Cryptology ePrint Archive: Listing for 2005
-
2005/469 ( PDF )
- A lower bound on the higher order nonlinearity of algebraic immune functions
- C. Carlet
-
2005/468 ( PDF )
- Blind Attacks on Engineering Samples
- Vanessa Gratzer and David Naccache
-
2005/467 ( PDF )
- A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
- Ricardo Corin and Jerry den Hartog
-
2005/466 ( PDF )
- Cryptanalysis of the Yang -Wang's password authentication schemes
- Jue-Sam Chou and Ming-De Yang and Guey-Chuen Lee
-
2005/465 ( PDF )
- A sequence approach to constructing perfect hash families
- S.G. Barwick and W.-A. Jackson
-
2005/464 ( PS PS.GZ PDF )
- Equivalent Keys in Multivariate Quadratic Public Key Systems
- Christopher Wolf and Bart Preneel
-
2005/463 ( PDF )
- More short signatures without random oracles
- Victor K. Wei and Tsz Hon Yuen
-
2005/462 ( PS PS.GZ PDF )
- A Simplified Quadratic Frobenius Primality Test
- Martin Seysen
-
2005/461 ( PS PS.GZ PDF )
- Parallel and Concurrent Security of the HB and HB+ Protocols
- Jonathan Katz and Ji Sun Shin
-
2005/460 ( PDF )
- One-Time HNP or Attacks on a Flawed El Gamal Revisited
- Tomas Rosa
-
2005/459 ( PS PS.GZ PDF )
- A Practical Attack on the Root Problem in Braid Groups
- Anja Groch and Dennis Hofheinz and Rainer Steinwandt
-
2005/458 ( PS PS.GZ PDF )
- Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
- James A. Muir
-
2005/457 ( PDF )
- Weakness of shimˇ¦s New ID-based tripartite multiple-key agreement protocol
- Jue-Sam Chou and Chu-Hsing Lin and Chia-Hung Chiu
-
2005/456 ( PDF )
- A Secure Scheme for Authenticated Encryption
- Fuw-Yi Yang
-
2005/455 ( PDF )
- Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
- Robert W. Zhu and Xiaojian Tian and Duncan S. Wong
-
2005/454 ( PS PS.GZ PDF )
- Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
- Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi
-
2005/453 ( PDF )
- Further Constructions of Almost Resilient Functions
- Pinhui Ke and Jie Zhang and Qiaoyan Wen
-
2005/452 ( PDF )
- Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
- Ran Canetti and Ling Cheung and Dilsun Kaynar and Moses Liskov and Nancy Lynch and Olivier Pereira and Roberto Segala
-
2005/451 ( PDF )
- Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
- Jue-Sam Chou and Yalin Chen and Ming-De Yang
-
2005/450 ( PDF )
- Improvement of Manik et al.ˇ¦s remote user authentication scheme
- Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
-
2005/449 ( PDF )
- On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
- Longjiang Qu and Guozhu Feng and Chao Li
-
2005/448 ( PS PS.GZ PDF )
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
- Souradyuti Paul and Bart Preneel
-
2005/447 ( PDF )
- A new key exchange protocol based on the decomposition problem
- Vladimir Shpilrain and Alexander Ushakov
-
2005/446 ( PDF )
- Democratic Group Signatures on Example of Joint Ventures
- Mark Manulis
-
2005/445 ( PS PS.GZ PDF )
- An Anonymous Authentication Scheme for Trusted Computing Platform
- HE GE
-
2005/444 ( PDF )
- Privacy-Preserving Polling using Playing Cards
- Sid Stamm and Markus Jakobsson
-
2005/443 ( PDF )
- Revised: Block Cipher Based Hash Function Construction From PGV
- Duo Lei
-
2005/442 ( PDF )
- One-Time Signatures Revisited: Have They Become Practical?
- Dalit Naor and Amir Shenhav and Avishai Wool
-
2005/441 ( PS PS.GZ PDF )
- Tight bound between nonlinearity and algebraic immunity
- Mikhail Lobanov
-
2005/440 ( -- withdrawn -- )
- HB++: a Lightweight Authentication Protocol Secure against Some Attacks
- Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
-
2005/439 ( PDF )
- A note on the n-spendable extension of Ferguson's single-term off-line coins
- T. C. Lam
-
2005/438 ( PS PS.GZ PDF )
- Minimal Assumptions for Efficient Mercurial Commitments
- Yevgeniy Dodis
-
2005/437 ( -- withdrawn -- )
- On Boolean functions with maximum algebraic immunity
- Enes Pasalic
-
2005/436 ( PDF )
- A Note on the Kasami Power Function
- Doreen Hertel
-
2005/435 ( PDF )
- Concurrent Blind Signatures without Random Oracles
- Aggelos Kiayias and Hong-Sheng Zhou
-
2005/434 ( PDF )
- Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
- Daniel R. L. Brown
-
2005/433 ( PDF )
- Proxy Re-Signatures: New Definitions, Algorithms, and Applications
- Giuseppe Ateniese and Susan Hohenberger
-
2005/432 ( PS PS.GZ PDF )
- On the Security of Kaweichel
- Dieter Schmidt
-
2005/431 ( PS PS.GZ PDF )
- Is it possible to have CBE from CL-PKE?
- Bo Gyeong Kang and Je Hong Park
-
2005/430 ( PDF )
- F-HASH: Securing Hash Functions Using Feistel Chaining
- Duo Lei
-
2005/429 ( PDF )
- Signature from a New Subgroup Assumption
- Victor K. Wei
-
2005/428 ( PS PS.GZ PDF )
- Loud and Clear: Human-Verifiable Authentication Based on Audio
- Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun
-
2005/427 ( PDF )
- Solutions to Key Exposure Problem in Ring Signature
- Joseph K. Liu and Duncan S. Wong
-
2005/426 ( PDF )
- On the Security of a Certificateless Public-Key Encryption
- Zhenfeng Zhang and Dengguo Feng
-
2005/425 ( PDF )
- Improved Collision Attack on Hash Function MD5
- Jie Liang and Xuejia Lai
-
2005/424 ( PS PS.GZ PDF )
- Efficient Mutual Data Authentication Using Manually Authenticated Strings
- Sven Laur and N. Asokan and Kaisa Nyberg
-
2005/423 ( -- withdrawn -- )
- ID-based signature and Key-insulated threshold signature
- Jin Li and Fangguo Zhang
-
2005/422 ( PDF )
- On Anonymity of Group Signatures
- Zhou Sujing and Lin Dongdai
-
2005/421 ( PS PS.GZ )
- Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
- Michael Backes and Birgit Pfitzmann and Andre Scedrov
-
2005/420 ( PS PS.GZ PDF )
- Efficient Scalar Multiplication by Isogeny Decompositions
- Christophe Doche and Thomas Icart and David R. Kohel
-
2005/419 ( PDF )
- Unified Point Addition Formul{\ae} and Side-Channel Attacks
- Douglas Stebila and Nicolas Th\'eriault
-
2005/418 ( PDF )
- Generic On-Line/Off-Line Threshold Signatures
- Chris Crutchfield and David Molnar and David Turner and David Wagner
-
2005/417 ( PS PS.GZ PDF )
- Correlation-Resistant Storage via Keyword-Searchable Encryption
- Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose
-
2005/416 ( PDF )
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
- Kenneth G. Paterson and Arnold K.L. Yau
-
2005/415 ( -- withdrawn -- )
- A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
- Benjamin Gittins and Howard A. Landman and Sean O'Neil and Ron Kelson
-
2005/414 ( -- withdrawn -- )
- Authenticated Encryption Mode of VEST Ciphers
- Sean O'Neil and Benjamin Gittins
-
2005/413 ( -- withdrawn -- )
- VEST Hardware-Dedicated Stream Ciphers
- Sean O'Neil and Benjamin Gittins and Howard A. Landman
-
2005/412 ( PDF )
- Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
- Tsz Hon Yuen and Victor K. Wei
-
2005/411 ( PDF )
- More Compact E-Cash with Efficient Coin Tracing
- Victor K. Wei
-
2005/410 ( PDF )
- Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
- Victor K. Wei
-
2005/409 ( -- withdrawn -- )
- Intrusion-Resilient Authentication in the Limited Communication Model
- David Cash and Yan Zong Ding and Wenke Lee and Richard Lipton
-
2005/408 ( PDF )
- Compartmented Secret Sharing Based on the Chinese Remainder Theorem
- Sorin Iftene
-
2005/407 ( PDF )
- Anonymous Signature Schemes
- Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang
-
2005/406 ( PS PS.GZ PDF )
- Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
- Dominique Unruh
-
2005/405 ( PS PS.GZ PDF )
- Building Better Signcryption Schemes with Tag-KEMs
- Tor E. Bj{\o}rstad and Alexander W. Dent
-
2005/404 ( PDF )
- Preventing Attacks on Machine Readable Travel Documents (MRTDs)
- Gaurav S. Kc and Paul A. Karger
-
2005/403 ( PDF )
- Collisions in the Original Version of a Chaotic Hash Function
- Scott Contini
-
2005/402 ( PS PS.GZ PDF )
- Some Analysis of Radix-r Representations
- Dong-Guk Han and Tsuyoshi Takagi
-
2005/401 ( PS PS.GZ PDF )
- A Computationally Sound Mechanized Prover for Security Protocols
- Bruno Blanchet
-
2005/400 ( PDF )
- Improved Collision Attack on MD5
- Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta
-
2005/399 ( PS PS.GZ )
- On affine rank of spectrum support for plateaued function
- Yuriy Tarannikov
-
2005/398 ( PDF )
- Preliminary Analysis of DHA-256
- IAIK Krypto Group
-
2005/397 ( PDF )
- Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
- Neil Kauer and Tony Suarez and Yuliang Zheng
-
2005/396 ( PS PS.GZ PDF )
- Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
- Pallavi Joshi and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
-
2005/395 ( PDF )
- Secure Group Key Establishment Revisited
- Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2005/394 ( PDF )
- How to Shuffle in Public
- Ben Adida and Douglas Wikstr\"{o}m
-
2005/393 ( PS PS.GZ PDF )
- Multivariate Quadratic Polynomials in Public Key Cryptography
- Christopher Wolf
-
2005/392 ( PDF )
- An Efficient Variant of RSA Cryptosystem
- Sahadeo Padhye
-
2005/391 ( PS PS.GZ PDF )
- Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
- Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto
-
2005/390 ( PS PS.GZ PDF )
- 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
- Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto and Edward Dawson
-
2005/389 ( PS PS.GZ PDF )
- How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
- KyungKeun Lee and JoongHyo Oh and SangJae Moon
-
2005/388 ( PDF )
- Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
- YongBin Zhou and DengGuo Feng
-
2005/387 ( PDF )
- On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
- C. Carlet
-
2005/386 ( PS PS.GZ PDF )
- A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
- Fangguo Zhang, Xiaofeng Chen, Willy Susilo and Yi Mu
-
2005/385 ( PDF )
- Practical Group Signatures without Random Oracles
- Giuseppe Ateniese and Jan Camenisch and Susan Hohenberger and Breno de Medeiros
-
2005/384 ( PS PS.GZ PDF )
- Some Explicit Formulae of NAF and its Left-to-Right Analogue
- Dong-Guk Han and Tetsuya Izu and Tsuyoshi Takagi
-
2005/383 ( PS PS.GZ PDF )
- Key Mixing in Block Ciphers through Addition modulo $2^n$
- Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
-
2005/382 ( PDF )
- One-Wayness Equivalent to General Factoring
- Kaoru Kurosawa and Tsuyoshi Takagi
-
2005/381 ( PDF )
- Compact Group Signatures Without Random Oracles
- Xavier Boyen and Brent Waters
-
2005/380 ( PDF )
- Breaking RSA May Be As Difficult As Factoring
- Daniel R. L. Brown
-
2005/379 ( PS PS.GZ PDF )
- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
- Jonathan Katz and Yehuda Lindell
-
2005/378 ( PDF )
- A New Protocol for Conditional Disclosure of Secrets And Its Applications
- Sven Laur and Helger Lipmaa
-
2005/377 ( PS PS.GZ PDF )
- Exclusion-Intersection Encryption
- Sherman S.M. Chow and Siu-Ming Yiu
-
2005/376 ( PDF )
- Representing small identically self-dual matroids by self-dual codes
- Carles Padro and Ignacio Gracia
-
2005/375 ( PDF )
- Truncated differential cryptanalysis of five rounds of Salsa20
- Paul Crowley
-
2005/374 ( PDF )
- Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
- Kunpeng Wang, Bao Li
-
2005/373 ( PS PS.GZ PDF )
- Efficient Broadcast Encryption Scheme with Log-Key Storage
- Yong Ho Hwang and Pil Joong Lee
-
2005/372 ( PDF )
- Secret color images sharing schemes based on XOR operation
- Dao-Shun Wang, Lei Zhang, Ning Ma and Lian-Sheng Huang
-
2005/371 ( PDF )
- On a Traitor Tracing Scheme from ACISP 2003
- Dongvu Tonien
-
2005/370 ( PS PS.GZ PDF )
- Resource Fairness and Composability of Cryptographic Protocols
- Juan A. Garay and Philip MacKenzie and Manoj Prabhakaran and Ke Yang
-
2005/369 ( PDF )
- Secure and {\sl Practical} Identity-Based Encryption
- David Naccache
-
2005/368 ( PDF )
- The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
- David Molnar and Matt Piotrowski and David Schultz and David Wagner
-
2005/367 ( PDF )
- Searchable Keyword-Based Encryption
- Dong Jin Park, Juyoung Cha, and Pil Joong Lee
-
2005/366 ( PS PS.GZ PDF )
- Efficient Compilers for Authenticated Group Key Exchange
- Qiang Tang and Chris J. Mitchell
-
2005/365 ( PS PS.GZ PDF )
- Derandomization in Cryptography
- Boaz Barak and Shien Jin Ong and Salil Vadhan
-
2005/364 ( PS PS.GZ PDF )
- Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
- Amitabh Saxena
-
2005/363 ( PDF )
- Elliptic Curves with Low Embedding Degree
- Florian Luca and Igor E. Shparlinski
-
2005/362 ( PS PS.GZ PDF )
- On a (Flawed) Proposal to Build More Pairing-Friendly Curves
- Michael Scott and Paulo S. L. M. Barreto
-
2005/361 ( PS PS.GZ PDF )
- Strict Avalanche Criterion Over Finite Fields
- Yuan Li and T.W.Cusick
-
2005/360 ( PS PS.GZ )
- Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
- Jens Matthias-Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2005/359 ( PS PS.GZ PDF )
- An infinite class of quadratic APN functions which are not equivalent to power mappings
- L. Budaghyan and C. Carlet and P. Felke and G. Leander
-
2005/358 ( PDF )
- Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
- Haining Fan and Duo Liu and Yiqi Dai
-
2005/357 ( PDF )
- Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
- Kyung-Ah Shim
-
2005/356 ( PDF )
- Exponential Memory-Bound Functions for Proof of Work Protocols
- Fabien Coelho
-
2005/355 ( PS PS.GZ PDF )
- ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
- Rongxing Lu and Zhenfu Cao
-
2005/354 ( PS PS.GZ PDF )
- Pairing-Based Two-Party Authenticated Key Agreement Protocol
- Rongxing Lu and Zhenfu Cao and Renwang Su and Jun Shao
-
2005/353 ( PS PS.GZ PDF )
- On the Security of A Group Signature Scheme
- Jianhong Zhang, Wei Zou,
-
2005/352 ( PS PS.GZ PDF )
- Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
- Danilo Gligoroski
-
2005/351 ( PS PS.GZ PDF )
- Errors in Computational Complexity Proofs for Protocols
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
-
2005/350 ( PS PS.GZ )
- Is SHA-1 conceptually sound?
- Charanjit S. Jutla and Anindya C. Patthak
-
2005/349 ( PS PS.GZ PDF )
- Oblivious Transfer and Linear Functions
- Ivan B. Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
-
2005/348 ( -- withdrawn -- )
- On Proofs of Security for Certificateless Cryptosystems
- Alexander W. Dent and Caroline Kudla
-
2005/347 ( -- withdrawn -- )
- Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
- Song Han and Elizabeth Chang and Tharam Dillon
-
2005/346 ( PS PS.GZ )
- Batch Verification of Validity of Bids in Homomorphic E-auction
- Kun Peng, Colin Boyd and Ed Dawson
-
2005/345 ( PDF )
- Group Signatures with Efficient Concurrent Join
- Aggelos Kiayias and Moti Yung
-
2005/344 ( PS PS.GZ PDF )
- Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
- Tapan Rai
-
2005/343 ( PS PS.GZ PDF )
- Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
- Amitabh Saxena and Serguey Priymak and Ben Soh
-
2005/342 ( PDF )
- Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
- Pu Duan and Shi Cui and Choong Wah Chan
-
2005/341 ( PS PS.GZ PDF )
- A Universally Composable Scheme for Electronic Cash
- Marten Trolin
-
2005/340 ( -- withdrawn -- )
- A New Approach to Counteract DPA Attacks on Block Ciphers
- Christophe Giraud and Emmanuel Prouff
-
2005/339 ( PS PS.GZ PDF )
- Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
- Zhaohui Cheng and Liqun Chen and Richard Comley and Qiang Tang
-
2005/338 ( PDF )
- An Improved Power Analysis Attack Against Camellia's Key Schedule
- Lu Xiao and Howard M. Heys
-
2005/337 ( PDF )
- Statistical Multiparty Computation Based on Random Walks on Graphs
- Liangliang Xiao, Mulan Liu, and Zhifang Zhang
-
2005/336 ( PDF )
- Pairing-based identification schemes
- David Freeman
-
2005/335 ( PS PS.GZ PDF )
- One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
- Amitabh Saxena and Ben Soh
-
2005/334 ( PS PS.GZ PDF )
- Secure Key-Updating for Lazy Revocation
- Michael Backes and Christian Cachin and Alina Oprea
-
2005/333 ( PDF )
- Universally Composable Disk Encryption Schemes
- Ivan Damg{\aa}rd and Kasper Dupont
-
2005/332 ( PS PS.GZ PDF )
- Classification of Cubic $(n-4)$-resilient Boolean Functions
- An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
-
2005/331 ( PS PS.GZ PDF )
- A Fuzzy Sketch with Trapdoor
- Julien Bringer and Hervé Chabanne and Quoc Dung Do
-
2005/330 ( PDF )
- A Dedicated Processor for the eta Pairing
- Robert Ronan and Colm O hEigeartaigh and Colin Murphy and Michael Scott and Tim Kerins and W.P. Marnane
-
2005/329 ( PDF )
- Cryptographic Protocols to Prevent Spam
- Amir Herzberg
-
2005/328 ( PDF )
- On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
- Jonathan Katz and Chiu-Yuen Koo
-
2005/327 ( PS PS.GZ PDF )
- On the Security of Encryption Modes of MD4, MD5 and HAVAL
- Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee
-
2005/326 ( PDF )
- A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
- Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
-
2005/325 ( PS PS.GZ PDF )
- An Effective Method to Implement Group Signature with Revocation
- HE GE
-
2005/324 ( PS PS.GZ PDF )
- Extracting bits from coordinates of a point of an elliptic curve
- Nicolas G\"urel
-
2005/323 ( PDF )
- The Weil pairing on elliptic curves over C
- Steven D. Galbraith
-
2005/322 ( PDF )
- Evolutionary Design of Trace Form Bent Functions
- Min yang and Qingshu Meng and Huanguo Zhang
-
2005/321 ( PS PS.GZ PDF )
- Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
- Liam Keliher and Jiayuan Sui
-
2005/320 ( PDF )
- Efficient Identity-Based Encryption with Tight Security Reduction
- Nuttapong Attrapadung and Benoit Chevallier-Mames and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
-
2005/319 ( PS PS.GZ PDF )
- ID-based Restrictive Partially Blind Signatures and Applications
- Xiaofeng Chen and Fangguo Zhang and Shengli Liu
-
2005/318 ( PDF )
- Bounds on Birthday Attack Times
- Michael J. Wiener
-
2005/317 ( PS PS.GZ PDF )
- Ring Signatures without Random Oracles
- Sherman S. M. Chow and Joseph K. Liu and Victor K. Wei and Tsz Hon Yuen
-
2005/316 ( PS PS.GZ PDF )
- Collision Attack on XTR and a Countermeasure with a Fixed Pattern
- Dong-Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyo Il Chung
-
2005/315 ( PDF )
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
- David Molnar and Andrea Soppera and David Wagner
-
2005/314 ( PS PS.GZ PDF )
- Fast genus 2 arithmetic based on Theta functions
- P. Gaudry
-
2005/313 ( PS PS.GZ PDF )
- Deterministic Identity-Based Signatures for Partial Aggregation
- Javier Herranz
-
2005/312 ( PDF )
- A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
- Xijin Tang and Yong Feng
-
2005/311 ( PDF )
- What do S-boxes Say in Differential Side Channel Attacks?
- Cecile Canovas and Jessy Clediere
-
2005/310 ( PS PS.GZ PDF )
- Meta Ring Signature
- Hiroyuki OKAZAKI and Ryuichi SAKAI and Masao KASAHARA
-
2005/309 ( PS PS.GZ PDF )
- A New Efficient ID-Based Authenticated Key Agreement Protocol
- Quan Yuan and Songping Li
-
2005/308 ( PDF )
- Adaptable Group-Oriented Signature
- Chunbo Ma, Jun Ao, and Dake He
-
2005/307 ( PS PS.GZ PDF )
- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
- K. Bentahar
-
2005/306 ( PDF )
- Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
- Yasuyuki MURAKAMI, Masao KASAHARA
-
2005/305 ( PDF )
- Steganography with Imperfect Samplers
- Anna Lysyanskaya and Maria Meyerovich
-
2005/304 ( PS PS.GZ PDF )
- Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
- Adam Bender and Jonathan Katz and Ruggero Morselli
-
2005/303 ( PDF )
- Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
- Kevin Fu and Seny Kamara and Tadayoshi Kohno
-
2005/302 ( PS PS.GZ PDF )
- Elliptic Curves for Pairing Applications
- Angela Murphy and Noel Fitzpatrick
-
2005/301 ( PDF )
- On the Hardware Implementation of the MICKEY-128 Stream Cipher
- Paris Kitsos
-
2005/300 ( PS PS.GZ PDF )
- Towards Security Two-part Authenticated Key Agreement Protocols
- Songping Li and Quan Yuan and Jin Li
-
2005/299 ( PDF )
- Nonlinearity of the Round Function
- Marcin Kontak and Janusz Szmidt
-
2005/298 ( PDF )
- Keeping Denial-of-Service Attackers in the Dark
- Gal Badishi and Amir Herzberg and Idit Keidar
-
2005/297 ( PS PS.GZ PDF )
- DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
- Maithili Narasimha and Gene Tsudik
-
2005/296 ( PS PS.GZ PDF )
- A Key Establishment IP-Core for Ubiquitous Computing
- Markus Volkmer and Sebastian Wallner
-
2005/295 ( PS PS.GZ PDF )
- Hidden Exponent RSA and Efficient Key Distribution
- HE GE
-
2005/294 ( PS PS.GZ PDF )
- On Fairness in Simulatability-based Cryptographic Systems
- Michael Backes and Dennis Hofheinz and J\"orn M\"uller-Quade and Dominique Unruh
-
2005/293 ( PDF )
- Speeding Up Pairing Computation
- Colm O hEigeartaigh
-
2005/292 ( PDF )
- Improved Integral Cryptanalysis of FOX Block Cipher
- Wu Wenling, Zhang Wentao, and Feng Dengguo
-
2005/291 ( PDF )
- Cryptography In the Bounded Quantum-Storage Model
- Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner
-
2005/290 ( PS PS.GZ PDF )
- Perfect Non-Interactive Zero Knowledge for NP
- Jens Groth and Rafail Ostrovsky and Amit Sahai
-
2005/289 ( PS PS.GZ PDF )
- Overview of Key Agreement Protocols
- Ratna Dutta and Rana Barua
-
2005/288 ( PS PS.GZ PDF )
- Direct Chosen Ciphertext Security from Identity-Based Techniques
- Xavier Boyen and Qixiang Mei and Brent Waters
-
2005/287 ( PS PS.GZ PDF )
- Provable Efficient Certificateless Public Key Encryption
- Yijuan Shi and Jianhua Li
-
2005/286 ( PS PS.GZ PDF )
- Concurrent Zero Knowledge without Complexity Assumptions
- Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil Vadhan
-
2005/285 ( PS PS.GZ PDF )
- Generalizations of RSA public key cryptosystems
- Li Banghe
-
2005/284 ( PS PS.GZ PDF )
- Foundations and Applications for Secure Triggers
- Ariel Futoransky and Emiliano Kargieman and Carlos Sarraute and Ariel Waissbein
-
2005/283 ( PS PS.GZ PDF )
- Revisiting Oblivious Signature-Based Envelopes
- Samad Nasserian, Gene Tsudik
-
2005/282 ( PS PS.GZ PDF )
- Spreading Alerts Quietly and the Subgroup Escape Problem
- James Aspnes and Zoë Diamadi and Kristian Gjřsteen and René Peralta and Aleksandr Yampolskiy
-
2005/281 ( PDF )
- Herding Hash Functions and the Nostradamus Attack
- John Kelsey and Tadayoshi Kohno
-
2005/280 ( PS PS.GZ PDF )
- Partitioned Cache Architecture as a Side-Channel Defence Mechanism
- D. Page
-
2005/279 ( PS PS.GZ PDF )
- Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model
- Bao Li and Hongda Li and Guangwu Xu and Haixia Xu
-
2005/278 ( PS PS.GZ PDF )
- A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
- Katja Schmidt-Samoa
-
2005/277 ( PS PS.GZ PDF )
- Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions
- Fumiyuki Momose and Jinhui Chao
-
2005/276 ( PDF )
- Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
- Jung Hee Cheon and Dong Hoon Lee
-
2005/275 ( PDF )
- Explicit Construction of Secure Frameproof Codes
- Dongvu Tonien and Reihaneh Safavi-Naini
-
2005/274 ( PDF )
- Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
- Jeff Hoffstein and Nick Howgrave-Graham and Jill Pipher and Joseph H. Silverman and William Whyte
-
2005/273 ( PDF )
- CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
- P G Vaidya and Sajini Anand
-
2005/272 ( PDF )
- An Authentication Protocol For Mobile Agents Using Bilinear Pairings
- Amitabh Saxena and Ben Soh
-
2005/271 ( PS PS.GZ PDF )
- Cache attacks and Countermeasures: the Case of AES
- Dag Arne Osvik and Adi Shamir and Eran Tromer
-
2005/270 ( PS PS.GZ PDF )
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
-
2005/269 ( PS PS.GZ PDF )
- Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2005/268 ( PDF )
- Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI
- Shujun Li and Heung-Yeung Shum
-
2005/267 ( PS PS.GZ PDF )
- Stream Cipher Design based on Jumping Finite State Machines
- Cees J.A. Jansen
-
2005/266 ( PS PS.GZ PDF )
- A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code
- Charanjit S. Jutla and Anindya C. Patthak
-
2005/265 ( PS PS.GZ PDF )
- Security Analysis of KEA Authenticated Key Exchange Protocol
- Kristin Lauter and Anton Mityagin
-
2005/264 ( PS PS.GZ PDF )
- On an authentication scheme based on the Root Problem in the braid group
- Boaz Tsaban
-
2005/263 ( PDF )
- Wang's sufficient conditions of MD5 are not sufficient
- Jun Yajima and Takeshi Shimoyama
-
2005/262 ( PS PS.GZ PDF )
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Ivan Damg{\aa}rd and Yuval Ishai
-
2005/261 ( PS PS.GZ PDF )
- The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
- Alexander W. Dent
-
2005/260 ( PS PS.GZ PDF )
- Powered Tate Pairing Computation
- Bo Gyeong Kang and Je Hong Park
-
2005/259 ( PS PS.GZ PDF )
- Efficient Delegation of Pairing Computation
- Bo Gyeong Kang and Moon Sung Lee and Je Hong Park
-
2005/258 ( PS PS.GZ PDF )
- Relations Among Notions of Security for Identity Based Encryption Schemes
- Nuttapong Attrapadung and Yang Cui and Goichiro Hanaoka and Hideki Imai and Kanta Matsuura and Peng Yang and Rui Zhang
-
2005/257 ( PS PS.GZ PDF )
- TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
- Jin Hong and Woo-Hwan Kim
-
2005/256 ( PDF )
- Fuzzy Universal Hashing and Approximate Authentication
- Reihaneh Safavi-Naini and Dongvu Tonien
-
2005/255 ( PDF )
- Inoculating Multivariate Schemes Against Differential Attacks
- Jintai Ding and Jason E. Gower
-
2005/254 ( PS PS.GZ PDF )
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi
-
2005/253 ( PS PS.GZ PDF )
- Security Notions for Identity Based Encryption
- David Galindo and Ichiro Hasuo
-
2005/252 ( PDF )
- Faster Pairings using an Elliptic Curve with an Efficient Endomorphism
- Michael Scott
-
2005/251 ( PS PS.GZ PDF )
- Feistel Schemes and Bi-Linear Cryptanalysis
- Nicolas Courtois
-
2005/250 ( PDF )
- The topology of covert conflict
- Shishir Nagaraja, Ross Anderson
-
2005/249 ( -- withdrawn -- )
- Efficient Certificateless Public Key Encryption
- Yijuan Shi and Jianhua Li
-
2005/248 ( PS PS.GZ PDF )
- Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing
- Michael Szydlo and Yiqun Lisa Yin
-
2005/247 ( PS PS.GZ PDF )
- A Simple and Provably Good Code for SHA Message Expansion
- Charanjit S. Jutla and Anindya C. Patthak
-
2005/246 ( PS PS.GZ PDF )
- A Verifiable Secret Shuffle of Homomorphic Encryptions
- Jens Groth
-
2005/245 ( PS PS.GZ PDF )
- On the Algebraic Immunity of Symmetric Boolean Functions
- An Braeken and Bart Preneel
-
2005/244 ( PS PS.GZ PDF )
- Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
- Boaz Tsaban
-
2005/243 ( PS PS.GZ PDF )
- Cryptanalysis of Sfinks
- Nicolas T. Courtois
-
2005/242 ( PS PS.GZ PDF )
- Private Searching On Streaming Data
- Rafail Ostrovsky and William E. Skeith III
-
2005/241 ( PS PS.GZ )
- On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities
- Hao Chen and Liqing Xu
-
2005/240 ( PS PS.GZ PDF )
- Attack on Okamoto et al.'s New Short Signature Schemes
- Fangguo Zhang and Xiaofeng Chen
-
2005/239 ( PDF )
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- Raylin Tso and Ying Miao and Takeshi Okamoto and Eiji Okamoto
-
2005/238 ( -- withdrawn -- )
- Simple and Provable Secure Strong Designated Verifier Signature Schemes
- Raylin Tso and Takeshi Okamoto and Eiji Okamoto
-
2005/237 ( PDF )
- An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
- Henri Gilbert and Matt Robshaw and Herve Sibert
-
2005/236 ( PDF )
- Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
- Pu Duan and Shi Cui and Choong Wah Chan
-
2005/235 ( PS PS.GZ PDF )
- Tree Parity Machine Rekeying Architectures for Embedded Security
- Markus Volkmer and Sebastian Wallner
-
2005/234 ( PDF )
- LILI-II is not Broken
- William Millan and Ed Dawson
-
2005/233 ( PDF )
- On the Entropy of Arcfour Keys
- Luke O'Connor
-
2005/232 ( PS PS.GZ PDF )
- Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
- Markus Volkmer and Sebastian Wallner
-
2005/231 ( PS PS.GZ PDF )
- Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
- Boaz Tsaban
-
2005/230 ( -- withdrawn -- )
- Yet Another Short Signatures Without Random Oracles from Bilinear Pairings
- Fangguo Zhang and Xiaofeng Chen
-
2005/229 ( PS PS.GZ PDF )
- Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
- Deepak Kumar Dalai and Subhamoy Maitra and Sumanta Sarkar
-
2005/228 ( PS PS.GZ PDF )
- Efficient Doubling on Genus 3 Curves over Binary Fields
- Xinxin Fan and Thomas Wollinger and Yumin Wang
-
2005/227 ( PS PS.GZ PDF )
- Threshold Ring Signatures Efficient for Large Sets of Signers
- K. Maneva-Jakimoska and G. Jakimoski and M. Burmester
-
2005/226 ( PS PS.GZ PDF )
- Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
- Liqun Chen and Zhaohui Cheng
-
2005/225 ( PDF )
- Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving
- Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
-
2005/224 ( PS PS.GZ PDF )
- An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
- L. Chen and Z. Cheng and J. Malone-Lee and N.P. Smart
-
2005/223 ( PS PS.GZ PDF )
- Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
- Ayan Mahalanobis
-
2005/222 ( PS PS.GZ PDF )
- Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
- Min Feng and Bin B.Zhu and Maozhi Xu and Shipeng Li
-
2005/221 ( PS PS.GZ PDF )
- Constant Round Dynamic Group Key Agreement
- Ratna Dutta and Rana Barua
-
2005/220 ( PS PS.GZ )
- Limits of the Cryptographic Realization of Dolev-Yao-style XOR
- Michael Backes and Birgit Pfitzmann
-
2005/219 ( PS PS.GZ PDF )
- Cryptanalysis of a 32-bit RC4-like Stream Cipher
- Hongjun Wu
-
2005/218 ( PS PS.GZ PDF )
- The conjugacy problem and related problems in lattice-ordered groups
- W. Charles Holland and Boaz Tsaban
-
2005/217 ( PS PS.GZ PDF )
- Efficient Identity-Based Key Encapsulation to Multiple Parties
- M. Barbosa and P. Farshim
-
2005/216 ( PDF )
- A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret
- Hassan Jameel and Sungyoung Lee
-
2005/215 ( PS PS.GZ PDF )
- Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes
- Jason E. Holt
-
2005/214 ( PS PS.GZ PDF )
- TMTO With Multiple Data: Analysis and New Single Table Trade-offs
- Sourav Mukhopadhyay and Palash Sarkar
-
2005/213 ( -- withdrawn -- )
- A Counter-based MAC Revisited: Towards Better Security
- Eonkyung Lee
-
2005/212 ( PDF )
- Probability distributions of Correlation and Differentials in Block Ciphers
- Joan Daemen and Vincent Rijmen
-
2005/211 ( PDF )
- Games and the Impossibility of Realizable Ideal Functionality
- Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov
-
2005/210 ( PS PS.GZ PDF )
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
- John Black
-
2005/209 ( PS PS.GZ PDF )
- Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
- Jin Wook Byun and Dong Hoon Lee
-
2005/208 ( -- withdrawn -- )
- On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm
- Daniel R. L. Brown
-
2005/207 ( PS PS.GZ PDF )
- Some Thoughts on Time-Memory-Data Tradeoffs
- Alex Biryukov
-
2005/206 ( PDF )
- On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
-
2005/205 ( PDF )
- Another look at HMQV
- Alfred Menezes
-
2005/204 ( PS PS.GZ PDF )
- An Algebraic Masking Method to Protect AES Against Power Attacks
- Nicolas Courtois and Louis Goubin
-
2005/203 ( PS PS.GZ PDF )
- On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions
- Nicolas Courtois and Blandine Debraize and Eric Garrido
-
2005/202 ( PS PS.GZ PDF )
- The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
- Nicolas Courtois
-
2005/201 ( PS PS.GZ PDF )
- On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
- Zhaohui Cheng and Liqun Chen
-
2005/200 ( PDF )
- Block ciphers sensitive to Groebner Basis Attacks
- Johannes Buchmann and Andrei Pychkine and Ralf-Philipp Weinmann
-
2005/199 ( -- withdrawn -- )
- Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security
- Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa
-
2005/198 ( PS PS.GZ PDF )
- Universally Composable Time-Stamping Schemes with Audit
- Ahto Buldas and Peeter Laud and Märt Saarepera and Jan Willemson
-
2005/197 ( PDF )
- Weaknesses in two group Diffie-Hellman key exchange protocols
- Qiang Tang and Liqun Chen
-
2005/196 ( PS PS.GZ PDF )
- Universally Composable Password-Based Key Exchange
- Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Philip MacKenzie
-
2005/195 ( PS PS.GZ PDF )
- Twin RSA
- Arjen K. Lenstra and Benjamin M.M. de Weger
-
2005/194 ( PDF )
- Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography
- Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, and Tomohiko Uyematsu
-
2005/193 ( PS PS.GZ PDF )
- VSH, an Efficient and Provable Collision Resistant Hash Function
- Scott Contini and Arjen K. Lenstra and Ron Steinfeld
-
2005/192 ( PS PS.GZ PDF )
- On the security and the efficiency of the Merkle signature scheme
- Carlos Coronado
-
2005/191 ( PDF )
- Public Key Encryption with Keyword Search Revisited
- Joonsang Baek and Reihaneh Safavi-Naini and Willy Susilo
-
2005/190 ( PDF )
- Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"
- SeongHan Shin and Kazukuni Kobara and Hideki Imai
-
2005/189 ( PDF )
- A Weak-Randomizer Attack on RSA-OAEP with e = 3
- Daniel R. L. Brown
-
2005/188 ( PS PS.GZ PDF )
- Group Signature where Group Manager, Members and Open Authority are Identity-Based
- Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang
-
2005/187 ( PDF )
- How To Exchange Secrets with Oblivious Transfer
- Michael O. Rabin
-
2005/186 ( -- withdrawn -- )
- Linkability of Several Blind Signature Schemes
- Xuesheng Zhong
-
2005/185 ( PDF )
- Security properties of two provably secure conference key agreement protocols
- Qiang Tang and Chris J. Mitchell
-
2005/184 ( PDF )
- Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families
- Dongvu Tonien and Reihaneh Safavi-Naini
-
2005/183 ( PDF )
- PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
- Thierry Moreau
-
2005/182 ( PDF )
- Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
- Chih-I Wang, Chun-I Fan, and D. J. Guan
-
2005/181 ( PS PS.GZ PDF )
- A plausible approach to computer-aided cryptographic proofs
- Shai Halevi
-
2005/180 ( PDF )
- A Note on Secure Key Issuing in ID-based Cryptography
- XU Chunxiang and ZHOU Junhui and QIN Zhiguang
-
2005/179 ( PS PS.GZ PDF )
- Intrusion-Resilience via the Bounded-Storage Model
- Stefan Dziembowski
-
2005/178 ( PDF )
- Analyzing Unlinkability of Some Group Signatures
- Zhou Sujing and Lin Dongdai
-
2005/177 ( PDF )
- Secret sharing on the $d$-dimensional cube
- Laszlo Csirmaz
-
2005/176 ( PDF )
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Hugo Krawczyk
-
2005/175 ( PS PS.GZ PDF )
- A 32-bit RC4-like Keystream Generator
- Yassir Nawaz and Kishan Chand Gupta and Guang Gong
-
2005/174 ( PS PS.GZ PDF )
- On the Automatic Construction of Indistinguishable Operations
- Manuel Barbosa and Dan Page
-
2005/173 ( PDF )
- Weaknesses in a leakage-resilient authenticated key transport protocol
- Qiang Tang and Chris J. Mitchell
-
2005/172 ( -- withdrawn -- )
- Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy
- Radu Sion and Bogdan Carbunar
-
2005/171 ( PS PS.GZ PDF )
- Towards computationally sound symbolic analysis of key exchange protocols
- Prateek Gupta and Vitaly Shmatikov
-
2005/170 ( PDF )
- Unclonable Group Identification
- Ivan Damg{\aa}rd and Kasper Dupont and Michael {\O}stergaard Pedersen
-
2005/169 ( PS PS.GZ PDF )
- Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
- Shai Halevi and Paul A. Karger and Dalit Naor
-
2005/168 ( PS PS.GZ PDF )
- Dynamic k-Times Anonymous Authentication
- Lan Nguyen and Rei Safavi-Naini
-
2005/167 ( -- withdrawn -- )
- Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems
- YoungJu Choie and Jaemyung Kim and Eunjeong Lee
-
2005/166 ( PDF )
- Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems
- Eunjeong Lee and Yoonjin Lee
-
2005/165 ( PDF )
- CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER
- Makoto Matsumoto and Takuji Nishimura and Mariko Hagita and Mutsuo Saito
-
2005/164 ( PDF )
- A Distinguish attack on COSvd Ciphers
- Mohammad Ali Orumiehchi ha and Dr.R. Mirghadri
-
2005/163 ( PDF )
- Modeling Insider Attacks on Group Key-Exchange Protocols
- Jonathan Katz and Ji Sun Shin
-
2005/162 ( PS PS.GZ PDF )
- A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
- Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa
-
2005/161 ( PDF )
- Multiple forgery attacks against Message Authentication Codes
- David A. McGrew and Scott R. Fluhrer
-
2005/160 ( PS PS.GZ PDF )
- First Steps Toward a Cryptography-Aware Language and Compiler
- M. Barbosa and R. Noad and D. Page and N.P. Smart
-
2005/159 ( PS PS.GZ PDF )
- On Constructing Parallel Pseudorandom Generators from One-Way Functions
- Emanuele Viola
-
2005/158 ( PDF )
- Geometric Cryptosystem
- Arkady Berenstein and Leon Chernyak
-
2005/157 ( PDF )
- FOX Algorithm Implementation: a hardware design approach
- Colm O'Keeffe and Emanuel Popovici
-
2005/156 ( PDF )
- On the security of some password-based key agreement schemes
- Qiang Tang and Chris J. Mitchell
-
2005/155 ( PS PS.GZ )
- Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
- Eli Biham and Jennifer Seberry
-
2005/154 ( PS PS.GZ PDF )
- Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol
- Marius C. Silaghi and Gerhard Friedrich
-
2005/153 ( PDF )
- On Security of Koyama Schemes
- Sahadeo Padhye
-
2005/152 ( PS PS.GZ PDF )
- On High-Rate Cryptographic Compression Functions
- Richard Ostertag and Martin Stanek
-
2005/151 ( PDF )
- Improved Collision Attack on MD4
- Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta
-
2005/150 ( PS PS.GZ PDF )
- Secure Delegation of Elliptic-Curve Pairing
- Benoit Chevallier-Mames and Jean-Sebastien Coron and Noel McCullagh and David Naccache and Michael Scott
-
2005/149 ( PDF )
- Conditionally Verifiable Signatures
- Aldar C-F. Chan and Ian F. Blake
-
2005/148 ( PDF )
- On Universal Composable Security of Time-Stamping Protocols
- Toshihiko Matsuo and Shin'ichiro Matsuo
-
2005/147 ( PDF )
- Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware
- Jong Youl Choi and Philippe Golle and Markus Jakobsson
-
2005/146 ( PDF )
- A High Speed Architecture for Galois/Counter Mode of Operation (GCM)
- Bo Yang, Sambit Mishra, Ramesh Karri
-
2005/145 ( PDF )
- Small Secure Sketch for Point-Set Difference
- Ee-Chien Chang and Qiming Li
-
2005/144 ( PS PS.GZ PDF )
- Kaweichel, an Extension of Blowfish for 64-Bit Architectures
- Dieter Schmidt
-
2005/143 ( PDF )
- Multiparty Computation Based on Connectivity of Graphs
- Liangliang Xiao and Mulan Liu and Zhifang Zhang
-
2005/142 ( PDF )
- Broadcast Encryption with Random Key Pre-distribution Schemes
- Mahalingam Ramkumar
-
2005/141 ( PDF )
- Enhanced password-based key establishment protocol
- Qiang Tang and Chris J. Mitchell
-
2005/140 ( PS PS.GZ PDF )
- How to Split a Shared Secret into Shared Bits in Constant-Round
- Ivan Damg{\aa}rd and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft
-
2005/139 ( PDF )
- Scaling security in pairing-based protocols
- Michael Scott
-
2005/138 ( PDF )
- I-HARPS: An Efficient Key Pre-distribution Scheme
- Mahalingam Ramkumar
-
2005/137 ( PS PS.GZ )
- A Sender Verifiable Mix-Net and a New Proof of a Shuffle
- Douglas Wikström
-
2005/136 ( PDF )
- Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
- Jung Hee Cheon and Nam-su Jho and Myung-Hwan Kim and Eun Sun Yoo
-
2005/135 ( PS PS.GZ PDF )
- Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
- Jacques Patarin and Paul Camion
-
2005/134 ( PDF )
- Broadcast Authentication With Hashed Random Preloaded Subsets
- Mahalingam Ramkumar
-
2005/133 ( PS PS.GZ PDF )
- Pairing-Friendly Elliptic Curves of Prime Order
- Paulo S. L. M. Barreto and Michael Naehrig
-
2005/132 ( PS PS.GZ PDF )
- Formal Notions of Anonymity for Peer-to-peer Networks
- Jiejun Kong
-
2005/131 ( PS PS.GZ PDF )
- Dynamic Group Key Agreement in Tree-Based Setting
- Ratna Dutta and Rana Barua
-
2005/130 ( -- withdrawn -- )
- Results on Rotation Symmetric Boolean Functions on Even Number Variable
- pinhui ke,changzhu ling,wenqiao yan
-
2005/129 ( PS PS.GZ PDF )
- On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
- Zhaohui Cheng and Manos Nistazakis and Richard Comley and Luminita Vasiu
-
2005/128 ( -- withdrawn -- )
- Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials
- Xijin Tang and Yong Feng
-
2005/127 ( PDF )
- Browser Model for Security Analysis of Browser-Based Protocols
- Thomas Groß and Birgit Pfitzmann and Ahmad-Reza Sadeghi
-
2005/126 ( PDF )
- On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
- Shahram Khazaei, Mahmood Salmasizadeh and Javad Mohajeri
-
2005/125 ( PS PS.GZ PDF )
- SPA Resistant Left-to-Right Integer Recodings
- Nicolas Th\'eriault
-
2005/124 ( PS PS.GZ PDF )
- Append-Only Signatures
- Eike Kiltz and Anton Mityagin and Saurabh Panjwani and Barath Raghavan
-
2005/123 ( PS PS.GZ PDF )
- Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
- Lan Nguyen
-
2005/122 ( PDF )
- Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
- Xinyi Huang and Willy Susilo and Yi Mu
-
2005/121 ( PDF )
- Pass-thoughts: Authenticating With Our Minds
- Julie Thorpe and P.C. van Oorschot and Anil Somayaji
-
2005/120 ( PDF )
- On Designatedly Verified (Non-interactive) Watermarking Schemes
- Malapati Raja Sekhar and Takeshi Okamoto and Eiji Okamato
-
2005/119 ( PS PS.GZ PDF )
- Index Calculus in Class Groups of Plane Curves of Small Degree
- Claus Diem
-
2005/118 ( PS PS.GZ PDF )
- Results on Rotation Symmetric Bent Functions
- Deepak Kumar Dalai and Subhamoy Maitra
-
2005/117 ( PS PS.GZ PDF )
- Boneh-Franklin Identity Based Encryption Revisited
- David Galindo
-
2005/116 ( PS PS.GZ PDF )
- On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
- Nigel Smart and Frederik Vercauteren
-
2005/115 ( PS PS.GZ PDF )
- Characteristics of Key-Dependent S-Boxes: the Case of Twofish
- Marco Macchetti
-
2005/114 ( PS PS.GZ PDF )
- Intrusion-Resilient Secure Channels
- Gene Itkis and Robert McNerney Jr. and Scott W. Russell
-
2005/113 ( PS PS.GZ PDF )
- Partially Fixed Point Multiplication
- Majid Khabbazian, T. Aaron Gulliver and Vijay K. Bhargava
-
2005/112 ( PS PS.GZ PDF )
- On the relationship between squared pairings and plain pairings
- Bo Gyeong Kang and Je Hong Park
-
2005/111 ( PDF )
- Weak Composite Diffie-Hellman is not Weaker than Factoring
- Kooshiar Azimian, Javad Mohajeri and Mahmoud Salmasizadeh
-
2005/110 ( PS PS.GZ PDF )
- Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.
- Ayan Mahalanobis
-
2005/109 ( PDF )
- A Public Key Cryptosystem Based on Singular Cubic Curve
- Sahadeo Padhye
-
2005/108 ( PS PS.GZ PDF )
- Efficient Identity-Based and Authenticated Key Agreement Protocol
- Yongge Wang
-
2005/107 ( PDF )
- A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher
- Ophir Levy and Avishai Wool
-
2005/106 ( PS PS.GZ PDF )
- How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
- Boaz Barak and Amit Sahai
-
2005/105 ( PS PS.GZ PDF )
- On Error Correction in the Exponent
- Chris Peikert
-
2005/104 ( PS PS.GZ )
- On estimating the lattice security of NTRU
- Nick Howgrave-Graham and Jeff Hoffstein and Jill Pipher and William Whyte
-
2005/103 ( PS PS.GZ PDF )
- Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
- Fangguo Zhang and Xiaofeng Chen
-
2005/102 ( PDF )
- Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
- Vlastimil Klima
-
2005/101 ( PDF )
- Soundness and Completeness of Formal Logics of Symmetric Encryption
- Gergei Bana
-
2005/100 ( PDF )
- almost enumeration of 8-variable bent functions
- Qingshu Meng and Huanguo Zhang and Jingsong Cui and Min Yang
-
2005/099 ( PDF )
- Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
- Miodrag J. Mihaljevic and Marc P.C. Fossorier and Hideki Imai
-
2005/098 ( PS PS.GZ PDF )
- Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
- Yassine Lakhnech and Laurent Mazare
-
2005/097 ( PS PS.GZ PDF )
- Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
- Yassine Lakhnech and Laurent Mazare
-
2005/096 ( PS PS.GZ PDF )
- Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$
- David Jedlicka
-
2005/095 ( PS PS.GZ PDF )
- Security and Privacy Issues in E-passports
- Ari Juels and David Molnar and David Wagner
-
2005/094 ( PS PS.GZ PDF )
- A Survey on ID-Based Cryptographic Primitives
- M. Choudary Gorantla and Raju Gangishetti and Ashutosh Saxena
-
2005/093 ( PDF )
- An ID-Based Key Agreement Scheme from pairing
- Guohong Xie
-
2005/092 ( PS PS.GZ )
- PRF Domain Extension Using DAGs
- Charanjit Jutla
-
2005/091 ( PDF )
- Distributed Phishing Attacks
- Markus Jakobsson and Adam Young
-
2005/090 ( PS PS.GZ PDF )
- Rediscovery of Time Memory Tradeoffs
- Jin Hong and Palash Sarkar
-
2005/089 ( PDF )
- Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions
- Hans Dobbertin and Gregor Leander
-
2005/088 ( PDF )
- The Pelican MAC Function
- Joan Daemen and Vincent Rijmen
-
2005/087 ( PDF )
- AES side channel attack protection using random isomorphisms
- Rostovtsev A.G. and Shemyakina O.V.
-
2005/086 ( PDF )
- Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)
- Henry Ng
-
2005/085 ( -- withdrawn -- )
- A new structural attack for GPT and variants
- R. Overbeck
-
2005/084 ( PS PS.GZ PDF )
- On Resistance of DES to Related-Key Differential Cryptanalysis
- Goce Jakimoski and Yvo Desmedt
-
2005/083 ( PDF )
- Security notions for disk encryption
- Kristian Gjřsteen
-
2005/082 ( PS PS.GZ PDF )
- Some properties of an FSE 2005 Hash Proposal
- Lars R. Knudsen
-
2005/081 ( -- withdrawn -- )
- Smashing SMASH
- Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
-
2005/080 ( PDF )
- A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification
- R. Venkatesh and C. Sanjeevakumar and M. Kasi Rajan and L. Sudarsan and N. Srinivasan
-
2005/079 ( PS PS.GZ PDF )
- Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
- Marius C Silaghi
-
2005/078 ( PS PS.GZ PDF )
- Duality between Multiplication and Modular Reduction
- Wieland Fischer and Jean-Pierre Seifert
-
2005/077 ( PS PS.GZ PDF )
- Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
- Christopher Wolf and Bart Preneel
-
2005/076 ( PDF )
- Pairing-Based Cryptography at High Security Levels
- Neal Koblitz and Alfred Menezes
-
2005/075 ( PDF )
- Finding MD5 Collisions – a Toy For a Notebook
- Vlastimil Klima
-
2005/074 ( PS PS.GZ PDF )
- Computationally sound implementations of equational theories against passive adversaries
- Mathieu Baudet and V{\'e}ronique Cortier and Steve Kremer
-
2005/073 ( PS PS.GZ PDF )
- BROADCAST ENCRYPTION $\pi$
- Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo
-
2005/072 ( PS PS.GZ PDF )
- Practical Lattice Basis Sampling Reduction
- Johannes Buchmann and Christoph Ludwig
-
2005/071 ( -- withdrawn -- )
- A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields
- Dabi Zou and Dongdai Lin
-
2005/070 ( PDF )
- On public-key cryptosystems based on combinatorial group theory
- Jean-Camille Birget and Spyros S. Magliveras and Michal Sramka
-
2005/069 ( PS PS.GZ PDF )
- Fast Elliptic Curve Point Multiplication using Double-Base Chains
- V. S. Dimitrov and L. Imbert and P. K. Mishra
-
2005/068 ( PS PS.GZ PDF )
- N-adic Summation-Shrinking Generator. Basic properties and empirical evidences.
- Zhaneta Tasheva and Borislav Bedzhev and Borislav Stoyanov
-
2005/067 ( PDF )
- Colliding X.509 Certificates
- Arjen Lenstra and Xiaoyun Wang and Benne de Weger
-
2005/066 ( PS PS.GZ PDF )
- Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
- Eike Kiltz
-
2005/065 ( PS PS.GZ PDF )
- Efficient hardware for the Tate pairing calculation in characteristic three
- T. Kerins and W. P. Marnane and E. M. Popovici and P. S. L. M. Barreto
-
2005/064 ( PDF )
- On Efficient Key Agreement Protocols
- Anish Mathuria and Vipul Jain
-
2005/063 ( -- withdrawn -- )
- On the Key Schedule of Blowfish
- Dieter Schmidt
-
2005/062 ( -- withdrawn -- )
- Cryptanalysis of One Fair E-cash System
- LiHua Liu and Zhengjun Cao
-
2005/061 ( PS PS.GZ PDF )
- Key Derivation and Randomness Extraction
- Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval
-
2005/060 ( PDF )
- Compact E-Cash
- Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya
-
2005/059 ( PDF )
- Secret sharing schemes on graphs
- Laszlo Csirmaz
-
2005/058 ( PS PS.GZ PDF )
- Generic Constructions of Identity-Based and Certificateless KEMs
- K. Bentahar and P. Farshim and J. Malone-Lee and N.P. Smart
-
2005/057 ( PDF )
- Tight Reductions among Strong Die-Hellman Assumptions
- Victor K. Wei
-
2005/056 ( PS PS.GZ PDF )
- Deniable Authentication with RSA and Multicasting
- Daniel R. L. Brown
-
2005/055 ( PS PS.GZ PDF )
- Untraceability of Two Group Signature Schemes
- Zhengjun Cao
-
2005/054 ( -- withdrawn -- )
- Comment on cryptanalysis of Tseng et al.ˇ¦s authenticated encryption schemes
- Yi-Hwa Chen and Jinn-Ke Jan
-
2005/053 ( PDF )
- An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
- Hung-Min Sun and Mu-En Wu
-
2005/052 ( PDF )
- Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
- Ziv Kfir and Avishai Wool
-
2005/051 ( PS PS.GZ PDF )
- A Note on Shor's Quantum Algorithm for Prime Factorization
- Zhengjun Cao
-
2005/050 ( PDF )
- David Chaum's Voter Verification using Encrypted Paper Receipts
- Poorvi L. Vora
-
2005/049 ( PDF )
- Adversarial Model for Radio Frequency Identification
- Gildas Avoine
-
2005/048 ( PDF )
- Cryptanalysis of two identification schemes based on an ID-based cryptosystem
- Qiang Tang and Chris J. Mitchell
-
2005/047 ( PDF )
- Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
- Qiang Tang and Chris J. Mitchell
-
2005/046 ( PDF )
- New Approaches for Deniable Authentication
- Mario Di Raimondo and Rosario Gennaro
-
2005/045 ( PDF )
- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
- Nick Howgrave-Graham and Joseph H. Silverman and William Whyte
-
2005/044 ( PS PS.GZ PDF )
- On the affine classification of cubic bent functions
- Sergey Agievich
-
2005/043 ( PS PS.GZ PDF )
- An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption
- Hsiao-Ying Lin and Wen-Guey Tzeng
-
2005/042 ( PS PS.GZ PDF )
- Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
- Logachev~O.A. and Salnikov~A.A. and Yaschenko~V.V.
-
2005/041 ( PS PS.GZ PDF )
- On the Security of a Group Signature Scheme with Strong Separability
- Lihua Liu and Zhengjun Cao
-
2005/040 ( PS PS.GZ PDF )
- Unfairness of a protocol for certified delivery
- Juan M. Estevez-Tapiador and Almudena Alcaide
-
2005/039 ( PDF )
- Distinguishing Stream Ciphers with Convolutional Filters
- Joan Daemen and Gilles Van Assche
-
2005/038 ( -- withdrawn -- )
- Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants
- Yi-Hwa Chen and Jinn-Ke Jan
-
2005/037 ( PS PS.GZ PDF )
- Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
- Claude Castelluccia and Einar Mykletun and Gene Tsudik
-
2005/036 ( PS PS.GZ PDF )
- Concurrent Composition of Secure Protocols in the Timing Model
- Yael Kalai and Yehuda Lindell and Manoj Prabhakaran
-
2005/035 ( PS PS.GZ PDF )
- An Efficient CDH-based Signature Scheme With a Tight Security Reduction
- Benoit Chevallier-Mames
-
2005/034 ( PDF )
- Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)
- Gene Tsudik and Shouhuai Xu
-
2005/033 ( PDF )
- An Attack on CFB Mode Encryption As Used By OpenPGP
- Serge Mister and Robert Zuccherato
-
2005/032 ( PS PS.GZ PDF )
- On the Notion of Statistical Security in Simulatability Definitions
- Dennis Hofheinz and Dominique Unruh
-
2005/031 ( PS PS.GZ PDF )
- The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
- Iwan Duursma and Negar Kiyavash
-
2005/030 ( PDF )
- Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves.
- A. A. Kalele and V. R. Sule
-
2005/029 ( PS PS.GZ PDF )
- A model and architecture for pseudo-random generation with applications to /dev/random
- Boaz Barak and Shai Halevi
-
2005/028 ( PDF )
- Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
- Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger
-
2005/027 ( PS PS.GZ PDF )
- Tag-KEM/DEM: A New Framework for Hybrid Encryption
- Masayuki ABE and Rosario Gennaro and Kaoru Kurosawa
-
2005/026 ( PS PS.GZ )
- Techniques for random maskin in hardware
- Jovan Dj. Golic
-
2005/025 ( PS PS.GZ PDF )
- Analysis of Affinely Equivalent Boolean Functions
- Meng Qing-shu and Yang min and Zhang Huan-guo and Liu Yu-zhen
-
2005/024 ( PDF )
- Weak keys of the Diffe Hellman key exchange I
- A. A. Kalele and V. R. Sule
-
2005/023 ( PDF )
- A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
- Masao Kasahara
-
2005/022 ( PS PS.GZ PDF )
- An Improved and Efficient Countermeasure against Power Analysis Attacks
- ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and Sung-Hyun Kim
-
2005/021 ( PS PS.GZ )
- Partial Hiding in Public-Key Cryptography
- Eabhnat N\'{\i} Fhloinn and Michael Purser
-
2005/020 ( PS PS.GZ PDF )
- (De)Compositions of Cryptographic Schemes and their Applications to Protocols
- R. Janvier and Y. Lakhnech and L. Mazare
-
2005/019 ( PDF )
- The Full Abstraction of the UC Framework
- Jes{\'u}s F. Almansa
-
2005/018 ( PDF )
- Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
- Dan Boneh and Craig Gentry and Brent Waters
-
2005/017 ( PDF )
- Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
- Roberto M. Avanzi
-
2005/016 ( PS PS.GZ PDF )
- Narrow T-functions
- Magnus Daum
-
2005/015 ( PS PS.GZ PDF )
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Dan Boneh and Xavier Boyen and Eu-Jin Goh
-
2005/014 ( PS PS.GZ )
- A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
- Ludovic Perret
-
2005/013 ( PDF )
- Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
- Hung-Yu Chien
-
2005/012 ( PS PS.GZ PDF )
- Efficient Certificateless Public Key Encryption
- Zhaohui Cheng and Richard Comley
-
2005/011 ( PDF )
- An Improved Elegant Method to Re-initialize Hash Chains
- Yuanchao Zhao and Daoben Li
-
2005/010 ( PS PS.GZ PDF )
- Update on SHA-1
- Vincent Rijmen and Elisabeth Oswald
-
2005/009 ( PDF )
- Mixing properties of triangular feedback shift registers
- Bernd Schomburg
-
2005/008 ( PS PS.GZ PDF )
- Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
- J. Wu and R. Wei
-
2005/007 ( PS PS.GZ PDF )
- The Misuse of RC4 in Microsoft Word and Excel
- Hongjun Wu
-
2005/006 ( PS PS.GZ )
- A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$.
- Pradeep Kumar Mishra and Kishan Chand Gupta
-
2005/005 ( PS PS.GZ PDF )
- A sufficient condition for key-privacy
- Shai Halevi
-
2005/004 ( PS PS.GZ PDF )
- Benes and Butterfly schemes revisited
- Jacques Patarin and Audrey Montreuil
-
2005/003 ( PDF )
- Cryptanalysis of Hiji-bij-bij (HBB)
- Vlastimil Klima
-
2005/002 ( PS PS.GZ PDF )
- Logcrypt: Forward Security and Public Verification for Secure Audit Logs
- Jason E. Holt and Kent E. Seamons
-
2005/001 ( PS PS.GZ PDF )
- On Obfuscating Point Functions
- Hoeteck Wee
[ Cryptology ePrint archive ]