Cryptology ePrint Archive: Listing for 2008
-
2008/545 ( PDF )
- Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
- Vipul Goyal and Amit Sahai
-
2008/544 ( PDF )
- Comments on two multi-server authentication protocols
- *Yalin Chen 1, Chun-Hui Huang 2, Jue-Sam Chou3
-
2008/543 ( PDF )
- Odd-Char Multivariate Hidden Field Equations
- Chia-Hsin Owen Chen and Ming-Shing Chen and Jintai Ding and Fabian Werner and Bo-Yin Yang
-
2008/542 ( PDF )
- Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
- Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu
-
2008/541 ( PDF )
- Resettably-Sound Resettable Zero Knowledge Arguments for NP
- Yi Deng
-
2008/540 ( PDF )
- New Impossible Differential Attacks on AES
- Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim
-
2008/539 ( PDF )
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- Jan Camenisch and Markulf Kohlweiss and Claudio Soriente
-
2008/538 ( PDF )
- Supporting Non-membership Proofs with Bilinear-map Accumulators
- Ivan Damgård and Nikos Triandopoulos
-
2008/537 ( PDF )
- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
- SeongHan Shin and Kazukuni Kobara and Hideki Imai
-
2008/536 ( PS PS.GZ PDF )
- Predicate Privacy in Encryption Systems
- Emily Shen and Elaine Shi and Brent Waters
-
2008/535 ( PDF )
- A Recursive Threshold Visual Cryptography Scheme
- Abhishek Parakh and Subhash Kak
-
2008/534 ( PDF )
- Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
- Juan A. Garay and Daniel Wichs and Hong-Sheng Zhou
-
2008/533 ( PDF )
- Collusion-Free Multiparty Computation in the Mediated Model
- Jonathan Katz and Yehuda Lindell
-
2008/532 ( PDF )
- Semi-free start collision attack on Blender
- Xu Liangyu and Li Ji
-
2008/531 ( PDF )
- Collision Attack on the Waterfall Hash Function
- Scott Fluhrer
-
2008/530 ( PDF )
- Fast hashing to G2 on pairing friendly curves
- Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
-
2008/529 ( PDF )
- A Hardware Interface for Hashing Algorithms
- Zhimin Chen, Sergey Morozov, Patrick Schaumont
-
2008/528 ( PDF )
- Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
- Georg Fuchsbauer and David Pointcheval
-
2008/527 ( PS PS.GZ PDF )
- Properties of Cryptographic Hash Functions
- Michal Rjaško
-
2008/526 ( PDF )
- Novel Precomputation Schemes for Elliptic Curve Cryptosystems
- Patrick Longa, and Catherine Gebotys
-
2008/525 ( PDF )
- On The Diffie-Hellman Assumption
- R. Bhaskar, K. Chandrasekaran, S. Lokam, P.L. Montgomery, R. Venkatesan, Y. Yacobi
-
2008/524 ( PDF )
- Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
- Li Hongda and Feng dengguo and Li Bao and Xue Haixia
-
2008/523 ( -- withdrawn -- )
- Privacy Preserving Multiset Union with ElGamal Encryption
- Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon
-
2008/522 ( PDF )
- Twisted Edwards Curves Revisited
- Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
-
2008/521 ( PDF )
- Generating Shorter Bases for Hard Random Lattices
- Joel Alwen and Chris Peikert
-
2008/520 ( PDF )
- Cryptanalysis of the Hash Function LUX-256
- Shuang Wu and Dengguo Feng and Wenling Wu
-
2008/519 ( PDF )
- Collision attack on NaSHA-512
- Li Ji and Xu Liangyu and Guan Xu
-
2008/518 ( -- withdrawn -- )
- A NEW HASH ALGORITHM$:$ Khichidi$-$1
- Natarajan Vijayarangan
-
2008/517 ( PS PS.GZ PDF )
- Improving the Rules of the DPA Contest
- Francois-Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat-Charvillon
-
2008/516 ( PDF )
- Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
- Zheng Yuan and Keting Jia and Wei Wang and Xiaoyun Wang
-
2008/515 ( PDF )
- Cryptanalysis of RadioGatun
- Thomas Fuhr and Thomas Peyrin
-
2008/514 ( PS PS.GZ PDF )
- Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
- Tapan Rai and Stanislav Bulygin
-
2008/513 ( PDF )
- Improved Cryptanalysis of SHAMATA-BC
- Adem Atalay, Orhun Kara and Ferhat Karakoç
-
2008/512 ( PS PS.GZ )
- A new class of Bent functions in Polynomial Forms
- Sihem Mesnager
-
2008/511 ( PDF )
- Classification of the SHA-3 Candidates
- Ewan Fleischmann and Christian Forler and Michael Gorski
-
2008/510 ( PDF )
- Reconstructing RSA Private Keys from Random Key Bits
- Nadia Heninger and Hovav Shacham
-
2008/509 ( PS PS.GZ PDF )
- Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
- Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
-
2008/508 ( PDF )
- Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
- Fabrice J.P.R. Pautot
-
2008/507 ( PDF )
- A non-delegatable identity-based strong designated verifier signature scheme
- Bin Wang
-
2008/506 ( PDF )
- Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
- Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/505 ( PDF )
- removed
- removed
-
2008/504 ( PS PS.GZ PDF )
- The $n^c$-Unique Shortest Vector Problem is Hard
- Vadim Lyubashevsky
-
2008/503 ( PS PS.GZ PDF )
- Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
- Yevgeniy Dodis and Daniel Wichs
-
2008/502 ( PDF )
- Extended Access Structures and Their Cryptographic Applications
- Vanesa Daza and Javier Herranz and Paz Morillo and Carla Rafols
-
2008/501 ( PDF )
- Some Observations on SHAMATA
- Ewan Fleischmann and Michael Gorski
-
2008/500 ( PDF )
- Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
- Hai Huang and Zhenfu Cao
-
2008/499 ( PDF )
- Some Observations on HC-128
- Subhamoy Maitra and Goutam Paul and Shashwat Raizada
-
2008/498 ( PDF )
- Small Odd Prime Field Multivariate PKCs
- Anna Chen an Ming-Shing Chen and Tien-Ren Chen and Chen-Mou Cheng and Jintai Ding and Eric Kuo and Frost Li and Bo-Yin Yang
-
2008/497 ( PDF )
- On the Correctness of An Approach Against Side-channel attacks
- Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang
-
2008/496 ( PDF )
- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
- Debra L. Cook and Moti Yung and Angelos Keromytis
-
2008/495 ( PDF )
- Non-Malleable Obfuscation
- Ran Canetti and Mayank Varia
-
2008/494 ( PS PS.GZ PDF )
- Key Agreement from Close Secrets over Unsecured Channels
- Bhavana Kanukurthi and Leonid Reyzin
-
2008/493 ( PDF )
- Secure Parameters for SWIFFT
- Johannes Buchmann and Richard Lindner
-
2008/492 ( PDF )
- Modeling Computational Security in Long-Lived Systems, Version 2
- Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
-
2008/491 ( PDF )
- A CM construction for curves of genus 2 with p-rank 1
- Laura Hitt O'Connor and Gary McGuire and Michael Naehrig and Marco Streng
-
2008/490 ( PDF )
- On the final exponentiation for calculating pairings on ordinary elliptic curves
- Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
-
2008/489 ( PDF )
- HAIL: A High-Availability and Integrity Layer for Cloud Storage
- Kevin D. Bowers and Ari Juels and Alina Oprea
-
2008/488 ( PDF )
- Efficient Rational Secret Sharing in Standard Communication Networks
- Georg Fuchsbauer and Jonathan Katz and David Naccache
-
2008/487 ( PDF )
- Secure Certificateless Public Key Encryption without Redundancy
- Yinxia Sun and Futai Zhang
-
2008/486 ( PDF )
- Inside the Hypercube
- Jean-Philippe Aumasson and Eric Brier and Willi Meier and María Naya-Plasencia and Thomas Peyrin
-
2008/485 ( -- withdrawn -- )
- Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
- Rongquan Feng and Zilong Wang and Hongfeng Wu
-
2008/484 ( PDF )
- Sharp lower bounds on the extractable randomness from non-uniform sources
- Boris Skoric and Chibuzo Obi and Evgeny Verbitskiy and Berry Schoenmakers
-
2008/483 ( PDF )
- Sharing DSS by the Chinese Remainder Theorem
- Kamer Kaya and Ali Aydın Selçuk
-
2008/482 ( PDF )
- The Generic Hardness of Subset Membership Problems under the Factoring Assumption
- Tibor Jager and Jörg Schwenk
-
2008/481 ( PS PS.GZ PDF )
- Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
- Chris Peikert
-
2008/480 ( PDF )
- ECM on Graphics Cards
- Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang
-
2008/479 ( PDF )
- Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
- Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren and Shizhu Bian
-
2008/478 ( PS PS.GZ PDF )
- Attribute-Based Encryption with Key Cloning Protection
- M. J. Hinek and S. Jiang and R. Safavi-Naini and S. F. Shahandashti
-
2008/477 ( PDF )
- On a New Formal Proof Model for RFID Location Privacy (Extended Version)
- Ton van Deursen and Sasa Radomirovic
-
2008/476 ( PS PS.GZ PDF )
- The $F_f$-Family of Protocols for RFID-Privacy and Authentication
- Erik-Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa
-
2008/475 ( PDF )
- Sphinx: A Compact and Provably Secure Mix Format
- George Danezis and Ian Goldberg
-
2008/474 ( PDF )
- Access Controls for Oblivious and Anonymous Systems
- Scott Coull and Matthew Green and Susan Hohenberger
-
2008/473 ( PDF )
- Exploring Cipherspace: Combining stream ciphers and block ciphers
- Sandy Harris
-
2008/472 ( PDF )
- Practical attacks against WEP and WPA
- Martin Beck and Erik Tews
-
2008/471 ( PDF )
- Automatic Generation of Sound Zero-Knowledge Protocols
- Endre Bangerter and Jan Camenisch and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
-
2008/470 ( PDF )
- From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
- Paolo D'Arco and Alfredo De Santis
-
2008/469 ( PS PS.GZ PDF )
- Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
- Stephane Manuel
-
2008/468 ( PDF )
- A CCA2 Secure Variant of the McEliece Cryptosystem
- Nico D\"{o}ttling, Rafael Dowsley, J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento
-
2008/467 ( PDF )
- Cryptanalysis of EnRUPT
- Dmitry Khovratovich and Ivica Nikolic
-
2008/466 ( PS PS.GZ PDF )
- Combined (identity-based) public key schemes
- Maria Isabel Gonzalez Vasco and Florian Hess and Rainer Steinwandt
-
2008/465 ( PDF )
- Secure Arithmetic Computation with No Honest Majority
- Yuval Ishai and Manoj Prabhakaran and Amit Sahai
-
2008/464 ( PDF )
- Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
- Michael Kounavis and Shay Gueron
-
2008/463 ( PDF )
- Key-Private Proxy Re-Encryption
- Giuseppe Ateniese and Karyn Benson and Susan Hohenberger
-
2008/462 ( PDF )
- Unconditionally Secure Multiparty Set Intersection Re-Visited
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/461 ( -- withdrawn -- )
- On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
- Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan
-
2008/460 ( PS PS.GZ PDF )
- Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
- Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee
-
2008/459 ( PDF )
- A variant of Wiener's attack on RSA
- Andrej Dujella
-
2008/458 ( PDF )
- Complete Fairness in Multi-Party Computation Without an Honest Majority
- S. Dov Gordon and Jonathan Katz
-
2008/457 ( PDF )
- On the Composability of Statistically Secure Bit Commitments
- Rafael Dowsley and Jeroen van de Graaf and Jörn Müller-Quade and Anderson C. A. Nascimento
-
2008/456 ( PDF )
- The Diffie-Hellman problem and generalization of Verheul's theorem
- Dustin Moody
-
2008/455 ( PDF )
- New hash function designs
- Igor Semaev
-
2008/454 ( PDF )
- Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2008/453 ( PDF )
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
- Ahmad-Reza Sadeghi and Thomas Schneider
-
2008/452 ( -- withdrawn -- )
- Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems
- Rui Xue and Dengguo Feng
-
2008/451 ( PDF )
- Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
- Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann
-
2008/450 ( PDF )
- On the Security of Fully Collusion Resistant Traitor Tracing Schemes
- Yongdong WU and Robert H. Deng
-
2008/449 ( PDF )
- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
- Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou
-
2008/448 ( PS PS.GZ PDF )
- Authenticated Adversarial Routing
- Yair Amir and Paul Bunn and Rafail Ostrovsky
-
2008/447 ( PS PS.GZ PDF )
- Divisible On-line/Off-line Signatures
- Chong-zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang
-
2008/446 ( PDF )
- Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
- Mike Burmester and Reihaneh Safavi-Naini and Gelareh Taban
-
2008/445 ( PDF )
- Cryptanalysis of the Improved Cellular Message Encryption Algorithm
- Thomas Chardin and Raphaël Marinier
-
2008/444 ( PS PS.GZ PDF )
- Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
- Rachel Shipsey and Christine Swart
-
2008/443 ( PDF )
- Key differentiation attacks on stream ciphers
- Enes Pasalic
-
2008/442 ( PS PS.GZ PDF )
- Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
- Anton Kargl and Stefan Pyka and Hermann Seuschek
-
2008/441 ( PDF )
- How Risky is the Random-Oracle Model?
- Gaetan Leurent and Phong Q. Nguyen
-
2008/440 ( PDF )
- Robust Encryption
- Michel Abdalla and Mihir Bellare and Gregory Neven
-
2008/439 ( PDF )
- Linear equivalence between elliptic curves in Weierstrass and Hesse form
- Alexander Rostovtsev
-
2008/438 ( PDF )
- New Related-Key Boomerang Attacks on AES
- Michael Gorski and Stefan Lucks
-
2008/437 ( PDF )
- Divisibility, Smoothness and Cryptographic Applications
- David Naccache and Igor Shparlinski
-
2008/436 ( -- withdrawn -- )
- BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
- Zhibin Zhou and Dijiang Huang
-
2008/435 ( PS PS.GZ PDF )
- Obtaining and solving systems of equations in key variables only for the small variants of AES
- Stanislav Bulygin and Michael Brickenstein
-
2008/434 ( PDF )
- The computational SLR: a logic for reasoning about computational indistinguishability
- Yu Zhang
-
2008/433 ( PDF )
- On differences of quadratic residues
- Guillermo Morales-Luna
-
2008/432 ( PDF )
- Dynamic Provable Data Possession
- C. Chris Erway and Alptekin Kupcu and Charalampos Papamanthou and Roberto Tamassia
-
2008/431 ( PDF )
- Usable Optimistic Fair Exchange
- Alptekin Kupcu and Anna Lysyanskaya
-
2008/430 ( PDF )
- Cryptographic Protocol Composition via the Authentication Tests
- Joshua D. Guttman
-
2008/429 ( PDF )
- Public-Key Encryption with Efficient Amortized Updates
- Nishanth Chandran and Rafail Ostrovsky and William E. Skeith III
-
2008/428 ( PDF )
- Delegatable Anonymous Credentials
- Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham
-
2008/427 ( PDF )
- LEGO for Two Party Secure Computation
- Jesper Buus Nielsen and Claudio Orlandi
-
2008/426 ( PDF )
- On Kasami Bent Functions
- Deepmala Sharma and Sugata Gangopadhyay
-
2008/425 ( PDF )
- Efficient Asynchronous Multiparty Computation with Optimal Resilience
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan
-
2008/424 ( PDF )
- Efficient Asynchronous Byzantine Agreement with Optimal Resilience
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan
-
2008/423 ( PS PS.GZ PDF )
- Searchable encryption with decryption in the standard model
- Dennis Hofheinz and Enav Weinreb
-
2008/422 ( PDF )
- A New Approach for Algebraically Homomorphic Encryption
- Frederik Armknecht and Ahmad-Reza Sadeghi
-
2008/421 ( PDF )
- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
- Kaoru Kurosawa and Kazuhiro Suzuki
-
2008/420 ( PDF )
- Oblivious Transfer from Weak Noisy Channels
- J\"urg Wullschleger
-
2008/419 ( PS PS.GZ PDF )
- Parsing ambiguities in authentication and key establishment protocols
- Liqun Chen and Chris J. Mitchell
-
2008/418 ( PDF )
- Privacy-Enhancing First-Price Auctions Using Rational Cryptography
- Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos
-
2008/417 ( PDF )
- On the security of pairing-friendly abelian varieties over non-prime fields
- Naomi Benger and Manuel Charlemagne and David Freeman
-
2008/416 ( PDF )
- Almost-Asynchronous MPC with Faulty Minority
- Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
-
2008/415 ( PDF )
- Asynchronous Multiparty Computation: Theory and Implementation
- Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
-
2008/414 ( PDF )
- On the Number of Synchronous Rounds Required for Byzantine Agreement
- Matthias Fitzi and Jesper Buus Nielsen
-
2008/413 ( PS PS.GZ PDF )
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Vladimir Kolesnikov and Charles Rackoff
-
2008/412 ( PDF )
- Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
- Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2008/411 ( PDF )
- Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
- Bo Zhu, Yanfei Zheng, Yaowei Zhou and Kefei Chen
-
2008/410 ( PDF )
- On the Role of PKG for Proxy Re-encryption in Identity Based Setting
- Xu an Wang and Xiaoyuan Yang and Fagen Li
-
2008/409 ( PDF )
- A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension
- Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka
-
2008/408 ( PDF )
- The Enigmatique Toolkit
- Christopher Billings
-
2008/407 ( PS PS.GZ PDF )
- Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
- Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee
-
2008/406 ( PDF )
- An asymptotically optimal RFID protocol against relay attacks
- Gildas Avoine and Aslan Tchamkerten
-
2008/405 ( PDF )
- Slid Pairs in Salsa20 and Trivium
- Deike Priemuth-Schmid and Alex Biryukov
-
2008/404 ( PS PS.GZ PDF )
- Pairing with Supersingular Trace Zero Varieties Revisited
- Emanuele Cesena
-
2008/403 ( PDF )
- SPICE Simulation of a "Provably Secure" True Random Number Generator
- Markus Dichtl and Bernd Meyer and Hermann Seuschek
-
2008/402 ( PDF )
- Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
- Jean-Charles Faugère and Ludovic Perret
-
2008/401 ( PDF )
- Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
- Mridul Nandi
-
2008/400 ( PDF )
- Comments on two password based protocols
- Yalin Chen and Hung-Min Sun and Chun-Hui Huang and Jue-Sam Chou
-
2008/399 ( PDF )
- Round Efficient Unconditionally Secure Multiparty Computation Protocol
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/398 ( PS PS.GZ PDF )
- Generating genus two hyperelliptic curves over large characteristic finite fields
- Takakazu Satoh
-
2008/397 ( -- withdrawn -- )
- A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
- Uttam Kr. Mondal , Satyendra Nath Mandal and J. PalChoudhury
-
2008/396 ( PDF )
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Subhamoy Maitra and Goutam Paul
-
2008/395 ( PDF )
- New Applications of Differential Bounds of the SDS Structure
- Jiali Choy and Khoongming Khoo
-
2008/394 ( PDF )
- Attribute-Based Ring Signatures
- Jin Li and Kwangjo Kim
-
2008/393 ( PDF )
- How Far Must You See To Hear Reliably
- Pranav K Vasishta and Anuj Gupta and Prasant Gopal and Piyush Bansal and Rishabh Mukherjee and Poornima M and Kannan Srinathan and Kishore Kothapalli
-
2008/392 ( PDF )
- GUC-Secure Set-Intersection Computation
- TIAN Yuan and WANG Ying
-
2008/391 ( PDF )
- Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
- Tao Xie FanBao Liu DengGuo Feng
-
2008/390 ( PDF )
- Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
- Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes
-
2008/389 ( PS PS.GZ )
- Optimal Subset-Difference Broadcast Encryption with Free Riders
- Murat Ak and Kamer Kaya and Ali Aydin Selcuk
-
2008/388 ( PS PS.GZ PDF )
- Double-Base Number System for Multi-Scalar Multiplications
- Christophe Doche and David R. Kohel and Francesco Sica
-
2008/387 ( -- withdrawn -- )
- None
- None
-
2008/386 ( PDF )
- Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table
- Michael Lifliand
-
2008/385 ( PDF )
- Cube Attacks on Tweakable Black Box Polynomials
- Itai Dinur and Adi Shamir
-
2008/384 ( PDF )
- Improving the Boneh-Franklin Traitor Tracing Scheme
- Pascal Junod and Alexandre Karlov and Arjen K. Lenstra
-
2008/383 ( PS PS.GZ PDF )
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Craig Gentry and Shai Halevi
-
2008/382 ( PDF )
- Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
- Mark Manulis and Damien Leroy and Francois Koeune and Olivier Bonaventure and Jean-Jacques Quisquater
-
2008/381 ( PDF )
- New AES software speed records
- Daniel J. Bernstein and Peter Schwabe
-
2008/380 ( PDF )
- Dynamic Threshold Cryptosystem without Group Manager
- Andreas Noack and Stefan Spitz
-
2008/379 ( PDF )
- A Characterization of Chameleon Hash Functions and New, Efficient Designs
- Mihir Bellare and Todor Ristov
-
2008/378 ( PDF )
- Additively Homomorphic Encryption with d-Operand Multiplications
- Carlos Aguilar Melchor, Philippe Gaborit, and Javier Herranz
-
2008/377 ( PDF )
- TRIVIUM's output partially autocancels
- Michael Vielhaber
-
2008/376 ( PDF )
- Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
- Cas J.F. Cremers
-
2008/375 ( PDF )
- A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
- Jan Camenisch and Nishanth Chandran and Victor Shoup
-
2008/374 ( PDF )
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto
-
2008/373 ( PS PS.GZ PDF )
- Analysis and Improvement of Authenticatable Ring Signcryption Scheme
- Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
-
2008/372 ( PDF )
- Enumeration of Balanced Symmetric Functions over GF(p)
- Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
-
2008/371 ( PDF )
- Unconditionally Reliable Message Transmission in Directed Hypergraphs
- Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2008/370 ( PDF )
- Compartmented Threshold RSA Based on the Chinese Remainder Theorem
- Sorin Iftene and Stefan Ciobaca and Manuela Grindei
-
2008/369 ( PDF )
- New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
- Shahram Khazaei and Willi Meier
-
2008/368 ( PDF )
- Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
- Varad Kirtane and C. Pandu Rangan
-
2008/367 ( PS PS.GZ PDF )
- {Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
- Peeter Laud and Long Ngo
-
2008/366 ( PDF )
- Unique Shortest Vector Problem for max norm is NP-hard
- Than Quang Khoat and Nguyen Hong Tan
-
2008/365 ( PDF )
- Entropy Bounds for Traffic Confirmation
- Luke O'Connor
-
2008/364 ( PDF )
- Zcipher Algorithm Specification
- Ilya O Levin
-
2008/363 ( PS PS.GZ PDF )
- An argument for Hamiltonicity
- Vadym Fedyukovych
-
2008/362 ( PDF )
- The Cost of False Alarms in Hellman and Rainbow Tradeoffs
- Jin Hong
-
2008/361 ( -- withdrawn -- )
- IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
- William Whyte (editor) and Nick Howgrave-Graham and Jeff Hoffstein and Jill PIpher and Joseph H. Silverman and Phil Hirschhorn
-
2008/360 ( PDF )
- An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
- Saurabh Dutta and Jyotsna Kumar mandal
-
2008/359 ( PS PS.GZ PDF )
- Argument of knowledge of a bounded error
- Vadym Fedyukovych
-
2008/358 ( PS PS.GZ PDF )
- History-Independent Cuckoo Hashing
- Moni Naor and Gil Segev and Udi Wieder
-
2008/357 ( PS PS.GZ PDF )
- A protocol for K-multiple substring matching
- Vadym Fedyukovych and Vitaliy Sharapov
-
2008/356 ( PDF )
- Using Commutative Encryption to Share a Secret
- Saied Hosseini Khayat
-
2008/355 ( PS PS.GZ PDF )
- An argument for rank metric
- Vadym Fedyukovych
-
2008/354 ( -- withdrawn -- )
- On DDos Attack against Proxy in Re-encryption and Re-signature
- Xu an Wang
-
2008/353 ( PDF )
- Weaknesses in HENKOS Stream Cipher
- Prasanth Kumar Thandra and S.A.V. Satya Murty and R Balasubramanian
-
2008/352 ( PDF )
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Alexandra Boldyreva and Serge Fehr and Adam O'Neill
-
2008/351 ( PDF )
- Flaws in Some Self-Healing Key Distribution Schemes with Revocation
- Vanesa Daza and Javier Herranz and German Saez
-
2008/350 ( PDF )
- Higher Order Differential Cryptanalysis of Multivariate Hash Functions
- Yiyuan Luo and Xuejia Lai
-
2008/349 ( PDF )
- Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
- Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf
-
2008/348 ( PS PS.GZ )
- Iterative Probabilistic Reconstruction of RC4 Internal States
- Jovan Golic and Guglielmo Morgari
-
2008/347 ( PDF )
- Information Leakage in Optimal Anonymized and Diversified Data
- Chengfang Fang and Ee-Chien Chang
-
2008/346 ( PDF )
- Remote Integrity Check with Dishonest Storage Server
- Ee-Chien Chang and Jia Xu
-
2008/345 ( PDF )
- An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
- Jooyoung Lee and Choon Sik Park
-
2008/344 ( PDF )
- Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
- Jooyoung Lee and Je Hong Park
-
2008/343 ( PDF )
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Jooyoung Lee and Yongjin Yeom
-
2008/342 ( PS PS.GZ PDF )
- Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and Pandu Rangan Chandrasekaran
-
2008/341 ( PDF )
- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
- S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran
-
2008/340 ( -- withdrawn -- )
- On construction of signature schemes based on birational permutations over noncommutative rings
- Yasufumi Hashimoto and Kouichi Sakurai
-
2008/339 ( PDF )
- High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
- Mohamed El-Hadedy and Danilo Gligoroski and Svein J. Knapskog
-
2008/338 ( PS PS.GZ PDF )
- An improvement of discrete Tardos fingerprinting codes
- Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and Kazuto Ogawa and Hideki Imai
-
2008/337 ( PDF )
- Modified Huang-Wang's Convertible Nominative Signature Scheme
- Wei Zhao and Dingfeng Ye
-
2008/336 ( PDF )
- New attacks on ISO key establishment protocols
- Anish Mathuria and G. Sriram
-
2008/335 ( PDF )
- Public Key Cryptography from Different Assumptions
- Boaz Barak and Avi Wigderson
-
2008/334 ( PDF )
- Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
- Darrel Hankerson and Koray Karabina and Alfred Menezes
-
2008/333 ( PDF )
- Explicit hard instances of the shortest vector problem
- Johannes Buchmann and Richard Lindner and Markus Rückert and Michael Schneider
-
2008/332 ( PDF )
- Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
- Mahalingam Ramkumar
-
2008/331 ( PDF )
- A Secure Remote User Authentication Scheme with Smart Cards
- Manoj Kumar
-
2008/330 ( -- withdrawn -- )
- Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
- Xianhui Lu, Xuejia Lai, Dake He
-
2008/329 ( PS PS.GZ PDF )
- SMS4 Encryption Algorithm for Wireless Networks
- Whitfield Diffie and George Ledin (translators)
-
2008/328 ( PDF )
- Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
- Hemanta Maji and Manoj Prabhakaran and Mike Rosulek
-
2008/327 ( PDF )
- Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
- Le Trieu Phong and Wakaha Ogata
-
2008/326 ( PDF )
- Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
- M. B. Paterson and D. R. Stinson
-
2008/325 ( PDF )
- Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
- Chunbo Ma and Jun Ao
-
2008/324 ( PDF )
- RSA-TBOS Signcryption with Proxy Re-encryption.
- Varad Kirtane and C.Pandu Rangan
-
2008/323 ( PDF )
- A new identity based proxy signature scheme
- Bin Wang
-
2008/322 ( PDF )
- Lattice-based Blind Signatures
- Markus Rückert
-
2008/321 ( PDF )
- A correction to ``Efficient and Secure Comparison for On-Line Auctions''
- Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard
-
2008/320 ( PDF )
- Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
- Danilo Gligoroski and Smile Markovski and Svein J. Knapskog
-
2008/319 ( PDF )
- Yet Another Secure Distance-Bounding Protocol
- Ventzislav Nikov and Marc Vauclair
-
2008/318 ( PDF )
- Attacking and defending the McEliece cryptosystem
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2008/317 ( -- withdrawn -- )
- Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
- Abdulwahed M. Ismail and Mohamad Rushdan
-
2008/316 ( PDF )
- Signing a Linear Subspace: Signature Schemes for Network Coding
- Dan Boneh and David Freeman and Jonathan Katz and Brent Waters
-
2008/315 ( PDF )
- RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
- Santanu Sarkar and Subhamoy Maitra and Sumanta Sarkar
-
2008/314 ( PDF )
- Scratch, Click & Vote: E2E voting over the Internet
- Miroslaw Kutylowski and Filip Zagorski
-
2008/313 ( PS PS.GZ PDF )
- A new almost perfect nonlinear function which is not quadratic
- Yves Edel and Alexander Pott
-
2008/312 ( PDF )
- Improved efficiency of Kiltz07-KEM
- Xianhui Lu, Xuejia Lai, Dake He
-
2008/311 ( PDF )
- Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
- Orr Dunkelman and Nathan Keller
-
2008/310 ( PDF )
- Attacks on RFID Protocols
- T. van Deursen and S. Radomirovic
-
2008/309 ( PDF )
- Revocation Systems with Very Small Private Keys
- Allison Lewko and Amit Sahai and Brent Waters
-
2008/308 ( PDF )
- Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
- Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen
-
2008/307 ( PDF )
- Full Security:Fuzzy Identity Based Encryption
- Liming Fang and Jinyue Xia
-
2008/306 ( PDF )
- Combinatorial batch codes
- M. B. Paterson and D. R. Stinson and R. Wei
-
2008/305 ( PDF )
- Identity-Based Directed Signature Scheme from Bilinear Pairings
- Xun Sun and Jian-hua Li and Gong-liang Chen and Shu-tang Yang
-
2008/304 ( PDF )
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung
-
2008/303 ( PDF )
- Complete Fairness in Secure Two-Party Computation
- S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell
-
2008/302 ( PDF )
- Secure Biometric Authentication With Improved Accuracy
- M. Barbosa, S. Cauchie, T. Brouard and S. Melo de Sousa
-
2008/301 ( PDF )
- Accountability of Perfect Concurrent Signature
- Yunfeng Li, Dake He, Xianhui Lu
-
2008/300 ( PDF )
- Cheon's algorithm, pairing inversion and the discrete logarithm problem
- David J. Mireles Morales
-
2008/299 ( PDF )
- An analysis of the infrastructure in real function fields
- David J. Mireles Morales
-
2008/298 ( PDF )
- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
- Ryou Fujita and Kohtaro Tadaki and Shigeo Tsujii
-
2008/297 ( PDF )
- Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
- Hongzhen Du and Qiaoyan Wen
-
2008/296 ( PDF )
- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
- Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, and Huaxiong Wang
-
2008/295 ( PS PS.GZ PDF )
- Foundations of Group Key Management – Framework, Security Model and a Generic Construction
- Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and Pandu Rangan Chandrasekaran
-
2008/294 ( PDF )
- A New Message Recognition Protocol for Ad Hoc Pervasive Networks
- Atefeh Mashatan and Douglas R. Stinson
-
2008/293 ( PDF )
- Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
- Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik
-
2008/292 ( PDF )
- Another approach to pairing computation in Edwards coordinates
- Sorina Ionica and Antoine Joux
-
2008/291 ( PDF )
- How to Protect Yourself without Perfect Shredding
- Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah-Yoh Lim
-
2008/290 ( PDF )
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Brent Waters
-
2008/289 ( PDF )
- Sharemind: a framework for fast privacy-preserving computations
- Dan Bogdanov and Sven Laur and Jan Willemson
-
2008/288 ( PDF )
- How to Launch A Birthday Attack Against DES
- Zhengjun Cao
-
2008/287 ( PDF )
- Authenticated Byzantine Generals in Dual Failure Model
- Anuj Gupta and Prasant Gopal and Piyush Bansal and Kannan Srinathan
-
2008/286 ( PS PS.GZ )
- One-Up Problem for (EC)DSA
- Daniel R. L. Brown
-
2008/285 ( PDF )
- Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
- Jithra Adikari and Vassil Dimitrov and Laurent Imbert
-
2008/284 ( PDF )
- Breaking the Akiyama-Goto cryptosystem
- P. Ivanov and J. F. Voloch
-
2008/283 ( PDF )
- Attacks on Singelee and Preneel's protocol
- Jorge Munilla and Alberto Peinado
-
2008/282 ( PDF )
- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
- Jihye Kim and Gene Tsudik
-
2008/281 ( PDF )
- Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
- Taehyun Kim, Jongsung Kim, Seokhie Hong and Jaechul Sung
-
2008/280 ( PDF )
- FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
- Jean-Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto
-
2008/279 ( PDF )
- Delegating Capabilities in Predicate Encryption Systems
- Elaine Shi and Brent Waters
-
2008/278 ( PS PS.GZ PDF )
- An Improved Robust Fuzzy Extractor
- Bhavana Kanukurthi and Leonid Reyzin
-
2008/277 ( PS PS.GZ PDF )
- A strategy for any DAA Issuer and an additional verification by a Host
- Vadym Fedyukovych
-
2008/276 ( PS PS.GZ PDF )
- Signcryption with Proxy Re-encryption
- Chandrasekar S. and Ambika K. and Pandu Rangan C.
-
2008/275 ( PDF )
- Certificate-Based Signature Schemes without Pairings or Random Oracles
- Joseph K. Liu \and Joonsang Baek \and Willy Susilo \and Jianying Zhou
-
2008/274 ( PS PS.GZ PDF )
- Twisted Ate Pairing on Hyperelliptic Curves and Applications
- Fangguo Zhang
-
2008/273 ( PDF )
- White-Box Cryptography: Formal Notions and (Im)possibility Results
- Amitabh Saxena and Brecht Wyseur and Bart Preneel
-
2008/272 ( PS PS.GZ PDF )
- A New Hash Family Obtained by Modifying the SHA-2 Family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/271 ( PS PS.GZ PDF )
- A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/270 ( PS PS.GZ PDF )
- New Collision attacks Against Up To 24-step SHA-2
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/269 ( PS PS.GZ PDF )
- Searching for Low Weight Codewords in Linear Binary Codes
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/268 ( PDF )
- Adaptive Security in Broadcast Encryption Systems
- Craig Gentry and Brent Waters
-
2008/267 ( PDF )
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart
-
2008/266 ( PDF )
- Information-Theoretically Secure Voting Without an Honest Majority
- Anne Broadbent and Alain Tapp
-
2008/265 ( PDF )
- Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
- Steven D. Galbraith and Michael Harrison and David J. Mireles Morales
-
2008/264 ( PDF )
- Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
- Robin Künzler and Jörn Müller-Quade and Dominik Raub
-
2008/263 ( PS PS.GZ PDF )
- Slide Attacks on a Class of Hash Functions
- Michael Gorski and Stefan Lucks and Thomas Peyrin
-
2008/262 ( PDF )
- Statistically Reliable and Secure Message Transmission in Directed Networks
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan
-
2008/261 ( PS PS.GZ PDF )
- The Hidden Root Problem
- F. Vercauteren
-
2008/260 ( PDF )
- Breaking RSA Generically is Equivalent to Factoring
- Divesh Aggarwal and Ueli Maurer
-
2008/259 ( PDF )
- 2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
- ZHAO Lu, WEN Qiao-yan
-
2008/258 ( PDF )
- ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
- JAIYEOLA Temitope Gbolahan and ADENIRAN John Olushola
-
2008/257 ( PDF )
- ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
- JAIYEOLA Temitope Gbolahan
-
2008/256 ( PDF )
- ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
- JAIYEOLA Temitope Gbolahan
-
2008/255 ( PDF )
- Embedding in Two Least Significant Bits with Wet Paper Coding
- Xin Liao and Qiao-yan Wen
-
2008/254 ( PDF )
- An Efficient Identity-based Ring Signcryption Scheme
- Zhenchao ZHU and Yuqing ZHANG and FengjiaoWANG
-
2008/253 ( PDF )
- Multi-Recipient Signcryption for Secure Wireless Group Communication
- Yiliang Han, Xiaolin Gui, Xu'an Wang
-
2008/252 ( PS PS.GZ PDF )
- Provable Security of Digital Signatures in the Tamper-Proof Device Model
- Nick Varnovsky
-
2008/251 ( PDF )
- Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
- Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad-Reza Sadeghi and Jörg Schwenk
-
2008/250 ( PDF )
- Pairings on hyperelliptic curves with a real model
- Steven Galbraith and Xibin Lin and David Mireles
-
2008/249 ( -- withdrawn -- )
- Construction of Resilient Functions with Multiple Cryptographic Criteria
- Shaojing Fu, Chao Li, Bing sun
-
2008/248 ( PDF )
- Cryptanalysis of a client-to-client password-authenticated key agreement protocol
- Fengjiao Wang and Yuqing Zhang
-
2008/247 ( PS PS.GZ PDF )
- Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
- S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Pandu Rangan Chandrasekaran
-
2008/246 ( PDF )
- The Random Oracle Model and the Ideal Cipher Model are Equivalent
- Jean-Sebastien Coron and Jacques Patarin and Yannick Seurin
-
2008/245 ( PS PS.GZ PDF )
- Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
- Markus Grassl and Rainer Steinwandt
-
2008/244 ( PDF )
- New balanced Boolean functions satisfying all the main cryptographic criteria
- Claude Carlet and Keqin Feng
-
2008/243 ( PDF )
- On the economic payoff of forensic systems when used to trace Counterfeited Software and content
- Yacov Yacobi
-
2008/242 ( -- withdrawn -- )
- Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
- Shaojing Fu Chao Li Bing Sun
-
2008/241 ( PDF )
- Practical Attacks on HB and HB+ Protocols
- Zbigniew Golebiewski and Krzysztof Majcher and Filip Zagorski and Marcin Zawada
-
2008/240 ( PDF )
- Leakage-Resilient Cryptography in the Standard Model
- Stefan Dziembowski and Krzysztof Pietrzak
-
2008/239 ( PDF )
- Recognition in Ad Hoc Pervasive Networks
- Atefeh Mashatan and Douglas R. Stinson
-
2008/238 ( PS PS.GZ PDF )
- On the Provable Security of Multi-Receiver Signcryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C.Pandu Rangan
-
2008/237 ( PDF )
- Local Affinity Based Inversion of Filter Generators
- O.A. Logachev and D.S. Nazarova
-
2008/236 ( PDF )
- A Modular Security Analysis of the TLS Handshake Protocol
- P. Morrissey and N.P.Smart and B. Warinschi
-
2008/235 ( PDF )
- Constant-Round Concurrent Non-Malleable Commitments and Decommitments
- Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
-
2008/234 ( PDF )
- On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal
- Helger Lipmaa
-
2008/233 ( -- withdrawn -- )
- On Resettably-Sound Resttable Zero Knowledege Arguments
- Yi Deng and Dongdai Lin
-
2008/232 ( PDF )
- Perfectly Secure Message Transmission Tolerating Mixed Adversary
- Arpita Patra and Ashish Choudhury and Ashwinkumar B. V and Kannan Srinathan and C. Pandu Rangan
-
2008/231 ( PDF )
- A Novel Probabilistic Passive Attack on the Protocols HB and HB+
- Jose Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento
-
2008/230 ( PDF )
- A New Collision Differential For MD5 With Its Full Differential Path
- Tao Xie and DengGuo Feng and FanBao Liu
-
2008/229 ( PDF )
- Identification and Privacy: Zero-Knowledge is not Enough
- Julien Bringer and Herve Chabanne and Thomas Icart
-
2008/228 ( PDF )
- Revisiting Wiener's Attack -- New Weak Keys in RSA
- Subhamoy Maitra and Santanu Sarkar
-
2008/227 ( PS PS.GZ PDF )
- New Impossible Differential Cryptanalysis of ARIA
- Ruilin Li, Bing Sun, Peng Zhang and Chao Li
-
2008/226 ( PDF )
- Proxy Key Re-encapsulation Mechanism for Group Communications
- Chunbo Ma and Jun Ao
-
2008/225 ( PS PS.GZ PDF )
- Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan
-
2008/224 ( PDF )
- An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
- Hai Huang and Zhenfu Cao
-
2008/223 ( PDF )
- On the Security of a Visual Cryptography Scheme for Color Images
- Bert W. Leung and Felix Y. Ng and Duncan S. Wong
-
2008/222 ( PDF )
- Encryption-On-Demand: Practical and Theoretical Considerations
- Gideon Samid
-
2008/221 ( PDF )
- Efficient Conversion of Secret-shared Values Between Different Fields
- Ivan Damgard and Rune Thorbek
-
2008/220 ( PS PS.GZ PDF )
- Essentially Optimal Universally Composable Oblivious Transfer
- Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi
-
2008/219 ( -- withdrawn -- )
- Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
- Dan P. Milleville
-
2008/218 ( PDF )
- Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
- Wouter Castryck and Steven Galbraith and Reza Rezaeian Farashahi
-
2008/217 ( PDF )
- Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
- Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom\'e
-
2008/216 ( PDF )
- A New Multi-Linear Universal Hash Family
- Palash Sarkar
-
2008/215 ( PDF )
- On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
- Naoki Hashizume and Fumiyuki Momose and Jinhui Chao
-
2008/214 ( PDF )
- Multi-Factor Password-Authenticated Key Exchange
- Douglas Stebila and Poornaprajna Udupi and Sheueling Chang
-
2008/213 ( PDF )
- The Multireceiver Commitment Schemes
- Shuhong Wang
-
2008/212 ( PDF )
- Reducing the Complexity of the Weil Pairing Computation
- Chang-An Zhao and Fangguo Zhang and Dongqing Xie
-
2008/211 ( PDF )
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Goichiro Hanaoka and Kaoru Kurosawa
-
2008/210 ( PDF )
- Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
- Haimin Jin and Duncan S. Wong and Yinlong Xu
-
2008/209 ( PDF )
- Computing Bilinear Pairings on Elliptic Curves with Automorphisms
- Chang-An Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Bing-Long Chen
-
2008/208 ( PS PS.GZ PDF )
- Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
- Naoki Ogura and Shigenori Uchiyama
-
2008/207 ( PDF )
- Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
- Ben Adida and C. Andrew Neff
-
2008/206 ( PDF )
- Partial Fairness in Secure Two-Party Computation
- Dov Gordon and Jonathan Katz
-
2008/205 ( PS PS.GZ PDF )
- On Software Parallel Implementation of Cryptographic Pairings
- Philipp Grabher and Johann Groszschaedl and Dan Page
-
2008/204 ( PDF )
- Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
- Yanbin Pan and Yingpu Deng
-
2008/203 ( PDF )
- Privacy-Preserving Matching of DNA Profiles
- Fons Bruekers and Stefan Katzenbeisser and Klaus Kursawe and Pim Tuyls
-
2008/202 ( PS PS.GZ PDF )
- Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
- Zhitu Su, Hui Li and JianFeng Ma
-
2008/201 ( PDF )
- How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
- J. Wu and D.R. Stinson
-
2008/200 ( PDF )
- On The Security of The ElGamal Encryption Scheme and Damgard’s Variant
- J. Wu and D.R. Stinson
-
2008/199 ( PDF )
- Simultaneous field divisions: an extension of Montgomery's trick
- David G. Harris
-
2008/198 ( PDF )
- Security needs in embedded systems
- Anoop MS
-
2008/197 ( PDF )
- Secure Multiparty Computation for Privacy-Preserving Data Mining
- Yehuda Lindell and Benny Pinkas
-
2008/196 ( PS PS.GZ PDF )
- A New Family of Perfect Nonlinear Binomials
- Zhengbang Zha and Gohar M. Kyureghyan and Xueli Wang
-
2008/195 ( PDF )
- An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
- Jin Zhengping and Zuo Huijuan and Du hongzhen and Wen Qiaoyan
-
2008/194 ( PDF )
- Endomorphisms for faster elliptic curve cryptography on a large class of curves
- Steven D. Galbraith and Xibin Lin and Michael Scott
-
2008/193 ( -- withdrawn -- )
- A Tamper-Evident Voting Machine Resistant to Covert Channels
- Wei Han and Tao Hao and Dong Zheng and Ke-fei Chen and Xiaofeng Chen
-
2008/192 ( PDF )
- Investigating the DPA-Resistance Property of Charge Recovery Logics
- Amir Moradi and Mehrdad Khatir and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
-
2008/191 ( -- withdrawn -- )
- None
- None
-
2008/190 ( PS PS.GZ )
- User-Sure-and-Safe Key Retrieval
- Daniel R. L. Brown
-
2008/189 ( PDF )
- How to Build a Hash Function from any Collision-Resistant Function
- Thomas Ristenpart and Thomas Shrimpton
-
2008/188 ( PDF )
- Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
- Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh
-
2008/187 ( PS PS.GZ PDF )
- An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
- Fagen Li and Yong Yu
-
2008/186 ( PDF )
- Privacy-Preserving Audit and Extraction of Digital Contents
- Mehul A. Shah and Ram Swaminathan and Mary Baker
-
2008/185 ( PS PS.GZ PDF )
- A New Approach to Secure Logging
- Di Ma and Gene Tsudik
-
2008/184 ( PDF )
- On the Secure Obfuscation of Deterministic Finite Automata
- W. Erik Anderson
-
2008/183 ( PDF )
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Jean-Philippe Aumasson and Willi Meier and Florian Mendel
-
2008/182 ( PDF )
- Restricted Adaptive Oblivious Transfer
- Javier Herranz
-
2008/181 ( PDF )
- Proofs of Knowledge with Several Challenge Values
- Grzegorz Stachowiak
-
2008/180 ( PDF )
- Imaginary quadratic orders with given prime factor of class number
- Alexander Rostovtsev
-
2008/179 ( -- withdrawn -- )
- An Efficient ID-based Ring Signature Scheme from Pairings
- Chunxiang Gu and Yuefei Zhu
-
2008/178 ( PDF )
- Optimal Discretization for High-Entropy Graphical Passwords
- Kemal Bicakci
-
2008/177 ( PDF )
- Algebraic Techniques in Differential Cryptanalysis
- Martin Albrecht and Carlos Cid
-
2008/176 ( PDF )
- New construction of Boolean functions with maximun algebraic immunity
- Wang yongjuan and Fan shuqin and Han wenbao
-
2008/175 ( PDF )
- Proofs of Retrievability: Theory and Implementation
- Kevin D. Bowers and Ari Juels and Alina Oprea
-
2008/174 ( PS PS.GZ PDF )
- Non-Linear Reduced Round Attacks Against SHA-2 Hash family
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/173 ( PDF )
- Full Cryptanalysis of LPS and Morgenstern Hash Function
- Christophe Petit and Kristin Lauter and Jean-Jacques Quisquater
-
2008/172 ( PDF )
- The Round Complexity of Verifiable Secret Sharing Revisited
- Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan
-
2008/171 ( PDF )
- Binary Edwards Curves
- Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi
-
2008/170 ( PDF )
- Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
- Simon R. Blackburn
-
2008/169 ( PS PS.GZ PDF )
- Understanding Phase Shifting Equivalent Keys and Exhaustive Search
- Côme Berbain and Aline Gouget and Hervé Sibert
-
2008/168 ( PS PS.GZ PDF )
- Possibility and impossibility results for selective decommitments
- Dennis Hofheinz
-
2008/167 ( PDF )
- Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
- Omkant Pandey
-
2008/166 ( PS PS.GZ PDF )
- Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
- Nicolas T. Courtois and Karsten Nohl and Sean O'Neil
-
2008/165 ( PDF )
- Improved lower bound on the number of balanced symmetric functions over GF(p)
- Pinhui Ke
-
2008/164 ( PDF )
- On the (Im)Possibility of Key Dependent Encryption
- Iftach Haitner and Thomas Holenstein
-
2008/163 ( PDF )
- Universally Composable Adaptive Oblivious Transfer
- Matthew Green and Susan Hohenberger
-
2008/162 ( PDF )
- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
- Michael Backes and Boris Köpf
-
2008/161 ( PDF )
- Modular polynomials for genus 2
- Reinier Broker and Kristin Lauter
-
2008/160 ( PDF )
- A Proxy Signature Scheme over Braid Groups
- Girraj Kumar Verma
-
2008/159 ( PDF )
- A non-interactive deniable authentication scheme based on designated verifier proofs
- Bin Wang
-
2008/158 ( PS PS.GZ PDF )
- DISH: Distributed Self-Healing in Unattended Sensor Networks
- Di Ma and Gene Tsudik
-
2008/157 ( PDF )
- Secure Online Elections in Practice
- Lucie Langer and Axel Schmidt and Johannes Buchmann
-
2008/156 ( PDF )
- On Black-Box Ring Extraction and Integer Factorization
- Kristina Altmann and Tibor Jager and Andy Rupp
-
2008/155 ( PDF )
- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
- David Freeman
-
2008/154 ( -- withdrawn -- )
- The Walsh Spectrum of a New Family of APN Functions
- Yue Zhou and Chao Li
-
2008/153 ( PDF )
- Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
- Clemens Heuberger
-
2008/152 ( PDF )
- Computational soundness of symbolic zero-knowledge proofs
- Michael Backes and Dominique Unruh
-
2008/151 ( -- withdrawn -- )
- Impossible Differential Cryptanalysis of CLEFIA
- Bing Sun,Ruilin Li, Mian Wang, Ping Li and Chao Li
-
2008/150 ( PDF )
- Robust Combiners for Software Hardening
- Amir Herzberg and Haya Shulman
-
2008/149 ( PS PS.GZ )
- Toy Factoring by Newton's Method
- Daniel R. L. Brown
-
2008/148 ( PDF )
- Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
- Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
-
2008/147 ( PDF )
- A Real-World Attack Breaking A5/1 within Hours
- Timo Gendrullis and Martin Novotny and Andy Rupp
-
2008/146 ( PDF )
- Dynamic SHA-2
- Xu Zijie
-
2008/145 ( PDF )
- Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
- Jithra Adikari and Vassil S. Dimitrov and Pradeep K. Mishra
-
2008/144 ( PS PS.GZ PDF )
- A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
- Shiva Prasad Kasiviswanathan and Adam Smith
-
2008/143 ( PS PS.GZ PDF )
- Certificateless Signcryption
- M. Barbosa and P. Farshim
-
2008/142 ( PDF )
- Attacking Reduced Round SHA-256
- Somitra Kumar Sanadhya and Palash Sarkar
-
2008/141 ( PDF )
- Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
- Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan
-
2008/140 ( PDF )
- Reducing Complexity Assumptions for Oblivious Transfer
- K.Y. Cheong and Takeshi Koshiba
-
2008/139 ( PDF )
- Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
- Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian
-
2008/138 ( PDF )
- Oblivious Transfer Based on the McEliece Assumptions
- Rafael Dowsley and Jeroen van de Graaf and J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento
-
2008/137 ( PDF )
- More Discriminants with the Brezing-Weng Method
- Gaetan Bisson and Takakazu Satoh
-
2008/136 ( PDF )
- Constant-Size Dynamic $k$-TAA
- Man Ho Au and Willy Susilo and Yi Mu
-
2008/135 ( PS PS.GZ PDF )
- Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
- Clemens Heuberger and James A. Muir
-
2008/134 ( PS PS.GZ PDF )
- Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
- Alon Rosen and Gil Segev
-
2008/133 ( PDF )
- The arithmetic of characteristic 2 Kummer surfaces
- P. Gaudry and D. Lubicz
-
2008/132 ( PDF )
- A Framework for the Sound Specification of Cryptographic Tasks
- Juan A. Garay and Aggelos Kiayias and Hong-Sheng Zhou
-
2008/131 ( PS PS.GZ PDF )
- Collisions and other Non-Random Properties for Step-Reduced SHA-256
- Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger
-
2008/130 ( PS PS.GZ PDF )
- Analysis of Step-Reduced SHA-256
- Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
-
2008/129 ( PDF )
- Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
- Mohamed Layouni
-
2008/128 ( PS PS.GZ PDF )
- A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
- Hidehiko Nakagami and Ryoichi Teramura and Toshihiro Ohigashi and Hidenori Kuwakado and Masakatu Morii
-
2008/127 ( PDF )
- A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
- Nidia Cortez-Duarte and Francisco Rodr\'iguez-Henr\'iquez and Jean-Luc Beuchat and Eiji Okamoto
-
2008/126 ( PDF )
- Machine Learning Attacks Against the ASIRRA CAPTCHA
- Philippe Golle
-
2008/125 ( PDF )
- Pairing Lattices
- Florian Hess
-
2008/124 ( PDF )
- A Simple Derivation for the Frobenius Pseudoprime Test
- Daniel Loebenberger
-
2008/123 ( PDF )
- Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
- Mehrdad Khatir and Amir Moradi
-
2008/122 ( PDF )
- TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
- Seog Chung Seo and Dong-Guk Han and Seokhie Hong
-
2008/121 ( PS PS.GZ PDF )
- New proofs for old modes
- Mark Wooding
-
2008/120 ( PDF )
- Public key encryption and encryption emulation attacks
- Denis Osin and Vladimir Shpilrain
-
2008/119 ( PDF )
- Linear Bandwidth Naccache-Stern Encryption
- Benoit Chevallier-Mames and David Naccache and Jacques Stern
-
2008/118 ( PDF )
- Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
- Patrick Longa and Catherine Gebotys
-
2008/117 ( PDF )
- Exponentiation in pairing-friendly groups using homomorphisms
- Steven D. Galbraith and Michael Scott
-
2008/116 ( PS PS.GZ PDF )
- Chosen-Ciphertext Security via Correlated Products
- Alon Rosen and Gil Segev
-
2008/115 ( PDF )
- A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
- Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Francisco Rodríguez-Henríquez
-
2008/114 ( PDF )
- Scalable and Efficient Provable Data Possession
- Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik
-
2008/113 ( PDF )
- Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
- Daniel Mall and Qing Zhong
-
2008/112 ( PDF )
- Democratic Group Signatures with Threshold Traceability
- Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li
-
2008/111 ( PDF )
- THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
- Yuriy Izbenko and Vladislav Kovtun and Alexandr Kuznetsov
-
2008/110 ( -- withdrawn -- )
- On the Design of Secure and Fast Double Block Length Hash Functions
- Zheng Gong and Xuejia Lai and Kefei Chen
-
2008/109 ( PDF )
- Collisions for Round-Reduced LAKE
- Florian Mendel and Martin Schläffer
-
2008/108 ( PDF )
- New Differential-Algebraic Attacks and Reparametrization of Rainbow
- Jintai Ding AND Bo-Yin Yang AND Owen Chen AND Ming-Shing Chen AND Doug Cheng
-
2008/107 ( PDF )
- Private Branching Programs: On Communication-Efficient Cryptocomputing
- Helger Lipmaa
-
2008/106 ( PS PS.GZ PDF )
- Knapsack cryptosystems built on NP-hard instances
- Laurent Evain
-
2008/105 ( PS PS.GZ PDF )
- Cryptanalysis of White-Box Implementations
- W. Michiels and P. Gorissen and H.D.L. Hollmann
-
2008/104 ( PS PS.GZ PDF )
- Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
- Ernie Brickell, Liqun Chen and Jiangtao Li
-
2008/103 ( -- withdrawn -- )
- Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
- Jun Shao and Dongsheng Xing and Zhenfu Cao
-
2008/102 ( PS PS.GZ PDF )
- Degradation and Amplification of Computational Hardness
- Shai Halevi and Tal Rabin
-
2008/101 ( -- withdrawn -- )
- Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
- Arpita Patra and Ashish Choudhary and AshwinKumar B.V and C. Pandu Rangan
-
2008/100 ( PDF )
- Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
- Patrick Longa
-
2008/099 ( PS PS.GZ PDF )
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
- Kristin E. Lauter and Katherine E. Stange
-
2008/098 ( PDF )
- On Security Notions for Verifiable Encrypted Signature
- Xu-An Wang and Xiaoyuan Yang and Yiliang Han
-
2008/097 ( PS PS.GZ PDF )
- Fairness with an Honest Minority and a Rational Majority
- Shien Jin Ong and David Parkes and Alon Rosen and Salil Vadhan
-
2008/096 ( PS PS.GZ PDF )
- Optimal Pairings
- F. Vercauteren
-
2008/095 ( PS PS.GZ PDF )
- Strongly Unforgeable ID-based Signatures Without Random Oracles
- Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
-
2008/094 ( PDF )
- Universally Composable Undeniable Signature
- Kaoru Kurosawa and Jun Furukawa
-
2008/093 ( PDF )
- New ID-based Fair Blind Signatures
- Girraj Kumar Verma
-
2008/092 ( PDF )
- An Efficient SPRP-secure Construction based on Pseudo Random Involution
- Mridul Nandi
-
2008/091 ( PDF )
- A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
- Mridul Nandi
-
2008/090 ( PDF )
- Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
- Mridul Nandi
-
2008/089 ( PDF )
- An improved preimage attack on MD2
- S{\o}ren S. Thomsen
-
2008/088 ( PDF )
- A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
- Mahabir Prasad Jhanwar and Rana Barua
-
2008/087 ( PDF )
- Towards a Theory of White-Box Security
- Amir Herzberg and Haya Shulman and Amitabh Saxena and Bruno Crispo
-
2008/086 ( PDF )
- Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
- Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan
-
2008/085 ( PDF )
- All Pairings Are in a Group
- Chang-An Zhao and Fangguo Zhang and Jiwu Huang
-
2008/084 ( PDF )
- ID based generalized signcryption
- Sunder Lal and Prashant Kushwah
-
2008/083 ( PDF )
- On the Security of Chien's Ultralightweight RFID Authentication Protocol
- Hung-Min Sun, Wei-Chih Ting, and King-Hang Wang
-
2008/082 ( PDF )
- Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
- Roberto Araujo and Peter Y. A. Ryan
-
2008/081 ( PDF )
- Template Attacks on ECDSA
- Marcel Medwed and Elisabeth Oswald
-
2008/080 ( PDF )
- Pairing-Based Onion Routing with Improved Forward Secrecy
- Aniket Kate and Greg Zaverucha and Ian Goldberg
-
2008/079 ( PDF )
- Homomorphic Encryption with CCA Security
- Manoj Prabhakaran and Mike Rosulek
-
2008/078 ( PS PS.GZ PDF )
- A Short Proof of the PRP/PRF Switching Lemma
- Donghoon Chang and Mridul Nandi
-
2008/077 ( PDF )
- Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
-
2008/076 ( PDF )
- Results from a Search for the Best Linear Approximation of a Block Cipher
- Kashif Ali and Howard M. Heys
-
2008/075 ( PS PS.GZ PDF )
- On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
- Jonathan J. Hoch and Adi Shamir
-
2008/074 ( PDF )
- On the Chikazawa-Inoue ID based key system
- Bae Eun Jung and Hee Jean Kim
-
2008/073 ( PDF )
- Compact Proofs of Retrievability
- Hovav Shacham and Brent Waters
-
2008/072 ( PDF )
- The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
- Alexandre M. Deusajute and Paulo S. L. M. Barreto
-
2008/071 ( PDF )
- Blockcipher Based Hashing Revisited
- Martijn Stam
-
2008/070 ( PS PS.GZ PDF )
- Generators of Jacobians of Genus Two Curves
- Christian Robenhagen Ravnshoj
-
2008/069 ( PDF )
- HENKOS Cryptanalysis-Related keys attack
- Marius Oliver Gheorghita
-
2008/068 ( PDF )
- Multiparty Computation Goes Live
- Peter Bogetoft and Dan Lund Christensen and Ivan Damgard and Martin Geisler and Thomas Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael Schwartzbach and Tomas Toft
-
2008/067 ( PDF )
- The Twin Diffie-Hellman Problem and Applications
- David Cash and Eike Kiltz and Victor Shoup
-
2008/066 ( PDF )
- High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
- Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng
-
2008/065 ( PS PS.GZ PDF )
- Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
- Junghyun Nam
-
2008/064 ( PDF )
- Remarks on the NFS complexity
- Pavol Zajac
-
2008/063 ( PS PS.GZ PDF )
- Efficient Sequential Aggregate Signed Data
- Gregory Neven
-
2008/062 ( PDF )
- Computing Hilbert Class Polynomials
- Juliana Belding and Reinier Broker and Andreas Enge and Kristin Lauter
-
2008/061 ( PDF )
- Abelian varieties with prescribed embedding degree
- David Freeman and Peter Stevenhagen and Marco Streng
-
2008/060 ( PDF )
- Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
- Nicholas T. Sullivan
-
2008/059 ( PDF )
- Buying random votes is as hard as buying no-votes
- Stefan Popoveniuc and Jonathan Stanton
-
2008/058 ( PDF )
- Physical Cryptanalysis of KeeLoq Code Hopping Applications
- Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
-
2008/057 ( PDF )
- Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
- Vladislav Kovtun, Jan Pelzl and Alexandr Kuznetsov
-
2008/056 ( PDF )
- Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
- Vladislav Kovtun, Thomas Wollinger
-
2008/055 ( -- withdrawn -- )
- cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
- S.Sharmila Deva Selvi and S.Sree Vivek
-
2008/054 ( PS PS.GZ PDF )
- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
- Jin Hong and Kyung Chul Jeong and Eun Young Kwon and In-Sok Lee and Daegun Ma
-
2008/053 ( PDF )
- Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
- Miroslava Sotakova
-
2008/052 ( PDF )
- New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
- Patrick Longa and Ali Miri
-
2008/051 ( PDF )
- New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
- Patrick Longa and Ali Miri
-
2008/050 ( PDF )
- Multi-PKG ID based signcryption
- Sunder Lal and Prashant Kushwah
-
2008/049 ( PDF )
- An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
- Yehuda Lindell and Benny Pinkas
-
2008/048 ( PDF )
- Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
- Donghoon Chang, Jaechul Sung, Seokhie Hong and Sangjin Lee
-
2008/047 ( PS PS.GZ PDF )
- Fair Traceable Multi-Group Signatures
- Vicente Benjumea and Seung Geol Choi and Javier Lopez and Moti Yung
-
2008/046 ( PS PS.GZ PDF )
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- Tal Moran and Gil Segev
-
2008/045 ( PDF )
- Threshold RSA for Dynamic and Ad-Hoc Groups
- Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin
-
2008/044 ( PDF )
- Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
- Ari Juels and Ravikanth Pappu and Bryan Parno
-
2008/043 ( PDF )
- Cryptanalysis of CRUSH hash structure
- Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
-
2008/042 ( PDF )
- Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
- Julien Bringer and Herve Chabanne
-
2008/041 ( PDF )
- A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
- Hassan Elkamchouchi and Yasmine Abouelseoud
-
2008/040 ( PDF )
- Efficient and Generalized Pairing Computation on Abelian Varieties
- Eunjeong Lee, Hyang-Sook Lee, and Cheol-Min Park
-
2008/039 ( PDF )
- New Results on Unconditionally Secure Multireceiver Manual Authentication
- Shuhong Wang and Reihaneh Safavi-Naini
-
2008/038 ( PDF )
- A New Blind Identity-Based Signature Scheme with Message Recovery
- Hassan Elkamchouchi and Yasmine Abouelseoud
-
2008/037 ( PS PS.GZ PDF )
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- Georg Fuchsbauer and David Pointcheval
-
2008/036 ( PDF )
- Generic Attacks on Feistel Schemes
- Jacques Patarin
-
2008/035 ( PS PS.GZ PDF )
- Efficient Fully-Simulatable Oblivious Transfer
- Yehuda Lindell
-
2008/034 ( PS PS.GZ PDF )
- Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
- Chunming Tang and Dingyi Pei and Zhuojun Liu and Zheng-an Yao and Mingsheng Wang
-
2008/033 ( PDF )
- Lower Bounds on Signatures From Symmetric Primitives
- Boaz Barak, Mohammad Mahmoody-Ghidardy
-
2008/032 ( PS PS.GZ PDF )
- Merkle Puzzles are Optimal
- Boaz Barak, Mohammad Mahmoody-Ghidary
-
2008/031 ( PDF )
- Authenticating with Attributes
- Dalia Khader
-
2008/030 ( PS PS.GZ PDF )
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr\'o and Daniel Wichs
-
2008/029 ( PS PS.GZ PDF )
- Non-Cyclic Subgroups of Jacobians of Genus Two Curves
- Christian Robenhagen Ravnshoj
-
2008/028 ( PS PS.GZ PDF )
- HB#: Increasing the Security and Efficiency of HB+
- Henri Gilbert and Matthew J.B. Robshaw and Yannick Seurin
-
2008/027 ( PDF )
- Blind Signature Scheme over Braid Groups
- Girraj Kumar Verma
-
2008/026 ( PDF )
- Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
- Mitsuru Kawazoe and Tetsuya Takahashi
-
2008/025 ( PS PS.GZ PDF )
- Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
- Christian Robenhagen Ravnshoj
-
2008/024 ( PDF )
- Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
- Sunder Lal and Vandani Verma
-
2008/023 ( PS PS.GZ PDF )
- General Certificateless Encryption and Timed-Release Encryption
- Sherman S.M. Chow and Volker Roth and Eleanor G. Rieffel
-
2008/022 ( PDF )
- Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
- M. Gebhardt and G. Illies and W. Schindler
-
2008/021 ( PDF )
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
- Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
-
2008/020 ( PDF )
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Eike Kiltz and Yevgeniy Vahlis
-
2008/019 ( PS PS.GZ PDF )
- Computing Pairings Using x-Coordinates Only
- Steven D. Galbraith and Xibin Lin
-
2008/018 ( PDF )
- Disjunctive Multi-Level Secret Sharing
- Mira Belenkiy
-
2008/017 ( PS PS.GZ PDF )
- New State Recovery Attack on RC4
- Alexander Maximov and Dmitry Khovratovich
-
2008/016 ( PDF )
- ECM using Edwards curves
- Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
-
2008/015 ( PDF )
- Practical Short Signature Batch Verification
- Anna Lisa Ferrara and Matthew Green and Susan Hohenberger and Michael {\O}stergaard Pedersen
-
2008/014 ( PS PS.GZ PDF )
- Simulatable Adaptive Oblivious Transfer
- Jan Camenisch and Gregory Neven and abhi shelat
-
2008/013 ( PDF )
- Twisted Edwards Curves
- Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters
-
2008/012 ( PDF )
- The Encrypted Elliptic Curve Hash
- Daniel R. L. Brown
-
2008/011 ( PDF )
- A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
- Ayan Mahalanobis
-
2008/010 ( PDF )
- A Proof of Security in O(2^n) for the Xor of Two Random Permutations
- Jacques Patarin
-
2008/009 ( PDF )
- Generic Attacks for the Xor of k random permutations
- Jacques Patarin
-
2008/008 ( PS PS.GZ PDF )
- Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
- Zhitu su, Hui Li and Jianfeng Ma
-
2008/007 ( PDF )
- Efficient One-round Key Exchange in the Standard Model
- Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson
-
2008/006 ( PDF )
- Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
- Ralf Kuesters and Max Tuengerthal
-
2008/005 ( PS PS.GZ PDF )
- Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
- Francois Mace and Francois-Xavier Standaert and Jean-Jacques Quisquater
-
2008/004 ( PDF )
- Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
- Palash Sarkar
-
2008/003 ( PDF )
- On Collisions of Hash Functions Turbo SHA-2
- Vlastimil Klima
-
2008/002 ( PDF )
- Fuzzy Identity Based Signature
- Piyi Yang and Zhenfu Cao and Xiaolei Dong
-
2008/001 ( PS PS.GZ PDF )
- Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
- Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo and Lihua Wang
[ Cryptology ePrint archive ]