Cryptology ePrint Archive: Listing for 2006
-
2006/486 ( PDF )
- Inductive Trace Properties for Computational Security
- Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
-
2006/485 ( PDF )
- Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
- Hidenori Kuwakado and Masakatu Morii
-
2006/484 ( -- withdrawn -- )
- A New Identity Based Encryption Scheme From Pairing
- Xianhui Lu , Dake He, Guomin Li
-
2006/483 ( PS PS.GZ PDF )
- New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
- Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
-
2006/482 ( PS PS.GZ PDF )
- Countermeasures for the Simple Branch Prediction Analysis
- Giovanni Agosta and Gerardo Pelosi
-
2006/481 ( PS PS.GZ PDF )
- A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
- Donghoon Chang
-
2006/480 ( PDF )
- Cryptanalysis of REESSE1+ Public Key Cryptosystem
- Shengli Liu and Fangguo Zhang
-
2006/479 ( PS PS.GZ PDF )
- Efficient Provably-Secure Hierarchical Key Assignment Schemes
- Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
-
2006/478 ( PS PS.GZ PDF )
- Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
- Donghoon Chang
-
2006/477 ( PS PS.GZ PDF )
- Dynamic Cryptographic Hash Functions
- William R. Speirs II and Samuel S. Wagstaff, Jr.
-
2006/476 ( PS PS.GZ PDF )
- Password-Authenticated Multi-Party Key Exchange with Different Passwords
- Jeong Ok Kwon and Ik Rae Jeong and Kouichi Sakurai and Dong Hoon Lee
-
2006/475 ( PS PS.GZ PDF )
- New Technique for Solving Sparse Equation Systems
- Håvard Raddum and Igor Semaev
-
2006/474 ( PDF )
- Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
- Chang-An Zhao and Fangguo Zhang and Jiwu Huang
-
2006/473 ( PDF )
- Identity-Based Proxy Re-encryption
- Matthew Green and Giuseppe Ateniese
-
2006/472 ( PS PS.GZ PDF )
- A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
- Luis Teixeira d'Aguiar Norton Brandao
-
2006/471 ( PDF )
- Multiplication and Squaring on Pairing-Friendly Fields
- Augusto Jun Devegili and Colm \'O~h\'Eigeartaigh and Michael Scott and Ricardo Dahab
-
2006/470 ( PS PS.GZ PDF )
- On the security of a group key agreement protocol
- Qiang Tang
-
2006/469 ( PS PS.GZ PDF )
- An Attack on Disguised Elliptic Curves
- David Mireles
-
2006/468 ( PDF )
- White Box Cryptography: Another Attempt
- Julien Bringer and Herve Chabanne and Emmanuelle Dottax
-
2006/467 ( PS PS.GZ PDF )
- Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
- Donghoon Chang and Moti Yung
-
2006/466 ( PDF )
- Prime Order Primitive Subgroups in Torus-Based Cryptography
- Jason E. Gower
-
2006/465 ( PS PS.GZ )
- Security and Composition of Cryptographic Protocols: A Tutorial
- Ran Canetti
-
2006/464 ( PDF )
- Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
- Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik
-
2006/463 ( PS PS.GZ PDF )
- Obfuscation for Cryptographic Purposes
- Dennis Hofheinz and John Malone-Lee and Martijn Stam
-
2006/462 ( PDF )
- Improved Collision and Preimage Resistance Bounds on PGV Schemes
- Lei Duo and Chao Li
-
2006/461 ( PS PS.GZ )
- On Post-Modern Cryptography
- Oded Goldreich
-
2006/460 ( PS PS.GZ PDF )
- Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
- Donghoon Chang
-
2006/459 ( PDF )
- Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
- Claude Carlet
-
2006/458 ( PS PS.GZ PDF )
- Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
- Aggelos Kiayias and Moti Yung
-
2006/457 ( PDF )
- Linear Approximating to Integer Addition
- Li An-Ping
-
2006/456 ( PDF )
- Indistinguishability Amplification
- Ueli Maurer and Krzysztof Pietrzak and Renato Renner
-
2006/455 ( PS PS.GZ PDF )
- On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
- Jonathan Katz
-
2006/454 ( PS PS.GZ PDF )
- How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
- Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich
-
2006/453 ( PDF )
- Key Replacement Attack on a Certificateless Signature Scheme
- Zhenfeng Zhang and Dengguo Feng
-
2006/452 ( PDF )
- Hybrid Protocol For Password-based Key Exchange in Three-party Setting
- TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
-
2006/451 ( PDF )
- Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
- Jongsung Kim
-
2006/450 ( PS PS.GZ PDF )
- Secure Cryptographic Workflow in the Standard Model
- M. Barbosa and P. Farshim
-
2006/449 ( PS PS.GZ PDF )
- Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
- Mihir Bellare and Phillip Rogaway
-
2006/448 ( PS PS.GZ PDF )
- Universally Composable and Forward Secure RFID Authentication and Key Exchange
- Tri van Le, Mike Burmester, Breno de Medeiros
-
2006/447 ( PS PS.GZ )
- Towards a Separation of Semantic and CCA Security for Public Key Encryption
- Yael Gertner and Tal Malkin and Steven Myers
-
2006/446 ( PS PS.GZ PDF )
- New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
- Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo
-
2006/445 ( PS PS.GZ PDF )
- A class of quadratic APN binomials inequivalent to power functions
- Lilya Budaghyan and Claude Carlet and Gregor Leander
-
2006/444 ( PS PS.GZ PDF )
- Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
- Chris Peikert and Alon Rosen
-
2006/443 ( PS PS.GZ PDF )
- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
- Yvo Desmedt and Tanja Lange and Mike Burmester
-
2006/442 ( PDF )
- An attack on the certificateless signature scheme from EUC Workshops 2006
- Je Hong Park
-
2006/441 ( PS PS.GZ PDF )
- General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
- Donghoon Chang, Mridul Nandi
-
2006/440 ( PDF )
- A New Type of Group Signature Scheme
- Jun Zhong Dake He
-
2006/439 ( PDF )
- A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
- Jun Zhong Dake He
-
2006/438 ( PS PS.GZ PDF )
- On the pseudo-random generator ISAAC
- Jean-Philippe Aumasson
-
2006/437 ( PS PS.GZ PDF )
- On Zigzag Functions and Related Objects in New Metric
- An Braeken, Ventzislav Nikov, Svetla Nikova
-
2006/436 ( PS PS.GZ )
- Statistically-Hiding Commitment from Any One-Way Function
- Iftach Haitner and Omer Reingold
-
2006/435 ( PDF )
- Searching for Shapes in Cryptographic Protocols (extended version)
- Shaddin F. Doghmi and Joshua D. Guttman and F. Javier Thayer
-
2006/434 ( PS PS.GZ PDF )
- Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
- Deepak Kumar Dalai and Subhamoy Maitra
-
2006/433 ( PS PS.GZ PDF )
- Information Theoretic Bounds on Authentication Systems in Query Model
- Reihaneh Safavi-Naini and Peter Wild
-
2006/432 ( PS PS.GZ PDF )
- Universally Composable Security with Global Setup
- Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish
-
2006/431 ( PDF )
- Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
- Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2006/430 ( PDF )
- From Weak to Strong Watermarking
- Nicholas Hopper and David Molnar and David Wagner
-
2006/429 ( PDF )
- On a new invariant of Boolean functions
- Sugata Gangopadhyay and Deepmala Sharma
-
2006/428 ( PS PS.GZ PDF )
- Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
- Lilya Budaghyan and Claude Carlet and Gregor Leander
-
2006/427 ( PDF )
- Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
- Aya Comuta and Mitsuru Kawazoe and Tetsuya Takahashi
-
2006/426 ( -- withdrawn -- )
- The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
- Christophe Tartary and Huaxiong Wang
-
2006/425 ( -- withdrawn -- )
- A protocol
- anoymous
-
2006/424 ( PDF )
- Security Analysis of Voice-over-IP Protocols
- Prateek Gupta and Vitaly Shmatikov
-
2006/423 ( PS PS.GZ PDF )
- Perfect NIZK with Adaptive Soundness
- Masayuki Abe and Serge Fehr
-
2006/422 ( PDF )
- Long-term Security and Universal Composability
- Joern Mueller-Quade and Dominique Unruh
-
2006/421 ( PDF )
- Universally Composable Three-Party Key Distribution
- Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
-
2006/420 ( PDF )
- The REESSE1+ Public Key Cryptosystem v 2.21
- Shenghui Su and Shuwang Lu
-
2006/419 ( PDF )
- Some New Hidden Ideal Cryptosystems
- Ilia Toli
-
2006/418 ( PDF )
- Analysis of Privacy-Preserving Element Reduction of Multiset
- Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon and Dowon Hong
-
2006/417 ( PS PS.GZ )
- The Recent Attack of Nie et al On TTM is Faulty
- T.Moh
-
2006/416 ( PS PS.GZ PDF )
- Authenticated Interleaved Encryption \\
- Claude Castelluccia
-
2006/415 ( PS PS.GZ PDF )
- On the Minimal Embedding Field
- Laura Hitt
-
2006/414 ( PS PS.GZ PDF )
- Zero Knowledge and Soundness are Symmetric
- Shien Jin Ong and Salil Vadhan
-
2006/413 ( PDF )
- Preimage Attack on Parallel FFT-Hashing
- Donghoon Chang
-
2006/412 ( PS PS.GZ PDF )
- Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
- Donghoon Chang
-
2006/411 ( PS PS.GZ PDF )
- Preimage Attack on Hashing with Polynomials proposed at ICISC'06
- Donghoon Chang
-
2006/410 ( PDF )
- Galois Field Commitment Scheme
- Alexandre Pinto and André Souto and Armando Matos and Luís Antunes
-
2006/409 ( PDF )
- A NEW MAC: LAMA
- Li An-Ping
-
2006/408 ( PS PS.GZ PDF )
- A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
- Goichiro Hanaoka and Hideki Imai
-
2006/407 ( PS PS.GZ PDF )
- Cryptography in the Multi-string Model
- Jens Groth and Rafail Ostrovsky
-
2006/406 ( PDF )
- Redundancy of the Wang-Yu Sufficient Conditions
- Yuto Nakano and Hidenori Kuwakado and Masakatu Morii
-
2006/405 ( PS PS.GZ PDF )
- Universally Composable Blind Signatures in the Plain Model
- Aslak Bakke Buan and Kristian Gj\o steen and Lillian Kr\aa kmo
-
2006/404 ( PDF )
- Faugere's F5 Algorithm Revisited
- Till Stegers
-
2006/403 ( PS PS.GZ PDF )
- Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
- Willi Geiselmann and Rainer Steinwandt
-
2006/402 ( PS PS.GZ PDF )
- Algebraic Cryptanalysis of the Data Encryption Standard
- Nicolas T. Courtois and Gregory V. Bard
-
2006/401 ( -- withdrawn -- )
- On the cost of cryptanalytic attacks
- Jean-Philippe Aumasson
-
2006/400 ( PDF )
- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
- Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai
-
2006/399 ( PDF )
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Mihir Bellare and Thomas Ristenpart
-
2006/398 ( PDF )
- The Layered Games Framework for Specifications and Analysis of Security Protocols
- Amir Herzberg and Igal Yoffe
-
2006/397 ( PS PS.GZ PDF )
- Revisiting the Efficiency of Malicious Two-Party Computation
- David P. Woodruff
-
2006/396 ( PDF )
- Security Protocols with Isotropic Channels
- Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan
-
2006/395 ( PDF )
- Security-Focused Survey on Group Key Exchange Protocols
- Mark Manulis
-
2006/394 ( PDF )
- Identity Based Strong Designated Verifier Proxy Signature Schemes
- Sunder Lal and Vandani Verma
-
2006/393 ( -- withdrawn -- )
- The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
- Sujing Zhou, Dongdai Lin
-
2006/392 ( PS PS.GZ PDF )
- The Tate Pairing via Elliptic Nets
- Katherine E. Stange
-
2006/391 ( PDF )
- A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
- Ronald Cramer and Dennis Hofheinz and Eike Kiltz
-
2006/390 ( -- withdrawn -- )
- Revisit of CS98
- Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
-
2006/389 ( PDF )
- Traceable Ring Signature
- Eiichiro Fujisaki and Koutarou Suzuki
-
2006/388 ( PDF )
- Survey on Security Requirements and Models for Group Key Exchange
- Mark Manulis
-
2006/387 ( PDF )
- A Note on the Security of NTRUSign
- Phong Q. Nguyen
-
2006/386 ( PS PS.GZ PDF )
- The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
- Mark Wooding
-
2006/385 ( PDF )
- On Security Models and Compilers for Group Key Exchange Protocols
- Emmanuel Bresson and Mark Manulis and Joerg Schwenk
-
2006/384 ( PDF )
- Design and Analysis of a Hash Ring-iterative Structure
- Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang
-
2006/383 ( PS PS.GZ PDF )
- Traitor tracing scheme with constant ciphertext rate against powerful pirates
- Thomas Sirvent
-
2006/382 ( PS PS.GZ PDF )
- Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
- E-yong Kim and Hwangnam Kim and Kunsoo Park
-
2006/381 ( PDF )
- Cryptanalysis on an Algorithm for Efficient Digital Signatures
- Fuw-Yi Yang
-
2006/380 ( PDF )
- On Security of Sovereign Joins
- Einar Mykletun and Gene Tsudik
-
2006/379 ( PDF )
- Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
- Matthew J. Campagna
-
2006/378 ( PS PS.GZ PDF )
- A New Key Exchange Primitive Based on the Triple Decomposition Problem
- YesemKurt
-
2006/377 ( PS PS.GZ PDF )
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
- James Birkett, Alexander W. Dent, Gregory Neven and Jacob Schuldt
-
2006/376 ( PDF )
- A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
- Vlastimil KLIMA
-
2006/375 ( PDF )
- Distortion maps for genus two curves
- Steven D. Galbraith and Jordi Pujol\`as and Christophe Ritzenthaler and Benjamin Smith
-
2006/374 ( PS PS.GZ PDF )
- Robust Final-Round Cache-Trace Attacks Against AES
- Joseph Bonneau
-
2006/373 ( PDF )
- Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
- Joseph K. Liu and Man Ho Au and Willy Susilo
-
2006/372 ( PDF )
- A taxonomy of pairing-friendly elliptic curves
- David Freeman and Michael Scott and Edlyn Teske
-
2006/371 ( PDF )
- Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
- Robert Ronan and Colm o hEigeartaigh and Colin Murphy and Tim Kerins and Paulo S. L. M. Barreto
-
2006/370 ( PS PS.GZ PDF )
- A DoS Attack Against the Integrity-Less ESP (IPSec)
- Ventzislav Nikov
-
2006/369 ( PDF )
- RadioGat\'un, a belt-and-mill hash function
- Guido Bertoni and Joan Daemen and Micha\"el Peeters and Gilles Van Assche
-
2006/368 ( PDF )
- Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
- Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
-
2006/367 ( PDF )
- An Attack on a Certificateless Signature Scheme
- Xuefei Cao and Kenneth G. Paterson and Weidong Kou
-
2006/366 ( PDF )
- A Latency-Free Election Scheme
- Kristian Gj\o steen
-
2006/365 ( -- withdrawn -- )
- Revisit of KD04
- Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
-
2006/364 ( PDF )
- Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
- Gregory V. Bard
-
2006/363 ( -- withdrawn -- )
- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
- Ventzislav Nikov and Svetla Nikova and Bart Preneel
-
2006/362 ( PS PS.GZ PDF )
- Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
- Palash Sarkar and Sanjit Chatterjee
-
2006/361 ( PS PS.GZ PDF )
- Generic Construction of (Identity-based) Perfect Concurrent Signatures
- Sherman S.M. Chow and Willy Susilo
-
2006/360 ( PDF )
- Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Marc Stevens and Arjen Lenstra and Benne de Weger
-
2006/359 ( PS PS.GZ )
- On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
- Mihir Bellare and Oded Goldreich
-
2006/358 ( PDF )
- Public Key Encryption with Keyword Search based on K-Resilient IBE
- Dalia Khader
-
2006/357 ( PDF )
- Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
- Su-Jeong Choi and Simon R. Blackburn and Peter R. Wild
-
2006/356 ( PS PS.GZ PDF )
- Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
- Emilia K\"{a}sper and Sven Laur and Helger Lipmaa
-
2006/355 ( PS PS.GZ PDF )
- Concurrent Non-Malleable Zero Knowledge
- Boaz Barak and Manoj Prabhakaran and Amit Sahai
-
2006/354 ( PDF )
- A new stream cipher: DICING
- Li An-Ping
-
2006/353 ( PDF )
- Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
- Zhenjie Huang and Kefei Chen and Yumin Wang
-
2006/352 ( PDF )
- Foundations of Secure E-Commerce: The Order Layer
- Amir Herzberg and Igal Yoffe
-
2006/351 ( PDF )
- On the Power of Simple Branch Prediction Analysis
- Onur Aciicmez and Cetin Kaya Koc and Jean-Pierre Seifert
-
2006/350 ( PDF )
- Impossible Differential Cryptanalysis of ARIA and Camellia
- Wenling Wu, Wentao Zhang, and Dengguo Feng
-
2006/349 ( PS PS.GZ PDF )
- A Note On Side-Channels Resulting From Dynamic Compilation
- D. Page
-
2006/348 ( PS PS.GZ PDF )
- Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
- Krzysztof Pietrzak
-
2006/347 ( PDF )
- Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
- Fumiyuki Momose and Jinhui Chao
-
2006/346 ( PDF )
- Generic Transformation to Strongly Unforgeable Signatures
- Qiong Huang and Duncan S. Wong and Yiming Zhao
-
2006/345 ( PS PS.GZ PDF )
- Private and Efficient Stable Marriages (Matching)
- Atkinson, T. and Bartak,R. and Silaghi,M.-C. and Tuleu,E. and Zanker,M.
-
2006/344 ( PDF )
- A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
- Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
-
2006/343 ( PS PS.GZ PDF )
- Verifiably Encrypted Signature Scheme with Threshold Adjudication
- M. Choudary Gorantla And Ashutosh Saxena
-
2006/342 ( PDF )
- A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
- Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
-
2006/341 ( PS PS.GZ PDF )
- MV3: A new word based stream cipher using rapid mixing and revolving buffers
- Nathan Keller and Stephen D. Miller and Ilya Mironov and Ramarathnam Venkatesan
-
2006/340 ( PDF )
- Cryptanalyses of Some Multimedia Encryption Schemes
- Chengqing Li
-
2006/339 ( -- withdrawn -- )
- A New family of Ideal Multipartite Access Structure Based on MSP
- Jun Xu and Jiwen Zeng and Xiaomin Zha
-
2006/338 ( PS PS.GZ PDF )
- Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
- Fagen Li, Yupu Hu, and Shuanggen Liu
-
2006/337 ( PDF )
- An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
- D.R. Stinson and J. Wu
-
2006/336 ( PDF )
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
- Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
-
2006/335 ( PDF )
- A ID-Based Deniable Authentication Protocol on pairings
- Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
-
2006/334 ( PDF )
- Colliding Message Pair for 53-Step HAS-160
- Florian Mendel
-
2006/333 ( PDF )
- Discrete Logarithms in Generalized Jacobians
- S. D. Galbraith and B. A. Smith
-
2006/332 ( PDF )
- Improved Efficiency for Private Stable Matching
- Matthew Franklin and Mark Gondree and Payman Mohassel
-
2006/331 ( PDF )
- On the Security of Generalized Jacobian Cryptosystems
- Isabelle Dechene
-
2006/330 ( PS PS.GZ PDF )
- Extended Double-Base Number System with applications to Elliptic Curve Cryptography
- Christophe Doche and Laurent Imbert
-
2006/329 ( PDF )
- Designated Verifier Signature Scheme Based on Braid Groups
- Shi-hua Zou and Ji-wen Zeng and Jun-jie Quan
-
2006/328 ( PDF )
- Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
- Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
-
2006/327 ( PDF )
- An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
- Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2006/326 ( PDF )
- Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
- Jonathan Katz and Adam Smith
-
2006/325 ( PS PS.GZ PDF )
- Invisible Designated Confirmer Signatures without Random Oracles
- Victor K. Wei
-
2006/324 ( PDF )
- The Average Transmission Overhead of Broadcast Encryption
- Sarang Aravamuthan and Sachin Lodha
-
2006/323 ( PS PS.GZ PDF )
- Computational Soundness of Formal Indistinguishability and Static Equivalence
- Gergei Bana and Payman Mohassel and Till Stegers
-
2006/322 ( PDF )
- Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
- Yassir Nawaz and Kishan Chand Gupta and Guang Gong
-
2006/321 ( PS PS.GZ PDF )
- Efficient Pseudorandom Generators Based on the DDH Assumption
- Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko
-
2006/320 ( PDF )
- CMSS -- An Improved Merkle Signature Scheme
- Johannes Buchmann and Luis Carlos Coronado Garcia and Erik Dahmen and Martin Doering and Elena Klintsevich
-
2006/319 ( PS PS.GZ PDF )
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Scott Contini and Yiqun Lisa Yin
-
2006/318 ( PDF )
- Chameleon-Based Deniable Authenticated Key Agreement Protocol
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2006/317 ( PS PS.GZ PDF )
- Weaknesses of the FORK-256 compression function
- Krystian Matusiewicz and Scott Contini and Josef Pieprzyk
-
2006/316 ( PDF )
- A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
- Sarang Aravamuthan and Viswanatha Rao Thumparthy
-
2006/315 ( PDF )
- On the Necessity of Rewinding in Secure Multiparty Computation
- Michael Backes and Joern-Mueller Quade and Dominique Unruh
-
2006/314 ( PDF )
- Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
- Yi Deng and Giovanni Di Crescenzo and Dongdai Lin
-
2006/313 ( PDF )
- Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
- Lars Elmegaard-Fessel
-
2006/312 ( PS PS.GZ PDF )
- ElGamal type signature schemes for n-dimensional vector spaces
- Iwan M. Duursma and SeungKook Park
-
2006/311 ( -- withdrawn -- )
- Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
- Bennian Dou and Chungen Xu
-
2006/310 ( PDF )
- A d-Sequence based Recursive Random Number Generator
- Abhishek Parakh
-
2006/309 ( PDF )
- Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
- Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters
-
2006/308 ( PDF )
- Efficient ID-based Threshold Signature Schemes without Pairings
- Jun Shao and Zhenfu Cao and Licheng Wang
-
2006/307 ( PDF )
- Note on Design Criteria for Rainbow-Type Multivariates
- Jintai Ding and Lei Hu and Bo-Yin Yang and Jiun-Ming Chen
-
2006/306 ( PS PS.GZ PDF )
- Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
- Alexander W. Dent and Qiang Tang
-
2006/305 ( PS PS.GZ PDF )
- Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
- V.S. Dimitrov and K.U. Jaervinen and M.J. Jacobson, Jr. and W.F. Chan and Z. Huang
-
2006/304 ( PS PS.GZ PDF )
- Identity-Based Encryption Gone Wild
- Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone-Lee and Gregory Neven and Nigel P. Smart
-
2006/303 ( PS PS.GZ )
- Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
- Eric Filiol
-
2006/302 ( PDF )
- Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
- Atefeh Mashatan and Douglas R. Stinson
-
2006/301 ( PDF )
- New features for JPEG Steganalysis
- Johann Barbier and \'Eric Filiol and Kichenakoumar Mayoura
-
2006/300 ( -- withdrawn -- )
- Attacks and Modifications of CJC's E-voting Scheme
- Bennian Dou and Chun-hua Chen and Roberto Araujo
-
2006/299 ( PDF )
- Efficient Implementation of Tate Pairing on a Mobile Phone using Java
- Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto
-
2006/298 ( PDF )
- A Fully Collusion Resistant Broadcast, Trace, and Revoke System
- Dan Boneh and Brent Waters
-
2006/297 ( PDF )
- Forward-Secure Signatures with Untrusted Update
- Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters
-
2006/296 ( PS PS.GZ PDF )
- On the Generic Construction of Identity-Based Signatures with Additional Properties
- David Galindo and Javier Herranz and Eike Kiltz
-
2006/295 ( PDF )
- Visual secret sharing scheme with autostereogram
- Feng Yi and Daoshun Wang and Yiqi Dai
-
2006/294 ( PDF )
- The Collision Intractability of MDC-2 in the Ideal Cipher Model
- John P Steinberger
-
2006/293 ( PS PS.GZ PDF )
- Fast Algorithms for the Free Riders Problem in Broadcast Encryption
- Zulfikar Ramzan and David P. Woodruff
-
2006/292 ( PDF )
- Ideal Multipartite Secret Sharing Schemes
- Oriol Farras and Jaume Marti-Farre and Carles Padro
-
2006/291 ( PS PS.GZ PDF )
- Hard Homogeneous Spaces
- Jean-Marc Couveignes
-
2006/290 ( PDF )
- On Authentication with HMAC and Non-Random Properties
- Christian Rechberger and Vincent Rijmen
-
2006/289 ( PDF )
- Efficient Ring Signatures without Random Oracles
- Hovav Shacham and Brent Waters
-
2006/288 ( PDF )
- Predicting Secret Keys via Branch Prediction
- Onur Aciicmez and Jean-Pierre Seifert and Cetin Kaya Koc
-
2006/287 ( PDF )
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Dan Boneh and Brent Waters
-
2006/286 ( PDF )
- Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
- Sujing Zhou and Dongdai Lin
-
2006/285 ( PS PS.GZ PDF )
- Unrestricted Aggregate Signatures
- Mihir Bellare and Chanathip Namprempre and Gregory Neven
-
2006/284 ( PS PS.GZ PDF )
- Constant Round Group Key Exchange with Logarithmic Computational Complexity
- Junghyun Nam, Youngsook Lee, and Dongho Won
-
2006/283 ( PS PS.GZ PDF )
- Does Privacy Require True Randomness?
- Carl Bosley and Yevgeniy Dodis
-
2006/282 ( -- withdrawn -- )
- Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
- Victor K. Wei and Fangguo Zhang
-
2006/281 ( PS PS.GZ PDF )
- Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
- Phillip Rogaway
-
2006/280 ( PS PS.GZ )
- Deniable Authentication and Key Exchange
- Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk
-
2006/279 ( PDF )
- On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
- Sanjit Chatterjee and Palash Sarkar
-
2006/278 ( PS PS.GZ PDF )
- Fundamental problems in provable security and cryptography
- Alexander W. Dent
-
2006/277 ( PS PS.GZ )
- On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
- Oded Goldreich
-
2006/276 ( PS PS.GZ PDF )
- Mitigating Dictionary Attacks on Password-Protected Local Storage
- Ran Canetti and Shai Halevi and Michael Steiner
-
2006/275 ( PS PS.GZ PDF )
- A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
- Debrup Chakraborty and Palash Sarkar
-
2006/274 ( PDF )
- An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
- Debasis Giri and P. D. Srivastava
-
2006/273 ( PS PS.GZ PDF )
- Secure Positioning of Mobile Terminals with Simplex Radio Communication
- Mikio Fujii
-
2006/272 ( PS PS.GZ PDF )
- Efficient Use of Random Delays
- Olivier Benoit and Michael Tunstall
-
2006/271 ( PDF )
- Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
- Gregory V. Bard
-
2006/270 ( PDF )
- Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
- Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng
-
2006/269 ( PS PS.GZ PDF )
- An Analysis of the Hermes8 Stream Ciphers
- Steve Babbage and Carlos Cid and Norbert Pramstaller and Havard Raddum
-
2006/268 ( PDF )
- On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
- Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto
-
2006/267 ( PS PS.GZ PDF )
- Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
- Mihir Bellare and Tadayoshi Kohno and Victor Shoup
-
2006/266 ( PS PS.GZ PDF )
- Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
- Michael Backes and Peeter Laud
-
2006/265 ( PDF )
- Some (in)sufficient conditions for secure hybrid encryption.
- Javier Herranz and Dennis Hofheinz and Eike Kiltz
-
2006/264 ( PS PS.GZ PDF )
- A Simple and Unified Method of Proving Unpredictability
- Mridul Nandi
-
2006/263 ( PDF )
- Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
- Dragos Trinca
-
2006/262 ( PDF )
- Logical Concepts in Cryptography
- Simon Kramer
-
2006/261 ( PS PS.GZ PDF )
- Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
- Frederic Didier
-
2006/260 ( PS PS.GZ PDF )
- A Note On Game-Hopping Proofs
- Alexander W. Dent
-
2006/259 ( PDF )
- Simplified Submission of Inputs to Protocols
- Douglas Wikstrom
-
2006/258 ( PDF )
- Cryptanalysis of a Cognitive Authentication Scheme
- Philippe Golle and David Wagner
-
2006/257 ( PDF )
- Efficient Divisor Class Halving on Genus Two Curves
- Peter Birkner
-
2006/256 ( PDF )
- Constant-Round Concurrent NMWI and its relation to NMZK
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2006/255 ( PDF )
- Malicious KGC Attacks in Certificateless Cryptography
- Man Ho Au and Jing Chen and Joseph K. Liu and Yi Mu and Duncan S. Wong and Guomin Yang
-
2006/254 ( PS PS.GZ PDF )
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Ilya Mironov and Lintao Zhang
-
2006/253 ( PS PS.GZ PDF )
- Hard Instances of the Constrained Discrete Logarithm Problem
- Ilya Mironov and Anton Mityagin and Kobbi Nissim
-
2006/252 ( PDF )
- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
- Maurizio A. Strangio
-
2006/251 ( PDF )
- Accelerating Cryptanalysis with the Method of Four Russians
- Gregory V. Bard
-
2006/250 ( PDF )
- Linear Cryptanalysis of CTC
- Orr Dunkelman and Nathan Keller
-
2006/249 ( PS PS.GZ PDF )
- Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
- Selcuk Kavut and Subhamoy Maitra and Sumanta Sarkar and Melek D. Yucel
-
2006/248 ( PDF )
- Disguising tori and elliptic curves
- Steven D. Galbraith
-
2006/247 ( -- withdrawn -- )
- Factoring Class Polynomials over the Genus Field
- Marcel Martin
-
2006/246 ( PS PS.GZ PDF )
- ON THE POSTQUANTUM CIPHER SCHEME
- Jaroslav HRUBY
-
2006/245 ( PDF )
- Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
- K. Phani Kumar and G. Shailaja and Ashutosh Saxena
-
2006/244 ( PS PS.GZ PDF )
- Length-based cryptanalysis: The case of Thompson's Group
- Dima Ruinskiy, Adi Shamir, Boaz Tsaban
-
2006/243 ( PDF )
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
- Tae Hyun Kim and Tsuyoshi Takagi and Dong-Guk Han and Ho Won Kim and Jongin Lim
-
2006/242 ( PDF )
- The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
- Haina Zhang , Shaohui Wang, Xiaoyun Wang
-
2006/241 ( PS PS.GZ PDF )
- A Stronger Definition for Anonymous Electronic Cash
- Marten Trolin
-
2006/240 ( PS PS.GZ PDF )
- Computing Zeta Functions of Nondegenerate Curves
- W. Castryck and J. Denef and F. Vercauteren
-
2006/239 ( PDF )
- Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
- Yi Deng and Dongdai Lin
-
2006/238 ( -- withdrawn -- )
- Searchable Index Schemes for Groups : Security vs. Efficiency
- Hyun-A Park, Yu Jeong Lee, and Dong Hoon Lee
-
2006/237 ( PDF )
- Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
- Claire Whelan and Mike Scott
-
2006/236 ( PS PS.GZ PDF )
- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
- Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
-
2006/235 ( PS PS.GZ PDF )
- Application of ECM to a Class of RSA keys
- Abderrahmane Nitaj
-
2006/234 ( PDF )
- RFID Security: Tradeoffs between Security and Efficiency
- Ivan Damg{\aa}rd and Michael {\O}stergaard
-
2006/233 ( PS PS.GZ PDF )
- A simple generalization of El-Gamal cryptosystem to non-abelian groups
- Ayan Mahalanobis
-
2006/232 ( PDF )
- Improvement to AKS algorithm
- Roman Popovych
-
2006/231 ( PS PS.GZ PDF )
- A handy multi-coupon system
- Sebastien Canard and Aline Gouget and Emeline Hufschmitt
-
2006/230 ( PDF )
- Another Look at Generic Groups
- Neal Koblitz and Alfred Menezes
-
2006/229 ( PDF )
- Another Look at "Provable Security". II
- Neal Koblitz and Alfred Menezes
-
2006/228 ( PS PS.GZ PDF )
- Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
- Mihir Bellare and Amit Sahai
-
2006/227 ( PS PS.GZ PDF )
- An Elliptic Curve Processor Suitable For RFID-Tags
- L. Batina and J. Guajardo and T. Kerins and N. Mentens and P. Tuyls and I. Verbauwhede
-
2006/226 ( PDF )
- The Fairness of Perfect Concurrent Signatures
- Guilin Wang, Feng Bao, and Jianying Zhou
-
2006/225 ( PS PS.GZ PDF )
- Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
- Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
-
2006/224 ( PS PS.GZ PDF )
- Generalizations of the Karatsuba Algorithm for Efficient Implementations
- Andr\'{e} Weimerskirch and Christof Paar
-
2006/223 ( PDF )
- What Hashes Make RSA-OAEP Secure?
- Daniel R. L. Brown
-
2006/222 ( PS PS.GZ )
- Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
- R. Overbeck
-
2006/221 ( PS PS.GZ PDF )
- Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
- Phillip Rogaway and Thomas Shrimpton
-
2006/220 ( PDF )
- Multi-Dimensional Montgomery Ladders for Elliptic Curves
- Daniel R. L. Brown
-
2006/219 ( PS PS.GZ PDF )
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
- Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kai Tsay
-
2006/218 ( PS PS.GZ PDF )
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
-
2006/217 ( PS PS.GZ PDF )
- Statistical Analysis of the MARS Block Cipher
- Andrey Pestunov
-
2006/216 ( PDF )
- Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
- Meloni Nicolas
-
2006/215 ( PDF )
- Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
- Shujun Li and Chengqing Li and Kowk-Tung Lo and Guanrong Chen
-
2006/214 ( PDF )
- Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String
- Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2006/213 ( PS PS.GZ PDF )
- Luby-Rackoff Ciphers from Weak Round Functions?
- Ueli Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj{\"o}din
-
2006/212 ( PDF )
- Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
- Kemal BICAKCI and Bruno Crispo and Andrew S. Tanenbaum
-
2006/211 ( PS PS.GZ PDF )
- A Survey of Certificateless Encryption Schemes and Security Models
- Alexander W. Dent
-
2006/210 ( PDF )
- Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
- Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky
-
2006/209 ( PS PS.GZ PDF )
- Minimal Weight and Colexicographically Minimal Integer Representations
- Clemens Heuberger and James A. Muir
-
2006/208 ( PS PS.GZ PDF )
- Private Information Retrieval Using Trusted Hardware
- Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao
-
2006/207 ( PDF )
- The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
- Javier Herranz and Dennis Hofheinz and Eike Kiltz
-
2006/206 ( PS PS.GZ PDF )
- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
- Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang
-
2006/205 ( -- withdrawn -- )
- ID-Based Ring Signature Scheme secure in the Standard Model
- Man Ho Au and Joseph K. Liu and Y. H. Yuen and Duncan S. Wong
-
2006/204 ( PS PS.GZ )
- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
- Pradeep Kumar Mishra and Pinakpani Pal and Palash Sarkar.
-
2006/203 ( PS PS.GZ PDF )
- Generalization of the Selective-ID Security Model for HIBE Protocols
- Sanjit Chatterjee and Palash Sarkar
-
2006/202 ( PS PS.GZ PDF )
- Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
- Ryuichi Harasawa, Yutaka Sueyoshi, and Aichi Kudo
-
2006/201 ( PS PS.GZ PDF )
- Efficient Tate Pairing Computation Using Double-Base Chains
- Chang'an Zhao and Fangguo Zhang and Jiwu Huang
-
2006/200 ( PDF )
- Improvement of recently proposed Remote User Authentication Schemes
- Guanfei Fang and Genxun huang
-
2006/199 ( PS PS.GZ PDF )
- Identity-based Key Agreement Protocols From Pairings
- L. Chen and Z. Cheng and N.P. Smart
-
2006/198 ( PDF )
- Cryptographically Private Support Vector Machines
- Sven Laur and Helger Lipmaa and Taneli Mielikäinen
-
2006/197 ( PDF )
- A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
- Marc P.C. Fossorier and Miodrag J. Mihaljevic and Hideki Imai and Yang Cui and Kanta Matsuura
-
2006/196 ( PDF )
- On ZK-Crypt, Book Stack, and Statistical Tests
- S.~Doroshenko \and A.~Fionov \and A.~Lubkin \and V.~Monarev \and B.~Ryabko
-
2006/195 ( PS PS.GZ PDF )
- An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
- Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto
-
2006/194 ( -- withdrawn -- )
- Self-Generated-Certificate Public Key Cryptosystem
- Joseph K. Liu and Man Ho Au
-
2006/193 ( PDF )
- (Hierarchical Identity-Based) Threshold Ring Signatures
- Victor K. Wei and Tsz Hon Yuen
-
2006/192 ( PDF )
- DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
- Osman Kocar
-
2006/191 ( PDF )
- A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
- Sahadeo Padhye
-
2006/190 ( PS PS.GZ PDF )
- Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
- Berry Schoenmakers and Andrey Sidorenko
-
2006/189 ( PDF )
- Unconditionally secure chaffing and winnowing with short authentication tags
- D. R. Stinson
-
2006/188 ( PS PS.GZ PDF )
- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
- Tetsu Iwata
-
2006/187 ( PS PS.GZ PDF )
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
- Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong
-
2006/186 ( PDF )
- Deterministic and Efficiently Searchable Encryption
- Mihir Bellare and Alexandra Boldyreva and Adam O'Neill
-
2006/185 ( PS PS.GZ PDF )
- Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
- Minh-Huyen Nguyen and Shien Jin Ong and Salil Vadhan
-
2006/184 ( PS PS.GZ PDF )
- On Signatures of Knowledge
- Melissa Chase and Anna Lysyanskaya
-
2006/183 ( PDF )
- Information-Theoretic Conditions for Two-Party Secure Function Evaluation
- Claude Cr\'epeau and George Savvides and Christian Schaffner and J\"urg Wullschleger
-
2006/182 ( PS PS.GZ PDF )
- On the Limits of Point Function Obfuscation
- Arvind Narayanan and Vitaly Shmatikov
-
2006/181 ( PS PS.GZ PDF )
- There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
- Sel\c{c}uk Kavut and Subhamoy Maitra and Melek D. Y{\"u}cel
-
2006/180 ( PDF )
- Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
- Dmitry Khovratovich
-
2006/179 ( PDF )
- FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
- Chang Shu and Soonhak Kwon and Kris Gaj
-
2006/178 ( PS PS.GZ PDF )
- A New Cryptosystem Based On Hidden Order Groups
- Amitabh Saxena and Ben Soh
-
2006/177 ( PS PS.GZ PDF )
- On the (Im-)Possibility of Extending Coin Toss
- Dennis Hofheinz and Joern Mueller-Quade and Dominique Unruh
-
2006/176 ( PDF )
- Counting points on elliptic curves in medium characteristic
- Antoine Joux and Reynald Lercier
-
2006/175 ( PS PS.GZ PDF )
- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
- Moni Naor and Gil Segev and Adam Smith
-
2006/174 ( -- withdrawn -- )
- Frobenius expansion and the Diffie Hellman problem
- V. R. Sule
-
2006/173 ( PS PS.GZ PDF )
- Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
- Le Trieu Phong and Ogata Wakaha
-
2006/172 ( PS PS.GZ PDF )
- On Computing Products of Pairings
- R Granger and N.P. Smart
-
2006/171 ( PS PS.GZ PDF )
- Key confirmation and adaptive corruptions in the protocol security logic
- Prateek Gupta and Vitaly Shmatikov
-
2006/170 ( PDF )
- Visual Cryptography Schemes with Optimal Pixel Expansion
- Carlo Blundo and Stelvio Cimato and Alfredo De Santis
-
2006/169 ( PDF )
- Simplified pairing computation and security implications
- Steven D. Galbraith and Colm O hEigeartaigh and Caroline Sheedy
-
2006/168 ( PS PS.GZ PDF )
- How Fast can be Algebraic Attacks on Block Ciphers ?
- Nicolas T. Courtois
-
2006/167 ( PS PS.GZ PDF )
- Towards Trustworthy e-Voting using Paper Receipts
- Yunho Lee and Kwangwoo Lee and Seungjoo Kim and Dongho Won
-
2006/166 ( PDF )
- General Secret Sharing Based on the Chinese Remainder Theorem
- Sorin Iftene
-
2006/165 ( PS PS.GZ PDF )
- Pairings for Cryptographers
- S.D. Galbraith and K.G. Paterson and N.P. Smart
-
2006/164 ( PDF )
- Classification of Signature-only Signature Models
- Zhengjun Cao
-
2006/163 ( PDF )
- Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
- Gregory V. Bard
-
2006/162 ( PS PS.GZ )
- A Summary of McEliece-Type Cryptosystems and their Security
- D. Engelbert, R. Overbeck and A. Schmidt
-
2006/161 ( PDF )
- Cryptanalysis of 4-Pass HAVAL
- Zhangyi Wang and Huanguo Zhang and Zhongping Qin and Qingshu Meng
-
2006/160 ( -- withdrawn -- )
- A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
- L. Chen and Z. Cheng and N.P. Smart
-
2006/159 ( -- withdrawn -- )
- Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
- Joonsang Baek and Guilin Wang
-
2006/158 ( PDF )
- An Efficient ID-based Proxy Signature Scheme from Pairings
- Chunxiang Gu and Yuefei Zhu
-
2006/157 ( PS PS.GZ PDF )
- An efficient way to access an array at a secret index
- Timothy Atkinson and Marius C. Silaghi
-
2006/156 ( PS PS.GZ PDF )
- The Hardness of the DHK Problem in the Generic Group Model
- Alexander W. Dent
-
2006/155 ( PS PS.GZ )
- Independent Zero-Knowledge Sets
- Rosario Gennaro and Silvio Micali
-
2006/154 ( PS PS.GZ PDF )
- New Public Key Authentication Frameworks with Lite Certification Authority
- Xiaolei Dong and Licheng Wang and Zhenfu Cao
-
2006/153 ( PS PS.GZ PDF )
- On the Relationships Between Notions of Simulation-Based Security
- Anupam Datta and Ralf Kuesters and John C. Mitchell and Ajith Ramanathan
-
2006/152 ( PDF )
- Pairing based Mutual Authentication Scheme Using Smart Cards
- G. Shailaja and K. Phani Kumar and Ashutosh Saxena
-
2006/151 ( PS PS.GZ PDF )
- Simulation-Based Security with Inexhaustible Interactive Turing Machines
- Ralf Kuesters
-
2006/150 ( PDF )
- Demonstrating data possession and uncheatable data transfer
- D\'ecio Luiz Gazzoni Filho and Paulo S\'ergio Licciardi Messeder Barreto
-
2006/149 ( PDF )
- A method of construction of balanced functions with optimum algebraic immunity
- C. Carlet
-
2006/148 ( PS PS.GZ PDF )
- Computational Indistinguishability between Quantum States and Its Cryptographic Application
- Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami
-
2006/147 ( PDF )
- New Integrated proof Method on Iterated Hash Structure and New Structures
- Duo Lei
-
2006/146 ( PS PS.GZ PDF )
- Completeness of Formal Hashes in the Standard Model
- Flavio D. Garcia and Peter van Rossum
-
2006/145 ( PS PS.GZ PDF )
- PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
- Alexander Rostovtsev and Anton Stolbunov
-
2006/144 ( PDF )
- Implementing Cryptographic Pairings on Smartcards
- Michael Scott and Neil Costigan and Wesam Abdulwahab
-
2006/143 ( PDF )
- Blinded Fault Resistant Exponentiation
- Guillaume Fumaroli and David Vigilant
-
2006/142 ( PS PS.GZ PDF )
- Rational Secret Sharing, Revisited
- S. Dov Gordon and Jonathan Katz
-
2006/141 ( PDF )
- Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
- Shahram Khazaei and Mahdi M. Hasanzadeh and Mohammad S. Kiaei
-
2006/140 ( PS PS.GZ PDF )
- GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
- Jiejun Kong
-
2006/139 ( PS PS.GZ PDF )
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
- Francois-Xavier Standaert and Tal G. Malkin and Moti Yung
-
2006/138 ( PDF )
- Trace-Driven Cache Attacks on AES
- Onur Ac\i{}i\c{c}mez and \c{C}etin Kaya Ko\c{c}
-
2006/137 ( PDF )
- Defining Strong Privacy for RFID
- Ari Juels and Stephen A. Weis
-
2006/136 ( PDF )
- A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
- Gregory V. Bard
-
2006/135 ( PDF )
- The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction
- Duo Lei, Da Lin2, Li Chao, Keqin Feng, and Longjiang Qu
-
2006/134 ( PDF )
- Identity Based Strong Designated Verifier Signature Scheme
- K. Phani Kumar and G. Shailaja and Ashutosh Saxena
-
2006/133 ( PDF )
- Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
- Francisco Rodr\'{i}guez-Henr\'{i}quez and Guillermo Morales-Luna and Julio L\'{o}pez-Hern\'{a}ndez
-
2006/132 ( PDF )
- Conditional Reactive Simulatability
- Michael Backes and Markus Duermuth and Dennis Hofheinz and Ralf Kuesters
-
2006/131 ( PS PS.GZ PDF )
- Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
- Mike Burmester and Tri van Le and Breno de Medeiros
-
2006/130 ( PS PS.GZ )
- Simulatable Security and Polynomially Bounded Concurrent Composition
- Dennis Hofheinz and Dominique Unruh
-
2006/129 ( PDF )
- Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
- Wei Han and Dong Zheng and Ke-fei Chen
-
2006/128 ( PDF )
- On the existence of distortion maps on ordinary elliptic curves
- Denis Charles
-
2006/127 ( PS PS.GZ PDF )
- A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
- Sourav Mukhopadhyay and Palash Sarkar
-
2006/126 ( PDF )
- ECGSC: Elliptic Curve based Generalized Signcryption Scheme
- Yiliang Han and Xiaoyuan Yang
-
2006/125 ( PDF )
- Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
- Eunjeong Lee and Hyang-Sook Lee and Yoonjin Lee
-
2006/124 ( PDF )
- Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
- K.W. Wong and Edward C.W. Lee and L.M. Cheng and Xiaofeng Liao
-
2006/123 ( PDF )
- Designated Confirmer Signatures Revisited
- Douglas Wikström
-
2006/122 ( PDF )
- Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
- Eike Kiltz
-
2006/121 ( PS PS.GZ PDF )
- Counting Prime Numbers with Short Binary Signed Representation
- Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna
-
2006/120 ( PDF )
- Key Privacy for Identity Based Encryption
- Jason E. Holt
-
2006/119 ( -- withdrawn -- )
- Repairing Attacks on a Password-Based Group Key Agreement
- Ratna Dutta and Rana Barua
-
2006/118 ( PS PS.GZ PDF )
- On construction of non-normal Boolean functions
- Sugata Gangopadhyay and Deepmala Sharma
-
2006/117 ( PDF )
- Conjectured Security of the ANSI-NIST Elliptic Curve RNG
- Daniel R. L. Brown
-
2006/116 ( PDF )
- Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
- Mario Lamberger and Norbert Pramstaller and Vincent Rijmen
-
2006/115 ( PDF )
- Fast exponentiation via prime finite field isomorphism
- Alexander Rostovtsev
-
2006/114 ( PS PS.GZ PDF )
- Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
- Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
-
2006/113 ( PDF )
- A New Construction of Time Capsule Signature
- Miaomiao Zhang and Gongliang Chen and Jianhua Li and Licheng Wang and Haifeng Qian
-
2006/112 ( PS PS.GZ )
- Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
- Markus Volkmer
-
2006/111 ( PS PS.GZ PDF )
- Attacking LCCC Batch Verification of RSA Signatures
- Martin Stanek
-
2006/110 ( PS PS.GZ PDF )
- The Eta Pairing Revisited
- F. Hess and N.P. Smart and F. Vercauteren
-
2006/109 ( PS PS.GZ PDF )
- A Simpler Sieving Device: Combining ECM and TWIRL
- Willi Geiselmann and Fabian Januszewski and Hubert Koepfer and Jan Pelzl and Rainer Steinwandt
-
2006/108 ( PDF )
- Efficient Public Key Encryption with Keyword Search Schemes from Pairings
- Chunxiang Gu and Yuefei Zhu and Yajuan Zhang
-
2006/107 ( PDF )
- The number field sieve for integers of low weight
- Oliver Schirokauer
-
2006/106 ( PS PS.GZ PDF )
- Further Refinement of Pairing Computation Based on Miller's Algorithm
- Chao-Liang Liu and Gwoboa Horng and Te-Yu Chen
-
2006/105 ( PDF )
- Tunnels in Hash Functions: MD5 Collisions Within a Minute
- Vlastimil Klima
-
2006/104 ( PDF )
- Fast Collision Attack on MD5
- Marc Stevens
-
2006/103 ( PS PS.GZ PDF )
- Security of VSH in the Real World
- Markku-Juhani O. Saarinen
-
2006/102 ( PS PS.GZ PDF )
- Efficient Blind and Partially Blind Signatures Without Random Oracles
- Tatsuaki Okamoto
-
2006/101 ( PS PS.GZ PDF )
- Information-theoretic analysis of coating PUFs
- B. Skoric and S. Maubach and T. Kevenaar and P. Tuyls
-
2006/100 ( PDF )
- A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
- Zhou Sujing, Lin Dongdai
-
2006/099 ( PDF )
- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
- Dongvu Tonien and Reihaneh Safavi-Naini
-
2006/098 ( PS PS.GZ PDF )
- Gr\"obner Basis Based Cryptanalysis of SHA-1
- Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
-
2006/097 ( PDF )
- A Cryptographic Tour of the IPsec Standards
- Kenneth G. Paterson
-
2006/096 ( PDF )
- Sequential Aggregate Signatures and Multisignatures without Random Oracles
- Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters
-
2006/095 ( PDF )
- MAC Reforgeability
- John Black and Martin Cochran
-
2006/094 ( PS PS.GZ PDF )
- Cryptanalysis of the MEM Mode of Operation
- Peng Wang and Dengguo Feng and Wenling Wu
-
2006/093 ( PS PS.GZ PDF )
- RSA and a higher degree diophantine equation
- Abderrahmane Nitaj
-
2006/092 ( PS PS.GZ PDF )
- Cryptanalysis of RSA with constrained keys
- Abderrahmane Nitaj
-
2006/091 ( PS PS.GZ PDF )
- The Complexity of Online Memory Checking
- Moni Naor and Guy Rothblum
-
2006/090 ( PDF )
- Secure Sketch for Multi-Sets
- Ee-Chien Chang and Vadym Fedyukovych and Qiming Li
-
2006/089 ( PS PS.GZ PDF )
- A Tree-based Model of Unicast Stream Authentication
- Goce Jakimoski and Yvo Desmedt
-
2006/088 ( PDF )
- On the Feasibility of Consistent Computations
- Sven Laur and Helger Lipmaa
-
2006/087 ( PDF )
- Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
- Barath Raghavan and Saurabh Panjwani and Anton Mityagin
-
2006/086 ( PDF )
- Analysis of the Linux Random Number Generator
- Zvi Gutterman and Benny Pinkas and Tzachy Reinman
-
2006/085 ( PS PS.GZ PDF )
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Xavier Boyen and Brent Waters
-
2006/084 ( PS PS.GZ PDF )
- Cryptography from Anonymity
- Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
-
2006/083 ( PDF )
- Browsers Defenses Against Phishing, Spoofing and Malware
- Amir Herzberg
-
2006/082 ( PS PS.GZ PDF )
- Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
- HariGovind V. Ramasamy and Christian Cachin
-
2006/081 ( PS PS.GZ )
- Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
- David Molnar and Tadayoshi Kohno and Naveen Sastry and David Wagner
-
2006/080 ( PDF )
- Efficient Identity-based Signatures Secure in the Standard Model
- Kenneth G. Paterson and Jacob C. N. Schuldt
-
2006/079 ( PS PS.GZ PDF )
- Towards Provably Secure Group Key Agreement Building on Group Theory
- Jens-Matthias Bohli and Benjamin Glas and Rainer Steinwandt
-
2006/078 ( PDF )
- Verifiable Random Permutations
- Yevgeniy Dodis and Prashant Puniya
-
2006/077 ( PDF )
- On Secret Sharing Schemes, Matroids and Polymatroids
- Jaume Marti-Farre and Carles Padro
-
2006/076 ( -- withdrawn -- )
- A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
- Amitabh Saxena and Ben Soh
-
2006/075 ( PS PS.GZ PDF )
- ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
- TOMOHIRO HARAYAMA
-
2006/074 ( PDF )
- How to Construct Sufficient Condition in Searching Collisions of MD5
- Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta
-
2006/073 ( PS PS.GZ PDF )
- Stronger Security of Authenticated Key Exchange
- Brian LaMacchia and Kristin Lauter and Anton Mityagin
-
2006/072 ( PDF )
- Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
- Yaniv Shaked and Avishai Wool
-
2006/071 ( PS PS.GZ PDF )
- A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
- Ueli Maurer and Johan Sjödin
-
2006/070 ( PDF )
- The experimental distinguishing attack on RC4
- Sergey Doroshenko and Boris Ryabko
-
2006/069 ( PS PS.GZ PDF )
- Automated Security Proofs with Sequences of Games
- Bruno Blanchet and David Pointcheval
-
2006/068 ( PDF )
- Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2006/067 ( PS PS.GZ PDF )
- Scalar Multiplication on Koblitz Curves using Double Bases
- Roberto Avanzi and Francesco Sica
-
2006/066 ( PS PS.GZ PDF )
- Simple and Flexible Private Revocation Checking
- John Solis and Gene Tsudik
-
2006/065 ( PS PS.GZ PDF )
- On Expected Constant-Round Protocols for Byzantine Agreement
- Jonathan Katz and Chiu-Yuen Koo
-
2006/064 ( PS PS.GZ PDF )
- Perturbing and Protecting a Traceable Block Cipher
- Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
-
2006/063 ( PS PS.GZ PDF )
- Provably Secure Universal Steganographic Systems
- Boris Ryabko and Daniil Ryabko
-
2006/062 ( -- withdrawn -- )
- A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
- Debrup Chakraborty and Palash Sarkar
-
2006/061 ( -- withdrawn -- )
-
- Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan
-
2006/060 ( -- withdrawn -- )
- An Efficient ID-based Signature Scheme from Pairings
- Chunxiang Gu and Yuefei Zhu and Xiaoyu Pan
-
2006/059 ( PS PS.GZ PDF )
- High Security Pairing-Based Cryptography Revisited
- R. Granger and D. Page and N.P. Smart
-
2006/058 ( PDF )
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
- Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò
-
2006/057 ( PS PS.GZ PDF )
- Key Exchange Using Passwords and Long Keys
- Vladimir Kolesnikov and Charles Rackoff
-
2006/056 ( PDF )
- Key Exchange Protocols: Security Definition, Proof Method and Applications
- Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi
-
2006/055 ( PDF )
- Multicollision Attacks on some Generalized Sequential Hash Functions
- M. Nandi and D. R. Stinson
-
2006/054 ( PDF )
- How to Build a Low-Cost, Extended-Range RFID Skimmer
- Ilan Kirschenbaum and Avishai Wool
-
2006/053 ( PS PS.GZ PDF )
- Cryptanalysis of the CFVZ cryptosystem
- J. J. Climent and E. Gorla and J. Rosenthal
-
2006/052 ( PS PS.GZ PDF )
- Software mitigations to hedge AES against cache-based software side channel vulnerabilities
- Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert
-
2006/051 ( PDF )
- Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
-
2006/050 ( PDF )
- Secure Device Pairing based on a Visual Channel
- Nitesh Saxena and Jan-Erik Ekberg and Kari Kostiainen and N. Asokan
-
2006/049 ( PS PS.GZ )
- Crossword Puzzle Attack on NLS
- Joo Yeon Cho and Josef Pieprzyk
-
2006/048 ( PS PS.GZ PDF )
- New Results on Multipartite Access Structures
- Javier Herranz and German Saez
-
2006/047 ( PDF )
- Cryptographically Sound Theorem Proving
- Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner
-
2006/046 ( PS PS.GZ PDF )
- Efficient Primitives from Exponentiation in Zp
- Shaoquan Jiang
-
2006/045 ( PDF )
- Fully Collusion Resistant Traitor Tracing
- Dan Boneh and Amit Sahai and Brent Waters
-
2006/044 ( PS PS.GZ PDF )
- Linear Integer Secret Sharing and Distributed Exponentiation
- Ivan Damgard and Rune Thorbek
-
2006/043 ( PS PS.GZ PDF )
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Mihir Bellare
-
2006/042 ( PDF )
- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
- Sourav Mukhopadhyay and Palash Sarkar
-
2006/041 ( PS PS.GZ PDF )
- Reactively Simulatable Certified Mail
- Birgit Pfitzmann and Matthias Schunter and Michael Waidner
-
2006/040 ( PDF )
- Linkable Democratic Group Signatures
- Mark Manulis and Ahmad-Reza Sadeghi and Joerg Schwenk
-
2006/039 ( PDF )
- Two-Round AES Differentials
- Joan Daemen and Vincent Rijmen
-
2006/038 ( PDF )
- Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
- Jintai Ding and Jason E. Gower and Dieter S. Schmidt
-
2006/037 ( PS PS.GZ PDF )
- Message Authentication on 64-bit Architectures
- Ted Krovetz
-
2006/036 ( PDF )
- Vector Stream Cipher Instant Key Recovery
- Sean O'Neil
-
2006/035 ( PDF )
- Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
- Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Nazar A. Saqib and Nareli Cruz-Cortés
-
2006/034 ( PDF )
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
- Eike Kiltz and David Galindo
-
2006/033 ( PDF )
- Arithmetic of Generalized Jacobians
- Isabelle Déchène
-
2006/032 ( PS PS.GZ PDF )
- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
- Deepak Kumar Dalai and Subhamoy Maitra
-
2006/031 ( PS PS.GZ PDF )
- On a Variation of Kurosawa-Desmedt Encryption Scheme
- Le Trieu Phong and Wakaha Ogata
-
2006/030 ( PDF )
- Improved cryptanalysis of Py
- Paul Crowley
-
2006/029 ( PS PS.GZ PDF )
- Authenticated Hybrid Encryption for Multiple Recipients
- Stéphanie Alt
-
2006/028 ( PDF )
- Cryptanalysis of recently proposed Remote User Authentication Schemes
- Thulasi Goriparthi, Manik Lal Das, Atul Negi and Ashutosh Saxena
-
2006/027 ( PS PS.GZ PDF )
- Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
- Vladimir Bayev
-
2006/026 ( PDF )
- Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
- David Freeman
-
2006/025 ( PDF )
- Signatures for Network Coding
- Denis Charles and Kamal Jain and Kristin Lauter
-
2006/024 ( PDF )
- Improving the Decoding Efficiency of Private Search
- George Danezis and Claudia Diaz
-
2006/023 ( PS PS.GZ PDF )
- A Method to Implement Direct Anonymous Attestation
- HE GE
-
2006/021 ( PDF )
- Cryptographic hash functions from expander graphs
- Denis Charles and Eyal Goren and Kristin Lauter
-
2006/020 ( PS PS.GZ PDF )
- Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
- Adam Smith
-
2006/019 ( PDF )
- Hermes8 : A Low-Complexity Low-Power Stream Cipher
- Ulrich Kaiser
-
2006/018 ( PS PS.GZ PDF )
- Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
- Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra
-
2006/017 ( PS PS.GZ PDF )
- Threshold and Proactive Pseudo-Random Permutations
- Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung
-
2006/016 ( PDF )
- Message Modification for Step 21-23 on SHA-0
- Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta
-
2006/015 ( PS PS.GZ )
- A Family of Dunces: Trivial RFID Identification and Authentication Protocols
- Gene Tsudik
-
2006/014 ( PS PS.GZ PDF )
- Sound Computational Interpretation of Symbolic Hashes in the Standard Model
- Flavio D. Garcia and Peter van Rossum
-
2006/013 ( PDF )
- Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
- Hung-Yu Chien
-
2006/012 ( PS PS.GZ PDF )
- Certificate-Based Encryption Without Random Oracles
- Paz Morillo and Carla R`{a}fols
-
2006/011 ( PDF )
- Formal Proof for the Correctness of RSA-PSS
- Christina Lindenberg and Kai Wirt and Johannes Buchmann
-
2006/010 ( PDF )
- Finding Characteristic Polynomials with Jump Indices
- Steve Babbage and Matthew Dodd
-
2006/009 ( PS PS.GZ PDF )
- Breaking and Fixing Public-Key Kerberos
- Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kay Tsay and Christopher Walstad
-
2006/008 ( PS PS.GZ PDF )
- A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
- James A. Muir
-
2006/007 ( PDF )
- Further Discussions on the Security of a Nominative Signature Scheme
- Lifeng Guo and Guilin Wang and Duncan S. Wong
-
2006/006 ( PDF )
- Group Key Agreement for Ad Hoc Networks
- Lijun Liao
-
2006/005 ( PDF )
- Pairing Calculation on Supersingular Genus 2 Curves
- Colm O hEigeartaigh and Michael Scott
-
2006/004 ( PDF )
- Provably Secure Subsitution of Cryptographic Tools
- Lea Kissner and David Molnar
-
2006/003 ( PDF )
- Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
- Dragos Trinca
-
2006/002 ( PDF )
- Geometric constructions of optimal linear perfect hash families
- S.G. Barwick and W.-A. Jackson.
-
2006/001 ( PS PS.GZ PDF )
- Homomorphic Cryptosystems and their Applications
- Doerte K. Rappe
[ Cryptology ePrint archive ]