Cryptology ePrint Archive: Listing for 2010

2010/661 ( PDF )
Security Evaluation of MISTY Structure with SPN Round Function
Ruilin Li and Chao Li and Jinshu Su and Bing Sun
2010/660 ( PDF )
Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches
Brian J. Matt
2010/659 ( PDF )
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
Mark Manulis and Bertram Poettering
2010/658 ( PDF )
ABC - A New Framework for Block Ciphers
Uri Avraham and Eli Biham and Orr Dunkelman
2010/657 ( PDF )
On small secret key attack against RSA with high bits known prime factor
Yasufumi Hashimoto
2010/656 ( PDF )
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
Yehuda Lindell
2010/655 ( PS PS.GZ PDF )
On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings
İsa Sertkaya and Ali Doğanaksoy
2010/654 ( PDF )
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)
Daniel Kraschewski and Jörn Müller-Quade
2010/653 ( PDF )
Cubic groups
2010/652 ( PDF )
Active Domain Expansion for Normal Narrow-pipe Hash Functions
Xigen Yao
2010/651 ( PDF )
On the Impossibility of Instantiating PSS in the Standard Model
Rishiraj Bhattacharyya and Avradip Mandal
2010/650 ( PDF )
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
Jean-Sebastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi
2010/649 ( PDF )
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Gonzalez Nieto
2010/648 ( PDF )
Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
Dario Fiore and Dominique Schröder
2010/647 ( PDF )
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
Xiaoyun Wang and Mingjie Liu and Chengliang Tian and Jingguo Bi
2010/646 ( PDF )
Statistical Analysis of Second Order Differential Power Analysis
Emmanuel Prouff and Matthieu Rivain and Régis Bévan
2010/645 ( PDF )
A Timed Logic for Modeling and Reasoning about Security Protocols
Xinfeng Lei and Rui Xue and Ting Yu
2010/644 ( PDF )
A Practical Platform for Cube-Attack-like Cryptanalyses
Bo Zhu and Wenye Yu and Tao Wang
2010/643 ( PDF )
Construct MD5 Collisions Using Just A Single Block Of Message
Tao Xie and Dengguo Feng
2010/642 ( PDF )
More Insights on Blockcipher-Based Hash Functions
Yiyuan Luo, Xuejia Lai
2010/641 ( PDF )
A new algorithm for computing Groebner bases
Shuhong Gao and Frank Volny IV and Mingsheng Wang
2010/640 ( PS PS.GZ PDF )
Short collusion-secure fingerprint codes against three pirates
Koji Nuida
2010/639 ( -- withdrawn -- )
Enumerating Results of Homogeneous Rotation over $GF(p)$
Guang-Pu Go, Xi-Yong Zhang, and Wen-Fen Liu
2010/638 ( PDF )
One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi and Hugo Krawczyk
2010/637 ( PDF )
Breaking An Identity-Based Encryption Scheme based on DHIES
Martin R. Albrecht and Kenneth G. Paterson
2010/636 ( PS PS.GZ PDF )
Differential Fault Analysis of AES using a Single Multiple-Byte Fault
Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall
2010/635 ( -- withdrawn -- )
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials
Zhang Yun and Christophe Tartary
2010/634 ( PDF )
ROTIV: RFID Ownership Transfer with Issuer Verification
Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
2010/633 ( PDF )
Low Data Complexity Attacks on AES
Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre-Alain Fouque
2010/632 ( PDF )
Efficient and provably-secure certificateless signature scheme without bilinear pairings
He Debiao, Chen Jianhua, Zhang Rui
2010/631 ( PDF )
Black-box property of Cryptographic Hash Functions
Michal Rjaško
2010/630 ( PDF )
Divison Polynomials for Alternate Models of Elliptic Curves
Dustin Moody
2010/629 ( PDF )
On the Security of Hash Functions Employing Blockcipher Postprocessing
Donghoon Chang and Mridul Nandi and Moti Yung
2010/628 ( PDF )
State convergence and keyspace reduction of the Mixer stream cipher
Sui-Guan Teo and Kenneth Koon-Ho Wong and Leonie Simpson and Ed Dawson
2010/627 ( PS PS.GZ PDF )
Secure and Efficient Protocols for Iris and Fingerprint Identification
Marina Blanton and Paolo Gasti
2010/626 ( PDF )
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Peng Xu and Hai Jin
2010/625 ( PDF )
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
2010/624 ( PDF )
No-leak authentication by the Sherlock Holmes method
Dima Grigoriev and Vladimir Shpilrain
2010/623 ( PDF )
Cryptanalysis of Skein
Daniel J. Bernstein and Tanja Lange
2010/622 ( PDF )
A new result on the distinctness of primitive sequences over Z(pq) modulo 2
Qunxiong Zheng and Wenfeng Qi
2010/621 ( PDF )
Generic Compilers for Authenticated Key Exchange (Full Version)
Tibor Jager and Florian Kohlar and Sven Schäge and Jörg Schwenk
2010/620 ( -- withdrawn -- )
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
2010/619 ( PDF )
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
Yang Lu
2010/618 ( PDF )
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
Thomas Fuhr and Henri Gilbert and Jean-Ren{\'e} Reinhard and Marion Videau
2010/617 ( PDF )
Computing Discrete Logarithms in an Interval
Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai
2010/616 ( PDF )
A non-uniform birthday problem with applications to discrete logarithms
Steven D. Galbraith and Mark Holmes
2010/615 ( PDF )
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
Steven D. Galbraith and Raminder S. Ruprai
2010/614 ( PDF )
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder and Marcin Wojcik and Stefan Tillich and Dan Page
2010/613 ( PDF )
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner and Chris Peikert
2010/612 ( -- withdrawn -- )
Cryptanalysis of Hummingbird-1
Markku-Juhani O. Saarinen
2010/611 ( PDF )
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates
Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
2010/610 ( PDF )
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
Craig Gentry and Daniel Wichs
2010/609 ( PS PS.GZ PDF )
The Round Complexity of General VSS
Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
2010/608 ( PDF )
A New Model of Binary Elliptic Curves with Fast Arithmetic
Hongfeng Wu, Chunming Tang and Rongquan Feng
2010/607 ( PDF )
How to Improve Rebound Attacks
María Naya-Plasencia
2010/606 ( PDF )
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
He Debiao,Chen Jianhua, Hu Jin
2010/605 ( PDF )
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
Tzipora Halevi and Nitesh Saxena
2010/604 ( PS PS.GZ PDF )
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
Shangwei Zhao,Ruyong Feng and Xiao-Shan Gao
2010/603 ( PDF )
Cryptanalysis of Dual CRT-RSA
Santanu Sarkar and Subhamoy Maitra
2010/602 ( PDF )
An Improved Algebraic Attack on Hamsi-256
Itai Dinur and Adi Shamir
2010/601 ( PDF )
Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
Lei Li and Siman Yang
2010/600 ( PDF )
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Anne Broadbent and Stacey Jeffery and Alain Tapp
2010/599 ( PS PS.GZ PDF )
Secure Multiparty Computation with Partial Fairness
Amos Beimel, Eran Omri, and Ilan Orlov
2010/598 ( PDF )
A Broadcast Attack against NTRU Using Ding's Algorithm
Yanbin Pan, Yingpu Deng
2010/597 ( PDF )
A New Class of Bent--Negabent Boolean Functions
Sugata Gangopadhyay and Ankita Chaturvedi
2010/596 ( PDF )
Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL
Enrico Thomae and Christopher Wolf
2010/595 ( PDF )
Attribute-Based Signatures
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2010/594 ( PDF )
Cache Games - Bringing Access Based Cache Attacks on AES to Practice
Endre Bangerter and David Gullasch and Stephan Krenn
2010/593 ( PDF )
Differential Attack on Five Rounds of the SC2000 Block Cipher
Jiqiang Lu
2010/592 ( -- withdrawn -- )
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner and Chris Peikert
2010/591 ( PDF )
Bonsai Trees, or How to Delegate a Lattice Basis
David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert
2010/590 ( PDF )
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
Andrey Bogdanov and Ilya Kizhvatov
2010/589 ( PS PS.GZ PDF )
Higher-order differential properties of Keccak and Luffa
Christina Boura and Anne Canteaut and Christophe De Canni\`ere
2010/588 ( PDF )
Improved Collisions for Reduced ECHO-256
Martin Schläffer
2010/587 ( PDF )
Group Message Authentication
Bartosz Przydatek and Douglas Wikstr{\"o}m
2010/586 ( PDF )
Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
İsmail San and Nuray At
2010/585 ( PDF )
Smaller decoding exponents: ball-collision decoding
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2010/584 ( PDF )
VMCrypt - Modular Software Architecture for Scalable Secure Computation
Lior Malka and Jonathan Katz
2010/583 ( PDF )
Improved Preimage Attack on One-block MD4
Jinmin Zhong and Xuejia Lai
2010/582 ( PDF )
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
Alexandre Berzati and C\'ecile Canovas-Dumas and Louis Goubin
2010/581 ( PDF )
Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm
Jintai Ding
2010/580 ( PDF )
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski and Janusz Szmidt
2010/579 ( PDF )
Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion
WeiGuo Zhang and GuoZhen Xiao
2010/578 ( PDF )
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Axel Schroepfer and Florian Kerschbaum and Guenter Mueller
2010/577 ( PDF )
Discrete Logarithms, Diffie-Hellman, and Reductions
Neal Koblitz and Alfred Menezes and Igor Shparlinski
2010/576 ( PDF )
Efficient Hashing using the AES Instruction Set
Joppe W. Bos and Onur Ozen and Martijn Stam
2010/575 ( PDF )
A Discrete Logarithm Attack on Elliptic Curves
Otto Johnston
2010/574 ( PDF )
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Julia Borghoff and Lars R. Knudsen and Gregor Leander and Soeren S. Thomsen
2010/573 ( PDF )
On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$
Yongqiang Li and Mingsheng Wang
2010/572 ( PDF )
Cryptanalysis of splay tree based encryption
Jean-Philippe Aumasson
2010/571 ( PDF )
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform
Mohamed El Hadedy, Danilo Gligoroski and Svein J. Knapskog
2010/570 ( PDF )
Breaking Grain-128 with Dynamic Cube Attacks
Itai Dinur and Adi Shamir
2010/569 ( PDF )
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Jérémy Jean and Pierre-Alain Fouque
2010/568 ( PDF )
Efficient Two-Move Blind Signatures in the Common Reference String Model
E. Ghadafi and N.P. Smart
2010/567 ( PS PS.GZ PDF )
2010/566 ( PDF )
Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles
Yusuke Naito
2010/565 ( PDF )
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
Joseph A. Akinyele and Christoph U. Lehmann and Matthew D. Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin
2010/564 ( PDF )
Cryptographic Randomness Testing of Block Ciphers and Hash Functions
Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
2010/563 ( PDF )
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
Tatsuaki Okamoto and Katsuyuki Takashima
2010/562 ( PDF )
How to Leak on Key Updates
Allison Lewko and Mark Lewko and Brent Waters
2010/561 ( PS PS.GZ PDF )
Password-Protected Secret Sharing
Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu
2010/560 ( PDF )
On CCA-Secure Fully Homomorphic Encryption
J. Loftus and A. May and N.P. Smart and F. Vercauteren
2010/559 ( PDF )
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
Diego F. Aranha and Jean-Luc Beuchat and J\'er\'emie Detrey and Nicolas Estibals
2010/558 ( PDF )
Solving LWE problem with bounded errors in polynomial time
Jintai Ding
2010/557 ( -- withdrawn -- )
A Digital Signature Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
2010/556 ( PDF )
Definitional Issues in Functional Encryption
Adam O'Neill
2010/555 ( PDF )
RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation
S. Duquesne
2010/554 ( PDF )
Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant
Stéphane Jacob
2010/553 ( -- withdrawn -- )
Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
Yang Lu
2010/552 ( PDF )
A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality
Carmit Hazay and Yehuda Lindell
2010/551 ( PDF )
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries
Carmit Hazay and Yehuda Lindell
2010/550 ( PDF )
Isogenies and Cryptography
2010/549 ( PDF )
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
Yalin Chen1, *Jue-Sam Chou2, Chi-Fong Lin3
2010/548 ( PDF )
Shay Gueron, Simon Johnson, Jesse Walker
2010/547 ( -- withdrawn -- )
Symmetric-key Searchable keyword Concealment (SSC)
Yacov Yacobi
2010/546 ( PS PS.GZ PDF )
Timed Encryption and Its Application
Shaoquan Jiang
2010/545 ( PDF )
Optimal XOR based (2,n)-Visual Cryptography Schemes
Feng Liu and Chuankun Wu
2010/544 ( PDF )
Semantic Security Under Related-Key Attacks and Applications
Benny Applebaum and Danny Harnik and Yuval Ishai
2010/543 ( PDF )
Functional Encryption: Definitions and Challenges
Dan Boneh and Amit Sahai and Brent Waters
2010/542 ( PS PS.GZ PDF )
Squaring in cyclotomic subgroups
Koray Karabina
2010/541 ( PDF )
One-time Computable and Uncomputable Functions
Stefan Dziembowski and Tomasz Kazana and Daniel Wichs
2010/540 ( PDF )
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption
Anna Lysyanskaya and Aaron Segal
2010/539 ( PDF )
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves
Reza R. Farashahi and Pierre-Alain Fouque and Igor E. Shparlinski and Mehdi Tibouchi and J. Felipe Voloch
2010/538 ( PDF )
Rotational Rebound Attacks on Reduced Skein
Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger
2010/537 ( PDF )
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
Yongzhuang Wei and Jiqiang Lu and Yupu Hu
2010/536 ( PDF )
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont
2010/535 ( PDF )
Linear Analysis of Reduced-Round CubeHash
Tomer Ashur and Orr Dunkelman
2010/534 ( PDF )
Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity
Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu
2010/533 ( -- withdrawn -- )
Deterministic Public-Key Encryption Revisited
Adam O'Neill
2010/532 ( PDF )
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Andrey Bogdanov and Christian Rechberger
2010/531 ( PDF )
Comparison of seven SHA-3 candidates software implementations on smart cards.
Mourad Gouicem
2010/530 ( PDF )
How to Read a Signature?
Vanessa Gratzer and David Naccache
2010/529 ( PDF )
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields
Kristin Lauter and Ning Shang
2010/528 ( PDF )
Constant-Round Private Function Evaluation with Linear Complexity
Jonathan Katz and Lior Malka
2010/527 ( PDF )
The Digital Signature Scheme MQQ-SIG
Danilo Gligoroski and Rune Steinsmo \O deg\aa rd and Rune Erlend Jensen and Ludovic Perret and Jean-Charles Faug\`{e}re and Svein Johan Knapskog and Smile Markovski
2010/526 ( PDF )
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio López
2010/525 ( PS PS.GZ PDF )
Torus-based compression by factor 4 and 6
Koray Karabina
2010/524 ( PDF )
Combining properties of cryptographic hash functions
Michal Rjaško
2010/523 ( PDF )
Affine Masking against Higher-Order Side Channel Analysis
Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain
2010/522 ( PDF )
Signatures Resilient to Continual Leakage on Memory and Computation
Tal Malkin and Isamu Teranishiy and Yevgeniy Vahlis and Moti Yung
2010/521 ( PDF )
Linear Approximations of Addition Modulo $2^n$-1
Xiutao Feng and Chunfang Zhou and Chuankun Wu
2010/520 ( PDF )
Implementing Gentry's Fully-Homomorphic Encryption Scheme
Craig Gentry and Shai Halevi
2010/519 ( PDF )
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
Matthias Krause and Frederik Armknecht and Ewan Fleischmann
2010/518 ( PDF )
Boolean functions with all main cryptographic properties
Ziran Tu and Yingpu Deng
2010/517 ( PDF )
Cryptanalysis of block EnRUPT
Elias Yarrkov
2010/516 ( PDF )
Key Agreement Protocols Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
2010/515 ( -- withdrawn -- )
2010/514 ( PDF )
Semi-Homomorphic Encryption and Multiparty Computation
Rikke Bendlin and Ivan Damgĺrd and Claudio Orlandi and Sarah Zakarias
2010/513 ( PDF )
Key-Dependent Message Security: Generic Amplification and Completeness
Benny Applebaum
2010/512 ( PDF )
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
Jung Hee Cheon and Stanislaw Jarecki and Jae Hong Seo
2010/511 ( PDF )
On the complexity of Decomposition Attack
Koh-ichi Nagao
2010/509 ( PDF )
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
Maria Dubovitskaya and Alessandra Scafuro and Ivan Visconti
2010/508 ( PDF )
A Fault Analytic Method against HB+
Jose Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento
2010/507 ( PS PS.GZ PDF )
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan and Tor Helleseth
2010/506 ( PDF )
Quantum Preimage and Collision Attacks on CubeHash
Gaëtan Leurent
2010/505 ( PS PS.GZ PDF )
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
Dominique Unruh
2010/504 ( PDF )
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
Charles Bouillaguet and Jean-Charles Faugčre and Pierre-Alain Fouque and Ludovic Perret
2010/503 ( PDF )
BiTR: Built-in Tamper Resilience
Seung Geol Choi and Aggelos Kiayias and Tal Malkin
2010/502 ( PDF )
Proving Coercion-Resistance of Scantegrity II
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2010/501 ( PDF )
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter
2010/500 ( PS PS.GZ )
Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu-Varsakelis and Spyros T. Halkidis and George Stephanides
2010/499 ( PDF )
Secure Computations on Non-Integer Values
M. Franz and B. Deiseroth and K. Hamacher and S. Jha and S. Katzenbeisser and H. Schroeder
2010/498 ( PDF )
Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields
Vladislav Kovtun, Sergey Kavun
2010/497 ( -- withdrawn -- )
Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
Tao Shi and Dongdai Lin
2010/496 ( PDF )
Efficient Attributes for Anonymous Credentials (Extended Version)
Jan Camenisch and Thomas Gro{\ss}
2010/495 ( PDF )
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
Mahabir Prasad Jhanwar
2010/494 ( PS PS.GZ PDF )
Stronger Security Model of Group Key Agreement
Jianjie Zhao, Dawu Gu and M. Choudary Gorantla
2010/493 ( -- withdrawn -- )
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
S.Sharmila Deva Selvi and S.Sree Vivek and C. Pandu Rangan
2010/492 ( PDF )
Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae
Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
2010/491 ( PDF )
A Collaborative Framework for Privacy Protection in Online Social Networks
Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail-Joon Ahn
2010/490 ( PDF )
Strong designated verifier signature scheme: new definition and construction
Zuhua Shao
2010/489 ( PDF )
Loiss: A Byte-Oriented Stream Cipher
Dengguo Feng and Xiutao Feng and Wentao Zhang and Xiubin Fan and Chuankun Wu
2010/488 ( PDF )
Fully Leakage-Resilient Signatures
Elette Boyle and Gil Segev and Daniel Wichs
2010/487 ( PDF )
Constant Round Non-Malleable Protocols using One Way Functions
Vipul Goyal
2010/486 ( PDF )
Claude Carlet and Sihem Mesnager
2010/485 ( PDF )
Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
Hamid Mala and Mohammad Dakhilalian and Mohsen Shakiba
2010/484 ( PDF )
Automata Evaluation and Text Search Protocols with Simulation Based Security
Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen
2010/483 ( PDF )
Constant-round Non-Malleable Commitments from Any One-Way Function
Huijia Lin, Rafael Pass
2010/482 ( -- withdrawn -- )
On Instantiation of the Random Oracle
He Ge
2010/481 ( PDF )
A secure email login system using virtual password
Bhavin Tanti, Nishant doshi
2010/480 ( PDF )
Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
Shigeo Tsujii and Masahito Gotaishi
2010/479 ( PDF )
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
R.M. Avanzi and S. Hoerder and D. Page and M. Tunstall
2010/478 ( PDF )
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang
2010/477 ( PDF )
On Compression of Data Encrypted with Block Ciphers
Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and and Tal Rabin
2010/476 ( PDF )
Predicate Encryption with Partial Public Keys
Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano
2010/475 ( PDF )
Pairing Computation on Elliptic Curves of Jacobi Quartic Form
Hong Wang and Kunpeng Wang and Lijun Zhang and Bao Li
2010/474 ( PDF )
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
Sarah Meiklejohn and Hovav Shacham and David Mandell Freeman
2010/473 ( -- withdrawn -- )
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
Hui Zhang and Chunxiang Xu and Abdur Rashid Sangi
2010/472 ( PDF )
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought
A. Simone and B. Skoric
2010/471 ( -- withdrawn -- )
Privacy-preserving Sharing of Sensitive Information
Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik
2010/470 ( PDF )
Two identification protocols based on Cayley graphs of Coxeter groups
Feli\'u Sagols and Guillermo Morales-Luna
2010/469 ( PDF )
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
2010/468 ( PS PS.GZ PDF )
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
Goichiro Hanaoka and Jian Weng
2010/467 ( PDF )
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
Xinfeng Lei and Rui Xue and Ting Yu
2010/466 ( PDF )
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
Benwen Zhu and Bo Zhu and Kui Ren
2010/465 ( PDF )
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
2010/464 ( -- withdrawn -- )
Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
Q. Pu
2010/463 ( PDF )
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
Mohammad Reza Sohizadeh Abyaneh
2010/462 ( PDF )
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
Zhifang Zhang
2010/461 ( PDF )
Identity Based Partial Aggregate Signature Scheme Without Pairing
S. Sharmila Deva Selvi and S. Sree Vivek and J.Shriram and C. Pandu Rangan
2010/460 ( -- withdrawn -- )
On extended algebraic immunity
Gaofei Wu and Yuqing Zhang and Weiguo Zhang
2010/459 ( PDF )
CCA2 Secure Certificateless Encryption Schemes Based on RSA
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2010/458 ( PDF )
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
Masahiro Yagisawa
2010/457 ( PDF )
Improving the performance of Luffa Hash Algorithm
Thomaz Oliveira and Julio López
2010/456 ( PS PS.GZ PDF )
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam Smith
2010/455 ( PDF )
Optimal Verification of Operations on Dynamic Sets
Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
2010/454 ( PDF )
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
Jesse Walker and Jiangtao Li
2010/453 ( PDF )
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Dan Boneh and David Mandell Freeman
2010/452 ( PDF )
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Feng Hao and Matthew Nicolas Kreeger
2010/451 ( PS PS.GZ PDF )
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
Subidh Ali and Debdeep Mukhopadhyay
2010/450 ( PDF )
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
Kaoru Kurosawa
2010/449 ( PDF )
Oblivious and Fair Server-Aided Two-Party Computation
Amir Herzberg and Haya Shulman
2010/448 ( PDF )
Sequential Rationality in Cryptographic Protocols
Ronen Gradwohl and Noam Livne and Alon Rosen
2010/447 ( PDF )
Side-channel Analysis of Six SHA-3 Candidates
Olivier Benoit and Thomas Peyrin
2010/446 ( PDF )
Short One-Time Signatures
G.M. Zaverucha and D.R. Stinson
2010/445 ( PDF )
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj
2010/444 ( PDF )
New Construction of Identity-based Proxy Re-encryption
Song Luo and Jianbin Hu and Zhong Chen
2010/443 ( PS PS.GZ PDF )
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu
2010/442 ( PDF )
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
Dan Boneh and Hart Montgomery and Ananth Raghunathan
2010/441 ( PDF )
Provably Secure Higher-Order Masking of AES
Matthieu Rivain and Emmanuel Prouff
2010/440 ( PDF )
Piret and Quisquater's DFA on AES Revisited
Christophe Giraud and Adrian Thillard
2010/439 ( PDF )
Embedded Extended Visual Cryptography Schemes
Feng Liu and Chuankun Wu
2010/438 ( PDF )
Achieving Leakage Resilience Through Dual System Encryption
Allison Lewko and Yannis Rouselakis and Brent Waters
2010/437 ( PDF )
Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2010/436 ( PDF )
Arithmetic of Supersingular Koblitz Curves in Characteristic Three
Roberto Avanzi and Clemens Heuberger and Helmut Prodinger
2010/435 ( PDF )
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Cihangir Tezcan
2010/434 ( PDF )
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Takanori Isobe and Taizo Shirai
2010/433 ( PS PS.GZ PDF )
The PASSERINE Public Key Encryption and Authentication Mechanism
Markku-Juhani O. Saarinen
2010/432 ( PDF )
K. Atighehchi and A. Enache and T. Muntean and G. Risterucci
2010/431 ( PDF )
Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
Jing Liu and Bo Yang
2010/430 ( PDF )
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
Vlastimil Klima and Danilo Gligoroski
2010/429 ( PS PS.GZ PDF )
A Family of Implementation-Friendly BN Elliptic Curves
Geovandro C. C. F. Pereira and Marcos A. Simplício Jr and Michael Naehrig and Paulo S. L. M. Barreto
2010/428 ( PDF )
Random Oracles in a Quantum World
Dan Boneh and Ozgur Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry
2010/427 ( -- withdrawn -- )
Security Improvement on a Password-Authenticated Group Key Exchange Protocol
Junghyun Nam
2010/426 ( PDF )
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
Huihui Yap and Khoongming Khoo and Axel Poschmann
2010/425 ( PDF )
KIST: A new encryption algorithm based on splay
R. Wei and Z. Zeng
2010/424 ( PS PS.GZ PDF )
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2010/423 ( PDF )
Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
LI Yun-qiang and Wang Ai-lan
2010/422 ( PDF )
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
Jae Hyun Ahn and Matthew Green and Susan Hohenberger
2010/421 ( PDF )
Binomial Sieve Series -- a Prospective Cryptographic Tool
Gideon Samid
2010/420 ( PS PS.GZ PDF )
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
Stanislav Bulygin and Albrecht Petzoldt and Johannes Buchmann
2010/419 ( PDF )
White-Box Cryptography and SPN ciphers. LRC method.
Dmitry Schelkunov
2010/418 ( PDF )
Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
*Jue-Sam Chou 1, hsien-ching Chen 2, Chun-Yun Chen 3
2010/417 ( PDF )
Distinguishing Properties of Higher Order Derivatives of Boolean Functions
Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu
2010/416 ( PDF )
Computationally Sound Verification of Source Code
Michael Backes and Matteo Maffei and Dominique Unruh
2010/415 ( PS PS.GZ PDF )
Perfectly Balanced Boolean Functions and Goli\'c Conjecture
Stanislav Smyshlyaev
2010/414 ( PDF )
On Strong Simulation and Composable Point Obfuscation
Nir Bitansky and Ran Canetti
2010/413 ( PDF )
Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
2010/412 ( PDF )
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Margus Niitsoo
2010/411 ( PDF )
Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.
Vivien Dubois and Jean-Gabriel Kammerer
2010/410 ( PDF )
Wild McEliece
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2010/409 ( PDF )
The collision security of Tandem-DM in the ideal cipher model
Jooyoung Lee and Martijn Stam and John Steinberger
2010/408 ( PDF )
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
Jean-François Gallais and Ilya Kizhvatov and Michael Tunstall
2010/407 ( PDF )
Flaws in Differential Cryptanalysis of Reduced Round PRESENT
Manoj Kumar and Pratibha Yadav and Meena Kumari
2010/406 ( PDF )
Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
Julien Francq and Céline Thuillet
2010/405 ( PS PS.GZ PDF )
Privacy-Preserving RFID Systems: Model and Constructions
S\'ebastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault
2010/404 ( PDF )
On the Insecurity of Parallel Repetition for Leakage Resilience
Allison Lewko and Brent Waters
2010/403 ( -- withdrawn -- )
Linear Secret Sharing for Hierarchical Access Structures
Ali Aydın Selçuk and Ramazan Yılmaz
2010/402 ( PDF )
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
Mohammad Reza Sohizadeh Abyaneh
2010/401 ( PDF )
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
Jan Camenisch and Thomas Groß and Peter Hladky and Christian Hoertnagl
2010/400 ( PDF )
Security Analysis of a Threshold Proxy Signature Scheme
Kitae Kim and Dahun Nyang
2010/399 ( PS PS.GZ PDF )
Faster Computation of Self-pairings
Chang-An Zhao, Fangguo Zhang and Dongqing Xie
2010/398 ( PDF )
Distinguisher for Shabal's Permutation Function
Peter Novotney
2010/397 ( PDF )
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mihir Bellare and David Cash
2010/396 ( PS PS.GZ PDF )
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
Noémie Floissac and Yann L'Hyver
2010/395 ( PDF )
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Zhibin Zhou and Dijiang Huang
2010/394 ( PDF )
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier and Benoit Feix and Georges Gagnerot and Mylene Roussellet and Vincent Verneuil
2010/393 ( PDF )
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
Jue-Sam Chou 1*, Yalin Chen 2, Chun-Hui Huang 3
2010/392 ( PS PS.GZ PDF )
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2010/391 ( PDF )
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
Daniel Z. Zanger
2010/390 ( PDF )
Elliptic curves in Huff 's model
Hongfeng Wu and Rongquan Feng
2010/389 ( PDF )
The impossibility of computationally sound XOR
Dominique Unruh
2010/388 ( PDF )
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes
2010/387 ( PDF )
A Combinatorial Analysis of HC-128
Goutam Paul and Subhamoy Maitra and Shashwat Raizada
2010/386 ( PDF )
BoostReduce - A Framework For Strong Lattice Basis Reduction
Werner Backes and Susanne Wetzel
2010/385 ( PDF )
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
Emmanuel Prouff and Robert McEvoy
2010/384 ( PDF )
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
Danilo Gligoroski and Vlastimil Klima
2010/383 ( PDF )
Huff's Model for Elliptic Curves
Marc Joye and Mehdi Tibouchi and Damien Vergnaud
2010/382 ( PDF )
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pierre-Alain Fouque and Mehdi Tibouchi
2010/381 ( PDF )
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
2010/380 ( PDF )
Analysis of an internet voting protocol
Kristian Gjřsteen
2010/379 ( PDF )
Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
Sorina Ionica and Antoine Joux
2010/378 ( PDF )
Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
Jin Wang
2010/377 ( PDF )
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
Masahiro Yagisawa
2010/376 ( PS PS.GZ PDF )
Identity Based Online/Offline Signcryption Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2010/375 ( PDF )
Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function
Kota Ideguchi and Elmar Tischhauser and Bart Preneel
2010/374 ( PDF )
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption
Zhen Liu and Zhenfu Cao
2010/373 ( PDF )
Hashing into Hessian Curves
Reza Rezaeian Farashahi
2010/372 ( PS PS.GZ PDF )
Decoding square-free Goppa codes over $\F_p$
Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki
2010/371 ( PDF )
Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
Nicolas Estibals
2010/370 ( PDF )
Finding discrete logarithms with a set orbit distinguisher
Robert P. Gallant
2010/369 ( PDF )
Double Ciphertext Mode : A Proposal for Secure Backup
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez
2010/368 ( PDF )
Round-Optimal Password-Based Authenticated Key Exchange
Jonathan Katz and Vinod Vaikuntanathan
2010/367 ( PDF )
Starfish on Strike
Daniel J. Bernstein and Peter Birkner and Tanja Lange
2010/366 ( PDF )
Oblivious RAM Revisited
Benny Pinkas and Tzachy Reinman
2010/365 ( PDF )
TASTY: Tool for Automating Secure Two-partY computations
Wilko Henecka and Stefan Kögl and Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
2010/364 ( PDF )
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
2010/363 ( PDF )
An Analysis of Affine Coordinates for Pairing Computation
Kristin Lauter and Peter L. Montgomery and Michael Naehrig
2010/362 ( PS PS.GZ PDF )
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
Deng Tang and Weiguo Zhang and Xiaohu Tang
2010/361 ( PDF )
On the Use of Financial Data as a Random Beacon
Jeremy Clark and Urs Hengartner
2010/360 ( PS PS.GZ PDF )
On the Security of Identity Based Threshold Unsigncryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and S.Priti and C.Pandu Rangan
2010/359 ( PDF )
Identity Based Self Delegated Signature - Self Proxy Signatures
S.Sharmila Deva Selvi and S.Sree Vivek and S.Gopinath and C.Pandu Rangan
2010/358 ( PDF )
The Fiat--Shamir Transform for Group and Ring Signature Schemes
M.-F. Lee, N.P. Smart and B. Warinschi
2010/357 ( -- withdrawn -- )
CCA-Secure PRE Scheme without Public Verifiability
Jun Shao and Peng liu and Jian Weng
2010/356 ( PS PS.GZ PDF )
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
Pinaki Sarkar and Amrita Saha and Morshed Udan Chowdhury
2010/355 ( PDF )
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
Bozhan Su and Wenling Wu and Shuang Wu and Le Dong
2010/354 ( PDF )
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
Jean-Luc Beuchat and Jorge Enrique González Díaz and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodríguez-Henríquez and Tadanori Teruya
2010/353 ( PDF )
Cryptographic Pairings Based on Elliptic Nets
Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto
2010/352 ( PDF )
A Digital Signature Using Multivariate Functions on Quaternion Ring
Masahiro Yagisawa
2010/351 ( PDF )
Decentralizing Attribute-Based Encryption
Allison Lewko and Brent Waters
2010/350 ( PS PS.GZ PDF )
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
Vladimir Kolesnikov
2010/349 ( PS PS.GZ PDF )
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
Kenneth Koon-Ho Wong and Gregory V. Bard
2010/348 ( PDF )
Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
A. N. Alekseychuk
2010/347 ( PDF )
Time-Specific Encryption
Kenneth G. Paterson and Elizabeth A. Quaglia
2010/346 ( PDF )
Efficient Generalized Signcryption Schemes
Prashant Kushwah and Sunder Lal
2010/345 ( PDF )
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta
2010/344 ( PDF )
Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
Ezekiel J Kachisa
2010/343 ( PS PS.GZ PDF )
Identity Based Public Verifiable Signcryption Scheme
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2010/342 ( PDF )
Fixed Argument Pairings
Craig Costello and Douglas Stebila
2010/341 ( PDF )
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
Masao Kasahara
2010/340 ( PDF )
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
Jayaprakash Kar and Banshidhar Majhi
2010/339 ( PDF )
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
Jose Bacelar Almeida and Endre Bangerter and Manuel Barbosa and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
2010/338 ( PDF )
Efficient SIMD arithmetic modulo a Mersenne number
Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
2010/337 ( PDF )
Practical-Titled Attack on AES-128 Using Chosen-Text Relations
Vincent Rijmen
2010/336 ( PS PS.GZ PDF )
Efficient Differential Fault Analysis for AES
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2010/335 ( PDF )
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
Patrick Longa, and Catherine Gebotys
2010/334 ( PDF )
Security Proof of AugPAKE
SeongHan Shin and Kazukuni Kobara and Hideki Imai
2010/333 ( -- withdrawn -- )
Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
Zhengjun Cao
2010/332 ( PDF )
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon and Boris Danev and Srdjan Capkun
2010/331 ( PDF )
A Distinguisher for High Rate McEliece Cryptosystems
Jean-Charles Faug\`ere and Val\'erie Gauthier and Ayoub Otmani and Ludovic Perret and Jean-Pierre Tillich
2010/330 ( PS PS.GZ PDF )
Distributed Rational Consensus
Amjed Shareef
2010/329 ( PDF )
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Koji Nuida and Goichiro Hanaoka
2010/328 ( PDF )
Signatures for Multi-source Network Coding
László Czap and István Vajda
2010/327 ( PDF )
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2010/326 ( PDF )
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Daniel Funke and Florian Kerschbaum
2010/325 ( PDF )
Effect of the Dependent Paths in Linear Hull
Zhenli Dai and Meiqin Wang and Yue Sun
2010/324 ( PDF )
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Abdel Alim Kamal and Amr M. Youssef
2010/323 ( PDF )
Security Analysis of SIMD
Charles Bouillaguet and Pierre-Alain Fouque and Gaëtan Leurent
2010/322 ( PDF )
Improved Single-Key Attacks on 8-round AES
Orr Dunkelman and Nathan Keller and Adi Shamir
2010/321 ( PDF )
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
Martin Schläffer
2010/320 ( -- withdrawn -- )
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan and Tor Helleseth
2010/319 ( PS PS.GZ PDF )
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
Jian Weng and Yunlei Zhao
2010/318 ( PS PS.GZ PDF )
Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
Ivan Damgĺrd and Claudio Orlandi
2010/317 ( PDF )
A Note On Gottesman-Chuang Quantum Signature Scheme
Zhengjun Cao
2010/316 ( PDF )
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang
2010/315 ( PDF )
Efficient Techniques for High-Speed Elliptic Curve Cryptography
Patrick Longa and Catherine Gebotys
2010/314 ( PDF )
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
2010/313 ( PS PS.GZ PDF )
Fast Exhaustive Search for Polynomial Systems in $F_2$
Charles Bouillaguet and Chen-Mou Cheng and Tony (Tung) Chou and Ruben Niederhagen and Adi Shamir and Bo-Yin Yang
2010/312 ( PDF )
Security weakness of two authenticated key exchange protocols from pairings
Qingfeng Cheng and Chuangui Ma
2010/311 ( PDF )
Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
J.C. Bajard and S. Duquesne and M. Ercegovac
2010/310 ( -- withdrawn -- )
The analytical property for $\zeta(s)$
Sheng-Ping Wu
2010/309 ( PDF )
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
Raveen R. Goundar and Marc Joye and Atsuko Miyaji
2010/308 ( PDF )
Attacking M&M Collective Signature Scheme
Michal Rjaško and Martin Stanek
2010/307 ( PDF )
Impossible Differential Cryptanalysis of SPN Ciphers
Ruilin Li and Bing Sun and Chao Li
2010/306 ( PDF )
On security of a remote user authentication scheme without using smart cards
He Debiao, Chen Jianhua, Hu Jin
2010/305 ( PDF )
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Marten van Dijk and Ari Juels
2010/304 ( PDF )
Cryptanalysis of the Compression Function of SIMD
Hongbo Yu and Xiaoyun Wang
2010/303 ( PDF )
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
Ran Canetti and Sebastian Gajek
2010/302 ( PDF )
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
Frederik Armknecht and Carsten Elsner and Martin Schmidt
2010/301 ( PDF )
On generalized Feistel networks
Viet Tung Hoang and Phillip Rogaway
2010/300 ( PS PS.GZ PDF )
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai
2010/299 ( PDF )
Faster Fully Homomorphic Encryption
Damien Stehle and Ron Steinfeld
2010/298 ( PDF )
On the Indifferentiability of the Gr{\o}stl Hash Function
Elena Andreeva, Bart Mennink and Bart Preneel
2010/297 ( PDF )
Correlation-Enhanced Power Analysis Collision Attack
Amir Moradi and Oliver Mischke and Thomas Eisenbarth
2010/296 ( PDF )
Hash-based Multivariate Public Key Cryptosystems
WANG Hou-Zhen and ZHANG Huan-Guo
2010/295 ( PDF )
Ideal Key Derivation and Encryption in Simulation-based Security
Ralf Kuesters and Max Tuengerthal
2010/294 ( PDF )
Computing genus 2 curves from invariants on the Hilbert moduli space
Kristin Lauter and Tonghai Yang
2010/293 ( PDF )
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
Jacques Patarin
2010/292 ( PDF )
A Low-Area yet Performant FPGA Implementation of Shabal
Jérémie Detrey and Pierrick Gaudry and Karim Khalfallah
2010/291 ( PDF )
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
He Debiao, Chen Jianhua, Hu Jin
2010/290 ( PDF )
Intractable Problems in Cryptography
Neal Koblitz and Alfred Menezes
2010/289 ( PDF )
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento
2010/288 ( PDF )
Lattice-based Identity-Based Broadcast Encryption Scheme
Jin Wang and Jingguo Bi
2010/287 ( PDF )
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
Jacques Patarin
2010/286 ( PDF )
On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
Sugata Gangopadhyay, Brajesh Kumar Singh
2010/285 ( PDF )
A SAT-based preimage analysis of reduced KECCAK hash functions
Pawel Morawiecki and Marian Srebrny
2010/284 ( PDF )
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
2010/283 ( PDF )
Recursive Information Hiding in Visual Cryptography
Sandeep Katta
2010/282 ( PDF )
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
Kerry A. McKay and Poorvi L. Vora
2010/281 ( PDF )
Protocols for Reliable and Secure Message Transmission
Ashish Choudhury
2010/280 ( PDF )
Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
Arpita Patra
2010/279 ( PDF )
On the Round Complexity of Covert Computation
Vipul Goyal and Abhishek Jain
2010/278 ( PDF )
Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan
2010/277 ( -- withdrawn -- )
Adaptively Secure Broadcast Encryption with Short Ciphertexts
Behzad Malek and Ali Miri
2010/276 ( PDF )
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2010/275 ( PDF )
Position-Based Quantum Cryptography: Impossibility and Constructions
Harry Buhrman, Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky and Christian Schaffner
2010/274 ( PDF )
Online/Offline Identity-Based Signcryption Revisited
Joseph K. Liu, Joonsang Baek and Jianying Zhou
2010/273 ( PDF )
Symmetric States and their Structure: Improved Analysis of CubeHash
Niels Ferguson and Stefan Lucks and Kerry A. McKay
2010/272 ( PDF )
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
Zhimin Chen and Patrick Schaumont
2010/271 ( PDF )
Selecting Parameters for Secure McEliece-based Cryptosystems
Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, and Johannes Buchmann
2010/270 ( PDF )
Factorization of RSA-180
S.A. Danilov and I.A. Popovyan
2010/269 ( PDF )
LAB Form for Iterated Hash Functions
Xigen Yao
2010/268 ( PDF )
Key-Controlled Order-Preserving Encryption
HU Mengke; GAO Juntao
2010/267 ( PDF )
Two improved authenticated multiple key exchange protocols
Feng LIU
2010/266 ( PDF )
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
2010/265 ( PS PS.GZ PDF )
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Jian Weng and Minrong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao
2010/264 ( PDF )
Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
2010/263 ( -- withdrawn -- )
Lattice Reduction and Polynomial Solving
Raphaël Marinier
2010/262 ( PS PS.GZ PDF )
Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
Alan Kaminsky
2010/261 ( PDF )
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
Céline Blondeau and Benoît Gérard
2010/260 ( PDF )
On FPGA-based implementations of Gr\{o}stl
Bernhard Jungk and Steffen Reith
2010/259 ( PS PS.GZ PDF )
Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
Andrey V. Pavlov
2010/258 ( PDF )
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
Ruchi Gode and Sugata Gangopadhyay
2010/257 ( PDF )
Feasible Attack on the 13-round AES-256
Alex Biryukov and Dmitry Khovratovich
2010/256 ( -- withdrawn -- )
On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
2010/255 ( PS PS.GZ PDF )
Automorphism group of the set of all bent functions
Natalia Tokareva
2010/254 ( PDF )
Cryptanalysis of XXTEA
Elias Yarrkov
2010/253 ( PDF )
Separable Hash Functions
Sarang Aravamuthan
2010/252 ( PDF )
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
Zhengping Jin and Qiaoyan Wen and Hua Zhang
2010/251 ( PDF )
Modeling Attacks on Physical Unclonable Functions
Ulrich Rührmair and Frank Sehnke and Jan Sölter and Gideon Dror and Srinivas Devadas and Jürgen Schmidhuber
2010/250 ( PS PS.GZ PDF )
Collusion Free Protocol for Rational Secret Sharing
Amjed Shareef
2010/249 ( PS PS.GZ PDF )
Rational Secret Sharing without Broadcast
Amjed Shareef
2010/248 ( PDF )
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Alex Biryukov and Ivica Nikoli\'c
2010/247 ( PDF )
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
Jia XU
2010/246 ( PDF )
Quantifying Trust
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2010/245 ( PDF )
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
2010/244 ( PDF )
Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
Jia XU
2010/243 ( PDF )
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Senshan Pan and Xiaotong Fu and Weiguo Zhang
2010/242 ( PDF )
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Yang ZHANG and Jun-Liang CHEN
2010/241 ( PDF )
Improved Delegation of Computation using Fully Homomorphic Encryption
Kai-Min Chung and Yael Kalai and Salil Vadhan
2010/240 ( PDF )
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
2010/239 ( PDF )
One-round and authenticated three-party multiple key exchange protocol from parings
Feng LIU
2010/238 ( PS PS.GZ PDF )
Collusion Free Protocol for Correlated Element Selection Problem
Amjed Shareef and Akshay Agrawal and C. Pandu Rangan
2010/237 ( PS PS.GZ PDF )
A New Security Model for Authenticated Key Agreement
Augustin P. Sarr and Philippe Elbaz–Vincent and Jean–Claude Bajard
2010/236 ( PDF )
Accountability: Definition and Relationship to Verifiability
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2010/235 ( PDF )
Attribute-based group key establishment
Rainer Steinwandt and Adriana Suárez Corona
2010/234 ( PDF )
Efficient provable data possession for hybrid clouds
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010/233 ( PDF )
Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Georg Fuchsbauer
2010/232 ( PDF )
On Representable Matroids and Ideal Secret Sharing
Ching-Fang Hsu and Qi Cheng
2010/231 ( PS PS.GZ PDF )
Throughput-Optimal Routing in Unreliable Networks
Paul Bunn and Rafail Ostrovsky
2010/230 ( PDF )
A calculus for game-based security proofs
David Nowak and Yu Zhang
2010/229 ( PDF )
Concurrent composition in the bounded quantum storage model
Dominique Unruh
2010/228 ( PDF )
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis
2010/227 ( PS PS.GZ PDF )
A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
Neal Koblitz
2010/226 ( PDF )
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
Zvika Brakerski and Shafi Goldwasser
2010/225 ( PDF )
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
Junghyun Nam
2010/224 ( PS PS.GZ PDF )
Efficient Implementation of the Orlandi Protocol Extended Version
Thomas P. Jakobsen and Marc X. Makkes and Janus Dam Nielsen
2010/223 ( PDF )
Improved Differential Attacks for ECHO and Grostl
Thomas Peyrin
2010/222 ( PS PS.GZ PDF )
Some Observations on Indifferentiability
Ewan Fleischmann and Michael Gorski and Stefan Lucks
2010/221 ( PDF )
Solving Generalized Small Inverse Problems
Noboru Kunihiro
2010/220 ( PS PS.GZ PDF )
(If) Size Matters: Size-Hiding Private Set Intersection
Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik
2010/219 ( PDF )
Tracker: Security and Privacy for RFID-based Supply Chains
Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
2010/218 ( -- withdrawn -- )
New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
Zhen Wang and Shuqin Fan
2010/217 ( PDF )
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Daniele Perito and Gene Tsudik
2010/216 ( PDF )
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
Zheng Yuan and Xiaoqiu Ren
2010/215 ( PDF )
On the q-Strong Diffie-Hellman Problem
Naoki Tanaka and Taiichi Saito
2010/214 ( PDF )
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
2010/213 ( PDF )
Composable Security Analysis of OS Services
Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Venema
2010/212 ( PDF )
Quantum Proofs of Knowledge
Dominique Unruh
2010/211 ( PDF )
Practical-time Attack on the Full MMB Block Cipher
Keting Jia and Jiazhe Chen and Meiqin Wang and Xiaoyun Wang
2010/210 ( -- withdrawn -- )
Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
Yu Chen
2010/209 ( PDF )
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer
2010/208 ( PDF )
Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
Richard Moloney and Aidan O'Mahony and Pierre Laurent
2010/207 ( PDF )
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Koen Simoens and Roel Peeters and Bart Preneel
2010/206 ( PDF )
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
Long Hoang Nguyen and Andrew William Roscoe
2010/205 ( PDF )
On Protecting Cryptographic Keys Against Continual Leakage
Ali Juma and Yevgeniy Vahlis
2010/204 ( PDF )
Certificateless generalized signcryption
Ji Huifang, Han Wenbao, Zhao Long
2010/203 ( PDF )
Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
Bernard Colbert and Anthony H. Dekker and Lynn Margaret Batten
2010/202 ( PDF )
Robust Combiner for Obfuscators
Amir Herzberg and Haya Shulman
2010/201 ( -- withdrawn -- )
Impossible Differential Cryptanalysis on E2
Yuechuan Wei and Ruilin Li and Ping Li and Chao Li
2010/200 ( PDF )
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Markus Rückert and Michael Schneider and Dominique Schröder
2010/199 ( PDF )
A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
Zeng Bing and Tang Xueming and Chingfang Hsu
2010/198 ( PDF )
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schläffer
2010/197 ( PDF )
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
2010/196 ( PS PS.GZ PDF )
Cryptography Against Continuous Memory Attacks
Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
2010/195 ( PDF )
On E-Vote Integrity in the Case of Malicious Voter Computers
Sven Heiberg, Helger Lipmaa, Filip Van Laenen
2010/194 ( PS PS.GZ PDF )
Identity-Based Online/Offline Key Encapsulation and Encryption
Sherman S.M. Chow and Joseph K. Liu and Jianying Zhou
2010/193 ( PDF )
Speeding Up The Widepipe: Secure and Fast Hashing
Mridul Nandi and Souradyuti Paul
2010/192 ( PDF )
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
2010/191 ( PDF )
On Designated Verifier Signature Schemes
Michal Rjaško and Martin Stanek
2010/190 ( PDF )
J-PAKE: Authenticated Key Exchange Without PKI
Feng Hao and Peter Ryan
2010/189 ( PDF )
New generic algorithms for hard knapsacks
Nick Howgrave-Graham and Antoine Joux
2010/188 ( PS PS.GZ PDF )
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang
2010/187 ( PS PS.GZ PDF )
Certificateless Signcryption without Pairing
Wenjian Xie and Zhang Zhang
2010/186 ( PDF )
New software speed records for cryptographic pairings
Michael Naehrig and Ruben Niederhagen and Peter Schwabe
2010/185 ( PDF )
New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
Wenping Ma, Chen Yang, and Shaohui Sun
2010/184 ( -- withdrawn -- )
Rational Secret Sharing AS Extensive Games
Zhifang Zhang
2010/183 ( PDF )
Preventing Pollution Attacks in Multi-Source Network Coding
Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman
2010/182 ( PDF )
A Simple BGN-type Cryptosystem from LWE
Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
2010/181 ( PDF )
Cryptanalysis of a DoS-resistant ID-based password authentication
He Debiao, Chen Jianhua, Hu Jin
2010/180 ( PS PS.GZ PDF )
The World is Not Enough: Another Look on Second-Order DPA
Francois-Xavier Standaert and Nicolas Veyrat-Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard
2010/179 ( PDF )
A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
Ziran Tu and Yingpu Deng
2010/178 ( PDF )
Identity Based Online/Offline Encryption Scheme
Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
2010/177 ( PDF )
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Robert Granger
2010/176 ( PDF )
A Comparison of Cryptanalytic Tradeoff Algorithms
Jin Hong and Sunghwan Moon
2010/175 ( PDF )
Sanitizable signatures with strong transparency in the standard model
Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan
2010/174 ( PDF )
A Reflection on the Security of Two-Party Key Establishment Protocols
Qiang Tang
2010/173 ( PDF )
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
2010/172 ( PS PS.GZ )
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
Qixiang Mei, Bao Li,Xianhui Lu and Dingding Jia
2010/171 ( PDF )
On Foundation and Construction of Physical Unclonable Functions
Jiang Wu and Maire O'Neill
2010/170 ( PDF )
On a conjecture about binary strings distribution
Jean-Pierre Flori and Hugues Randriambololona and Gérard Cohen and Sihem Mesnager
2010/169 ( PDF )
Dismantling SecureMemory, CryptoMemory and CryptoRF
Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur
2010/168 ( PDF )
A Meet-in-the-Middle Attack on ARIA
Xuehai Tang, Bing Sun, Ruilin Li and Chao Li
2010/167 ( PDF )
Evolutionary Cipher against Differential Power Attack
Tang ming and Meng Qinshu and Zhang Huanguo and Gao Si and Dou Qin and Shen Fei and Li Du
2010/166 ( PDF )
Fault Analysis Study of the Block Cipher FOX64
Ruilin Li and Jianxiong You and Bing Sun and Chao Li
2010/165 ( PDF )
Comment on four two-party authentication protocols
Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
2010/164 ( PDF )
Black-Box Constructions of Protocols for Secure Computation
Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
2010/163 ( PDF )
Golay Complementary Sequences Over the QAM Constellation
Wenping Ma ,Chen Yang and Shaohui Sun
2010/162 ( PS PS.GZ PDF )
1024XKS - A High Security Software Oriented Block Cipher Revisited
Dieter Schmidt
2010/161 ( PDF )
Stange's Elliptic Nets and Coxeter Group F4
Daniel R. L. Brown
2010/160 ( PDF )
A Flaw in The Internal State Recovery Attack on ALPHA-MAC
Shengbao Wu and Mingsheng Wang and Zheng Yuan
2010/159 ( PDF )
Identity-Based Encryption Secure against Selective Opening Attack
Mihir Bellare and Brent Waters and Scott Yilek
2010/158 ( PDF )
A variant of the F4 algorithm
Antoine Joux and Vanessa Vitse
2010/157 ( PDF )
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
Antoine Joux and Vanessa Vitse
2010/156 ( PDF )
Genus 2 Curves with Complex Multiplication
Eyal Z. Goren and Kristin E. Lauter
2010/155 ( PDF )
the upper bounds on differntial characteristics in block cipher SMS4
Zhang MeiLing and Liu JingMei and Wang XinMei
2010/154 ( PDF )
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
2010/153 ( PDF )
Founding Cryptography on Tamper-Proof Hardware Tokens
Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia
2010/152 ( PDF )
Secure and Fast Implementations of Two Involution Ciphers
Billy Bob Brumley
2010/151 ( PDF )
Ring signature with divided private key
Stelian Flonta, Liviu-Cristian Miclea
2010/150 ( PDF )
Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
Mohammad Sadeq Dousti
2010/149 ( PDF )
On Small Subgroup Non-confinement Attack
Feng Hao
2010/148 ( PDF )
Comments on five smart card based password authentication protocols
Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
2010/147 ( PDF )
A New Framework for Password-Based Authenticated Key Exchange
Adam Groce and Jonathan Katz
2010/146 ( PDF )
Some Applications of Lattice Based Root Finding Techniques
Santanu Sarkar and Subhamoy Maitra
2010/145 ( PDF )
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
2010/144 ( PDF )
New Definitions and Separations for Circular Security
David Cash and Matthew Green and Susan Hohenberger
2010/143 ( PDF )
Small Scale Variants Of The Block Cipher PRESENT
Gregor Leander
2010/142 ( PDF )
Mean value formulas for twisted Edwards curves
Dustin Moody
2010/141 ( -- withdrawn -- )
A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
Yu Chen
2010/140 ( PDF )
Improved Agreeing-Gluing Algorithm
Igor Semaev
2010/139 ( PDF )
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2010/138 ( PDF )
On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
Manoj Kumar
2010/137 ( PDF )
Estimating the Security of Lattice-based Cryptosystems
Markus Rückert and Michael Schneider
2010/136 ( PDF )
On Robust Key Agreement Based on Public Key Authentication
Feng Hao
2010/135 ( PS PS.GZ PDF )
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
Aur\'elie Bauer and Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud
2010/134 ( PDF )
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
Masaaki Shirase
2010/133 ( PDF )
Signing on Elements in Bilinear Groups for Modular Protocol Design
Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo
2010/132 ( PS PS.GZ PDF )
On the claimed privacy of EC-RAC III
Junfeng Fan and Jens Hermans and Frederik Vercauteren
2010/131 ( PDF )
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
Jooyoung Lee and John Steinberger
2010/130 ( PDF )
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi
2010/129 ( PDF )
Relation for Algebraic Attack on E0 combiner
N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
2010/128 ( -- withdrawn -- )
Update-Optimal Authenticated Structures Based on Lattices
Charalampos Papamanthou and Roberto Tamassia
2010/127 ( -- withdrawn -- )
CCA-Secure Cryptosystem from Lattice
Chen Huiyan
2010/126 ( PDF )
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Jian-zhu Lu and Jipeng Zhou
2010/125 ( PDF )
Cryptographic Aspects of Real Hyperelliptic Curves
M. J. Jacobson, Jr., R. Scheidler, AND A. Stein
2010/124 ( PDF )
A Hardware Wrapper for the SHA-3 Hash Algorithms
Brian Baldwin and Andrew Byrne and Liang Lu and Mark Hamilton and Neil Hanley and Maire O'Neill and William P. Marnane
2010/123 ( PDF )
Delaying Mismatched Field Multiplications in Pairing Computations
Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
2010/122 ( PDF )
Security of Encryption Schemes in Weakened Random Oracle Models
Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa
2010/121 ( -- withdrawn -- )
Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Chen Huiyan and Li Zichen
2010/120 ( PDF )
Universal One-Way Hash Functions via Inaccessible Entropy
Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee
2010/119 ( -- withdrawn -- )
How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
Huang Lin and Zhenfu Cao and Muxin Zhou and Haojin Zhu
2010/118 ( PDF )
Proposal of a Signature Scheme based on STS Trapdoor
Shigeo Tsujii and Masahito Gotaishi and Kohtaro Tadaki and Ryou Fujita
2010/117 ( PDF )
Cryptographic Agility and its Relation to Circular Encryption
Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash
2010/116 ( PDF )
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
M. Abdelaziz Elaabid and Sylvain Guilley
2010/115 ( PDF )
A Security Evaluation of DNSSEC with NSEC3
Jason Bau, and John C Mitchell
2010/114 ( PDF )
The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
Simon R. Blackburn
2010/113 ( PDF )
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Xu An Wang and Xiaoyuan Yang
2010/112 ( PDF )
CCA-Secure PRE Scheme without Random Oracles
Jun Shao and Zhenfu Cao and Peng Liu
2010/111 ( PDF )
On zero practical significance of “Key recovery attack on full GOST block cipher with zero time and memory”
Vladimir Rudskoy
2010/110 ( PDF )
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Allison Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters
2010/109 ( PDF )
Practical Adaptive Oblivious Transfer from Simple Assumptions
Matthew Green and Susan Hohenberger
2010/108 ( PDF )
Perfectly Secure Oblivious RAM Without Random Oracles
Ivan Damg\aa{}rd and Sigurd Meldgaard and Jesper Buus Nielsen
2010/107 ( PDF )
Adaptive Concurrent Non-Malleability with Bare Public-Keys
Andrew C. Yao and Moti Yung and Yunlei Zhao
2010/106 ( PDF )
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Ivan Damgĺrd and Yuval Ishai and Mikkel Krřigaard
2010/105 ( PDF )
Bias in the nonlinear filter generator output sequence
Sui-Guan Teo and Leonie Simpson and Ed Dawson
2010/104 ( PDF )
Avoiding Full Extension Field Arithmetic in Pairing Computations
Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
2010/103 ( PDF )
The Extended Access Control for Machine Readable Travel Documents
Rafik Chaabouni and Serge Vaudenay
2010/102 ( PDF )
Constructing Verifiable Random Functions with Large Input Spaces
Susan Hohenberger and Brent Waters
2010/101 ( PDF )
Fair Blind Signatures without Random Oracles
Georg Fuchsbauer and Damien Vergnaud
2010/100 ( PDF )
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
Brett Hemenway and Steve Lu and Rafail Ostrovsky
2010/099 ( PDF )
On Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway and Rafail Ostrovsky
2010/098 ( PDF )
A Zero-One Law for Deterministic 2-Party Secure Computation
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2010/097 ( PDF )
Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen and Michael Schneider
2010/096 ( PDF )
Secret Sharing Extensions based on the Chinese Remainder Theorem
Kamer Kaya and Ali Aydın Selçuk
2010/095 ( PDF )
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
Kenneth G. Paterson and Gaven J. Watson
2010/094 ( PDF )
A Random Number Generator Based on Isogenies Operations
He Debiao, Chen Jianhua, Hu Jin
2010/093 ( PDF )
New Impossible Di®erential Attacks on AES
Zheng Yuan
2010/092 ( PS PS.GZ PDF )
Security Weaknesses in Two Certificateless Signcryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2010/091 ( PDF )
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Jean-Philippe Aumasson and Emilia Käsper and Lars Ramkilde Knudsen and Krystian Matusiewicz and Rune Odegaard and Thomas Peyrin and Martin Schläffer
2010/090 ( PDF )
Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})
Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi
2010/089 ( PDF )
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai
2010/088 ( PDF )
An Efficient and Parallel Gaussian Sampler for Lattices
Chris Peikert
2010/087 ( PDF )
MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
Christopher Wolf and Bart Preneel
2010/086 ( PDF )
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
Zvika Brakerski and Yael Tauman Kalai
2010/085 ( PDF )
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El-Khatib and Hussein Mouftah and Eiji Okamoto
2010/084 ( PDF )
Attribute-based Authenticated Key Exchange
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
2010/083 ( PS PS.GZ PDF )
One Round Group Key Exchange with Forward Security in the Standard Model
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
2010/082 ( PDF )
Predicate-Based Key Exchange
James Birkett and Douglas Stebila
2010/081 ( PDF )
The Eris hybrid cipher
Sandy Harris
2010/080 ( PDF )
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
Gergei Bana and Koji Hasebe and Mitsuhiro Okada
2010/079 ( PDF )
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2010/078 ( PDF )
Multiple Bytes Differential Fault Analysis on CLEFIA
Xin-jie ZHAO and Tao WANG and Jing-zhe GAO
2010/077 ( PDF )
ECC2K-130 on Cell CPUs
Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe
2010/076 ( PDF )
Private and Continual Release of Statistics
T-H. Hubert Chan, Elaine Shi, Dawn Song
2010/075 ( PDF )
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
Mehdi Vasef
2010/074 ( PDF )
Concurrent Knowledge Extraction in the Public-Key Model
Andrew C. Yao and Moti Yung and Yunlei Zhao
2010/073 ( PDF )
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook Koo, Yongjin Yeom, and Junghwan Song
2010/072 ( PDF )
Approximating Addition by XOR: how to go all the way
Didier Alqui\'e
2010/071 ( PDF )
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
Didier Alqui\'e
2010/070 ( PDF )
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
Markus Rückert
2010/069 ( PDF )
Type-II Optimal Polynomial Bases
Daniel J. Bernstein and Tanja Lange
2010/068 ( PDF )
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Rosario Gennaro and Hugo Krawczyk and Tal Rabin
2010/067 ( PDF )
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Ernie Brickell and Jiangtao Li
2010/066 ( PDF )
Some Observations on TWIS Block Cipher
Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li
2010/065 ( PDF )
An Anonymous ID-based Encryption Revisited
Zhengjun Cao
2010/064 ( PDF )
New Advances on Privacy-Preserving Policy Reconciliation
Ulrike Meyer and Susanne Wetzel and Sotiris Ioannidis
2010/063 ( PDF )
Differential Fault Analysis on SMS4 Using a Single Fault
Ruilin Li and Bing Sun and Chao Li and Jianxiong You
2010/062 ( PDF )
Differential Cryptanalysis of SMS4 Block Cipher
Bozhan Su and Wenling Wu and Wentao Zhang
2010/061 ( PDF )
Privacy-Preserving Matching Protocols for Attributes and Strings
Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu and Jyh-Charn Liu
2010/060 ( PDF )
Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
Yongge Wang
2010/059 ( PDF )
A New Framework for RFID Privacy
Robert H. Deng, Yingjiu Li, Andrew C. Yao and Moti Yung and Yunlei Zhao
2010/058 ( PDF )
Solinas primes of small weight for fixed sizes
Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna
2010/057 ( PDF )
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Cagdas Calik and Meltem Sonmez Turan
2010/056 ( PDF )
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Xin-jie ZHAO and Tao WANG
2010/055 ( PDF )
Credential Authenticated Identification and Key Exchange
Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup
2010/054 ( PDF )
An Improved Timing Attack with Error Detection on RSA-CRT
Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
2010/053 ( PDF )
Logical cryptoanalysis on the example of the cryptosystem DES
A.D. Plotnikov
2010/052 ( -- withdrawn -- )
Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
FuShan Wei and QingFeng Cheng and ChuanGui Ma
2010/051 ( PDF )
A Principle for Cryptographic Protocols Beyond Security, Less Parameters
Zhengjun Cao
2010/050 ( PS PS.GZ PDF )
Authenticating Aggregate Range Queries over Multidimensional Dataset
Jia XU and Ee-Chien CHANG
2010/049 ( PS PS.GZ PDF )
On Symmetric Encryption and Point Obfuscation
Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs
2010/048 ( -- withdrawn -- )
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
He Debiao; Chen Jianhua; Hu Jin
2010/047 ( PDF )
Lower Bounds for Straight Line Factoring
Daniel R. L. Brown
2010/046 ( -- withdrawn -- )
A New Chaos-Based Cryptosystem for Secure Transmitted Images
2010/045 ( -- withdrawn -- )
Efficient chaotic permutations for image encryption algorithms
2010/044 ( -- withdrawn -- )
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
2010/043 ( PDF )
Differential and invertibility properties of BLAKE (full version)
Jean-Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier
2010/042 ( PDF )
A modified eCK model with stronger security for tripartite authenticated key exchange
Qingfeng Cheng and Chuangui Ma and Fushan Wei
2010/041 ( PDF )
The Effects of the Omission of Last Round's MixColumns on AES
Orr Dunkelman and Nathan Keller
2010/040 ( PDF )
Batch Groth-Sahai
Olivier Blazy and Georg Fuchsbauer and Malika Izabachčne and Amandine Jambert and Hervé Sibert and Damien Vergnaud
2010/039 ( PDF )
On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
Xiwang Cao and Lei Hu
2010/038 ( PDF )
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
Arnaud Boscher and Helena Handschuh and Elena Trichina
2010/037 ( PDF )
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Pierre-Alain Fouque and Mehdi Tibouchi
2010/036 ( -- withdrawn -- )
An Enhanced Remote User Authentication Scheme
Keerti Srivastava and Amit K Awasthi and R.C.Mittal
2010/035 ( PDF )
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro Hanaoka and Kaoru Kurosawa
2010/034 ( PDF )
On the order of the polynomial $x^p-x-a$
Xiwang Cao
2010/033 ( PDF )
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup
2010/032 ( PDF )
An Information Theoretic Perspective on the Differential Fault Analysis against AES
Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta
2010/031 ( PDF )
Class Invariants by the CRT Method
Andreas Enge and Andrew V. Sutherland
2010/030 ( PDF )
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
Simon R. Blackburn and Douglas R. Stinson and Jalaj Upadhyay
2010/029 ( PDF )
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
2010/028 ( PDF )
A secure anonymous communication scheme in vehicular ad hoc networks from pairings
*Jue-Sam Chou 1, Yalin Chen 2
2010/027 ( PDF )
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
Yalin Chen1, *Jue-Sam Chou2, Xian-Wu Hou3
2010/026 ( PDF )
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
Xin-jie Zhao and Tao Wang
2010/025 ( PDF )
New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
Jiqiang Lu
2010/024 ( PDF )
Authentication schemes from actions on graphs, groups, or rings
Dima Grigoriev and Vladimir Shpilrain
2010/023 ( PDF )
Differential Fault Analysis on AES with 192 and 256-Bit Keys
Junko Takahashi and Toshinori Fukunaga
2010/022 ( PDF )
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
2010/021 ( PDF )
A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong
2010/020 ( PS PS.GZ PDF )
Number of Jacobi quartic curves over finite fields
Rongquan Feng, Hongfeng Wu
2010/019 ( PDF )
Related-Key Boomerang and Rectangle Attacks
Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller
2010/018 ( PDF )
Scalability and Security Conflict for RFID Authentication Protocols
Imran Erguler and Emin Anarim
2010/017 ( PS PS.GZ PDF )
A new one-time signature scheme from syndrome decoding
Paulo S. L. M. Barreto and Rafael Misoczki
2010/016 ( PDF )
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang
2010/015 ( PDF )
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Jorge Guajardo and Bart Mennink
2010/014 ( PDF )
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
Mridul Nandi
2010/013 ( PDF )
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
Orr Dunkelman and Nathan Keller and Adi Shamir
2010/012 ( PS PS.GZ PDF )
Differential Cache Trace Attack Against CLEFIA
Chester Rebeiro and Debdeep Mukhopadhyay
2010/011 ( -- withdrawn -- )
Related Key Cryptanalysis of the LEX Stream Cipher
Mainack Mondal and Debdeep Mukhopadhyay
2010/010 ( PDF )
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta
2010/009 ( PDF )
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
Xuelian Li and Yupu Hu and Juntao Gao
2010/008 ( PS PS.GZ PDF )
A DAA Scheme Requiring Less TPM Resources
Liqun Chen
2010/007 ( PDF )
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2010/006 ( PDF )
Factorization of a 768-bit RSA modulus
Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
2010/005 ( PDF )
Skew-Frobenius map on twisted Edwards curve
Mingqiang Wang, Xiaoyun Wang,Tao Zhan, Yuliang Zheng
2010/004 ( PS PS.GZ PDF )
Halving on Binary Edwards Curves
Qiping Lin and Fangguo Zhang
2010/003 ( PDF )
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
2010/002 ( PDF )
Practical ID-based Encryption for Wireless Sensor Network
Cheng-Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng
2010/001 ( PDF )
Transfinite Cryptography
Jacques Patarin

[ Cryptology ePrint archive ]