Cryptology ePrint Archive: Listing for 2007


2007/482 ( PDF )
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
Leonardo B. Oliveira and Michael Scott and Julio López and Ricardo Dahab
2007/481 ( -- withdrawn -- )
MAC-free variant of KD04
Xianhui Lu, Xuejia Lai, Dake He
2007/480 ( PDF )
Differential Fault Analysis on the AES Key Schedule
Junko Takahashi and Toshinori Fukunaga
2007/479 ( PDF )
An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
J. Wu and D.R. Stinson
2007/478 ( PDF )
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
Dafna Kidron and Yehuda Lindell
2007/477 ( PDF )
Algebraic Side-Channel Collision Attacks on AES
Andrey Bogdanov and Andrey Pyshkin
2007/476 ( PDF )
Dynamic SHA
Xu Zijie
2007/475 ( PDF )
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
Ran Canetti
2007/474 ( PDF )
Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
Martin Cochran
2007/473 ( PDF )
Authenticated Key Exchange and Key Encapsulation Without Random Oracles
Tatsuaki Okamoto
2007/472 ( PS PS.GZ PDF )
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Jean-Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger
2007/471 ( PDF )
Attacks on the WEP protocol
Erik Tews
2007/470 ( PDF )
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
Bodo Möller and Andy Rupp
2007/469 ( PDF )
ID-Based Group Password-Authenticated Key Exchange
Xun Yi and Raylin Tso and Eiji Okamoto
2007/468 ( -- withdrawn -- )
On the hash function of ODH assumption
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/467 ( PS PS.GZ PDF )
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
Andr\'e Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil Vadhan
2007/466 ( PDF )
Improved Impossible Differential Cryptanalysis of CLEFIA
Wei Wang and Xiaoyun Wang
2007/465 ( PDF )
A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
Zheng Gong and Xuejia Lai and Kefei Chen
2007/464 ( PDF )
Secure Computation Without Authentication
Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin
2007/463 ( PDF )
Efficient GF(3m) Multiplication Algorithm for eta T Pairing
Gen Takahashi and Fumitaka Hoshino and Tetsutaro Kobayashi
2007/462 ( PDF )
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Siamak F Shahandashti and Reihaneh Safavi-Naini
2007/461 ( PDF )
Verifiable Attribute-based Encryption
QiangTang and Dongyao Ji
2007/460 ( PS PS.GZ PDF )
Guarantees for Customers of Incentive Anonymizing Networks
Timothy Atkinson and Marius Silaghi
2007/459 ( PDF )
Practical Anonymous Divisible E-Cash From Bounded Accumulators
Man Ho Au and Willy Susilo and Yi Mu
2007/458 ( PS PS.GZ PDF )
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
Nenad Dedic and Danny Harnik and Leonid Reyzin
2007/457 ( PDF )
Comparing Implementation Efficiency of Ordinary and Squared Pairings
Christine Abegail Antonio and Tanaka Satoru and Ken Nakamula
2007/456 ( -- withdrawn -- )
Precise Zero-Knowledge in Concurrent Setting
Ning Ding and Dawu Gu
2007/455 ( PDF )
Analysis and optimization of elliptic-curve single-scalar multiplication
Daniel J. Bernstein and Tanja Lange
2007/454 ( PDF )
Efficient Certificateless Signatures Suitable for Aggregation
Rafael Castro and Ricardo Dahab
2007/453 ( PDF )
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
Kenneth G. Paterson and Sriramkrishnan Srinivasan
2007/452 ( PDF )
Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
Ezekiel J. Kachisa and Edward F. Schaefer and Michael Scott
2007/451 ( PDF )
Precise Concurrent Zero Knowledge
Omkant Pandey and Rafael Pass and Amit Sahai and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam
2007/450 ( PDF )
Short Group Signature without Random Oracles
Xiaohui Liang and Zhenfu Cao and Jun Shao and Huang Lin
2007/449 ( PDF )
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Jacques Patarin and Valérie Nachef and Côme Berbain
2007/448 ( PDF )
Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
Sergiy Pometun
2007/447 ( PDF )
Weak adaptive chosen ciphertext secure hybrid encryption scheme
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/446 ( PDF )
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
Carlos AGUILAR MELCHOR and Philippe GABORIT
2007/445 ( PDF )
Proposal of a new efficient public key system for encryption and digital signatures
Gerold Grünauer
2007/444 ( PDF )
Tight bounds between algebraic immunity and nonlinearities of high orders
Lobanov Mikhail
2007/443 ( PDF )
Template Attacks with a Power Model
Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST
2007/442 ( PDF )
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
Neal Koblitz and Alfred Menezes
2007/441 ( PS PS.GZ PDF )
Faster Group Operations on Elliptic Curves
Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
2007/440 ( PDF )
An Improved Remote User Authentication Scheme using Bilinear Pairings
Sunder Lal and K.K.Goyal
2007/439 ( PDF )
Multiparty Key Agreement Using Bilinear Map
Nam-Su Jho and Myung-Hwan Kim and Do Won Hong and Byung-Gil Lee
2007/438 ( PDF )
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum
2007/437 ( PDF )
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Cuauhtemoc Mancillas-Lopez and Debrup Chakraborty and Francisco Rodriguez-Henriquez
2007/436 ( PS PS.GZ PDF )
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Gautham Sekar and Souradyuti Paul and Bart Preneel
2007/435 ( PS PS.GZ PDF )
Irreducibility to the One-More Evaluation Problems: More May Be Less
Daniel R. L. Brown
2007/434 ( PS PS.GZ PDF )
Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
Xibin Lin and Chang-An Zhao and Fangguo Zhang and Yanming Wang
2007/433 ( PDF )
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
Fabien Coelho
2007/432 ( PDF )
Trapdoors for Hard Lattices and New Cryptographic Constructions
Craig Gentry and Chris Peikert and Vinod Vaikuntanathan
2007/431 ( PS PS.GZ PDF )
Notions of Efficiency in Simulation Paradigm
Tzer-jen Wei
2007/430 ( PDF )
Cryptanalysis of LASH
Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang
2007/429 ( PS PS.GZ PDF )
On compressible pairings and their computation
Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe
2007/428 ( PDF )
Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
Benjamin Smith
2007/427 ( PDF )
Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
Sumanta Sarkar and Subhamoy Maitra
2007/426 ( PDF )
Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
Christine Abegail Antonio, Satoru Tanaka, and Ken Nakamula
2007/425 ( PS PS.GZ PDF )
On prime-order elliptic curves with embedding degrees k=3,4 and 6
Koray Karabina and Edlyn Teske
2007/424 ( PS PS.GZ PDF )
When e-th Roots Become Easier Than Factoring
Antoine Joux and David Naccache and Emmanuel Thomé
2007/423 ( PDF )
Finding Low Weight Polynomial Multiples Using Lattices
Laila El Aimani and Joachim von zur Gathen
2007/422 ( PDF )
Structural Identity-Based Encryption
Man Ho Au and Siu-Ming Yiu
2007/421 ( PS PS.GZ PDF )
The role of help in Classical and Quantum Zero-Knowledge
Andr\'e Chailloux and Iordanis Kerenidis
2007/420 ( PDF )
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Jiayuan Sui and Douglas R. Stinson
2007/419 ( PDF )
Cryptanalysis of the Random Number Generator of the Windows Operating System
Leo Dorrendorf and Zvi Gutterman and Benny Pinkas
2007/418 ( -- withdrawn -- )
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Amit K Awasthi
2007/417 ( PDF )
Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi
2007/416 ( PS PS.GZ PDF )
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung and Seokhie Hong
2007/415 ( PDF )
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
2007/414 ( PDF )
Optimizing double-base elliptic-curve single-scalar multiplication
Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
2007/413 ( PDF )
Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
Michael Vielhaber
2007/412 ( PDF )
Proposing a Master One-Way Function
Gideon Samid
2007/411 ( PDF )
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
2007/410 ( PDF )
Inverted Edwards coordinates
Daniel J. Bernstein and Tanja Lange
2007/409 ( PDF )
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
Thomas Shrimpton and Martijn Stam
2007/408 ( PDF )
Differential Cryptanalysis of PRESENT
Meiqin Wang
2007/407 ( -- withdrawn -- )
Provably Secure Grouping-proofs for RFID tags
Mike Burmester and Breno de Medeiros and Rossana Motta
2007/406 ( PS PS.GZ PDF )
Modeling Computational Security in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
2007/405 ( PDF )
Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
Michael Feng-Hao Liu and Chi-Jen Lu and Bo-Yin Yang and Jintai Ding
2007/404 ( PDF )
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Katz and Amit Sahai and Brent Waters
2007/403 ( PDF )
Turbo SHA-2
Danilo Gligoroski and Svein Johan Knapskog
2007/402 ( PDF )
Robust, Anonymous RFID Authentication with Constant Key-Lookup
Mike Burmester and Breno de Medeiros and Rossana Motta
2007/401 ( PDF )
Another Look at Automated Theorem-Proving
Neal Koblitz
2007/400 ( PDF )
REMARKS ON IBE SCHEME OF WANG AND CAO
Sunder Lal and Priyam Sharma
2007/399 ( PDF )
Ceremony Design and Analysis
Carl Ellison
2007/398 ( -- withdrawn -- )
A Short Signature Scheme in the Standard Model
Li Kang and Xiaohu Tang and Xianhui Lu and Jia Fan
2007/397 ( PDF )
On the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
2007/396 ( PDF )
Proxy Re-Signature Schemes without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
2007/395 ( PS PS.GZ PDF )
Second Preimage Attacks on Dithered Hash Functions
Charles Bouillaguet and Pierre-Alain Fouque and Adi Shamir and Sebastien Zimmer
2007/394 ( PS PS.GZ PDF )
Almost-everywhere Secure Computation
Juan A. Garay and Rafail Ostrovsky
2007/393 ( PDF )
Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
Haining Fan and Jiaguang Sun and Ming Gu and Kwok-Yan Lam
2007/392 ( PDF )
Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
Jonathan Trostle and Andy Parrish
2007/391 ( PDF )
A novel public key crypto system based on semi-modules over quotient semi-rings
Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
2007/390 ( PDF )
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Augusto Jun Devegili and Michael Scott and Ricardo Dahab
2007/389 ( PDF )
Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
Dragos Florin Ciocan and Salil Vadhan
2007/388 ( PS PS.GZ PDF )
On Ciphertext Undetectability
Peter Gazi and Martin Stanek
2007/387 ( -- withdrawn -- )
Analysis of Local Optima in Block Ciphers
John A. Clark and Juan M. E. Tapiador
2007/386 ( PS PS.GZ PDF )
(Convertible) Undeniable Signatures without Random Oracles
Tsz Hon Yuen and Man Ho Au and Joseph K. Liu and Willy Susilo
2007/385 ( PDF )
On the insecurity of interchanged use of OFB and CBC modes of operation
Danilo Gligoroski
2007/384 ( PS PS.GZ PDF )
Non-Interactive Anonymous Credentials
Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
2007/383 ( PDF )
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
2007/382 ( PDF )
Oblivious Transfer via McEliece's PKC and Permuted Kernels
K. Kobara and K. Morozov and R. Overbeck
2007/381 ( PDF )
Cryptanalysis of Two New Instances of TTM Cryptosystem
Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding
2007/380 ( PS PS.GZ PDF )
X-FCSR: a new software oriented stream cipher based upon FCSRs
Francois Arnault, Thierry P. Berger, Cédric Lauradoux and Marine Minier
2007/379 ( PDF )
On The Inequivalence Of Ness-Helleseth APN Functions
Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang
2007/378 ( PDF )
Algebraic Structure Defectoscopy
Sean O'Neil
2007/377 ( -- withdrawn -- )
Fast Point Multiplication on Elliptic Curves of Even Order
Rongquan Feng, Hongfeng Wu
2007/376 ( PDF )
An Efficient Range-Bounded Commitment Scheme
Zhengjun Cao
2007/375 ( PDF )
Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
Gregory Hirshman
2007/374 ( PS PS.GZ PDF )
On Factoring Arbitrary Integers with Known Bits
Mathias Herrmann and Alexander May
2007/373 ( PS PS.GZ PDF )
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
2007/372 ( PDF )
On the Authentication of One Popular Signcryption Scheme
Zhengjun Cao
2007/371 ( PDF )
Group-oriented encryption secure against collude attack
Chunbo Ma, Jun Ao, and Jianhua Li
2007/370 ( PDF )
FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu
2007/369 ( PDF )
Universally Composable Multi-Party Computation with an Unreliable Common Reference String
Vipul Goyal and Jonathan Katz
2007/368 ( PDF )
Reducing Trust in the PKG in Identity Based Cryptosystems
Vipul Goyal
2007/367 ( PDF )
Cryptanalysis of Rational Multivariate Public Key Cryptosystems
Jintai Ding and John Wagner
2007/366 ( PDF )
Breaking the Symmetry: a Way to Resist the New Differential Attack
Jintai Ding and Bo-Yin Yang and Chen-Mou Cheng and Owen Chen and Vivien Dubois
2007/365 ( PS PS.GZ PDF )
Pairings on Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
2007/364 ( PDF )
A Proof of Security of a Mesh Security Architecture
Doug Kuhlman and Ryan Moriarty and Tony Braskich and Steve Emeott and Mahesh Tripunitara
2007/363 ( PDF )
Fuzzy Private Matching (Extended Abstract)
{\L}ukasz Chmielewski and Jaap-Henk Hoepman
2007/362 ( PDF )
Statistical Testing for Disk Encryption Modes of Operations
Mohamed Abo El-Fotouh and Klaus Diepold
2007/361 ( PDF )
Proxy Re-encryption Systems for Identity-based Encryption
Toshihiko Matsuo
2007/360 ( PDF )
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Andy Rupp and Gregor Leander and Endre Bangerter and Ahmad-Reza Sadeghi and Alexander W. Dent
2007/359 ( PDF )
Intrusion-Resilient Secret Sharing
Stefan Dziembowski and Krzysztof Pietrzak
2007/358 ( PDF )
Improving the Round Complexity of VSS in Point-to-Point Networks
Jonathan Katz and Chiu-Yuen Koo and Ranjit Kumaresan
2007/357 ( PDF )
A Note on Signature Standards
Michael Braun and Anton Kargl
2007/356 ( PS PS.GZ PDF )
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
Christophe Petit and Francois-Xavier Standaert and Olivier Pereira and Tal G. Malkin and Moti Yung
2007/355 ( PDF )
Secret sharing on the infinite ladder
Laszlo Csirmaz
2007/354 ( PDF )
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Cheng-Kang Chu and Wen-Guey Tzeng
2007/353 ( PS PS.GZ PDF )
Multiparty Computation to Generate Secret Permutations
Chris Studholme and Ian Blake
2007/352 ( PS PS.GZ PDF )
New Local Collisions for the SHA-2 Hash Family
Somitra Kumar Sanadhya and Palash Sarkar
2007/351 ( PS PS.GZ PDF )
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Iftach Haitner and Jonathan J. Hoch and Gil Segev
2007/350 ( PS PS.GZ )
On Tweaking Luby-Rackoff Blockciphers
David Goldenberg and Susan Hohenberger and Moses Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu
2007/349 ( PS PS.GZ PDF )
Statistically Hiding Sets
Manoj Prabhakaran and Rui Xue
2007/348 ( PDF )
A Framework for Efficient and Composable Oblivious Transfer
Chris Peikert and Vinod Vaikuntanathan and Brent Waters
2007/347 ( PDF )
Lai-Massey Scheme and Quasi-Feistel Networks
Aaram Yun and Je Hong Park and Jooyoung Lee
2007/346 ( -- withdrawn -- )
Secure multi-party computation on incomplete networks
Shailesh Vaya
2007/345 ( PDF )
Analysis of Underlying Assumptions in NIST DRBGs
Wilson Kan
2007/344 ( PDF )
Security Analysis of WAPI Authentication and Key Exchange Protocol
Liufei Wu,Yuqing Zhang, FengjiaoWang
2007/343 ( PS PS.GZ PDF )
Updated standards for validating elliptic curves
Laura Hitt
2007/342 ( PDF )
A New Security Model for Cross-Realm C2C-PAKE Protocol
Fengjiao Wang and Yuqing Zhang
2007/341 ( PDF )
Multi-Party Indirect Indexing and Applications
Matthew Franklin and Mark Gondree and Payman Mohassel
2007/340 ( PDF )
Efficient Implementation of the Pairing on Mobilephones using BREW
Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka
2007/339 ( PDF )
On the security of a class of image encryption schemes
Chengqing Li and Guanrong Chen
2007/338 ( PS PS.GZ PDF )
VHASH Security
Wei Dai and Ted Krovetz
2007/337 ( PDF )
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
W. Bamberger and O. Welter and S. Spitz and M. Marhöfer
2007/336 ( PDF )
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
Onur Aciicmez and Werner Schindler
2007/335 ( PDF )
Encryption Techniques for Secure Database Outsourcing
Sergei Evdokimov and Oliver Guenther
2007/334 ( PDF )
New Constructions for UC Secure Computation using Tamper-proof Hardware
Nishanth Chandran and Vipul Goyal and Amit Sahai
2007/333 ( PS PS.GZ PDF )
Towards Key-Dependent Message Security in the Standard Model
Dennis Hofheinz and Dominique Unruh
2007/332 ( PS PS.GZ PDF )
Universally Composable Multiparty Computation with Partially Isolated Parties
Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
2007/331 ( PS PS.GZ PDF )
Isolated Proofs of Knowledge and Isolated Zero Knowledge
Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
2007/330 ( PS PS.GZ PDF )
Remote Power Analysis of {RFID} Tags
Yossi Oren
2007/329 ( PDF )
A Tunable Broadcast Encryption Scheme
David Lubicz and Thomas Sirvent
2007/328 ( PDF )
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Ivan Damgaard and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner
2007/327 ( PDF )
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Ivan Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
2007/326 ( PDF )
Efficient Password-based Authenticated Key Exchange without Public Information
Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu
2007/325 ( PS PS.GZ )
Faster and Shorter Password-Authenticated Key Exchange
Rosario Gennaro
2007/324 ( PDF )
Towards provable security for route discovery protocols in mobile ad hoc networks
Mike Burmester and Breno de Medeiros
2007/323 ( PDF )
Attribute-Based Encryption with Non-Monotonic Access Structures
Rafail Ostrovsky and Amit Sahai and Brent Waters
2007/322 ( PS PS.GZ PDF )
Identifying Ideal Lattices
Jintai Ding and Richard Lindner
2007/321 ( PDF )
Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
Selcuk Kavut and Melek Diker Yucel
2007/320 ( PDF )
On the Big Gap Between $|p|$ and $|q|$ in DSA
Zhengjun Cao
2007/319 ( PDF )
A New Security Definition for Public Key Encryption Schemes and Its Applications
Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng
2007/318 ( PDF )
On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
Michael Neve and Kris Tiri
2007/317 ( PDF )
Improving Upon the TET Mode of Operation
Palash Sarkar
2007/316 ( PDF )
SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
Sunder Lal and Priyam Sharma
2007/315 ( PDF )
Security under Key-Dependent Inputs
Shai Halevi and Hugo Krawczyk
2007/314 ( -- withdrawn -- )
Formal Certification of Code-Based Cryptographic Proofs
G. Barthe and B. Gr{\'e}goire and R. Janvier and S. Zanella B{\'e}guelin
2007/313 ( PS PS.GZ PDF )
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Shengbao Wang and Zhenfu Cao and Zhaohui Cheng and Kim-Kwang Raymond Choo
2007/312 ( PDF )
Secure Similarity Search
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan
2007/311 ( PDF )
A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2007/310 ( PDF )
A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
Kwang Ho Kim
2007/309 ( PDF )
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Subhamoy Maitra
2007/308 ( PDF )
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
Selcuk Kavut and Melek Diker Yucel
2007/307 ( PS PS.GZ PDF )
Locally Invertible Boolean Mappings
Oleg A. Logachev
2007/306 ( PDF )
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
Thanh-Ha Le and Quoc-Thinh Nguyen-Vuong and Cécile Canovas and Jessy Clédière
2007/305 ( PDF )
On Non-Randomness of the Permutation after RC4 Key Scheduling
Goutam Paul and Subhamoy Maitra and Rohit Srivastava
2007/304 ( PDF )
A Bound on the Size of Separating Hash Families
Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson and Gregory M. Zaverucha
2007/303 ( PDF )
A Forward Secure Remote User Authentication Scheme
Manoj Kumar
2007/302 ( PDF )
Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori Kuwakado and Masakatu Morii
2007/301 ( PDF )
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Yuri Borissov and Moon Ho Lee and Svetla Nikova
2007/300 ( PS PS.GZ PDF )
A Note on Automata-based Dynamic Convolutional Cryptosystems
Renji Tao
2007/299 ( PDF )
Optimizing Multiprecision Multiplication for Public Key Cryptography
Michael Scott and Piotr Szczechowiak
2007/298 ( PDF )
The Security of the Extended Codebook (XCB) Mode of Operation
David A. McGrew and Scott R. Fluhrer
2007/297 ( PDF )
Secret sharing on infinite graphs
Laszlo Csirmaz
2007/296 ( PDF )
Construction of Efficient and Secure Pairing Algorithm and its Application
Doo Ho Choi, Dong-Guk Han, and Howon Kim
2007/295 ( PS PS.GZ PDF )
Linearization Attacks Against Syndrome Based Hashes
Markku-Juhani O. Saarinen
2007/294 ( PDF )
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
Julien Bringer and Herve Chabanne and Thomas Icart
2007/293 ( PDF )
Fully Resilient Traitor Tracing Scheme using Key Update
Eun Sun Yoo, Koutarou Suzuki and Myung-Hwan Kim
2007/292 ( PDF )
Improved security analysis of OMAC
Mridul Nandi
2007/291 ( PDF )
Relations Among Notions of Plaintext Awareness
James Birkett and Alexander W. Dent
2007/290 ( PDF )
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
Sumanta Sarkar and Subhamoy Maitra
2007/289 ( PDF )
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
Michael Backes and Matteo Maffei and Dominique Unruh
2007/288 ( PS PS.GZ PDF )
Secure Hybrid Encryption from Weakened Key Encapsulation
Dennis Hofheinz and Eike Kiltz
2007/287 ( PDF )
The Effectiveness of Receipt-Based Attacks on ThreeBallot
Kevin Henry and Douglas R. Stinson and Jiayuan Sui
2007/286 ( PDF )
Faster addition and doubling on elliptic curves
Daniel J. Bernstein and Tanja Lange
2007/285 ( PDF )
Solving MRHS linear equations
H{\aa}vard Raddum and Igor Semaev
2007/284 ( -- withdrawn -- )
No title
No Author
2007/283 ( PDF )
Provably Secure Framework for Information Aggregation is Sensor Networks
Mark Manulis and Joerg Schwenk
2007/282 ( PDF )
Analysis of countermeasures against access driven cache attacks on AES
Johannes Bl\"omer \and Volker Krummel
2007/281 ( PDF )
A Pollard-like pseudorandom number generator over EC
Grzegorz Wojtenko
2007/280 ( PDF )
On solving sparse algebraic equations over finite fields II
Igor Semaev
2007/279 ( PDF )
Lossy Trapdoor Functions and Their Applications
Chris Peikert and Brent Waters
2007/278 ( PDF )
A Framework for Iterative Hash Functions - HAIFA
Eli Biham and Orr Dunkelman
2007/277 ( PS PS.GZ PDF )
Cryptanalysis of a class of cryptographic hash functions
Praveen Gauravaram and John Kelsey
2007/276 ( PDF )
Prolific Codes with the Identifiable Parent Property
Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
2007/275 ( PDF )
`Good' Pseudo-Random Binary Sequences from Elliptic Curves
Zhixiong CHEN and Guozhen XIAO
2007/274 ( PDF )
Group-based Proxy Re-encryption scheme
Chunbo Ma, Jun Ao, and Jianhua Li
2007/273 ( PDF )
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
Mihir Bellare and Sarah Shoup
2007/272 ( PS PS.GZ PDF )
Cryptanalysis of a Hash Function Proposed at ICISC 2006
Willi Geiselmann and Rainer Steinwandt
2007/271 ( PDF )
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Mihir Bellare and Thomas Ristenpart
2007/270 ( PDF )
Secret Ballot Elections with Unconditional Integrity
David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora
2007/269 ( PDF )
Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
Jeroen van de Graaf
2007/268 ( PDF )
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Erik Dahmen and Katsuyuki Okeya and Daniel Schepers
2007/267 ( PDF )
CRUST: Cryptographic Remote Untrusted Storage without Public Keys
Erel Geron and Avishai Wool
2007/266 ( PDF )
Filling the Gap between Voters and Cryptography in e-Voting
Wei Han and Dong Zheng and Ke-fei Chen
2007/265 ( PDF )
Which Languages Have 4-Round Zero-Knowledge Proofs?
Jonathan Katz
2007/264 ( PDF )
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart and Scott Yilek
2007/263 ( -- withdrawn -- )
Efficiency Improvement for NTRU
Johannes Buchmann and Martin D{\"o}ring and Richard Lindner
2007/262 ( PS PS.GZ PDF )
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Yong Ho Hwang and Joseph K. Liu and Sherman S.M. Chow
2007/261 ( PDF )
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Subhamoy Maitra and Goutam Paul
2007/260 ( PDF )
An Efficient One-move Nominative Signature Scheme
Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong
2007/259 ( PDF )
Algebraic Immunity Hierarchy of Boolean Functions
Ziran Tu and Yingpu Deng
2007/258 ( PDF )
UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
Ulrich Kaiser
2007/257 ( PDF )
A Forward-Secure Signature with Backward-Secure Detection
Dai-Rui Lin and Chih-I Wang
2007/256 ( PDF )
Aspects of Pairing Inversion
S. D. Galbraith and F. Hess and F. Vercauteren
2007/255 ( -- withdrawn -- )
Efficient Identity Based Signature in Standard Model
S.Narayan
2007/254 ( -- withdrawn -- )
Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
2007/253 ( PDF )
Choosing the correct elliptic curve in the CM method
K. Rubin and A. Silverberg
2007/252 ( PDF )
A Verifiable Voting Protocol based on Farnel
Roberto Araujo, Ricardo Felipe Custodio, and Jeroen van de Graaf
2007/251 ( PS PS.GZ PDF )
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
V{\'e}ronique Cortier and Ralf Kuesters and Bogdan Warinschi
2007/250 ( PDF )
Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
Hongzhen Du and Qiaoyan Wen
2007/249 ( PDF )
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Serge Fehr and Christian Schaffner
2007/248 ( PS PS.GZ PDF )
1. AES seems weak. 2. Linear time secure cryptography
Warren D. Smith
2007/247 ( PS PS.GZ PDF )
A Note on the Ate Pairing
Chang-An Zhao and Fangguo Zhang and Jiwu Huang
2007/246 ( PDF )
BEDA: Button-Enabled Device Pairing
Claudio Soriente and Gene Tsudik and Ersin Uzun
2007/245 ( PS PS.GZ PDF )
Incorporating Temporal Capabilities in Existing Key Management Schemes
Mikhail J. Atallah and Marina Blanton and Keith B. Frikken
2007/244 ( PDF )
A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
Martin Hlavac and Tomas Rosa
2007/243 ( -- withdrawn -- )
PORs: Proofs of Retrievability for Large Files
Ari Juels and Burton S. Kaliski Jr.
2007/242 ( PDF )
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
Khoongming Khoo, Guanhan Chew, Guang Gong and Hian-Kiat Lee
2007/241 ( PDF )
Attribute Based Group Signature with Revocation
Dalia Khader
2007/240 ( PDF )
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida and Jeremy A. Hansen
2007/239 ( PS PS.GZ PDF )
Making Large Hash Functions From Small Compression Functions
William R. Speirs and Ian Molloy
2007/238 ( PDF )
Long-lived digital integrity using short-lived hash functions
Stuart Haber
2007/237 ( PDF )
Forward-secure Key Evolution in Wireless Sensor Networks
Marek Klonowski and Miros\l{}aw Kuty\l{}owski and Micha\l{} Ren and Katarzyna Rybarczyk
2007/236 ( PS PS.GZ PDF )
Certificateless Ring Signatures
Sherman S.M. Chow and Wun-She Yap
2007/235 ( PDF )
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Matthew Green and Susan Hohenberger
2007/234 ( PDF )
Provable-Security Analysis of Authenticated Encryption in Kerberos
Alexandra Boldyreva and Virendra Kumar
2007/233 ( PDF )
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Michael Backes and Markus Duermuth and Ralf Kuesters
2007/232 ( -- withdrawn -- )
A new paradigm of chosen ciphertext secure public key encryption scheme
Xianhui Lu, Xuejia Lai, Dake He
2007/231 ( PS PS.GZ PDF )
Secure Two-Party k-Means Clustering
Paul Bunn and Rafail Ostrovsky
2007/230 ( PS PS.GZ PDF )
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
2007/229 ( PS PS.GZ PDF )
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Ueli Maurer and Stefano Tessaro
2007/228 ( PS PS.GZ PDF )
AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi
2007/227 ( PDF )
Related-Key Statistical Cryptanalysis
Darakhshan J. Mir and Poorvi L. Vora
2007/226 ( PDF )
Generalized mix functions and orthogonal equitable rectangles
Douglas R. Stinson
2007/225 ( PDF )
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
Shengli Liu and Xiaofeng Chen and Fangguo Zhang
2007/224 ( PDF )
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
*Jue-Sam Chou 1, Guey-Chuen Lee 2, Chung-Ju Chan 3
2007/223 ( PS PS.GZ PDF )
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black and Martin Cochran and Thomas Shrimpton
2007/222 ( PS PS.GZ PDF )
Towards Security Limits in Side-Channel Attacks
Francois-Xavier Standaert and Eric Peeters and Cedric Archambeau and Jean-Jacques Quisquater
2007/221 ( PS PS.GZ PDF )
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla and Eike Kiltz and Gregory Neven
2007/220 ( PDF )
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
Fengjiao WANG and Yuqing ZHANG
2007/219 ( PDF )
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
Liufei Wu1, 2, Yuqing Zhang1, Fengjiao Wang1
2007/218 ( PDF )
Differential Cryptanalysis in Stream Ciphers
Eli Biham and Orr Dunkelman
2007/217 ( PS PS.GZ PDF )
Identity-Based Broadcast Encryption
Ryuichi Sakai and Jun Furukawa
2007/216 ( PS PS.GZ PDF )
Unlinkable Divisible Digital Cash without Trusted Third Party
Pawel Pszona and Grzegorz Stachowiak
2007/215 ( PS PS.GZ PDF )
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
Jesper Buus Nielsen
2007/214 ( PDF )
Matrix Power S-Box Construction
Eligijus Sakalauskas and Kestutis Luksys
2007/213 ( PDF )
Unlinkable Randomizable Signature and Its Application in Group Signature
Sujing Zhou and Dongdai Lin
2007/212 ( PDF )
The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
Andrey Khalyavin
2007/211 ( PDF )
Scalable Storage Scheme from Forward Key Rotation
Chunbo Ma, Jun Ao, and Jianhua Li
2007/210 ( -- withdrawn -- )
Efficient chosen ciphertext secure PKE scheme with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/209 ( PDF )
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Liqun Chen and Qiang Tang
2007/208 ( PDF )
RC4 State Information at Any Stage Reveals the Secret Key
Goutam Paul and Subhamoy Maitra
2007/207 ( PDF )
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
2007/206 ( PS PS.GZ PDF )
Automatic Search of Differential Path in MD4
Pierre-Alain Fouque and Gaetan Leurent and Phong Nguyen
2007/205 ( PS PS.GZ PDF )
A kilobit special number field sieve factorization
Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen Lenstra and Dag Arne Osvik
2007/204 ( PDF )
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
Shu Yun Lim and Chuan Chin Pu and Hyo Taek Lim and Hoon Jae Lee
2007/203 ( PDF )
Kipnis-Shamir's Attack on HFE Revisited
Xin Jiang and Jintai Ding and Lei Hu
2007/202 ( PDF )
Provable Data Possession at Untrusted Stores
Giuseppe Ateniese and Randal Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary Peterson and Dawn Song
2007/201 ( PDF )
The BBG HIBE Has Limited Delegation
Hovav Shacham
2007/200 ( PDF )
ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
Philip Atzemoglou and Tal Malkin
2007/199 ( PDF )
A Framework for Game-Based Security Proofs
David Nowak
2007/198 ( PS PS.GZ PDF )
Mutual Information Analysis -- A Universal Differential Side-Channel Attack
Benedikt Gierlichs and Lejla Batina and Pim Tuyls
2007/197 ( PS PS.GZ PDF )
On-Line Ciphers and the Hash-CBC Constructions
Mihir Bellare and Alexandra Boldyreva and Lars Knudsen and Chanathip Namprempre
2007/196 ( -- withdrawn -- )
An Efficient Certificateless Signature Scheme
Rafael Castro and Ricardo Dahab
2007/195 ( PDF )
Verifying Statistical Zero Knowledge with Approximate Implementations
Ling Cheung and Sayan Mitra and Olivier Pereira
2007/194 ( PDF )
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
Ernie Brickell and Jiangtao Li
2007/193 ( PDF )
Some Identity Based Strong Bi-Designated Verifier Signature Schemes
Sunder Lal and Vandani Verma
2007/192 ( PDF )
Optimal Irreducible Polynomials for GF(2^m) Arithmetic
Michael Scott
2007/191 ( PDF )
Deniable Internet Key-Exchange
Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
2007/190 ( PDF )
Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
Tian Yuan
2007/189 ( PS PS.GZ PDF )
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee
2007/188 ( PDF )
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Kim-Kwang Raymond Choo
2007/187 ( PDF )
Executing Modular Exponentiation on a Graphics Accelerator
Andrew Moss and Dan Page and Nigel Smart
2007/186 ( PS PS.GZ PDF )
Fully Anonymous Group Signatures without Random Oracles
Jens Groth
2007/185 ( PDF )
New FORK-256
Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee
2007/184 ( PDF )
Provable password-based tripartite key agreement protocol
Chunbo Ma, Jun Ao, and Jianhua Li
2007/183 ( PDF )
Provably Secure Ciphertext Policy ABE
Ling Cheung and Calvin Newport
2007/182 ( PDF )
Optimistic Fair Exchange in a Multi-user Setting
Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum
2007/181 ( PDF )
A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
Kwang Ho Kim and So In Kim
2007/180 ( PDF )
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
*Jue-Sam Chou 1, Yalin Chen 2, Tsung-Heng Chen 3
2007/179 ( PDF )
New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
Kwang Ho Kim and So In Kim and Ju Song Choe
2007/178 ( PS PS.GZ )
Utility Sampling for Trust Metrics in PKI
Dakshi Agrawal and Charanjit Jutla
2007/177 ( PDF )
Space-Efficient Identity Based Encryption Without Pairings
Dan Boneh and Craig Gentry and Michael Hamburg
2007/176 ( PS PS.GZ PDF )
Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton
2007/175 ( PDF )
Embedding Degree of Hyperelliptic Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
2007/174 ( PS PS.GZ PDF )
Counting hyperelliptic curves that admit a Koblitz model
Cevahir Demirkiran and Enric Nart
2007/173 ( PDF )
Provable Secure Generalized Signcryption
Xu An Wang and Xiaoyuan Yang and Yiliang Han
2007/172 ( PDF )
Batch Verification of Short Signatures
Jan Camenisch and Susan Hohenberger and Michael {\O}stergaard Pedersen
2007/171 ( PDF )
Chosen-Ciphertext Secure Proxy Re-Encryption
Ran Canetti and Susan Hohenberger
2007/170 ( PDF )
Clone Resistant Mutual Authentication for Low-Cost RFID Technology
Stephane Lemieux and Adrian Tang
2007/169 ( PDF )
On the Security of Protocols with Logarithmic Communication Complexity
Michael Backes and Dominique Unruh
2007/168 ( PDF )
Random Oracles and Auxiliary Input
Dominique Unruh
2007/167 ( PDF )
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
Yi-Ru Liu, Wen-Guey Tzeng
2007/166 ( PS PS.GZ PDF )
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
Junghyun Nam
2007/165 ( PDF )
Inductive Proof Method for Computational Secrecy
Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
2007/164 ( PDF )
Yet Another MicroArchitectural Attack: Exploiting I-cache
Onur Aciicmez
2007/163 ( PDF )
Secure Deniable Authenticated Key Establishment for Internet Protocols
Meng-Hui Lim and Sanggon Lee and Youngho Park and Sangjae Moon
2007/162 ( PS PS.GZ PDF )
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
Jens-Matthias Bohli and Joern Mueller-Quade and Stefan Roehrich
2007/161 ( PDF )
Collusion-Resistant Group Key Management Using Attribute-Based Encryption
Ling Cheung and Joseph A. Cooley and Roger Khazan and Calvin Newport
2007/160 ( PS PS.GZ )
Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
Muxiang Zhang
2007/159 ( PDF )
Attribute Based Group Signatures
Dalia Khader
2007/158 ( PS PS.GZ PDF )
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
Mridul Nandi
2007/157 ( PDF )
ConSum v0: An Experimental Cipher
David A. Madore
2007/156 ( PDF )
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Gergei Bana and Koji Hasebe and Mitsuhiro Okada
2007/155 ( PS PS.GZ PDF )
Efficient Non-interactive Proof Systems for Bilinear Groups
Jens Groth and Amit Sahai
2007/154 ( PDF )
Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
Danilo Gligoroski and Svein Johan Knapskog
2007/153 ( PS PS.GZ PDF )
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
Aggelos Kiayias and Moti Yung
2007/152 ( PS PS.GZ PDF )
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
Nicolas T. Courtois
2007/151 ( PS PS.GZ PDF )
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Tal Moran and Moni Naor and Gil Segev
2007/150 ( PS PS.GZ PDF )
Generators of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
2007/149 ( PS PS.GZ PDF )
Towards Generating Secure Keys for Braid Cryptography
Ki Hyoung Ko and Jang Won Lee and Tony Thomas
2007/148 ( PDF )
Practical Compact E-Cash
Man Ho Au and Willy Susilo and Yi Mu
2007/147 ( PDF )
Using decision problems in public key cryptography
Vladimir Shpilrain and Gabriel Zapata
2007/146 ( PDF )
Time Capsule Signature: Efficient and Provably Secure Constructions
Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng
2007/145 ( PS PS.GZ PDF )
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
Iftach Haitner and Jonathan J. Hoch and Omer Reingold and Gil Segev
2007/144 ( PS PS.GZ )
Two New Examples of TTM
T.Moh
2007/143 ( PDF )
Offline/Online Mixing
Ben Adida and Douglas Wikström
2007/142 ( PDF )
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
2007/141 ( PDF )
Practical Cryptanalysis of SFLASH
Vivien Dubois and Pierre-Alain Fouque and Adi Shamir and Jacques Stern
2007/140 ( PDF )
Hidden Identity-Based Signatures
Aggelos Kiayias and Hong-Sheng Zhou
2007/139 ( PDF )
The Delivery and Evidences Layer
Amir Herzberg and Igal Yoffe
2007/138 ( PS PS.GZ PDF )
Efficient Pairing Computation on Curves
Rongquan Feng and Hongfeng Wu
2007/137 ( PDF )
Multivariates Polynomials for Hashing
Jintai Ding and Bo-yin Yang
2007/136 ( -- withdrawn -- )
Fair Exchange Signature Schemes
Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
2007/135 ( PDF )
Efficient ID-based Signature Without Trusted PKG
Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
2007/134 ( PDF )
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
Osman Kocar
2007/133 ( PDF )
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
Helger Lipmaa
2007/132 ( PDF )
Equivocal Blind Signatures and Adaptive UC-Security
Aggelos Kiayias and Hong-Sheng Zhou
2007/131 ( PDF )
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi-Naini
2007/130 ( PDF )
Some Results on Anonymity in Hybrid Encryption
Tian Yuan and Chen Zhi-Yu and Jin Yuee and Jin Feng and Ma Huihui
2007/129 ( PS PS.GZ PDF )
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
Cameron McDonald, Chris Charnes, Josef Pieprzyk
2007/128 ( PS PS.GZ PDF )
Computationally Sound Mechanized Proofs of Correspondence Assertions
Bruno Blanchet
2007/127 ( PS PS.GZ PDF )
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Vanesa Daza and Javier Herranz and Paz Morillo and Carla R\`afols
2007/126 ( PDF )
An Interesting Member ID-based Group Signature
Sujing Zhou and Dongdai Lin
2007/125 ( PDF )
Attacking the IPsec Standards in Encryption-only Configurations
Jean Paul Degabriele and Kenneth G. Paterson
2007/124 ( PDF )
Rebuttal of overtaking VEST
Benjamin Gittins and Howard Landman
2007/123 ( PDF )
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Berkant Ustaoglu
2007/122 ( PDF )
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
Qiang Tang
2007/121 ( PS PS.GZ PDF )
Certificateless Encryption Schemes Strongly Secure in the Standard Model
Alexander W. Dent and Benoit Libert and Kenneth G. Paterson
2007/120 ( PDF )
Breaking 104 bit WEP in less than 60 seconds
Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
2007/119 ( PDF )
Rerandomizable RCCA Encryption
Manoj Prabhakaran and Mike Rosulek
2007/118 ( PDF )
Smooth Projective Hashing and Two-Message Oblivious Transfer
Shai Halevi and Yael Tauman Kalai
2007/117 ( PDF )
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
Sihem Mesnager
2007/116 ( PDF )
A Zero-Knowledge Identification and Key Agreement Protocol
D.R. Stinson and J. Wu
2007/115 ( PDF )
Quadratic Almost Perfect Nonlinear Functions With Many Terms
Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire
2007/114 ( PDF )
High Efficiency Feedback Shift Register: $\sigma-$LFSR
Guang Zeng and Wenbao Han and Kaicheng He
2007/113 ( PDF )
An Enhanced ID-based Deniable Authentication Protocol on Pairings
Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
2007/112 ( PDF )
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
Koh-ichi Nagao
2007/111 ( PS PS.GZ PDF )
Privacy-Preserving Distributed Set Intersection
Qingsong Ye and Huaxiong Wang and Christophe Tartary
2007/110 ( PDF )
Construction of Pairing-Friendly Elliptic Curves
Woo Sug Kang
2007/109 ( PDF )
How to Enrich the Message Space of a Cipher
Thomas Ristenpart and Phillip Rogaway
2007/108 ( PDF )
An Improved Distinguisher for Dragon
Joo Yeon Cho and Josef Pieprzyk
2007/107 ( PDF )
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
Yasuyuki MURAKAMI, Takeshi NASAKO
2007/106 ( PDF )
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
Masao KASAHARA
2007/105 ( PS PS.GZ PDF )
Isodual Reduction of Lattices
Nicholas A. Howgrave-Graham
2007/104 ( PS PS.GZ PDF )
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel
2007/103 ( PDF )
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
Roberto Avanzi
2007/102 ( PDF )
On the Role of Scheduling in Simulation-Based Security
Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira
2007/101 ( PS PS.GZ PDF )
Practical Password Recovery on an MD5 Challenge and Response
Yu Sasaki and Go Yamamoto and Kazumaro Aoki
2007/100 ( PS PS.GZ PDF )
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Shengbao Wang and Zhenfu Cao
2007/099 ( PDF )
Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
Jaime Gutierrez and Alvar Ibeas
2007/098 ( PS PS.GZ PDF )
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
Lilya Budaghyan and Claude Carlet
2007/097 ( PS PS.GZ PDF )
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnsh{\o}j
2007/096 ( PS PS.GZ PDF )
Somos Sequence Near-Addition Formulas and Modular Theta Functions
R. Wm. Gosper and Rich Schroeppel
2007/095 ( PDF )
Generic Certificateless Encryption in the Standard Model
Qiong Huang and Duncan S. Wong
2007/094 ( PDF )
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
Xavier Boyen
2007/093 ( PDF )
HAPADEP: Human Asisted Pure Audio Device Pairing
Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/092 ( PDF )
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
Grzegorz Wojtenko
2007/091 ( PDF )
Arithmetic Operators for Pairing-Based Cryptography
Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto
2007/090 ( -- withdrawn -- )
On the security of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
2007/089 ( PS PS.GZ PDF )
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Ueli Maurer and Dominik Raub
2007/088 ( PDF )
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
2007/087 ( PDF )
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
Jie Liu and Jianhua Li
2007/086 ( PS PS.GZ PDF )
Non-Interactive Proofs for Integer Multiplication
Ivan Damgard and Rune Thorbek
2007/085 ( PS PS.GZ PDF )
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Hongbo Yu, Xiaoyun Wang
2007/084 ( PS PS.GZ PDF )
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
Sanjit Chatterjee and Palash Sarkar
2007/083 ( PDF )
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
Brett Hemenway and Rafail Ostrovsky
2007/082 ( PS PS.GZ PDF )
Deniable Authentication on the Internet
Shaoquan Jiang
2007/081 ( PDF )
Revisiting an Efficient Elliptic Curve Key Agreement Protocol
Maurizio Adriano Strangio
2007/080 ( -- withdrawn -- )
Weakly only Unforgeable Signature and Its Application in Group Signature
Sujing Zhou, Dongdai Lin
2007/079 ( PS PS.GZ PDF )
How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki and Kaoru Kurosawa
2007/078 ( PS PS.GZ PDF )
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Zuzana Beerliova-Trubiniova and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas
2007/077 ( -- withdrawn -- )
On bent functions with zero second derivatives
Sugata Gangopadhyay
2007/076 ( PDF )
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru Kurosawa and Kazuhiro Suzuki
2007/075 ( PS PS.GZ PDF )
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel
2007/074 ( PDF )
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
Hovav Shacham
2007/073 ( PS PS.GZ PDF )
Public Key Encryption that Allows PIR Queries
Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III
2007/072 ( -- withdrawn -- )
A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
Namin Yu and Howard M. Heys
2007/071 ( PS PS.GZ PDF )
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
Ahto Buldas and Sven Laur
2007/070 ( PS PS.GZ PDF )
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
Alexander Maximov
2007/069 ( PDF )
Nominative Signature: Application, Security Model and Construction
Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo
2007/068 ( -- withdrawn -- )
Efficient Hierarchical Identity Based Signature in the Standard Model
Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
2007/067 ( -- withdrawn -- )
withdrawn
withdrawn
2007/066 ( PDF )
Low-Density Attack Revisited
Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama
2007/065 ( PDF )
How to Derive Lower Bound on Oblivious Transfer Reduction
Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba
2007/064 ( PDF )
Algebraic Lower Bounds for Computing on Encrypted Data
Rafail Ostrovsky and William E. Skeith III
2007/063 ( PS PS.GZ PDF )
Constructing new APN functions from known ones
Lilya Budaghyan and Claude Carlet and Gregor Leander
2007/062 ( PS PS.GZ PDF )
Algebraic and Slide Attacks on KeeLoq
Nicolas T. Courtois and Gregory V. Bard and David Wagner
2007/061 ( PDF )
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
Neil Costigan and Michael Scott
2007/060 ( PDF )
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Yonatan Aumann and Yehuda Lindell
2007/059 ( PS PS.GZ PDF )
A Survey of Single Database PIR: Techniques and Applications
Rafail Ostrovsky and William E. Skeith III
2007/058 ( PS PS.GZ PDF )
The simplest method for constructing APN polynomials EA-inequivalent to power functions
Lilya Budaghyan
2007/057 ( PDF )
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
David Freeman
2007/056 ( PS PS.GZ )
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney
2007/055 ( PDF )
Cryptanalysis of the KeeLoq block cipher
Andrey Bogdanov
2007/054 ( PS PS.GZ PDF )
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
Souradyuti Paul
2007/053 ( PS PS.GZ PDF )
Compiler Assisted Elliptic Curve Cryptography
M. Barbosa and A. Moss and D. Page
2007/052 ( PS PS.GZ PDF )
Forward-Secure Sequential Aggregate Authentication
Di Ma, and Gene Tsudik
2007/051 ( PDF )
Forward-secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester and Breno de Medeiros
2007/050 ( PDF )
Special block cipher family DN and new generation SNMAC-type hash function family HDN
Vlastimil KLIMA
2007/049 ( PDF )
Security Arguments for a Class of ID-based Signatures
jin zhou and ya-juan zhang and yue-fei zhu
2007/048 ( PDF )
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Daniel R. L. Brown and Kristian Gj{\o}steen
2007/047 ( PDF )
New Constructions of Fuzzy Identity-Based Encryption
Joonsang Baek and Willy Susilo and Jianying Zhou
2007/046 ( PS PS.GZ )
Direct Reduction of String (1,2)-OT to Rabin's OT
Kaoru Kurosawa and Takeshi Koshiba
2007/045 ( PDF )
A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2007/044 ( PDF )
Design and Primitive Specification for Shannon
Philip Hawkes and Cameron McDonald and Michael Paddon and Gregory Rose and Miriam Wiggers de Vries
2007/043 ( PS PS.GZ PDF )
Reflection Attacks on Product Ciphers
Orhun Kara
2007/042 ( PDF )
Authorship Proof for Textual Document
J. Wu and D. R. Stinson
2007/041 ( PS PS.GZ PDF )
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B. Skoric and S. Katzenbeisser and M.U. Celik
2007/040 ( PS PS.GZ PDF )
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
Pradeep Kumar Mishra and Vassil Dimitrov
2007/039 ( PDF )
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Onur Aciicmez and Shay Gueron and Jean-Pierre Seifert
2007/038 ( PDF )
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Joo Yeon Cho and Josef Pieprzyk
2007/037 ( PDF )
Best Quadratic Approximations of Cubic Boolean Functions
Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis
2007/036 ( PDF )
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
Eike Kiltz
2007/035 ( PS PS.GZ PDF )
Cryptanalysis of white box DES implementations
Louis Goubin and Jean-Michel Masereel and Michael Quisquater
2007/034 ( PDF )
A New Type of Cipher: DICING_CSB
Li An-Ping
2007/033 ( PDF )
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Eike Kiltz
2007/032 ( PDF )
An improved collision probability for CBC-MAC and PMAC
Avradip Mandal and Mridul Nandi
2007/031 ( PDF )
Improved Security Analysis of PMAC
Mridul Nandi and Avradip Mandal
2007/030 ( PS PS.GZ PDF )
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang Cui and Eiichiro Fujisaki and Goichiro Hanaoka and Hideki Imai and Rui Zhang
2007/029 ( PDF )
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Debrup Chakraborty and Palash Sarkar
2007/028 ( PS PS.GZ )
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
Debrup Chakraborty and Palash Sarkar
2007/027 ( -- withdrawn -- )
Verifying Data Integrity with Few Queries to Untrusted Memory
Nachiketh R. Potlapally
2007/026 ( PS PS.GZ PDF )
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Shengbao Wang and Zhenfu Cao and Maurizio Adriano Strangio and Lihua Wang
2007/025 ( PDF )
Private Locally Decodable Codes
Rafail Ostrovsky and Omkant Pandey and Amit Sahai
2007/024 ( PDF )
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
Gregory V. Bard, and Nicolas T. Courtois, and Chris Jefferson.
2007/023 ( PDF )
Efficient Hybrid Encryption from ID-Based Encryption
Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz
2007/022 ( PS PS.GZ PDF )
On Perfectly Balanced Boolean Functions
O. A. Logachev
2007/021 ( PDF )
Two Trivial Attacks on Trivium
Alexander Maximov and Alex Biryukov
2007/020 ( PDF )
TinyTate: Identity-Based Encryption for Sensor Networks
Leonardo B. Oliveira and Diego Aranha and Eduardo Morais and Felipe Daguano and Julio Lo'pez and Ricardo Dahab
2007/019 ( PDF )
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Changshe Ma, Jian Weng and Dong Zheng
2007/018 ( PS PS.GZ PDF )
Strongly-Secure Identity-based Key Agreement and Anonymous Extension
Sherman S.M. Chow and Kim-Kwang Raymond Choo
2007/017 ( PDF )
Group Decryption
Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu and Yumin Wang
2007/016 ( -- withdrawn -- )
VEST Ciphers
Sean O'Neil and Benjamin Gittins and Howard A. Landman
2007/015 ( PS PS.GZ PDF )
Group Encryption
Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
2007/014 ( PDF )
Invertible Universal Hashing and the TET Encryption Mode
Shai Halevi
2007/013 ( PDF )
Optimised versions of the Ate and Twisted Ate Pairings
Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto
2007/012 ( PDF )
Interactive two-channel message authentication based on interactive-collision Resistant hash functions
Atefeh Mashatan and Douglas R. Stinson
2007/011 ( PDF )
Universally Composable Key-evolving Signature
Jin Zhou and TingMao Chang and YaJuan Zhang and YueFei Zhu
2007/010 ( PDF )
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
David Freeman and Kristin Lauter
2007/009 ( PDF )
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
Zhenfu Cao, Xiaolei Dong and Licheng Wang
2007/008 ( PS PS.GZ PDF )
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
Dong Hoon Lee and Je Hong Park and Jaewoo Han
2007/007 ( PDF )
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Wei Gao and Xueli Wang and Guilin Wang and Fei Li
2007/006 ( PDF )
Efficient Dynamic k-Times Anonymous Authentication
Lan Nguyen
2007/005 ( PDF )
Privacy-Protecting Coupon System Revisited
Lan Nguyen
2007/004 ( PDF )
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
*Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
2007/003 ( PS PS.GZ PDF )
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
Johann Groszschaedl and Alexander Szekely and Stefan Tillich
2007/002 ( -- withdrawn -- )
Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
Huang Lin and Zhenfu Cao
2007/001 ( PS PS.GZ PDF )
Families of genus 2 curves with small embedding degree
Laura Hitt


[ Cryptology ePrint archive ]