Cryptology ePrint Archive: Listing for 2009
-
2009/638 ( -- withdrawn -- )
- Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field $\mathbb{F}_q$ for Some Orders
- Wei Yu, Kunpeng Wang, Bao Li
-
2009/637 ( PDF )
- Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers
- Xiao-shan Gao and Zhenyu Huang
-
2009/636 ( PDF )
- Obtaining More Karatsuba-Like Formulae over The Binary Field
- Haining Fan and Ming Gu and Jiaguang Sun and Kwok-Yan Lam
-
2009/635 ( PDF )
- Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
- Kazukuni Kobara
-
2009/634 ( PDF )
- Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512}
- Charles Bouillaguet and Orr Dunkelman and Gaëtan Leurent and Pierre-Alain Fouque
-
2009/633 ( PDF )
- Traitor-Tracing on Binary Strings
- Michael J. Collins
-
2009/632 ( PDF )
- Cryptanalysis of Secure Message Transmission Protocols with Feedback
- Qiushi Yang and Yvo Desmedt
-
2009/631 ( PDF )
- Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
- DaeHun Nyang and Mun-Kyu Lee
-
2009/630 ( PDF )
- Information-Theoretically Secure Protocols and Security Under Composition
- Eyal Kushilevitz and Yehuda Lindell and Tal Rabin
-
2009/629 ( PDF )
- A Comparative Analysis of Delay Based PUF Implementations on FPGA
- Sergey Morozov and Abhranil Maiti and Patrick Schaumont,
-
2009/628 ( PS PS.GZ PDF )
- Using Sphinx to Improve Onion Routing Circuit Construction
- Aniket Kate and Ian Goldberg
-
2009/627 ( PDF )
- A Unified Method for Finding Impossible Differentials of Block Cipher Structures
- Yiyuan Luo, Zhongming Wu, Xuejia Lai and Guang Gong
-
2009/626 ( PDF )
- Approximate Integer Common Divisor Problem relates to Implicit Factorization
- Santanu Sarkar and Subhamoy Maitra
-
2009/625 ( PS PS.GZ PDF )
- Cryptographic Accumulators for Authenticated Hash Tables
- Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
-
2009/624 ( PS PS.GZ PDF )
- Security Analysis of the PACE Key-Agreement Protocol
- Jens Bender and Marc Fischlin and Dennis Kuegler
-
2009/623 ( PDF )
- Universally Constructing 12-th Degree Extension Field for Ate Pairing
- Masaaki Shirase
-
2009/622 ( PDF )
- A Strong Blind Signature Scheme over Braid Groups
- WEI Yun, XIONG Guo-Hua, BAO Wan-Su and ZHANG Xing-Kai
-
2009/621 ( PDF )
- On the Analysis of Cryptographic Assumptions in the Generic Ring Model
- Tibor Jager and Jörg Schwenk
-
2009/620 ( PDF )
- Security of ECQV-Certified ECDSA Against Passive Adversaries
- Daniel R. L. Brown and Matthew J. Campagna and Scott A. Vanstone
-
2009/619 ( PDF )
- A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
- Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger
-
2009/618 ( PDF )
- Data-Depend Hash Algorithm
- ZiJie Xu and Ke Xu
-
2009/617 ( PDF )
- An efficient ID- based directed signature scheme from bilinear pairings
- B. Umaprasada Rao and P. Vasudeva Reddy and T. Gowri
-
2009/616 ( PS PS.GZ PDF )
- Fully Homomorphic Encryption over the Integers
- Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
-
2009/615 ( PDF )
- Faster Pairing Computations on Curves with High-Degree Twists
- Craig Costello and Tanja Lange and Michael Naehrig
-
2009/614 ( PDF )
- Secure Multiparty AES (full paper)
- Ivan Damgård and Marcel Keller
-
2009/613 ( PDF )
- Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition
- Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
-
2009/612 ( PDF )
- On the Impossibility of Batch Update for Cryptographic Accumulators
- Philippe Camacho
-
2009/611 ( PDF )
- Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules
- Lan Luo,QiongHai Dai,ZhiGuang Qin and ChunXiang Xu
-
2009/610 ( PDF )
- Security Analysis of A Remote User Authentication Protocol by Liao and Wang
- Dang Nguyen Duc and Kwangjo Kim
-
2009/609 ( PDF )
- Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
- Dang Nguyen Duc and Kwangjo Kim
-
2009/608 ( PS PS.GZ PDF )
- Non-Malleable Codes
- Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs
-
2009/607 ( -- withdrawn -- )
- Efficient Client Puzzles based on Repeated-Squaring
- Ghassan O. Karame and Srdjan Capkun
-
2009/606 ( PDF )
- On a weakness of the Tu-Deng function and its repair
- Claude Carlet
-
2009/605 ( PDF )
- Solving the Shortest Lattice Vector Problem in Time 2^2.465n
- Xavier Pujol and Damien Stehle
-
2009/604 ( PDF )
- Composition of Zero-Knowledge Proofs with Efficient Provers
- Eleanor Birrell and Salil Vadhan
-
2009/603 ( PDF )
- An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations
- Brian Baldwin and William P. Marnane
-
2009/602 ( PS PS.GZ PDF )
- Secure Ranging With Message Temporal Integrity
- Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Čapkun
-
2009/601 ( PDF )
- Parallel Shortest Lattice Vector Enumeration on Graphics Cards
- Jens Hermans and Michael Schneider and Johannes Buchmann and Frederik Vercauteren and Bart Preneel
-
2009/600 ( PDF )
- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
- D. Fiore and R. Gennaro and N.P. Smart
-
2009/599 ( PDF )
- Groth--Sahai proofs revisited
- E. Ghadafi, N.P. Smart and B. Warinschi
-
2009/598 ( PDF )
- On the Design and Implementation of an Efficient DAA Scheme
- L. Chen, D. Page and N.P. Smart
-
2009/597 ( PS PS.GZ PDF )
- Twisted Jacobi Intersections Curves
- Rongquan Feng, Menglong Nie, Hongfeng Wu
-
2009/596 ( PS PS.GZ PDF )
- Could SFLASH be repaired?
- Jintai Ding and Vivien Dubois and Bo-Yin Yang and Owen Chia-Hsin Chen and Chen-Mou Cheng
-
2009/595 ( PDF )
- Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms
- Endre Bangerter and Jan Camenisch and Stephan Krenn
-
2009/594 ( PDF )
- Efficient Set Operations in the Presence of Malicious Adversaries
- Carmit Hazay and Kobbi Nissim
-
2009/593 ( PS PS.GZ PDF )
- Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
- Jin Li and Qian Wang and Cong Wang and Ning Cao and Kui Ren and Wenjing Lou
-
2009/592 ( PDF )
- From Passive to Covert Security at Low Cost
- Ivan Damgård and Martin Geisler and Jesper Buus Nielsen
-
2009/591 ( PDF )
- Embedded SFE: Offloading Server and Network using Hardware Tokens
- Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/590 ( PDF )
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev
-
2009/589 ( PDF )
- Information-set decoding for linear codes over Fq
- Christiane Peters
-
2009/588 ( PS PS.GZ PDF )
- Confidential Signatures and Deterministic Signcryption
- Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam and Dominique Schroder
-
2009/587 ( PDF )
- Poly-Dragon: An efficient Multivariate Public Key Cryptosystem
- Rajesh P. Singh, A. Saikia and B.K. Sarma
-
2009/586 ( PS PS.GZ PDF )
- A mean value formula for elliptic curves
- Rongquan Feng and Hongfeng Wu
-
2009/585 ( PDF )
- An Improved Differential Fault Attack on Camellia
- ZHAO Xin-jie, WANG Tao
-
2009/584 ( PDF )
- Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers
- Yu Liu, Kaijie Wu, and Ramesh Karri
-
2009/583 ( PDF )
- Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem
- Charles Bouillaguet and Jean-Charles Faugère and Pierre-Alain Fouque and Ludovic Perret
-
2009/582 ( PDF )
- A Game-Based Definition of Coercion-Resistance and its Applications
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2009/581 ( PDF )
- A Diagonal Fault Attack on the Advanced Encryption Standard
- Dhiman Saha and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
-
2009/580 ( PDF )
- A complete set of addition laws\\for incomplete Edwards curves
- Daniel J. Bernstein and Tanja Lange
-
2009/579 ( PDF )
- Privacy-Preserving Public Auditing for Secure Cloud Storage
- Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou
-
2009/578 ( PS PS.GZ PDF )
- Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
- Wenjian Xie and Zhang Zhang
-
2009/577 ( PDF )
- On the nonlinearity profile of the Dillon function
- Claude Carlet
-
2009/576 ( PDF )
- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
- Vadim Lyubashevsky and Adriana Palacio and Gil Segev
-
2009/575 ( PDF )
- Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
- Michael Tunstall and Debdeep Mukhopadhyay
-
2009/574 ( PS PS.GZ PDF )
- Voting with unconditional privacy: CFSY for booth voting
- Jeroen van de Graaf
-
2009/573 ( PDF )
- New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields
- Leibo Li and Mingqiang Wang and Zhanjiang Xia
-
2009/572 ( -- withdrawn -- )
- On the Equivalence of Two Models for Key-Dependent-Message Encryption
- Alexander W. Dent
-
2009/571 ( PDF )
- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
- N.P. Smart and F. Vercauteren
-
2009/570 ( PDF )
- Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
- Adriana C. B. Pinto and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento
-
2009/569 ( PDF )
- Secure Network Coding Over the Integers
- Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin
-
2009/568 ( PDF )
- Ephemeral key compromise attack on the IB-KA protocol
- Qingfeng Cheng and Chuangui Ma
-
2009/567 ( PDF )
- Properties of the Discrete Differential with Cryptographic Applications
- Daniel Smith-Tone
-
2009/566 ( PDF )
- New Cryptosystems From CSP-Based Self-Distributive Systems
- Licheng Wang and Lihua Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao
-
2009/565 ( PDF )
- Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
- Robert Granger and Michael Scott
-
2009/564 ( PDF )
- Optimal pairing revisited
- Mingqiang Wang and Puwen Wei and Haifeng Zhang and Yuliang Zheng
-
2009/563 ( PDF )
- A Family of $p$-ary Binomial Bent Functions
- Dabin Zheng and Xiangyong Zeng and Lei Hu
-
2009/562 ( PDF )
- How to pair with a human
- Stefan Dziembowski
-
2009/561 ( PDF )
- Improvements on two password-based authentication protocols
- Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
-
2009/560 ( PDF )
- On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
- Manoj Kumar
-
2009/559 ( PDF )
- New Integral Distinguisher for Rijndael-256
- Yuechuan Wei and Bing Sun and Chao Li
-
2009/558 ( -- withdrawn -- )
- Quantifying Trust
- Mariusz Jakubowski AND Ramarathnam Venkatesan AND Yacov Yacobi
-
2009/557 ( -- withdrawn -- )
- Towards a Theory of Trust Based Collaborative Search
- Yacov Yacobi
-
2009/556 ( PDF )
- Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
- Naomi Benger and Michael Scott
-
2009/555 ( -- withdrawn -- )
- An enhanced password authenticated key agreement protocol for wireless mobile network
- Zhigang Gao and Dengguo Feng
-
2009/554 ( PDF )
- ON A COMBINATORIAL CONJECTURE
- T. W. CUSICK, YUAN LI AND PANTELIMON STANICA
-
2009/553 ( PDF )
- Cryptanalysis of a key exchange scheme based on block matrices
- Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Pedro Taborda Duarte
-
2009/552 ( PDF )
- Preimage Attacks on Reduced DHA-256
- Jinmin Zhong and Xuejia Lai
-
2009/551 ( PDF )
- A Novel Design Method of Stream Ciphers Based on Table-Element Permutation
- Hongbo Zou
-
2009/550 ( PDF )
- How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
- Yusuke Naito and Lei Wang and Kazuo Ohta
-
2009/549 ( PDF )
- Making Collusion-Secure Codes (More) Robust against Bit Erasure
- Koji Nuida
-
2009/548 ( PS PS.GZ PDF )
- A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS
- Stéphane BALLET and Robert ROLLAND
-
2009/547 ( PS PS.GZ PDF )
- Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Rosario Gennaro and Craig Gentry and Bryan Parno
-
2009/546 ( PDF )
- Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC
- Masao Kasahara
-
2009/545 ( PDF )
- Fuzzy extractors for continuous distributions
- Ileana Buhan and Jeroen Doumen and Pieter Hartel
-
2009/544 ( PS PS.GZ PDF )
- Connections between Quaternary and Binary Bent Functions
- Patrick Solé and Natalia Tokareva
-
2009/543 ( -- withdrawn -- )
- A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
- Gildas Avoine and Muhammed Ali Bingol and Suleyman Kardas and Cedric Lauradoux and Benjamin Martin
-
2009/542 ( PDF )
- Analysis of Intermediate Field Systems
- Olivier Billet and Jacques Patarin and Yannick Seurin
-
2009/541 ( PDF )
- Breaking ECC2K-130
- Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh-Chung Chen and Chen-Mou Cheng and Gauthier van Damme and Giacomo de Meulenaer and Luis Julian Dominguez Perez and Junfeng Fan and Tim Güneysu and Frank Gurkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo-Yin Yang
-
2009/540 ( PDF )
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- David Mandell Freeman
-
2009/539 ( PDF )
- Covering Radius of Two-dimensional Lattices
- Yupeng Jiang and Yingpu Deng and Yanbin Pan
-
2009/538 ( PS PS.GZ PDF )
- Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
- Johann Großschädl and Elisabeth Oswald and Dan Page and Michael Tunstall
-
2009/537 ( PDF )
- Cryptanalysis of two knapsack public-key cryptosystems
- Jingguo Bi; Xianmeng Meng and Lidong Han
-
2009/536 ( -- withdrawn -- )
- Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
- S. Wu
-
2009/535 ( -- withdrawn -- )
- Weakness of a three-party password-based authenticated key exchange protocol
- S. Wu
-
2009/534 ( -- withdrawn -- )
- Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
- S. Wu
-
2009/533 ( PDF )
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method
- D. Boneh and K. Rubin and A. Silverberg
-
2009/532 ( PDF )
- Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
- Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters
-
2009/531 ( PDF )
- Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations
- Henri Gilbert and Thomas Peyrin
-
2009/530 ( PDF )
- A New Proposal Against the Main of Generic Attacks
- Xigen.Yao
-
2009/529 ( PDF )
- Oblivious Transfer with Access Control
- Jan Camenisch and Maria Dubovitskaya and Gregory Neven
-
2009/528 ( PDF )
- New Fault Attack on Elliptic Curve Scalar Multiplication
- Alexey Chilikov and Oleg Taraskin
-
2009/527 ( PDF )
- An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
- Seiko Arita
-
2009/526 ( PDF )
- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
- Jiazhe Chen and Keting Jia
-
2009/525 ( PS PS.GZ PDF )
- On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks
- Somindu C. Ramanna and Palash Sarkar
-
2009/524 ( PDF )
- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
- Petros Mol and Scott Yilek
-
2009/523 ( PDF )
- Differential Addition in generalized Edwards Coordinates
- Benjamin Justus and Daniel Loebenberger
-
2009/522 ( PDF )
- Isogenies of Elliptic Curves: A Computational Approach
- Daniel Shumow
-
2009/521 ( PDF )
- An Efficient Secure Oblivious Transfer
- Hung-Min Sun and Yalin Chen and Jue-Sam Chou
-
2009/520 ( PDF )
- Universally Composable Incoercibility
- Dominique Unruh and Jörn Müller-Quade
-
2009/519 ( PDF )
- Secure Message Transmission with Small Public Discussion
- Juan Garay and Clint Givens and Rafail Ostrovsky
-
2009/518 ( PDF )
- Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability
- Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo
-
2009/517 ( PDF )
- New Constructions of Convertible Undeniable Signature Schemes without Random Oracles
- Qiong Huang and Duncan S. Wong
-
2009/516 ( PDF )
- Lightweight Cryptography - Cryptographic Engineering for a Pervasive World
- Axel Poschmann
-
2009/515 ( PDF )
- Blake-Wilson, Johnson and Menezes Protocol Revisited
- Hai Huang and Zhenfu Cao
-
2009/514 ( PS PS.GZ PDF )
- Generic One Round Group Key Exchange in the Standard Model
- M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonzalez Nieto and Mark Manulis
-
2009/513 ( PDF )
- On the round complexity of black-box constructions of commitments secure against selective opening attacks
- David Xiao
-
2009/512 ( PS PS.GZ PDF )
- Public-Key Encryption in the Bounded-Retrieval Model
- Joel Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs
-
2009/511 ( PDF )
- Bounded Key-Dependent Message Security
- Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai
-
2009/510 ( PDF )
- High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein
- Stefan Tillich and Martin Feldhofer and Mario Kirschbaum and Thomas Plos and Jörn-Marc Schmidt and Alexander Szekely
-
2009/509 ( PDF )
- Practical Key Recovery Attacks On Two McEliece Variants
- Valerie Gauthier Umana and Gregor Leander
-
2009/508 ( PDF )
- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
- Severin Winkler and Juerg Wullschleger
-
2009/507 ( PDF )
- Efficient Privacy-Preserving Face Recognition
- Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
-
2009/506 ( PDF )
- An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2009/505 ( PDF )
- Authenticated Key Exchange Protocols with Enhanced Freshness Properties
- Hai Huang, Zhenfu Cao
-
2009/504 ( PDF )
- Insecure ``Provable Secure Network Coding''
- Yongge Wang
-
2009/503 ( PDF )
- Fault Attacks Against EMV Signatures
- Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi
-
2009/502 ( PDF )
- On second order nonlinearities of cubic monomial Boolean functions
- Ruchi Gode, Sugata Gangopadhyay
-
2009/501 ( PDF )
- Fast Implementations of AES on Various Platforms
- Joppe W. Bos, Dag Arne Osvik, and Deian Stefan
-
2009/500 ( PS PS.GZ PDF )
- Key Recovery Attack on QuiSci
- Nils Reimers
-
2009/499 ( PS PS.GZ PDF )
- Underlying Assumptions and Designated Verifier Signatures
- Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
-
2009/498 ( PDF )
- NTRU based group oriented signature
- Chunbo Ma and Jun Ao
-
2009/497 ( PDF )
- Cube Attack on Courtois Toy Cipher
- Piotr Mroczkowski and Janusz Szmidt
-
2009/496 ( PS PS.GZ PDF )
- Anonymous Fuzzy Identity-based Encryption for Similarity Search
- Ye Zhang and Nikos Mamoulis and David W. Cheung and S.M. Yiu and W.K. Wong
-
2009/495 ( PDF )
- Security Weakness in Two Authenticated Key Exchange Protocols
- Qingfeng Cheng and Chuangui Ma
-
2009/494 ( PDF )
- A Framework for Universally Composable Non-Committing Blind Signatures
- Masayuki Abe and Miyako Ohkubo
-
2009/493 ( PDF )
- Remarks on Some Quantum Cryptographic Schemes
- Zhengjun Cao
-
2009/492 ( PDF )
- Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2009/491 ( PDF )
- Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity
- Emiliano De Cristofaro and Gene Tsudik
-
2009/490 ( PDF )
- Cryptanalysis of Multiple-Server Password-Authenticated Key
- Sang-Gon Lee
-
2009/489 ( PDF )
- Impossible Boomerang Attack for Block Cipher Structures
- Jiali Choy and Huihui Yap
-
2009/488 ( PDF )
- Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
- Rajesh P Singh and A.Saikia and B.K.Sarma
-
2009/487 ( PDF )
- Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures
- Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
-
2009/486 ( PDF )
- Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
- Allison Lewko and Brent Waters
-
2009/485 ( PDF )
- Black-Box Circular-Secure Encryption Beyond Affine Functions
- Zvika Brakerski and Shafi Goldwasser and Yael Kalai
-
2009/484 ( PDF )
- New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
- Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
-
2009/483 ( PDF )
- On the Security of UOV
- Jean-Charles Faugère and Ludovic Perret
-
2009/482 ( PDF )
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Allison Lewko and Brent Waters
-
2009/481 ( PDF )
- PPS: Privacy Preserving Statistics using RFID Tags
- Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
-
2009/480 ( PDF )
- On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited
- Sanjit Chatterjee and Alfred Menezes
-
2009/479 ( PDF )
- Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
- Yu Sasaki and Lei Wang and Kazumaro Aoki
-
2009/478 ( PDF )
- Pseudo-cryptanalysis of the Original Blue Midnight Wish
- Søren S. Thomsen
-
2009/477 ( PDF )
- Preimages for Step-Reduced SHA-2
- Jian Guo and Krystian Matusiewicz
-
2009/476 ( PDF )
- On the Security of PAS (Predicate-based Authentication Service)
- Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang
-
2009/475 ( PS PS.GZ PDF )
- Double-Exponentiation in Factor-4 Groups and its Applications
- Koray Karabina
-
2009/474 ( PDF )
- Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
- Scott Yilek
-
2009/473 ( PS PS.GZ PDF )
- A Simple Power Analysis Attack on the Serpent Key Schedule
- Kevin J. Compton and Brian Timm and Joel VanLaven
-
2009/472 ( PDF )
- Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
- Madeline Gonzalez and Rainer Steinwandt
-
2009/471 ( PS PS.GZ PDF )
- Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$
- Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo and Liang Cui
-
2009/470 ( PDF )
- On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2009/469 ( PDF )
- Additive Combinatorics and Discrete Logarithm Based Range Protocols
- Rafik Chaabouni and Helger Lipmaa and abhi shelat
-
2009/468 ( PDF )
- Password Based Key Exchange with Hidden Elliptic Curve Public Parameters
- Julien Bringer and Herve Chabanne and Thomas Icart
-
2009/467 ( -- withdrawn -- )
- The LPN Problem with Auxiliary Input
- Yu Yu
-
2009/466 ( PDF )
- The Certicom Challenges ECC2-X
- Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
-
2009/465 ( PDF )
- Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
- Rishab Nithyanand and Gene Tsudik and Ersin Uzun
-
2009/464 ( PDF )
- On Key Authentic Degree of Cryptosystem
- WANG Yong, WANG Huangdeng
-
2009/463 ( PDF )
- On Linear Cryptanalysis with Many Linear Approximations
- Benoit Gérard and Jean-Pierre Tillich
-
2009/462 ( PS PS.GZ PDF )
- Certificateless KEM and Hybrid Signcryption Schemes Revisited
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2009/461 ( PDF )
- A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)
- Bruce Kapron and Lior Malka and Venkatesh Srinivasan
-
2009/460 ( PDF )
- Asymptotic enumeration of correlation-immune boolean functions
- E. Rodney Canfield and Zhicheng Gao and Catherine Greenhill and Brendan D. McKay and Robert W. Robinson
-
2009/459 ( PS PS.GZ PDF )
- Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
- Carmit Hazay and Yehuda Lindell
-
2009/458 ( PDF )
- Security Analysis and Design of Proxy Signature Schemes over Braid Groups
- Wei Yun and Xiong Guo-hua and Zhang Xing-kai and Bao Wan-su
-
2009/457 ( PDF )
- A remark on the computation of cube roots in finite fields
- Nozomu Nishihara and Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
-
2009/456 ( -- withdrawn -- )
- An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
- Kimmo Halunen and Juha Kortelainen and Tuomas Kortelainen
-
2009/455 ( PS PS.GZ PDF )
- Identity-Based Hybrid Signcryption
- Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
-
2009/454 ( PDF )
- An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
- Jacob C. N. Schuldt and Kanta Matsuura
-
2009/453 ( PDF )
- A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
- Vlastimil Klima and Petr Susil
-
2009/452 ( PDF )
- Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
- Christian Wieschebrink
-
2009/451 ( PDF )
- Efficient Certificateless KEM in the Standard Model
- Georg Lippold, Colin Boyd, Juan González Nieto
-
2009/450 ( PDF )
- On Hierarchical Threshold Secret Sharing
- Ali Aydin Selcuk and Kerem Kaskaloglu and Ferruh Ozbudak
-
2009/449 ( PS PS.GZ PDF )
- One for All - All for One: Unifying Standard DPA Attacks
- Stefan Mangard and Elisabeth Oswald and Francois-Xavier Standaert
-
2009/448 ( PDF )
- Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
- Ning Ding and Dawu Gu and Bart Preneel
-
2009/447 ( PDF )
- ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS
- Sunil Pandey and Praveen Kaushik and Dr. S.C. Shrivastava
-
2009/446 ( PDF )
- Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
- Ehsan Malekian and Ali Zakerolhosseini
-
2009/445 ( PDF )
- Computing Hilbert class polynomials with the Chinese Remainder Theorem
- Andrew V. Sutherland
-
2009/444 ( PDF )
- Secure and Efficient HB-CM Entity Authentication Protocol
- Zhijun Li and Guang Gong and Zhiguang Qin
-
2009/443 ( PDF )
- Rebound Attack on the Full LANE Compression Function
- Krystian Matusiewicz and Maria Naya-Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schläffer
-
2009/442 ( PDF )
- Fuzzy Privacy Preserving Peer-to-Peer Reputation Management
- Rishab Nithyanand and Karthik Raman
-
2009/441 ( PDF )
- An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP
- Jayaprakash Kar and Banshidhar Majhi
-
2009/440 ( PS PS.GZ PDF )
- A Multivariate Signature Scheme with an almost cyclic public key
- Albrecht Petzoldt and Johannes Buchmann
-
2009/439 ( PS PS.GZ PDF )
- A Fast Mental Poker Protocol
- Tzer-jen Wei and Lih-Chung Wang
-
2009/438 ( PDF )
- Improved Cryptanalysis of Skein
- Jean-Philippe Aumasson and Cagdas Calik and Willi Meier and Onur Ozen and Raphael C.-W. Phan and Kerem Varici
-
2009/437 ( PS PS.GZ PDF )
- On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
- Shengbao Wang
-
2009/436 ( PS PS.GZ PDF )
- On the Connection between Signcryption and One-pass Key Establishment
- M. Choudary Gorantla and Colin Boyd and Juan Manuel González Nieto
-
2009/435 ( PS PS.GZ PDF )
- Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm
- Laila El Aimani
-
2009/434 ( PDF )
- Tight Bounds for Protocols with Hybrid Security
- Matthias Fitzi and Dominik Raub
-
2009/433 ( PDF )
- Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience
- Arpita Patra and C. Pandu Rangan
-
2009/432 ( -- withdrawn -- )
- Practical Distributed Key Generation Scheme
- Chen Huiyan and Li Zichen and Fang Yong
-
2009/431 ( PS PS.GZ PDF )
- On the Design of Trivium
- Yun Tian and Gongliang Chen and Jianhua Li
-
2009/430 ( PDF )
- One-time-password-authenticated key exchange
- Kenneth G. Paterson and Douglas Stebila
-
2009/429 ( PDF )
- Precise Time and Space Simulatable Zero-Knowledge
- Ning Ding and Dawu Gu
-
2009/428 ( PDF )
- Efficiently from Semi-honest to Malicious OT via OLFE
- Jürg Wullschleger
-
2009/427 ( PDF )
- Efficient Verifiable Escrow and Fair Exchange with Trusted Hardware
- Stephen R. Tate and Roopa Vishwanathan
-
2009/426 ( PDF )
- Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes
- Daniel Pasaila and Vlad Alexa and Sorin Iftene
-
2009/425 ( PDF )
- Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol
- Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
-
2009/424 ( PDF )
- Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
- Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
-
2009/423 ( PDF )
- Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
- Atsushi Fujioka and Koutarou Suzuki and Berkant Ustaoglu
-
2009/422 ( PDF )
- Attacks on {RFID}-Based Electronic Voting Systems
- Yossef Oren and Avishai Wool
-
2009/421 ( PS PS.GZ PDF )
- How to Construct Identity-Based Signatures without the Key Escrow Problem
- Tsz Hon Yuen and Willy Susilo and Yi Mu
-
2009/420 ( PDF )
- Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
- Matthieu Rivain and Emmanuel Prouff and Julien Doget
-
2009/419 ( PDF )
- An Efficient Method for Random Delay Generation in Embedded Software
- Jean-Sébastien Coron and Ilya Kizhvatov
-
2009/418 ( PDF )
- Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?
- Mihir Bellare and Dennis Hofheinz and Eike Kiltz
-
2009/417 ( PS PS.GZ PDF )
- More Differential Paths of TIB3
- Harry Wiggins and Philip Hawkes and Gregory G. Rose and Cameron McDonald
-
2009/416 ( PDF )
- KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem
- Carsten Elsner and Martin Schmidt
-
2009/415 ( PDF )
- Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash
- Ethan Heilman
-
2009/414 ( PDF )
- Security Bounds for the Design of Code-based Cryptosystems
- Matthieu Finiasz and Nicolas Sendrier
-
2009/413 ( PDF )
- Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
- Jiang Wu and Douglas R. Stinson
-
2009/412 ( PDF )
- Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
- Nathan Keller and Stephen D. Miller
-
2009/411 ( PDF )
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
- Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/410 ( PDF )
- Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
- S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich
-
2009/409 ( PS PS.GZ )
- A Tree Based Recursive Scheme for Space Efficient Secret Sharing
- Abhishek Parakh and Subhash Kak
-
2009/408 ( PS PS.GZ PDF )
- A Secure and Efficient Authenticated Diffie–Hellman Protocol
- Augustin P. Sarr and Philippe Elbaz–Vincent, and Jean–Claude Bajard
-
2009/407 ( PS PS.GZ PDF )
- Single Block Attacks and Statistical Tests on CubeHash
- Benjamin Bloom and Alan Kaminsky
-
2009/406 ( PDF )
- On-line Non-transferable Signatures Revisited
- Jacob C. N. Schuldt and Kanta Matsuura
-
2009/405 ( PDF )
- Generic Attacks on Misty Schemes -5 rounds is not enough-
- Valerie Nachef and Jacques Patarin and Joana Treger
-
2009/404 ( -- withdrawn -- )
- Pairing-Friendly Elliptic Curves With Various Discriminants
- Woo Sug Kang and Ki Taek Kim
-
2009/403 ( PS PS.GZ PDF )
- On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
- Laila El Aimani
-
2009/402 ( PDF )
- AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time
- Michael Vielhaber
-
2009/401 ( PDF )
- Longest Common Subsequence as Private Search
- Mark Gondree and Payman Mohassel
-
2009/400 ( PDF )
- Identity-Based Chameleon Hash Scheme Without Key Exposure
- Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim
-
2009/399 ( PDF )
- Leakage-Resilient Storage
- Francesco Davì and Stefan Dziembowski and Daniele Venturi
-
2009/398 ( PDF )
- Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves
- Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez
-
2009/397 ( PS PS.GZ PDF )
- Linear Cryptanalysis of Reduced-Round PRESENT
- Joo Yeon Cho
-
2009/396 ( PDF )
- Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
- Ueli Maurer and Stefano Tessaro
-
2009/395 ( PDF )
- First CPIR Protocol with Data-Dependent Computation
- Helger Lipmaa
-
2009/394 ( PDF )
- Provably Secure Convertible Undeniable Signatures with Unambiguity
- Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata
-
2009/393 ( PS PS.GZ PDF )
- Permutation Polynomials modulo $p^n$}
- Rajesh P Singh and Soumen Maity
-
2009/392 ( PDF )
- Computational Soundness for Key Exchange Protocols with Symmetric Encryption
- Ralf Kuesters and Max Tuengerthal
-
2009/391 ( PDF )
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Rikke Bendlin and Ivan Damgård
-
2009/390 ( PS PS.GZ PDF )
- Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments
- Jens Groth
-
2009/389 ( PDF )
- On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
- Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
-
2009/388 ( -- withdrawn -- )
- A Simple Secret Sharing Scheme for Hierarchical Threshold Access Structures
- Kerem Kaskaloglu and Ferruh Ozbudak
-
2009/387 ( PDF )
- Securing Plastic Money Using an RFID Based Protocol Stack
- Rishab Nithyanand
-
2009/386 ( PDF )
- QTRU: A Lattice Attack Resistant Version of NTRU
- Ehsan Malekian and Ali Zakerolhosseini and Atefeh Mashatan
-
2009/385 ( PDF )
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Brent Waters
-
2009/384 ( PDF )
- Practical Attacks on NESHA-256
- Orr Dunkelman and Tor E. Bjørstad
-
2009/383 ( PDF )
- A Registration Scheme to Allocate a Unique Identification Number
- Manoj Kumar
-
2009/382 ( PDF )
- Linearization Framework for Collision Attacks: Application to CubeHash and MD6
- Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin
-
2009/381 ( PS PS.GZ PDF )
- A short Note on Discrete Log Problem in $\mathbbF_p$
- Habeeb Syed
-
2009/380 ( PDF )
- Untraceable Tags based on Mild Assumptions
- Carlo Blundo and Angelo De Caro and Giuseppe Persiano
-
2009/379 ( PDF )
- Protecting Circuits from Computationally Bounded and Noisy Leakage
- Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan
-
2009/378 ( PDF )
- Detectable correlations in Edon-R
- Peter Novotney and Niels Ferguson
-
2009/377 ( PDF )
- Chosen-Ciphertext Secure RSA-type Cryptosystems
- Benoit Chevallier-Mames and Marc Joye
-
2009/376 ( PDF )
- Cryptanalysis of the Tillich-Zémor hash function
- Markus Grassl and Ivana Ilic and Spyros Magliveras and Rainer Steinwandt
-
2009/375 ( PDF )
- Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes
- Masao KASAHARA
-
2009/374 ( PDF )
- Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
- Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir
-
2009/373 ( PDF )
- Utility Dependence in Correct and Fair Rational Secret Sharing
- Gilad Asharov and Yehuda Lindell
-
2009/372 ( PS PS.GZ )
- More on Key Wrapping
- Rosario Gennaro and Shai Halevi
-
2009/371 ( PDF )
- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
- Rakesh Bobba and Himanshu Khurana and Manoj Prabhakaran
-
2009/370 ( PS PS.GZ PDF )
- A study of pairing computation for elliptic curves with embedding degree 15
- Nadia El Mrabet and Nicolas Guillermin and Sorina Ionica
-
2009/369 ( PDF )
- Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
- Boris Skoric
-
2009/368 ( PDF )
- A Simulation-Based Treatment of Authenticated Message Exchange
- Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke
-
2009/367 ( PDF )
- Non-delegatable Identity-based Designated Verifier Signature
- Qiong Huang and Willy Susilo and Duncan S. Wong
-
2009/366 ( PS PS.GZ PDF )
- Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
- Yehuda Lindell and Hila Zarosim
-
2009/365 ( PDF )
- Space Efficient Secret Sharing: A Recursive Approach
- Abhishek Parakh and Subhash Kak
-
2009/364 ( PDF )
- Position Based Cryptography
- Nishanth Chandran and Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky
-
2009/363 ( PDF )
- Some Lattices Attacks on DSA and ECDSA
- Dimitrios Poulakis
-
2009/362 ( PDF )
- Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures
- Laila El Aimani
-
2009/361 ( PS PS.GZ PDF )
- On the Security of a Proxy Blind Signature Scheme over Braid Groups
- Manoj Kumar
-
2009/360 ( PS PS.GZ PDF )
- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
- Ruilin Li and Bing Sun and Chao Li and Longjiang Qu
-
2009/359 ( PDF )
- Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography)
- Chris Peikert
-
2009/358 ( PDF )
- MAC Precomputation with Applications to Secure Memory
- Juan A. Garay and Vladimir Kolesnikov and Rae McLellan
-
2009/357 ( PDF )
- Impossible Differential Cryptanalysis of FOX
- Zhongming Wu and Xuejia Lai and Bo Zhu and Yiyuan Luo
-
2009/356 ( PDF )
- A Domain Extender for the Ideal Cipher
- Jean-Sebastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin
-
2009/355 ( PS PS.GZ PDF )
- Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
- Aniket Kate and Ian Goldberg
-
2009/354 ( PDF )
- Cache Timing Attacks on Camellia Block Cipher
- ZHAO Xin-jie and WANG Tao and ZHENG Yuan-yuan
-
2009/353 ( PDF )
- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
- Berkant Ustaoglu
-
2009/352 ( PDF )
- On the Duality of Probing and Fault Attacks
- Berndt M. Gammel and Stefan Mangard
-
2009/351 ( PS PS.GZ PDF )
- How to Delegate a Lattice Basis
- David Cash and Dennis Hofheinz and Eike Kiltz
-
2009/350 ( PDF )
- Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
- Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan
-
2009/349 ( PDF )
- Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
- Stefan Tillich and Martin Feldhofer and Wolfgang Issovits and Thomas Kern and Hermann Kureck and Michael Mühlberghuber and Georg Neubauer and Andreas Reiter and Armin Köfler and Mathias Mayrhofer
-
2009/348 ( PDF )
- A provably secure really source hiding designated verifier signature scheme based on random oracle model
- Huang-Ta Huang1, *Jue-Sam Chou2
-
2009/347 ( PDF )
- An Efficient Concurrent Repetition Theorem
- Douglas Wikström
-
2009/346 ( PDF )
- Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
- Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang
-
2009/345 ( PDF )
- Anonymous ID Based Signcryption Scheme for Multiple Receivers
- Sunder Lal and Prashant Kushwah
-
2009/344 ( PS PS.GZ PDF )
- Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
- Xi Zhang and Min-Rong Chen and Xia Li
-
2009/343 ( PDF )
- Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications
- Kenneth Koon-Ho Wong and Gregory V. Bard and Robert H. Lewis
-
2009/342 ( PDF )
- FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, L{\sc ane}, Shabal and Spectral Hash
- Brian Baldwin and Andrew Byrne and Mark Hamilton and Neil Hanley and Robert P. McEvoy and Weibo Pan and William P. Marnane
-
2009/341 ( PDF )
- Leakage Resilient Cryptography in Practice
- Francois-Xavier Standaert and Olivier Pereira and Yu Yu and Jean-Jacques Quisquater and Moti Yung and Elisabeth Oswald
-
2009/340 ( PDF )
- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
- Eric Brier and Jean-Sebastien Coron and Thomas Icart and David Madore and Hugues Randriam and Mehdi Tibouchi
-
2009/339 ( PDF )
- A Novel ID-based Electronic Cash System from Pairings
- Jue-Sam Chou*1, Yalin Chen2 , Ming-Hsun Cho3 , Hung-Min Sun4
-
2009/338 ( PDF )
- Security weaknesses in two multi-server password based authentication protocols
- *Jue-Sam Chou1, Chun-Hui Huang2, Cheng-Chung Ding3
-
2009/337 ( PDF )
- A New Lattice-Based Cryptosystem Mixed with a Knapsack
- Yanbin Pan and Yingpu Deng and Yupeng Jiang and Ziran Tu
-
2009/336 ( PDF )
- Partial Signatures and their Applications
- Mihir Bellare and Shanshan Duan
-
2009/335 ( PDF )
- Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/334 ( PDF )
- Attacking Reduced Rounds of the ARIA Block Cipher
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/333 ( PDF )
- Hard Fault Analysis of Trivium
- Yupu Hu and Fengrong Zhang and Yiwei Zhang
-
2009/332 ( PDF )
- Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
- Ton van Deursen and Sasa Radomirovic
-
2009/331 ( PDF )
- Security Notions and Generic Constructions for Client Puzzles
- L. Chen and P. Morrissey and N.P. Smart and B. Warinschi
-
2009/330 ( -- withdrawn -- )
- NTRU, quaternion algebra, public key cryptography
- Ehsan Malekian and Ali Zakerolhosseini and Atefeh
-
2009/329 ( -- withdrawn -- )
- Efficient Approximation of Higher Order Boolean function in a Low Order Function
- Mehreen Afzal and Ashraf Masood
-
2009/328 ( PDF )
- Flowchart description of security primitives for Controlled Physical Unclonable Functions
- Boris Skoric and Marc X. Makkes
-
2009/327 ( PDF )
- Simple Adaptive Oblivious Transfer Without Random Oracle
- Kaoru Kurosawa and Ryo Nojima
-
2009/326 ( PDF )
- The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property
- Gregory V. Bard
-
2009/325 ( PDF )
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
- Mridul Nandi
-
2009/324 ( PDF )
- Group-Oriented Fair Exchange of Signatures
- Qiong Huang and Duncan S. Wong and Willy Susilo
-
2009/323 ( PDF )
- Factoring Unbalanced Moduli with Known Bits
- Eric Brier and David Naccache and Mehdi Tibouchi
-
2009/322 ( PDF )
- Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS
- Reynald Affeldt, David Nowak and Kiyoshi Yamada
-
2009/321 ( PDF )
- Tweakable Enciphering Schemes From Stream Ciphers With IV
- Palash Sarkar
-
2009/320 ( PS PS.GZ PDF )
- Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures
- Georg Fuchsbauer
-
2009/319 ( PDF )
- Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
- Xiaofeng Chen and Haibo Tian and Fangguo Zhang
-
2009/318 ( PS PS.GZ PDF )
- The Fermat factorization method revisited
- Robert ERRA and Christophe GRENIER
-
2009/317 ( PDF )
- Related-key Cryptanalysis of the Full AES-192 and AES-256
- Alex Biryukov and Dmitry Khovratovich
-
2009/316 ( PDF )
- An Efficient Password Security of Key Exchange Protocol based on ECDLP
- Jayaprakash Kar and Banshidhar Majhi
-
2009/315 ( PDF )
- Breaking RSA-based PIN Encryption with thirty ciphertext validity queries
- N.P. Smart
-
2009/314 ( PDF )
- Secure Two-Party Computation is Practical
- B. Pinkas and T. Schneider and N.P. Smart and S. Williams
-
2009/313 ( PDF )
- Identity Based Group Signatures from Hierarchical Identity-Based Encryption
- Nigel P. Smart and Bogdan Warinschi
-
2009/312 ( PS PS.GZ PDF )
- Jacobi Quartic Curves Revisited
- Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
-
2009/311 ( PDF )
- Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
- Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
-
2009/310 ( PDF )
- RFID distance bounding protocol with mixed challenges to prevent relay attacks
- Chong Hee Kim and Gildas Avoine
-
2009/309 ( PDF )
- Fault Attacks on RSA Signatures with Partially Unknown Messages
- Jean-Sebastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier
-
2009/308 ( PDF )
- A note on the Certificateless Multi-receiver Signcryption Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2009/307 ( PDF )
- Anonymous Signatures Revisited
- Vishal Saraswat and Aaram Yun
-
2009/306 ( PDF )
- Authentic Time-Stamps for Archival Storage
- Alina Oprea and Kevin D. Bowers
-
2009/305 ( PDF )
- Improved generic algorithms for 3-collisions
- Antoine Joux and Stefan Lucks
-
2009/304 ( PS PS.GZ PDF )
- Factor-4 and 6 Compression of Cyclotomic Subgroups
- Koray Karabina
-
2009/303 ( PDF )
- Key extraction from general non-discrete signals
- E. Verbitskiy and P. Tuyls and C. Obi and B. Schoenmakers and B. Skoric
-
2009/302 ( PDF )
- Cryptanalysis of ESSENCE
- Maria Naya-Plasencia and Andrea Röck and Jean-Philippe Aumasson and Yann Laigle-Chapuy and Gaëtan Leurent and Willi Meier and Thomas Peyrin
-
2009/301 ( PDF )
- A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
- Yuyin Yu and Mingsheng Wang
-
2009/300 ( PS PS.GZ PDF )
- Universally Composable Contributory Group Key Exchange
- M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonzàlez Nieto
-
2009/299 ( PS PS.GZ PDF )
- On the security of oscillator-based random number generators
- Mathieu Baudet and David Lubicz and Julien Micolod and André Tassiaux
-
2009/298 ( PS PS.GZ PDF )
- Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2009/297 ( -- withdrawn -- )
- A New Improved Distinguisher for HC-128
- Subhabrata Sen and Rudradev Sengupta and Subhamoy Maitra and Goutam Paul and Shashwat Raizada
-
2009/296 ( PS PS.GZ PDF )
- Perfectly Balanced Functions in Symbolic Dynamics
- O.A. Logachev and A.A. Salnikov and S.V. Smyshlyaev and V.V. Yashchenko
-
2009/295 ( PDF )
- Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
- Shucheng Yu and Kui Ren and Wenjing Lou and Jin Li
-
2009/294 ( PDF )
- Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
- Roman Schlegel and Duncan S. Wong
-
2009/293 ( PS PS.GZ PDF )
- Enhancing Attribute-based Encryption with Attribute Hierarchy
- Jin Li and Qian Wang and Cong Wang and Kui Ren
-
2009/292 ( PDF )
- Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
- Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe
-
2009/291 ( PS PS.GZ PDF )
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- M. Choudary Gorantla and Colin Boyd and Juan Manuel González Nieto
-
2009/290 ( PDF )
- Security Analysis of Aggregate signature and Batch verification signature schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and J.Shriram and S.Kalaivani and C.Pandu Rangan
-
2009/289 ( PDF )
- Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
- Erik Zenner
-
2009/288 ( PDF )
- Efficient Key Exchange with Tight Security Reduction
- Jiang Wu and Berkant Ustaoglu
-
2009/287 ( PDF )
- Generic Attacks on Alternating Unbalanced Feistel Schemes
- Valerie Nachef
-
2009/286 ( PDF )
- On Privacy Losses in the Trusted Agent Model (Abstract)
- Paulo Mateus and Serge Vaudenay
-
2009/285 ( PDF )
- Efficient Public Key Encryption Based on Ideal Lattices
- Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
-
2009/284 ( PS PS.GZ PDF )
- Privacy-aware Attribute-based Encryption with User Accountability
- Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan
-
2009/283 ( PDF )
- Short and Stateless Signatures from the RSA Assumption
- Susan Hohenberger and Brent Waters
-
2009/282 ( PDF )
- Leakage-Resilient Signatures
- Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy Rothblum
-
2009/281 ( PDF )
- Enabling Public Verifiability and Data Dynamics for Storage Security
- Qian Wang and Cong Wang and Jin Li and Kui Ren and Wenjing Lou
-
2009/280 ( PDF )
- Universally Anonymous IBE based on the Quadratic Residuosity Assumption
- Giuseppe Ateniese and Paolo Gasti
-
2009/279 ( PDF )
- Algebraic Side-Channel Attacks
- Mathieu Renauld and Francois-Xavier Standaert
-
2009/278 ( PDF )
- Towards Electrical, Integrated Implementations of SIMPL Systems
- Ulrich Rührmair Qingqing Chen Paolo Lugli Ulf Schlichtmann Martin Stutzmann György Csaba
-
2009/277 ( PDF )
- On the Foundations of Physical Unclonable Functions
- Ulrich Rührmair and Jan Sölter and Frank Sehnke
-
2009/276 ( PDF )
- Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
- Jean-Luc Beuchat and Emmanuel López-Trejo and Luis Martínez-Ramos and Shigeo Mitsunari and Francisco Rodríguez-Henríquez
-
2009/275 ( PDF )
- Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit)
- Thomas Dullien
-
2009/274 ( PDF )
- A Collision-resistance Hash Function DIHA2
- Xigen.Yao
-
2009/273 ( PDF )
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Rafael Dowsley and Jörn Müller-Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento
-
2009/272 ( PDF )
- A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
- Ziran Tu and Yingpu Deng
-
2009/271 ( PS PS.GZ PDF )
- Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems
- Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento
-
2009/270 ( PDF )
- Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
- Rafael Tonicelli and Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Jörn Müller-Quade and Akira Otsuka and Anderson C. A. Nascimento
-
2009/269 ( PDF )
- Side-channel attacks based on linear approximations
- Thomas Roche and Cédric Tavernier
-
2009/268 ( -- withdrawn -- )
- Dealer-Free Dynamic Secret Sharing Schemes with Unconditional Security
- Mehrdad Nojoumian and Douglas R. Stinson
-
2009/267 ( PDF )
- Simulation based security in the applied pi calculus
- Stéphanie Delaune and Steve Kremer and Olivier Pereira
-
2009/266 ( PDF )
- Pseudorandomness Analysis of the Lai-Massey Scheme
- Yiyuan Luo and Xuejia Lai and Zheng Gong and Zhongming Wu
-
2009/265 ( PS PS.GZ PDF )
- Revisiting the Indifferentiability of PGV Hash Functions
- Yiyuan Luo and Zheng Gong and Ming Duan and Bo Zhu and Xuejia Lai
-
2009/264 ( PDF )
- Proposal of PPS Multivariate Public Key Cryptosystems
- Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryo Fujita and Masao Kasahara
-
2009/263 ( PS PS.GZ PDF )
- General Error Decodable Secret Sharing Scheme and Its Application
- Kaoru Kurosawa
-
2009/262 ( PDF )
- Computationally Secure Two-Round Authenticated Message Exchange
- Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke
-
2009/261 ( PDF )
- Security of Cyclic Double Block Length Hash Functions including Abreast-DM
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/260 ( PDF )
- A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
- Kota Ideguchi and Toru Owada and Hirotaka Yoshida
-
2009/259 ( -- withdrawn -- )
- Differential Path for SHA-1 with complexity $O(2^{52})$
- Cameron McDonald and Philip Hawkes and Josef Pieprzyk
-
2009/258 ( PS PS.GZ PDF )
- FACTORIZATION WITH GENUS 2 CURVES
- Romain COSSET
-
2009/257 ( PDF )
- FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION
- Ulf T. Mattsson
-
2009/256 ( PDF )
- Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Zhiqiang Liu and Dawu Gu and Jing Zhang
-
2009/255 ( PDF )
- SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions
- Ulrich Rührmair
-
2009/254 ( PDF )
- Improvement of One Quantum Encryption Scheme
- Zhengjun Cao
-
2009/253 ( PDF )
- Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
- Cas J.F. Cremers
-
2009/252 ( PDF )
- Sparse Boolean equations and circuit lattices
- Igor Semaev
-
2009/251 ( PDF )
- Format-Preserving Encryption
- Mihir Bellare and Thomas Ristenpart and Phillip Rogaway and Till Stegers
-
2009/250 ( -- withdrawn -- )
- Modifications in the Design of Trivium to Increase its Security Level
- Mehreen Afzal and Ashraf Masood
-
2009/249 ( PS PS.GZ PDF )
- Pseudo-randomness and partial information in symbolic security analysis
- Daniele Micciancio
-
2009/248 ( PDF )
- Cryptanalysis of the MST_3 Public Key Cryptosystem
- Simon R. Blackburn, Carlos Cid and Ciaran Mullan
-
2009/247 ( PS PS.GZ PDF )
- On the Necessary and Sufficient Assumptions for UC Computation
- Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi
-
2009/246 ( PDF )
- On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions
- György Csaba \and Xueming Ju \and Qingqing Chen \and Wolfgang Porod \and Jürgen Schmidhuber \and Ulf Schlichtmann \and Paolo Lugli \and Ulrich Rührmair
-
2009/245 ( PDF )
- Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring
- Naoki Ogura and Shigenori Uchiyama
-
2009/244 ( PDF )
- Tardos Fingerprinting Codes in the Combined Digit Model
- Boris Skoric and Stefan Katzenbeisser and Hans Georg Schaathun and Mehmet U. Celik
-
2009/243 ( PS PS.GZ PDF )
- Faster Pairings on Special Weierstrass Curves
- Craig Costello and Huseyin Hisil and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
-
2009/242 ( PDF )
- Examples of differential multicollisions for 13 and 14 rounds of AES-256
- Alex Biryukov and Dmitry Khovratovich and Ivica Nikolić
-
2009/241 ( PDF )
- Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)
- Alex Biryukov and Dmitry Khovratovich and Ivica Nikolić
-
2009/240 ( PDF )
- Group Testing and Batch Verification
- Gregory M. Zaverucha and Douglas R. Stinson
-
2009/239 ( PDF )
- Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations
- Julien Bringer and Herve Chabanne and Jean-Luc Danger
-
2009/238 ( PDF )
- Attacks on Round-Reduced BLAKE
- LI Ji and XU Liangyu
-
2009/237 ( PDF )
- Remarks on One Arbitrated Quantum-signature Scheme
- Zhengjun Cao
-
2009/236 ( PDF )
- Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics
- Fumiyuki Momose and Jinhui Chao
-
2009/235 ( PS PS.GZ PDF )
- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2009/234 ( PDF )
- On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function
- Rune Steinsmo \Oe degå rd and Danilo Gligoroski
-
2009/233 ( PDF )
- A strategy for recovering roots of bivariate polynomials modulo a prime
- Paula Bustillo and Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
-
2009/232 ( PDF )
- MeshHash2
- Björn Fay
-
2009/231 ( PDF )
- Practical DPA Attacks on MDPL
- Elke De Mulder \and Benedikt Gierlichs \and Bart Preneel \and Ingrid Verbauwhede
-
2009/230 ( PS PS.GZ PDF )
- Adaptively Secure Broadcast
- Martin Hirt and Vassilis Zikas
-
2009/229 ( PDF )
- Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
- Giacomo de Meulenaer and Christophe Petit and Jean-Jacques Quisquater
-
2009/228 ( PDF )
- Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
- Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede
-
2009/227 ( PS PS.GZ PDF )
- Computational soundness, co-induction, and encryption cycles
- Daniele Micciancio
-
2009/226 ( PDF )
- How to Hash into Elliptic Curves
- Thomas Icart
-
2009/225 ( PDF )
- The Security of Abreast-DM in the Ideal Cipher Model
- Jooyoung Lee and Daesung Kwon
-
2009/224 ( PDF )
- Pseudo-Cryptanalysis of Luffa
- Keting Jia and Yvo Desmedt and Lidong Han and Xiaoyun Wang
-
2009/223 ( PDF )
- How To Find Weak Input Differences For MD5 Collision Attacks
- Tao Xie and Dengguo Feng
-
2009/222 ( PDF )
- PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
- Willi Geiselmann and Kenneth Matheis and Rainer Steinwandt
-
2009/221 ( PDF )
- Boneh-Boyen signatures and the Strong Diffie-Hellman problem
- David Jao and Kayo Yoshida
-
2009/220 ( PDF )
- Signature Schemes with Bounded Leakage Resilience
- Jonathan Katz
-
2009/219 ( PDF )
- Strongly Secure Certificateless Key Agreement
- Georg Lippold and Colin Boyd and Juan González Nieto
-
2009/218 ( PDF )
- Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128
- Jean-Philippe Aumasson and Itai Dinur and Luca Henzen and Willi Meier and Adi Shamir
-
2009/217 ( PDF )
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
- Palash Sarkar
-
2009/216 ( PDF )
- Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher
- Palash Sarkar
-
2009/215 ( PDF )
- A Simple and Generic Construction of Authenticated Encryption With Associated Data
- Palash Sarkar
-
2009/214 ( PDF )
- An Optimally Fair Coin Toss
- Tal Moran and Moni Naor and Gil Segev
-
2009/213 ( PDF )
- Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion
- Richard Moloney and Gary McGuire and Michael Markowitz
-
2009/212 ( -- withdrawn -- )
- A Flyweight RFID Authentication Protocol
- Mike Burmester and Jorge Munilla
-
2009/211 ( PDF )
- Bringing Zero-Knowledge Proofs of Knowledge to Practice
- Endre Bangerter and Stefania Barzan and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider and Joe-Kai Tsay
-
2009/210 ( PDF )
- Sufficient conditions for sound tree and sequential hashing modes
- Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
-
2009/209 ( PS PS.GZ PDF )
- On Directed Transitive Signature
- Jia Xu
-
2009/208 ( PS PS.GZ PDF )
- PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS
- Rajesh P Singh and B.K.Sarma and A.Saikia
-
2009/207 ( -- withdrawn -- )
- Unconditionally Secure Social Secret Sharing Scheme
- Mehrdad Nojoumian and Douglas R. Stinson and Morgan Grainger
-
2009/206 ( PS PS.GZ PDF )
- On Optimized FPGA Implementations of the SHA-3 Candidate Groestl
- Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
-
2009/205 ( PS PS.GZ PDF )
- Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions
- Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo
-
2009/204 ( PDF )
- GUC-Secure Join Operator in Distributed Relational Database
- TIAN Yuan
-
2009/203 ( PDF )
- Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures
- Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi and Ralf-Philipp Weinmann
-
2009/202 ( PDF )
- A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES
- Alawi A. Al-Saggaf and Acharya H. S.
-
2009/201 ( PDF )
- Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
- Mohamed Abo El-Fotouh and Klaus Diepold
-
2009/200 ( PDF )
- A Survey on the Evolution of Cryptographic Protocols in ePassports
- Rishab Nithyanand
-
2009/199 ( PDF )
- Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers
- Emmanuel Bresson and Anne Canteaut and Benoit Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-Francois Misarsky and Maria Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-Rene Reinhard and Celine Thuillet and Marion Videau
-
2009/198 ( -- withdrawn -- )
- DAA: Fixing the pairing based protocols
- L Chen and P. Morrissey and N.P. Smart
-
2009/197 ( PDF )
- Practical pseudo-collisions for hash functions ARIRANG-224/384
- Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang
-
2009/196 ( PDF )
- Analysis of one quantum bit string commitment
- Zhengjun Cao
-
2009/195 ( PDF )
- Secure Evaluation of Private Linear Branching Programs with Medical Applications
- Mauro Barni and Pierluigi Failla and Vladimir Kolesnikov and Riccardo Lazzeretti and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/194 ( PDF )
- Analysis and Enhance of Anonymous Signcryption Scheme
- Mingwu Zhang and Yusheng Zhong and Pengcheng Li and Bo Yang
-
2009/193 ( PDF )
- Generalization of Barreto et al ID based Signcryption Scheme
- Sunder Lal and Prashant Kushwah
-
2009/192 ( PS PS.GZ PDF )
- Linkability of Blind Signature Schemes over Braid Groups
- Manoj Kumar
-
2009/191 ( PDF )
- New logic minimization techniques with applications to cryptology.
- Joan Boyar and Rene Peralta
-
2009/190 ( PS PS.GZ PDF )
- The discrete logarithm problem in the group of non-singular circulant matrices
- Ayan Mahalanobis
-
2009/189 ( PS PS.GZ PDF )
- Efficient Unidirectional Proxy Re-Encryption
- Sherman S.M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng
-
2009/188 ( PS PS.GZ PDF )
- Breaking and Building of Group Inside Signature
- S. Sree Vivek and S. Sharmila Deva Selvi and S.Gopinath and C. Pandu Rangan
-
2009/187 ( PS PS.GZ PDF )
- Compact McEliece Keys from Goppa Codes
- Rafael Misoczki and Paulo S. L. M. Barreto
-
2009/186 ( PDF )
- Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
- Nicolas T. Courtois and Gregory V. Bard and Shaun V. Ault
-
2009/185 ( PDF )
- All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
- Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane
-
2009/184 ( PDF )
- Cryptanalysis of Dynamic SHA(2)
- Jean-Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel
-
2009/183 ( PDF )
- Proactive Linear Integer Secret Sharing
- Rune Thorbek
-
2009/182 ( PDF )
- Extended Substitution Cipher Chaining mode (ESCC)
- Mohamed Abo El-Fotouh, Klaus Diepold
-
2009/181 ( PDF )
- PSP: Private and Secure Payment with RFID
- Erik-Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe
-
2009/180 ( PDF )
- Collaborative, Privacy-Preserving Data Aggregation at Scale
- Haakon Ringberg and Benny Applebaum and Michael J. Freedman and Matthew Caesar and Jennifer Rexford
-
2009/179 ( PS PS.GZ PDF )
- Near-Collision Attack on the Compression Function of Dynamic SHA2
- Hongbo Yu and Xiaoyun Wang
-
2009/178 ( PDF )
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version)
- Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap
-
2009/177 ( PDF )
- Salvaging Merkle-Damgard for Practical Applications
- Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton
-
2009/176 ( PDF )
- A novel multi-server authentication protocol
- Yalin Chen, Chun-Hui Huang, *Jue-Sam Chou
-
2009/175 ( PDF )
- Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)
- Stefan Lucks and Erik Zenner and Andre Weimerskirch and Dirk Westhoff
-
2009/174 ( PDF )
- Making the Diffie-Hellman Protocol Identity-Based
- Dario Fiore and Rosario Gennaro
-
2009/173 ( PDF )
- Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
- Patrick Longa and Catherine Gebotys
-
2009/172 ( PS PS.GZ )
- A new Protocol for 1-2 Oblivious Transfer
- Bjoern Grohmann
-
2009/171 ( PDF )
- On the Theory and Practice of Personal Digital Signatures
- Ivan Damgård and Gert Læssøe Mikkelsen
-
2009/170 ( PDF )
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2009/169 ( PDF )
- Floating Fault analysis of Trivium under Weaker Assumptions
- Hu Yupu and Gao Juntao and Liu Qing
-
2009/168 ( PDF )
- A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)
- Michael A. Halcrow and Niels Ferguson
-
2009/167 ( PDF )
- A new approach for FCSRs
- François Arnault and Thierry Berger and Cédric Lauradoux and Marine Minier and Benjamin Pousse
-
2009/166 ( PDF )
- I shall love you up to the death
- Valerie Nachef and Jacques Patarin
-
2009/165 ( PDF )
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
- Matthieu Rivain
-
2009/164 ( PDF )
- CCA-Secure Proxy Re-Encryption without Pairings
- Jun Shao and Zhenfu Cao
-
2009/163 ( PS PS.GZ )
- A New Key-Agreement-Protocol
- Bjoern Grohmann
-
2009/162 ( PS PS.GZ PDF )
- Certificateless Hybrid Signcryption
- Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
-
2009/161 ( PS PS.GZ PDF )
- Built-in Determined Sub-key Correlation Power Analysis
- Yuichi Komano and Hideo Shimizu and Shinichi Kawamura
-
2009/160 ( PS PS.GZ PDF )
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Joel Alwen and Yevgeniy Dodis and Daniel Wichs
-
2009/159 ( PDF )
- Hardware Implementation of the SHA-3 Candidate Skein
- Stefan Tillich
-
2009/158 ( PS PS.GZ PDF )
- Security Analysis of a Proxy Signature Scheme over Braid Groups
- Manoj Kumar
-
2009/157 ( PDF )
- Efficient Halving for Genus 3 Curves over Binary Fields
- Peter Birkner and Nicolas Thériault
-
2009/156 ( PDF )
- A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution
- Anupam Pattanayak and B. Majhi
-
2009/155 ( PDF )
- Faster Computation of the Tate Pairing
- Christophe Arene and Tanja Lange and Michael Naehrig and Christophe Ritzenthaler
-
2009/154 ( PDF )
- Algorithms to solve massively under-defined systems of multivariate quadratic equations
- Yasufumi Hashimoto
-
2009/153 ( PDF )
- A new bound for t−wise almost universal hash functions
- Long Hoang Nguyen and A. W. Roscoe
-
2009/152 ( -- withdrawn -- )
- FaceTrust: Assessing the Credibility of Online Personas via Social Networks
- Michael Sirivianos
-
2009/151 ( PDF )
- Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm
- Shaohua Zhang
-
2009/150 ( PDF )
- Efficient group authentication protocols based on human interaction
- Long Hoang Nguyen and A. W. Roscoe
-
2009/149 ( PDF )
- Secure EPC Gen2 compliant Radio Frequency Identification
- Mike Burmester and Breno de Medeiros and Jorge Munilla and Alberto Peinado
-
2009/148 ( PDF )
- Secret Handshake: Strong Anonymity Definition and Construction
- Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta
-
2009/147 ( PDF )
- Preimage Attack on ARIRANG
- Deukjo Hong and Woo-Hwan Kim and Bonwook Koo
-
2009/146 ( PS PS.GZ PDF )
- Transferable Constant-Size Fair E-Cash
- Georg Fuchsbauer and David Pointcheval and Damien Vergnaud
-
2009/145 ( PDF )
- Security of Permutation-based Compression Function lp 231
- Jooyoung Lee and Daesung Kwon
-
2009/144 ( PS PS.GZ PDF )
- On the security of Identity Based Ring Signcryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2009/143 ( PDF )
- Multiple and Unlinkable Public Key Encryption without Certificates
- Soyoung Park and Sang-Ho Lee and Joohan Lee
-
2009/142 ( PDF )
- Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems
- Ronald Cramer and Dennis Hofheinz and Eike Kiltz
-
2009/141 ( PDF )
- Ideal Hierarchical Secret Sharing Schemes
- Oriol Farras and Carles Padro
-
2009/140 ( PDF )
- The Analysis of Galois Substitution Counter Mode (GSCM)
- Mohamed Abo El-Fotouh and Klaus Diepold
-
2009/139 ( PDF )
- Certificateless Group Oriented Signature Secure Against Key Replacement Attack
- Chunbo Ma and Jun Ao
-
2009/138 ( PS PS.GZ PDF )
- A Hybrid RFID Protocol against Tracking Attacks
- Jen-Chun Chang and Hsin-Lung Wu
-
2009/137 ( PDF )
- The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
- Nicolas T. Courtois
-
2009/136 ( PDF )
- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
- Yvonne Cliff and Colin Boyd and Juan Gonzalez Nieto
-
2009/135 ( PDF )
- Practical Key Recovery Attack against Secret-prefix Edon-R
- Gaëtan Leurent
-
2009/134 ( PDF )
- A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity
- Yindong Chen and Peizhong Lu
-
2009/133 ( -- withdrawn -- )
- Signature Schemes with Bounded Leakage Resilience
- Jonathan Katz
-
2009/132 ( -- withdrawn -- )
- A New Lattice for Implicit Factoring
- Yanbin Pan and Yingpu Deng
-
2009/131 ( PDF )
- Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited
- Anupam Pattanayak and B. Majhi
-
2009/130 ( PDF )
- Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity
- Yindong Chen and Peizhong Lu
-
2009/129 ( PDF )
- Faster and Timing-Attack Resistant AES-GCM
- Emilia Kasper and Peter Schwabe
-
2009/128 ( PS PS.GZ PDF )
- Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator
- Lu Xiao and Gregory G. Rose
-
2009/127 ( PDF )
- Side Channel Cube Attacks on Block Ciphers
- Itai Dinur and Adi Shamir
-
2009/126 ( PDF )
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Siamak F Shahandashti and Reihaneh Safavi-Naini
-
2009/125 ( PDF )
- A Full Key Recovery Attack on HMAC-AURORA-512
- Yu Sasaki
-
2009/124 ( PDF )
- Practical Secure Evaluation of Semi-Private Functions
- Annika Paus and Ahmad-Reza Sadeghi and Thomas Schneider
-
2009/123 ( PDF )
- On the Complexity of Integer Factorization
- N. A. Carella, CUNY, N.Y.
-
2009/122 ( PDF )
- Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
- Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez
-
2009/121 ( -- withdrawn -- )
- Optimized Public Key Infrastructure -- A PKI to Support Efficient Document's Signatures
- Martín Augusto Gagliotti Vigil and Ricardo Felipe Custódio and Nelson da Silva and Ricardo Moraes
-
2009/120 ( PDF )
- On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R
- Danilo Gligoroski and Rune Steinsmo Ø degå rd
-
2009/119 ( PDF )
- A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
- Marcel Medwed
-
2009/118 ( PDF )
- A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
- Jin Li and Kui Ren and Kwangjo Kim
-
2009/117 ( PDF )
- Changing probabilities of differentials and linear sums via isomorphisms of ciphers
- Alexander Rostovtsev
-
2009/116 ( PDF )
- Information Theoretically Secure Multi Party Set Intersection Re-Visited
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2009/115 ( PS PS.GZ PDF )
- Scalable Compilers for Group Key Establishment : Two/Three Party to Group
- S.Sree Vivek and S.Sharmila Deva Selvi, Deepanshu Shukla and C.Pandu Rangan
-
2009/114 ( PDF )
- Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
- Anupam Pattanayak and B. Majhi
-
2009/113 ( PDF )
- Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
- Niels Ferguson and Stefan Lucks
-
2009/112 ( PDF )
- A 2nd-Preimage Attack on AURORA-512
- Yu Sasaki
-
2009/111 ( PDF )
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- Marc Stevens and Alexander Sotirov and Jacob Appelbaum and Arjen Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger
-
2009/110 ( PDF )
- On the Security of Stream Cipher CryptMT v3
- Haina Zhang and Xiaoyun Wang
-
2009/109 ( PDF )
- Cryptanalysis of Stream Cipher Grain Family
- Haina Zhang and Xiaoyun Wang
-
2009/108 ( PDF )
- Further Results on Implicit Factoring in Polynomial Time
- Santanu Sarkar and Subhamoy Maitra
-
2009/107 ( PDF )
- Compact E-Cash and Simulatable VRFs Revisited
- Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
-
2009/106 ( PDF )
- A Collision Attack on AURORA-512
- Yu Sasaki
-
2009/105 ( PDF )
- Public-Key Cryptosystems Resilient to Key Leakage
- Moni Naor and Gil Segev
-
2009/104 ( PS PS.GZ PDF )
- 1024 - A High Security Software Oriented Block Cipher
- Dieter Schmidt
-
2009/103 ( PDF )
- Constructing pairing-friendly hyperelliptic curves using Weil restriction
- David Mandell Freeman and Takakazu Satoh
-
2009/102 ( PDF )
- A Step Towards QC Blind Signatures
- Raphael Overbeck
-
2009/101 ( PDF )
- Encryption Schemes Secure under Selective Opening Attack
- Mihir Bellare and Scott Yilek
-
2009/100 ( PDF )
- Computing the endomorphism ring of an ordinary elliptic curve over a finite field
- Gaetan Bisson and Andrew V. Sutherland
-
2009/099 ( PS PS.GZ PDF )
- A Single Initialization Server for Multi-Party Cryptography
- Hugue Blier and Alain Tapp
-
2009/098 ( PDF )
- Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
- Martin Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz
-
2009/097 ( PS PS.GZ PDF )
- Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
- Brian J. Matt
-
2009/096 ( PDF )
- A note on the security of MST3
- M.I. Gonzalez Vasco and A. L. Perez del Pozo and P. Taborda Duarte
-
2009/095 ( PDF )
- Enhanced Privacy ID from Bilinear Pairing
- Ernie Brickell and Jiangtao Li
-
2009/094 ( PDF )
- On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
- Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
-
2009/093 ( PS PS.GZ PDF )
- Cascade Encryption Revisited
- Peter Gazi and Ueli Maurer
-
2009/092 ( PDF )
- Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
- Jung Hee Cheon and Jeongdae Hong and Gene Tsudik
-
2009/091 ( PDF )
- Knapsack Cryptosystem on Elliptic Curves
- Koichiro Noro and Kunikatsu Kobayashi
-
2009/090 ( PS PS.GZ PDF )
- A Brief History of Provably-Secure Public-Key Encryption
- Alexander W. Dent
-
2009/089 ( PDF )
- A Provably Secure And Efficient Countermeasure Against Timing Attacks
- Boris Köpf and Markus Dürmuth
-
2009/088 ( PDF )
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Brett Hemenway and Benoit Libert and Rafail Ostrovsky and Damien Vergnaud
-
2009/087 ( -- withdrawn -- )
- Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
- Arpita Patra, Ashish Choudhary, C. Pandu Rangan
-
2009/086 ( PDF )
- Point Compression for Koblitz Elliptic Curves
- P. N. J. Eagle and Steven D. Galbraith and John Ong
-
2009/085 ( PDF )
- UC-Secure Source Routing Protocol
- Tao Feng and Xian Guo and Jianfeng Ma and Xinghua Li
-
2009/084 ( PDF )
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
- Mihir Bellare and Thomas Ristenpart
-
2009/083 ( PS PS.GZ PDF )
- Multi-authority attribute based encryption with honest-but-curious central authority
- Vladimir Bozovic and Daniel Socek and Rainer Steinwandt and Viktoria I. Villanyi
-
2009/082 ( PDF )
- The Case for Quantum Key Distribution
- Douglas Stebila and Michele Mosca and Norbert Lütkenhaus
-
2009/081 ( PDF )
- Ensuring Data Storage Security in Cloud Computing
- Cong Wang and Qian Wang and Kui Ren and Wenjing Lou
-
2009/080 ( PDF )
- CoSP: A General Framework For Computational Soundness Proofs
- Michael Backes and Dennis Hofheinz and Dominique Unruh
-
2009/079 ( PDF )
- From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
- David Basin and Cas Cremers
-
2009/078 ( PDF )
- Attacks on the DECT authentication mechanisms
- Stefan Lucks and Andreas Schuler and Erik Tews and Ralf-Philipp Weinmann and Matthias Wenzel
-
2009/077 ( PDF )
- On the Security of Iterated Hashing based on Forgery-resistant Compression Functions
- Charles Bouillaguet and Orr Dunkelman and Pierre-Alain Fouque and Antoine Joux
-
2009/076 ( PDF )
- Construction of large families of pseudorandom subsets using elliptic curves
- Zhixiong Chen and Chenhuang Wu
-
2009/075 ( PDF )
- Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model
- Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta
-
2009/074 ( PDF )
- Computational Oblivious Transfer and Interactive Hashing
- Kirill Morozov and George Savvides
-
2009/073 ( PDF )
- Automatic Approach of Provable Security and its Application for OAEP+
- GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
-
2009/072 ( PDF )
- Implementing cryptographic pairings: a magma tutorial
- Luis J Dominguez Perez, Ezekiel J Kachisa, and Michael Scott
-
2009/071 ( PDF )
- Secret sharing on trees: problem solved
- Laszlo Csirmaz and Gabor Tardos
-
2009/070 ( PDF )
- Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis
- Omran Ahmadi and Francisco Rodr\iguez-Henriquez
-
2009/069 ( PDF )
- Optimistic Fair Exchange with Multiple Arbiters
- Alptekin Kupcu and Anna Lysyanskaya
-
2009/068 ( PDF )
- Overview of Turbo-Code Reconstruction Techniques
- Johann Barbier and Eric Filiol
-
2009/067 ( PDF )
- On fractional correlation immunity of majority functions
- Chuan-Kun Wu
-
2009/066 ( PDF )
- Adaptive Preimage Resistance and Permutation-based Hash Functions
- Jooyoung Lee and Je Hong Park
-
2009/065 ( PS PS.GZ PDF )
- Foundations of Non-Malleable Hash and One-Way Functions
- Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi
-
2009/064 ( PDF )
- On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)
- Céline Blondeau and Benoît Gérard
-
2009/063 ( PS PS.GZ PDF )
- CCZ-equivalence and Boolean functions
- Lilya Budaghyan and Claude Carlet
-
2009/062 ( PDF )
- On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
- Subhamoy Maitra and Santanu Sarkar
-
2009/061 ( PDF )
- Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita and Masahito Gotaishi and Toshinobu Kaneko
-
2009/060 ( PDF )
- Comparing Two Pairing-Based Aggregate Signature Schemes
- Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes
-
2009/059 ( PDF )
- On the impossibility of graph secret sharing
- Laszlo Csirmaz
-
2009/058 ( PDF )
- On Generalization of Cheon's Algorithm
- Takakazu Satoh
-
2009/057 ( PDF )
- Anonymity in Shared Symmetric Key Primitives
- Gregory M. Zaverucha and Douglas R. Stinson
-
2009/056 ( PDF )
- Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
- David Kammler and Diandian Zhang and Peter Schwabe and Hanno Scharwaechter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rainer Leupers and Rudolf Mathar and Heinrich Meyr
-
2009/055 ( PDF )
- Universally Composable Symmetric Encryption
- Ralf Kuesters and Max Tuengerthal
-
2009/054 ( PDF )
- On the Security of Tandem-DM
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2009/053 ( PS PS.GZ PDF )
- New commutative semifields defined by PN multinomials
- Lilya Budaghyan and Tor Helleseth
-
2009/052 ( PS PS.GZ PDF )
- ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
- S.Sree Vivek and S.Sharmila Deva Selvi and C.Pandu Rangan
-
2009/051 ( PDF )
- Enhanced Target Collision Resistant Hash Functions Revisited
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2009/050 ( PDF )
- On the Portability of Generalized Schnorr Proofs
- Jan Camenisch and Aggelos Kiayias and Moti Yung
-
2009/049 ( PDF )
- Extensions of the Cube Attack based on Low Degree Annihilators
- Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei and Josef Pieprzyk
-
2009/048 ( PDF )
- A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials
- Palash Sarkar
-
2009/047 ( PDF )
- On Approximating Addition by Exclusive OR
- Palash Sarkar
-
2009/046 ( PDF )
- Traceability Codes
- Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
-
2009/045 ( PDF )
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Carmit Hazay and Yehuda Lindell
-
2009/044 ( PDF )
- Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
- Dmitry Frumkin and Adi Shamir
-
2009/043 ( PDF )
- Image Encryption by Pixel Property Separation
- Karthik Chandrashekar Iyer and Aravinda Subramanya
-
2009/042 ( PS PS.GZ PDF )
- On CCZ-equivalence and its use in secondary constructions of bent functions
- Lilya Budaghyan and Claude Carlet
-
2009/041 ( PS PS.GZ PDF )
- Proofs of Retrievability via Hardness Amplification
- Yevgeniy Dodis and Salil Vadhan and Daniel Wichs
-
2009/040 ( PDF )
- How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability
- Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta
-
2009/039 ( PDF )
- Key Insulation and Intrusion Resilience Over a Public Channel
- Mihir Bellare and Shanshan Duan and Adriana Palacio
-
2009/038 ( PDF )
- On Algebraic Relations of Serpent S-Boxes
- Bhupendra Singh and Lexy Alexander and Sanjay Burman
-
2009/037 ( PDF )
- Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)
- M. Jason Hinek and Charles C. Y. Lam
-
2009/036 ( PDF )
- Constructions of Truly Practical Secure Protocols using Standard Smartcards
- Carmit Hazay and Yehuda Lindell
-
2009/035 ( PDF )
- Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
- Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim
-
2009/034 ( PDF )
- On a Conditional Collision Attack on NaSHA-512
- S. Markovski, A. Mileva, V. Dimitrova and D. Gligoroski
-
2009/033 ( PDF )
- NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
- Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
-
2009/032 ( PDF )
- A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor
- MITSUNARI Shigeo
-
2009/031 ( PDF )
- Adaptively Secure Two-Party Computation with Erasures
- Yehuda Lindell
-
2009/030 ( PDF )
- An efficient fuzzy extractor for limited noise
- B. Skoric and P. Tuyls
-
2009/029 ( PDF )
- Nofish - A new stream cipher
- Marius Oliver Gheorghita
-
2009/028 ( PDF )
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- Susan Hohenberger and Brent Waters
-
2009/027 ( PDF )
- Security of Verifiably Encrypted Signatures
- Markus Rückert and Dominique Schröder
-
2009/026 ( PDF )
- Collision Attacks on NaSHA-384/512
- Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
-
2009/025 ( PS PS.GZ PDF )
- Short Redactable Signatures Using Random Trees
- Ee-Chien Chang and Chee Liang Lim and Jia Xu
-
2009/024 ( PDF )
- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
- Emmanuelle Dottax and Christophe Giraud and Matthieu Rivain and Yannick Sierra
-
2009/023 ( PDF )
- Polynomial Runtime and Composability
- Dennis Hofheinz and Dominique Unruh and Jörn Müller-Quade
-
2009/022 ( PDF )
- Correctness of Li Generalization of RSA Cryptosystem
- Roman Popovych
-
2009/021 ( PDF )
- Comparing With RSA
- Julien Cathalo and David Naccache and Jean-Jacques Quisquater
-
2009/020 ( PDF )
- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
- Jiali Choy and Khoongming Khoo and Chuan-Wen Loe
-
2009/019 ( PDF )
- Communication-Efficient Private Protocols for Longest Common Subsequence
- Matthew Franklin and Mark Gondree and Payman Mohassel
-
2009/018 ( PDF )
- Huge 2ndpreimages and collisions of khichidi-1
- prasanth Kumar Thandra, S.A.V. Satya Murty
-
2009/017 ( PDF )
- Anonymous signature scheme
- Chunbo Ma and Jun Ao
-
2009/016 ( PDF )
- Fast elliptic-curve cryptography on the Cell Broadband Engine
- Neil Costigan and Peter Schwabe
-
2009/015 ( PDF )
- Cube Attacks on Trivium
- S S Bedi and N Rajesh Pillai
-
2009/014 ( PDF )
- Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
- Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson
-
2009/013 ( PDF )
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- Yehuda Lindell
-
2009/012 ( PDF )
- Avoid Mask Re-use in Masked Galois Multipliers
- D. Canright
-
2009/011 ( PDF )
- A Very Compact "Perfectly Masked" S-Box for AES (corrected)
- D. Canright and Lejla Batina
-
2009/010 ( PDF )
- Optimal Multicast Group Communication
- Zhibin Zhou and Dijiang Huang
-
2009/009 ( PS PS.GZ PDF )
- Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
- Christoph Lucas and Dominik Raub and Ueli Maurer
-
2009/008 ( PDF )
- A note on Agrawal conjecture
- Roman Popovych
-
2009/007 ( PS PS.GZ PDF )
- Homomorphic Trapdoor Commitments to Group Elements
- Jens Groth
-
2009/006 ( PDF )
- Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
- Vlastimil Klima
-
2009/005 ( PDF )
- Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
- Wei Wang and Xiaoyun Wang and Guangwu Xu
-
2009/004 ( -- withdrawn -- )
- On Stateless Schemes for Message Authentication Using Pseudorandom Functions
- Palash Sarkar
-
2009/003 ( PDF )
- Separating two roles of hashing in one-way message authentication
- L. H. Nguyen and A. W. Roscoe
-
2009/002 ( PDF )
- Thermocommunication
- Julien Brouchier and Nora Dabbous and Tom Kean and Carol Marsh and David Naccache
-
2009/001 ( PDF )
- A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
- Brian Baldwin and Richard Moloney and Andrew Byrne and Gary McGuire and William P. Marnane
[ Cryptology ePrint archive ]