Cryptology ePrint Archive: Search Results

2013/310 ( PDF )
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange
2013/309 ( PDF )
Bypassing Passkey Authentication in Bluetooth Low Energy
Tomas Rosa
2013/308 ( PDF )
Lattice-Based Group Signatures with Logarithmic Signature Size
Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle
2013/307 ( PDF )
Maliciously Circuit-private FHE
Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky
2013/306 ( PDF )
Solving a $6120$-bit DLP on a Desktop Computer
Faruk G\"olo\u{g}lu and Robert Granger and Gary McGuire and Jens Zumbr\"agel
2013/305 ( PDF )
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich
2013/304 ( PDF )
Secure PRNG Seeding on Commerial-of-the-Shelf Microcontrollers
Anthony Van Herrewege and Vincent van der Leest and Andr\'e Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede
2013/303 ( PDF )
Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions
Shivam Bhasin and Claude Carlet and Sylvain Guilley
2013/302 ( PDF )
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors
Nicolas T. Courtois
2013/301 ( PDF )
Impossible Differential-Linear Cryptanalysis of Full-Round CLEFIA-128
Zheng Yuan and Xian Li and Haixia Liu
2013/300 ( PDF )
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups
Allison Lewko and Sarah Meiklejohn
2013/299 ( PDF )
Computing class polynomials for abelian surfaces
Andres Enge and Emmanuel Thomé
2013/298 ( PDF )
A Comparison of Statistical Techniques for Detecting Side-Channel Information Leakage in Cryptographic Devices
Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin W\'{o}jcik
2013/297 ( PDF )
Improvement and Efficient Implementation of a Lattice-based Signature Scheme
Rachid El Bansarkhani and Johannes Buchmann
2013/296 ( PDF )
Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
Morten Dahl and Ivan Damgård
2013/295 ( PDF )
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
Micka\"el Cazorla and Kevin Marquet and Marine Minier
2013/294 ( PDF )
Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis
Colin O'Flynn and Zhizhang (David) Chen
2013/293 ( PDF )
A Toolkit for Ring-LWE Cryptography
Vadim Lyubashevsky and Chris Peikert and Oded Regev
2013/292 ( PDF )
A Leakage Resilient MAC
Dan Martin and Elisabeth Oswald and Martijn Stam
2013/291 ( PDF )
On Diffie-Hellman–like Security Assumptions
Antoine Joux and Antoine Rojat
2013/290 ( PDF )
Massive Group Message Authentication with Revocable Anonymity
Boaz Catane and Amir Herzberg
2013/289 ( PDF )
Secure Second Price Auctions with a Rational Auctioneer
Boaz Catane and Amir Herzberg
2013/288 ( PDF )
Key Classification Attack on Block Ciphers
Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi
2013/287 ( PDF )
The failure of McEliece PKC based on Reed-Muller codes.
I. V. Chizhov and M. A. Borodin
2013/286 ( PDF )
Salvaging Indifferentiability in a Multi-stage Setting
Arno Mittelbach
2013/285 ( PDF )
A Novel Proof on Weil Pairing
Sutirtha Sanyal
2013/284 ( PDF )
A Secure Paper-Based Electronic Voting With No Encryption
Asghar Tavakkoli, Reza Ebrahimi Atani
2013/283 ( PDF )
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
Dan Boneh and Ananth Raghunathan and Gil Segev
2013/282 ( PDF )
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
Goutam Paul and Anupam Chattopadhyay
2013/281 ( PDF )
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit
2013/280 ( PDF )
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas
2013/279 ( PDF )
Pinocchio: Nearly Practical Verifiable Computation
Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova
2013/278 ( PDF )
A Frequency Leakage Model and its application to CPA and DPA
S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine
2013/277 ( PDF )
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo
2013/276 ( PDF )
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
David Bernhard and Stephan Neumann and Melanie Volkamer
2013/275 ( PDF )
The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures
Johannes Braun and Gregor Rynkowski
2013/274 ( PDF )
A time series approach for profiling attack
Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch
2013/273 ( PDF )
Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions
Deepak Kumar Dalai
2013/272 ( PDF )
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
2013/271 ( PDF )
The Legal Classification of Identity-Based Signatures
Christoph Sorge
2013/270 ( PDF )
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters
Yu Yu
2013/269 ( PDF )
Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
2013/268 ( PDF )
Dynamic Cube Attack on Grain-v1
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref
2013/267 ( PDF )
Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee
2013/266 ( PDF )
L-P States of RC4 Stream Cipher
Jing Lv and Dongdai Lin
2013/265 ( PDF )
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger and Brent Waters
2013/264 ( PDF )
Encrypted Secret Sharing and Analysis by Plaintext Randomization
Stephen R. Tate and Roopa Vishwanathan and Scott Weeks
2013/263 ( PDF )
Speeding up QUAD
Albrecht Petzoldt
2013/262 ( PDF )
An efficient FHE based on the hardness of solving systems of non-linear multivariate equations
Gérald Gavin
2013/261 ( PDF )
Secure information transmission based on physical principles
Dima Grigoriev and Vladimir Shpilrain
2013/260 ( PDF )
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung and Edward Lui and Rafael Pass
2013/259 ( PDF )
Private Interactive Communication Across an Adversarial Channel
Ran Gelles and Amit Sahai and Akshay Wadia
2013/258 ( PDF )
Witness Encryption and its Applications
Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
2013/257 ( PDF )
Secure two-party computation: a visual way
Paolo D'Arco and Roberto De Prisco
2013/256 ( PDF )
On the Lossiness of the Rabin Trapdoor Function
Yannick Seurin
2013/255 ( PDF )
How to Construct an Ideal Cipher from a Small Set of Public Permutations
Rodolphe Lampe and Yannick Seurin
2013/254 ( PDF )
Towards Adoption of DNSSEC: Availability and Security Challenges
Amir Herzberg and Haya Shulman
2013/253 ( PDF )
CacheAudit: A Tool for the Static Analysis of Cache Side Channels
Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke
2013/252 ( PDF )
On the Primitivity of some Trinomials over Finite Fields
LI Yujuan, WANG Huaifu, ZHAO Jinhua
2013/251 ( PDF )
Permutation Polynomials and Their Differential Properties over Residue Class Rings
Yuyin Yu and Mingsheng Wang
2013/250 ( PDF )
Fully Homomorphic Encryption for Mathematicians
Alice Silverberg
2013/249 ( PDF )
How to Factor N_1 and N_2 When p_1=p_2 mod 2^t
Kaoru Kurosawa and Takuma Ueda
2013/248 ( PDF )
Another Look at Security Theorems for 1-Key Nested MACs
Neal Koblitz and Alfred Menezes
2013/247 ( PDF )
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction
Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu
2013/246 ( PDF )
A Lever Function to a New Codomain with Adequate Indeterminacy
Shenghui Su and Maozhi Xu and Shuwang Lu
2013/245 ( PDF )
The Fiat-Shamir Transformation in a Quantum World
Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni
2013/244 ( PDF )
Cryptographic schemes, key exchange, public key.
Ted Hurley
2013/243 ( PDF )
A Simple ORAM
Kai-Min Chung and Rafael Pass
2013/242 ( PDF )
AE5 Security Notions: Definitions Implicit in the CAESAR Call
Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton
2013/241 ( PDF )
The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
Joachim Strömbergson and Simon Josefsson
2013/240 ( PDF )
Algebraic analysis of Trivium-like ciphers
Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson
2013/239 ( PDF )
Optimizing ORAM and Using it Efficiently for Secure Computation
Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs
2013/238 ( PDF )
Anonymity-preserving Public-Key Encryption: A Constructive Approach
Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi
2013/237 ( PDF )
Type-Based Analysis of Generic Key Management APIs (Long Version)
Pedro Adão and Riccardo Focardi and Flaminia L. Luccio
2013/236 ( PDF )
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security
Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo
2013/235 ( PDF )
Ballot secrecy and ballot independence coincide
Ben Smyth and David Bernhard
2013/234 ( PDF )
A Cryptographic Analysis of OPACITY
Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete
2013/233 ( PDF )
Attacks on JH, Grøstl and SMASH Hash Functions
Yiyuan Luo and Xuejia Lai
2013/232 ( PDF )
Quantum algorithm to check Resiliency of a Boolean function
Kaushik Chakraborty and Subhamoy Maitra
2013/231 ( PDF )
Sakura: a flexible coding for tree hashing
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2013/230 ( PDF )
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo
2013/229 ( PDF )
Overcoming the Worst-Case Curse for Cryptographic Constructions
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
2013/228 ( PDF )
Public-Key Revocation and Tracing Schemes with Subset Difference Methods
Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park
2013/227 ( PDF )
Analysis of authentication and key establishment in inter-generational mobile telephony
Chunyu Tang and David A. Naumann and Susanne Wetzel
2013/226 ( PDF )
Public key exchange using semidirect product of (semi)groups
Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
2013/225 ( PDF )
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Mohammad Etemad and Alptekin Küpçü
2013/224 ( PDF )
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater
2013/223 ( PDF )
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security
Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
2013/222 ( PDF )
Tight security bounds for key-alternating ciphers
Shan Chen, John Steinberger
2013/221 ( PDF )
Identity-based Aggregate Signatures with Verifiable Single Ones
Yang Zhang, Jun-liang Chen
2013/220 ( PDF )
Towards Efficient Private Distributed Computation on Unbounded Input Streams
Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky
2013/219 ( PDF )
Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes
Stefan G. Weber
2013/218 ( PDF )
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves
Aurore Guillevic
2013/217 ( PDF )
Computing on Authenticated Data for Adjustable Predicates
Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein
2013/216 ( PDF )
Election Verifiability or Ballot Privacy: Do We Need to Choose?
Edouard Cuvelier and Olivier Pereira and Thomas Peters
2013/215 ( PDF )
Optical PUFs Reloaded
Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek
2013/214 ( PDF )
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora
2013/213 ( PDF )
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption
Guangjun Fan and Yongbin Zhou and F.-X. Standaert and Dengguo Feng
2013/212 ( PDF )
A Closer Look at HMAC
Krzysztof Pietrzak
2013/211 ( PDF )
A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)
Christina Boura and Anne Canteaut
2013/210 ( PDF )
Cryptophia's Short Combiner for Collision-Resistant Hash Functions
Arno Mittelbach
2013/209 ( PDF )
New modular multiplication and division algorithms based on continued fraction expansion
Mourad Gouicem
2013/208 ( PDF )
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou
2013/207 ( PDF )
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng
2013/206 ( PDF )
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation
Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko
2013/205 ( PDF )
Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$
Jan Camenisch and Robert R. Enderlein and Victor Shoup
2013/204 ( PDF )
Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture
Shi Pu, Jyh-Charn Liu
2013/203 ( PDF )
From oblivious AES to efficient and secure database join in the multiparty setting
Sven Laur and Riivo Talviste and Jan Willemson
2013/202 ( PDF )
Breaking NLM-MAC Generator
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
2013/201 ( PDF )
Non-malleable Codes from Additive Combinatorics
Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett
2013/200 ( PDF )
Selecting polynomials for the Function Field Sieve
Razvan Barbulescu
2013/199 ( PDF )
Quantum algorithms for the subset-sum problem
Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer
2013/198 ( PDF )
On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes
Zhizhou Li and Ten H. Lai
2013/197 ( PDF )
Discrete logarithm in GF(2^809) with FFS
Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann
2013/196 ( PDF )
Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen
2013/195 ( PDF )
On the (re)design of an FPGA-based PUF
Philipp Grabher and Dan Page and Marcin Wójcik
2013/194 ( PDF )
On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses
Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth
2013/193 ( PDF )
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes
Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng
2013/192 ( PDF )
A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties
David Lubicz and Damien Robert
2013/191 ( PDF )
Improved Differential Fault Analysis on ARIA using Small Number of Faults
Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong
2013/190 ( PDF )
Power Analysis Attacks against FPGA Implementations of KLEIN
Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong
2013/189 ( PDF )
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes
Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah
2013/188 ( PDF )
A family of 6-to-4-bit S-boxes with large linear branch number
Daniel Loebenberger and Michael Nüsken
2013/187 ( PDF )
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo
2013/186 ( PDF )
On the (Im)possibility of Projecting Property in Prime-Order Setting
Jae Hong Seo
2013/185 ( PDF )
Security Analysis of Linearly Filtered NLFSRs
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett
2013/184 ( PDF )
The Vernam cipher is robust to small deviations from randomness
Boris Ryabko
2013/183 ( PDF )
Practical Multilinear Maps over the Integers
Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi
2013/182 ( PDF )
Collusion-Resistant Domain-Specific Pseudonymous Signatures
Julien Bringer and Herve Chabanne and Alain Patey
2013/181 ( PDF )
On the evaluation of modular polynomials
Andrew V. Sutherland
2013/180 ( PDF )
A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code
Masao KASAHARA
2013/179 ( PDF )
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2013/178 ( PDF )
Cryptanalysis of RC4(n,m) Stream Cipher
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
2013/177 ( PDF )
A generic construction for voting correctness at minimum cost - Application to Helios
Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene
2013/176 ( PDF )
Distinguishing Attacks on RC4 and A New Improvement of the Cipher
Jing Lv and Bin Zhang and Dongdai Lin
2013/175 ( PDF )
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano
2013/174 ( PDF )
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key
Deukjo Hong and Daesung Kwon
2013/173 ( PDF )
On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"
Ray Perlner and Daniel Smith-Tone
2013/172 ( PDF )
On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)
Raphael Spreitzer and Thomas Plos
2013/171 ( PDF )
Confined Guessing: New Signatures From Standard Assumptions
Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks
2013/170 ( PDF )
Fast Collision Attack on MD5
Tao Xie and Fanbao Liu and Dengguo Feng
2013/169 ( PDF )
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner
2013/168 ( PDF )
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Simon Hoerder and Kimmo Järvinen and Dan Page
2013/167 ( PDF )
Single Password Authentication
Tolga Acar and Mira Belenkiy and Alptekin Küpçü
2013/166 ( PDF )
On generalized semi-bent (and partially bent) Boolean functions
Brajesh Kumar Singh
2013/165 ( PDF )
A New Security and Privacy Framework for RFID In Cloud Computing
Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi
2013/164 ( PDF )
Provably Secure LWE-Encryption with Uniform Secret
Daniel Cabarcas and Florian Göpfert and Patrick Weiden
2013/163 ( PDF )
Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions
Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan
2013/162 ( PDF )
A Non Asymptotic Analysis of Information Set Decoding
Yann Hamdaoui and Nicolas Sendrier
2013/161 ( PDF )
Completeness Theorems for All Finite Stateless 2-Party Primitives
Daniel Kraschewski
2013/160 ( PDF )
Interactive Coding, Revisited
Kai-Min Chung and Rafael Pass and Sidharth Telang
2013/159 ( PDF )
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme
Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei
2013/158 ( PDF )
Keep Calm and Stay with One (and p>3)
Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez
2013/157 ( PDF )
The fragility of AES-GCM authentication algorithm
Shay Gueron and Vlad Krasnov
2013/156 ( PDF )
Incentivizing Outsourced Computation
Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya
2013/155 ( PDF )
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions
Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
2013/154 ( PDF )
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes
Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen
2013/153 ( PDF )
On the security of a certi cateless signature scheme in the standard model
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang
2013/152 ( PDF )
Policy-based Secure Deletion
Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti
2013/151 ( PDF )
Some Fixes To SSH
Xu ZiJie
2013/150 ( PS PS.GZ PDF )
Practical (Second) Preimage Attacks on TCS_SHA-3
Gautham Sekar and Soumyadeep Bhattacharya
2013/149 ( PDF )
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication
Jiawei Yuan and Shucheng Yu
2013/148 ( PDF )
AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
Alexander Rostovtsev
2013/147 ( PDF )
A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms
Naomi Benger and Manuel Charlemagne and Kefei Chen
2013/146 ( PDF )
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition
Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
2013/145 ( PDF )
Key Wrapping with a Fixed Permutation
Dmitry Khovratovich
2013/144 ( PDF )
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
2013/143 ( PDF )
An architecture for practical actively secure MPC with dishonest majority
Marcel Keller and Peter Scholl and Nigel P. Smart
2013/142 ( PDF )
A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES
Kisoon YOON
2013/141 ( PDF )
Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton
M. Shakiba and M. Dakhilalian and H. Mala
2013/140 ( PDF )
Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures
Marc Fischlin and Nils Fleischhacker
2013/139 ( PDF )
Rethinking Definitions of Security for Session Key Agreement
Wesley George and Charles Rackoff
2013/138 ( PDF )
Multi-bit homomorphic encryption based on learning with errors over rings
Zhang Wei, Liu Shuguang, Yang Xiaoyuan
2013/137 ( PDF )
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
Payman Mohassel and Saeed Sadeghian
2013/136 ( PDF )
2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers
Dieter Schmidt
2013/135 ( PDF )
An MQ/Code Cryptosystem Proposal
Leonard J. Schulman
2013/134 ( PDF )
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields
Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III
2013/133 ( PDF )
New Lattice Based Signature Using The Jordan Normal Form
Hemlata Nagesh and Birendra Kumar Sharma
2013/132 ( PDF )
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
Niu Liu and Shaohua Tang and Lingling Xu
2013/131 ( PDF )
Two is the fastest prime
Thomaz Oliveira and Juilo López and Diego F. Aranha and Francisco Rodríguez-Henríquez
2013/130 ( PDF )
Blank Digital Signatures
Christian Hanser and Daniel Slamanig
2013/129 ( PDF )
An Ideal-Security Protocol for Order-Preserving Encoding
Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich
2013/128 ( PDF )
Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters
2013/127 ( PDF )
Oblivious PAKE and Efficient Handling of Password Trials
Franziskus Kiefer and Mark Manulis
2013/126 ( PDF )
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
Aysajan Abidin and Jan-Åke Larsson
2013/125 ( PDF )
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Ananth Raghunathan and Gil Segev and Salil Vadhan
2013/124 ( PDF )
Tamper Resilient Cryptography Without Self-Destruct
Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi
2013/123 ( PDF )
Analysis and Improvement of Lindell's UC-Secure Commitment Schemes
Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2013/122 ( PDF )
Practical collision attack on 40-step RIPEMD-128
Gaoli Wang
2013/121 ( PDF )
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
Helger Lipmaa
2013/120 ( PDF )
An Attack Against Fixed Value Discrete Logarithm Representations
Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks
2013/119 ( PDF )
Speeding up Ate Pairing Computation in Affine Coordinates
Duc-Phong Le and Chik How Tan
2013/118 ( PDF )
Throughput Optimized Implementations of QUAD
Jason R. Hamlet and Robert W. Brocato
2013/117 ( PDF )
On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s
Namhun Koo and Gook Hwa Cho and Soonhak Kwon
2013/116 ( PDF )
The Algorithm of AAES
Shiyong Zhang and Gongliang Chen and Lei Fan
2013/115 ( PDF )
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang
2013/114 ( PDF )
Public Key Exchange Using Matrices Over Group Rings
Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain
2013/113 ( PDF )
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
2013/112 ( PDF )
PUF Modeling Attacks on Simulated and Silicon Data
Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas
2013/111 ( PDF )
Message Authentication Codes Secure against Additively Related-Key Attacks
Keita Xagawa
2013/110 ( PDF )
Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov and Yehuda Lindell and Tal Rabin
2013/109 ( PS PS.GZ PDF )
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Charanjit S. Jutla and Arnab Roy
2013/108 ( PDF )
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
Ivan Damgard and Alessandra Scafuro
2013/107 ( PDF )
On the Arithmetic Complexity of Strassen-Like Matrix Multiplications
Murat Cenk and M. Anwar Hasan
2013/106 ( -- withdrawn -- )
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme
Roohallah Rastaghi
2013/105 ( PDF )
Lossy Chains and Fractional Secret Sharing
Yuval Ishai and Eyal Kushilevitz and Omer Strulovich
2013/104 ( PDF )
A Tutorial on White-box AES
James A. Muir
2013/103 ( PDF )
On the Complexity of Broadcast Setup
Martin Hirt and Pavel Raykov
2013/102 ( PDF )
On the Negative Effects of Trend Noise and Its Applications in Side-Channel Cryptanalysis
Yuchen Cao, Yongbin Zhou and Zhenmei Yu
2013/101 ( PDF )
Notions of Black-Box Reductions, Revisited
Paul Baecher and Christina Brzuska and Marc Fischlin
2013/100 ( PDF )
Attacks and Comments on Several Recently Proposed Key Management Schemes
Niu Liu and Shaohua Tang and Lingling Xu
2013/099 ( PDF )
Secure Two-Party Computation via Leaky Generalized Oblivious Transfer
Samuel Ranellucci and Alain Tapp
2013/098 ( PDF )
Learning with Rounding, Revisited: New Reduction, Properties and Applications
Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs
2013/097 ( PDF )
Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher
Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref
2013/096 ( PDF )
State convergence in bit-based stream ciphers
Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson
2013/095 ( PDF )
A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic
Antoine Joux
2013/094 ( PDF )
On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
2013/093 ( PDF )
On the security of a certificateless aggregate signature scheme
Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou
2013/092 ( PDF )
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
Vadim Lyubashevsky and Daniel Masny
2013/091 ( PDF )
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test based Side-Channel Distinguishers
Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang
2013/090 ( -- withdrawn -- )
Functional Encryption Supporting Recursive Languages
Somindu C. Ramanna and Palash Sarkar
2013/089 ( PDF )
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin and John A. Clark
2013/088 ( PDF )
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World
Dan Boneh and Mark Zhandry
2013/087 ( PDF )
Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))
Namhun Koo and Gook Hwa Cho and Soonhak Kwon
2013/086 ( PDF )
Efficient Private File Retrieval by Combining ORAM and PIR
Travis Mayberry and Erik-Oliver Blass and Agnes Chan
2013/085 ( PDF )
Between a Rock and a Hard Place: Interpolating Between MPC and FHE
Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart
2013/084 ( PDF )
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks
Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse
2013/083 ( PDF )
A Security Framework for Analysis and Design of Software Attestation
Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann
2013/082 ( PDF )
Secret Sharing, Rank Inequalities and Information Inequalities
Sebastia Martin and Carles Padro and An Yang
2013/081 ( PDF )
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Yan Huang and Jonathan Katz and Dave Evans
2013/080 ( PDF )
An efficient attack of a McEliece cryptosystem variant based on convolutional codes
Grégory Landais and Jean-Pierre Tillich
2013/079 ( PDF )
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
2013/078 ( PDF )
Broadcast Steganography
Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera
2013/077 ( PDF )
UC-Secure Multi-Session OT Using Tamper-Proof Hardware
Kaoru Kurosawa and Ro Nojima and Le Trieu Phong
2013/076 ( PDF )
Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
Ling Ren and Xiangyao Yu and Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas
2013/075 ( PDF )
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig
2013/074 ( PDF )
On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$
Faruk Gologlu and Robert Granger and Gary McGuire and Jens Zumbragel
2013/073 ( PDF )
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek and Florian Kerschbaum and Claudio Orlandi
2013/072 ( PDF )
The UC approach: an application view
István Vajda
2013/071 ( PDF )
Relation collection for the Function Field Sieve
Jérémie Detrey and Pierrick Gaudry and Marion Videau
2013/070 ( PDF )
Related-key Attacks Against Full Hummingbird-2
Markku-Juhani O. Saarinen
2013/069 ( PDF )
Hardness of SIS and LWE with Small Parameters
Daniele Micciancio and Chris Peikert
2013/068 ( PDF )
Why Proving HIBE Systems Secure is Difficult
Allison Lewko and Brent Waters
2013/067 ( PDF )
Power Analysis of Hardware Implementations Protected with Secret Sharing
Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche
2013/066 ( PDF )
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref
2013/065 ( PDF )
Instantiating Treeless Signature Schemes
Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann
2013/064 ( PDF )
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
Sven Laur and Bingsheng Zhang
2013/063 ( PDF )
A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol
Christian L. F. Corniaux and Hossein Ghodosi
2013/062 ( PDF )
Symbolic Universal Composability
Florian Böhl and Dominique Unruh
2013/061 ( PS PS.GZ PDF )
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger
2013/060 ( PDF )
On FHE without bootstrapping
Aayush Jain
2013/059 ( PDF )
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay
2013/058 ( PDF )
Cryptanalysis of the Dragonfly Key Exchange Protocol
Dylan Clarke and Feng Hao
2013/057 ( PDF )
CRT-based Fully Homomorphic Encryption over the Integers
Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon
2013/056 ( PDF )
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
Kishan Chand Gupta and Indranil Ghosh Ray
2013/055 ( PDF )
Secrecy without one-way functions
Dima Grigoriev and Vladimir Shpilrain
2013/054 ( PDF )
Joint Compartmented Threshold Access Structures
Ali Aydın Selçuk and Ramazan Yılmaz
2013/053 ( PDF )
A revocable certificateless signature scheme
Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng
2013/052 ( PDF )
Some Complexity Results and Bit Unpredictable for Short Vector Problem
Kuan Cheng
2013/051 ( PDF )
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation
Payman Mohassel and Ben Riva
2013/050 ( PS PS.GZ PDF )
Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem
Roohallah Rastaghi
2013/049 ( PDF )
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
Christopher Meyer and Jörg Schwenk
2013/048 ( PDF )
Power Balanced Circuits for Leakage-Power-Attacks Resilient Design
Basel Halak, Julian Murphy, Alex Yakovlev
2013/047 ( PDF )
Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes
Carles Padro
2013/046 ( PDF )
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
2013/045 ( PDF )
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Jiawei Yuan and Shucheng Yu
2013/044 ( PDF )
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions
Fangguo Zhang and Xu Ma and Shengli Liu
2013/043 ( PDF )
Differential Fault Attack on the PRINCE Block Cipher
Ling Song and Lei Hu
2013/042 ( PDF )
Complexity of Multi-Party Computation Functionalities
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2013/041 ( PDF )
Trace Expression of r-th Root over Finite Field
Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
2013/040 ( PDF )
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Roohallah Rastaghi
2013/039 ( PDF )
Creating a Challenge for Ideal Lattices
Thomas Plantard and Michael Schneider
2013/038 ( PDF )
Verifiable Data Streaming
Dominique Schröder and Heike Schröder
2013/037 ( PDF )
Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles
Jayaprakash Kar
2013/036 ( PDF )
Batch Fully Homomorphic Encryption over the Integers
Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi
2013/035 ( PDF )
Improvements to NFC Mobile Transaction and Authentication Protocol
Muhammad Qasim Saeed
2013/034 ( PDF )
New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange
Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2013/033 ( PDF )
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems
Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
2013/032 ( PDF )
Detection of Cheaters in Non-interactive Polynomial Evaluation
Maki Yoshida and Satoshi Obana
2013/031 ( PDF )
An Analysis of the EMV Channel Establishment Protocol
Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson
2013/030 ( PDF )
On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks
Haiyan Sun
2013/029 ( PDF )
A Differential Fault Attack on MICKEY 2.0
Subhadeep Banik and Subhamoy Maitra
2013/028 ( PDF )
More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96
Stanislav Bulygin
2013/027 ( PDF )
Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol
Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson
2013/026 ( PDF )
RSA private key reconstruction from random bits using SAT solvers
Constantinos Patsakis
2013/025 ( PDF )
The IITM Model: a Simple and Expressive Model for Universal Composability
Ralf Kuesters and Max Tuengerthal
2013/024 ( PDF )
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field
Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon
2013/023 ( PDF )
A New Practical Identity-Based Encryption System
Jong Hwan Park and Dong Hoon Lee
2013/022 ( PDF )
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.
James McLaughlin and John A. Clark
2013/021 ( PDF )
Rate-Limited Secure Function Evaluation: Definitions and Constructions
Özgür Dagdelen and Payman Mohassel and Daniele Venturi
2013/020 ( PDF )
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles
Markus Rückert and Dominique Schroeder
2013/019 ( PDF )
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Peter Gaži
2013/018 ( PDF )
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
Jae Hong Seo and Keita Emura
2013/017 ( PDF )
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions
Alexandra Boldyreva and Robert Lychev
2013/016 ( PDF )
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo and Keita Emura
2013/015 ( PDF )
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography
Graham Enos
2013/014 ( PDF )
On formal and automatic security verification of WSN transport protocols
Ta Vinh Thong and Amit Dvir
2013/013 ( PDF )
Efficiently Outsourcing Multiparty Computation under Multiple Keys
Andreas Peter and Erik Tews and Stefan Katzenbeisser
2013/012 ( PDF )
Tropical cryptography
Dima Grigoriev and Vladimir Shpilrain
2013/011 ( PDF )
Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.
James McLaughlin and John A. Clark
2013/010 ( PDF )
Simultaneous Resettable WI from One-way Functions
Kai-Min Chung and Rafael Pass
2013/009 ( PDF )
Achieving Anonymity Against Major Face Recognition Algorithms
Benedikt Driessen and Markus Dürmuth
2013/008 ( PDF )
Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security
Kai-Min Chung and Rafael Pass and Karn Seth
2013/007 ( PDF )
A Matrix Approach for Constructing Quadratic APN Functions
Yuyin Yu and Mingsheng Wang and Yongqiang Li
2013/006 ( PDF )
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
Qingfeng Cheng
2013/005 ( PDF )
Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA
Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue and Faouzi Chekir
2013/004 ( PDF )
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices
Damien Stehlé and Ron Steinfeld
2013/003 ( PDF )
On Formal Expressions of BRW-polynomials
Guillermo Morales-Luna
2013/002 ( PDF )
Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao
2013/001 ( PDF )
Shielding circuits with groups
Eric Miles and Emanuele Viola
2012/733 ( PDF )
Reusable Garbled Circuits and Succinct Functional Encryption
Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich
2012/732 ( PDF )
Non-Interactive Key Exchange
Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson
2012/731 ( PDF )
Time-memory Trade-offs for Near-collisions
Gaëtan Leurent
2012/730 ( PS PS.GZ PDF )
Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes
Dalin Chu and Johann Gro{\ss}sch{\"a}dl and Zhe Liu and Volker M{\"u}ller and Yang Zhang
2012/729 ( PDF )
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
Nir Bitansky and Omer Paneth
2012/728 ( PDF )
Defensive Leakage Camouflage
E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin
2012/727 ( PDF )
On the Impossibility of Sender-Deniable Public Key Encryption
Dana Dachman-Soled
2012/726 ( PDF )
Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting
Marc Obrador and Paz Morillo and Sandra Guasch
2012/725 ( PDF )
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol
Qingfeng Cheng
2012/724 ( PDF )
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn
2012/723 ( PDF )
Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis
2012/722 ( PDF )
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor
2012/721 ( PDF )
On the (In)security of Fischlin's Paradigm
Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao
2012/720 ( PDF )
Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields
Antoine Joux
2012/719 ( PDF )
An ideal multi-secret sharing scheme based on minimal privileged coalitions
Yun Song , Zhihui Li
2012/718 ( PDF )
Succinct Non-Interactive Arguments via Linear Interactive Proofs
Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth
2012/717 ( PDF )
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
Jan Camenisch and Anna Lysyanskaya and Gregory Neven
2012/716 ( PDF )
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
2012/715 ( PDF )
New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$
Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng
2012/714 ( PDF )
Discrete Gaussian Leftover Hash Lemma over Infinite Domains
Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai
2012/713 ( PDF )
Systematic Treatment of Remote Attestation
Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik
2012/712 ( PDF )
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
Farzaneh Abed and Eik List and Stefan Lucks
2012/711 ( PDF )
Unprovable Security of Two-Message Zero Knowledge
Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass
2012/710 ( PDF )
Non Observability in the Random Oracle Model
Prabhanjan Ananth and Raghav Bhaskar
2012/709 ( PDF )
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng and Wen-Feng Qi
2012/708 ( PDF )
Calling out Cheaters: Covert Security With Public Verifiability
Gilad Asharov and Claudio Orlandi
2012/707 ( PDF )
Cryptanalysis of WIDEA
Gaëtan Leurent
2012/706 ( PDF )
On the (In)security of the Fiat-Shamir Paradigm, Revisited
Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt
2012/705 ( PDF )
Why "Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky and Sanjam Garg and Daniel Wichs
2012/704 ( PDF )
On the Non-malleability of the Fiat-Shamir Transform
Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi
2012/703 ( PDF )
Profiled Model Based Power Simulator for Side Channel Evaluation
Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le
2012/702 ( PDF )
Cryptanalysis of RAPP, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador
2012/701 ( PDF )
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
2012/700 ( PDF )
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou
2012/699 ( PDF )
Is Public-Key Encryption Based on LPN Practical?
Ivan Damg{\aa}rd and Sunoo Park
2012/698 ( PDF )
5PM: Secure Pattern Matching
Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler
2012/697 ( PDF )
Verifiable Elections That Scale for Free
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/696 ( PDF )
Cryptanalysis of RAKAPOSHI Stream Cipher
Lin Ding and Jie Guan
2012/695 ( PDF )
Automated Analysis and Synthesis of Padding-Based Encryption Schemes
Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Santiago Zanella-Béguelin
2012/694 ( PDF )
Cryptanalysis of matrix conjugation schemes
A. D. Myasnikov and A. Ushakov
2012/693 ( PDF )
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters
2012/692 ( PDF )
Integrated PKE and PEKS - Stronger Security Notions and New Constructions
Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin
2012/691 ( PDF )
Root Optimization of Polynomials in the Number Field Sieve
Shi Bai and Richard P. Brent and Emmanuel Thom\'e
2012/690 ( PDF )
The Weakness of Integrity Protection for LTE
Teng Wu and Guang Gong
2012/689 ( PDF )
Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia
2012/688 ( PDF )
A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
Jintai Ding, Xiaodong Lin
2012/687 ( PDF )
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Karyn Benson and Hovav Shacham and Brent Waters
2012/686 ( PDF )
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl
Jian Zou and Wenling Wu and Shuang Wu and Le Dong
2012/685 ( PDF )
Square root computation over even extension fields
Gora Adj and Francisco Rodr\'iguez-Henr\'iquez
2012/684 ( PDF )
Generic Related-key Attacks for HMAC
Thomas Peyrin and Yu Sasaki and Lei Wang
2012/683 ( PDF )
Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster
Gildas Avoine and Adrien Bourgeois and Xavier Carpent
2012/682 ( PDF )
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud
Jiawei Yuan and Shucheng Yu
2012/681 ( PDF )
Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations
Guang Gong and Mark Aagaard and Xinxin Fan
2012/680 ( PDF )
Natural Generalizations of Threshold Secret Sharing
Oriol Farras,Carles Padro,Chaoping Xing, and An Yang
2012/679 ( PDF )
Hiding the Input-Size in Secure Two-Party Computation
Yehuda Lindell and Kobbi Nissim and Claudio Orlandi
2012/678 ( PDF )
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall
2012/677 ( PDF )
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher
Jialin Huang and Xuejia Lai
2012/676 ( PDF )
Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan
Julia Borghoff
2012/675 ( PDF )
Minkowski sum based lattice construction for multivariate simultaneous Coppersmith's technique and applications to RSA
Yoshinori Aono
2012/674 ( PDF )
Lecture Notes in Secret Sharing
Carles Padro
2012/673 ( PDF )
Robust Encryption, Revisited
Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
2012/672 ( PDF )
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
Itai Dinur and Orr Dunkelman and Adi Shamir
2012/671 ( PDF )
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
Tatsuaki Okamoto and Katsuyuki Takashima
2012/670 ( PDF )
Fast Cryptography in Genus 2
Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter
2012/669 ( PDF )
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption
Zhen Liu and Zhenfu Cao and Duncan S. Wong
2012/668 ( PDF )
Construction of Differential Characteristics in ARX Designs -- Application to Skein
Gaetan Leurent
2012/667 ( PDF )
False Negative probabilities in Tardos codes
Antonino Simone and Boris Skoric
2012/666 ( PS PS.GZ PDF )
Estimating the Φ(n) of Upper/Lower Bound in its RSA Cryptosystem
Chenglian Liu and Ziwei Ye
2012/665 ( PDF )
Uniform Compression Functions Can Fail to Preserve “Full” Entropy
Daniel R. L. Brown
2012/664 ( PDF )
PRE- Stronger Security Notion and Efficient Construction with New Property
Jiang Zhang and Zhenfeng Zhang and Yu Chen
2012/663 ( PDF )
Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev
2012/662 ( PDF )
Asynchronous Physical Unclonable Functions – AsyncPUF
Julian Murphy
2012/661 ( PDF )
Breaking Another Quasigroup-Based Cryptographic Scheme
Markus Dichtl and Pascale B\"offgen
2012/660 ( PDF )
Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm
Munivel E and Rajeswari Mukesh
2012/659 ( PDF )
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks
Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpzyk
2012/658 ( PDF )
Digital Signatures with Minimal Overhead
Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy
2012/657 ( PDF )
Fixed Argument Pairing Inversion on Elliptic Curves
Sungwook Kim and Jung Hee Cheon
2012/656 ( PDF )
Security Evaluation of Rakaposhi Stream Cipher
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld
2012/655 ( PDF )
Privacy Preserving Revocable Predicate Encryption Revisited
Kwangsu Lee and Intae Kim and Seong Oun Hwang
2012/654 ( PDF )
Refine the Concept of Public Key Encryption with Delegated Search
Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma
2012/653 ( PDF )
How powerful are the DDH hard groups?
Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis
2012/652 ( PDF )
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai
2012/651 ( PDF )
TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems
Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren
2012/650 ( PDF )
Formal analysis of privacy in Direct Anonymous Attestation schemes
Ben Smyth and Mark D. Ryan and Liqun Chen
2012/649 ( PDF )
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Yannick Seurin and Joana Treger
2012/648 ( PDF )
Search in Encrypted Data: Theoretical Models and Practical Applications
Qiang Tang
2012/647 ( PDF )
A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions
Daniel Smith-Tone and Cristina Tone
2012/646 ( PS PS.GZ PDF )
Galindo-Garcia Identity-Based Signature Revisited
Sanjit Chatterjee and Chethan Kamath and Vikas Kumar
2012/645 ( PDF )
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2012/644 ( PDF )
Impossibility Results for Indifferentiability with Resets
Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel
2012/643 ( PDF )
Protocols for Multiparty Coin Toss With Dishonest Majority
Amos Beimel and Eran Omri and Ilan Orlov
2012/642 ( PDF )
Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart
2012/641 ( PDF )
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
Bin Wang
2012/640 ( PDF )
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
Gaoli Wang and Yanzhao Shen
2012/639 ( PDF )
Coarse-grained integer - Smooth? Rough? Both!
Daniel Loebenberger and Michael Nüsken
2012/638 ( PDF )
Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme
Cai-xue Zhou
2012/637 ( PDF )
Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification
Aviad Kipnis and Eliphaz Hibshoosh
2012/636 ( PDF )
On the Complexity of the BKW Algorithm on LWE
Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret
2012/635 ( -- withdrawn -- )
Secure Outsourced Attribute-based Encryption
Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong
2012/634 ( PDF )
Cryptanalysis of Double-Block-Length Hash Mode MJH
Deukjo Hong and Daesung Kwon
2012/633 ( PDF )
New Preimage Attack on MDC-4
Deukjo Hong and Daesung Kwon
2012/632 ( PDF )
Pairings on Generalized Huff Curves
Abdoul Aziz Ciss and Djiby Sow
2012/631 ( PDF )
Message-Locked Encryption and Secure Deduplication
Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart
2012/630 ( PDF )
On the Security of TLS Renegotiation
Florian Giesen and Florian Kohlar and Douglas Stebila
2012/629 ( PDF )
SCAPI: The Secure Computation Application Programming Interface
Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell
2012/628 ( PDF )
Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems
Muhammad Yasir Malik
2012/627 ( PDF )
Efficient Group Signatures in the Standard Model
Laila El Aimani and Olivier Sanders
2012/626 ( PDF )
Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis
Xi Xiong and Haining Fan
2012/625 ( PDF )
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions
Alexandra Boldyreva and Nathan Chenette and Adam O’Neill
2012/624 ( PDF )
Order-Preserving Symmetric Encryption
Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O’Neill
2012/623 ( PDF )
Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes
David McGrew
2012/622 ( PDF )
Resolving the conflict between generality and plausibility in verified computation
Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish
2012/621 ( PDF )
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong
2012/620 ( PDF )
Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction
Claus P. Schnorr and Taras Shevchenko
2012/619 ( PDF )
Asynchronous Computational VSS with Reduced Communication Complexity
Michael Backes and Amit Datta and Aniket Kate
2012/618 ( PDF )
Towards fully collusion-resistant ID-based establishment of pairwise keys
Oscar Garcia Morchon and Ludo Tolhuizen and Domingo Gomez and Jaime Gutierrez
2012/617 ( PDF )
Security Analysis of an Open Car Immobilizer Protocol Stack
Stefan Tillich and Marcin Wójcik
2012/616 ( PDF )
Hardness Preserving Constructions of Pseudorandom Functions, Revisited
Nishanth Chandran and Sanjam Garg
2012/615 ( PDF )
Polynomial time solutions of computational problems in noncommutative-algebraic cryptography
Boaz Tsaban
2012/614 ( PDF )
An arithmetic intersection formula for denominators of Igusa class polynomials
Kristin Lauter and Bianca Viray
2012/613 ( PDF )
Resource-Restricted Indifferentiability
Grégory Demay and Peter Gaži and Martin Hirt and Ueli Maurer
2012/612 ( PDF )
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff
Byoung-Il Kim and Jin Hong
2012/611 ( PDF )
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay
2012/610 ( PDF )
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg and Craig Gentry and Shai Halevi
2012/609 ( PDF )
A New Approach to Discrete Logarithm Problem with Auxiliary Inputs
Taechan Kim and Jung Hee Cheon
2012/608 ( PDF )
On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting
Marina Blanton and Mehrdad Aliasgari
2012/607 ( PDF )
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem
Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber
2012/606 ( PDF )
Quantum-Secure Message Authentication Codes
Dan Boneh and Mark Zhandry
2012/605 ( PDF )
Secure Outsourced Attribute-Based Signatures
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo
2012/604 ( PDF )
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs
2012/603 ( PDF )
Collecting Data while Preserving Individuals' Privacy: A Case Study
Alexis Bonnecaze and Robert Rolland
2012/602 ( PDF )
A note on invariant linear transformations in multivariate public key cryptography
Andreas Wiemers
2012/601 ( PS PS.GZ PDF )
How to Garble RAM Programs
Steve Lu and Rafail Ostrovsky
2012/600 ( PDF )
The LED Block Cipher
Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw
2012/599 ( PDF )
On the coefficients of the polynomial in the number field sieve
Min Yang, Qingshu Meng, Zhangyi Wang, Li Li, Huanguo Zhang
2012/598 ( PDF )
Taking proof-based verified computation a few steps closer to practicality (extended version)
Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Muqeet Ali and Andrew J. Blumberg and Michael Walfish
2012/597 ( PDF )
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj
2012/596 ( PDF )
Evaluating User Privacy in Bitcoin
Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun
2012/595 ( PDF )
Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes
Oriol Farràs and Carles Padró
2012/594 ( PDF )
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li
2012/593 ( PDF )
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps
Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani
2012/592 ( PDF )
Attribute-Based Encryption for Circuits from Multilinear Maps
Amit Sahai and Brent Waters
2012/591 ( PDF )
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers
Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel
2012/590 ( -- withdrawn -- )
--withdrawn--
--withdrawn--
2012/589 ( -- withdrawn -- )
--withdrawn--
--withdrawn--
2012/588 ( PDF )
Breaking Public Keys - How to Determine an Unknown RSA Public Modulus
Hans-Joachim Knobloch
2012/587 ( PDF )
Symbolic computation in block cipher with application to PRESENT
Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
2012/586 ( PDF )
SHADE: Secure HAmming DistancE computation from oblivious transfer
Julien Bringer and Herve Chabanne and Alain Patey
2012/585 ( PDF )
ON PROVABLY SECURE CODE-BASED SIGNATURE AND SIGNCRYPTION SCHEME
Preetha Mathew K and Sachin Vasant and C Pandu Rangan
2012/584 ( PDF )
Quantitative Analysis of the Full Bitcoin Transaction Graph
Dorit Ron and Adi Shamir
2012/583 ( PDF )
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
2012/582 ( PS PS.GZ PDF )
Using Randomizers for Batch Verification of ECDSA Signatures
Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury
2012/581 ( PDF )
On the (in)security of some smart-card-based password authentication schemes for WSN
Ding Wang and Chun-guang Ma
2012/580 ( PDF )
Cryptanalysis of the OKH Authenticated Encryption Scheme
Peng Wang and Wenling Wu and Liting Zhang
2012/579 ( PDF )
Defending Against the Unknown Enemy: Applying FlipIt to System Security
Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos
2012/578 ( PDF )
Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?
Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert
2012/577 ( PDF )
A Framework for Unique Ring Signatures
Matthew Franklin and Haibin Zhang
2012/576 ( PDF )
Concurrent Signature without Random Oracles
Xiao Tan and Qiong Huang and Duncan S. Wong
2012/575 ( PDF )
Nanoelectronic Solutions for Hardware Security
Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki
2012/574 ( PDF )
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings
A. D. Myasnikov and A. Ushakov
2012/573 ( PDF )
Limits on the Usefulness of Random Oracles
Iftach Haitner and Eran Omri and Hila Zarosim
2012/572 ( PDF )
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
Divya Gupta and Amit Sahai
2012/571 ( PDF )
Improved side channel attack on the block cipher NOEKEON
Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang
2012/570 ( PDF )
Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock
Hadi Soleimany and Kaisa Nyberg
2012/569 ( PDF )
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang
2012/568 ( PDF )
On Transaction Pseudonyms with Implicit Attributes
Stefan G. Weber
2012/567 ( PDF )
Leakage Squeezing of Order Two
Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi
2012/566 ( PDF )
Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes
Joep de Groot and Boris Skoric and Niels de Vreede and Jean-Paul Linnartz
2012/565 ( PDF )
Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski and Craig Gentry and Shai Halevi
2012/564 ( PDF )
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
2012/563 ( PDF )
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions
Kai-Min Chung and Huijia Lin and Rafael Pass
2012/562 ( PDF )
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2012/561 ( PDF )
An Attack on a Fully Homomorphic Encryption Scheme
Hu Yupu, Wang Fenghe
2012/560 ( PDF )
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Mohammad Hajiabadi, Bruce M. Kapron
2012/559 ( PDF )
Plaintext Awareness in Identity-Based Key Encapsulation
Mark Manulis and Bertram Poettering and Douglas Stebila
2012/558 ( PDF )
Domain-Specifi c Pseudonymous Signatures for the German Identity Card
Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler
2012/557 ( PDF )
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)
Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann
2012/556 ( PDF )
Resource-based Corruptions and the Combinatorics of Hidden Diversity
Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung
2012/555 ( PDF )
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai
2012/554 ( PDF )
Security weakness in the Proof of Storage with Deduplication
Youngjoo Shin, Junbeom Hur, Kwangjo Kim
2012/553 ( PDF )
Bellcore attack in practice
Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos
2012/552 ( PDF )
Provably Secure Concurrent Error Detection Against Differential Fault Analysis
Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri
2012/551 ( PDF )
Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists
Liangze Li and Hongfeng Wu and Fan Zhang
2012/550 ( PDF )
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash and Alptekin Kupcu and Daniel Wichs
2012/549 ( PDF )
Faster batch forgery identification
Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
2012/548 ( PDF )
New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments
Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang
2012/547 ( PDF )
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity
Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta
2012/546 ( PDF )
Rotational cryptanalysis of round-reduced Keccak
Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny
2012/545 ( PDF )
A Versatile Multi-Input Multiplier over Finite Fields
Haibo Yi, Shaohua Tang, Lingling Xu
2012/544 ( PDF )
Differential Analysis of the LED Block Cipher
Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici
2012/543 ( PDF )
Enhanced Chosen-Ciphertext Security and Applications
Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill
2012/542 ( PDF )
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara and Payman Mohassel and Ben Riva
2012/541 ( -- withdrawn -- )
2048XKS - A Software Oriented High Security Block Cipher
Dieter Schmidt
2012/540 ( PDF )
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms
Ga Won Lee and Jin Hong
2012/539 ( PDF )
Efficient Implementation of RSA Algorithm with MKE
Sami A. Nagar and Dr. Saad Alshamma
2012/538 ( PDF )
Private Top-k Aggregation Protocols
Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim
2012/537 ( PDF )
Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens
Özgür Dagdelen and Marc Fischlin
2012/536 ( PDF )
Secret Sharing and Secure Computing from Monotone Formulae
Ivan Bjerre Damgård and Jonas Kölker and Peter Bro Miltersen
2012/535 ( PDF )
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Gr{\o}stl
Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki
2012/534 ( PDF )
A Simple Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes
Maura B. Paterson and Douglas R. Stinson
2012/533 ( PDF )
Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
Thijs Laarhoven and Joop van de Pol and Benne de Weger
2012/532 ( PDF )
Pairing computation on Edwards curves with high-degree twists
Liangze Li and Hongfeng Wu and Fan Zhang
2012/531 ( PDF )
Generic Construction of Trace and Revoke Schemes
Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Selcuk
2012/530 ( PS PS.GZ PDF )
Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou and Tom Roeder
2012/529 ( PDF )
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)
Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knežević and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Søren S. Thomsen and Tolga Yalçın
2012/528 ( PDF )
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption
Graham Enos and Yuliang Zheng
2012/527 ( PDF )
Cryptanalysis of a recent two factor authentication scheme
Michael Scott
2012/526 ( PDF )
Invertible Polynomial Representation for Private Set Operations
Hyung Tae Lee and Hyunsook Hong and Jung Hee Cheon
2012/525 ( PDF )
Computing endomorphism rings of abelian varieties of dimension two
Gaetan Bisson
2012/524 ( PDF )
Tahoe – The Least-Authority Filesystem
Zooko Wilcox-O'Hearn and Brian Warner
2012/523 ( PDF )
The Curious Case of Non-Interactive Commitments
Mohammad Mahmoody and Rafael Pass
2012/522 ( PDF )
False Positive probabilities in q-ary Tardos codes: comparison of attacks
A. Simone and B. Skoric
2012/521 ( PDF )
Functional Encryption with Bounded Collusions via Multi-Party Computation
Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2012/520 ( PDF )
Optimizing Segment Based Document Protection (Corrected Version)
Miroslaw Kutylowski and Maciej Gebala
2012/519 ( PDF )
Faster implementation of scalar multiplication on Koblitz curves
Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez
2012/518 ( PDF )
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee and Dong Hoon Lee and Moti Yung
2012/517 ( PDF )
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
Ashish Choudhury and Martin Hirt and Arpita Patra
2012/516 ( PDF )
Garbling XOR Gates ``For Free'' in the Standard Model
Benny Applebaum
2012/515 ( PDF )
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
Mihir Bellare and Adam O'Neill
2012/514 ( PDF )
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
Mihir Bellare and Kenneth G. Paterson and Susan Thomson
2012/513 ( PS PS.GZ PDF )
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes
2012/512 ( PDF )
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
Ivan Damgard and Sarah Zakarias
2012/511 ( PDF )
Entangled Cloud Storage
Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi
2012/510 ( PDF )
Enabling 3-share Threshold Implementations for any 4-bit S-box
Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann
2012/509 ( PDF )
On 3-share Threshold Implementations for 4-bit S-boxes
Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang
2012/508 ( PDF )
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs
Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung
2012/507 ( PDF )
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices
Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefan Heyse and Stéphanie Kerckhof and François Koeune and Thomas Plos and Thomas Pöppelmann and Francesco Regazzoni and François-Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Loïc van Oldeneel tot Oldenzeel and Ingo von Maurich
2012/506 ( PDF )
Succinct Malleable NIZKs and an Application to Compact Shuffles
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/505 ( PDF )
On pseudorandomization of information-theoretically secure schemes without hardness assumptions
Koji Nuida
2012/504 ( PDF )
Scalable Deniable Group Key Establishment
Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona
2012/503 ( PDF )
Hierarchical Identity-Based (Lossy) Trapdoor Functions
Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols
2012/502 ( PDF )
Are We Compromised? Modelling Security Assessment Games
Viet Pham and Carlos Cid
2012/501 ( PS PS.GZ PDF )
Privacy Amplification with Asymptotically Optimal Entropy Loss
Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin
2012/500 ( PDF )
Constant Ciphertext Length in CP-ABE
Nishant Doshi and Devesh Jinwala
2012/499 ( PDF )
Authenticity, Integrity and Proof of Existence for Long-Term Archiving: a Survey
Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann
2012/498 ( PDF )
On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation
Meicheng Liu and Yin Zhang and Dongdai Lin
2012/497 ( PDF )
The low-call diet: Authenticated Encryption for call counting HSM users
Mike Bond and George French and Nigel P. Smart and Gaven J. Watson
2012/496 ( PDF )
Updating attribute in CP-ABE: A New Approach
Nishant Doshi and Devesh Jinwala
2012/495 ( PDF )
"Metaproofs" (and their Cryptographic Applications)
Alfredo De Santis and Moti Yung
2012/494 ( PDF )
Format-Transforming Encryption: More than Meets the DPI
Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton
2012/493 ( PDF )
Efficient Query Integrity for Outsourced Dynamic Databases
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
2012/492 ( PDF )
A Method for Generating Full Cycles by a Composition of NLFSRs
Elena Dubrova
2012/491 ( PDF )
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown
Lidong Han and Wei Wei and Mingjie Liu
2012/490 ( PS PS.GZ PDF )
Desynchronization Attack on RAPP Ultralightweight Authentication Protocol
Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref
2012/489 ( PDF )
Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols
Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
2012/488 ( PDF )
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
Mohammad Beheshti-Atashgah \and Majid Bayat \and Mahmoud Gardeshi \and Mohammad Reza Aref
2012/487 ( PDF )
Short communication: An interpretation of the Linux entropy estimator
Benjamin Pousse
2012/486 ( PDF )
Computational Soundness without Protocol Restrictions
Michael Backes and Ankit Malik and Dominique Unruh
2012/485 ( PDF )
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms
Neil Hanley and HeeSeok Kim and Michael Tunstall
2012/484 ( PS PS.GZ )
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture
Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui
2012/483 ( PS PS.GZ PDF )
An Efficient Signcryption Scheme from q-Diffie-Hellman Problems
Jayaprakash Kar
2012/482 ( PDF )
Approaches for the Parallelization of Software Implementation of Integer Multiplication
Vladislav Kovtun and Andrew Okhrimenko
2012/481 ( PDF )
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance
John Steinberger
2012/480 ( PDF )
Short Signatures From Diffie-Hellman: Realizing Short Public Key
Jae Hong Seo
2012/479 ( PDF )
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles
Mohammad Reza Reyhanitabar and Willy Susilo
2012/478 ( PDF )
Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol
Wang Qinglong, Xu Li
2012/477 ( PDF )
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean
2012/476 ( PDF )
A j-lanes tree hashing mode and j-lanes SHA-256
Shay Gueron
2012/475 ( PDF )
Efficient Signatures of Knowledge and DAA in the Standard Model
David Bernhard and Georg Fuchsbauer and Essam Ghadafi
2012/474 ( PDF )
On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa and Pooya Farshim
2012/473 ( PDF )
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang and Shengli Liu and Baodong Qin
2012/472 ( PDF )
On the Simplicity of Converting Leakages from Multivariate to Univariate – Case Study of a Glitch-Resistant Masking Scheme –
Amir Moradi and Oliver Mischke
2012/471 ( PDF )
A Quasigroup Based Random Number Generator for Resource Constrained Environments
Matthew Battey and Abhishek Parakh
2012/470 ( PDF )
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime
Sorin Iftene
2012/469 ( PDF )
Perfect Keyword Privacy in PEKS Systems
Mototsugu Nishioka
2012/468 ( PDF )
Functional Encryption: New Perspectives and Lower Bounds
Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee
2012/467 ( PDF )
New results on nonexistence of generalized bent functions
Yupeng Jiang and Yingpu Deng
2012/466 ( PDF )
Computational Entropy and Information Leakage
Benjamin Fuller and Leonid Reyzin
2012/465 ( PDF )
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags
Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
2012/464 ( PDF )
Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming
Carles Padro and Leonor Vazquez and An Yang
2012/463 ( PDF )
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
Xiang Xie and Rui Xue and Rui Zhang
2012/462 ( PDF )
Perfect Ambiguous Optimistic Fair Exchange
Yang Wang and Man Ho Au and Willy Susilo
2012/461 ( PDF )
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits
Nir Bitansky and Alessandro Chiesa
2012/460 ( PDF )
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
Yohei Watanabe and Takenobu Seito and Junji Shikata
2012/459 ( PDF )
Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs
2012/458 ( PDF )
Computing small discrete logarithms faster
Daniel J. Bernstein and Tanja Lange
2012/457 ( PDF )
Hush Functions Extended to Any Size Input versus Any Size Output
Gideon Samid
2012/456 ( PDF )
Crowd-Blending Privacy
Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass
2012/455 ( PDF )
Must you know the code of f to securely compute f?
Mike Rosulek
2012/454 ( PDF )
A Probabilistic Quantum Key Transfer Protocol
Abhishek Parakh
2012/453 ( PDF )
New Leakage Resilient CCA-Secure Public Key Encryption
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2012/452 ( PDF )
EPiC: Efficient Privacy-Preserving Counting for MapReduce
Erik-Oliver Blass and Guevara Noubir and Triet D. Vo-Huu
2012/451 ( PS PS.GZ PDF )
Stam's Conjecture and Threshold Phenomena in Collision Resistance
John Steinberger, Xiaoming Sun, Zhe Yang
2012/450 ( PDF )
Tweakable Blockciphers with Beyond Birthday-Bound Security
Will Landecker and Thomas Shrimpton and R. Seth Terashima
2012/449 ( PDF )
Long Term Confidentiality: a Survey
Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alex Wiesmaier
2012/448 ( PDF )
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt
2012/447 ( PDF )
Multi-receiver Homomorphic Authentication Codes for Network Coding
Zhaohui Tang and Hoon Wei Lim
2012/446 ( PS PS.GZ PDF )
Differential Fault Analysis of AES: Towards Reaching its Limits
Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall
2012/445 ( PDF )
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’
Debiao He, Jianhua Chen, Miaomiao Tian
2012/444 ( PDF )
Factorization of a 1061-bit number by the Special Number Field Sieve
Greg Childers
2012/443 ( PDF )
Improved CRT Algorithm for Class Polynomials in Genus 2
Kristin Lauter and Damien Robert
2012/442 ( PDF )
Group Signatures with Almost-for-free Revocation
Benoit Libert and Thomas Peters and Moti Yung
2012/441 ( PDF )
Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg and Amit Sahai
2012/440 ( PDF )
New Preimage Attacks Against Reduced SHA-1
Simon Knellwolf and Dmitry Khovratovich
2012/439 ( PDF )
Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach
Ding Wang, Chun-guang Ma, Ping Wang ang Zhong Chen
2012/438 ( PDF )
Breaking and Repairing GCM Security Proofs
Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu
2012/437 ( PDF )
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai and Hakan Seyalioglu and Brent Waters
2012/436 ( PDF )
Secure Database Commitments and Universal Arguments of Quasi Knowledge
Melissa Chase and Ivan Visconti
2012/435 ( PS PS.GZ PDF )
Differential Privacy with Imperfect Randomness
Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan
2012/434 ( PDF )
Algebraic (Trapdoor) One Way Functions and their Applications
Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis
2012/433 ( PDF )
Impossibility Results for Static Input Secure Computation
Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti
2012/432 ( PDF )
TorScan: Tracing Long-lived Connections and Differential Scanning Attacks
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012/431 ( PDF )
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta
2012/430 ( PDF )
A formal study of two physical countermeasures against side channel attacks
Sébastien Briais and Sylvain Guilley and Jean-Luc Danger
2012/429 ( PDF )
Simple construction of epsilon-biased distribution
Long Hoang Nguyen and Andrew William Roscoe
2012/428 ( PDF )
Rational authentication protocols and their use in financial transactions
Long Hoang Nguyen
2012/427 ( PDF )
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
Robert Drylo
2012/426 ( PDF )
A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes
Ed Kendall and Michelle Kendall and Wilfrid S. Kendall
2012/425 ( PS PS.GZ PDF )
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
Gautham Sekar
2012/424 ( PDF )
Scalable Group Signatures with Revocation
Benoit Libert and Thomas Peters and Moti Yung
2012/423 ( PDF )
Programmable encryption and key-dependent messages
Dominique Unruh
2012/422 ( PDF )
Biclique Cryptanalysis of TWINE
Mustafa \c{C}oban and Ferhat Karako\c{c} and \"{O}zkan Bozta\c{s}
2012/421 ( PDF )
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny
2012/420 ( PDF )
A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers
Denise Demirel and Jeroen van de Graaf
2012/419 ( PDF )
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Kan Yang and Xiaohua Jia and Kui Ren
2012/418 ( PDF )
Weaknesses of an Improvement Authentication Scheme using
Rafael Martínez-Peláez and Francisco Rico-Novella
2012/417 ( PDF )
Efficient Padding Oracle Attacks on Cryptographic Hardware
Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay
2012/416 ( PDF )
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
Cas Cremers and Michèle Feltz
2012/415 ( PDF )
Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion
Jialin Huang and Xuejia Lai
2012/414 ( PDF )
Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials
Yin Li and Gong-liang Chen and Xiao-ning Xie
2012/413 ( PDF )
Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation
Mukund Kalyanaraman and Michael Orshansky
2012/412 ( PDF )
Probabilistic Infinite Secret Sharing
Laszlo Csirmaz
2012/411 ( PDF )
Infinite Secret Sharing -- Examples
Alexander Dibert and Laszlo Csirmaz
2012/410 ( PDF )
Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme
Qingfeng Cheng
2012/409 ( PDF )
MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes
Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto
2012/408 ( PDF )
Efficient Implementation of Bilinear Pairings on ARM Processors
Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao
2012/407 ( PDF )
Cross-Unlinkable Hierarchical Group Signatures
Julien Bringer and Herve Chabanne and Alain Patey
2012/406 ( PDF )
Comments on four multi-server authentication protocols using smart card
*Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4
2012/405 ( PDF )
Secure Computation on Floating Point Numbers
Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele
2012/404 ( PDF )
Secret Sharing Schemes for Very Dense Graphs
Amos Beimel and Oriol Farràs and Yuval Mintz
2012/403 ( PDF )
Fully Private Revocable Predicate Encryption
Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Dongdong Sun
2012/402 ( PDF )
Forward-Secure Hierarchical Predicate Encryption
Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Dongdong Sun
2012/401 ( PDF )
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Martin Albrecht and Gregor Leander
2012/400 ( PDF )
An Algebraic Fault Attack on the LED Block Cipher
Philipp Jovanovic and Martin Kreuzer and Ilia Polian
2012/399 ( PDF )
Differential Fault Analysis on Block Cipher Piccolo
Kitae Jeong
2012/398 ( PDF )
PIRMAP: Efficient Private Information Retrieval for MapReduce
Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan
2012/397 ( PDF )
Cross-Domain Password-Based Authenticated Key Exchange Revisited
Liqun Chen and Hoon Wei Lim and Guomin Yang
2012/396 ( PDF )
On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$
Brajesh Kumar Singh
2012/395 ( PDF )
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash
2012/394 ( PDF )
An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari
2012/393 ( PDF )
A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat
2012/392 ( PDF )
ID Based Signcryption Scheme in Standard Model
S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
2012/391 ( PDF )
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
Shaohui Wang,Sujuan Liu,Danwei Chen
2012/390 ( PDF )
Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three
Chol-Sun Sin
2012/389 ( PDF )
Wide Strong Private RFID Identification based on Zero-Knowledge
Roel Peeters and Jens Hermans
2012/388 ( PDF )
The Arithmetic Codex
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2012/387 ( PDF )
New cryptographic constructions using generalized learning with errors problem
Jintai ding
2012/386 ( PDF )
Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
Rafael Martínez-Peláez and Francisco Rico-Novella
2012/385 ( PDF )
CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing
Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen
2012/384 ( PDF )
Functional Encryption for Regular Languages
Brent Waters
2012/383 ( PDF )
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited
Junji Shikata
2012/382 ( PDF )
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Afonso Arriaga and Manuel Barbosa and Pooya Farshim
2012/381 ( PDF )
A Strongly Secure Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles
Zheng Yang
2012/380 ( PDF )
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Ioana Boureanu and Serge Vaudenay
2012/379 ( PDF )
A Framework for Efficient Fully-Equipped UC Commitments
Eiichiro Fujisaki
2012/378 ( PDF )
Multiparty Proximity Testing with Dishonest Majority from Equality Testing
Ran Gelles and Rafail Ostrovsky and Kina Winoto
2012/377 ( PDF )
Distributed Key Generation in the Wild
Aniket Kate and Yizhou Huang and Ian Goldberg
2012/376 ( PDF )
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
Colleen M. Swanson and Douglas R. Stinson
2012/375 ( PDF )
How to Store some Secrets
Reto E. Koenig and Rolf Haenni
2012/374 ( PDF )
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption
Omar Choudary and Felix Grobert and Joachim Metz
2012/373 ( PDF )
Optimal Lower Bound for Differentially Private Multi-Party Aggregation
T-H. Hubert Chan and Elaine Shi and Dawn Song
2012/372 ( -- withdrawn -- )
New Preimage Attacks on Hash Modes of AES-256
Deukjo Hong and Dong-Chan Kim and Daesung Kwon
2012/371 ( PDF )
Simultaneous hashing of multiple messages
Shay Gueron and Vlad Krasnov
2012/370 ( PDF )
Improved Broadcast Encryption Scheme with Constant-Size Ciphertext
Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton
2012/369 ( PDF )
Factorisation of RSA-704 with CADO-NFS
Shi Bai and Emmanuel Thom\'e and Paul Zimmermann
2012/368 ( PDF )
Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs
Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif
2012/367 ( PDF )
On Continual Leakage of Discrete Log Representations
Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs
2012/366 ( PDF )
Securing Circuits Against Constant-Rate Tampering
Dana Dachman-Soled and Yael Tauman Kalai
2012/365 ( PDF )
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin
2012/364 ( PDF )
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
Ivan Damgard and Adriana Lopez-Alt
2012/363 ( PDF )
A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions
Anne Canteaut and Thomas Fuhr and Mar\'{i}a Naya-Plasencia and Pascal Paillier and Jean-Ren\'{e} Reinhard and Marion Videau
2012/362 ( PDF )
Achieving Constant Round Leakage-Resilient Zero-Knowledge
Omkant Pandey
2012/361 ( PDF )
Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
Michele Mosca and Douglas Stebila and Berkant Ustaoglu
2012/360 ( PDF )
Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics
Céline Blondeau and Benoît Gérard and Kaisa Nyberg
2012/359 ( PDF )
Another look at non-uniformity
Neal Koblitz and Alfred Menezes
2012/358 ( PDF )
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --
Gilles Piret and Thomas Roche and Claude Carlet
2012/357 ( PDF )
Publicly Verifiable Ciphertexts
Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila
2012/356 ( PDF )
Fully Anonymous Attribute Tokens from Lattices
Jan Camenisch and Gregory Neven and Markus Rückert
2012/355 ( PDF )
Never trust a bunny
Daniel J. Bernstein and Tanja Lange
2012/354 ( PDF )
Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output
Arno Mittelbach
2012/353 ( PDF )
On Reconfigurable Fabrics and Generic Side-Channel Countermeasures
Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik
2012/352 ( PS PS.GZ PDF )
On Hashing Graphs
Ashish Kundu, Elisa Bertino
2012/351 ( PDF )
SipHash: a fast short-input PRF
Jean-Philippe Aumasson and Daniel J. Bernstein
2012/350 ( PDF )
A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption
Liangliang Xiao and I-Ling Yen
2012/349 ( PDF )
A Differential Fault Attack on Grain-128a using MACs
Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
2012/348 ( PDF )
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven
2012/347 ( PDF )
Algebraic Differential Fault Attacks on LED using a Single Fault Injection
Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji
2012/346 ( PS PS.GZ PDF )
Edwards model of elliptic curves defined over any fields
Oumar DIAO and Emmanuel FOUOTSA
2012/345 ( PDF )
Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$
Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi
2012/344 ( PDF )
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code
Masao KASAHARA
2012/343 ( PDF )
High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Functions
Tamas Gyorfi and Octavian Cret and Guillaume Hanrot and Nicolas Brisebarre
2012/342 ( PDF )
Enhancing Location Privacy for Electric Vehicles (at the right time)
Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou
2012/341 ( PDF )
From Selective to Full Security: Semi-Generic Transformations in the Standard Model
Michel Abdalla and Dario Fiore and Vadim Lyubashevsky
2012/340 ( PDF )
Deciding Epistemic and Strategic Properties of Cryptographic Protocols
Henning Schnoor
2012/339 ( PDF )
Practical Polynomial Time Known Plaintext Attacks on a Stream Cipher Proposed by John Nash
Adi Shamir and Eldad Zinger
2012/338 ( PDF )
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions
Xiao Zhong and Mingsheng Wang
2012/337 ( PDF )
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
Sanjay Bhattacherjee and Palash Sarkar
2012/336 ( PDF )
RSA modulus generation in the two-party case
Gerald Gavin
2012/335 ( PDF )
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu
2012/334 ( PDF )
On the Traceability of Tags in SUAP RFID Authentication Protocols
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012/333 ( PDF )
On the Feasibility of Extending Oblivious Transfer
Yehuda Lindell and Hila Zarosim
2012/332 ( PDF )
A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/331 ( PDF )
Homomorphic Authentication Codes for Network Coding
Zhaohui Tang
2012/330 ( PDF )
A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences
Xu ZiJie and Xu Ke
2012/329 ( PDF )
An Analysis of ZVP-Attack on ECC Cryptosystems
Claude Crépeau and Raza Ali Kazmi
2012/328 ( PS PS.GZ PDF )
The Multivariate Probabilistic Encryption Scheme MQQ-ENC
Danilo Gligoroski and Simona Samardjiska
2012/327 ( PDF )
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation
Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei
2012/326 ( PDF )
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison Lewko and Brent Waters
2012/325 ( PDF )
A note on generalized bent criteria for Boolean functions
Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica
2012/324 ( PDF )
3D Hardware Canaries
Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf
2012/323 ( PDF )
ML Confidential: Machine Learning on Encrypted Data
Thore Graepel and Kristin Lauter and Michael Naehrig
2012/322 ( PDF )
Revisiting Dedicated and Block Cipher based Hash Functions
Anupam Pattanayak
2012/321 ( PDF )
DECT Security Analysis
Erik Tews
2012/320 ( PDF )
The Discrete Logarithm Problem in non-representable rings
Matan Banin and Boaz Tsaban
2012/319 ( PDF )
Bounds on the Threshold Gap in Secret Sharing over Small Fields
Ignacio Cascudo and Ronald Cramer and Chaoping Xing
2012/318 ( PDF )
Non-uniform cracks in the concrete: the power of free precomputation
Daniel J. Bernstein and Tanja Lange
2012/317 ( PDF )
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)
Markku-Juhani O. Saarinen and Daniel Engels
2012/316 ( PDF )
Computationally Complete Symbolic Attacker in Action
Gergei Bana and Pedro Adão and Hideki Sakurada
2012/315 ( PDF )
Using Variance to Analyze Visual Cryptography Schemes
Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou
2012/314 ( PDF )
Generation of Nonlinear Feedback Shift Registers with special-purpose hardware
Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki
2012/313 ( PDF )
An anonymous proxy signature scheme without random oracles
Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/312 ( PDF )
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Debiao He
2012/311 ( PDF )
Tightly Secure Signatures and Public-Key Encryption
Dennis Hofheinz and Tibor Jager
2012/310 ( PDF )
A mathematical problem for security analysis of hash functions and pseudorandom generators
Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata
2012/309 ( PDF )
Fast and compact elliptic-curve cryptography
Mike Hamburg
2012/308 ( PDF )
Verified Security of Redundancy-Free Encryption from Rabin and RSA
Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin
2012/307 ( PDF )
Multi-Channel Broadcast Encryption
Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh
2012/306 ( PDF )
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
Marcel Keller and Gert Læssøe Mikkelsen and Andy Rupp
2012/305 ( PDF )
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography
Duong Hieu Phan and Viet Cuong Trinh
2012/304 ( PDF )
Actively Secure Two-Party Evaluation of any Quantum Operation
Fr\'ed\'eric Dupuis and Jesper Buus Nielsen and Louis Salvail
2012/303 ( PDF )
On The Distribution of Linear Biases: Three Instructive Examples
Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander
2012/302 ( PDF )
On instance separation in the UC-framework
István Vajda
2012/301 ( PDF )
A Public Shuffle without Private Permutations
Myungsun Kim and Jinsu Kim and Jung Hee Cheon
2012/300 ( PDF )
Threshold Implementations of all 3x3 and 4x4 S-boxes
B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.Stütz
2012/299 ( PDF )
Differential Power Analysis on ZUC Algorithm
TANG Ming, CHENG PingPan ,QIU ZhenLong
2012/298 ( PDF )
Anonymous Credentials Light
Foteini Baldimtsi and Anna Lysyanskaya
2012/297 ( PDF )
Tamper and Leakage Resilience in the Split-State Model
Feng-Hao Liu and Anna Lysyanskaya
2012/296 ( PDF )
In the blink of an eye: There goes your AES key
Sergei Skorobogatov and Christopher Woods
2012/295 ( PDF )
Broadcast-enhanced Key Predistribution Schemes
Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson
2012/294 ( PDF )
Two grumpy giants and a baby
Daniel J. Bernstein and Tanja Lange
2012/293 ( PDF )
New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors
Wei Wei and Chengliang Tian and Xiaoyun Wang
2012/292 ( PDF )
An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle
Jon Passki and Tom Ritter
2012/291 ( PDF )
Efficient Dynamic Provable Possession of Remote Data via Update Trees
Yihua Zhang and Marina Blanton
2012/290 ( PDF )
Fully Homomorphic Message Authenticators
Rosario Gennaro and Daniel Wichs
2012/289 ( PS PS.GZ PDF )
Ring Group Signatures
Liqun Chen
2012/288 ( PDF )
Fair Exchange of Short Signatures without Trusted Third Party
Philippe Camacho
2012/287 ( PDF )
Computationally-Fair Group and Identity-Based Key-Exchange
Andrew C. Yao and Yunlei Zhao
2012/286 ( PS PS.GZ PDF )
Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis
Sk Subidh Ali and Debdeep Mukhopadhyay
2012/285 ( PDF )
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
2012/284 ( PDF )
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Ben Hamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud
2012/283 ( PDF )
Some properties of q-ary functions based on spectral analysis
Deep Singh and Maheshanand Bhaintwal
2012/282 ( PDF )
ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY
Md. Iftekhar Salam and Hoon-Jae Lee
2012/281 ( PDF )
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
Dario Fiore and Rosario Gennaro
2012/280 ( PDF )
Improved ``Partial Sums"-based Square Attack on AES
Michael Tunstall
2012/279 ( PDF )
Concurrent Zero Knowledge in the Bounded Player Model
Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti
2012/278 ( PS PS.GZ PDF )
Improved Indifferentiability Security Bound for the JH Mode
Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
2012/277 ( PS PS.GZ PDF )
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil
Rkia Aouinatou (1) Mostafa Belkasmi (2)
2012/276 ( PDF )
Official Arbitration with Secure Cloud Storage Application
Alptekin Küpçü
2012/275 ( PDF )
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves and Jean-Philippe Aumasson
2012/274 ( PDF )
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
Aleksandar Kircanski and Amr M. Youssef
2012/273 ( PDF )
Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang
2012/272 ( PS PS.GZ PDF )
Passive Corruption in Statistical Multi-Party Computation
Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
2012/271 ( -- withdrawn -- )
Homomorphic Signature for Identity Authentication in Cloud Computing
Zhiwei Wang, Guozi Sun and Danwei Chen
2012/270 ( PDF )
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings
Enrico Thomae
2012/269 ( PDF )
Quantifying Side-Channel Information Leakage from Web Applications
Luke Mather and Elisabeth Oswald
2012/268 ( PDF )
On a CCA2-secure variant of McEliece in the standard model
Edoardo Persichetti
2012/267 ( PDF )
Self-pairings on Hyperelliptic Curves
Steven D. Galbraith and Chang-An Zhao
2012/266 ( PDF )
Compilation Techniques for Efficient Encrypted Computation
Christopher Fletcher and Marten van Dijk and Srinivas Devadas
2012/265 ( PDF )
Foundations of Garbled Circuits
Mihir Bellare and Viet Tung Hoang and Phillip Rogaway
2012/264 ( PDF )
On the (In)Security of IDEA in Various Hashing Modes
Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang
2012/263 ( PDF )
One-way Functions from Chebyshev Polynomials
Kai-Yuen Cheong
2012/262 ( PDF )
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart
2012/261 ( PDF )
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters
2012/260 ( PDF )
Transposition of AES Key Schedule
Jialin Huang, Xuejia Lai
2012/259 ( PDF )
A Novel Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/258 ( PDF )
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols
José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella Béguelin
2012/257 ( -- withdrawn -- )
The Transformation from the Galois NLFSR to the Fibonacci Configuration
Lin Zhiqiang
2012/256 ( PDF )
The myth of generic DPA...and the magic of learning
Carolyn Whitnall and Elisabeth Oswald and Fran\c{c}ois-Xavier Standaert
2012/255 ( PDF )
How to Garble Arithmetic Circuits
Benny Applebaum and Yuval Ishai and Eyal Kushilevitz
2012/254 ( PDF )
FastPRP: Fast Pseudo-Random Permutations for Small Domains
Emil Stefanov and Elaine Shi
2012/253 ( PDF )
Cryptanalysis of pairing-free certificateless authenticated key agreement protocol
Zhian Zhu
2012/252 ( PDF )
Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello
2012/251 ( PDF )
The Linux Pseudorandom Number Generator Revisited
Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau
2012/250 ( PDF )
New Identity Based Encryption And Its Proxy Re-encryption
Xu An Wang and Xiaoyuan Yang
2012/249 ( PDF )
Binary and q-ary Tardos codes, revisited
Boris Skoric and Jan-Jaap Oosterwijk
2012/248 ( PDF )
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
Ghassan O. Karame and Elli Androulaki and Srdjan Capkun
2012/247 ( PDF )
On Efficient Pairings on Elliptic Curves over Extension Fields
Xusheng Zhang and Kunpeng Wang and Dongdai Lin
2012/246 ( PDF )
A Secret Sharing Scheme Based on Group Presentations and the Word Problem
Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain
2012/245 ( PDF )
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes
Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen
2012/244 ( PDF )
Cryptography from tensor problems
Leonard J. Schulman
2012/243 ( PDF )
COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES
MYUNGSUN KIM and JIHYE KIM and AND JUNG HEE CHEON
2012/242 ( PDF )
Less is More: Relaxed yet Composable Security Notions for Key Exchange
C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams
2012/241 ( PDF )
Key distribution system and attribute-based encryption
Masahiro Yagisawa
2012/240 ( PDF )
Ring Switching in BGV-Style Homomorphic Encryption
Craig Gentry and Shai Halevi and Chris Peikert and Nigel P. Smart
2012/239 ( PDF )
Zero-Knowledge for Multivariate Polynomials
Valerie Nachef and Jacques Patarin and Emmanuel Volte
2012/238 ( PDF )
The Boomerang Attacks on the Round-Reduced Skein-512
Hongbo Yu and Jiazhe Chen and XIaoyun Wang
2012/237 ( PS PS.GZ PDF )
In the point of view security, An efficient scheme in IBE with random oracle
Rkia Aouinatou1, Mostafa Belkasmi2
2012/236 ( PDF )
On Necessary and Sufficient Conditions for Private Ballot Submission
D. Bernhard and O. Pereira and B. Warinschi
2012/235 ( PDF )
Ring-LWE in Polynomial Rings
Leo Ducas and Alain Durmus
2012/234 ( PDF )
SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks
Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan
2012/233 ( PDF )
A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis
Qi Chai and Guang Gong
2012/232 ( PDF )
Implementing Pairings at the 192-bit Security Level
Diego F. Aranha and Laura Fuentes-Castañeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez
2012/231 ( PDF )
A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT
Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang
2012/230 ( PDF )
On Ideal Lattices and Learning with Errors Over Rings
Vadim Lyubashevsky and Chris Peikert and Oded Regev
2012/229 ( PDF )
Languages with Efficient Zero-Knowledge PCP's are in SZK
Mohammad Mahmoody and David Xiao
2012/228 ( PDF )
Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results
Marten van Dijk and Ulrich Rührmair
2012/227 ( -- withdrawn -- )
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Ding Wang and Chun-guang Ma and Peng Wu
2012/226 ( PDF )
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya
2012/225 ( PDF )
When Homomorphism Becomes a Liability
Zvika Brakerski
2012/224 ( PDF )
Shorter Identity-Based Encryption via Asymmetric Pairings
Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee
2012/223 ( PDF )
A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes
Enrico Thomae
2012/222 ( PDF )
A secret sharing scheme of prime numbers based on hardness of factorization
Kai-Yuen Cheong
2012/221 ( PDF )
Almost-Everywhere Secure Computation with Edge Corruptions
Nishanth Chandran and Juan Garay and Rafail Ostrovsky
2012/220 ( PDF )
Hedged Public-key Encryption: How to Protect against Bad Randomness
Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek
2012/219 ( PDF )
Private Fingerprint Matching
Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona
2012/218 ( PDF )
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu
2012/217 ( PDF )
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
2012/216 ( PDF )
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler
2012/215 ( PDF )
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova
2012/214 ( PDF )
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers (Full Version)
Shengbao Wu and Mingsheng Wang
2012/213 ( PDF )
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2012/212 ( PDF )
Perfect Algebraic Immune Functions
Meicheng Liu and Yin Zhang and Dongdai Lin
2012/211 ( PDF )
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama
2012/210 ( PDF )
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks
Yusong Du, and Fangguo Zhang
2012/209 ( PS PS.GZ PDF )
Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications
Donghoon Chang and Moti Yung
2012/208 ( PDF )
A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
Jay Shah and Ayan Mahalanobis
2012/207 ( -- withdrawn -- )
Cryptanalysis of Hummingbird-2
Kai Zhang, Lin Ding and Jie Guan
2012/206 ( PDF )
(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version)
Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou
2012/205 ( PDF )
Information-flow control for programming on encrypted data
J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman
2012/204 ( PDF )
Unique Group Signatures
Matthew Franklin and Haibin Zhang
2012/203 ( PDF )
Robust biometric-based user authentication scheme for wireless sensor networks
Debiao He
2012/202 ( PDF )
Secure Similarity Coefficients Computation with Malicious Adversaries
Bo Zhang and Fangguo Zhang
2012/201 ( PDF )
Comment an Anonymous Multi-receiver Identity-based Encryption Scheme
J.H.Zhang, Y.B.Cui
2012/200 ( PDF )
Aggregate Signcryption
Alexander W. Dent
2012/199 ( PDF )
Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm
Jean-Charles Faugère and Pierrick Gaudry and Louise Huot and Guénaël Renault
2012/198 ( PDF )
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
Jae Hong Seo and Jung Hee Cheon
2012/197 ( PDF )
On The Security of One-Witness Blind Signature Schemes
Foteini Baldimtsi and Anna Lysyanskaya
2012/196 ( PS PS.GZ PDF )
Multi-Instance Security and its Application to Password-Based Cryptography
Mihir Bellare and Thomas Ristenpart and Stefano Tessaro
2012/195 ( PDF )
The BlueJay Ultra-Lightweight Hybrid Cryptosystem
Markku-Juhani O. Saarinen
2012/194 ( PDF )
A Multivariate based Threshold Ring Signature Scheme
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2012/193 ( PDF )
An Efficient Homomorphic Encryption Protocol for Multi-User Systems
Liangliang Xiao and Osbert Bastani and I-Ling Yen
2012/192 ( PDF )
Extending Order Preserving Encryption for Multi-User Systems
Liangliang Xiao and I-Ling Yen and Dung T. Huynh
2012/191 ( PDF )
Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes
Liangliang Xiao and I-Ling Yen
2012/190 ( PDF )
On the Security of an Improved Password Authentication Scheme Based on ECC
Ding Wang and Chun-guang Ma
2012/189 ( PDF )
Universally Composable Key-Management
Steve Kremer and Robert Künnemann and Graham Steel
2012/188 ( PS PS.GZ PDF )
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Xin Li
2012/187 ( PDF )
SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)
Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann
2012/186 ( PDF )
Third-order nonlinearities of some biquadratic monomial Boolean functions
Brajesh Kumar Singh
2012/185 ( PDF )
Replay attacks that violate ballot secrecy in Helios
Ben Smyth
2012/184 ( PDF )
Asymptotic fingerprinting capacity in the Combined Digit Model
Dion Boesten and Boris Skoric
2012/183 ( PDF )
Differentially Private Smart Metering with Battery Recharging
Michael Backes and Sebastian Meiser
2012/182 ( PDF )
How to Construct Quantum Random Functions
Mark Zhandry
2012/181 ( PDF )
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange
Nils Fleischhacker and Mark Manulis and Amir Azodi
2012/180 ( PDF )
Yet Another SHA-3 Round 3 FPGA Results Paper
Brian Baldwin and William P. Marnane
2012/179 ( PDF )
Billion-Gate Secure Computation with Malicious Adversaries
Benjamin Kreuter and abhi shelat and Chih-hao Shen
2012/178 ( PDF )
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams
2012/177 ( PDF )
Everlasting Quantum Security
Unruh, Dominique
2012/176 ( PS PS.GZ PDF )
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination
Satrajit Ghosh and Abhijit Das
2012/175 ( PDF )
Optimal First-Order Masking with Linear and Non-Linear Bijections
Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER
2012/174 ( PDF )
Zero Knowledge with Rubik's Cubes and Non-Abelian Groups
Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF
2012/173 ( PS PS.GZ PDF )
Automatically Verified Mechanized Proof of One-Encryption Key Exchange
Bruno Blanchet
2012/172 ( PDF )
Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication
Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz
2012/171 ( PS PS.GZ PDF )
Quantum Money from Hidden Subspaces
Scott Aaronson and Paul Christiano
2012/170 ( PDF )
Approaches for the performance increasing of software implementation of integer multiplication in prime fields
Vladislav Kovtun and Andrew Okhrimenko
2012/169 ( PDF )
Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers
Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan
2012/168 ( PDF )
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
Val\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
2012/167 ( PDF )
Pairing-based methods for genus 2 jacobians with maximal endomorphism ring
Sorina Ionica
2012/166 ( PDF )
A List of Maximum Period NLFSRs
Elena Dubrova
2012/165 ( PDF )
Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy
Cristina Onete
2012/164 ( PDF )
On Secure Two-party Integer Division
Morten Dahl, Chao Ning, Tomas Toft
2012/163 ( PDF )
Differential propagation analysis of Keccak
Joan Daemen and Gilles Van Assche
2012/162 ( PS PS.GZ PDF )
Provably Secure Online/Off-line Identity-Based Signature Scheme forWireless Sensor Network
Jayaprakash Kar
2012/161 ( PDF )
New Constructions of Low Correlation Sequences with High Linear Complexity
Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu
2012/160 ( -- withdrawn -- )
New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set
Hai Xiong, Longjiang Qu, Chao Li
2012/159 ( PDF )
Hybrid Encryption in the Multi-User Setting
G.M. Zaverucha
2012/158 ( PDF )
Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading
Peter Gazi and Stefano Tessaro
2012/157 ( PDF )
Attack on Fully Homomorphic Encryption over the Integers
Gu Chunsheng
2012/156 ( PDF )
Fast Embedded Software Hashing
Dag Arne Osvik
2012/155 ( PS PS.GZ PDF )
Toward Practical Group Encryption
Laila El Aimani and Marc Joye
2012/154 ( PS PS.GZ PDF )
The Joint Signature and Encryption Revisited
Laila El Aimani
2012/153 ( PDF )
A Framework for the Cryptographic Verification of Java-like Programs
Ralf Kuesters and Tomasz Truderung and Juergen Graf
2012/152 ( PDF )
On security of a Certificateless Aggregate Signature Scheme
Limin Shen, Yinxia Sun
2012/151 ( PDF )
On Boolean Ideals and Varieties with Application to Algebraic Attacks
Alexander Rostovtsev and Alexey Mizyukin
2012/150 ( PDF )
Circular chosen-ciphertext security with compact ciphertexts
Dennis Hofheinz
2012/149 ( PDF )
Attacking Scrambled Burrows-Wheeler Transform
Martin Stanek
2012/148 ( PDF )
Replacing Username/Password with Software-Only Two-Factor Authentication
Michael Scott
2012/147 ( PDF )
On Security Arguments of the Second Round SHA-3 Candidates
Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger
2012/146 ( PDF )
On Polynomial Systems Arising from a Weil Descent
Christophe Petit and Jean-Jacques Quisquater
2012/145 ( PDF )
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization
Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita
2012/144 ( PDF )
Somewhat Practical Fully Homomorphic Encryption
Junfeng Fan and Frederik Vercauteren
2012/143 ( PDF )
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
2012/142 ( PDF )
Identity-Based Encryption with Master Key-Dependent Message Security and Applications
David Galindo and Javier Herranz and Jorge Villar
2012/141 ( PDF )
Bicliques for permutations: collision and preimage attacks in stronger settings
Dmitry Khovratovich
2012/140 ( PDF )
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors
Selcuk Baktir and Erkay Savas
2012/139 ( PDF )
Formal veri cation of secure ad-hoc network routing protocols using deductive model-checking
Ta Vinh Thong
2012/138 ( PDF )
An Improved Differential Attack on Full GOST
Nicolas T. Courtois
2012/137 ( PDF )
Usable assembly language for GPUs: a success story
Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
2012/136 ( PDF )
Adaptive Key Protection in Complex Cryptosystems with Attributes
Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng
2012/135 ( PDF )
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade
2012/134 ( PDF )
A Digital Signature Scheme for Long-Term Security
Dimitrios Poulakis and Robert Rolland
2012/133 ( PDF )
Toward Practical Private Access to Data Centers via Parallel ORAM
Jacob R. Lorch and Bryan Parno and James Mickens and Mariana Raykova and Joshua Schiffman
2012/132 ( PDF )
CFS Software Implementation
Gregory Landais and Nicolas Sendrier
2012/131 ( PDF )
Security of Feistel Schemes with New and Various Tools
Rodolphe LAMPE and Jacques PATARIN
2012/130 ( PDF )
Broadcast-Efficient Secure Multiparty Computation
Juan Garay and Clint Givens and Rafail Ostrovsky
2012/129 ( PDF )
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio and Irippuge Milinda Perera
2012/128 ( PDF )
Provably Secure Distance-Bounding: an Analysis of Prominent Protocols
Marc Fischlin and Cristina Onete
2012/127 ( PDF )
Additive autocorrelation of some classes of cubic semi-bent Boolean functions
Deep Singh and Maheshanand Bhaintwal
2012/126 ( PDF )
Compact Implementation of Threefish and Skein on FPGA
Nuray At and Jean-Luc Beuchat and Ismail San
2012/125 ( -- withdrawn -- )
Short and Efficient Expressive Attribute-Based Signature in the Standard Model
Aijun Ge and Cheng Chen and Chuangui Ma and Zhenfeng Zhang
2012/124 ( PS PS.GZ PDF )
On Securing Communication From Profilers
Sandra Diaz-Santiago and Debrup Chakraborty
2012/123 ( PDF )
Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-
A. Dehbaoui and J.M. Dutertre and B. Robisson and P. Orsatelli and P. Maurine and A. Tria
2012/122 ( PDF )
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three
Reza R. Farashahi and Hongfeng Wu and Chang-An Zhao
2012/121 ( PDF )
An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps
Mitra Fatemi and Taraneh Eghlidos and Mohammadreza Aref
2012/120 ( PDF )
Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks
Yongge Wang
2012/119 ( PDF )
Accelerating the Final Exponentiation in the Computation of the Tate Pairings
Taechan Kim, Sungwook Kim, Jung Hee Cheon
2012/118 ( PDF )
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks
S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan
2012/117 ( PDF )
Universally Composable Security With Local Adversaries
Ran Canetti and Margarita Vald
2012/116 ( PDF )
Clash Attacks on the Verifiability of E-Voting Systems
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2012/115 ( PDF )
Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing
XU Chun-xiang and HE Xiao-hu and Daniel Abraha
2012/114 ( PDF )
On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives
Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He
2012/113 ( PDF )
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
Bart Mennink
2012/112 ( PDF )
On The Nonlinearity of Maximum-length NFSR Feedbacks
Meltem Sonmez Turan
2012/111 ( PDF )
On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks
Yin Zhang and Meicheng Liu and Dongdai Lin
2012/110 ( PDF )
Finding Optimal Formulae for Bilinear Maps
Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann
2012/109 ( -- withdrawn -- )
Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model
Yang Cui and Kirill Morozov
2012/108 ( PDF )
On the Optimality of Lattices for the Coppersmith Technique
Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe
2012/107 ( PDF )
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
Guilin Wang and Jiangshan Yu and Qi Xie
2012/106 ( PDF )
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents
Santanu Sarkar and Subhamoy Maitra
2012/105 ( PDF )
Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
2012/104 ( PDF )
Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang
2012/103 ( PDF )
FlipIt: The Game of "Stealthy Takeover"
Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
2012/102 ( PDF )
On the Circular Security of Bit-Encryption
Ron Rothblum
2012/101 ( -- withdrawn -- )
Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>=3"
Zhihui Ou
2012/100 ( PDF )
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
Shahram Khazaei and Bj{\"o}rn Terelius and Douglas Wikstr{\"o}m
2012/099 ( PDF )
Homomorphic Evaluation of the AES Circuit
Craig Gentry and Shai Halevi and Nigel P. Smart
2012/098 ( PS PS.GZ PDF )
Combined Attacks on the AES Key Schedule
François Dassance and Alexandre Venelli
2012/097 ( PDF )
An algorithm for factoring integers
Yingpu Deng and Yanbin Pan
2012/096 ( PDF )
The Collision Security of MDC-4
Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
2012/095 ( PDF )
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data
Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
2012/094 ( PDF )
Algebraic attack on lattice based cryptosystems via solving equations over real numbers.
Jintai Ding and Dieter Schmidt
2012/093 ( PDF )
Recent Results on Balanced Symmetric Boolean Functions
Yingming Guo and Guangpu Gao and Yaqun Zhao
2012/092 ( PDF )
Tolerant Algebraic Side-Channel Analysis of {AES}
Yossef Oren and Avishai Wool
2012/091 ( -- withdrawn -- )
Hardness of decision (R)LWE for any modulus
Adeline Langlois and Damien Stehle
2012/090 ( PDF )
Worst-Case to Average-Case Reductions for Module Lattices
Adeline Langlois and Damien Stehle
2012/089 ( PDF )
ECM at Work
Joppe W. Bos and Thorsten Kleinjung
2012/088 ( -- withdrawn -- )
A Lattice-Based Traitor Tracing Scheme
San Ling and Damien Stehle
2012/087 ( PDF )
Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms
Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev
2012/086 ( -- withdrawn -- )
Remarks on- An ideal multi-secret sharing scheme based on MSP
Zhi-hui Li Jing Li
2012/085 ( PDF )
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery
Stanislav Bulygin and Michael Walter
2012/084 ( PDF )
Improved Algebraic Side-Channel Attack on AES
Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter
2012/083 ( PDF )
Optimally Robust Private Information Retrieval
Casey Devet and Ian Goldberg and Nadia Heninger
2012/082 ( PDF )
Semi-Supervised Template Attack
Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and Cedric Meuter and Gianluca Bontempi and Olivier Markowitch
2012/081 ( PDF )
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification
Michael Backes and Fabian Bendun and Dominique Unruh
2012/080 ( PDF )
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model
S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan
2012/079 ( PDF )
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao KASAHARA
2012/078 ( PDF )
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Zvika Brakerski
2012/077 ( PDF )
MAGNITUDE SQUARED COHERENCE BASED SCA
Sebastien Tiran and Amine Dehbaoui and Philippe Maurine
2012/076 ( PDF )
Secure Identity-Based Encryption in the Quantum Random Oracle Model
Mark Zhandry
2012/075 ( PDF )
Efficient identity-based threshold decryption scheme from bilinear pairings
Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang
2012/074 ( PDF )
Another look at HMAC
Neal Koblitz and Alfred Menezes
2012/073 ( PDF )
Efficient identity-based threshold signature scheme from bilinear pairings in the standard model
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen
2012/072 ( PDF )
Particularly Friendly Members of Family Trees
Craig Costello
2012/071 ( PDF )
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems
Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer
2012/070 ( PDF )
Finding ECM-Friendly Curves through a Study of Galois Properties
Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery
2012/069 ( PDF )
Automatic Search of Attacks on round-reduced AES and Applications
Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque
2012/068 ( PDF )
Extended Security Arguments for (Ring) Signature Schemes
Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel
2012/067 ( PDF )
Parallelizing message schedules to accelerate the computations of hash functions
Shay Gueron, Vlad Krasnov
2012/066 ( PDF )
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Jiqiang Lu and Wen-She Yap and Yongzhuang Wei
2012/065 ( PDF )
Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”
Tsukasa Ishiguro
2012/064 ( PDF )
Ron was wrong, Whit is right
Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter
2012/063 ( PDF )
Randomized Partial Checking Revisited
Shahram Khazaei and Douglas Wikstr{\"o}m
2012/062 ( -- withdrawn -- )
On the Security of Attribute Based Signature Schemes
S Sharmila Deva Selvi and Subhashini Venugopalan and C. Pandu Rangan
2012/061 ( PDF )
A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh
2012/060 ( PDF )
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
2012/059 ( PDF )
Message Authentication, Revisited
Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs
2012/058 ( PS PS.GZ PDF )
Key recycling in authentication
Christopher Portmann
2012/057 ( PDF )
(Anonymous) Fully Secure Constant-Size Ciphertext HIBE From Type-3 Pairings
Somindu C. Ramanna and Palash Sarkar
2012/056 ( PDF )
A New Pseudorandom Generator from Collision-Resistant Hash Functions
Alexandra Boldyreva and Virendra Kumar
2012/055 ( -- withdrawn -- )
Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks
Hongbin Tang and Xinsong Liu
2012/054 ( PDF )
On the performance of certain Private Set Intersection protocols
Emiliano De Cristofaro and Gene Tsudik
2012/053 ( PS PS.GZ PDF )
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage
Yevgeniy Dodis
2012/052 ( PDF )
Identity-based Encryption with Efficient Revocation
Alexandra Boldyreva and Vipul Goyal and Virendra Kumar
2012/051 ( PDF )
Eavesdropping on Satellite Telecommunication Systems
Benedikt Driessen
2012/050 ( PDF )
Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture
Jeremy Constantin and Andreas Burg and Frank K. Gurkaynak
2012/049 ( PDF )
2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160
Yu Sasaki and Lei Wang
2012/048 ( PDF )
Designing Integrated Accelerator for Stream Ciphers with Structural Similarities
Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid
2012/047 ( PDF )
Incremental Deterministic Public-Key Encryption
Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev
2012/046 ( PDF )
Modifying Boolean Functions to Ensure Maximum Algebraic Immunity
Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis
2012/045 ( PS PS.GZ PDF )
Signature Schemes Secure against Hard-to-Invert Leakage
Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel
2012/044 ( PDF )
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems
Jun Zhou, Zhenfu Cao
2012/043 ( PDF )
A novel Group Key Transfer Protocol
Chingfang Hsu and Bing Zeng and Qi Cheng and Guohua Cui
2012/042 ( PDF )
Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing
Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi
2012/041 ( -- withdrawn -- )
A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION
Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen
2012/040 ( PDF )
Single-block collision attack on MD5
Marc Stevens
2012/039 ( PDF )
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
Feng Hao and Dylan Clarke
2012/038 ( PDF )
Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure
François Durvaux and Mathieu Renauld and François-Xavier Standaert and Loic van Oldeneel tot Oldenzeel and Nicolas Veyrat-Charvillon
2012/037 ( PDF )
Some results on $q$-ary bent functions
Deep Singh, Maheshanand Bhaintwal and Brajesh Kumar Singh
2012/036 ( PS PS.GZ PDF )
Efficient Leakage-free Authentication of Trees, Graphs and Forests
Ashish Kundu, Mikhail Atallah, Elisa Bertino
2012/035 ( PDF )
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations
Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser
2012/034 ( PDF )
Automatic Quantification of Cache Side-Channels
Boris Köpf and Laurent Mauborgne and Martin Ochoa
2012/033 ( PDF )
A note on hyper-bent functions via Dillon-like exponents
Sihem Mesnager and Jean-Pierre Flori
2012/032 ( PS PS.GZ PDF )
Counterexamples to Hardness Amplification Beyond Negligible
Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs
2012/031 ( PDF )
An error in "On a new formal proof model for RFID location privacy"
Da-Zhi Sun
2012/030 ( PDF )
Fault Analysis of the KATAN Family of Block Ciphers
Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry
2012/029 ( PDF )
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Yannick Seurin
2012/028 ( PDF )
A First-Order Leak-Free Masking Countermeasure
Houssem MAGHREBI and Emmanuel PROUFF and Sylvain GUILLEY and Jean-Luc DANGER
2012/027 ( -- withdrawn -- )
Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack
Ali Mackvandi and Maryam Saeed and Mansour Naddafiun
2012/026 ( PS PS.GZ PDF )
Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding
Anja Becker and Antoine Joux and Alexander May and Alexander Meurer
2012/025 ( PDF )
A new remote data integrity checking scheme for cloud storage
Xiangtao Yan and Yifa Li
2012/024 ( PS PS.GZ PDF )
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings
Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar
2012/023 ( PS PS.GZ PDF )
On the security of Lo et al.’s ownership transfer protocol
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Ali Mahani
2012/022 ( PS PS.GZ PDF )
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
Mihir Bellare and Stefano Tessaro
2012/021 ( -- withdrawn -- )
Security Analysis of J-PAKE
Mohsen Toorani
2012/020 ( PDF )
Dickson polynomials, hyperelliptic curves and hyper-bent functions
Jean-Pierre Flori and Sihem Mesnager
2012/019 ( PDF )
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker
Gergei Bana and Hubert Comon-Lundh
2012/018 ( PDF )
Attacks and Security Proofs of EAX-Prime
Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata
2012/017 ( PDF )
Secondary constructions on generalized bent functions
Brajesh Kumar Singh
2012/016 ( -- withdrawn -- )
Efficient Mix-Net Veri cation by Proofs of Random Blocks
Denise Demirel and Melanie Volkamer and Hugo Jonker
2012/015 ( PS PS.GZ PDF )
A Cryptographic Treatment of the Wiretap Channel
Mihir Bellare and Stefano Tessaro and Alexander Vardy
2012/014 ( PDF )
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
2012/013 ( -- withdrawn -- )
Higher Order Algebraic Attacks on Stream Ciphers
Qichun Wang and Thomas Johansson
2012/012 ( PDF )
Malleable Proof Systems and Applications
Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn
2012/011 ( PDF )
Biclique Attack of the Full ARIA-256
Shao-zhen Chen Tian-min Xu
2012/010 ( PDF )
PayTree: "Amortized Signature" for Flexible Micro-Payments
Charanjit Jutla and Moti Yung
2012/009 ( PDF )
On the Indifferentiability of the Integrated-Key Hash Functions
Saif Al-Kuwari
2012/008 ( PDF )
Security proof with dishonest keys
Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri
2012/007 ( PDF )
Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures
Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen
2012/006 ( PDF )
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Susan Hohenberger and Allison Lewko and Brent Waters
2012/005 ( PS PS.GZ PDF )
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Benjamin Fuller and Adam O'Neill and Leonid Reyzin
2012/004 ( PDF )
The new SHA-3 software shootout
Daniel J. Bernstein and Tanja Lange
2012/003 ( PDF )
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers
Qun-Xiong Zheng, Wen-Feng Qi and Tian Tian
2012/002 ( PDF )
ECC2K-130 on NVIDIA GPUs
Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang
2012/001 ( PDF )
Digital Signatures from Challenge-Divided Sigma-Protocols
Andrew C. Yao and Yunlei Zhao
2011/714 ( PDF )
Position-Verification in Multi-Channel Models
Huajun Zhang and Zongyang Zhang and Zhenfu Cao
2011/713 ( PDF )
A server-aided verification signature scheme without random oracles
Bin Wang and Qing Zhao
2011/712 ( PDF )
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Johann Gro{\ss}sch{\"a}dl and Dan Page and Stefan Tillich
2011/711 ( PDF )
Evolutionary Construction of de Bruijn Sequences
Meltem Sonmez Turan
2011/710 ( PDF )
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Alex Biryukov and Johann Gro{\ss}sch{\"a}dl
2011/709 ( PDF )
Fault Attack against Miller's algorithm
Nadia El Mrabet
2011/708 ( PDF )
Computational Extractors and Pseudorandomness
Dana Dachman-Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin
2011/707 ( PS PS.GZ PDF )
Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF
Alex Biryukov and Ilya Kizhvatov and Bin Zhang
2011/706 ( PDF )
Improved Side Channel Attacks on Pairing Based Cryptography
Johannes Blömer and Peter Günther and Gennadij Liske
2011/705 ( PDF )
Differential Attacks on Generalized Feistel Schemes
Valerie Nachef and Emmanuel Volte and Jacques Patarin
2011/704 ( PS PS.GZ PDF )
Security Analysis of a PUF based RFID Authentication Protocol
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
2011/703 ( PDF )
Waters Signatures with Optimal Security Reduction
Dennis Hofheinz and Tibor Jager and Edward Knapp
2011/702 ( PDF )
Comments of an efficient and secure multi-server authentication scheme with key agreement
Yitao Chen
2011/701 ( PDF )
Decentralized Attribute-Based Signatures
Tatsuaki Okamoto and Katsuyuki Takashima
2011/700 ( PDF )
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
Tatsuaki Okamoto and Katsuyuki Takashima
2011/699 ( -- withdrawn -- )
Public-Key Encryption with Cluster-Chain-based Keyword Search
Peng Xu and Hai Jin and Wei Wang and Deqing Zou
2011/698 ( PDF )
A generalization of the class of hyper-bent Boolean functions in binomial forms
Chunming Tang, Yu Lou, Yanfeng Qi, Baocheng Wang, Yixian Yang
2011/697 ( PDF )
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
2011/696 ( PDF )
Efficient Network Coding Signatures in the Standard Model
Dario Catalano and Dario Fiore and Bogdan Warinschi
2011/695 ( PDF )
Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2011/694 ( PDF )
Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation
Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng
2011/693 ( PDF )
A non-interactive deniable authentication scheme in the standard model
Bin Wang ,Qing Zhao and Ke Dai
2011/692 ( PDF )
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions
Cheng Chen and Zhenfeng Zhang and Dengguo Feng
2011/691 ( PDF )
Yet Another Ultralightweight Authentication Protocol that is Broken
Gildas Avoine and Xavier Carpent
2011/690 ( PDF )
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation
Masao KASAHARA
2011/689 ( -- withdrawn -- )
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong-Sheng Zhou
2011/688 ( PDF )
Authenticated Key Exchange under Bad Randomness
Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang
2011/687 ( PDF )
Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)
Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld
2011/686 ( PDF )
Analysis of some natural variants of the PKP Algorithm
Rodolphe LAMPE and Jacques PATARIN
2011/685 ( PDF )
Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function
Roman Oliynykov
2011/684 ( PS PS.GZ PDF )
Identification Based Encryption with RSA-OAEP. Using SEM and Without
Rkia Aouinatou, Mostafa Belkasmi
2011/683 ( PDF )
Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems
Falko Strenzke
2011/682 ( PDF )
UC framework for anonymous communication
István Vajda
2011/681 ( PDF )
Physically Uncloneable Functions in the Universal Composition Framework
Christina Brzuska and Marc Fischlin and Heike Schr{\"o}der and Stefan Katzenbeisser
2011/680 ( PDF )
Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry and Shai Halevi and Nigel P. Smart
2011/679 ( PDF )
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
Junaid Jameel Ahmad and Shujun Li and Ahmad-Reza Sadeghi and Thomas Schneider
2011/678 ( PDF )
On definitions of selective opening security
Florian Böhl and Dennis Hofheinz and Daniel Kraschewski
2011/677 ( PDF )
CommitCoin: Carbon Dating Commitments with Bitcoin
Jeremy Clark and Aleksander Essex
2011/676 ( PDF )
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie
2011/675 ( PDF )
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Nico Döttling and Thilo Mie and Jörn Müller-Quade and Tobias Nilges
2011/674 ( PDF )
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
Colleen M. Swanson and Douglas R. Stinson
2011/673 ( PDF )
Pseudorandom Signatures
Nils Fleischhacker and Felix Günther and Franziskus Kiefer and Mark Manulis and Bertram Poettering
2011/672 ( PDF )
Fast and Secure Root Finding for Code-based Cryptosystems
Falko Strenzke
2011/671 ( PDF )
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256
Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li and Ying Man
2011/670 ( PDF )
SHA-3 on ARM11 processors
Peter Schwabe and Bo-Yin Yang and Shang-Yi Yang
2011/669 ( PDF )
Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields
Christopher Wolf and Enrico Thomae
2011/668 ( PDF )
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
Piotr K. Tysowski and M. Anwarul Hasan
2011/667 ( -- withdrawn -- )
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
Suleyman Kardas and Atakan Arslan and Serkan Celik and Albert Levi
2011/666 ( PDF )
A Gross-Zagier formula for quaternion algebras over totally real fields
Eyal Z. Goren and Kristin E. Lauter
2011/665 ( PDF )
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection
Jothi Rangasamy \and Douglas Stebila \and Lakshmi Kuppusamy \and Colin Boyd \and Juan Gonzalez Nieto
2011/664 ( PDF )
On the Security of ID Based Signcryption Schemes
S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan
2011/663 ( PDF )
Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption
Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan
2011/662 ( PDF )
Deploying secure multi-party computation for financial data analysis
Dan Bogdanov and Riivo Talviste and Jan Willemson
2011/661 ( PS PS.GZ PDF )
New Impossible Differential Attacks on Camellia
Dongxia Bai and Leibo Li
2011/660 ( PDF )
Program Obfuscation with Leaky Hardware
Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum
2011/659 ( PDF )
Formally Assessing Cryptographic Entropy
Daniel R. L. Brown
2011/658 ( PDF )
Anonymous attestation with user-controlled linkability
D. Bernhard and G. Fuchsbauer and E. Ghadafi and N.P. Smart and B. Warinschi
2011/657 ( PDF )
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Abhranil Maiti and Vikash Gunreddy and Patrick Schaumont
2011/656 ( PDF )
Use Data-depend Function Build Message Expansion Function
ZiJie Xu and Ke Xu
2011/655 ( PDF )
Privacy-Preserving Stream Aggregation with Fault Tolerance
T-H. Hubert Chan, Elaine Shi and Dawn Song
2011/654 ( PDF )
Elliptic Curve Cryptography in JavaScript
Laurie Haustenne and Quentin De Neyer and Olivier Pereira
2011/653 ( -- withdrawn -- )
An Improved Certificateless Authenticated Key Agreement Protocol
Haomin Yang and Yaoxue Zhang and Yuezhi Zhou
2011/652 ( PDF )
Security Enhancement of the Vortex Family of Hash Functions
Shay Gueron and Michael Kounavis
2011/651 ( PDF )
CHECKER: On-site checking in RFID-based supply chains
Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
2011/650 ( PDF )
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang
2011/649 ( PDF )
On the Security of NMAC and Its Variants
Fanbao Liu and Changxiang Shen and Tao Xie and Dengguo Feng
2011/648 ( PDF )
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
Tatsuaki Okamoto and Katsuyuki Takashima
2011/647 ( PDF )
Breaking $H^2$-MAC Using Birthday Paradox
Fanbao Liu and Tao Xie and Changxiang Shen
2011/646 ( PDF )
The security impact of a new cryptographic library
Daniel J. Bernstein and Tanja Lange and Peter Schwabe
2011/645 ( PDF )
Fully Homomorphic Encryption Based on Approximate Matrix GCD
Gu Chunsheng
2011/644 ( PDF )
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel
2011/643 ( PDF )
Some Words About Cryptographic Key Recognition In Data Streams
Alexey Chilikov and Evgeny Alekseev
2011/642 ( PDF )
Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$
Yongqiang Li and Mingsheng Wang
2011/641 ( PDF )
Collision for 75-step SHA-1: Intensive Parallelization with GPU
E.A. Grechnikov and A.V. Adinetz
2011/640 ( PDF )
Hummingbird: Privacy at the time of Twitter
Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams
2011/639 ( PS PS.GZ PDF )
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks
Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
2011/638 ( PDF )
Rubik's for cryptographers
Christophe Petit and Jean-Jacques Quisquater
2011/637 ( PDF )
Random Number Generation Based on Oscillatory Metastability in Ring Circuits
Laszlo Hars
2011/636 ( -- withdrawn -- )
Untangling RFID Privacy Models
Iwen Coisel and Tania Martin
2011/635 ( PDF )
Groestl Tweaks and their Effect on FPGA Results
Marcin Rogawski and Kris Gaj
2011/634 ( PDF )
Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat1
2011/633 ( PDF )
Practical realisation and elimination of an ECC-related software bug attack
B.B. Brumley and M. Barbosa and D. Page and F. Vercauteren
2011/632 ( PDF )
A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs
Elena Dubrova
2011/631 ( PS PS.GZ PDF )
On the Security of a Cheating Immune Visual Secret Sharing Scheme
Yu-Chi Chen and Du-Shiau Tsai and Gwoboa Horng
2011/630 ( PDF )
Indifferentiability Security of the Fast Wide Pipe Hash: Breaking the Birthday Barrier
Dustin Moody and Souradyuti Paul and Daniel Smith-Tone
2011/629 ( PDF )
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Eli Ben-Sasson and Serge Fehr and Rafail Ostrovsky
2011/628 ( PDF )
Maximum Leakage Resilient IBE and IPE
Kaoru Kurosawa and Le Trieu Phong
2011/627 ( PDF )
A note on semi-bent functions with multiple trace terms and hyperelliptic curves
Sihem Mesnager
2011/626 ( PDF )
Algebraic Complexity Reduction and Cryptanalysis of GOST
Nicolas T. Courtois
2011/625 ( PDF )
Two RFID Privacy Models in Front of a Court
Mohammad Hassan Habibi, Mohammad Reza Aref
2011/624 ( PDF )
New attacks on Keccak-224 and Keccak-256
Itai Dinur and Orr Dunkelman and Adi Shamir
2011/623 ( PDF )
Indifferentiability of the Hash Algorithm BLAKE
Donghoon Chang and Mridul Nandi and Moti Yung
2011/622 ( PDF )
Homomorphic encryption from codes
Andrej Bogdanov and Chin Ho Lee
2011/621 ( PDF )
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
Zhenfu Cao, Zongyang Zhang , Yunlei Zhao
2011/620 ( PDF )
Provable Security of BLAKE with Non-Ideal Compression Function
Elena Andreeva and Atul Luykx and Bart Mennink
2011/619 ( PDF )
Multidimensional Meet-in-the-Middle Attack and Its Applications to KATAN32/48/64
Bo Zhu and Guang Gong
2011/618 ( PDF )
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis
2011/617 ( PDF )
Charm: A framework for Rapidly Prototyping Cryptosystems
Joseph A. Akinyele and Matthew D. Green and Avi D. Rubin
2011/616 ( PDF )
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
Jiazhe Chen and Meiqin Wang and Bart Preneel
2011/615 ( PDF )
On the Joint Security of Encryption and Signature in EMV
Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler
2011/614 ( PS PS.GZ PDF )
On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud
Keke Chen
2011/613 ( PDF )
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Gilad Asharov and Abhishek Jain and Daniel Wichs
2011/612 ( PDF )
IBAKE: Identity-Based Authenticated Key Exchange Protocol
Vladimir Kolesnikov and Ganapathy S. Sundaram
2011/611 ( PDF )
Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability
Dana Dachman-Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam
2011/610 ( PDF )
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks
Nicolas Veyrat-Charvillon and Benoît Gérard and Mathieu Renauld and François-Xavier Standaert
2011/609 ( PDF )
The PHOTON Family of Lightweight Hash Functions
Jian Guo and Thomas Peyrin and Axel Poschmann
2011/608 ( PDF )
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
Patrick Longa and Francesco Sica
2011/607 ( PDF )
Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}
Carlos {Aguilar Melchor} and Slim Bettaieb and Philippe Gaborit and Javier Herranz
2011/606 ( -- withdrawn -- )
$GF(2^{n})$ Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials
Xi Xiong and Haining Fan
2011/605 ( PDF )
Efficient and Secure Delegation of Linear Algebra
Payman Mohassel
2011/604 ( PDF )
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
Aurore Guillevic and Damien Vergnaud
2011/603 ( -- withdrawn -- )
Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family
Le Dong and Wenling Wu and Shuang Wu and Jian Zou
2011/602 ( PDF )
Positive Results for Concurrently Secure Computation in the Plain Model
Vipul Goyal
2011/601 ( PDF )
A Multi-Receiver ID-Based Generalized Signcryption Scheme
Caixue Zhou
2011/600 ( PDF )
A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms
Chunming Tang, Yanfeng Qi, Maozhi Xu, Baocheng Wang, Yixian Yang
2011/599 ( PDF )
Efficient Password-Based Authenticated Key Exchange from Lattices
Yi Ding and Lei Fan
2011/598 ( PDF )
New Subexponential Algorithms for Factoring in $SL(2,\fq)$
Jean-Charles Faugère and Ludovic Perret and Christophe Petit and Guénaël Renault
2011/597 ( PDF )
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
Bryan Parno and Mariana Raykova and Vinod Vaikuntanathan
2011/596 ( PDF )
Parallel Homomorphic Encryption
Seny Kamara and Mariana Raykova
2011/595 ( PDF )
Efficient Multi-Query CPIR from Ring-LWE
Helger Lipmaa
2011/594 ( PDF )
Receipt Freeness of Prêt à Voter Provably Secure
Dalia Khader and Peter Y.A. Ryan
2011/593 ( PDF )
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
Yu Chen and Liqun Chen and Zongyang Zhang
2011/592 ( PS PS.GZ PDF )
Generic Constructions for Verifiable Signcryption
Laila El Aimani
2011/591 ( PDF )
A Unified Framework for Small Secret Exponent Attack on RSA
Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu
2011/590 ( PDF )
An Efficient Broadcast Attack against NTRU
Jianwei Li and Yanbin Pan and Mingjie Liu and Guizhen Zhu
2011/589 ( PDF )
Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication
Chen Su and Haining Fan
2011/588 ( PDF )
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Arpita Maitra and Goutam Paul
2011/587 ( PDF )
Signatures of Correct Computation
Charalampos Papamanthou and Elaine Shi and Roberto Tamassia
2011/586 ( PDF )
TweLEX: A Tweaked Version of the LEX Stream Cipher
Mainack Mondal and Avik Chakraborti and Nilanjan Datta and Debdeep Mukhopadhyay
2011/585 ( PDF )
Iris: A Scalable Cloud File System with Efficient Integrity Checks
Emil Stefanov and Marten van Dijk and Alina Oprea and Ari Juels
2011/584 ( PDF )
A Single-Key Attack on 6-Round KASUMI
Teruo Saito
2011/583 ( PDF )
Revocable Identity-Based Encryption from Lattices
Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Khoa Nguyen
2011/582 ( PDF )
Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$
Abdoul Aziz Ciss
2011/581 ( PS PS.GZ PDF )
Standard Security Does Not Imply Security Against Selective-Opening
Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek
2011/580 ( PDF )
On a new generalization of Huff curves
Abdoul Aziz Ciss and Djiby Sow
2011/579 ( PDF )
Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements
Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama
2011/578 ( PDF )
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS
Balasingham Balamohan
2011/577 ( PDF )
An Efficient Protocol for the Commit-Prove-Fair-Open functionality
Ou Ruan , Cai Fu and Guohua Cui
2011/576 ( PDF )
Efficient Multicast Key Distribution Using HOWP-based Dynamic Group Access Structures
Jing Liu and Qiong Huang and Bo Yang and Yang Zhang
2011/575 ( PDF )
Exclusive Key Based Group Rekeying Protocols
Jing Liu and Changji Wang
2011/574 ( PDF )
Towards Efficient Provable Data Possession
Jia XU and Ee-Chien CHANG
2011/573 ( PDF )
A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2011/572 ( PDF )
The ElGamal cryptosystem over circulant matrices
Ayan Mahalanobis
2011/571 ( -- withdrawn -- )
Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions
Brajesh Kumar Singh and Sugata Gangopadhyay
2011/570 ( PDF )
Degree of regularity for HFE-
Jintai Ding and Thorsten Kleinjung
2011/569 ( PDF )
Analysis of the Hamming Weight of the Extended wmbNAF
Ming Li, Ali Miri and Daming Zhu
2011/568 ( PDF )
Single Layer Optical-scan Voting with Fully Distributed Trust
Aleksander Essex and Christian Henrich and Urs Hengartner
2011/567 ( PDF )
On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption
Moon Sung Lee
2011/566 ( PDF )
Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry and Shai Halevi and Nigel P. Smart
2011/565 ( PDF )
Cryptographic Hash Functions: Recent Design Trends and Security Notions
Saif Al-Kuwari and James H. Davenport and Russell J. Bradford
2011/564 ( PS PS.GZ PDF )
Private-key Symbolic Encryption
N. Ahmed and C.D. Jensen and E. Zenner
2011/563 ( PS PS.GZ PDF )
On the Security of RFID Anti Cloning Security Protocol(ACSP)
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
2011/562 ( PDF )
A Group Testing Approach to Improved Corruption Localizing Hashing
Annalisa De Bonis and Giovanni Di Crescenzo
2011/561 ( PS PS.GZ PDF )
A Domain-Specific Language for Computing on Encrypted Data
Alex Bain and John Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman
2011/560 ( PDF )
Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
Ching-Hua Yu and Bo-Yin Yang
2011/559 ( PDF )
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
Eike Kiltz and Adam O'Neill and Adam Smith
2011/558 ( PDF )
Improved Attacks on Full GOST
Itai Dinur and Orr Dunkelman and Adi Shamir
2011/557 ( PDF )
An Improved Trace Driven Instruction Cache Timing Attack on RSA
Chen Cai-Sen, Wang Tao, Chen Xiao-Cen and Zhou Ping
2011/556 ( PDF )
GF(2^n) redundant representation using matrix embedding
Yongjia Wang and Haining Fan
2011/555 ( PDF )
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
Michelle Kendall and Keith Martin
2011/554 ( PDF )
On the security models for certificateless signature schemes achieving level 3 security
Yu-Chi Chen and Gwoboa Horng
2011/553 ( PDF )
Publicly Verifiable Proofs of Sequential Work
Mohammad Mahmoody and Tal Moran and Salil Vadhan
2011/552 ( PDF )
Recyclable PUFs: Logically Reconfigurable PUFs
Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann
2011/551 ( PDF )
Security Evaluation against Differential Cryptanalysis for Block Cipher Structures
Shengbao Wu and Mingsheng Wang
2011/550 ( PDF )
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
Javad Alizadeh and Abdolrasoul Mirghadri
2011/549 ( PDF )
1-Resilient Boolean Function with Optimal Algebraic Immunity
Qingfang Jin and Zhuojun Liu and Baofeng Wu
2011/548 ( PDF )
On the security of MQ_DRBG
V.O. Drelikhov and G.B. Marshalko and A.V. Pokrovskiy
2011/547 ( PDF )
The Single Cycle T-functions
Zhaopeng Dai and Zhuojun Liu
2011/546 ( PDF )
Hidden Vector Encryption Fully Secure Against Unrestricted Queries
Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
2011/545 ( PDF )
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2011/544 ( PDF )
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers
Andres Molina-Markham and George Danezis and Kevin Fu and Prashant Shenoy and David Irwin
2011/543 ( PDF )
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Tatsuaki Okamoto and Katsuyuki Takashima
2011/542 ( PDF )
Certificate-Based Signcryption: Security Model and Efficient Construction
Yang Lu and Jiguo Li
2011/541 ( PDF )
Minimalism in Cryptography: The Even-Mansour Scheme Revisited
Orr Dunkelman, Nathan Keller, Adi Shamir
2011/540 ( PDF )
Efficient Implementation of the $\eta_T$ Pairing on GPU
Yosuke Katoh and Yun-Ju Huang and Chen-Mou Cheng and Tsuyoshi Takagi
2011/539 ( PDF )
Sign Modules in Secure Arithmetic Circuits
Ching-Hua Yu
2011/538 ( PDF )
Leakage-Resilient Client-side Deduplication of Encrypted Data in Cloud Storage
Jia Xu and Ee-Chien Chang and Jianying Zhou
2011/537 ( PDF )
Lattice Signatures Without Trapdoors
Vadim Lyubashevsky
2011/536 ( PDF )
Revisiting Lower and Upper Bounds for Selective Decommitments
Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti
2011/535 ( PDF )
Multiparty Computation from Somewhat Homomorphic Encryption
I. Damgard and V. Pastro and N.P. Smart and S. Zakarias
2011/534 ( PDF )
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
Maxime Nassar and Sylvain Guilley and Jean-Luc Danger
2011/533 ( PDF )
Two-Output Secure Computation with Malicious Adversaries
abhi shelat and Chih-hao Shen
2011/532 ( PDF )
Hash Functions Based on Three Permutations: A Generic Security Analysis
Bart Mennink and Bart Preneel
2011/531 ( PDF )
Static Fault Attacks on Hardware DES Registers
Philippe Loubet-Moundi and David Vigilant and Francis Olivier
2011/530 ( PDF )
Key-Evolution Schemes Resilient to Space-Bounded Leakage
Stefan Dziembowski and Tomasz Kazana and Daniel Wichs
2011/529 ( PDF )
Secure and Efficient Proof of Storage with Deduplication
Qingji Zheng and Shouhuai Xu
2011/528 ( PDF )
Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy
Jian-Zhu Lu, Hong-Qing Ren, and Jipeng Zhou
2011/527 ( -- withdrawn -- )
Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography
Mohsen Toorani and Maryam Saeed
2011/526 ( PS PS.GZ PDF )
Universally Composable Security Analysis of OAuth v2.0
Suresh Chari and Charanjit Jutla and Arnab Roy
2011/525 ( PDF )
A Note on the Density of the Multiple Subset Sum Problems
Yanbin Pan and Feng Zhang
2011/524 ( PDF )
Security of Reduced-Round Camellia against Impossible Differential Attack
Leibo Li, Jiazhe Chen and Xiaoyun Wang
2011/523 ( -- withdrawn -- )
Security analysis of a fuzzy identity-based encryption scheme
Miaomiao Tian and Liusheng Huang and Wei Yang
2011/522 ( PDF )
A Compact S-Box Design for SMS4 Block Cipher
Imran Abbasi, Mehreen Afzal
2011/521 ( PDF )
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions
Daniele Micciancio and Petros Mol
2011/520 ( PDF )
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency
Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger
2011/519 ( PDF )
Leakage-Resilient Cryptography From the Inner-Product Extractor
Stefan Dziembowski and Sebastian Faust
2011/518 ( PDF )
Two 1-Round Protocols for Delegation of Computation
Ran Canetti and Ben Riva and Guy N. Rothblum
2011/517 ( PDF )
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2011/516 ( PDF )
Protecting AES with Shamir's Secret Sharing Scheme
Louis Goubin and Ange Martinelli
2011/515 ( PDF )
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity
Qingfang Jin and Zhuojun Liu and Baofeng Wu and Xiaoming Zhang
2011/514 ( PDF )
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols
Mohammad Sadeq Dousti and Rasool Jalili
2011/513 ( PDF )
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
Abhishek Jain and Omkant Pandey
2011/512 ( PDF )
A Dichotomy for Local Small-Bias Generators
Benny Applebaum and Andrej Bogdanov and Alon Rosen
2011/511 ( PDF )
The Cryptographic Power of Random Selection
Matthias Krause and Matthias Hamann
2011/510 ( PDF )
On the Security of the Free-XOR Technique
Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Hong-Sheng Zhou
2011/509 ( PDF )
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Emil Stefanov and Elaine Shi and Dawn Song
2011/508 ( PDF )
Secure Two-Party Computation with Low Communication
Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay
2011/507 ( PDF )
Relatively-Sound NIZKs and Password-Based Key-Exchange
Charanjit Jutla and Arnab Roy
2011/506 ( PDF )
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Luca De Feo and David Jao and Jérôme Plût
2011/505 ( PDF )
A New Second Order Side Channel Attack Based on Linear Regression
Julien Doget and Guillaume Dabosville and Emmanuel Prouff
2011/504 ( PDF )
From Non-Adaptive to Adaptive Pseudorandom Functions
Iftach Haitner and Itay Berman
2011/503 ( PDF )
On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$
Christina Boura and Anne Canteaut
2011/502 ( PDF )
Wild McEliece Incognito
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2011/501 ( PDF )
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
Daniele Micciancio and Chris Peikert
2011/500 ( PDF )
Biclique Cryptanalysis of the Block Cipher SQUARE
Hamid Mala
2011/499 ( PDF )
Duplexing the sponge: single-pass authenticated encryption and other applications
Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche
2011/498 ( PDF )
An Efficient Secure Anonymous Proxy Signature Scheme
*Jue-Sam Chou 1, Shih-Che Hung 2, Yalin Chen
2011/497 ( PDF )
Can a Program Reverse-Engineer Itself?
Antoine Amarilli and David Naccache and Pablo Rauzy and Emil Simion
2011/496 ( PDF )
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
Avradip Mandal and Jacques Patarin and Yannick Seurin
2011/495 ( PDF )
Vector Commitments and their Applications
Dario Catalano and Dario Fiore
2011/494 ( PDF )
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
Carmit Hazay and Gert Læssøe Mikkelsen and Tal Rabin and Tomas Toft
2011/493 ( PDF )
From Point Obfuscation To 3-round Zero-Knowledge
Nir Bitansky and Omer Paneth
2011/492 ( PDF )
Rational distance-bounding protocols over noisy channels
Long H. Nguyen
2011/491 ( -- withdrawn -- )
Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid
Qi Jiang, Jianfeng Ma, Guangsong Li and Xiang Lu
2011/490 ( PDF )
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Allison Lewko
2011/489 ( PS PS.GZ PDF )
Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis
A. N. Alekseychuk and L. V. Kovalchuk
2011/488 ( PS PS.GZ )
A Survey of Cryptography Based on Physically Unclonable Objects
Kai-Yuen Cheong
2011/487 ( PDF )
Noiseless Database Privacy
Raghav Bhaskar and Abhishek Bhowmick and Vipul Goyal and Srivatsan Laxman and Abhradeep Thakurta
2011/486 ( PDF )
On the Joint Security of Encryption and Signature, Revisited
Kenneth G. Paterson and Jacob C.N. Schuldt and Martijn Stam and Susan Thomson
2011/485 ( PDF )
Another Look at Automated Theorem-Proving. II
Neal Koblitz
2011/484 ( PDF )
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
Johannes Buchmann, Erik Dahmen, and Andreas Hülsing
2011/483 ( PDF )
Adaption of Pollard's kangaroo algorithm to the FACTOR problem
Mario Romsy
2011/482 ( PDF )
Secure Computation with Sublinear Amortized Work
Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis
2011/481 ( PDF )
Close to Uniform Prime Number Generation With Fewer Random Bits
Pierre-Alain Fouque and Mehdi Tibouchi
2011/480 ( PDF )
Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis
Sanjay Bhattacherjee and Palash Sarkar
2011/479 ( PDF )
Identity-Based (Lossy) Trapdoor Functions and Applications
Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters
2011/478 ( PDF )
An efficient certificateless authenticated key agreement scheme
Debiao He, Sahadeo Padhye, Jianhua Chen
2011/477 ( PDF )
Cryptanalysis of NTRU with two public keys
Abderrahmane Nitaj
2011/476 ( PDF )
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Benoit Libert and Kenneth G. Paterson and Elizabeth A. Quaglia
2011/475 ( PDF )
Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis
Nicolas T. Courtois, Daniel Hulme and Theodosis Mourouzis
2011/474 ( PDF )
Improved Generic Algorithms for Hard Knapsacks
Anja Becker and Jean-Sébastien Coron and Antoine Joux
2011/473 ( PS PS.GZ PDF )
Practically Efficient Verifiable Delegation of Polynomial and its Applications
Jia XU
2011/472 ( PDF )
Forward Secure Ring Signature without Random Oracles
Joseph K. Liu and Tsz Hon Yuen and Jianying Zhou
2011/471 ( PDF )
Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme
P. Scholl and N.P. Smart
2011/470 ( PDF )
Non-malleable public key encryption in BRSIM/UC
István Vajda
2011/469 ( PDF )
Cryptanalysis of INCrypt32 in HID's iCLASS Systems
ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han
2011/468 ( PDF )
Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three
Hongfeng Wu and Chang-An Zhao
2011/467 ( PDF )
A !ew Efficient Asymmetric Cryptosystem for large data sets
M.R.K. Ariffin, M.A. Asbullah and N.A. Abu
2011/466 ( PDF )
Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher
Keting Jia and Christian Rechberger and Xiaoyun Wang
2011/465 ( PDF )
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
Craig Costello and Kristin Lauter and Michael Naehrig
2011/464 ( PDF )
Private and Oblivious Set and Multiset Operations
Marina Blanton and Everaldo Aguiar
2011/463 ( PDF )
Decentralized Dynamic Broadcast Encryption
Duong Hieu Phan and David Pointcheval and Mario Strefler
2011/462 ( PDF )
Secure Outsourced Computation of Iris Matching
Marina Blanton and Mehrdad Aliasgari
2011/461 ( PDF )
Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving
Fangguo Zhang and Ping Wang
2011/460 ( PDF )
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings
Zijian Zhang and Liehuang Zhu and Lejian Liao
2011/459 ( PDF )
Sufficient conditions for sound hashing using a truncated permutation
Joan Daemen and Tony Dusenge and Gilles Van Assche
2011/458 ( PDF )
Sieving for Shortest Vectors in Ideal Lattices
Michael Schneider
2011/457 ( PDF )
Resettable Statistical Zero Knowledge
Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
2011/456 ( PDF )
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs
Shafi Goldwasser, Huijia Lin, Aviad Rubinstein
2011/455 ( PDF )
The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption
Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang
2011/454 ( PDF )
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers and Mona Sergi and abhi shelat
2011/453 ( PDF )
Practical Complexity Differential Cryptanalysis and Fault Analysis of AES
Michael Tunstall
2011/452 ( PDF )
The Good lower bound of Second-order nonlinearity of a class of Boolean function
Manish Garg and Sugata Gangopadhyay
2011/451 ( PDF )
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
Hakhyun Kim, Woongryul Jeon, Yunho Lee and Dongho Won
2011/450 ( -- withdrawn -- )
R-hash : Hash Function Using Random Quadratic Polynomials Over GF (2)
Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta
2011/449 ( PDF )
Biclique Cryptanalysis of the Full AES
Andrey Bogdanov and Dmitry Khovratovich and Christian Rechberger
2011/448 ( PDF )
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher
Sourav Sen Gupta and Subhamoy Maitra and Goutam Paul and Santanu Sarkar
2011/447 ( PDF )
On Verifying Dynamic Multiple Data Copies over Cloud Servers
Ayad F. Barsoum and M. Anwar Hasan
2011/446 ( PDF )
Private Information Extraction over Online Social Networks
Huang Lin and Yuguang Fang and Zhenfu Cao
2011/445 ( PDF )
Privacy-Preserving Friend Search over Online Social Networks
Huang Lin and Sherman S. M. Chow and Dongsheng Xing and Yuguang Fang and Zhenfu Cao
2011/444 ( PDF )
Generalised Mersenne Numbers Revisited
Robert Granger and Andrew Moss
2011/443 ( PDF )
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again
Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer
2011/442 ( PDF )
Another Look at Tightness
Sanjit Chatterjee and Alfred Menezes and Palash Sarkar
2011/441 ( PDF )
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
Jean-Sebastien Coron and Avradip Mandal and David Naccache and Mehdi Tibouchi
2011/440 ( PDF )
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi
2011/439 ( PDF )
Optimal Data Authentication from Directed Transitive Signatures
Philippe Camacho
2011/438 ( PDF )
Short Transitive Signatures for Directed Trees
Philippe Camacho and Alejandro Hevia
2011/437 ( PDF )
Approximate common divisors via lattices
Henry Cohn and Nadia Heninger
2011/436 ( PDF )
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers
Yuanmi Chen and Phong Q. Nguyen
2011/435 ( PDF )
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
Yehuda Lindell and Benny Pinkas and Eli Oxman
2011/434 ( PDF )
An Efficient Protocol for Oblivious DFA Evaluation and Applications
Payman Mohassel and Salman Niksefat and Saeed Sadeghian and Babak Sadeghiyan
2011/433 ( PDF )
Collusion-Preserving Computation
Joel Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas
2011/432 ( PS PS.GZ PDF )
Ciphers that Securely Encipher their own Keys
Mihir Bellare and David Cash and Sriram Keelveedhi
2011/431 ( PDF )
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Enrico Thomae and Christopher Wolf
2011/430 ( PDF )
Analogues of Velu's formulas for Isogenies on Alternate Models of Elliptic Curves
Dustin Moody and Daniel Shumow
2011/429 ( PDF )
Round-efficient Oblivious Database Manipulation
Sven Laur and Jan Willemson and Bingsheng Zhang
2011/428 ( PDF )
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -
Tatsuya TAKEHISA and Hiroki NOGAWA and Masakatu MORII
2011/427 ( PDF )
A new attack on the KMOVcryptosystem
Abderrahmane Nitaj
2011/426 ( PS PS.GZ PDF )
Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
Masoumeh Safkhani and Nasour Bagheri and Somitra Kumar Sanadhya and Majid Naderi
2011/425 ( PDF )
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
Laurie Genelle and Emmanuel Prouff and Michaël Quisquater
2011/424 ( PS PS.GZ PDF )
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Masoumeh Safkhani and Nasour Bagheri and Majid Naderi
2011/423 ( PDF )
Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere
Martin Ågren and Thomas Johansson
2011/422 ( PDF )
Improved Analysis of ECHO-256
Jérémy Jean and María Naya-Plasencia and Martin Schläffer
2011/421 ( PDF )
Superposition Attacks on Cryptographic Protocols
Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail
2011/420 ( PS PS.GZ PDF )
Unaligned Rebound Attack - Application to Keccak
Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
2011/419 ( -- withdrawn -- )
On the security of a certificateless short signature scheme
Miaomiao Tian and Liusheng Huang and Wei Yang
2011/418 ( PDF )
An efficient RFID mutual authentication scheme based on ECC
Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin
2011/417 ( PDF )
New Data-Efficient Attacks on Reduced-Round IDEA
Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir
2011/416 ( PDF )
Efficient Parallelization of Lanczos Type Algorithms
Ilya Popovyan
2011/415 ( PDF )
On the Access Structures of Hyperelliptic Secret Sharing
Lei Li and Siman Yang
2011/414 ( PDF )
Fuzzy Identity Based Encryption from Lattices
Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee
2011/413 ( PDF )
Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation Protocols – Extended Version –
Thomas Roche and Emmanuel Prouff
2011/412 ( PDF )
Automatic Insertion of DPA Countermeasures
Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall
2011/411 ( PDF )
Comments on a password authentication and update scheme based on elliptic curve cryptography
Debiao He
2011/410 ( PDF )
Functional Encryption for Inner Product Predicates from Learning with Errors
Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan
2011/409 ( PDF )
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption
Xiaoyuan Yang, Weiyi Cai, Xu An Wang
2011/408 ( PDF )
Resettable Cryptography in Constant Rounds -- the Case of Zero Knowledge
Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung
2011/407 ( PDF )
Oblivious RAM with O((log N)^3) Worst-Case Cost
Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li
2011/406 ( PDF )
Composition Theorems Without Pre-Established Session Identifiers
Ralf Kuesters and Max Tuengerthal
2011/405 ( PDF )
Can Homomorphic Encryption be Practical?
Kristin Lauter and Michael Naehrig and Vinod Vaikuntanathan
2011/404 ( PDF )
A constant-round resettably-sound resettable zero-knowledge argument in the BPK model
Seiko Arita
2011/403 ( PDF )
A Fair Evaluation Framework for Comparing Side-Channel Distinguishers
Carolyn Whitnall and Elisabeth Oswald
2011/402 ( PDF )
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles
Essam Ghadafi
2011/401 ( PDF )
Pseudorandom Functions and Lattices
Abhishek Banerjee and Chris Peikert and Alon Rosen
2011/400 ( PDF )
On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$
Gérard Cohen and Jean-Pierre Flori
2011/399 ( PDF )
Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic
Luk Bettale and Jean-Charles Faugère and Ludovic Perret
2011/398 ( PDF )
Hardness of Learning Problems over Burnside Groups of Exponent 3
Nelly Fazio and Kevin Iga and Antonio Nicolosi and Ludovic Perret and William E. Skeith III
2011/397 ( PS PS.GZ )
The n-Diffie-Hellman Problem and its Applications
Liqun Chen and Yu Chen
2011/396 ( PDF )
Fair Computation with Rational Players
Adam Groce and Jonathan Katz
2011/395 ( PDF )
Improved Anonymity for Key-Trees
Beye, Michael and Veugen, Thijs
2011/394 ( PDF )
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument
Helger Lipmaa and Bingsheng Zhang
2011/393 ( -- withdrawn -- )
Analysis and Improvement of Thing's Time-Memory Trade-Off Attack
Zhenqi Li, Dongdai Lin and Wenhao Wang
2011/392 ( PDF )
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)
Yun Zhang, Christophe Tartary and Huaxiong Wang
2011/391 ( PDF )
On the Portability of Side-Channel Attacks – An Analysis of the Xilinx Virtex 4, Virtex 5, and Spartan 6 Bitstream Encryption Mechanism
Amir Moradi and Markus Kasper and Christof Paar
2011/390 ( PDF )
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar
2011/389 ( PDF )
Spatial Encryption
Mike Hamburg
2011/388 ( PDF )
Modulus Fault Attacks Against RSA-CRT Signatures
Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi
2011/387 ( PDF )
Analysis of the Parallel Distinguished Point Tradeoff
Jin Hong and Ga Won Lee and Daegun Ma
2011/386 ( PDF )
How to share secrets simultaneously
Laszlo Csirmaz
2011/385 ( PDF )
Efficient Implementation of Grand Cru with TI C6x+ Processor
Azhar Ali Khan and Ghulam Murtaza
2011/384 ( PDF )
Distributed Oblivious RAM for Secure Two-Party Computation
Steve Lu and Rafail Ostrovsky
2011/383 ( PDF )
A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application
Stefan Maubach
2011/382 ( PDF )
Generic Fully Simulatable Adaptive Oblivious Transfer
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2011/381 ( PDF )
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
Yalin Chen1, Jue-Sam Chou2, Chi-Fong Lin3, Cheng-Lun Wu4
2011/380 ( PDF )
An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis
Carolyn Whitnall and Elisabeth Oswald and Luke Mather
2011/379 ( PDF )
Cryptanalysis and improvement of a certificateless multi-proxy signature scheme
Miaomiao Tian and Wei Yang and Liusheng Huang
2011/378 ( PS PS.GZ PDF )
A generalization of the Lucas addition chains
Amadou TALL
2011/377 ( PS PS.GZ PDF )
Improved Generalized Birthday Attack
Paul Kirchner
2011/376 ( PDF )
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check
Julien Bringer and Alain Patey
2011/375 ( PDF )
Complexity of universal access structures
Laszlo Csirmaz
2011/374 ( PDF )
Restoring the Differential Resistance of MD6
Ethan Heilman
2011/373 ( PDF )
An efficient characterization of a family of hyperbent functions with multiple trace terms
Jean-Pierre Flori and Sihem Mesnager
2011/372 ( PDF )
Identity based signcryption schemes without random oracles
Prashant Kushwah and Sunder Lal
2011/371 ( PDF )
Monoidic Codes in Cryptography
Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki
2011/370 ( PDF )
Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
Mehrdad Nojoumian and Douglas R. Stinson
2011/369 ( PS PS.GZ PDF )
Storing Secrets on Continually Leaky Devices
Yevgeniy Dodis and Allison Lewko and Brent Waters and Daniel Wichs
2011/368 ( PDF )
High-speed high-security signatures
Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang
2011/367 ( PDF )
Decoding One Out of Many
Nicolas Sendrier
2011/366 ( PDF )
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks
Deng Tang and Claude Carlet and Xiaohu Tang
2011/365 ( PDF )
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
Debiao He
2011/364 ( PDF )
The Value $4$ of Binary Kloosterman Sums
Jean-Pierre Flori and Sihem Mesnager and Gérard Cohen
2011/363 ( -- withdrawn -- )
Dynamic Group Blind Signatures
Essam Ghadafi
2011/362 ( PDF )
Practically Efficient Proof of Retrievability in Cloud Storage
Jia XU and Ee-Chien CHANG
2011/361 ( PDF )
The Exact Security of a Stateful IBE and New Compact Stateful PKE Schemes
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2011/360 ( PDF )
Certificateless Aggregate Signcryption Schemes
Ziba Eslami, Nasrollah Pakniat
2011/359 ( PDF )
High-Entropy Visual Identification for Touch Screen Devices
Nathaniel Wesley Filardo and Giuseppe Ateniese
2011/358 ( PDF )
Constructing a Ternary FCSR with a Given Connection Integer
Lin Zhiqiang and Pei Dingyi
2011/357 ( PDF )
Generalized Learning Problems and Applications to Non-Commutative Cryptography
Gilbert Baumslag and Nelly Fazio and Antonio R. Nicolosi and Vladimir Shpilrain and William E. Skeith III
2011/356 ( PS PS.GZ PDF )
An Efficient Attack on All Concrete KKS Proposals
Ayoub Otmani and Jean-Pierre Tillich
2011/355 ( PDF )
On the (Non-)Equivalence of UC Security Notions
Oana Ciobotaru
2011/354 ( PDF )
A coprocessor for secure and high speed modular arithmetic
Nicolas Guillermin
2011/353 ( PDF )
Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi and Shigeo Tsujii
2011/352 ( PDF )
Bi-Deniable Public-Key Encryption
Adam O'Neill and Chris Peikert and Brent Waters
2011/351 ( -- withdrawn -- )
Cryptanalysis of the $AA_{\beta}$ Cryptosystem based on Linear Diophantine Equation Discrete Log Problem
Yanbin Pan , Yingpu Deng
2011/350 ( PDF )
$HB^N$: An HB-like protocol secure against man-in-the-middle attacks
Carl Bosley and Kristiyan Haralambiev and Antonio Nicolosi
2011/349 ( PDF )
Efficient Methods for Exploiting Faults Induced at AES Middle Rounds
Chong Hee Kim
2011/348 ( PDF )
Extractors Against Side-Channel Attacks: Weak or Strong?
Marcel Medwed and Francois-Xavier Standaert
2011/347 ( -- withdrawn -- )
An efficient certificateless authenticated key agreement protocol without bilinear pairings
Debiao He
2011/346 ( PDF )
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
Hai Huang
2011/345 ( PDF )
LBlock: A Lightweight Block Cipher *
Wenling Wu and Lei Zhang
2011/344 ( PDF )
Efficient Fully Homomorphic Encryption from (Standard) LWE
Zvika Brakerski and Vinod Vaikuntanathan
2011/343 ( PDF )
Another Look at Security Definitions
Neal Koblitz and Alfred Menezes
2011/342 ( PDF )
A Domain Transformation for Structure-Preserving Signatures on Group Elements
Melissa Chase and Markulf Kohlweiss
2011/341 ( -- withdrawn -- )
An Improved Internet Voting Protocol
Mehmet Sabir Kiraz and Süleyman Kardaş and Muhammed Ali Bingöl and Fatih Birinci
2011/340 ( PDF )
Encrypting More Information in Visual Cryptography Scheme
Feng Liu, Peng Li, ChuanKun Wu
2011/339 ( PDF )
Careful with Composition: Limitations of Indifferentiability and Universal Composability
Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton
2011/338 ( PDF )
Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves
Matthieu Rivain
2011/337 ( PDF )
Functional Re-encryption and Collusion-Resistant Obfuscation
Nishanth Chandran and Melissa Chase and Vinod Vaikuntanathan
2011/336 ( -- withdrawn -- )
Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
Debiao He
2011/335 ( PDF )
New look at impossibility result on Dolev-Yao models with hashes
István Vajda
2011/334 ( PDF )
On the Efficient Implementation of Pairing-Based Protocols
Michael Scott
2011/333 ( PDF )
Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He
2011/332 ( PDF )
A depth-16 circuit for the AES S-box
Joan Boyar and Rene Peralta
2011/331 ( PS PS.GZ PDF )
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
Masoumeh Safkhani and Pedro Peris-Lopez and Julio Cesar Hernandez-Castro and Nasour Bagheri and Majid Naderi
2011/330 ( PDF )
Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme
Ashish Choudhury
2011/329 ( PS PS.GZ PDF )
Hardness of Computing Individual Bits for One-way Functions on Elliptic Curves
Alexandre Duc and Dimitar Jetchev
2011/328 ( PDF )
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption
Gu Chunsheng
2011/327 ( PDF )
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky
2011/326 ( PDF )
SGCM: The Sophie Germain Counter Mode
Markku-Juhani O. Saarinen
2011/325 ( PDF )
New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm
Aram Jivanyan and Gurgen Khachatryan
2011/324 ( PDF )
On the Efficiency of Bit Commitment Reductions
Samuel Ranellucci and Alain Tapp and Severin Winkler and Jürg Wullschleger
2011/323 ( PDF )
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
Shusheng Liu and Libin Wang and Zheng Gong
2011/322 ( PDF )
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework
Carolyn Whitnall and Elisabeth Oswald
2011/321 ( PDF )
A Formal Approach to Distance-Bounding RFID Protocols
Ulrich Duerholz and Marc Fischlin and Michael Kasper and Cristina Onete
2011/320 ( PDF )
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
Manan Nayak and Shashank Agrawal and Kannan Srinathan
2011/319 ( PS PS.GZ PDF )
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
Jan Camenisch and Kristiyan Haralambiev and Markulf Kohlweiss and Jorn Lapon and Vincent Naessens
2011/318 ( PDF )
Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF
Sujoy Sinha Roy and Chester Rebeiro and Debdeep Mukhopadhyay and Junko Takahashi and Toshinori Fukunaga
2011/317 ( PDF )
Two Simple Code-Verification Voting Protocols
Helger Lipmaa
2011/316 ( PDF )
Security of Blind Signatures Revisited
Dominique Schröder and Dominique Unruh
2011/315 ( PDF )
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0
Zhi Hu and Patrick Longa and Maozhi Xu
2011/314 ( PDF )
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi
2011/313 ( PDF )
Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity
Arpita Patra
2011/312 ( PDF )
Differential Cryptanalysis of GOST
Nicolas T. Courtois and Michal Misztal
2011/311 ( PDF )
Targeted Malleability: Homomorphic Encryption for Restricted Computations
Dan Boneh and Gil Segev and Brent Waters
2011/310 ( PS PS.GZ PDF )
Universally Composable Synchronous Computation
Jonathan Katz and Ueli Maurer and Björn Tackmann and Vassilis Zikas
2011/309 ( PDF )
On Constructing Homomorphic Encryption Schemes from Coding Theory
Frederik Armknecht and Daniel Augot and Ludovic Perret and Ahmad-Reza Sadeghi
2011/308 ( PDF )
Provably Secure and Practical Onion Routing
Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
2011/307 ( PDF )
Ways to restrict the differential path
ZiJie Xu and Ke Xu
2011/306 ( PDF )
Group Law Computations on Jacobians of Hyperelliptic Curves
Craig Costello and Kristin Lauter
2011/305 ( PDF )
A new attack on Jakobsson Hybrid Mix-Net
Seyyed Amir Mortazavi
2011/304 ( PDF )
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Jia XU
2011/303 ( PDF )
GNUC: A New Universal Composability Framework
Dennis Hofheinz and Victor Shoup
2011/302 ( PDF )
Univariate Side Channel Attacks and Leakage Modeling
Julien Doget and Emmanuel Prouff and Matthieu Rivain and François-Xavier Standaert
2011/301 ( PDF )
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
Ronald Cramer and Ivan Damgard and Valerio Pastro
2011/300 ( PDF )
One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability
Cas Cremers and Michele Feltz
2011/299 ( PDF )
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
Palash Sarkar
2011/298 ( PDF )
Local limit theorem for large deviations and statistical box-tests
Igor Semaev
2011/297 ( PDF )
NEW STATISTICAL BOX-TEST AND ITS POWER
Igor Semaev and Mehdi M. Hassanzadeh
2011/296 ( PDF )
Short Signatures From Weaker Assumptions
Dennis Hofheinz and Tibor Jager and Eike Kiltz
2011/295 ( PDF )
Counting Points on Genus 2 Curves with Real Multiplication
P. Gaudry and D. Kohel and B. Smith
2011/294 ( PDF )
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
Albrecht Petzoldt and Enrico Thomae and Stanislav Bulygin and Christopher Wolf
2011/293 ( -- withdrawn -- )
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
W. Han
2011/292 ( PDF )
On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve
Namhun Koo and Gooc Hwa Jo and Soonhak Kwon
2011/291 ( PDF )
Leakage-Resilient Coin Tossing
Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai
2011/290 ( PDF )
Some Results Concerning Generalized Bent Functions
Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh
2011/289 ( PDF )
Polly Cracker, Revisited
Martin R. Albrecht and Jean-Charles Faugère and Pooya Farshim and Gottfried Herold and Ludovic Perret
2011/288 ( PDF )
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks
Ashish Choudhury and Arpita Patra
2011/287 ( PDF )
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
Stanislav Bulygin
2011/286 ( PDF )
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva
2011/285 ( PDF )
Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version)
Andrea Röck and Kaisa Nyberg
2011/284 ( -- withdrawn -- )
On the Security of PPPoE Network
Fanbao Liu and Yumeng Feng and Yuan Cao
2011/283 ( PDF )
The Fault Attack ECDLP Revisited
Mingqiang Wang and Xiaoyun Wang and Tao Zhan
2011/282 ( PDF )
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
Itai Dinur and Tim Güneysu and Christof Paar and Adi Shamir and Ralf Zimmermann
2011/281 ( PDF )
Computational Verifiable Secret Sharing Revisited
Michael Backes and Aniket Kate and Arpita Patra
2011/280 ( PDF )
DDH-like Assumptions Based on Extension Rings
Ronald Cramer and Ivan Damgaard and Eike Kiltz and Sarah Zakarias and Angela Zottarel
2011/279 ( PDF )
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
Craig Gentry and Shai Halevi
2011/278 ( PDF )
Comparing Different Definitions of Secure Session
Can Zhang
2011/277 ( PDF )
Fully Homomorphic Encryption without Bootstrapping
Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan
2011/276 ( PDF )
Analysis of the SSH Key Exchange Protocol
Stephen C. Williams
2011/275 ( PDF )
Inverting the Square systems is exponential
Jintai Ding
2011/274 ( -- withdrawn -- )
A Splice-and-Cut Cryptanalysis of the AES
Dmitry Khovratovich and Christian Rechberger
2011/273 ( PDF )
Memory Delegation
Kai-Min Chung and Yael Tauman Kalai and Feng-Hao Liu and Ran Raz
2011/272 ( PDF )
Outsourcing Multi-Party Computation
Seny Kamara and Payman Mohassel and Mariana Raykova
2011/271 ( PDF )
Practical Key-recovery For All Possible Parameters of SFLASH
Charles Bouillaguet and Pierre-Alain Fouque and Gilles Macario-Rat
2011/270 ( PDF )
Programmable Hash Functions and Their Applications
Dennis Hofheinz and Eike Kiltz
2011/269 ( PDF )
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare and Sriram Keelveedhi
2011/268 ( PDF )
Birthday Forgery Attack on 128-EIA3 Version 1.5
Raja Zeshan Haider
2011/267 ( PDF )
Mutual Private Set Intersection with Linear Complexity
Myungsun Kim and Hyung Tae Lee and Jung Hee Cheon
2011/266 ( PDF )
Identity-Based Decryption
Daniel R. L. Brown
2011/265 ( PDF )
Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol
Qiushi Yang and Yvo Desmedt
2011/264 ( PDF )
Round Optimal Blind Signatures
Dominique Schröder and Dominique Unruh
2011/263 ( PDF )
The Computational Square-Root Exponent Problem- Revisited
Fangguo Zhang
2011/262 ( PDF )
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version
Mohamed Ahmed Abdelraheem and Julia Borghoff and Erik Zenner
2011/261 ( PDF )
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
Danilo Gligoroski and Rune Steinsmo Ødeård and Rune Erlend Jensen
2011/260 ( PDF )
Security \& Indistinguishability in the Presence of Traffic Analysis
Cristina Onete and Daniele Venturi
2011/259 ( PDF )
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
Douglas R.~Stinson
2011/258 ( PDF )
A High Speed Pairing Coprocessor Using RNS and Lazy Reduction
Gavin Xiaoxu Yao and Junfeng Fan and Ray C.C. Cheung and Ingrid Verbauwhede
2011/257 ( PDF )
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Seung Geol Choi and Kyung-Wook Hwang and Jonathan Katz and Tal Malkin and Dan Rubenstein
2011/256 ( -- withdrawn -- )
Leakage Resilient Secure Two-Party Computation
Ivan Damgaard, Carmit Hazay and Arpita Patra
2011/255 ( PDF )
Hiding the Policy in Cryptographic Access Control
Sascha Müller and Stefan Katzenbeisser
2011/254 ( PDF )
Using the Cloud to Determine Key Strengths
T. Kleinjung and A.K. Lenstra and D. Page and N.P. Smart
2011/253 ( PDF )
Attack Cryptosystems Based on HCDLP
Mingqiang Wang and Xiaoyun Wang and Tao Zhan
2011/252 ( PDF )
Cryptography Secure Against Related-Key Attacks and Tampering
Mihir Bellare and David Cash and Rachel Miller
2011/251 ( PDF )
Concurrently Secure Computation in Constant Rounds
Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai
2011/250 ( PDF )
A Parallel Repetition Theorem for Leakage Resilience
Zvika Brakerski and Yael Tauman Kalai
2011/249 ( -- withdrawn -- )
Breaking a certificateless key agreement protocol withour bilinear pairing
W. Han
2011/248 ( PDF )
Fast Password Recovery Attack: Application to APOP
Fanbao Liu and Yi Liu and Tao Xie and Yumeng Feng
2011/247 ( PDF )
An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2
Qi Chai, Xinxin Fan, Guang Gong
2011/246 ( PDF )
A Framework for Secure Single Sign-On
Bernardo Machado David and Anderson C. A. Nascimento and Rafael Tonicelli
2011/245 ( PDF )
On the Number of Carries Occuring in an Addition $\mod 2^k-1$
Jean-Pierre Flori and Hugues Randriam
2011/244 ( PDF )
PRISM -- Privacy-Preserving Search in MapReduce
Erik-Oliver Blass and Roberto Di Pietro and Refik Molva and Melek Onen
2011/243 ( PDF )
Affine Pairings on ARM
Tolga Acar and Kristin Lauter and Michael Naehrig and Daniel Shumow
2011/242 ( PDF )
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
Idan Sheetrit and Avishai Wool
2011/241 ( PDF )
A Novel Adaptive Proactive Secret Sharing without a Trusted Party
Xiuqun Wang
2011/240 ( PDF )
Universal Composability from Essentially Any Trusted Setup
Mike Rosulek
2011/239 ( PDF )
Efficient Software Implementations of Modular Exponentiation
Shay Gueron
2011/238 ( PDF )
Attacks On a Double Length Blockcipher-based Hash Proposal
Yiyuan Luo, Xuejia Lai
2011/237 ( PDF )
The block cipher NSABC (public domain)
Alice Nguyenova-Stepanikova and Tran Ngoc Duong
2011/236 ( PDF )
Using Templates to Distinguish Multiplications from Squaring Operations
Neil Hanley and Michael Tunstall and William P. Marnane
2011/235 ( PDF )
Computer-Aided Decision-Making with Trust Relations and Trust Domains (Cryptographic Applications)
Simon Kramer and Rajeev Goré and Eiji Okamoto
2011/234 ( PDF )
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
Debiao He
2011/233 ( PDF )
Correlated-Input Secure Hash Functions
Vipul Goyal and Adam O'Neill and Vanishree Rao
2011/232 ( PDF )
Remote Timing Attacks are Still Practical
Billy Bob Brumley and Nicola Tuveri
2011/231 ( PDF )
History-Free Sequential Aggregate Signatures
Marc Fischlin and Anja Lehmann and Dominique Schröder
2011/230 ( PDF )
All-But-Many Lossy Trapdoor Functions
Dennis Hofheinz
2011/229 ( PDF )
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
Md. Golam Kaosar
2011/228 ( PDF )
A Framework for Practical Universally Composable Zero-Knowledge Protocols
Jan Camenisch and Stephan Krenn and Victor Shoup
2011/227 ( PDF )
Robust parent-identifying codes and combinatorial arrays
Alexander Barg and Grigory Kabatiansky
2011/226 ( PDF )
Substitution-permutation networks, pseudorandom functions, and Natural Proofs
Eric Miles and Emanuele Viola
2011/225 ( PDF )
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry
Shaohua Tang and Jintai Ding and Yujun Liang
2011/224 ( PDF )
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme
Xu An Wang and Liqiang Wu and Xiaoyuan Yang and Huaqun Wang
2011/223 ( PDF )
A Perfectly Binding Commitment Scheme Against Quantum Attacks
Zeng Bing and Chen Liang and Tang Xueming
2011/222 ( PDF )
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations
Kyle Brogle and Sharon Goldberg and Leonid Reyzin
2011/221 ( PDF )
Protecting Drive Encryption Systems Against Memory Attacks
Leo Dorrendorf
2011/220 ( PDF )
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks
István Vajda
2011/219 ( PDF )
On the Security of TLS-DHE in the Standard Model
Tibor Jager, Florian Kohlar, Sven Schäge, and Jörg Schwenk
2011/218 ( PDF )
Cryptographic Analysis of All 4 x 4 - Bit S-Boxes
Markku-Juhani O. Saarinen
2011/217 ( PDF )
Identity Based Deterministic Signature Scheme Without Forking-Lemma
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2011/216 ( PDF )
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
2011/215 ( PDF )
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
M. Barbosa and P. Farshim
2011/214 ( PDF )
On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto
Charles Rackoff
2011/213 ( PDF )
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
M.R. Albrecht and P. Farshim and K.G. Paterson and G.J. Watson
2011/212 ( PDF )
Maiorana-McFarland Functions with High Second-Order Nonlinearity
Nicholas Kolokotronis and Konstantinos Limniotis
2011/211 ( PDF )
Security Evaluation of GOST 28147-89 In View Of International Standardisation
Nicolas T. Courtois
2011/210 ( PDF )
The preimage security of double-block-length compression functions
Jooyoung Lee and Martijn Stam and John Steinberger
2011/209 ( PDF )
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Zvika Brakerski and Gil Segev
2011/208 ( PS PS.GZ PDF )
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy
Jian Weng and Yunlei Zhao
2011/207 ( PDF )
Proofs of Ownership in Remote Storage Systems
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg
2011/206 ( PDF )
Isomorphism classes of Edwards curves over finite fields
R. Farashahi and D. Moody and H. Wu
2011/205 ( PDF )
Group-oriented ring signature
Chunbo Ma and Jun Ao
2011/204 ( PDF )
Leakage Tolerant Interactive Protocols
Nir Bitansky and Ran Canetti and Shai Halevi
2011/203 ( PS PS.GZ PDF )
Key agreement based on homomorphisms of algebraic structures
Juha Partala
2011/202 ( PDF )
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
Markku-Juhani O. Saarinen
2011/201 ( PDF )
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling
2011/200 ( PDF )
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)
Georg Neugebauer and Ulrike Meyer and Susanne Wetzel
2011/199 ( PDF )
An efficient deterministic test for Kloosterman sum zeros
Omran Ahmadi and Robert Granger
2011/198 ( PDF )
Terminating BKZ
Guillaume Hanrot and Xavier Pujol and Damien Stehlé
2011/197 ( PDF )
Public Key Encryption for the Forgetful
Puwen Wei and Yuliang Zheng and Xiaoyun Wang
2011/196 ( PDF )
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and S.M. Yiu
2011/195 ( -- withdrawn -- )
An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
Debiao He, Yitao Chen
2011/194 ( PS PS.GZ PDF )
Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol
Masoumeh Safkhani, Nasour Bagheri and Majid Naderi
2011/193 ( PDF )
Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol
Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, and Somitra Kumar Sanadhya
2011/192 ( PDF )
Short and Efficient Certificate-Based Signature
Joseph K. Liu and Feng Bao and Jianying Zhou
2011/191 ( PDF )
On the Security of the Winternitz One-Time Signature Scheme
Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas Hülsing and Markus Rückert
2011/190 ( PDF )
SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS
Peng Xu and Hai Jin
2011/189 ( PDF )
SIMPL Systems as a Keyless Cryptographic and Security Primitive
Ulrich Rührmair
2011/188 ( PDF )
Physical Turing Machines and the Formalization of Physical Cryptography
Ulrich Rührmair
2011/187 ( PDF )
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
Hyung Tae Lee and Jung Hee Cheon and Jin Hong
2011/186 ( -- withdrawn -- )
Some aspects of multi-variable secret sharing
Umadevi Ganugula and Prabal Paul
2011/185 ( PDF )
Efficient and Secure Data Storage Operations for Mobile Cloud Computing
Zhibin Zhou and Dijiang Huang
2011/184 ( PDF )
Fortification of AES with Dynamic Mix-Column Transformation
Ghulam Murtaza and Azhar Ali Khan and Syed Wasi Alam and Aqeel Farooqi
2011/183 ( -- withdrawn -- )
Elliptic Curve Point Multiplication Using MBNR and Point Halving
G.N.Purohit, Asmita SIngh Rawat
2011/182 ( PDF )
Designated Confirmer Signatures With Unified Verification
Guilin Wang, Fubiao Xia, and Yunlei Zhao
2011/181 ( PS PS.GZ PDF )
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack
Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury
2011/180 ( PDF )
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
Yehuda Lindell
2011/179 ( PDF )
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
Edoardo Persichetti
2011/178 ( PDF )
Differential Fault Analysis of AES: Toward Reducing Number of Faults
Chong Hee KIM
2011/177 ( PDF )
Dynamic MDS Matrices for Substantial Cryptographic Strength
Muhammad Yasir Malik and Jong-Seon No
2011/176 ( PDF )
A FPGA pairing implementation using the Residue Number System
Sylvain Duquesne and Nicolas Guillermin
2011/175 ( PDF )
Analysis of reduced-SHAvite-3-256 v2
Marine Minier, Maria Naya-Plasencia, and Thomas Peyrin
2011/174 ( PDF )
On-line secret sharing
Laszlo Csirmaz and Gabor Tardos
2011/173 ( -- withdrawn -- )
An efficient certificateless short signature scheme from pairings
Debiao He, Jianhua Chen
2011/172 ( PDF )
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
T.V. Laptyeva and S. Flach and K. Kladko
2011/171 ( PDF )
On lower bounds on second--order nonliearities of bent functions obtained by using Niho power functions
Manish Garg and Sugata Gangopadhyay
2011/170 ( PDF )
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication
Jonathan Taverne and Armando Faz-Hern\'andez and Diego F. Aranha and Francisco Rodr\'iguez-Henr\'iquez and Darrel Hankerson and Julio L\'opez
2011/169 ( PDF )
Identity-Based Cryptography for Cloud Security
Hongwei Li, Yuanshun Dai, Bo Yang
2011/168 ( PDF )
A Commitment-Consistent Proof of a Shuffle
Douglas Wikstr{\"o}m
2011/167 ( PDF )
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin
2011/166 ( PDF )
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
Jeremy Clark and Urs Hengartner
2011/165 ( PDF )
Improved Side Channel Cube Attacks on PRESENT
XinJie Zhao and Tao Wang and ShiZe Guo
2011/164 ( PDF )
On the relation between the MXL family of algorithms and Gröbner basis algorithms
Martin Albrecht and Carlos Cid and Jean-Charles Faugère and Ludovic Perret
2011/163 ( PDF )
Improved Integral Attacks on Reduced Round Camellia
Yanjun Li, Wenling Wu, Liting Zhang and Lei Zhang
2011/162 ( PDF )
Collision Timing Attack when Breaking 42 AES ASIC Cores
Amir Moradi and Oliver Mischke and Christof Paar
2011/161 ( PDF )
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Francisco Rodriguez-Henriquez and Palash Sarkar
2011/160 ( PDF )
Cryptanalysis of ARMADILLO2
Mohamed Ahmed Abdelraheem and Céline Blondeau and María Naya-Plasencia and Marion Videau and Erik Zenner
2011/159 ( -- withdrawn -- )
The Block Cipher Thuca
Isaiah Makwakwa
2011/158 ( PDF )
Enhancing Data Privacy in the Cloud
Yanbin Lu and Gene Tsudik
2011/157 ( PDF )
Secure Computation on the Web: Computing without Simultaneous Interaction
Shai Halevi and Yehuda Lindell and Benny Pinkas
2011/156 ( PDF )
Strong Forward Security in Identity-Based Signcryption
Madeline González Muñiz and Peeter Laud
2011/155 ( -- withdrawn -- )
High-speed Hardware Implementation of Rainbow Signatures on FPGAs
Shaohua Tang and Haibo Yi and Huan Chen and Guomin Chen and Jintai Ding
2011/154 ( -- withdrawn -- )
The Block Cipher Vuna
Isaiah Makwakwa
2011/153 ( PDF )
Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices
Jingguo Bi and Qi Cheng
2011/152 ( PDF )
A Practical Application of Differential Privacy to Personalized Online Advertising
Yehuda Lindell and Eran Omri
2011/151 ( PDF )
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix
Murtaza, G. and Ikram, N.
2011/150 ( PDF )
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Jue-Sam Chou*1, Cheng-Lun Wu 2, Yalin Chen 3
2011/149 ( PDF )
Generic Side-Channel Distinguishers: Improvements and Limitations
Nicolas Veyrat-Charvillon and François-Xavier Standaert
2011/148 ( PDF )
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hongbo Yu and Jiazhe Chen and Ketingjia and Xiaoyun Wang
2011/147 ( PS PS.GZ PDF )
The Optimal Linear Secret Sharing Scheme for Any Given Access Structure
Tang Chunming, Gao Shuhong, Zhang Chengli
2011/146 ( PDF )
ECDLP on GPU
Lei Xu and Dongdai Lin and Jing Zou
2011/145 ( -- withdrawn -- )
Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA{\beta}-cryptosystem
M.R.K.Ariffin and N.A.Abu
2011/144 ( -- withdrawn -- )
Deniable Encryption from the McEliece Assumptions
Bernardo M. David and Anderson C. A. Nascimento
2011/143 ( PDF )
Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves
Romain Cosset and Damien Robert
2011/142 ( -- withdrawn -- )
A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2^n)
Haibo Yi and Shaohua Tang and Huan Chen and Guomin Chen
2011/141 ( PDF )
Fast and Private Computation of Cardinality of Set Intersection and Union
Emiliano De Cristofaro and Paolo Gasti and Gene Tsudik
2011/140 ( PDF )
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
Martin Ågren
2011/139 ( PDF )
Shortest Lattice Vectors in the Presence of Gaps
Mingjie Liu and Xiaoyun Wang and Guangwu Xu and Xuexin Zheng
2011/138 ( PS PS.GZ PDF )
Constant-Round Privacy Preserving Multiset Union
Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon
2011/137 ( PDF )
Towards a Game Theoretic View of Secure Computation
Gilad Asharov and Ran Canetti and Carmit Hazay
2011/136 ( PDF )
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov and Yehuda Lindell
2011/135 ( PDF )
On isogeny classes of Edwards curves over finite fields
Omran Ahmadi and Robert Granger
2011/134 ( PS PS.GZ PDF )
Differentially Private Billing with Rebates
George Danezis and Markulf Kohlweiss and Alfredo Rial
2011/133 ( PS PS.GZ PDF )
Fully Homomorphic SIMD Operations
N.P. Smart and F. Vercauteren
2011/132 ( PDF )
Verifiable Delegation of Computation over Large Datasets
Siavosh Benabbas and Rosario Gennaro and Yevgeniy Vahlis
2011/131 ( PDF )
Trapdoor oneway functions associated with exponentiation
Virendra Sule
2011/130 ( PS PS.GZ PDF )
Ergodic Theory Over ${\F}_2[[T]]$
Dongdai Lin, Tao Shi, and Zifeng Yang
2011/129 ( PDF )
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers and Kasper B. Rasmussen and Benedikt Schmidt and Srdjan Capkun
2011/128 ( -- withdrawn -- )
The Ligo Block Cipher
Isaiah Makwakwa
2011/127 ( PDF )
Integer Arithmetic without Arithmetic Addition
Gideon Samid
2011/126 ( PDF )
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Daniel Engels and Markku-Juhani O. Saarinen and Peter Schweitzer and Eric M. Smith
2011/125 ( PDF )
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC
Masao KASAHARA
2011/124 ( PDF )
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I)
Masao KASAHARA
2011/123 ( PDF )
Linear Hulls with Correlation Zero and Linear Cryptanalysis of Block Ciphers
Andrey Bogdanov and Vincent Rijmen
2011/122 ( PDF )
Secure Multi-Party Sorting and Applications
Kristj{\'a}n Valur J{\'o}nsson and Gunnar Kreitz and Misbah Uddin
2011/121 ( PDF )
More Practical Fully Homomorphic Encryption
Gu Chunsheng
2011/120 ( PDF )
Faster 2-regular information-set decoding
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe
2011/119 ( PDF )
Multiplicative Learning with Errors and Cryptosystems
Gu Chunsheng
2011/118 ( PDF )
New Fully Homomorphic Encryption over the Integers
Gu Chunsheng
2011/117 ( PDF )
Bounded Vector Signatures and their Applications
Lei Wei and Scott E. Coull and Michael K. Reiter
2011/116 ( PDF )
Short-output universal hash functions and their use in fast and secure message authentication
Long Hoang Nguyen and Andrew William Roscoe
2011/115 ( PDF )
Multiple Differential Cryptanalysis: Theory and Practice (Corrected)
Céline Blondeau and Benoît Gérard
2011/114 ( PDF )
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE
Gu Chunsheng
2011/113 ( PDF )
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik
2011/112 ( PDF )
An efficient certificateless two-party authenticated key agreement scheme from pairings
Debiao He, Jin Hu
2011/111 ( PDF )
Generalizations of Bent Functions. A Survey
Natalia Tokareva
2011/110 ( -- withdrawn -- )
Fully Homomorphic Encryption over the Binary Polynomials
Gu Chunsheng
2011/109 ( PDF )
Secure Blind Decryption
Matthew Green
2011/108 ( PDF )
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
Jannik Dreier and Florian Kerschbaum
2011/107 ( PDF )
Threshold Encryption into Multiple Ciphertexts
Martin Stanek
2011/106 ( PS PS.GZ PDF )
Common Randomness and Secret Key Capacities of Two-way Channels
Hadi Ahmadi and Reihaneh Safavi-Naini
2011/105 ( PDF )
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation
S. Erickson and M. J. Jacobson, Jr. and A. Stein
2011/104 ( PDF )
Unconditionally Secure Signature Schemes Revisited
Colleen M. Swanson and Douglas R. Stinson
2011/103 ( PDF )
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
István Vajda
2011/102 ( PDF )
Optimal and Parallel Online Memory Checking
Charalampos Papamanthou and Roberto Tamassia
2011/101 ( PDF )
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Liqun Chen and Kurt Dietrich and Hans Löhr and Ahmad-Reza Sadeghi and Christian Wachsmann and Johannes Winter
2011/100 ( PDF )
A Novel Group Signature Scheme Based on MPKC
Guangdong Yang and Shaohua Tang and Li Yang
2011/099 ( PDF )
Can Code Polymorphism Limit Information Leakage?
Antoine Amarilli and Sascha M\"uller and David Naccache and Daniel Page and Pablo Rauzy and Michael Tunstall
2011/098 ( PDF )
Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields
M. D. Velichka and M. J. Jacobson, Jr. and A. Stein
2011/097 ( PDF )
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture
Shi Pu, Pu Duan, Jyh-Charn Liu
2011/096 ( PDF )
Computing on Authenticated Data
Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
2011/095 ( PDF )
ALRED Blues: New Attacks on AES-Based MAC's
Orr Dunkelman and Nathan Keller and Adi Shamir
2011/094 ( PS PS.GZ PDF )
Graceful Degradation in Multi-Party Computation
Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub
2011/093 ( PDF )
Linear Cryptanalysis Using Multiple Linear Approximations
Miia Hermelin and Kaisa Nyberg
2011/092 ( PS PS.GZ PDF )
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Akinori Kawachi and Christopher Portmann and Keisuke Tanaka
2011/091 ( PS PS.GZ PDF )
A New Approach to Practical Active-Secure Two-Party Computation
Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra
2011/090 ( PDF )
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
Yu Chen and Liqun Chen and Zhong Chen
2011/089 ( PDF )
Octal Bent Generalized Boolean Functions
Pantelimon Stanica and Thor Martinsen
2011/088 ( PS PS.GZ PDF )
Leftover Hash Lemma, Revisited
Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Francois-Xavier Standaert and Yu Yu
2011/087 ( PDF )
On the Instantiability of Hash-and-Sign RSA Signatures
Yevgeniy Dodis and Iftach Haitner and Aris Tentes
2011/086 ( PDF )
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher
Xin-jie Zhao, Tao Wang, Shi-ze Guo
2011/085 ( -- withdrawn -- )
Co-induction and Computational Semantics for Public-key Encryption with Key Cycles
Mohammad Hajiabadi, Bruce M. Kapron
2011/084 ( PDF )
Traitor Tracing against Public Collaboration (Full Version)
Xingwen Zhao and Fangguo Zhang
2011/083 ( PDF )
On the number of bent functions from iterative constructions: lower bounds and hypotheses
Natalia Tokareva
2011/082 ( -- withdrawn -- )
Does Pseudo-basis Extend to General Adversary?
Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
2011/081 ( PDF )
Secure Datastructures based on Multiparty Computation
Tomas Toft
2011/080 ( PDF )
Turbo Codes Can Be Asymptotically Information-Theoretically Secure
Xiao Ma
2011/079 ( PDF )
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
2011/078 ( PDF )
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
2011/077 ( PDF )
DPA Leakage Evaluation and Countermeasure Plug-in
Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong
2011/076 ( PDF )
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
Maura B. Paterson and Douglas R. Stinson
2011/075 ( -- withdrawn -- )
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Suleyman Kardas and Mehmet Sabir Kiraz and Muhammed Ali Bingol and Huseyin Demirci
2011/074 ( PDF )
Really fast syndrome-based hashing
Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe
2011/073 ( PDF )
Cryptanalysis of three matrix-based key establishment protocols
Simon R. Blackburn, Carlos Cid and Ciaran Mullan
2011/072 ( PDF )
AES Variants Secure Against Related-Key Differential and Boomerang Attacks
Jiali Choy and Aileen Zhang and Khoongming Khoo and Matt Henricksen and Axel Poschmann
2011/071 ( PDF )
Information-theoretic Bounds for Differentially Private Mechanisms
Gilles Barthe and Boris Köpf
2011/070 ( PDF )
Rational authentication protocols
Long H. Nguyen
2011/069 ( PDF )
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
Chao Ning and Qiuliang Xu
2011/068 ( PS PS.GZ PDF )
Rational Secret Sharing with Honest Players over an Asynchronous Channel
William K. Moses Jr. and C. Pandu Rangan
2011/067 ( PDF )
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
Simon R. Blackburn, Alina Ostafe and Igor E. Shparlinski
2011/066 ( PDF )
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
Markus Duermuth and David Mandell Freeman
2011/065 ( PDF )
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
Carolin Lunemann and Jesper Buus Nielsen
2011/064 ( PDF )
Cryptographic Treatment of Private User Profiles
Felix Günther and Mark Manulis and Thorsten Strufe
2011/063 ( PS PS.GZ PDF )
Secret Keys from Channel Noise
Hadi Ahmadi and Reihaneh Safavi-Naini
2011/062 ( PDF )
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
Swapnoneel Roy and Amlan K Das and Yu Li
2011/061 ( PS PS.GZ PDF )
Cryptanalysis of Some Protocols for RFID Systems
Masoumeh Safkhani, Majid Naderi, Nasour Bagheri and Somitra Kumar Sanadhya
2011/060 ( PDF )
A Group Signature Scheme from Lattice Assumptions
S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan
2011/059 ( PDF )
Extending Baby-step Giant-step algorithm for FACTOR problem
Martin Stanek
2011/058 ( PDF )
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Jean-S\'ebastien Coron and Aline Gouget and Thomas Icart and Pascal Paillier
2011/057 ( PDF )
Another Look at RSA Signatures With Affine Padding
Jean-Sébastien Coron and David Naccache and Mehdi Tibouchi
2011/056 ( PDF )
Spectral Coherence Analysis - First Experimental Results -
Amine Dehbaoui and Sébastien Tiran and Philippe Maurine and François-Xavier Standaert and Nicolas Veyrat-Charvillon
2011/055 ( PDF )
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC
Dongdai Lin and Jean-Charles Faugere and Ludovic Perret and Tianze Wang
2011/054 ( -- withdrawn -- )
Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary
Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
2011/053 ( PDF )
Adaptive Pseudo-Free Groups and Applications
Dario Catalano and Dario Fiore and Bogdan Warinschi
2011/052 ( PS PS.GZ PDF )
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model
Alex Escala and Javier Herranz and Paz Morillo
2011/051 ( -- withdrawn -- )
Towards Strong Adaptive Corruption Security of Authenticated Key Exchange
Zheng Yang
2011/050 ( -- withdrawn -- )
Authenticated Key Exchange with Synchronized State
Zheng Yang
2011/049 ( PDF )
Unbounded HIBE and Attribute-Based Encryption
Allison Lewko and Brent Waters
2011/048 ( PDF )
A non-Abelian factorization problem and an associated cryptosystem
Srinath Baba, Srinivas Kotyad and Raghu Teja
2011/047 ( PDF )
Constructing differential 4-uniform permutations from know ones
Yuyin Yu and Mingsheng Wang and Yongqiang Li
2011/046 ( PDF )
Lower and Upper Bounds for Deniable Public-Key Encryption
Rikke Bendlin and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi
2011/045 ( PDF )
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
2011/044 ( PDF )
Fast Scalar Multiplication in ECC using The Multi base Number System.
G. N. Purohit , Asmita Singh Rawat
2011/043 ( PDF )
Proxy Blind Multi-signature Scheme using ECC for handheld devices
Jayaprakash Kar
2011/042 ( PDF )
Computing endomorphism rings of elliptic curves under the GRH
Gaetan Bisson
2011/041 ( PS PS.GZ PDF )
Reclaiming Privacy for Smartphone Applications (Revised Version)
Imad Aad and Emiliano De Cristofaro and Anthony Durussel
2011/040 ( PDF )
Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves
Hoon Hong, Eunjeong Lee, Hyang-Sook Lee and Cheol-Min Park
2011/039 ( PDF )
Fast Quadrupling of a Point in Elliptic Curve Cryptography
Duc-Phong Le
2011/038 ( PDF )
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
Martin Albrecht and Carlos Cid
2011/037 ( PDF )
Higher-Order Differential Attack on Reduced SHA-256
Mario Lamberger and Florian Mendel
2011/036 ( -- withdrawn -- )
The Complexity Analysis of the MutantXL Family
Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann
2011/035 ( PDF )
A New Family of Implicitly Authenticated Diffie-Hellman Protocols
Andrew C. Yao and Yunlei Zhao
2011/034 ( PDF )
Secure Authentication from a Weak Key, Without Leaking Information
Niek J. Bouman and Serge Fehr
2011/033 ( PS PS.GZ PDF )
The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations
Jean-Marc Couveignes and Jean-Gabriel Kammerer
2011/032 ( PDF )
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski and Janusz Szmidt
2011/031 ( PDF )
Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience
Ashish Choudhury and Arpita Patra
2011/030 ( PS PS.GZ PDF )
Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains
Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai
2011/029 ( PS PS.GZ PDF )
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs
Benjamin Gittins
2011/028 ( PDF )
The Parazoa Family: Generalizing the Sponge Hash Functions
Elena Andreeva and Bart Mennink and Bart Preneel
2011/027 ( PDF )
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
2011/026 ( PDF )
Private Discovery of Common Social Contacts
Emiliano De Cristofaro and Mark Manulis and Bertram Poettering
2011/025 ( PDF )
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
Mihaela Ion and Giovanni Russello and Bruno Crispo
2011/024 ( PDF )
Secure evaluation of polynomial using privacy ring homomorphisms
Alexander Rostovtsev, Alexey Bogdanov and Mikhail Mikhaylov
2011/023 ( PDF )
Improved zero-sum distinguisher for full round Keccak-f permutation
Ming Duan and Xuajia Lai
2011/022 ( PDF )
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
Farzaneh Abazari and Babak Sadeghian
2011/021 ( PDF )
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Jae Hong Seo and Jung Hee Cheon
2011/020 ( PDF )
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$
Antoine Joux and Vanessa Vitse
2011/019 ( PDF )
Collision Resistance of the JH Hash Function
Jooyoung Lee and Deukjo Hong
2011/018 ( PDF )
Homomorphic Signatures for Polynomial Functions
Dan Boneh and David Mandell Freeman
2011/017 ( PDF )
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
Jiazhe Chen and Keting Jia and Hongbo Yu and Xiaoyun Wang
2011/016 ( PDF )
An Anonymous Health Care System
Melissa Chase and Kristin Lauter
2011/015 ( -- withdrawn -- )
Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey
Jean-Philippe Aumasson
2011/014 ( PDF )
Unconditionally Reliable Message Transmission in Directed Neighbour Networks
Shashank Agrawal and Abhinav Mehta and Kannan Srinathan
2011/013 ( PDF )
Secure Message Transmission In Asynchronous Directed Networks
Shashank Agrawal and Abhinav Mehta and Kannan Srinathan
2011/012 ( PDF )
Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption
Jens Groth
2011/011 ( PDF )
After-the-Fact Leakage in Public-Key Encryption
Shai Halevi and Huijia Lin
2011/010 ( PDF )
Structured Encryption and Controlled Disclosure
Melissa Chase and Seny Kamara
2011/009 ( PDF )
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Helger Lipmaa
2011/008 ( PDF )
Computing Elliptic Curve Discrete Logarithms with the Negation Map
Ping Wang and Fangguo Zhang
2011/007 ( PDF )
KISS: A Bit Too Simple
Greg Rose
2011/006 ( PDF )
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek
2011/005 ( PDF )
Is privacy compatible with truthfulness?
David Xiao
2011/004 ( PDF )
A low-memory algorithm for finding short product representations in finite groups
Gaetan Bisson and Andrew V. Sutherland
2011/003 ( PDF )
On the correct use of the negation map in the Pollard rho method
Daniel J. Bernstein and Tanja Lange and Peter Schwabe
2011/002 ( PDF )
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)
Gunnar Kreitz
2011/001 ( PDF )
Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries
Zeng Bing and Tang Xueming and Xu Peng and Jing Jiandu
2010/661 ( PDF )
Security Evaluation of MISTY Structure with SPN Round Function
Ruilin Li and Chao Li and Jinshu Su and Bing Sun
2010/660 ( PDF )
Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches
Brian J. Matt
2010/659 ( PDF )
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation
Mark Manulis and Bertram Poettering
2010/658 ( PDF )
ABC - A New Framework for Block Ciphers
Uri Avraham and Eli Biham and Orr Dunkelman
2010/657 ( PDF )
On small secret key attack against RSA with high bits known prime factor
Yasufumi Hashimoto
2010/656 ( PDF )
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
Yehuda Lindell
2010/655 ( PS PS.GZ PDF )
On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings
İsa Sertkaya and Ali Doğanaksoy
2010/654 ( PDF )
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)
Daniel Kraschewski and Jörn Müller-Quade
2010/653 ( PDF )
Cubic groups
M.A.Popov
2010/652 ( PDF )
Active Domain Expansion for Normal Narrow-pipe Hash Functions
Xigen Yao
2010/651 ( PDF )
On the Impossibility of Instantiating PSS in the Standard Model
Rishiraj Bhattacharyya and Avradip Mandal
2010/650 ( PDF )
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
Jean-Sebastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi
2010/649 ( PDF )
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Gonzalez Nieto
2010/648 ( PDF )
Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
Dario Fiore and Dominique Schröder
2010/647 ( PDF )
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
Xiaoyun Wang and Mingjie Liu and Chengliang Tian and Jingguo Bi
2010/646 ( PDF )
Statistical Analysis of Second Order Differential Power Analysis
Emmanuel Prouff and Matthieu Rivain and Régis Bévan
2010/645 ( PDF )
A Timed Logic for Modeling and Reasoning about Security Protocols
Xinfeng Lei and Rui Xue and Ting Yu
2010/644 ( PDF )
A Practical Platform for Cube-Attack-like Cryptanalyses
Bo Zhu and Wenye Yu and Tao Wang
2010/643 ( PDF )
Construct MD5 Collisions Using Just A Single Block Of Message
Tao Xie and Dengguo Feng
2010/642 ( PDF )
More Insights on Blockcipher-Based Hash Functions
Yiyuan Luo, Xuejia Lai
2010/641 ( PDF )
A new algorithm for computing Groebner bases
Shuhong Gao and Frank Volny IV and Mingsheng Wang
2010/640 ( PS PS.GZ PDF )
Short collusion-secure fingerprint codes against three pirates
Koji Nuida
2010/639 ( -- withdrawn -- )
Enumerating Results of Homogeneous Rotation over $GF(p)$
Guang-Pu Go, Xi-Yong Zhang, and Wen-Fen Liu
2010/638 ( PDF )
One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi and Hugo Krawczyk
2010/637 ( PDF )
Breaking An Identity-Based Encryption Scheme based on DHIES
Martin R. Albrecht and Kenneth G. Paterson
2010/636 ( PS PS.GZ PDF )
Differential Fault Analysis of AES using a Single Multiple-Byte Fault
Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall
2010/635 ( -- withdrawn -- )
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials
Zhang Yun and Christophe Tartary
2010/634 ( PDF )
ROTIV: RFID Ownership Transfer with Issuer Verification
Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva
2010/633 ( PDF )
Low Data Complexity Attacks on AES
Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre-Alain Fouque
2010/632 ( PDF )
Efficient and provably-secure certificateless signature scheme without bilinear pairings
He Debiao, Chen Jianhua, Zhang Rui
2010/631 ( PDF )
Black-box property of Cryptographic Hash Functions
Michal Rjaško
2010/630 ( PDF )
Divison Polynomials for Alternate Models of Elliptic Curves
Dustin Moody
2010/629 ( PDF )
On the Security of Hash Functions Employing Blockcipher Postprocessing
Donghoon Chang and Mridul Nandi and Moti Yung
2010/628 ( PDF )
State convergence and keyspace reduction of the Mixer stream cipher
Sui-Guan Teo and Kenneth Koon-Ho Wong and Leonie Simpson and Ed Dawson
2010/627 ( PS PS.GZ PDF )
Secure and Efficient Protocols for Iris and Fingerprint Identification
Marina Blanton and Paolo Gasti
2010/626 ( PDF )
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
Peng Xu and Hai Jin
2010/625 ( PDF )
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
2010/624 ( PDF )
No-leak authentication by the Sherlock Holmes method
Dima Grigoriev and Vladimir Shpilrain
2010/623 ( PDF )
Cryptanalysis of Skein
Daniel J. Bernstein and Tanja Lange
2010/622 ( PDF )
A new result on the distinctness of primitive sequences over Z(pq) modulo 2
Qunxiong Zheng and Wenfeng Qi
2010/621 ( PDF )
Generic Compilers for Authenticated Key Exchange (Full Version)
Tibor Jager and Florian Kohlar and Sven Schäge and Jörg Schwenk
2010/620 ( -- withdrawn -- )
Identity-based Digital Signature Scheme Without Bilinear Pairings
He Debiao, Chen Jianhua, Hu Jin
2010/619 ( PDF )
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption
Yang Lu
2010/618 ( PDF )
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
Thomas Fuhr and Henri Gilbert and Jean-Ren{\'e} Reinhard and Marion Videau
2010/617 ( PDF )
Computing Discrete Logarithms in an Interval
Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai
2010/616 ( PDF )
A non-uniform birthday problem with applications to discrete logarithms
Steven D. Galbraith and Mark Holmes
2010/615 ( PDF )
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval
Steven D. Galbraith and Raminder S. Ruprai
2010/614 ( PDF )
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder and Marcin Wojcik and Stefan Tillich and Dan Page
2010/613 ( PDF )
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner and Chris Peikert
2010/612 ( -- withdrawn -- )
Cryptanalysis of Hummingbird-1
Markku-Juhani O. Saarinen
2010/611 ( PDF )
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates
Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
2010/610 ( PS PS.GZ PDF )
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
Craig Gentry and Daniel Wichs
2010/609 ( PS PS.GZ PDF )
The Round Complexity of General VSS
Ashish Choudhury and Kaoru Kurosawa and Arpita Patra
2010/608 ( PDF )
A New Model of Binary Elliptic Curves with Fast Arithmetic
Hongfeng Wu, Chunming Tang and Rongquan Feng
2010/607 ( PDF )
How to Improve Rebound Attacks
María Naya-Plasencia
2010/606 ( PDF )
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices
He Debiao,Chen Jianhua, Hu Jin
2010/605 ( PDF )
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
Tzipora Halevi and Nitesh Saxena
2010/604 ( PS PS.GZ PDF )
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
Shangwei Zhao,Ruyong Feng and Xiao-Shan Gao
2010/603 ( PDF )
Cryptanalysis of Dual CRT-RSA
Santanu Sarkar and Subhamoy Maitra
2010/602 ( PDF )
An Improved Algebraic Attack on Hamsi-256
Itai Dinur and Adi Shamir
2010/601 ( PDF )
Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
Lei Li and Siman Yang
2010/600 ( PDF )
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Anne Broadbent and Stacey Jeffery and Alain Tapp
2010/599 ( PS PS.GZ PDF )
Secure Multiparty Computation with Partial Fairness
Amos Beimel, Eran Omri, and Ilan Orlov
2010/598 ( PDF )
A Broadcast Attack against NTRU Using Ding's Algorithm
Yanbin Pan, Yingpu Deng
2010/597 ( PDF )
A New Class of Bent--Negabent Boolean Functions
Sugata Gangopadhyay and Ankita Chaturvedi
2010/596 ( PDF )
Solving Systems of Multivariate Quadratic Equations over Finite Fields or: From Relinearization to MutantXL
Enrico Thomae and Christopher Wolf
2010/595 ( PDF )
Attribute-Based Signatures
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2010/594 ( PDF )
Cache Games - Bringing Access Based Cache Attacks on AES to Practice
Endre Bangerter and David Gullasch and Stephan Krenn
2010/593 ( PDF )
Differential Attack on Five Rounds of the SC2000 Block Cipher
Jiqiang Lu
2010/592 ( -- withdrawn -- )
Better Key Sizes (and Attacks) for LWE-Based Encryption
Richard Lindner and Chris Peikert
2010/591 ( PDF )
Bonsai Trees, or How to Delegate a Lattice Basis
David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert
2010/590 ( PDF )
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks
Andrey Bogdanov and Ilya Kizhvatov
2010/589 ( PS PS.GZ PDF )
Higher-order differential properties of Keccak and Luffa
Christina Boura and Anne Canteaut and Christophe De Canni\`ere
2010/588 ( PDF )
Improved Collisions for Reduced ECHO-256
Martin Schläffer
2010/587 ( PDF )
Group Message Authentication
Bartosz Przydatek and Douglas Wikstr{\"o}m
2010/586 ( PDF )
Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm
İsmail San and Nuray At
2010/585 ( PDF )
Smaller decoding exponents: ball-collision decoding
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2010/584 ( PDF )
VMCrypt - Modular Software Architecture for Scalable Secure Computation
Lior Malka and Jonathan Katz
2010/583 ( PDF )
Improved Preimage Attack on One-block MD4
Jinmin Zhong and Xuejia Lai
2010/582 ( PDF )
Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems
Alexandre Berzati and C\'ecile Canovas-Dumas and Louis Goubin
2010/581 ( PDF )
Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm
Jintai Ding
2010/580 ( PDF )
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
Piotr Mroczkowski and Janusz Szmidt
2010/579 ( PDF )
Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion
WeiGuo Zhang and GuoZhen Xiao
2010/578 ( PDF )
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
Axel Schroepfer and Florian Kerschbaum and Guenter Mueller
2010/577 ( PDF )
Discrete Logarithms, Diffie-Hellman, and Reductions
Neal Koblitz and Alfred Menezes and Igor Shparlinski
2010/576 ( PDF )
Efficient Hashing using the AES Instruction Set
Joppe W. Bos and Onur Ozen and Martijn Stam
2010/575 ( PDF )
A Discrete Logarithm Attack on Elliptic Curves
Otto Johnston
2010/574 ( PDF )
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Julia Borghoff and Lars R. Knudsen and Gregor Leander and Soeren S. Thomsen
2010/573 ( PDF )
On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$
Yongqiang Li and Mingsheng Wang
2010/572 ( PDF )
Cryptanalysis of splay tree based encryption
Jean-Philippe Aumasson
2010/571 ( PDF )
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform
Mohamed El Hadedy, Danilo Gligoroski and Svein J. Knapskog
2010/570 ( PDF )
Breaking Grain-128 with Dynamic Cube Attacks
Itai Dinur and Adi Shamir
2010/569 ( PDF )
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Jérémy Jean and Pierre-Alain Fouque
2010/568 ( PDF )
Efficient Two-Move Blind Signatures in the Common Reference String Model
E. Ghadafi and N.P. Smart
2010/567 ( PS PS.GZ PDF )
ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS
CLAUDE CARLET AND SIHEM MESNAGER
2010/566 ( PDF )
Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles
Yusuke Naito
2010/565 ( PDF )
Self-Protecting Electronic Medical Records Using Attribute-Based Encryption
Joseph A. Akinyele and Christoph U. Lehmann and Matthew D. Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin
2010/564 ( PDF )
Cryptographic Randomness Testing of Block Ciphers and Hash Functions
Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak
2010/563 ( PDF )
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
Tatsuaki Okamoto and Katsuyuki Takashima
2010/562 ( PDF )
How to Leak on Key Updates
Allison Lewko and Mark Lewko and Brent Waters
2010/561 ( PS PS.GZ PDF )
Password-Protected Secret Sharing
Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu
2010/560 ( PDF )
On CCA-Secure Fully Homomorphic Encryption
J. Loftus and A. May and N.P. Smart and F. Vercauteren
2010/559 ( PDF )
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves
Diego F. Aranha and Jean-Luc Beuchat and J\'er\'emie Detrey and Nicolas Estibals
2010/558 ( PDF )
Solving LWE problem with bounded errors in polynomial time
Jintai Ding
2010/557 ( -- withdrawn -- )
A Digital Signature Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
2010/556 ( PDF )
Definitional Issues in Functional Encryption
Adam O'Neill
2010/555 ( PDF )
RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation
S. Duquesne
2010/554 ( PDF )
Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant
Stéphane Jacob
2010/553 ( -- withdrawn -- )
Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth
Yang Lu
2010/552 ( PDF )
A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality
Carmit Hazay and Yehuda Lindell
2010/551 ( PDF )
A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries
Carmit Hazay and Yehuda Lindell
2010/550 ( PDF )
Isogenies and Cryptography
RAZA ALI KAZMI
2010/549 ( PDF )
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem
Yalin Chen1, *Jue-Sam Chou2, Chi-Fong Lin3
2010/548 ( PDF )
SHA-512/256
Shay Gueron, Simon Johnson, Jesse Walker
2010/547 ( -- withdrawn -- )
Symmetric-key Searchable keyword Concealment (SSC)
Yacov Yacobi
2010/546 ( PS PS.GZ PDF )
Timed Encryption and Its Application
Shaoquan Jiang
2010/545 ( PDF )
Optimal XOR based (2,n)-Visual Cryptography Schemes
Feng Liu and Chuankun Wu
2010/544 ( PDF )
Semantic Security Under Related-Key Attacks and Applications
Benny Applebaum and Danny Harnik and Yuval Ishai
2010/543 ( PDF )
Functional Encryption: Definitions and Challenges
Dan Boneh and Amit Sahai and Brent Waters
2010/542 ( PS PS.GZ PDF )
Squaring in cyclotomic subgroups
Koray Karabina
2010/541 ( PDF )
One-time Computable and Uncomputable Functions
Stefan Dziembowski and Tomasz Kazana and Daniel Wichs
2010/540 ( PDF )
Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption
Anna Lysyanskaya and Aaron Segal
2010/539 ( PDF )
Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves
Reza R. Farashahi and Pierre-Alain Fouque and Igor E. Shparlinski and Mehdi Tibouchi and J. Felipe Voloch
2010/538 ( PDF )
Rotational Rebound Attacks on Reduced Skein
Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger
2010/537 ( PDF )
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
Yongzhuang Wei and Jiqiang Lu and Yupu Hu
2010/536 ( PDF )
On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings
Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont
2010/535 ( PDF )
Linear Analysis of Reduced-Round CubeHash
Tomer Ashur and Orr Dunkelman
2010/534 ( PDF )
Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity
Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu
2010/533 ( -- withdrawn -- )
Deterministic Public-Key Encryption Revisited
Adam O'Neill
2010/532 ( PDF )
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Andrey Bogdanov and Christian Rechberger
2010/531 ( PDF )
Comparison of seven SHA-3 candidates software implementations on smart cards.
Mourad Gouicem
2010/530 ( PDF )
How to Read a Signature?
Vanessa Gratzer and David Naccache
2010/529 ( PDF )
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields
Kristin Lauter and Ning Shang
2010/528 ( PDF )
Constant-Round Private Function Evaluation with Linear Complexity
Jonathan Katz and Lior Malka
2010/527 ( PDF )
The Digital Signature Scheme MQQ-SIG
Danilo Gligoroski and Rune Steinsmo \O deg\aa rd and Rune Erlend Jensen and Ludovic Perret and Jean-Charles Faug\`{e}re and Svein Johan Knapskog and Smile Markovski
2010/526 ( PDF )
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio López
2010/525 ( PS PS.GZ PDF )
Torus-based compression by factor 4 and 6
Koray Karabina
2010/524 ( PDF )
Combining properties of cryptographic hash functions
Michal Rjaško
2010/523 ( PDF )
Affine Masking against Higher-Order Side Channel Analysis
Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain
2010/522 ( PDF )
Signatures Resilient to Continual Leakage on Memory and Computation
Tal Malkin and Isamu Teranishiy and Yevgeniy Vahlis and Moti Yung
2010/521 ( PDF )
Linear Approximations of Addition Modulo $2^n$-1
Xiutao Feng and Chunfang Zhou and Chuankun Wu
2010/520 ( PDF )
Implementing Gentry's Fully-Homomorphic Encryption Scheme
Craig Gentry and Shai Halevi
2010/519 ( PDF )
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
Matthias Krause and Frederik Armknecht and Ewan Fleischmann
2010/518 ( PDF )
Boolean functions with all main cryptographic properties
Ziran Tu and Yingpu Deng
2010/517 ( PDF )
Cryptanalysis of block EnRUPT
Elias Yarrkov
2010/516 ( PDF )
Key Agreement Protocols Based on Multivariate Polynomials over Fq
Masahiro Yagisawa
2010/515 ( -- withdrawn -- )
2010/514 ( PDF )
Semi-Homomorphic Encryption and Multiparty Computation
Rikke Bendlin and Ivan Damgård and Claudio Orlandi and Sarah Zakarias
2010/513 ( PDF )
Key-Dependent Message Security: Generic Amplification and Completeness
Benny Applebaum
2010/512 ( PDF )
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity
Jung Hee Cheon and Stanislaw Jarecki and Jae Hong Seo
2010/511 ( PDF )
On the complexity of Decomposition Attack
Koh-ichi Nagao
2010/509 ( PDF )
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
Maria Dubovitskaya and Alessandra Scafuro and Ivan Visconti
2010/508 ( PDF )
A Fault Analytic Method against HB+
Jose Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento
2010/507 ( PS PS.GZ PDF )
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan and Tor Helleseth
2010/506 ( PDF )
Quantum Preimage and Collision Attacks on CubeHash
Gaëtan Leurent
2010/505 ( PS PS.GZ PDF )
Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
Dominique Unruh
2010/504 ( PDF )
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
Charles Bouillaguet and Jean-Charles Faugère and Pierre-Alain Fouque and Ludovic Perret
2010/503 ( PDF )
BiTR: Built-in Tamper Resilience
Seung Geol Choi and Aggelos Kiayias and Tal Malkin
2010/502 ( PDF )
Proving Coercion-Resistance of Scantegrity II
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2010/501 ( PDF )
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter
2010/500 ( PS PS.GZ )
ATTACKS ON THE AKACP PROTOCOL
Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu-Varsakelis and Spyros T. Halkidis and George Stephanides
2010/499 ( PDF )
Secure Computations on Non-Integer Values
M. Franz and B. Deiseroth and K. Hamacher and S. Jha and S. Katzenbeisser and H. Schroeder
2010/498 ( PDF )
Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields
Vladislav Kovtun, Sergey Kavun
2010/497 ( -- withdrawn -- )
Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function
Tao Shi and Dongdai Lin
2010/496 ( PDF )
Efficient Attributes for Anonymous Credentials (Extended Version)
Jan Camenisch and Thomas Gro{\ss}
2010/495 ( PDF )
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
Mahabir Prasad Jhanwar
2010/494 ( PS PS.GZ PDF )
Stronger Security Model of Group Key Agreement
Jianjie Zhao, Dawu Gu and M. Choudary Gorantla
2010/493 ( -- withdrawn -- )
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA
S.Sharmila Deva Selvi and S.Sree Vivek and C. Pandu Rangan
2010/492 ( PDF )
Efficient Fully Secure Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae
Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
2010/491 ( PDF )
A Collaborative Framework for Privacy Protection in Online Social Networks
Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail-Joon Ahn
2010/490 ( PDF )
Strong designated verifier signature scheme: new definition and construction
Zuhua Shao
2010/489 ( PDF )
Loiss: A Byte-Oriented Stream Cipher
Dengguo Feng and Xiutao Feng and Wentao Zhang and Xiubin Fan and Chuankun Wu
2010/488 ( PDF )
Fully Leakage-Resilient Signatures
Elette Boyle and Gil Segev and Daniel Wichs
2010/487 ( PDF )
Constant Round Non-Malleable Protocols using One Way Functions
Vipul Goyal
2010/486 ( PDF )
A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS
Claude Carlet and Sihem Mesnager
2010/485 ( PDF )
Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials
Hamid Mala and Mohammad Dakhilalian and Mohsen Shakiba
2010/484 ( PDF )
Automata Evaluation and Text Search Protocols with Simulation Based Security
Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen
2010/483 ( PDF )
Constant-round Non-Malleable Commitments from Any One-Way Function
Huijia Lin, Rafael Pass
2010/482 ( -- withdrawn -- )
On Instantiation of the Random Oracle
He Ge
2010/481 ( PDF )
A secure email login system using virtual password
Bhavin Tanti, Nishant doshi
2010/480 ( PDF )
Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--
Shigeo Tsujii and Masahito Gotaishi
2010/479 ( PDF )
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
R.M. Avanzi and S. Hoerder and D. Page and M. Tunstall
2010/478 ( PDF )
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang
2010/477 ( PDF )
On Compression of Data Encrypted with Block Ciphers
Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and and Tal Rabin
2010/476 ( PDF )
Predicate Encryption with Partial Public Keys
Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano
2010/475 ( PDF )
Pairing Computation on Elliptic Curves of Jacobi Quartic Form
Hong Wang and Kunpeng Wang and Lijun Zhang and Bao Li
2010/474 ( PDF )
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
Sarah Meiklejohn and Hovav Shacham and David Mandell Freeman
2010/473 ( -- withdrawn -- )
Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol
Hui Zhang and Chunxiang Xu and Abdur Rashid Sangi
2010/472 ( PDF )
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought
A. Simone and B. Skoric
2010/471 ( -- withdrawn -- )
Privacy-preserving Sharing of Sensitive Information
Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik
2010/470 ( PDF )
Two identification protocols based on Cayley graphs of Coxeter groups
Feli\'u Sagols and Guillermo Morales-Luna
2010/469 ( PDF )
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Emiliano De Cristofaro and Jihye Kim and Gene Tsudik
2010/468 ( PS PS.GZ PDF )
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes
Goichiro Hanaoka and Jian Weng
2010/467 ( PDF )
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
Xinfeng Lei and Rui Xue and Ting Yu
2010/466 ( PDF )
PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search
Benwen Zhu and Bo Zhu and Kui Ren
2010/465 ( PDF )
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
Falko Strenzke
2010/464 ( -- withdrawn -- )
Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
Q. Pu
2010/463 ( PDF )
Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
Mohammad Reza Sohizadeh Abyaneh
2010/462 ( PDF )
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
Zhifang Zhang
2010/461 ( PDF )
Identity Based Partial Aggregate Signature Scheme Without Pairing
S. Sharmila Deva Selvi and S. Sree Vivek and J.Shriram and C. Pandu Rangan
2010/460 ( -- withdrawn -- )
On extended algebraic immunity
Gaofei Wu and Yuqing Zhang and Weiguo Zhang
2010/459 ( PDF )
CCA2 Secure Certificateless Encryption Schemes Based on RSA
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2010/458 ( PDF )
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
Masahiro Yagisawa
2010/457 ( PDF )
Improving the performance of Luffa Hash Algorithm
Thomaz Oliveira and Julio López
2010/456 ( PS PS.GZ PDF )
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam Smith
2010/455 ( PDF )
Optimal Verification of Operations on Dynamic Sets
Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
2010/454 ( PDF )
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
Jesse Walker and Jiangtao Li
2010/453 ( PDF )
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Dan Boneh and David Mandell Freeman
2010/452 ( PDF )
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Feng Hao and Matthew Nicolas Kreeger
2010/451 ( PS PS.GZ PDF )
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
Subidh Ali and Debdeep Mukhopadhyay
2010/450 ( PDF )
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
Kaoru Kurosawa
2010/449 ( PDF )
Oblivious and Fair Server-Aided Two-Party Computation
Amir Herzberg and Haya Shulman
2010/448 ( PDF )
Sequential Rationality in Cryptographic Protocols
Ronen Gradwohl and Noam Livne and Alon Rosen
2010/447 ( PDF )
Side-channel Analysis of Six SHA-3 Candidates
Olivier Benoit and Thomas Peyrin
2010/446 ( PDF )
Short One-Time Signatures
G.M. Zaverucha and D.R. Stinson
2010/445 ( PDF )
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj
2010/444 ( PDF )
New Construction of Identity-based Proxy Re-encryption
Song Luo and Jianbin Hu and Zhong Chen
2010/443 ( PS PS.GZ PDF )
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu
2010/442 ( PDF )
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
Dan Boneh and Hart Montgomery and Ananth Raghunathan
2010/441 ( PDF )
Provably Secure Higher-Order Masking of AES
Matthieu Rivain and Emmanuel Prouff
2010/440 ( PDF )
Piret and Quisquater's DFA on AES Revisited
Christophe Giraud and Adrian Thillard
2010/439 ( PDF )
Embedded Extended Visual Cryptography Schemes
Feng Liu and Chuankun Wu
2010/438 ( PDF )
Achieving Leakage Resilience Through Dual System Encryption
Allison Lewko and Yannis Rouselakis and Brent Waters
2010/437 ( PDF )
Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2010/436 ( PDF )
Arithmetic of Supersingular Koblitz Curves in Characteristic Three
Roberto Avanzi and Clemens Heuberger and Helmut Prodinger
2010/435 ( PDF )
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Cihangir Tezcan
2010/434 ( PDF )
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Takanori Isobe and Taizo Shirai
2010/433 ( PS PS.GZ PDF )
The PASSERINE Public Key Encryption and Authentication Mechanism
Markku-Juhani O. Saarinen
2010/432 ( PDF )
AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
K. Atighehchi and A. Enache and T. Muntean and G. Risterucci
2010/431 ( PDF )
Collusion-Resistant Multicast Key Distribution Based on Homomorphic One-Way Function Trees
Jing Liu and Bo Yang
2010/430 ( PDF )
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
Vlastimil Klima and Danilo Gligoroski
2010/429 ( PS PS.GZ PDF )
A Family of Implementation-Friendly BN Elliptic Curves
Geovandro C. C. F. Pereira and Marcos A. Simplício Jr and Michael Naehrig and Paulo S. L. M. Barreto
2010/428 ( PDF )
Random Oracles in a Quantum World
Dan Boneh and Ozgur Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry
2010/427 ( -- withdrawn -- )
Security Improvement on a Password-Authenticated Group Key Exchange Protocol
Junghyun Nam
2010/426 ( PDF )
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
Huihui Yap and Khoongming Khoo and Axel Poschmann
2010/425 ( PDF )
KIST: A new encryption algorithm based on splay
R. Wei and Z. Zeng
2010/424 ( PS PS.GZ PDF )
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann
2010/423 ( PDF )
Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
LI Yun-qiang and Wang Ai-lan
2010/422 ( PDF )
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
Jae Hyun Ahn and Matthew Green and Susan Hohenberger
2010/421 ( PDF )
Binomial Sieve Series -- a Prospective Cryptographic Tool
Gideon Samid
2010/420 ( PS PS.GZ PDF )
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
Stanislav Bulygin and Albrecht Petzoldt and Johannes Buchmann
2010/419 ( PDF )
White-Box Cryptography and SPN ciphers. LRC method.
Dmitry Schelkunov
2010/418 ( PDF )
Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
*Jue-Sam Chou 1, hsien-ching Chen 2, Chun-Yun Chen 3
2010/417 ( PDF )
Distinguishing Properties of Higher Order Derivatives of Boolean Functions
Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu
2010/416 ( PDF )
Computationally Sound Verification of Source Code
Michael Backes and Matteo Maffei and Dominique Unruh
2010/415 ( PS PS.GZ PDF )
Perfectly Balanced Boolean Functions and Goli\'c Conjecture
Stanislav Smyshlyaev
2010/414 ( PDF )
On Strong Simulation and Composable Point Obfuscation
Nir Bitansky and Ran Canetti
2010/413 ( PDF )
Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
E.A.Grechnikov
2010/412 ( PDF )
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Margus Niitsoo
2010/411 ( PDF )
Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.
Vivien Dubois and Jean-Gabriel Kammerer
2010/410 ( PDF )
Wild McEliece
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2010/409 ( PDF )
The collision security of Tandem-DM in the ideal cipher model
Jooyoung Lee and Martijn Stam and John Steinberger
2010/408 ( PDF )
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
Jean-François Gallais and Ilya Kizhvatov and Michael Tunstall
2010/407 ( PDF )
Flaws in Differential Cryptanalysis of Reduced Round PRESENT
Manoj Kumar and Pratibha Yadav and Meena Kumari
2010/406 ( PDF )
Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
Julien Francq and Céline Thuillet
2010/405 ( PS PS.GZ PDF )
Privacy-Preserving RFID Systems: Model and Constructions
S\'ebastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault
2010/404 ( PDF )
On the Insecurity of Parallel Repetition for Leakage Resilience
Allison Lewko and Brent Waters
2010/403 ( -- withdrawn -- )
Linear Secret Sharing for Hierarchical Access Structures
Ali Aydın Selçuk and Ramazan Yılmaz
2010/402 ( PDF )
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
Mohammad Reza Sohizadeh Abyaneh
2010/401 ( PDF )
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
Jan Camenisch and Thomas Groß and Peter Hladky and Christian Hoertnagl
2010/400 ( PDF )
Security Analysis of a Threshold Proxy Signature Scheme
Kitae Kim and Dahun Nyang
2010/399 ( PS PS.GZ PDF )
Faster Computation of Self-pairings
Chang-An Zhao, Fangguo Zhang and Dongqing Xie
2010/398 ( PDF )
Distinguisher for Shabal's Permutation Function
Peter Novotney
2010/397 ( PDF )
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mihir Bellare and David Cash
2010/396 ( PS PS.GZ PDF )
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
Noémie Floissac and Yann L'Hyver
2010/395 ( PDF )
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Zhibin Zhou and Dijiang Huang
2010/394 ( PDF )
Horizontal Correlation Analysis on Exponentiation
Christophe Clavier and Benoit Feix and Georges Gagnerot and Mylene Roussellet and Vincent Verneuil
2010/393 ( PDF )
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
Jue-Sam Chou 1*, Yalin Chen 2, Chun-Hui Huang 3
2010/392 ( PS PS.GZ PDF )
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
Abhinav Mehta, Shashank Agrawal, Kannan Srinathan
2010/391 ( PDF )
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
Daniel Z. Zanger
2010/390 ( PDF )
Elliptic curves in Huff 's model
Hongfeng Wu and Rongquan Feng
2010/389 ( PDF )
The impossibility of computationally sound XOR
Dominique Unruh
2010/388 ( PDF )
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes
2010/387 ( PDF )
A Combinatorial Analysis of HC-128
Goutam Paul and Subhamoy Maitra and Shashwat Raizada
2010/386 ( PDF )
BoostReduce - A Framework For Strong Lattice Basis Reduction
Werner Backes and Susanne Wetzel
2010/385 ( PDF )
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–
Emmanuel Prouff and Robert McEvoy
2010/384 ( PDF )
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
Danilo Gligoroski and Vlastimil Klima
2010/383 ( PDF )
Huff's Model for Elliptic Curves
Marc Joye and Mehdi Tibouchi and Damien Vergnaud
2010/382 ( PDF )
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
Pierre-Alain Fouque and Mehdi Tibouchi
2010/381 ( PDF )
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva and Bart Mennink and Bart Preneel
2010/380 ( PDF )
Analysis of an internet voting protocol
Kristian Gjøsteen
2010/379 ( PDF )
Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree
Sorina Ionica and Antoine Joux
2010/378 ( PDF )
Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
Jin Wang
2010/377 ( PDF )
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
Masahiro Yagisawa
2010/376 ( PS PS.GZ PDF )
Identity Based Online/Offline Signcryption Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2010/375 ( PDF )
Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function
Kota Ideguchi and Elmar Tischhauser and Bart Preneel
2010/374 ( PDF )
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption
Zhen Liu and Zhenfu Cao
2010/373 ( PDF )
Hashing into Hessian Curves
Reza Rezaeian Farashahi
2010/372 ( PS PS.GZ PDF )
Decoding square-free Goppa codes over $\F_p$
Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki
2010/371 ( PDF )
Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
Nicolas Estibals
2010/370 ( PDF )
Finding discrete logarithms with a set orbit distinguisher
Robert P. Gallant
2010/369 ( PDF )
Double Ciphertext Mode : A Proposal for Secure Backup
Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez
2010/368 ( PDF )
Round-Optimal Password-Based Authenticated Key Exchange
Jonathan Katz and Vinod Vaikuntanathan
2010/367 ( PDF )
Starfish on Strike
Daniel J. Bernstein and Peter Birkner and Tanja Lange
2010/366 ( PDF )
Oblivious RAM Revisited
Benny Pinkas and Tzachy Reinman
2010/365 ( PDF )
TASTY: Tool for Automating Secure Two-partY computations
Wilko Henecka and Stefan Kögl and Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
2010/364 ( PDF )
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
2010/363 ( PDF )
An Analysis of Affine Coordinates for Pairing Computation
Kristin Lauter and Peter L. Montgomery and Michael Naehrig
2010/362 ( PS PS.GZ PDF )
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
Deng Tang and Weiguo Zhang and Xiaohu Tang
2010/361 ( PDF )
On the Use of Financial Data as a Random Beacon
Jeremy Clark and Urs Hengartner
2010/360 ( PS PS.GZ PDF )
On the Security of Identity Based Threshold Unsigncryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and S.Priti and C.Pandu Rangan
2010/359 ( PDF )
Identity Based Self Delegated Signature - Self Proxy Signatures
S.Sharmila Deva Selvi and S.Sree Vivek and S.Gopinath and C.Pandu Rangan
2010/358 ( PDF )
The Fiat--Shamir Transform for Group and Ring Signature Schemes
M.-F. Lee, N.P. Smart and B. Warinschi
2010/357 ( -- withdrawn -- )
CCA-Secure PRE Scheme without Public Verifiability
Jun Shao and Peng liu and Jian Weng
2010/356 ( PS PS.GZ PDF )
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
Pinaki Sarkar and Amrita Saha and Morshed Udan Chowdhury
2010/355 ( PDF )
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
Bozhan Su and Wenling Wu and Shuang Wu and Le Dong
2010/354 ( PDF )
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
Jean-Luc Beuchat and Jorge Enrique González Díaz and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodríguez-Henríquez and Tadanori Teruya
2010/353 ( PDF )
Cryptographic Pairings Based on Elliptic Nets
Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto
2010/352 ( PDF )
A Digital Signature Using Multivariate Functions on Quaternion Ring
Masahiro Yagisawa
2010/351 ( PDF )
Decentralizing Attribute-Based Encryption
Allison Lewko and Brent Waters
2010/350 ( PS PS.GZ PDF )
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
Vladimir Kolesnikov
2010/349 ( PS PS.GZ PDF )
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
Kenneth Koon-Ho Wong and Gregory V. Bard
2010/348 ( PDF )
Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
A. N. Alekseychuk
2010/347 ( PDF )
Time-Specific Encryption
Kenneth G. Paterson and Elizabeth A. Quaglia
2010/346 ( PDF )
Efficient Generalized Signcryption Schemes
Prashant Kushwah and Sunder Lal
2010/345 ( PDF )
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta
2010/344 ( PDF )
Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
Ezekiel J Kachisa
2010/343 ( PS PS.GZ PDF )
Identity Based Public Verifiable Signcryption Scheme
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2010/342 ( PDF )
Fixed Argument Pairings
Craig Costello and Douglas Stebila
2010/341 ( PDF )
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
Masao Kasahara
2010/340 ( PDF )
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
Jayaprakash Kar and Banshidhar Majhi
2010/339 ( PDF )
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
Jose Bacelar Almeida and Endre Bangerter and Manuel Barbosa and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
2010/338 ( PDF )
Efficient SIMD arithmetic modulo a Mersenne number
Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
2010/337 ( PDF )
Practical-Titled Attack on AES-128 Using Chosen-Text Relations
Vincent Rijmen
2010/336 ( PS PS.GZ PDF )
Efficient Differential Fault Analysis for AES
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
2010/335 ( PDF )
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
Patrick Longa, and Catherine Gebotys
2010/334 ( PDF )
Security Proof of AugPAKE
SeongHan Shin and Kazukuni Kobara and Hideki Imai
2010/333 ( -- withdrawn -- )
Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
Zhengjun Cao
2010/332 ( PDF )
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon and Boris Danev and Srdjan Capkun
2010/331 ( PDF )
A Distinguisher for High Rate McEliece Cryptosystems
Jean-Charles Faug\`ere and Val\'erie Gauthier and Ayoub Otmani and Ludovic Perret and Jean-Pierre Tillich
2010/330 ( PS PS.GZ PDF )
Distributed Rational Consensus
Amjed Shareef
2010/329 ( PDF )
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Koji Nuida and Goichiro Hanaoka
2010/328 ( PDF )
Signatures for Multi-source Network Coding
László Czap and István Vajda
2010/327 ( PDF )
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong
2010/326 ( PDF )
Privacy-Preserving Multi-Objective Evolutionary Algorithms
Daniel Funke and Florian Kerschbaum
2010/325 ( PDF )
Effect of the Dependent Paths in Linear Hull
Zhenli Dai and Meiqin Wang and Yue Sun
2010/324 ( PDF )
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Abdel Alim Kamal and Amr M. Youssef
2010/323 ( PDF )
Security Analysis of SIMD
Charles Bouillaguet and Pierre-Alain Fouque and Gaëtan Leurent
2010/322 ( PDF )
Improved Single-Key Attacks on 8-round AES
Orr Dunkelman and Nathan Keller and Adi Shamir
2010/321 ( PDF )
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
Martin Schläffer
2010/320 ( -- withdrawn -- )
On isotopisms of commutative presemifields and CCZ-equivalence of functions
Lilya Budaghyan and Tor Helleseth
2010/319 ( PS PS.GZ PDF )
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
Jian Weng and Yunlei Zhao
2010/318 ( PS PS.GZ PDF )
Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
Ivan Damgård and Claudio Orlandi
2010/317 ( PDF )
A Note On Gottesman-Chuang Quantum Signature Scheme
Zhengjun Cao
2010/316 ( PDF )
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang
2010/315 ( PDF )
Efficient Techniques for High-Speed Elliptic Curve Cryptography
Patrick Longa and Catherine Gebotys
2010/314 ( PDF )
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
2010/313 ( PS PS.GZ PDF )
Fast Exhaustive Search for Polynomial Systems in $F_2$
Charles Bouillaguet and Chen-Mou Cheng and Tony (Tung) Chou and Ruben Niederhagen and Adi Shamir and Bo-Yin Yang
2010/312 ( PDF )
Security weakness of two authenticated key exchange protocols from pairings
Qingfeng Cheng and Chuangui Ma
2010/311 ( PDF )
Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
J.C. Bajard and S. Duquesne and M. Ercegovac
2010/310 ( PDF )
The analytical property for $\zeta(s)$
Sheng-Ping Wu
2010/309 ( PDF )
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
Raveen R. Goundar and Marc Joye and Atsuko Miyaji
2010/308 ( PDF )
Attacking M&M Collective Signature Scheme
Michal Rjaško and Martin Stanek
2010/307 ( PDF )
Impossible Differential Cryptanalysis of SPN Ciphers
Ruilin Li and Bing Sun and Chao Li
2010/306 ( PDF )
On security of a remote user authentication scheme without using smart cards
He Debiao, Chen Jianhua, Hu Jin
2010/305 ( PDF )
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Marten van Dijk and Ari Juels
2010/304 ( PDF )
Cryptanalysis of the Compression Function of SIMD
Hongbo Yu and Xiaoyun Wang
2010/303 ( PDF )
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
Ran Canetti and Sebastian Gajek
2010/302 ( PDF )
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
Frederik Armknecht and Carsten Elsner and Martin Schmidt
2010/301 ( PDF )
On generalized Feistel networks
Viet Tung Hoang and Phillip Rogaway
2010/300 ( PS PS.GZ PDF )
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai
2010/299 ( PDF )
Faster Fully Homomorphic Encryption
Damien Stehle and Ron Steinfeld
2010/298 ( PDF )
On the Indifferentiability of the Gr{\o}stl Hash Function
Elena Andreeva, Bart Mennink and Bart Preneel
2010/297 ( PDF )
Correlation-Enhanced Power Analysis Collision Attack
Amir Moradi and Oliver Mischke and Thomas Eisenbarth
2010/296 ( PDF )
Hash-based Multivariate Public Key Cryptosystems
WANG Hou-Zhen and ZHANG Huan-Guo
2010/295 ( PDF )
Ideal Key Derivation and Encryption in Simulation-based Security
Ralf Kuesters and Max Tuengerthal
2010/294 ( PDF )
Computing genus 2 curves from invariants on the Hilbert moduli space
Kristin Lauter and Tonghai Yang
2010/293 ( PDF )
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
Jacques Patarin
2010/292 ( PDF )
A Low-Area yet Performant FPGA Implementation of Shabal
Jérémie Detrey and Pierrick Gaudry and Karim Khalfallah
2010/291 ( PDF )
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
He Debiao, Chen Jianhua, Hu Jin
2010/290 ( PDF )
Intractable Problems in Cryptography
Neal Koblitz and Alfred Menezes
2010/289 ( PDF )
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento
2010/288 ( PDF )
Lattice-based Identity-Based Broadcast Encryption Scheme
Jin Wang and Jingguo Bi
2010/287 ( PDF )
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
Jacques Patarin
2010/286 ( PDF )
On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
Sugata Gangopadhyay, Brajesh Kumar Singh
2010/285 ( PDF )
A SAT-based preimage analysis of reduced KECCAK hash functions
Pawel Morawiecki and Marian Srebrny
2010/284 ( PDF )
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Yehuda Lindell and Benny Pinkas
2010/283 ( PDF )
Recursive Information Hiding in Visual Cryptography
Sandeep Katta
2010/282 ( PDF )
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
Kerry A. McKay and Poorvi L. Vora
2010/281 ( PDF )
Protocols for Reliable and Secure Message Transmission
Ashish Choudhury
2010/280 ( PDF )
Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
Arpita Patra
2010/279 ( PDF )
On the Round Complexity of Covert Computation
Vipul Goyal and Abhishek Jain
2010/278 ( PDF )
Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage
Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan
2010/277 ( -- withdrawn -- )
Adaptively Secure Broadcast Encryption with Short Ciphertexts
Behzad Malek and Ali Miri
2010/276 ( PDF )
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2010/275 ( PDF )
Position-Based Quantum Cryptography: Impossibility and Constructions
Harry Buhrman, Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky and Christian Schaffner
2010/274 ( PDF )
Online/Offline Identity-Based Signcryption Revisited
Joseph K. Liu, Joonsang Baek and Jianying Zhou
2010/273 ( PDF )
Symmetric States and their Structure: Improved Analysis of CubeHash
Niels Ferguson and Stefan Lucks and Kerry A. McKay
2010/272 ( PDF )
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
Zhimin Chen and Patrick Schaumont
2010/271 ( PDF )
Selecting Parameters for Secure McEliece-based Cryptosystems
Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, and Johannes Buchmann
2010/270 ( PDF )
Factorization of RSA-180
S.A. Danilov and I.A. Popovyan
2010/269 ( PDF )
LAB Form for Iterated Hash Functions
Xigen Yao
2010/268 ( PDF )
Key-Controlled Order-Preserving Encryption
HU Mengke; GAO Juntao
2010/267 ( PDF )
Two improved authenticated multiple key exchange protocols
Feng LIU
2010/266 ( PDF )
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
2010/265 ( PS PS.GZ PDF )
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Jian Weng and Minrong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao
2010/264 ( PDF )
Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
2010/263 ( -- withdrawn -- )
Lattice Reduction and Polynomial Solving
Raphaël Marinier
2010/262 ( PS PS.GZ PDF )
Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
Alan Kaminsky
2010/261 ( PDF )
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
Céline Blondeau and Benoît Gérard
2010/260 ( PDF )
On FPGA-based implementations of Gr\{o}stl
Bernhard Jungk and Steffen Reith
2010/259 ( PS PS.GZ PDF )
Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
Andrey V. Pavlov
2010/258 ( PDF )
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
Ruchi Gode and Sugata Gangopadhyay
2010/257 ( PDF )
Feasible Attack on the 13-round AES-256
Alex Biryukov and Dmitry Khovratovich
2010/256 ( -- withdrawn -- )
On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang
2010/255 ( PS PS.GZ PDF )
Automorphism group of the set of all bent functions
Natalia Tokareva
2010/254 ( PDF )
Cryptanalysis of XXTEA
Elias Yarrkov
2010/253 ( PDF )
Separable Hash Functions
Sarang Aravamuthan
2010/252 ( PDF )
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
Zhengping Jin and Qiaoyan Wen and Hua Zhang
2010/251 ( PDF )
Modeling Attacks on Physical Unclonable Functions
Ulrich Rührmair and Frank Sehnke and Jan Sölter and Gideon Dror and Srinivas Devadas and Jürgen Schmidhuber
2010/250 ( PS PS.GZ PDF )
Collusion Free Protocol for Rational Secret Sharing
Amjed Shareef
2010/249 ( PS PS.GZ PDF )
Rational Secret Sharing without Broadcast
Amjed Shareef
2010/248 ( PDF )
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Alex Biryukov and Ivica Nikoli\'c
2010/247 ( PDF )
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
Jia XU
2010/246 ( PDF )
Quantifying Trust
Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
2010/245 ( PDF )
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
2010/244 ( PDF )
Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
Jia XU
2010/243 ( PDF )
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Senshan Pan and Xiaotong Fu and Weiguo Zhang
2010/242 ( PDF )
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Yang ZHANG and Jun-Liang CHEN
2010/241 ( PDF )
Improved Delegation of Computation using Fully Homomorphic Encryption
Kai-Min Chung and Yael Kalai and Salil Vadhan
2010/240 ( PDF )
Weaknesses of a dynamic ID-based remote user authentication scheme
He Debiao, Chen Jianhua, Hu Jin
2010/239 ( PDF )
One-round and authenticated three-party multiple key exchange protocol from parings
Feng LIU
2010/238 ( PS PS.GZ PDF )
Collusion Free Protocol for Correlated Element Selection Problem
Amjed Shareef and Akshay Agrawal and C. Pandu Rangan
2010/237 ( PS PS.GZ PDF )
A New Security Model for Authenticated Key Agreement
Augustin P. Sarr and Philippe Elbaz–Vincent and Jean–Claude Bajard
2010/236 ( PDF )
Accountability: Definition and Relationship to Verifiability
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2010/235 ( PDF )
Attribute-based group key establishment
Rainer Steinwandt and Adriana Suárez Corona
2010/234 ( PDF )
Efficient provable data possession for hybrid clouds
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau
2010/233 ( PDF )
Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Georg Fuchsbauer
2010/232 ( PDF )
On Representable Matroids and Ideal Secret Sharing
Ching-Fang Hsu and Qi Cheng
2010/231 ( PS PS.GZ PDF )
Throughput-Optimal Routing in Unreliable Networks
Paul Bunn and Rafail Ostrovsky
2010/230 ( PDF )
A calculus for game-based security proofs
David Nowak and Yu Zhang
2010/229 ( PDF )
Concurrent composition in the bounded quantum storage model
Dominique Unruh
2010/228 ( PDF )
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis
2010/227 ( PS PS.GZ PDF )
A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
Neal Koblitz
2010/226 ( PDF )
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
Zvika Brakerski and Shafi Goldwasser
2010/225 ( PDF )
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
Junghyun Nam
2010/224 ( PS PS.GZ PDF )
Efficient Implementation of the Orlandi Protocol Extended Version
Thomas P. Jakobsen and Marc X. Makkes and Janus Dam Nielsen
2010/223 ( PDF )
Improved Differential Attacks for ECHO and Grostl
Thomas Peyrin
2010/222 ( PS PS.GZ PDF )
Some Observations on Indifferentiability
Ewan Fleischmann and Michael Gorski and Stefan Lucks
2010/221 ( PDF )
Solving Generalized Small Inverse Problems
Noboru Kunihiro
2010/220 ( PS PS.GZ PDF )
(If) Size Matters: Size-Hiding Private Set Intersection
Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik
2010/219 ( PDF )
Tracker: Security and Privacy for RFID-based Supply Chains
Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
2010/218 ( -- withdrawn -- )
New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
Zhen Wang and Shuqin Fan
2010/217 ( PDF )
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Daniele Perito and Gene Tsudik
2010/216 ( PDF )
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
Zheng Yuan and Xiaoqiu Ren
2010/215 ( PDF )
On the q-Strong Diffie-Hellman Problem
Naoki Tanaka and Taiichi Saito
2010/214 ( PDF )
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest
2010/213 ( PDF )
Composable Security Analysis of OS Services
Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Venema
2010/212 ( PDF )
Quantum Proofs of Knowledge
Dominique Unruh
2010/211 ( PDF )
Practical-time Attack on the Full MMB Block Cipher
Keting Jia and Jiazhe Chen and Meiqin Wang and Xiaoyun Wang
2010/210 ( -- withdrawn -- )
Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
Yu Chen
2010/209 ( PDF )
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer
2010/208 ( PDF )
Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
Richard Moloney and Aidan O'Mahony and Pierre Laurent
2010/207 ( PDF )
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Koen Simoens and Roel Peeters and Bart Preneel
2010/206 ( PDF )
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
Long Hoang Nguyen and Andrew William Roscoe
2010/205 ( PDF )
On Protecting Cryptographic Keys Against Continual Leakage
Ali Juma and Yevgeniy Vahlis
2010/204 ( PDF )
Certificateless generalized signcryption
Ji Huifang, Han Wenbao, Zhao Long
2010/203 ( PDF )
Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
Bernard Colbert and Anthony H. Dekker and Lynn Margaret Batten
2010/202 ( PDF )
Robust Combiner for Obfuscators
Amir Herzberg and Haya Shulman
2010/201 ( -- withdrawn -- )
Impossible Differential Cryptanalysis on E2
Yuechuan Wei and Ruilin Li and Ping Li and Chao Li
2010/200 ( PDF )
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Markus Rückert and Michael Schneider and Dominique Schröder
2010/199 ( PDF )
A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
Zeng Bing and Tang Xueming and Chingfang Hsu
2010/198 ( PDF )
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schläffer
2010/197 ( PDF )
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano
2010/196 ( PS PS.GZ PDF )
Cryptography Against Continuous Memory Attacks
Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
2010/195 ( PDF )
On E-Vote Integrity in the Case of Malicious Voter Computers
Sven Heiberg, Helger Lipmaa, Filip Van Laenen
2010/194 ( PS PS.GZ PDF )
Identity-Based Online/Offline Key Encapsulation and Encryption
Sherman S.M. Chow and Joseph K. Liu and Jianying Zhou
2010/193 ( PDF )
Speeding Up The Widepipe: Secure and Fast Hashing
Mridul Nandi and Souradyuti Paul
2010/192 ( PDF )
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
Yi-Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu
2010/191 ( PDF )
On Designated Verifier Signature Schemes
Michal Rjaško and Martin Stanek
2010/190 ( PDF )
J-PAKE: Authenticated Key Exchange Without PKI
Feng Hao and Peter Ryan
2010/189 ( PDF )
New generic algorithms for hard knapsacks
Nick Howgrave-Graham and Antoine Joux
2010/188 ( PS PS.GZ PDF )
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang
2010/187 ( PS PS.GZ PDF )
Certificateless Signcryption without Pairing
Wenjian Xie and Zhang Zhang
2010/186 ( PDF )
New software speed records for cryptographic pairings
Michael Naehrig and Ruben Niederhagen and Peter Schwabe
2010/185 ( PDF )
New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
Wenping Ma, Chen Yang, and Shaohui Sun
2010/184 ( -- withdrawn -- )
Rational Secret Sharing AS Extensive Games
Zhifang Zhang
2010/183 ( PDF )
Preventing Pollution Attacks in Multi-Source Network Coding
Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman
2010/182 ( PDF )
A Simple BGN-type Cryptosystem from LWE
Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
2010/181 ( PDF )
Cryptanalysis of a DoS-resistant ID-based password authentication
He Debiao, Chen Jianhua, Hu Jin
2010/180 ( PS PS.GZ PDF )
The World is Not Enough: Another Look on Second-Order DPA
Francois-Xavier Standaert and Nicolas Veyrat-Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard
2010/179 ( PDF )
A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
Ziran Tu and Yingpu Deng
2010/178 ( PDF )
Identity Based Online/Offline Encryption Scheme
Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C
2010/177 ( PDF )
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
Robert Granger
2010/176 ( PDF )
A Comparison of Cryptanalytic Tradeoff Algorithms
Jin Hong and Sunghwan Moon
2010/175 ( PDF )
Sanitizable signatures with strong transparency in the standard model
Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan
2010/174 ( PDF )
A Reflection on the Security of Two-Party Key Establishment Protocols
Qiang Tang
2010/173 ( PDF )
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki
2010/172 ( PS PS.GZ )
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
Qixiang Mei, Bao Li,Xianhui Lu and Dingding Jia
2010/171 ( PDF )
On Foundation and Construction of Physical Unclonable Functions
Jiang Wu and Maire O'Neill
2010/170 ( PDF )
On a conjecture about binary strings distribution
Jean-Pierre Flori and Hugues Randriambololona and Gérard Cohen and Sihem Mesnager
2010/169 ( PDF )
Dismantling SecureMemory, CryptoMemory and CryptoRF
Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur
2010/168 ( PDF )
A Meet-in-the-Middle Attack on ARIA
Xuehai Tang, Bing Sun, Ruilin Li and Chao Li
2010/167 ( PDF )
Evolutionary Cipher against Differential Power Attack
Tang ming and Meng Qinshu and Zhang Huanguo and Gao Si and Dou Qin and Shen Fei and Li Du
2010/166 ( PDF )
Fault Analysis Study of the Block Cipher FOX64
Ruilin Li and Jianxiong You and Bing Sun and Chao Li
2010/165 ( PDF )
Comment on four two-party authentication protocols
Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
2010/164 ( PDF )
Black-Box Constructions of Protocols for Secure Computation
Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
2010/163 ( PDF )
Golay Complementary Sequences Over the QAM Constellation
Wenping Ma ,Chen Yang and Shaohui Sun
2010/162 ( PS PS.GZ PDF )
1024XKS - A High Security Software Oriented Block Cipher Revisited
Dieter Schmidt
2010/161 ( PDF )
Stange's Elliptic Nets and Coxeter Group F4
Daniel R. L. Brown
2010/160 ( PDF )
A Flaw in The Internal State Recovery Attack on ALPHA-MAC
Shengbao Wu and Mingsheng Wang and Zheng Yuan
2010/159 ( PDF )
Identity-Based Encryption Secure against Selective Opening Attack
Mihir Bellare and Brent Waters and Scott Yilek
2010/158 ( PDF )
A variant of the F4 algorithm
Antoine Joux and Vanessa Vitse
2010/157 ( PDF )
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
Antoine Joux and Vanessa Vitse
2010/156 ( PDF )
Genus 2 Curves with Complex Multiplication
Eyal Z. Goren and Kristin E. Lauter
2010/155 ( PDF )
the upper bounds on differntial characteristics in block cipher SMS4
Zhang MeiLing and Liu JingMei and Wang XinMei
2010/154 ( PDF )
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs
2010/153 ( PDF )
Founding Cryptography on Tamper-Proof Hardware Tokens
Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia
2010/152 ( PDF )
Secure and Fast Implementations of Two Involution Ciphers
Billy Bob Brumley
2010/151 ( PDF )
Ring signature with divided private key
Stelian Flonta, Liviu-Cristian Miclea
2010/150 ( PDF )
Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
Mohammad Sadeq Dousti
2010/149 ( PDF )
On Small Subgroup Non-confinement Attack
Feng Hao
2010/148 ( PDF )
Comments on five smart card based password authentication protocols
Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
2010/147 ( PDF )
A New Framework for Password-Based Authenticated Key Exchange
Adam Groce and Jonathan Katz
2010/146 ( PDF )
Some Applications of Lattice Based Root Finding Techniques
Santanu Sarkar and Subhamoy Maitra
2010/145 ( PDF )
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
2010/144 ( PDF )
New Definitions and Separations for Circular Security
David Cash and Matthew Green and Susan Hohenberger
2010/143 ( PDF )
Small Scale Variants Of The Block Cipher PRESENT
Gregor Leander
2010/142 ( PDF )
Mean value formulas for twisted Edwards curves
Dustin Moody
2010/141 ( -- withdrawn -- )
A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
Yu Chen
2010/140 ( PDF )
Improved Agreeing-Gluing Algorithm
Igor Semaev
2010/139 ( PDF )
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
Masao Kasahara
2010/138 ( PDF )
On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
Manoj Kumar
2010/137 ( PDF )
Estimating the Security of Lattice-based Cryptosystems
Markus Rückert and Michael Schneider
2010/136 ( PDF )
On Robust Key Agreement Based on Public Key Authentication
Feng Hao
2010/135 ( PS PS.GZ PDF )
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
Aur\'elie Bauer and Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud
2010/134 ( PDF )
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
Masaaki Shirase
2010/133 ( PDF )
Signing on Elements in Bilinear Groups for Modular Protocol Design
Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo
2010/132 ( PS PS.GZ PDF )
On the claimed privacy of EC-RAC III
Junfeng Fan and Jens Hermans and Frederik Vercauteren
2010/131 ( PDF )
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
Jooyoung Lee and John Steinberger
2010/130 ( PDF )
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi
2010/129 ( PDF )
Relation for Algebraic Attack on E0 combiner
N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary
2010/128 ( -- withdrawn -- )
Update-Optimal Authenticated Structures Based on Lattices
Charalampos Papamanthou and Roberto Tamassia
2010/127 ( -- withdrawn -- )
CCA-Secure Cryptosystem from Lattice
Chen Huiyan
2010/126 ( PDF )
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Jian-zhu Lu and Jipeng Zhou
2010/125 ( PDF )
Cryptographic Aspects of Real Hyperelliptic Curves
M. J. Jacobson, Jr., R. Scheidler, AND A. Stein
2010/124 ( PDF )
A Hardware Wrapper for the SHA-3 Hash Algorithms
Brian Baldwin and Andrew Byrne and Liang Lu and Mark Hamilton and Neil Hanley and Maire O'Neill and William P. Marnane
2010/123 ( PDF )
Delaying Mismatched Field Multiplications in Pairing Computations
Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
2010/122 ( PDF )
Security of Encryption Schemes in Weakened Random Oracle Models
Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa
2010/121 ( -- withdrawn -- )
Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Chen Huiyan and Li Zichen
2010/120 ( PDF )
Universal One-Way Hash Functions via Inaccessible Entropy
Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee
2010/119 ( -- withdrawn -- )
How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
Huang Lin and Zhenfu Cao and Muxin Zhou and Haojin Zhu
2010/118 ( PDF )
Proposal of a Signature Scheme based on STS Trapdoor
Shigeo Tsujii and Masahito Gotaishi and Kohtaro Tadaki and Ryou Fujita
2010/117 ( PDF )
Cryptographic Agility and its Relation to Circular Encryption
Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash
2010/116 ( PDF )
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
M. Abdelaziz Elaabid and Sylvain Guilley
2010/115 ( PDF )
A Security Evaluation of DNSSEC with NSEC3
Jason Bau, and John C Mitchell
2010/114 ( PDF )
The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
Simon R. Blackburn
2010/113 ( PDF )
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Xu An Wang and Xiaoyuan Yang
2010/112 ( PDF )
CCA-Secure PRE Scheme without Random Oracles
Jun Shao and Zhenfu Cao and Peng Liu
2010/111 ( PDF )
On zero practical significance of “Key recovery attack on full GOST block cipher with zero time and memory”
Vladimir Rudskoy
2010/110 ( PDF )
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Allison Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters
2010/109 ( PDF )
Practical Adaptive Oblivious Transfer from Simple Assumptions
Matthew Green and Susan Hohenberger
2010/108 ( PDF )
Perfectly Secure Oblivious RAM Without Random Oracles
Ivan Damg\aa{}rd and Sigurd Meldgaard and Jesper Buus Nielsen
2010/107 ( PDF )
Adaptive Concurrent Non-Malleability with Bare Public-Keys
Andrew C. Yao and Moti Yung and Yunlei Zhao
2010/106 ( PDF )
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Ivan Damgård and Yuval Ishai and Mikkel Krøigaard
2010/105 ( PDF )
Bias in the nonlinear filter generator output sequence
Sui-Guan Teo and Leonie Simpson and Ed Dawson
2010/104 ( PDF )
Avoiding Full Extension Field Arithmetic in Pairing Computations
Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
2010/103 ( PDF )
The Extended Access Control for Machine Readable Travel Documents
Rafik Chaabouni and Serge Vaudenay
2010/102 ( PDF )
Constructing Verifiable Random Functions with Large Input Spaces
Susan Hohenberger and Brent Waters
2010/101 ( PDF )
Fair Blind Signatures without Random Oracles
Georg Fuchsbauer and Damien Vergnaud
2010/100 ( PDF )
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
Brett Hemenway and Steve Lu and Rafail Ostrovsky
2010/099 ( PDF )
On Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway and Rafail Ostrovsky
2010/098 ( PDF )
A Zero-One Law for Deterministic 2-Party Secure Computation
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2010/097 ( PDF )
Parallel Enumeration of Shortest Lattice Vectors
Özgür Dagdelen and Michael Schneider
2010/096 ( PDF )
Secret Sharing Extensions based on the Chinese Remainder Theorem
Kamer Kaya and Ali Aydın Selçuk
2010/095 ( PDF )
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
Kenneth G. Paterson and Gaven J. Watson
2010/094 ( PDF )
A Random Number Generator Based on Isogenies Operations
He Debiao, Chen Jianhua, Hu Jin
2010/093 ( PDF )
New Impossible Di®erential Attacks on AES
Zheng Yuan
2010/092 ( PS PS.GZ PDF )
Security Weaknesses in Two Certificateless Signcryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2010/091 ( PDF )
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Jean-Philippe Aumasson and Emilia Käsper and Lars Ramkilde Knudsen and Krystian Matusiewicz and Rune Odegaard and Thomas Peyrin and Martin Schläffer
2010/090 ( PDF )
Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})
Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi
2010/089 ( PDF )
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai
2010/088 ( PDF )
An Efficient and Parallel Gaussian Sampler for Lattices
Chris Peikert
2010/087 ( PDF )
MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
Christopher Wolf and Bart Preneel
2010/086 ( PDF )
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
Zvika Brakerski and Yael Tauman Kalai
2010/085 ( PDF )
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El-Khatib and Hussein Mouftah and Eiji Okamoto
2010/084 ( PDF )
Attribute-based Authenticated Key Exchange
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
2010/083 ( PS PS.GZ PDF )
One Round Group Key Exchange with Forward Security in the Standard Model
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
2010/082 ( PDF )
Predicate-Based Key Exchange
James Birkett and Douglas Stebila
2010/081 ( PDF )
The Eris hybrid cipher
Sandy Harris
2010/080 ( PDF )
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
Gergei Bana and Koji Hasebe and Mitsuhiro Okada
2010/079 ( PDF )
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2010/078 ( PDF )
Multiple Bytes Differential Fault Analysis on CLEFIA
Xin-jie ZHAO and Tao WANG and Jing-zhe GAO
2010/077 ( PDF )
ECC2K-130 on Cell CPUs
Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe
2010/076 ( PDF )
Private and Continual Release of Statistics
T-H. Hubert Chan, Elaine Shi, Dawn Song
2010/075 ( PDF )
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
Mehdi Vasef
2010/074 ( PDF )
Concurrent Knowledge Extraction in the Public-Key Model
Andrew C. Yao and Moti Yung and Yunlei Zhao
2010/073 ( PDF )
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook Koo, Yongjin Yeom, and Junghwan Song
2010/072 ( PDF )
Approximating Addition by XOR: how to go all the way
Didier Alqui\'e
2010/071 ( PDF )
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
Didier Alqui\'e
2010/070 ( PDF )
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
Markus Rückert
2010/069 ( PDF )
Type-II Optimal Polynomial Bases
Daniel J. Bernstein and Tanja Lange
2010/068 ( PDF )
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Rosario Gennaro and Hugo Krawczyk and Tal Rabin
2010/067 ( PDF )
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Ernie Brickell and Jiangtao Li
2010/066 ( PDF )
Some Observations on TWIS Block Cipher
Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li
2010/065 ( PDF )
An Anonymous ID-based Encryption Revisited
Zhengjun Cao
2010/064 ( PDF )
New Advances on Privacy-Preserving Policy Reconciliation
Ulrike Meyer and Susanne Wetzel and Sotiris Ioannidis
2010/063 ( PDF )
Differential Fault Analysis on SMS4 Using a Single Fault
Ruilin Li and Bing Sun and Chao Li and Jianxiong You
2010/062 ( PDF )
Differential Cryptanalysis of SMS4 Block Cipher
Bozhan Su and Wenling Wu and Wentao Zhang
2010/061 ( PDF )
Privacy-Preserving Matching Protocols for Attributes and Strings
Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu and Jyh-Charn Liu
2010/060 ( PDF )
Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
Yongge Wang
2010/059 ( PDF )
A New Framework for RFID Privacy
Robert H. Deng, Yingjiu Li, Andrew C. Yao and Moti Yung and Yunlei Zhao
2010/058 ( PDF )
Solinas primes of small weight for fixed sizes
Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna
2010/057 ( PDF )
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Cagdas Calik and Meltem Sonmez Turan
2010/056 ( PDF )
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Xin-jie ZHAO and Tao WANG
2010/055 ( PDF )
Credential Authenticated Identification and Key Exchange
Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup
2010/054 ( PDF )
An Improved Timing Attack with Error Detection on RSA-CRT
Cai-Sen CHEN, Tao Wang, Jun-Jian Tian
2010/053 ( PDF )
Logical cryptoanalysis on the example of the cryptosystem DES
A.D. Plotnikov
2010/052 ( -- withdrawn -- )
Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
FuShan Wei and QingFeng Cheng and ChuanGui Ma
2010/051 ( PDF )
A Principle for Cryptographic Protocols Beyond Security, Less Parameters
Zhengjun Cao
2010/050 ( PS PS.GZ PDF )
Authenticating Aggregate Range Queries over Multidimensional Dataset
Jia XU and Ee-Chien CHANG
2010/049 ( PS PS.GZ PDF )
On Symmetric Encryption and Point Obfuscation
Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs
2010/048 ( -- withdrawn -- )
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
He Debiao; Chen Jianhua; Hu Jin
2010/047 ( PDF )
Lower Bounds for Straight Line Factoring
Daniel R. L. Brown
2010/046 ( -- withdrawn -- )
A New Chaos-Based Cryptosystem for Secure Transmitted Images
Abir AWAD
2010/045 ( -- withdrawn -- )
Efficient chaotic permutations for image encryption algorithms
Abir AWAD
2010/044 ( -- withdrawn -- )
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
Abir AWAD
2010/043 ( PDF )
Differential and invertibility properties of BLAKE (full version)
Jean-Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier
2010/042 ( PDF )
A modified eCK model with stronger security for tripartite authenticated key exchange
Qingfeng Cheng and Chuangui Ma and Fushan Wei
2010/041 ( PDF )
The Effects of the Omission of Last Round's MixColumns on AES
Orr Dunkelman and Nathan Keller
2010/040 ( PDF )
Batch Groth-Sahai
Olivier Blazy and Georg Fuchsbauer and Malika Izabachène and Amandine Jambert and Hervé Sibert and Damien Vergnaud
2010/039 ( PDF )
On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
Xiwang Cao and Lei Hu
2010/038 ( PDF )
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
Arnaud Boscher and Helena Handschuh and Elena Trichina
2010/037 ( PDF )
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Pierre-Alain Fouque and Mehdi Tibouchi
2010/036 ( -- withdrawn -- )
An Enhanced Remote User Authentication Scheme
Keerti Srivastava and Amit K Awasthi and R.C.Mittal
2010/035 ( PDF )
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro Hanaoka and Kaoru Kurosawa
2010/034 ( PDF )
On the order of the polynomial $x^p-x-a$
Xiwang Cao
2010/033 ( PDF )
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup
2010/032 ( PDF )
An Information Theoretic Perspective on the Differential Fault Analysis against AES
Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta
2010/031 ( PDF )
Class Invariants by the CRT Method
Andreas Enge and Andrew V. Sutherland
2010/030 ( PDF )
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
Simon R. Blackburn and Douglas R. Stinson and Jalaj Upadhyay
2010/029 ( PDF )
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank
2010/028 ( PDF )
A secure anonymous communication scheme in vehicular ad hoc networks from pairings
*Jue-Sam Chou 1, Yalin Chen 2
2010/027 ( PDF )
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
Yalin Chen1, *Jue-Sam Chou2, Xian-Wu Hou3
2010/026 ( PDF )
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
Xin-jie Zhao and Tao Wang
2010/025 ( PDF )
New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
Jiqiang Lu
2010/024 ( PDF )
Authentication schemes from actions on graphs, groups, or rings
Dima Grigoriev and Vladimir Shpilrain
2010/023 ( PDF )
Differential Fault Analysis on AES with 192 and 256-Bit Keys
Junko Takahashi and Toshinori Fukunaga
2010/022 ( PDF )
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
2010/021 ( PDF )
A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong
2010/020 ( PS PS.GZ PDF )
Number of Jacobi quartic curves over finite fields
Rongquan Feng, Hongfeng Wu
2010/019 ( PDF )
Related-Key Boomerang and Rectangle Attacks
Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller
2010/018 ( PDF )
Scalability and Security Conflict for RFID Authentication Protocols
Imran Erguler and Emin Anarim
2010/017 ( PS PS.GZ PDF )
A new one-time signature scheme from syndrome decoding
Paulo S. L. M. Barreto and Rafael Misoczki
2010/016 ( PDF )
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang
2010/015 ( PDF )
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Jorge Guajardo and Bart Mennink
2010/014 ( PDF )
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
Mridul Nandi
2010/013 ( PDF )
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
Orr Dunkelman and Nathan Keller and Adi Shamir
2010/012 ( PS PS.GZ PDF )
Differential Cache Trace Attack Against CLEFIA
Chester Rebeiro and Debdeep Mukhopadhyay
2010/011 ( -- withdrawn -- )
Related Key Cryptanalysis of the LEX Stream Cipher
Mainack Mondal and Debdeep Mukhopadhyay
2010/010 ( PDF )
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta
2010/009 ( PDF )
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
Xuelian Li and Yupu Hu and Juntao Gao
2010/008 ( PS PS.GZ PDF )
A DAA Scheme Requiring Less TPM Resources
Liqun Chen
2010/007 ( PDF )
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2010/006 ( PDF )
Factorization of a 768-bit RSA modulus
Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann
2010/005 ( PDF )
Skew-Frobenius map on twisted Edwards curve
Mingqiang Wang, Xiaoyun Wang,Tao Zhan, Yuliang Zheng
2010/004 ( PS PS.GZ PDF )
Halving on Binary Edwards Curves
Qiping Lin and Fangguo Zhang
2010/003 ( PDF )
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong
2010/002 ( PDF )
Practical ID-based Encryption for Wireless Sensor Network
Cheng-Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng
2010/001 ( PDF )
Transfinite Cryptography
Jacques Patarin
2009/638 ( -- withdrawn -- )
Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field $\mathbb{F}_q$ for Some Orders
Wei Yu, Kunpeng Wang, Bao Li
2009/637 ( PDF )
Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers
Xiao-shan Gao and Zhenyu Huang
2009/636 ( PDF )
Obtaining More Karatsuba-Like Formulae over The Binary Field
Haining Fan and Ming Gu and Jiaguang Sun and Kwok-Yan Lam
2009/635 ( PDF )
Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature
Kazukuni Kobara
2009/634 ( PDF )
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512}
Charles Bouillaguet and Orr Dunkelman and Ga\"etan Leurent and Pierre-Alain Fouque
2009/633 ( PDF )
Traitor-Tracing on Binary Strings
Michael J. Collins
2009/632 ( PDF )
Cryptanalysis of Secure Message Transmission Protocols with Feedback
Qiushi Yang and Yvo Desmedt
2009/631 ( PDF )
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
DaeHun Nyang and Mun-Kyu Lee
2009/630 ( PDF )
Information-Theoretically Secure Protocols and Security Under Composition
Eyal Kushilevitz and Yehuda Lindell and Tal Rabin
2009/629 ( PDF )
A Comparative Analysis of Delay Based PUF Implementations on FPGA
Sergey Morozov and Abhranil Maiti and Patrick Schaumont,
2009/628 ( PS PS.GZ PDF )
Using Sphinx to Improve Onion Routing Circuit Construction
Aniket Kate and Ian Goldberg
2009/627 ( PDF )
A Unified Method for Finding Impossible Differentials of Block Cipher Structures
Yiyuan Luo, Zhongming Wu, Xuejia Lai and Guang Gong
2009/626 ( PDF )
Approximate Integer Common Divisor Problem relates to Implicit Factorization
Santanu Sarkar and Subhamoy Maitra
2009/625 ( PS PS.GZ PDF )
Cryptographic Accumulators for Authenticated Hash Tables
Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos
2009/624 ( PS PS.GZ PDF )
Security Analysis of the PACE Key-Agreement Protocol
Jens Bender and Marc Fischlin and Dennis Kuegler
2009/623 ( PDF )
Universally Constructing 12-th Degree Extension Field for Ate Pairing
Masaaki Shirase
2009/622 ( PDF )
A Strong Blind Signature Scheme over Braid Groups
WEI Yun, XIONG Guo-Hua, BAO Wan-Su and ZHANG Xing-Kai
2009/621 ( PDF )
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Tibor Jager and Jörg Schwenk
2009/620 ( PDF )
Security of ECQV-Certified ECDSA Against Passive Adversaries
Daniel R. L. Brown and Matthew J. Campagna and Scott A. Vanstone
2009/619 ( PDF )
A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)
Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger
2009/618 ( PDF )
Data-Depend Hash Algorithm
ZiJie Xu and Ke Xu
2009/617 ( PDF )
An efficient ID- based directed signature scheme from bilinear pairings
B. Umaprasada Rao and P. Vasudeva Reddy and T. Gowri
2009/616 ( PS PS.GZ PDF )
Fully Homomorphic Encryption over the Integers
Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan
2009/615 ( PDF )
Faster Pairing Computations on Curves with High-Degree Twists
Craig Costello and Tanja Lange and Michael Naehrig
2009/614 ( PDF )
Secure Multiparty AES (full paper)
Ivan Damgård and Marcel Keller
2009/613 ( PDF )
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition
Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao
2009/612 ( PDF )
On the Impossibility of Batch Update for Cryptographic Accumulators
Philippe Camacho
2009/611 ( PDF )
Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules
Lan Luo,QiongHai Dai,ZhiGuang Qin and ChunXiang Xu
2009/610 ( PDF )
Security Analysis of A Remote User Authentication Protocol by Liao and Wang
Dang Nguyen Duc and Kwangjo Kim
2009/609 ( PDF )
Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction
Dang Nguyen Duc and Kwangjo Kim
2009/608 ( PS PS.GZ PDF )
Non-Malleable Codes
Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs
2009/607 ( -- withdrawn -- )
Efficient Client Puzzles based on Repeated-Squaring
Ghassan O. Karame and Srdjan Capkun
2009/606 ( PDF )
On a weakness of the Tu-Deng function and its repair
Claude Carlet
2009/605 ( PDF )
Solving the Shortest Lattice Vector Problem in Time 2^2.465n
Xavier Pujol and Damien Stehle
2009/604 ( PDF )
Composition of Zero-Knowledge Proofs with Efficient Provers
Eleanor Birrell and Salil Vadhan
2009/603 ( PDF )
An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations
Brian Baldwin and William P. Marnane
2009/602 ( PS PS.GZ PDF )
Secure Ranging With Message Temporal Integrity
Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan \v{C}apkun
2009/601 ( PDF )
Parallel Shortest Lattice Vector Enumeration on Graphics Cards
Jens Hermans and Michael Schneider and Johannes Buchmann and Frederik Vercauteren and Bart Preneel
2009/600 ( PDF )
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
D. Fiore and R. Gennaro and N.P. Smart
2009/599 ( PDF )
Groth--Sahai proofs revisited
E. Ghadafi, N.P. Smart and B. Warinschi
2009/598 ( PDF )
On the Design and Implementation of an Efficient DAA Scheme
L. Chen, D. Page and N.P. Smart
2009/597 ( PS PS.GZ PDF )
Twisted Jacobi Intersections Curves
Rongquan Feng, Menglong Nie, Hongfeng Wu
2009/596 ( PS PS.GZ PDF )
Could SFLASH be repaired?
Jintai Ding and Vivien Dubois and Bo-Yin Yang and Owen Chia-Hsin Chen and Chen-Mou Cheng
2009/595 ( PDF )
Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms
Endre Bangerter and Jan Camenisch and Stephan Krenn
2009/594 ( PDF )
Efficient Set Operations in the Presence of Malicious Adversaries
Carmit Hazay and Kobbi Nissim
2009/593 ( PS PS.GZ PDF )
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
Jin Li and Qian Wang and Cong Wang and Ning Cao and Kui Ren and Wenjing Lou
2009/592 ( PDF )
From Passive to Covert Security at Low Cost
Ivan Damgård and Martin Geisler and Jesper Buus Nielsen
2009/591 ( PDF )
Embedded SFE: Offloading Server and Network using Hardware Tokens
Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2009/590 ( PDF )
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev
2009/589 ( PDF )
Information-set decoding for linear codes over Fq
Christiane Peters
2009/588 ( PS PS.GZ PDF )
Confidential Signatures and Deterministic Signcryption
Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam and Dominique Schroder
2009/587 ( PDF )
Poly-Dragon: An efficient Multivariate Public Key Cryptosystem
Rajesh P. Singh, A. Saikia and B.K. Sarma
2009/586 ( PS PS.GZ PDF )
A mean value formula for elliptic curves
Rongquan Feng and Hongfeng Wu
2009/585 ( PDF )
An Improved Differential Fault Attack on Camellia
ZHAO Xin-jie, WANG Tao
2009/584 ( PDF )
Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers
Yu Liu, Kaijie Wu, and Ramesh Karri
2009/583 ( PDF )
Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem
Charles Bouillaguet and Jean-Charles Faugère and Pierre-Alain Fouque and Ludovic Perret
2009/582 ( PDF )
A Game-Based Definition of Coercion-Resistance and its Applications
Ralf Kuesters and Tomasz Truderung and Andreas Vogt
2009/581 ( PDF )
A Diagonal Fault Attack on the Advanced Encryption Standard
Dhiman Saha and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
2009/580 ( PDF )
A complete set of addition laws\\for incomplete Edwards curves
Daniel J. Bernstein and Tanja Lange
2009/579 ( PDF )
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang and Sherman S.-M. Chow and Qian Wang and Kui Ren and Wenjing Lou
2009/578 ( PS PS.GZ PDF )
Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps
Wenjian Xie and Zhang Zhang
2009/577 ( PDF )
On the nonlinearity profile of the Dillon function
Claude Carlet
2009/576 ( PDF )
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Vadim Lyubashevsky and Adriana Palacio and Gil Segev
2009/575 ( PDF )
Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
Michael Tunstall and Debdeep Mukhopadhyay
2009/574 ( PS PS.GZ PDF )
Voting with unconditional privacy: CFSY for booth voting
Jeroen van de Graaf
2009/573 ( PDF )
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields
Leibo Li and Mingqiang Wang and Zhanjiang Xia
2009/572 ( -- withdrawn -- )
On the Equivalence of Two Models for Key-Dependent-Message Encryption
Alexander W. Dent
2009/571 ( PDF )
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
N.P. Smart and F. Vercauteren
2009/570 ( PDF )
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
Adriana C. B. Pinto and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento
2009/569 ( PDF )
Secure Network Coding Over the Integers
Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin
2009/568 ( PDF )
Ephemeral key compromise attack on the IB-KA protocol
Qingfeng Cheng and Chuangui Ma
2009/567 ( PDF )
Properties of the Discrete Differential with Cryptographic Applications
Daniel Smith-Tone
2009/566 ( PDF )
New Cryptosystems From CSP-Based Self-Distributive Systems
Licheng Wang and Lihua Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao
2009/565 ( PDF )
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions
Robert Granger and Michael Scott
2009/564 ( PDF )
Optimal pairing revisited
Mingqiang Wang and Puwen Wei and Haifeng Zhang and Yuliang Zheng
2009/563 ( PDF )
A Family of $p$-ary Binomial Bent Functions
Dabin Zheng and Xiangyong Zeng and Lei Hu
2009/562 ( PDF )
How to pair with a human
Stefan Dziembowski
2009/561 ( PDF )
Improvements on two password-based authentication protocols
Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3
2009/560 ( PDF )
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
Manoj Kumar
2009/559 ( PDF )
New Integral Distinguisher for Rijndael-256
Yuechuan Wei and Bing Sun and Chao Li
2009/558 ( -- withdrawn -- )
Quantifying Trust
Mariusz Jakubowski AND Ramarathnam Venkatesan AND Yacov Yacobi
2009/557 ( -- withdrawn -- )
Towards a Theory of Trust Based Collaborative Search
Yacov Yacobi
2009/556 ( PDF )
Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
Naomi Benger and Michael Scott
2009/555 ( -- withdrawn -- )
An enhanced password authenticated key agreement protocol for wireless mobile network
Zhigang Gao and Dengguo Feng
2009/554 ( PDF )
ON A COMBINATORIAL CONJECTURE
T. W. CUSICK, YUAN LI AND PANTELIMON STANICA
2009/553 ( PDF )
Cryptanalysis of a key exchange scheme based on block matrices
Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Pedro Taborda Duarte
2009/552 ( PDF )
Preimage Attacks on Reduced DHA-256
Jinmin Zhong and Xuejia Lai
2009/551 ( PDF )
A Novel Design Method of Stream Ciphers Based on Table-Element Permutation
Hongbo Zou
2009/550 ( PDF )
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito and Lei Wang and Kazuo Ohta
2009/549 ( PDF )
Making Collusion-Secure Codes (More) Robust against Bit Erasure
Koji Nuida
2009/548 ( PS PS.GZ PDF )
A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS
Stéphane BALLET and Robert ROLLAND
2009/547 ( PS PS.GZ PDF )
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Rosario Gennaro and Craig Gentry and Bryan Parno
2009/546 ( PDF )
Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC
Masao Kasahara
2009/545 ( PDF )
Fuzzy extractors for continuous distributions
Ileana Buhan and Jeroen Doumen and Pieter Hartel
2009/544 ( PS PS.GZ PDF )
Connections between Quaternary and Binary Bent Functions
Patrick Sol\'e and Natalia Tokareva
2009/543 ( -- withdrawn -- )
A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols
Gildas Avoine and Muhammed Ali Bingol and Suleyman Kardas and Cedric Lauradoux and Benjamin Martin
2009/542 ( PDF )
Analysis of Intermediate Field Systems
Olivier Billet and Jacques Patarin and Yannick Seurin
2009/541 ( PDF )
Breaking ECC2K-130
Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh-Chung Chen and Chen-Mou Cheng and Gauthier van Damme and Giacomo de Meulenaer and Luis Julian Dominguez Perez and Junfeng Fan and Tim Güneysu and Frank Gurkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo-Yin Yang
2009/540 ( PDF )
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
David Mandell Freeman
2009/539 ( PDF )
Covering Radius of Two-dimensional Lattices
Yupeng Jiang and Yingpu Deng and Yanbin Pan
2009/538 ( PS PS.GZ PDF )
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Johann Gro{\ss}sch{\"a}dl and Elisabeth Oswald and Dan Page and Michael Tunstall
2009/537 ( PDF )
Cryptanalysis of two knapsack public-key cryptosystems
Jingguo Bi; Xianmeng Meng and Lidong Han
2009/536 ( -- withdrawn -- )
Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
S. Wu
2009/535 ( -- withdrawn -- )
Weakness of a three-party password-based authenticated key exchange protocol
S. Wu
2009/534 ( -- withdrawn -- )
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu
2009/533 ( PDF )
Finding composite order ordinary elliptic curves using the Cocks-Pinch method
D. Boneh and K. Rubin and A. Silverberg
2009/532 ( PDF )
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters
2009/531 ( PDF )
Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations
Henri Gilbert and Thomas Peyrin
2009/530 ( PDF )
A New Proposal Against the Main of Generic Attacks
Xigen.Yao
2009/529 ( PDF )
Oblivious Transfer with Access Control
Jan Camenisch and Maria Dubovitskaya and Gregory Neven
2009/528 ( PDF )
New Fault Attack on Elliptic Curve Scalar Multiplication
Alexey Chilikov and Oleg Taraskin
2009/527 ( PDF )
An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
Seiko Arita
2009/526 ( PDF )
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
Jiazhe Chen and Keting Jia
2009/525 ( PS PS.GZ PDF )
On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks
Somindu C. Ramanna and Palash Sarkar
2009/524 ( PDF )
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Petros Mol and Scott Yilek
2009/523 ( PDF )
Differential Addition in generalized Edwards Coordinates
Benjamin Justus and Daniel Loebenberger
2009/522 ( PDF )
Isogenies of Elliptic Curves: A Computational Approach
Daniel Shumow
2009/521 ( PDF )
An Efficient Secure Oblivious Transfer
Hung-Min Sun and Yalin Chen and Jue-Sam Chou
2009/520 ( PDF )
Universally Composable Incoercibility
Dominique Unruh and Jörn Müller-Quade
2009/519 ( PDF )
Secure Message Transmission with Small Public Discussion
Juan Garay and Clint Givens and Rafail Ostrovsky
2009/518 ( PDF )
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability
Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo
2009/517 ( PDF )
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles
Qiong Huang and Duncan S. Wong
2009/516 ( PDF )
Lightweight Cryptography - Cryptographic Engineering for a Pervasive World
Axel Poschmann
2009/515 ( PDF )
Blake-Wilson, Johnson and Menezes Protocol Revisited
Hai Huang and Zhenfu Cao
2009/514 ( PS PS.GZ PDF )
Generic One Round Group Key Exchange in the Standard Model
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonzalez Nieto and Mark Manulis
2009/513 ( PDF )
On the round complexity of black-box constructions of commitments secure against selective opening attacks
David Xiao
2009/512 ( PS PS.GZ PDF )
Public-Key Encryption in the Bounded-Retrieval Model
Joel Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs
2009/511 ( PDF )
Bounded Key-Dependent Message Security
Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai
2009/510 ( PDF )
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gr{\o}stl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein
Stefan Tillich and Martin Feldhofer and Mario Kirschbaum and Thomas Plos and J{\"o}rn-Marc Schmidt and Alexander Szekely
2009/509 ( PDF )
Practical Key Recovery Attacks On Two McEliece Variants
Valerie Gauthier Umana and Gregor Leander
2009/508 ( PDF )
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Severin Winkler and Juerg Wullschleger
2009/507 ( PDF )
Efficient Privacy-Preserving Face Recognition
Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg
2009/506 ( PDF )
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions
Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
2009/505 ( PDF )
Authenticated Key Exchange Protocols with Enhanced Freshness Properties
Hai Huang, Zhenfu Cao
2009/504 ( PDF )
Insecure ``Provable Secure Network Coding''
Yongge Wang
2009/503 ( PDF )
Fault Attacks Against EMV Signatures
Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi
2009/502 ( PDF )
On second order nonlinearities of cubic monomial Boolean functions
Ruchi Gode, Sugata Gangopadhyay
2009/501 ( PDF )
Fast Implementations of AES on Various Platforms
Joppe W. Bos, Dag Arne Osvik, and Deian Stefan
2009/500 ( PS PS.GZ PDF )
Key Recovery Attack on QuiSci
Nils Reimers
2009/499 ( PS PS.GZ PDF )
Underlying Assumptions and Designated Verifier Signatures
Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
2009/498 ( PDF )
NTRU based group oriented signature
Chunbo Ma and Jun Ao
2009/497 ( PDF )
Cube Attack on Courtois Toy Cipher
Piotr Mroczkowski and Janusz Szmidt
2009/496 ( PS PS.GZ PDF )
Anonymous Fuzzy Identity-based Encryption for Similarity Search
Ye Zhang and Nikos Mamoulis and David W. Cheung and S.M. Yiu and W.K. Wong
2009/495 ( PDF )
Security Weakness in Two Authenticated Key Exchange Protocols
Qingfeng Cheng and Chuangui Ma
2009/494 ( PDF )
A Framework for Universally Composable Non-Committing Blind Signatures
Masayuki Abe and Miyako Ohkubo
2009/493 ( PDF )
Remarks on Some Quantum Cryptographic Schemes
Zhengjun Cao
2009/492 ( PDF )
Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2009/491 ( PDF )
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity
Emiliano De Cristofaro and Gene Tsudik
2009/490 ( PDF )
Cryptanalysis of Multiple-Server Password-Authenticated Key
Sang-Gon Lee
2009/489 ( PDF )
Impossible Boomerang Attack for Block Cipher Structures
Jiali Choy and Huihui Yap
2009/488 ( PDF )
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Rajesh P Singh and A.Saikia and B.K.Sarma
2009/487 ( PDF )
Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures
Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2009/486 ( PDF )
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
Allison Lewko and Brent Waters
2009/485 ( PDF )
Black-Box Circular-Secure Encryption Beyond Affine Functions
Zvika Brakerski and Shafi Goldwasser and Yael Kalai
2009/484 ( PDF )
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang
2009/483 ( PDF )
On the Security of UOV
Jean-Charles Faugère and Ludovic Perret
2009/482 ( PDF )
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Allison Lewko and Brent Waters
2009/481 ( PDF )
PPS: Privacy Preserving Statistics using RFID Tags
Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva
2009/480 ( PDF )
On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited
Sanjit Chatterjee and Alfred Menezes
2009/479 ( PDF )
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
Yu Sasaki and Lei Wang and Kazumaro Aoki
2009/478 ( PDF )
Pseudo-cryptanalysis of the Original Blue Midnight Wish
S{\o}ren S. Thomsen
2009/477 ( PDF )
Preimages for Step-Reduced SHA-2
Jian Guo and Krystian Matusiewicz
2009/476 ( PDF )
On the Security of PAS (Predicate-based Authentication Service)
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang
2009/475 ( PS PS.GZ PDF )
Double-Exponentiation in Factor-4 Groups and its Applications
Koray Karabina
2009/474 ( PDF )
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Scott Yilek
2009/473 ( PS PS.GZ PDF )
A Simple Power Analysis Attack on the Serpent Key Schedule
Kevin J. Compton and Brian Timm and Joel VanLaven
2009/472 ( PDF )
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
Madeline Gonzalez and Rainer Steinwandt
2009/471 ( PS PS.GZ PDF )
Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$
Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo and Liang Cui
2009/470 ( PDF )
On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2009/469 ( PDF )
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni and Helger Lipmaa and abhi shelat
2009/468 ( PDF )
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters
Julien Bringer and Herve Chabanne and Thomas Icart
2009/467 ( -- withdrawn -- )
The LPN Problem with Auxiliary Input
Yu Yu
2009/466 ( PDF )
The Certicom Challenges ECC2-X
Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel
2009/465 ( PDF )
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems
Rishab Nithyanand and Gene Tsudik and Ersin Uzun
2009/464 ( PDF )
On Key Authentic Degree of Cryptosystem
WANG Yong, WANG Huangdeng
2009/463 ( PDF )
On Linear Cryptanalysis with Many Linear Approximations
Benoit Gérard and Jean-Pierre Tillich
2009/462 ( PS PS.GZ PDF )
Certificateless KEM and Hybrid Signcryption Schemes Revisited
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2009/461 ( PDF )
A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)
Bruce Kapron and Lior Malka and Venkatesh Srinivasan
2009/460 ( PDF )
Asymptotic enumeration of correlation-immune boolean functions
E. Rodney Canfield and Zhicheng Gao and Catherine Greenhill and Brendan D. McKay and Robert W. Robinson
2009/459 ( PS PS.GZ PDF )
Efficient Oblivious Polynomial Evaluation with Simulation-Based Security
Carmit Hazay and Yehuda Lindell
2009/458 ( PDF )
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
Wei Yun and Xiong Guo-hua and Zhang Xing-kai and Bao Wan-su
2009/457 ( PS PS.GZ PDF )
A remark on the computation of cube roots in finite fields
Nozomu Nishihara and Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
2009/456 ( -- withdrawn -- )
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Kimmo Halunen and Juha Kortelainen and Tuomas Kortelainen
2009/455 ( PS PS.GZ PDF )
Identity-Based Hybrid Signcryption
Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
2009/454 ( PDF )
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Jacob C. N. Schuldt and Kanta Matsuura
2009/453 ( PDF )
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Vlastimil Klima and Petr Susil
2009/452 ( PDF )
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Christian Wieschebrink
2009/451 ( PDF )
Efficient Certificateless KEM in the Standard Model
Georg Lippold, Colin Boyd, Juan Gonz\'{a}lez Nieto
2009/450 ( PDF )
On Hierarchical Threshold Secret Sharing
Ali Aydin Selcuk and Kerem Kaskaloglu and Ferruh Ozbudak
2009/449 ( PS PS.GZ PDF )
One for All - All for One: Unifying Standard DPA Attacks
Stefan Mangard and Elisabeth Oswald and Francois-Xavier Standaert
2009/448 ( PDF )
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds
Ning Ding and Dawu Gu and Bart Preneel
2009/447 ( PDF )
ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS
Sunil Pandey and Praveen Kaushik and Dr. S.C. Shrivastava
2009/446 ( PDF )
Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra
Ehsan Malekian and Ali Zakerolhosseini
2009/445 ( PDF )
Computing Hilbert class polynomials with the Chinese Remainder Theorem
Andrew V. Sutherland
2009/444 ( PDF )
Secure and Efficient HB-CM Entity Authentication Protocol
Zhijun Li and Guang Gong and Zhiguang Qin
2009/443 ( PDF )
Rebound Attack on the Full LANE Compression Function
Krystian Matusiewicz and Maria Naya-Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schläffer
2009/442 ( PDF )
Fuzzy Privacy Preserving Peer-to-Peer Reputation Management
Rishab Nithyanand and Karthik Raman
2009/441 ( PDF )
An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP
Jayaprakash Kar and Banshidhar Majhi
2009/440 ( PS PS.GZ PDF )
A Multivariate Signature Scheme with an almost cyclic public key
Albrecht Petzoldt and Johannes Buchmann
2009/439 ( PS PS.GZ PDF )
A Fast Mental Poker Protocol
Tzer-jen Wei and Lih-Chung Wang
2009/438 ( PDF )
Improved Cryptanalysis of Skein
Jean-Philippe Aumasson and Cagdas Calik and Willi Meier and Onur Ozen and Raphael C.-W. Phan and Kerem Varici
2009/437 ( PS PS.GZ PDF )
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
Shengbao Wang
2009/436 ( PS PS.GZ PDF )
On the Connection between Signcryption and One-pass Key Establishment
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
2009/435 ( PS PS.GZ PDF )
Efficient Confirmer Signatures from the ``Signature of a Commitment'' Paradigm
Laila El Aimani
2009/434 ( PDF )
Tight Bounds for Protocols with Hybrid Security
Matthias Fitzi and Dominik Raub
2009/433 ( PDF )
Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra and C. Pandu Rangan
2009/432 ( -- withdrawn -- )
Practical Distributed Key Generation Scheme
Chen Huiyan and Li Zichen and Fang Yong
2009/431 ( PS PS.GZ PDF )
On the Design of Trivium
Yun Tian and Gongliang Chen and Jianhua Li
2009/430 ( PDF )
One-time-password-authenticated key exchange
Kenneth G. Paterson and Douglas Stebila
2009/429 ( PDF )
Precise Time and Space Simulatable Zero-Knowledge
Ning Ding and Dawu Gu
2009/428 ( PDF )
Efficiently from Semi-honest to Malicious OT via OLFE
J\"urg Wullschleger
2009/427 ( PDF )
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology
Stephen R. Tate and Roopa Vishwanathan
2009/426 ( PDF )
Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes
Daniel Pasaila and Vlad Alexa and Sorin Iftene
2009/425 ( PDF )
Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol
Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri
2009/424 ( PDF )
Double Voter Perceptible Blind Signature Based Electronic Voting Protocol
Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri
2009/423 ( PDF )
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Atsushi Fujioka and Koutarou Suzuki and Berkant Ustaoglu
2009/422 ( PDF )
Attacks on {RFID}-Based Electronic Voting Systems
Yossef Oren and Avishai Wool
2009/421 ( PS PS.GZ PDF )
How to Construct Identity-Based Signatures without the Key Escrow Problem
Tsz Hon Yuen and Willy Susilo and Yi Mu
2009/420 ( PDF )
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
Matthieu Rivain and Emmanuel Prouff and Julien Doget
2009/419 ( PDF )
An Efficient Method for Random Delay Generation in Embedded Software
Jean-Sébastien Coron and Ilya Kizhvatov
2009/418 ( PDF )
Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?
Mihir Bellare and Dennis Hofheinz and Eike Kiltz
2009/417 ( PS PS.GZ PDF )
More Di fferential Paths of TIB3
Harry Wiggins and Philip Hawkes and Gregory G. Rose and Cameron McDonald
2009/416 ( PDF )
KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem
Carsten Elsner and Martin Schmidt
2009/415 ( PDF )
Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash
Ethan Heilman
2009/414 ( PDF )
Security Bounds for the Design of Code-based Cryptosystems
Matthieu Finiasz and Nicolas Sendrier
2009/413 ( PDF )
Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
Jiang Wu and Douglas R. Stinson
2009/412 ( PDF )
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words
Nathan Keller and Stephen D. Miller
2009/411 ( PDF )
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
2009/410 ( PDF )
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich
2009/409 ( PS PS.GZ )
A Tree Based Recursive Scheme for Space Efficient Secret Sharing
Abhishek Parakh and Subhash Kak
2009/408 ( PS PS.GZ PDF )
A Secure and Efficient Authenticated Diffie–Hellman Protocol
Augustin P. Sarr and Philippe Elbaz–Vincent, and Jean–Claude Bajard
2009/407 ( PS PS.GZ PDF )
Single Block Attacks and Statistical Tests on CubeHash
Benjamin Bloom and Alan Kaminsky
2009/406 ( PDF )
On-line Non-transferable Signatures Revisited
Jacob C. N. Schuldt and Kanta Matsuura
2009/405 ( PDF )
Generic Attacks on Misty Schemes -5 rounds is not enough-
Valerie Nachef and Jacques Patarin and Joana Treger
2009/404 ( -- withdrawn -- )
Pairing-Friendly Elliptic Curves With Various Discriminants
Woo Sug Kang and Ki Taek Kim
2009/403 ( PS PS.GZ PDF )
On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
Laila El Aimani
2009/402 ( PDF )
AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time
Michael Vielhaber
2009/401 ( PDF )
Longest Common Subsequence as Private Search
Mark Gondree and Payman Mohassel
2009/400 ( PDF )
Identity-Based Chameleon Hash Scheme Without Key Exposure
Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim
2009/399 ( PDF )
Leakage-Resilient Storage
Francesco Davì and Stefan Dziembowski and Daniele Venturi
2009/398 ( PDF )
Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves
Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez
2009/397 ( PS PS.GZ PDF )
Linear Cryptanalysis of Reduced-Round PRESENT
Joo Yeon Cho
2009/396 ( PDF )
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
Ueli Maurer and Stefano Tessaro
2009/395 ( PDF )
First CPIR Protocol with Data-Dependent Computation
Helger Lipmaa
2009/394 ( PDF )
Provably Secure Convertible Undeniable Signatures with Unambiguity
Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata
2009/393 ( PS PS.GZ PDF )
Permutation Polynomials modulo $p^n$}
Rajesh P Singh and Soumen Maity
2009/392 ( PDF )
Computational Soundness for Key Exchange Protocols with Symmetric Encryption
Ralf Kuesters and Max Tuengerthal
2009/391 ( PDF )
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
Rikke Bendlin and Ivan Damgård
2009/390 ( PS PS.GZ PDF )
Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments
Jens Groth
2009/389 ( PDF )
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery
2009/388 ( -- withdrawn -- )
A Simple Secret Sharing Scheme for Hierarchical Threshold Access Structures
Kerem Kaskaloglu and Ferruh Ozbudak
2009/387 ( PDF )
Securing Plastic Money Using an RFID Based Protocol Stack
Rishab Nithyanand
2009/386 ( PDF )
QTRU: A Lattice Attack Resistant Version of NTRU
Ehsan Malekian and Ali Zakerolhosseini and Atefeh Mashatan
2009/385 ( PDF )
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
Brent Waters
2009/384 ( PDF )
Practical Attacks on NESHA-256
Orr Dunkelman and Tor E. Bjørstad
2009/383 ( PDF )
A Registration Scheme to Allocate a Unique Identification Number
Manoj Kumar
2009/382 ( PDF )
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin
2009/381 ( PS PS.GZ PDF )
A short Note on Discrete Log Problem in $\mathbbF_p$
Habeeb Syed
2009/380 ( PDF )
Untraceable Tags based on Mild Assumptions
Carlo Blundo and Angelo De Caro and Giuseppe Persiano
2009/379 ( PDF )
Protecting Circuits from Computationally Bounded and Noisy Leakage
Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan
2009/378 ( PDF )
Detectable correlations in Edon-R
Peter Novotney and Niels Ferguson
2009/377 ( PDF )
Chosen-Ciphertext Secure RSA-type Cryptosystems
Benoit Chevallier-Mames and Marc Joye
2009/376 ( PDF )
Cryptanalysis of the Tillich-Z\'emor hash function
Markus Grassl and Ivana Ilic and Spyros Magliveras and Rainer Steinwandt
2009/375 ( PDF )
Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes
Masao KASAHARA
2009/374 ( PDF )
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds
Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir
2009/373 ( PDF )
Utility Dependence in Correct and Fair Rational Secret Sharing
Gilad Asharov and Yehuda Lindell
2009/372 ( PS PS.GZ )
More on Key Wrapping
Rosario Gennaro and Shai Halevi
2009/371 ( PDF )
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
Rakesh Bobba and Himanshu Khurana and Manoj Prabhakaran
2009/370 ( PS PS.GZ PDF )
A study of pairing computation for elliptic curves with embedding degree 15
Nadia El Mrabet and Nicolas Guillermin and Sorina Ionica
2009/369 ( PDF )
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
Boris Skoric
2009/368 ( PDF )
A Simulation-Based Treatment of Authenticated Message Exchange
Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke
2009/367 ( PDF )
Non-delegatable Identity-based Designated Verifier Signature
Qiong Huang and Willy Susilo and Duncan S. Wong
2009/366 ( PS PS.GZ PDF )
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
Yehuda Lindell and Hila Zarosim
2009/365 ( PDF )
Space Efficient Secret Sharing: A Recursive Approach
Abhishek Parakh and Subhash Kak
2009/364 ( PDF )
Position Based Cryptography
Nishanth Chandran and Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky
2009/363 ( PDF )
Some Lattices Attacks on DSA and ECDSA
Dimitrios Poulakis
2009/362 ( PDF )
Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures
Laila El Aimani
2009/361 ( PS PS.GZ PDF )
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Manoj Kumar
2009/360 ( PS PS.GZ PDF )
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure
Ruilin Li and Bing Sun and Chao Li and Longjiang Qu
2009/359 ( PDF )
Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography)
Chris Peikert
2009/358 ( PS PS.GZ PDF )
MAC Precomputation with Applications to Secure Memory
Juan A. Garay and Vladimir Kolesnikov and Rae McLellan
2009/357 ( PDF )
Impossible Differential Cryptanalysis of FOX
Zhongming Wu and Xuejia Lai and Bo Zhu and Yiyuan Luo
2009/356 ( PDF )
A Domain Extender for the Ideal Cipher
Jean-Sebastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin
2009/355 ( PS PS.GZ PDF )
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate and Ian Goldberg
2009/354 ( PDF )
Cache Timing Attacks on Camellia Block Cipher
ZHAO Xin-jie and WANG Tao and ZHENG Yuan-yuan
2009/353 ( PDF )
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)
Berkant Ustaoglu
2009/352 ( PDF )
On the Duality of Probing and Fault Attacks
Berndt M. Gammel and Stefan Mangard
2009/351 ( PS PS.GZ PDF )
How to Delegate a Lattice Basis
David Cash and Dennis Hofheinz and Eike Kiltz
2009/350 ( PDF )
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan
2009/349 ( PDF )
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Gr{\o}stl, and Skein
Stefan Tillich and Martin Feldhofer and Wolfgang Issovits and Thomas Kern and Hermann Kureck and Michael M{\"u}hlberghuber and Georg Neubauer and Andreas Reiter and Armin K{\"o}fler and Mathias Mayrhofer
2009/348 ( PDF )
A provably secure really source hiding designated verifier signature scheme based on random oracle model
Huang-Ta Huang1, *Jue-Sam Chou2
2009/347 ( PDF )
An Efficient Concurrent Repetition Theorem
Douglas Wikstr{\"o}m
2009/346 ( PDF )
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang
2009/345 ( PDF )
Anonymous ID Based Signcryption Scheme for Multiple Receivers
Sunder Lal and Prashant Kushwah
2009/344 ( PS PS.GZ PDF )
Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009
Xi Zhang and Min-Rong Chen and Xia Li
2009/343 ( PDF )
Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications
Kenneth Koon-Ho Wong and Gregory V. Bard and Robert H. Lewis
2009/342 ( PDF )
FPGA Implementations of SHA-3 Candidates:CubeHash, Gr{\o}stl, L{\sc ane}, Shabal and Spectral Hash
Brian Baldwin and Andrew Byrne and Mark Hamilton and Neil Hanley and Robert P. McEvoy and Weibo Pan and William P. Marnane
2009/341 ( PDF )
Leakage Resilient Cryptography in Practice
Francois-Xavier Standaert and Olivier Pereira and Yu Yu and Jean-Jacques Quisquater and Moti Yung and Elisabeth Oswald
2009/340 ( PDF )
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Eric Brier and Jean-Sebastien Coron and Thomas Icart and David Madore and Hugues Randriam and Mehdi Tibouchi
2009/339 ( PDF )
A Novel ID-based Electronic Cash System from Pairings
Jue-Sam Chou*1, Yalin Chen2 , Ming-Hsun Cho3 , Hung-Min Sun4
2009/338 ( PDF )
Security weaknesses in two multi-server password based authentication protocols
*Jue-Sam Chou1, Chun-Hui Huang2, Cheng-Chung Ding3
2009/337 ( PDF )
A New Lattice-Based Cryptosystem Mixed with a Knapsack
Yanbin Pan and Yingpu Deng and Yupeng Jiang and Ziran Tu
2009/336 ( PDF )
Partial Signatures and their Applications
Mihir Bellare and Shanshan Duan
2009/335 ( PDF )
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
Ewan Fleischmann and Michael Gorski and Stefan Lucks
2009/334 ( PDF )
Attacking Reduced Rounds of the ARIA Block Cipher
Ewan Fleischmann and Michael Gorski and Stefan Lucks
2009/333 ( PDF )
Hard Fault Analysis of Trivium
Yupu Hu and Fengrong Zhang and Yiwei Zhang
2009/332 ( PDF )
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
Ton van Deursen and Sasa Radomirovic
2009/331 ( PDF )
Security Notions and Generic Constructions for Client Puzzles
L. Chen and P. Morrissey and N.P. Smart and B. Warinschi
2009/330 ( -- withdrawn -- )
NTRU, quaternion algebra, public key cryptography
Ehsan Malekian and Ali Zakerolhosseini and Atefeh
2009/329 ( -- withdrawn -- )
Efficient Approximation of Higher Order Boolean function in a Low Order Function
Mehreen Afzal and Ashraf Masood
2009/328 ( PDF )
Flowchart description of security primitives for Controlled Physical Unclonable Functions
Boris Skoric and Marc X. Makkes
2009/327 ( PDF )
Simple Adaptive Oblivious Transfer Without Random Oracle
Kaoru Kurosawa and Ryo Nojima
2009/326 ( PDF )
The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property
Gregory V. Bard
2009/325 ( PDF )
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
Mridul Nandi
2009/324 ( PDF )
Group-Oriented Fair Exchange of Signatures
Qiong Huang and Duncan S. Wong and Willy Susilo
2009/323 ( PDF )
Factoring Unbalanced Moduli with Known Bits
Eric Brier and David Naccache and Mehdi Tibouchi
2009/322 ( PDF )
Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS
Reynald Affeldt, David Nowak and Kiyoshi Yamada
2009/321 ( PDF )
Tweakable Enciphering Schemes From Stream Ciphers With IV
Palash Sarkar
2009/320 ( PS PS.GZ PDF )
Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures
Georg Fuchsbauer
2009/319 ( PDF )
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring
Xiaofeng Chen and Haibo Tian and Fangguo Zhang
2009/318 ( PS PS.GZ PDF )
The Fermat factorization method revisited
Robert ERRA and Christophe GRENIER
2009/317 ( PDF )
Related-key Cryptanalysis of the Full AES-192 and AES-256
Alex Biryukov and Dmitry Khovratovich
2009/316 ( PDF )
An Efficient Password Security of Key Exchange Protocol based on ECDLP
Jayaprakash Kar and Banshidhar Majhi
2009/315 ( PDF )
Breaking RSA-based PIN Encryption with thirty ciphertext validity queries
N.P. Smart
2009/314 ( PDF )
Secure Two-Party Computation is Practical
B. Pinkas and T. Schneider and N.P. Smart and S. Williams
2009/313 ( PDF )
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Nigel P. Smart and Bogdan Warinschi
2009/312 ( PS PS.GZ PDF )
Jacobi Quartic Curves Revisited
Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
2009/311 ( PDF )
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C
2009/310 ( PDF )
RFID distance bounding protocol with mixed challenges to prevent relay attacks
Chong Hee Kim and Gildas Avoine
2009/309 ( PDF )
Fault Attacks on RSA Signatures with Partially Unknown Messages
Jean-Sebastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier
2009/308 ( PDF )
A note on the Certificateless Multi-receiver Signcryption Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan
2009/307 ( PDF )
Anonymous Signatures Revisited
Vishal Saraswat and Aaram Yun
2009/306 ( PDF )
Authentic Time-Stamps for Archival Storage
Alina Oprea and Kevin D. Bowers
2009/305 ( PDF )
Improved generic algorithms for 3-collisions
Antoine Joux and Stefan Lucks
2009/304 ( PS PS.GZ PDF )
Factor-4 and 6 Compression of Cyclotomic Subgroups
Koray Karabina
2009/303 ( PDF )
Key extraction from general non-discrete signals
E. Verbitskiy and P. Tuyls and C. Obi and B. Schoenmakers and B. Skoric
2009/302 ( PDF )
Cryptanalysis of ESSENCE
Maria Naya-Plasencia and Andrea Röck and Jean-Philippe Aumasson and Yann Laigle-Chapuy and Gaëtan Leurent and Willi Meier and Thomas Peyrin
2009/301 ( PDF )
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
Yuyin Yu and Mingsheng Wang
2009/300 ( PS PS.GZ PDF )
Universally Composable Contributory Group Key Exchange
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\`alez Nieto
2009/299 ( PS PS.GZ PDF )
On the security of oscillator-based random number generators
Mathieu Baudet and David Lubicz and Julien Micolod and Andr\'e Tassiaux
2009/298 ( PS PS.GZ PDF )
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2009/297 ( -- withdrawn -- )
A New Improved Distinguisher for HC-128
Subhabrata Sen and Rudradev Sengupta and Subhamoy Maitra and Goutam Paul and Shashwat Raizada
2009/296 ( PS PS.GZ PDF )
Perfectly Balanced Functions in Symbolic Dynamics
O.A. Logachev and A.A. Salnikov and S.V. Smyshlyaev and V.V. Yashchenko
2009/295 ( PDF )
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
Shucheng Yu and Kui Ren and Wenjing Lou and Jin Li
2009/294 ( PDF )
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
Roman Schlegel and Duncan S. Wong
2009/293 ( PS PS.GZ PDF )
Enhancing Attribute-based Encryption with Attribute Hierarchy
Jin Li and Qian Wang and Cong Wang and Kui Ren
2009/292 ( PDF )
Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB
Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen and Christiane Peters and Peter Schwabe
2009/291 ( PS PS.GZ PDF )
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto
2009/290 ( PDF )
Security Analysis of Aggregate signature and Batch verification signature schemes
S.Sharmila Deva Selvi and S.Sree Vivek and J.Shriram and S.Kalaivani and C.Pandu Rangan
2009/289 ( PDF )
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
Erik Zenner
2009/288 ( PDF )
Efficient Key Exchange with Tight Security Reduction
Jiang Wu and Berkant Ustaoglu
2009/287 ( PDF )
Generic Attacks on Alternating Unbalanced Feistel Schemes
Valerie Nachef
2009/286 ( PDF )
On Privacy Losses in the Trusted Agent Model (Abstract)
Paulo Mateus and Serge Vaudenay
2009/285 ( PDF )
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa
2009/284 ( PS PS.GZ PDF )
Privacy-aware Attribute-based Encryption with User Accountability
Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan
2009/283 ( PDF )
Short and Stateless Signatures from the RSA Assumption
Susan Hohenberger and Brent Waters
2009/282 ( PDF )
Leakage-Resilient Signatures
Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy Rothblum
2009/281 ( PDF )
Enabling Public Verifiability and Data Dynamics for Storage Security
Qian Wang and Cong Wang and Jin Li and Kui Ren and Wenjing Lou
2009/280 ( PDF )
Universally Anonymous IBE based on the Quadratic Residuosity Assumption
Giuseppe Ateniese and Paolo Gasti
2009/279 ( PDF )
Algebraic Side-Channel Attacks
Mathieu Renauld and Francois-Xavier Standaert
2009/278 ( PDF )
Towards Electrical, Integrated Implementations of SIMPL Systems
Ulrich Rührmair Qingqing Chen Paolo Lugli Ulf Schlichtmann Martin Stutzmann György Csaba
2009/277 ( PDF )
On the Foundations of Physical Unclonable Functions
Ulrich Rührmair and Jan Sölter and Frank Sehnke
2009/276 ( PDF )
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
Jean-Luc Beuchat and Emmanuel López-Trejo and Luis Martínez-Ramos and Shigeo Mitsunari and Francisco Rodríguez-Henríquez
2009/275 ( PDF )
Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit)
Thomas Dullien
2009/274 ( PDF )
A Collision-resistance Hash Function DIHA2
Xigen.Yao
2009/273 ( PDF )
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael Dowsley and Jörn Müller-Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento
2009/272 ( PDF )
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
Ziran Tu and Yingpu Deng
2009/271 ( PS PS.GZ PDF )
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems
Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento
2009/270 ( PDF )
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model
Rafael Tonicelli and Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Jörn Müller-Quade and Akira Otsuka and Anderson C. A. Nascimento
2009/269 ( PDF )
Side-channel attacks based on linear approximations
Thomas Roche and Cédric Tavernier
2009/268 ( -- withdrawn -- )
Dealer-Free Dynamic Secret Sharing Schemes with Unconditional Security
Mehrdad Nojoumian and Douglas R. Stinson
2009/267 ( PDF )
Simulation based security in the applied pi calculus
Stéphanie Delaune and Steve Kremer and Olivier Pereira
2009/266 ( PDF )
Pseudorandomness Analysis of the Lai-Massey Scheme
Yiyuan Luo and Xuejia Lai and Zheng Gong and Zhongming Wu
2009/265 ( PS PS.GZ PDF )
Revisiting the Indifferentiability of PGV Hash Functions
Yiyuan Luo and Zheng Gong and Ming Duan and Bo Zhu and Xuejia Lai
2009/264 ( PDF )
Proposal of PPS Multivariate Public Key Cryptosystems
Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryo Fujita and Masao Kasahara
2009/263 ( PS PS.GZ PDF )
General Error Decodable Secret Sharing Scheme and Its Application
Kaoru Kurosawa
2009/262 ( PDF )
Computationally Secure Two-Round Authenticated Message Exchange
Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke
2009/261 ( PDF )
Security of Cyclic Double Block Length Hash Functions including Abreast-DM
Ewan Fleischmann and Michael Gorski and Stefan Lucks
2009/260 ( PDF )
A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs
Kota Ideguchi and Toru Owada and Hirotaka Yoshida
2009/259 ( -- withdrawn -- )
Differential Path for SHA-1 with complexity $O(2^{52})$
Cameron McDonald and Philip Hawkes and Josef Pieprzyk
2009/258 ( PS PS.GZ PDF )
FACTORIZATION WITH GENUS 2 CURVES
Romain COSSET
2009/257 ( PDF )
FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION
Ulf T. Mattsson
2009/256 ( PDF )
Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher
Zhiqiang Liu and Dawu Gu and Jing Zhang
2009/255 ( PDF )
SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions
Ulrich Rührmair
2009/254 ( PDF )
Improvement of One Quantum Encryption Scheme
Zhengjun Cao
2009/253 ( PDF )
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
2009/252 ( PDF )
Sparse Boolean equations and circuit lattices
Igor Semaev
2009/251 ( PDF )
Format-Preserving Encryption
Mihir Bellare and Thomas Ristenpart and Phillip Rogaway and Till Stegers
2009/250 ( -- withdrawn -- )
Modifications in the Design of Trivium to Increase its Security Level
Mehreen Afzal and Ashraf Masood
2009/249 ( PS PS.GZ PDF )
Pseudo-randomness and partial information in symbolic security analysis
Daniele Micciancio
2009/248 ( PDF )
Cryptanalysis of the MST_3 Public Key Cryptosystem
Simon R. Blackburn, Carlos Cid and Ciaran Mullan
2009/247 ( PS PS.GZ PDF )
On the Necessary and Sufficient Assumptions for UC Computation
Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi
2009/246 ( PDF )
On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions
Gy\"{o}rgy Csaba \and Xueming Ju \and Qingqing Chen \and Wolfgang Porod \and J{\"u}rgen Schmidhuber \and Ulf Schlichtmann \and Paolo Lugli \and Ulrich R{\"u}hrmair
2009/245 ( PDF )
Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring
Naoki Ogura and Shigenori Uchiyama
2009/244 ( PDF )
Tardos Fingerprinting Codes in the Combined Digit Model
Boris Skoric and Stefan Katzenbeisser and Hans Georg Schaathun and Mehmet U. Celik
2009/243 ( PS PS.GZ PDF )
Faster Pairings on Special Weierstrass Curves
Craig Costello and Huseyin Hisil and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong
2009/242 ( PDF )
Examples of differential multicollisions for 13 and 14 rounds of AES-256
Alex Biryukov and Dmitry Khovratovich and Ivica Nikoli\'{c}
2009/241 ( PDF )
Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)
Alex Biryukov and Dmitry Khovratovich and Ivica Nikoli\'{c}
2009/240 ( PDF )
Group Testing and Batch Verification
Gregory M. Zaverucha and Douglas R. Stinson
2009/239 ( PDF )
Protecting the NOEKEON Cipher Against SCARE Attacks in FPGAs by using Dynamic Implementations
Julien Bringer and Herve Chabanne and Jean-Luc Danger
2009/238 ( PDF )
Attacks on Round-Reduced BLAKE
LI Ji and XU Liangyu
2009/237 ( PDF )
Remarks on One Arbitrated Quantum-signature Scheme
Zhengjun Cao
2009/236 ( PDF )
Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics
Fumiyuki Momose and Jinhui Chao
2009/235 ( PS PS.GZ PDF )
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2009/234 ( PDF )
On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function
Rune Steinsmo \Oe deg\aa rd and Danilo Gligoroski
2009/233 ( PDF )
A strategy for recovering roots of bivariate polynomials modulo a prime
Paula Bustillo and Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
2009/232 ( PDF )
MeshHash2
Björn Fay
2009/231 ( PDF )
Practical DPA Attacks on MDPL
Elke De Mulder \and Benedikt Gierlichs \and Bart Preneel \and Ingrid Verbauwhede
2009/230 ( PS PS.GZ PDF )
Adaptively Secure Broadcast
Martin Hirt and Vassilis Zikas
2009/229 ( PDF )
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
Giacomo de Meulenaer and Christophe Petit and Jean-Jacques Quisquater
2009/228 ( PDF )
Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede
2009/227 ( PS PS.GZ PDF )
Computational soundness, co-induction, and encryption cycles
Daniele Micciancio
2009/226 ( PDF )
How to Hash into Elliptic Curves
Thomas Icart
2009/225 ( PDF )
The Security of Abreast-DM in the Ideal Cipher Model
Jooyoung Lee and Daesung Kwon
2009/224 ( PDF )
Pseudo-Cryptanalysis of Luffa
Keting Jia and Yvo Desmedt and Lidong Han and Xiaoyun Wang
2009/223 ( PDF )
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
2009/222 ( PDF )
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Willi Geiselmann and Kenneth Matheis and Rainer Steinwandt
2009/221 ( PDF )
Boneh-Boyen signatures and the Strong Diffie-Hellman problem
David Jao and Kayo Yoshida
2009/220 ( PDF )
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
2009/219 ( PDF )
Strongly Secure Certificateless Key Agreement
Georg Lippold and Colin Boyd and Juan Gonz\'{a}lez Nieto
2009/218 ( PDF )
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128
Jean-Philippe Aumasson and Itai Dinur and Luca Henzen and Willi Meier and Adi Shamir
2009/217 ( PDF )
Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
Palash Sarkar
2009/216 ( PDF )
Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher
Palash Sarkar
2009/215 ( PDF )
A Simple and Generic Construction of Authenticated Encryption With Associated Data
Palash Sarkar
2009/214 ( PS PS.GZ PDF )
An Optimally Fair Coin Toss
Tal Moran and Moni Naor and Gil Segev
2009/213 ( PDF )
Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion
Richard Moloney and Gary McGuire and Michael Markowitz
2009/212 ( PDF )
A Flyweight RFID Authentication Protocol
Mike Burmester and Jorge Munilla
2009/211 ( PDF )
Bringing Zero-Knowledge Proofs of Knowledge to Practice
Endre Bangerter and Stefania Barzan and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider and Joe-Kai Tsay
2009/210 ( PDF )
Sufficient conditions for sound tree and sequential hashing modes
Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche
2009/209 ( PS PS.GZ PDF )
On Directed Transitive Signature
Jia Xu
2009/208 ( PS PS.GZ PDF )
PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS
Rajesh P Singh and B.K.Sarma and A.Saikia
2009/207 ( -- withdrawn -- )
Unconditionally Secure Social Secret Sharing Scheme
Mehrdad Nojoumian and Douglas R. Stinson and Morgan Grainger
2009/206 ( PS PS.GZ PDF )
On Optimized FPGA Implementations of the SHA-3 Candidate Groestl
Bernhard Jungk, Steffen Reith, Juergen Apfelbeck
2009/205 ( PS PS.GZ PDF )
Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions
Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo
2009/204 ( PDF )
GUC-Secure Join Operator in Distributed Relational Database
TIAN Yuan
2009/203 ( PDF )
Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures
Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi and Ralf-Philipp Weinmann
2009/202 ( PDF )
A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES
Alawi A. Al-Saggaf and Acharya H. S.
2009/201 ( PDF )
Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
Mohamed Abo El-Fotouh and Klaus Diepold
2009/200 ( PDF )
A Survey on the Evolution of Cryptographic Protocols in ePassports
Rishab Nithyanand
2009/199 ( PDF )
Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers
Emmanuel Bresson and Anne Canteaut and Benoit Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-Francois Misarsky and Maria Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-Rene Reinhard and Celine Thuillet and Marion Videau
2009/198 ( -- withdrawn -- )
DAA: Fixing the pairing based protocols
L Chen and P. Morrissey and N.P. Smart
2009/197 ( PDF )
Practical pseudo-collisions for hash functions ARIRANG-224/384
Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang
2009/196 ( PDF )
Analysis of one quantum bit string commitment
Zhengjun Cao
2009/195 ( PDF )
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Mauro Barni and Pierluigi Failla and Vladimir Kolesnikov and Riccardo Lazzeretti and Ahmad-Reza Sadeghi and Thomas Schneider
2009/194 ( PDF )
Analysis and Enhance of Anonymous Signcryption Scheme
Mingwu Zhang and Yusheng Zhong and Pengcheng Li and Bo Yang
2009/193 ( PDF )
Generalization of Barreto et al ID based Signcryption Scheme
Sunder Lal and Prashant Kushwah
2009/192 ( PS PS.GZ PDF )
Linkability of Blind Signature Schemes over Braid Groups
Manoj Kumar
2009/191 ( PDF )
New logic minimization techniques with applications to cryptology.
Joan Boyar and Rene Peralta
2009/190 ( PS PS.GZ PDF )
The discrete logarithm problem in the group of non-singular circulant matrices
Ayan Mahalanobis
2009/189 ( PS PS.GZ PDF )
Efficient Unidirectional Proxy Re-Encryption
Sherman S.M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng
2009/188 ( PS PS.GZ PDF )
Breaking and Building of Group Inside Signature
S. Sree Vivek and S. Sharmila Deva Selvi and S.Gopinath and C. Pandu Rangan
2009/187 ( PS PS.GZ PDF )
Compact McEliece Keys from Goppa Codes
Rafael Misoczki and Paulo S. L. M. Barreto
2009/186 ( PDF )
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
Nicolas T. Courtois and Gregory V. Bard and Shaun V. Ault
2009/185 ( PDF )
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane
2009/184 ( PDF )
Cryptanalysis of Dynamic SHA(2)
Jean-Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel
2009/183 ( PDF )
Proactive Linear Integer Secret Sharing
Rune Thorbek
2009/182 ( PDF )
Extended Substitution Cipher Chaining mode (ESCC)
Mohamed Abo El-Fotouh, Klaus Diepold
2009/181 ( PDF )
PSP: Private and Secure Payment with RFID
Erik-Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe
2009/180 ( PDF )
Collaborative, Privacy-Preserving Data Aggregation at Scale
Haakon Ringberg and Benny Applebaum and Michael J. Freedman and Matthew Caesar and Jennifer Rexford
2009/179 ( PS PS.GZ PDF )
Near-Collision Attack on the Compression Function of Dynamic SHA2
Hongbo Yu and Xiaoyun Wang
2009/178 ( PDF )
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version)
Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap
2009/177 ( PDF )
Salvaging Merkle-Damgard for Practical Applications
Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton
2009/176 ( PDF )
A novel multi-server authentication protocol
Yalin Chen, Chun-Hui Huang, *Jue-Sam Chou
2009/175 ( PDF )
Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)
Stefan Lucks and Erik Zenner and Andre Weimerskirch and Dirk Westhoff
2009/174 ( PDF )
Making the Diffie-Hellman Protocol Identity-Based
Dario Fiore and Rosario Gennaro
2009/173 ( PDF )
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
Patrick Longa and Catherine Gebotys
2009/172 ( PS PS.GZ )
A new Protocol for 1-2 Oblivious Transfer
Bjoern Grohmann
2009/171 ( PDF )
On the Theory and Practice of Personal Digital Signatures
Ivan Damgård and Gert Læssøe Mikkelsen
2009/170 ( PDF )
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
2009/169 ( PDF )
Floating Fault analysis of Trivium under Weaker Assumptions
Hu Yupu and Gao Juntao and Liu Qing
2009/168 ( PDF )
A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)
Michael A. Halcrow and Niels Ferguson
2009/167 ( PDF )
A new approach for FCSRs
François Arnault and Thierry Berger and Cédric Lauradoux and Marine Minier and Benjamin Pousse
2009/166 ( PDF )
I shall love you up to the death
Valerie Nachef and Jacques Patarin
2009/165 ( PDF )
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Matthieu Rivain
2009/164 ( PDF )
CCA-Secure Proxy Re-Encryption without Pairings
Jun Shao and Zhenfu Cao
2009/163 ( PS PS.GZ )
A New Key-Agreement-Protocol
Bjoern Grohmann
2009/162 ( PS PS.GZ PDF )
Certificateless Hybrid Signcryption
Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
2009/161 ( PS PS.GZ PDF )
Built-in Determined Sub-key Correlation Power Analysis
Yuichi Komano and Hideo Shimizu and Shinichi Kawamura
2009/160 ( PS PS.GZ PDF )
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Joel Alwen and Yevgeniy Dodis and Daniel Wichs
2009/159 ( PDF )
Hardware Implementation of the SHA-3 Candidate Skein
Stefan Tillich
2009/158 ( PS PS.GZ PDF )
Security Analysis of a Proxy Signature Scheme over Braid Groups
Manoj Kumar
2009/157 ( PDF )
Efficient Halving for Genus 3 Curves over Binary Fields
Peter Birkner and Nicolas Thériault
2009/156 ( PDF )
A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution
Anupam Pattanayak and B. Majhi
2009/155 ( PDF )
Faster Computation of the Tate Pairing
Christophe Arene and Tanja Lange and Michael Naehrig and Christophe Ritzenthaler
2009/154 ( PDF )
Algorithms to solve massively under-defined systems of multivariate quadratic equations
Yasufumi Hashimoto
2009/153 ( PDF )
A new bound for t−wise almost universal hash functions
Long Hoang Nguyen and A. W. Roscoe
2009/152 ( -- withdrawn -- )
FaceTrust: Assessing the Credibility of Online Personas via Social Networks
Michael Sirivianos
2009/151 ( PDF )
Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm
Shaohua Zhang
2009/150 ( PDF )
Efficient group authentication protocols based on human interaction
Long Hoang Nguyen and A. W. Roscoe
2009/149 ( PDF )
Secure EPC Gen2 compliant Radio Frequency Identification
Mike Burmester and Breno de Medeiros and Jorge Munilla and Alberto Peinado
2009/148 ( PDF )
Secret Handshake: Strong Anonymity Definition and Construction
Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta
2009/147 ( PDF )
Preimage Attack on ARIRANG
Deukjo Hong and Woo-Hwan Kim and Bonwook Koo
2009/146 ( PS PS.GZ PDF )
Transferable Constant-Size Fair E-Cash
Georg Fuchsbauer and David Pointcheval and Damien Vergnaud
2009/145 ( PDF )
Security of Single-permutation-based Compression Functions
Jooyoung Lee and Daesung Kwon
2009/144 ( PS PS.GZ PDF )
On the security of Identity Based Ring Signcryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan
2009/143 ( PDF )
Multiple and Unlinkable Public Key Encryption without Certificates
Soyoung Park and Sang-Ho Lee and Joohan Lee
2009/142 ( PDF )
Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems
Ronald Cramer and Dennis Hofheinz and Eike Kiltz
2009/141 ( PDF )
Ideal Hierarchical Secret Sharing Schemes
Oriol Farras and Carles Padro
2009/140 ( PDF )
The Analysis of Galois Substitution Counter Mode (GSCM)
Mohamed Abo El-Fotouh and Klaus Diepold
2009/139 ( PDF )
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Chunbo Ma and Jun Ao
2009/138 ( PS PS.GZ PDF )
A Hybrid RFID Protocol against Tracking Attacks
Jen-Chun Chang and Hsin-Lung Wu
2009/137 ( PDF )
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime
Nicolas T. Courtois
2009/136 ( PDF )
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Yvonne Cliff and Colin Boyd and Juan Gonzalez Nieto
2009/135 ( PDF )
Practical Key Recovery Attack against Secret-prefix Edon-R
Gaëtan Leurent
2009/134 ( PDF )
A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity
Yindong Chen and Peizhong Lu
2009/133 ( -- withdrawn -- )
Signature Schemes with Bounded Leakage Resilience
Jonathan Katz
2009/132 ( -- withdrawn -- )
A New Lattice for Implicit Factoring
Yanbin Pan and Yingpu Deng
2009/131 ( PDF )
Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited
Anupam Pattanayak and B. Majhi
2009/130 ( PDF )
Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity
Yindong Chen and Peizhong Lu
2009/129 ( PDF )
Faster and Timing-Attack Resistant AES-GCM
Emilia Kasper and Peter Schwabe
2009/128 ( PS PS.GZ PDF )
Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator
Lu Xiao and Gregory G. Rose
2009/127 ( PDF )
Side Channel Cube Attacks on Block Ciphers
Itai Dinur and Adi Shamir
2009/126 ( PDF )
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak F Shahandashti and Reihaneh Safavi-Naini
2009/125 ( PDF )
A Full Key Recovery Attack on HMAC-AURORA-512
Yu Sasaki
2009/124 ( PDF )
Practical Secure Evaluation of Semi-Private Functions
Annika Paus and Ahmad-Reza Sadeghi and Thomas Schneider
2009/123 ( PDF )
On the Complexity of Integer Factorization
N. A. Carella, CUNY, N.Y.
2009/122 ( PDF )
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez
2009/121 ( -- withdrawn -- )
Optimized Public Key Infrastructure -- A PKI to Support Efficient Document's Signatures
Mart\'{i}n Augusto Gagliotti Vigil and Ricardo Felipe Cust\'{o}dio and Nelson da Silva and Ricardo Moraes
2009/120 ( PDF )
On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R
Danilo Gligoroski and Rune Steinsmo \O deg\aa rd
2009/119 ( PDF )
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Marcel Medwed
2009/118 ( PDF )
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control
Jin Li and Kui Ren and Kwangjo Kim
2009/117 ( PDF )
Changing probabilities of differentials and linear sums via isomorphisms of ciphers
Alexander Rostovtsev
2009/116 ( PDF )
Information Theoretically Secure Multi Party Set Intersection Re-Visited
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2009/115 ( PS PS.GZ PDF )
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
S.Sree Vivek and S.Sharmila Deva Selvi, Deepanshu Shukla and C.Pandu Rangan
2009/114 ( PDF )
Weakness of Key Predistribution Scheme Proposed by J. Dong et al.
Anupam Pattanayak and B. Majhi
2009/113 ( PDF )
Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
Niels Ferguson and Stefan Lucks
2009/112 ( PDF )
A 2nd-Preimage Attack on AURORA-512
Yu Sasaki
2009/111 ( PDF )
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Marc Stevens and Alexander Sotirov and Jacob Appelbaum and Arjen Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger
2009/110 ( PDF )
On the Security of Stream Cipher CryptMT v3
Haina Zhang and Xiaoyun Wang
2009/109 ( PDF )
Cryptanalysis of Stream Cipher Grain Family
Haina Zhang and Xiaoyun Wang
2009/108 ( PDF )
Further Results on Implicit Factoring in Polynomial Time
Santanu Sarkar and Subhamoy Maitra
2009/107 ( PDF )
Compact E-Cash and Simulatable VRFs Revisited
Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
2009/106 ( PDF )
A Collision Attack on AURORA-512
Yu Sasaki
2009/105 ( PDF )
Public-Key Cryptosystems Resilient to Key Leakage
Moni Naor and Gil Segev
2009/104 ( PS PS.GZ PDF )
1024 - A High Security Software Oriented Block Cipher
Dieter Schmidt
2009/103 ( PDF )
Constructing pairing-friendly hyperelliptic curves using Weil restriction
David Mandell Freeman and Takakazu Satoh
2009/102 ( PDF )
A Step Towards QC Blind Signatures
Raphael Overbeck
2009/101 ( PDF )
Encryption Schemes Secure under Selective Opening Attack
Mihir Bellare and Scott Yilek
2009/100 ( PDF )
Computing the endomorphism ring of an ordinary elliptic curve over a finite field
Gaetan Bisson and Andrew V. Sutherland
2009/099 ( PS PS.GZ PDF )
A Single Initialization Server for Multi-Party Cryptography
Hugue Blier and Alain Tapp
2009/098 ( PDF )
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
Martin Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz
2009/097 ( PS PS.GZ PDF )
Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
Brian J. Matt
2009/096 ( PDF )
A note on the security of MST3
M.I. Gonzalez Vasco and A. L. Perez del Pozo and P. Taborda Duarte
2009/095 ( PDF )
Enhanced Privacy ID from Bilinear Pairing
Ernie Brickell and Jiangtao Li
2009/094 ( PDF )
On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang
2009/093 ( PS PS.GZ PDF )
Cascade Encryption Revisited
Peter Gazi and Ueli Maurer
2009/092 ( PDF )
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
Jung Hee Cheon and Jeongdae Hong and Gene Tsudik
2009/091 ( PDF )
Knapsack Cryptosystem on Elliptic Curves
Koichiro Noro and Kunikatsu Kobayashi
2009/090 ( PS PS.GZ PDF )
A Brief History of Provably-Secure Public-Key Encryption
Alexander W. Dent
2009/089 ( PDF )
A Provably Secure And Efficient Countermeasure Against Timing Attacks
Boris Köpf and Markus Dürmuth
2009/088 ( PDF )
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
Brett Hemenway and Benoit Libert and Rafail Ostrovsky and Damien Vergnaud
2009/087 ( -- withdrawn -- )
Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009/086 ( PDF )
Point Compression for Koblitz Elliptic Curves
P. N. J. Eagle and Steven D. Galbraith and John Ong
2009/085 ( PDF )
UC-Secure Source Routing Protocol
Tao Feng and Xian Guo and Jianfeng Ma and Xinghua Li
2009/084 ( PDF )
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
Mihir Bellare and Thomas Ristenpart
2009/083 ( PS PS.GZ PDF )
Multi-authority attribute based encryption with honest-but-curious central authority
Vladimir Bozovic and Daniel Socek and Rainer Steinwandt and Viktoria I. Villanyi
2009/082 ( PDF )
The Case for Quantum Key Distribution
Douglas Stebila and Michele Mosca and Norbert L\"utkenhaus
2009/081 ( PDF )
Ensuring Data Storage Security in Cloud Computing
Cong Wang and Qian Wang and Kui Ren and Wenjing Lou
2009/080 ( PDF )
CoSP: A General Framework For Computational Soundness Proofs
Michael Backes and Dennis Hofheinz and Dominique Unruh
2009/079 ( PDF )
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
2009/078 ( PDF )
Attacks on the DECT authentication mechanisms
Stefan Lucks and Andreas Schuler and Erik Tews and Ralf-Philipp Weinmann and Matthias Wenzel
2009/077 ( PDF )
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions
Charles Bouillaguet and Orr Dunkelman and Pierre-Alain Fouque and Antoine Joux
2009/076 ( PDF )
Construction of large families of pseudorandom subsets using elliptic curves
Zhixiong Chen and Chenhuang Wu
2009/075 ( PDF )
Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model
Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta
2009/074 ( PDF )
Computational Oblivious Transfer and Interactive Hashing
Kirill Morozov and George Savvides
2009/073 ( PDF )
Automatic Approach of Provable Security and its Application for OAEP+
GU Chun-Xiang, Guang Yan, ZHU Yue-Fei
2009/072 ( PDF )
Implementing cryptographic pairings: a magma tutorial
Luis J Dominguez Perez, Ezekiel J Kachisa, and Michael Scott
2009/071 ( PDF )
Secret sharing on trees: problem solved
Laszlo Csirmaz and Gabor Tardos
2009/070 ( PDF )
Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis
Omran Ahmadi and Francisco Rodr\iguez-Henriquez
2009/069 ( PDF )
Optimistic Fair Exchange with Multiple Arbiters
Alptekin Kupcu and Anna Lysyanskaya
2009/068 ( PDF )
Overview of Turbo-Code Reconstruction Techniques
Johann Barbier and Eric Filiol
2009/067 ( PDF )
On fractional correlation immunity of majority functions
Chuan-Kun Wu
2009/066 ( PDF )
Adaptive Preimage Resistance and Permutation-based Hash Functions
Jooyoung Lee and Je Hong Park
2009/065 ( PS PS.GZ PDF )
Foundations of Non-Malleable Hash and One-Way Functions
Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi
2009/064 ( PDF )
On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)
Céline Blondeau and Benoît Gérard
2009/063 ( PS PS.GZ PDF )
CCZ-equivalence and Boolean functions
Lilya Budaghyan and Claude Carlet
2009/062 ( PDF )
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
Subhamoy Maitra and Santanu Sarkar
2009/061 ( PDF )
Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method
Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita and Masahito Gotaishi and Toshinobu Kaneko
2009/060 ( PDF )
Comparing Two Pairing-Based Aggregate Signature Schemes
Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes
2009/059 ( PDF )
On the impossibility of graph secret sharing
Laszlo Csirmaz
2009/058 ( PDF )
On Generalization of Cheon's Algorithm
Takakazu Satoh
2009/057 ( PDF )
Anonymity in Shared Symmetric Key Primitives
Gregory M. Zaverucha and Douglas R. Stinson
2009/056 ( PDF )
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
David Kammler and Diandian Zhang and Peter Schwabe and Hanno Scharwaechter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rainer Leupers and Rudolf Mathar and Heinrich Meyr
2009/055 ( PDF )
Universally Composable Symmetric Encryption
Ralf Kuesters and Max Tuengerthal
2009/054 ( PDF )
On the Security of Tandem-DM
Ewan Fleischmann and Michael Gorski and Stefan Lucks
2009/053 ( PS PS.GZ PDF )
New commutative semifields defined by PN multinomials
Lilya Budaghyan and Tor Helleseth
2009/052 ( PS PS.GZ PDF )
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
S.Sree Vivek and S.Sharmila Deva Selvi and C.Pandu Rangan
2009/051 ( PDF )
Enhanced Target Collision Resistant Hash Functions Revisited
Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu
2009/050 ( PDF )
On the Portability of Generalized Schnorr Proofs
Jan Camenisch and Aggelos Kiayias and Moti Yung
2009/049 ( PDF )
Extensions of the Cube Attack based on Low Degree Annihilators
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Wei Lei and Josef Pieprzyk
2009/048 ( PDF )
A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials
Palash Sarkar
2009/047 ( PDF )
On Approximating Addition by Exclusive OR
Palash Sarkar
2009/046 ( PDF )
Traceability Codes
Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
2009/045 ( PDF )
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Carmit Hazay and Yehuda Lindell
2009/044 ( PDF )
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
Dmitry Frumkin and Adi Shamir
2009/043 ( PDF )
Image Encryption by Pixel Property Separation
Karthik Chandrashekar Iyer and Aravinda Subramanya
2009/042 ( PS PS.GZ PDF )
On CCZ-equivalence and its use in secondary constructions of bent functions
Lilya Budaghyan and Claude Carlet
2009/041 ( PS PS.GZ PDF )
Proofs of Retrievability via Hardness Amplification
Yevgeniy Dodis and Salil Vadhan and Daniel Wichs
2009/040 ( PDF )
How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd Hashing by Adopting Indifferentiability
Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta
2009/039 ( PDF )
Key Insulation and Intrusion Resilience Over a Public Channel
Mihir Bellare and Shanshan Duan and Adriana Palacio
2009/038 ( PDF )
On Algebraic Relations of Serpent S-Boxes
Bhupendra Singh and Lexy Alexander and Sanjay Burman
2009/037 ( PDF )
Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)
M. Jason Hinek and Charles C. Y. Lam
2009/036 ( PDF )
Constructions of Truly Practical Secure Protocols using Standard Smartcards
Carmit Hazay and Yehuda Lindell
2009/035 ( PDF )
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim
2009/034 ( PDF )
On a Conditional Collision Attack on NaSHA-512
S. Markovski, A. Mileva, V. Dimitrova and D. Gligoroski
2009/033 ( PDF )
NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi Mohammad Hassanzadeh
2009/032 ( PDF )
A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor
MITSUNARI Shigeo
2009/031 ( PDF )
Adaptively Secure Two-Party Computation with Erasures
Yehuda Lindell
2009/030 ( PDF )
An efficient fuzzy extractor for limited noise
B. Skoric and P. Tuyls
2009/029 ( PDF )
Nofish - A new stream cipher
Marius Oliver Gheorghita
2009/028 ( PDF )
Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger and Brent Waters
2009/027 ( PDF )
Security of Verifiably Encrypted Signatures
Markus Rückert and Dominique Schröder
2009/026 ( PDF )
Collision Attacks on NaSHA-384/512
Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang
2009/025 ( PS PS.GZ PDF )
Short Redactable Signatures Using Random Trees
Ee-Chien Chang and Chee Liang Lim and Jia Xu
2009/024 ( PDF )
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Emmanuelle Dottax and Christophe Giraud and Matthieu Rivain and Yannick Sierra
2009/023 ( PDF )
Polynomial Runtime and Composability
Dennis Hofheinz and Dominique Unruh and Jörn Müller-Quade
2009/022 ( PDF )
Correctness of Li Generalization of RSA Cryptosystem
Roman Popovych
2009/021 ( PDF )
Comparing With RSA
Julien Cathalo and David Naccache and Jean-Jacques Quisquater
2009/020 ( PDF )
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
Jiali Choy and Khoongming Khoo and Chuan-Wen Loe
2009/019 ( PDF )
Communication-Efficient Private Protocols for Longest Common Subsequence
Matthew Franklin and Mark Gondree and Payman Mohassel
2009/018 ( PDF )
Huge 2ndpreimages and collisions of khichidi-1
prasanth Kumar Thandra, S.A.V. Satya Murty
2009/017 ( PDF )
Anonymous signature scheme
Chunbo Ma and Jun Ao
2009/016 ( PDF )
Fast elliptic-curve cryptography on the Cell Broadband Engine
Neil Costigan and Peter Schwabe
2009/015 ( PDF )
Cube Attacks on Trivium
S S Bedi and N Rajesh Pillai
2009/014 ( PDF )
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson
2009/013 ( PDF )
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
Yehuda Lindell
2009/012 ( PDF )
Avoid Mask Re-use in Masked Galois Multipliers
D. Canright
2009/011 ( PDF )
A Very Compact "Perfectly Masked" S-Box for AES (corrected)
D. Canright and Lejla Batina
2009/010 ( PDF )
Optimal Multicast Group Communication
Zhibin Zhou and Dijiang Huang
2009/009 ( PS PS.GZ PDF )
Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
Christoph Lucas and Dominik Raub and Ueli Maurer
2009/008 ( PDF )
A note on Agrawal conjecture
Roman Popovych
2009/007 ( PS PS.GZ PDF )
Homomorphic Trapdoor Commitments to Group Elements
Jens Groth
2009/006 ( PDF )
Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
Vlastimil Klima
2009/005 ( PDF )
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
Wei Wang and Xiaoyun Wang and Guangwu Xu
2009/004 ( -- withdrawn -- )
On Stateless Schemes for Message Authentication Using Pseudorandom Functions
Palash Sarkar
2009/003 ( PDF )
Separating two roles of hashing in one-way message authentication
L. H. Nguyen and A. W. Roscoe
2009/002 ( PDF )
Thermocommunication
Julien Brouchier and Nora Dabbous and Tom Kean and Carol Marsh and David Naccache
2009/001 ( PDF )
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
Brian Baldwin and Richard Moloney and Andrew Byrne and Gary McGuire and William P. Marnane
2008/545 ( PDF )
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
Vipul Goyal and Amit Sahai
2008/544 ( PDF )
Comments on two multi-server authentication protocols
*Yalin Chen 1, Chun-Hui Huang 2, Jue-Sam Chou3
2008/543 ( PDF )
Odd-Char Multivariate Hidden Field Equations
Chia-Hsin Owen Chen and Ming-Shing Chen and Jintai Ding and Fabian Werner and Bo-Yin Yang
2008/542 ( PDF )
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu
2008/541 ( PDF )
Resettably-Sound Resettable Zero Knowledge Arguments for NP
Yi Deng
2008/540 ( PDF )
New Impossible Differential Attacks on AES
Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim
2008/539 ( PDF )
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Jan Camenisch and Markulf Kohlweiss and Claudio Soriente
2008/538 ( PDF )
Supporting Non-membership Proofs with Bilinear-map Accumulators
Ivan Damgård and Nikos Triandopoulos
2008/537 ( PDF )
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin and Kazukuni Kobara and Hideki Imai
2008/536 ( PS PS.GZ PDF )
Predicate Privacy in Encryption Systems
Emily Shen and Elaine Shi and Brent Waters
2008/535 ( PDF )
A Recursive Threshold Visual Cryptography Scheme
Abhishek Parakh and Subhash Kak
2008/534 ( PDF )
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay and Daniel Wichs and Hong-Sheng Zhou
2008/533 ( PDF )
Collusion-Free Multiparty Computation in the Mediated Model
Jonathan Katz and Yehuda Lindell
2008/532 ( PDF )
Semi-free start collision attack on Blender
Xu Liangyu and Li Ji
2008/531 ( PDF )
Collision Attack on the Waterfall Hash Function
Scott Fluhrer
2008/530 ( PDF )
Fast hashing to G2 on pairing friendly curves
Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
2008/529 ( PDF )
A Hardware Interface for Hashing Algorithms
Zhimin Chen, Sergey Morozov, Patrick Schaumont
2008/528 ( PDF )
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
Georg Fuchsbauer and David Pointcheval
2008/527 ( PS PS.GZ PDF )
Properties of Cryptographic Hash Functions
Michal Rjaško
2008/526 ( PDF )
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Patrick Longa, and Catherine Gebotys
2008/525 ( PDF )
On The Diffie-Hellman Assumption
R. Bhaskar, K. Chandrasekaran, S. Lokam, P.L. Montgomery, R. Venkatesan, Y. Yacobi
2008/524 ( PDF )
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP
Li Hongda and Feng dengguo and Li Bao and Xue Haixia
2008/523 ( -- withdrawn -- )
Privacy Preserving Multiset Union with ElGamal Encryption
Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon
2008/522 ( PDF )
Twisted Edwards Curves Revisited
Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
2008/521 ( PDF )
Generating Shorter Bases for Hard Random Lattices
Joel Alwen and Chris Peikert
2008/520 ( PDF )
Cryptanalysis of the Hash Function LUX-256
Shuang Wu and Dengguo Feng and Wenling Wu
2008/519 ( PDF )
Collision attack on NaSHA-512
Li Ji and Xu Liangyu and Guan Xu
2008/518 ( -- withdrawn -- )
A NEW HASH ALGORITHM$:$ Khichidi$-$1
Natarajan Vijayarangan
2008/517 ( PS PS.GZ PDF )
Improving the Rules of the DPA Contest
Francois-Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat-Charvillon
2008/516 ( PDF )
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
Zheng Yuan and Keting Jia and Wei Wang and Xiaoyun Wang
2008/515 ( PDF )
Cryptanalysis of RadioGatun
Thomas Fuhr and Thomas Peyrin
2008/514 ( PS PS.GZ PDF )
Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security
Tapan Rai and Stanislav Bulygin
2008/513 ( PDF )
Improved Cryptanalysis of SHAMATA-BC
Adem Atalay, Orhun Kara and Ferhat Karakoç
2008/512 ( PS PS.GZ )
A new class of Bent functions in Polynomial Forms
Sihem Mesnager
2008/511 ( PDF )
Classification of the SHA-3 Candidates
Ewan Fleischmann and Christian Forler and Michael Gorski
2008/510 ( PDF )
Reconstructing RSA Private Keys from Random Key Bits
Nadia Heninger and Hovav Shacham
2008/509 ( PS PS.GZ PDF )
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings
Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang
2008/508 ( PDF )
Some Formal Solutions in Side-channel Cryptanalysis - An Introduction
Fabrice J.P.R. Pautot
2008/507 ( PDF )
A non-delegatable identity-based strong designated verifier signature scheme
Bin Wang
2008/506 ( PDF )
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/505 ( PDF )
removed
removed
2008/504 ( PS PS.GZ PDF )
The $n^c$-Unique Shortest Vector Problem is Hard
Vadim Lyubashevsky
2008/503 ( PS PS.GZ PDF )
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets
Yevgeniy Dodis and Daniel Wichs
2008/502 ( PDF )
Extended Access Structures and Their Cryptographic Applications
Vanesa Daza and Javier Herranz and Paz Morillo and Carla Rafols
2008/501 ( PDF )
Some Observations on SHAMATA
Ewan Fleischmann and Michael Gorski
2008/500 ( PDF )
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
Hai Huang and Zhenfu Cao
2008/499 ( PDF )
Some Observations on HC-128
Subhamoy Maitra and Goutam Paul and Shashwat Raizada
2008/498 ( PDF )
Small Odd Prime Field Multivariate PKCs
Anna Chen an Ming-Shing Chen and Tien-Ren Chen and Chen-Mou Cheng and Jintai Ding and Eric Kuo and Frost Li and Bo-Yin Yang
2008/497 ( PDF )
On the Correctness of An Approach Against Side-channel attacks
Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang
2008/496 ( PDF )
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook and Moti Yung and Angelos Keromytis
2008/495 ( PDF )
Non-Malleable Obfuscation
Ran Canetti and Mayank Varia
2008/494 ( PS PS.GZ PDF )
Key Agreement from Close Secrets over Unsecured Channels
Bhavana Kanukurthi and Leonid Reyzin
2008/493 ( PDF )
Secure Parameters for SWIFFT
Johannes Buchmann and Richard Lindner
2008/492 ( PDF )
Modeling Computational Security in Long-Lived Systems, Version 2
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
2008/491 ( PDF )
A CM construction for curves of genus 2 with p-rank 1
Laura Hitt O'Connor and Gary McGuire and Michael Naehrig and Marco Streng
2008/490 ( PDF )
On the final exponentiation for calculating pairings on ordinary elliptic curves
Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa
2008/489 ( PDF )
HAIL: A High-Availability and Integrity Layer for Cloud Storage
Kevin D. Bowers and Ari Juels and Alina Oprea
2008/488 ( PDF )
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer and Jonathan Katz and David Naccache
2008/487 ( PDF )
Secure Certificateless Public Key Encryption without Redundancy
Yinxia Sun and Futai Zhang
2008/486 ( PDF )
Inside the Hypercube
Jean-Philippe Aumasson and Eric Brier and Willi Meier and María Naya-Plasencia and Thomas Peyrin
2008/485 ( -- withdrawn -- )
Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
Rongquan Feng and Zilong Wang and Hongfeng Wu
2008/484 ( PDF )
Sharp lower bounds on the extractable randomness from non-uniform sources
Boris Skoric and Chibuzo Obi and Evgeny Verbitskiy and Berry Schoenmakers
2008/483 ( PDF )
Sharing DSS by the Chinese Remainder Theorem
Kamer Kaya and Ali Aydın Selçuk
2008/482 ( PDF )
The Generic Hardness of Subset Membership Problems under the Factoring Assumption
Tibor Jager and Jörg Schwenk
2008/481 ( PS PS.GZ PDF )
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
Chris Peikert
2008/480 ( PDF )
ECM on Graphics Cards
Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang
2008/479 ( PDF )
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren and Shizhu Bian
2008/478 ( PS PS.GZ PDF )
Attribute-Based Encryption with Key Cloning Protection
M. J. Hinek and S. Jiang and R. Safavi-Naini and S. F. Shahandashti
2008/477 ( PDF )
On a New Formal Proof Model for RFID Location Privacy (Extended Version)
Ton van Deursen and Sasa Radomirovic
2008/476 ( PS PS.GZ PDF )
The $F_f$-Family of Protocols for RFID-Privacy and Authentication
Erik-Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa
2008/475 ( PDF )
Sphinx: A Compact and Provably Secure Mix Format
George Danezis and Ian Goldberg
2008/474 ( PDF )
Access Controls for Oblivious and Anonymous Systems
Scott Coull and Matthew Green and Susan Hohenberger
2008/473 ( PDF )
Exploring Cipherspace: Combining stream ciphers and block ciphers
Sandy Harris
2008/472 ( PDF )
Practical attacks against WEP and WPA
Martin Beck and Erik Tews
2008/471 ( PDF )
Automatic Generation of Sound Zero-Knowledge Protocols
Endre Bangerter and Jan Camenisch and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider
2008/470 ( PDF )
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
Paolo D'Arco and Alfredo De Santis
2008/469 ( PS PS.GZ PDF )
Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
Stephane Manuel
2008/468 ( PDF )
A CCA2 Secure Variant of the McEliece Cryptosystem
Nico D\"{o}ttling, Rafael Dowsley, J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento
2008/467 ( PDF )
Cryptanalysis of EnRUPT
Dmitry Khovratovich and Ivica Nikolic
2008/466 ( PS PS.GZ PDF )
Combined (identity-based) public key schemes
Maria Isabel Gonzalez Vasco and Florian Hess and Rainer Steinwandt
2008/465 ( PDF )
Secure Arithmetic Computation with No Honest Majority
Yuval Ishai and Manoj Prabhakaran and Amit Sahai
2008/464 ( PDF )
Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
Michael Kounavis and Shay Gueron
2008/463 ( PDF )
Key-Private Proxy Re-Encryption
Giuseppe Ateniese and Karyn Benson and Susan Hohenberger
2008/462 ( PDF )
Unconditionally Secure Multiparty Set Intersection Re-Visited
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/461 ( -- withdrawn -- )
On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan
2008/460 ( PS PS.GZ PDF )
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee
2008/459 ( PDF )
A variant of Wiener's attack on RSA
Andrej Dujella
2008/458 ( PDF )
Complete Fairness in Multi-Party Computation Without an Honest Majority
S. Dov Gordon and Jonathan Katz
2008/457 ( PDF )
On the Composability of Statistically Secure Bit Commitments
Rafael Dowsley and Jeroen van de Graaf and Jörn Müller-Quade and Anderson C. A. Nascimento
2008/456 ( PDF )
The Diffie-Hellman problem and generalization of Verheul's theorem
Dustin Moody
2008/455 ( PDF )
New hash function designs
Igor Semaev
2008/454 ( PDF )
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek
2008/453 ( PDF )
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Ahmad-Reza Sadeghi and Thomas Schneider
2008/452 ( -- withdrawn -- )
Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems
Rui Xue and Dengguo Feng
2008/451 ( PDF )
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann
2008/450 ( PDF )
On the Security of Fully Collusion Resistant Traitor Tracing Schemes
Yongdong WU and Robert H. Deng
2008/449 ( PDF )
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou
2008/448 ( PS PS.GZ PDF )
Authenticated Adversarial Routing
Yair Amir and Paul Bunn and Rafail Ostrovsky
2008/447 ( PS PS.GZ PDF )
Divisible On-line/Off-line Signatures
Chong-zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang
2008/446 ( PDF )
Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
Mike Burmester and Reihaneh Safavi-Naini and Gelareh Taban
2008/445 ( PDF )
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
Thomas Chardin and Raphaël Marinier
2008/444 ( PS PS.GZ PDF )
Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
Rachel Shipsey and Christine Swart
2008/443 ( PDF )
Key differentiation attacks on stream ciphers
Enes Pasalic
2008/442 ( PS PS.GZ PDF )
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
Anton Kargl and Stefan Pyka and Hermann Seuschek
2008/441 ( PDF )
How Risky is the Random-Oracle Model?
Gaetan Leurent and Phong Q. Nguyen
2008/440 ( PDF )
Robust Encryption
Michel Abdalla and Mihir Bellare and Gregory Neven
2008/439 ( PDF )
Linear equivalence between elliptic curves in Weierstrass and Hesse form
Alexander Rostovtsev
2008/438 ( PDF )
New Related-Key Boomerang Attacks on AES
Michael Gorski and Stefan Lucks
2008/437 ( PDF )
Divisibility, Smoothness and Cryptographic Applications
David Naccache and Igor Shparlinski
2008/436 ( -- withdrawn -- )
BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
Zhibin Zhou and Dijiang Huang
2008/435 ( PS PS.GZ PDF )
Obtaining and solving systems of equations in key variables only for the small variants of AES
Stanislav Bulygin and Michael Brickenstein
2008/434 ( PDF )
The computational SLR: a logic for reasoning about computational indistinguishability
Yu Zhang
2008/433 ( PDF )
On differences of quadratic residues
Guillermo Morales-Luna
2008/432 ( PDF )
Dynamic Provable Data Possession
C. Chris Erway and Alptekin Kupcu and Charalampos Papamanthou and Roberto Tamassia
2008/431 ( PDF )
Usable Optimistic Fair Exchange
Alptekin Kupcu and Anna Lysyanskaya
2008/430 ( PDF )
Cryptographic Protocol Composition via the Authentication Tests
Joshua D. Guttman
2008/429 ( PDF )
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran and Rafail Ostrovsky and William E. Skeith III
2008/428 ( PDF )
Delegatable Anonymous Credentials
Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham
2008/427 ( PDF )
LEGO for Two Party Secure Computation
Jesper Buus Nielsen and Claudio Orlandi
2008/426 ( PDF )
On Kasami Bent Functions
Deepmala Sharma and Sugata Gangopadhyay
2008/425 ( PDF )
Efficient Asynchronous Multiparty Computation with Optimal Resilience
Arpita Patra and Ashish Choudhury and C. Pandu Rangan
2008/424 ( PDF )
Efficient Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra and Ashish Choudhury and C. Pandu Rangan
2008/423 ( PS PS.GZ PDF )
Searchable encryption with decryption in the standard model
Dennis Hofheinz and Enav Weinreb
2008/422 ( PDF )
A New Approach for Algebraically Homomorphic Encryption
Frederik Armknecht and Ahmad-Reza Sadeghi
2008/421 ( PDF )
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
Kaoru Kurosawa and Kazuhiro Suzuki
2008/420 ( PDF )
Oblivious Transfer from Weak Noisy Channels
J\"urg Wullschleger
2008/419 ( PS PS.GZ PDF )
Parsing ambiguities in authentication and key establishment protocols
Liqun Chen and Chris J. Mitchell
2008/418 ( PDF )
Privacy-Enhancing First-Price Auctions Using Rational Cryptography
Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos
2008/417 ( PDF )
On the security of pairing-friendly abelian varieties over non-prime fields
Naomi Benger and Manuel Charlemagne and David Freeman
2008/416 ( PDF )
Almost-Asynchronous MPC with Faulty Minority
Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen
2008/415 ( PDF )
Asynchronous Multiparty Computation: Theory and Implementation
Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen
2008/414 ( PDF )
On the Number of Synchronous Rounds Required for Byzantine Agreement
Matthias Fitzi and Jesper Buus Nielsen
2008/413 ( PS PS.GZ PDF )
Password Mistyping in Two-Factor-Authenticated Key Exchange
Vladimir Kolesnikov and Charles Rackoff
2008/412 ( PDF )
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
Keith M. Martin and Maura B. Paterson and Douglas R. Stinson
2008/411 ( PDF )
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
Bo Zhu, Yanfei Zheng, Yaowei Zhou and Kefei Chen
2008/410 ( PDF )
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
Xu an Wang and Xiaoyuan Yang and Fagen Li
2008/409 ( PDF )
A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension
Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka
2008/408 ( PDF )
The Enigmatique Toolkit
Christopher Billings
2008/407 ( PS PS.GZ PDF )
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee
2008/406 ( PDF )
An asymptotically optimal RFID protocol against relay attacks
Gildas Avoine and Aslan Tchamkerten
2008/405 ( PDF )
Slid Pairs in Salsa20 and Trivium
Deike Priemuth-Schmid and Alex Biryukov
2008/404 ( PS PS.GZ PDF )
Pairing with Supersingular Trace Zero Varieties Revisited
Emanuele Cesena
2008/403 ( PDF )
SPICE Simulation of a "Provably Secure" True Random Number Generator
Markus Dichtl and Bernd Meyer and Hermann Seuschek
2008/402 ( PDF )
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
Jean-Charles Faugère and Ludovic Perret
2008/401 ( PDF )
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
Mridul Nandi
2008/400 ( PDF )
Comments on two password based protocols
Yalin Chen and Hung-Min Sun and Chun-Hui Huang and Jue-Sam Chou
2008/399 ( PDF )
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/398 ( PS PS.GZ PDF )
Generating genus two hyperelliptic curves over large characteristic finite fields
Takakazu Satoh
2008/397 ( -- withdrawn -- )
A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
Uttam Kr. Mondal , Satyendra Nath Mandal and J. PalChoudhury
2008/396 ( PDF )
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Subhamoy Maitra and Goutam Paul
2008/395 ( PDF )
New Applications of Differential Bounds of the SDS Structure
Jiali Choy and Khoongming Khoo
2008/394 ( PDF )
Attribute-Based Ring Signatures
Jin Li and Kwangjo Kim
2008/393 ( PDF )
How Far Must You See To Hear Reliably
Pranav K Vasishta and Anuj Gupta and Prasant Gopal and Piyush Bansal and Rishabh Mukherjee and Poornima M and Kannan Srinathan and Kishore Kothapalli
2008/392 ( PDF )
GUC-Secure Set-Intersection Computation
TIAN Yuan and WANG Ying
2008/391 ( PDF )
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
Tao Xie FanBao Liu DengGuo Feng
2008/390 ( PDF )
Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes
2008/389 ( PS PS.GZ )
Optimal Subset-Difference Broadcast Encryption with Free Riders
Murat Ak and Kamer Kaya and Ali Aydin Selcuk
2008/388 ( PS PS.GZ PDF )
Double-Base Number System for Multi-Scalar Multiplications
Christophe Doche and David R. Kohel and Francesco Sica
2008/387 ( -- withdrawn -- )
None
None
2008/386 ( PDF )
Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table
Michael Lifliand
2008/385 ( PDF )
Cube Attacks on Tweakable Black Box Polynomials
Itai Dinur and Adi Shamir
2008/384 ( PDF )
Improving the Boneh-Franklin Traitor Tracing Scheme
Pascal Junod and Alexandre Karlov and Arjen K. Lenstra
2008/383 ( PS PS.GZ PDF )
Hierarchical Identity Based Encryption with Polynomially Many Levels
Craig Gentry and Shai Halevi
2008/382 ( PDF )
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
Mark Manulis and Damien Leroy and Francois Koeune and Olivier Bonaventure and Jean-Jacques Quisquater
2008/381 ( PDF )
New AES software speed records
Daniel J. Bernstein and Peter Schwabe
2008/380 ( PDF )
Dynamic Threshold Cryptosystem without Group Manager
Andreas Noack and Stefan Spitz
2008/379 ( PDF )
A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare and Todor Ristov
2008/378 ( PDF )
Additively Homomorphic Encryption with d-Operand Multiplications
Carlos Aguilar Melchor, Philippe Gaborit, and Javier Herranz
2008/377 ( PDF )
TRIVIUM's output partially autocancels
Michael Vielhaber
2008/376 ( PDF )
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
Cas J.F. Cremers
2008/375 ( PDF )
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
Jan Camenisch and Nishanth Chandran and Victor Shoup
2008/374 ( PDF )
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto
2008/373 ( PS PS.GZ PDF )
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
Fagen Li and Masaaki Shirase and Tsuyoshi Takagi
2008/372 ( PDF )
Enumeration of Balanced Symmetric Functions over GF(p)
Shaojing Fu, Chao Li, Longjiang Qu, Ping Li
2008/371 ( PDF )
Unconditionally Reliable Message Transmission in Directed Hypergraphs
Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan
2008/370 ( PDF )
Compartmented Threshold RSA Based on the Chinese Remainder Theorem
Sorin Iftene and Stefan Ciobaca and Manuela Grindei
2008/369 ( PDF )
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
Shahram Khazaei and Willi Meier
2008/368 ( PDF )
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
Varad Kirtane and C. Pandu Rangan
2008/367 ( PS PS.GZ PDF )
{Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
Peeter Laud and Long Ngo
2008/366 ( PDF )
Unique Shortest Vector Problem for max norm is NP-hard
Than Quang Khoat and Nguyen Hong Tan
2008/365 ( PDF )
Entropy Bounds for Traffic Confirmation
Luke O'Connor
2008/364 ( PDF )
Zcipher Algorithm Specification
Ilya O Levin
2008/363 ( PS PS.GZ PDF )
An argument for Hamiltonicity
Vadym Fedyukovych
2008/362 ( PDF )
The Cost of False Alarms in Hellman and Rainbow Tradeoffs
Jin Hong
2008/361 ( -- withdrawn -- )
IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.
William Whyte (editor) and Nick Howgrave-Graham and Jeff Hoffstein and Jill PIpher and Joseph H. Silverman and Phil Hirschhorn
2008/360 ( PDF )
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
Saurabh Dutta and Jyotsna Kumar mandal
2008/359 ( PS PS.GZ PDF )
Argument of knowledge of a bounded error
Vadym Fedyukovych
2008/358 ( PS PS.GZ PDF )
History-Independent Cuckoo Hashing
Moni Naor and Gil Segev and Udi Wieder
2008/357 ( PS PS.GZ PDF )
A protocol for K-multiple substring matching
Vadym Fedyukovych and Vitaliy Sharapov
2008/356 ( PDF )
Using Commutative Encryption to Share a Secret
Saied Hosseini Khayat
2008/355 ( PS PS.GZ PDF )
An argument for rank metric
Vadym Fedyukovych
2008/354 ( -- withdrawn -- )
On DDos Attack against Proxy in Re-encryption and Re-signature
Xu an Wang
2008/353 ( PDF )
Weaknesses in HENKOS Stream Cipher
Prasanth Kumar Thandra and S.A.V. Satya Murty and R Balasubramanian
2008/352 ( PDF )
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Alexandra Boldyreva and Serge Fehr and Adam O'Neill
2008/351 ( PDF )
Flaws in Some Self-Healing Key Distribution Schemes with Revocation
Vanesa Daza and Javier Herranz and German Saez
2008/350 ( PDF )
Higher Order Differential Cryptanalysis of Multivariate Hash Functions
Yiyuan Luo and Xuejia Lai
2008/349 ( PDF )
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf
2008/348 ( PS PS.GZ )
Iterative Probabilistic Reconstruction of RC4 Internal States
Jovan Golic and Guglielmo Morgari
2008/347 ( PDF )
Information Leakage in Optimal Anonymized and Diversified Data
Chengfang Fang and Ee-Chien Chang
2008/346 ( PDF )
Remote Integrity Check with Dishonest Storage Server
Ee-Chien Chang and Jia Xu
2008/345 ( PDF )
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
Jooyoung Lee and Choon Sik Park
2008/344 ( PDF )
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
Jooyoung Lee and Je Hong Park
2008/343 ( PDF )
Efficient RFID authentication protocols based on pseudorandom sequence generators
Jooyoung Lee and Yongjin Yeom
2008/342 ( PS PS.GZ PDF )
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and Pandu Rangan Chandrasekaran
2008/341 ( PDF )
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran
2008/340 ( -- withdrawn -- )
On construction of signature schemes based on birational permutations over noncommutative rings
Yasufumi Hashimoto and Kouichi Sakurai
2008/339 ( PDF )
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
Mohamed El-Hadedy and Danilo Gligoroski and Svein J. Knapskog
2008/338 ( PS PS.GZ PDF )
An improvement of discrete Tardos fingerprinting codes
Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and Kazuto Ogawa and Hideki Imai
2008/337 ( PDF )
Modified Huang-Wang's Convertible Nominative Signature Scheme
Wei Zhao and Dingfeng Ye
2008/336 ( PDF )
New attacks on ISO key establishment protocols
Anish Mathuria and G. Sriram
2008/335 ( PDF )
Public Key Cryptography from Different Assumptions
Boaz Barak and Avi Wigderson
2008/334 ( PDF )
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
Darrel Hankerson and Koray Karabina and Alfred Menezes
2008/333 ( PDF )
Explicit hard instances of the shortest vector problem
Johannes Buchmann and Richard Lindner and Markus Rückert and Michael Schneider
2008/332 ( PDF )
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Mahalingam Ramkumar
2008/331 ( PDF )
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
2008/330 ( -- withdrawn -- )
Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He
2008/329 ( PS PS.GZ PDF )
SMS4 Encryption Algorithm for Wireless Networks
Whitfield Diffie and George Ledin (translators)
2008/328 ( PDF )
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
Hemanta Maji and Manoj Prabhakaran and Mike Rosulek
2008/327 ( PDF )
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
Le Trieu Phong and Wakaha Ogata
2008/326 ( PDF )
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
M. B. Paterson and D. R. Stinson
2008/325 ( PDF )
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Chunbo Ma and Jun Ao
2008/324 ( PDF )
RSA-TBOS Signcryption with Proxy Re-encryption.
Varad Kirtane and C.Pandu Rangan
2008/323 ( PDF )
A new identity based proxy signature scheme
Bin Wang
2008/322 ( PDF )
Lattice-based Blind Signatures
Markus Rückert
2008/321 ( PDF )
A correction to ``Efficient and Secure Comparison for On-Line Auctions''
Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard
2008/320 ( PDF )
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Danilo Gligoroski and Smile Markovski and Svein J. Knapskog
2008/319 ( PDF )
Yet Another Secure Distance-Bounding Protocol
Ventzislav Nikov and Marc Vauclair
2008/318 ( PDF )
Attacking and defending the McEliece cryptosystem
Daniel J. Bernstein and Tanja Lange and Christiane Peters
2008/317 ( -- withdrawn -- )
Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
Abdulwahed M. Ismail and Mohamad Rushdan
2008/316 ( PDF )
Signing a Linear Subspace: Signature Schemes for Network Coding
Dan Boneh and David Freeman and Jonathan Katz and Brent Waters
2008/315 ( PDF )
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
Santanu Sarkar and Subhamoy Maitra and Sumanta Sarkar
2008/314 ( PDF )
Scratch, Click & Vote: E2E voting over the Internet
Miroslaw Kutylowski and Filip Zagorski
2008/313 ( PS PS.GZ PDF )
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2008/312 ( PDF )
Improved efficiency of Kiltz07-KEM
Xianhui Lu, Xuejia Lai, Dake He
2008/311 ( PDF )
Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
Orr Dunkelman and Nathan Keller
2008/310 ( PDF )
Attacks on RFID Protocols
T. van Deursen and S. Radomirovic
2008/309 ( PDF )
Revocation Systems with Very Small Private Keys
Allison Lewko and Amit Sahai and Brent Waters
2008/308 ( PDF )
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen
2008/307 ( PDF )
Full Security:Fuzzy Identity Based Encryption
Liming Fang and Jinyue Xia
2008/306 ( PDF )
Combinatorial batch codes
M. B. Paterson and D. R. Stinson and R. Wei
2008/305 ( PDF )
Identity-Based Directed Signature Scheme from Bilinear Pairings
Xun Sun and Jian-hua Li and Gong-liang Chen and Shu-tang Yang
2008/304 ( PDF )
A New Randomness Extraction Paradigm for Hybrid Encryption
Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung
2008/303 ( PDF )
Complete Fairness in Secure Two-Party Computation
S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell
2008/302 ( PDF )
Secure Biometric Authentication With Improved Accuracy
M. Barbosa, S. Cauchie, T. Brouard and S. Melo de Sousa
2008/301 ( PDF )
Accountability of Perfect Concurrent Signature
Yunfeng Li, Dake He, Xianhui Lu
2008/300 ( PDF )
Cheon's algorithm, pairing inversion and the discrete logarithm problem
David J. Mireles Morales
2008/299 ( PDF )
An analysis of the infrastructure in real function fields
David J. Mireles Morales
2008/298 ( PDF )
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
Ryou Fujita and Kohtaro Tadaki and Shigeo Tsujii
2008/297 ( PDF )
Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
Hongzhen Du and Qiaoyan Wen
2008/296 ( PDF )
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, and Huaxiong Wang
2008/295 ( PS PS.GZ PDF )
Foundations of Group Key Management – Framework, Security Model and a Generic Construction
Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and Pandu Rangan Chandrasekaran
2008/294 ( PDF )
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
Atefeh Mashatan and Douglas R. Stinson
2008/293 ( PDF )
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik
2008/292 ( PDF )
Another approach to pairing computation in Edwards coordinates
Sorina Ionica and Antoine Joux
2008/291 ( PDF )
How to Protect Yourself without Perfect Shredding
Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah-Yoh Lim
2008/290 ( PDF )
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Brent Waters
2008/289 ( PDF )
Sharemind: a framework for fast privacy-preserving computations
Dan Bogdanov and Sven Laur and Jan Willemson
2008/288 ( PDF )
How to Launch A Birthday Attack Against DES
Zhengjun Cao
2008/287 ( PDF )
Authenticated Byzantine Generals in Dual Failure Model
Anuj Gupta and Prasant Gopal and Piyush Bansal and Kannan Srinathan
2008/286 ( PS PS.GZ )
One-Up Problem for (EC)DSA
Daniel R. L. Brown
2008/285 ( PDF )
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Jithra Adikari and Vassil Dimitrov and Laurent Imbert
2008/284 ( PDF )
Breaking the Akiyama-Goto cryptosystem
P. Ivanov and J. F. Voloch
2008/283 ( PDF )
Attacks on Singelee and Preneel's protocol
Jorge Munilla and Alberto Peinado
2008/282 ( PDF )
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Jihye Kim and Gene Tsudik
2008/281 ( PDF )
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
Taehyun Kim, Jongsung Kim, Seokhie Hong and Jaechul Sung
2008/280 ( PDF )
FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto
2008/279 ( PDF )
Delegating Capabilities in Predicate Encryption Systems
Elaine Shi and Brent Waters
2008/278 ( PS PS.GZ PDF )
An Improved Robust Fuzzy Extractor
Bhavana Kanukurthi and Leonid Reyzin
2008/277 ( PS PS.GZ PDF )
A strategy for any DAA Issuer and an additional verification by a Host
Vadym Fedyukovych
2008/276 ( PS PS.GZ PDF )
Signcryption with Proxy Re-encryption
Chandrasekar S. and Ambika K. and Pandu Rangan C.
2008/275 ( PDF )
Certificate-Based Signature Schemes without Pairings or Random Oracles
Joseph K. Liu \and Joonsang Baek \and Willy Susilo \and Jianying Zhou
2008/274 ( PS PS.GZ PDF )
Twisted Ate Pairing on Hyperelliptic Curves and Applications
Fangguo Zhang
2008/273 ( PDF )
White-Box Cryptography: Formal Notions and (Im)possibility Results
Amitabh Saxena and Brecht Wyseur and Bart Preneel
2008/272 ( PS PS.GZ PDF )
A New Hash Family Obtained by Modifying the SHA-2 Family
Somitra Kumar Sanadhya and Palash Sarkar
2008/271 ( PS PS.GZ PDF )
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
Somitra Kumar Sanadhya and Palash Sarkar
2008/270 ( PS PS.GZ PDF )
New Collision attacks Against Up To 24-step SHA-2
Somitra Kumar Sanadhya and Palash Sarkar
2008/269 ( PS PS.GZ PDF )
Searching for Low Weight Codewords in Linear Binary Codes
Somitra Kumar Sanadhya and Palash Sarkar
2008/268 ( PDF )
Adaptive Security in Broadcast Encryption Systems
Craig Gentry and Brent Waters
2008/267 ( PDF )
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart
2008/266 ( PDF )
Information-Theoretically Secure Voting Without an Honest Majority
Anne Broadbent and Alain Tapp
2008/265 ( PDF )
Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
Steven D. Galbraith and Michael Harrison and David J. Mireles Morales
2008/264 ( PDF )
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
Robin Künzler and Jörn Müller-Quade and Dominik Raub
2008/263 ( PS PS.GZ PDF )
Slide Attacks on a Class of Hash Functions
Michael Gorski and Stefan Lucks and Thomas Peyrin
2008/262 ( PDF )
Statistically Reliable and Secure Message Transmission in Directed Networks
Arpita Patra and Ashish Choudhury and C. Pandu Rangan
2008/261 ( PS PS.GZ PDF )
The Hidden Root Problem
F. Vercauteren
2008/260 ( PDF )
Breaking RSA Generically is Equivalent to Factoring
Divesh Aggarwal and Ueli Maurer
2008/259 ( PDF )
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
ZHAO Lu, WEN Qiao-yan
2008/258 ( PDF )
ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
JAIYEOLA Temitope Gbolahan and ADENIRAN John Olushola
2008/257 ( PDF )
ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
JAIYEOLA Temitope Gbolahan
2008/256 ( PDF )
ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
JAIYEOLA Temitope Gbolahan
2008/255 ( PDF )
Embedding in Two Least Significant Bits with Wet Paper Coding
Xin Liao and Qiao-yan Wen
2008/254 ( PDF )
An Efficient Identity-based Ring Signcryption Scheme
Zhenchao ZHU and Yuqing ZHANG and FengjiaoWANG
2008/253 ( PDF )
Multi-Recipient Signcryption for Secure Wireless Group Communication
Yiliang Han, Xiaolin Gui, Xu'an Wang
2008/252 ( PS PS.GZ PDF )
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Nick Varnovsky
2008/251 ( PDF )
Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad-Reza Sadeghi and Jörg Schwenk
2008/250 ( PDF )
Pairings on hyperelliptic curves with a real model
Steven Galbraith and Xibin Lin and David Mireles
2008/249 ( -- withdrawn -- )
Construction of Resilient Functions with Multiple Cryptographic Criteria
Shaojing Fu, Chao Li, Bing sun
2008/248 ( PDF )
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Fengjiao Wang and Yuqing Zhang
2008/247 ( PS PS.GZ PDF )
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Pandu Rangan Chandrasekaran
2008/246 ( PDF )
The Random Oracle Model and the Ideal Cipher Model are Equivalent
Jean-Sebastien Coron and Jacques Patarin and Yannick Seurin
2008/245 ( PS PS.GZ PDF )
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
Markus Grassl and Rainer Steinwandt
2008/244 ( PDF )
New balanced Boolean functions satisfying all the main cryptographic criteria
Claude Carlet and Keqin Feng
2008/243 ( PDF )
On the economic payoff of forensic systems when used to trace Counterfeited Software and content
Yacov Yacobi
2008/242 ( -- withdrawn -- )
Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
Shaojing Fu Chao Li Bing Sun
2008/241 ( PDF )
Practical Attacks on HB and HB+ Protocols
Zbigniew Golebiewski and Krzysztof Majcher and Filip Zagorski and Marcin Zawada
2008/240 ( PDF )
Leakage-Resilient Cryptography in the Standard Model
Stefan Dziembowski and Krzysztof Pietrzak
2008/239 ( PDF )
Recognition in Ad Hoc Pervasive Networks
Atefeh Mashatan and Douglas R. Stinson
2008/238 ( PS PS.GZ PDF )
On the Provable Security of Multi-Receiver Signcryption Schemes
S.Sharmila Deva Selvi and S.Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C.Pandu Rangan
2008/237 ( PDF )
Local Affinity Based Inversion of Filter Generators
O.A. Logachev and D.S. Nazarova
2008/236 ( PDF )
A Modular Security Analysis of the TLS Handshake Protocol
P. Morrissey and N.P.Smart and B. Warinschi
2008/235 ( PDF )
Constant-Round Concurrent Non-Malleable Commitments and Decommitments
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2008/234 ( PDF )
On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal
Helger Lipmaa
2008/233 ( -- withdrawn -- )
On Resettably-Sound Resttable Zero Knowledege Arguments
Yi Deng and Dongdai Lin
2008/232 ( PDF )
Perfectly Secure Message Transmission Tolerating Mixed Adversary
Arpita Patra and Ashish Choudhury and Ashwinkumar B. V and Kannan Srinathan and C. Pandu Rangan
2008/231 ( PDF )
A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento
2008/230 ( PDF )
A New Collision Differential For MD5 With Its Full Differential Path
Tao Xie and DengGuo Feng and FanBao Liu
2008/229 ( PDF )
Identification and Privacy: Zero-Knowledge is not Enough
Julien Bringer and Herve Chabanne and Thomas Icart
2008/228 ( PDF )
Revisiting Wiener's Attack -- New Weak Keys in RSA
Subhamoy Maitra and Santanu Sarkar
2008/227 ( PS PS.GZ PDF )
New Impossible Differential Cryptanalysis of ARIA
Ruilin Li, Bing Sun, Peng Zhang and Chao Li
2008/226 ( PDF )
Proxy Key Re-encapsulation Mechanism for Group Communications
Chunbo Ma and Jun Ao
2008/225 ( PS PS.GZ PDF )
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan
2008/224 ( PDF )
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem
Hai Huang and Zhenfu Cao
2008/223 ( PDF )
On the Security of a Visual Cryptography Scheme for Color Images
Bert W. Leung and Felix Y. Ng and Duncan S. Wong
2008/222 ( PDF )
Encryption-On-Demand: Practical and Theoretical Considerations
Gideon Samid
2008/221 ( PDF )
Efficient Conversion of Secret-shared Values Between Different Fields
Ivan Damgard and Rune Thorbek
2008/220 ( PS PS.GZ PDF )
Essentially Optimal Universally Composable Oblivious Transfer
Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi
2008/219 ( -- withdrawn -- )
Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
Dan P. Milleville
2008/218 ( PDF )
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
Wouter Castryck and Steven Galbraith and Reza Rezaeian Farashahi
2008/217 ( PDF )
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom\'e
2008/216 ( PDF )
A New Multi-Linear Universal Hash Family
Palash Sarkar
2008/215 ( PDF )
On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
Naoki Hashizume and Fumiyuki Momose and Jinhui Chao
2008/214 ( PDF )
Multi-Factor Password-Authenticated Key Exchange
Douglas Stebila and Poornaprajna Udupi and Sheueling Chang
2008/213 ( PDF )
The Multireceiver Commitment Schemes
Shuhong Wang
2008/212 ( PDF )
Reducing the Complexity of the Weil Pairing Computation
Chang-An Zhao and Fangguo Zhang and Dongqing Xie
2008/211 ( PDF )
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Goichiro Hanaoka and Kaoru Kurosawa
2008/210 ( PDF )
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
Haimin Jin and Duncan S. Wong and Yinlong Xu
2008/209 ( PDF )
Computing Bilinear Pairings on Elliptic Curves with Automorphisms
Chang-An Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Bing-Long Chen
2008/208 ( PS PS.GZ PDF )
Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
Naoki Ogura and Shigenori Uchiyama
2008/207 ( PDF )
Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
Ben Adida and C. Andrew Neff
2008/206 ( PDF )
Partial Fairness in Secure Two-Party Computation
Dov Gordon and Jonathan Katz
2008/205 ( PS PS.GZ PDF )
On Software Parallel Implementation of Cryptographic Pairings
Philipp Grabher and Johann Groszschaedl and Dan Page
2008/204 ( PDF )
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
Yanbin Pan and Yingpu Deng
2008/203 ( PDF )
Privacy-Preserving Matching of DNA Profiles
Fons Bruekers and Stefan Katzenbeisser and Klaus Kursawe and Pim Tuyls
2008/202 ( PS PS.GZ PDF )
Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
Zhitu Su, Hui Li and JianFeng Ma
2008/201 ( PDF )
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
J. Wu and D.R. Stinson
2008/200 ( PDF )
On The Security of The ElGamal Encryption Scheme and Damgard’s Variant
J. Wu and D.R. Stinson
2008/199 ( PDF )
Simultaneous field divisions: an extension of Montgomery's trick
David G. Harris
2008/198 ( PDF )
Security needs in embedded systems
Anoop MS
2008/197 ( PDF )
Secure Multiparty Computation for Privacy-Preserving Data Mining
Yehuda Lindell and Benny Pinkas
2008/196 ( PS PS.GZ PDF )
A New Family of Perfect Nonlinear Binomials
Zhengbang Zha and Gohar M. Kyureghyan and Xueli Wang
2008/195 ( PDF )
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
Jin Zhengping and Zuo Huijuan and Du hongzhen and Wen Qiaoyan
2008/194 ( PDF )
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Steven D. Galbraith and Xibin Lin and Michael Scott
2008/193 ( -- withdrawn -- )
A Tamper-Evident Voting Machine Resistant to Covert Channels
Wei Han and Tao Hao and Dong Zheng and Ke-fei Chen and Xiaofeng Chen
2008/192 ( PDF )
Investigating the DPA-Resistance Property of Charge Recovery Logics
Amir Moradi and Mehrdad Khatir and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
2008/191 ( -- withdrawn -- )
None
None
2008/190 ( PS PS.GZ )
User-Sure-and-Safe Key Retrieval
Daniel R. L. Brown
2008/189 ( PDF )
How to Build a Hash Function from any Collision-Resistant Function
Thomas Ristenpart and Thomas Shrimpton
2008/188 ( PDF )
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh
2008/187 ( PS PS.GZ PDF )
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
Fagen Li and Yong Yu
2008/186 ( PDF )
Privacy-Preserving Audit and Extraction of Digital Contents
Mehul A. Shah and Ram Swaminathan and Mary Baker
2008/185 ( PS PS.GZ PDF )
A New Approach to Secure Logging
Di Ma and Gene Tsudik
2008/184 ( PDF )
On the Secure Obfuscation of Deterministic Finite Automata
W. Erik Anderson
2008/183 ( PDF )
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Jean-Philippe Aumasson and Willi Meier and Florian Mendel
2008/182 ( PDF )
Restricted Adaptive Oblivious Transfer
Javier Herranz
2008/181 ( PDF )
Proofs of Knowledge with Several Challenge Values
Grzegorz Stachowiak
2008/180 ( PDF )
Imaginary quadratic orders with given prime factor of class number
Alexander Rostovtsev
2008/179 ( -- withdrawn -- )
An Efficient ID-based Ring Signature Scheme from Pairings
Chunxiang Gu and Yuefei Zhu
2008/178 ( PDF )
Optimal Discretization for High-Entropy Graphical Passwords
Kemal Bicakci
2008/177 ( PDF )
Algebraic Techniques in Differential Cryptanalysis
Martin Albrecht and Carlos Cid
2008/176 ( PDF )
New construction of Boolean functions with maximun algebraic immunity
Wang yongjuan and Fan shuqin and Han wenbao
2008/175 ( PDF )
Proofs of Retrievability: Theory and Implementation
Kevin D. Bowers and Ari Juels and Alina Oprea
2008/174 ( PS PS.GZ PDF )
Non-Linear Reduced Round Attacks Against SHA-2 Hash family
Somitra Kumar Sanadhya and Palash Sarkar
2008/173 ( PDF )
Full Cryptanalysis of LPS and Morgenstern Hash Function
Christophe Petit and Kristin Lauter and Jean-Jacques Quisquater
2008/172 ( PDF )
The Round Complexity of Verifiable Secret Sharing Revisited
Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan
2008/171 ( PDF )
Binary Edwards Curves
Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi
2008/170 ( PDF )
Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem
Simon R. Blackburn
2008/169 ( PS PS.GZ PDF )
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Côme Berbain and Aline Gouget and Hervé Sibert
2008/168 ( PS PS.GZ PDF )
Possibility and impossibility results for selective decommitments
Dennis Hofheinz
2008/167 ( PDF )
Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
Omkant Pandey
2008/166 ( PS PS.GZ PDF )
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
Nicolas T. Courtois and Karsten Nohl and Sean O'Neil
2008/165 ( PDF )
Improved lower bound on the number of balanced symmetric functions over GF(p)
Pinhui Ke
2008/164 ( PDF )
On the (Im)Possibility of Key Dependent Encryption
Iftach Haitner and Thomas Holenstein
2008/163 ( PDF )
Universally Composable Adaptive Oblivious Transfer
Matthew Green and Susan Hohenberger
2008/162 ( PDF )
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Michael Backes and Boris Köpf
2008/161 ( PDF )
Modular polynomials for genus 2
Reinier Broker and Kristin Lauter
2008/160 ( PDF )
A Proxy Signature Scheme over Braid Groups
Girraj Kumar Verma
2008/159 ( PDF )
A non-interactive deniable authentication scheme based on designated verifier proofs
Bin Wang
2008/158 ( PS PS.GZ PDF )
DISH: Distributed Self-Healing in Unattended Sensor Networks
Di Ma and Gene Tsudik
2008/157 ( PDF )
Secure Online Elections in Practice
Lucie Langer and Axel Schmidt and Johannes Buchmann
2008/156 ( PDF )
On Black-Box Ring Extraction and Integer Factorization
Kristina Altmann and Tibor Jager and Andy Rupp
2008/155 ( PDF )
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
David Freeman
2008/154 ( -- withdrawn -- )
The Walsh Spectrum of a New Family of APN Functions
Yue Zhou and Chao Li
2008/153 ( PDF )
Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
Clemens Heuberger
2008/152 ( PDF )
Computational soundness of symbolic zero-knowledge proofs
Michael Backes and Dominique Unruh
2008/151 ( -- withdrawn -- )
Impossible Differential Cryptanalysis of CLEFIA
Bing Sun,Ruilin Li, Mian Wang, Ping Li and Chao Li
2008/150 ( PDF )
Robust Combiners for Software Hardening
Amir Herzberg and Haya Shulman
2008/149 ( PS PS.GZ )
Toy Factoring by Newton's Method
Daniel R. L. Brown
2008/148 ( PDF )
Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
2008/147 ( PDF )
A Real-World Attack Breaking A5/1 within Hours
Timo Gendrullis and Martin Novotny and Andy Rupp
2008/146 ( PDF )
Dynamic SHA-2
Xu Zijie
2008/145 ( PDF )
Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
Jithra Adikari and Vassil S. Dimitrov and Pradeep K. Mishra
2008/144 ( PS PS.GZ PDF )
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
Shiva Prasad Kasiviswanathan and Adam Smith
2008/143 ( PS PS.GZ PDF )
Certificateless Signcryption
M. Barbosa and P. Farshim
2008/142 ( PDF )
Attacking Reduced Round SHA-256
Somitra Kumar Sanadhya and Palash Sarkar
2008/141 ( PDF )
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan
2008/140 ( PDF )
Reducing Complexity Assumptions for Oblivious Transfer
K.Y. Cheong and Takeshi Koshiba
2008/139 ( PDF )
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian
2008/138 ( PDF )
Oblivious Transfer Based on the McEliece Assumptions
Rafael Dowsley and Jeroen van de Graaf and J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento
2008/137 ( PDF )
More Discriminants with the Brezing-Weng Method
Gaetan Bisson and Takakazu Satoh
2008/136 ( PDF )
Constant-Size Dynamic $k$-TAA
Man Ho Au and Willy Susilo and Yi Mu
2008/135 ( PS PS.GZ PDF )
Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
Clemens Heuberger and James A. Muir
2008/134 ( PS PS.GZ PDF )
Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
Alon Rosen and Gil Segev
2008/133 ( PDF )
The arithmetic of characteristic 2 Kummer surfaces
P. Gaudry and D. Lubicz
2008/132 ( PDF )
A Framework for the Sound Specification of Cryptographic Tasks
Juan A. Garay and Aggelos Kiayias and Hong-Sheng Zhou
2008/131 ( PS PS.GZ PDF )
Collisions and other Non-Random Properties for Step-Reduced SHA-256
Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger
2008/130 ( PS PS.GZ PDF )
Analysis of Step-Reduced SHA-256
Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
2008/129 ( PDF )
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
Mohamed Layouni
2008/128 ( PS PS.GZ PDF )
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
Hidehiko Nakagami and Ryoichi Teramura and Toshihiro Ohigashi and Hidenori Kuwakado and Masakatu Morii
2008/127 ( PDF )
A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
Nidia Cortez-Duarte and Francisco Rodr\'iguez-Henr\'iquez and Jean-Luc Beuchat and Eiji Okamoto
2008/126 ( PDF )
Machine Learning Attacks Against the ASIRRA CAPTCHA
Philippe Golle
2008/125 ( PDF )
Pairing Lattices
Florian Hess
2008/124 ( PDF )
A Simple Derivation for the Frobenius Pseudoprime Test
Daniel Loebenberger
2008/123 ( PDF )
Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
Mehrdad Khatir and Amir Moradi
2008/122 ( PDF )
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
Seog Chung Seo and Dong-Guk Han and Seokhie Hong
2008/121 ( PS PS.GZ PDF )
New proofs for old modes
Mark Wooding
2008/120 ( PDF )
Public key encryption and encryption emulation attacks
Denis Osin and Vladimir Shpilrain
2008/119 ( PDF )
Linear Bandwidth Naccache-Stern Encryption
Benoit Chevallier-Mames and David Naccache and Jacques Stern
2008/118 ( PDF )
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
Patrick Longa and Catherine Gebotys
2008/117 ( PDF )
Exponentiation in pairing-friendly groups using homomorphisms
Steven D. Galbraith and Michael Scott
2008/116 ( PS PS.GZ PDF )
Chosen-Ciphertext Security via Correlated Products
Alon Rosen and Gil Segev
2008/115 ( PDF )
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Francisco Rodríguez-Henríquez
2008/114 ( PDF )
Scalable and Efficient Provable Data Possession
Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik
2008/113 ( PDF )
Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
Daniel Mall and Qing Zhong
2008/112 ( PDF )
Democratic Group Signatures with Threshold Traceability
Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li
2008/111 ( PDF )
THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
Yuriy Izbenko and Vladislav Kovtun and Alexandr Kuznetsov
2008/110 ( -- withdrawn -- )
On the Design of Secure and Fast Double Block Length Hash Functions
Zheng Gong and Xuejia Lai and Kefei Chen
2008/109 ( PDF )
Collisions for Round-Reduced LAKE
Florian Mendel and Martin Schläffer
2008/108 ( PDF )
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Jintai Ding AND Bo-Yin Yang AND Owen Chen AND Ming-Shing Chen AND Doug Cheng
2008/107 ( PDF )
Private Branching Programs: On Communication-Efficient Cryptocomputing
Helger Lipmaa
2008/106 ( PS PS.GZ PDF )
Knapsack cryptosystems built on NP-hard instances
Laurent Evain
2008/105 ( PS PS.GZ PDF )
Cryptanalysis of White-Box Implementations
W. Michiels and P. Gorissen and H.D.L. Hollmann
2008/104 ( PS PS.GZ PDF )
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Ernie Brickell, Liqun Chen and Jiangtao Li
2008/103 ( -- withdrawn -- )
Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
Jun Shao and Dongsheng Xing and Zhenfu Cao
2008/102 ( PS PS.GZ PDF )
Degradation and Amplification of Computational Hardness
Shai Halevi and Tal Rabin
2008/101 ( -- withdrawn -- )
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
Arpita Patra and Ashish Choudhary and AshwinKumar B.V and C. Pandu Rangan
2008/100 ( PDF )
Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
Patrick Longa
2008/099 ( PS PS.GZ PDF )
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
Kristin E. Lauter and Katherine E. Stange
2008/098 ( PDF )
On Security Notions for Verifiable Encrypted Signature
Xu-An Wang and Xiaoyuan Yang and Yiliang Han
2008/097 ( PS PS.GZ PDF )
Fairness with an Honest Minority and a Rational Majority
Shien Jin Ong and David Parkes and Alon Rosen and Salil Vadhan
2008/096 ( PS PS.GZ PDF )
Optimal Pairings
F. Vercauteren
2008/095 ( PS PS.GZ PDF )
Strongly Unforgeable ID-based Signatures Without Random Oracles
Chifumi Sato and Takeshi Okamoto and Eiji Okamoto
2008/094 ( PDF )
Universally Composable Undeniable Signature
Kaoru Kurosawa and Jun Furukawa
2008/093 ( PDF )
New ID-based Fair Blind Signatures
Girraj Kumar Verma
2008/092 ( PDF )
An Efficient SPRP-secure Construction based on Pseudo Random Involution
Mridul Nandi
2008/091 ( PDF )
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
Mridul Nandi
2008/090 ( PDF )
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
Mridul Nandi
2008/089 ( PDF )
An improved preimage attack on MD2
S{\o}ren S. Thomsen
2008/088 ( PDF )
A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
Mahabir Prasad Jhanwar and Rana Barua
2008/087 ( PDF )
Towards a Theory of White-Box Security
Amir Herzberg and Haya Shulman and Amitabh Saxena and Bruno Crispo
2008/086 ( PDF )
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan
2008/085 ( PDF )
All Pairings Are in a Group
Chang-An Zhao and Fangguo Zhang and Jiwu Huang
2008/084 ( PDF )
ID based generalized signcryption
Sunder Lal and Prashant Kushwah
2008/083 ( PDF )
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Hung-Min Sun, Wei-Chih Ting, and King-Hang Wang
2008/082 ( PDF )
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
Roberto Araujo and Peter Y. A. Ryan
2008/081 ( PDF )
Template Attacks on ECDSA
Marcel Medwed and Elisabeth Oswald
2008/080 ( PDF )
Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate and Greg Zaverucha and Ian Goldberg
2008/079 ( PDF )
Homomorphic Encryption with CCA Security
Manoj Prabhakaran and Mike Rosulek
2008/078 ( PS PS.GZ PDF )
A Short Proof of the PRP/PRF Switching Lemma
Donghoon Chang and Mridul Nandi
2008/077 ( PDF )
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
2008/076 ( PDF )
Results from a Search for the Best Linear Approximation of a Block Cipher
Kashif Ali and Howard M. Heys
2008/075 ( PS PS.GZ PDF )
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
Jonathan J. Hoch and Adi Shamir
2008/074 ( PDF )
On the Chikazawa-Inoue ID based key system
Bae Eun Jung and Hee Jean Kim
2008/073 ( PDF )
Compact Proofs of Retrievability
Hovav Shacham and Brent Waters
2008/072 ( PDF )
The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
Alexandre M. Deusajute and Paulo S. L. M. Barreto
2008/071 ( PDF )
Blockcipher Based Hashing Revisited
Martijn Stam
2008/070 ( PS PS.GZ PDF )
Generators of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
2008/069 ( PDF )
HENKOS Cryptanalysis-Related keys attack
Marius Oliver Gheorghita
2008/068 ( PDF )
Multiparty Computation Goes Live
Peter Bogetoft and Dan Lund Christensen and Ivan Damgard and Martin Geisler and Thomas Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael Schwartzbach and Tomas Toft
2008/067 ( PDF )
The Twin Diffie-Hellman Problem and Applications
David Cash and Eike Kiltz and Victor Shoup
2008/066 ( PDF )
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng
2008/065 ( PS PS.GZ PDF )
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
Junghyun Nam
2008/064 ( PDF )
Remarks on the NFS complexity
Pavol Zajac
2008/063 ( PS PS.GZ PDF )
Efficient Sequential Aggregate Signed Data
Gregory Neven
2008/062 ( PDF )
Computing Hilbert Class Polynomials
Juliana Belding and Reinier Broker and Andreas Enge and Kristin Lauter
2008/061 ( PDF )
Abelian varieties with prescribed embedding degree
David Freeman and Peter Stevenhagen and Marco Streng
2008/060 ( PDF )
Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
Nicholas T. Sullivan
2008/059 ( PDF )
Buying random votes is as hard as buying no-votes
Stefan Popoveniuc and Jonathan Stanton
2008/058 ( PDF )
Physical Cryptanalysis of KeeLoq Code Hopping Applications
Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani
2008/057 ( PDF )
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
Vladislav Kovtun, Jan Pelzl and Alexandr Kuznetsov
2008/056 ( PDF )
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
Vladislav Kovtun, Thomas Wollinger
2008/055 ( -- withdrawn -- )
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
S.Sharmila Deva Selvi and S.Sree Vivek
2008/054 ( PS PS.GZ PDF )
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
Jin Hong and Kyung Chul Jeong and Eun Young Kwon and In-Sok Lee and Daegun Ma
2008/053 ( PDF )
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
Miroslava Sotakova
2008/052 ( PDF )
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
Patrick Longa and Ali Miri
2008/051 ( PDF )
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
Patrick Longa and Ali Miri
2008/050 ( PDF )
Multi-PKG ID based signcryption
Sunder Lal and Prashant Kushwah
2008/049 ( PDF )
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell and Benny Pinkas
2008/048 ( PDF )
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
Donghoon Chang, Jaechul Sung, Seokhie Hong and Sangjin Lee
2008/047 ( PS PS.GZ PDF )
Fair Traceable Multi-Group Signatures
Vicente Benjumea and Seung Geol Choi and Javier Lopez and Moti Yung
2008/046 ( PS PS.GZ PDF )
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Tal Moran and Gil Segev
2008/045 ( PDF )
Threshold RSA for Dynamic and Ad-Hoc Groups
Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin
2008/044 ( PDF )
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Ari Juels and Ravikanth Pappu and Bryan Parno
2008/043 ( PDF )
Cryptanalysis of CRUSH hash structure
Nasour Bagheri, Majid Naderi, Babak Sadeghiyan
2008/042 ( PDF )
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Julien Bringer and Herve Chabanne
2008/041 ( PDF )
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
Hassan Elkamchouchi and Yasmine Abouelseoud
2008/040 ( PDF )
Efficient and Generalized Pairing Computation on Abelian Varieties
Eunjeong Lee, Hyang-Sook Lee, and Cheol-Min Park
2008/039 ( PDF )
New Results on Unconditionally Secure Multireceiver Manual Authentication
Shuhong Wang and Reihaneh Safavi-Naini
2008/038 ( PDF )
A New Blind Identity-Based Signature Scheme with Message Recovery
Hassan Elkamchouchi and Yasmine Abouelseoud
2008/037 ( PS PS.GZ PDF )
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Georg Fuchsbauer and David Pointcheval
2008/036 ( PDF )
Generic Attacks on Feistel Schemes
Jacques Patarin
2008/035 ( PS PS.GZ PDF )
Efficient Fully-Simulatable Oblivious Transfer
Yehuda Lindell
2008/034 ( PS PS.GZ PDF )
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
Chunming Tang and Dingyi Pei and Zhuojun Liu and Zheng-an Yao and Mingsheng Wang
2008/033 ( PDF )
Lower Bounds on Signatures From Symmetric Primitives
Boaz Barak, Mohammad Mahmoody-Ghidardy
2008/032 ( PS PS.GZ PDF )
Merkle Puzzles are Optimal
Boaz Barak, Mohammad Mahmoody-Ghidary
2008/031 ( PDF )
Authenticating with Attributes
Dalia Khader
2008/030 ( PS PS.GZ PDF )
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr\'o and Daniel Wichs
2008/029 ( PS PS.GZ PDF )
Non-Cyclic Subgroups of Jacobians of Genus Two Curves
Christian Robenhagen Ravnshoj
2008/028 ( PS PS.GZ PDF )
HB#: Increasing the Security and Efficiency of HB+
Henri Gilbert and Matthew J.B. Robshaw and Yannick Seurin
2008/027 ( PDF )
Blind Signature Scheme over Braid Groups
Girraj Kumar Verma
2008/026 ( PDF )
Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
Mitsuru Kawazoe and Tetsuya Takahashi
2008/025 ( PS PS.GZ PDF )
Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
2008/024 ( PDF )
Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
Sunder Lal and Vandani Verma
2008/023 ( PS PS.GZ PDF )
General Certificateless Encryption and Timed-Release Encryption
Sherman S.M. Chow and Volker Roth and Eleanor G. Rieffel
2008/022 ( PDF )
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
M. Gebhardt and G. Illies and W. Schindler
2008/021 ( PDF )
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008/020 ( PDF )
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Eike Kiltz and Yevgeniy Vahlis
2008/019 ( PS PS.GZ PDF )
Computing Pairings Using x-Coordinates Only
Steven D. Galbraith and Xibin Lin
2008/018 ( PDF )
Disjunctive Multi-Level Secret Sharing
Mira Belenkiy
2008/017 ( PS PS.GZ PDF )
New State Recovery Attack on RC4
Alexander Maximov and Dmitry Khovratovich
2008/016 ( PDF )
ECM using Edwards curves
Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
2008/015 ( PDF )
Practical Short Signature Batch Verification
Anna Lisa Ferrara and Matthew Green and Susan Hohenberger and Michael {\O}stergaard Pedersen
2008/014 ( PS PS.GZ PDF )
Simulatable Adaptive Oblivious Transfer
Jan Camenisch and Gregory Neven and abhi shelat
2008/013 ( PDF )
Twisted Edwards Curves
Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters
2008/012 ( PDF )
The Encrypted Elliptic Curve Hash
Daniel R. L. Brown
2008/011 ( PDF )
A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
Ayan Mahalanobis
2008/010 ( PDF )
A Proof of Security in O(2^n) for the Xor of Two Random Permutations
Jacques Patarin
2008/009 ( PDF )
Generic Attacks for the Xor of k random permutations
Jacques Patarin
2008/008 ( PS PS.GZ PDF )
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
Zhitu su, Hui Li and Jianfeng Ma
2008/007 ( PDF )
Efficient One-round Key Exchange in the Standard Model
Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson
2008/006 ( PDF )
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Ralf Kuesters and Max Tuengerthal
2008/005 ( PS PS.GZ PDF )
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
Francois Mace and Francois-Xavier Standaert and Jean-Jacques Quisquater
2008/004 ( PDF )
Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
Palash Sarkar
2008/003 ( PDF )
On Collisions of Hash Functions Turbo SHA-2
Vlastimil Klima
2008/002 ( PDF )
Fuzzy Identity Based Signature
Piyi Yang and Zhenfu Cao and Xiaolei Dong
2008/001 ( PS PS.GZ PDF )
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo and Lihua Wang
2007/482 ( PDF )
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
Leonardo B. Oliveira and Michael Scott and Julio López and Ricardo Dahab
2007/481 ( -- withdrawn -- )
MAC-free variant of KD04
Xianhui Lu, Xuejia Lai, Dake He
2007/480 ( PDF )
Differential Fault Analysis on the AES Key Schedule
Junko Takahashi and Toshinori Fukunaga
2007/479 ( PDF )
An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
J. Wu and D.R. Stinson
2007/478 ( PDF )
Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs
Dafna Kidron and Yehuda Lindell
2007/477 ( PDF )
Algebraic Side-Channel Collision Attacks on AES
Andrey Bogdanov and Andrey Pyshkin
2007/476 ( PDF )
Dynamic SHA
Xu Zijie
2007/475 ( PDF )
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
Ran Canetti
2007/474 ( PDF )
Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
Martin Cochran
2007/473 ( PDF )
Authenticated Key Exchange and Key Encapsulation Without Random Oracles
Tatsuaki Okamoto
2007/472 ( PS PS.GZ PDF )
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Jean-Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger
2007/471 ( PDF )
Attacks on the WEP protocol
Erik Tews
2007/470 ( PDF )
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
Bodo Möller and Andy Rupp
2007/469 ( PDF )
ID-Based Group Password-Authenticated Key Exchange
Xun Yi and Raylin Tso and Eiji Okamoto
2007/468 ( -- withdrawn -- )
On the hash function of ODH assumption
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/467 ( PS PS.GZ PDF )
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
Andr\'e Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil Vadhan
2007/466 ( PDF )
Improved Impossible Differential Cryptanalysis of CLEFIA
Wei Wang and Xiaoyun Wang
2007/465 ( PDF )
A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions
Zheng Gong and Xuejia Lai and Kefei Chen
2007/464 ( PDF )
Secure Computation Without Authentication
Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin
2007/463 ( PDF )
Efficient GF(3m) Multiplication Algorithm for eta T Pairing
Gen Takahashi and Fumitaka Hoshino and Tetsutaro Kobayashi
2007/462 ( PDF )
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Siamak F Shahandashti and Reihaneh Safavi-Naini
2007/461 ( PDF )
Verifiable Attribute-based Encryption
QiangTang and Dongyao Ji
2007/460 ( PS PS.GZ PDF )
Guarantees for Customers of Incentive Anonymizing Networks
Timothy Atkinson and Marius Silaghi
2007/459 ( PDF )
Practical Anonymous Divisible E-Cash From Bounded Accumulators
Man Ho Au and Willy Susilo and Yi Mu
2007/458 ( PS PS.GZ PDF )
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
Nenad Dedic and Danny Harnik and Leonid Reyzin
2007/457 ( PDF )
Comparing Implementation Efficiency of Ordinary and Squared Pairings
Christine Abegail Antonio and Tanaka Satoru and Ken Nakamula
2007/456 ( -- withdrawn -- )
Precise Zero-Knowledge in Concurrent Setting
Ning Ding and Dawu Gu
2007/455 ( PDF )
Analysis and optimization of elliptic-curve single-scalar multiplication
Daniel J. Bernstein and Tanja Lange
2007/454 ( PDF )
Efficient Certificateless Signatures Suitable for Aggregation
Rafael Castro and Ricardo Dahab
2007/453 ( PDF )
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
Kenneth G. Paterson and Sriramkrishnan Srinivasan
2007/452 ( PDF )
Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
Ezekiel J. Kachisa and Edward F. Schaefer and Michael Scott
2007/451 ( PDF )
Precise Concurrent Zero Knowledge
Omkant Pandey and Rafael Pass and Amit Sahai and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam
2007/450 ( PDF )
Short Group Signature without Random Oracles
Xiaohui Liang and Zhenfu Cao and Jun Shao and Huang Lin
2007/449 ( PDF )
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Jacques Patarin and Valérie Nachef and Côme Berbain
2007/448 ( PDF )
Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
Sergiy Pometun
2007/447 ( PDF )
Weak adaptive chosen ciphertext secure hybrid encryption scheme
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/446 ( PDF )
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
Carlos AGUILAR MELCHOR and Philippe GABORIT
2007/445 ( PDF )
Proposal of a new efficient public key system for encryption and digital signatures
Gerold Grünauer
2007/444 ( PDF )
Tight bounds between algebraic immunity and nonlinearities of high orders
Lobanov Mikhail
2007/443 ( PDF )
Template Attacks with a Power Model
Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST
2007/442 ( PDF )
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
Neal Koblitz and Alfred Menezes
2007/441 ( PS PS.GZ PDF )
Faster Group Operations on Elliptic Curves
Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson
2007/440 ( PDF )
An Improved Remote User Authentication Scheme using Bilinear Pairings
Sunder Lal and K.K.Goyal
2007/439 ( PDF )
Multiparty Key Agreement Using Bilinear Map
Nam-Su Jho and Myung-Hwan Kim and Do Won Hong and Byung-Gil Lee
2007/438 ( PDF )
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum
2007/437 ( PDF )
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Cuauhtemoc Mancillas-Lopez and Debrup Chakraborty and Francisco Rodriguez-Henriquez
2007/436 ( PS PS.GZ PDF )
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Gautham Sekar and Souradyuti Paul and Bart Preneel
2007/435 ( PS PS.GZ PDF )
Irreducibility to the One-More Evaluation Problems: More May Be Less
Daniel R. L. Brown
2007/434 ( PS PS.GZ PDF )
Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
Xibin Lin and Chang-An Zhao and Fangguo Zhang and Yanming Wang
2007/433 ( PDF )
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
Fabien Coelho
2007/432 ( PDF )
Trapdoors for Hard Lattices and New Cryptographic Constructions
Craig Gentry and Chris Peikert and Vinod Vaikuntanathan
2007/431 ( PS PS.GZ PDF )
Notions of Efficiency in Simulation Paradigm
Tzer-jen Wei
2007/430 ( PDF )
Cryptanalysis of LASH
Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang
2007/429 ( PS PS.GZ PDF )
On compressible pairings and their computation
Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe
2007/428 ( PDF )
Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
Benjamin Smith
2007/427 ( PDF )
Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
Sumanta Sarkar and Subhamoy Maitra
2007/426 ( PDF )
Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
Christine Abegail Antonio, Satoru Tanaka, and Ken Nakamula
2007/425 ( PS PS.GZ PDF )
On prime-order elliptic curves with embedding degrees k=3,4 and 6
Koray Karabina and Edlyn Teske
2007/424 ( PS PS.GZ PDF )
When e-th Roots Become Easier Than Factoring
Antoine Joux and David Naccache and Emmanuel Thomé
2007/423 ( PDF )
Finding Low Weight Polynomial Multiples Using Lattices
Laila El Aimani and Joachim von zur Gathen
2007/422 ( PDF )
Structural Identity-Based Encryption
Man Ho Au and Siu-Ming Yiu
2007/421 ( PS PS.GZ PDF )
The role of help in Classical and Quantum Zero-Knowledge
Andr\'e Chailloux and Iordanis Kerenidis
2007/420 ( PDF )
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Jiayuan Sui and Douglas R. Stinson
2007/419 ( PDF )
Cryptanalysis of the Random Number Generator of the Windows Operating System
Leo Dorrendorf and Zvi Gutterman and Benny Pinkas
2007/418 ( -- withdrawn -- )
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Amit K Awasthi
2007/417 ( PDF )
Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi
2007/416 ( PS PS.GZ PDF )
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung and Seokhie Hong
2007/415 ( PDF )
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
2007/414 ( PDF )
Optimizing double-base elliptic-curve single-scalar multiplication
Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters
2007/413 ( PDF )
Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
Michael Vielhaber
2007/412 ( PDF )
Proposing a Master One-Way Function
Gideon Samid
2007/411 ( PDF )
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
2007/410 ( PDF )
Inverted Edwards coordinates
Daniel J. Bernstein and Tanja Lange
2007/409 ( PDF )
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
Thomas Shrimpton and Martijn Stam
2007/408 ( PDF )
Differential Cryptanalysis of PRESENT
Meiqin Wang
2007/407 ( -- withdrawn -- )
Provably Secure Grouping-proofs for RFID tags
Mike Burmester and Breno de Medeiros and Rossana Motta
2007/406 ( PS PS.GZ PDF )
Modeling Computational Security in Long-Lived Systems
Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira
2007/405 ( PDF )
Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
Michael Feng-Hao Liu and Chi-Jen Lu and Bo-Yin Yang and Jintai Ding
2007/404 ( PDF )
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Katz and Amit Sahai and Brent Waters
2007/403 ( PDF )
Turbo SHA-2
Danilo Gligoroski and Svein Johan Knapskog
2007/402 ( PDF )
Robust, Anonymous RFID Authentication with Constant Key-Lookup
Mike Burmester and Breno de Medeiros and Rossana Motta
2007/401 ( PDF )
Another Look at Automated Theorem-Proving
Neal Koblitz
2007/400 ( PDF )
REMARKS ON IBE SCHEME OF WANG AND CAO
Sunder Lal and Priyam Sharma
2007/399 ( PDF )
Ceremony Design and Analysis
Carl Ellison
2007/398 ( -- withdrawn -- )
A Short Signature Scheme in the Standard Model
Li Kang and Xiaohu Tang and Xianhui Lu and Jia Fan
2007/397 ( PDF )
On the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
2007/396 ( PDF )
Proxy Re-Signature Schemes without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
2007/395 ( PS PS.GZ PDF )
Second Preimage Attacks on Dithered Hash Functions
Charles Bouillaguet and Pierre-Alain Fouque and Adi Shamir and Sebastien Zimmer
2007/394 ( PS PS.GZ PDF )
Almost-everywhere Secure Computation
Juan A. Garay and Rafail Ostrovsky
2007/393 ( PDF )
Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms
Haining Fan and Jiaguang Sun and Ming Gu and Kwok-Yan Lam
2007/392 ( PDF )
Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups
Jonathan Trostle and Andy Parrish
2007/391 ( PDF )
A novel public key crypto system based on semi-modules over quotient semi-rings
Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki
2007/390 ( PDF )
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Augusto Jun Devegili and Michael Scott and Ricardo Dahab
2007/389 ( PDF )
Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
Dragos Florin Ciocan and Salil Vadhan
2007/388 ( PS PS.GZ PDF )
On Ciphertext Undetectability
Peter Gazi and Martin Stanek
2007/387 ( -- withdrawn -- )
Analysis of Local Optima in Block Ciphers
John A. Clark and Juan M. E. Tapiador
2007/386 ( PS PS.GZ PDF )
(Convertible) Undeniable Signatures without Random Oracles
Tsz Hon Yuen and Man Ho Au and Joseph K. Liu and Willy Susilo
2007/385 ( PDF )
On the insecurity of interchanged use of OFB and CBC modes of operation
Danilo Gligoroski
2007/384 ( PS PS.GZ PDF )
Non-Interactive Anonymous Credentials
Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya
2007/383 ( PDF )
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
Meng-Hui Lim and Sanggon Lee and Hoonjae Lee
2007/382 ( PDF )
Oblivious Transfer via McEliece's PKC and Permuted Kernels
K. Kobara and K. Morozov and R. Overbeck
2007/381 ( PDF )
Cryptanalysis of Two New Instances of TTM Cryptosystem
Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding
2007/380 ( PS PS.GZ PDF )
X-FCSR: a new software oriented stream cipher based upon FCSRs
Francois Arnault, Thierry P. Berger, Cédric Lauradoux and Marine Minier
2007/379 ( PDF )
On The Inequivalence Of Ness-Helleseth APN Functions
Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang
2007/378 ( PDF )
Algebraic Structure Defectoscopy
Sean O'Neil
2007/377 ( -- withdrawn -- )
Fast Point Multiplication on Elliptic Curves of Even Order
Rongquan Feng, Hongfeng Wu
2007/376 ( PDF )
An Efficient Range-Bounded Commitment Scheme
Zhengjun Cao
2007/375 ( PDF )
Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
Gregory Hirshman
2007/374 ( PS PS.GZ PDF )
On Factoring Arbitrary Integers with Known Bits
Mathias Herrmann and Alexander May
2007/373 ( PS PS.GZ PDF )
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
2007/372 ( PDF )
On the Authentication of One Popular Signcryption Scheme
Zhengjun Cao
2007/371 ( PDF )
Group-oriented encryption secure against collude attack
Chunbo Ma, Jun Ao, and Jianhua Li
2007/370 ( PDF )
FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu
2007/369 ( PDF )
Universally Composable Multi-Party Computation with an Unreliable Common Reference String
Vipul Goyal and Jonathan Katz
2007/368 ( PDF )
Reducing Trust in the PKG in Identity Based Cryptosystems
Vipul Goyal
2007/367 ( PDF )
Cryptanalysis of Rational Multivariate Public Key Cryptosystems
Jintai Ding and John Wagner
2007/366 ( PDF )
Breaking the Symmetry: a Way to Resist the New Differential Attack
Jintai Ding and Bo-Yin Yang and Chen-Mou Cheng and Owen Chen and Vivien Dubois
2007/365 ( PS PS.GZ PDF )
Pairings on Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
2007/364 ( PDF )
A Proof of Security of a Mesh Security Architecture
Doug Kuhlman and Ryan Moriarty and Tony Braskich and Steve Emeott and Mahesh Tripunitara
2007/363 ( PDF )
Fuzzy Private Matching (Extended Abstract)
{\L}ukasz Chmielewski and Jaap-Henk Hoepman
2007/362 ( PDF )
Statistical Testing for Disk Encryption Modes of Operations
Mohamed Abo El-Fotouh and Klaus Diepold
2007/361 ( PDF )
Proxy Re-encryption Systems for Identity-based Encryption
Toshihiko Matsuo
2007/360 ( PDF )
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Andy Rupp and Gregor Leander and Endre Bangerter and Ahmad-Reza Sadeghi and Alexander W. Dent
2007/359 ( PDF )
Intrusion-Resilient Secret Sharing
Stefan Dziembowski and Krzysztof Pietrzak
2007/358 ( PDF )
Improving the Round Complexity of VSS in Point-to-Point Networks
Jonathan Katz and Chiu-Yuen Koo and Ranjit Kumaresan
2007/357 ( PDF )
A Note on Signature Standards
Michael Braun and Anton Kargl
2007/356 ( PS PS.GZ PDF )
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
Christophe Petit and Francois-Xavier Standaert and Olivier Pereira and Tal G. Malkin and Moti Yung
2007/355 ( PDF )
Secret sharing on the infinite ladder
Laszlo Csirmaz
2007/354 ( PDF )
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Cheng-Kang Chu and Wen-Guey Tzeng
2007/353 ( PS PS.GZ PDF )
Multiparty Computation to Generate Secret Permutations
Chris Studholme and Ian Blake
2007/352 ( PS PS.GZ PDF )
New Local Collisions for the SHA-2 Hash Family
Somitra Kumar Sanadhya and Palash Sarkar
2007/351 ( PS PS.GZ PDF )
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Iftach Haitner and Jonathan J. Hoch and Gil Segev
2007/350 ( PS PS.GZ )
On Tweaking Luby-Rackoff Blockciphers
David Goldenberg and Susan Hohenberger and Moses Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu
2007/349 ( PS PS.GZ PDF )
Statistically Hiding Sets
Manoj Prabhakaran and Rui Xue
2007/348 ( PDF )
A Framework for Efficient and Composable Oblivious Transfer
Chris Peikert and Vinod Vaikuntanathan and Brent Waters
2007/347 ( PDF )
Lai-Massey Scheme and Quasi-Feistel Networks
Aaram Yun and Je Hong Park and Jooyoung Lee
2007/346 ( -- withdrawn -- )
Secure multi-party computation on incomplete networks
Shailesh Vaya
2007/345 ( PDF )
Analysis of Underlying Assumptions in NIST DRBGs
Wilson Kan
2007/344 ( PDF )
Security Analysis of WAPI Authentication and Key Exchange Protocol
Liufei Wu,Yuqing Zhang, FengjiaoWang
2007/343 ( PS PS.GZ PDF )
Updated standards for validating elliptic curves
Laura Hitt
2007/342 ( PDF )
A New Security Model for Cross-Realm C2C-PAKE Protocol
Fengjiao Wang and Yuqing Zhang
2007/341 ( PDF )
Multi-Party Indirect Indexing and Applications
Matthew Franklin and Mark Gondree and Payman Mohassel
2007/340 ( PDF )
Efficient Implementation of the Pairing on Mobilephones using BREW
Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka
2007/339 ( PDF )
On the security of a class of image encryption schemes
Chengqing Li and Guanrong Chen
2007/338 ( PS PS.GZ PDF )
VHASH Security
Wei Dai and Ted Krovetz
2007/337 ( PDF )
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
W. Bamberger and O. Welter and S. Spitz and M. Marhöfer
2007/336 ( PDF )
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
Onur Aciicmez and Werner Schindler
2007/335 ( PDF )
Encryption Techniques for Secure Database Outsourcing
Sergei Evdokimov and Oliver Guenther
2007/334 ( PDF )
New Constructions for UC Secure Computation using Tamper-proof Hardware
Nishanth Chandran and Vipul Goyal and Amit Sahai
2007/333 ( PS PS.GZ PDF )
Towards Key-Dependent Message Security in the Standard Model
Dennis Hofheinz and Dominique Unruh
2007/332 ( PS PS.GZ PDF )
Universally Composable Multiparty Computation with Partially Isolated Parties
Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
2007/331 ( PS PS.GZ PDF )
Isolated Proofs of Knowledge and Isolated Zero Knowledge
Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs
2007/330 ( PS PS.GZ PDF )
Remote Power Analysis of {RFID} Tags
Yossi Oren
2007/329 ( PDF )
A Tunable Broadcast Encryption Scheme
David Lubicz and Thomas Sirvent
2007/328 ( PDF )
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Ivan Damgaard and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner
2007/327 ( PDF )
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Ivan Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
2007/326 ( PDF )
Efficient Password-based Authenticated Key Exchange without Public Information
Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu
2007/325 ( PS PS.GZ )
Faster and Shorter Password-Authenticated Key Exchange
Rosario Gennaro
2007/324 ( PDF )
Towards provable security for route discovery protocols in mobile ad hoc networks
Mike Burmester and Breno de Medeiros
2007/323 ( PDF )
Attribute-Based Encryption with Non-Monotonic Access Structures
Rafail Ostrovsky and Amit Sahai and Brent Waters
2007/322 ( PS PS.GZ PDF )
Identifying Ideal Lattices
Jintai Ding and Richard Lindner
2007/321 ( PDF )
Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
Selcuk Kavut and Melek Diker Yucel
2007/320 ( PDF )
On the Big Gap Between $|p|$ and $|q|$ in DSA
Zhengjun Cao
2007/319 ( PDF )
A New Security Definition for Public Key Encryption Schemes and Its Applications
Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng
2007/318 ( PDF )
On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
Michael Neve and Kris Tiri
2007/317 ( PDF )
Improving Upon the TET Mode of Operation
Palash Sarkar
2007/316 ( PDF )
SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
Sunder Lal and Priyam Sharma
2007/315 ( PDF )
Security under Key-Dependent Inputs
Shai Halevi and Hugo Krawczyk
2007/314 ( -- withdrawn -- )
Formal Certification of Code-Based Cryptographic Proofs
G. Barthe and B. Gr{\'e}goire and R. Janvier and S. Zanella B{\'e}guelin
2007/313 ( PS PS.GZ PDF )
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Shengbao Wang and Zhenfu Cao and Zhaohui Cheng and Kim-Kwang Raymond Choo
2007/312 ( PDF )
Secure Similarity Search
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan
2007/311 ( PDF )
A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2007/310 ( PDF )
A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
Kwang Ho Kim
2007/309 ( PDF )
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Subhamoy Maitra
2007/308 ( PDF )
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
Selcuk Kavut and Melek Diker Yucel
2007/307 ( PS PS.GZ PDF )
Locally Invertible Boolean Mappings
Oleg A. Logachev
2007/306 ( PDF )
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
Thanh-Ha Le and Quoc-Thinh Nguyen-Vuong and Cécile Canovas and Jessy Clédière
2007/305 ( PDF )
On Non-Randomness of the Permutation after RC4 Key Scheduling
Goutam Paul and Subhamoy Maitra and Rohit Srivastava
2007/304 ( PDF )
A Bound on the Size of Separating Hash Families
Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson and Gregory M. Zaverucha
2007/303 ( PDF )
A Forward Secure Remote User Authentication Scheme
Manoj Kumar
2007/302 ( PDF )
Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori Kuwakado and Masakatu Morii
2007/301 ( PDF )
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Yuri Borissov and Moon Ho Lee and Svetla Nikova
2007/300 ( PS PS.GZ PDF )
A Note on Automata-based Dynamic Convolutional Cryptosystems
Renji Tao
2007/299 ( PDF )
Optimizing Multiprecision Multiplication for Public Key Cryptography
Michael Scott and Piotr Szczechowiak
2007/298 ( PDF )
The Security of the Extended Codebook (XCB) Mode of Operation
David A. McGrew and Scott R. Fluhrer
2007/297 ( PDF )
Secret sharing on infinite graphs
Laszlo Csirmaz
2007/296 ( PDF )
Construction of Efficient and Secure Pairing Algorithm and its Application
Doo Ho Choi, Dong-Guk Han, and Howon Kim
2007/295 ( PS PS.GZ PDF )
Linearization Attacks Against Syndrome Based Hashes
Markku-Juhani O. Saarinen
2007/294 ( PDF )
Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function
Julien Bringer and Herve Chabanne and Thomas Icart
2007/293 ( PDF )
Fully Resilient Traitor Tracing Scheme using Key Update
Eun Sun Yoo, Koutarou Suzuki and Myung-Hwan Kim
2007/292 ( PDF )
Improved security analysis of OMAC
Mridul Nandi
2007/291 ( PDF )
Relations Among Notions of Plaintext Awareness
James Birkett and Alexander W. Dent
2007/290 ( PDF )
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
Sumanta Sarkar and Subhamoy Maitra
2007/289 ( PDF )
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
Michael Backes and Matteo Maffei and Dominique Unruh
2007/288 ( PS PS.GZ PDF )
Secure Hybrid Encryption from Weakened Key Encapsulation
Dennis Hofheinz and Eike Kiltz
2007/287 ( PDF )
The Effectiveness of Receipt-Based Attacks on ThreeBallot
Kevin Henry and Douglas R. Stinson and Jiayuan Sui
2007/286 ( PDF )
Faster addition and doubling on elliptic curves
Daniel J. Bernstein and Tanja Lange
2007/285 ( PDF )
Solving MRHS linear equations
H{\aa}vard Raddum and Igor Semaev
2007/284 ( -- withdrawn -- )
No title
No Author
2007/283 ( PDF )
Provably Secure Framework for Information Aggregation is Sensor Networks
Mark Manulis and Joerg Schwenk
2007/282 ( PDF )
Analysis of countermeasures against access driven cache attacks on AES
Johannes Bl\"omer \and Volker Krummel
2007/281 ( PDF )
A Pollard-like pseudorandom number generator over EC
Grzegorz Wojtenko
2007/280 ( PDF )
On solving sparse algebraic equations over finite fields II
Igor Semaev
2007/279 ( PDF )
Lossy Trapdoor Functions and Their Applications
Chris Peikert and Brent Waters
2007/278 ( PDF )
A Framework for Iterative Hash Functions - HAIFA
Eli Biham and Orr Dunkelman
2007/277 ( PS PS.GZ PDF )
Cryptanalysis of a class of cryptographic hash functions
Praveen Gauravaram and John Kelsey
2007/276 ( PDF )
Prolific Codes with the Identifiable Parent Property
Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng
2007/275 ( PDF )
`Good' Pseudo-Random Binary Sequences from Elliptic Curves
Zhixiong CHEN and Guozhen XIAO
2007/274 ( PDF )
Group-based Proxy Re-encryption scheme
Chunbo Ma, Jun Ao, and Jianhua Li
2007/273 ( PDF )
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
Mihir Bellare and Sarah Shoup
2007/272 ( PS PS.GZ PDF )
Cryptanalysis of a Hash Function Proposed at ICISC 2006
Willi Geiselmann and Rainer Steinwandt
2007/271 ( PDF )
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Mihir Bellare and Thomas Ristenpart
2007/270 ( PDF )
Secret Ballot Elections with Unconditional Integrity
David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora
2007/269 ( PDF )
Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
Jeroen van de Graaf
2007/268 ( PDF )
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Erik Dahmen and Katsuyuki Okeya and Daniel Schepers
2007/267 ( PDF )
CRUST: Cryptographic Remote Untrusted Storage without Public Keys
Erel Geron and Avishai Wool
2007/266 ( PDF )
Filling the Gap between Voters and Cryptography in e-Voting
Wei Han and Dong Zheng and Ke-fei Chen
2007/265 ( PDF )
Which Languages Have 4-Round Zero-Knowledge Proofs?
Jonathan Katz
2007/264 ( PDF )
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Thomas Ristenpart and Scott Yilek
2007/263 ( -- withdrawn -- )
Efficiency Improvement for NTRU
Johannes Buchmann and Martin D{\"o}ring and Richard Lindner
2007/262 ( PS PS.GZ PDF )
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Yong Ho Hwang and Joseph K. Liu and Sherman S.M. Chow
2007/261 ( PDF )
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Subhamoy Maitra and Goutam Paul
2007/260 ( PDF )
An Efficient One-move Nominative Signature Scheme
Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong
2007/259 ( PDF )
Algebraic Immunity Hierarchy of Boolean Functions
Ziran Tu and Yingpu Deng
2007/258 ( PDF )
UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
Ulrich Kaiser
2007/257 ( PDF )
A Forward-Secure Signature with Backward-Secure Detection
Dai-Rui Lin and Chih-I Wang
2007/256 ( PDF )
Aspects of Pairing Inversion
S. D. Galbraith and F. Hess and F. Vercauteren
2007/255 ( -- withdrawn -- )
Efficient Identity Based Signature in Standard Model
S.Narayan
2007/254 ( -- withdrawn -- )
Fully Secure Proxy Re-Encryption without Random Oracles
Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang
2007/253 ( PDF )
Choosing the correct elliptic curve in the CM method
K. Rubin and A. Silverberg
2007/252 ( PDF )
A Verifiable Voting Protocol based on Farnel
Roberto Araujo, Ricardo Felipe Custodio, and Jeroen van de Graaf
2007/251 ( PS PS.GZ PDF )
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
V{\'e}ronique Cortier and Ralf Kuesters and Bogdan Warinschi
2007/250 ( PDF )
Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
Hongzhen Du and Qiaoyan Wen
2007/249 ( PDF )
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Serge Fehr and Christian Schaffner
2007/248 ( PS PS.GZ PDF )
1. AES seems weak. 2. Linear time secure cryptography
Warren D. Smith
2007/247 ( PS PS.GZ PDF )
A Note on the Ate Pairing
Chang-An Zhao and Fangguo Zhang and Jiwu Huang
2007/246 ( PDF )
BEDA: Button-Enabled Device Pairing
Claudio Soriente and Gene Tsudik and Ersin Uzun
2007/245 ( PS PS.GZ PDF )
Incorporating Temporal Capabilities in Existing Key Management Schemes
Mikhail J. Atallah and Marina Blanton and Keith B. Frikken
2007/244 ( PDF )
A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
Martin Hlavac and Tomas Rosa
2007/243 ( -- withdrawn -- )
PORs: Proofs of Retrievability for Large Files
Ari Juels and Burton S. Kaliski Jr.
2007/242 ( PDF )
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
Khoongming Khoo, Guanhan Chew, Guang Gong and Hian-Kiat Lee
2007/241 ( PDF )
Attribute Based Group Signature with Revocation
Dalia Khader
2007/240 ( PDF )
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
George I. Davida and Jeremy A. Hansen
2007/239 ( PS PS.GZ PDF )
Making Large Hash Functions From Small Compression Functions
William R. Speirs and Ian Molloy
2007/238 ( PDF )
Long-lived digital integrity using short-lived hash functions
Stuart Haber
2007/237 ( PDF )
Forward-secure Key Evolution in Wireless Sensor Networks
Marek Klonowski and Miros\l{}aw Kuty\l{}owski and Micha\l{} Ren and Katarzyna Rybarczyk
2007/236 ( PS PS.GZ PDF )
Certificateless Ring Signatures
Sherman S.M. Chow and Wun-She Yap
2007/235 ( PDF )
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Matthew Green and Susan Hohenberger
2007/234 ( PDF )
Provable-Security Analysis of Authenticated Encryption in Kerberos
Alexandra Boldyreva and Virendra Kumar
2007/233 ( PDF )
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Michael Backes and Markus Duermuth and Ralf Kuesters
2007/232 ( -- withdrawn -- )
A new paradigm of chosen ciphertext secure public key encryption scheme
Xianhui Lu, Xuejia Lai, Dake He
2007/231 ( PS PS.GZ PDF )
Secure Two-Party k-Means Clustering
Paul Bunn and Rafail Ostrovsky
2007/230 ( PS PS.GZ PDF )
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Gautham Sekar and Souradyuti Paul and Bart Preneel
2007/229 ( PS PS.GZ PDF )
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Ueli Maurer and Stefano Tessaro
2007/228 ( PS PS.GZ PDF )
AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi
2007/227 ( PDF )
Related-Key Statistical Cryptanalysis
Darakhshan J. Mir and Poorvi L. Vora
2007/226 ( PDF )
Generalized mix functions and orthogonal equitable rectangles
Douglas R. Stinson
2007/225 ( PDF )
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
Shengli Liu and Xiaofeng Chen and Fangguo Zhang
2007/224 ( PDF )
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
*Jue-Sam Chou 1, Guey-Chuen Lee 2, Chung-Ju Chan 3
2007/223 ( PS PS.GZ PDF )
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black and Martin Cochran and Thomas Shrimpton
2007/222 ( PS PS.GZ PDF )
Towards Security Limits in Side-Channel Attacks
Francois-Xavier Standaert and Eric Peeters and Cedric Archambeau and Jean-Jacques Quisquater
2007/221 ( PS PS.GZ PDF )
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla and Eike Kiltz and Gregory Neven
2007/220 ( PDF )
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
Fengjiao WANG and Yuqing ZHANG
2007/219 ( PDF )
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
Liufei Wu1, 2, Yuqing Zhang1, Fengjiao Wang1
2007/218 ( PDF )
Differential Cryptanalysis in Stream Ciphers
Eli Biham and Orr Dunkelman
2007/217 ( PS PS.GZ PDF )
Identity-Based Broadcast Encryption
Ryuichi Sakai and Jun Furukawa
2007/216 ( PS PS.GZ PDF )
Unlinkable Divisible Digital Cash without Trusted Third Party
Pawel Pszona and Grzegorz Stachowiak
2007/215 ( PS PS.GZ PDF )
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
Jesper Buus Nielsen
2007/214 ( PDF )
Matrix Power S-Box Construction
Eligijus Sakalauskas and Kestutis Luksys
2007/213 ( PDF )
Unlinkable Randomizable Signature and Its Application in Group Signature
Sujing Zhou and Dongdai Lin
2007/212 ( PDF )
The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.
Andrey Khalyavin
2007/211 ( PDF )
Scalable Storage Scheme from Forward Key Rotation
Chunbo Ma, Jun Ao, and Jianhua Li
2007/210 ( -- withdrawn -- )
Efficient chosen ciphertext secure PKE scheme with short ciphertext
Xianhui Lu, Xuejia Lai, Dake He, Guomin Li
2007/209 ( PDF )
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Liqun Chen and Qiang Tang
2007/208 ( PDF )
RC4 State Information at Any Stage Reveals the Secret Key
Goutam Paul and Subhamoy Maitra
2007/207 ( PDF )
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
2007/206 ( PS PS.GZ PDF )
Automatic Search of Differential Path in MD4
Pierre-Alain Fouque and Gaetan Leurent and Phong Nguyen
2007/205 ( PS PS.GZ PDF )
A kilobit special number field sieve factorization
Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen Lenstra and Dag Arne Osvik
2007/204 ( PDF )
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
Shu Yun Lim and Chuan Chin Pu and Hyo Taek Lim and Hoon Jae Lee
2007/203 ( PDF )
Kipnis-Shamir's Attack on HFE Revisited
Xin Jiang and Jintai Ding and Lei Hu
2007/202 ( PDF )
Provable Data Possession at Untrusted Stores
Giuseppe Ateniese and Randal Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary Peterson and Dawn Song
2007/201 ( PDF )
The BBG HIBE Has Limited Delegation
Hovav Shacham
2007/200 ( PDF )
ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
Philip Atzemoglou and Tal Malkin
2007/199 ( PDF )
A Framework for Game-Based Security Proofs
David Nowak
2007/198 ( PS PS.GZ PDF )
Mutual Information Analysis -- A Universal Differential Side-Channel Attack
Benedikt Gierlichs and Lejla Batina and Pim Tuyls
2007/197 ( PS PS.GZ PDF )
On-Line Ciphers and the Hash-CBC Constructions
Mihir Bellare and Alexandra Boldyreva and Lars Knudsen and Chanathip Namprempre
2007/196 ( -- withdrawn -- )
An Efficient Certificateless Signature Scheme
Rafael Castro and Ricardo Dahab
2007/195 ( PDF )
Verifying Statistical Zero Knowledge with Approximate Implementations
Ling Cheung and Sayan Mitra and Olivier Pereira
2007/194 ( PDF )
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
Ernie Brickell and Jiangtao Li
2007/193 ( PDF )
Some Identity Based Strong Bi-Designated Verifier Signature Schemes
Sunder Lal and Vandani Verma
2007/192 ( PDF )
Optimal Irreducible Polynomials for GF(2^m) Arithmetic
Michael Scott
2007/191 ( PDF )
Deniable Internet Key-Exchange
Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu
2007/190 ( PDF )
Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
Tian Yuan
2007/189 ( PS PS.GZ PDF )
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee
2007/188 ( PDF )
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Kim-Kwang Raymond Choo
2007/187 ( PDF )
Executing Modular Exponentiation on a Graphics Accelerator
Andrew Moss and Dan Page and Nigel Smart
2007/186 ( PS PS.GZ PDF )
Fully Anonymous Group Signatures without Random Oracles
Jens Groth
2007/185 ( PDF )
New FORK-256
Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee
2007/184 ( PDF )
Provable password-based tripartite key agreement protocol
Chunbo Ma, Jun Ao, and Jianhua Li
2007/183 ( PDF )
Provably Secure Ciphertext Policy ABE
Ling Cheung and Calvin Newport
2007/182 ( PDF )
Optimistic Fair Exchange in a Multi-user Setting
Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum
2007/181 ( PDF )
A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
Kwang Ho Kim and So In Kim
2007/180 ( PDF )
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
*Jue-Sam Chou 1, Yalin Chen 2, Tsung-Heng Chen 3
2007/179 ( PDF )
New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
Kwang Ho Kim and So In Kim and Ju Song Choe
2007/178 ( PS PS.GZ )
Utility Sampling for Trust Metrics in PKI
Dakshi Agrawal and Charanjit Jutla
2007/177 ( PDF )
Space-Efficient Identity Based Encryption Without Pairings
Dan Boneh and Craig Gentry and Michael Hamburg
2007/176 ( PS PS.GZ PDF )
Seven-Property-Preserving Iterated Hashing: ROX
Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton
2007/175 ( PDF )
Embedding Degree of Hyperelliptic Curves with Complex Multiplication
Christian Robenhagen Ravnshoj
2007/174 ( PS PS.GZ PDF )
Counting hyperelliptic curves that admit a Koblitz model
Cevahir Demirkiran and Enric Nart
2007/173 ( PDF )
Provable Secure Generalized Signcryption
Xu An Wang and Xiaoyuan Yang and Yiliang Han
2007/172 ( PDF )
Batch Verification of Short Signatures
Jan Camenisch and Susan Hohenberger and Michael {\O}stergaard Pedersen
2007/171 ( PDF )
Chosen-Ciphertext Secure Proxy Re-Encryption
Ran Canetti and Susan Hohenberger
2007/170 ( PDF )
Clone Resistant Mutual Authentication for Low-Cost RFID Technology
Stephane Lemieux and Adrian Tang
2007/169 ( PDF )
On the Security of Protocols with Logarithmic Communication Complexity
Michael Backes and Dominique Unruh
2007/168 ( PDF )
Random Oracles and Auxiliary Input
Dominique Unruh
2007/167 ( PDF )
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)
Yi-Ru Liu, Wen-Guey Tzeng
2007/166 ( PS PS.GZ PDF )
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
Junghyun Nam
2007/165 ( PDF )
Inductive Proof Method for Computational Secrecy
Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
2007/164 ( PDF )
Yet Another MicroArchitectural Attack: Exploiting I-cache
Onur Aciicmez
2007/163 ( PDF )
Secure Deniable Authenticated Key Establishment for Internet Protocols
Meng-Hui Lim and Sanggon Lee and Youngho Park and Sangjae Moon
2007/162 ( PS PS.GZ PDF )
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
Jens-Matthias Bohli and Joern Mueller-Quade and Stefan Roehrich
2007/161 ( PDF )
Collusion-Resistant Group Key Management Using Attribute-Based Encryption
Ling Cheung and Joseph A. Cooley and Roger Khazan and Calvin Newport
2007/160 ( PS PS.GZ )
Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
Muxiang Zhang
2007/159 ( PDF )
Attribute Based Group Signatures
Dalia Khader
2007/158 ( PS PS.GZ PDF )
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
Mridul Nandi
2007/157 ( PDF )
ConSum v0: An Experimental Cipher
David A. Madore
2007/156 ( PDF )
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Gergei Bana and Koji Hasebe and Mitsuhiro Okada
2007/155 ( PS PS.GZ PDF )
Efficient Non-interactive Proof Systems for Bilinear Groups
Jens Groth and Amit Sahai
2007/154 ( PDF )
Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
Danilo Gligoroski and Svein Johan Knapskog
2007/153 ( PS PS.GZ PDF )
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
Aggelos Kiayias and Moti Yung
2007/152 ( PS PS.GZ PDF )
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
Nicolas T. Courtois
2007/151 ( PS PS.GZ PDF )
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Tal Moran and Moni Naor and Gil Segev
2007/150 ( PS PS.GZ PDF )
Generators of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnshoj
2007/149 ( PS PS.GZ PDF )
Towards Generating Secure Keys for Braid Cryptography
Ki Hyoung Ko and Jang Won Lee and Tony Thomas
2007/148 ( PDF )
Practical Compact E-Cash
Man Ho Au and Willy Susilo and Yi Mu
2007/147 ( PDF )
Using decision problems in public key cryptography
Vladimir Shpilrain and Gabriel Zapata
2007/146 ( PDF )
Time Capsule Signature: Efficient and Provably Secure Constructions
Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng
2007/145 ( PS PS.GZ PDF )
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
Iftach Haitner and Jonathan J. Hoch and Omer Reingold and Gil Segev
2007/144 ( PS PS.GZ )
Two New Examples of TTM
T.Moh
2007/143 ( PDF )
Offline/Online Mixing
Ben Adida and Douglas Wikström
2007/142 ( PDF )
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
2007/141 ( PDF )
Practical Cryptanalysis of SFLASH
Vivien Dubois and Pierre-Alain Fouque and Adi Shamir and Jacques Stern
2007/140 ( PDF )
Hidden Identity-Based Signatures
Aggelos Kiayias and Hong-Sheng Zhou
2007/139 ( PDF )
The Delivery and Evidences Layer
Amir Herzberg and Igal Yoffe
2007/138 ( PS PS.GZ PDF )
Efficient Pairing Computation on Curves
Rongquan Feng and Hongfeng Wu
2007/137 ( PDF )
Multivariates Polynomials for Hashing
Jintai Ding and Bo-yin Yang
2007/136 ( -- withdrawn -- )
Fair Exchange Signature Schemes
Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
2007/135 ( PDF )
Efficient ID-based Signature Without Trusted PKG
Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang
2007/134 ( PDF )
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
Osman Kocar
2007/133 ( PDF )
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
Helger Lipmaa
2007/132 ( PDF )
Equivocal Blind Signatures and Adaptive UC-Security
Aggelos Kiayias and Hong-Sheng Zhou
2007/131 ( PDF )
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi-Naini
2007/130 ( PDF )
Some Results on Anonymity in Hybrid Encryption
Tian Yuan and Chen Zhi-Yu and Jin Yuee and Jin Feng and Ma Huihui
2007/129 ( PS PS.GZ PDF )
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
Cameron McDonald, Chris Charnes, Josef Pieprzyk
2007/128 ( PS PS.GZ PDF )
Computationally Sound Mechanized Proofs of Correspondence Assertions
Bruno Blanchet
2007/127 ( PS PS.GZ PDF )
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
Vanesa Daza and Javier Herranz and Paz Morillo and Carla R\`afols
2007/126 ( PDF )
An Interesting Member ID-based Group Signature
Sujing Zhou and Dongdai Lin
2007/125 ( PDF )
Attacking the IPsec Standards in Encryption-only Configurations
Jean Paul Degabriele and Kenneth G. Paterson
2007/124 ( PDF )
Rebuttal of overtaking VEST
Benjamin Gittins and Howard Landman
2007/123 ( PDF )
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Berkant Ustaoglu
2007/122 ( PDF )
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
Qiang Tang
2007/121 ( PS PS.GZ PDF )
Certificateless Encryption Schemes Strongly Secure in the Standard Model
Alexander W. Dent and Benoit Libert and Kenneth G. Paterson
2007/120 ( PDF )
Breaking 104 bit WEP in less than 60 seconds
Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin
2007/119 ( PDF )
Rerandomizable RCCA Encryption
Manoj Prabhakaran and Mike Rosulek
2007/118 ( PDF )
Smooth Projective Hashing and Two-Message Oblivious Transfer
Shai Halevi and Yael Tauman Kalai
2007/117 ( PDF )
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
Sihem Mesnager
2007/116 ( PDF )
A Zero-Knowledge Identification and Key Agreement Protocol
D.R. Stinson and J. Wu
2007/115 ( PDF )
Quadratic Almost Perfect Nonlinear Functions With Many Terms
Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire
2007/114 ( PDF )
High Efficiency Feedback Shift Register: $\sigma-$LFSR
Guang Zeng and Wenbao Han and Kaicheng He
2007/113 ( PDF )
An Enhanced ID-based Deniable Authentication Protocol on Pairings
Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee
2007/112 ( PDF )
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
Koh-ichi Nagao
2007/111 ( PS PS.GZ PDF )
Privacy-Preserving Distributed Set Intersection
Qingsong Ye and Huaxiong Wang and Christophe Tartary
2007/110 ( PDF )
Construction of Pairing-Friendly Elliptic Curves
Woo Sug Kang
2007/109 ( PDF )
How to Enrich the Message Space of a Cipher
Thomas Ristenpart and Phillip Rogaway
2007/108 ( PDF )
An Improved Distinguisher for Dragon
Joo Yeon Cho and Josef Pieprzyk
2007/107 ( PDF )
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
Yasuyuki MURAKAMI, Takeshi NASAKO
2007/106 ( PDF )
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
Masao KASAHARA
2007/105 ( PS PS.GZ PDF )
Isodual Reduction of Lattices
Nicholas A. Howgrave-Graham
2007/104 ( PS PS.GZ PDF )
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel
2007/103 ( PDF )
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
Roberto Avanzi
2007/102 ( PDF )
On the Role of Scheduling in Simulation-Based Security
Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira
2007/101 ( PS PS.GZ PDF )
Practical Password Recovery on an MD5 Challenge and Response
Yu Sasaki and Go Yamamoto and Kazumaro Aoki
2007/100 ( PS PS.GZ PDF )
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Shengbao Wang and Zhenfu Cao
2007/099 ( PDF )
Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
Jaime Gutierrez and Alvar Ibeas
2007/098 ( PS PS.GZ PDF )
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
Lilya Budaghyan and Claude Carlet
2007/097 ( PS PS.GZ PDF )
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
Christian Robenhagen Ravnsh{\o}j
2007/096 ( PS PS.GZ PDF )
Somos Sequence Near-Addition Formulas and Modular Theta Functions
R. Wm. Gosper and Rich Schroeppel
2007/095 ( PDF )
Generic Certificateless Encryption in the Standard Model
Qiong Huang and Duncan S. Wong
2007/094 ( PDF )
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
Xavier Boyen
2007/093 ( PDF )
HAPADEP: Human Asisted Pure Audio Device Pairing
Claudio Soriente, Gene Tsudik, Ersin Uzun
2007/092 ( PDF )
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
Grzegorz Wojtenko
2007/091 ( PDF )
Arithmetic Operators for Pairing-Based Cryptography
Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto
2007/090 ( -- withdrawn -- )
On the security of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen
2007/089 ( PS PS.GZ PDF )
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Ueli Maurer and Dominik Raub
2007/088 ( PDF )
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
Domingo Gomez and Jaime Gutierrez and Alvar Ibeas
2007/087 ( PDF )
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
Jie Liu and Jianhua Li
2007/086 ( PS PS.GZ PDF )
Non-Interactive Proofs for Integer Multiplication
Ivan Damgard and Rune Thorbek
2007/085 ( PS PS.GZ PDF )
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Hongbo Yu, Xiaoyun Wang
2007/084 ( PS PS.GZ PDF )
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
Sanjit Chatterjee and Palash Sarkar
2007/083 ( PDF )
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
Brett Hemenway and Rafail Ostrovsky
2007/082 ( PS PS.GZ PDF )
Deniable Authentication on the Internet
Shaoquan Jiang
2007/081 ( PDF )
Revisiting an Efficient Elliptic Curve Key Agreement Protocol
Maurizio Adriano Strangio
2007/080 ( -- withdrawn -- )
Weakly only Unforgeable Signature and Its Application in Group Signature
Sujing Zhou, Dongdai Lin
2007/079 ( PS PS.GZ PDF )
How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki and Kaoru Kurosawa
2007/078 ( PS PS.GZ PDF )
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Zuzana Beerliova-Trubiniova and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas
2007/077 ( -- withdrawn -- )
On bent functions with zero second derivatives
Sugata Gangopadhyay
2007/076 ( PDF )
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru Kurosawa and Kazuhiro Suzuki
2007/075 ( PS PS.GZ PDF )
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Gautham Sekar and Souradyuti Paul and Bart Preneel
2007/074 ( PDF )
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
Hovav Shacham
2007/073 ( PS PS.GZ PDF )
Public Key Encryption that Allows PIR Queries
Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III
2007/072 ( -- withdrawn -- )
A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
Namin Yu and Howard M. Heys
2007/071 ( PS PS.GZ PDF )
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
Ahto Buldas and Sven Laur
2007/070 ( PS PS.GZ PDF )
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
Alexander Maximov
2007/069 ( PDF )
Nominative Signature: Application, Security Model and Construction
Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo
2007/068 ( -- withdrawn -- )
Efficient Hierarchical Identity Based Signature in the Standard Model
Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
2007/067 ( -- withdrawn -- )
withdrawn
withdrawn
2007/066 ( PDF )
Low-Density Attack Revisited
Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama
2007/065 ( PDF )
How to Derive Lower Bound on Oblivious Transfer Reduction
Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba
2007/064 ( PDF )
Algebraic Lower Bounds for Computing on Encrypted Data
Rafail Ostrovsky and William E. Skeith III
2007/063 ( PS PS.GZ PDF )
Constructing new APN functions from known ones
Lilya Budaghyan and Claude Carlet and Gregor Leander
2007/062 ( PS PS.GZ PDF )
Algebraic and Slide Attacks on KeeLoq
Nicolas T. Courtois and Gregory V. Bard and David Wagner
2007/061 ( PDF )
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
Neil Costigan and Michael Scott
2007/060 ( PDF )
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Yonatan Aumann and Yehuda Lindell
2007/059 ( PS PS.GZ PDF )
A Survey of Single Database PIR: Techniques and Applications
Rafail Ostrovsky and William E. Skeith III
2007/058 ( PS PS.GZ PDF )
The simplest method for constructing APN polynomials EA-inequivalent to power functions
Lilya Budaghyan
2007/057 ( PDF )
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
David Freeman
2007/056 ( PS PS.GZ )
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney
2007/055 ( PDF )
Cryptanalysis of the KeeLoq block cipher
Andrey Bogdanov
2007/054 ( PS PS.GZ PDF )
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
Souradyuti Paul
2007/053 ( PS PS.GZ PDF )
Compiler Assisted Elliptic Curve Cryptography
M. Barbosa and A. Moss and D. Page
2007/052 ( PS PS.GZ PDF )
Forward-Secure Sequential Aggregate Authentication
Di Ma, and Gene Tsudik
2007/051 ( PDF )
Forward-secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester and Breno de Medeiros
2007/050 ( PDF )
Special block cipher family DN and new generation SNMAC-type hash function family HDN
Vlastimil KLIMA
2007/049 ( PDF )
Security Arguments for a Class of ID-based Signatures
jin zhou and ya-juan zhang and yue-fei zhu
2007/048 ( PDF )
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Daniel R. L. Brown and Kristian Gj{\o}steen
2007/047 ( PDF )
New Constructions of Fuzzy Identity-Based Encryption
Joonsang Baek and Willy Susilo and Jianying Zhou
2007/046 ( PS PS.GZ )
Direct Reduction of String (1,2)-OT to Rabin's OT
Kaoru Kurosawa and Takeshi Koshiba
2007/045 ( PDF )
A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
Jean-Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2007/044 ( PDF )
Design and Primitive Specification for Shannon
Philip Hawkes and Cameron McDonald and Michael Paddon and Gregory Rose and Miriam Wiggers de Vries
2007/043 ( PS PS.GZ PDF )
Reflection Attacks on Product Ciphers
Orhun Kara
2007/042 ( PDF )
Authorship Proof for Textual Document
J. Wu and D. R. Stinson
2007/041 ( PS PS.GZ PDF )
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
B. Skoric and S. Katzenbeisser and M.U. Celik
2007/040 ( PS PS.GZ PDF )
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
Pradeep Kumar Mishra and Vassil Dimitrov
2007/039 ( PDF )
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Onur Aciicmez and Shay Gueron and Jean-Pierre Seifert
2007/038 ( PDF )
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Joo Yeon Cho and Josef Pieprzyk
2007/037 ( PDF )
Best Quadratic Approximations of Cubic Boolean Functions
Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis
2007/036 ( PDF )
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
Eike Kiltz
2007/035 ( PS PS.GZ PDF )
Cryptanalysis of white box DES implementations
Louis Goubin and Jean-Michel Masereel and Michael Quisquater
2007/034 ( PDF )
A New Type of Cipher: DICING_CSB
Li An-Ping
2007/033 ( PDF )
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Eike Kiltz
2007/032 ( PDF )
An improved collision probability for CBC-MAC and PMAC
Avradip Mandal and Mridul Nandi
2007/031 ( PDF )
Improved Security Analysis of PMAC
Mridul Nandi and Avradip Mandal
2007/030 ( PS PS.GZ PDF )
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang Cui and Eiichiro Fujisaki and Goichiro Hanaoka and Hideki Imai and Rui Zhang
2007/029 ( PDF )
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Debrup Chakraborty and Palash Sarkar
2007/028 ( PS PS.GZ )
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
Debrup Chakraborty and Palash Sarkar
2007/027 ( -- withdrawn -- )
Verifying Data Integrity with Few Queries to Untrusted Memory
Nachiketh R. Potlapally
2007/026 ( PS PS.GZ PDF )
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Shengbao Wang and Zhenfu Cao and Maurizio Adriano Strangio and Lihua Wang
2007/025 ( PDF )
Private Locally Decodable Codes
Rafail Ostrovsky and Omkant Pandey and Amit Sahai
2007/024 ( PDF )
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
Gregory V. Bard, and Nicolas T. Courtois, and Chris Jefferson.
2007/023 ( PDF )
Efficient Hybrid Encryption from ID-Based Encryption
Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz
2007/022 ( PS PS.GZ PDF )
On Perfectly Balanced Boolean Functions
O. A. Logachev
2007/021 ( PDF )
Two Trivial Attacks on Trivium
Alexander Maximov and Alex Biryukov
2007/020 ( PDF )
TinyTate: Identity-Based Encryption for Sensor Networks
Leonardo B. Oliveira and Diego Aranha and Eduardo Morais and Felipe Daguano and Julio Lo'pez and Ricardo Dahab
2007/019 ( PDF )
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Changshe Ma, Jian Weng and Dong Zheng
2007/018 ( PS PS.GZ PDF )
Strongly-Secure Identity-based Key Agreement and Anonymous Extension
Sherman S.M. Chow and Kim-Kwang Raymond Choo
2007/017 ( PDF )
Group Decryption
Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu and Yumin Wang
2007/016 ( -- withdrawn -- )
VEST Ciphers
Sean O'Neil and Benjamin Gittins and Howard A. Landman
2007/015 ( PS PS.GZ PDF )
Group Encryption
Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
2007/014 ( PDF )
Invertible Universal Hashing and the TET Encryption Mode
Shai Halevi
2007/013 ( PDF )
Optimised versions of the Ate and Twisted Ate Pairings
Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto
2007/012 ( PDF )
Interactive two-channel message authentication based on interactive-collision Resistant hash functions
Atefeh Mashatan and Douglas R. Stinson
2007/011 ( PDF )
Universally Composable Key-evolving Signature
Jin Zhou and TingMao Chang and YaJuan Zhang and YueFei Zhu
2007/010 ( PDF )
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
David Freeman and Kristin Lauter
2007/009 ( PDF )
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
Zhenfu Cao, Xiaolei Dong and Licheng Wang
2007/008 ( PS PS.GZ PDF )
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
Dong Hoon Lee and Je Hong Park and Jaewoo Han
2007/007 ( PDF )
One-Round ID-Based Blind Signature Scheme without ROS Assumption
Wei Gao and Xueli Wang and Guilin Wang and Fei Li
2007/006 ( PDF )
Efficient Dynamic k-Times Anonymous Authentication
Lan Nguyen
2007/005 ( PDF )
Privacy-Protecting Coupon System Revisited
Lan Nguyen
2007/004 ( PDF )
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
*Jue-Sam Chou, Yalin Chen, Chung-Ju Chan
2007/003 ( PS PS.GZ PDF )
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
Johann Groszschaedl and Alexander Szekely and Stefan Tillich
2007/002 ( -- withdrawn -- )
Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
Huang Lin and Zhenfu Cao
2007/001 ( PS PS.GZ PDF )
Families of genus 2 curves with small embedding degree
Laura Hitt
2006/486 ( PDF )
Inductive Trace Properties for Computational Security
Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell
2006/485 ( PDF )
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori Kuwakado and Masakatu Morii
2006/484 ( -- withdrawn -- )
A New Identity Based Encryption Scheme From Pairing
Xianhui Lu , Dake He, Guomin Li
2006/483 ( PS PS.GZ PDF )
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
2006/482 ( PS PS.GZ PDF )
Countermeasures for the Simple Branch Prediction Analysis
Giovanni Agosta and Gerardo Pelosi
2006/481 ( PS PS.GZ PDF )
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Donghoon Chang
2006/480 ( PDF )
Cryptanalysis of REESSE1+ Public Key Cryptosystem
Shengli Liu and Fangguo Zhang
2006/479 ( PS PS.GZ PDF )
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
2006/478 ( PS PS.GZ PDF )
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
Donghoon Chang
2006/477 ( PS PS.GZ PDF )
Dynamic Cryptographic Hash Functions
William R. Speirs II and Samuel S. Wagstaff, Jr.
2006/476 ( PS PS.GZ PDF )
Password-Authenticated Multi-Party Key Exchange with Different Passwords
Jeong Ok Kwon and Ik Rae Jeong and Kouichi Sakurai and Dong Hoon Lee
2006/475 ( PS PS.GZ PDF )
New Technique for Solving Sparse Equation Systems
Håvard Raddum and Igor Semaev
2006/474 ( PDF )
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
Chang-An Zhao and Fangguo Zhang and Jiwu Huang
2006/473 ( PDF )
Identity-Based Proxy Re-encryption
Matthew Green and Giuseppe Ateniese
2006/472 ( PS PS.GZ PDF )
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
Luis Teixeira d'Aguiar Norton Brandao
2006/471 ( PDF )
Multiplication and Squaring on Pairing-Friendly Fields
Augusto Jun Devegili and Colm \'O~h\'Eigeartaigh and Michael Scott and Ricardo Dahab
2006/470 ( PS PS.GZ PDF )
On the security of a group key agreement protocol
Qiang Tang
2006/469 ( PS PS.GZ PDF )
An Attack on Disguised Elliptic Curves
David Mireles
2006/468 ( PDF )
White Box Cryptography: Another Attempt
Julien Bringer and Herve Chabanne and Emmanuelle Dottax
2006/467 ( PS PS.GZ PDF )
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
Donghoon Chang and Moti Yung
2006/466 ( PDF )
Prime Order Primitive Subgroups in Torus-Based Cryptography
Jason E. Gower
2006/465 ( PS PS.GZ )
Security and Composition of Cryptographic Protocols: A Tutorial
Ran Canetti
2006/464 ( PDF )
Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik
2006/463 ( PS PS.GZ PDF )
Obfuscation for Cryptographic Purposes
Dennis Hofheinz and John Malone-Lee and Martijn Stam
2006/462 ( PDF )
Improved Collision and Preimage Resistance Bounds on PGV Schemes
Lei Duo and Chao Li
2006/461 ( PS PS.GZ )
On Post-Modern Cryptography
Oded Goldreich
2006/460 ( PS PS.GZ PDF )
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
Donghoon Chang
2006/459 ( PDF )
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
Claude Carlet
2006/458 ( PS PS.GZ PDF )
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
Aggelos Kiayias and Moti Yung
2006/457 ( PDF )
Linear Approximating to Integer Addition
Li An-Ping
2006/456 ( PDF )
Indistinguishability Amplification
Ueli Maurer and Krzysztof Pietrzak and Renato Renner
2006/455 ( PS PS.GZ PDF )
On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
Jonathan Katz
2006/454 ( PS PS.GZ PDF )
How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich
2006/453 ( PDF )
Key Replacement Attack on a Certificateless Signature Scheme
Zhenfeng Zhang and Dengguo Feng
2006/452 ( PDF )
Hybrid Protocol For Password-based Key Exchange in Three-party Setting
TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu
2006/451 ( PDF )
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Jongsung Kim
2006/450 ( PS PS.GZ PDF )
Secure Cryptographic Workflow in the Standard Model
M. Barbosa and P. Farshim
2006/449 ( PS PS.GZ PDF )
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
Mihir Bellare and Phillip Rogaway
2006/448 ( PS PS.GZ PDF )
Universally Composable and Forward Secure RFID Authentication and Key Exchange
Tri van Le, Mike Burmester, Breno de Medeiros
2006/447 ( PS PS.GZ )
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Yael Gertner and Tal Malkin and Steven Myers
2006/446 ( PS PS.GZ PDF )
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo
2006/445 ( PS PS.GZ PDF )
A class of quadratic APN binomials inequivalent to power functions
Lilya Budaghyan and Claude Carlet and Gregor Leander
2006/444 ( PS PS.GZ PDF )
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
Chris Peikert and Alon Rosen
2006/443 ( PS PS.GZ PDF )
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Yvo Desmedt and Tanja Lange and Mike Burmester
2006/442 ( PDF )
An attack on the certificateless signature scheme from EUC Workshops 2006
Je Hong Park
2006/441 ( PS PS.GZ PDF )
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
Donghoon Chang, Mridul Nandi
2006/440 ( PDF )
A New Type of Group Signature Scheme
Jun Zhong Dake He
2006/439 ( PDF )
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
Jun Zhong Dake He
2006/438 ( PS PS.GZ PDF )
On the pseudo-random generator ISAAC
Jean-Philippe Aumasson
2006/437 ( PS PS.GZ PDF )
On Zigzag Functions and Related Objects in New Metric
An Braeken, Ventzislav Nikov, Svetla Nikova
2006/436 ( PS PS.GZ )
Statistically-Hiding Commitment from Any One-Way Function
Iftach Haitner and Omer Reingold
2006/435 ( PDF )
Searching for Shapes in Cryptographic Protocols (extended version)
Shaddin F. Doghmi and Joshua D. Guttman and F. Javier Thayer
2006/434 ( PS PS.GZ PDF )
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
Deepak Kumar Dalai and Subhamoy Maitra
2006/433 ( PS PS.GZ PDF )
Information Theoretic Bounds on Authentication Systems in Query Model
Reihaneh Safavi-Naini and Peter Wild
2006/432 ( PS PS.GZ PDF )
Universally Composable Security with Global Setup
Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish
2006/431 ( PDF )
Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2006/430 ( PDF )
From Weak to Strong Watermarking
Nicholas Hopper and David Molnar and David Wagner
2006/429 ( PDF )
On a new invariant of Boolean functions
Sugata Gangopadhyay and Deepmala Sharma
2006/428 ( PS PS.GZ PDF )
Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
Lilya Budaghyan and Claude Carlet and Gregor Leander
2006/427 ( PDF )
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
Aya Comuta and Mitsuru Kawazoe and Tetsuya Takahashi
2006/426 ( -- withdrawn -- )
The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
Christophe Tartary and Huaxiong Wang
2006/425 ( -- withdrawn -- )
A protocol
anoymous
2006/424 ( PDF )
Security Analysis of Voice-over-IP Protocols
Prateek Gupta and Vitaly Shmatikov
2006/423 ( PS PS.GZ PDF )
Perfect NIZK with Adaptive Soundness
Masayuki Abe and Serge Fehr
2006/422 ( PDF )
Long-term Security and Universal Composability
Joern Mueller-Quade and Dominique Unruh
2006/421 ( PDF )
Universally Composable Three-Party Key Distribution
Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu
2006/420 ( PDF )
The REESSE1+ Public Key Cryptosystem v 2.21
Shenghui Su and Shuwang Lu
2006/419 ( PDF )
Some New Hidden Ideal Cryptosystems
Ilia Toli
2006/418 ( PDF )
Analysis of Privacy-Preserving Element Reduction of Multiset
Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon and Dowon Hong
2006/417 ( PS PS.GZ )
The Recent Attack of Nie et al On TTM is Faulty
T.Moh
2006/416 ( PS PS.GZ PDF )
Authenticated Interleaved Encryption \\
Claude Castelluccia
2006/415 ( PS PS.GZ PDF )
On the Minimal Embedding Field
Laura Hitt
2006/414 ( PS PS.GZ PDF )
Zero Knowledge and Soundness are Symmetric
Shien Jin Ong and Salil Vadhan
2006/413 ( PDF )
Preimage Attack on Parallel FFT-Hashing
Donghoon Chang
2006/412 ( PS PS.GZ PDF )
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
Donghoon Chang
2006/411 ( PS PS.GZ PDF )
Preimage Attack on Hashing with Polynomials proposed at ICISC'06
Donghoon Chang
2006/410 ( PDF )
Galois Field Commitment Scheme
Alexandre Pinto and André Souto and Armando Matos and Luís Antunes
2006/409 ( PDF )
A NEW MAC: LAMA
Li An-Ping
2006/408 ( PS PS.GZ PDF )
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
Goichiro Hanaoka and Hideki Imai
2006/407 ( PS PS.GZ PDF )
Cryptography in the Multi-string Model
Jens Groth and Rafail Ostrovsky
2006/406 ( PDF )
Redundancy of the Wang-Yu Sufficient Conditions
Yuto Nakano and Hidenori Kuwakado and Masakatu Morii
2006/405 ( PS PS.GZ PDF )
Universally Composable Blind Signatures in the Plain Model
Aslak Bakke Buan and Kristian Gj\o steen and Lillian Kr\aa kmo
2006/404 ( PDF )
Faugere's F5 Algorithm Revisited
Till Stegers
2006/403 ( PS PS.GZ PDF )
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
Willi Geiselmann and Rainer Steinwandt
2006/402 ( PS PS.GZ PDF )
Algebraic Cryptanalysis of the Data Encryption Standard
Nicolas T. Courtois and Gregory V. Bard
2006/401 ( -- withdrawn -- )
On the cost of cryptanalytic attacks
Jean-Philippe Aumasson
2006/400 ( PDF )
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai
2006/399 ( PDF )
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Mihir Bellare and Thomas Ristenpart
2006/398 ( PDF )
The Layered Games Framework for Specifications and Analysis of Security Protocols
Amir Herzberg and Igal Yoffe
2006/397 ( PS PS.GZ PDF )
Revisiting the Efficiency of Malicious Two-Party Computation
David P. Woodruff
2006/396 ( PDF )
Security Protocols with Isotropic Channels
Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan
2006/395 ( PDF )
Security-Focused Survey on Group Key Exchange Protocols
Mark Manulis
2006/394 ( PDF )
Identity Based Strong Designated Verifier Proxy Signature Schemes
Sunder Lal and Vandani Verma
2006/393 ( -- withdrawn -- )
The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
Sujing Zhou, Dongdai Lin
2006/392 ( PS PS.GZ PDF )
The Tate Pairing via Elliptic Nets
Katherine E. Stange
2006/391 ( PDF )
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
Ronald Cramer and Dennis Hofheinz and Eike Kiltz
2006/390 ( -- withdrawn -- )
Revisit of CS98
Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
2006/389 ( PDF )
Traceable Ring Signature
Eiichiro Fujisaki and Koutarou Suzuki
2006/388 ( PDF )
Survey on Security Requirements and Models for Group Key Exchange
Mark Manulis
2006/387 ( PDF )
A Note on the Security of NTRUSign
Phong Q. Nguyen
2006/386 ( PS PS.GZ PDF )
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
Mark Wooding
2006/385 ( PDF )
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson and Mark Manulis and Joerg Schwenk
2006/384 ( PDF )
Design and Analysis of a Hash Ring-iterative Structure
Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang
2006/383 ( PS PS.GZ PDF )
Traitor tracing scheme with constant ciphertext rate against powerful pirates
Thomas Sirvent
2006/382 ( PS PS.GZ PDF )
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
E-yong Kim and Hwangnam Kim and Kunsoo Park
2006/381 ( PDF )
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Fuw-Yi Yang
2006/380 ( PDF )
On Security of Sovereign Joins
Einar Mykletun and Gene Tsudik
2006/379 ( PDF )
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
Matthew J. Campagna
2006/378 ( PS PS.GZ PDF )
A New Key Exchange Primitive Based on the Triple Decomposition Problem
YesemKurt
2006/377 ( PS PS.GZ PDF )
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
James Birkett, Alexander W. Dent, Gregory Neven and Jacob Schuldt
2006/376 ( PDF )
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
Vlastimil KLIMA
2006/375 ( PDF )
Distortion maps for genus two curves
Steven D. Galbraith and Jordi Pujol\`as and Christophe Ritzenthaler and Benjamin Smith
2006/374 ( PS PS.GZ PDF )
Robust Final-Round Cache-Trace Attacks Against AES
Joseph Bonneau
2006/373 ( PDF )
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Joseph K. Liu and Man Ho Au and Willy Susilo
2006/372 ( PDF )
A taxonomy of pairing-friendly elliptic curves
David Freeman and Michael Scott and Edlyn Teske
2006/371 ( PDF )
Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
Robert Ronan and Colm o hEigeartaigh and Colin Murphy and Tim Kerins and Paulo S. L. M. Barreto
2006/370 ( PS PS.GZ PDF )
A DoS Attack Against the Integrity-Less ESP (IPSec)
Ventzislav Nikov
2006/369 ( PDF )
RadioGat\'un, a belt-and-mill hash function
Guido Bertoni and Joan Daemen and Micha\"el Peeters and Gilles Van Assche
2006/368 ( PDF )
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong
2006/367 ( PDF )
An Attack on a Certificateless Signature Scheme
Xuefei Cao and Kenneth G. Paterson and Weidong Kou
2006/366 ( PDF )
A Latency-Free Election Scheme
Kristian Gj\o steen
2006/365 ( -- withdrawn -- )
Revisit of KD04
Xianhui Lu, Xuejia Lai, Dake He,Guomin Li
2006/364 ( PDF )
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
Gregory V. Bard
2006/363 ( -- withdrawn -- )
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Ventzislav Nikov and Svetla Nikova and Bart Preneel
2006/362 ( PS PS.GZ PDF )
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
Palash Sarkar and Sanjit Chatterjee
2006/361 ( PS PS.GZ PDF )
Generic Construction of (Identity-based) Perfect Concurrent Signatures
Sherman S.M. Chow and Willy Susilo
2006/360 ( PDF )
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Marc Stevens and Arjen Lenstra and Benne de Weger
2006/359 ( PS PS.GZ )
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Mihir Bellare and Oded Goldreich
2006/358 ( PDF )
Public Key Encryption with Keyword Search based on K-Resilient IBE
Dalia Khader
2006/357 ( PDF )
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
Su-Jeong Choi and Simon R. Blackburn and Peter R. Wild
2006/356 ( PS PS.GZ PDF )
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
Emilia K\"{a}sper and Sven Laur and Helger Lipmaa
2006/355 ( PS PS.GZ PDF )
Concurrent Non-Malleable Zero Knowledge
Boaz Barak and Manoj Prabhakaran and Amit Sahai
2006/354 ( PDF )
A new stream cipher: DICING
Li An-Ping
2006/353 ( PDF )
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
Zhenjie Huang and Kefei Chen and Yumin Wang
2006/352 ( PDF )
Foundations of Secure E-Commerce: The Order Layer
Amir Herzberg and Igal Yoffe
2006/351 ( PDF )
On the Power of Simple Branch Prediction Analysis
Onur Aciicmez and Cetin Kaya Koc and Jean-Pierre Seifert
2006/350 ( PDF )
Impossible Differential Cryptanalysis of ARIA and Camellia
Wenling Wu, Wentao Zhang, and Dengguo Feng
2006/349 ( PS PS.GZ PDF )
A Note On Side-Channels Resulting From Dynamic Compilation
D. Page
2006/348 ( PS PS.GZ PDF )
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
Krzysztof Pietrzak
2006/347 ( PDF )
Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
Fumiyuki Momose and Jinhui Chao
2006/346 ( PDF )
Generic Transformation to Strongly Unforgeable Signatures
Qiong Huang and Duncan S. Wong and Yiming Zhao
2006/345 ( PS PS.GZ PDF )
Private and Efficient Stable Marriages (Matching)
Atkinson, T. and Bartak,R. and Silaghi,M.-C. and Tuleu,E. and Zanker,M.
2006/344 ( PDF )
A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
2006/343 ( PS PS.GZ PDF )
Verifiably Encrypted Signature Scheme with Threshold Adjudication
M. Choudary Gorantla And Ashutosh Saxena
2006/342 ( PDF )
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
2006/341 ( PS PS.GZ PDF )
MV3: A new word based stream cipher using rapid mixing and revolving buffers
Nathan Keller and Stephen D. Miller and Ilya Mironov and Ramarathnam Venkatesan
2006/340 ( PDF )
Cryptanalyses of Some Multimedia Encryption Schemes
Chengqing Li
2006/339 ( -- withdrawn -- )
A New family of Ideal Multipartite Access Structure Based on MSP
Jun Xu and Jiwen Zeng and Xiaomin Zha
2006/338 ( PS PS.GZ PDF )
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
Fagen Li, Yupu Hu, and Shuanggen Liu
2006/337 ( PDF )
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
D.R. Stinson and J. Wu
2006/336 ( PDF )
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner
2006/335 ( PDF )
A ID-Based Deniable Authentication Protocol on pairings
Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang
2006/334 ( PDF )
Colliding Message Pair for 53-Step HAS-160
Florian Mendel
2006/333 ( PDF )
Discrete Logarithms in Generalized Jacobians
S. D. Galbraith and B. A. Smith
2006/332 ( PDF )
Improved Efficiency for Private Stable Matching
Matthew Franklin and Mark Gondree and Payman Mohassel
2006/331 ( PDF )
On the Security of Generalized Jacobian Cryptosystems
Isabelle Dechene
2006/330 ( PS PS.GZ PDF )
Extended Double-Base Number System with applications to Elliptic Curve Cryptography
Christophe Doche and Laurent Imbert
2006/329 ( PDF )
Designated Verifier Signature Scheme Based on Braid Groups
Shi-hua Zou and Ji-wen Zeng and Jun-jie Quan
2006/328 ( PDF )
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto
2006/327 ( PDF )
An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto
2006/326 ( PDF )
Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
Jonathan Katz and Adam Smith
2006/325 ( PS PS.GZ PDF )
Invisible Designated Confirmer Signatures without Random Oracles
Victor K. Wei
2006/324 ( PDF )
The Average Transmission Overhead of Broadcast Encryption
Sarang Aravamuthan and Sachin Lodha
2006/323 ( PS PS.GZ PDF )
Computational Soundness of Formal Indistinguishability and Static Equivalence
Gergei Bana and Payman Mohassel and Till Stegers
2006/322 ( PDF )
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
Yassir Nawaz and Kishan Chand Gupta and Guang Gong
2006/321 ( PS PS.GZ PDF )
Efficient Pseudorandom Generators Based on the DDH Assumption
Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko
2006/320 ( PDF )
CMSS -- An Improved Merkle Signature Scheme
Johannes Buchmann and Luis Carlos Coronado Garcia and Erik Dahmen and Martin Doering and Elena Klintsevich
2006/319 ( PS PS.GZ PDF )
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini and Yiqun Lisa Yin
2006/318 ( PDF )
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Chunbo Ma, Jun Ao, and Jianhua Li
2006/317 ( PS PS.GZ PDF )
Weaknesses of the FORK-256 compression function
Krystian Matusiewicz and Scott Contini and Josef Pieprzyk
2006/316 ( PDF )
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Sarang Aravamuthan and Viswanatha Rao Thumparthy
2006/315 ( PDF )
On the Necessity of Rewinding in Secure Multiparty Computation
Michael Backes and Joern-Mueller Quade and Dominique Unruh
2006/314 ( PDF )
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
Yi Deng and Giovanni Di Crescenzo and Dongdai Lin
2006/313 ( PDF )
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
Lars Elmegaard-Fessel
2006/312 ( PS PS.GZ PDF )
ElGamal type signature schemes for n-dimensional vector spaces
Iwan M. Duursma and SeungKook Park
2006/311 ( -- withdrawn -- )
Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
Bennian Dou and Chungen Xu
2006/310 ( PDF )
A d-Sequence based Recursive Random Number Generator
Abhishek Parakh
2006/309 ( PDF )
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters
2006/308 ( PDF )
Efficient ID-based Threshold Signature Schemes without Pairings
Jun Shao and Zhenfu Cao and Licheng Wang
2006/307 ( PDF )
Note on Design Criteria for Rainbow-Type Multivariates
Jintai Ding and Lei Hu and Bo-Yin Yang and Jiun-Ming Chen
2006/306 ( PS PS.GZ PDF )
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
Alexander W. Dent and Qiang Tang
2006/305 ( PS PS.GZ PDF )
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
V.S. Dimitrov and K.U. Jaervinen and M.J. Jacobson, Jr. and W.F. Chan and Z. Huang
2006/304 ( PS PS.GZ PDF )
Identity-Based Encryption Gone Wild
Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone-Lee and Gregory Neven and Nigel P. Smart
2006/303 ( PS PS.GZ )
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Eric Filiol
2006/302 ( PDF )
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions.
Atefeh Mashatan and Douglas R. Stinson
2006/301 ( PDF )
New features for JPEG Steganalysis
Johann Barbier and \'Eric Filiol and Kichenakoumar Mayoura
2006/300 ( -- withdrawn -- )
Attacks and Modifications of CJC's E-voting Scheme
Bennian Dou and Chun-hua Chen and Roberto Araujo
2006/299 ( PDF )
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto
2006/298 ( PDF )
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
Dan Boneh and Brent Waters
2006/297 ( PDF )
Forward-Secure Signatures with Untrusted Update
Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters
2006/296 ( PS PS.GZ PDF )
On the Generic Construction of Identity-Based Signatures with Additional Properties
David Galindo and Javier Herranz and Eike Kiltz
2006/295 ( PDF )
Visual secret sharing scheme with autostereogram
Feng Yi and Daoshun Wang and Yiqi Dai
2006/294 ( PDF )
The Collision Intractability of MDC-2 in the Ideal Cipher Model
John P Steinberger
2006/293 ( PS PS.GZ PDF )
Fast Algorithms for the Free Riders Problem in Broadcast Encryption
Zulfikar Ramzan and David P. Woodruff
2006/292 ( PDF )
Ideal Multipartite Secret Sharing Schemes
Oriol Farras and Jaume Marti-Farre and Carles Padro
2006/291 ( PS PS.GZ PDF )
Hard Homogeneous Spaces
Jean-Marc Couveignes
2006/290 ( PDF )
On Authentication with HMAC and Non-Random Properties
Christian Rechberger and Vincent Rijmen
2006/289 ( PDF )
Efficient Ring Signatures without Random Oracles
Hovav Shacham and Brent Waters
2006/288 ( PDF )
Predicting Secret Keys via Branch Prediction
Onur Aciicmez and Jean-Pierre Seifert and Cetin Kaya Koc
2006/287 ( PDF )
Conjunctive, Subset, and Range Queries on Encrypted Data
Dan Boneh and Brent Waters
2006/286 ( PDF )
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
Sujing Zhou and Dongdai Lin
2006/285 ( PS PS.GZ PDF )
Unrestricted Aggregate Signatures
Mihir Bellare and Chanathip Namprempre and Gregory Neven
2006/284 ( PS PS.GZ PDF )
Constant Round Group Key Exchange with Logarithmic Computational Complexity
Junghyun Nam, Youngsook Lee, and Dongho Won
2006/283 ( PS PS.GZ PDF )
Does Privacy Require True Randomness?
Carl Bosley and Yevgeniy Dodis
2006/282 ( -- withdrawn -- )
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
Victor K. Wei and Fangguo Zhang
2006/281 ( PS PS.GZ PDF )
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
Phillip Rogaway
2006/280 ( PS PS.GZ )
Deniable Authentication and Key Exchange
Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk
2006/279 ( PDF )
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
Sanjit Chatterjee and Palash Sarkar
2006/278 ( PS PS.GZ PDF )
Fundamental problems in provable security and cryptography
Alexander W. Dent
2006/277 ( PS PS.GZ )
On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
Oded Goldreich
2006/276 ( PS PS.GZ PDF )
Mitigating Dictionary Attacks on Password-Protected Local Storage
Ran Canetti and Shai Halevi and Michael Steiner
2006/275 ( PS PS.GZ PDF )
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
Debrup Chakraborty and Palash Sarkar
2006/274 ( PDF )
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Debasis Giri and P. D. Srivastava
2006/273 ( PS PS.GZ PDF )
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Mikio Fujii
2006/272 ( PS PS.GZ PDF )
Efficient Use of Random Delays
Olivier Benoit and Michael Tunstall
2006/271 ( PDF )
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Gregory V. Bard
2006/270 ( PDF )
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng
2006/269 ( PS PS.GZ PDF )
An Analysis of the Hermes8 Stream Ciphers
Steve Babbage and Carlos Cid and Norbert Pramstaller and Havard Raddum
2006/268 ( PDF )
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto
2006/267 ( PS PS.GZ PDF )
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation
Mihir Bellare and Tadayoshi Kohno and Victor Shoup
2006/266 ( PS PS.GZ PDF )
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Michael Backes and Peeter Laud
2006/265 ( PDF )
Some (in)sufficient conditions for secure hybrid encryption.
Javier Herranz and Dennis Hofheinz and Eike Kiltz
2006/264 ( PS PS.GZ PDF )
A Simple and Unified Method of Proving Unpredictability
Mridul Nandi
2006/263 ( PDF )
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
Dragos Trinca
2006/262 ( PDF )
Logical Concepts in Cryptography
Simon Kramer
2006/261 ( PS PS.GZ PDF )
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
Frederic Didier
2006/260 ( PS PS.GZ PDF )
A Note On Game-Hopping Proofs
Alexander W. Dent
2006/259 ( PDF )
Simplified Submission of Inputs to Protocols
Douglas Wikstrom
2006/258 ( PDF )
Cryptanalysis of a Cognitive Authentication Scheme
Philippe Golle and David Wagner
2006/257 ( PDF )
Efficient Divisor Class Halving on Genus Two Curves
Peter Birkner
2006/256 ( PDF )
Constant-Round Concurrent NMWI and its relation to NMZK
Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti
2006/255 ( PDF )
Malicious KGC Attacks in Certificateless Cryptography
Man Ho Au and Jing Chen and Joseph K. Liu and Yi Mu and Duncan S. Wong and Guomin Yang
2006/254 ( PS PS.GZ PDF )
Applications of SAT Solvers to Cryptanalysis of Hash Functions
Ilya Mironov and Lintao Zhang
2006/253 ( PS PS.GZ PDF )
Hard Instances of the Constrained Discrete Logarithm Problem
Ilya Mironov and Anton Mityagin and Kobbi Nissim
2006/252 ( PDF )
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Maurizio A. Strangio
2006/251 ( PDF )
Accelerating Cryptanalysis with the Method of Four Russians
Gregory V. Bard
2006/250 ( PDF )
Linear Cryptanalysis of CTC
Orr Dunkelman and Nathan Keller
2006/249 ( PS PS.GZ PDF )
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
Selcuk Kavut and Subhamoy Maitra and Sumanta Sarkar and Melek D. Yucel
2006/248 ( PDF )
Disguising tori and elliptic curves
Steven D. Galbraith
2006/247 ( -- withdrawn -- )
Factoring Class Polynomials over the Genus Field
Marcel Martin
2006/246 ( PS PS.GZ PDF )
ON THE POSTQUANTUM CIPHER SCHEME
Jaroslav HRUBY
2006/245 ( PDF )
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
K. Phani Kumar and G. Shailaja and Ashutosh Saxena
2006/244 ( PS PS.GZ PDF )
Length-based cryptanalysis: The case of Thompson's Group
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
2006/243 ( PDF )
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Tae Hyun Kim and Tsuyoshi Takagi and Dong-Guk Han and Ho Won Kim and Jongin Lim
2006/242 ( PDF )
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
Haina Zhang , Shaohui Wang, Xiaoyun Wang
2006/241 ( PS PS.GZ PDF )
A Stronger Definition for Anonymous Electronic Cash
Marten Trolin
2006/240 ( PS PS.GZ PDF )
Computing Zeta Functions of Nondegenerate Curves
W. Castryck and J. Denef and F. Vercauteren
2006/239 ( PDF )
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
Yi Deng and Dongdai Lin
2006/238 ( -- withdrawn -- )
Searchable Index Schemes for Groups : Security vs. Efficiency
Hyun-A Park, Yu Jeong Lee, and Dong Hoon Lee
2006/237 ( PDF )
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Claire Whelan and Mike Scott
2006/236 ( PS PS.GZ PDF )
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang
2006/235 ( PS PS.GZ PDF )
Application of ECM to a Class of RSA keys
Abderrahmane Nitaj
2006/234 ( PDF )
RFID Security: Tradeoffs between Security and Efficiency
Ivan Damg{\aa}rd and Michael {\O}stergaard
2006/233 ( PS PS.GZ PDF )
A simple generalization of El-Gamal cryptosystem to non-abelian groups
Ayan Mahalanobis
2006/232 ( PDF )
Improvement to AKS algorithm
Roman Popovych
2006/231 ( PS PS.GZ PDF )
A handy multi-coupon system
Sebastien Canard and Aline Gouget and Emeline Hufschmitt
2006/230 ( PDF )
Another Look at Generic Groups
Neal Koblitz and Alfred Menezes
2006/229 ( PDF )
Another Look at "Provable Security". II
Neal Koblitz and Alfred Menezes
2006/228 ( PS PS.GZ PDF )
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
Mihir Bellare and Amit Sahai
2006/227 ( PS PS.GZ PDF )
An Elliptic Curve Processor Suitable For RFID-Tags
L. Batina and J. Guajardo and T. Kerins and N. Mentens and P. Tuyls and I. Verbauwhede
2006/226 ( PDF )
The Fairness of Perfect Concurrent Signatures
Guilin Wang, Feng Bao, and Jianying Zhou
2006/225 ( PS PS.GZ PDF )
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci
2006/224 ( PS PS.GZ PDF )
Generalizations of the Karatsuba Algorithm for Efficient Implementations
Andr\'{e} Weimerskirch and Christof Paar
2006/223 ( PDF )
What Hashes Make RSA-OAEP Secure?
Daniel R. L. Brown
2006/222 ( PS PS.GZ )
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
R. Overbeck
2006/221 ( PS PS.GZ PDF )
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
Phillip Rogaway and Thomas Shrimpton
2006/220 ( PDF )
Multi-Dimensional Montgomery Ladders for Elliptic Curves
Daniel R. L. Brown
2006/219 ( PS PS.GZ PDF )
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kai Tsay
2006/218 ( PS PS.GZ PDF )
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi
2006/217 ( PS PS.GZ PDF )
Statistical Analysis of the MARS Block Cipher
Andrey Pestunov
2006/216 ( PDF )
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
Meloni Nicolas
2006/215 ( PDF )
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
Shujun Li and Chengqing Li and Kowk-Tung Lo and Guanrong Chen
2006/214 ( PDF )
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String
Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2006/213 ( PS PS.GZ PDF )
Luby-Rackoff Ciphers from Weak Round Functions?
Ueli Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj{\"o}din
2006/212 ( PDF )
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Kemal BICAKCI and Bruno Crispo and Andrew S. Tanenbaum
2006/211 ( PS PS.GZ PDF )
A Survey of Certificateless Encryption Schemes and Security Models
Alexander W. Dent
2006/210 ( PDF )
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky
2006/209 ( PS PS.GZ PDF )
Minimal Weight and Colexicographically Minimal Integer Representations
Clemens Heuberger and James A. Muir
2006/208 ( PS PS.GZ PDF )
Private Information Retrieval Using Trusted Hardware
Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao
2006/207 ( PDF )
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
Javier Herranz and Dennis Hofheinz and Eike Kiltz
2006/206 ( PS PS.GZ PDF )
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang
2006/205 ( -- withdrawn -- )
ID-Based Ring Signature Scheme secure in the Standard Model
Man Ho Au and Joseph K. Liu and Y. H. Yuen and Duncan S. Wong
2006/204 ( PS PS.GZ )
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
Pradeep Kumar Mishra and Pinakpani Pal and Palash Sarkar.
2006/203 ( PS PS.GZ PDF )
Generalization of the Selective-ID Security Model for HIBE Protocols
Sanjit Chatterjee and Palash Sarkar
2006/202 ( PS PS.GZ PDF )
Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
Ryuichi Harasawa, Yutaka Sueyoshi, and Aichi Kudo
2006/201 ( PS PS.GZ PDF )
Efficient Tate Pairing Computation Using Double-Base Chains
Chang'an Zhao and Fangguo Zhang and Jiwu Huang
2006/200 ( PDF )
Improvement of recently proposed Remote User Authentication Schemes
Guanfei Fang and Genxun huang
2006/199 ( PS PS.GZ PDF )
Identity-based Key Agreement Protocols From Pairings
L. Chen and Z. Cheng and N.P. Smart
2006/198 ( PDF )
Cryptographically Private Support Vector Machines
Sven Laur and Helger Lipmaa and Taneli Mielikäinen
2006/197 ( PDF )
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
Marc P.C. Fossorier and Miodrag J. Mihaljevic and Hideki Imai and Yang Cui and Kanta Matsuura
2006/196 ( PDF )
On ZK-Crypt, Book Stack, and Statistical Tests
S.~Doroshenko \and A.~Fionov \and A.~Lubkin \and V.~Monarev \and B.~Ryabko
2006/195 ( PS PS.GZ PDF )
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto
2006/194 ( -- withdrawn -- )
Self-Generated-Certificate Public Key Cryptosystem
Joseph K. Liu and Man Ho Au
2006/193 ( PDF )
(Hierarchical Identity-Based) Threshold Ring Signatures
Victor K. Wei and Tsz Hon Yuen
2006/192 ( PDF )
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Osman Kocar
2006/191 ( PDF )
A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
Sahadeo Padhye
2006/190 ( PS PS.GZ PDF )
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
Berry Schoenmakers and Andrey Sidorenko
2006/189 ( PDF )
Unconditionally secure chaffing and winnowing with short authentication tags
D. R. Stinson
2006/188 ( PS PS.GZ PDF )
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Tetsu Iwata
2006/187 ( PS PS.GZ PDF )
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong
2006/186 ( PDF )
Deterministic and Efficiently Searchable Encryption
Mihir Bellare and Alexandra Boldyreva and Adam O'Neill
2006/185 ( PS PS.GZ PDF )
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
Minh-Huyen Nguyen and Shien Jin Ong and Salil Vadhan
2006/184 ( PS PS.GZ PDF )
On Signatures of Knowledge
Melissa Chase and Anna Lysyanskaya
2006/183 ( PDF )
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
Claude Cr\'epeau and George Savvides and Christian Schaffner and J\"urg Wullschleger
2006/182 ( PS PS.GZ PDF )
On the Limits of Point Function Obfuscation
Arvind Narayanan and Vitaly Shmatikov
2006/181 ( PS PS.GZ PDF )
There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
Sel\c{c}uk Kavut and Subhamoy Maitra and Melek D. Y{\"u}cel
2006/180 ( PDF )
Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
Dmitry Khovratovich
2006/179 ( PDF )
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
Chang Shu and Soonhak Kwon and Kris Gaj
2006/178 ( PS PS.GZ PDF )
A New Cryptosystem Based On Hidden Order Groups
Amitabh Saxena and Ben Soh
2006/177 ( PS PS.GZ PDF )
On the (Im-)Possibility of Extending Coin Toss
Dennis Hofheinz and Joern Mueller-Quade and Dominique Unruh
2006/176 ( PDF )
Counting points on elliptic curves in medium characteristic
Antoine Joux and Reynald Lercier
2006/175 ( PS PS.GZ PDF )
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
Moni Naor and Gil Segev and Adam Smith
2006/174 ( -- withdrawn -- )
Frobenius expansion and the Diffie Hellman problem
V. R. Sule
2006/173 ( PS PS.GZ PDF )
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
Le Trieu Phong and Ogata Wakaha
2006/172 ( PS PS.GZ PDF )
On Computing Products of Pairings
R Granger and N.P. Smart
2006/171 ( PS PS.GZ PDF )
Key confirmation and adaptive corruptions in the protocol security logic
Prateek Gupta and Vitaly Shmatikov
2006/170 ( PDF )
Visual Cryptography Schemes with Optimal Pixel Expansion
Carlo Blundo and Stelvio Cimato and Alfredo De Santis
2006/169 ( PDF )
Simplified pairing computation and security implications
Steven D. Galbraith and Colm O hEigeartaigh and Caroline Sheedy
2006/168 ( PS PS.GZ PDF )
How Fast can be Algebraic Attacks on Block Ciphers ?
Nicolas T. Courtois
2006/167 ( PS PS.GZ PDF )
Towards Trustworthy e-Voting using Paper Receipts
Yunho Lee and Kwangwoo Lee and Seungjoo Kim and Dongho Won
2006/166 ( PDF )
General Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
2006/165 ( PS PS.GZ PDF )
Pairings for Cryptographers
S.D. Galbraith and K.G. Paterson and N.P. Smart
2006/164 ( PDF )
Classification of Signature-only Signature Models
Zhengjun Cao
2006/163 ( PDF )
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
Gregory V. Bard
2006/162 ( PS PS.GZ )
A Summary of McEliece-Type Cryptosystems and their Security
D. Engelbert, R. Overbeck and A. Schmidt
2006/161 ( PDF )
Cryptanalysis of 4-Pass HAVAL
Zhangyi Wang and Huanguo Zhang and Zhongping Qin and Qingshu Meng
2006/160 ( -- withdrawn -- )
A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
L. Chen and Z. Cheng and N.P. Smart
2006/159 ( -- withdrawn -- )
Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
Joonsang Baek and Guilin Wang
2006/158 ( PDF )
An Efficient ID-based Proxy Signature Scheme from Pairings
Chunxiang Gu and Yuefei Zhu
2006/157 ( PS PS.GZ PDF )
An efficient way to access an array at a secret index
Timothy Atkinson and Marius C. Silaghi
2006/156 ( PS PS.GZ PDF )
The Hardness of the DHK Problem in the Generic Group Model
Alexander W. Dent
2006/155 ( PS PS.GZ )
Independent Zero-Knowledge Sets
Rosario Gennaro and Silvio Micali
2006/154 ( PS PS.GZ PDF )
New Public Key Authentication Frameworks with Lite Certification Authority
Xiaolei Dong and Licheng Wang and Zhenfu Cao
2006/153 ( PS PS.GZ PDF )
On the Relationships Between Notions of Simulation-Based Security
Anupam Datta and Ralf Kuesters and John C. Mitchell and Ajith Ramanathan
2006/152 ( PDF )
Pairing based Mutual Authentication Scheme Using Smart Cards
G. Shailaja and K. Phani Kumar and Ashutosh Saxena
2006/151 ( PS PS.GZ PDF )
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Ralf Kuesters
2006/150 ( PDF )
Demonstrating data possession and uncheatable data transfer
D\'ecio Luiz Gazzoni Filho and Paulo S\'ergio Licciardi Messeder Barreto
2006/149 ( PDF )
A method of construction of balanced functions with optimum algebraic immunity
C. Carlet
2006/148 ( PS PS.GZ PDF )
Computational Indistinguishability between Quantum States and Its Cryptographic Application
Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami
2006/147 ( PDF )
New Integrated proof Method on Iterated Hash Structure and New Structures
Duo Lei
2006/146 ( PS PS.GZ PDF )
Completeness of Formal Hashes in the Standard Model
Flavio D. Garcia and Peter van Rossum
2006/145 ( PS PS.GZ PDF )
PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
Alexander Rostovtsev and Anton Stolbunov
2006/144 ( PDF )
Implementing Cryptographic Pairings on Smartcards
Michael Scott and Neil Costigan and Wesam Abdulwahab
2006/143 ( PDF )
Blinded Fault Resistant Exponentiation
Guillaume Fumaroli and David Vigilant
2006/142 ( PS PS.GZ PDF )
Rational Secret Sharing, Revisited
S. Dov Gordon and Jonathan Katz
2006/141 ( PDF )
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
Shahram Khazaei and Mahdi M. Hasanzadeh and Mohammad S. Kiaei
2006/140 ( PS PS.GZ PDF )
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
Jiejun Kong
2006/139 ( PS PS.GZ PDF )
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
Francois-Xavier Standaert and Tal G. Malkin and Moti Yung
2006/138 ( PDF )
Trace-Driven Cache Attacks on AES
Onur Ac\i{}i\c{c}mez and \c{C}etin Kaya Ko\c{c}
2006/137 ( PDF )
Defining Strong Privacy for RFID
Ari Juels and Stephen A. Weis
2006/136 ( PDF )
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
Gregory V. Bard
2006/135 ( PDF )
The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction
Duo Lei, Da Lin2, Li Chao, Keqin Feng, and Longjiang Qu
2006/134 ( PDF )
Identity Based Strong Designated Verifier Signature Scheme
K. Phani Kumar and G. Shailaja and Ashutosh Saxena
2006/133 ( PDF )
Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
Francisco Rodr\'{i}guez-Henr\'{i}quez and Guillermo Morales-Luna and Julio L\'{o}pez-Hern\'{a}ndez
2006/132 ( PDF )
Conditional Reactive Simulatability
Michael Backes and Markus Duermuth and Dennis Hofheinz and Ralf Kuesters
2006/131 ( PS PS.GZ PDF )
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
Mike Burmester and Tri van Le and Breno de Medeiros
2006/130 ( PS PS.GZ )
Simulatable Security and Polynomially Bounded Concurrent Composition
Dennis Hofheinz and Dominique Unruh
2006/129 ( PDF )
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
Wei Han and Dong Zheng and Ke-fei Chen
2006/128 ( PDF )
On the existence of distortion maps on ordinary elliptic curves
Denis Charles
2006/127 ( PS PS.GZ PDF )
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
Sourav Mukhopadhyay and Palash Sarkar
2006/126 ( PDF )
ECGSC: Elliptic Curve based Generalized Signcryption Scheme
Yiliang Han and Xiaoyuan Yang
2006/125 ( PDF )
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
Eunjeong Lee and Hyang-Sook Lee and Yoonjin Lee
2006/124 ( PDF )
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
K.W. Wong and Edward C.W. Lee and L.M. Cheng and Xiaofeng Liao
2006/123 ( PDF )
Designated Confirmer Signatures Revisited
Douglas Wikström
2006/122 ( PDF )
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Eike Kiltz
2006/121 ( PS PS.GZ PDF )
Counting Prime Numbers with Short Binary Signed Representation
Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna
2006/120 ( PDF )
Key Privacy for Identity Based Encryption
Jason E. Holt
2006/119 ( -- withdrawn -- )
Repairing Attacks on a Password-Based Group Key Agreement
Ratna Dutta and Rana Barua
2006/118 ( PS PS.GZ PDF )
On construction of non-normal Boolean functions
Sugata Gangopadhyay and Deepmala Sharma
2006/117 ( PDF )
Conjectured Security of the ANSI-NIST Elliptic Curve RNG
Daniel R. L. Brown
2006/116 ( PDF )
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
Mario Lamberger and Norbert Pramstaller and Vincent Rijmen
2006/115 ( PDF )
Fast exponentiation via prime finite field isomorphism
Alexander Rostovtsev
2006/114 ( PS PS.GZ PDF )
Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo
2006/113 ( PDF )
A New Construction of Time Capsule Signature
Miaomiao Zhang and Gongliang Chen and Jianhua Li and Licheng Wang and Haifeng Qian
2006/112 ( PS PS.GZ )
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
Markus Volkmer
2006/111 ( PS PS.GZ PDF )
Attacking LCCC Batch Verification of RSA Signatures
Martin Stanek
2006/110 ( PS PS.GZ PDF )
The Eta Pairing Revisited
F. Hess and N.P. Smart and F. Vercauteren
2006/109 ( PS PS.GZ PDF )
A Simpler Sieving Device: Combining ECM and TWIRL
Willi Geiselmann and Fabian Januszewski and Hubert Koepfer and Jan Pelzl and Rainer Steinwandt
2006/108 ( PDF )
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Chunxiang Gu and Yuefei Zhu and Yajuan Zhang
2006/107 ( PDF )
The number field sieve for integers of low weight
Oliver Schirokauer
2006/106 ( PS PS.GZ PDF )
Further Refinement of Pairing Computation Based on Miller's Algorithm
Chao-Liang Liu and Gwoboa Horng and Te-Yu Chen
2006/105 ( PDF )
Tunnels in Hash Functions: MD5 Collisions Within a Minute
Vlastimil Klima
2006/104 ( PDF )
Fast Collision Attack on MD5
Marc Stevens
2006/103 ( PS PS.GZ PDF )
Security of VSH in the Real World
Markku-Juhani O. Saarinen
2006/102 ( PS PS.GZ PDF )
Efficient Blind and Partially Blind Signatures Without Random Oracles
Tatsuaki Okamoto
2006/101 ( PS PS.GZ PDF )
Information-theoretic analysis of coating PUFs
B. Skoric and S. Maubach and T. Kevenaar and P. Tuyls
2006/100 ( PDF )
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
Zhou Sujing, Lin Dongdai
2006/099 ( PDF )
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
Dongvu Tonien and Reihaneh Safavi-Naini
2006/098 ( PS PS.GZ PDF )
Gr\"obner Basis Based Cryptanalysis of SHA-1
Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
2006/097 ( PDF )
A Cryptographic Tour of the IPsec Standards
Kenneth G. Paterson
2006/096 ( PDF )
Sequential Aggregate Signatures and Multisignatures without Random Oracles
Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters
2006/095 ( PDF )
MAC Reforgeability
John Black and Martin Cochran
2006/094 ( PS PS.GZ PDF )
Cryptanalysis of the MEM Mode of Operation
Peng Wang and Dengguo Feng and Wenling Wu
2006/093 ( PS PS.GZ PDF )
RSA and a higher degree diophantine equation
Abderrahmane Nitaj
2006/092 ( PS PS.GZ PDF )
Cryptanalysis of RSA with constrained keys
Abderrahmane Nitaj
2006/091 ( PS PS.GZ PDF )
The Complexity of Online Memory Checking
Moni Naor and Guy Rothblum
2006/090 ( PDF )
Secure Sketch for Multi-Sets
Ee-Chien Chang and Vadym Fedyukovych and Qiming Li
2006/089 ( PS PS.GZ PDF )
A Tree-based Model of Unicast Stream Authentication
Goce Jakimoski and Yvo Desmedt
2006/088 ( PDF )
On the Feasibility of Consistent Computations
Sven Laur and Helger Lipmaa
2006/087 ( PDF )
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
Barath Raghavan and Saurabh Panjwani and Anton Mityagin
2006/086 ( PDF )
Analysis of the Linux Random Number Generator
Zvi Gutterman and Benny Pinkas and Tzachy Reinman
2006/085 ( PS PS.GZ PDF )
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Xavier Boyen and Brent Waters
2006/084 ( PS PS.GZ PDF )
Cryptography from Anonymity
Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai
2006/083 ( PDF )
Browsers Defenses Against Phishing, Spoofing and Malware
Amir Herzberg
2006/082 ( PS PS.GZ PDF )
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
HariGovind V. Ramasamy and Christian Cachin
2006/081 ( PS PS.GZ )
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
David Molnar and Tadayoshi Kohno and Naveen Sastry and David Wagner
2006/080 ( PDF )
Efficient Identity-based Signatures Secure in the Standard Model
Kenneth G. Paterson and Jacob C. N. Schuldt
2006/079 ( PS PS.GZ PDF )
Towards Provably Secure Group Key Agreement Building on Group Theory
Jens-Matthias Bohli and Benjamin Glas and Rainer Steinwandt
2006/078 ( PDF )
Verifiable Random Permutations
Yevgeniy Dodis and Prashant Puniya
2006/077 ( PDF )
On Secret Sharing Schemes, Matroids and Polymatroids
Jaume Marti-Farre and Carles Padro
2006/076 ( -- withdrawn -- )
A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
Amitabh Saxena and Ben Soh
2006/075 ( PS PS.GZ PDF )
ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
TOMOHIRO HARAYAMA
2006/074 ( PDF )
How to Construct Sufficient Condition in Searching Collisions of MD5
Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta
2006/073 ( PS PS.GZ PDF )
Stronger Security of Authenticated Key Exchange
Brian LaMacchia and Kristin Lauter and Anton Mityagin
2006/072 ( PDF )
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
Yaniv Shaked and Avishai Wool
2006/071 ( PS PS.GZ PDF )
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
Ueli Maurer and Johan Sjödin
2006/070 ( PDF )
The experimental distinguishing attack on RC4
Sergey Doroshenko and Boris Ryabko
2006/069 ( PS PS.GZ PDF )
Automated Security Proofs with Sequences of Games
Bruno Blanchet and David Pointcheval
2006/068 ( PDF )
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Michael Backes and Birgit Pfitzmann and Michael Waidner
2006/067 ( PS PS.GZ PDF )
Scalar Multiplication on Koblitz Curves using Double Bases
Roberto Avanzi and Francesco Sica
2006/066 ( PS PS.GZ PDF )
Simple and Flexible Private Revocation Checking
John Solis and Gene Tsudik
2006/065 ( PS PS.GZ PDF )
On Expected Constant-Round Protocols for Byzantine Agreement
Jonathan Katz and Chiu-Yuen Koo
2006/064 ( PS PS.GZ PDF )
Perturbing and Protecting a Traceable Block Cipher
Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
2006/063 ( PS PS.GZ PDF )
Provably Secure Universal Steganographic Systems
Boris Ryabko and Daniil Ryabko
2006/062 ( -- withdrawn -- )
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
Debrup Chakraborty and Palash Sarkar
2006/061 ( -- withdrawn -- )
Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan
2006/060 ( -- withdrawn -- )
An Efficient ID-based Signature Scheme from Pairings
Chunxiang Gu and Yuefei Zhu and Xiaoyu Pan
2006/059 ( PS PS.GZ PDF )
High Security Pairing-Based Cryptography Revisited
R. Granger and D. Page and N.P. Smart
2006/058 ( PDF )
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò
2006/057 ( PS PS.GZ PDF )
Key Exchange Using Passwords and Long Keys
Vladimir Kolesnikov and Charles Rackoff
2006/056 ( PDF )
Key Exchange Protocols: Security Definition, Proof Method and Applications
Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi
2006/055 ( PDF )
Multicollision Attacks on some Generalized Sequential Hash Functions
M. Nandi and D. R. Stinson
2006/054 ( PDF )
How to Build a Low-Cost, Extended-Range RFID Skimmer
Ilan Kirschenbaum and Avishai Wool
2006/053 ( PS PS.GZ PDF )
Cryptanalysis of the CFVZ cryptosystem
J. J. Climent and E. Gorla and J. Rosenthal
2006/052 ( PS PS.GZ PDF )
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert
2006/051 ( PDF )
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
2006/050 ( PDF )
Secure Device Pairing based on a Visual Channel
Nitesh Saxena and Jan-Erik Ekberg and Kari Kostiainen and N. Asokan
2006/049 ( PS PS.GZ )
Crossword Puzzle Attack on NLS
Joo Yeon Cho and Josef Pieprzyk
2006/048 ( PS PS.GZ PDF )
New Results on Multipartite Access Structures
Javier Herranz and German Saez
2006/047 ( PDF )
Cryptographically Sound Theorem Proving
Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner
2006/046 ( PS PS.GZ PDF )
Efficient Primitives from Exponentiation in Zp
Shaoquan Jiang
2006/045 ( PDF )
Fully Collusion Resistant Traitor Tracing
Dan Boneh and Amit Sahai and Brent Waters
2006/044 ( PS PS.GZ PDF )
Linear Integer Secret Sharing and Distributed Exponentiation
Ivan Damgard and Rune Thorbek
2006/043 ( PS PS.GZ PDF )
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
Mihir Bellare
2006/042 ( PDF )
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Sourav Mukhopadhyay and Palash Sarkar
2006/041 ( PS PS.GZ PDF )
Reactively Simulatable Certified Mail
Birgit Pfitzmann and Matthias Schunter and Michael Waidner
2006/040 ( PDF )
Linkable Democratic Group Signatures
Mark Manulis and Ahmad-Reza Sadeghi and Joerg Schwenk
2006/039 ( PDF )
Two-Round AES Differentials
Joan Daemen and Vincent Rijmen
2006/038 ( PDF )
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
Jintai Ding and Jason E. Gower and Dieter S. Schmidt
2006/037 ( PS PS.GZ PDF )
Message Authentication on 64-bit Architectures
Ted Krovetz
2006/036 ( PDF )
Vector Stream Cipher Instant Key Recovery
Sean O'Neil
2006/035 ( PDF )
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Nazar A. Saqib and Nareli Cruz-Cortés
2006/034 ( PDF )
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
Eike Kiltz and David Galindo
2006/033 ( PDF )
Arithmetic of Generalized Jacobians
Isabelle Déchène
2006/032 ( PS PS.GZ PDF )
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Deepak Kumar Dalai and Subhamoy Maitra
2006/031 ( PS PS.GZ PDF )
On a Variation of Kurosawa-Desmedt Encryption Scheme
Le Trieu Phong and Wakaha Ogata
2006/030 ( PDF )
Improved cryptanalysis of Py
Paul Crowley
2006/029 ( PS PS.GZ PDF )
Authenticated Hybrid Encryption for Multiple Recipients
Stéphanie Alt
2006/028 ( PDF )
Cryptanalysis of recently proposed Remote User Authentication Schemes
Thulasi Goriparthi, Manik Lal Das, Atul Negi and Ashutosh Saxena
2006/027 ( PS PS.GZ PDF )
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Vladimir Bayev
2006/026 ( PDF )
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
David Freeman
2006/025 ( PDF )
Signatures for Network Coding
Denis Charles and Kamal Jain and Kristin Lauter
2006/024 ( PDF )
Improving the Decoding Efficiency of Private Search
George Danezis and Claudia Diaz
2006/023 ( PS PS.GZ PDF )
A Method to Implement Direct Anonymous Attestation
HE GE
2006/021 ( PDF )
Cryptographic hash functions from expander graphs
Denis Charles and Eyal Goren and Kristin Lauter
2006/020 ( PS PS.GZ PDF )
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
Adam Smith
2006/019 ( PDF )
Hermes8 : A Low-Complexity Low-Power Stream Cipher
Ulrich Kaiser
2006/018 ( PS PS.GZ PDF )
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra
2006/017 ( PS PS.GZ PDF )
Threshold and Proactive Pseudo-Random Permutations
Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung
2006/016 ( PDF )
Message Modification for Step 21-23 on SHA-0
Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta
2006/015 ( PS PS.GZ )
A Family of Dunces: Trivial RFID Identification and Authentication Protocols
Gene Tsudik
2006/014 ( PS PS.GZ PDF )
Sound Computational Interpretation of Symbolic Hashes in the Standard Model
Flavio D. Garcia and Peter van Rossum
2006/013 ( PDF )
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
Hung-Yu Chien
2006/012 ( PS PS.GZ PDF )
Certificate-Based Encryption Without Random Oracles
Paz Morillo and Carla R`{a}fols
2006/011 ( PDF )
Formal Proof for the Correctness of RSA-PSS
Christina Lindenberg and Kai Wirt and Johannes Buchmann
2006/010 ( PDF )
Finding Characteristic Polynomials with Jump Indices
Steve Babbage and Matthew Dodd
2006/009 ( PS PS.GZ PDF )
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kay Tsay and Christopher Walstad
2006/008 ( PS PS.GZ PDF )
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
James A. Muir
2006/007 ( PDF )
Further Discussions on the Security of a Nominative Signature Scheme
Lifeng Guo and Guilin Wang and Duncan S. Wong
2006/006 ( PDF )
Group Key Agreement for Ad Hoc Networks
Lijun Liao
2006/005 ( PDF )
Pairing Calculation on Supersingular Genus 2 Curves
Colm O hEigeartaigh and Michael Scott
2006/004 ( PDF )
Provably Secure Subsitution of Cryptographic Tools
Lea Kissner and David Molnar
2006/003 ( PDF )
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Dragos Trinca
2006/002 ( PDF )
Geometric constructions of optimal linear perfect hash families
S.G. Barwick and W.-A. Jackson.
2006/001 ( PS PS.GZ PDF )
Homomorphic Cryptosystems and their Applications
Doerte K. Rappe
2005/469 ( PDF )
A lower bound on the higher order nonlinearity of algebraic immune functions
C. Carlet
2005/468 ( PDF )
Blind Attacks on Engineering Samples
Vanessa Gratzer and David Naccache
2005/467 ( PDF )
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
Ricardo Corin and Jerry den Hartog
2005/466 ( PDF )
Cryptanalysis of the Yang -Wang's password authentication schemes
Jue-Sam Chou and Ming-De Yang and Guey-Chuen Lee
2005/465 ( PDF )
A sequence approach to constructing perfect hash families
S.G. Barwick and W.-A. Jackson
2005/464 ( PS PS.GZ PDF )
Equivalent Keys in Multivariate Quadratic Public Key Systems
Christopher Wolf and Bart Preneel
2005/463 ( PDF )
More short signatures without random oracles
Victor K. Wei and Tsz Hon Yuen
2005/462 ( PS PS.GZ PDF )
A Simplified Quadratic Frobenius Primality Test
Martin Seysen
2005/461 ( PS PS.GZ PDF )
Parallel and Concurrent Security of the HB and HB+ Protocols
Jonathan Katz and Ji Sun Shin
2005/460 ( PDF )
One-Time HNP or Attacks on a Flawed El Gamal Revisited
Tomas Rosa
2005/459 ( PS PS.GZ PDF )
A Practical Attack on the Root Problem in Braid Groups
Anja Groch and Dennis Hofheinz and Rainer Steinwandt
2005/458 ( PS PS.GZ PDF )
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
James A. Muir
2005/457 ( PDF )
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
Jue-Sam Chou and Chu-Hsing Lin and Chia-Hung Chiu
2005/456 ( PDF )
A Secure Scheme for Authenticated Encryption
Fuw-Yi Yang
2005/455 ( PDF )
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
Robert W. Zhu and Xiaojian Tian and Duncan S. Wong
2005/454 ( PS PS.GZ PDF )
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi
2005/453 ( PDF )
Further Constructions of Almost Resilient Functions
Pinhui Ke and Jie Zhang and Qiaoyan Wen
2005/452 ( PDF )
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
Ran Canetti and Ling Cheung and Dilsun Kaynar and Moses Liskov and Nancy Lynch and Olivier Pereira and Roberto Segala
2005/451 ( PDF )
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
Jue-Sam Chou and Yalin Chen and Ming-De Yang
2005/450 ( PDF )
Improvement of Manik et al.¡¦s remote user authentication scheme
Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
2005/449 ( PDF )
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
Longjiang Qu and Guozhu Feng and Chao Li
2005/448 ( PS PS.GZ PDF )
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
Souradyuti Paul and Bart Preneel
2005/447 ( PDF )
A new key exchange protocol based on the decomposition problem
Vladimir Shpilrain and Alexander Ushakov
2005/446 ( PDF )
Democratic Group Signatures on Example of Joint Ventures
Mark Manulis
2005/445 ( PS PS.GZ PDF )
An Anonymous Authentication Scheme for Trusted Computing Platform
HE GE
2005/444 ( PDF )
Privacy-Preserving Polling using Playing Cards
Sid Stamm and Markus Jakobsson
2005/443 ( PDF )
Revised: Block Cipher Based Hash Function Construction From PGV
Duo Lei
2005/442 ( PDF )
One-Time Signatures Revisited: Have They Become Practical?
Dalit Naor and Amir Shenhav and Avishai Wool
2005/441 ( PS PS.GZ PDF )
Tight bound between nonlinearity and algebraic immunity
Mikhail Lobanov
2005/440 ( -- withdrawn -- )
HB++: a Lightweight Authentication Protocol Secure against Some Attacks
Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
2005/439 ( PDF )
A note on the n-spendable extension of Ferguson's single-term off-line coins
T. C. Lam
2005/438 ( PS PS.GZ PDF )
Minimal Assumptions for Efficient Mercurial Commitments
Yevgeniy Dodis
2005/437 ( -- withdrawn -- )
On Boolean functions with maximum algebraic immunity
Enes Pasalic
2005/436 ( PDF )
A Note on the Kasami Power Function
Doreen Hertel
2005/435 ( PDF )
Concurrent Blind Signatures without Random Oracles
Aggelos Kiayias and Hong-Sheng Zhou
2005/434 ( PDF )
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
Daniel R. L. Brown
2005/433 ( PDF )
Proxy Re-Signatures: New Definitions, Algorithms, and Applications
Giuseppe Ateniese and Susan Hohenberger
2005/432 ( PS PS.GZ PDF )
On the Security of Kaweichel
Dieter Schmidt
2005/431 ( PS PS.GZ PDF )
Is it possible to have CBE from CL-PKE?
Bo Gyeong Kang and Je Hong Park
2005/430 ( PDF )
F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei
2005/429 ( PDF )
Signature from a New Subgroup Assumption
Victor K. Wei
2005/428 ( PS PS.GZ PDF )
Loud and Clear: Human-Verifiable Authentication Based on Audio
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun
2005/427 ( PDF )
Solutions to Key Exposure Problem in Ring Signature
Joseph K. Liu and Duncan S. Wong
2005/426 ( PDF )
On the Security of a Certificateless Public-Key Encryption
Zhenfeng Zhang and Dengguo Feng
2005/425 ( PDF )
Improved Collision Attack on Hash Function MD5
Jie Liang and Xuejia Lai
2005/424 ( PS PS.GZ PDF )
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Sven Laur and N. Asokan and Kaisa Nyberg
2005/423 ( -- withdrawn -- )
ID-based signature and Key-insulated threshold signature
Jin Li and Fangguo Zhang
2005/422 ( PDF )
On Anonymity of Group Signatures
Zhou Sujing and Lin Dongdai
2005/421 ( PS PS.GZ )
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Michael Backes and Birgit Pfitzmann and Andre Scedrov
2005/420 ( PS PS.GZ PDF )
Efficient Scalar Multiplication by Isogeny Decompositions
Christophe Doche and Thomas Icart and David R. Kohel
2005/419 ( PDF )
Unified Point Addition Formul{\ae} and Side-Channel Attacks
Douglas Stebila and Nicolas Th\'eriault
2005/418 ( PDF )
Generic On-Line/Off-Line Threshold Signatures
Chris Crutchfield and David Molnar and David Turner and David Wagner
2005/417 ( PS PS.GZ PDF )
Correlation-Resistant Storage via Keyword-Searchable Encryption
Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose
2005/416 ( PDF )
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Kenneth G. Paterson and Arnold K.L. Yau
2005/415 ( -- withdrawn -- )
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
Benjamin Gittins and Howard A. Landman and Sean O'Neil and Ron Kelson
2005/414 ( -- withdrawn -- )
Authenticated Encryption Mode of VEST Ciphers
Sean O'Neil and Benjamin Gittins
2005/413 ( -- withdrawn -- )
VEST Hardware-Dedicated Stream Ciphers
Sean O'Neil and Benjamin Gittins and Howard A. Landman
2005/412 ( PDF )
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
Tsz Hon Yuen and Victor K. Wei
2005/411 ( PDF )
More Compact E-Cash with Efficient Coin Tracing
Victor K. Wei
2005/410 ( PDF )
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
Victor K. Wei
2005/409 ( -- withdrawn -- )
Intrusion-Resilient Authentication in the Limited Communication Model
David Cash and Yan Zong Ding and Wenke Lee and Richard Lipton
2005/408 ( PDF )
Compartmented Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
2005/407 ( PDF )
Anonymous Signature Schemes
Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang
2005/406 ( PS PS.GZ PDF )
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
Dominique Unruh
2005/405 ( PS PS.GZ PDF )
Building Better Signcryption Schemes with Tag-KEMs
Tor E. Bj{\o}rstad and Alexander W. Dent
2005/404 ( PDF )
Preventing Attacks on Machine Readable Travel Documents (MRTDs)
Gaurav S. Kc and Paul A. Karger
2005/403 ( PDF )
Collisions in the Original Version of a Chaotic Hash Function
Scott Contini
2005/402 ( PS PS.GZ PDF )
Some Analysis of Radix-r Representations
Dong-Guk Han and Tsuyoshi Takagi
2005/401 ( PS PS.GZ PDF )
A Computationally Sound Mechanized Prover for Security Protocols
Bruno Blanchet
2005/400 ( PDF )
Improved Collision Attack on MD5
Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta
2005/399 ( PS PS.GZ )
On affine rank of spectrum support for plateaued function
Yuriy Tarannikov
2005/398 ( PDF )
Preliminary Analysis of DHA-256
IAIK Krypto Group
2005/397 ( PDF )
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
Neil Kauer and Tony Suarez and Yuliang Zheng
2005/396 ( PS PS.GZ PDF )
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
Pallavi Joshi and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
2005/395 ( PDF )
Secure Group Key Establishment Revisited
Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2005/394 ( PDF )
How to Shuffle in Public
Ben Adida and Douglas Wikstr\"{o}m
2005/393 ( PS PS.GZ PDF )
Multivariate Quadratic Polynomials in Public Key Cryptography
Christopher Wolf
2005/392 ( PDF )
An Efficient Variant of RSA Cryptosystem
Sahadeo Padhye
2005/391 ( PS PS.GZ PDF )
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto
2005/390 ( PS PS.GZ PDF )
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto and Edward Dawson
2005/389 ( PS PS.GZ PDF )
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
KyungKeun Lee and JoongHyo Oh and SangJae Moon
2005/388 ( PDF )
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
YongBin Zhou and DengGuo Feng
2005/387 ( PDF )
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
C. Carlet
2005/386 ( PS PS.GZ PDF )
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
Fangguo Zhang, Xiaofeng Chen, Willy Susilo and Yi Mu
2005/385 ( PDF )
Practical Group Signatures without Random Oracles
Giuseppe Ateniese and Jan Camenisch and Susan Hohenberger and Breno de Medeiros
2005/384 ( PS PS.GZ PDF )
Some Explicit Formulae of NAF and its Left-to-Right Analogue
Dong-Guk Han and Tetsuya Izu and Tsuyoshi Takagi
2005/383 ( PS PS.GZ PDF )
Key Mixing in Block Ciphers through Addition modulo $2^n$
Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
2005/382 ( PDF )
One-Wayness Equivalent to General Factoring
Kaoru Kurosawa and Tsuyoshi Takagi
2005/381 ( PDF )
Compact Group Signatures Without Random Oracles
Xavier Boyen and Brent Waters
2005/380 ( PDF )
Breaking RSA May Be As Difficult As Factoring
Daniel R. L. Brown
2005/379 ( PS PS.GZ PDF )
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Jonathan Katz and Yehuda Lindell
2005/378 ( PDF )
A New Protocol for Conditional Disclosure of Secrets And Its Applications
Sven Laur and Helger Lipmaa
2005/377 ( PS PS.GZ PDF )
Exclusion-Intersection Encryption
Sherman S.M. Chow and Siu-Ming Yiu
2005/376 ( PDF )
Representing small identically self-dual matroids by self-dual codes
Carles Padro and Ignacio Gracia
2005/375 ( PDF )
Truncated differential cryptanalysis of five rounds of Salsa20
Paul Crowley
2005/374 ( PDF )
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
Kunpeng Wang, Bao Li
2005/373 ( PS PS.GZ PDF )
Efficient Broadcast Encryption Scheme with Log-Key Storage
Yong Ho Hwang and Pil Joong Lee
2005/372 ( PDF )
Secret color images sharing schemes based on XOR operation
Dao-Shun Wang, Lei Zhang, Ning Ma and Lian-Sheng Huang
2005/371 ( PDF )
On a Traitor Tracing Scheme from ACISP 2003
Dongvu Tonien
2005/370 ( PS PS.GZ PDF )
Resource Fairness and Composability of Cryptographic Protocols
Juan A. Garay and Philip MacKenzie and Manoj Prabhakaran and Ke Yang
2005/369 ( PDF )
Secure and {\sl Practical} Identity-Based Encryption
David Naccache
2005/368 ( PDF )
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
David Molnar and Matt Piotrowski and David Schultz and David Wagner
2005/367 ( PDF )
Searchable Keyword-Based Encryption
Dong Jin Park, Juyoung Cha, and Pil Joong Lee
2005/366 ( PS PS.GZ PDF )
Efficient Compilers for Authenticated Group Key Exchange
Qiang Tang and Chris J. Mitchell
2005/365 ( PS PS.GZ PDF )
Derandomization in Cryptography
Boaz Barak and Shien Jin Ong and Salil Vadhan
2005/364 ( PS PS.GZ PDF )
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
Amitabh Saxena
2005/363 ( PDF )
Elliptic Curves with Low Embedding Degree
Florian Luca and Igor E. Shparlinski
2005/362 ( PS PS.GZ PDF )
On a (Flawed) Proposal to Build More Pairing-Friendly Curves
Michael Scott and Paulo S. L. M. Barreto
2005/361 ( PS PS.GZ PDF )
Strict Avalanche Criterion Over Finite Fields
Yuan Li and T.W.Cusick
2005/360 ( PS PS.GZ )
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
Jens Matthias-Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2005/359 ( PS PS.GZ PDF )
An infinite class of quadratic APN functions which are not equivalent to power mappings
L. Budaghyan and C. Carlet and P. Felke and G. Leander
2005/358 ( PDF )
Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
Haining Fan and Duo Liu and Yiqi Dai
2005/357 ( PDF )
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Kyung-Ah Shim
2005/356 ( PDF )
Exponential Memory-Bound Functions for Proof of Work Protocols
Fabien Coelho
2005/355 ( PS PS.GZ PDF )
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
Rongxing Lu and Zhenfu Cao
2005/354 ( PS PS.GZ PDF )
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Rongxing Lu and Zhenfu Cao and Renwang Su and Jun Shao
2005/353 ( PS PS.GZ PDF )
On the Security of A Group Signature Scheme
Jianhong Zhang, Wei Zou,
2005/352 ( PS PS.GZ PDF )
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Danilo Gligoroski
2005/351 ( PS PS.GZ PDF )
Errors in Computational Complexity Proofs for Protocols
Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
2005/350 ( PS PS.GZ )
Is SHA-1 conceptually sound?
Charanjit S. Jutla and Anindya C. Patthak
2005/349 ( PS PS.GZ PDF )
Oblivious Transfer and Linear Functions
Ivan B. Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
2005/348 ( -- withdrawn -- )
On Proofs of Security for Certificateless Cryptosystems
Alexander W. Dent and Caroline Kudla
2005/347 ( -- withdrawn -- )
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
Song Han and Elizabeth Chang and Tharam Dillon
2005/346 ( PS PS.GZ )
Batch Verification of Validity of Bids in Homomorphic E-auction
Kun Peng, Colin Boyd and Ed Dawson
2005/345 ( PDF )
Group Signatures with Efficient Concurrent Join
Aggelos Kiayias and Moti Yung
2005/344 ( PS PS.GZ PDF )
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
Tapan Rai
2005/343 ( PS PS.GZ PDF )
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
Amitabh Saxena and Serguey Priymak and Ben Soh
2005/342 ( PDF )
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
Pu Duan and Shi Cui and Choong Wah Chan
2005/341 ( PS PS.GZ PDF )
A Universally Composable Scheme for Electronic Cash
Marten Trolin
2005/340 ( -- withdrawn -- )
A New Approach to Counteract DPA Attacks on Block Ciphers
Christophe Giraud and Emmanuel Prouff
2005/339 ( PS PS.GZ PDF )
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
Zhaohui Cheng and Liqun Chen and Richard Comley and Qiang Tang
2005/338 ( PDF )
An Improved Power Analysis Attack Against Camellia's Key Schedule
Lu Xiao and Howard M. Heys
2005/337 ( PDF )
Statistical Multiparty Computation Based on Random Walks on Graphs
Liangliang Xiao, Mulan Liu, and Zhifang Zhang
2005/336 ( PDF )
Pairing-based identification schemes
David Freeman
2005/335 ( PS PS.GZ PDF )
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
Amitabh Saxena and Ben Soh
2005/334 ( PS PS.GZ PDF )
Secure Key-Updating for Lazy Revocation
Michael Backes and Christian Cachin and Alina Oprea
2005/333 ( PDF )
Universally Composable Disk Encryption Schemes
Ivan Damg{\aa}rd and Kasper Dupont
2005/332 ( PS PS.GZ PDF )
Classification of Cubic $(n-4)$-resilient Boolean Functions
An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
2005/331 ( PS PS.GZ PDF )
A Fuzzy Sketch with Trapdoor
Julien Bringer and Hervé Chabanne and Quoc Dung Do
2005/330 ( PDF )
A Dedicated Processor for the eta Pairing
Robert Ronan and Colm O hEigeartaigh and Colin Murphy and Michael Scott and Tim Kerins and W.P. Marnane
2005/329 ( PDF )
Cryptographic Protocols to Prevent Spam
Amir Herzberg
2005/328 ( PDF )
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
Jonathan Katz and Chiu-Yuen Koo
2005/327 ( PS PS.GZ PDF )
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee
2005/326 ( PDF )
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2005/325 ( PS PS.GZ PDF )
An Effective Method to Implement Group Signature with Revocation
HE GE
2005/324 ( PS PS.GZ PDF )
Extracting bits from coordinates of a point of an elliptic curve
Nicolas G\"urel
2005/323 ( PDF )
The Weil pairing on elliptic curves over C
Steven D. Galbraith
2005/322 ( PDF )
Evolutionary Design of Trace Form Bent Functions
Min yang and Qingshu Meng and Huanguo Zhang
2005/321 ( PS PS.GZ PDF )
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
Liam Keliher and Jiayuan Sui
2005/320 ( PDF )
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung and Benoit Chevallier-Mames and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
2005/319 ( PS PS.GZ PDF )
ID-based Restrictive Partially Blind Signatures and Applications
Xiaofeng Chen and Fangguo Zhang and Shengli Liu
2005/318 ( PDF )
Bounds on Birthday Attack Times
Michael J. Wiener
2005/317 ( PS PS.GZ PDF )
Ring Signatures without Random Oracles
Sherman S. M. Chow and Joseph K. Liu and Victor K. Wei and Tsz Hon Yuen
2005/316 ( PS PS.GZ PDF )
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Dong-Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyo Il Chung
2005/315 ( PDF )
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
David Molnar and Andrea Soppera and David Wagner
2005/314 ( PS PS.GZ PDF )
Fast genus 2 arithmetic based on Theta functions
P. Gaudry
2005/313 ( PS PS.GZ PDF )
Deterministic Identity-Based Signatures for Partial Aggregation
Javier Herranz
2005/312 ( PDF )
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
Xijin Tang and Yong Feng
2005/311 ( PDF )
What do S-boxes Say in Differential Side Channel Attacks?
Cecile Canovas and Jessy Clediere
2005/310 ( PS PS.GZ PDF )
Meta Ring Signature
Hiroyuki OKAZAKI and Ryuichi SAKAI and Masao KASAHARA
2005/309 ( PS PS.GZ PDF )
A New Efficient ID-Based Authenticated Key Agreement Protocol
Quan Yuan and Songping Li
2005/308 ( PDF )
Adaptable Group-Oriented Signature
Chunbo Ma, Jun Ao, and Dake He
2005/307 ( PS PS.GZ PDF )
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
K. Bentahar
2005/306 ( PDF )
Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
Yasuyuki MURAKAMI, Masao KASAHARA
2005/305 ( PDF )
Steganography with Imperfect Samplers
Anna Lysyanskaya and Maria Meyerovich
2005/304 ( PS PS.GZ PDF )
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Adam Bender and Jonathan Katz and Ruggero Morselli
2005/303 ( PDF )
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Kevin Fu and Seny Kamara and Tadayoshi Kohno
2005/302 ( PS PS.GZ PDF )
Elliptic Curves for Pairing Applications
Angela Murphy and Noel Fitzpatrick
2005/301 ( PDF )
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Paris Kitsos
2005/300 ( PS PS.GZ PDF )
Towards Security Two-part Authenticated Key Agreement Protocols
Songping Li and Quan Yuan and Jin Li
2005/299 ( PDF )
Nonlinearity of the Round Function
Marcin Kontak and Janusz Szmidt
2005/298 ( PDF )
Keeping Denial-of-Service Attackers in the Dark
Gal Badishi and Amir Herzberg and Idit Keidar
2005/297 ( PS PS.GZ PDF )
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
Maithili Narasimha and Gene Tsudik
2005/296 ( PS PS.GZ PDF )
A Key Establishment IP-Core for Ubiquitous Computing
Markus Volkmer and Sebastian Wallner
2005/295 ( PS PS.GZ PDF )
Hidden Exponent RSA and Efficient Key Distribution
HE GE
2005/294 ( PS PS.GZ PDF )
On Fairness in Simulatability-based Cryptographic Systems
Michael Backes and Dennis Hofheinz and J\"orn M\"uller-Quade and Dominique Unruh
2005/293 ( PDF )
Speeding Up Pairing Computation
Colm O hEigeartaigh
2005/292 ( PDF )
Improved Integral Cryptanalysis of FOX Block Cipher
Wu Wenling, Zhang Wentao, and Feng Dengguo
2005/291 ( PDF )
Cryptography In the Bounded Quantum-Storage Model
Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner
2005/290 ( PS PS.GZ PDF )
Perfect Non-Interactive Zero Knowledge for NP
Jens Groth and Rafail Ostrovsky and Amit Sahai
2005/289 ( PS PS.GZ PDF )
Overview of Key Agreement Protocols
Ratna Dutta and Rana Barua
2005/288 ( PS PS.GZ PDF )
Direct Chosen Ciphertext Security from Identity-Based Techniques
Xavier Boyen and Qixiang Mei and Brent Waters
2005/287 ( PS PS.GZ PDF )
Provable Effi