Cryptology ePrint Archive: Listing for 2009
Regex
2009/637 (PDF ) Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers Xiao-shan Gao, Zhenyu Huang
2009/636 (PDF ) Obtaining More Karatsuba-Like Formulae over The Binary Field Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam
2009/635 (PDF ) Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara
2009/634 (PDF ) Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512} Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
2009/633 (PDF ) Traitor-Tracing on Binary Strings Michael J. Collins
2009/632 (PDF ) Cryptanalysis of Secure Message Transmission Protocols with Feedback Qiushi Yang, Yvo Desmedt
2009/631 (PDF ) Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks DaeHun Nyang, Mun-Kyu Lee
2009/630 (PDF ) Information-Theoretically Secure Protocols and Security Under Composition Eyal Kushilevitz, Yehuda Lindell, Tal Rabin
2009/629 (PDF ) A Comparative Analysis of Delay Based PUF Implementations on FPGA Sergey Morozov, Abhranil Maiti, Patrick Schaumont
2009/628 (PDF ) Using Sphinx to Improve Onion Routing Circuit Construction Aniket Kate, Ian Goldberg
2009/627 (PDF ) A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong
2009/626 (PDF ) Approximate Integer Common Divisor Problem relates to Implicit Factorization Santanu Sarkar, Subhamoy Maitra
2009/625 (PDF ) Cryptographic Accumulators for Authenticated Hash Tables Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2009/624 (PDF ) Security Analysis of the PACE Key-Agreement Protocol Jens Bender, Marc Fischlin, Dennis Kuegler
2009/623 (PDF ) Universally Constructing 12-th Degree Extension Field for Ate Pairing Masaaki Shirase
2009/622 (PDF ) A Strong Blind Signature Scheme over Braid Groups WEI Yun, XIONG Guo-Hua, BAO Wan-Su, ZHANG Xing-Kai
2009/621 (PDF ) On the Analysis of Cryptographic Assumptions in the Generic Ring Model Tibor Jager, Jörg Schwenk
2009/620 (PDF ) Security of ECQV-Certified ECDSA Against Passive Adversaries Daniel R. L. Brown, Matthew J. Campagna, Scott A. Vanstone
2009/619 (PDF ) A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet, Pierre-Alain Fouque, Antoine Joux, Joana Treger
2009/618 (PDF ) Data-Depend Hash Algorithm ZiJie Xu, Ke Xu
2009/617 (PDF ) An efficient ID- based directed signature scheme from bilinear pairings B. Umaprasada Rao, P. Vasudeva Reddy, T. Gowri
2009/616 (PDF ) Fully Homomorphic Encryption over the Integers Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2009/615 (PDF ) Faster Pairing Computations on Curves with High-Degree Twists Craig Costello, Tanja Lange, Michael Naehrig
2009/614 (PDF ) Secure Multiparty AES (full paper) Ivan Damgård, Marcel Keller
2009/613 (PDF ) Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition Tsutomu Iijima, Fumiyuki Momose, Jinhui Chao
2009/612 (PDF ) On the Impossibility of Batch Update for Cryptographic Accumulators Philippe Camacho, Alejandro Hevia
2009/611 (PDF ) Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules Lan Luo, QiongHai Dai, ZhiGuang Qin, ChunXiang Xu
2009/610 (PDF ) Security Analysis of A Remote User Authentication Protocol by Liao and Wang Dang Nguyen Duc, Kwangjo Kim
2009/609 (PDF ) Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc, Kwangjo Kim
2009/608 (PDF ) Non-Malleable Codes Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs
2009/606 (PDF ) On a weakness of the Tu-Deng function and its repair Claude Carlet
2009/605 (PDF ) Solving the Shortest Lattice Vector Problem in Time 2^2.465n Xavier Pujol, Damien Stehle
2009/604 (PDF ) Composition of Zero-Knowledge Proofs with Efficient Provers Eleanor Birrell, Salil Vadhan
2009/603 (PDF ) An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations Brian Baldwin, William P. Marnane
2009/602 (PDF ) Secure Ranging With Message Temporal Integrity Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun
2009/601 (PDF ) Parallel Shortest Lattice Vector Enumeration on Graphics Cards Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
2009/600 (PDF ) Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement D. Fiore, R. Gennaro, N. P. Smart
2009/599 (PDF ) Groth--Sahai proofs revisited E. Ghadafi, N. P. Smart, B. Warinschi
2009/598 (PDF ) On the Design and Implementation of an Efficient DAA Scheme L. Chen, D. Page, N. P. Smart
2009/597 (PDF ) Twisted Jacobi Intersections Curves Rongquan Feng, Menglong Nie, Hongfeng Wu
2009/596 (PDF ) Could SFLASH be repaired? Jintai Ding, Vivien Dubois, Bo-Yin Yang, Owen Chia-Hsin Chen, Chen-Mou Cheng
2009/595 (PDF ) Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms Endre Bangerter, Jan Camenisch, Stephan Krenn
2009/594 (PDF ) Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay, Kobbi Nissim
2009/593 (PDF ) Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
2009/592 (PDF ) From Passive to Covert Security at Low Cost Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
2009/591 (PDF ) Embedded SFE: Offloading Server and Network using Hardware Tokens Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/590 (PDF ) More Constructions of Lossy and Correlation-Secure Trapdoor Functions David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
2009/589 (PDF ) Information-set decoding for linear codes over Fq Christiane Peters
2009/588 (PDF ) Confidential Signatures and Deterministic Signcryption Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schroder
2009/587 (PDF ) Poly-Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P. Singh, A. Saikia, B. K. Sarma
2009/586 (PDF ) A mean value formula for elliptic curves Rongquan Feng, Hongfeng Wu
2009/585 (PDF ) An Improved Differential Fault Attack on Camellia ZHAO Xin-jie, WANG Tao
2009/584 (PDF ) Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers Yu Liu, Kaijie Wu, Ramesh Karri
2009/583 (PDF ) Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2009/582 (PDF ) A Game-Based Definition of Coercion-Resistance and its Applications Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2009/581 (PDF ) A Diagonal Fault Attack on the Advanced Encryption Standard Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury
2009/580 (PDF ) A complete set of addition laws\\for incomplete Edwards curves Daniel J. Bernstein, Tanja Lange
2009/579 (PDF ) Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Sherman S. -M. Chow, Qian Wang, Kui Ren, Wenjing Lou
2009/578 (PDF ) Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps Wenjian Xie, Zhang Zhang
2009/577 (PDF ) On the nonlinearity profile of the Dillon function Claude Carlet
2009/576 (PDF ) Public-Key Cryptographic Primitives Provably as Secure as Subset Sum Vadim Lyubashevsky, Adriana Palacio, Gil Segev
2009/575 (PDF ) Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault Michael Tunstall, Debdeep Mukhopadhyay
2009/574 (PDF ) Voting with unconditional privacy: CFSY for booth voting Jeroen van de Graaf
2009/573 (PDF ) New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields Leibo Li, Mingqiang Wang, Zhanjiang Xia
2009/571 (PDF ) Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes N. P. Smart, F. Vercauteren
2009/570 (PDF ) Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento
2009/569 (PDF ) Secure Network Coding Over the Integers Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009/568 (PDF ) Ephemeral key compromise attack on the IB-KA protocol Qingfeng Cheng, Chuangui Ma
2009/567 (PDF ) Properties of the Discrete Differential with Cryptographic Applications Daniel Smith-Tone
2009/566 (PDF ) New Cryptosystems From CSP-Based Self-Distributive Systems Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
2009/565 (PDF ) Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions Robert Granger, Michael Scott
2009/564 (PDF ) Optimal pairing revisited Mingqiang Wang, Puwen Wei, Haifeng Zhang, Yuliang Zheng
2009/563 (PDF ) A Family of $p$-ary Binomial Bent Functions Dabin Zheng, Xiangyong Zeng, Lei Hu
2009/562 (PDF ) How to pair with a human Stefan Dziembowski
2009/561 (PDF ) Improvements on two password-based authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2009/560 (PDF ) On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme Manoj Kumar
2009/559 (PDF ) New Integral Distinguisher for Rijndael-256 Yuechuan Wei, Bing Sun, Chao Li
2009/556 (PDF ) Constructing Tower Extensions for the implementation of Pairing-Based Cryptography Naomi Benger, Michael Scott
2009/554 (PDF ) ON A COMBINATORIAL CONJECTURE T. W. CUSICK, YUAN LI, PANTELIMON STANICA
2009/553 (PDF ) Cryptanalysis of a key exchange scheme based on block matrices Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo, Pedro Taborda Duarte
2009/552 (PDF ) Preimage Attacks on Reduced DHA-256 Jinmin Zhong, Xuejia Lai
2009/551 (PDF ) A Novel Design Method of Stream Ciphers Based on Table-Element Permutation Hongbo Zou
2009/550 (PDF ) How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models Yusuke Naito, Lei Wang, Kazuo Ohta
2009/549 (PDF ) Making Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida
2009/548 (PDF ) A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS Stéphane BALLET, Robert ROLLAND
2009/547 (PDF ) Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro, Craig Gentry, Bryan Parno
2009/546 (PDF ) Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC Masao Kasahara
2009/545 (PDF ) Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel
2009/544 (PDF ) Connections between Quaternary and Binary Bent Functions Patrick Solé, Natalia Tokareva
2009/542 (PDF ) Analysis of Intermediate Field Systems Olivier Billet, Jacques Patarin, Yannick Seurin
2009/541 (PDF ) Breaking ECC2K-130 Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang
2009/540 (PDF ) Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman
2009/539 (PDF ) Covering Radius of Two-dimensional Lattices Yupeng Jiang, Yingpu Deng, Yanbin Pan
2009/538 (PDF ) Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall
2009/537 (PDF ) Cryptanalysis of two knapsack public-key cryptosystems Jingguo Bi, Xianmeng Meng, Lidong Han
2009/533 (PDF ) Finding composite order ordinary elliptic curves using the Cocks-Pinch method D. Boneh, K. Rubin, A. Silverberg
2009/532 (PDF ) Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters
2009/531 (PDF ) Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations Henri Gilbert, Thomas Peyrin
2009/530 (PDF ) A New Proposal Against the Main of Generic Attacks Xigen. Yao
2009/529 (PDF ) Oblivious Transfer with Access Control Jan Camenisch, Maria Dubovitskaya, Gregory Neven
2009/528 (PDF ) New Fault Attack on Elliptic Curve Scalar Multiplication Alexey Chilikov, Oleg Taraskin
2009/527 (PDF ) An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme Seiko Arita
2009/526 (PDF ) Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 Jiazhe Chen, Keting Jia
2009/525 (PDF ) On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks Somindu C. Ramanna, Palash Sarkar
2009/524 (PDF ) Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions Petros Mol, Scott Yilek
2009/523 (PDF ) Differential Addition in generalized Edwards Coordinates Benjamin Justus, Daniel Loebenberger
2009/522 (PDF ) Isogenies of Elliptic Curves: A Computational Approach Daniel Shumow
2009/521 (PDF ) An Efficient Secure Oblivious Transfer Hung-Min Sun, Yalin Chen, Jue-Sam Chou
2009/520 (PDF ) Universally Composable Incoercibility Dominique Unruh, Jörn Müller-Quade
2009/519 (PDF ) Secure Message Transmission with Small Public Discussion Juan Garay, Clint Givens, Rafail Ostrovsky
2009/518 (PDF ) Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2009/517 (PDF ) New Constructions of Convertible Undeniable Signature Schemes without Random Oracles Qiong Huang, Duncan S. Wong
2009/516 (PDF ) Lightweight Cryptography - Cryptographic Engineering for a Pervasive World Axel Poschmann
2009/515 (PDF ) Blake-Wilson, Johnson and Menezes Protocol Revisited Hai Huang, Zhenfu Cao
2009/514 (PDF ) Generic One Round Group Key Exchange in the Standard Model M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzalez Nieto, Mark Manulis
2009/513 (PDF ) On the round complexity of black-box constructions of commitments secure against selective opening attacks David Xiao
2009/512 (PDF ) Public-Key Encryption in the Bounded-Retrieval Model Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
2009/511 (PDF ) Bounded Key-Dependent Message Security Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
2009/510 (PDF ) High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Stefan Tillich, Martin Feldhofer, Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt, Alexander Szekely
2009/509 (PDF ) Practical Key Recovery Attacks On Two McEliece Variants Valerie Gauthier Umana, Gregor Leander
2009/508 (PDF ) On the Efficiency of Classical and Quantum Oblivious Transfer Reductions Severin Winkler, Juerg Wullschleger
2009/507 (PDF ) Efficient Privacy-Preserving Face Recognition Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2009/506 (PDF ) An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/505 (PDF ) Authenticated Key Exchange Protocols with Enhanced Freshness Properties Hai Huang, Zhenfu Cao
2009/504 (PDF ) Insecure ``Provable Secure Network Coding'' Yongge Wang
2009/503 (PDF ) Fault Attacks Against EMV Signatures Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi
2009/502 (PDF ) On second order nonlinearities of cubic monomial Boolean functions Ruchi Gode, Sugata Gangopadhyay
2009/501 (PDF ) Fast Implementations of AES on Various Platforms Joppe W. Bos, Dag Arne Osvik, Deian Stefan
2009/500 (PDF ) Key Recovery Attack on QuiSci Nils Reimers
2009/499 (PDF ) Underlying Assumptions and Designated Verifier Signatures Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2009/498 (PDF ) NTRU based group oriented signature Chunbo Ma, Jun Ao
2009/497 (PDF ) Cube Attack on Courtois Toy Cipher Piotr Mroczkowski, Janusz Szmidt
2009/496 (PDF ) Anonymous Fuzzy Identity-based Encryption for Similarity Search Ye Zhang, Nikos Mamoulis, David W. Cheung, S. M. Yiu, W. K. Wong
2009/495 (PDF ) Security Weakness in Two Authenticated Key Exchange Protocols Qingfeng Cheng, Chuangui Ma
2009/494 (PDF ) A Framework for Universally Composable Non-Committing Blind Signatures Masayuki Abe, Miyako Ohkubo
2009/493 (PDF ) Remarks on Some Quantum Cryptographic Schemes Zhengjun Cao
2009/492 (PDF ) Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/491 (PDF ) Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity Emiliano De Cristofaro, Gene Tsudik
2009/490 (PDF ) Cryptanalysis of Multiple-Server Password-Authenticated Key Sang-Gon Lee
2009/489 (PDF ) Impossible Boomerang Attack for Block Cipher Structures Jiali Choy, Huihui Yap
2009/488 (PDF ) Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A. Saikia, B. K. Sarma
2009/487 (PDF ) Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures Keith M. Martin, Maura B. Paterson, Douglas R. Stinson
2009/486 (PDF ) Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison Lewko, Brent Waters
2009/485 (PDF ) Black-Box Circular-Secure Encryption Beyond Affine Functions Zvika Brakerski, Shafi Goldwasser, Yael Kalai
2009/484 (PDF ) New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256 Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
2009/483 (PDF ) On the Security of UOV Jean-Charles Faugère, Ludovic Perret
2009/482 (PDF ) New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Allison Lewko, Brent Waters
2009/481 (PDF ) PPS: Privacy Preserving Statistics using RFID Tags Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2009/480 (PDF ) On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited Sanjit Chatterjee, Alfred Menezes
2009/479 (PDF ) Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512 Yu Sasaki, Lei Wang, Kazumaro Aoki
2009/478 (PDF ) Pseudo-cryptanalysis of the Original Blue Midnight Wish Søren S. Thomsen
2009/477 (PDF ) Preimages for Step-Reduced SHA-2 Jian Guo, Krystian Matusiewicz
2009/476 (PDF ) On the Security of PAS (Predicate-based Authentication Service) Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang
2009/475 (PDF ) Double-Exponentiation in Factor-4 Groups and its Applications Koray Karabina
2009/474 (PDF ) Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine Scott Yilek
2009/473 (PDF ) A Simple Power Analysis Attack on the Serpent Key Schedule Kevin J. Compton, Brian Timm, Joel VanLaven
2009/472 (PDF ) Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson Madeline Gonzalez, Rainer Steinwandt
2009/471 (PDF ) Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$ Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo, Liang Cui
2009/470 (PDF ) On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/469 (PDF ) Additive Combinatorics and Discrete Logarithm Based Range Protocols Rafik Chaabouni, Helger Lipmaa, abhi shelat
2009/468 (PDF ) Password Based Key Exchange with Hidden Elliptic Curve Public Parameters Julien Bringer, Herve Chabanne, Thomas Icart
2009/466 (PDF ) The Certicom Challenges ECC2-X Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
2009/465 (PDF ) Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2009/464 (PDF ) On Key Authentic Degree of Cryptosystem WANG Yong, WANG Huangdeng
2009/463 (PDF ) On Linear Cryptanalysis with Many Linear Approximations Benoit Gérard, Jean-Pierre Tillich
2009/462 (PDF ) Certificateless KEM and Hybrid Signcryption Schemes Revisited S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/461 (PDF ) A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC) Bruce Kapron, Lior Malka, Venkatesh Srinivasan
2009/460 (PDF ) Asymptotic enumeration of correlation-immune boolean functions E. Rodney Canfield, Zhicheng Gao, Catherine Greenhill, Brendan D. McKay, Robert W. Robinson
2009/459 (PDF ) Efficient Oblivious Polynomial Evaluation with Simulation-Based Security Carmit Hazay, Yehuda Lindell
2009/458 (PDF ) Security Analysis and Design of Proxy Signature Schemes over Braid Groups Wei Yun, Xiong Guo-hua, Zhang Xing-kai, Bao Wan-su
2009/457 (PDF ) A remark on the computation of cube roots in finite fields Nozomu Nishihara, Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo
2009/455 (PDF ) Identity-Based Hybrid Signcryption Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/454 (PDF ) An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification Jacob C. N. Schuldt, Kanta Matsuura
2009/453 (PDF ) A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function Vlastimil Klima, Petr Susil
2009/452 (PDF ) Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes Christian Wieschebrink
2009/451 (PDF ) Efficient Certificateless KEM in the Standard Model Georg Lippold, Colin Boyd, Juan González Nieto
2009/450 (PDF ) On Hierarchical Threshold Secret Sharing Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak
2009/449 (PDF ) One for All - All for One: Unifying Standard DPA Attacks Stefan Mangard, Elisabeth Oswald, Francois-Xavier Standaert
2009/448 (PDF ) Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds Ning Ding, Dawu Gu, Bart Preneel
2009/447 (PDF ) ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS Sunil Pandey, Praveen Kaushik, Dr. S. C. Shrivastava
2009/446 (PDF ) Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra Ehsan Malekian, Ali Zakerolhosseini
2009/445 (PDF ) Computing Hilbert class polynomials with the Chinese Remainder Theorem Andrew V. Sutherland
2009/444 (PDF ) Secure and Efficient HB-CM Entity Authentication Protocol Zhijun Li, Guang Gong, Zhiguang Qin
2009/443 (PDF ) Rebound Attack on the Full LANE Compression Function Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer
2009/442 (PDF ) Fuzzy Privacy Preserving Peer-to-Peer Reputation Management Rishab Nithyanand, Karthik Raman
2009/441 (PDF ) An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP Jayaprakash Kar, Banshidhar Majhi
2009/440 (PDF ) A Multivariate Signature Scheme with an almost cyclic public key Albrecht Petzoldt, Johannes Buchmann
2009/439 (PDF ) A Fast Mental Poker Protocol Tzer-jen Wei, Lih-Chung Wang
2009/438 (PDF ) Improved Cryptanalysis of Skein Jean-Philippe Aumasson, Cagdas Calik, Willi Meier, Onur Ozen, Raphael C. -W. Phan, Kerem Varici
2009/437 (PDF ) On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings Shengbao Wang
2009/436 (PDF ) On the Connection between Signcryption and One-pass Key Establishment M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/435 (PDF ) Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm Laila El Aimani
2009/434 (PDF ) Tight Bounds for Protocols with Hybrid Security Matthias Fitzi, Dominik Raub
2009/433 (PDF ) Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience Arpita Patra, C. Pandu Rangan
2009/431 (PDF ) On the Design of Trivium Yun Tian, Gongliang Chen, Jianhua Li
2009/430 (PDF ) One-time-password-authenticated key exchange Kenneth G. Paterson, Douglas Stebila
2009/429 (PDF ) Precise Time and Space Simulatable Zero-Knowledge Ning Ding, Dawu Gu
2009/428 (PDF ) Efficiently from Semi-honest to Malicious OT via OLFE Jürg Wullschleger
2009/427 (PDF ) Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware Stephen R. Tate, Roopa Vishwanathan
2009/426 (PDF ) Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes Daniel Pasaila, Vlad Alexa, Sorin Iftene
2009/425 (PDF ) Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
2009/424 (PDF ) Double Voter Perceptible Blind Signature Based Electronic Voting Protocol Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
2009/423 (PDF ) Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu
2009/422 (PDF ) Attacks on {RFID}-Based Electronic Voting Systems Yossef Oren, Avishai Wool
2009/421 (PDF ) How to Construct Identity-Based Signatures without the Key Escrow Problem Tsz Hon Yuen, Willy Susilo, Yi Mu
2009/420 (PDF ) Higher-order Masking and Shuffling for Software Implementations of Block Ciphers Matthieu Rivain, Emmanuel Prouff, Julien Doget
2009/419 (PDF ) An Efficient Method for Random Delay Generation in Embedded Software Jean-Sébastien Coron, Ilya Kizhvatov
2009/418 (PDF ) Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? Mihir Bellare, Dennis Hofheinz, Eike Kiltz
2009/417 (PDF ) More Differential Paths of TIB3 Harry Wiggins, Philip Hawkes, Gregory G. Rose, Cameron McDonald
2009/416 (PDF ) KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem Carsten Elsner, Martin Schmidt
2009/415 (PDF ) Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman
2009/414 (PDF ) Security Bounds for the Design of Code-based Cryptosystems Matthieu Finiasz, Nicolas Sendrier
2009/413 (PDF ) Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission Jiang Wu, Douglas R. Stinson
2009/412 (PDF ) Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words Nathan Keller, Stephen D. Miller
2009/411 (PDF ) Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009/410 (PDF ) Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich
2009/409 (PDF ) A Tree Based Recursive Scheme for Space Efficient Secret Sharing Abhishek Parakh, Subhash Kak
2009/408 (PDF ) A Secure and Efficient Authenticated Diffie–Hellman Protocol Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2009/407 (PDF ) Single Block Attacks and Statistical Tests on CubeHash Benjamin Bloom, Alan Kaminsky
2009/406 (PDF ) On-line Non-transferable Signatures Revisited Jacob C. N. Schuldt, Kanta Matsuura
2009/405 (PDF ) Generic Attacks on Misty Schemes -5 rounds is not enough- Valerie Nachef, Jacques Patarin, Joana Treger
2009/403 (PDF ) On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited) Laila El Aimani
2009/402 (PDF ) AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time Michael Vielhaber
2009/401 (PDF ) Longest Common Subsequence as Private Search Mark Gondree, Payman Mohassel
2009/400 (PDF ) Identity-Based Chameleon Hash Scheme Without Key Exposure Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim
2009/399 (PDF ) Leakage-Resilient Storage Francesco Davì, Stefan Dziembowski, Daniele Venturi
2009/398 (PDF ) Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/397 (PDF ) Linear Cryptanalysis of Reduced-Round PRESENT Joo Yeon Cho
2009/396 (PDF ) Computational Indistinguishability Amplification: Tight Product Theorems for System Composition Ueli Maurer, Stefano Tessaro
2009/395 (PDF ) First CPIR Protocol with Data-Dependent Computation Helger Lipmaa
2009/394 (PDF ) Provably Secure Convertible Undeniable Signatures with Unambiguity Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
2009/393 (PDF ) Permutation Polynomials modulo $p^n$} Rajesh P Singh, Soumen Maity
2009/392 (PDF ) Computational Soundness for Key Exchange Protocols with Symmetric Encryption Ralf Kuesters, Max Tuengerthal
2009/391 (PDF ) Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems Rikke Bendlin, Ivan Damgård
2009/390 (PDF ) Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments Jens Groth
2009/389 (PDF ) On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2009/387 (PDF ) Securing Plastic Money Using an RFID Based Protocol Stack Rishab Nithyanand
2009/386 (PDF ) QTRU: A Lattice Attack Resistant Version of NTRU Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan
2009/385 (PDF ) Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions Brent Waters
2009/384 (PDF ) Practical Attacks on NESHA-256 Orr Dunkelman, Tor E. Bjørstad
2009/383 (PDF ) A Registration Scheme to Allocate a Unique Identification Number Manoj Kumar
2009/382 (PDF ) Linearization Framework for Collision Attacks: Application to CubeHash and MD6 Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
2009/380 (PDF ) Untraceable Tags based on Mild Assumptions Carlo Blundo, Angelo De Caro, Giuseppe Persiano
2009/379 (PDF ) Protecting Circuits from Computationally Bounded and Noisy Leakage Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
2009/378 (PDF ) Detectable correlations in Edon-R Peter Novotney, Niels Ferguson
2009/377 (PDF ) Chosen-Ciphertext Secure RSA-type Cryptosystems Benoit Chevallier-Mames, Marc Joye
2009/376 (PDF ) Cryptanalysis of the Tillich-Zémor hash function Markus Grassl, Ivana Ilic, Spyros Magliveras, Rainer Steinwandt
2009/375 (PDF ) Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes Masao KASAHARA
2009/374 (PDF ) Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
2009/373 (PDF ) Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov, Yehuda Lindell
2009/372 (PDF ) More on Key Wrapping Rosario Gennaro, Shai Halevi
2009/371 (PDF ) Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
2009/370 (PDF ) A study of pairing computation for elliptic curves with embedding degree 15 Nadia El Mrabet, Nicolas Guillermin, Sorina Ionica
2009/369 (PDF ) Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets Boris Skoric
2009/368 (PDF ) A Simulation-Based Treatment of Authenticated Message Exchange Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/367 (PDF ) Non-delegatable Identity-based Designated Verifier Signature Qiong Huang, Willy Susilo, Duncan S. Wong
2009/366 (PDF ) Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer Yehuda Lindell, Hila Zarosim
2009/365 (PDF ) Space Efficient Secret Sharing: A Recursive Approach Abhishek Parakh, Subhash Kak
2009/364 (PDF ) Position Based Cryptography Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky
2009/363 (PDF ) Some Lattices Attacks on DSA and ECDSA Dimitrios Poulakis
2009/362 (PDF ) Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures Laila El Aimani
2009/361 (PDF ) On the Security of a Proxy Blind Signature Scheme over Braid Groups Manoj Kumar
2009/360 (PDF ) Cryptanalysis of a Generalized Unbalanced Feistel Network Structure Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
2009/359 (PDF ) Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography) Chris Peikert
2009/358 (PDF ) MAC Precomputation with Applications to Secure Memory Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
2009/357 (PDF ) Impossible Differential Cryptanalysis of FOX Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo
2009/356 (PDF ) A Domain Extender for the Ideal Cipher Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
2009/355 (PDF ) Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate, Ian Goldberg
2009/354 (PDF ) Cache Timing Attacks on Camellia Block Cipher ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan
2009/353 (PDF ) Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version) Berkant Ustaoglu
2009/352 (PDF ) On the Duality of Probing and Fault Attacks Berndt M. Gammel, Stefan Mangard
2009/351 (PDF ) How to Delegate a Lattice Basis David Cash, Dennis Hofheinz, Eike Kiltz
2009/350 (PDF ) Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
2009/349 (PDF ) Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein Stefan Tillich, Martin Feldhofer, Wolfgang Issovits, Thomas Kern, Hermann Kureck, Michael Mühlberghuber, Georg Neubauer, Andreas Reiter, Armin Köfler, Mathias Mayrhofer
2009/348 (PDF ) A provably secure really source hiding designated verifier signature scheme based on random oracle model Huang-Ta Huang, Jue-Sam Chou
2009/347 (PDF ) An Efficient Concurrent Repetition Theorem Douglas Wikström
2009/346 (PDF ) Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
2009/345 (PDF ) Anonymous ID Based Signcryption Scheme for Multiple Receivers Sunder Lal, Prashant Kushwah
2009/344 (PDF ) Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009 Xi Zhang, Min-Rong Chen, Xia Li
2009/343 (PDF ) Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications Kenneth Koon-Ho Wong, Gregory V. Bard, Robert H. Lewis
2009/342 (PDF ) FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash Brian Baldwin, Andrew Byrne, Mark Hamilton, Neil Hanley, Robert P. McEvoy, Weibo Pan, William P. Marnane
2009/341 (PDF ) Leakage Resilient Cryptography in Practice Francois-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald
2009/340 (PDF ) Efficient Indifferentiable Hashing into Ordinary Elliptic Curves Eric Brier, Jean-Sebastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
2009/339 (PDF ) A Novel ID-based Electronic Cash System from Pairings Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun
2009/338 (PDF ) Security weaknesses in two multi-server password based authentication protocols Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding
2009/337 (PDF ) A New Lattice-Based Cryptosystem Mixed with a Knapsack Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
2009/336 (PDF ) Partial Signatures and their Applications Mihir Bellare, Shanshan Duan
2009/335 (PDF ) Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/334 (PDF ) Attacking Reduced Rounds of the ARIA Block Cipher Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/333 (PDF ) Hard Fault Analysis of Trivium Yupu Hu, Fengrong Zhang, Yiwei Zhang
2009/332 (PDF ) Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC Ton van Deursen, Sasa Radomirovic
2009/331 (PDF ) Security Notions and Generic Constructions for Client Puzzles L. Chen, P. Morrissey, N. P. Smart, B. Warinschi
2009/328 (PDF ) Flowchart description of security primitives for Controlled Physical Unclonable Functions Boris Skoric, Marc X. Makkes
2009/327 (PDF ) Simple Adaptive Oblivious Transfer Without Random Oracle Kaoru Kurosawa, Ryo Nojima
2009/326 (PDF ) The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property Gregory V. Bard
2009/325 (PDF ) Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi
2009/324 (PDF ) Group-Oriented Fair Exchange of Signatures Qiong Huang, Duncan S. Wong, Willy Susilo
2009/323 (PDF ) Factoring Unbalanced Moduli with Known Bits Eric Brier, David Naccache, Mehdi Tibouchi
2009/322 (PDF ) Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS Reynald Affeldt, David Nowak, Kiyoshi Yamada
2009/321 (PDF ) Tweakable Enciphering Schemes From Stream Ciphers With IV Palash Sarkar
2009/320 (PDF ) Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures Georg Fuchsbauer
2009/319 (PDF ) Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring Xiaofeng Chen, Haibo Tian, Fangguo Zhang
2009/318 (PDF ) The Fermat factorization method revisited Robert ERRA, Christophe GRENIER
2009/317 (PDF ) Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov, Dmitry Khovratovich
2009/316 (PDF ) An Efficient Password Security of Key Exchange Protocol based on ECDLP Jayaprakash Kar, Banshidhar Majhi
2009/315 (PDF ) Breaking RSA-based PIN Encryption with thirty ciphertext validity queries N. P. Smart
2009/314 (PDF ) Secure Two-Party Computation is Practical B. Pinkas, T. Schneider, N. P. Smart, S. Williams
2009/313 (PDF ) Identity Based Group Signatures from Hierarchical Identity-Based Encryption Nigel P. Smart, Bogdan Warinschi
2009/312 (PDF ) Jacobi Quartic Curves Revisited Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
2009/311 (PDF ) Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
2009/310 (PDF ) RFID distance bounding protocol with mixed challenges to prevent relay attacks Chong Hee Kim, Gildas Avoine
2009/309 (PDF ) Fault Attacks on RSA Signatures with Partially Unknown Messages Jean-Sebastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, Pascal Paillier
2009/308 (PDF ) A note on the Certificateless Multi-receiver Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/307 (PDF ) Anonymous Signatures Revisited Vishal Saraswat, Aaram Yun
2009/306 (PDF ) Authentic Time-Stamps for Archival Storage Alina Oprea, Kevin D. Bowers
2009/305 (PDF ) Improved generic algorithms for 3-collisions Antoine Joux, Stefan Lucks
2009/304 (PDF ) Factor-4 and 6 Compression of Cyclotomic Subgroups Koray Karabina
2009/303 (PDF ) Key extraction from general non-discrete signals E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, B. Skoric
2009/302 (PDF ) Cryptanalysis of ESSENCE Maria Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
2009/301 (PDF ) A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure Yuyin Yu, Mingsheng Wang
2009/300 (PDF ) Universally Composable Contributory Group Key Exchange M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonzàlez Nieto
2009/299 (PDF ) On the security of oscillator-based random number generators Mathieu Baudet, David Lubicz, Julien Micolod, André Tassiaux
2009/298 (PDF ) Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/296 (PDF ) Perfectly Balanced Functions in Symbolic Dynamics O. A. Logachev, A. A. Salnikov, S. V. Smyshlyaev, V. V. Yashchenko
2009/295 (PDF ) Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li
2009/294 (PDF ) Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing Roman Schlegel, Duncan S. Wong
2009/293 (PDF ) Enhancing Attribute-based Encryption with Attribute Hierarchy Jin Li, Qian Wang, Cong Wang, Kui Ren
2009/292 (PDF ) Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
2009/291 (PDF ) Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2009/290 (PDF ) Security Analysis of Aggregate signature and Batch verification signature schemes S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan
2009/289 (PDF ) Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks Erik Zenner
2009/288 (PDF ) Efficient Key Exchange with Tight Security Reduction Jiang Wu, Berkant Ustaoglu
2009/287 (PDF ) Generic Attacks on Alternating Unbalanced Feistel Schemes Valerie Nachef
2009/286 (PDF ) On Privacy Losses in the Trusted Agent Model (Abstract) Paulo Mateus, Serge Vaudenay
2009/285 (PDF ) Efficient Public Key Encryption Based on Ideal Lattices Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
2009/284 (PDF ) Privacy-aware Attribute-based Encryption with User Accountability Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
2009/283 (PDF ) Short and Stateless Signatures from the RSA Assumption Susan Hohenberger, Brent Waters
2009/282 (PDF ) Leakage-Resilient Signatures Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy Rothblum
2009/281 (PDF ) Enabling Public Verifiability and Data Dynamics for Storage Security Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
2009/280 (PDF ) Universally Anonymous IBE based on the Quadratic Residuosity Assumption Giuseppe Ateniese, Paolo Gasti
2009/279 (PDF ) Algebraic Side-Channel Attacks Mathieu Renauld, Francois-Xavier Standaert
2009/278 (PDF ) Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rührmair, Qingqing Chen, Paolo Lugli, Ulf Schlichtmann, Martin Stutzmann, György Csaba
2009/277 (PDF ) On the Foundations of Physical Unclonable Functions Ulrich Rührmair, Jan Sölter, Frank Sehnke
2009/276 (PDF ) Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
2009/275 (PDF ) Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit) Thomas Dullien
2009/274 (PDF ) A Collision-resistance Hash Function DIHA2 Xigen. Yao
2009/273 (PDF ) Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/272 (PDF ) A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu, Yingpu Deng
2009/271 (PDF ) Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento
2009/270 (PDF ) Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento
2009/269 (PDF ) Side-channel attacks based on linear approximations Thomas Roche, Cédric Tavernier
2009/267 (PDF ) Simulation based security in the applied pi calculus Stéphanie Delaune, Steve Kremer, Olivier Pereira
2009/266 (PDF ) Pseudorandomness Analysis of the Lai-Massey Scheme Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu
2009/265 (PDF ) Revisiting the Indifferentiability of PGV Hash Functions Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai
2009/264 (PDF ) Proposal of PPS Multivariate Public Key Cryptosystems Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, Masao Kasahara
2009/263 (PDF ) General Error Decodable Secret Sharing Scheme and Its Application Kaoru Kurosawa
2009/262 (PDF ) Computationally Secure Two-Round Authenticated Message Exchange Klaas Ole Kuertz, Henning Schnoor, Thomas Wilke
2009/261 (PDF ) Security of Cyclic Double Block Length Hash Functions including Abreast-DM Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/260 (PDF ) A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs Kota Ideguchi, Toru Owada, Hirotaka Yoshida
2009/258 (PDF ) FACTORIZATION WITH GENUS 2 CURVES Romain COSSET
2009/257 (PDF ) FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION Ulf T. Mattsson
2009/256 (PDF ) Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher Zhiqiang Liu, Dawu Gu, Jing Zhang
2009/255 (PDF ) SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions Ulrich Rührmair
2009/254 (PDF ) Improvement of One Quantum Encryption Scheme Zhengjun Cao
2009/253 (PDF ) Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange Cas J. F. Cremers
2009/252 (PDF ) Sparse Boolean equations and circuit lattices Igor Semaev
2009/251 (PDF ) Format-Preserving Encryption Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
2009/249 (PDF ) Symbolic Encryption with Pseudorandom Keys Daniele Micciancio
2009/248 (PDF ) Cryptanalysis of the MST_3 Public Key Cryptosystem Simon R. Blackburn, Carlos Cid, Ciaran Mullan
2009/247 (PDF ) On the Necessary and Sufficient Assumptions for UC Computation Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2009/246 (PDF ) On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions György Csaba, Xueming Ju, Qingqing Chen, Wolfgang Porod, Jürgen Schmidhuber, Ulf Schlichtmann, Paolo Lugli, Ulrich Rührmair
2009/245 (PDF ) Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring Naoki Ogura, Shigenori Uchiyama
2009/244 (PDF ) Tardos Fingerprinting Codes in the Combined Digit Model Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet U. Celik
2009/243 (PDF ) Faster Pairings on Special Weierstrass Curves Craig Costello, Huseyin Hisil, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2009/242 (PDF ) Examples of differential multicollisions for 13 and 14 rounds of AES-256 Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/241 (PDF ) Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić
2009/240 (PDF ) Group Testing and Batch Verification Gregory M. Zaverucha, Douglas R. Stinson
2009/239 (PDF ) Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations Julien Bringer, Herve Chabanne, Jean-Luc Danger
2009/238 (PDF ) Attacks on Round-Reduced BLAKE LI Ji, XU Liangyu
2009/237 (PDF ) Remarks on One Arbitrated Quantum-signature Scheme Zhengjun Cao
2009/236 (PDF ) Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics Fumiyuki Momose, Jinhui Chao
2009/235 (PDF ) Breaking and Fixing of an Identity Based Multi-Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/234 (PDF ) On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function Rune Steinsmo Ødegård, Danilo Gligoroski
2009/233 (PDF ) A strategy for recovering roots of bivariate polynomials modulo a prime Paula Bustillo, Domingo Gomez, Jaime Gutierrez, Alvar Ibeas
2009/232 (PDF ) MeshHash2 Björn Fay
2009/231 (PDF ) Practical DPA Attacks on MDPL Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede
2009/230 (PDF ) Adaptively Secure Broadcast Martin Hirt, Vassilis Zikas
2009/229 (PDF ) Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer, Christophe Petit, Jean-Jacques Quisquater
2009/228 (PDF ) Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2009/227 (PDF ) Computational soundness, co-induction, and encryption cycles Daniele Micciancio
2009/226 (PDF ) How to Hash into Elliptic Curves Thomas Icart
2009/225 (PDF ) The Security of Abreast-DM in the Ideal Cipher Model Jooyoung Lee, Daesung Kwon
2009/224 (PDF ) Pseudo-Cryptanalysis of Luffa Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang
2009/223 (PDF ) How To Find Weak Input Differences For MD5 Collision Attacks Tao Xie, Dengguo Feng
2009/222 (PDF ) PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware Willi Geiselmann, Kenneth Matheis, Rainer Steinwandt
2009/221 (PDF ) Boneh-Boyen signatures and the Strong Diffie-Hellman problem David Jao, Kayo Yoshida
2009/220 (PDF ) Signature Schemes with Bounded Leakage Resilience Jonathan Katz
2009/219 (PDF ) Strongly Secure Certificateless Key Agreement Georg Lippold, Colin Boyd, Juan González Nieto
2009/218 (PDF ) Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128 Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
2009/217 (PDF ) Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher Palash Sarkar
2009/216 (PDF ) Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher Palash Sarkar
2009/215 (PDF ) A Simple and Generic Construction of Authenticated Encryption With Associated Data Palash Sarkar
2009/214 (PDF ) An Optimally Fair Coin Toss Tal Moran, Moni Naor, Gil Segev
2009/213 (PDF ) Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion Richard Moloney, Gary McGuire, Michael Markowitz
2009/211 (PDF ) Bringing Zero-Knowledge Proofs of Knowledge to Practice Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
2009/210 (PDF ) Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche
2009/209 (PDF ) On Directed Transitive Signature Jia Xu, Ee-Chien Chang, Jianying Zhou
2009/208 (PDF ) PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS Rajesh P Singh, B. K. Sarma, A. Saikia
2009/206 (PDF ) On Optimized FPGA Implementations of the SHA-3 Candidate Groestl Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
2009/205 (PDF ) Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions Maria Isabel Gonzalez Vasco, Angel L. Perez del Pozo
2009/204 (PDF ) GUC-Secure Join Operator in Distributed Relational Database TIAN Yuan
2009/203 (PDF ) Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann
2009/202 (PDF ) A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES Alawi A. Al-Saggaf, Acharya H. S.
2009/201 (PDF ) Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128) Mohamed Abo El-Fotouh, Klaus Diepold
2009/200 (PDF ) A Survey on the Evolution of Cryptographic Protocols in ePassports Rishab Nithyanand
2009/199 (PDF ) Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers Emmanuel Bresson, Anne Canteaut, Benoit Chevallier-Mames, Christophe Clavier, Thomas Fuhr, Aline Gouget, Thomas Icart, Jean-Francois Misarsky, Maria Naya-Plasencia, Pascal Paillier, Thomas Pornin, Jean-Rene Reinhard, Celine Thuillet, Marion Videau
2009/197 (PDF ) Practical pseudo-collisions for hash functions ARIRANG-224/384 Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
2009/196 (PDF ) Analysis of one quantum bit string commitment Zhengjun Cao
2009/195 (PDF ) Secure Evaluation of Private Linear Branching Programs with Medical Applications Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
2009/194 (PDF ) Analysis and Enhance of Anonymous Signcryption Scheme Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang
2009/193 (PDF ) Generalization of Barreto et al ID based Signcryption Scheme Sunder Lal, Prashant Kushwah
2009/192 (PDF ) Linkability of Blind Signature Schemes over Braid Groups Manoj Kumar
2009/191 (PDF ) New logic minimization techniques with applications to cryptology. Joan Boyar, Rene Peralta
2009/190 (PDF ) The discrete logarithm problem in the group of non-singular circulant matrices Ayan Mahalanobis
2009/189 (PDF ) Efficient Unidirectional Proxy Re-Encryption Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
2009/188 (PDF ) Breaking and Building of Group Inside Signature S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopinath, C. Pandu Rangan
2009/187 (PDF ) Compact McEliece Keys from Goppa Codes Rafael Misoczki, Paulo S. L. M. Barreto
2009/186 (PDF ) Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers Nicolas T. Courtois, Gregory V. Bard, Shaun V. Ault
2009/185 (PDF ) All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis Robert P. McEvoy, Michael Tunstall, Claire Whelan, Colin C. Murphy, William P. Marnane
2009/184 (PDF ) Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
2009/183 (PDF ) Proactive Linear Integer Secret Sharing Rune Thorbek
2009/182 (PDF ) Extended Substitution Cipher Chaining mode (ESCC) Mohamed Abo El-Fotouh, Klaus Diepold
2009/181 (PDF ) PSP: Private and Secure Payment with RFID Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe
2009/180 (PDF ) Collaborative, Privacy-Preserving Data Aggregation at Scale Haakon Ringberg, Benny Applebaum, Michael J. Freedman, Matthew Caesar, Jennifer Rexford
2009/179 (PDF ) Near-Collision Attack on the Compression Function of Dynamic SHA2 Hongbo Yu, Xiaoyun Wang
2009/178 (PDF ) Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version) Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
2009/177 (PDF ) Salvaging Merkle-Damgard for Practical Applications Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
2009/176 (PDF ) A novel multi-server authentication protocol Yalin Chen, Chun-Hui Huang, Jue-Sam Chou
2009/175 (PDF ) Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper) Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
2009/174 (PDF ) Making the Diffie-Hellman Protocol Identity-Based Dario Fiore, Rosario Gennaro
2009/173 (PDF ) Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication Patrick Longa, Catherine Gebotys
2009/172 (PDF ) A new Protocol for 1-2 Oblivious Transfer Bjoern Grohmann
2009/171 (PDF ) On the Theory and Practice of Personal Digital Signatures Ivan Damgård, Gert Læssøe Mikkelsen
2009/170 (PDF ) Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/169 (PDF ) Floating Fault analysis of Trivium under Weaker Assumptions Hu Yupu, Gao Juntao, Liu Qing
2009/168 (PDF ) A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH) Michael A. Halcrow, Niels Ferguson
2009/167 (PDF ) A new approach for FCSRs François Arnault, Thierry Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
2009/166 (PDF ) I shall love you up to the death Valerie Nachef, Jacques Patarin
2009/165 (PDF ) Securing RSA against Fault Analysis by Double Addition Chain Exponentiation Matthieu Rivain
2009/164 (PDF ) CCA-Secure Proxy Re-Encryption without Pairings Jun Shao, Zhenfu Cao
2009/163 (PDF ) A New Key-Agreement-Protocol Bjoern Grohmann
2009/162 (PDF ) Certificateless Hybrid Signcryption Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009/161 (PDF ) Built-in Determined Sub-key Correlation Power Analysis Yuichi Komano, Hideo Shimizu, Shinichi Kawamura
2009/160 (PDF ) Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model Joel Alwen, Yevgeniy Dodis, Daniel Wichs
2009/159 (PDF ) Hardware Implementation of the SHA-3 Candidate Skein Stefan Tillich
2009/158 (PDF ) Security Analysis of a Proxy Signature Scheme over Braid Groups Manoj Kumar
2009/157 (PDF ) Efficient Halving for Genus 3 Curves over Binary Fields Peter Birkner, Nicolas Thériault
2009/156 (PDF ) A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution Anupam Pattanayak, B. Majhi
2009/155 (PDF ) Faster Computation of the Tate Pairing Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler
2009/154 (PDF ) Algorithms to solve massively under-defined systems of multivariate quadratic equations Yasufumi Hashimoto
2009/153 (PDF ) A new bound for t−wise almost universal hash functions Long Hoang Nguyen, A. W. Roscoe
2009/151 (PDF ) Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm Shaohua Zhang
2009/150 (PDF ) Efficient group authentication protocols based on human interaction Long Hoang Nguyen, A. W. Roscoe
2009/149 (PDF ) Secure EPC Gen2 compliant Radio Frequency Identification Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado
2009/148 (PDF ) Secret Handshake: Strong Anonymity Definition and Construction Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
2009/147 (PDF ) Preimage Attack on ARIRANG Deukjo Hong, Woo-Hwan Kim, Bonwook Koo
2009/146 (PDF ) Transferable Constant-Size Fair E-Cash Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
2009/145 (PDF ) Security of Permutation-based Compression Function lp 231 Jooyoung Lee, Daesung Kwon
2009/144 (PDF ) On the security of Identity Based Ring Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009/143 (PDF ) Multiple and Unlinkable Public Key Encryption without Certificates Soyoung Park, Sang-Ho Lee, Joohan Lee
2009/142 (PDF ) Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2009/141 (PDF ) Ideal Hierarchical Secret Sharing Schemes Oriol Farras, Carles Padro
2009/140 (PDF ) The Analysis of Galois Substitution Counter Mode (GSCM) Mohamed Abo El-Fotouh, Klaus Diepold
2009/139 (PDF ) Certificateless Group Oriented Signature Secure Against Key Replacement Attack Chunbo Ma, Jun Ao
2009/138 (PDF ) A Hybrid RFID Protocol against Tracking Attacks Jen-Chun Chang, Hsin-Lung Wu
2009/137 (PDF ) The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime Nicolas T. Courtois
2009/136 (PDF ) How to Extract and Expand Randomness: A Summary and Explanation of Existing Results Yvonne Cliff, Colin Boyd, Juan Gonzalez Nieto
2009/135 (PDF ) Practical Key Recovery Attack against Secret-prefix Edon-R Gaëtan Leurent
2009/134 (PDF ) A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity Yindong Chen, Peizhong Lu
2009/131 (PDF ) Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited Anupam Pattanayak, B. Majhi
2009/130 (PDF ) Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity Yindong Chen, Peizhong Lu
2009/129 (PDF ) Faster and Timing-Attack Resistant AES-GCM Emilia Kasper, Peter Schwabe
2009/128 (PDF ) Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator Lu Xiao, Gregory G. Rose
2009/127 (PDF ) Side Channel Cube Attacks on Block Ciphers Itai Dinur, Adi Shamir
2009/126 (PDF ) Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems Siamak F Shahandashti, Reihaneh Safavi-Naini
2009/125 (PDF ) A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki
2009/124 (PDF ) Practical Secure Evaluation of Semi-Private Functions Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
2009/123 (PDF ) On the Complexity of Integer Factorization N. A. Carella
2009/122 (PDF ) Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
2009/120 (PDF ) On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R Danilo Gligoroski, Rune Steinsmo Ødegård
2009/119 (PDF ) A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate Marcel Medwed
2009/118 (PDF ) A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control Jin Li, Kui Ren, Kwangjo Kim
2009/117 (PDF ) Changing probabilities of differentials and linear sums via isomorphisms of ciphers Alexander Rostovtsev
2009/116 (PDF ) Information Theoretically Secure Multi Party Set Intersection Re-Visited Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/115 (PDF ) Scalable Compilers for Group Key Establishment : Two/Three Party to Group S. Sree Vivek, S. Sharmila Deva Selvi, Deepanshu Shukla, C. Pandu Rangan
2009/114 (PDF ) Weakness of Key Predistribution Scheme Proposed by J. Dong et al. Anupam Pattanayak, B. Majhi
2009/113 (PDF ) Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform Niels Ferguson, Stefan Lucks
2009/112 (PDF ) A 2nd-Preimage Attack on AURORA-512 Yu Sasaki
2009/111 (PDF ) Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens, Alexander Sotirov, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger
2009/110 (PDF ) On the Security of Stream Cipher CryptMT v3 Haina Zhang, Xiaoyun Wang
2009/109 (PDF ) Cryptanalysis of Stream Cipher Grain Family Haina Zhang, Xiaoyun Wang
2009/108 (PDF ) Further Results on Implicit Factoring in Polynomial Time Santanu Sarkar, Subhamoy Maitra
2009/107 (PDF ) Compact E-Cash and Simulatable VRFs Revisited Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2009/106 (PDF ) A Collision Attack on AURORA-512 Yu Sasaki
2009/105 (PDF ) Public-Key Cryptosystems Resilient to Key Leakage Moni Naor, Gil Segev
2009/104 (PDF ) 1024 - A High Security Software Oriented Block Cipher Dieter Schmidt
2009/103 (PDF ) Constructing pairing-friendly hyperelliptic curves using Weil restriction David Mandell Freeman, Takakazu Satoh
2009/102 (PDF ) A Step Towards QC Blind Signatures Raphael Overbeck
2009/101 (PDF ) Encryption Schemes Secure under Selective Opening Attack Mihir Bellare, Scott Yilek
2009/100 (PDF ) Computing the endomorphism ring of an ordinary elliptic curve over a finite field Gaetan Bisson, Andrew V. Sutherland
2009/099 (PDF ) A Single Initialization Server for Multi-Party Cryptography Hugue Blier, Alain Tapp
2009/098 (PDF ) Attacking Cryptographic Schemes Based on "Perturbation Polynomials" Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz
2009/097 (PDF ) Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures Brian J. Matt
2009/096 (PDF ) A note on the security of MST3 M. I. Gonzalez Vasco, A. L. Perez del Pozo, P. Taborda Duarte
2009/095 (PDF ) Enhanced Privacy ID from Bilinear Pairing Ernie Brickell, Jiangtao Li
2009/094 (PDF ) On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
2009/093 (PDF ) Cascade Encryption Revisited Peter Gazi, Ueli Maurer
2009/092 (PDF ) Reducing RFID Reader Load with the Meet-in-the-Middle Strategy Jung Hee Cheon, Jeongdae Hong, Gene Tsudik
2009/091 (PDF ) Knapsack Cryptosystem on Elliptic Curves Koichiro Noro, Kunikatsu Kobayashi
2009/090 (PDF ) A Brief History of Provably-Secure Public-Key Encryption Alexander W. Dent
2009/089 (PDF ) A Provably Secure And Efficient Countermeasure Against Timing Attacks Boris Köpf, Markus Dürmuth
2009/088 (PDF ) Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud
2009/086 (PDF ) Point Compression for Koblitz Elliptic Curves P. N. J. Eagle, Steven D. Galbraith, John Ong
2009/085 (PDF ) UC-Secure Source Routing Protocol Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li
2009/084 (PDF ) Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme Mihir Bellare, Thomas Ristenpart
2009/083 (PDF ) Multi-authority attribute based encryption with honest-but-curious central authority Vladimir Bozovic, Daniel Socek, Rainer Steinwandt, Viktoria I. Villanyi
2009/082 (PDF ) The Case for Quantum Key Distribution Douglas Stebila, Michele Mosca, Norbert Lütkenhaus
2009/081 (PDF ) Ensuring Data Storage Security in Cloud Computing Cong Wang, Qian Wang, Kui Ren, Wenjing Lou
2009/080 (PDF ) CoSP: A General Framework For Computational Soundness Proofs Michael Backes, Dennis Hofheinz, Dominique Unruh
2009/079 (PDF ) From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries David Basin, Cas Cremers
2009/078 (PDF ) Attacks on the DECT authentication mechanisms Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
2009/077 (PDF ) On the Security of Iterated Hashing based on Forgery-resistant Compression Functions Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Antoine Joux
2009/076 (PDF ) Construction of large families of pseudorandom subsets using elliptic curves Zhixiong Chen, Chenhuang Wu
2009/075 (PDF ) Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/074 (PDF ) Computational Oblivious Transfer and Interactive Hashing Kirill Morozov, George Savvides
2009/073 (PDF ) Automatic Approach of Provable Security and its Application for OAEP+ GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
2009/072 (PDF ) Implementing cryptographic pairings: a magma tutorial Luis J Dominguez Perez, Ezekiel J Kachisa, Michael Scott
2009/071 (PDF ) Secret sharing on trees: problem solved Laszlo Csirmaz, Gabor Tardos
2009/070 (PDF ) Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis Omran Ahmadi, Francisco Rodríguez-Henriquez
2009/069 (PDF ) Optimistic Fair Exchange with Multiple Arbiters Alptekin Kupcu, Anna Lysyanskaya
2009/068 (PDF ) Overview of Turbo-Code Reconstruction Techniques Johann Barbier, Eric Filiol
2009/067 (PDF ) On fractional correlation immunity of majority functions Chuan-Kun Wu
2009/066 (PDF ) Adaptive Preimage Resistance and Permutation-based Hash Functions Jooyoung Lee, Je Hong Park
2009/065 (PDF ) Foundations of Non-Malleable Hash and One-Way Functions Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi
2009/064 (PDF ) On the Data Complexity of Statistical Attacks Against Block Ciphers (full version) Céline Blondeau, Benoît Gérard
2009/063 (PDF ) CCZ-equivalence and Boolean functions Lilya Budaghyan, Claude Carlet
2009/062 (PDF ) On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring Subhamoy Maitra, Santanu Sarkar
2009/061 (PDF ) Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko
2009/060 (PDF ) Comparing Two Pairing-Based Aggregate Signature Schemes Sanjit Chatterjee, Darrel Hankerson, Edward Knapp, Alfred Menezes
2009/059 (PDF ) On the impossibility of graph secret sharing Laszlo Csirmaz
2009/058 (PDF ) On Generalization of Cheon's Algorithm Takakazu Satoh
2009/057 (PDF ) Anonymity in Shared Symmetric Key Primitives Gregory M. Zaverucha, Douglas R. Stinson
2009/056 (PDF ) Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rainer Leupers, Rudolf Mathar, Heinrich Meyr
2009/055 (PDF ) Universally Composable Symmetric Encryption Ralf Kuesters, Max Tuengerthal
2009/054 (PDF ) On the Security of Tandem-DM Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009/053 (PDF ) New commutative semifields defined by PN multinomials Lilya Budaghyan, Tor Helleseth
2009/052 (PDF ) ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2009/051 (PDF ) Enhanced Target Collision Resistant Hash Functions Revisited Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009/050 (PDF ) On the Portability of Generalized Schnorr Proofs Jan Camenisch, Aggelos Kiayias, Moti Yung
2009/049 (PDF ) Extensions of the Cube Attack based on Low Degree Annihilators Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei, Josef Pieprzyk
2009/048 (PDF ) A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials Palash Sarkar
2009/047 (PDF ) On Approximating Addition by Exclusive OR Palash Sarkar
2009/046 (PDF ) Traceability Codes Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng
2009/045 (PDF ) Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Carmit Hazay, Yehuda Lindell
2009/044 (PDF ) Un-Trusted-HB: Security Vulnerabilities of Trusted-HB Dmitry Frumkin, Adi Shamir
2009/043 (PDF ) Image Encryption by Pixel Property Separation Karthik Chandrashekar Iyer, Aravinda Subramanya
2009/042 (PDF ) On CCZ-equivalence and its use in secondary constructions of bent functions Lilya Budaghyan, Claude Carlet
2009/041 (PDF ) Proofs of Retrievability via Hardness Amplification Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
2009/040 (PDF ) How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2009/039 (PDF ) Key Insulation and Intrusion Resilience Over a Public Channel Mihir Bellare, Shanshan Duan, Adriana Palacio
2009/038 (PDF ) On Algebraic Relations of Serpent S-Boxes Bhupendra Singh, Lexy Alexander, Sanjay Burman
2009/037 (PDF ) Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice) M. Jason Hinek, Charles C. Y. Lam
2009/036 (PDF ) Constructions of Truly Practical Secure Protocols using Standard Smartcards Carmit Hazay, Yehuda Lindell
2009/035 (PDF ) Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim
2009/034 (PDF ) On a Conditional Collision Attack on NaSHA-512 S. Markovski, A. Mileva, V. Dimitrova, D. Gligoroski
2009/033 (PDF ) NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract) Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
2009/032 (PDF ) A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor MITSUNARI Shigeo
2009/031 (PDF ) Adaptively Secure Two-Party Computation with Erasures Yehuda Lindell
2009/030 (PDF ) An efficient fuzzy extractor for limited noise B. Skoric, P. Tuyls
2009/029 (PDF ) Nofish - A new stream cipher Marius Oliver Gheorghita
2009/028 (PDF ) Realizing Hash-and-Sign Signatures under Standard Assumptions Susan Hohenberger, Brent Waters
2009/027 (PDF ) Security of Verifiably Encrypted Signatures Markus Rückert, Dominique Schröder
2009/026 (PDF ) Collision Attacks on NaSHA-384/512 Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
2009/025 (PDF ) Short Redactable Signatures Using Random Trees Ee-Chien Chang, Chee Liang Lim, Jia Xu
2009/024 (PDF ) On Second-Order Fault Analysis Resistance for CRT-RSA Implementations Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
2009/023 (PDF ) Polynomial Runtime and Composability Dennis Hofheinz, Dominique Unruh, Jörn Müller-Quade
2009/022 (PDF ) Correctness of Li Generalization of RSA Cryptosystem Roman Popovych
2009/021 (PDF ) Comparing With RSA Julien Cathalo, David Naccache, Jean-Jacques Quisquater
2009/020 (PDF ) Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
2009/019 (PDF ) Communication-Efficient Private Protocols for Longest Common Subsequence Matthew Franklin, Mark Gondree, Payman Mohassel
2009/018 (PDF ) Huge 2ndpreimages and collisions of khichidi-1 prasanth Kumar Thandra, S. A. V. Satya Murty
2009/017 (PDF ) Anonymous signature scheme Chunbo Ma, Jun Ao
2009/016 (PDF ) Fast elliptic-curve cryptography on the Cell Broadband Engine Neil Costigan, Peter Schwabe
2009/015 (PDF ) Cube Attacks on Trivium S S Bedi, N Rajesh Pillai
2009/014 (PDF ) Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn, Tuvi Etzion, Keith M. Martin, Maura B. Paterson
2009/013 (PDF ) Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 Yehuda Lindell
2009/012 (PDF ) Avoid Mask Re-use in Masked Galois Multipliers D. Canright
2009/011 (PDF ) A Very Compact "Perfectly Masked" S-Box for AES (corrected) D. Canright, Lejla Batina
2009/010 (PDF ) Optimal Multicast Group Communication Zhibin Zhou, Dijiang Huang
2009/009 (PDF ) Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy Christoph Lucas, Dominik Raub, Ueli Maurer
2009/008 (PDF ) A note on Agrawal conjecture Roman Popovych
2009/007 (PDF ) Homomorphic Trapdoor Commitments to Group Elements Jens Groth
2009/006 (PDF ) Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n Vlastimil Klima
2009/005 (PDF ) Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES Wei Wang, Xiaoyun Wang, Guangwu Xu
2009/003 (PDF ) Separating two roles of hashing in one-way message authentication L. H. Nguyen, A. W. Roscoe
2009/002 (PDF ) Thermocommunication Julien Brouchier, Nora Dabbous, Tom Kean, Carol Marsh, David Naccache
2009/001 (PDF ) A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem Brian Baldwin, Richard Moloney, Andrew Byrne, Gary McGuire, William P. Marnane
[ Cryptology ePrint archive ]