDF ) Attacking and defending the McEliece cryptosystem Daniel J. Bernstein, Tanja Lange, Christiane Peters
2008/316 (PDF ) Signing a Linear Subspace: Signature Schemes for Network Coding Dan Boneh, David Freeman, Jonathan Katz, Brent Waters
2008/315 (PDF ) RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar
2008/314 (PDF ) Scratch, Click & Vote: E2E voting over the Internet Miroslaw Kutylowski, Filip Zagorski
2008/313 (PDF ) A new almost perfect nonlinear function which is not quadratic Yves Edel, Alexander Pott
2008/312 (PDF ) Improved efficiency of Kiltz07-KEM Xianhui Lu, Xuejia Lai, Dake He
2008/311 (PDF ) Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers Orr Dunkelman, Nathan Keller
2008/310 (PDF ) Attacks on RFID Protocols T. van Deursen, S. Radomirovic
2008/309 (PDF ) Revocation Systems with Very Small Private Keys Allison Lewko, Amit Sahai, Brent Waters
2008/308 (PDF ) Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
2008/307 (PDF ) Full Security:Fuzzy Identity Based Encryption Liming Fang, Jinyue Xia
2008/306 (PDF ) Combinatorial batch codes M. B. Paterson, D. R. Stinson, R. Wei
2008/305 (PDF ) Identity-Based Directed Signature Scheme from Bilinear Pairings Xun Sun, Jian-hua Li, Gong-liang Chen, Shu-tang Yang
2008/304 (PDF ) A New Randomness Extraction Paradigm for Hybrid Encryption Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
2008/303 (PDF ) Complete Fairness in Secure Two-Party Computation S. Dov Gordon, Carmit Hazay, Jonathan Katz, Yehuda Lindell
2008/302 (PDF ) Secure Biometric Authentication With Improved Accuracy M. Barbosa, S. Cauchie, T. Brouard, S. Melo de Sousa
2008/301 (PDF ) Accountability of Perfect Concurrent Signature Yunfeng Li, Dake He, Xianhui Lu
2008/300 (PDF ) Cheon's algorithm, pairing inversion and the discrete logarithm problem David J. Mireles Morales
2008/299 (PDF ) An analysis of the infrastructure in real function fields David J. Mireles Morales
2008/298 (PDF ) Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii
2008/297 (PDF ) Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme Hongzhen Du, Qiaoyan Wen
2008/296 (PDF ) Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
2008/295 (PDF ) Foundations of Group Key Management – Framework, Security Model and a Generic Construction Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Rahul Srinivasan, Pandu Rangan Chandrasekaran
2008/294 (PDF ) A New Message Recognition Protocol for Ad Hoc Pervasive Networks Atefeh Mashatan, Douglas R. Stinson
2008/293 (PDF ) Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik
2008/292 (PDF ) Another approach to pairing computation in Edwards coordinates Sorina Ionica, Antoine Joux
2008/291 (PDF ) How to Protect Yourself without Perfect Shredding Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim
2008/290 (PDF ) Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters
2008/289 (PDF ) Sharemind: a framework for fast privacy-preserving computations Dan Bogdanov, Sven Laur, Jan Willemson
2008/288 (PDF ) How to Launch A Birthday Attack Against DES Zhengjun Cao
2008/287 (PDF ) Authenticated Byzantine Generals in Dual Failure Model Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan
2008/286 (PDF ) One-Up Problem for (EC)DSA Daniel R. L. Brown
2008/285 (PDF ) Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography Jithra Adikari, Vassil Dimitrov, Laurent Imbert
2008/284 (PDF ) Breaking the Akiyama-Goto cryptosystem P. Ivanov, J. F. Voloch
2008/283 (PDF ) Attacks on Singelee and Preneel's protocol Jorge Munilla, Alberto Peinado
2008/282 (PDF ) Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks Jihye Kim, Gene Tsudik
2008/281 (PDF ) Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher Taehyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung
2008/280 (PDF ) FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto
2008/279 (PDF ) Delegating Capabilities in Predicate Encryption Systems Elaine Shi, Brent Waters
2008/278 (PDF ) An Improved Robust Fuzzy Extractor Bhavana Kanukurthi, Leonid Reyzin
2008/277 (PDF ) A strategy for any DAA Issuer and an additional verification by a Host Vadym Fedyukovych
2008/276 (PDF ) Signcryption with Proxy Re-encryption Chandrasekar S., Ambika K., Pandu Rangan C.
2008/275 (PDF ) Certificate-Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
2008/274 (PDF ) Twisted Ate Pairing on Hyperelliptic Curves and Applications Fangguo Zhang
2008/273 (PDF ) White-Box Cryptography: Formal Notions and (Im)possibility Results Amitabh Saxena, Brecht Wyseur, Bart Preneel
2008/272 (PDF ) A New Hash Family Obtained by Modifying the SHA-2 Family Somitra Kumar Sanadhya, Palash Sarkar
2008/271 (PDF ) A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family Somitra Kumar Sanadhya, Palash Sarkar
2008/270 (PDF ) New Collision attacks Against Up To 24-step SHA-2 Somitra Kumar Sanadhya, Palash Sarkar
2008/269 (PDF ) Searching for Low Weight Codewords in Linear Binary Codes Somitra Kumar Sanadhya, Palash Sarkar
2008/268 (PDF ) Adaptive Security in Broadcast Encryption Systems Craig Gentry, Brent Waters
2008/267 (PDF ) Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart
2008/266 (PDF ) Information-Theoretically Secure Voting Without an Honest Majority Anne Broadbent, Alain Tapp
2008/265 (PDF ) Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors Steven D. Galbraith, Michael Harrison, David J. Mireles Morales
2008/264 (PDF ) Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security Robin Künzler, Jörn Müller-Quade, Dominik Raub
2008/263 (PDF ) Slide Attacks on a Class of Hash Functions Michael Gorski, Stefan Lucks, Thomas Peyrin
2008/262 (PDF ) Statistically Reliable and Secure Message Transmission in Directed Networks Arpita Patra, Ashish Choudhury, C. Pandu Rangan
2008/261 (PDF ) The Hidden Root Problem F. Vercauteren
2008/260 (PDF ) Breaking RSA Generically is Equivalent to Factoring Divesh Aggarwal, Ueli Maurer
2008/259 (PDF ) 2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period ZHAO Lu, WEN Qiao-yan
2008/258 (PDF ) ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS JAIYEOLA Temitope Gbolahan, ADENIRAN John Olushola
2008/257 (PDF ) ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY JAIYEOLA Temitope Gbolahan
2008/256 (PDF ) ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES JAIYEOLA Temitope Gbolahan
2008/255 (PDF ) Embedding in Two Least Significant Bits with Wet Paper Coding Xin Liao, Qiao-yan Wen
2008/254 (PDF ) An Efficient Identity-based Ring Signcryption Scheme Zhenchao ZHU, Yuqing ZHANG, Fengjiao WANG
2008/253 (PDF ) Multi-Recipient Signcryption for Secure Wireless Group Communication Yiliang Han, Xiaolin Gui, Xu'an Wang
2008/252 (PDF ) Provable Security of Digital Signatures in the Tamper-Proof Device Model Nick Varnovsky
2008/251 (PDF ) Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
2008/250 (PDF ) Pairings on hyperelliptic curves with a real model Steven Galbraith, Xibin Lin, David Mireles
2008/248 (PDF ) Cryptanalysis of a client-to-client password-authenticated key agreement protocol Fengjiao Wang, Yuqing Zhang
2008/247 (PDF ) Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, Pandu Rangan Chandrasekaran
2008/246 (PDF ) The Random Oracle Model and the Ideal Cipher Model are Equivalent Jean-Sebastien Coron, Jacques Patarin, Yannick Seurin
2008/245 (PDF ) Cryptanalysis of an Authentication Scheme Using Truncated Polynomials Markus Grassl, Rainer Steinwandt
2008/244 (PDF ) New balanced Boolean functions satisfying all the main cryptographic criteria Claude Carlet, Keqin Feng
2008/243 (PDF ) On the economic payoff of forensic systems when used to trace Counterfeited Software and content Yacov Yacobi
2008/241 (PDF ) Practical Attacks on HB and HB+ Protocols Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagorski, Marcin Zawada
2008/240 (PDF ) Leakage-Resilient Cryptography in the Standard Model Stefan Dziembowski, Krzysztof Pietrzak
2008/239 (PDF ) Recognition in Ad Hoc Pervasive Networks Atefeh Mashatan, Douglas R. Stinson
2008/238 (PDF ) On the Provable Security of Multi-Receiver Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/237 (PDF ) Local Affinity Based Inversion of Filter Generators O. A. Logachev, D. S. Nazarova
2008/236 (PDF ) A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N. P. Smart, B. Warinschi
2008/235 (PDF ) Constant-Round Concurrent Non-Malleable Commitments and Decommitments Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2008/234 (PDF ) On the CCA1-Security of Elgamal and Damgård's Elgamal Helger Lipmaa
2008/232 (PDF ) Perfectly Secure Message Transmission Tolerating Mixed Adversary Arpita Patra, Ashish Choudhury, Ashwinkumar B. V, Kannan Srinathan, C. Pandu Rangan
2008/231 (PDF ) A Novel Probabilistic Passive Attack on the Protocols HB and HB+ Jose Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento
2008/230 (PDF ) A New Collision Differential For MD5 With Its Full Differential Path Tao Xie, DengGuo Feng, FanBao Liu
2008/229 (PDF ) Identification and Privacy: Zero-Knowledge is not Enough Julien Bringer, Herve Chabanne, Thomas Icart
2008/228 (PDF ) Revisiting Wiener's Attack -- New Weak Keys in RSA Subhamoy Maitra, Santanu Sarkar
2008/227 (PDF ) New Impossible Differential Cryptanalysis of ARIA Ruilin Li, Bing Sun, Peng Zhang, Chao Li
2008/226 (PDF ) Proxy Key Re-encapsulation Mechanism for Group Communications Chunbo Ma, Jun Ao
2008/225 (PDF ) Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
2008/224 (PDF ) An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem Hai Huang, Zhenfu Cao
2008/223 (PDF ) On the Security of a Visual Cryptography Scheme for Color Images Bert W. Leung, Felix Y. Ng, Duncan S. Wong
2008/222 (PDF ) Encryption-On-Demand: Practical and Theoretical Considerations Gideon Samid
2008/221 (PDF ) Efficient Conversion of Secret-shared Values Between Different Fields Ivan Damgard, Rune Thorbek
2008/220 (PDF ) Essentially Optimal Universally Composable Oblivious Transfer Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2008/218 (PDF ) Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation Wouter Castryck, Steven Galbraith, Reza Rezaeian Farashahi
2008/217 (PDF ) Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé
2008/216 (PDF ) A New Multi-Linear Universal Hash Family Palash Sarkar
2008/215 (PDF ) On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics Naoki Hashizume, Fumiyuki Momose, Jinhui Chao
2008/214 (PDF ) Multi-Factor Password-Authenticated Key Exchange Douglas Stebila, Poornaprajna Udupi, Sheueling Chang
2008/213 (PDF ) The Multireceiver Commitment Schemes Shuhong Wang
2008/212 (PDF ) Reducing the Complexity of the Weil Pairing Computation Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2008/211 (PDF ) Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption Goichiro Hanaoka, Kaoru Kurosawa
2008/210 (PDF ) Complexity Analysis of a Fast Modular Multiexponentiation Algorithm Haimin Jin, Duncan S. Wong, Yinlong Xu
2008/209 (PDF ) Computing Bilinear Pairings on Elliptic Curves with Automorphisms Chang-An Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Bing-Long Chen
2008/208 (PDF ) Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme Naoki Ogura, Shigenori Uchiyama
2008/207 (PDF ) Efficient Receipt-Free Ballot Casting Resistant to Covert Channels Ben Adida, C. Andrew Neff
2008/206 (PDF ) Partial Fairness in Secure Two-Party Computation Dov Gordon, Jonathan Katz
2008/205 (PDF ) On Software Parallel Implementation of Cryptographic Pairings Philipp Grabher, Johann Groszschaedl, Dan Page
2008/204 (PDF ) Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem Yanbin Pan, Yingpu Deng
2008/203 (PDF ) Privacy-Preserving Matching of DNA Profiles Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls
2008/202 (PDF ) Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing Zhitu Su, Hui Li, JianFeng Ma
2008/201 (PDF ) How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG J. Wu, D. R. Stinson
2008/200 (PDF ) On The Security of The ElGamal Encryption Scheme and Damgard’s Variant J. Wu, D. R. Stinson
2008/199 (PDF ) Simultaneous field divisions: an extension of Montgomery's trick David G. Harris
2008/198 (PDF ) Security needs in embedded systems Anoop MS
2008/197 (PDF ) Secure Multiparty Computation for Privacy-Preserving Data Mining Yehuda Lindell, Benny Pinkas
2008/196 (PDF ) A New Family of Perfect Nonlinear Binomials Zhengbang Zha, Gohar M. Kyureghyan, Xueli Wang
2008/195 (PDF ) An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs Jin Zhengping, Zuo Huijuan, Du hongzhen, Wen Qiaoyan
2008/194 (PDF ) Endomorphisms for faster elliptic curve cryptography on a large class of curves Steven D. Galbraith, Xibin Lin, Michael Scott
2008/192 (PDF ) Investigating the DPA-Resistance Property of Charge Recovery Logics Amir Moradi, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/190 (PDF ) User-Sure-and-Safe Key Retrieval Daniel R. L. Brown
2008/189 (PDF ) How to Build a Hash Function from any Collision-Resistant Function Thomas Ristenpart, Thomas Shrimpton
2008/188 (PDF ) Information Leakage of Flip-Flops in DPA-Resistant Logic Styles Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Carsten Rolfes, Christof Paar, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh
2008/187 (PDF ) An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme Fagen Li, Yong Yu
2008/186 (PDF ) Privacy-Preserving Audit and Extraction of Digital Contents Mehul A. Shah, Ram Swaminathan, Mary Baker
2008/185 (PDF ) A New Approach to Secure Logging Di Ma, Gene Tsudik
2008/184 (PDF ) On the Secure Obfuscation of Deterministic Finite Automata W. Erik Anderson
2008/183 (PDF ) Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 Jean-Philippe Aumasson, Willi Meier, Florian Mendel
2008/182 (PDF ) Restricted Adaptive Oblivious Transfer Javier Herranz
2008/181 (PDF ) Proofs of Knowledge with Several Challenge Values Grzegorz Stachowiak
2008/180 (PDF ) Imaginary quadratic orders with given prime factor of class number Alexander Rostovtsev
2008/178 (PDF ) Optimal Discretization for High-Entropy Graphical Passwords Kemal Bicakci
2008/177 (PDF ) Algebraic Techniques in Differential Cryptanalysis Martin Albrecht, Carlos Cid
2008/176 (PDF ) New construction of Boolean functions with maximun algebraic immunity Wang yongjuan, Fan shuqin, Han wenbao
2008/175 (PDF ) Proofs of Retrievability: Theory and Implementation Kevin D. Bowers, Ari Juels, Alina Oprea
2008/174 (PDF ) Non-Linear Reduced Round Attacks Against SHA-2 Hash family Somitra Kumar Sanadhya, Palash Sarkar
2008/173 (PDF ) Full Cryptanalysis of LPS and Morgenstern Hash Function Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
2008/172 (PDF ) The Round Complexity of Verifiable Secret Sharing Revisited Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan
2008/171 (PDF ) Binary Edwards Curves Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Farashahi
2008/170 (PDF ) Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem Simon R. Blackburn
2008/169 (PDF ) Understanding Phase Shifting Equivalent Keys and Exhaustive Search Côme Berbain, Aline Gouget, Hervé Sibert
2008/168 (PDF ) Possibility and impossibility results for selective decommitments Dennis Hofheinz
2008/167 (PDF ) Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols Omkant Pandey
2008/166 (PDF ) Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards Nicolas T. Courtois, Karsten Nohl, Sean O'Neil
2008/165 (PDF ) Improved lower bound on the number of balanced symmetric functions over GF(p) Pinhui Ke
2008/164 (PDF ) On the (Im)Possibility of Key Dependent Encryption Iftach Haitner, Thomas Holenstein
2008/163 (PDF ) Universally Composable Adaptive Oblivious Transfer Matthew Green, Susan Hohenberger
2008/162 (PDF ) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks Michael Backes, Boris Köpf
2008/161 (PDF ) Modular polynomials for genus 2 Reinier Broker, Kristin Lauter
2008/160 (PDF ) A Proxy Signature Scheme over Braid Groups Girraj Kumar Verma
2008/159 (PDF ) A non-interactive deniable authentication scheme based on designated verifier proofs Bin Wang
2008/158 (PDF ) DISH: Distributed Self-Healing in Unattended Sensor Networks Di Ma, Gene Tsudik
2008/157 (PDF ) Secure Online Elections in Practice Lucie Langer, Axel Schmidt, Johannes Buchmann
2008/156 (PDF ) On Black-Box Ring Extraction and Integer Factorization Kristina Altmann, Tibor Jager, Andy Rupp
2008/155 (PDF ) A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties David Freeman
2008/153 (PDF ) Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour Clemens Heuberger
2008/152 (PDF ) Computational soundness of symbolic zero-knowledge proofs Michael Backes, Dominique Unruh
2008/150 (PDF ) Robust Combiners for Software Hardening Amir Herzberg, Haya Shulman
2008/149 (PDF ) Toy Factoring by Newton's Method Daniel R. L. Brown
2008/148 (PDF ) Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication Roberto M. Avanzi, Clemens Heuberger, Helmut Prodinger
2008/147 (PDF ) A Real-World Attack Breaking A5/1 within Hours Timo Gendrullis, Martin Novotny, Andy Rupp
2008/146 (PDF ) Dynamic SHA-2 Xu Zijie
2008/145 (PDF ) Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System Jithra Adikari, Vassil S. Dimitrov, Pradeep K. Mishra
2008/143 (PDF ) Certificateless Signcryption M. Barbosa, P. Farshim
2008/142 (PDF ) Attacking Reduced Round SHA-256 Somitra Kumar Sanadhya, Palash Sarkar
2008/141 (PDF ) Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
2008/140 (PDF ) Reducing Complexity Assumptions for Oblivious Transfer K. Y. Cheong, Takeshi Koshiba
2008/139 (PDF ) Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian
2008/138 (PDF ) Oblivious Transfer Based on the McEliece Assumptions Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento
2008/137 (PDF ) More Discriminants with the Brezing-Weng Method Gaetan Bisson, Takakazu Satoh
2008/136 (PDF ) Constant-Size Dynamic $k$-TAA Man Ho Au, Willy Susilo, Yi Mu
2008/135 (PDF ) Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations Clemens Heuberger, James A. Muir
2008/134 (PDF ) Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption Alon Rosen, Gil Segev
2008/133 (PDF ) The arithmetic of characteristic 2 Kummer surfaces P. Gaudry, D. Lubicz
2008/132 (PDF ) A Framework for the Sound Specification of Cryptographic Tasks Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
2008/131 (PDF ) Collisions and other Non-Random Properties for Step-Reduced SHA-256 Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
2008/130 (PDF ) Analysis of Step-Reduced SHA-256 Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2008/129 (PDF ) Controlling access to personal data through Accredited Symmetrically Private Information Retrieval Mohamed Layouni
2008/128 (PDF ) A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2 Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii
2008/127 (PDF ) A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation Nidia Cortez-Duarte, Francisco Rodríguez-Henríquez, Jean-Luc Beuchat, Eiji Okamoto
2008/126 (PDF ) Machine Learning Attacks Against the ASIRRA CAPTCHA Philippe Golle
2008/125 (PDF ) Pairing Lattices Florian Hess
2008/124 (PDF ) A Simple Derivation for the Frobenius Pseudoprime Test Daniel Loebenberger
2008/123 (PDF ) Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style Mehrdad Khatir, Amir Moradi
2008/122 (PDF ) TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote Seog Chung Seo, Dong-Guk Han, Seokhie Hong
2008/121 (PDF ) New proofs for old modes Mark Wooding
2008/120 (PDF ) Public key encryption and encryption emulation attacks Denis Osin, Vladimir Shpilrain
2008/119 (PDF ) Linear Bandwidth Naccache-Stern Encryption Benoit Chevallier-Mames, David Naccache, Jacques Stern
2008/118 (PDF ) Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication Patrick Longa, Catherine Gebotys
2008/117 (PDF ) Exponentiation in pairing-friendly groups using homomorphisms Steven D. Galbraith, Michael Scott
2008/116 (PDF ) Chosen-Ciphertext Security via Correlated Products Alon Rosen, Gil Segev
2008/115 (PDF ) A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$ Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez
2008/114 (PDF ) Scalable and Efficient Provable Data Possession Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik
2008/113 (PDF ) Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132 Daniel Mall, Qing Zhong
2008/112 (PDF ) Democratic Group Signatures with Threshold Traceability Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li
2008/111 (PDF ) THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD Yuriy Izbenko, Vladislav Kovtun, Alexandr Kuznetsov
2008/109 (PDF ) Collisions for Round-Reduced LAKE Florian Mendel, Martin Schläffer
2008/108 (PDF ) New Differential-Algebraic Attacks and Reparametrization of Rainbow Jintai Ding, Bo-Yin Yang, Owen Chen, Ming-Shing Chen, Doug Cheng
2008/107 (PDF ) Private Branching Programs: On Communication-Efficient Cryptocomputing Helger Lipmaa
2008/106 (PDF ) Knapsack cryptosystems built on NP-hard instances Laurent Evain
2008/105 (PDF ) Cryptanalysis of White-Box Implementations W. Michiels, P. Gorissen, H. D. L. Hollmann
2008/104 (PDF ) Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell, Liqun Chen, Jiangtao Li
2008/102 (PDF ) Degradation and Amplification of Computational Hardness Shai Halevi, Tal Rabin
2008/100 (PDF ) Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields Patrick Longa
2008/099 (PDF ) The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin E. Lauter, Katherine E. Stange
2008/098 (PDF ) On Security Notions for Verifiable Encrypted Signature Xu-An Wang, Xiaoyuan Yang, Yiliang Han
2008/097 (PDF ) Fairness with an Honest Minority and a Rational Majority Shien Jin Ong, David Parkes, Alon Rosen, Salil Vadhan
2008/096 (PDF ) Optimal Pairings F. Vercauteren
2008/095 (PDF ) Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2008/094 (PDF ) Universally Composable Undeniable Signature Kaoru Kurosawa, Jun Furukawa
2008/093 (PDF ) New ID-based Fair Blind Signatures Girraj Kumar Verma
2008/092 (PDF ) An Efficient SPRP-secure Construction based on Pseudo Random Involution Mridul Nandi
2008/091 (PDF ) A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation Mridul Nandi
2008/090 (PDF ) Improving upon HCTR and matching attacks for Hash-Counter-Hash approach Mridul Nandi
2008/089 (PDF ) An improved preimage attack on MD2 Søren S. Thomsen
2008/088 (PDF ) A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm Mahabir Prasad Jhanwar, Rana Barua
2008/087 (PDF ) Towards a Theory of White-Box Security Amir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo
2008/086 (PDF ) Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary Arpita Patra, Ashish Choudhary, Madhu Gayatri, C. Pandu Rangan
2008/085 (PDF ) All Pairings Are in a Group Chang-An Zhao, Fangguo Zhang, Jiwu Huang
2008/084 (PDF ) ID based generalized signcryption Sunder Lal, Prashant Kushwah
2008/083 (PDF ) On the Security of Chien's Ultralightweight RFID Authentication Protocol Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
2008/082 (PDF ) Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes Roberto Araujo, Peter Y. A. Ryan
2008/081 (PDF ) Template Attacks on ECDSA Marcel Medwed, Elisabeth Oswald
2008/080 (PDF ) Pairing-Based Onion Routing with Improved Forward Secrecy Aniket Kate, Greg Zaverucha, Ian Goldberg
2008/079 (PDF ) Homomorphic Encryption with CCA Security Manoj Prabhakaran, Mike Rosulek
2008/078 (PDF ) A Short Proof of the PRP/PRF Switching Lemma Donghoon Chang, Mridul Nandi
2008/077 (PDF ) Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2008/076 (PDF ) Results from a Search for the Best Linear Approximation of a Block Cipher Kashif Ali, Howard M. Heys
2008/075 (PDF ) On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak Jonathan J. Hoch, Adi Shamir
2008/074 (PDF ) On the Chikazawa-Inoue ID based key system Bae Eun Jung, Hee Jean Kim
2008/073 (PDF ) Compact Proofs of Retrievability Hovav Shacham, Brent Waters
2008/072 (PDF ) The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption Alexandre M. Deusajute, Paulo S. L. M. Barreto
2008/071 (PDF ) Blockcipher Based Hashing Revisited Martijn Stam
2008/070 (PDF ) Generators of Jacobians of Genus Two Curves Christian Robenhagen Ravnshoj
2008/069 (PDF ) HENKOS Cryptanalysis-Related keys attack Marius Oliver Gheorghita
2008/068 (PDF ) Multiparty Computation Goes Live Peter Bogetoft, Dan Lund Christensen, Ivan Damgard, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas Toft
2008/067 (PDF ) The Twin Diffie-Hellman Problem and Applications David Cash, Eike Kiltz, Victor Shoup
2008/066 (PDF ) High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m) Junjie Jiang, Jing Chen, Jian Wang, Duncan S. Wong, Xiaotie Deng
2008/065 (PDF ) Infringing and Improving Password Security of a Three-Party Key Exchange Protocol Junghyun Nam
2008/064 (PDF ) Remarks on the NFS complexity Pavol Zajac
2008/063 (PDF ) Efficient Sequential Aggregate Signed Data Gregory Neven
2008/062 (PDF ) Computing Hilbert Class Polynomials Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter
2008/061 (PDF ) Abelian varieties with prescribed embedding degree David Freeman, Peter Stevenhagen, Marco Streng
2008/060 (PDF ) Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields Nicholas T. Sullivan
2008/059 (PDF ) Buying random votes is as hard as buying no-votes Stefan Popoveniuc, Jonathan Stanton
2008/058 (PDF ) Physical Cryptanalysis of KeeLoq Code Hopping Applications Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
2008/057 (PDF ) Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields Vladislav Kovtun, Jan Pelzl, Alexandr Kuznetsov
2008/056 (PDF ) Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated) Vladislav Kovtun, Thomas Wollinger
2008/054 (PDF ) Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version) Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
2008/053 (PDF ) Breaking One-Round Key-Agreement Protocols in the Random Oracle Model Miroslava Sotakova
2008/052 (PDF ) New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version) Patrick Longa, Ali Miri
2008/051 (PDF ) New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version) Patrick Longa, Ali Miri
2008/050 (PDF ) Multi-PKG ID based signcryption Sunder Lal, Prashant Kushwah
2008/049 (PDF ) An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Yehuda Lindell, Benny Pinkas
2008/048 (PDF ) Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
2008/047 (PDF ) Fair Traceable Multi-Group Signatures Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
2008/046 (PDF ) David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran, Gil Segev
2008/045 (PDF ) Threshold RSA for Dynamic and Ad-Hoc Groups Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
2008/044 (PDF ) Unidirectional Key Distribution Across Time and Space with Applications to RFID Security Ari Juels, Ravikanth Pappu, Bryan Parno
2008/043 (PDF ) Cryptanalysis of CRUSH hash structure Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
2008/042 (PDF ) Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks Julien Bringer, Herve Chabanne
2008/041 (PDF ) A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights Hassan Elkamchouchi, Yasmine Abouelseoud
2008/040 (PDF ) Efficient and Generalized Pairing Computation on Abelian Varieties Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park
2008/039 (PDF ) New Results on Unconditionally Secure Multireceiver Manual Authentication Shuhong Wang, Reihaneh Safavi-Naini
2008/038 (PDF ) A New Blind Identity-Based Signature Scheme with Message Recovery Hassan Elkamchouchi, Yasmine Abouelseoud
2008/037 (PDF ) Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures Georg Fuchsbauer, David Pointcheval
2008/036 (PDF ) Generic Attacks on Feistel Schemes Jacques Patarin
2008/035 (PDF ) Efficient Fully-Simulatable Oblivious Transfer Yehuda Lindell
2008/034 (PDF ) Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang
2008/033 (PDF ) Lower Bounds on Signatures From Symmetric Primitives Boaz Barak, Mohammad Mahmoody
2008/032 (PDF ) Merkle's Key Agreement Protocol is Optimal: An $O(n^2)$ Attack on any Key Agreement from Random Oracles Boaz Barak, Mohammad Mahmoody
2008/031 (PDF ) Authenticating with Attributes Dalia Khader
2008/030 (PDF ) Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs
2008/029 (PDF ) Non-Cyclic Subgroups of Jacobians of Genus Two Curves Christian Robenhagen Ravnshoj
2008/028 (PDF ) HB#: Increasing the Security and Efficiency of HB+ Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
2008/027 (PDF ) Blind Signature Scheme over Braid Groups Girraj Kumar Verma
2008/026 (PDF ) Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$ Mitsuru Kawazoe, Tetsuya Takahashi
2008/025 (PDF ) Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication Christian Robenhagen Ravnshoj
2008/024 (PDF ) Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes Sunder Lal, Vandani Verma
2008/023 (PDF ) General Certificateless Encryption and Timed-Release Encryption Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
2008/022 (PDF ) Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods M. Gebhardt, G. Illies, W. Schindler
2008/021 (PDF ) Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008/020 (PDF ) CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption Eike Kiltz, Yevgeniy Vahlis
2008/019 (PDF ) Computing Pairings Using x-Coordinates Only Steven D. Galbraith, Xibin Lin
2008/018 (PDF ) Disjunctive Multi-Level Secret Sharing Mira Belenkiy
2008/017 (PDF ) New State Recovery Attack on RC4 Alexander Maximov, Dmitry Khovratovich
2008/016 (PDF ) ECM using Edwards curves Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
2008/015 (PDF ) Practical Short Signature Batch Verification Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
2008/014 (PDF ) Simulatable Adaptive Oblivious Transfer Jan Camenisch, Gregory Neven, abhi shelat
2008/013 (PDF ) Twisted Edwards Curves Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
2008/012 (PDF ) The Encrypted Elliptic Curve Hash Daniel R. L. Brown
2008/011 (PDF ) A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II Ayan Mahalanobis
2008/010 (PDF ) A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''-- Jacques Patarin
2008/009 (PDF ) Generic Attacks for the Xor of k random permutations Jacques Patarin
2008/008 (PDF ) Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves Zhitu su, Hui Li, Jianfeng Ma
2008/007 (PDF ) Efficient One-round Key Exchange in the Standard Model Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
2008/006 (PDF ) Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation Ralf Kuesters, Max Tuengerthal
2008/005 (PDF ) Information Theoretic Evaluation of Side-Channel Resistant Logic Styles Francois Mace, Francois-Xavier Standaert, Jean-Jacques Quisquater
2008/004 (PDF ) Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions Palash Sarkar
2008/003 (PDF ) On Collisions of Hash Functions Turbo SHA-2 Vlastimil Klima
2008/002 (PDF ) Fuzzy Identity Based Signature Piyi Yang, Zhenfu Cao, Xiaolei Dong
2008/001 (PDF ) Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang
[ Cryptology ePrint archive ]