Cryptology ePrint Archive: Listing for 2008


2008/545 ( PDF )
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
Vipul Goyal and Amit Sahai
2008/544 ( PDF )
Comments on two multi-server authentication protocols
*Yalin Chen 1, Chun-Hui Huang 2, Jue-Sam Chou3
2008/543 ( PDF )
Odd-Char Multivariate Hidden Field Equations
Chia-Hsin Owen Chen and Ming-Shing Chen and Jintai Ding and Fabian Werner and Bo-Yin Yang
2008/542 ( PDF )
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu
2008/541 ( PDF )
Resettably-Sound Resettable Zero Knowledge Arguments for NP
Yi Deng
2008/540 ( PDF )
New Impossible Differential Attacks on AES
Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim
2008/539 ( PDF )
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Jan Camenisch and Markulf Kohlweiss and Claudio Soriente
2008/538 ( PDF )
Supporting Non-membership Proofs with Bilinear-map Accumulators
Ivan Damgård and Nikos Triandopoulos
2008/537 ( PDF )
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin and Kazukuni Kobara and Hideki Imai
2008/536 ( PS PS.GZ PDF )
Predicate Privacy in Encryption Systems
Emily Shen and Elaine Shi and Brent Waters
2008/535 ( PDF )
A Recursive Threshold Visual Cryptography Scheme
Abhishek Parakh and Subhash Kak
2008/534 ( PDF )
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay and Daniel Wichs and Hong-Sheng Zhou
2008/533 ( PDF )
Collusion-Free Multiparty Computation in the Mediated Model
Jonathan Katz and Yehuda Lindell
2008/532 ( PDF )
Semi-free start collision attack on Blender
Xu Liangyu and Li Ji
2008/531 ( PDF )
Collision Attack on the Waterfall Hash Function
Scott Fluhrer
2008/530 ( PDF )
Fast hashing to G2 on pairing friendly curves
Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
2008/529 ( PDF )
A Hardware Interface for Hashing Algorithms
Zhimin Chen, Sergey Morozov, Patrick Schaumont
2008/528 ( PDF )
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
Georg Fuchsbauer and David Pointcheval
2008/527 ( PS PS.GZ PDF )
Properties of Cryptographic Hash Functions
Michal Rjaško
2008/526 ( PDF )
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Patrick Longa, and Catherine Gebotys
2008/525 ( PDF )
On The Diffie-Hellman Assumption
R. Bhaskar, K. Chandrasekaran, S. Lokam, P.L. Montgomery, R. Venkatesan, Y. Yacobi
2008/524 ( PDF )
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
Li Hongda and Feng dengguo and Li Bao and Xue Haixia
2008/523 ( -- withdrawn -- )
Privacy Preserving Multiset Union with ElGamal Encryption
Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon
2008/522 ( PDF )
Twisted Edwards Curves Revisited
Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
2008/521 ( PDF )
Generating Shorter Bases for Hard Random Lattices
Joel Alwen and Chris Peikert
2008/520 ( PDF )
Cryptanalysis of the Hash Function LUX-256
Shuang Wu and Dengguo Feng and Wenling Wu
2008/519 ( PDF )
Collision attack on NaSHA-512
Li Ji and Xu Liangyu and Guan Xu
2008/518 ( -- withdrawn -- )
A NEW HASH ALGORITHM$:$ Khichidi$-$1
Natarajan Vijayarangan
2008/517 ( PS PS.GZ PDF )
Improving the Rules of the DPA Contest
Francois-Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat-Charvillon
2008/516 ( PDF )
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
Zheng Yuan and Keting Jia and Wei Wang and Xiaoyun Wang
2008/515 ( PDF )
Cryptanalysis of RadioGatun
Thomas Fuhr and Thomas Peyrin
2008/514 ( PS PS.GZ PDF )
Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
Tapan Rai and Stanislav Bulygin
2008/513 ( PDF )
Improved Cryptanalysis of SHAMATA-BC
Adem Atalay, Orhun Kara and Ferhat Karakoç
2008/512 ( PS PS.GZ )
A new class of Bent functions in Polynomial Forms
Sihem Mesnager
2008/511 ( PDF )
Classification of the SHA-3 Candidates
Ewan Fleischmann and Christian Forler and Michael Gorski
2008/510 ( PDF )
Reconstructing RSA Private Keys from Random Key Bits
Nadia Heninger and Hovav Shacham
2008/509 ( PS PS.GZ PDF )
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
2008/508 ( PDF )
Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
Fabrice J.P.R. Pautot
2008/507 ( PDF )
A non-delegatable identity-based strong designated verifier signature scheme
Bin Wang
2008/506 ( PDF )
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/505 ( PDF )
removed
removed
2008/504 ( PS PS.GZ PDF )
The $n^c$-Unique Shortest Vector Problem is Hard
Vadim Lyubashevsky
2008/503 ( PS PS.GZ PDF )
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
Yevgeniy Dodis and Daniel Wichs
2008/502 ( PDF )
Extended Access Structures and Their Cryptographic Applications
Vanesa Daza and Javier Herranz and Paz Morillo and Carla Rafols
2008/501 ( PDF )
Some Observations on SHAMATA
Ewan Fleischmann and Michael Gorski
2008/500 ( PDF )
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
Hai Huang and Zhenfu Cao
2008/499 ( PDF )
Some Observations on HC-128
Subhamoy Maitra and Goutam Paul and Shashwat Raizada
2008/498 ( PDF )
Small Odd Prime Field Multivariate PKCs
Anna Chen an Ming-Shing Chen and Tien-Ren Chen and Chen-Mou Cheng and Jintai Ding and Eric Kuo and Frost Li and Bo-Yin Yang
2008/497 ( PDF )
On the Correctness of An Approach Against Side-channel attacks
Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang
2008/496 ( PDF )
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook and Moti Yung and Angelos Keromytis
2008/495 ( PDF )
Non-Malleable Obfuscation
Ran Canetti and Mayank Varia
2008/494 ( PS PS.GZ PDF )
Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi and Leonid Reyzin
2008/493 ( PDF )
Secure Parameters for SWIFFT
Johannes Buchmann and Richard Lindner
2008/492 ( PDF )
Modeling Computational Security in Long-Lived Systems, Version 2
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
2008/491 ( PDF )
A CM construction for curves of genus 2 with p-rank 1
Laura Hitt O'Connor and Gary McGuire and Michael Naehrig and Marco Streng
2008/490 ( PDF )
On the final exponentiation for calculating pairings on ordinary elliptic curves
Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
2008/489 ( PDF )
HAIL: A High-Availability and Integrity Layer for Cloud Storage
Kevin D. Bowers and Ari Juels and Alina Oprea
2008/488 ( PDF )
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer and Jonathan Katz and David Naccache
2008/487 ( PDF )
Secure Certificateless Public Key Encryption without Redundancy
Yinxia Sun and Futai Zhang
2008/486 ( PDF )
Inside the Hypercube
Jean-Philippe Aumasson and Eric Brier and Willi Meier and María Naya-Plasencia and Thomas Peyrin
2008/485 ( -- withdrawn -- )
Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
Rongquan Feng and Zilong Wang and Hongfeng Wu
2008/484 ( PDF )
Sharp lower bounds on the extractable randomness from non-uniform sources
Boris Skoric and Chibuzo Obi and Evgeny Verbitskiy and Berry Schoenmakers
2008/483 ( PDF )
Sharing DSS by the Chinese Remainder Theorem
Kamer Kaya and Ali Aydın Selçuk
2008/482 ( PDF )
The Generic Hardness of Subset Membership Problems under the Factoring Assumption
Tibor Jager and Jörg Schwenk
2008/481 ( PS PS.GZ PDF )
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
Chris Peikert
2008/480 ( PDF )
ECM on Graphics Cards
Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang
2008/479 ( PDF )
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren and Shizhu Bian
2008/478 ( PS PS.GZ PDF )
Attribute-Based Encryption with Key Cloning Protection
M. J. Hinek and S. Jiang and R. Safavi-Naini and S. F. Shahandashti
2008/477 ( PDF )
On a New Formal Proof Model for RFID Location Privacy (Extended Version)
Ton van Deursen and Sasa Radomirovic
2008/476 ( PS PS.GZ PDF )
The $F_f$-Family of Protocols for RFID-Privacy and Authentication
Erik-Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa
2008/475 ( PDF )
Sphinx: A Compact and Provably Secure Mix Format
George Danezis and Ian Goldberg
2008/474 ( PDF )
Access Controls for Oblivious and Anonymous Systems
Scott Coull and Matthew Green and Susan Hohenberger
2008/473 ( PDF )
Exploring Cipherspace: Combining stream ciphers and block ciphers
Sandy Harris
2008/472 ( PDF )
Practical attacks against WEP and WPA
Martin Beck and Erik Tews
2008/471 ( PDF )
Automatic Generation of Sound Zero-Knowledge Protocols
Endre Bangerter and Jan Camenisch and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
2008/470 ( PDF )
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
Paolo D'Arco and Alfredo De Santis
2008/469 ( PS PS.GZ PDF )
Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
Stephane Manuel
2008/468 ( PDF )
A CCA2 Secure Variant of the McEliece Cryptosystem
Nico D\"{o}ttling, Rafael Dowsley, J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento
2008/467 ( PDF )
Cryptanalysis of EnRUPT
Dmitry Khovratovich and Ivica Nikolic
2008/466 ( PS PS.GZ PDF )
Combined (identity-based) public key schemes
Maria Isabel Gonzalez Vasco and Florian Hess and Rainer Steinwandt
2008/465 ( PDF )
Secure Arithmetic Computation with No Honest Majority
Yuval Ishai and Manoj Prabhakaran and Amit Sahai
2008/464 ( PDF )
Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
Michael Kounavis and Shay Gueron
2008/463 ( PDF )
Key-Private Proxy Re-Encryption
Giuseppe Ateniese and Karyn Benson and Susan Hohenberger
2008/462 ( PDF )
Unconditionally Secure Multiparty Set Intersection Re-Visited
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/461 ( -- withdrawn -- )
On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan
2008/460 ( PS PS.GZ PDF )
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee
2008/459 ( PDF )
A variant of Wiener's attack on RSA
Andrej Dujella
2008/458 ( PDF )
Complete Fairness in Multi-Party Computation Without an Honest Majority
S. Dov Gordon and Jonathan Katz
2008/457 ( PDF )
On the Composability of Statistically Secure Bit Commitments
Rafael Dowsley and Jeroen van de Graaf and Jörn Müller-Quade and Anderson C. A. Nascimento
2008/456 ( PDF )
The Diffie-Hellman problem and generalization of Verheul's theorem
Dustin Moody
2008/455 ( PDF )
New hash function designs
Igor Semaev
2008/454 ( PDF )
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2008/453 ( PDF )
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Ahmad-Reza Sadeghi and Thomas Schneider
2008/452 ( -- withdrawn -- )
Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems
Rui Xue and Dengguo Feng
2008/451 ( PDF )
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann
2008/450 ( PDF )
On the Security of Fully Collusion Resistant Traitor Tracing Schemes
Yongdong WU and Robert H. Deng
2008/449 ( PDF )
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou
2008/448 ( PS PS.GZ PDF )
Authenticated Adversarial Routing
Yair Amir and Paul Bunn and Rafail Ostrovsky
2008/447 ( PS PS.GZ PDF )
Divisible On-line/Off-line Signatures
Chong-zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang
2008/446 ( PDF )
Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
Mike Burmester and Reihaneh Safavi-Naini and Gelareh Taban
2008/445 ( PDF )
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
Thomas Chardin and Raphaël Marinier
2008/444 ( PS PS.GZ PDF )
Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
Rachel Shipsey and Christine Swart
2008/443 ( PDF )
Key differentiation attacks on stream ciphers
Enes Pasalic
2008/442 ( PS PS.GZ PDF )
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
Anton Kargl and Stefan Pyka and Hermann Seuschek
2008/441 ( PDF )
How Risky is the Random-Oracle Model?
Gaetan Leurent and Phong Q. Nguyen
2008/440 ( PDF )
Robust Encryption
Michel Abdalla and Mihir Bellare and Gregory Neven
2008/439 ( PDF )
Linear equivalence between elliptic curves in Weierstrass and Hesse form
Alexander Rostovtsev
2008/438 ( PDF )
New Related-Key Boomerang Attacks on AES
Michael Gorski and Stefan Lucks
2008/437 ( PDF )
Divisibility, Smoothness and Cryptographic Applications
David Naccache and Igor Shparlinski
2008/436 ( -- withdrawn -- )
BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
Zhibin Zhou and Dijiang Huang
2008/435 ( PS PS.GZ PDF )
Obtaining and solving systems of equations in key variables only for the small variants of AES
Stanislav Bulygin and Michael Brickenstein
2008/434 ( PDF )
The computational SLR: a logic for reasoning about computational indistinguishability
Yu Zhang
2008/433 ( PDF )
On differences of quadratic residues
Guillermo Morales-Luna
2008/432 ( PDF )
Dynamic Provable Data Possession
C. Chris Erway and Alptekin Kupcu and Charalampos Papamanthou and Roberto Tamassia
2008/431 ( PDF )
Usable Optimistic Fair Exchange
Alptekin Kupcu and Anna Lysyanskaya
2008/430 ( PDF )
Cryptographic Protocol Composition via the Authentication Tests
Joshua D. Guttman
2008/429 ( PDF )
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran and Rafail Ostrovsky and William E. Skeith III
2008/428 ( PDF )
Delegatable Anonymous Credentials
Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham
2008/427 ( PDF )
LEGO for Two Party Secure Computation
Jesper Buus Nielsen and Claudio Orlandi
2008/426 ( PDF )
On Kasami Bent Functions
Deepmala Sharma and Sugata Gangopadhyay
2008/425 ( PDF )
Efficient Asynchronous Multiparty Computation with Optimal Resilience
Arpita Patra and Ashish Choudhury and C. Pandu Rangan
2008/424 ( PDF )
Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra, Ashish Choudhury and C. Pandu Rangan
2008/423 ( PS PS.GZ PDF )
Searchable encryption with decryption in the standard model
Dennis Hofheinz and Enav Weinreb
2008/422 ( PDF )
A New Approach for Algebraically Homomorphic Encryption
Frederik Armknecht and Ahmad-Reza Sadeghi
2008/421 ( PDF )
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
Kaoru Kurosawa and Kazuhiro Suzuki
2008/420 ( PDF )
Oblivious Transfer from Weak Noisy Channels
J\"urg Wullschleger
2008/419 ( PS PS.GZ PDF )
Parsing ambiguities in authentication and key establishment protocols
Liqun Chen and Chris J. Mitchell
2008/418 ( PDF )
Privacy-Enhancing First-Price Auctions Using Rational Cryptography
Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos
2008/417 ( PDF )
On the security of pairing-friendly abelian varieties over non-prime fields
Naomi Benger and Manuel Charlemagne and David Freeman
2008/416 ( PDF )
Almost-Asynchronous MPC with Faulty Minority
Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
2008/415 ( PDF )
Asynchronous Multiparty Computation: Theory and Implementation
Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
2008/414 ( PDF )
On the Number of Synchronous Rounds Required for Byzantine Agreement
Matthias Fitzi and Jesper Buus Nielsen
2008/413 ( PS PS.GZ PDF )
Password Mistyping in Two-Factor-Authenticated Key Exchange
Vladimir Kolesnikov and Charles Rackoff
2008/412 ( PDF )
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2008/411 ( PDF )
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
Bo Zhu, Yanfei Zheng, Yaowei Zhou and Kefei Chen
2008/410 ( PDF )
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
Xu an Wang and Xiaoyuan Yang and Fagen Li
2008/409 ( PDF )
A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension
Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka
2008/408 ( PDF )
The Enigmatique Toolkit
Christopher Billings
2008/407 ( PS PS.GZ PDF )
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee
2008/406 ( PDF )
An asymptotically optimal RFID protocol against relay attacks
Gildas Avoine and Aslan Tchamkerten
2008/405 ( PDF )
Slid Pairs in Salsa20 and Trivium
Deike Priemuth-Schmid and Alex Biryukov
2008/404 ( PS PS.GZ PDF )
Pairing with Supersingular Trace Zero Varieties Revisited
Emanuele Cesena
2008/403 ( PDF )
SPICE Simulation of a "Provably Secure" True Random Number Generator
Markus Dichtl and Bernd Meyer and Hermann Seuschek
2008/402 ( PDF )
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Jean-Charles Faugère and Ludovic Perret
2008/401 ( PDF )
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
Mridul Nandi
2008/400 ( PDF )
Comments on two password based protocols
Yalin Chen and Hung-Min Sun and Chun-Hui Huang and Jue-Sam Chou
2008/399 ( PDF )
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/398 ( PS PS.GZ PDF )
Generating genus two hyperelliptic curves over large characteristic finite fields
Takakazu Satoh
2008/397 ( -- withdrawn -- )
A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
Uttam Kr. Mondal , Satyendra Nath Mandal and J. PalChoudhury
2008/396 ( PDF )
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Subhamoy Maitra and Goutam Paul
2008/395 ( PDF )
New Applications of Differential Bounds of the SDS Structure
Jiali Choy and Khoongming Khoo
2008/394 ( PDF )
Attribute-Based Ring Signatures
Jin Li and Kwangjo Kim
2008/393 ( PDF )
How Far Must You See To Hear Reliably
Pranav K Vasishta and Anuj Gupta and Prasant Gopal and Piyush Bansal and Rishabh Mukherjee and Poornima M and Kannan Srinathan and Kishore Kothapalli
2008/392 ( PDF )
GUC-Secure Set-Intersection Computation
TIAN Yuan and WANG Ying
2008/391 ( PDF )
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
Tao Xie FanBao Liu DengGuo Feng
2008/390 ( PDF )
Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes
2008/389 ( PS PS.GZ )
Optimal Subset-Difference Broadcast Encryption with Free Riders
Murat Ak and Kamer Kaya and Ali Aydin Selcuk
2008/388 ( PS PS.GZ PDF )
Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche and David R. Kohel and Francesco Sica
2008/387 ( -- withdrawn -- )
None
None
2008/386 ( PDF )
Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table
Michael Lifliand
2008/385 ( PDF )
Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur and Adi Shamir
2008/384 ( PDF )
Improving the Boneh-Franklin Traitor Tracing Scheme
Pascal Junod and Alexandre Karlov and Arjen K. Lenstra
2008/383 ( PS PS.GZ PDF )
Hierarchical Identity Based Encryption with Polynomially Many Levels
Craig Gentry and Shai Halevi
2008/382 ( PDF )
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
Mark Manulis and Damien Leroy and Francois Koeune and Olivier Bonaventure and Jean-Jacques Quisquater
2008/381 ( PDF )
New AES software speed records
Daniel J. Bernstein and Peter Schwabe
2008/380 ( PDF )
Dynamic Threshold Cryptosystem without Group Manager
Andreas Noack and Stefan Spitz
2008/379 ( PDF )
A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare and Todor Ristov
2008/378 ( PDF )
Additively Homomorphic Encryption with d-Operand Multiplications
Carlos Aguilar Melchor, Philippe Gaborit, and Javier Herranz
2008/377 ( PDF )
TRIVIUM's output partially autocancels
Michael Vielhaber
2008/376 ( PDF )
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
Cas J.F. Cremers
2008/375 ( PDF )
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
Jan Camenisch and Nishanth Chandran and Victor Shoup
2008/374 ( PDF )
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto
2008/373 ( PS PS.GZ PDF )
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
2008/372 ( PDF )
Enumeration of Balanced Symmetric Functions over GF(p)
Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
2008/371 ( PDF )
Unconditionally Reliable Message Transmission in Directed Hypergraphs
Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/370 ( PDF )
Compartmented Threshold RSA Based on the Chinese Remainder Theorem
Sorin Iftene and Stefan Ciobaca and Manuela Grindei
2008/369 ( PDF )
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
Shahram Khazaei and Willi Meier
2008/368 ( PDF )
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
Varad Kirtane and C. Pandu Rangan
2008/367 ( PS PS.GZ PDF )
{Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
Peeter Laud and Long Ngo
2008/366 ( PDF )
Unique Shortest Vector Problem for max norm is NP-hard
Than Quang Khoat and Nguyen Hong Tan
2008/365 ( PDF )
Entropy Bounds for Traffic Confirmation
Luke O'Connor
2008/364 ( PDF )
Zcipher Algorithm Specification
Ilya O Levin
2008/363 ( PS PS.GZ PDF )
An argument for Hamiltonicity
Vadym Fedyukovych
2008/362 ( PDF )
The Cost of False Alarms in Hellman and Rainbow Tradeoffs
Jin Hong
2008/361 ( -- withdrawn -- )
IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
William Whyte (editor) and Nick Howgrave-Graham and Jeff Hoffstein and Jill PIpher and Joseph H. Silverman and Phil Hirschhorn
2008/360 ( PDF )
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
Saurabh Dutta and Jyotsna Kumar mandal
2008/359 ( PS PS.GZ PDF )
Argument of knowledge of a bounded error
Vadym Fedyukovych
2008/358 ( PS PS.GZ PDF )
History-Independent Cuckoo Hashing
Moni Naor and Gil Segev and Udi Wieder
2008/357 ( PS PS.GZ PDF )
A protocol for K-multiple substring matching
Vadym Fedyukovych and Vitaliy Sharapov
2008/356 ( PDF )
Using Commutative Encryption to Share a Secret
Saied Hosseini Khayat
2008/355 ( PS PS.GZ PDF )
An argument for rank metric
Vadym Fedyukovych
2008/354 ( -- withdrawn -- )
On DDos Attack against Proxy in Re-encryption and Re-signature
Xu an Wang
2008/353 ( PDF )
Weaknesses in HENKOS Stream Cipher
Prasanth Kumar Thandra and S.A.V. Satya Murty and R Balasubramanian
2008/352 ( PDF )
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Alexandra Boldyreva and Serge Fehr and Adam O'Neill
2008/351 ( PDF )
Flaws in Some Self-Healing Key Distribution Schemes with Revocation
Vanesa Daza and Javier Herranz and German Saez
2008/350 ( PDF )
Higher Order Differential Cryptanalysis of Multivariate Hash Functions
Yiyuan Luo and Xuejia Lai
2008/349 ( PDF )
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf
2008/348 ( PS PS.GZ )
Iterative Probabilistic Reconstruction of RC4 Internal States
Jovan Golic and Guglielmo Morgari
2008/347 ( PDF )
Information Leakage in Optimal Anonymized and Diversified Data
Chengfang Fang and Ee-Chien Chang
2008/346 ( PDF )
Remote Integrity Check with Dishonest Storage Server
Ee-Chien Chang and Jia Xu
2008/345 ( PDF )
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
Jooyoung Lee and Choon Sik Park
2008/344 ( PDF )
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
Jooyoung Lee and Je Hong Park
2008/343 ( PDF )
Efficient RFID authentication protocols based on pseudorandom sequence generators
Jooyoung Lee and Yongjin Yeom
2008/342 ( PS PS.GZ PDF )
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and Pandu Rangan Chandrasekaran
2008/341 ( PDF )
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran
2008/340 ( -- withdrawn -- )
On construction of signature schemes based on birational permutations over noncommutative rings
Yasufumi Hashimoto and Kouichi Sakurai
2008/339 ( PDF )
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
Mohamed El-Hadedy and Danilo Gligoroski and Svein J. Knapskog
2008/338 ( PS PS.GZ PDF )
An improvement of discrete Tardos fingerprinting codes
Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and Kazuto Ogawa and Hideki Imai
2008/337 ( PDF )
Modified Huang-Wang's Convertible Nominative Signature Scheme
Wei Zhao and Dingfeng Ye
2008/336 ( PDF )
New attacks on ISO key establishment protocols
Anish Mathuria and G. Sriram
2008/335 ( PDF )
Public Key Cryptography from Different Assumptions
Boaz Barak and Avi Wigderson
2008/334 ( PDF )
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
Darrel Hankerson and Koray Karabina and Alfred Menezes
2008/333 ( PDF )
Explicit hard instances of the shortest vector problem
Johannes Buchmann and Richard Lindner and Markus Rückert and Michael Schneider
2008/332 ( PDF )
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Mahalingam Ramkumar
2008/331 ( PDF )
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
2008/330 ( -- withdrawn -- )
Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He
2008/329 ( PS PS.GZ PDF )
SMS4 Encryption Algorithm for Wireless Networks
Whitfield Diffie and George Ledin (translators)
2008/328 ( PDF )
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
Hemanta Maji and Manoj Prabhakaran and Mike Rosulek
2008/327 ( PDF )
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
Le Trieu Phong and Wakaha Ogata
2008/326 ( PDF )
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
M. B. Paterson and D. R. Stinson
2008/325 ( PDF )
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Chunbo Ma and Jun Ao
2008/324 ( PDF )
RSA-TBOS Signcryption with Proxy Re-encryption.
Varad Kirtane and C.Pandu Rangan
2008/323 ( PDF )
A new identity based proxy signature scheme
Bin Wang
2008/322 ( PDF )
Lattice-based Blind Signatures
Markus Rückert
2008/321 ( PDF )
A correction to ``Efficient and Secure Comparison for On-Line Auctions''
Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard
2008/320 ( PDF )
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Danilo Gligoroski and Smile Markovski and Svein J. Knapskog
2008/319 ( PDF )
Yet Another Secure Distance-Bounding Protocol
Ventzislav Nikov and Marc Vauclair
2008/318 ( PDF )
Attacking and defending the McEliece cryptosystem
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2008/317 ( -- withdrawn -- )
Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
Abdulwahed M. Ismail and Mohamad Rushdan
2008/316 ( PDF )
Signing a Linear Subspace: Signature Schemes for Network Coding
Dan Boneh and David Freeman and Jonathan Katz and Brent Waters
2008/315 ( PDF )
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
Santanu Sarkar and Subhamoy Maitra and Sumanta Sarkar
2008/314 ( PDF )
Scratch, Click & Vote: E2E voting over the Internet
Miroslaw Kutylowski and Filip Zagorski
2008/313 ( PS PS.GZ PDF )
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2008/312 ( PDF )
Improved efficiency of Kiltz07-KEM
Xianhui Lu, Xuejia Lai, Dake He
2008/311 ( PDF )
Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
Orr Dunkelman and Nathan Keller
2008/310 ( PDF )
Attacks on RFID Protocols
T. van Deursen and S. Radomirovic
2008/309 ( PDF )
Revocation Systems with Very Small Private Keys
Allison Lewko and Amit Sahai and Brent Waters
2008/308 ( PDF )
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen
2008/307 ( PDF )
Full Security:Fuzzy Identity Based Encryption
Liming Fang and Jinyue Xia
2008/306 ( PDF )
Combinatorial batch codes
M. B. Paterson and D. R. Stinson and R. Wei
2008/305 ( PDF )
Identity-Based Directed Signature Scheme from Bilinear Pairings
Xun Sun and Jian-hua Li and Gong-liang Chen and Shu-tang Yang
2008/304 ( PDF )
A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung
2008/303 ( PDF )
Complete Fairness in Secure Two-Party Computation
S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell
2008/302 ( PDF )
Secure Biometric Authentication With Improved Accuracy
M. Barbosa, S. Cauchie, T. Brouard and S. Melo de Sousa
2008/301 ( PDF )
Accountability of Perfect Concurrent Signature
Yunfeng Li, Dake He, Xianhui Lu
2008/300 ( PDF )
Cheon's algorithm, pairing inversion and the discrete logarithm problem
David J. Mireles Morales
2008/299 ( PDF )
An analysis of the infrastructure in real function fields
David J. Mireles Morales
2008/298 ( PDF )
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
Ryou Fujita and Kohtaro Tadaki and Shigeo Tsujii
2008/297 ( PDF )
Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
Hongzhen Du and Qiaoyan Wen
2008/296 ( PDF )
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, and Huaxiong Wang
2008/295 ( PS PS.GZ PDF )
Foundations of Group Key Management – Framework, Security Model and a Generic Construction
Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and Pandu Rangan Chandrasekaran
2008/294 ( PDF )
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
Atefeh Mashatan and Douglas R. Stinson
2008/293 ( PDF )
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik
2008/292 ( PDF )
Another approach to pairing computation in Edwards coordinates
Sorina Ionica and Antoine Joux
2008/291 ( PDF )
How to Protect Yourself without Perfect Shredding
Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah-Yoh Lim
2008/290 ( PDF )
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Brent Waters
2008/289 ( PDF )
Sharemind: a framework for fast privacy-preserving computations
Dan Bogdanov and Sven Laur and Jan Willemson
2008/288 ( PDF )
How to Launch A Birthday Attack Against DES
Zhengjun Cao
2008/287 ( PDF )
Authenticated Byzantine Generals in Dual Failure Model
Anuj Gupta and Prasant Gopal and Piyush Bansal and Kannan Srinathan
2008/286 ( PS PS.GZ )
One-Up Problem for (EC)DSA
Daniel R. L. Brown
2008/285 ( PDF )
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Jithra Adikari and Vassil Dimitrov and Laurent Imbert
2008/284 ( PDF )
Breaking the Akiyama-Goto cryptosystem
P. Ivanov and J. F. Voloch
2008/283 ( PDF )
Attacks on Singelee and Preneel's protocol
Jorge Munilla and Alberto Peinado
2008/282 ( PDF )
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Jihye Kim and Gene Tsudik
2008/281 ( PDF )
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
Taehyun Kim, Jongsung Kim, Seokhie Hong and Jaechul Sung
2008/280 ( PDF )
FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto
2008/279 ( PDF )
Delegating Capabilities in Predicate Encryption Systems
Elaine Shi and Brent Waters
2008/278 ( PS PS.GZ PDF )
An Improved Robust Fuzzy Extractor
Bhavana Kanukurthi and Leonid Reyzin
2008/277 ( PS PS.GZ PDF )
A strategy for any DAA Issuer and an additional verification by a Host
Vadym Fedyukovych
2008/276 ( PS PS.GZ PDF )
Signcryption with Proxy Re-encryption
Chandrasekar S. and Ambika K. and Pandu Rangan C.
2008/275 ( PDF )
Certificate-Based Signature Schemes without Pairings or Random Oracles
Joseph K. Liu \and Joonsang Baek \and Willy Susilo \and Jianying Zhou
2008/274 ( PS PS.GZ PDF )
Twisted Ate Pairing on Hyperelliptic Curves and Applications
Fangguo Zhang
2008/273 ( PDF )
White-Box Cryptography: Formal Notions and (Im)possibility Results
Amitabh Saxena and Brecht Wyseur and Bart Preneel
2008/272 ( PS PS.GZ PDF )
A New Hash Family Obtained by Modifying the SHA-2 Family
Somitra Kumar Sanadhya and Palash Sarkar
2008/271 ( PS PS.GZ PDF )
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
Somitra Kumar Sanadhya and Palash Sarkar
2008/270 ( PS PS.GZ PDF )
New Collision attacks Against Up To 24-step SHA-2
Somitra Kumar Sanadhya and Palash Sarkar
2008/269 ( PS PS.GZ PDF )
Searching for Low Weight Codewords in Linear Binary Codes
Somitra Kumar Sanadhya and Palash Sarkar
2008/268 ( PDF )
Adaptive Security in Broadcast Encryption Systems
Craig Gentry and Brent Waters
2008/267 ( PDF )
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart
2008/266 ( PDF )
Information-Theoretically Secure Voting Without an Honest Majority
Anne Broadbent and Alain Tapp
2008/265 ( PDF )
Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
Steven D. Galbraith and Michael Harrison and David J. Mireles Morales
2008/264 ( PDF )
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
Robin Künzler and Jörn Müller-Quade and Dominik Raub
2008/263 ( PS PS.GZ PDF )
Slide Attacks on a Class of Hash Functions
Michael Gorski and Stefan Lucks and Thomas Peyrin
2008/262 ( PDF )
Statistically Reliable and Secure Message Transmission in Directed Networks
Arpita Patra and Ashish Choudhury and C. Pandu Rangan
2008/261 ( PS PS.GZ PDF )
The Hidden Root Problem
F. Vercauteren
2008/260 ( PDF )
Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal and Ueli Maurer
2008/259 ( PDF )
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
ZHAO Lu, WEN Qiao-yan
2008/258 ( PDF )
ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
JAIYEOLA Temitope Gbolahan and ADENIRAN John Olushola
2008/257 ( PDF )
ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
JAIYEOLA Temitope Gbolahan
2008/256 ( PDF )
ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
JAIYEOLA Temitope Gbolahan
2008/255 ( PDF )
Embedding in Two Least Significant Bits with Wet Paper Coding
Xin Liao and Qiao-yan Wen
2008/254 ( PDF )
An Efficient Identity-based Ring Signcryption Scheme
Zhenchao ZHU and Yuqing ZHANG and FengjiaoWANG
2008/253 ( PDF )
Multi-Recipient Signcryption for Secure Wireless Group Communication
Yiliang Han, Xiaolin Gui, Xu'an Wang
2008/252 ( PS PS.GZ PDF )
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Nick Varnovsky
2008/251 ( PDF )
Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad-Reza Sadeghi and Jörg Schwenk
2008/250 ( PDF )
Pairings on hyperelliptic curves with a real model
Steven Galbraith and Xibin Lin and David Mireles
2008/249 ( -- withdrawn -- )
Construction of Resilient Functions with Multiple Cryptographic Criteria
Shaojing Fu, Chao Li, Bing sun
2008/248 ( PDF )
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Fengjiao Wang and Yuqing Zhang
2008/247 ( PS PS.GZ PDF )
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Pandu Rangan Chandrasekaran
2008/246 ( PDF )
The Random Oracle Model and the Ideal Cipher Model are Equivalent
Jean-Sebastien Coron and Jacques Patarin and Yannick Seurin
2008/245 ( PS PS.GZ PDF )
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
Markus Grassl and Rainer Steinwandt
2008/244 ( PDF )
New balanced Boolean functions satisfying all the main cryptographic criteria
Claude Carlet and Keqin Feng
2008/243 ( PDF )
On the economic payoff of forensic systems when used to trace Counterfeited Software and content
Yacov Yacobi
2008/242 ( -- withdrawn -- )
Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
Shaojing Fu Chao Li Bing Sun
2008/241 ( PDF )
Practical Attacks on HB and HB+ Protocols
Zbigniew Golebiewski and Krzysztof Majcher and Filip Zagorski and Marcin Zawada
2008/240 ( PDF )
Leakage-Resilient Cryptography in the Standard Model
Stefan Dziembowski and Krzysztof Pietrzak
2008/239 ( PDF )
Recognition in Ad Hoc Pervasive Networks
Atefeh Mashatan and Douglas R. Stinson
2008/238 ( PS PS.GZ PDF )
On the Provable Security of Multi-Receiver Signcryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C.Pandu Rangan
2008/237 ( PDF )
Local Affinity Based Inversion of Filter Generators
O.A. Logachev and D.S. Nazarova
2008/236 ( PDF )
A Modular Security Analysis of the TLS Handshake Protocol
P. Morrissey and N.P.Smart and B. Warinschi
2008/235 ( PDF )
Constant-Round Concurrent Non-Malleable Commitments and Decommitments
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2008/234 ( PDF )
On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal
Helger Lipmaa
2008/233 ( -- withdrawn -- )
On Resettably-Sound Resttable Zero Knowledege Arguments
Yi Deng and Dongdai Lin
2008/232 ( PDF )
Perfectly Secure Message Transmission Tolerating Mixed Adversary
Arpita Patra and Ashish Choudhury and Ashwinkumar B. V and Kannan Srinathan and C. Pandu Rangan
2008/231 ( PDF )
A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento
2008/230 ( PDF )
A New Collision Differential For MD5 With Its Full Differential Path
Tao Xie and DengGuo Feng and FanBao Liu
2008/229 ( PDF )
Identification and Privacy: Zero-Knowledge is not Enough
Julien Bringer and Herve Chabanne and Thomas Icart
2008/228 ( PDF )
Revisiting Wiener's Attack -- New Weak Keys in RSA
Subhamoy Maitra and Santanu Sarkar
2008/227 ( PS PS.GZ PDF )
New Impossible Differential Cryptanalysis of ARIA
Ruilin Li, Bing Sun, Peng Zhang and Chao Li
2008/226 ( PDF )
Proxy Key Re-encapsulation Mechanism for Group Communications
Chunbo Ma and Jun Ao
2008/225 ( PS PS.GZ PDF )
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan
2008/224 ( PDF )
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
Hai Huang and Zhenfu Cao
2008/223 ( PDF )
On the Security of a Visual Cryptography Scheme for Color Images
Bert W. Leung and Felix Y. Ng and Duncan S. Wong
2008/222 ( PDF )
Encryption-On-Demand: Practical and Theoretical Considerations
Gideon Samid
2008/221 ( PDF )
Efficient Conversion of Secret-shared Values Between Different Fields
Ivan Damgard and Rune Thorbek
2008/220 ( PS PS.GZ PDF )
Essentially Optimal Universally Composable Oblivious Transfer
Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi
2008/219 ( -- withdrawn -- )
Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
Dan P. Milleville
2008/218 ( PDF )
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
Wouter Castryck and Steven Galbraith and Reza Rezaeian Farashahi
2008/217 ( PDF )
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom\'e
2008/216 ( PDF )
A New Multi-Linear Universal Hash Family
Palash Sarkar
2008/215 ( PDF )
On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
Naoki Hashizume and Fumiyuki Momose and Jinhui Chao
2008/214 ( PDF )
Multi-Factor Password-Authenticated Key Exchange
Douglas Stebila and Poornaprajna Udupi and Sheueling Chang
2008/213 ( PDF )
The Multireceiver Commitment Schemes
Shuhong Wang
2008/212 ( PDF )
Reducing the Complexity of the Weil Pairing Computation
Chang-An Zhao and Fangguo Zhang and Dongqing Xie
2008/211 ( PDF )
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Goichiro Hanaoka and Kaoru Kurosawa
2008/210 ( PDF )
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
Haimin Jin and Duncan S. Wong and Yinlong Xu
2008/209 ( PDF )
Computing Bilinear Pairings on Elliptic Curves with Automorphisms
Chang-An Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Bing-Long Chen
2008/208 ( PS PS.GZ PDF )
Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
Naoki Ogura and Shigenori Uchiyama
2008/207 ( PDF )
Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
Ben Adida and C. Andrew Neff
2008/206 ( PDF )
Partial Fairness in Secure Two-Party Computation
Dov Gordon and Jonathan Katz
2008/205 ( PS PS.GZ PDF )
On Software Parallel Implementation of Cryptographic Pairings
Philipp Grabher and Johann Groszschaedl and Dan Page
2008/204 ( PDF )
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
Yanbin Pan and Yingpu Deng
2008/203 ( PDF )
Privacy-Preserving Matching of DNA Profiles
Fons Bruekers and Stefan Katzenbeisser and Klaus Kursawe and Pim Tuyls
2008/202 ( PS PS.GZ PDF )
Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
Zhitu Su, Hui Li and JianFeng Ma
2008/201 ( PDF )
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
J. Wu and D.R. Stinson
2008/200 ( PDF )
On The Security of The ElGamal Encryption Scheme and Damgard’s Variant
J. Wu and D.R. Stinson
2008/199 ( PDF )
Simultaneous field divisions: an extension of Montgomery's trick
David G. Harris
2008/198 ( PDF )
Security needs in embedded systems
Anoop MS
2008/197 ( PDF )
Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell and Benny Pinkas
2008/196 ( PS PS.GZ PDF )
A New Family of Perfect Nonlinear Binomials
Zhengbang Zha and Gohar M. Kyureghyan and Xueli Wang
2008/195 ( PDF )
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
Jin Zhengping and Zuo Huijuan and Du hongzhen and Wen Qiaoyan
2008/194 ( PDF )
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Steven D. Galbraith and Xibin Lin and Michael Scott
2008/193 ( -- withdrawn -- )
A Tamper-Evident Voting Machine Resistant to Covert Channels
Wei Han and Tao Hao and Dong Zheng and Ke-fei Chen and Xiaofeng Chen
2008/192 ( PDF )
Investigating the DPA-Resistance Property of Charge Recovery Logics
Amir Moradi and Mehrdad Khatir and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
2008/191 ( -- withdrawn -- )
None
None
2008/190 ( PS PS.GZ )
User-Sure-and-Safe Key Retrieval
Daniel R. L. Brown
2008/189 ( PDF )
How to Build a Hash Function from any Collision-Resistant Function
Thomas Ristenpart and Thomas Shrimpton
2008/188 ( PDF )
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh
2008/187 ( PS PS.GZ PDF )
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
Fagen Li and Yong Yu
2008/186 ( PDF )
Privacy-Preserving Audit and Extraction of Digital Contents
Mehul A. Shah and Ram Swaminathan and Mary Baker
2008/185 ( PS PS.GZ PDF )
A New Approach to Secure Logging
Di Ma and Gene Tsudik
2008/184 ( PDF )
On the Secure Obfuscation of Deterministic Finite Automata
W. Erik Anderson
2008/183 ( PDF )
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson and Willi Meier and Florian Mendel
2008/182 ( PDF )
Restricted Adaptive Oblivious Transfer
Javier Herranz
2008/181 ( PDF )
Proofs of Knowledge with Several Challenge Values
Grzegorz Stachowiak
2008/180 ( PDF )
Imaginary quadratic orders with given prime factor of class number
Alexander Rostovtsev
2008/179 ( -- withdrawn -- )
An Efficient ID-based Ring Signature Scheme from Pairings
Chunxiang Gu and Yuefei Zhu
2008/178 ( PDF )
Optimal Discretization for High-Entropy Graphical Passwords
Kemal Bicakci
2008/177 ( PDF )
Algebraic Techniques in Differential Cryptanalysis
Martin Albrecht and Carlos Cid
2008/176 ( PDF )
New construction of Boolean functions with maximun algebraic immunity
Wang yongjuan and Fan shuqin and Han wenbao
2008/175 ( PDF )
Proofs of Retrievability: Theory and Implementation
Kevin D. Bowers and Ari Juels and Alina Oprea
2008/174 ( PS PS.GZ PDF )
Non-Linear Reduced Round Attacks Against SHA-2 Hash family
Somitra Kumar Sanadhya and Palash Sarkar
2008/173 ( PDF )
Full Cryptanalysis of LPS and Morgenstern Hash Function
Christophe Petit and Kristin Lauter and Jean-Jacques Quisquater
2008/172 ( PDF )
The Round Complexity of Verifiable Secret Sharing Revisited
Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan
2008/171 ( PDF )
Binary Edwards Curves
Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi
2008/170 ( PDF )
Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
Simon R. Blackburn
2008/169 ( PS PS.GZ PDF )
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Côme Berbain and Aline Gouget and Hervé Sibert
2008/168 ( PS PS.GZ PDF )
Possibility and impossibility results for selective decommitments
Dennis Hofheinz
2008/167 ( PDF )
Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
Omkant Pandey
2008/166 ( PS PS.GZ PDF )
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
Nicolas T. Courtois and Karsten Nohl and Sean O'Neil
2008/165 ( PDF )
Improved lower bound on the number of balanced symmetric functions over GF(p)
Pinhui Ke
2008/164 ( PDF )
On the (Im)Possibility of Key Dependent Encryption
Iftach Haitner and Thomas Holenstein
2008/163 ( PDF )
Universally Composable Adaptive Oblivious Transfer
Matthew Green and Susan Hohenberger
2008/162 ( PDF )
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Michael Backes and Boris Köpf
2008/161 ( PDF )
Modular polynomials for genus 2
Reinier Broker and Kristin Lauter
2008/160 ( PDF )
A Proxy Signature Scheme over Braid Groups
Girraj Kumar Verma
2008/159 ( PDF )
A non-interactive deniable authentication scheme based on designated verifier proofs
Bin Wang
2008/158 ( PS PS.GZ PDF )
DISH: Distributed Self-Healing in Unattended Sensor Networks
Di Ma and Gene Tsudik
2008/157 ( PDF )
Secure Online Elections in Practice
Lucie Langer and Axel Schmidt and Johannes Buchmann
2008/156 ( PDF )
On Black-Box Ring Extraction and Integer Factorization
Kristina Altmann and Tibor Jager and Andy Rupp
2008/155 ( PDF )
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
David Freeman
2008/154 ( -- withdrawn -- )
The Walsh Spectrum of a New Family of APN Functions
Yue Zhou and Chao Li
2008/153 ( PDF )
Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
Clemens Heuberger
2008/152 ( PDF )
Computational soundness of symbolic zero-knowledge proofs
Michael Backes and Dominique Unruh
2008/151 ( -- withdrawn -- )
Impossible Differential Cryptanalysis of CLEFIA
Bing Sun,Ruilin Li, Mian Wang, Ping Li and Chao Li
2008/150 ( PDF )
Robust Combiners for Software Hardening
Amir Herzberg and Haya Shulman
2008/149 ( PS PS.GZ )
Toy Factoring by Newton's Method
Daniel R. L. Brown
2008/148 ( PDF )
Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
2008/147 ( PDF )
A Real-World Attack Breaking A5/1 within Hours
Timo Gendrullis and Martin Novotny and Andy Rupp
2008/146 ( PDF )
Dynamic SHA-2
Xu Zijie
2008/145 ( PDF )
Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
Jithra Adikari and Vassil S. Dimitrov and Pradeep K. Mishra
2008/144 ( PS PS.GZ PDF )
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
Shiva Prasad Kasiviswanathan and Adam Smith
2008/143 ( PS PS.GZ PDF )
Certificateless Signcryption
M. Barbosa and P. Farshim
2008/142 ( PDF )
Attacking Reduced Round SHA-256
Somitra Kumar Sanadhya and Palash Sarkar
2008/141 ( PDF )
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan
2008/140 ( PDF )
Reducing Complexity Assumptions for Oblivious Transfer
K.Y. Cheong and Takeshi Koshiba
2008/139 ( PDF )
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian
2008/138 ( PDF )
Oblivious Transfer Based on the McEliece Assumptions
Rafael Dowsley and Jeroen van de Graaf and J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento
2008/137 ( PDF )
More Discriminants with the Brezing-Weng Method
Gaetan Bisson and Takakazu Satoh
2008/136 ( PDF )
Constant-Size Dynamic $k$-TAA
Man Ho Au and Willy Susilo and Yi Mu
2008/135 ( PS PS.GZ PDF )
Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
Clemens Heuberger and James A. Muir
2008/134 ( PS PS.GZ PDF )
Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
Alon Rosen and Gil Segev
2008/133 ( PDF )
The arithmetic of characteristic 2 Kummer surfaces
P. Gaudry and D. Lubicz
2008/132 ( PDF )
A Framework for the Sound Specification of Cryptographic Tasks
Juan A. Garay and Aggelos Kiayias and Hong-Sheng Zhou
2008/131 ( PS PS.GZ PDF )
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger
2008/130 ( PS PS.GZ PDF )
Analysis of Step-Reduced SHA-256
Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
2008/129 ( PDF )
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
Mohamed Layouni
2008/128 ( PS PS.GZ PDF )
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
Hidehiko Nakagami and Ryoichi Teramura and Toshihiro Ohigashi and Hidenori Kuwakado and Masakatu Morii
2008/127 ( PDF )
A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
Nidia Cortez-Duarte and Francisco Rodr\'iguez-Henr\'iquez and Jean-Luc Beuchat and Eiji Okamoto
2008/126 ( PDF )
Machine Learning Attacks Against the ASIRRA CAPTCHA
Philippe Golle
2008/125 ( PDF )
Pairing Lattices
Florian Hess
2008/124 ( PDF )
A Simple Derivation for the Frobenius Pseudoprime Test
Daniel Loebenberger
2008/123 ( PDF )
Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
Mehrdad Khatir and Amir Moradi
2008/122 ( PDF )
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
Seog Chung Seo and Dong-Guk Han and Seokhie Hong
2008/121 ( PS PS.GZ PDF )
New proofs for old modes
Mark Wooding
2008/120 ( PDF )
Public key encryption and encryption emulation attacks
Denis Osin and Vladimir Shpilrain
2008/119 ( PDF )
Linear Bandwidth Naccache-Stern Encryption
Benoit Chevallier-Mames and David Naccache and Jacques Stern
2008/118 ( PDF )
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
Patrick Longa and Catherine Gebotys
2008/117 ( PDF )
Exponentiation in pairing-friendly groups using homomorphisms
Steven D. Galbraith and Michael Scott
2008/116 ( PS PS.GZ PDF )
Chosen-Ciphertext Security via Correlated Products
Alon Rosen and Gil Segev
2008/115 ( PDF )
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Francisco Rodríguez-Henríquez
2008/114 ( PDF )
Scalable and Efficient Provable Data Possession
Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik
2008/113 ( PDF )
Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
Daniel Mall and Qing Zhong
2008/112 ( PDF )
Democratic Group Signatures with Threshold Traceability
Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li
2008/111 ( PDF )
THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
Yuriy Izbenko and Vladislav Kovtun and Alexandr Kuznetsov
2008/110 ( -- withdrawn -- )
On the Design of Secure and Fast Double Block Length Hash Functions
Zheng Gong and Xuejia Lai and Kefei Chen
2008/109 ( PDF )
Collisions for Round-Reduced LAKE
Florian Mendel and Martin Schläffer
2008/108 ( PDF )
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Jintai Ding AND Bo-Yin Yang AND Owen Chen AND Ming-Shing Chen AND Doug Cheng
2008/107 ( PDF )
Private Branching Programs: On Communication-Efficient Cryptocomputing
Helger Lipmaa
2008/106 ( PS PS.GZ PDF )
Knapsack cryptosystems built on NP-hard instances
Laurent Evain
2008/105 ( PS PS.GZ PDF )
Cryptanalysis of White-Box Implementations
W. Michiels and P. Gorissen and H.D.L. Hollmann
2008/104 ( PS PS.GZ PDF )
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Ernie Brickell, Liqun Chen and Jiangtao Li
2008/103 ( -- withdrawn -- )
Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
Jun Shao and Dongsheng Xing and Zhenfu Cao
2008/102 ( PS PS.GZ PDF )
Degradation and Amplification of Computational Hardness
Shai Halevi and Tal Rabin
2008/101 ( -- withdrawn -- )
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
Arpita Patra and Ashish Choudhary and AshwinKumar B.V and C. Pandu Rangan
2008/100 ( PDF )
Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
Patrick Longa
2008/099 ( PS PS.GZ PDF )
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
Kristin E. Lauter and Katherine E. Stange
2008/098 ( PDF )
On Security Notions for Verifiable Encrypted Signature
Xu-An Wang and Xiaoyuan Yang and Yiliang Han
2008/097 ( PS PS.GZ PDF )
Fairness with an Honest Minority and a Rational Majority
Shien Jin Ong and David Parkes and Alon Rosen and Salil Vadhan
2008/096 ( PS PS.GZ PDF )
Optimal Pairings
F. Vercauteren
2008/095 ( PS PS.GZ PDF )
Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
2008/094 ( PDF )
Universally Composable Undeniable Signature
Kaoru Kurosawa and Jun Furukawa
2008/093 ( PDF )
New ID-based Fair Blind Signatures
Girraj Kumar Verma
2008/092 ( PDF )
An Efficient SPRP-secure Construction based on Pseudo Random Involution
Mridul Nandi
2008/091 ( PDF )
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
Mridul Nandi
2008/090 ( PDF )
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
Mridul Nandi
2008/089 ( PDF )
An improved preimage attack on MD2
S{\o}ren S. Thomsen
2008/088 ( PDF )
A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
Mahabir Prasad Jhanwar and Rana Barua
2008/087 ( PDF )
Towards a Theory of White-Box Security
Amir Herzberg and Haya Shulman and Amitabh Saxena and Bruno Crispo
2008/086 ( PDF )
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan
2008/085 ( PDF )
All Pairings Are in a Group
Chang-An Zhao and Fangguo Zhang and Jiwu Huang
2008/084 ( PDF )
ID based generalized signcryption
Sunder Lal and Prashant Kushwah
2008/083 ( PDF )
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Hung-Min Sun, Wei-Chih Ting, and King-Hang Wang
2008/082 ( PDF )
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
Roberto Araujo and Peter Y. A. Ryan
2008/081 ( PDF )
Template Attacks on ECDSA
Marcel Medwed and Elisabeth Oswald
2008/080 ( PDF )
Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate and Greg Zaverucha and Ian Goldberg
2008/079 ( PDF )
Homomorphic Encryption with CCA Security
Manoj Prabhakaran and Mike Rosulek
2008/078 ( PS PS.GZ PDF )
A Short Proof of the PRP/PRF Switching Lemma
Donghoon Chang and Mridul Nandi
2008/077 ( PDF )
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
2008/076 ( PDF )
Results from a Search for the Best Linear Approximation of a Block Cipher
Kashif Ali and Howard M. Heys
2008/075 ( PS PS.GZ PDF )
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
Jonathan J. Hoch and Adi Shamir
2008/074 ( PDF )
On the Chikazawa-Inoue ID based key system
Bae Eun Jung and Hee Jean Kim
2008/073 ( PDF )
Compact Proofs of Retrievability
Hovav Shacham and Brent Waters
2008/072 ( PDF )
The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
Alexandre M. Deusajute and Paulo S. L. M. Barreto
2008/071 ( PDF )
Blockcipher Based Hashing Revisited
Martijn Stam
2008/070 ( PS PS.GZ PDF )
Generators of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
2008/069 ( PDF )
HENKOS Cryptanalysis-Related keys attack
Marius Oliver Gheorghita
2008/068 ( PDF )
Multiparty Computation Goes Live
Peter Bogetoft and Dan Lund Christensen and Ivan Damgard and Martin Geisler and Thomas Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael Schwartzbach and Tomas Toft
2008/067 ( PDF )
The Twin Diffie-Hellman Problem and Applications
David Cash and Eike Kiltz and Victor Shoup
2008/066 ( PDF )
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng
2008/065 ( PS PS.GZ PDF )
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
Junghyun Nam
2008/064 ( PDF )
Remarks on the NFS complexity
Pavol Zajac
2008/063 ( PS PS.GZ PDF )
Efficient Sequential Aggregate Signed Data
Gregory Neven
2008/062 ( PDF )
Computing Hilbert Class Polynomials
Juliana Belding and Reinier Broker and Andreas Enge and Kristin Lauter
2008/061 ( PDF )
Abelian varieties with prescribed embedding degree
David Freeman and Peter Stevenhagen and Marco Streng
2008/060 ( PDF )
Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
Nicholas T. Sullivan
2008/059 ( PDF )
Buying random votes is as hard as buying no-votes
Stefan Popoveniuc and Jonathan Stanton
2008/058 ( PDF )
Physical Cryptanalysis of KeeLoq Code Hopping Applications
Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
2008/057 ( PDF )
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
Vladislav Kovtun, Jan Pelzl and Alexandr Kuznetsov
2008/056 ( PDF )
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
Vladislav Kovtun, Thomas Wollinger
2008/055 ( -- withdrawn -- )
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
S.Sharmila Deva Selvi and S.Sree Vivek
2008/054 ( PS PS.GZ PDF )
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
Jin Hong and Kyung Chul Jeong and Eun Young Kwon and In-Sok Lee and Daegun Ma
2008/053 ( PDF )
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
Miroslava Sotakova
2008/052 ( PDF )
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
Patrick Longa and Ali Miri
2008/051 ( PDF )
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
Patrick Longa and Ali Miri
2008/050 ( PDF )
Multi-PKG ID based signcryption
Sunder Lal and Prashant Kushwah
2008/049 ( PDF )
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell and Benny Pinkas
2008/048 ( PDF )
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
Donghoon Chang, Jaechul Sung, Seokhie Hong and Sangjin Lee
2008/047 ( PS PS.GZ PDF )
Fair Traceable Multi-Group Signatures
Vicente Benjumea and Seung Geol Choi and Javier Lopez and Moti Yung
2008/046 ( PS PS.GZ PDF )
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Tal Moran and Gil Segev
2008/045 ( PDF )
Threshold RSA for Dynamic and Ad-Hoc Groups
Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin
2008/044 ( PDF )
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Ari Juels and Ravikanth Pappu and Bryan Parno
2008/043 ( PDF )
Cryptanalysis of CRUSH hash structure
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
2008/042 ( PDF )
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Julien Bringer and Herve Chabanne
2008/041 ( PDF )
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
Hassan Elkamchouchi and Yasmine Abouelseoud
2008/040 ( PDF )
Efficient and Generalized Pairing Computation on Abelian Varieties
Eunjeong Lee, Hyang-Sook Lee, and Cheol-Min Park
2008/039 ( PDF )
New Results on Unconditionally Secure Multireceiver Manual Authentication
Shuhong Wang and Reihaneh Safavi-Naini
2008/038 ( PDF )
A New Blind Identity-Based Signature Scheme with Message Recovery
Hassan Elkamchouchi and Yasmine Abouelseoud
2008/037 ( PS PS.GZ PDF )
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Georg Fuchsbauer and David Pointcheval
2008/036 ( PDF )
Generic Attacks on Feistel Schemes
Jacques Patarin
2008/035 ( PS PS.GZ PDF )
Efficient Fully-Simulatable Oblivious Transfer
Yehuda Lindell
2008/034 ( PS PS.GZ PDF )
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
Chunming Tang and Dingyi Pei and Zhuojun Liu and Zheng-an Yao and Mingsheng Wang
2008/033 ( PDF )
Lower Bounds on Signatures From Symmetric Primitives
Boaz Barak, Mohammad Mahmoody-Ghidardy
2008/032 ( PS PS.GZ PDF )
Merkle Puzzles are Optimal
Boaz Barak, Mohammad Mahmoody-Ghidary
2008/031 ( PDF )
Authenticating with Attributes
Dalia Khader
2008/030 ( PS PS.GZ PDF )
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr\'o and Daniel Wichs
2008/029 ( PS PS.GZ PDF )
Non-Cyclic Subgroups of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
2008/028 ( PS PS.GZ PDF )
HB#: Increasing the Security and Efficiency of HB+
Henri Gilbert and Matthew J.B. Robshaw and Yannick Seurin
2008/027 ( PDF )
Blind Signature Scheme over Braid Groups
Girraj Kumar Verma
2008/026 ( PDF )
Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
Mitsuru Kawazoe and Tetsuya Takahashi
2008/025 ( PS PS.GZ PDF )
Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
2008/024 ( PDF )
Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
Sunder Lal and Vandani Verma
2008/023 ( PS PS.GZ PDF )
General Certificateless Encryption and Timed-Release Encryption
Sherman S.M. Chow and Volker Roth and Eleanor G. Rieffel
2008/022 ( PDF )
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
M. Gebhardt and G. Illies and W. Schindler
2008/021 ( PDF )
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008/020 ( PDF )
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Eike Kiltz and Yevgeniy Vahlis
2008/019 ( PS PS.GZ PDF )
Computing Pairings Using x-Coordinates Only
Steven D. Galbraith and Xibin Lin
2008/018 ( PDF )
Disjunctive Multi-Level Secret Sharing
Mira Belenkiy
2008/017 ( PS PS.GZ PDF )
New State Recovery Attack on RC4
Alexander Maximov and Dmitry Khovratovich
2008/016 ( PDF )
ECM using Edwards curves
Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
2008/015 ( PDF )
Practical Short Signature Batch Verification
Anna Lisa Ferrara and Matthew Green and Susan Hohenberger and Michael {\O}stergaard Pedersen
2008/014 ( PS PS.GZ PDF )
Simulatable Adaptive Oblivious Transfer
Jan Camenisch and Gregory Neven and abhi shelat
2008/013 ( PDF )
Twisted Edwards Curves
Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters
2008/012 ( PDF )
The Encrypted Elliptic Curve Hash
Daniel R. L. Brown
2008/011 ( PDF )
A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
Ayan Mahalanobis
2008/010 ( PDF )
A Proof of Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the ``$H_{\sigma}$ technique''--
Jacques Patarin
2008/009 ( PDF )
Generic Attacks for the Xor of k random permutations
Jacques Patarin
2008/008 ( PS PS.GZ PDF )
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
Zhitu su, Hui Li and Jianfeng Ma
2008/007 ( PDF )
Efficient One-round Key Exchange in the Standard Model
Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson
2008/006 ( PDF )
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Ralf Kuesters and Max Tuengerthal
2008/005 ( PS PS.GZ PDF )
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
Francois Mace and Francois-Xavier Standaert and Jean-Jacques Quisquater
2008/004 ( PDF )
Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
Palash Sarkar
2008/003 ( PDF )
On Collisions of Hash Functions Turbo SHA-2
Vlastimil Klima
2008/002 ( PDF )
Fuzzy Identity Based Signature
Piyi Yang and Zhenfu Cao and Xiaolei Dong
2008/001 ( PS PS.GZ PDF )
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo and Lihua Wang


[ Cryptology ePrint archive ]