Cryptology ePrint Archive: Listing for 2010
-
2010/661 ( PDF )
- Security Evaluation of MISTY Structure with SPN Round Function
- Ruilin Li and Chao Li and Jinshu Su and Bing Sun
-
2010/660 ( PDF )
- Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches
- Brian J. Matt
-
2010/659 ( PDF )
- Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
- Mark Manulis and Bertram Poettering
-
2010/658 ( PDF )
- ABC - A New Framework for Block Ciphers
- Uri Avraham and Eli Biham and Orr Dunkelman
-
2010/657 ( PDF )
- On small secret key attack against RSA with high bits known prime factor
- Yasufumi Hashimoto
-
2010/656 ( PDF )
- A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
- Yehuda Lindell
-
2010/655 ( PS PS.GZ PDF )
- On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings
- İsa Sertkaya and Ali Doğanaksoy
-
2010/654 ( PDF )
- Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)
- Daniel Kraschewski and Jörn Müller-Quade
-
2010/653 ( PDF )
- Cubic groups
- M.A.Popov
-
2010/652 ( PDF )
- Active Domain Expansion for Normal Narrow-pipe Hash Functions
- Xigen Yao
-
2010/651 ( PDF )
- On the Impossibility of Instantiating PSS in the Standard Model
- Rishiraj Bhattacharyya and Avradip Mandal
-
2010/650 ( PDF )
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
- Jean-Sebastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi
-
2010/649 ( PDF )
- Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
- Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Gonzalez Nieto
-
2010/648 ( PDF )
- Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
- Dario Fiore and Dominique Schröder
-
2010/647 ( PDF )
- Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
- Xiaoyun Wang and Mingjie Liu and Chengliang Tian and Jingguo Bi
-
2010/646 ( PDF )
- Statistical Analysis of Second Order Differential Power Analysis
- Emmanuel Prouff and Matthieu Rivain and Régis Bévan
-
2010/645 ( PDF )
- A Timed Logic for Modeling and Reasoning about Security Protocols
- Xinfeng Lei and Rui Xue and Ting Yu
-
2010/644 ( PDF )
- A Practical Platform for Cube-Attack-like Cryptanalyses
- Bo Zhu and Wenye Yu and Tao Wang
-
2010/643 ( PDF )
- Construct MD5 Collisions Using Just A Single Block Of Message
- Tao Xie and Dengguo Feng
-
2010/642 ( PDF )
- More Insights on Blockcipher-Based Hash Functions
- Yiyuan Luo, Xuejia Lai
-
2010/641 ( PDF )
- A new algorithm for computing Groebner bases
- Shuhong Gao and Frank Volny IV and Mingsheng Wang
-
2010/640 ( PS PS.GZ PDF )
- Short collusion-secure fingerprint codes against three pirates
- Koji Nuida
-
2010/639 ( -- withdrawn -- )
- Enumerating Results of Homogeneous Rotation over $GF(p)$
- Guang-Pu Go, Xi-Yong Zhang, and Wen-Fen Liu
-
2010/638 ( PDF )
- One-Pass HMQV and Asymmetric Key-Wrapping
- Shai Halevi and Hugo Krawczyk
-
2010/637 ( PDF )
- Breaking An Identity-Based Encryption Scheme based on DHIES
- Martin R. Albrecht and Kenneth G. Paterson
-
2010/636 ( PS PS.GZ PDF )
- Differential Fault Analysis of AES using a Single Multiple-Byte Fault
- Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall
-
2010/635 ( -- withdrawn -- )
- An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials
- Zhang Yun and Christophe Tartary
-
2010/634 ( PDF )
- ROTIV: RFID Ownership Transfer with Issuer Verification
- Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
-
2010/633 ( PDF )
- Low Data Complexity Attacks on AES
- Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre-Alain Fouque
-
2010/632 ( PDF )
- Efficient and provably-secure certificateless signature scheme without bilinear pairings
- He Debiao, Chen Jianhua, Zhang Rui
-
2010/631 ( PDF )
- Black-box property of Cryptographic Hash Functions
- Michal Rjaško
-
2010/630 ( PDF )
- Divison Polynomials for Alternate Models of Elliptic Curves
- Dustin Moody
-
2010/629 ( PDF )
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Donghoon Chang and Mridul Nandi and Moti Yung
-
2010/628 ( PDF )
- State convergence and keyspace reduction of the Mixer stream cipher
- Sui-Guan Teo and Kenneth Koon-Ho Wong and Leonie Simpson and Ed Dawson
-
2010/627 ( PS PS.GZ PDF )
- Secure and Efficient Protocols for Iris and Fingerprint Identification
- Marina Blanton and Paolo Gasti
-
2010/626 ( PDF )
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- Peng Xu and Hai Jin
-
2010/625 ( PDF )
- Attacking and fixing Helios: An analysis of ballot secrecy
- Veronique Cortier and Ben Smyth
-
2010/624 ( PDF )
- No-leak authentication by the Sherlock Holmes method
- Dima Grigoriev and Vladimir Shpilrain
-
2010/623 ( PDF )
- Cryptanalysis of Skein
- Daniel J. Bernstein and Tanja Lange
-
2010/622 ( PDF )
- A new result on the distinctness of primitive sequences over Z(pq) modulo 2
- Qunxiong Zheng and Wenfeng Qi
-
2010/621 ( PDF )
- Generic Compilers for Authenticated Key Exchange (Full Version)
- Tibor Jager and Florian Kohlar and Sven Schäge and Jörg Schwenk
-
2010/620 ( -- withdrawn -- )
- Identity-based Digital Signature Scheme Without Bilinear Pairings
- He Debiao, Chen Jianhua, Hu Jin
-
2010/619 ( PDF )
- Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
- Yang Lu
-
2010/618 ( PDF )
- A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
- Thomas Fuhr and Henri Gilbert and Jean-Ren{\'e} Reinhard and Marion Videau
-
2010/617 ( PDF )
- Computing Discrete Logarithms in an Interval
- Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai
-
2010/616 ( PDF )
- A non-uniform birthday problem with applications to discrete logarithms
- Steven D. Galbraith and Mark Holmes
-
2010/615 ( PDF )
- Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
- Steven D. Galbraith and Raminder S. Ruprai
-
2010/614 ( PDF )
- An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
- Simon Hoerder and Marcin Wojcik and Stefan Tillich and Dan Page
-
2010/613 ( PDF )
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Richard Lindner and Chris Peikert
-
2010/612 ( -- withdrawn -- )
- Cryptanalysis of Hummingbird-1
- Markku-Juhani O. Saarinen
-
2010/611 ( PDF )
- Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates
- Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
-
2010/610 ( PS PS.GZ PDF )
- Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
- Craig Gentry and Daniel Wichs
-
2010/609 ( PS PS.GZ PDF )
- The Round Complexity of General VSS
- Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
-
2010/608 ( PDF )
- A New Model of Binary Elliptic Curves with Fast Arithmetic
- Hongfeng Wu, Chunming Tang and Rongquan Feng
-
2010/607 ( PDF )
- How to Improve Rebound Attacks
- María Naya-Plasencia
-
2010/606 ( PDF )
- Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
- He Debiao,Chen Jianhua, Hu Jin
-
2010/605 ( PDF )
- A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
- Tzipora Halevi and Nitesh Saxena
-
2010/604 ( PS PS.GZ PDF )
- On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
- Shangwei Zhao,Ruyong Feng and Xiao-Shan Gao
-
2010/603 ( PDF )
- Cryptanalysis of Dual CRT-RSA
- Santanu Sarkar and Subhamoy Maitra
-
2010/602 ( PDF )
- An Improved Algebraic Attack on Hamsi-256
- Itai Dinur and Adi Shamir
-
2010/601 ( PDF )
- Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
- Lei Li and Siman Yang
-
2010/600 ( PDF )
- Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
- Anne Broadbent and Stacey Jeffery and Alain Tapp
-
2010/599 ( PS PS.GZ PDF )
- Secure Multiparty Computation with Partial Fairness
- Amos Beimel, Eran Omri, and Ilan Orlov
-
2010/598 ( PDF )
- A Broadcast Attack against NTRU Using Ding's Algorithm
- Yanbin Pan, Yingpu Deng
-
2010/597 ( PDF )
- A New Class of Bent--Negabent Boolean Functions
- Sugata Gangopadhyay and Ankita Chaturvedi
-
2010/596 ( PDF )
- Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL
- Enrico Thomae and Christopher Wolf
-
2010/595 ( PDF )
- Attribute-Based Signatures
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2010/594 ( PDF )
- Cache Games - Bringing Access Based Cache Attacks on AES to Practice
- Endre Bangerter and David Gullasch and Stephan Krenn
-
2010/593 ( PDF )
- Differential Attack on Five Rounds of the SC2000 Block Cipher
- Jiqiang Lu
-
2010/592 ( -- withdrawn -- )
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Richard Lindner and Chris Peikert
-
2010/591 ( PDF )
- Bonsai Trees, or How to Delegate a Lattice Basis
- David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert
-
2010/590 ( PDF )
- Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
- Andrey Bogdanov and Ilya Kizhvatov
-
2010/589 ( PS PS.GZ PDF )
- Higher-order differential properties of Keccak and Luffa
- Christina Boura and Anne Canteaut and Christophe De Canni\`ere
-
2010/588 ( PDF )
- Improved Collisions for Reduced ECHO-256
- Martin Schläffer
-
2010/587 ( PDF )
- Group Message Authentication
- Bartosz Przydatek and Douglas Wikstr{\"o}m
-
2010/586 ( PDF )
- Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
- İsmail San and Nuray At
-
2010/585 ( PDF )
- Smaller decoding exponents: ball-collision decoding
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2010/584 ( PDF )
- VMCrypt - Modular Software Architecture for Scalable Secure Computation
- Lior Malka and Jonathan Katz
-
2010/583 ( PDF )
- Improved Preimage Attack on One-block MD4
- Jinmin Zhong and Xuejia Lai
-
2010/582 ( PDF )
- Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
- Alexandre Berzati and C\'ecile Canovas-Dumas and Louis Goubin
-
2010/581 ( PDF )
- Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm
- Jintai Ding
-
2010/580 ( PDF )
- The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
- Piotr Mroczkowski and Janusz Szmidt
-
2010/579 ( PDF )
- Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion
- WeiGuo Zhang and GuoZhen Xiao
-
2010/578 ( PDF )
- L1 - An Intermediate Language for Mixed-Protocol Secure Computation
- Axel Schroepfer and Florian Kerschbaum and Guenter Mueller
-
2010/577 ( PDF )
- Discrete Logarithms, Diffie-Hellman, and Reductions
- Neal Koblitz and Alfred Menezes and Igor Shparlinski
-
2010/576 ( PDF )
- Efficient Hashing using the AES Instruction Set
- Joppe W. Bos and Onur Ozen and Martijn Stam
-
2010/575 ( PDF )
- A Discrete Logarithm Attack on Elliptic Curves
- Otto Johnston
-
2010/574 ( PDF )
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Julia Borghoff and Lars R. Knudsen and Gregor Leander and Soeren S. Thomsen
-
2010/573 ( PDF )
- On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$
- Yongqiang Li and Mingsheng Wang
-
2010/572 ( PDF )
- Cryptanalysis of splay tree based encryption
- Jean-Philippe Aumasson
-
2010/571 ( PDF )
- Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform
- Mohamed El Hadedy, Danilo Gligoroski and Svein J. Knapskog
-
2010/570 ( PDF )
- Breaking Grain-128 with Dynamic Cube Attacks
- Itai Dinur and Adi Shamir
-
2010/569 ( PDF )
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
- Jérémy Jean and Pierre-Alain Fouque
-
2010/568 ( PDF )
- Efficient Two-Move Blind Signatures in the Common Reference String Model
- E. Ghadafi and N.P. Smart
-
2010/567 ( PS PS.GZ PDF )
- ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS
- CLAUDE CARLET AND SIHEM MESNAGER
-
2010/566 ( PDF )
- Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles
- Yusuke Naito
-
2010/565 ( PDF )
- Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
- Joseph A. Akinyele and Christoph U. Lehmann and Matthew D. Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin
-
2010/564 ( PDF )
- Cryptographic Randomness Testing of Block Ciphers and Hash Functions
- Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
-
2010/563 ( PDF )
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Tatsuaki Okamoto and Katsuyuki Takashima
-
2010/562 ( PDF )
- How to Leak on Key Updates
- Allison Lewko and Mark Lewko and Brent Waters
-
2010/561 ( PS PS.GZ PDF )
- Password-Protected Secret Sharing
- Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu
-
2010/560 ( PDF )
- On CCA-Secure Fully Homomorphic Encryption
- J. Loftus and A. May and N.P. Smart and F. Vercauteren
-
2010/559 ( PDF )
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
- Diego F. Aranha and Jean-Luc Beuchat and J\'er\'emie Detrey and Nicolas Estibals
-
2010/558 ( PDF )
- Solving LWE problem with bounded errors in polynomial time
- Jintai Ding
-
2010/557 ( -- withdrawn -- )
- A Digital Signature Based on Multivariate Polynomials over Fq
- Masahiro Yagisawa
-
2010/556 ( PDF )
- Definitional Issues in Functional Encryption
- Adam O'Neill
-
2010/555 ( PDF )
- RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation
- S. Duquesne
-
2010/554 ( PDF )
- Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant
- Stéphane Jacob
-
2010/553 ( -- withdrawn -- )
- Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
- Yang Lu
-
2010/552 ( PDF )
- A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality
- Carmit Hazay and Yehuda Lindell
-
2010/551 ( PDF )
- A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries
- Carmit Hazay and Yehuda Lindell
-
2010/550 ( PDF )
- Isogenies and Cryptography
- RAZA ALI KAZMI
-
2010/549 ( PDF )
- A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
- Yalin Chen1, *Jue-Sam Chou2, Chi-Fong Lin3
-
2010/548 ( PDF )
- SHA-512/256
- Shay Gueron, Simon Johnson, Jesse Walker
-
2010/547 ( -- withdrawn -- )
- Symmetric-key Searchable keyword Concealment (SSC)
- Yacov Yacobi
-
2010/546 ( PS PS.GZ PDF )
- Timed Encryption and Its Application
- Shaoquan Jiang
-
2010/545 ( PDF )
- Optimal XOR based (2,n)-Visual Cryptography Schemes
- Feng Liu and Chuankun Wu
-
2010/544 ( PDF )
- Semantic Security Under Related-Key Attacks and Applications
- Benny Applebaum and Danny Harnik and Yuval Ishai
-
2010/543 ( PDF )
- Functional Encryption: Definitions and Challenges
- Dan Boneh and Amit Sahai and Brent Waters
-
2010/542 ( PS PS.GZ PDF )
- Squaring in cyclotomic subgroups
- Koray Karabina
-
2010/541 ( PDF )
- One-time Computable and Uncomputable Functions
- Stefan Dziembowski and Tomasz Kazana and Daniel Wichs
-
2010/540 ( PDF )
- Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption
- Anna Lysyanskaya and Aaron Segal
-
2010/539 ( PDF )
- Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves
- Reza R. Farashahi and Pierre-Alain Fouque and Igor E. Shparlinski and Mehdi Tibouchi and J. Felipe Voloch
-
2010/538 ( PDF )
- Rotational Rebound Attacks on Reduced Skein
- Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger
-
2010/537 ( PDF )
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
- Yongzhuang Wei and Jiqiang Lu and Yupu Hu
-
2010/536 ( PDF )
- On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
- Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont
-
2010/535 ( PDF )
- Linear Analysis of Reduced-Round CubeHash
- Tomer Ashur and Orr Dunkelman
-
2010/534 ( PDF )
- Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity
- Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu
-
2010/533 ( -- withdrawn -- )
- Deterministic Public-Key Encryption Revisited
- Adam O'Neill
-
2010/532 ( PDF )
- A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
- Andrey Bogdanov and Christian Rechberger
-
2010/531 ( PDF )
- Comparison of seven SHA-3 candidates software implementations on smart cards.
- Mourad Gouicem
-
2010/530 ( PDF )
- How to Read a Signature?
- Vanessa Gratzer and David Naccache
-
2010/529 ( PDF )
- Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields
- Kristin Lauter and Ning Shang
-
2010/528 ( PDF )
- Constant-Round Private Function Evaluation with Linear Complexity
- Jonathan Katz and Lior Malka
-
2010/527 ( PDF )
- The Digital Signature Scheme MQQ-SIG
- Danilo Gligoroski and Rune Steinsmo \O deg\aa rd and Rune Erlend Jensen and Ludovic Perret and Jean-Charles Faug\`{e}re and Svein Johan Knapskog and Smile Markovski
-
2010/526 ( PDF )
- Faster Explicit Formulas for Computing Pairings over Ordinary Curves
- Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio López
-
2010/525 ( PS PS.GZ PDF )
- Torus-based compression by factor 4 and 6
- Koray Karabina
-
2010/524 ( PDF )
- Combining properties of cryptographic hash functions
- Michal Rjaško
-
2010/523 ( PDF )
- Affine Masking against Higher-Order Side Channel Analysis
- Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain
-
2010/522 ( PDF )
- Signatures Resilient to Continual Leakage on Memory and Computation
- Tal Malkin and Isamu Teranishiy and Yevgeniy Vahlis and Moti Yung
-
2010/521 ( PDF )
- Linear Approximations of Addition Modulo $2^n$-1
- Xiutao Feng and Chunfang Zhou and Chuankun Wu
-
2010/520 ( PDF )
- Implementing Gentry's Fully-Homomorphic Encryption Scheme
- Craig Gentry and Shai Halevi
-
2010/519 ( PDF )
- Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
- Matthias Krause and Frederik Armknecht and Ewan Fleischmann
-
2010/518 ( PDF )
- Boolean functions with all main cryptographic properties
- Ziran Tu and Yingpu Deng
-
2010/517 ( PDF )
- Cryptanalysis of block EnRUPT
- Elias Yarrkov
-
2010/516 ( PDF )
- Key Agreement Protocols Based on Multivariate Polynomials over Fq
- Masahiro Yagisawa
-
2010/515 ( -- withdrawn -- )
-
-
-
2010/514 ( PDF )
- Semi-Homomorphic Encryption and Multiparty Computation
- Rikke Bendlin and Ivan Damgård and Claudio Orlandi and Sarah Zakarias
-
2010/513 ( PDF )
- Key-Dependent Message Security: Generic Amplification and Completeness
- Benny Applebaum
-
2010/512 ( PDF )
- Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
- Jung Hee Cheon and Stanislaw Jarecki and Jae Hong Seo
-
2010/511 ( PDF )
- On the complexity of Decomposition Attack
- Koh-ichi Nagao
-
2010/509 ( PDF )
- On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
- Maria Dubovitskaya and Alessandra Scafuro and Ivan Visconti
-
2010/508 ( PDF )
- A Fault Analytic Method against HB+
- Jose Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento
-
2010/507 ( PS PS.GZ PDF )
- On isotopisms of commutative presemifields and CCZ-equivalence of functions
- Lilya Budaghyan and Tor Helleseth
-
2010/506 ( PDF )
- Quantum Preimage and Collision Attacks on CubeHash
- Gaëtan Leurent
-
2010/505 ( PS PS.GZ PDF )
- Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
- Dominique Unruh
-
2010/504 ( PDF )
- Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
- Charles Bouillaguet and Jean-Charles Faugère and Pierre-Alain Fouque and Ludovic Perret
-
2010/503 ( PDF )
- BiTR: Built-in Tamper Resilience
- Seung Geol Choi and Aggelos Kiayias and Tal Malkin
-
2010/502 ( PDF )
- Proving Coercion-Resistance of Scantegrity II
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2010/501 ( PDF )
- Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
- Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter
-
2010/500 ( PS PS.GZ )
- ATTACKS ON THE AKACP PROTOCOL
- Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu-Varsakelis and Spyros T. Halkidis and George Stephanides
-
2010/499 ( PDF )
- Secure Computations on Non-Integer Values
- M. Franz and B. Deiseroth and K. Hamacher and S. Jha and S. Katzenbeisser and H. Schroeder
-
2010/498 ( PDF )
- Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields
- Vladislav Kovtun, Sergey Kavun
-
2010/497 ( -- withdrawn -- )
- Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
- Tao Shi and Dongdai Lin
-
2010/496 ( PDF )
- Efficient Attributes for Anonymous Credentials (Extended Version)
- Jan Camenisch and Thomas Gro{\ss}
-
2010/495 ( PDF )
- A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
- Mahabir Prasad Jhanwar
-
2010/494 ( PS PS.GZ PDF )
- Stronger Security Model of Group Key Agreement
- Jianjie Zhao, Dawu Gu and M. Choudary Gorantla
-
2010/493 ( -- withdrawn -- )
- A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
- S.Sharmila Deva Selvi and S.Sree Vivek and C. Pandu Rangan
-
2010/492 ( PDF )
- Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae
- Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
-
2010/491 ( PDF )
- A Collaborative Framework for Privacy Protection in Online Social Networks
- Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail-Joon Ahn
-
2010/490 ( PDF )
- Strong designated verifier signature scheme: new definition and construction
- Zuhua Shao
-
2010/489 ( PDF )
- Loiss: A Byte-Oriented Stream Cipher
- Dengguo Feng and Xiutao Feng and Wentao Zhang and Xiubin Fan and Chuankun Wu
-
2010/488 ( PDF )
- Fully Leakage-Resilient Signatures
- Elette Boyle and Gil Segev and Daniel Wichs
-
2010/487 ( PDF )
- Constant Round Non-Malleable Protocols using One Way Functions
- Vipul Goyal
-
2010/486 ( PDF )
- A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS
- Claude Carlet and Sihem Mesnager
-
2010/485 ( PDF )
- Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
- Hamid Mala and Mohammad Dakhilalian and Mohsen Shakiba
-
2010/484 ( PDF )
- Automata Evaluation and Text Search Protocols with Simulation Based Security
- Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen
-
2010/483 ( PDF )
- Constant-round Non-Malleable Commitments from Any One-Way Function
- Huijia Lin, Rafael Pass
-
2010/482 ( -- withdrawn -- )
- On Instantiation of the Random Oracle
- He Ge
-
2010/481 ( PDF )
- A secure email login system using virtual password
- Bhavin Tanti, Nishant doshi
-
2010/480 ( PDF )
- Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
- Shigeo Tsujii and Masahito Gotaishi
-
2010/479 ( PDF )
- Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
- R.M. Avanzi and S. Hoerder and D. Page and M. Tunstall
-
2010/478 ( PDF )
- Cryptanalysis of the Convex Hull Click Human Identification Protocol
- Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang
-
2010/477 ( PDF )
- On Compression of Data Encrypted with Block Ciphers
- Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and and Tal Rabin
-
2010/476 ( PDF )
- Predicate Encryption with Partial Public Keys
- Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano
-
2010/475 ( PDF )
- Pairing Computation on Elliptic Curves of Jacobi Quartic Form
- Hong Wang and Kunpeng Wang and Lijun Zhang and Bao Li
-
2010/474 ( PDF )
- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
- Sarah Meiklejohn and Hovav Shacham and David Mandell Freeman
-
2010/473 ( -- withdrawn -- )
- Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
- Hui Zhang and Chunxiang Xu and Abdur Rashid Sangi
-
2010/472 ( PDF )
- Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought
- A. Simone and B. Skoric
-
2010/471 ( -- withdrawn -- )
- Privacy-preserving Sharing of Sensitive Information
- Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik
-
2010/470 ( PDF )
- Two identification protocols based on Cayley graphs of Coxeter groups
- Feli\'u Sagols and Guillermo Morales-Luna
-
2010/469 ( PDF )
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
- Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
-
2010/468 ( PS PS.GZ PDF )
- Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
- Goichiro Hanaoka and Jian Weng
-
2010/467 ( PDF )
- Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
- Xinfeng Lei and Rui Xue and Ting Yu
-
2010/466 ( PDF )
- PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
- Benwen Zhu and Bo Zhu and Kui Ren
-
2010/465 ( PDF )
- How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
- Falko Strenzke
-
2010/464 ( -- withdrawn -- )
- Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
- Q. Pu
-
2010/463 ( PDF )
- Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
- Mohammad Reza Sohizadeh Abyaneh
-
2010/462 ( PDF )
- Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
- Zhifang Zhang
-
2010/461 ( PDF )
- Identity Based Partial Aggregate Signature Scheme Without Pairing
- S. Sharmila Deva Selvi and S. Sree Vivek and J.Shriram and C. Pandu Rangan
-
2010/460 ( -- withdrawn -- )
- On extended algebraic immunity
- Gaofei Wu and Yuqing Zhang and Weiguo Zhang
-
2010/459 ( PDF )
- CCA2 Secure Certificateless Encryption Schemes Based on RSA
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2010/458 ( PDF )
- Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
- Masahiro Yagisawa
-
2010/457 ( PDF )
- Improving the performance of Luffa Hash Algorithm
- Thomaz Oliveira and Julio López
-
2010/456 ( PS PS.GZ PDF )
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam Smith
-
2010/455 ( PDF )
- Optimal Verification of Operations on Dynamic Sets
- Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
-
2010/454 ( PDF )
- Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
- Jesse Walker and Jiangtao Li
-
2010/453 ( PDF )
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
- Dan Boneh and David Mandell Freeman
-
2010/452 ( PDF )
- Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
- Feng Hao and Matthew Nicolas Kreeger
-
2010/451 ( PS PS.GZ PDF )
- Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
- Subidh Ali and Debdeep Mukhopadhyay
-
2010/450 ( PDF )
- Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
- Kaoru Kurosawa
-
2010/449 ( PDF )
- Oblivious and Fair Server-Aided Two-Party Computation
- Amir Herzberg and Haya Shulman
-
2010/448 ( PDF )
- Sequential Rationality in Cryptographic Protocols
- Ronen Gradwohl and Noam Livne and Alon Rosen
-
2010/447 ( PDF )
- Side-channel Analysis of Six SHA-3 Candidates
- Olivier Benoit and Thomas Peyrin
-
2010/446 ( PDF )
- Short One-Time Signatures
- G.M. Zaverucha and D.R. Stinson
-
2010/445 ( PDF )
- Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
- Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj
-
2010/444 ( PDF )
- New Construction of Identity-based Proxy Re-encryption
- Song Luo and Jianbin Hu and Zhong Chen
-
2010/443 ( PS PS.GZ PDF )
- Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
- Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu
-
2010/442 ( PDF )
- Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
- Dan Boneh and Hart Montgomery and Ananth Raghunathan
-
2010/441 ( PDF )
- Provably Secure Higher-Order Masking of AES
- Matthieu Rivain and Emmanuel Prouff
-
2010/440 ( PDF )
- Piret and Quisquater's DFA on AES Revisited
- Christophe Giraud and Adrian Thillard
-
2010/439 ( PDF )
- Embedded Extended Visual Cryptography Schemes
- Feng Liu and Chuankun Wu
-
2010/438 ( PDF )
- Achieving Leakage Resilience Through Dual System Encryption
- Allison Lewko and Yannis Rouselakis and Brent Waters
-
2010/437 ( PDF )
- Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
- Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
-
2010/436 ( PDF )
- Arithmetic of Supersingular Koblitz Curves in Characteristic Three
- Roberto Avanzi and Clemens Heuberger and Helmut Prodinger
-
2010/435 ( PDF )
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- Cihangir Tezcan
-
2010/434 ( PDF )
- Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
- Takanori Isobe and Taizo Shirai
-
2010/433 ( PS PS.GZ PDF )
- The PASSERINE Public Key Encryption and Authentication Mechanism
- Markku-Juhani O. Saarinen
-
2010/432 ( PDF )
- AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
- K. Atighehchi and A. Enache and T. Muntean and G. Risterucci
-
2010/431 ( PDF )
- Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
- Jing Liu and Bo Yang
-
2010/430 ( PDF )
- Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
- Vlastimil Klima and Danilo Gligoroski
-
2010/429 ( PS PS.GZ PDF )
- A Family of Implementation-Friendly BN Elliptic Curves
- Geovandro C. C. F. Pereira and Marcos A. Simplício Jr and Michael Naehrig and Paulo S. L. M. Barreto
-
2010/428 ( PDF )
- Random Oracles in a Quantum World
- Dan Boneh and Ozgur Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry
-
2010/427 ( -- withdrawn -- )
- Security Improvement on a Password-Authenticated Group Key Exchange Protocol
- Junghyun Nam
-
2010/426 ( PDF )
- Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
- Huihui Yap and Khoongming Khoo and Axel Poschmann
-
2010/425 ( PDF )
- KIST: A new encryption algorithm based on splay
- R. Wei and Z. Zeng
-
2010/424 ( PS PS.GZ PDF )
- CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
- Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
-
2010/423 ( PDF )
- Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
- LI Yun-qiang and Wang Ai-lan
-
2010/422 ( PDF )
- Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
- Jae Hyun Ahn and Matthew Green and Susan Hohenberger
-
2010/421 ( PDF )
- Binomial Sieve Series -- a Prospective Cryptographic Tool
- Gideon Samid
-
2010/420 ( PS PS.GZ PDF )
- Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
- Stanislav Bulygin and Albrecht Petzoldt and Johannes Buchmann
-
2010/419 ( PDF )
- White-Box Cryptography and SPN ciphers. LRC method.
- Dmitry Schelkunov
-
2010/418 ( PDF )
- Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
- *Jue-Sam Chou 1, hsien-ching Chen 2, Chun-Yun Chen 3
-
2010/417 ( PDF )
- Distinguishing Properties of Higher Order Derivatives of Boolean Functions
- Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu
-
2010/416 ( PDF )
- Computationally Sound Verification of Source Code
- Michael Backes and Matteo Maffei and Dominique Unruh
-
2010/415 ( PS PS.GZ PDF )
- Perfectly Balanced Boolean Functions and Goli\'c Conjecture
- Stanislav Smyshlyaev
-
2010/414 ( PDF )
- On Strong Simulation and Composable Point Obfuscation
- Nir Bitansky and Ran Canetti
-
2010/413 ( PDF )
- Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
- E.A.Grechnikov
-
2010/412 ( PDF )
- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
- Margus Niitsoo
-
2010/411 ( PDF )
- Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.
- Vivien Dubois and Jean-Gabriel Kammerer
-
2010/410 ( PDF )
- Wild McEliece
- Daniel J. Bernstein and Tanja Lange and Christiane Peters
-
2010/409 ( PDF )
- The collision security of Tandem-DM in the ideal cipher model
- Jooyoung Lee and Martijn Stam and John Steinberger
-
2010/408 ( PDF )
- Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
- Jean-François Gallais and Ilya Kizhvatov and Michael Tunstall
-
2010/407 ( PDF )
- Flaws in Differential Cryptanalysis of Reduced Round PRESENT
- Manoj Kumar and Pratibha Yadav and Meena Kumari
-
2010/406 ( PDF )
- Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
- Julien Francq and Céline Thuillet
-
2010/405 ( PS PS.GZ PDF )
- Privacy-Preserving RFID Systems: Model and Constructions
- S\'ebastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault
-
2010/404 ( PDF )
- On the Insecurity of Parallel Repetition for Leakage Resilience
- Allison Lewko and Brent Waters
-
2010/403 ( -- withdrawn -- )
- Linear Secret Sharing for Hierarchical Access Structures
- Ali Aydın Selçuk and Ramazan Yılmaz
-
2010/402 ( PDF )
- On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
- Mohammad Reza Sohizadeh Abyaneh
-
2010/401 ( PDF )
- Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
- Jan Camenisch and Thomas Groß and Peter Hladky and Christian Hoertnagl
-
2010/400 ( PDF )
- Security Analysis of a Threshold Proxy Signature Scheme
- Kitae Kim and Dahun Nyang
-
2010/399 ( PS PS.GZ PDF )
- Faster Computation of Self-pairings
- Chang-An Zhao, Fangguo Zhang and Dongqing Xie
-
2010/398 ( PDF )
- Distinguisher for Shabal's Permutation Function
- Peter Novotney
-
2010/397 ( PDF )
- Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
- Mihir Bellare and David Cash
-
2010/396 ( PS PS.GZ PDF )
- From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
- Noémie Floissac and Yann L'Hyver
-
2010/395 ( PDF )
- On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
- Zhibin Zhou and Dijiang Huang
-
2010/394 ( PDF )
- Horizontal Correlation Analysis on Exponentiation
- Christophe Clavier and Benoit Feix and Georges Gagnerot and Mylene Roussellet and Vincent Verneuil
-
2010/393 ( PDF )
- A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
- Jue-Sam Chou 1*, Yalin Chen 2, Chun-Hui Huang 3
-
2010/392 ( PS PS.GZ PDF )
- Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
- Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
-
2010/391 ( PDF )
- Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
- Daniel Z. Zanger
-
2010/390 ( PDF )
- Elliptic curves in Huff's model
- Hongfeng Wu and Rongquan Feng
-
2010/389 ( PDF )
- The impossibility of computationally sound XOR
- Dominique Unruh
-
2010/388 ( PDF )
- On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
- Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes
-
2010/387 ( PDF )
- A Combinatorial Analysis of HC-128
- Goutam Paul and Subhamoy Maitra and Shashwat Raizada
-
2010/386 ( PDF )
- BoostReduce - A Framework For Strong Lattice Basis Reduction
- Werner Backes and Susanne Wetzel
-
2010/385 ( PDF )
- First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
- Emmanuel Prouff and Robert McEvoy
-
2010/384 ( PDF )
- Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
- Danilo Gligoroski and Vlastimil Klima
-
2010/383 ( PDF )
- Huff's Model for Elliptic Curves
- Marc Joye and Mehdi Tibouchi and Damien Vergnaud
-
2010/382 ( PDF )
- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
- Pierre-Alain Fouque and Mehdi Tibouchi
-
2010/381 ( PDF )
- Security Reductions of the Second Round SHA-3 Candidates
- Elena Andreeva and Bart Mennink and Bart Preneel
-
2010/380 ( PDF )
- Analysis of an internet voting protocol
- Kristian Gjøsteen
-
2010/379 ( PDF )
- Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
- Sorina Ionica and Antoine Joux
-
2010/378 ( PDF )
- Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
- Jin Wang
-
2010/377 ( PDF )
- Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
- Masahiro Yagisawa
-
2010/376 ( PS PS.GZ PDF )
- Identity Based Online/Offline Signcryption Scheme
- S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
-
2010/375 ( PDF )
- Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function
- Kota Ideguchi and Elmar Tischhauser and Bart Preneel
-
2010/374 ( PDF )
- On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption
- Zhen Liu and Zhenfu Cao
-
2010/373 ( PDF )
- Hashing into Hessian Curves
- Reza Rezaeian Farashahi
-
2010/372 ( PS PS.GZ PDF )
- Decoding square-free Goppa codes over $\F_p$
- Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki
-
2010/371 ( PDF )
- Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
- Nicolas Estibals
-
2010/370 ( PDF )
- Finding discrete logarithms with a set orbit distinguisher
- Robert P. Gallant
-
2010/369 ( PDF )
- Double Ciphertext Mode : A Proposal for Secure Backup
- Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez
-
2010/368 ( PDF )
- Round-Optimal Password-Based Authenticated Key Exchange
- Jonathan Katz and Vinod Vaikuntanathan
-
2010/367 ( PDF )
- Starfish on Strike
- Daniel J. Bernstein and Peter Birkner and Tanja Lange
-
2010/366 ( PDF )
- Oblivious RAM Revisited
- Benny Pinkas and Tzachy Reinman
-
2010/365 ( PDF )
- TASTY: Tool for Automating Secure Two-partY computations
- Wilko Henecka and Stefan Kögl and Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
-
2010/364 ( PDF )
- A Compact FPGA Implementation of the SHA-3 Candidate ECHO
- Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
-
2010/363 ( PDF )
- An Analysis of Affine Coordinates for Pairing Computation
- Kristin Lauter and Peter L. Montgomery and Michael Naehrig
-
2010/362 ( PS PS.GZ PDF )
- Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
- Deng Tang and Weiguo Zhang and Xiaohu Tang
-
2010/361 ( PDF )
- On the Use of Financial Data as a Random Beacon
- Jeremy Clark and Urs Hengartner
-
2010/360 ( PS PS.GZ PDF )
- On the Security of Identity Based Threshold Unsigncryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and S.Priti and C.Pandu Rangan
-
2010/359 ( PDF )
- Identity Based Self Delegated Signature - Self Proxy Signatures
- S.Sharmila Deva Selvi and S.Sree Vivek and S.Gopinath and C.Pandu Rangan
-
2010/358 ( PDF )
- The Fiat--Shamir Transform for Group and Ring Signature Schemes
- M.-F. Lee, N.P. Smart and B. Warinschi
-
2010/357 ( -- withdrawn -- )
- CCA-Secure PRE Scheme without Public Verifiability
- Jun Shao and Peng liu and Jian Weng
-
2010/356 ( PS PS.GZ PDF )
- Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
- Pinaki Sarkar and Amrita Saha and Morshed Udan Chowdhury
-
2010/355 ( PDF )
- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
- Bozhan Su and Wenling Wu and Shuang Wu and Le Dong
-
2010/354 ( PDF )
- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
- Jean-Luc Beuchat and Jorge Enrique González Díaz and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodríguez-Henríquez and Tadanori Teruya
-
2010/353 ( PDF )
- Cryptographic Pairings Based on Elliptic Nets
- Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto
-
2010/352 ( PDF )
- A Digital Signature Using Multivariate Functions on Quaternion Ring
- Masahiro Yagisawa
-
2010/351 ( PDF )
- Decentralizing Attribute-Based Encryption
- Allison Lewko and Brent Waters
-
2010/350 ( PS PS.GZ PDF )
- A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
- Vladimir Kolesnikov
-
2010/349 ( PS PS.GZ PDF )
- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
- Kenneth Koon-Ho Wong and Gregory V. Bard
-
2010/348 ( PDF )
- Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
- A. N. Alekseychuk
-
2010/347 ( PDF )
- Time-Specific Encryption
- Kenneth G. Paterson and Elizabeth A. Quaglia
-
2010/346 ( PDF )
- Efficient Generalized Signcryption Schemes
- Prashant Kushwah and Sunder Lal
-
2010/345 ( PDF )
- Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
- Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta
-
2010/344 ( PDF )
- Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
- Ezekiel J Kachisa
-
2010/343 ( PS PS.GZ PDF )
- Identity Based Public Verifiable Signcryption Scheme
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2010/342 ( PDF )
- Fixed Argument Pairings
- Craig Costello and Douglas Stebila
-
2010/341 ( PDF )
- A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
- Masao Kasahara
-
2010/340 ( PDF )
- A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
- Jayaprakash Kar and Banshidhar Majhi
-
2010/339 ( PDF )
- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
- Jose Bacelar Almeida and Endre Bangerter and Manuel Barbosa and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
-
2010/338 ( PDF )
- Efficient SIMD arithmetic modulo a Mersenne number
- Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
-
2010/337 ( PDF )
- Practical-Titled Attack on AES-128 Using Chosen-Text Relations
- Vincent Rijmen
-
2010/336 ( PS PS.GZ PDF )
- Efficient Differential Fault Analysis for AES
- Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
-
2010/335 ( PDF )
- Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
- Patrick Longa, and Catherine Gebotys
-
2010/334 ( PDF )
- Security Proof of AugPAKE
- SeongHan Shin and Kazukuni Kobara and Hideki Imai
-
2010/333 ( -- withdrawn -- )
- Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
- Zhengjun Cao
-
2010/332 ( PDF )
- Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
- Aurelien Francillon and Boris Danev and Srdjan Capkun
-
2010/331 ( PDF )
- A Distinguisher for High Rate McEliece Cryptosystems
- Jean-Charles Faug\`ere and Val\'erie Gauthier and Ayoub Otmani and Ludovic Perret and Jean-Pierre Tillich
-
2010/330 ( PS PS.GZ PDF )
- Distributed Rational Consensus
- Amjed Shareef
-
2010/329 ( PDF )
- On the Security of Pseudorandomized Information-Theoretically Secure Schemes
- Koji Nuida and Goichiro Hanaoka
-
2010/328 ( PDF )
- Signatures for Multi-source Network Coding
- László Czap and István Vajda
-
2010/327 ( PDF )
- Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
- Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
-
2010/326 ( PDF )
- Privacy-Preserving Multi-Objective Evolutionary Algorithms
- Daniel Funke and Florian Kerschbaum
-
2010/325 ( PDF )
- Effect of the Dependent Paths in Linear Hull
- Zhenli Dai and Meiqin Wang and Yue Sun
-
2010/324 ( PDF )
- Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
- Abdel Alim Kamal and Amr M. Youssef
-
2010/323 ( PDF )
- Security Analysis of SIMD
- Charles Bouillaguet and Pierre-Alain Fouque and Gaëtan Leurent
-
2010/322 ( PDF )
- Improved Single-Key Attacks on 8-round AES
- Orr Dunkelman and Nathan Keller and Adi Shamir
-
2010/321 ( PDF )
- Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
- Martin Schläffer
-
2010/320 ( -- withdrawn -- )
- On isotopisms of commutative presemifields and CCZ-equivalence of functions
- Lilya Budaghyan and Tor Helleseth
-
2010/319 ( PS PS.GZ PDF )
- On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
- Jian Weng and Yunlei Zhao
-
2010/318 ( PS PS.GZ PDF )
- Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
- Ivan Damgård and Claudio Orlandi
-
2010/317 ( PDF )
- A Note On Gottesman-Chuang Quantum Signature Scheme
- Zhengjun Cao
-
2010/316 ( PDF )
- A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
- Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang
-
2010/315 ( PDF )
- Efficient Techniques for High-Speed Elliptic Curve Cryptography
- Patrick Longa and Catherine Gebotys
-
2010/314 ( PDF )
- Weaknesses of a dynamic ID-based remote user authentication scheme
- He Debiao, Chen Jianhua, Hu Jin
-
2010/313 ( PS PS.GZ PDF )
- Fast Exhaustive Search for Polynomial Systems in $F_2$
- Charles Bouillaguet and Chen-Mou Cheng and Tony (Tung) Chou and Ruben Niederhagen and Adi Shamir and Bo-Yin Yang
-
2010/312 ( PDF )
- Security weakness of two authenticated key exchange protocols from pairings
- Qingfeng Cheng and Chuangui Ma
-
2010/311 ( PDF )
- Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
- J.C. Bajard and S. Duquesne and M. Ercegovac
-
2010/310 ( PDF )
- The analytical property for $\zeta(s)$
- Sheng-Ping Wu
-
2010/309 ( PDF )
- Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
- Raveen R. Goundar and Marc Joye and Atsuko Miyaji
-
2010/308 ( PDF )
- Attacking M&M Collective Signature Scheme
- Michal Rjaško and Martin Stanek
-
2010/307 ( PDF )
- Impossible Differential Cryptanalysis of SPN Ciphers
- Ruilin Li and Bing Sun and Chao Li
-
2010/306 ( PDF )
- On security of a remote user authentication scheme without using smart cards
- He Debiao, Chen Jianhua, Hu Jin
-
2010/305 ( PDF )
- On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
- Marten van Dijk and Ari Juels
-
2010/304 ( PDF )
- Cryptanalysis of the Compression Function of SIMD
- Hongbo Yu and Xiaoyun Wang
-
2010/303 ( PDF )
- Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
- Ran Canetti and Sebastian Gajek
-
2010/302 ( PDF )
- Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
- Frederik Armknecht and Carsten Elsner and Martin Schmidt
-
2010/301 ( PDF )
- On generalized Feistel networks
- Viet Tung Hoang and Phillip Rogaway
-
2010/300 ( PS PS.GZ PDF )
- Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
- Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai
-
2010/299 ( PDF )
- Faster Fully Homomorphic Encryption
- Damien Stehle and Ron Steinfeld
-
2010/298 ( PDF )
- On the Indifferentiability of the Gr{\o}stl Hash Function
- Elena Andreeva, Bart Mennink and Bart Preneel
-
2010/297 ( PDF )
- Correlation-Enhanced Power Analysis Collision Attack
- Amir Moradi and Oliver Mischke and Thomas Eisenbarth
-
2010/296 ( PDF )
- Hash-based Multivariate Public Key Cryptosystems
- WANG Hou-Zhen and ZHANG Huan-Guo
-
2010/295 ( PDF )
- Ideal Key Derivation and Encryption in Simulation-based Security
- Ralf Kuesters and Max Tuengerthal
-
2010/294 ( PDF )
- Computing genus 2 curves from invariants on the Hilbert moduli space
- Kristin Lauter and Tonghai Yang
-
2010/293 ( PDF )
- Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
- Jacques Patarin
-
2010/292 ( PDF )
- A Low-Area yet Performant FPGA Implementation of Shabal
- Jérémie Detrey and Pierrick Gaudry and Karim Khalfallah
-
2010/291 ( PDF )
- Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
- He Debiao, Chen Jianhua, Hu Jin
-
2010/290 ( PDF )
- Intractable Problems in Cryptography
- Neal Koblitz and Alfred Menezes
-
2010/289 ( PDF )
- A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
- Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento
-
2010/288 ( PDF )
- Lattice-based Identity-Based Broadcast Encryption Scheme
- Jin Wang and Jingguo Bi
-
2010/287 ( PDF )
- Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
- Jacques Patarin
-
2010/286 ( PDF )
- On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
- Sugata Gangopadhyay, Brajesh Kumar Singh
-
2010/285 ( PDF )
- A SAT-based preimage analysis of reduced KECCAK hash functions
- Pawel Morawiecki and Marian Srebrny
-
2010/284 ( PDF )
- Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
- Yehuda Lindell and Benny Pinkas
-
2010/283 ( PDF )
- Recursive Information Hiding in Visual Cryptography
- Sandeep Katta
-
2010/282 ( PDF )
- Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
- Kerry A. McKay and Poorvi L. Vora
-
2010/281 ( PDF )
- Protocols for Reliable and Secure Message Transmission
- Ashish Choudhury
-
2010/280 ( PDF )
- Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
- Arpita Patra
-
2010/279 ( PDF )
- On the Round Complexity of Covert Computation
- Vipul Goyal and Abhishek Jain
-
2010/278 ( PDF )
- Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
- Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan
-
2010/277 ( -- withdrawn -- )
- Adaptively Secure Broadcast Encryption with Short Ciphertexts
- Behzad Malek and Ali Miri
-
2010/276 ( PDF )
- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
- Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2010/275 ( PDF )
- Position-Based Quantum Cryptography: Impossibility and Constructions
- Harry Buhrman, Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky and Christian Schaffner
-
2010/274 ( PDF )
- Online/Offline Identity-Based Signcryption Revisited
- Joseph K. Liu, Joonsang Baek and Jianying Zhou
-
2010/273 ( PDF )
- Symmetric States and their Structure: Improved Analysis of CubeHash
- Niels Ferguson and Stefan Lucks and Kerry A. McKay
-
2010/272 ( PDF )
- Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
- Zhimin Chen and Patrick Schaumont
-
2010/271 ( PDF )
- Selecting Parameters for Secure McEliece-based Cryptosystems
- Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, and Johannes Buchmann
-
2010/270 ( PDF )
- Factorization of RSA-180
- S.A. Danilov and I.A. Popovyan
-
2010/269 ( PDF )
- LAB Form for Iterated Hash Functions
- Xigen Yao
-
2010/268 ( PDF )
- Key-Controlled Order-Preserving Encryption
- HU Mengke; GAO Juntao
-
2010/267 ( PDF )
- Two improved authenticated multiple key exchange protocols
- Feng LIU
-
2010/266 ( PDF )
- Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
- Chao Ning and Qiuliang Xu
-
2010/265 ( PS PS.GZ PDF )
- CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
- Jian Weng and Minrong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao
-
2010/264 ( PDF )
- Cryptographic Extraction and Key Derivation: The HKDF Scheme
- Hugo Krawczyk
-
2010/263 ( -- withdrawn -- )
- Lattice Reduction and Polynomial Solving
- Raphaël Marinier
-
2010/262 ( PS PS.GZ PDF )
- Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
- Alan Kaminsky
-
2010/261 ( PDF )
- Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
- Céline Blondeau and Benoît Gérard
-
2010/260 ( PDF )
- On FPGA-based implementations of Gr\{o}stl
- Bernhard Jungk and Steffen Reith
-
2010/259 ( PS PS.GZ PDF )
- Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
- Andrey V. Pavlov
-
2010/258 ( PDF )
- On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
- Ruchi Gode and Sugata Gangopadhyay
-
2010/257 ( PDF )
- Feasible Attack on the 13-round AES-256
- Alex Biryukov and Dmitry Khovratovich
-
2010/256 ( -- withdrawn -- )
- On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
- Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
-
2010/255 ( PS PS.GZ PDF )
- Automorphism group of the set of all bent functions
- Natalia Tokareva
-
2010/254 ( PDF )
- Cryptanalysis of XXTEA
- Elias Yarrkov
-
2010/253 ( PDF )
- Separable Hash Functions
- Sarang Aravamuthan
-
2010/252 ( PDF )
- A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
- Zhengping Jin and Qiaoyan Wen and Hua Zhang
-
2010/251 ( PDF )
- Modeling Attacks on Physical Unclonable Functions
- Ulrich Rührmair and Frank Sehnke and Jan Sölter and Gideon Dror and Srinivas Devadas and Jürgen Schmidhuber
-
2010/250 ( PS PS.GZ PDF )
- Collusion Free Protocol for Rational Secret Sharing
- Amjed Shareef
-
2010/249 ( PS PS.GZ PDF )
- Rational Secret Sharing without Broadcast
- Amjed Shareef
-
2010/248 ( PDF )
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Alex Biryukov and Ivica Nikoli\'c
-
2010/247 ( PDF )
- A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
- Jia XU
-
2010/246 ( PDF )
- Quantifying Trust
- Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
-
2010/245 ( PDF )
- Towards a Theory of Trust Based Collaborative Search
- Yacov Yacobi
-
2010/244 ( PDF )
- Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
- Jia XU
-
2010/243 ( PDF )
- Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
- Senshan Pan and Xiaotong Fu and Weiguo Zhang
-
2010/242 ( PDF )
- Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
- Yang ZHANG and Jun-Liang CHEN
-
2010/241 ( PDF )
- Improved Delegation of Computation using Fully Homomorphic Encryption
- Kai-Min Chung and Yael Kalai and Salil Vadhan
-
2010/240 ( PDF )
- Weaknesses of a dynamic ID-based remote user authentication scheme
- He Debiao, Chen Jianhua, Hu Jin
-
2010/239 ( PDF )
- One-round and authenticated three-party multiple key exchange protocol from parings
- Feng LIU
-
2010/238 ( PS PS.GZ PDF )
- Collusion Free Protocol for Correlated Element Selection Problem
- Amjed Shareef and Akshay Agrawal and C. Pandu Rangan
-
2010/237 ( PS PS.GZ PDF )
- A New Security Model for Authenticated Key Agreement
- Augustin P. Sarr and Philippe Elbaz–Vincent and Jean–Claude Bajard
-
2010/236 ( PDF )
- Accountability: Definition and Relationship to Verifiability
- Ralf Kuesters and Tomasz Truderung and Andreas Vogt
-
2010/235 ( PDF )
- Attribute-based group key establishment
- Rainer Steinwandt and Adriana Suárez Corona
-
2010/234 ( PDF )
- Efficient provable data possession for hybrid clouds
- Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
-
2010/233 ( PDF )
- Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
- Georg Fuchsbauer
-
2010/232 ( PDF )
- On Representable Matroids and Ideal Secret Sharing
- Ching-Fang Hsu and Qi Cheng
-
2010/231 ( PS PS.GZ PDF )
- Throughput-Optimal Routing in Unreliable Networks
- Paul Bunn and Rafail Ostrovsky
-
2010/230 ( PDF )
- A calculus for game-based security proofs
- David Nowak and Yu Zhang
-
2010/229 ( PDF )
- Concurrent composition in the bounded quantum storage model
- Dominique Unruh
-
2010/228 ( PDF )
- Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
- Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis
-
2010/227 ( PS PS.GZ PDF )
- A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
- Neal Koblitz
-
2010/226 ( PDF )
- Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
- Zvika Brakerski and Shafi Goldwasser
-
2010/225 ( PDF )
- A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
- Junghyun Nam
-
2010/224 ( PS PS.GZ PDF )
- Efficient Implementation of the Orlandi Protocol Extended Version
- Thomas P. Jakobsen and Marc X. Makkes and Janus Dam Nielsen
-
2010/223 ( PDF )
- Improved Differential Attacks for ECHO and Grostl
- Thomas Peyrin
-
2010/222 ( PS PS.GZ PDF )
- Some Observations on Indifferentiability
- Ewan Fleischmann and Michael Gorski and Stefan Lucks
-
2010/221 ( PDF )
- Solving Generalized Small Inverse Problems
- Noboru Kunihiro
-
2010/220 ( PS PS.GZ PDF )
- (If) Size Matters: Size-Hiding Private Set Intersection
- Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik
-
2010/219 ( PDF )
- Tracker: Security and Privacy for RFID-based Supply Chains
- Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
-
2010/218 ( -- withdrawn -- )
- New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
- Zhen Wang and Shuqin Fan
-
2010/217 ( PDF )
- Secure Code Update for Embedded Devices via Proofs of Secure Erasure
- Daniele Perito and Gene Tsudik
-
2010/216 ( PDF )
- Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
- Zheng Yuan and Xiaoqiu Ren
-
2010/215 ( PDF )
- On the q-Strong Diffie-Hellman Problem
- Naoki Tanaka and Taiichi Saito
-
2010/214 ( PDF )
- How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
- Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
-
2010/213 ( PDF )
- Composable Security Analysis of OS Services
- Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Venema
-
2010/212 ( PDF )
- Quantum Proofs of Knowledge
- Dominique Unruh
-
2010/211 ( PDF )
- Practical-time Attack on the Full MMB Block Cipher
- Keting Jia and Jiazhe Chen and Meiqin Wang and Xiaoyun Wang
-
2010/210 ( -- withdrawn -- )
- Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
- Yu Chen
-
2010/209 ( PDF )
- Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
- Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer
-
2010/208 ( PDF )
- Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
- Richard Moloney and Aidan O'Mahony and Pierre Laurent
-
2010/207 ( PDF )
- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
- Koen Simoens and Roel Peeters and Bart Preneel
-
2010/206 ( PDF )
- Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
- Long Hoang Nguyen and Andrew William Roscoe
-
2010/205 ( PDF )
- On Protecting Cryptographic Keys Against Continual Leakage
- Ali Juma and Yevgeniy Vahlis
-
2010/204 ( PDF )
- Certificateless generalized signcryption
- Ji Huifang, Han Wenbao, Zhao Long
-
2010/203 ( PDF )
- Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
- Bernard Colbert and Anthony H. Dekker and Lynn Margaret Batten
-
2010/202 ( PDF )
- Robust Combiner for Obfuscators
- Amir Herzberg and Haya Shulman
-
2010/201 ( -- withdrawn -- )
- Impossible Differential Cryptanalysis on E2
- Yuechuan Wei and Ruilin Li and Ping Li and Chao Li
-
2010/200 ( PDF )
- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
- Markus Rückert and Michael Schneider and Dominique Schröder
-
2010/199 ( PDF )
- A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
- Zeng Bing and Tang Xueming and Chingfang Hsu
-
2010/198 ( PDF )
- The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
- Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schläffer
-
2010/197 ( PDF )
- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
- Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
-
2010/196 ( PS PS.GZ PDF )
- Cryptography Against Continuous Memory Attacks
- Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
-
2010/195 ( PDF )
- On E-Vote Integrity in the Case of Malicious Voter Computers
- Sven Heiberg, Helger Lipmaa, Filip Van Laenen
-
2010/194 ( PS PS.GZ PDF )
- Identity-Based Online/Offline Key Encapsulation and Encryption
- Sherman S.M. Chow and Joseph K. Liu and Jianying Zhou
-
2010/193 ( PDF )
- Speeding Up The Widepipe: Secure and Fast Hashing
- Mridul Nandi and Souradyuti Paul
-
2010/192 ( PDF )
- Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
- Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
-
2010/191 ( PDF )
- On Designated Verifier Signature Schemes
- Michal Rjaško and Martin Stanek
-
2010/190 ( PDF )
- J-PAKE: Authenticated Key Exchange Without PKI
- Feng Hao and Peter Ryan
-
2010/189 ( PDF )
- New generic algorithms for hard knapsacks
- Nick Howgrave-Graham and Antoine Joux
-
2010/188 ( PS PS.GZ PDF )
- Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
- Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang
-
2010/187 ( PS PS.GZ PDF )
- Certificateless Signcryption without Pairing
- Wenjian Xie and Zhang Zhang
-
2010/186 ( PDF )
- New software speed records for cryptographic pairings
- Michael Naehrig and Ruben Niederhagen and Peter Schwabe
-
2010/185 ( PDF )
- New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
- Wenping Ma, Chen Yang, and Shaohui Sun
-
2010/184 ( -- withdrawn -- )
- Rational Secret Sharing AS Extensive Games
- Zhifang Zhang
-
2010/183 ( PDF )
- Preventing Pollution Attacks in Multi-Source Network Coding
- Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman
-
2010/182 ( PDF )
- A Simple BGN-type Cryptosystem from LWE
- Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
-
2010/181 ( PDF )
- Cryptanalysis of a DoS-resistant ID-based password authentication
- He Debiao, Chen Jianhua, Hu Jin
-
2010/180 ( PS PS.GZ PDF )
- The World is Not Enough: Another Look on Second-Order DPA
- Francois-Xavier Standaert and Nicolas Veyrat-Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard
-
2010/179 ( PDF )
- A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
- Ziran Tu and Yingpu Deng
-
2010/178 ( PDF )
- Identity Based Online/Offline Encryption Scheme
- Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
-
2010/177 ( PDF )
- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
- Robert Granger
-
2010/176 ( PDF )
- A Comparison of Cryptanalytic Tradeoff Algorithms
- Jin Hong and Sunghwan Moon
-
2010/175 ( PDF )
- Sanitizable signatures with strong transparency in the standard model
- Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan
-
2010/174 ( PDF )
- A Reflection on the Security of Two-Party Key Establishment Protocols
- Qiang Tang
-
2010/173 ( PDF )
- Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
- Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
-
2010/172 ( PS PS.GZ )
- Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
- Qixiang Mei, Bao Li,Xianhui Lu and Dingding Jia
-
2010/171 ( PDF )
- On Foundation and Construction of Physical Unclonable Functions
- Jiang Wu and Maire O'Neill
-
2010/170 ( PDF )
- On a conjecture about binary strings distribution
- Jean-Pierre Flori and Hugues Randriambololona and Gérard Cohen and Sihem Mesnager
-
2010/169 ( PDF )
- Dismantling SecureMemory, CryptoMemory and CryptoRF
- Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur
-
2010/168 ( PDF )
- A Meet-in-the-Middle Attack on ARIA
- Xuehai Tang, Bing Sun, Ruilin Li and Chao Li
-
2010/167 ( PDF )
- Evolutionary Cipher against Differential Power Attack
- Tang ming and Meng Qinshu and Zhang Huanguo and Gao Si and Dou Qin and Shen Fei and Li Du
-
2010/166 ( PDF )
- Fault Analysis Study of the Block Cipher FOX64
- Ruilin Li and Jianxiong You and Bing Sun and Chao Li
-
2010/165 ( PDF )
- Comment on four two-party authentication protocols
- Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
-
2010/164 ( PDF )
- Black-Box Constructions of Protocols for Secure Computation
- Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
-
2010/163 ( PDF )
- Golay Complementary Sequences Over the QAM Constellation
- Wenping Ma ,Chen Yang and Shaohui Sun
-
2010/162 ( PS PS.GZ PDF )
- 1024XKS - A High Security Software Oriented Block Cipher Revisited
- Dieter Schmidt
-
2010/161 ( PDF )
- Stange's Elliptic Nets and Coxeter Group F4
- Daniel R. L. Brown
-
2010/160 ( PDF )
- A Flaw in The Internal State Recovery Attack on ALPHA-MAC
- Shengbao Wu and Mingsheng Wang and Zheng Yuan
-
2010/159 ( PDF )
- Identity-Based Encryption Secure against Selective Opening Attack
- Mihir Bellare and Brent Waters and Scott Yilek
-
2010/158 ( PDF )
- A variant of the F4 algorithm
- Antoine Joux and Vanessa Vitse
-
2010/157 ( PDF )
- Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
- Antoine Joux and Vanessa Vitse
-
2010/156 ( PDF )
- Genus 2 Curves with Complex Multiplication
- Eyal Z. Goren and Kristin E. Lauter
-
2010/155 ( PDF )
- the upper bounds on differntial characteristics in block cipher SMS4
- Zhang MeiLing and Liu JingMei and Wang XinMei
-
2010/154 ( PDF )
- Efficient Public-Key Cryptography in the Presence of Key Leakage
- Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
-
2010/153 ( PDF )
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia
-
2010/152 ( PDF )
- Secure and Fast Implementations of Two Involution Ciphers
- Billy Bob Brumley
-
2010/151 ( PDF )
- Ring signature with divided private key
- Stelian Flonta, Liviu-Cristian Miclea
-
2010/150 ( PDF )
- Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
- Mohammad Sadeq Dousti
-
2010/149 ( PDF )
- On Small Subgroup Non-confinement Attack
- Feng Hao
-
2010/148 ( PDF )
- Comments on five smart card based password authentication protocols
- Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
-
2010/147 ( PDF )
- A New Framework for Password-Based Authenticated Key Exchange
- Adam Groce and Jonathan Katz
-
2010/146 ( PDF )
- Some Applications of Lattice Based Root Finding Techniques
- Santanu Sarkar and Subhamoy Maitra
-
2010/145 ( PDF )
- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
- Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
-
2010/144 ( PDF )
- New Definitions and Separations for Circular Security
- David Cash and Matthew Green and Susan Hohenberger
-
2010/143 ( PDF )
- Small Scale Variants Of The Block Cipher PRESENT
- Gregor Leander
-
2010/142 ( PDF )
- Mean value formulas for twisted Edwards curves
- Dustin Moody
-
2010/141 ( -- withdrawn -- )
- A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
- Yu Chen
-
2010/140 ( PDF )
- Improved Agreeing-Gluing Algorithm
- Igor Semaev
-
2010/139 ( PDF )
- A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
- Masao Kasahara
-
2010/138 ( PDF )
- On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
- Manoj Kumar
-
2010/137 ( PDF )
- Estimating the Security of Lattice-based Cryptosystems
- Markus Rückert and Michael Schneider
-
2010/136 ( PDF )
- On Robust Key Agreement Based on Public Key Authentication
- Feng Hao
-
2010/135 ( PS PS.GZ PDF )
- On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
- Aur\'elie Bauer and Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud
-
2010/134 ( PDF )
- Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
- Masaaki Shirase
-
2010/133 ( PDF )
- Signing on Elements in Bilinear Groups for Modular Protocol Design
- Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo
-
2010/132 ( PS PS.GZ PDF )
- On the claimed privacy of EC-RAC III
- Junfeng Fan and Jens Hermans and Frederik Vercauteren
-
2010/131 ( PDF )
- Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
- Jooyoung Lee and John Steinberger
-
2010/130 ( PDF )
- Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
- Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi
-
2010/129 ( PDF )
- Relation for Algebraic Attack on E0 combiner
- N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
-
2010/128 ( -- withdrawn -- )
- Update-Optimal Authenticated Structures Based on Lattices
- Charalampos Papamanthou and Roberto Tamassia
-
2010/127 ( -- withdrawn -- )
- CCA-Secure Cryptosystem from Lattice
- Chen Huiyan
-
2010/126 ( PDF )
- On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
- Jian-zhu Lu and Jipeng Zhou
-
2010/125 ( PDF )
- Cryptographic Aspects of Real Hyperelliptic Curves
- M. J. Jacobson, Jr., R. Scheidler, AND A. Stein
-
2010/124 ( PDF )
- A Hardware Wrapper for the SHA-3 Hash Algorithms
- Brian Baldwin and Andrew Byrne and Liang Lu and Mark Hamilton and Neil Hanley and Maire O'Neill and William P. Marnane
-
2010/123 ( PDF )
- Delaying Mismatched Field Multiplications in Pairing Computations
- Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
-
2010/122 ( PDF )
- Security of Encryption Schemes in Weakened Random Oracle Models
- Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa
-
2010/121 ( -- withdrawn -- )
- Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
- Chen Huiyan and Li Zichen
-
2010/120 ( PDF )
- Universal One-Way Hash Functions via Inaccessible Entropy
- Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee
-
2010/119 ( -- withdrawn -- )
- How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
- Huang Lin and Zhenfu Cao and Muxin Zhou and Haojin Zhu
-
2010/118 ( PDF )
- Proposal of a Signature Scheme based on STS Trapdoor
- Shigeo Tsujii and Masahito Gotaishi and Kohtaro Tadaki and Ryou Fujita
-
2010/117 ( PDF )
- Cryptographic Agility and its Relation to Circular Encryption
- Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash
-
2010/116 ( PDF )
- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
- M. Abdelaziz Elaabid and Sylvain Guilley
-
2010/115 ( PDF )
- A Security Evaluation of DNSSEC with NSEC3
- Jason Bau, and John C Mitchell
-
2010/114 ( PDF )
- The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
- Simon R. Blackburn
-
2010/113 ( PDF )
- Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
- Xu An Wang and Xiaoyuan Yang
-
2010/112 ( PDF )
- CCA-Secure PRE Scheme without Random Oracles
- Jun Shao and Zhenfu Cao and Peng Liu
-
2010/111 ( PDF )
- On zero practical significance of “Key recovery attack on full GOST block cipher with zero time and memory”
- Vladimir Rudskoy
-
2010/110 ( PDF )
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Allison Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters
-
2010/109 ( PDF )
- Practical Adaptive Oblivious Transfer from Simple Assumptions
- Matthew Green and Susan Hohenberger
-
2010/108 ( PDF )
- Perfectly Secure Oblivious RAM Without Random Oracles
- Ivan Damg\aa{}rd and Sigurd Meldgaard and Jesper Buus Nielsen
-
2010/107 ( PDF )
- Adaptive Concurrent Non-Malleability with Bare Public-Keys
- Andrew C. Yao and Moti Yung and Yunlei Zhao
-
2010/106 ( PDF )
- Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
- Ivan Damgård and Yuval Ishai and Mikkel Krøigaard
-
2010/105 ( PDF )
- Bias in the nonlinear filter generator output sequence
- Sui-Guan Teo and Leonie Simpson and Ed Dawson
-
2010/104 ( PDF )
- Avoiding Full Extension Field Arithmetic in Pairing Computations
- Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
-
2010/103 ( PDF )
- The Extended Access Control for Machine Readable Travel Documents
- Rafik Chaabouni and Serge Vaudenay
-
2010/102 ( PDF )
- Constructing Verifiable Random Functions with Large Input Spaces
- Susan Hohenberger and Brent Waters
-
2010/101 ( PDF )
- Fair Blind Signatures without Random Oracles
- Georg Fuchsbauer and Damien Vergnaud
-
2010/100 ( PDF )
- Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
- Brett Hemenway and Steve Lu and Rafail Ostrovsky
-
2010/099 ( PDF )
- On Homomorphic Encryption and Chosen-Ciphertext Security
- Brett Hemenway and Rafail Ostrovsky
-
2010/098 ( PDF )
- A Zero-One Law for Deterministic 2-Party Secure Computation
- Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
-
2010/097 ( PDF )
- Parallel Enumeration of Shortest Lattice Vectors
- Özgür Dagdelen and Michael Schneider
-
2010/096 ( PDF )
- Secret Sharing Extensions based on the Chinese Remainder Theorem
- Kamer Kaya and Ali Aydın Selçuk
-
2010/095 ( PDF )
- Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
- Kenneth G. Paterson and Gaven J. Watson
-
2010/094 ( PDF )
- A Random Number Generator Based on Isogenies Operations
- He Debiao, Chen Jianhua, Hu Jin
-
2010/093 ( PDF )
- New Impossible Di®erential Attacks on AES
- Zheng Yuan
-
2010/092 ( PS PS.GZ PDF )
- Security Weaknesses in Two Certificateless Signcryption Schemes
- S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
-
2010/091 ( PDF )
- Distinguishers for the Compression Function and Output Transformation of Hamsi-256
- Jean-Philippe Aumasson and Emilia Käsper and Lars Ramkilde Knudsen and Krystian Matusiewicz and Rune Odegaard and Thomas Peyrin and Martin Schläffer
-
2010/090 ( PDF )
- Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})
- Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi
-
2010/089 ( PDF )
- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
- Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai
-
2010/088 ( PDF )
- An Efficient and Parallel Gaussian Sampler for Lattices
- Chris Peikert
-
2010/087 ( PDF )
- MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
- Christopher Wolf and Bart Preneel
-
2010/086 ( PDF )
- A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
- Zvika Brakerski and Yael Tauman Kalai
-
2010/085 ( PDF )
- Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
- Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El-Khatib and Hussein Mouftah and Eiji Okamoto
-
2010/084 ( PDF )
- Attribute-based Authenticated Key Exchange
- M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
-
2010/083 ( PS PS.GZ PDF )
- One Round Group Key Exchange with Forward Security in the Standard Model
- M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
-
2010/082 ( PDF )
- Predicate-Based Key Exchange
- James Birkett and Douglas Stebila
-
2010/081 ( PDF )
- The Eris hybrid cipher
- Sandy Harris
-
2010/080 ( PDF )
- Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
- Gergei Bana and Koji Hasebe and Mitsuhiro Okada
-
2010/079 ( PDF )
- From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
- Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
-
2010/078 ( PDF )
- Multiple Bytes Differential Fault Analysis on CLEFIA
- Xin-jie ZHAO and Tao WANG and Jing-zhe GAO
-
2010/077 ( PDF )
- ECC2K-130 on Cell CPUs
- Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe
-
2010/076 ( PDF )
- Private and Continual Release of Statistics
- T-H. Hubert Chan, Elaine Shi, Dawn Song
-
2010/075 ( PDF )
- A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
- Mehdi Vasef
-
2010/074 ( PDF )
- Concurrent Knowledge Extraction in the Public-Key Model
- Andrew C. Yao and Moti Yung and Yunlei Zhao
-
2010/073 ( PDF )
- Related-Key Boomerang Attack on Block Cipher SQUARE
- Bonwook Koo, Yongjin Yeom, and Junghwan Song
-
2010/072 ( PDF )
- Approximating Addition by XOR: how to go all the way
- Didier Alqui\'e
-
2010/071 ( PDF )
- 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
- Didier Alqui\'e
-
2010/070 ( PDF )
- Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
- Markus Rückert
-
2010/069 ( PDF )
- Type-II Optimal Polynomial Bases
- Daniel J. Bernstein and Tanja Lange
-
2010/068 ( PDF )
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
- Rosario Gennaro and Hugo Krawczyk and Tal Rabin
-
2010/067 ( PDF )
- A Pairing-Based DAA Scheme Further Reducing TPM Resources
- Ernie Brickell and Jiangtao Li
-
2010/066 ( PDF )
- Some Observations on TWIS Block Cipher
- Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li
-
2010/065 ( PDF )
- An Anonymous ID-based Encryption Revisited
- Zhengjun Cao
-
2010/064 ( PDF )
- New Advances on Privacy-Preserving Policy Reconciliation
- Ulrike Meyer and Susanne Wetzel and Sotiris Ioannidis
-
2010/063 ( PDF )
- Differential Fault Analysis on SMS4 Using a Single Fault
- Ruilin Li and Bing Sun and Chao Li and Jianxiong You
-
2010/062 ( PDF )
- Differential Cryptanalysis of SMS4 Block Cipher
- Bozhan Su and Wenling Wu and Wentao Zhang
-
2010/061 ( PDF )
- Privacy-Preserving Matching Protocols for Attributes and Strings
- Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu and Jyh-Charn Liu
-
2010/060 ( PDF )
- Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
- Yongge Wang
-
2010/059 ( PDF )
- A New Framework for RFID Privacy
- Robert H. Deng, Yingjiu Li, Andrew C. Yao and Moti Yung and Yunlei Zhao
-
2010/058 ( PDF )
- Solinas primes of small weight for fixed sizes
- Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna
-
2010/057 ( PDF )
- Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
- Cagdas Calik and Meltem Sonmez Turan
-
2010/056 ( PDF )
- Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
- Xin-jie ZHAO and Tao WANG
-
2010/055 ( PDF )
- Credential Authenticated Identification and Key Exchange
- Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup
-
2010/054 ( PDF )
- An Improved Timing Attack with Error Detection on RSA-CRT
- Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
-
2010/053 ( PDF )
- Logical cryptoanalysis on the example of the cryptosystem DES
- A.D. Plotnikov
-
2010/052 ( -- withdrawn -- )
- Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
- FuShan Wei and QingFeng Cheng and ChuanGui Ma
-
2010/051 ( PDF )
- A Principle for Cryptographic Protocols Beyond Security, Less Parameters
- Zhengjun Cao
-
2010/050 ( PS PS.GZ PDF )
- Authenticating Aggregate Range Queries over Multidimensional Dataset
- Jia XU and Ee-Chien CHANG
-
2010/049 ( PS PS.GZ PDF )
- On Symmetric Encryption and Point Obfuscation
- Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs
-
2010/048 ( -- withdrawn -- )
- An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
- He Debiao; Chen Jianhua; Hu Jin
-
2010/047 ( PDF )
- Lower Bounds for Straight Line Factoring
- Daniel R. L. Brown
-
2010/046 ( -- withdrawn -- )
- A New Chaos-Based Cryptosystem for Secure Transmitted Images
- Abir AWAD
-
2010/045 ( -- withdrawn -- )
- Efficient chaotic permutations for image encryption algorithms
- Abir AWAD
-
2010/044 ( -- withdrawn -- )
- A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
- Abir AWAD
-
2010/043 ( PDF )
- Differential and invertibility properties of BLAKE (full version)
- Jean-Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier
-
2010/042 ( PDF )
- A modified eCK model with stronger security for tripartite authenticated key exchange
- Qingfeng Cheng and Chuangui Ma and Fushan Wei
-
2010/041 ( PDF )
- The Effects of the Omission of Last Round's MixColumns on AES
- Orr Dunkelman and Nathan Keller
-
2010/040 ( PDF )
- Batch Groth-Sahai
- Olivier Blazy and Georg Fuchsbauer and Malika Izabachène and Amandine Jambert and Hervé Sibert and Damien Vergnaud
-
2010/039 ( PDF )
- On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
- Xiwang Cao and Lei Hu
-
2010/038 ( PDF )
- Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
- Arnaud Boscher and Helena Handschuh and Elena Trichina
-
2010/037 ( PDF )
- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
- Pierre-Alain Fouque and Mehdi Tibouchi
-
2010/036 ( -- withdrawn -- )
- An Enhanced Remote User Authentication Scheme
- Keerti Srivastava and Amit K Awasthi and R.C.Mittal
-
2010/035 ( PDF )
- Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
- Goichiro Hanaoka and Kaoru Kurosawa
-
2010/034 ( PDF )
- On the order of the polynomial $x^p-x-a$
- Xiwang Cao
-
2010/033 ( PDF )
- Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
- Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup
-
2010/032 ( PDF )
- An Information Theoretic Perspective on the Differential Fault Analysis against AES
- Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta
-
2010/031 ( PDF )
- Class Invariants by the CRT Method
- Andreas Enge and Andrew V. Sutherland
-
2010/030 ( PDF )
- On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
- Simon R. Blackburn and Douglas R. Stinson and Jalaj Upadhyay
-
2010/029 ( PDF )
- On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
- Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
-
2010/028 ( PDF )
- A secure anonymous communication scheme in vehicular ad hoc networks from pairings
- *Jue-Sam Chou 1, Yalin Chen 2
-
2010/027 ( PDF )
- A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
- Yalin Chen1, *Jue-Sam Chou2, Xian-Wu Hou3
-
2010/026 ( PDF )
- Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
- Xin-jie Zhao and Tao Wang
-
2010/025 ( PDF )
- New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
- Jiqiang Lu
-
2010/024 ( PDF )
- Authentication schemes from actions on graphs, groups, or rings
- Dima Grigoriev and Vladimir Shpilrain
-
2010/023 ( PDF )
- Differential Fault Analysis on AES with 192 and 256-Bit Keys
- Junko Takahashi and Toshinori Fukunaga
-
2010/022 ( PDF )
- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
- Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
-
2010/021 ( PDF )
- A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
- Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong
-
2010/020 ( PS PS.GZ PDF )
- Number of Jacobi quartic curves over finite fields
- Rongquan Feng, Hongfeng Wu
-
2010/019 ( PDF )
- Related-Key Boomerang and Rectangle Attacks
- Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller
-
2010/018 ( PDF )
- Scalability and Security Conflict for RFID Authentication Protocols
- Imran Erguler and Emin Anarim
-
2010/017 ( PS PS.GZ PDF )
- A new one-time signature scheme from syndrome decoding
- Paulo S. L. M. Barreto and Rafael Misoczki
-
2010/016 ( PDF )
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang
-
2010/015 ( PDF )
- Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
- Jorge Guajardo and Bart Mennink
-
2010/014 ( PDF )
- A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
- Mridul Nandi
-
2010/013 ( PDF )
- A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
- Orr Dunkelman and Nathan Keller and Adi Shamir
-
2010/012 ( PS PS.GZ PDF )
- Differential Cache Trace Attack Against CLEFIA
- Chester Rebeiro and Debdeep Mukhopadhyay
-
2010/011 ( -- withdrawn -- )
- Related Key Cryptanalysis of the LEX Stream Cipher
- Mainack Mondal and Debdeep Mukhopadhyay
-
2010/010 ( PDF )
- Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
- Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta
-
2010/009 ( PDF )
- The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
- Xuelian Li and Yupu Hu and Juntao Gao
-
2010/008 ( PS PS.GZ PDF )
- A DAA Scheme Requiring Less TPM Resources
- Liqun Chen
-
2010/007 ( PDF )
- Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
- Arpita Patra and Ashish Choudhary and C. Pandu Rangan
-
2010/006 ( PDF )
- Factorization of a 768-bit RSA modulus
- Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
-
2010/005 ( PDF )
- Skew-Frobenius map on twisted Edwards curve
- Mingqiang Wang, Xiaoyun Wang,Tao Zhan, Yuliang Zheng
-
2010/004 ( PS PS.GZ PDF )
- Halving on Binary Edwards Curves
- Qiping Lin and Fangguo Zhang
-
2010/003 ( PDF )
- Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
- Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
-
2010/002 ( PDF )
- Practical ID-based Encryption for Wireless Sensor Network
- Cheng-Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng
-
2010/001 ( PDF )
- Transfinite Cryptography
- Jacques Patarin
[ Cryptology ePrint archive ]