Cryptology ePrint Archive: Listing for 2006

2006/486 ( PDF )
Inductive Trace Properties for Computational Security
Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
2006/485 ( PDF )
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori Kuwakado and Masakatu Morii
2006/484 ( -- withdrawn -- )
A New Identity Based Encryption Scheme From Pairing
Xianhui Lu , Dake He, Guomin Li
2006/483 ( PS PS.GZ PDF )
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
2006/482 ( PS PS.GZ PDF )
Countermeasures for the Simple Branch Prediction Analysis
Giovanni Agosta and Gerardo Pelosi
2006/481 ( PS PS.GZ PDF )
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Donghoon Chang
2006/480 ( PDF )
Cryptanalysis of REESSE1+ Public Key Cryptosystem
Shengli Liu and Fangguo Zhang
2006/479 ( PS PS.GZ PDF )
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
2006/478 ( PS PS.GZ PDF )
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
Donghoon Chang
2006/477 ( PS PS.GZ PDF )
Dynamic Cryptographic Hash Functions
William R. Speirs II and Samuel S. Wagstaff, Jr.
2006/476 ( PS PS.GZ PDF )
Password-Authenticated Multi-Party Key Exchange with Different Passwords
Jeong Ok Kwon and Ik Rae Jeong and Kouichi Sakurai and Dong Hoon Lee
2006/475 ( PS PS.GZ PDF )
New Technique for Solving Sparse Equation Systems
Håvard Raddum and Igor Semaev
2006/474 ( PDF )
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
Chang-An Zhao and Fangguo Zhang and Jiwu Huang
2006/473 ( PDF )
Identity-Based Proxy Re-encryption
Matthew Green and Giuseppe Ateniese
2006/472 ( PS PS.GZ PDF )
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
Luis Teixeira d'Aguiar Norton Brandao
2006/471 ( PDF )
Multiplication and Squaring on Pairing-Friendly Fields
Augusto Jun Devegili and Colm \'O~h\'Eigeartaigh and Michael Scott and Ricardo Dahab
2006/470 ( PS PS.GZ PDF )
On the security of a group key agreement protocol
Qiang Tang
2006/469 ( PS PS.GZ PDF )
An Attack on Disguised Elliptic Curves
David Mireles
2006/468 ( PDF )
White Box Cryptography: Another Attempt
Julien Bringer and Herve Chabanne and Emmanuelle Dottax
2006/467 ( PS PS.GZ PDF )
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
Donghoon Chang and Moti Yung
2006/466 ( PDF )
Prime Order Primitive Subgroups in Torus-Based Cryptography
Jason E. Gower
2006/465 ( PS PS.GZ )
Security and Composition of Cryptographic Protocols: A Tutorial
Ran Canetti
2006/464 ( PDF )
Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik
2006/463 ( PS PS.GZ PDF )
Obfuscation for Cryptographic Purposes
Dennis Hofheinz and John Malone-Lee and Martijn Stam
2006/462 ( PDF )
Improved Collision and Preimage Resistance Bounds on PGV Schemes
Lei Duo and Chao Li
2006/461 ( PS PS.GZ )
On Post-Modern Cryptography
Oded Goldreich
2006/460 ( PS PS.GZ PDF )
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
Donghoon Chang
2006/459 ( PDF )
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
Claude Carlet
2006/458 ( PS PS.GZ PDF )
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
Aggelos Kiayias and Moti Yung
2006/457 ( PDF )
Linear Approximating to Integer Addition
Li An-Ping
2006/456 ( PDF )
Indistinguishability Amplification
Ueli Maurer and Krzysztof Pietrzak and Renato Renner
2006/455 ( PS PS.GZ PDF )
On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
Jonathan Katz
2006/454 ( PS PS.GZ PDF )
How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich
2006/453 ( PDF )
Key Replacement Attack on a Certificateless Signature Scheme
Zhenfeng Zhang and Dengguo Feng
2006/452 ( PDF )
Hybrid Protocol For Password-based Key Exchange in Three-party Setting
TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
2006/451 ( PDF )
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Jongsung Kim
2006/450 ( PS PS.GZ PDF )
Secure Cryptographic Workflow in the Standard Model
M. Barbosa and P. Farshim
2006/449 ( PS PS.GZ PDF )
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
Mihir Bellare and Phillip Rogaway
2006/448 ( PS PS.GZ PDF )
Universally Composable and Forward Secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester, Breno de Medeiros
2006/447 ( PS PS.GZ )
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Yael Gertner and Tal Malkin and Steven Myers
2006/446 ( PS PS.GZ PDF )
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo
2006/445 ( PS PS.GZ PDF )
A class of quadratic APN binomials inequivalent to power functions
Lilya Budaghyan and Claude Carlet and Gregor Leander
2006/444 ( PS PS.GZ PDF )
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
Chris Peikert and Alon Rosen
2006/443 ( PS PS.GZ PDF )
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Yvo Desmedt and Tanja Lange and Mike Burmester
2006/442 ( PDF )
An attack on the certificateless signature scheme from EUC Workshops 2006
Je Hong Park
2006/441 ( PS PS.GZ PDF )
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
Donghoon Chang, Mridul Nandi
2006/440 ( PDF )
A New Type of Group Signature Scheme
Jun Zhong Dake He
2006/439 ( PDF )
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
Jun Zhong Dake He
2006/438 ( PS PS.GZ PDF )
On the pseudo-random generator ISAAC
Jean-Philippe Aumasson
2006/437 ( PS PS.GZ PDF )
On Zigzag Functions and Related Objects in New Metric
An Braeken, Ventzislav Nikov, Svetla Nikova
2006/436 ( PS PS.GZ )
Statistically-Hiding Commitment from Any One-Way Function
Iftach Haitner and Omer Reingold
2006/435 ( PDF )
Searching for Shapes in Cryptographic Protocols (extended version)
Shaddin F. Doghmi and Joshua D. Guttman and F. Javier Thayer
2006/434 ( PS PS.GZ PDF )
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
Deepak Kumar Dalai and Subhamoy Maitra
2006/433 ( PS PS.GZ PDF )
Information Theoretic Bounds on Authentication Systems in Query Model
Reihaneh Safavi-Naini and Peter Wild
2006/432 ( PS PS.GZ PDF )
Universally Composable Security with Global Setup
Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish
2006/431 ( PDF )
Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2006/430 ( PDF )
From Weak to Strong Watermarking
Nicholas Hopper and David Molnar and David Wagner
2006/429 ( PDF )
On a new invariant of Boolean functions
Sugata Gangopadhyay and Deepmala Sharma
2006/428 ( PS PS.GZ PDF )
Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
Lilya Budaghyan and Claude Carlet and Gregor Leander
2006/427 ( PDF )
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
Aya Comuta and Mitsuru Kawazoe and Tetsuya Takahashi
2006/426 ( -- withdrawn -- )
The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
Christophe Tartary and Huaxiong Wang
2006/425 ( -- withdrawn -- )
A protocol
2006/424 ( PDF )
Security Analysis of Voice-over-IP Protocols
Prateek Gupta and Vitaly Shmatikov
2006/423 ( PS PS.GZ PDF )
Perfect NIZK with Adaptive Soundness
Masayuki Abe and Serge Fehr
2006/422 ( PDF )
Long-term Security and Universal Composability
Joern Mueller-Quade and Dominique Unruh
2006/421 ( PDF )
Universally Composable Three-Party Key Distribution
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2006/420 ( PDF )
The REESSE1+ Public Key Cryptosystem v 2.21
Shenghui Su and Shuwang Lu
2006/419 ( PDF )
Some New Hidden Ideal Cryptosystems
Ilia Toli
2006/418 ( PDF )
Analysis of Privacy-Preserving Element Reduction of Multiset
Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon and Dowon Hong
2006/417 ( PS PS.GZ )
The Recent Attack of Nie et al On TTM is Faulty
2006/416 ( PS PS.GZ PDF )
Authenticated Interleaved Encryption \\
Claude Castelluccia
2006/415 ( PS PS.GZ PDF )
On the Minimal Embedding Field
Laura Hitt
2006/414 ( PS PS.GZ PDF )
Zero Knowledge and Soundness are Symmetric
Shien Jin Ong and Salil Vadhan
2006/413 ( PDF )
Preimage Attack on Parallel FFT-Hashing
Donghoon Chang
2006/412 ( PS PS.GZ PDF )
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
Donghoon Chang
2006/411 ( PS PS.GZ PDF )
Preimage Attack on Hashing with Polynomials proposed at ICISC'06
Donghoon Chang
2006/410 ( PDF )
Galois Field Commitment Scheme
Alexandre Pinto and André Souto and Armando Matos and Luís Antunes
2006/409 ( PDF )
Li An-Ping
2006/408 ( PS PS.GZ PDF )
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
Goichiro Hanaoka and Hideki Imai
2006/407 ( PS PS.GZ PDF )
Cryptography in the Multi-string Model
Jens Groth and Rafail Ostrovsky
2006/406 ( PDF )
Redundancy of the Wang-Yu Sufficient Conditions
Yuto Nakano and Hidenori Kuwakado and Masakatu Morii
2006/405 ( PS PS.GZ PDF )
Universally Composable Blind Signatures in the Plain Model
Aslak Bakke Buan and Kristian Gj\o steen and Lillian Kr\aa kmo
2006/404 ( PDF )
Faugere's F5 Algorithm Revisited
Till Stegers
2006/403 ( PS PS.GZ PDF )
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
Willi Geiselmann and Rainer Steinwandt
2006/402 ( PS PS.GZ PDF )
Algebraic Cryptanalysis of the Data Encryption Standard
Nicolas T. Courtois and Gregory V. Bard
2006/401 ( -- withdrawn -- )
On the cost of cryptanalytic attacks
Jean-Philippe Aumasson
2006/400 ( PDF )
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai
2006/399 ( PDF )
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Mihir Bellare and Thomas Ristenpart
2006/398 ( PDF )
The Layered Games Framework for Specifications and Analysis of Security Protocols
Amir Herzberg and Igal Yoffe
2006/397 ( PS PS.GZ PDF )
Revisiting the Efficiency of Malicious Two-Party Computation
David P. Woodruff
2006/396 ( PDF )
Security Protocols with Isotropic Channels
Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan
2006/395 ( PDF )
Security-Focused Survey on Group Key Exchange Protocols
Mark Manulis
2006/394 ( PDF )
Identity Based Strong Designated Verifier Proxy Signature Schemes
Sunder Lal and Vandani Verma
2006/393 ( -- withdrawn -- )
The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
Sujing Zhou, Dongdai Lin
2006/392 ( PS PS.GZ PDF )
The Tate Pairing via Elliptic Nets
Katherine E. Stange
2006/391 ( PDF )
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
Ronald Cramer and Dennis Hofheinz and Eike Kiltz
2006/390 ( -- withdrawn -- )
Revisit of CS98
Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
2006/389 ( PDF )
Traceable Ring Signature
Eiichiro Fujisaki and Koutarou Suzuki
2006/388 ( PDF )
Survey on Security Requirements and Models for Group Key Exchange
Mark Manulis
2006/387 ( PDF )
A Note on the Security of NTRUSign
Phong Q. Nguyen
2006/386 ( PS PS.GZ PDF )
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
Mark Wooding
2006/385 ( PDF )
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson and Mark Manulis and Joerg Schwenk
2006/384 ( PDF )
Design and Analysis of a Hash Ring-iterative Structure
Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang
2006/383 ( PS PS.GZ PDF )
Traitor tracing scheme with constant ciphertext rate against powerful pirates
Thomas Sirvent
2006/382 ( PS PS.GZ PDF )
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
E-yong Kim and Hwangnam Kim and Kunsoo Park
2006/381 ( PDF )
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Fuw-Yi Yang
2006/380 ( PDF )
On Security of Sovereign Joins
Einar Mykletun and Gene Tsudik
2006/379 ( PDF )
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
Matthew J. Campagna
2006/378 ( PS PS.GZ PDF )
A New Key Exchange Primitive Based on the Triple Decomposition Problem
2006/377 ( PS PS.GZ PDF )
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
James Birkett, Alexander W. Dent, Gregory Neven and Jacob Schuldt
2006/376 ( PDF )
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
Vlastimil KLIMA
2006/375 ( PDF )
Distortion maps for genus two curves
Steven D. Galbraith and Jordi Pujol\`as and Christophe Ritzenthaler and Benjamin Smith
2006/374 ( PS PS.GZ PDF )
Robust Final-Round Cache-Trace Attacks Against AES
Joseph Bonneau
2006/373 ( PDF )
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Joseph K. Liu and Man Ho Au and Willy Susilo
2006/372 ( PDF )
A taxonomy of pairing-friendly elliptic curves
David Freeman and Michael Scott and Edlyn Teske
2006/371 ( PDF )
Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
Robert Ronan and Colm o hEigeartaigh and Colin Murphy and Tim Kerins and Paulo S. L. M. Barreto
2006/370 ( PS PS.GZ PDF )
A DoS Attack Against the Integrity-Less ESP (IPSec)
Ventzislav Nikov
2006/369 ( PDF )
RadioGat\'un, a belt-and-mill hash function
Guido Bertoni and Joan Daemen and Micha\"el Peeters and Gilles Van Assche
2006/368 ( PDF )
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
2006/367 ( PDF )
An Attack on a Certificateless Signature Scheme
Xuefei Cao and Kenneth G. Paterson and Weidong Kou
2006/366 ( PDF )
A Latency-Free Election Scheme
Kristian Gj\o steen
2006/365 ( -- withdrawn -- )
Revisit of KD04
Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
2006/364 ( PDF )
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
Gregory V. Bard
2006/363 ( -- withdrawn -- )
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Ventzislav Nikov and Svetla Nikova and Bart Preneel
2006/362 ( PS PS.GZ PDF )
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
Palash Sarkar and Sanjit Chatterjee
2006/361 ( PS PS.GZ PDF )
Generic Construction of (Identity-based) Perfect Concurrent Signatures
Sherman S.M. Chow and Willy Susilo
2006/360 ( PDF )
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Marc Stevens and Arjen Lenstra and Benne de Weger
2006/359 ( PS PS.GZ )
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Mihir Bellare and Oded Goldreich
2006/358 ( PDF )
Public Key Encryption with Keyword Search based on K-Resilient IBE
Dalia Khader
2006/357 ( PDF )
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
Su-Jeong Choi and Simon R. Blackburn and Peter R. Wild
2006/356 ( PS PS.GZ PDF )
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
Emilia K\"{a}sper and Sven Laur and Helger Lipmaa
2006/355 ( PS PS.GZ PDF )
Concurrent Non-Malleable Zero Knowledge
Boaz Barak and Manoj Prabhakaran and Amit Sahai
2006/354 ( PDF )
A new stream cipher: DICING
Li An-Ping
2006/353 ( PDF )
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
Zhenjie Huang and Kefei Chen and Yumin Wang
2006/352 ( PDF )
Foundations of Secure E-Commerce: The Order Layer
Amir Herzberg and Igal Yoffe
2006/351 ( PDF )
On the Power of Simple Branch Prediction Analysis
Onur Aciicmez and Cetin Kaya Koc and Jean-Pierre Seifert
2006/350 ( PDF )
Impossible Differential Cryptanalysis of ARIA and Camellia
Wenling Wu, Wentao Zhang, and Dengguo Feng
2006/349 ( PS PS.GZ PDF )
A Note On Side-Channels Resulting From Dynamic Compilation
D. Page
2006/348 ( PS PS.GZ PDF )
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
Krzysztof Pietrzak
2006/347 ( PDF )
Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
Fumiyuki Momose and Jinhui Chao
2006/346 ( PDF )
Generic Transformation to Strongly Unforgeable Signatures
Qiong Huang and Duncan S. Wong and Yiming Zhao
2006/345 ( PS PS.GZ PDF )
Private and Efficient Stable Marriages (Matching)
Atkinson, T. and Bartak,R. and Silaghi,M.-C. and Tuleu,E. and Zanker,M.
2006/344 ( PDF )
A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
2006/343 ( PS PS.GZ PDF )
Verifiably Encrypted Signature Scheme with Threshold Adjudication
M. Choudary Gorantla And Ashutosh Saxena
2006/342 ( PDF )
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
2006/341 ( PS PS.GZ PDF )
MV3: A new word based stream cipher using rapid mixing and revolving buffers
Nathan Keller and Stephen D. Miller and Ilya Mironov and Ramarathnam Venkatesan
2006/340 ( PDF )
Cryptanalyses of Some Multimedia Encryption Schemes
Chengqing Li
2006/339 ( -- withdrawn -- )
A New family of Ideal Multipartite Access Structure Based on MSP
Jun Xu and Jiwen Zeng and Xiaomin Zha
2006/338 ( PS PS.GZ PDF )
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
Fagen Li, Yupu Hu, and Shuanggen Liu
2006/337 ( PDF )
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
D.R. Stinson and J. Wu
2006/336 ( PDF )
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
2006/335 ( PDF )
A ID-Based Deniable Authentication Protocol on pairings
Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
2006/334 ( PDF )
Colliding Message Pair for 53-Step HAS-160
Florian Mendel
2006/333 ( PDF )
Discrete Logarithms in Generalized Jacobians
S. D. Galbraith and B. A. Smith
2006/332 ( PDF )
Improved Efficiency for Private Stable Matching
Matthew Franklin and Mark Gondree and Payman Mohassel
2006/331 ( PDF )
On the Security of Generalized Jacobian Cryptosystems
Isabelle Dechene
2006/330 ( PS PS.GZ PDF )
Extended Double-Base Number System with applications to Elliptic Curve Cryptography
Christophe Doche and Laurent Imbert
2006/329 ( PDF )
Designated Verifier Signature Scheme Based on Braid Groups
Shi-hua Zou and Ji-wen Zeng and Jun-jie Quan
2006/328 ( PDF )
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
2006/327 ( PDF )
An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2006/326 ( PDF )
Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
Jonathan Katz and Adam Smith
2006/325 ( PS PS.GZ PDF )
Invisible Designated Confirmer Signatures without Random Oracles
Victor K. Wei
2006/324 ( PDF )
The Average Transmission Overhead of Broadcast Encryption
Sarang Aravamuthan and Sachin Lodha
2006/323 ( PS PS.GZ PDF )
Computational Soundness of Formal Indistinguishability and Static Equivalence
Gergei Bana and Payman Mohassel and Till Stegers
2006/322 ( PDF )
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
Yassir Nawaz and Kishan Chand Gupta and Guang Gong
2006/321 ( PS PS.GZ PDF )
Efficient Pseudorandom Generators Based on the DDH Assumption
Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko
2006/320 ( PDF )
CMSS -- An Improved Merkle Signature Scheme
Johannes Buchmann and Luis Carlos Coronado Garcia and Erik Dahmen and Martin Doering and Elena Klintsevich
2006/319 ( PS PS.GZ PDF )
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini and Yiqun Lisa Yin
2006/318 ( PDF )
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chunbo Ma, Jun Ao, and Jianhua Li
2006/317 ( PS PS.GZ PDF )
Weaknesses of the FORK-256 compression function
Krystian Matusiewicz and Scott Contini and Josef Pieprzyk
2006/316 ( PDF )
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Sarang Aravamuthan and Viswanatha Rao Thumparthy
2006/315 ( PDF )
On the Necessity of Rewinding in Secure Multiparty Computation
Michael Backes and Joern-Mueller Quade and Dominique Unruh
2006/314 ( PDF )
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
Yi Deng and Giovanni Di Crescenzo and Dongdai Lin
2006/313 ( PDF )
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
Lars Elmegaard-Fessel
2006/312 ( PS PS.GZ PDF )
ElGamal type signature schemes for n-dimensional vector spaces
Iwan M. Duursma and SeungKook Park
2006/311 ( -- withdrawn -- )
Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
Bennian Dou and Chungen Xu
2006/310 ( PDF )
A d-Sequence based Recursive Random Number Generator
Abhishek Parakh
2006/309 ( PDF )
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters
2006/308 ( PDF )
Efficient ID-based Threshold Signature Schemes without Pairings
Jun Shao and Zhenfu Cao and Licheng Wang
2006/307 ( PDF )
Note on Design Criteria for Rainbow-Type Multivariates
Jintai Ding and Lei Hu and Bo-Yin Yang and Jiun-Ming Chen
2006/306 ( PS PS.GZ PDF )
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
Alexander W. Dent and Qiang Tang
2006/305 ( PS PS.GZ PDF )
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
V.S. Dimitrov and K.U. Jaervinen and M.J. Jacobson, Jr. and W.F. Chan and Z. Huang
2006/304 ( PS PS.GZ PDF )
Identity-Based Encryption Gone Wild
Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone-Lee and Gregory Neven and Nigel P. Smart
2006/303 ( PS PS.GZ )
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Eric Filiol
2006/302 ( PDF )
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
Atefeh Mashatan and Douglas R. Stinson
2006/301 ( PDF )
New features for JPEG Steganalysis
Johann Barbier and \'Eric Filiol and Kichenakoumar Mayoura
2006/300 ( -- withdrawn -- )
Attacks and Modifications of CJC's E-voting Scheme
Bennian Dou and Chun-hua Chen and Roberto Araujo
2006/299 ( PDF )
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto
2006/298 ( PDF )
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
Dan Boneh and Brent Waters
2006/297 ( PDF )
Forward-Secure Signatures with Untrusted Update
Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters
2006/296 ( PS PS.GZ PDF )
On the Generic Construction of Identity-Based Signatures with Additional Properties
David Galindo and Javier Herranz and Eike Kiltz
2006/295 ( PDF )
Visual secret sharing scheme with autostereogram
Feng Yi and Daoshun Wang and Yiqi Dai
2006/294 ( PDF )
The Collision Intractability of MDC-2 in the Ideal Cipher Model
John P Steinberger
2006/293 ( PS PS.GZ PDF )
Fast Algorithms for the Free Riders Problem in Broadcast Encryption
Zulfikar Ramzan and David P. Woodruff
2006/292 ( PDF )
Ideal Multipartite Secret Sharing Schemes
Oriol Farras and Jaume Marti-Farre and Carles Padro
2006/291 ( PS PS.GZ PDF )
Hard Homogeneous Spaces
Jean-Marc Couveignes
2006/290 ( PDF )
On Authentication with HMAC and Non-Random Properties
Christian Rechberger and Vincent Rijmen
2006/289 ( PDF )
Efficient Ring Signatures without Random Oracles
Hovav Shacham and Brent Waters
2006/288 ( PDF )
Predicting Secret Keys via Branch Prediction
Onur Aciicmez and Jean-Pierre Seifert and Cetin Kaya Koc
2006/287 ( PDF )
Conjunctive, Subset, and Range Queries on Encrypted Data
Dan Boneh and Brent Waters
2006/286 ( PDF )
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
Sujing Zhou and Dongdai Lin
2006/285 ( PS PS.GZ PDF )
Unrestricted Aggregate Signatures
Mihir Bellare and Chanathip Namprempre and Gregory Neven
2006/284 ( PS PS.GZ PDF )
Constant Round Group Key Exchange with Logarithmic Computational Complexity
Junghyun Nam, Youngsook Lee, and Dongho Won
2006/283 ( PS PS.GZ PDF )
Does Privacy Require True Randomness?
Carl Bosley and Yevgeniy Dodis
2006/282 ( -- withdrawn -- )
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
Victor K. Wei and Fangguo Zhang
2006/281 ( PS PS.GZ PDF )
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
Phillip Rogaway
2006/280 ( PS PS.GZ )
Deniable Authentication and Key Exchange
Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk
2006/279 ( PDF )
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
Sanjit Chatterjee and Palash Sarkar
2006/278 ( PS PS.GZ PDF )
Fundamental problems in provable security and cryptography
Alexander W. Dent
2006/277 ( PS PS.GZ )
On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
Oded Goldreich
2006/276 ( PS PS.GZ PDF )
Mitigating Dictionary Attacks on Password-Protected Local Storage
Ran Canetti and Shai Halevi and Michael Steiner
2006/275 ( PS PS.GZ PDF )
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
Debrup Chakraborty and Palash Sarkar
2006/274 ( PDF )
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Debasis Giri and P. D. Srivastava
2006/273 ( PS PS.GZ PDF )
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Mikio Fujii
2006/272 ( PS PS.GZ PDF )
Efficient Use of Random Delays
Olivier Benoit and Michael Tunstall
2006/271 ( PDF )
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Gregory V. Bard
2006/270 ( PDF )
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng
2006/269 ( PS PS.GZ PDF )
An Analysis of the Hermes8 Stream Ciphers
Steve Babbage and Carlos Cid and Norbert Pramstaller and Havard Raddum
2006/268 ( PDF )
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto
2006/267 ( PS PS.GZ PDF )
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
Mihir Bellare and Tadayoshi Kohno and Victor Shoup
2006/266 ( PS PS.GZ PDF )
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Michael Backes and Peeter Laud
2006/265 ( PDF )
Some (in)sufficient conditions for secure hybrid encryption.
Javier Herranz and Dennis Hofheinz and Eike Kiltz
2006/264 ( PS PS.GZ PDF )
A Simple and Unified Method of Proving Unpredictability
Mridul Nandi
2006/263 ( PDF )
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
Dragos Trinca
2006/262 ( PDF )
Logical Concepts in Cryptography
Simon Kramer
2006/261 ( PS PS.GZ PDF )
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
Frederic Didier
2006/260 ( PDF )
A Note On Game-Hopping Proofs
Alexander W. Dent
2006/259 ( PDF )
Simplified Submission of Inputs to Protocols
Douglas Wikstrom
2006/258 ( PDF )
Cryptanalysis of a Cognitive Authentication Scheme
Philippe Golle and David Wagner
2006/257 ( PDF )
Efficient Divisor Class Halving on Genus Two Curves
Peter Birkner
2006/256 ( PDF )
Constant-Round Concurrent NMWI and its relation to NMZK
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2006/255 ( PDF )
Malicious KGC Attacks in Certificateless Cryptography
Man Ho Au and Jing Chen and Joseph K. Liu and Yi Mu and Duncan S. Wong and Guomin Yang
2006/254 ( PS PS.GZ PDF )
Applications of SAT Solvers to Cryptanalysis of Hash Functions
Ilya Mironov and Lintao Zhang
2006/253 ( PS PS.GZ PDF )
Hard Instances of the Constrained Discrete Logarithm Problem
Ilya Mironov and Anton Mityagin and Kobbi Nissim
2006/252 ( PDF )
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Maurizio A. Strangio
2006/251 ( PDF )
Accelerating Cryptanalysis with the Method of Four Russians
Gregory V. Bard
2006/250 ( PDF )
Linear Cryptanalysis of CTC
Orr Dunkelman and Nathan Keller
2006/249 ( PS PS.GZ PDF )
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
Selcuk Kavut and Subhamoy Maitra and Sumanta Sarkar and Melek D. Yucel
2006/248 ( PDF )
Disguising tori and elliptic curves
Steven D. Galbraith
2006/247 ( -- withdrawn -- )
Factoring Class Polynomials over the Genus Field
Marcel Martin
2006/246 ( PS PS.GZ PDF )
Jaroslav HRUBY
2006/245 ( PDF )
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
K. Phani Kumar and G. Shailaja and Ashutosh Saxena
2006/244 ( PS PS.GZ PDF )
Length-based cryptanalysis: The case of Thompson's Group
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
2006/243 ( PDF )
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Tae Hyun Kim and Tsuyoshi Takagi and Dong-Guk Han and Ho Won Kim and Jongin Lim
2006/242 ( PDF )
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
Haina Zhang , Shaohui Wang, Xiaoyun Wang
2006/241 ( PS PS.GZ PDF )
A Stronger Definition for Anonymous Electronic Cash
Marten Trolin
2006/240 ( PS PS.GZ PDF )
Computing Zeta Functions of Nondegenerate Curves
W. Castryck and J. Denef and F. Vercauteren
2006/239 ( PDF )
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
Yi Deng and Dongdai Lin
2006/238 ( -- withdrawn -- )
Searchable Index Schemes for Groups : Security vs. Efficiency
Hyun-A Park, Yu Jeong Lee, and Dong Hoon Lee
2006/237 ( PDF )
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Claire Whelan and Mike Scott
2006/236 ( PS PS.GZ PDF )
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
2006/235 ( PS PS.GZ PDF )
Application of ECM to a Class of RSA keys
Abderrahmane Nitaj
2006/234 ( PDF )
RFID Security: Tradeoffs between Security and Efficiency
Ivan Damg{\aa}rd and Michael {\O}stergaard
2006/233 ( PS PS.GZ PDF )
A simple generalization of El-Gamal cryptosystem to non-abelian groups
Ayan Mahalanobis
2006/232 ( PDF )
Improvement to AKS algorithm
Roman Popovych
2006/231 ( PS PS.GZ PDF )
A handy multi-coupon system
Sebastien Canard and Aline Gouget and Emeline Hufschmitt
2006/230 ( PDF )
Another Look at Generic Groups
Neal Koblitz and Alfred Menezes
2006/229 ( PDF )
Another Look at "Provable Security". II
Neal Koblitz and Alfred Menezes
2006/228 ( PS PS.GZ PDF )
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
Mihir Bellare and Amit Sahai
2006/227 ( PS PS.GZ PDF )
An Elliptic Curve Processor Suitable For RFID-Tags
L. Batina and J. Guajardo and T. Kerins and N. Mentens and P. Tuyls and I. Verbauwhede
2006/226 ( PDF )
The Fairness of Perfect Concurrent Signatures
Guilin Wang, Feng Bao, and Jianying Zhou
2006/225 ( PS PS.GZ PDF )
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
2006/224 ( PS PS.GZ PDF )
Generalizations of the Karatsuba Algorithm for Efficient Implementations
Andr\'{e} Weimerskirch and Christof Paar
2006/223 ( PDF )
What Hashes Make RSA-OAEP Secure?
Daniel R. L. Brown
2006/222 ( PS PS.GZ )
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
R. Overbeck
2006/221 ( PS PS.GZ PDF )
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
Phillip Rogaway and Thomas Shrimpton
2006/220 ( PDF )
Multi-Dimensional Montgomery Ladders for Elliptic Curves
Daniel R. L. Brown
2006/219 ( PS PS.GZ PDF )
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kai Tsay
2006/218 ( PS PS.GZ PDF )
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
2006/217 ( PS PS.GZ PDF )
Statistical Analysis of the MARS Block Cipher
Andrey Pestunov
2006/216 ( PDF )
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
Meloni Nicolas
2006/215 ( PDF )
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
Shujun Li and Chengqing Li and Kowk-Tung Lo and Guanrong Chen
2006/214 ( PDF )
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String
Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2006/213 ( PS PS.GZ PDF )
Luby-Rackoff Ciphers from Weak Round Functions?
Ueli Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj{\"o}din
2006/212 ( PDF )
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Kemal BICAKCI and Bruno Crispo and Andrew S. Tanenbaum
2006/211 ( PS PS.GZ PDF )
A Survey of Certificateless Encryption Schemes and Security Models
Alexander W. Dent
2006/210 ( PDF )
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky
2006/209 ( PS PS.GZ PDF )
Minimal Weight and Colexicographically Minimal Integer Representations
Clemens Heuberger and James A. Muir
2006/208 ( PS PS.GZ PDF )
Private Information Retrieval Using Trusted Hardware
Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao
2006/207 ( PDF )
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
Javier Herranz and Dennis Hofheinz and Eike Kiltz
2006/206 ( PS PS.GZ PDF )
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang
2006/205 ( -- withdrawn -- )
ID-Based Ring Signature Scheme secure in the Standard Model
Man Ho Au and Joseph K. Liu and Y. H. Yuen and Duncan S. Wong
2006/204 ( PS PS.GZ )
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
Pradeep Kumar Mishra and Pinakpani Pal and Palash Sarkar.
2006/203 ( PS PS.GZ PDF )
Generalization of the Selective-ID Security Model for HIBE Protocols
Sanjit Chatterjee and Palash Sarkar
2006/202 ( PS PS.GZ PDF )
Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
Ryuichi Harasawa, Yutaka Sueyoshi, and Aichi Kudo
2006/201 ( PS PS.GZ PDF )
Efficient Tate Pairing Computation Using Double-Base Chains
Chang'an Zhao and Fangguo Zhang and Jiwu Huang
2006/200 ( PDF )
Improvement of recently proposed Remote User Authentication Schemes
Guanfei Fang and Genxun huang
2006/199 ( PS PS.GZ PDF )
Identity-based Key Agreement Protocols From Pairings
L. Chen and Z. Cheng and N.P. Smart
2006/198 ( PDF )
Cryptographically Private Support Vector Machines
Sven Laur and Helger Lipmaa and Taneli Mielikäinen
2006/197 ( PDF )
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
Marc P.C. Fossorier and Miodrag J. Mihaljevic and Hideki Imai and Yang Cui and Kanta Matsuura
2006/196 ( PDF )
On ZK-Crypt, Book Stack, and Statistical Tests
S.~Doroshenko \and A.~Fionov \and A.~Lubkin \and V.~Monarev \and B.~Ryabko
2006/195 ( PS PS.GZ PDF )
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto
2006/194 ( -- withdrawn -- )
Self-Generated-Certificate Public Key Cryptosystem
Joseph K. Liu and Man Ho Au
2006/193 ( PDF )
(Hierarchical Identity-Based) Threshold Ring Signatures
Victor K. Wei and Tsz Hon Yuen
2006/192 ( PDF )
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Osman Kocar
2006/191 ( PDF )
Sahadeo Padhye
2006/190 ( PS PS.GZ PDF )
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
Berry Schoenmakers and Andrey Sidorenko
2006/189 ( PDF )
Unconditionally secure chaffing and winnowing with short authentication tags
D. R. Stinson
2006/188 ( PS PS.GZ PDF )
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Tetsu Iwata
2006/187 ( PS PS.GZ PDF )
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong
2006/186 ( PDF )
Deterministic and Efficiently Searchable Encryption
Mihir Bellare and Alexandra Boldyreva and Adam O'Neill
2006/185 ( PS PS.GZ PDF )
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
Minh-Huyen Nguyen and Shien Jin Ong and Salil Vadhan
2006/184 ( PS PS.GZ PDF )
On Signatures of Knowledge
Melissa Chase and Anna Lysyanskaya
2006/183 ( PDF )
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
Claude Cr\'epeau and George Savvides and Christian Schaffner and J\"urg Wullschleger
2006/182 ( PS PS.GZ PDF )
On the Limits of Point Function Obfuscation
Arvind Narayanan and Vitaly Shmatikov
2006/181 ( PS PS.GZ PDF )
There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
Sel\c{c}uk Kavut and Subhamoy Maitra and Melek D. Y{\"u}cel
2006/180 ( PDF )
Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
Dmitry Khovratovich
2006/179 ( PDF )
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
Chang Shu and Soonhak Kwon and Kris Gaj
2006/178 ( PS PS.GZ PDF )
A New Cryptosystem Based On Hidden Order Groups
Amitabh Saxena and Ben Soh
2006/177 ( PS PS.GZ PDF )
On the (Im-)Possibility of Extending Coin Toss
Dennis Hofheinz and Joern Mueller-Quade and Dominique Unruh
2006/176 ( PDF )
Counting points on elliptic curves in medium characteristic
Antoine Joux and Reynald Lercier
2006/175 ( PS PS.GZ PDF )
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
Moni Naor and Gil Segev and Adam Smith
2006/174 ( -- withdrawn -- )
Frobenius expansion and the Diffie Hellman problem
V. R. Sule
2006/173 ( PS PS.GZ PDF )
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
Le Trieu Phong and Ogata Wakaha
2006/172 ( PS PS.GZ PDF )
On Computing Products of Pairings
R Granger and N.P. Smart
2006/171 ( PS PS.GZ PDF )
Key confirmation and adaptive corruptions in the protocol security logic
Prateek Gupta and Vitaly Shmatikov
2006/170 ( PDF )
Visual Cryptography Schemes with Optimal Pixel Expansion
Carlo Blundo and Stelvio Cimato and Alfredo De Santis
2006/169 ( PDF )
Simplified pairing computation and security implications
Steven D. Galbraith and Colm O hEigeartaigh and Caroline Sheedy
2006/168 ( PS PS.GZ PDF )
How Fast can be Algebraic Attacks on Block Ciphers ?
Nicolas T. Courtois
2006/167 ( PS PS.GZ PDF )
Towards Trustworthy e-Voting using Paper Receipts
Yunho Lee and Kwangwoo Lee and Seungjoo Kim and Dongho Won
2006/166 ( PDF )
General Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
2006/165 ( PS PS.GZ PDF )
Pairings for Cryptographers
S.D. Galbraith and K.G. Paterson and N.P. Smart
2006/164 ( PDF )
Classification of Signature-only Signature Models
Zhengjun Cao
2006/163 ( PDF )
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
Gregory V. Bard
2006/162 ( PS PS.GZ )
A Summary of McEliece-Type Cryptosystems and their Security
D. Engelbert, R. Overbeck and A. Schmidt
2006/161 ( PDF )
Cryptanalysis of 4-Pass HAVAL
Zhangyi Wang and Huanguo Zhang and Zhongping Qin and Qingshu Meng
2006/160 ( -- withdrawn -- )
A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
L. Chen and Z. Cheng and N.P. Smart
2006/159 ( -- withdrawn -- )
Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
Joonsang Baek and Guilin Wang
2006/158 ( PDF )
An Efficient ID-based Proxy Signature Scheme from Pairings
Chunxiang Gu and Yuefei Zhu
2006/157 ( PS PS.GZ PDF )
An efficient way to access an array at a secret index
Timothy Atkinson and Marius C. Silaghi
2006/156 ( PS PS.GZ PDF )
The Hardness of the DHK Problem in the Generic Group Model
Alexander W. Dent
2006/155 ( PS PS.GZ )
Independent Zero-Knowledge Sets
Rosario Gennaro and Silvio Micali
2006/154 ( PS PS.GZ PDF )
New Public Key Authentication Frameworks with Lite Certification Authority
Xiaolei Dong and Licheng Wang and Zhenfu Cao
2006/153 ( PS PS.GZ PDF )
On the Relationships Between Notions of Simulation-Based Security
Anupam Datta and Ralf Kuesters and John C. Mitchell and Ajith Ramanathan
2006/152 ( PDF )
Pairing based Mutual Authentication Scheme Using Smart Cards
G. Shailaja and K. Phani Kumar and Ashutosh Saxena
2006/151 ( PS PS.GZ PDF )
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Ralf Kuesters
2006/150 ( PDF )
Demonstrating data possession and uncheatable data transfer
D\'ecio Luiz Gazzoni Filho and Paulo S\'ergio Licciardi Messeder Barreto
2006/149 ( PDF )
A method of construction of balanced functions with optimum algebraic immunity
C. Carlet
2006/148 ( PS PS.GZ PDF )
Computational Indistinguishability between Quantum States and Its Cryptographic Application
Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami
2006/147 ( PDF )
New Integrated proof Method on Iterated Hash Structure and New Structures
Duo Lei
2006/146 ( PS PS.GZ PDF )
Completeness of Formal Hashes in the Standard Model
Flavio D. Garcia and Peter van Rossum
2006/145 ( PS PS.GZ PDF )
Alexander Rostovtsev and Anton Stolbunov
2006/144 ( PDF )
Implementing Cryptographic Pairings on Smartcards
Michael Scott and Neil Costigan and Wesam Abdulwahab
2006/143 ( PDF )
Blinded Fault Resistant Exponentiation
Guillaume Fumaroli and David Vigilant
2006/142 ( PS PS.GZ PDF )
Rational Secret Sharing, Revisited
S. Dov Gordon and Jonathan Katz
2006/141 ( PDF )
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
Shahram Khazaei and Mahdi M. Hasanzadeh and Mohammad S. Kiaei
2006/140 ( PS PS.GZ PDF )
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
Jiejun Kong
2006/139 ( PS PS.GZ PDF )
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
Francois-Xavier Standaert and Tal G. Malkin and Moti Yung
2006/138 ( PDF )
Trace-Driven Cache Attacks on AES
Onur Ac\i{}i\c{c}mez and \c{C}etin Kaya Ko\c{c}
2006/137 ( PDF )
Defining Strong Privacy for RFID
Ari Juels and Stephen A. Weis
2006/136 ( PDF )
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
Gregory V. Bard
2006/135 ( PDF )
The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction
Duo Lei, Da Lin2, Li Chao, Keqin Feng, and Longjiang Qu
2006/134 ( PDF )
Identity Based Strong Designated Verifier Signature Scheme
K. Phani Kumar and G. Shailaja and Ashutosh Saxena
2006/133 ( PDF )
Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
Francisco Rodr\'{i}guez-Henr\'{i}quez and Guillermo Morales-Luna and Julio L\'{o}pez-Hern\'{a}ndez
2006/132 ( PDF )
Conditional Reactive Simulatability
Michael Backes and Markus Duermuth and Dennis Hofheinz and Ralf Kuesters
2006/131 ( PS PS.GZ PDF )
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
Mike Burmester and Tri van Le and Breno de Medeiros
2006/130 ( PS PS.GZ )
Simulatable Security and Polynomially Bounded Concurrent Composition
Dennis Hofheinz and Dominique Unruh
2006/129 ( PDF )
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
Wei Han and Dong Zheng and Ke-fei Chen
2006/128 ( PDF )
On the existence of distortion maps on ordinary elliptic curves
Denis Charles
2006/127 ( PS PS.GZ PDF )
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
Sourav Mukhopadhyay and Palash Sarkar
2006/126 ( PDF )
ECGSC: Elliptic Curve based Generalized Signcryption Scheme
Yiliang Han and Xiaoyuan Yang
2006/125 ( PDF )
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
Eunjeong Lee and Hyang-Sook Lee and Yoonjin Lee
2006/124 ( PDF )
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
K.W. Wong and Edward C.W. Lee and L.M. Cheng and Xiaofeng Liao
2006/123 ( PDF )
Designated Confirmer Signatures Revisited
Douglas Wikström
2006/122 ( PDF )
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
2006/121 ( PS PS.GZ PDF )
Counting Prime Numbers with Short Binary Signed Representation
Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna
2006/120 ( PDF )
Key Privacy for Identity Based Encryption
Jason E. Holt
2006/119 ( -- withdrawn -- )
Repairing Attacks on a Password-Based Group Key Agreement
Ratna Dutta and Rana Barua
2006/118 ( PS PS.GZ PDF )
On construction of non-normal Boolean functions
Sugata Gangopadhyay and Deepmala Sharma
2006/117 ( PDF )
Conjectured Security of the ANSI-NIST Elliptic Curve RNG
Daniel R. L. Brown
2006/116 ( PDF )
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
Mario Lamberger and Norbert Pramstaller and Vincent Rijmen
2006/115 ( PDF )
Fast exponentiation via prime finite field isomorphism
Alexander Rostovtsev
2006/114 ( PS PS.GZ PDF )
Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
2006/113 ( PDF )
A New Construction of Time Capsule Signature
Miaomiao Zhang and Gongliang Chen and Jianhua Li and Licheng Wang and Haifeng Qian
2006/112 ( PS PS.GZ )
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
Markus Volkmer
2006/111 ( PS PS.GZ PDF )
Attacking LCCC Batch Verification of RSA Signatures
Martin Stanek
2006/110 ( PS PS.GZ PDF )
The Eta Pairing Revisited
F. Hess and N.P. Smart and F. Vercauteren
2006/109 ( PS PS.GZ PDF )
A Simpler Sieving Device: Combining ECM and TWIRL
Willi Geiselmann and Fabian Januszewski and Hubert Koepfer and Jan Pelzl and Rainer Steinwandt
2006/108 ( PDF )
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Chunxiang Gu and Yuefei Zhu and Yajuan Zhang
2006/107 ( PDF )
The number field sieve for integers of low weight
Oliver Schirokauer
2006/106 ( PS PS.GZ PDF )
Further Refinement of Pairing Computation Based on Miller's Algorithm
Chao-Liang Liu and Gwoboa Horng and Te-Yu Chen
2006/105 ( PDF )
Tunnels in Hash Functions: MD5 Collisions Within a Minute
Vlastimil Klima
2006/104 ( PDF )
Fast Collision Attack on MD5
Marc Stevens
2006/103 ( PS PS.GZ PDF )
Security of VSH in the Real World
Markku-Juhani O. Saarinen
2006/102 ( PS PS.GZ PDF )
Efficient Blind and Partially Blind Signatures Without Random Oracles
Tatsuaki Okamoto
2006/101 ( PS PS.GZ PDF )
Information-theoretic analysis of coating PUFs
B. Skoric and S. Maubach and T. Kevenaar and P. Tuyls
2006/100 ( PDF )
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
Zhou Sujing, Lin Dongdai
2006/099 ( PDF )
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
Dongvu Tonien and Reihaneh Safavi-Naini
2006/098 ( PS PS.GZ PDF )
Gr\"obner Basis Based Cryptanalysis of SHA-1
Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
2006/097 ( PDF )
A Cryptographic Tour of the IPsec Standards
Kenneth G. Paterson
2006/096 ( PDF )
Sequential Aggregate Signatures and Multisignatures without Random Oracles
Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters
2006/095 ( PDF )
MAC Reforgeability
John Black and Martin Cochran
2006/094 ( PS PS.GZ PDF )
Cryptanalysis of the MEM Mode of Operation
Peng Wang and Dengguo Feng and Wenling Wu
2006/093 ( PS PS.GZ PDF )
RSA and a higher degree diophantine equation
Abderrahmane Nitaj
2006/092 ( PS PS.GZ PDF )
Cryptanalysis of RSA with constrained keys
Abderrahmane Nitaj
2006/091 ( PS PS.GZ PDF )
The Complexity of Online Memory Checking
Moni Naor and Guy Rothblum
2006/090 ( PDF )
Secure Sketch for Multi-Sets
Ee-Chien Chang and Vadym Fedyukovych and Qiming Li
2006/089 ( PS PS.GZ PDF )
A Tree-based Model of Unicast Stream Authentication
Goce Jakimoski and Yvo Desmedt
2006/088 ( PDF )
On the Feasibility of Consistent Computations
Sven Laur and Helger Lipmaa
2006/087 ( PDF )
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
Barath Raghavan and Saurabh Panjwani and Anton Mityagin
2006/086 ( PDF )
Analysis of the Linux Random Number Generator
Zvi Gutterman and Benny Pinkas and Tzachy Reinman
2006/085 ( PS PS.GZ PDF )
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Xavier Boyen and Brent Waters
2006/084 ( PS PS.GZ PDF )
Cryptography from Anonymity
Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2006/083 ( PDF )
Browsers Defenses Against Phishing, Spoofing and Malware
Amir Herzberg
2006/082 ( PS PS.GZ PDF )
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
HariGovind V. Ramasamy and Christian Cachin
2006/081 ( PS PS.GZ )
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
David Molnar and Tadayoshi Kohno and Naveen Sastry and David Wagner
2006/080 ( PDF )
Efficient Identity-based Signatures Secure in the Standard Model
Kenneth G. Paterson and Jacob C. N. Schuldt
2006/079 ( PS PS.GZ PDF )
Towards Provably Secure Group Key Agreement Building on Group Theory
Jens-Matthias Bohli and Benjamin Glas and Rainer Steinwandt
2006/078 ( PDF )
Verifiable Random Permutations
Yevgeniy Dodis and Prashant Puniya
2006/077 ( PDF )
On Secret Sharing Schemes, Matroids and Polymatroids
Jaume Marti-Farre and Carles Padro
2006/076 ( -- withdrawn -- )
A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
Amitabh Saxena and Ben Soh
2006/075 ( PS PS.GZ PDF )
2006/074 ( PDF )
How to Construct Sufficient Condition in Searching Collisions of MD5
Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta
2006/073 ( PS PS.GZ PDF )
Stronger Security of Authenticated Key Exchange
Brian LaMacchia and Kristin Lauter and Anton Mityagin
2006/072 ( PDF )
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
Yaniv Shaked and Avishai Wool
2006/071 ( PS PS.GZ PDF )
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
Ueli Maurer and Johan Sjödin
2006/070 ( PDF )
The experimental distinguishing attack on RC4
Sergey Doroshenko and Boris Ryabko
2006/069 ( PS PS.GZ PDF )
Automated Security Proofs with Sequences of Games
Bruno Blanchet and David Pointcheval
2006/068 ( PDF )
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Michael Backes and Birgit Pfitzmann and Michael Waidner
2006/067 ( PS PS.GZ PDF )
Scalar Multiplication on Koblitz Curves using Double Bases
Roberto Avanzi and Francesco Sica
2006/066 ( PS PS.GZ PDF )
Simple and Flexible Private Revocation Checking
John Solis and Gene Tsudik
2006/065 ( PS PS.GZ PDF )
On Expected Constant-Round Protocols for Byzantine Agreement
Jonathan Katz and Chiu-Yuen Koo
2006/064 ( PS PS.GZ PDF )
Perturbing and Protecting a Traceable Block Cipher
Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
2006/063 ( PS PS.GZ PDF )
Provably Secure Universal Steganographic Systems
Boris Ryabko and Daniil Ryabko
2006/062 ( -- withdrawn -- )
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
Debrup Chakraborty and Palash Sarkar
2006/061 ( -- withdrawn -- )
Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan
2006/060 ( -- withdrawn -- )
An Efficient ID-based Signature Scheme from Pairings
Chunxiang Gu and Yuefei Zhu and Xiaoyu Pan
2006/059 ( PS PS.GZ PDF )
High Security Pairing-Based Cryptography Revisited
R. Granger and D. Page and N.P. Smart
2006/058 ( PDF )
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò
2006/057 ( PS PS.GZ PDF )
Key Exchange Using Passwords and Long Keys
Vladimir Kolesnikov and Charles Rackoff
2006/056 ( PDF )
Key Exchange Protocols: Security Definition, Proof Method and Applications
Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi
2006/055 ( PDF )
Multicollision Attacks on some Generalized Sequential Hash Functions
M. Nandi and D. R. Stinson
2006/054 ( PDF )
How to Build a Low-Cost, Extended-Range RFID Skimmer
Ilan Kirschenbaum and Avishai Wool
2006/053 ( PS PS.GZ PDF )
Cryptanalysis of the CFVZ cryptosystem
J. J. Climent and E. Gorla and J. Rosenthal
2006/052 ( PS PS.GZ PDF )
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert
2006/051 ( PDF )
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
2006/050 ( PDF )
Secure Device Pairing based on a Visual Channel
Nitesh Saxena and Jan-Erik Ekberg and Kari Kostiainen and N. Asokan
2006/049 ( PS PS.GZ )
Crossword Puzzle Attack on NLS
Joo Yeon Cho and Josef Pieprzyk
2006/048 ( PS PS.GZ PDF )
New Results on Multipartite Access Structures
Javier Herranz and German Saez
2006/047 ( PDF )
Cryptographically Sound Theorem Proving
Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner
2006/046 ( PS PS.GZ PDF )
Efficient Primitives from Exponentiation in Zp
Shaoquan Jiang
2006/045 ( PDF )
Fully Collusion Resistant Traitor Tracing
Dan Boneh and Amit Sahai and Brent Waters
2006/044 ( PS PS.GZ PDF )
Linear Integer Secret Sharing and Distributed Exponentiation
Ivan Damgard and Rune Thorbek
2006/043 ( PDF )
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
Mihir Bellare
2006/042 ( PDF )
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Sourav Mukhopadhyay and Palash Sarkar
2006/041 ( PS PS.GZ PDF )
Reactively Simulatable Certified Mail
Birgit Pfitzmann and Matthias Schunter and Michael Waidner
2006/040 ( PDF )
Linkable Democratic Group Signatures
Mark Manulis and Ahmad-Reza Sadeghi and Joerg Schwenk
2006/039 ( PDF )
Two-Round AES Differentials
Joan Daemen and Vincent Rijmen
2006/038 ( PDF )
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
Jintai Ding and Jason E. Gower and Dieter S. Schmidt
2006/037 ( PS PS.GZ PDF )
Message Authentication on 64-bit Architectures
Ted Krovetz
2006/036 ( PDF )
Vector Stream Cipher Instant Key Recovery
Sean O'Neil
2006/035 ( PDF )
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Nazar A. Saqib and Nareli Cruz-Cortés
2006/034 ( PDF )
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
Eike Kiltz and David Galindo
2006/033 ( PDF )
Arithmetic of Generalized Jacobians
Isabelle Déchène
2006/032 ( PS PS.GZ PDF )
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Deepak Kumar Dalai and Subhamoy Maitra
2006/031 ( PS PS.GZ PDF )
On a Variation of Kurosawa-Desmedt Encryption Scheme
Le Trieu Phong and Wakaha Ogata
2006/030 ( PDF )
Improved cryptanalysis of Py
Paul Crowley
2006/029 ( PS PS.GZ PDF )
Authenticated Hybrid Encryption for Multiple Recipients
Stéphanie Alt
2006/028 ( PDF )
Cryptanalysis of recently proposed Remote User Authentication Schemes
Thulasi Goriparthi, Manik Lal Das, Atul Negi and Ashutosh Saxena
2006/027 ( PS PS.GZ PDF )
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Vladimir Bayev
2006/026 ( PDF )
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
David Freeman
2006/025 ( PDF )
Signatures for Network Coding
Denis Charles and Kamal Jain and Kristin Lauter
2006/024 ( PDF )
Improving the Decoding Efficiency of Private Search
George Danezis and Claudia Diaz
2006/023 ( PS PS.GZ PDF )
A Method to Implement Direct Anonymous Attestation
2006/021 ( PDF )
Cryptographic hash functions from expander graphs
Denis Charles and Eyal Goren and Kristin Lauter
2006/020 ( PS PS.GZ PDF )
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
Adam Smith
2006/019 ( PDF )
Hermes8 : A Low-Complexity Low-Power Stream Cipher
Ulrich Kaiser
2006/018 ( PS PS.GZ PDF )
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra
2006/017 ( PS PS.GZ PDF )
Threshold and Proactive Pseudo-Random Permutations
Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung
2006/016 ( PDF )
Message Modification for Step 21-23 on SHA-0
Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta
2006/015 ( PS PS.GZ )
A Family of Dunces: Trivial RFID Identification and Authentication Protocols
Gene Tsudik
2006/014 ( PS PS.GZ PDF )
Sound Computational Interpretation of Symbolic Hashes in the Standard Model
Flavio D. Garcia and Peter van Rossum
2006/013 ( PDF )
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
Hung-Yu Chien
2006/012 ( PS PS.GZ PDF )
Certificate-Based Encryption Without Random Oracles
Paz Morillo and Carla R`{a}fols
2006/011 ( PDF )
Formal Proof for the Correctness of RSA-PSS
Christina Lindenberg and Kai Wirt and Johannes Buchmann
2006/010 ( PDF )
Finding Characteristic Polynomials with Jump Indices
Steve Babbage and Matthew Dodd
2006/009 ( PS PS.GZ PDF )
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kay Tsay and Christopher Walstad
2006/008 ( PS PS.GZ PDF )
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
James A. Muir
2006/007 ( PDF )
Further Discussions on the Security of a Nominative Signature Scheme
Lifeng Guo and Guilin Wang and Duncan S. Wong
2006/006 ( PDF )
Group Key Agreement for Ad Hoc Networks
Lijun Liao
2006/005 ( PDF )
Pairing Calculation on Supersingular Genus 2 Curves
Colm O hEigeartaigh and Michael Scott
2006/004 ( PDF )
Provably Secure Subsitution of Cryptographic Tools
Lea Kissner and David Molnar
2006/003 ( PDF )
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Dragos Trinca
2006/002 ( PDF )
Geometric constructions of optimal linear perfect hash families
S.G. Barwick and W.-A. Jackson.
2006/001 ( PS PS.GZ PDF )
Homomorphic Cryptosystems and their Applications
Doerte K. Rappe

[ Cryptology ePrint archive ]