Cryptology ePrint Archive: Listing for 2010
Regex
2010/661 (PDF ) Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li, Chao Li, Jinshu Su, Bing Sun
2010/660 (PDF ) Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches Brian J. Matt
2010/659 (PDF ) Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation Mark Manulis, Bertram Poettering
2010/658 (PDF ) ABC - A New Framework for Block Ciphers Uri Avraham, Eli Biham, Orr Dunkelman
2010/657 (PDF ) On small secret key attack against RSA with high bits known prime factor Yasufumi Hashimoto
2010/656 (PDF ) A Note on Constant-Round Zero-Knowledge Proofs of Knowledge Yehuda Lindell
2010/655 (PDF ) On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings İsa Sertkaya, Ali Doğanaksoy
2010/654 (PDF ) Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version) Daniel Kraschewski, Jörn Müller-Quade
2010/653 (PDF ) Cubic groups M. A. Popov
2010/652 (PDF ) Active Domain Expansion for Normal Narrow-pipe Hash Functions Xigen Yao
2010/651 (PDF ) On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya, Avradip Mandal
2010/650 (PDF ) Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 Jean-Sebastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi
2010/649 (PDF ) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
2010/648 (PDF ) Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations Dario Fiore, Dominique Schröder
2010/647 (PDF ) Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
2010/646 (PDF ) Statistical Analysis of Second Order Differential Power Analysis Emmanuel Prouff, Matthieu Rivain, Régis Bévan
2010/645 (PDF ) A Timed Logic for Modeling and Reasoning about Security Protocols Xinfeng Lei, Rui Xue, Ting Yu
2010/644 (PDF ) A Practical Platform for Cube-Attack-like Cryptanalyses Bo Zhu, Wenye Yu, Tao Wang
2010/643 (PDF ) Construct MD5 Collisions Using Just A Single Block Of Message Tao Xie, Dengguo Feng
2010/642 (PDF ) More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai
2010/641 (PDF ) A new algorithm for computing Groebner bases Shuhong Gao, Frank Volny IV, Mingsheng Wang
2010/640 (PDF ) Short collusion-secure fingerprint codes against three pirates Koji Nuida
2010/638 (PDF ) One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi, Hugo Krawczyk
2010/637 (PDF ) Breaking An Identity-Based Encryption Scheme based on DHIES Martin R. Albrecht, Kenneth G. Paterson
2010/636 (PDF ) Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall
2010/634 (PDF ) ROTIV: RFID Ownership Transfer with Issuer Verification Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2010/633 (PDF ) Low Data Complexity Attacks on AES Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque
2010/632 (PDF ) Efficient and provably-secure certificateless signature scheme without bilinear pairings He Debiao, Chen Jianhua, Zhang Rui
2010/631 (PDF ) Black-box property of Cryptographic Hash Functions Michal Rjaško
2010/630 (PDF ) Divison Polynomials for Alternate Models of Elliptic Curves Dustin Moody
2010/629 (PDF ) On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang, Mridul Nandi, Moti Yung
2010/628 (PDF ) State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo, Kenneth Koon-Ho Wong, Leonie Simpson, Ed Dawson
2010/627 (PDF ) Secure and Efficient Protocols for Iris and Fingerprint Identification Marina Blanton, Paolo Gasti
2010/626 (PDF ) Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu, Hai Jin
2010/625 (PDF ) Attacking and fixing Helios: An analysis of ballot secrecy Veronique Cortier, Ben Smyth
2010/624 (PDF ) No-leak authentication by the Sherlock Holmes method Dima Grigoriev, Vladimir Shpilrain
2010/623 (PDF ) Cryptanalysis of Skein Daniel J. Bernstein, Tanja Lange
2010/622 (PDF ) A new result on the distinctness of primitive sequences over Z(pq) modulo 2 Qunxiong Zheng, Wenfeng Qi
2010/621 (PDF ) Generic Compilers for Authenticated Key Exchange (Full Version) Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
2010/619 (PDF ) Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption Yang Lu
2010/618 (PDF ) A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 Thomas Fuhr, Henri Gilbert, Jean-Renë Reinhard, Marion Videau
2010/617 (PDF ) Computing Discrete Logarithms in an Interval Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai
2010/616 (PDF ) A non-uniform birthday problem with applications to discrete logarithms Steven D. Galbraith, Mark Holmes
2010/615 (PDF ) Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval Steven D. Galbraith, Raminder S. Ruprai
2010/614 (PDF ) An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder, Marcin Wojcik, Stefan Tillich, Dan Page
2010/613 (PDF ) Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner, Chris Peikert
2010/611 (PDF ) Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/610 (PDF ) Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions Craig Gentry, Daniel Wichs
2010/609 (PDF ) The Round Complexity of General VSS Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2010/608 (PDF ) A New Model of Binary Elliptic Curves with Fast Arithmetic Hongfeng Wu, Chunming Tang, Rongquan Feng
2010/607 (PDF ) How to Improve Rebound Attacks María Naya-Plasencia
2010/606 (PDF ) Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices He Debiao, Chen Jianhua, Hu Jin
2010/605 (PDF ) A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques Tzipora Halevi, Nitesh Saxena
2010/604 (PDF ) On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization Shangwei Zhao, Ruyong Feng, Xiao-Shan Gao
2010/603 (PDF ) Cryptanalysis of Dual CRT-RSA Santanu Sarkar, Subhamoy Maitra
2010/602 (PDF ) An Improved Algebraic Attack on Hamsi-256 Itai Dinur, Adi Shamir
2010/601 (PDF ) Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic Lei Li, Siman Yang
2010/600 (PDF ) Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters Anne Broadbent, Stacey Jeffery, Alain Tapp
2010/599 (PDF ) Secure Multiparty Computation with Partial Fairness Amos Beimel, Eran Omri, Ilan Orlov
2010/598 (PDF ) A Broadcast Attack against NTRU Using Ding's Algorithm Yanbin Pan, Yingpu Deng
2010/597 (PDF ) A New Class of Bent--Negabent Boolean Functions Sugata Gangopadhyay, Ankita Chaturvedi
2010/596 (PDF ) Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL Enrico Thomae, Christopher Wolf
2010/595 (PDF ) Attribute-Based Signatures Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/594 (PDF ) Cache Games - Bringing Access Based Cache Attacks on AES to Practice Endre Bangerter, David Gullasch, Stephan Krenn
2010/593 (PDF ) Differential Attack on Five Rounds of the SC2000 Block Cipher Jiqiang Lu
2010/591 (PDF ) Bonsai Trees, or How to Delegate a Lattice Basis David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
2010/590 (PDF ) Beyond the Limits of DPA: Combined Side-Channel Collision Attacks Andrey Bogdanov, Ilya Kizhvatov
2010/589 (PDF ) Higher-order differential properties of Keccak and Luffa Christina Boura, Anne Canteaut, Christophe De Cannière
2010/588 (PDF ) Improved Collisions for Reduced ECHO-256 Martin Schläffer
2010/587 (PDF ) Group Message Authentication Bartosz Przydatek, Douglas Wikström
2010/586 (PDF ) Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm İsmail San, Nuray At
2010/585 (PDF ) Smaller decoding exponents: ball-collision decoding Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/584 (PDF ) VMCrypt - Modular Software Architecture for Scalable Secure Computation Lior Malka, Jonathan Katz
2010/583 (PDF ) Improved Preimage Attack on One-block MD4 Jinmin Zhong, Xuejia Lai
2010/582 (PDF ) Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
2010/581 (PDF ) Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm Jintai Ding
2010/580 (PDF ) The Cube Attack on Stream Cipher Trivium and Quadraticity Tests Piotr Mroczkowski, Janusz Szmidt
2010/579 (PDF ) Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion WeiGuo Zhang, GuoZhen Xiao
2010/578 (PDF ) L1 - An Intermediate Language for Mixed-Protocol Secure Computation Axel Schroepfer, Florian Kerschbaum, Guenter Mueller
2010/577 (PDF ) Discrete Logarithms, Diffie-Hellman, and Reductions Neal Koblitz, Alfred Menezes, Igor Shparlinski
2010/576 (PDF ) Efficient Hashing using the AES Instruction Set Joppe W. Bos, Onur Ozen, Martijn Stam
2010/575 (PDF ) A Discrete Logarithm Attack on Elliptic Curves Otto Johnston
2010/574 (PDF ) Cryptanalysis of PRESENT-like ciphers with secret S-boxes Julia Borghoff, Lars R. Knudsen, Gregor Leander, Soeren S. Thomsen
2010/573 (PDF ) On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$ Yongqiang Li, Mingsheng Wang
2010/572 (PDF ) Cryptanalysis of splay tree based encryption Jean-Philippe Aumasson
2010/571 (PDF ) Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform Mohamed El Hadedy, Danilo Gligoroski, Svein J. Knapskog
2010/570 (PDF ) Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur, Adi Shamir
2010/569 (PDF ) Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function Jérémy Jean, Pierre-Alain Fouque
2010/568 (PDF ) Efficient Two-Move Blind Signatures in the Common Reference String Model E. Ghadafi, N. P. Smart
2010/567 (PDF ) ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS Claude Carlet, Sihem Mesnager
2010/566 (PDF ) Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles Yusuke Naito
2010/565 (PDF ) Self-Protecting Electronic Medical Records Using Attribute-Based Encryption Joseph A. Akinyele, Christoph U. Lehmann, Matthew D. Green, Matthew W. Pagano, Zachary N. J. Peterson, Aviel D. Rubin
2010/564 (PDF ) Cryptographic Randomness Testing of Block Ciphers and Hash Functions Ali Doğanaksoy, Barış Ege, Onur Koçak, Fatih Sulak
2010/563 (PDF ) Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption Tatsuaki Okamoto, Katsuyuki Takashima
2010/562 (PDF ) How to Leak on Key Updates Allison Lewko, Mark Lewko, Brent Waters
2010/561 (PDF ) Password-Protected Secret Sharing Stanislaw Jarecki, Ali Bagherzandi, Nitesh Saxena, Yanbin Lu
2010/560 (PDF ) On CCA-Secure Fully Homomorphic Encryption J. Loftus, A. May, N. P. Smart, F. Vercauteren
2010/559 (PDF ) Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
2010/558 (PDF ) Solving LWE problem with bounded errors in polynomial time Jintai Ding
2010/556 (PDF ) Definitional Issues in Functional Encryption Adam O'Neill
2010/555 (PDF ) RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation S. Duquesne
2010/554 (PDF ) Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant Stéphane Jacob
2010/552 (PDF ) A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality Carmit Hazay, Yehuda Lindell
2010/551 (PDF ) A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries Carmit Hazay, Yehuda Lindell
2010/550 (PDF ) Isogenies and Cryptography RAZA ALI KAZMI
2010/549 (PDF ) A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem Yalin Chen, Jue-Sam Chou, Chi-Fong Lin
2010/548 (PDF ) SHA-512/256 Shay Gueron, Simon Johnson, Jesse Walker
2010/546 (PDF ) Timed Encryption and Its Application Shaoquan Jiang
2010/545 (PDF ) Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu, Chuankun Wu
2010/544 (PDF ) Semantic Security Under Related-Key Attacks and Applications Benny Applebaum, Danny Harnik, Yuval Ishai
2010/543 (PDF ) Functional Encryption: Definitions and Challenges Dan Boneh, Amit Sahai, Brent Waters
2010/542 (PDF ) Squaring in cyclotomic subgroups Koray Karabina
2010/541 (PDF ) One-time Computable and Uncomputable Functions Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2010/540 (PDF ) Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption Anna Lysyanskaya, Aaron Segal
2010/539 (PDF ) Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves Reza R. Farashahi, Pierre-Alain Fouque, Igor E. Shparlinski, Mehdi Tibouchi, J. Felipe Voloch
2010/538 (PDF ) Rotational Rebound Attacks on Reduced Skein Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger
2010/537 (PDF ) Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits Yongzhuang Wei, Jiqiang Lu, Yupu Hu
2010/536 (PDF ) On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Xu Guo, Sinan Huang, Leyla Nazhandali, Patrick Schaumont
2010/535 (PDF ) Linear Analysis of Reduced-Round CubeHash Tomer Ashur, Orr Dunkelman
2010/534 (PDF ) Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity Xiangyong Zeng, Claude Carlet, Jinyong Shan, Lei Hu
2010/532 (PDF ) A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov, Christian Rechberger
2010/531 (PDF ) Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem
2010/530 (PDF ) How to Read a Signature? Vanessa Gratzer, David Naccache
2010/529 (PDF ) Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields Kristin Lauter, Ning Shang
2010/528 (PDF ) Constant-Round Private Function Evaluation with Linear Complexity Jonathan Katz, Lior Malka
2010/527 (PDF ) The Digital Signature Scheme MQQ-SIG Danilo Gligoroski, Rune Steinsmo \O deg\aa rd, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski
2010/526 (PDF ) Faster Explicit Formulas for Computing Pairings over Ordinary Curves Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
2010/525 (PDF ) Torus-based compression by factor 4 and 6 Koray Karabina
2010/524 (PDF ) Combining properties of cryptographic hash functions Michal Rjaško
2010/523 (PDF ) Affine Masking against Higher-Order Side Channel Analysis Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
2010/522 (PDF ) Signatures Resilient to Continual Leakage on Memory and Computation Tal Malkin, Isamu Teranishiy, Yevgeniy Vahlis, Moti Yung
2010/521 (PDF ) Linear Approximations of Addition Modulo $2^n$-1 Xiutao Feng, Chunfang Zhou, Chuankun Wu
2010/520 (PDF ) Implementing Gentry's Fully-Homomorphic Encryption Scheme Craig Gentry, Shai Halevi
2010/519 (PDF ) Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited Matthias Krause, Frederik Armknecht, Ewan Fleischmann
2010/518 (PDF ) Boolean functions with all main cryptographic properties Ziran Tu, Yingpu Deng
2010/517 (PDF ) Cryptanalysis of block EnRUPT Elias Yarrkov
2010/516 (PDF ) Key Agreement Protocols Based on Multivariate Polynomials over Fq Masahiro Yagisawa
2010/514 (PDF ) Semi-Homomorphic Encryption and Multiparty Computation Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
2010/513 (PDF ) Key-Dependent Message Security: Generic Amplification and Completeness Benny Applebaum
2010/512 (PDF ) Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo
2010/511 (PDF ) On the complexity of Decomposition Attack Koh-ichi Nagao
2010/509 (PDF ) On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware Maria Dubovitskaya, Alessandra Scafuro, Ivan Visconti
2010/508 (PDF ) A Fault Analytic Method against HB+ Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento
2010/507 (PDF ) On isotopisms of commutative presemifields and CCZ-equivalence of functions Lilya Budaghyan, Tor Helleseth
2010/506 (PDF ) Quantum Preimage and Collision Attacks on CubeHash Gaëtan Leurent
2010/505 (PDF ) Termination-Insensitive Computational Indistinguishability (and applications to computational soundness) Dominique Unruh
2010/504 (PDF ) Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret
2010/503 (PDF ) BiTR: Built-in Tamper Resilience Seung Geol Choi, Aggelos Kiayias, Tal Malkin
2010/502 (PDF ) Proving Coercion-Resistance of Scantegrity II Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/501 (PDF ) Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
2010/500 (PDF ) ATTACKS ON THE AKACP PROTOCOL Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, Spyros T. Halkidis, George Stephanides
2010/499 (PDF ) Secure Computations on Non-Integer Values M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schroeder
2010/498 (PDF ) Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields Vladislav Kovtun, Sergey Kavun
2010/496 (PDF ) Efficient Attributes for Anonymous Credentials (Extended Version) Jan Camenisch, Thomas Groß
2010/495 (PDF ) A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme Mahabir Prasad Jhanwar
2010/494 (PDF ) Stronger Security Model of Group Key Agreement Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
2010/492 (PDF ) Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/491 (PDF ) A Collaborative Framework for Privacy Protection in Online Social Networks Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
2010/490 (PDF ) Strong designated verifier signature scheme: new definition and construction Zuhua Shao
2010/489 (PDF ) Loiss: A Byte-Oriented Stream Cipher Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
2010/488 (PDF ) Fully Leakage-Resilient Signatures Elette Boyle, Gil Segev, Daniel Wichs
2010/487 (PDF ) Constant Round Non-Malleable Protocols using One Way Functions Vipul Goyal
2010/486 (PDF ) A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS Claude Carlet, Sihem Mesnager
2010/485 (PDF ) Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba
2010/484 (PDF ) Automata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
2010/483 (PDF ) Constant-round Non-Malleable Commitments from Any One-Way Function Huijia Lin, Rafael Pass
2010/481 (PDF ) A secure email login system using virtual password Bhavin Tanti, Nishant doshi
2010/480 (PDF ) Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010-- Shigeo Tsujii, Masahito Gotaishi
2010/479 (PDF ) Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems R. M. Avanzi, S. Hoerder, D. Page, M. Tunstall
2010/478 (PDF ) Cryptanalysis of the Convex Hull Click Human Identification Protocol Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
2010/477 (PDF ) On Compression of Data Encrypted with Block Ciphers Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin
2010/476 (PDF ) Predicate Encryption with Partial Public Keys Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
2010/475 (PDF ) Pairing Computation on Elliptic Curves of Jacobi Quartic Form Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li
2010/474 (PDF ) Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman
2010/472 (PDF ) Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought A. Simone, B. Skoric
2010/470 (PDF ) Two identification protocols based on Cayley graphs of Coxeter groups Feliú Sagols, Guillermo Morales-Luna
2010/469 (PDF ) Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
2010/468 (PDF ) Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes Goichiro Hanaoka, Jian Weng
2010/467 (PDF ) Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles Xinfeng Lei, Rui Xue, Ting Yu
2010/466 (PDF ) PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search Benwen Zhu, Bo Zhu, Kui Ren
2010/465 (PDF ) How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices Falko Strenzke
2010/463 (PDF ) Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems Mohammad Reza Sohizadeh Abyaneh
2010/462 (PDF ) Unconditionally Secure Rational Secret Sharing in Standard Communication Networks Zhifang Zhang
2010/461 (PDF ) Identity Based Partial Aggregate Signature Scheme Without Pairing S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, C. Pandu Rangan
2010/459 (PDF ) CCA2 Secure Certificateless Encryption Schemes Based on RSA S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/458 (PDF ) Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring Masahiro Yagisawa
2010/457 (PDF ) Improving the performance of Luffa Hash Algorithm Thomaz Oliveira, Julio López
2010/456 (PDF ) Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
2010/455 (PDF ) Optimal Verification of Operations on Dynamic Sets Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2010/454 (PDF ) Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol Jesse Walker, Jiangtao Li
2010/453 (PDF ) Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh, David Mandell Freeman
2010/452 (PDF ) Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao, Matthew Nicolas Kreeger
2010/451 (PDF ) Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault Subidh Ali, Debdeep Mukhopadhyay
2010/450 (PDF ) Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary Kaoru Kurosawa
2010/449 (PDF ) Oblivious and Fair Server-Aided Two-Party Computation Amir Herzberg, Haya Shulman
2010/448 (PDF ) Sequential Rationality in Cryptographic Protocols Ronen Gradwohl, Noam Livne, Alon Rosen
2010/447 (PDF ) Side-channel Analysis of Six SHA-3 Candidates Olivier Benoit, Thomas Peyrin
2010/446 (PDF ) Short One-Time Signatures G. M. Zaverucha, D. R. Stinson
2010/445 (PDF ) Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs Ekawat Homsirikamol, Marcin Rogawski, Kris Gaj
2010/444 (PDF ) New Construction of Identity-based Proxy Re-encryption Song Luo, Jianbin Hu, Zhong Chen
2010/443 (PDF ) Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu
2010/442 (PDF ) Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade Dan Boneh, Hart Montgomery, Ananth Raghunathan
2010/441 (PDF ) Provably Secure Higher-Order Masking of AES Matthieu Rivain, Emmanuel Prouff
2010/440 (PDF ) Piret and Quisquater's DFA on AES Revisited Christophe Giraud, Adrian Thillard
2010/439 (PDF ) Embedded Extended Visual Cryptography Schemes Feng Liu, Chuankun Wu
2010/438 (PDF ) Achieving Leakage Resilience Through Dual System Encryption Allison Lewko, Yannis Rouselakis, Brent Waters
2010/437 (PDF ) Selecting Parameters for the Rainbow Signature Scheme - Extended Version - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/436 (PDF ) Arithmetic of Supersingular Koblitz Curves in Characteristic Three Roberto Avanzi, Clemens Heuberger, Helmut Prodinger
2010/435 (PDF ) The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA Cihangir Tezcan
2010/434 (PDF ) Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 Takanori Isobe, Taizo Shirai
2010/433 (PDF ) The PASSERINE Public Key Encryption and Authentication Mechanism Markku-Juhani O. Saarinen
2010/432 (PDF ) AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS K. Atighehchi, A. Enache, T. Muntean, G. Risterucci
2010/431 (PDF ) Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees Jing Liu, Bo Yang
2010/430 (PDF ) Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates Vlastimil Klima, Danilo Gligoroski
2010/429 (PDF ) A Family of Implementation-Friendly BN Elliptic Curves Geovandro C. C. F. Pereira, Marcos A. Simplício Jr, Michael Naehrig, Paulo S. L. M. Barreto
2010/428 (PDF ) Random Oracles in a Quantum World Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
2010/426 (PDF ) Parallelizing the Camellia and SMS4 Block Ciphers - Extended version Huihui Yap, Khoongming Khoo, Axel Poschmann
2010/425 (PDF ) KIST: A new encryption algorithm based on splay R. Wei, Z. Zeng
2010/424 (PDF ) CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
2010/423 (PDF ) Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm LI Yun-qiang, Wang Ai-lan
2010/422 (PDF ) Synchronized Aggregate Signatures: New Definitions, Constructions and Applications Jae Hyun Ahn, Matthew Green, Susan Hohenberger
2010/421 (PDF ) Binomial Sieve Series -- a Prospective Cryptographic Tool Gideon Samid
2010/420 (PDF ) Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
2010/419 (PDF ) White-Box Cryptography and SPN ciphers. LRC method. Dmitry Schelkunov
2010/418 (PDF ) Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function Jue-Sam Chou, Hsien-ching Chen, Chun-Yun Chen
2010/417 (PDF ) Distinguishing Properties of Higher Order Derivatives of Boolean Functions Ming Duan, Xuejia Lai, Mohan Yang, Xiaorui Sun, Bo Zhu
2010/416 (PDF ) Computationally Sound Verification of Source Code Michael Backes, Matteo Maffei, Dominique Unruh
2010/415 (PDF ) Perfectly Balanced Boolean Functions and Golić Conjecture Stanislav Smyshlyaev
2010/414 (PDF ) On Strong Simulation and Composable Point Obfuscation Nir Bitansky, Ran Canetti
2010/413 (PDF ) Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics E. A. Grechnikov
2010/412 (PDF ) Optimal Adversary Behavior for the Serial Model of Financial Attack Trees Margus Niitsoo
2010/411 (PDF ) Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials. Vivien Dubois, Jean-Gabriel Kammerer
2010/410 (PDF ) Wild McEliece Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010/409 (PDF ) The collision security of Tandem-DM in the ideal cipher model Jooyoung Lee, Martijn Stam, John Steinberger
2010/408 (PDF ) Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
2010/407 (PDF ) Flaws in Differential Cryptanalysis of Reduced Round PRESENT Manoj Kumar, Pratibha Yadav, Meena Kumari
2010/406 (PDF ) Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf Julien Francq, Céline Thuillet
2010/405 (PDF ) Privacy-Preserving RFID Systems: Model and Constructions Sébastien Canard, Iwen Coisel, Jonathan Etrog, Marc Girault
2010/404 (PDF ) On the Insecurity of Parallel Repetition for Leakage Resilience Allison Lewko, Brent Waters
2010/402 (PDF ) On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack Mohammad Reza Sohizadeh Abyaneh
2010/401 (PDF ) Privacy-friendly Incentives and their Application to Wikipedia (Extended Version) Jan Camenisch, Thomas Groß, Peter Hladky, Christian Hoertnagl
2010/400 (PDF ) Security Analysis of a Threshold Proxy Signature Scheme Kitae Kim, Dahun Nyang
2010/399 (PDF ) Faster Computation of Self-pairings Chang-An Zhao, Fangguo Zhang, Dongqing Xie
2010/398 (PDF ) Distinguisher for Shabal's Permutation Function Peter Novotney
2010/397 (PDF ) Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks Mihir Bellare, David Cash
2010/396 (PDF ) From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks Noémie Floissac, Yann L'Hyver
2010/395 (PDF ) On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption Zhibin Zhou, Dijiang Huang
2010/394 (PDF ) Horizontal Correlation Analysis on Exponentiation Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylene Roussellet, Vincent Verneuil
2010/393 (PDF ) A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment Jue-Sam Chou, Yalin Chen, Chun-Hui Huang
2010/392 (PDF ) Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2010/391 (PDF ) Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks Daniel Z. Zanger
2010/390 (PDF ) Elliptic curves in Huff's model Hongfeng Wu, Rongquan Feng
2010/389 (PDF ) The impossibility of computationally sound XOR Dominique Unruh
2010/388 (PDF ) On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings Sanjit Chatterjee, Darrel Hankerson, Alfred Menezes
2010/387 (PDF ) A Combinatorial Analysis of HC-128 Goutam Paul, Subhamoy Maitra, Shashwat Raizada
2010/386 (PDF ) BoostReduce - A Framework For Strong Lattice Basis Reduction Werner Backes, Susanne Wetzel
2010/385 (PDF ) First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version– Emmanuel Prouff, Robert McEvoy
2010/384 (PDF ) Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski, Vlastimil Klima
2010/383 (PDF ) Huff's Model for Elliptic Curves Marc Joye, Mehdi Tibouchi, Damien Vergnaud
2010/382 (PDF ) Deterministic Encoding and Hashing to Odd Hyperelliptic Curves Pierre-Alain Fouque, Mehdi Tibouchi
2010/381 (PDF ) Security Reductions of the Second Round SHA-3 Candidates Elena Andreeva, Bart Mennink, Bart Preneel
2010/380 (PDF ) Analysis of an internet voting protocol Kristian Gjøsteen
2010/379 (PDF ) Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree Sorina Ionica, Antoine Joux
2010/378 (PDF ) Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation Jin Wang
2010/377 (PDF ) Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring Masahiro Yagisawa
2010/376 (PDF ) Identity Based Online/Offline Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/375 (PDF ) Improved Collision Attacks on the Reduced-Round Grøstl Hash Function Kota Ideguchi, Elmar Tischhauser, Bart Preneel
2010/374 (PDF ) Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees Zhen Liu, Zhenfu Cao, Duncan S. Wong
2010/373 (PDF ) Hashing into Hessian Curves Reza Rezaeian Farashahi
2010/372 (PDF ) Decoding square-free Goppa codes over $\F_p$ Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki
2010/371 (PDF ) Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves Nicolas Estibals
2010/370 (PDF ) Finding discrete logarithms with a set orbit distinguisher Robert P. Gallant
2010/369 (PDF ) Double Ciphertext Mode : A Proposal for Secure Backup Debrup Chakraborty, Cuauhtemoc Mancillas-Lopez
2010/368 (PDF ) Round-Optimal Password-Based Authenticated Key Exchange Jonathan Katz, Vinod Vaikuntanathan
2010/367 (PDF ) Starfish on Strike Daniel J. Bernstein, Peter Birkner, Tanja Lange
2010/366 (PDF ) Oblivious RAM Revisited Benny Pinkas, Tzachy Reinman
2010/365 (PDF ) TASTY: Tool for Automating Secure Two-partY computations Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg
2010/364 (PDF ) A Compact FPGA Implementation of the SHA-3 Candidate ECHO Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/363 (PDF ) An Analysis of Affine Coordinates for Pairing Computation Kristin Lauter, Peter L. Montgomery, Michael Naehrig
2010/362 (PDF ) Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties Deng Tang, Weiguo Zhang, Xiaohu Tang
2010/361 (PDF ) On the Use of Financial Data as a Random Beacon Jeremy Clark, Urs Hengartner
2010/360 (PDF ) On the Security of Identity Based Threshold Unsigncryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, S. Priti, C. Pandu Rangan
2010/359 (PDF ) Identity Based Self Delegated Signature - Self Proxy Signatures S. Sharmila Deva Selvi, S. Sree Vivek, S. Gopinath, C. Pandu Rangan
2010/358 (PDF ) The Fiat--Shamir Transform for Group and Ring Signature Schemes M. -F. Lee, N. P. Smart, B. Warinschi
2010/356 (PDF ) Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes Pinaki Sarkar, Amrita Saha, Morshed Udan Chowdhury
2010/355 (PDF ) Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
2010/354 (PDF ) High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves Jean-Luc Beuchat, Jorge Enrique González Díaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodríguez-Henríquez, Tadanori Teruya
2010/353 (PDF ) Cryptographic Pairings Based on Elliptic Nets Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
2010/352 (PDF ) A Digital Signature Using Multivariate Functions on Quaternion Ring Masahiro Yagisawa
2010/351 (PDF ) Decentralizing Attribute-Based Encryption Allison Lewko, Brent Waters
2010/350 (PDF ) A Security Enhancement and Proof for Authentication and Key Agreement (AKA) Vladimir Kolesnikov
2010/349 (PDF ) Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems Kenneth Koon-Ho Wong, Gregory V. Bard
2010/348 (PDF ) Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids A. N. Alekseychuk
2010/347 (PDF ) Time-Specific Encryption Kenneth G. Paterson, Elizabeth A. Quaglia
2010/346 (PDF ) Efficient Generalized Signcryption Schemes Prashant Kushwah, Sunder Lal
2010/345 (PDF ) Robust RFID Authentication Protocol with Formal Proof and Its Feasibility Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama, Kazuo Ohta
2010/344 (PDF ) Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves. Ezekiel J Kachisa
2010/343 (PDF ) Identity Based Public Verifiable Signcryption Scheme S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/342 (PDF ) Fixed Argument Pairings Craig Costello, Douglas Stebila
2010/341 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme Masao Kasahara
2010/340 (PDF ) A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm Jayaprakash Kar, Banshidhar Majhi
2010/339 (PDF ) A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols Jose Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
2010/338 (PDF ) Efficient SIMD arithmetic modulo a Mersenne number Joppe W. Bos, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery
2010/337 (PDF ) Practical-Titled Attack on AES-128 Using Chosen-Text Relations Vincent Rijmen
2010/336 (PDF ) Efficient Differential Fault Analysis for AES Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2010/335 (PDF ) Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, Catherine Gebotys
2010/334 (PDF ) Security Proof of AugPAKE SeongHan Shin, Kazukuni Kobara, Hideki Imai
2010/332 (PDF ) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurelien Francillon, Boris Danev, Srdjan Capkun
2010/331 (PDF ) A Distinguisher for High Rate McEliece Cryptosystems Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
2010/330 (PDF ) Distributed Rational Consensus Amjed Shareef
2010/329 (PDF ) On the Security of Pseudorandomized Information-Theoretically Secure Schemes Koji Nuida, Goichiro Hanaoka
2010/328 (PDF ) Signatures for Multi-source Network Coding László Czap, István Vajda
2010/327 (PDF ) Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2010/326 (PDF ) Privacy-Preserving Multi-Objective Evolutionary Algorithms Daniel Funke, Florian Kerschbaum
2010/325 (PDF ) Effect of the Dependent Paths in Linear Hull Zhenli Dai, Meiqin Wang, Yue Sun
2010/324 (PDF ) Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images Abdel Alim Kamal, Amr M. Youssef
2010/323 (PDF ) Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
2010/322 (PDF ) Improved Single-Key Attacks on 8-round AES Orr Dunkelman, Nathan Keller, Adi Shamir
2010/321 (PDF ) Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function Martin Schläffer
2010/319 (PDF ) On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010 Jian Weng, Yunlei Zhao
2010/318 (PDF ) Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost Ivan Damgård, Claudio Orlandi
2010/317 (PDF ) A Note On Gottesman-Chuang Quantum Signature Scheme Zhengjun Cao
2010/316 (PDF ) A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
2010/315 (PDF ) Efficient Techniques for High-Speed Elliptic Curve Cryptography Patrick Longa, Catherine Gebotys
2010/314 (PDF ) Weaknesses of a dynamic ID-based remote user authentication scheme He Debiao, Chen Jianhua, Hu Jin
2010/313 (PDF ) Fast Exhaustive Search for Polynomial Systems in $F_2$ Charles Bouillaguet, Chen-Mou Cheng, Tony (Tung) Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang
2010/312 (PDF ) Security weakness of two authenticated key exchange protocols from pairings Qingfeng Cheng, Chuangui Ma
2010/311 (PDF ) Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation J. C. Bajard, S. Duquesne, M. Ercegovac
2010/309 (PDF ) Co-Z Addition Formulae and Binary Ladders on Elliptic Curves Raveen R. Goundar, Marc Joye, Atsuko Miyaji
2010/308 (PDF ) Attacking M&M Collective Signature Scheme Michal Rjaško, Martin Stanek
2010/307 (PDF ) Impossible Differential Cryptanalysis of SPN Ciphers Ruilin Li, Bing Sun, Chao Li
2010/306 (PDF ) On security of a remote user authentication scheme without using smart cards He Debiao, Chen Jianhua, Hu Jin
2010/305 (PDF ) On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing Marten van Dijk, Ari Juels
2010/304 (PDF ) Cryptanalysis of the Compression Function of SIMD Hongbo Yu, Xiaoyun Wang
2010/303 (PDF ) Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange Ran Canetti, Sebastian Gajek
2010/302 (PDF ) Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design Frederik Armknecht, Carsten Elsner, Martin Schmidt
2010/301 (PDF ) On generalized Feistel networks Viet Tung Hoang, Phillip Rogaway
2010/300 (PDF ) Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai
2010/299 (PDF ) Faster Fully Homomorphic Encryption Damien Stehle, Ron Steinfeld
2010/298 (PDF ) On the Indifferentiability of the Grøstl Hash Function Elena Andreeva, Bart Mennink, Bart Preneel
2010/297 (PDF ) Correlation-Enhanced Power Analysis Collision Attack Amir Moradi, Oliver Mischke, Thomas Eisenbarth
2010/296 (PDF ) Hash-based Multivariate Public Key Cryptosystems WANG Hou-Zhen, ZHANG Huan-Guo
2010/295 (PDF ) Ideal Key Derivation and Encryption in Simulation-based Security Ralf Kuesters, Max Tuengerthal
2010/294 (PDF ) Computing genus 2 curves from invariants on the Hilbert moduli space Kristin Lauter, Tonghai Yang
2010/293 (PDF ) Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities Jacques Patarin
2010/292 (PDF ) A Low-Area yet Performant FPGA Implementation of Shabal Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
2010/291 (PDF ) Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card He Debiao, Chen Jianhua, Hu Jin
2010/290 (PDF ) Intractable Problems in Cryptography Neal Koblitz, Alfred Menezes
2010/289 (PDF ) A Two-Party Protocol with Trusted Initializer for Computing the Inner Product Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento
2010/288 (PDF ) Lattice-based Identity-Based Broadcast Encryption Scheme Jin Wang, Jingguo Bi
2010/287 (PDF ) Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography Jacques Patarin
2010/286 (PDF ) On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions Sugata Gangopadhyay, Brajesh Kumar Singh
2010/285 (PDF ) A SAT-based preimage analysis of reduced KECCAK hash functions Pawel Morawiecki, Marian Srebrny
2010/284 (PDF ) Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer Yehuda Lindell, Benny Pinkas
2010/283 (PDF ) Recursive Information Hiding in Visual Cryptography Sandeep Katta
2010/282 (PDF ) Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish Kerry A. McKay, Poorvi L. Vora
2010/281 (PDF ) Protocols for Reliable and Secure Message Transmission Ashish Choudhury
2010/280 (PDF ) Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation Arpita Patra
2010/279 (PDF ) On the Round Complexity of Covert Computation Vipul Goyal, Abhishek Jain
2010/278 (PDF ) Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage Zvika Brakerski, Yael Tauman Kalai, Jonathan Katz, Vinod Vaikuntanathan
2010/276 (PDF ) Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/275 (PDF ) Position-Based Quantum Cryptography: Impossibility and Constructions Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner
2010/274 (PDF ) Online/Offline Identity-Based Signcryption Revisited Joseph K. Liu, Joonsang Baek, Jianying Zhou
2010/273 (PDF ) Symmetric States and their Structure: Improved Analysis of CubeHash Niels Ferguson, Stefan Lucks, Kerry A. McKay
2010/272 (PDF ) Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore Zhimin Chen, Patrick Schaumont
2010/271 (PDF ) Selecting Parameters for Secure McEliece-based Cryptosystems Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, Johannes Buchmann
2010/270 (PDF ) Factorization of RSA-180 S. A. Danilov, I. A. Popovyan
2010/269 (PDF ) LAB Form for Iterated Hash Functions Xigen Yao
2010/268 (PDF ) Key-Controlled Order-Preserving Encryption HU Mengke, GAO Juntao
2010/267 (PDF ) Two improved authenticated multiple key exchange protocols Feng LIU
2010/266 (PDF ) Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition Chao Ning, Qiuliang Xu
2010/265 (PDF ) CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles Jian Weng, Minrong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
2010/264 (PDF ) Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk
2010/262 (PDF ) Cube Test Analysis of the Statistical Behavior of CubeHash and Skein Alan Kaminsky
2010/261 (PDF ) Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT Céline Blondeau, Benoît Gérard
2010/260 (PDF ) On FPGA-based implementations of Gr\{o}stl Bernhard Jungk, Steffen Reith
2010/259 (PDF ) Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA Andrey V. Pavlov
2010/258 (PDF ) On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions Ruchi Gode, Sugata Gangopadhyay
2010/257 (PDF ) Feasible Attack on the 13-round AES-256 Alex Biryukov, Dmitry Khovratovich
2010/255 (PDF ) Automorphism group of the set of all bent functions Natalia Tokareva
2010/254 (PDF ) Cryptanalysis of XXTEA Elias Yarrkov
2010/253 (PDF ) Separable Hash Functions Sarang Aravamuthan
2010/252 (PDF ) A supplement to Liu et al.'s certificateless signcryption scheme in the standard model Zhengping Jin, Qiaoyan Wen, Hua Zhang
2010/251 (PDF ) Modeling Attacks on Physical Unclonable Functions Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, Jürgen Schmidhuber
2010/250 (PDF ) Collusion Free Protocol for Rational Secret Sharing Amjed Shareef
2010/249 (PDF ) Rational Secret Sharing without Broadcast Amjed Shareef
2010/248 (PDF ) Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov, Ivica Nikolić
2010/247 (PDF ) A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem Jia XU
2010/246 (PDF ) Quantifying Trust Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2010/245 (PDF ) Towards a Theory of Trust Based Collaborative Search Yacov Yacobi
2010/244 (PDF ) Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset Jia XU
2010/243 (PDF ) Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Senshan Pan, Xiaotong Fu, Weiguo Zhang
2010/242 (PDF ) Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios Yang ZHANG, Jun-Liang CHEN
2010/241 (PDF ) Improved Delegation of Computation using Fully Homomorphic Encryption Kai-Min Chung, Yael Kalai, Salil Vadhan
2010/240 (PDF ) Weaknesses of a dynamic ID-based remote user authentication scheme He Debiao, Chen Jianhua, Hu Jin
2010/239 (PDF ) One-round and authenticated three-party multiple key exchange protocol from parings Feng LIU
2010/238 (PDF ) Collusion Free Protocol for Correlated Element Selection Problem Amjed Shareef, Akshay Agrawal, C. Pandu Rangan
2010/237 (PDF ) A New Security Model for Authenticated Key Agreement Augustin P. Sarr, Philippe Elbaz–Vincent, Jean–Claude Bajard
2010/236 (PDF ) Accountability: Definition and Relationship to Verifiability Ralf Kuesters, Tomasz Truderung, Andreas Vogt
2010/235 (PDF ) Attribute-based group key establishment Rainer Steinwandt, Adriana Suárez Corona
2010/234 (PDF ) Efficient provable data possession for hybrid clouds Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010/233 (PDF ) Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials Georg Fuchsbauer
2010/232 (PDF ) On Representable Matroids and Ideal Secret Sharing Ching-Fang Hsu, Qi Cheng
2010/231 (PDF ) Throughput-Optimal Routing in Unreliable Networks Paul Bunn, Rafail Ostrovsky
2010/230 (PDF ) A calculus for game-based security proofs David Nowak, Yu Zhang
2010/229 (PDF ) Concurrent composition in the bounded quantum storage model Dominique Unruh
2010/228 (PDF ) Practical NFC Peer-to-Peer Relay Attack using Mobile Phones Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis
2010/227 (PDF ) A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$ Neal Koblitz
2010/226 (PDF ) Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) Zvika Brakerski, Shafi Goldwasser
2010/225 (PDF ) A Security Weakness in a Generic Construction of a Group Key Exchange Protocol Junghyun Nam
2010/224 (PDF ) Efficient Implementation of the Orlandi Protocol Extended Version Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
2010/223 (PDF ) Improved Differential Attacks for ECHO and Grostl Thomas Peyrin
2010/222 (PDF ) Some Observations on Indifferentiability Ewan Fleischmann, Michael Gorski, Stefan Lucks
2010/221 (PDF ) Solving Generalized Small Inverse Problems Noboru Kunihiro
2010/220 (PDF ) (If) Size Matters: Size-Hiding Private Set Intersection Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik
2010/219 (PDF ) Tracker: Security and Privacy for RFID-based Supply Chains Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2010/217 (PDF ) Secure Code Update for Embedded Devices via Proofs of Secure Erasure Daniele Perito, Gene Tsudik
2010/216 (PDF ) Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework Zheng Yuan, Xiaoqiu Ren
2010/215 (PDF ) On the q-Strong Diffie-Hellman Problem Naoki Tanaka, Taiichi Saito
2010/214 (PDF ) How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest
2010/213 (PDF ) Composable Security Analysis of OS Services Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema
2010/212 (PDF ) Quantum Proofs of Knowledge Dominique Unruh
2010/211 (PDF ) Practical-time Attack on the Full MMB Block Cipher Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang
2010/209 (PDF ) Identity-Based Authenticated Asymmetric Group Key Agreement Protocol Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
2010/208 (PDF ) Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves Richard Moloney, Aidan O'Mahony, Pierre Laurent
2010/207 (PDF ) Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares Koen Simoens, Roel Peeters, Bart Preneel
2010/206 (PDF ) Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey Long Hoang Nguyen, Andrew William Roscoe
2010/205 (PDF ) On Protecting Cryptographic Keys Against Continual Leakage Ali Juma, Yevgeniy Vahlis
2010/204 (PDF ) Certificateless generalized signcryption Ji Huifang, Han Wenbao, Zhao Long
2010/203 (PDF ) Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure Bernard Colbert, Anthony H. Dekker, Lynn Margaret Batten
2010/202 (PDF ) Robust Combiner for Obfuscators Amir Herzberg, Haya Shulman
2010/200 (PDF ) Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs Markus Rückert, Michael Schneider, Dominique Schröder
2010/199 (PDF ) A Framework for Fully-Simulatable $t$-out-of-$n$ Oblivious Transfer Bing Zeng, Christophe Tartary, Chingfang Hsu
2010/198 (PDF ) The Rebound Attack and Subspace Distinguishers: Application to Whirlpool Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer
2010/197 (PDF ) Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
2010/196 (PDF ) Cryptography Against Continuous Memory Attacks Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/195 (PDF ) On E-Vote Integrity in the Case of Malicious Voter Computers Sven Heiberg, Helger Lipmaa, Filip Van Laenen
2010/194 (PDF ) Identity-Based Online/Offline Key Encapsulation and Encryption Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
2010/193 (PDF ) Speeding Up The Widepipe: Secure and Fast Hashing Mridul Nandi, Souradyuti Paul
2010/192 (PDF ) Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
2010/191 (PDF ) On Designated Verifier Signature Schemes Michal Rjaško, Martin Stanek
2010/190 (PDF ) J-PAKE: Authenticated Key Exchange Without PKI Feng Hao, Peter Ryan
2010/189 (PDF ) New generic algorithms for hard knapsacks Nick Howgrave-Graham, Antoine Joux
2010/188 (PDF ) Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
2010/187 (PDF ) Certificateless Signcryption without Pairing Wenjian Xie, Zhang Zhang
2010/186 (PDF ) New software speed records for cryptographic pairings Michael Naehrig, Ruben Niederhagen, Peter Schwabe
2010/185 (PDF ) New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation Wenping Ma, Chen Yang, Shaohui Sun
2010/183 (PDF ) Preventing Pollution Attacks in Multi-Source Network Coding Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman
2010/182 (PDF ) A Simple BGN-type Cryptosystem from LWE Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/181 (PDF ) Cryptanalysis of a DoS-resistant ID-based password authentication He Debiao, Chen Jianhua, Hu Jin
2010/180 (PDF ) The World is Not Enough: Another Look on Second-Order DPA Francois-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
2010/179 (PDF ) A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity Ziran Tu, Yingpu Deng
2010/178 (PDF ) Identity Based Online/Offline Encryption Scheme Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
2010/177 (PDF ) On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Robert Granger
2010/176 (PDF ) A Comparison of Cryptanalytic Tradeoff Algorithms Jin Hong, Sunghwan Moon
2010/175 (PDF ) Sanitizable signatures with strong transparency in the standard model Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan
2010/174 (PDF ) A Reflection on the Security of Two-Party Key Establishment Protocols Qiang Tang
2010/173 (PDF ) Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki
2010/172 (PDF ) Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia
2010/171 (PDF ) On Foundation and Construction of Physical Unclonable Functions Jiang Wu, Maire O'Neill
2010/170 (PDF ) On a conjecture about binary strings distribution Jean-Pierre Flori, Hugues Randriambololona, Gérard Cohen, Sihem Mesnager
2010/169 (PDF ) Dismantling SecureMemory, CryptoMemory and CryptoRF Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
2010/168 (PDF ) A Meet-in-the-Middle Attack on ARIA Xuehai Tang, Bing Sun, Ruilin Li, Chao Li
2010/167 (PDF ) Evolutionary Cipher against Differential Power Attack Tang ming, Meng Qinshu, Zhang Huanguo, Gao Si, Dou Qin, Shen Fei, Li Du
2010/166 (PDF ) Fault Analysis Study of the Block Cipher FOX64 Ruilin Li, Jianxiong You, Bing Sun, Chao Li
2010/165 (PDF ) Comment on four two-party authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/164 (PDF ) Black-Box Constructions of Protocols for Secure Computation Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/163 (PDF ) Golay Complementary Sequences Over the QAM Constellation Wenping Ma, Chen Yang, Shaohui Sun
2010/162 (PDF ) 1024XKS - A High Security Software Oriented Block Cipher Revisited Dieter Schmidt
2010/161 (PDF ) Stange's Elliptic Nets and Coxeter Group F4 Daniel R. L. Brown
2010/160 (PDF ) A Flaw in The Internal State Recovery Attack on ALPHA-MAC Shengbao Wu, Mingsheng Wang, Zheng Yuan
2010/159 (PDF ) Identity-Based Encryption Secure against Selective Opening Attack Mihir Bellare, Brent Waters, Scott Yilek
2010/158 (PDF ) A variant of the F4 algorithm Antoine Joux, Vanessa Vitse
2010/157 (PDF ) Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$ Antoine Joux, Vanessa Vitse
2010/156 (PDF ) Genus 2 Curves with Complex Multiplication Eyal Z. Goren, Kristin E. Lauter
2010/155 (PDF ) the upper bounds on differntial characteristics in block cipher SMS4 Zhang MeiLing, Liu JingMei, Wang XinMei
2010/154 (PDF ) Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt, Daniel Wichs
2010/153 (PDF ) Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
2010/152 (PDF ) Secure and Fast Implementations of Two Involution Ciphers Billy Bob Brumley
2010/151 (PDF ) Ring signature with divided private key Stelian Flonta, Liviu-Cristian Miclea
2010/150 (PDF ) Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm Mohammad Sadeq Dousti
2010/149 (PDF ) On Small Subgroup Non-confinement Attack Feng Hao
2010/148 (PDF ) Comments on five smart card based password authentication protocols Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
2010/147 (PDF ) A New Framework for Password-Based Authenticated Key Exchange Adam Groce, Jonathan Katz
2010/146 (PDF ) Some Applications of Lattice Based Root Finding Techniques Santanu Sarkar, Subhamoy Maitra
2010/145 (PDF ) i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010/144 (PDF ) New Definitions and Separations for Circular Security David Cash, Matthew Green, Susan Hohenberger
2010/143 (PDF ) Small Scale Variants Of The Block Cipher PRESENT Gregor Leander
2010/142 (PDF ) Mean value formulas for twisted Edwards curves Dustin Moody
2010/140 (PDF ) Improved Agreeing-Gluing Algorithm Igor Semaev
2010/139 (PDF ) A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0 Masao Kasahara
2010/138 (PDF ) On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP Manoj Kumar
2010/137 (PDF ) Estimating the Security of Lattice-based Cryptosystems Markus Rückert, Michael Schneider
2010/136 (PDF ) On Robust Key Agreement Based on Public Key Authentication Feng Hao
2010/135 (PDF ) On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
2010/134 (PDF ) Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves - Masaaki Shirase
2010/133 (PDF ) Signing on Elements in Bilinear Groups for Modular Protocol Design Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
2010/132 (PDF ) On the claimed privacy of EC-RAC III Junfeng Fan, Jens Hermans, Frederik Vercauteren
2010/131 (PDF ) Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation Jooyoung Lee, John Steinberger
2010/130 (PDF ) Low Voltage Fault Attacks to AES and RSA on General Purpose Processors Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi
2010/129 (PDF ) Relation for Algebraic Attack on E0 combiner N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
2010/126 (PDF ) On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks Jian-zhu Lu, Jipeng Zhou
2010/125 (PDF ) Cryptographic Aspects of Real Hyperelliptic Curves M. J. Jacobson Jr., R. Scheidler, A. Stein
2010/124 (PDF ) A Hardware Wrapper for the SHA-3 Hash Algorithms Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Maire O'Neill, William P. Marnane
2010/123 (PDF ) Delaying Mismatched Field Multiplications in Pairing Computations Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/122 (PDF ) Security of Encryption Schemes in Weakened Random Oracle Models Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa
2010/120 (PDF ) Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
2010/118 (PDF ) Proposal of a Signature Scheme based on STS Trapdoor Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita
2010/117 (PDF ) Cryptographic Agility and its Relation to Circular Encryption Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010/116 (PDF ) Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator M. Abdelaziz Elaabid, Sylvain Guilley
2010/115 (PDF ) A Security Evaluation of DNSSEC with NSEC3 Jason Bau, John C Mitchell
2010/114 (PDF ) The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem Simon R. Blackburn
2010/113 (PDF ) Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model Xu An Wang, Xiaoyuan Yang
2010/112 (PDF ) CCA-Secure PRE Scheme without Random Oracles Jun Shao, Zhenfu Cao, Peng Liu
2010/111 (PDF ) On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”" Vladimir Rudskoy
2010/110 (PDF ) Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010/109 (PDF ) Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green, Susan Hohenberger
2010/108 (PDF ) Perfectly Secure Oblivious RAM Without Random Oracles Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
2010/107 (PDF ) Adaptive Concurrent Non-Malleability with Bare Public-Keys Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/106 (PDF ) Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
2010/105 (PDF ) Bias in the nonlinear filter generator output sequence Sui-Guan Teo, Leonie Simpson, Ed Dawson
2010/104 (PDF ) Avoiding Full Extension Field Arithmetic in Pairing Computations Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, Kenneth Koon-Ho Wong
2010/103 (PDF ) The Extended Access Control for Machine Readable Travel Documents Rafik Chaabouni, Serge Vaudenay
2010/102 (PDF ) Constructing Verifiable Random Functions with Large Input Spaces Susan Hohenberger, Brent Waters
2010/101 (PDF ) Fair Blind Signatures without Random Oracles Georg Fuchsbauer, Damien Vergnaud
2010/100 (PDF ) Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security Brett Hemenway, Steve Lu, Rafail Ostrovsky
2010/099 (PDF ) On Homomorphic Encryption and Chosen-Ciphertext Security Brett Hemenway, Rafail Ostrovsky
2010/098 (PDF ) A Zero-One Law for Deterministic 2-Party Secure Computation Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2010/097 (PDF ) Parallel Enumeration of Shortest Lattice Vectors Özgür Dagdelen, Michael Schneider
2010/096 (PDF ) Secret Sharing Extensions based on the Chinese Remainder Theorem Kamer Kaya, Ali Aydın Selçuk
2010/095 (PDF ) Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR Kenneth G. Paterson, Gaven J. Watson
2010/094 (PDF ) A Random Number Generator Based on Isogenies Operations He Debiao, Chen Jianhua, Hu Jin
2010/093 (PDF ) New Impossible Differential Attacks on AES Zheng Yuan
2010/092 (PDF ) Security Weaknesses in Two Certificateless Signcryption Schemes S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010/091 (PDF ) Distinguishers for the Compression Function and Output Transformation of Hamsi-256 Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Odegaard, Thomas Peyrin, Martin Schläffer
2010/090 (PDF ) Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n}) Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi
2010/089 (PDF ) Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
2010/088 (PDF ) An Efficient and Parallel Gaussian Sampler for Lattices Chris Peikert
2010/087 (PDF ) MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions Christopher Wolf, Bart Preneel
2010/086 (PDF ) A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model Zvika Brakerski, Yael Tauman Kalai
2010/085 (PDF ) Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein Mouftah, Eiji Okamoto
2010/084 (PDF ) Attribute-based Authenticated Key Exchange M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/083 (PDF ) One Round Group Key Exchange with Forward Security in the Standard Model M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
2010/082 (PDF ) Predicate-Based Key Exchange James Birkett, Douglas Stebila
2010/081 (PDF ) The Eris hybrid cipher Sandy Harris
2010/080 (PDF ) Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols Gergei Bana, Koji Hasebe, Mitsuhiro Okada
2010/079 (PDF ) From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2010/078 (PDF ) Multiple Bytes Differential Fault Analysis on CLEFIA Xin-jie ZHAO, Tao WANG, Jing-zhe GAO
2010/077 (PDF ) ECC2K-130 on Cell CPUs Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
2010/076 (PDF ) Private and Continual Release of Statistics T-H. Hubert Chan, Elaine Shi, Dawn Song
2010/075 (PDF ) A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra Mehdi Vasef
2010/074 (PDF ) Concurrent Knowledge Extraction in the Public-Key Model Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/073 (PDF ) Related-Key Boomerang Attack on Block Cipher SQUARE Bonwook Koo, Yongjin Yeom, Junghwan Song
2010/072 (PDF ) Approximating Addition by XOR: how to go all the way Didier Alquié
2010/071 (PDF ) 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree Didier Alquié
2010/070 (PDF ) Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles Markus Rückert
2010/069 (PDF ) Type-II Optimal Polynomial Bases Daniel J. Bernstein, Tanja Lange
2010/068 (PDF ) Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2010/067 (PDF ) A Pairing-Based DAA Scheme Further Reducing TPM Resources Ernie Brickell, Jiangtao Li
2010/066 (PDF ) Some Observations on TWIS Block Cipher Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
2010/065 (PDF ) An Anonymous ID-based Encryption Revisited Zhengjun Cao
2010/064 (PDF ) New Advances on Privacy-Preserving Policy Reconciliation Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
2010/063 (PDF ) Differential Fault Analysis on SMS4 Using a Single Fault Ruilin Li, Bing Sun, Chao Li, Jianxiong You
2010/062 (PDF ) Differential Cryptanalysis of SMS4 Block Cipher Bozhan Su, Wenling Wu, Wentao Zhang
2010/061 (PDF ) Privacy-Preserving Matching Protocols for Attributes and Strings Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu
2010/060 (PDF ) Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding Yongge Wang
2010/059 (PDF ) A New Framework for RFID Privacy Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao
2010/058 (PDF ) Solinas primes of small weight for fixed sizes José de Jesús Angel Angel, Guillermo Morales-Luna
2010/057 (PDF ) Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256 Cagdas Calik, Meltem Sonmez Turan
2010/056 (PDF ) Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment Xin-jie ZHAO, Tao WANG
2010/055 (PDF ) Credential Authenticated Identification and Key Exchange Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
2010/054 (PDF ) An Improved Timing Attack with Error Detection on RSA-CRT Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
2010/053 (PDF ) Logical cryptoanalysis on the example of the cryptosystem DES A. D. Plotnikov
2010/051 (PDF ) A Principle for Cryptographic Protocols Beyond Security, Less Parameters Zhengjun Cao
2010/050 (PDF ) Authenticating Aggregate Range Queries over Multidimensional Dataset Jia XU, Ee-Chien CHANG
2010/049 (PDF ) On Symmetric Encryption and Point Obfuscation Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
2010/047 (PDF ) Lower Bounds for Straight Line Factoring Daniel R. L. Brown
2010/043 (PDF ) Differential and invertibility properties of BLAKE (full version) Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
2010/042 (PDF ) A modified eCK model with stronger security for tripartite authenticated key exchange Qingfeng Cheng, Chuangui Ma, Fushan Wei
2010/041 (PDF ) The Effects of the Omission of Last Round's MixColumns on AES Orr Dunkelman, Nathan Keller
2010/040 (PDF ) Batch Groth-Sahai Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
2010/039 (PDF ) On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields Xiwang Cao, Lei Hu
2010/038 (PDF ) Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions Arnaud Boscher, Helena Handschuh, Elena Trichina
2010/037 (PDF ) Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves Pierre-Alain Fouque, Mehdi Tibouchi
2010/035 (PDF ) Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption Goichiro Hanaoka, Kaoru Kurosawa
2010/034 (PDF ) On the order of the polynomial $x^p-x-a$ Xiwang Cao
2010/033 (PDF ) Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
2010/032 (PDF ) An Information Theoretic Perspective on the Differential Fault Analysis against AES Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta
2010/031 (PDF ) Class Invariants by the CRT Method Andreas Enge, Andrew V. Sutherland
2010/030 (PDF ) On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay
2010/029 (PDF ) On Achieving the "Best of Both Worlds" in Secure Multiparty Computation Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2010/028 (PDF ) A secure anonymous communication scheme in vehicular ad hoc networks from pairings Jue-Sam Chou, Yalin Chen
2010/027 (PDF ) A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings Yalin Chen, Jue-Sam Chou, Xian-Wu Hou
2010/026 (PDF ) Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth Xin-jie Zhao, Tao Wang
2010/025 (PDF ) New Methodologies for Differential-Linear Cryptanalysis and Its Extensions Jiqiang Lu
2010/024 (PDF ) Authentication schemes from actions on graphs, groups, or rings Dima Grigoriev, Vladimir Shpilrain
2010/023 (PDF ) Differential Fault Analysis on AES with 192 and 256-Bit Keys Junko Takahashi, Toshinori Fukunaga
2010/022 (PDF ) Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2010/021 (PDF ) A note on ``Improved Fast Correlation Attacks on Stream Ciphers" Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
2010/020 (PDF ) Number of Jacobi quartic curves over finite fields Rongquan Feng, Hongfeng Wu
2010/019 (PDF ) Related-Key Boomerang and Rectangle Attacks Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller
2010/018 (PDF ) Scalability and Security Conflict for RFID Authentication Protocols Imran Erguler, Emin Anarim
2010/017 (PDF ) A new one-time signature scheme from syndrome decoding Paulo S. L. M. Barreto, Rafael Misoczki
2010/016 (PDF ) Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang
2010/015 (PDF ) Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures? Jorge Guajardo, Bart Mennink
2010/014 (PDF ) A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs Mridul Nandi
2010/013 (PDF ) A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, Adi Shamir
2010/012 (PDF ) Differential Cache Trace Attack Against CLEFIA Chester Rebeiro, Debdeep Mukhopadhyay
2010/010 (PDF ) Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII Kazuyuki Kobayashi, Jun Ikegami, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
2010/009 (PDF ) The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions Xuelian Li, Yupu Hu, Juntao Gao
2010/008 (PDF ) A DAA Scheme Requiring Less TPM Resources Liqun Chen
2010/007 (PDF ) Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2010/006 (PDF ) Factorization of a 768-bit RSA modulus Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, Paul Zimmermann
2010/005 (PDF ) Skew-Frobenius map on twisted Edwards curve Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng
2010/004 (PDF ) Halving on Binary Edwards Curves Qiping Lin, Fangguo Zhang
2010/003 (PDF ) Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
2010/002 (PDF ) Practical ID-based Encryption for Wireless Sensor Network Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng
2010/001 (PDF ) Transfinite Cryptography Jacques Patarin
[ Cryptology ePrint archive ]