Cryptology ePrint Archive: Listing for 2007
-
2007/482 ( PDF )
- TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
- Leonardo B. Oliveira and Michael Scott and Julio López and Ricardo Dahab
-
2007/481 ( -- withdrawn -- )
- MAC-free variant of KD04
- Xianhui Lu, Xuejia Lai, Dake He
-
2007/480 ( PDF )
- Differential Fault Analysis on the AES Key Schedule
- Junko Takahashi and Toshinori Fukunaga
-
2007/479 ( PDF )
- An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
- J. Wu and D.R. Stinson
-
2007/478 ( PDF )
- Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
- Dafna Kidron and Yehuda Lindell
-
2007/477 ( PDF )
- Algebraic Side-Channel Collision Attacks on AES
- Andrey Bogdanov and Andrey Pyshkin
-
2007/476 ( PDF )
- Dynamic SHA
- Xu Zijie
-
2007/475 ( PDF )
- Obtaining Universally Composable Security: Towards the Bare Bones of Trust
- Ran Canetti
-
2007/474 ( PDF )
- Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
- Martin Cochran
-
2007/473 ( PDF )
- Authenticated Key Exchange and Key Encapsulation Without Random Oracles
- Tatsuaki Okamoto
-
2007/472 ( PS PS.GZ PDF )
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
- Jean-Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger
-
2007/471 ( PDF )
- Attacks on the WEP protocol
- Erik Tews
-
2007/470 ( PDF )
- Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
- Bodo Möller and Andy Rupp
-
2007/469 ( PDF )
- ID-Based Group Password-Authenticated Key Exchange
- Xun Yi and Raylin Tso and Eiji Okamoto
-
2007/468 ( -- withdrawn -- )
- On the hash function of ODH assumption
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
-
2007/467 ( PS PS.GZ PDF )
- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
- André Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil Vadhan
-
2007/466 ( PDF )
- Improved Impossible Differential Cryptanalysis of CLEFIA
- Wei Wang and Xiaoyun Wang
-
2007/465 ( PDF )
- A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
- Zheng Gong and Xuejia Lai and Kefei Chen
-
2007/464 ( PDF )
- Secure Computation Without Authentication
- Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin
-
2007/463 ( PDF )
- Efficient GF(3m) Multiplication Algorithm for eta T Pairing
- Gen Takahashi and Fumitaka Hoshino and Tetsutaro Kobayashi
-
2007/462 ( PDF )
- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
- Siamak F Shahandashti and Reihaneh Safavi-Naini
-
2007/461 ( PDF )
- Verifiable Attribute-based Encryption
- QiangTang and Dongyao Ji
-
2007/460 ( PS PS.GZ PDF )
- Guarantees for Customers of Incentive Anonymizing Networks
- Timothy Atkinson and Marius Silaghi
-
2007/459 ( PDF )
- Practical Anonymous Divisible E-Cash From Bounded Accumulators
- Man Ho Au and Willy Susilo and Yi Mu
-
2007/458 ( PS PS.GZ PDF )
- Saving Private Randomness in One-Way Functions and Pseudorandom Generators
- Nenad Dedic and Danny Harnik and Leonid Reyzin
-
2007/457 ( PDF )
- Comparing Implementation Efficiency of Ordinary and Squared Pairings
- Christine Abegail Antonio and Tanaka Satoru and Ken Nakamula
-
2007/456 ( -- withdrawn -- )
- Precise Zero-Knowledge in Concurrent Setting
- Ning Ding and Dawu Gu
-
2007/455 ( PDF )
- Analysis and optimization of elliptic-curve single-scalar multiplication
- Daniel J. Bernstein and Tanja Lange
-
2007/454 ( PDF )
- Efficient Certificateless Signatures Suitable for Aggregation
- Rafael Castro and Ricardo Dahab
-
2007/453 ( PDF )
- On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
- Kenneth G. Paterson and Sriramkrishnan Srinivasan
-
2007/452 ( PDF )
- Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
- Ezekiel J. Kachisa and Edward F. Schaefer and Michael Scott
-
2007/451 ( PDF )
- Precise Concurrent Zero Knowledge
- Omkant Pandey and Rafael Pass and Amit Sahai and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam
-
2007/450 ( PDF )
- Short Group Signature without Random Oracles
- Xiaohui Liang and Zhenfu Cao and Jun Shao and Huang Lin
-
2007/449 ( PDF )
- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
- Jacques Patarin and Valérie Nachef and Côme Berbain
-
2007/448 ( PDF )
- Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
- Sergiy Pometun
-
2007/447 ( PDF )
- Weak adaptive chosen ciphertext secure hybrid encryption scheme
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
-
2007/446 ( PDF )
- A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
- Carlos AGUILAR MELCHOR and Philippe GABORIT
-
2007/445 ( PDF )
- Proposal of a new efficient public key system for encryption and digital signatures
- Gerold Grünauer
-
2007/444 ( PDF )
- Tight bounds between algebraic immunity and nonlinearities of high orders
- Lobanov Mikhail
-
2007/443 ( PDF )
- Template Attacks with a Power Model
- Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST
-
2007/442 ( PDF )
- Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
- Neal Koblitz and Alfred Menezes
-
2007/441 ( PS PS.GZ PDF )
- Faster Group Operations on Elliptic Curves
- Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
-
2007/440 ( PDF )
- An Improved Remote User Authentication Scheme using Bilinear Pairings
- Sunder Lal and K.K.Goyal
-
2007/439 ( PDF )
- Multiparty Key Agreement Using Bilinear Map
- Nam-Su Jho and Myung-Hwan Kim and Do Won Hong and Byung-Gil Lee
-
2007/438 ( PDF )
- Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
- Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum
-
2007/437 ( PDF )
- Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
- Cuauhtemoc Mancillas-Lopez and Debrup Chakraborty and Francisco Rodriguez-Henriquez
-
2007/436 ( PS PS.GZ PDF )
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
- Gautham Sekar and Souradyuti Paul and Bart Preneel
-
2007/435 ( PS PS.GZ PDF )
- Irreducibility to the One-More Evaluation Problems: More May Be Less
- Daniel R. L. Brown
-
2007/434 ( PS PS.GZ PDF )
- Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
- Xibin Lin and Chang-An Zhao and Fangguo Zhang and Yanming Wang
-
2007/433 ( PDF )
- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
- Fabien Coelho
-
2007/432 ( PDF )
- Trapdoors for Hard Lattices and New Cryptographic Constructions
- Craig Gentry and Chris Peikert and Vinod Vaikuntanathan
-
2007/431 ( PS PS.GZ PDF )
- Notions of Efficiency in Simulation Paradigm
- Tzer-jen Wei
-
2007/430 ( PDF )
- Cryptanalysis of LASH
- Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang
-
2007/429 ( PS PS.GZ PDF )
- On compressible pairings and their computation
- Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe
-
2007/428 ( PDF )
- Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
- Benjamin Smith
-
2007/427 ( PDF )
- Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
- Sumanta Sarkar and Subhamoy Maitra
-
2007/426 ( PDF )
- Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
- Christine Abegail Antonio, Satoru Tanaka, and Ken Nakamula
-
2007/425 ( PS PS.GZ PDF )
- On prime-order elliptic curves with embedding degrees k=3,4 and 6
- Koray Karabina and Edlyn Teske
-
2007/424 ( PS PS.GZ PDF )
- When e-th Roots Become Easier Than Factoring
- Antoine Joux and David Naccache and Emmanuel Thomé
-
2007/423 ( PDF )
- Finding Low Weight Polynomial Multiples Using Lattices
- Laila El Aimani and Joachim von zur Gathen
-
2007/422 ( PDF )
- Structural Identity-Based Encryption
- Man Ho Au and Siu-Ming Yiu
-
2007/421 ( PS PS.GZ PDF )
- The role of help in Classical and Quantum Zero-Knowledge
- André Chailloux and Iordanis Kerenidis
-
2007/420 ( PDF )
- A Critical Analysis and Improvement of AACS Drive-Host Authentication
- Jiayuan Sui and Douglas R. Stinson
-
2007/419 ( PDF )
- Cryptanalysis of the Random Number Generator of the Windows Operating System
- Leo Dorrendorf and Zvi Gutterman and Benny Pinkas
-
2007/418 ( -- withdrawn -- )
- An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
- Amit K Awasthi
-
2007/417 ( PDF )
- Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi
-
2007/416 ( PS PS.GZ PDF )
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung and Seokhie Hong
-
2007/415 ( PDF )
- Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
-
2007/414 ( PDF )
- Optimizing double-base elliptic-curve single-scalar multiplication
- Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
-
2007/413 ( PDF )
- Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
- Michael Vielhaber
-
2007/412 ( PDF )
- Proposing a Master One-Way Function
- Gideon Samid
-
2007/411 ( PDF )
- Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
-
2007/410 ( PDF )
- Inverted Edwards coordinates
- Daniel J. Bernstein and Tanja Lange
-
2007/409 ( PDF )
- Building a Collision-Resistant Compression Function from Non-Compressing Primitives
- Thomas Shrimpton and Martijn Stam
-
2007/408 ( PDF )
- Differential Cryptanalysis of PRESENT
- Meiqin Wang
-
2007/407 ( -- withdrawn -- )
- Provably Secure Grouping-proofs for RFID tags
- Mike Burmester and Breno de Medeiros and Rossana Motta
-
2007/406 ( PS PS.GZ PDF )
- Modeling Computational Security in Long-Lived Systems
- Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
-
2007/405 ( PDF )
- Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
- Michael Feng-Hao Liu and Chi-Jen Lu and Bo-Yin Yang and Jintai Ding
-
2007/404 ( PDF )
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Jonathan Katz and Amit Sahai and Brent Waters
-
2007/403 ( PDF )
- Turbo SHA-2
- Danilo Gligoroski and Svein Johan Knapskog
-
2007/402 ( PDF )
- Robust, Anonymous RFID Authentication with Constant Key-Lookup
- Mike Burmester and Breno de Medeiros and Rossana Motta
-
2007/401 ( PDF )
- Another Look at Automated Theorem-Proving
- Neal Koblitz
-
2007/400 ( PDF )
- REMARKS ON IBE SCHEME OF WANG AND CAO
- Sunder Lal and Priyam Sharma
-
2007/399 ( PDF )
- Ceremony Design and Analysis
- Carl Ellison
-
2007/398 ( -- withdrawn -- )
- A Short Signature Scheme in the Standard Model
- Li Kang and Xiaohu Tang and Xianhui Lu and Jia Fan
-
2007/397 ( PDF )
- On the security defects of an image encryption scheme
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
-
2007/396 ( PDF )
- Proxy Re-Signature Schemes without Random Oracles
- Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
-
2007/395 ( PS PS.GZ PDF )
- Second Preimage Attacks on Dithered Hash Functions
- Charles Bouillaguet and Pierre-Alain Fouque and Adi Shamir and Sebastien Zimmer
-
2007/394 ( PS PS.GZ PDF )
- Almost-everywhere Secure Computation
- Juan A. Garay and Rafail Ostrovsky
-
2007/393 ( PDF )
- Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
- Haining Fan and Jiaguang Sun and Ming Gu and Kwok-Yan Lam
-
2007/392 ( PDF )
- Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
- Jonathan Trostle and Andy Parrish
-
2007/391 ( PDF )
- A novel public key crypto system based on semi-modules over quotient semi-rings
- Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
-
2007/390 ( PDF )
- Implementing Cryptographic Pairings over Barreto-Naehrig Curves
- Augusto Jun Devegili and Michael Scott and Ricardo Dahab
-
2007/389 ( PDF )
- Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
- Dragos Florin Ciocan and Salil Vadhan
-
2007/388 ( PS PS.GZ PDF )
- On Ciphertext Undetectability
- Peter Gazi and Martin Stanek
-
2007/387 ( -- withdrawn -- )
- Analysis of Local Optima in Block Ciphers
- John A. Clark and Juan M. E. Tapiador
-
2007/386 ( PS PS.GZ PDF )
- (Convertible) Undeniable Signatures without Random Oracles
- Tsz Hon Yuen and Man Ho Au and Joseph K. Liu and Willy Susilo
-
2007/385 ( PDF )
- On the insecurity of interchanged use of OFB and CBC modes of operation
- Danilo Gligoroski
-
2007/384 ( PS PS.GZ PDF )
- Non-Interactive Anonymous Credentials
- Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
-
2007/383 ( PDF )
- Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
- Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
-
2007/382 ( PDF )
- Oblivious Transfer via McEliece's PKC and Permuted Kernels
- K. Kobara and K. Morozov and R. Overbeck
-
2007/381 ( PDF )
- Cryptanalysis of Two New Instances of TTM Cryptosystem
- Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding
-
2007/380 ( PS PS.GZ PDF )
- X-FCSR: a new software oriented stream cipher based upon FCSRs
- Francois Arnault, Thierry P. Berger, Cédric Lauradoux and Marine Minier
-
2007/379 ( PDF )
- On The Inequivalence Of Ness-Helleseth APN Functions
- Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang
-
2007/378 ( PDF )
- Algebraic Structure Defectoscopy
- Sean O'Neil
-
2007/377 ( -- withdrawn -- )
- Fast Point Multiplication on Elliptic Curves of Even Order
- Rongquan Feng, Hongfeng Wu
-
2007/376 ( PDF )
- An Efficient Range-Bounded Commitment Scheme
- Zhengjun Cao
-
2007/375 ( PDF )
- Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
- Gregory Hirshman
-
2007/374 ( PS PS.GZ PDF )
- On Factoring Arbitrary Integers with Known Bits
- Mathias Herrmann and Alexander May
-
2007/373 ( PS PS.GZ PDF )
- A Meet-in-the-Middle Collision Attack Against the New FORK-256
- Markku-Juhani O. Saarinen
-
2007/372 ( PDF )
- On the Authentication of One Popular Signcryption Scheme
- Zhengjun Cao
-
2007/371 ( PDF )
- Group-oriented encryption secure against collude attack
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/370 ( PDF )
- FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
- Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu
-
2007/369 ( PDF )
- Universally Composable Multi-Party Computation with an Unreliable Common Reference String
- Vipul Goyal and Jonathan Katz
-
2007/368 ( PDF )
- Reducing Trust in the PKG in Identity Based Cryptosystems
- Vipul Goyal
-
2007/367 ( PDF )
- Cryptanalysis of Rational Multivariate Public Key Cryptosystems
- Jintai Ding and John Wagner
-
2007/366 ( PDF )
- Breaking the Symmetry: a Way to Resist the New Differential Attack
- Jintai Ding and Bo-Yin Yang and Chen-Mou Cheng and Owen Chen and Vivien Dubois
-
2007/365 ( PS PS.GZ PDF )
- Pairings on Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshoj
-
2007/364 ( PDF )
- A Proof of Security of a Mesh Security Architecture
- Doug Kuhlman and Ryan Moriarty and Tony Braskich and Steve Emeott and Mahesh Tripunitara
-
2007/363 ( PDF )
- Fuzzy Private Matching (Extended Abstract)
- Łukasz Chmielewski and Jaap-Henk Hoepman
-
2007/362 ( PDF )
- Statistical Testing for Disk Encryption Modes of Operations
- Mohamed Abo El-Fotouh and Klaus Diepold
-
2007/361 ( PDF )
- Proxy Re-encryption Systems for Identity-based Encryption
- Toshihiko Matsuo
-
2007/360 ( PDF )
- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
- Andy Rupp and Gregor Leander and Endre Bangerter and Ahmad-Reza Sadeghi and Alexander W. Dent
-
2007/359 ( PDF )
- Intrusion-Resilient Secret Sharing
- Stefan Dziembowski and Krzysztof Pietrzak
-
2007/358 ( PDF )
- Improving the Round Complexity of VSS in Point-to-Point Networks
- Jonathan Katz and Chiu-Yuen Koo and Ranjit Kumaresan
-
2007/357 ( PDF )
- A Note on Signature Standards
- Michael Braun and Anton Kargl
-
2007/356 ( PS PS.GZ PDF )
- A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
- Christophe Petit and Francois-Xavier Standaert and Olivier Pereira and Tal G. Malkin and Moti Yung
-
2007/355 ( PDF )
- Secret sharing on the infinite ladder
- Laszlo Csirmaz
-
2007/354 ( PDF )
- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
- Cheng-Kang Chu and Wen-Guey Tzeng
-
2007/353 ( PS PS.GZ PDF )
- Multiparty Computation to Generate Secret Permutations
- Chris Studholme and Ian Blake
-
2007/352 ( PS PS.GZ PDF )
- New Local Collisions for the SHA-2 Hash Family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2007/351 ( PS PS.GZ PDF )
- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
- Iftach Haitner and Jonathan J. Hoch and Gil Segev
-
2007/350 ( PS PS.GZ )
- On Tweaking Luby-Rackoff Blockciphers
- David Goldenberg and Susan Hohenberger and Moses Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu
-
2007/349 ( PS PS.GZ PDF )
- Statistically Hiding Sets
- Manoj Prabhakaran and Rui Xue
-
2007/348 ( PDF )
- A Framework for Efficient and Composable Oblivious Transfer
- Chris Peikert and Vinod Vaikuntanathan and Brent Waters
-
2007/347 ( PDF )
- Lai-Massey Scheme and Quasi-Feistel Networks
- Aaram Yun and Je Hong Park and Jooyoung Lee
-
2007/346 ( -- withdrawn -- )
- Secure multi-party computation on incomplete networks
- Shailesh Vaya
-
2007/345 ( PDF )
- Analysis of Underlying Assumptions in NIST DRBGs
- Wilson Kan
-
2007/344 ( PDF )
- Security Analysis of WAPI Authentication and Key Exchange Protocol
- Liufei Wu,Yuqing Zhang, FengjiaoWang
-
2007/343 ( PS PS.GZ PDF )
- Updated standards for validating elliptic curves
- Laura Hitt
-
2007/342 ( PDF )
- A New Security Model for Cross-Realm C2C-PAKE Protocol
- Fengjiao Wang and Yuqing Zhang
-
2007/341 ( PDF )
- Multi-Party Indirect Indexing and Applications
- Matthew Franklin and Mark Gondree and Payman Mohassel
-
2007/340 ( PDF )
- Efficient Implementation of the Pairing on Mobilephones using BREW
- Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka
-
2007/339 ( PDF )
- On the security of a class of image encryption schemes
- Chengqing Li and Guanrong Chen
-
2007/338 ( PS PS.GZ PDF )
- VHASH Security
- Wei Dai and Ted Krovetz
-
2007/337 ( PDF )
- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
- W. Bamberger and O. Welter and S. Spitz and M. Marhöfer
-
2007/336 ( PDF )
- A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
- Onur Aciicmez and Werner Schindler
-
2007/335 ( PDF )
- Encryption Techniques for Secure Database Outsourcing
- Sergei Evdokimov and Oliver Guenther
-
2007/334 ( PDF )
- New Constructions for UC Secure Computation using Tamper-proof Hardware
- Nishanth Chandran and Vipul Goyal and Amit Sahai
-
2007/333 ( PS PS.GZ PDF )
- Towards Key-Dependent Message Security in the Standard Model
- Dennis Hofheinz and Dominique Unruh
-
2007/332 ( PS PS.GZ PDF )
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
-
2007/331 ( PS PS.GZ PDF )
- Isolated Proofs of Knowledge and Isolated Zero Knowledge
- Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
-
2007/330 ( PS PS.GZ PDF )
- Remote Power Analysis of {RFID} Tags
- Yossi Oren
-
2007/329 ( PDF )
- A Tunable Broadcast Encryption Scheme
- David Lubicz and Thomas Sirvent
-
2007/328 ( PDF )
- A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
- Ivan Damgaard and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner
-
2007/327 ( PDF )
- Secure Identification and QKD in the Bounded-Quantum-Storage Model
- Ivan Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
-
2007/326 ( PDF )
- Efficient Password-based Authenticated Key Exchange without Public Information
- Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu
-
2007/325 ( PS PS.GZ )
- Faster and Shorter Password-Authenticated Key Exchange
- Rosario Gennaro
-
2007/324 ( PDF )
- Towards provable security for route discovery protocols in mobile ad hoc networks
- Mike Burmester and Breno de Medeiros
-
2007/323 ( PDF )
- Attribute-Based Encryption with Non-Monotonic Access Structures
- Rafail Ostrovsky and Amit Sahai and Brent Waters
-
2007/322 ( PS PS.GZ PDF )
- Identifying Ideal Lattices
- Jintai Ding and Richard Lindner
-
2007/321 ( PDF )
- Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
- Selcuk Kavut and Melek Diker Yucel
-
2007/320 ( PDF )
- On the Big Gap Between $|p|$ and $|q|$ in DSA
- Zhengjun Cao
-
2007/319 ( PDF )
- A New Security Definition for Public Key Encryption Schemes and Its Applications
- Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng
-
2007/318 ( PDF )
- On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
- Michael Neve and Kris Tiri
-
2007/317 ( PDF )
- Improving Upon the TET Mode of Operation
- Palash Sarkar
-
2007/316 ( PDF )
- SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
- Sunder Lal and Priyam Sharma
-
2007/315 ( PDF )
- Security under Key-Dependent Inputs
- Shai Halevi and Hugo Krawczyk
-
2007/314 ( -- withdrawn -- )
- Formal Certification of Code-Based Cryptographic Proofs
- G. Barthe and B. Grégoire and R. Janvier and S. Zanella Béguelin
-
2007/313 ( PS PS.GZ PDF )
- Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
- Shengbao Wang and Zhenfu Cao and Zhaohui Cheng and Kim-Kwang Raymond Choo
-
2007/312 ( PDF )
- Secure Similarity Search
- Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan
-
2007/311 ( PDF )
- A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
- Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2007/310 ( PDF )
- A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
- Kwang Ho Kim
-
2007/309 ( PDF )
- Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
- Subhamoy Maitra
-
2007/308 ( PDF )
- Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
- Selcuk Kavut and Melek Diker Yucel
-
2007/307 ( PS PS.GZ PDF )
- Locally Invertible Boolean Mappings
- Oleg A. Logachev
-
2007/306 ( PDF )
- Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
- Thanh-Ha Le and Quoc-Thinh Nguyen-Vuong and Cécile Canovas and Jessy Clédière
-
2007/305 ( PDF )
- On Non-Randomness of the Permutation after RC4 Key Scheduling
- Goutam Paul and Subhamoy Maitra and Rohit Srivastava
-
2007/304 ( PDF )
- A Bound on the Size of Separating Hash Families
- Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson and Gregory M. Zaverucha
-
2007/303 ( PDF )
- A Forward Secure Remote User Authentication Scheme
- Manoj Kumar
-
2007/302 ( PDF )
- Compression Functions Suitable for the Multi-Property-Preserving Transform
- Hidenori Kuwakado and Masakatu Morii
-
2007/301 ( PDF )
- On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
- Yuri Borissov and Moon Ho Lee and Svetla Nikova
-
2007/300 ( PS PS.GZ PDF )
- A Note on Automata-based Dynamic Convolutional Cryptosystems
- Renji Tao
-
2007/299 ( PDF )
- Optimizing Multiprecision Multiplication for Public Key Cryptography
- Michael Scott and Piotr Szczechowiak
-
2007/298 ( PDF )
- The Security of the Extended Codebook (XCB) Mode of Operation
- David A. McGrew and Scott R. Fluhrer
-
2007/297 ( PDF )
- Secret sharing on infinite graphs
- Laszlo Csirmaz
-
2007/296 ( PDF )
- Construction of Efficient and Secure Pairing Algorithm and its Application
- Doo Ho Choi, Dong-Guk Han, and Howon Kim
-
2007/295 ( PS PS.GZ PDF )
- Linearization Attacks Against Syndrome Based Hashes
- Markku-Juhani O. Saarinen
-
2007/294 ( PDF )
- Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
- Julien Bringer and Herve Chabanne and Thomas Icart
-
2007/293 ( PDF )
- Fully Resilient Traitor Tracing Scheme using Key Update
- Eun Sun Yoo, Koutarou Suzuki and Myung-Hwan Kim
-
2007/292 ( PDF )
- Improved security analysis of OMAC
- Mridul Nandi
-
2007/291 ( PDF )
- Relations Among Notions of Plaintext Awareness
- James Birkett and Alexander W. Dent
-
2007/290 ( PDF )
- Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
- Sumanta Sarkar and Subhamoy Maitra
-
2007/289 ( PDF )
- Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
- Michael Backes and Matteo Maffei and Dominique Unruh
-
2007/288 ( PS PS.GZ PDF )
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Dennis Hofheinz and Eike Kiltz
-
2007/287 ( PDF )
- The Effectiveness of Receipt-Based Attacks on ThreeBallot
- Kevin Henry and Douglas R. Stinson and Jiayuan Sui
-
2007/286 ( PDF )
- Faster addition and doubling on elliptic curves
- Daniel J. Bernstein and Tanja Lange
-
2007/285 ( PDF )
- Solving MRHS linear equations
- Håvard Raddum and Igor Semaev
-
2007/284 ( -- withdrawn -- )
- No title
- No Author
-
2007/283 ( PDF )
- Provably Secure Framework for Information Aggregation is Sensor Networks
- Mark Manulis and Joerg Schwenk
-
2007/282 ( PDF )
- Analysis of countermeasures against access driven cache attacks on AES
- Johannes Blömer \and Volker Krummel
-
2007/281 ( PDF )
- A Pollard-like pseudorandom number generator over EC
- Grzegorz Wojtenko
-
2007/280 ( PDF )
- On solving sparse algebraic equations over finite fields II
- Igor Semaev
-
2007/279 ( PDF )
- Lossy Trapdoor Functions and Their Applications
- Chris Peikert and Brent Waters
-
2007/278 ( PDF )
- A Framework for Iterative Hash Functions - HAIFA
- Eli Biham and Orr Dunkelman
-
2007/277 ( PS PS.GZ PDF )
- Cryptanalysis of a class of cryptographic hash functions
- Praveen Gauravaram and John Kelsey
-
2007/276 ( PDF )
- Prolific Codes with the Identifiable Parent Property
- Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
-
2007/275 ( PDF )
- `Good' Pseudo-Random Binary Sequences from Elliptic Curves
- Zhixiong CHEN and Guozhen XIAO
-
2007/274 ( PDF )
- Group-based Proxy Re-encryption scheme
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/273 ( PDF )
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
- Mihir Bellare and Sarah Shoup
-
2007/272 ( PS PS.GZ PDF )
- Cryptanalysis of a Hash Function Proposed at ICISC 2006
- Willi Geiselmann and Rainer Steinwandt
-
2007/271 ( PDF )
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Mihir Bellare and Thomas Ristenpart
-
2007/270 ( PDF )
- Secret Ballot Elections with Unconditional Integrity
- David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora
-
2007/269 ( PDF )
- Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
- Jeroen van de Graaf
-
2007/268 ( PDF )
- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
- Erik Dahmen and Katsuyuki Okeya and Daniel Schepers
-
2007/267 ( PDF )
- CRUST: Cryptographic Remote Untrusted Storage without Public Keys
- Erel Geron and Avishai Wool
-
2007/266 ( PDF )
- Filling the Gap between Voters and Cryptography in e-Voting
- Wei Han and Dong Zheng and Ke-fei Chen
-
2007/265 ( PDF )
- Which Languages Have 4-Round Zero-Knowledge Proofs?
- Jonathan Katz
-
2007/264 ( PDF )
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Thomas Ristenpart and Scott Yilek
-
2007/263 ( -- withdrawn -- )
- Efficiency Improvement for NTRU
- Johannes Buchmann and Martin Döring and Richard Lindner
-
2007/262 ( PS PS.GZ PDF )
- Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
- Yong Ho Hwang and Joseph K. Liu and Sherman S.M. Chow
-
2007/261 ( PDF )
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Subhamoy Maitra and Goutam Paul
-
2007/260 ( PDF )
- An Efficient One-move Nominative Signature Scheme
- Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong
-
2007/259 ( PDF )
- Algebraic Immunity Hierarchy of Boolean Functions
- Ziran Tu and Yingpu Deng
-
2007/258 ( PDF )
- UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
- Ulrich Kaiser
-
2007/257 ( PDF )
- A Forward-Secure Signature with Backward-Secure Detection
- Dai-Rui Lin and Chih-I Wang
-
2007/256 ( PDF )
- Aspects of Pairing Inversion
- S. D. Galbraith and F. Hess and F. Vercauteren
-
2007/255 ( -- withdrawn -- )
- Efficient Identity Based Signature in Standard Model
- S.Narayan
-
2007/254 ( -- withdrawn -- )
- Fully Secure Proxy Re-Encryption without Random Oracles
- Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
-
2007/253 ( PDF )
- Choosing the correct elliptic curve in the CM method
- K. Rubin and A. Silverberg
-
2007/252 ( PDF )
- A Verifiable Voting Protocol based on Farnel
- Roberto Araujo, Ricardo Felipe Custodio, and Jeroen van de Graaf
-
2007/251 ( PS PS.GZ PDF )
- A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
- Véronique Cortier and Ralf Kuesters and Bogdan Warinschi
-
2007/250 ( PDF )
- Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
- Hongzhen Du and Qiaoyan Wen
-
2007/249 ( PDF )
- Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
- Serge Fehr and Christian Schaffner
-
2007/248 ( PS PS.GZ PDF )
- 1. AES seems weak. 2. Linear time secure cryptography
- Warren D. Smith
-
2007/247 ( PS PS.GZ PDF )
- A Note on the Ate Pairing
- Chang-An Zhao and Fangguo Zhang and Jiwu Huang
-
2007/246 ( PDF )
- BEDA: Button-Enabled Device Pairing
- Claudio Soriente and Gene Tsudik and Ersin Uzun
-
2007/245 ( PS PS.GZ PDF )
- Incorporating Temporal Capabilities in Existing Key Management Schemes
- Mikhail J. Atallah and Marina Blanton and Keith B. Frikken
-
2007/244 ( PDF )
- A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
- Martin Hlavac and Tomas Rosa
-
2007/243 ( -- withdrawn -- )
- PORs: Proofs of Retrievability for Large Files
- Ari Juels and Burton S. Kaliski Jr.
-
2007/242 ( PDF )
- Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
- Khoongming Khoo, Guanhan Chew, Guang Gong and Hian-Kiat Lee
-
2007/241 ( PDF )
- Attribute Based Group Signature with Revocation
- Dalia Khader
-
2007/240 ( PDF )
- A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
- George I. Davida and Jeremy A. Hansen
-
2007/239 ( PS PS.GZ PDF )
- Making Large Hash Functions From Small Compression Functions
- William R. Speirs and Ian Molloy
-
2007/238 ( PDF )
- Long-lived digital integrity using short-lived hash functions
- Stuart Haber
-
2007/237 ( PDF )
- Forward-secure Key Evolution in Wireless Sensor Networks
- Marek Klonowski and Mirosław Kutyłowski and Michał Ren and Katarzyna Rybarczyk
-
2007/236 ( PS PS.GZ PDF )
- Certificateless Ring Signatures
- Sherman S.M. Chow and Wun-She Yap
-
2007/235 ( PDF )
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Matthew Green and Susan Hohenberger
-
2007/234 ( PDF )
- Provable-Security Analysis of Authenticated Encryption in Kerberos
- Alexandra Boldyreva and Virendra Kumar
-
2007/233 ( PDF )
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
- Michael Backes and Markus Duermuth and Ralf Kuesters
-
2007/232 ( -- withdrawn -- )
- A new paradigm of chosen ciphertext secure public key encryption scheme
- Xianhui Lu, Xuejia Lai, Dake He
-
2007/231 ( PS PS.GZ PDF )
- Secure Two-Party k-Means Clustering
- Paul Bunn and Rafail Ostrovsky
-
2007/230 ( PS PS.GZ PDF )
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
- Gautham Sekar and Souradyuti Paul and Bart Preneel
-
2007/229 ( PS PS.GZ PDF )
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Ueli Maurer and Stefano Tessaro
-
2007/228 ( PS PS.GZ PDF )
- AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
- Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi
-
2007/227 ( PDF )
- Related-Key Statistical Cryptanalysis
- Darakhshan J. Mir and Poorvi L. Vora
-
2007/226 ( PDF )
- Generalized mix functions and orthogonal equitable rectangles
- Douglas R. Stinson
-
2007/225 ( PDF )
- On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
- Shengli Liu and Xiaofeng Chen and Fangguo Zhang
-
2007/224 ( PDF )
- A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
- *Jue-Sam Chou 1, Guey-Chuen Lee 2, Chung-Ju Chan 3
-
2007/223 ( PS PS.GZ PDF )
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- John Black and Martin Cochran and Thomas Shrimpton
-
2007/222 ( PS PS.GZ PDF )
- Towards Security Limits in Side-Channel Attacks
- Francois-Xavier Standaert and Eric Peeters and Cedric Archambeau and Jean-Jacques Quisquater
-
2007/221 ( PS PS.GZ PDF )
- Generalized Key Delegation for Hierarchical Identity-Based Encryption
- Michel Abdalla and Eike Kiltz and Gregory Neven
-
2007/220 ( PDF )
- A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
- Fengjiao WANG and Yuqing ZHANG
-
2007/219 ( PDF )
- A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
- Liufei Wu1, 2, Yuqing Zhang1, Fengjiao Wang1
-
2007/218 ( PDF )
- Differential Cryptanalysis in Stream Ciphers
- Eli Biham and Orr Dunkelman
-
2007/217 ( PS PS.GZ PDF )
- Identity-Based Broadcast Encryption
- Ryuichi Sakai and Jun Furukawa
-
2007/216 ( PS PS.GZ PDF )
- Unlinkable Divisible Digital Cash without Trusted Third Party
- Pawel Pszona and Grzegorz Stachowiak
-
2007/215 ( PS PS.GZ PDF )
- Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
- Jesper Buus Nielsen
-
2007/214 ( PDF )
- Matrix Power S-Box Construction
- Eligijus Sakalauskas and Kestutis Luksys
-
2007/213 ( PDF )
- Unlinkable Randomizable Signature and Its Application in Group Signature
- Sujing Zhou and Dongdai Lin
-
2007/212 ( PDF )
- The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
- Andrey Khalyavin
-
2007/211 ( PDF )
- Scalable Storage Scheme from Forward Key Rotation
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/210 ( -- withdrawn -- )
- Efficient chosen ciphertext secure PKE scheme with short ciphertext
- Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
-
2007/209 ( PDF )
- Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
- Liqun Chen and Qiang Tang
-
2007/208 ( PDF )
- RC4 State Information at Any Stage Reveals the Secret Key
- Goutam Paul and Subhamoy Maitra
-
2007/207 ( PDF )
- On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
-
2007/206 ( PS PS.GZ PDF )
- Automatic Search of Differential Path in MD4
- Pierre-Alain Fouque and Gaetan Leurent and Phong Nguyen
-
2007/205 ( PS PS.GZ PDF )
- A kilobit special number field sieve factorization
- Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen Lenstra and Dag Arne Osvik
-
2007/204 ( PDF )
- Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
- Shu Yun Lim and Chuan Chin Pu and Hyo Taek Lim and Hoon Jae Lee
-
2007/203 ( PDF )
- Kipnis-Shamir's Attack on HFE Revisited
- Xin Jiang and Jintai Ding and Lei Hu
-
2007/202 ( PDF )
- Provable Data Possession at Untrusted Stores
- Giuseppe Ateniese and Randal Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary Peterson and Dawn Song
-
2007/201 ( PDF )
- The BBG HIBE Has Limited Delegation
- Hovav Shacham
-
2007/200 ( PDF )
- ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
- Philip Atzemoglou and Tal Malkin
-
2007/199 ( PDF )
- A Framework for Game-Based Security Proofs
- David Nowak
-
2007/198 ( PS PS.GZ PDF )
- Mutual Information Analysis -- A Universal Differential Side-Channel Attack
- Benedikt Gierlichs and Lejla Batina and Pim Tuyls
-
2007/197 ( PS PS.GZ PDF )
- On-Line Ciphers and the Hash-CBC Constructions
- Mihir Bellare and Alexandra Boldyreva and Lars Knudsen and Chanathip Namprempre
-
2007/196 ( -- withdrawn -- )
- An Efficient Certificateless Signature Scheme
- Rafael Castro and Ricardo Dahab
-
2007/195 ( PDF )
- Verifying Statistical Zero Knowledge with Approximate Implementations
- Ling Cheung and Sayan Mitra and Olivier Pereira
-
2007/194 ( PDF )
- Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
- Ernie Brickell and Jiangtao Li
-
2007/193 ( PDF )
- Some Identity Based Strong Bi-Designated Verifier Signature Schemes
- Sunder Lal and Vandani Verma
-
2007/192 ( PDF )
- Optimal Irreducible Polynomials for GF(2^m) Arithmetic
- Michael Scott
-
2007/191 ( PDF )
- Deniable Internet Key-Exchange
- Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
-
2007/190 ( PDF )
- Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
- Tian Yuan
-
2007/189 ( PS PS.GZ PDF )
- An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee
-
2007/188 ( PDF )
- A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
- Kim-Kwang Raymond Choo
-
2007/187 ( PDF )
- Executing Modular Exponentiation on a Graphics Accelerator
- Andrew Moss and Dan Page and Nigel Smart
-
2007/186 ( PS PS.GZ PDF )
- Fully Anonymous Group Signatures without Random Oracles
- Jens Groth
-
2007/185 ( PDF )
- New FORK-256
- Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee
-
2007/184 ( PDF )
- Provable password-based tripartite key agreement protocol
- Chunbo Ma, Jun Ao, and Jianhua Li
-
2007/183 ( PDF )
- Provably Secure Ciphertext Policy ABE
- Ling Cheung and Calvin Newport
-
2007/182 ( PDF )
- Optimistic Fair Exchange in a Multi-user Setting
- Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum
-
2007/181 ( PDF )
- A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
- Kwang Ho Kim and So In Kim
-
2007/180 ( PDF )
- A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
- *Jue-Sam Chou 1, Yalin Chen 2, Tsung-Heng Chen 3
-
2007/179 ( PDF )
- New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
- Kwang Ho Kim and So In Kim and Ju Song Choe
-
2007/178 ( PS PS.GZ )
- Utility Sampling for Trust Metrics in PKI
- Dakshi Agrawal and Charanjit Jutla
-
2007/177 ( PDF )
- Space-Efficient Identity Based Encryption Without Pairings
- Dan Boneh and Craig Gentry and Michael Hamburg
-
2007/176 ( PS PS.GZ PDF )
- Seven-Property-Preserving Iterated Hashing: ROX
- Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton
-
2007/175 ( PDF )
- Embedding Degree of Hyperelliptic Curves with Complex Multiplication
- Christian Robenhagen Ravnshoj
-
2007/174 ( PS PS.GZ PDF )
- Counting hyperelliptic curves that admit a Koblitz model
- Cevahir Demirkiran and Enric Nart
-
2007/173 ( PDF )
- Provable Secure Generalized Signcryption
- Xu An Wang and Xiaoyuan Yang and Yiliang Han
-
2007/172 ( PDF )
- Batch Verification of Short Signatures
- Jan Camenisch and Susan Hohenberger and Michael Østergaard Pedersen
-
2007/171 ( PDF )
- Chosen-Ciphertext Secure Proxy Re-Encryption
- Ran Canetti and Susan Hohenberger
-
2007/170 ( PDF )
- Clone Resistant Mutual Authentication for Low-Cost RFID Technology
- Stephane Lemieux and Adrian Tang
-
2007/169 ( PDF )
- On the Security of Protocols with Logarithmic Communication Complexity
- Michael Backes and Dominique Unruh
-
2007/168 ( PDF )
- Random Oracles and Auxiliary Input
- Dominique Unruh
-
2007/167 ( PDF )
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
- Yi-Ru Liu, Wen-Guey Tzeng
-
2007/166 ( PS PS.GZ PDF )
- Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
- Junghyun Nam
-
2007/165 ( PDF )
- Inductive Proof Method for Computational Secrecy
- Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
-
2007/164 ( PDF )
- Yet Another MicroArchitectural Attack: Exploiting I-cache
- Onur Aciicmez
-
2007/163 ( PDF )
- Secure Deniable Authenticated Key Establishment for Internet Protocols
- Meng-Hui Lim and Sanggon Lee and Youngho Park and Sangjae Moon
-
2007/162 ( PS PS.GZ PDF )
- Bingo Voting: Secure and coercion-free voting using a trusted random number generator
- Jens-Matthias Bohli and Joern Mueller-Quade and Stefan Roehrich
-
2007/161 ( PDF )
- Collusion-Resistant Group Key Management Using Attribute-Based Encryption
- Ling Cheung and Joseph A. Cooley and Roger Khazan and Calvin Newport
-
2007/160 ( PS PS.GZ )
- Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
- Muxiang Zhang
-
2007/159 ( PDF )
- Attribute Based Group Signatures
- Dalia Khader
-
2007/158 ( PS PS.GZ PDF )
- A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
- Mridul Nandi
-
2007/157 ( PDF )
- ConSum v0: An Experimental Cipher
- David A. Madore
-
2007/156 ( PDF )
- Computational Semantics for Basic Protocol Logic - A Stochastic Approach
- Gergei Bana and Koji Hasebe and Mitsuhiro Okada
-
2007/155 ( PS PS.GZ PDF )
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Jens Groth and Amit Sahai
-
2007/154 ( PDF )
- Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
- Danilo Gligoroski and Svein Johan Knapskog
-
2007/153 ( PS PS.GZ PDF )
- Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
- Aggelos Kiayias and Moti Yung
-
2007/152 ( PS PS.GZ PDF )
- CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
- Nicolas T. Courtois
-
2007/151 ( PS PS.GZ PDF )
- Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
- Tal Moran and Moni Naor and Gil Segev
-
2007/150 ( PS PS.GZ PDF )
- Generators of Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshoj
-
2007/149 ( PS PS.GZ PDF )
- Towards Generating Secure Keys for Braid Cryptography
- Ki Hyoung Ko and Jang Won Lee and Tony Thomas
-
2007/148 ( PDF )
- Practical Compact E-Cash
- Man Ho Au and Willy Susilo and Yi Mu
-
2007/147 ( PDF )
- Using decision problems in public key cryptography
- Vladimir Shpilrain and Gabriel Zapata
-
2007/146 ( PDF )
- Time Capsule Signature: Efficient and Provably Secure Constructions
- Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng
-
2007/145 ( PS PS.GZ PDF )
- Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
- Iftach Haitner and Jonathan J. Hoch and Omer Reingold and Gil Segev
-
2007/144 ( PS PS.GZ )
- Two New Examples of TTM
- T.Moh
-
2007/143 ( PDF )
- Offline/Online Mixing
- Ben Adida and Douglas Wikström
-
2007/142 ( PDF )
- An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
- Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
-
2007/141 ( PDF )
- Practical Cryptanalysis of SFLASH
- Vivien Dubois and Pierre-Alain Fouque and Adi Shamir and Jacques Stern
-
2007/140 ( PDF )
- Hidden Identity-Based Signatures
- Aggelos Kiayias and Hong-Sheng Zhou
-
2007/139 ( PDF )
- The Delivery and Evidences Layer
- Amir Herzberg and Igal Yoffe
-
2007/138 ( PS PS.GZ PDF )
- Efficient Pairing Computation on Curves
- Rongquan Feng and Hongfeng Wu
-
2007/137 ( PDF )
- Multivariates Polynomials for Hashing
- Jintai Ding and Bo-yin Yang
-
2007/136 ( -- withdrawn -- )
- Fair Exchange Signature Schemes
- Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
-
2007/135 ( PDF )
- Efficient ID-based Signature Without Trusted PKG
- Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
-
2007/134 ( PDF )
- Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
- Osman Kocar
-
2007/133 ( PDF )
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Helger Lipmaa
-
2007/132 ( PDF )
- Equivocal Blind Signatures and Adaptive UC-Security
- Aggelos Kiayias and Hong-Sheng Zhou
-
2007/131 ( PDF )
- Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
- Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi-Naini
-
2007/130 ( PDF )
- Some Results on Anonymity in Hybrid Encryption
- Tian Yuan and Chen Zhi-Yu and Jin Yuee and Jin Feng and Ma Huihui
-
2007/129 ( PS PS.GZ PDF )
- An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
- Cameron McDonald, Chris Charnes, Josef Pieprzyk
-
2007/128 ( PS PS.GZ PDF )
- Computationally Sound Mechanized Proofs of Correspondence Assertions
- Bruno Blanchet
-
2007/127 ( PS PS.GZ PDF )
- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
- Vanesa Daza and Javier Herranz and Paz Morillo and Carla Ràfols
-
2007/126 ( PDF )
- An Interesting Member ID-based Group Signature
- Sujing Zhou and Dongdai Lin
-
2007/125 ( PDF )
- Attacking the IPsec Standards in Encryption-only Configurations
- Jean Paul Degabriele and Kenneth G. Paterson
-
2007/124 ( PDF )
- Rebuttal of overtaking VEST
- Benjamin Gittins and Howard Landman
-
2007/123 ( PDF )
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Berkant Ustaoglu
-
2007/122 ( PDF )
- On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
- Qiang Tang
-
2007/121 ( PS PS.GZ PDF )
- Certificateless Encryption Schemes Strongly Secure in the Standard Model
- Alexander W. Dent and Benoit Libert and Kenneth G. Paterson
-
2007/120 ( PDF )
- Breaking 104 bit WEP in less than 60 seconds
- Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
-
2007/119 ( PDF )
- Rerandomizable RCCA Encryption
- Manoj Prabhakaran and Mike Rosulek
-
2007/118 ( PDF )
- Smooth Projective Hashing and Two-Message Oblivious Transfer
- Shai Halevi and Yael Tauman Kalai
-
2007/117 ( PDF )
- Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
- Sihem Mesnager
-
2007/116 ( PDF )
- A Zero-Knowledge Identification and Key Agreement Protocol
- D.R. Stinson and J. Wu
-
2007/115 ( PDF )
- Quadratic Almost Perfect Nonlinear Functions With Many Terms
- Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire
-
2007/114 ( PDF )
- High Efficiency Feedback Shift Register: $\sigma-$LFSR
- Guang Zeng and Wenbao Han and Kaicheng He
-
2007/113 ( PDF )
- An Enhanced ID-based Deniable Authentication Protocol on Pairings
- Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
-
2007/112 ( PDF )
- Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
- Koh-ichi Nagao
-
2007/111 ( PS PS.GZ PDF )
- Privacy-Preserving Distributed Set Intersection
- Qingsong Ye and Huaxiong Wang and Christophe Tartary
-
2007/110 ( PDF )
- Construction of Pairing-Friendly Elliptic Curves
- Woo Sug Kang
-
2007/109 ( PDF )
- How to Enrich the Message Space of a Cipher
- Thomas Ristenpart and Phillip Rogaway
-
2007/108 ( PDF )
- An Improved Distinguisher for Dragon
- Joo Yeon Cho and Josef Pieprzyk
-
2007/107 ( PDF )
- Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
- Yasuyuki MURAKAMI, Takeshi NASAKO
-
2007/106 ( PDF )
- A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
- Masao KASAHARA
-
2007/105 ( PS PS.GZ PDF )
- Isodual Reduction of Lattices
- Nicholas A. Howgrave-Graham
-
2007/104 ( PS PS.GZ PDF )
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel
-
2007/103 ( PDF )
- Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
- Roberto Avanzi
-
2007/102 ( PDF )
- On the Role of Scheduling in Simulation-Based Security
- Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira
-
2007/101 ( PS PS.GZ PDF )
- Practical Password Recovery on an MD5 Challenge and Response
- Yu Sasaki and Go Yamamoto and Kazumaro Aoki
-
2007/100 ( PS PS.GZ PDF )
- Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
- Shengbao Wang and Zhenfu Cao
-
2007/099 ( PDF )
- Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
- Jaime Gutierrez and Alvar Ibeas
-
2007/098 ( PS PS.GZ PDF )
- Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
- Lilya Budaghyan and Claude Carlet
-
2007/097 ( PS PS.GZ PDF )
- Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
- Christian Robenhagen Ravnshøj
-
2007/096 ( PS PS.GZ PDF )
- Somos Sequence Near-Addition Formulas and Modular Theta Functions
- R. Wm. Gosper and Rich Schroeppel
-
2007/095 ( PDF )
- Generic Certificateless Encryption in the Standard Model
- Qiong Huang and Duncan S. Wong
-
2007/094 ( PDF )
- Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
- Xavier Boyen
-
2007/093 ( PDF )
- HAPADEP: Human Asisted Pure Audio Device Pairing
- Claudio Soriente, Gene Tsudik, Ersin Uzun
-
2007/092 ( PDF )
- PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
- Grzegorz Wojtenko
-
2007/091 ( PDF )
- Arithmetic Operators for Pairing-Based Cryptography
- Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto
-
2007/090 ( -- withdrawn -- )
- On the security of an image encryption scheme
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
-
2007/089 ( PS PS.GZ PDF )
- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
- Ueli Maurer and Dominik Raub
-
2007/088 ( PDF )
- An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
- Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
-
2007/087 ( PDF )
- Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
- Jie Liu and Jianhua Li
-
2007/086 ( PS PS.GZ PDF )
- Non-Interactive Proofs for Integer Multiplication
- Ivan Damgard and Rune Thorbek
-
2007/085 ( PS PS.GZ PDF )
- MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- Hongbo Yu, Xiaoyun Wang
-
2007/084 ( PS PS.GZ PDF )
- Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
- Sanjit Chatterjee and Palash Sarkar
-
2007/083 ( PDF )
- Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
- Brett Hemenway and Rafail Ostrovsky
-
2007/082 ( PS PS.GZ PDF )
- Deniable Authentication on the Internet
- Shaoquan Jiang
-
2007/081 ( PDF )
- Revisiting an Efficient Elliptic Curve Key Agreement Protocol
- Maurizio Adriano Strangio
-
2007/080 ( -- withdrawn -- )
- Weakly only Unforgeable Signature and Its Application in Group Signature
- Sujing Zhou, Dongdai Lin
-
2007/079 ( PS PS.GZ PDF )
- How To Find Many Collisions of 3-Pass HAVAL
- Kazuhiro Suzuki and Kaoru Kurosawa
-
2007/078 ( PS PS.GZ PDF )
- MPC vs. SFE: Perfect Security in a Unified Corruption Model
- Zuzana Beerliova-Trubiniova and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas
-
2007/077 ( -- withdrawn -- )
- On bent functions with zero second derivatives
- Sugata Gangopadhyay
-
2007/076 ( PDF )
- Almost Secure (1-Round, n-Channel) Message Transmission Scheme
- Kaoru Kurosawa and Kazuhiro Suzuki
-
2007/075 ( PS PS.GZ PDF )
- Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
- Gautham Sekar and Souradyuti Paul and Bart Preneel
-
2007/074 ( PDF )
- A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
- Hovav Shacham
-
2007/073 ( PS PS.GZ PDF )
- Public Key Encryption that Allows PIR Queries
- Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III
-
2007/072 ( -- withdrawn -- )
- A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
- Namin Yu and Howard M. Heys
-
2007/071 ( PS PS.GZ PDF )
- Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
- Ahto Buldas and Sven Laur
-
2007/070 ( PS PS.GZ PDF )
- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
- Alexander Maximov
-
2007/069 ( PDF )
- Nominative Signature: Application, Security Model and Construction
- Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo
-
2007/068 ( -- withdrawn -- )
- Efficient Hierarchical Identity Based Signature in the Standard Model
- Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
-
2007/067 ( -- withdrawn -- )
- withdrawn
- withdrawn
-
2007/066 ( PDF )
- Low-Density Attack Revisited
- Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama
-
2007/065 ( PDF )
- How to Derive Lower Bound on Oblivious Transfer Reduction
- Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba
-
2007/064 ( PDF )
- Algebraic Lower Bounds for Computing on Encrypted Data
- Rafail Ostrovsky and William E. Skeith III
-
2007/063 ( PS PS.GZ PDF )
- Constructing new APN functions from known ones
- Lilya Budaghyan and Claude Carlet and Gregor Leander
-
2007/062 ( PS PS.GZ PDF )
- Algebraic and Slide Attacks on KeeLoq
- Nicolas T. Courtois and Gregory V. Bard and David Wagner
-
2007/061 ( PDF )
- Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
- Neil Costigan and Michael Scott
-
2007/060 ( PDF )
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Yonatan Aumann and Yehuda Lindell
-
2007/059 ( PS PS.GZ PDF )
- A Survey of Single Database PIR: Techniques and Applications
- Rafail Ostrovsky and William E. Skeith III
-
2007/058 ( PS PS.GZ PDF )
- The simplest method for constructing APN polynomials EA-inequivalent to power functions
- Lilya Budaghyan
-
2007/057 ( PDF )
- Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
- David Freeman
-
2007/056 ( PS PS.GZ )
- Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
- Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney
-
2007/055 ( PDF )
- Cryptanalysis of the KeeLoq block cipher
- Andrey Bogdanov
-
2007/054 ( PS PS.GZ PDF )
- Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
- Souradyuti Paul
-
2007/053 ( PS PS.GZ PDF )
- Compiler Assisted Elliptic Curve Cryptography
- M. Barbosa and A. Moss and D. Page
-
2007/052 ( PS PS.GZ PDF )
- Forward-Secure Sequential Aggregate Authentication
- Di Ma, and Gene Tsudik
-
2007/051 ( PDF )
- Forward-secure RFID Authentication and Key Exchange
- Tri van Le, Mike Burmester and Breno de Medeiros
-
2007/050 ( PDF )
- Special block cipher family DN and new generation SNMAC-type hash function family HDN
- Vlastimil KLIMA
-
2007/049 ( PDF )
- Security Arguments for a Class of ID-based Signatures
- jin zhou and ya-juan zhang and yue-fei zhu
-
2007/048 ( PDF )
- A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
- Daniel R. L. Brown and Kristian Gjøsteen
-
2007/047 ( PDF )
- New Constructions of Fuzzy Identity-Based Encryption
- Joonsang Baek and Willy Susilo and Jianying Zhou
-
2007/046 ( PS PS.GZ )
- Direct Reduction of String (1,2)-OT to Rabin's OT
- Kaoru Kurosawa and Takeshi Koshiba
-
2007/045 ( PDF )
- A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
-
2007/044 ( PDF )
- Design and Primitive Specification for Shannon
- Philip Hawkes and Cameron McDonald and Michael Paddon and Gregory Rose and Miriam Wiggers de Vries
-
2007/043 ( PS PS.GZ PDF )
- Reflection Attacks on Product Ciphers
- Orhun Kara
-
2007/042 ( PDF )
- Authorship Proof for Textual Document
- J. Wu and D. R. Stinson
-
2007/041 ( PS PS.GZ PDF )
- Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
- B. Skoric and S. Katzenbeisser and M.U. Celik
-
2007/040 ( PS PS.GZ PDF )
- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
- Pradeep Kumar Mishra and Vassil Dimitrov
-
2007/039 ( PDF )
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Onur Aciicmez and Shay Gueron and Jean-Pierre Seifert
-
2007/038 ( PDF )
- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
- Joo Yeon Cho and Josef Pieprzyk
-
2007/037 ( PDF )
- Best Quadratic Approximations of Cubic Boolean Functions
- Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis
-
2007/036 ( PDF )
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Eike Kiltz
-
2007/035 ( PS PS.GZ PDF )
- Cryptanalysis of white box DES implementations
- Louis Goubin and Jean-Michel Masereel and Michael Quisquater
-
2007/034 ( PDF )
- A New Type of Cipher: DICING_CSB
- Li An-Ping
-
2007/033 ( PDF )
- From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
- Eike Kiltz
-
2007/032 ( PDF )
- An improved collision probability for CBC-MAC and PMAC
- Avradip Mandal and Mridul Nandi
-
2007/031 ( PDF )
- Improved Security Analysis of PMAC
- Mridul Nandi and Avradip Mandal
-
2007/030 ( PS PS.GZ PDF )
- Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
- Yang Cui and Eiichiro Fujisaki and Goichiro Hanaoka and Hideki Imai and Rui Zhang
-
2007/029 ( PDF )
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations
- Debrup Chakraborty and Palash Sarkar
-
2007/028 ( PS PS.GZ )
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
- Debrup Chakraborty and Palash Sarkar
-
2007/027 ( -- withdrawn -- )
- Verifying Data Integrity with Few Queries to Untrusted Memory
- Nachiketh R. Potlapally
-
2007/026 ( PS PS.GZ PDF )
- Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
- Shengbao Wang and Zhenfu Cao and Maurizio Adriano Strangio and Lihua Wang
-
2007/025 ( PDF )
- Private Locally Decodable Codes
- Rafail Ostrovsky and Omkant Pandey and Amit Sahai
-
2007/024 ( PDF )
- Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
- Gregory V. Bard, and Nicolas T. Courtois, and Chris Jefferson.
-
2007/023 ( PDF )
- Efficient Hybrid Encryption from ID-Based Encryption
- Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz
-
2007/022 ( PS PS.GZ PDF )
- On Perfectly Balanced Boolean Functions
- O. A. Logachev
-
2007/021 ( PDF )
- Two Trivial Attacks on Trivium
- Alexander Maximov and Alex Biryukov
-
2007/020 ( PDF )
- TinyTate: Identity-Based Encryption for Sensor Networks
- Leonardo B. Oliveira and Diego Aranha and Eduardo Morais and Felipe Daguano and Julio Lo'pez and Ricardo Dahab
-
2007/019 ( PDF )
- Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
- Changshe Ma, Jian Weng and Dong Zheng
-
2007/018 ( PS PS.GZ PDF )
- Strongly-Secure Identity-based Key Agreement and Anonymous Extension
- Sherman S.M. Chow and Kim-Kwang Raymond Choo
-
2007/017 ( PDF )
- Group Decryption
- Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu and Yumin Wang
-
2007/016 ( -- withdrawn -- )
- VEST Ciphers
- Sean O'Neil and Benjamin Gittins and Howard A. Landman
-
2007/015 ( PS PS.GZ PDF )
- Group Encryption
- Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
-
2007/014 ( PDF )
- Invertible Universal Hashing and the TET Encryption Mode
- Shai Halevi
-
2007/013 ( PDF )
- Optimised versions of the Ate and Twisted Ate Pairings
- Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto
-
2007/012 ( PDF )
- Interactive two-channel message authentication based on interactive-collision Resistant hash functions
- Atefeh Mashatan and Douglas R. Stinson
-
2007/011 ( PDF )
- Universally Composable Key-evolving Signature
- Jin Zhou and TingMao Chang and YaJuan Zhang and YueFei Zhu
-
2007/010 ( PDF )
- Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
- David Freeman and Kristin Lauter
-
2007/009 ( PDF )
- New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
- Zhenfu Cao, Xiaolei Dong and Licheng Wang
-
2007/008 ( PS PS.GZ PDF )
- Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
- Dong Hoon Lee and Je Hong Park and Jaewoo Han
-
2007/007 ( PDF )
- One-Round ID-Based Blind Signature Scheme without ROS Assumption
- Wei Gao and Xueli Wang and Guilin Wang and Fei Li
-
2007/006 ( PDF )
- Efficient Dynamic k-Times Anonymous Authentication
- Lan Nguyen
-
2007/005 ( PDF )
- Privacy-Protecting Coupon System Revisited
- Lan Nguyen
-
2007/004 ( PDF )
- Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
- *Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
-
2007/003 ( PS PS.GZ PDF )
- The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
- Johann Groszschaedl and Alexander Szekely and Stefan Tillich
-
2007/002 ( -- withdrawn -- )
- Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
- Huang Lin and Zhenfu Cao
-
2007/001 ( PS PS.GZ PDF )
- Families of genus 2 curves with small embedding degree
- Laura Hitt
[ Cryptology ePrint archive ]