default search action
IACR Cryptology ePrint Archive, Volume 2004
Volume 2004, 2004
- Yuichi Komano, Kazuo Ohta:
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation. 2 - Erik Zenner:
On the Role of the Inner State Size in Stream Ciphers. 3 - Huafei Zhu:
Universal Undeniable Signatures. 5 - Boaz Barak, Yehuda Lindell, Tal Rabin:
Protocol Initialization for the Framework of Universal Composability. 6 - Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Traceable Signatures. 7 - Mihir Bellare, Adriana Palacio:
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. 8 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness. 9 - Tom St. Denis:
Fast Pseudo-Hadamard Transforms. 10 - Adam J. Slagell:
Known-Plaintext Attack Against a Permutation Based Video. 11 - María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. 12 - Jean-Sébastien Coron, Antoine Joux:
Cryptanalysis of a Provably Secure Cryptographic Hash Function. 13 - Sugata Gangopadhyay, Subhamoy Maitra:
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions. 14 - Trond Stølen Gustavsen, Kristian Ranestad:
An AGM-type elliptic curve point counting algorithm in characteristic three. 15 - Dennis Hofheinz, Jörn Müller-Quade:
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer. 16 - Michael Scott:
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints. 17 - Song-Ju Kim, Ken Umeno, Akio Hasegawa:
Corrections of the NIST Statistical Test Suite for Randomness. 18 - Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. 19 - Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Optimal Signcryption from Any Trapdoor Permutation. 20 - Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. 21 - Steven M. Bellovin, William R. Cheswick:
Privacy-Enhanced Searches Using Encrypted Bloom Filters. 22 - Asnat Dadon-Elichai:
RDS: Remote Distributed Scheme for Protecting Mobile Agents. 23 - Sergey Agievich, Andrey Afonenko:
Exponential S-boxes. 24 - Hamilton E. Link, William D. Neumann:
Clarifying Obfuscation: Improving the Security of White-Box Encoding. 25 - Tom St. Denis:
The CSQUARE Transform. 26 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. 27 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. 28 - Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. 29 - Colin Stahlke:
Point Compression on Jacobians of Hyperelliptic Curves over Fq. 30 - Igor A. Semaev:
Summation polynomials and the discrete logarithm problem on elliptic curves. 31 - Michael Scott, Paulo S. L. M. Barreto:
Compressed Pairings. 32 - Muxiang Zhang:
New Approaches to Password Authenticated Key Exchange based on RSA. 33 - Gideon Samid:
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic. 34 - Phillip Rogaway, Thomas Shrimpton:
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. 35 - Yan-Cheng Chang:
Single Database Private Information Retrieval with Logarithmic Communication. 36 - Fuw-Yi Yang, Jinn-ke Jan:
A Provably Secure Scheme for Restrictive Partially Blind Signatures. 37 - Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing without Key Exposure. 38 - Victor K. Wei:
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. 39 - Lizhen Yang, Kefei Chen:
Cryptanalysis of a timestamp-based password authentication scheme. 40 - Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries. 41 - (Withdrawn) Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge. 42
- Xiutao Feng, Quanlong Wang, Zongduo Dai:
Multi-sequences with d-perfect property. 43 - Sujing Zhou:
Transitive Signatures Based on Non-adaptive Standard Signatures. 44 - Yehuda Lindell:
Lower Bounds and Impossibility Results for Concurrent Self Composition. 45 - Lih-Chung Wang, Fei-Hwang Chang:
Revision of Tractable Rational Map Cryptosystem. 46 - Yodai Watanabe:
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes. 47 - Bartosz Zoltak:
Tail-MAC: A Message Authentication Scheme for Stream Ciphers. 48 - Christophe Clavier:
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm. 49 - Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen:
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. 50 - Yan-Cheng Chang, Michael Mitzenmacher:
Privacy Preserving Keyword Searches on Remote Encrypted Data. 51 - Tal Malkin, Satoshi Obana, Moti Yung:
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. 52 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Efficient and Universally Composable Committed Oblivious Transfer and Applications. 53 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. 54 - Christophe Doche:
Redundant Trinomials for Finite Fields of Characteristic 2. 55 - Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. 57 - Michael Scott, Paulo S. L. M. Barreto:
Generating more MNT elliptic curves. 58 - Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. 59 - Ben Lynn, Manoj Prabhakaran, Amit Sahai:
Positive Results and Techniques for Obfuscation. 60 - Bo-Yin Yang, Jiun-Ming Chen:
TTS: Rank Attacks in Tame-Like Multivariate PKCs. 61 - John Black, Martin Cochran, Thomas Shrimpton:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. 62 - Helger Lipmaa:
An Oblivious Transfer Protocol with Log-Squared Communication. 63 - Ratna Dutta, Rana Barua, Palash Sarkar:
Pairing-Based Cryptographic Protocols : A Survey. 64 - Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing. 65 - Kris Tiri, Ingrid Verbauwhede:
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC's. 66 - Kris Tiri, Ingrid Verbauwhede:
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC's against Differential Power Analysis. 67 - Kris Tiri, Ingrid Verbauwhede:
Synthesis of Secure FPGA Implementations. 68 - Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. 69 - Steven D. Galbraith, Victor Rotger:
Easy decision-Diffie-Hellman groups. 70 - Waldyr D. Benits Jr., Routo Terada:
An IBE Scheme to Exchange Authenticated Secret Keys. 71 - Christopher Wolf, Bart Preneel:
Asymmetric Cryptography: Hidden Field Equations. 72 - Pierrick Gaudry:
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem. 73 - Liam Keliher, Henk Meijer, Stafford E. Tavares:
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael. 74 - Alexis Warner Machado:
An Hybrid Mode of Operation. 75 - Aggelos Kiayias, Moti Yung:
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. 76 - Mihir Bellare, Haixia Shi, Chong Zhang:
Foundations of Group Signatures: The Case of Dynamic Groups. 77 - Tadayoshi Kohno:
Analysis of the WinZip encryption method. 78 - Zhaohui Cheng, Luminita Vasiu, Richard Comley:
Pairing-Based One-Round Tripartite Key Agreement Protocols. 79 - Marius Oliver Gheorghita:
HENKOS Stream Cipher. 80 - Philip Hawkes, Gregory G. Rose:
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers. 81 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. 82 - Bo Yang, Kaijie Wu, Ramesh Karri:
Scan Based Side Channel Attack on Data Encryption Standard. 83 - David Galindo, Sebastià Martín Molleví, Jorge L. Villar:
Evaluating elliptic curve based KEMs in the light of pairings. 84 - Tom St. Denis:
The CS2 Block Cipher. 85 - Amit Sahai, Brent Waters:
Fuzzy Identity Based Encryption. 86 - Karl Rubin, Alice Silverberg:
Using primitive subgroups to do more with fewer bits. 87 - (Withdrawn) Efficient Batch Verification of Signature Schemes based on Bilinear Maps. 88
- Mahalingam Ramkumar, Nasir D. Memon:
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. 89 - Ratna Dutta, Rana Barua, Palash Sarkar:
Provably Secure Authenticated Tree Based Group Key Agreement Protocol. 90 - Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. 91 - Hongjun Wu:
A New Stream Cipher HC-256. 92 - Giuseppe Ateniese, Breno de Medeiros:
A Provably Secure Nyberg-Rueppel Signature Variant with Applications. 93 - Alex Biryukov:
Block Ciphers and Stream Ciphers: The State of the Art. 94 - Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda:
GNFS Factoring Statistics of RSA-100, 110, ..., 150. 95 - (Withdrawn) On the Ambiguity of Concurrent Signatures. 96
- Vipul Goyal:
How To Re-initialize a Hash Chain. 97 - María Isabel González Vasco, David Pérez-García:
Attacking a Public Key Cryptosystem Based on Tree Replacement. 98 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. 99 - Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan:
The Sorcerer's Apprentice Guide to Fault Attacks. 100 - Johannes Blömer, Jorge Guajardo, Volker Krummel:
Provably Secure Masking of AES. 101 - Benoît Libert, Jean-Jacques Quisquater:
The Exact Security of an Identity Based Signature and its Applications. 102 - Jintai Ding, Dieter Schmidt:
Cryptanalysis of SFlash v3. 103 - Lan Nguyen, Reihaneh Safavi-Naini:
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings. 104 - Alessandro Acquisti:
Receipt-Free Homomorphic Elections and Write-in Ballots. 105 - Pim Tuyls, Jasper Goseling:
Capacity and Examples of Template Protecting Biometric Authentication Systems. 106 - Bertrand Byramjee, Sylvain Duquesne:
Classification of genus 2 curves over F2n and optimization of their arithmetic. 107 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. 108 - Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons:
Concealing Complex Policies with Hidden Credentials. 109 - Carlisle Adams:
Designing Against the 'Overdefined System of Equations' Attack. 110 - Gregory V. Bard:
The Vulnerability of SSL to Chosen Plaintext Attack. 111 - Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Relation between XL algorithm and Gröbner Bases Algorithms. 112 - Dominik Raub, Rainer Steinwandt, Jörn Müller-Quade:
On the Security and Composability of the One Time Pad. 113 - Liqun Chen, John Malone-Lee:
Improved Identity-Based Signcryption. 114 - Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won:
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange. 115 - Ran Canetti, Eyal Kushilevitz, Yehuda Lindell:
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions. 116 - Noel McCullagh, Paulo S. L. M. Barreto:
Efficient and Forward-Secure Identity-Based Signcryption. 117 - Stéphane Flon, Roger Oyono, Christophe Ritzenthaler:
Fast addition on non-hyperelliptic genus 3 curves. 118 - Masayuki Abe, Serge Fehr:
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. 119 - Bartosz Zoltak:
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup. 120 - Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. 121 - Noel McCullagh, Paulo S. L. M. Barreto:
A New Two-Party Identity-Based Authenticated Key Agreement. 122 - Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On security of XTR public key cryptosystems against Side Channel Attacks. 123 - Douglas Wikström:
Universally Composable DKG with Linear Number of Exponentiations. 124 - Shai Halevi:
EME*: extending EME to handle arbitrary-length messages with associated data. 125 - Haining Fan, Yiqi Dai:
Two Software Normal Basis Multiplication Algorithms for GF(2n). 126 - Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won:
DDH-based Group Key Agreement in a Mobile Environment. 127 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic Block Ciphers. 128 - Joe Suzuki:
Generalizing Kedlaya's order counting based on Miura Theory. 129 - David P. Woodruff, Jessica Staddon:
Private Inference Control. 130 - Jung Hee Cheon, Yongdae Kim, HyoJin Yoon:
A New ID-based Signature with Batch Verification. 131 - Robert Granger, Dan Page, Martijn Stam:
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography. 132 - Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. 133 - Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller:
Secure and Efficient Masking of AES - A Mission Impossible? 134 - Vipul Goyal:
More Efficient Server Assisted One Time Signatures. 135 - Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. 136 - Haining Fan, Yiqi Dai:
New GF(2n) Parallel Multiplier Using Redundant Representation. 137 - Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval:
How to Disembed a Program? 138 - Manoj Prabhakaran, Amit Sahai:
New Notions of Security: Achieving Universal Composability without Trusted Setup. 139 - (Withdrawn) Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher. 140
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic AES. 141 - (Withdrawn) Elliptic Curve based Signcryption and its Multi-party Schemes. 142
- Nicolas T. Courtois:
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash. 143 - Alexander Maximov, Martin Hell, Subhamoy Maitra:
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables. 144 - Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier:
Electromagnetic Side Channels of an FPGA Implementation of AES. 145 - Eli Biham, Rafi Chen:
Near-Collisions of SHA-0. 146 - Matthew J. Campagna, Amit Sethi:
Key Recovery Method for CRT Implementation of RSA. 147 - Zuowen Tan, Zhuojun Liu:
Provably Secure Delegation-by-Certification Proxy Signature Schemes. 148 - Elena Trichina, Lesya M. Korkishko:
Secure and Efficient AES Software Implementation for Smart Caards. 149 - Young-Ran Lee, Hyang-Sook Lee:
An Authenticated Certificateless Public Key Encryption Scheme. 150 - Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi:
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type y2=x2k+1+ax. 151 - Neal Koblitz, Alfred Menezes:
Another Look at "Provable Security". 152 - Pierrick Gaudry, Emmanuel Thomé, Nicolas Thériault, Claus Diem:
A double large prime variation for small genus hyperelliptic index calculus. 153 - Amir Herzberg:
Controlling Spam by Secure Internet Content Selection. 154 - Amir Herzberg, Ahmad Jbara:
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks. 155 - Kenneth G. Paterson, Fred Piper, Rüdiger Schack:
Quantum cryptography: a practical information security perspective. 156 - Robert Granger, Dan Page, Martijn Stam:
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three. 157 - Olivier Benoît, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan:
Mobile Terminal Security. 158 - Gergely Ács, Levente Buttyán, István Vajda:
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. 159 - Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable Public-Key Tracing and Revoking. 160 - Koh-ichi Nagao:
Improvement of ThéLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus. 161 - Ivan Damgård, Thomas Pedersen, Louis Salvail:
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission. 162 - (Withdrawn) On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. 163
- Man Ho Au, Victor K. Wei:
ID-based Cryptography from Composite Degree Residuosity. 164 - Dan Page, Nigel P. Smart, Frederik Vercauteren:
A comparison of MNT curves and supersingular curves. 165 - Éliane Jaulmes, Reynald Lercier:
FRMAC, a Fast Randomized Message Authentication Code. 166 - Fuw-Yi Yang, Jinn-ke Jan:
A Secure and Efficient Key Exchange Protocol for Mobile Communications. 167 - Tzuong-Tsieng Moh, Jiun-Ming Chen, Bo-Yin Yang:
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack. 168 - Alexander W. Dent, Allan Tomlinson:
Regional Blackouts: Protection of Broadcast Content on 3G Networks. 169 - Rafail Ostrovsky, Charles Rackoff, Adam D. Smith:
Efficient Consistency Proofs for Generalized Queries on a Committed Database. 170 - Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. 171 - Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. 172 - Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. 173 - Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. 174 - Yehuda Lindell, Benny Pinkas:
A Proof of Yao's Protocol for Secure Two-Party Computation. 175 - Andrew Burnett, Adam Duffy, Tom Dowling:
A Biometric Identity Based Signature Scheme. 176 - Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin:
Updating the Parameters of a Threshold Scheme by Minimal Broadcast. 177 - Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Optimal Updating of Ideal Threshold Schemes. 178 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. 179 - Brent R. Waters:
Efficient Identity-Based Encryption Without Random Oracles. 180 - Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. 181 - Minh-Huyen Nguyen, Salil P. Vadhan:
Simpler Session-Key Generation from Short Random Passwords. 182 - Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn:
A New Forward Secure Signature Scheme. 183 - Amit K. Awasthi, Sunder Lal:
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. 184 - Frederik Armknecht:
On the Existence of low-degree Equations for Algebraic Attacks. 185 - (Withdrawn) A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy. 186
- Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater:
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version. 187 - Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax:
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design. 188 - Denis Xavier Charles, Kristin E. Lauter:
Computing Modular Polynomials. 189 - Javier Herranz, Germán Sáez:
Distributed Ring Signatures for Identity-Based Scenarios. 190 - Pradeep Kumar Mishra:
Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations. 191 - (Withdrawn) Security Pitfalls of an efficient remote user authentication scheme using smart cards. 192
- David A. McGrew, John Viega:
The Security and Performance of the Galois/Counter Mode of Operation (Full Version). 193 - Rosario Gennaro, Victor Shoup:
A Note on An Encryption Scheme of Kurosawa and Desmedt. 194 - Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi:
Signed Binary Representations Revisited. 195 - Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. 196 - Helmut Kahl:
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation. 197 - Laszlo Hars:
Long Modular Multiplication for Cryptographic Applications. 198 - Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu:
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. 199 - An Braeken, Svetla Nikova, Ventzislav Nikov:
On Cheating Immune Secret Sharing. 200 - Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He:
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing. 201 - Yuri L. Borissov, An Braeken, Svetla Nikova:
Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions. 202 - John Black, Martin Cochran, Ryan W. Gardner:
How to Cheat at Chess: A Security Analysis of the Internet Chess Club. 203 - Markus Volkmer, André Schaumburg:
Authenticated tree parity machine key exchange. 204 - Ernie Brickell, Jan Camenisch, Liqun Chen:
Direct Anonymous Attestation. 205 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. 206 - Philip Hawkes, Michael Paddon, Gregory G. Rose:
On Corrective Patterns for the SHA-2 Family. 207 - Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring. 208 - Christoph Ludwig:
The Security and Efficiency of Micciancio's Cryptosystem. 209 - Alexander W. Dent:
Hybrid Cryptography. 210 - Ian F. Blake, Aldar C.-F. Chan:
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing. 211 - Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. 212 - Fangguo Zhang:
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery. 213 - An Braeken, Christopher Wolf, Bart Preneel:
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality. 214 - Mihir Bellare, Gregory Neven:
Transitive Signatures: New Schemes and Proofs. 215 - Markus Volkmer, Sebastian Wallner:
Tree Parity Machine Rekeying Architectures. 216 - Aggelos Kiayias, Moti Yung:
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice. 217 - Eiichiro Fujisaki:
Plaintext-Simulatability. 218 - Yevgeniy Dodis, Adam D. Smith:
Entropic Security and the Encryption of High Entropy Messages. 219 - Heiko Stamer, Friedrich Otto:
On Oleshchuk's Public Key Cryptosystem. 220 - Mihir Bellare, Adriana Palacio:
Towards Plaintext-Aware Public-Key Encryption without Random Oracles. 221 - An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. 222 - Xinxin Fan, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves. 223 - Marc Joye, David Naccache, Stéphanie Porte:
The Polynomial Composition Problem in (Z/nZ)[X]. 224 - Jovan Dj. Golic:
Vectorial Boolean functions and induced algebraic equations. 225 - Boaz Barak, Yehuda Lindell, Salil P. Vadhan:
Lower Bounds for Non-Black-Box Zero Knowledge. 226 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
Sign Change Fault Attacks On Elliptic Curve Cryptosystems. 227 - Honggang Hu, Dengguo Feng:
Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z2l. 228 - Xin Lü, Zhi Ma, Dengguo Feng:
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes. 229 - Fuw-Yi Yang, Jinn-ke Jan:
A Provable Secure Scheme for Partially Blind Signatures. 230 - Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption. 231 - Frederik Armknecht, Joseph Lano, Bart Preneel:
Extending the Resynchronization Attack. 232 - Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. 233 - Zuo-Wen Tan, Zhuo-Jun Liu:
On the security of some nonrepudiable threshold proxy signature schemes with known signers. 234 - Alfred Menezes, Edlyn Teske:
Cryptographic Implications of Hess' Generalized GHS Attack. 235 - Xiaotong Fu, Chunxiang Xu, Guozhen Xiao:
Forgery Attacks on Chang et al.'s signature scheme with message recovery. 236 - Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. 237 - Amit K. Awasthi, Sunder Lal:
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme. 238 - Arkady Berenstein, Leon Chernyak:
Geometric Key Establishment. 239 - Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura:
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields. 240 - Colm O'hEigeartaigh:
A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2. 241 - Vladimir Shpilrain, Gabriel Zapata:
Combinatorial group theory and public key cryptography. 242 - Giuseppe Ateniese, Breno de Medeiros:
On the Key Exposure Problem in Chameleon Hashes. 243 - Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. 244 - Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On codes, matroids and secure multi-party computation from linear secret sharing schemes. 245 - Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell:
Upper and Lower Bounds on Black-Box Steganography. 246 - Jovan Dj. Golic, Guglielmo Morgari:
Vectorial fast correlation attacks. 247 - An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties. 248 - Zhaohui Cheng, Richard Comley:
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol. 249 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:
Identity Based Threshold Proxy Signature. 250 - Junghyun Nam, Seungjoo Kim, Dongho Won:
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices. 251 - Mihir Bellare, Chanathip Namprempre, Gregory Neven:
Security Proofs for Identity-Based Identification and Signature Schemes. 252 - Stefan Lucks:
Design Principles for Iterated Hash Functions. 253 - Jovan Dj. Golic:
New paradigms for digital generation and post-processing of random data. 254 - Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi:
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. 255 - Claude Carlet, Sihem Mesnager:
On the supports of the Walsh transforms of Boolean functions. 256 - Junghyun Nam, Seungjoo Kim, Dongho Won:
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme. 257 - Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart:
Escrow-Free Encryption Supporting Cryptographic Workflow. 258 - An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. 259 - Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won:
Secure Group Communications over Combined Wired/Wireless Networks. 260 - Dan Boneh, Jonathan Katz:
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. 261 - Lihua Liu, Zhengjun Cao:
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. 262 - Christopher Wolf, Bart Preneel:
Applications of Multivariate Quadratic Public Key Systems. 263 - Philip Hawkes, Michael Paddon, Gregory G. Rose:
Musings on the Wang et al. MD5 Collision. 264 - Yongge Wang, Bei-tseng Chu:
sSCADA: Securing SCADA Infrastructure Communications. 265 - Majid Khabbazian, T. Aaron Gulliver:
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods. 266 - Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. 267 - Zhengjun Cao, Lihua Liu:
Untraceability of Wang-Fu Group Signature Scheme. 268 - Lifeng Guo:
Cryptanalysis of Threshold-Multisignature Schemes. 269 - Fuw-Yi Yang, Jinn-ke Jan:
An Enhanced and Secure Protocol for Authenticated Key Exchange. 270 - Philip Hawkes, Michael Paddon, Gregory G. Rose:
The Mundja Streaming MAC. 271 - Tom Shrimpton:
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security. 272 - Lifeng Guo:
Cryptanalysis of Threshold-Multisignature schemes. 273 - Qingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui:
A novel algorithm enumerating Bent functions. 274 - Wei-Chi Ku, Chun-Ming Ho:
An e-Voting Scheme with Improved Resistance to Bribe and Coercion. 275 - Claude Carlet:
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions. 276 - David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan:
Experimenting with Faults, Lattices and the DSA. 277 - David A. McGrew, Scott R. Fluhrer:
The Extended Codebook (XCB) Mode of Operation. 278 - Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien:
Parallel Montgomery Multiplication in GF(2k) using Trinomial Residue Arithmetic. 279 - Zhengjun Cao:
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme. 280 - Patrick P. Tsang, Victor K. Wei:
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. 281 - Ventzislav Nikov, Svetla Nikova:
New Monotone Span Programs from Old. 282 - Dan Page, Frederik Vercauteren:
Fault and Side-Channel Attacks on Pairing Based Cryptography. 283 - Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui:
ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS. 284 - Annegret Weng:
Generation of random Picard curves for cryptography. 285 - Daniele Micciancio:
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. 286 - Quang Viet Duong, Kaoru Kurosawa:
Almost Ideal Contrast Visual Cryptography with Reversing. 287 - (Withdrawn) A New Designated Confirmer Signature Variant with Intended Recipient. 288
- Kai Wirt:
Fault attack on the DVB Common Scrambling Algorithm. 289 - Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. 290 - Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner:
The Rabbit Stream Cipher - Design and Security Analysis. 291 - Ruishan Zhang, Kefei Chen:
Asynchronous Proactive RSA. 292 - Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Provably Secure Authentication of Digital Media Through Invertible Watermarks. 293 - Souradyuti Paul, Bart Preneel:
Solving Systems of Differential Equations of Addition. 294 - Jiang Wu, Ruizhong Wei:
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. 295 - Mridul Nandi:
Designs of Efficient Secure Large Hash Values. 296 - Johannes Buchmann, Luis Carlos Coronado García, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann:
Post-Quantum Signatures. 297 - Zuo-Wen Tan, Zhuo-Jun Liu:
Nominative Proxy Signature Schemes. 298 - Zhengjun Cao, Sherman S. M. Chow:
Security Flaws in a Pairing-based Group Signature Scheme. 299 - Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. 300 - Bartosz Zoltak:
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme. 301 - Lifeng Guo:
Security of Wang-Li Threshold Signature Scheme. 302 - Soonhak Kwon:
Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields. 303 - John Kelsey, Bruce Schneier:
Second Preimages on n-bit Hash Functions for Much Less than 2n Work. 304 - Paulo S. L. M. Barreto:
A note on efficient computation of cube roots in characteristic 3. 305 - Daniel R. L. Brown, Robert P. Gallant:
The Static Diffie-Hellman Problem. 306 - Zhengjun Cao:
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme. 307 - Guohong Xie:
Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement. 308 - Mihir Bellare, Oded Goldreich, Anton Mityagin:
The Power of Verification Queries in Message Authentication and Authenticated Encryption. 309 - Yevgeniy Dodis, Aleksandr Yampolskiy:
A Verifiable Random Function With Short Proofs and Keys. 310 - Mårten Trolin, Douglas Wikström:
Hierarchical Group Signatures. 311 - David Jao, Stephen D. Miller, Ramarathnam Venkatesan:
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves. 312 - Fuw-Yi Yang, Jinn-ke Jan, Woei-Jiunn Jeng:
Cryptanalysis of a threshold proxy signature with known signers. 313 - AbdelNasir Alshamsi, Takamichi Saito:
A Technical Comparison of IPSec and SSL. 314 - Qin Wang, Zhenfu Cao:
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes. 315 - Zhengjun Cao:
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme. 316 - Ran Canetti, Shai Halevi, Jonathan Katz:
Adaptively-Secure, Non-Interactive Public-Key Encryption. 317 - Martin Hirt, Jesper Buus Nielsen:
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. 318 - Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner:
Badger - A Fast and Provably Secure MAC. 319 - Alfonso De Gregorio:
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. 320 - Vladimir Shpilrain, Alexander Ushakov:
The conjugacy search problem in public key cryptography: unnecessary and insufficient. 321 - Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. 322 - Tanja Lange:
A note on López-Dahab coordinates. 323 - Giuliano Laccetti, Giovanni Schmid:
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions. 324 - Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida:
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. 325 - Zhengjun Cao:
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme. 326 - Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. 327 - (Withdrawn) Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model. 328
- Ran Canetti, Shai Halevi, Michael Steiner:
Hardness amplification of weakly verifiable puzzles. 329 - Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on Generalized Hash Functions. 330 - Mihir Bellare, Phillip Rogaway:
Code-Based Game-Playing Proofs and the Security of Triple Encryption. 331 - Victor Shoup:
Sequences of games: a tool for taming complexity in security proofs. 332 - Marius-Calin Silaghi:
Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem. 333 - Ran Canetti, Jonathan Herzog:
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange). 334 - Iftach Haitner, Ronen Shaltiel:
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions. 335 - Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. 336 - Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. 337 - Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. 338 - Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj:
Divisors in Residue Classes, Constructively. 339 - Morris Dworkin:
Request for Review of Key Wrap Algorithms. 340 - Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli:
Reducing Complexity Assumptions for Statistically-Hiding Commitment. 341 - Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau:
A comb method to render ECC resistant against Side Channel Attacks. 342 - Kim-Kwang Raymond Choo:
Revisit Of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. 343 - Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte:
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures. 344 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. 345 - Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa:
Random Switching Logic: A Countermeasure against DPA based on Transition Probability. 346 - Marco Macchetti:
Addendum to "On the Generalized Linear Equivalence of Functions over Finite Fields". 347 - Junghyun Nam, Seungjoo Kim, Dongho Won:
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords. 348 - Dong Jin Park, Pil Joong Lee:
A DPA Attack on the Improved Ha-Moon Algorithm. 349 - Jintai Ding, Dieter Schmidt:
Multivariable public-key cryptosystems. 350 - (Withdrawn) Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security. 351
- Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. 352 - Patrick Fitzpatrick, Christopher Wolf:
Direct Division in Factor Rings. 353 - Alexander Maximov:
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra. 354 - Pei-Yih Ting, Po-Yueh Hung:
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates. 355 - Ondrej Mikle:
Practical Attacks on Digital Signatures Using MD5 Message Digest. 356 - Dan Kaminsky:
MD5 To Be Considered Harmful Someday. 357 - Xavier Boyen:
Reusable Cryptographic Fuzzy Extractors. 358 - Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. 359 - Christopher Wolf, Bart Preneel:
Equivalent Keys in HFE, C*, and variations. 360 - Christopher Wolf, Bart Preneel:
Superfluous Keys in Multivariate Quadratic Asymmetric Systems. 361 - Kristian Gjøsteen:
A new security proof for Damgård's ElGamal. 362 - Qiang Tang, Chris J. Mitchell:
Rethinking the security of some authenticated group key agreement schemes. 363 - Krystian Matusiewicz, Josef Pieprzyk:
Finding good differential patterns for attacks on SHA-1. 364 - Steven D. Galbraith, James F. McKee, P. C. Valença:
Ordinary abelian varieties having small embedding degree. 365 - Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key. 366 - Patrick Felke:
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches. 367 - Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek:
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience. 368 - Filipe Rosado da-Fonseca:
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks. 369 - Victor K. Wei:
Tracing-by-Linking Group Signautres. 370 - Vipul Goyal:
Construction and Traversal of Hash Chain with Public Links. 371 - (Withdrawn) On The Security of Two Key-Updating Signature Schemes. 372
- Chunming Tang, Dingyi Pei, Zhuojun Liu:
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs. 373 - Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo:
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. 374 - Paulo S. L. M. Barreto, Steven D. Galbraith, Colm O'hEigeartaigh, Michael Scott:
Efficient Pairing Computation on Supersingular Abelian Varieties. 375 - Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of RCES/RSES Image Encryption Scheme. 376 - Javier Herranz, Germán Sáez:
New Distributed Ring Signatures for General Families of Signing Subsets. 377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.