default search action
IACR Cryptology ePrint Archive, Volume 2006
Volume 2006, 2006
- Doerte K. Rappe:
Homomorphic Cryptosystems and their Applications. 1 - Susan G. Barwick, Wen-Ai Jackson:
Geometric constructions of optimal linear perfect hash families. 2 - Dragos Trinca:
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. 3 - Lea Kissner, David Molnar:
Provably Secure Subsitution of Cryptographic Tools. 4 - Colm O'hEigeartaigh, Michael Scott:
Pairing Calculation on Supersingular Genus 2 Curves. 5 - Lijun Liao:
Group Key Agreement for Ad Hoc Networks. 6 - Lifeng Guo, Guilin Wang, Duncan S. Wong:
Further Discussions on the Security of a Nominative Signature Scheme. 7 - James A. Muir:
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers. 8 - Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad:
Breaking and Fixing Public-Key Kerberos. 9 - Steve Babbage, Matthew Dodd:
Finding Characteristic Polynomials with Jump Indices. 10 - Christina Lindenberg, Kai Wirt, Johannes Buchmann:
Formal Proof for the Correctness of RSA-PSS. 11 - Paz Morillo, Carla Ràfols:
Certificate-Based Encryption Without Random Oracles. 12 - Hung-Yu Chien:
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings. 13 - Flavio D. Garcia, Peter van Rossum:
Sound Computational Interpretation of Formal Hashes. 14 - Gene Tsudik:
A Family of Dunces: Trivial RFID Identification and Authentication Protocols. 15 - Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Message Modification for Step 21-23 on SHA-0. 16 - Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung:
Threshold and Proactive Pseudo-Random Permutations. 17 - Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra:
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks. 18 - Ulrich Kaiser:
Hermes8 : A Low-Complexity Low-Power Stream Cipher. 19 - Adam D. Smith:
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes. 20 - Denis Xavier Charles, Eyal Z. Goren, Kristin E. Lauter:
Cryptographic hash functions from expander graphs. 21 - He Ge:
A Method to Implement Direct Anonymous Attestation. 23 - George Danezis, Claudia Díaz:
Improving the Decoding Efficiency of Private Search. 24 - Denis Xavier Charles, Kamal Jain, Kristin E. Lauter:
Signatures for Network Coding. 25 - David Freeman:
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10. 26 - Vladimir Bayev:
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms. 27 - Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena:
Cryptanalysis of recently proposed Remote User Authentication Schemes. 28 - Stéphanie Alt:
Authenticated Hybrid Encryption for Multiple Recipients. 29 - Paul Crowley:
Improved cryptanalysis of Py. 30 - Le Trieu Phong, Wakaha Ogata:
On a Variation of Kurosawa-Desmedt Encryption Scheme. 31 - Deepak Kumar Dalai, Subhamoy Maitra:
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators. 32 - Isabelle Déchène:
Arithmetic of Generalized Jacobians. 33 - Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. 34 - Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar Abbas Saqib, Nareli Cruz Cortés:
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials. 35 - Sean O'Neil:
Vector Stream Cipher Instant Key Recovery. 36 - Ted Krovetz:
Message Authentication on 64-bit Architectures. 37 - Jintai Ding, Jason E. Gower, Dieter Schmidt:
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. 38 - Joan Daemen, Vincent Rijmen:
Two-Round AES Differentials. 39 - Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. 40 - Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. 41 - Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. 42 - Mihir Bellare:
New Proofs for NMAC and HMAC: Security Without Collision-Resistance. 43 - Ivan Damgård, Rune Thorbek:
Linear Integer Secret Sharing and Distributed Exponentiation. 44 - Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing. 45 - Shaoquan Jiang:
Efficient Primitives from Exponentiation in Zp. 46 - Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. 47 - Javier Herranz, Germán Sáez:
New Results on Multipartite Access Structures. 48 - Joo Yeon Cho, Josef Pieprzyk:
Crossword Puzzle Attack on NLS. 49 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel. 50 - Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems. 51 - Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert:
Software mitigations to hedge AES against cache-based software side channel vulnerabilities. 52 - Joan-Josep Climent, Elisa Gorla, Joachim Rosenthal:
Cryptanalysis of the CFVZ cryptosystem. 53 - Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. 54 - Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on some Generalized Sequential Hash Functions. 55 - Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Key Exchange Protocols: Security Definition, Proof Method and Applications. 56 - Vladimir Kolesnikov, Charles Rackoff:
Key Exchange Using Passwords and Long Keys. 57 - Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. 58 - Robert Granger, Dan Page, Nigel P. Smart:
High Security Pairing-Based Cryptography Revisited. 59 - (Withdrawn) An Efficient ID-based Signature Scheme from Pairings. 60
- (Withdrawn) A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries. 62
- Boris Ryabko, Daniil Ryabko:
Provably Secure Universal Steganographic Systems. 63 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax:
Perturbing and Protecting a Traceable Block Cipher. 64 - Jonathan Katz, Chiu-Yuen Koo:
On Expected Constant-Round Protocols for Byzantine Agreement. 65 - John Solis, Gene Tsudik:
Simple and Flexible Private Revocation Checking. 66 - Roberto Avanzi, Francesco Sica:
Scalar Multiplication on Koblitz Curves using Double Bases. 67 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. 68 - Bruno Blanchet, David Pointcheval:
Automated Security Proofs with Sequences of Games. 69 - Sergey Doroshenko, Boris Ryabko:
The experimental distinguishing attack on RC4. 70 - Ueli Maurer, Johan Sjödin:
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security. 71 - Yaniv Shaked, Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's. 72 - Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:
Stronger Security of Authenticated Key Exchange. 73 - Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Condition in Searching Collisions of MD5. 74 - Tomohiro Harayama:
On the Weil Sum Evaluation of Central Polynomial in Multivariate Quadratic Cryptosystem. 75 - (Withdrawn) A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement. 76
- Jaume Martí-Farré, Carles Padró:
On Secret Sharing Schemes, Matroids and Polymatroids. 77 - Yevgeniy Dodis, Prashant Puniya:
Verifiable Random Permutations. 78 - Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:
Towards Provably Secure Group Key Agreement Building on Group Theory. 79 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Efficient Identity-based Signatures Secure in the Standard Model. 80 - David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. 81 - HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. 82 - Amir Herzberg:
Browsers Defenses Against Phishing, Spoofing and Malware. 83 - Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography from Anonymity. 84 - Xavier Boyen, Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). 85 - Zvi Gutterman, Benny Pinkas, Tzachy Reinman:
Analysis of the Linux Random Number Generator. 86 - Barath Raghavan, Saurabh Panjwani, Anton Mityagin:
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons. 87 - Sven Laur, Helger Lipmaa:
On the Feasibility of Consistent Computations. 88 - Goce Jakimoski, Yvo Desmedt:
A Tree-based Model of Unicast Stream Authentication. 89 - Ee-Chien Chang, Vadym Fedyukovych, Qiming Li:
Secure Sketch for Multi-Sets. 90 - Moni Naor, Guy N. Rothblum:
The Complexity of Online Memory Checking. 91 - Abderrahmane Nitaj:
Cryptanalysis of RSA with constrained keys. 92 - Abderrahmane Nitaj:
RSA and a higher degree diophantine equation. 93 - Peng Wang, Dengguo Feng, Wenling Wu:
Cryptanalysis of the MEM Mode of Operation. 94 - John Black, Martin Cochran:
MAC Reforgeability. 95 - Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures without Random Oracles. 96 - Kenneth G. Paterson:
A Cryptographic Tour of the IPsec Standards. 97 - Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Gröbner Basis Based Cryptanalysis of SHA-1. 98 - Dongvu Tonien, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. 99 - Sujing Zhou, Dongdai Lin:
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability. 100 - Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. 101 - Tatsuaki Okamoto:
Efficient Blind and Partially Blind Signatures Without Random Oracles. 102 - Markku-Juhani O. Saarinen:
Security of VSH in the Real World. 103 - Marc Stevens:
Fast Collision Attack on MD5. 104 - Vlastimil Klíma:
Tunnels in Hash Functions: MD5 Collisions Within a Minute. 105 - Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further Refinement of Pairing Computation Based on Miller's Algorithm. 106 - Oliver Schirokauer:
The number field sieve for integers of low weight. 107 - Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. 108 - Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt:
A Simpler Sieving Device: Combining ECM and TWIRL. 109 - Florian Hess, Nigel P. Smart, Frederik Vercauteren:
The Eta Pairing Revisited. 110 - Martin Stanek:
Attacking LCCC Batch Verification of RSA Signatures. 111 - Markus Volkmer:
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines. 112 - Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. 113 - Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo:
Tate pairing for y2=x5-αx in Characteristic Five. 114 - Alexander Rostovtsev:
Fast exponentiation via prime finite field isomorphism. 115 - Mario Lamberger, Norbert Pramstaller, Vincent Rijmen:
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass. 116 - Daniel R. L. Brown:
Conjectured Security of the ANSI-NIST Elliptic Curve RNG. 117 - Sugata Gangopadhyay, Deepmala Sharma:
On construction of non-normal Boolean functions. 118 - (Withdrawn) Repairing Attacks on a Password-Based Group Key Agreement. 119
- Jason E. Holt:
Key Privacy for Identity Based Encryption. 120 - José de Jesús Angel Angel, Guillermo Morales-Luna:
Counting Prime Numbers with Short Binary Signed Representation. 121 - Eike Kiltz:
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. 122 - Douglas Wikström:
Designated Confirmer Signatures Revisited. 123 - Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. 124 - Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee:
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves. 125 - Yiliang Han, Xiaoyuan Yang:
ECGSC: Elliptic Curve based Generalized Signcryption Scheme. 126 - Sourav Mukhopadhyay, Palash Sarkar:
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm. 127 - Denis Xavier Charles:
On the existence of distortion maps on ordinary elliptic curves. 128 - Wei Han, Dong Zheng, Kefei Chen:
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. 129 - Dennis Hofheinz, Dominique Unruh:
Simulatable Security and Polynomially Bounded Concurrent Composition. 130 - Mike Burmester, Tri Van Le, Breno de Medeiros:
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. 131 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. 132 - Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio César López-Hernández:
Low Complexity Bit-Parallel Square Root Computation over GF(2m) for all Trinomials. 133 - Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena:
Identity Based Strong Designated Verifier Signature Scheme. 134 - Duo Lei, Da Lin, Chao Li, Keqin Feng, Longjiang Qu:
The Design Principle of Hash Function with Merkle-Damgård Construction. 135 - Gregory V. Bard:
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. 136 - Ari Juels, Stephen A. Weis:
Defining Strong Privacy for RFID. 137 - Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES. 138 - François-Xavier Standaert, Tal Malkin, Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version). 139 - Jiejun Kong:
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks. 140 - Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei:
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers. 141 - S. Dov Gordon, Jonathan Katz:
Rational Secret Sharing, Revisited. 142 - Guillaume Fumaroli, David Vigilant:
Blinded Fault Resistant Exponentiation. 143 - Michael Scott, Neil Costigan, Wesam Abdulwahab:
Implementing Cryptographic Pairings on Smartcards. 144 - Alexander Rostovtsev, Anton Stolbunov:
Public-Key Cryptosystem Based on Isogenies. 145 - Flavio D. Garcia, Peter van Rossum:
Completeness of Formal Hashes in the Standard Model. 146 - Duo Lei:
New Integrated proof Method on Iterated Hash Structure and New Structures. 147 - Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability between Quantum States and Its Cryptographic Application. 148 - Claude Carlet:
A method of construction of balanced functions with optimum algebraic immunity. 149 - Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto:
Demonstrating data possession and uncheatable data transfer. 150 - Ralf Küsters:
Simulation-Based Security with Inexhaustible Interactive Turing Machines. 151 - G. Shailaja, K. Phani Kumar, Ashutosh Saxena:
Pairing based Mutual Authentication Scheme Using Smart Cards. 152 - Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. 153 - Xiaolei Dong, Licheng Wang, Zhenfu Cao:
New Public Key Authentication Frameworks with Lite Certification Authority. 154 - Rosario Gennaro, Silvio Micali:
Independent Zero-Knowledge Sets. 155 - Alexander W. Dent:
The Hardness of the DHK Problem in the Generic Group Model. 156 - Timothy Atkinson, Marius-Calin Silaghi:
An efficient way to access an array at a secret index. 157 - Chunxiang Gu, Yuefei Zhu:
An Efficient ID-based Proxy Signature Scheme from Pairings. 158 - (Withdrawn) Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006. 159
- (Withdrawn) A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings. 160
- Zhang-yi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng:
Cryptanalysis of 4-Pass HAVAL. 161 - Daniela Engelbert, Raphael Overbeck, Arthur Schmidt:
A Summary of McEliece-Type Cryptosystems and their Security. 162 - Gregory V. Bard:
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods. 163 - Zhengjun Cao:
Classification of Signature-only Signature Models. 164 - Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart:
Pairings for Cryptographers. 165 - Sorin Iftene:
General Secret Sharing Based on the Chinese Remainder Theorem. 166 - Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won:
Towards Trustworthy e-Voting using Paper Receipts. 167 - Nicolas T. Courtois:
How Fast can be Algebraic Attacks on Block Ciphers ? 168 - Steven D. Galbraith, Colm O'hEigeartaigh, Caroline Sheedy:
Simplified pairing computation and security implications. 169 - Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual Cryptography Schemes with Optimal Pixel Expansion. 170 - Prateek Gupta, Vitaly Shmatikov:
Key confirmation and adaptive corruptions in the protocol security logic. 171 - Robert Granger, Nigel P. Smart:
On Computing Products of Pairings. 172 - Le Trieu Phong, Wakaha Ogata:
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model. 173 - (Withdrawn) Frobenius expansion and the Diffie Hellman problem. 174
- Moni Naor, Gil Segev, Adam D. Smith:
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. 175 - Antoine Joux, Reynald Lercier:
Counting points on elliptic curves in medium characteristic. 176 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:
On the (Im-)Possibility of Extending Coin Toss. 177 - Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. 178 - Chang Shu, Soonhak Kwon, Kris Gaj:
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields. 179 - Dmitry Khovratovich:
Divisibility of the Hamming Weight by 2k and Monomial Criteria for Boolean Functions. 180 - Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel:
There exist Boolean functions on n (odd) variables having nonlinearity > 2n-1 - 2(n-1)/2 if and only if n>7. 181 - Arvind Narayanan, Vitaly Shmatikov:
On the Limits of Point Function Obfuscation. 182 - Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. 183 - Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. 184 - Minh-Huyen Nguyen, Shien Jin Ong, Salil P. Vadhan:
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function. 185 - Mihir Bellare, Alexandra Boldyreva, Adam O'Neill:
Deterministic and Efficiently Searchable Encryption. 186 - Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. 187 - Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. 188 - Douglas R. Stinson:
Unconditionally secure chaffing and winnowing with short authentication tags. 189 - Berry Schoenmakers, Andrey Sidorenko:
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator. 190 - Sahadeo Padhye:
A Public Key Cryptosystem Based on Pell Equation. 191 - Osman Kocar:
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior. 192 - Victor K. Wei, Tsz Hon Yuen:
(Hierarchical Identity-Based) Threshold Ring Signatures. 193 - (Withdrawn) Self-Generated-Certificate Public Key Cryptosystem. 194
- Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing. 195 - Sergey Doroshenko, Andrei Fionov, A. Lubkin, V. A. Monarev, Boris Ryabko:
On ZK-Crypt, Book Stack, and Statistical Tests. 196 - Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. 197 - Sven Laur, Helger Lipmaa, Taneli Mielikäinen:
Cryptographically Private Support Vector Machines. 198 - Liqun Chen, Zhaohui Cheng, Nigel P. Smart:
Identity-based Key Agreement Protocols From Pairings. 199 - Guanfei Fang, Genxun huang:
Improvement of recently proposed Remote User Authentication Schemes. 200 - Changan Zhao, Fangguo Zhang, Jiwu Huang:
Efficient Tate Pairing Computation Using Double-Base Chains. 201 - Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo:
Ate pairing for y2=x5-αx in characteristic five. 202 - Sanjit Chatterjee, Palash Sarkar:
Generalization of the Selective-ID Security Model for HIBE Protocols. 203 - Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar:
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems. 204 - (Withdrawn) ID-Based Ring Signature Scheme secure in the Standard Model. 205
- Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. 206 - Javier Herranz, Dennis Hofheinz, Eike Kiltz:
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure. 207 - Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. 208 - Clemens Heuberger, James A. Muir:
Minimal Weight and Colexicographically Minimal Integer Representations. 209 - Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. 210 - Alexander W. Dent:
A Survey of Certificateless Encryption Schemes and Security Models. 211 - Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. 212 - Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin:
Luby-Rackoff Ciphers from Weak Round Functions? 213 - Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String. 214 - Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. 215 - Nicolas Méloni:
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. 216 - Andrey Pestunov:
Statistical Analysis of the MARS Block Cipher. 217 - Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi:
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. 218 - Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. 219 - Daniel R. L. Brown:
Multi-Dimensional Montgomery Ladders for Elliptic Curves. 220 - Phillip Rogaway, Thomas Shrimpton:
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem. 221 - Raphael Overbeck:
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants. 222 - Daniel R. L. Brown:
What Hashes Make RSA-OAEP Secure? 223 - André Weimerskirch, Christof Paar:
Generalizations of the Karatsuba Algorithm for Efficient Implementations. 224 - Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. 225 - Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. 226 - Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, Ingrid Verbauwhede:
An Elliptic Curve Processor Suitable For RFID-Tags. 227 - Mihir Bellare, Amit Sahai:
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. 228 - Neal Koblitz, Alfred Menezes:
Another Look at "Provable Security". II. 229 - Neal Koblitz, Alfred Menezes:
Another Look at Generic Groups. 230 - Sébastien Canard, Aline Gouget, Emeline Hufschmitt:
A handy multi-coupon system. 231 - Roman Popovych:
Improvement to AKS algorithm. 232 - Ayan Mahalanobis:
A simple generalization of El-Gamal cryptosystem to non-abelian groups. 233 - Ivan Damgård, Michael Østergaard Pedersen:
RFID Security: Tradeoffs between Security and Efficiency. 234 - Abderrahmane Nitaj:
Application of ECM to a Class of RSA keys. 235 - Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. 236 - Claire Whelan, Michael Scott:
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure? 237 - (Withdrawn) Searchable Index Schemes for Groups : Security vs. Efficiency. 238
- Yi Deng, Dongdai Lin:
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption. 239 - Wouter Castryck, Jan Denef, Frederik Vercauteren:
Computing Zeta Functions of Nondegenerate Curves. 240 - Mårten Trolin:
A Stronger Definition for Anonymous Electronic Cash. 241 - Haina Zhang, Shaohui Wang, Xiaoyun Wang:
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers. 242 - Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. 243 - Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Length-based cryptanalysis: The case of Thompson's Group. 244 - K. Phani Kumar, G. Shailaja, Ashutosh Saxena:
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems. 245 - Jaroslav Hruby:
On the Postquantum Cipher Scheme. 246 - (Withdrawn) Factoring Class Polynomials over the Genus Field. 247
- Steven D. Galbraith:
Disguising tori and elliptic curves. 248 - Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek Diker Yücel:
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240. 249 - Orr Dunkelman, Nathan Keller:
Linear Cryptanalysis of CTC. 250 - Gregory V. Bard:
Accelerating Cryptanalysis with the Method of Four Russians. 251 - Maurizio Adriano Strangio:
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. 252 - Ilya Mironov, Anton Mityagin, Kobbi Nissim:
Hard Instances of the Constrained Discrete Logarithm Problem. 253 - Ilya Mironov, Lintao Zhang:
Applications of SAT Solvers to Cryptanalysis of Hash Functions. 254 - Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. 255 - Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti:
Constant-Round Concurrent NMWI and its relation to NMZK. 256 - Peter Birkner:
Efficient Divisor Class Halving on Genus Two Curves. 257 - Philippe Golle, David A. Wagner:
Cryptanalysis of a Cognitive Authentication Scheme. 258 - Douglas Wikström:
Simplified Submission of Inputs to Protocols. 259 - Alexander W. Dent:
A Note On Game-Hopping Proofs. 260 - Frédéric Didier:
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks. 261 - Simon Kramer:
Logical Concepts in Cryptography. 262 - Dragos Trinca:
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems. 263 - Mridul Nandi:
A Simple and Unified Method of Proving Unpredictability. 264 - Javier Herranz, Dennis Hofheinz, Eike Kiltz:
Some (in)sufficient conditions for secure hybrid encryption. 265 - Michael Backes, Peeter Laud:
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis. 266 - Mihir Bellare, Tadayoshi Kohno, Victor Shoup:
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. 267 - Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism. 268 - Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. 269 - Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme. 270 - Gregory V. Bard:
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack. 271 - Olivier Benoît, Michael Tunstall:
Efficient Use of Random Delays. 272 - Mikio Fujii:
Secure Positioning of Mobile Terminals with Simplex Radio Communication. 273 - Debasis Giri, P. D. Srivastava:
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings. 274 - Debrup Chakraborty, Palash Sarkar:
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random. 275 - Ran Canetti, Shai Halevi, Michael Steiner:
Mitigating Dictionary Attacks on Password-Protected Local Storage. 276 - Oded Goldreich:
On Expected Probabilistic Polynomial-Time Adversaries - A suggestion for restricted definitions and their benefits. 277 - Alexander W. Dent:
Fundamental problems in provable security and cryptography. 278 - Sanjit Chatterjee, Palash Sarkar:
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique). 279 - Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. 280 - Phillip Rogaway:
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys. 281 - (Withdrawn) Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing). 282
- Carl Bosley, Yevgeniy Dodis:
Does Privacy Require True Randomness? 283 - Junghyun Nam, Youngsook Lee, Dongho Won:
Constant Round Group Key Exchange with Logarithmic Computational Complexity. 284 - Mihir Bellare, Chanathip Namprempre, Gregory Neven:
Unrestricted Aggregate Signatures. 285 - Sujing Zhou, Dongdai Lin:
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps. 286 - Dan Boneh, Brent Waters:
Conjunctive, Subset, and Range Queries on Encrypted Data. 287 - Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Predicting Secret Keys via Branch Prediction. 288 - Hovav Shacham, Brent Waters:
Efficient Ring Signatures without Random Oracles. 289 - Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-Random Properties. 290 - Jean Marc Couveignes:
Hard Homogeneous Spaces. 291 - Oriol Farràs, Jaume Martí-Farré, Carles Padró:
Ideal Multipartite Secret Sharing Schemes. 292 - Zulfikar Ramzan, David P. Woodruff:
Fast Algorithms for the Free Riders Problem in Broadcast Encryption. 293 - John P. Steinberger:
The Collision Intractability of MDC-2 in the Ideal Cipher Model. 294 - Feng Yi, Daoshun Wang, Yiqi Dai:
Visual secret sharing scheme with autostereogram. 295 - David Galindo, Javier Herranz, Eike Kiltz:
On the Generic Construction of Identity-Based Signatures with Additional Properties. 296 - Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-Secure Signatures with Untrusted Update. 297 - Dan Boneh, Brent Waters:
A Fully Collusion Resistant Broadcast, Trace, and Revoke System. 298 - Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:
Efficient Implementation of Tate Pairing on a Mobile Phone using Java. 299 - (Withdrawn) Attacks and Modifications of CJC's E-voting Scheme. 300
- Johann Barbier, Eric Filiol, Kichenakoumar Mayoura:
New features for JPEG Steganalysis. 301 - Atefeh Mashatan, Douglas R. Stinson:
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. 302 - Eric Filiol:
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption. 303 - Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. 304 - Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang:
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation. 305 - Alexander W. Dent, Qiang Tang:
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability. 306 - Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen:
Note on Design Criteria for Rainbow-Type Multivariates. 307 - Jun Shao, Zhenfu Cao, Licheng Wang:
Efficient ID-based Threshold Signature Schemes without Pairings. 308 - Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. 309 - Abhishek Parakh:
A d-Sequence based Recursive Random Number Generator. 310 - (Withdrawn) Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme. 311
- Iwan M. Duursma, Seungkook Park:
ElGamal type signature schemes for n-dimensional vector spaces. 312 - Lars Elmegaard-Fessel:
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields. 313 - Yi Deng, Giovanni Di Crescenzo, Dongdai Lin:
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model. 314 - Michael Backes, Jörn Müller-Quade, Dominique Unruh:
On the Necessity of Rewinding in Secure Multiparty Computation. 315 - Sarang Aravamuthan, Viswanatha Rao Thumparthy:
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks. 316 - Krystian Matusiewicz, Scott Contini, Josef Pieprzyk:
Weaknesses of the FORK-256 compression function. 317 - Chunbo Ma, Jun Ao, Jianhua Li:
Chameleon-Based Deniable Authenticated Key Agreement Protocol. 318 - Scott Contini, Yiqun Lisa Yin:
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. 319 - Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich:
CMSS - An Improved Merkle Signature Scheme. 320 - Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko:
Efficient Pseudorandom Generators Based on the DDH Assumption. 321 - Yassir Nawaz, Kishan Chand Gupta, Guang Gong:
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction. 322 - Gergei Bana, Payman Mohassel, Till Stegers:
Computational Soundness of Formal Indistinguishability and Static Equivalence. 323 - Sarang Aravamuthan, Sachin Lodha:
The Average Transmission Overhead of Broadcast Encryption. 324 - Victor K. Wei:
Invisible Designated Confirmer Signatures without Random Oracles. 325 - Jonathan Katz, Adam D. Smith:
Analyzing the HB and HB+ Protocols in the "Large Error" Case. 326 - Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Algorithm for the ηT Pairing Calculation in Characteristic Three and its Hardware Implementation. 327 - Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. 328 - Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan:
Designated Verifier Signature Scheme Based on Braid Groups. 329 - Christophe Doche, Laurent Imbert:
Extended Double-Base Number System with applications to Elliptic Curve Cryptography. 330 - Isabelle Déchène:
On the Security of Generalized Jacobian Cryptosystems. 331 - Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Improved Efficiency for Private Stable Matching. 332 - Steven D. Galbraith, Benjamin A. Smith:
Discrete Logarithms in Generalized Jacobians. 333 - Florian Mendel:
Colliding Message Pair for 53-Step HAS-160. 334 - Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A ID-Based Deniable Authentication Protocol on pairings. 335 - Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. 336 - Douglas R. Stinson, Jiang Wu:
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol. 337 - Fagen Li, Yupu Hu, Shuanggen Liu:
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings. 338 - (Withdrawn) A New family of Ideal Multipartite Access Structure Based on MSP. 339
- Chengqing Li:
Cryptanalyses of Some Multimedia Encryption Schemes. 340 - Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers. 341 - Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings. 342 - M. Choudary Gorantla, Ashutosh Saxena:
Verifiably Encrypted Signature Scheme with Threshold Adjudication. 343 - Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. 344 - Timothy Atkinson, Roman Barták, Marius-Calin Silaghi, E. Tuleu, Markus Zanker:
Private and Efficient Stable Marriages (Matching). 345 - Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. 346 - Fumiyuki Momose, Jinhui Chao:
Classification of Weil Restrictions Obtained by (2, ..., 2) Coverings of P1. 347 - Krzysztof Pietrzak:
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist. 348 - Dan Page:
A Note On Side-Channels Resulting From Dynamic Compilation. 349 - Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of ARIA and Camellia. 350 - Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
On the Power of Simple Branch Prediction Analysis. 351 - Amir Herzberg, Igal Yoffe:
Foundations of Secure E-Commerce: The Order Layer. 352 - Zhenjie Huang, Kefei Chen, Yumin Wang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. 353 - An-Ping Li:
A new stream cipher: DICING. 354 - Boaz Barak, Manoj Prabhakaran, Amit Sahai:
Concurrent Non-Malleable Zero Knowledge. 355 - Emilia Käsper, Sven Laur, Helger Lipmaa:
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds. 356 - Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild:
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. 357 - Dalia Khader:
Public Key Encryption with Keyword Search based on K-Resilient IBE. 358 - Mihir Bellare, Oded Goldreich:
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge. 359 - Marc Stevens, Arjen K. Lenstra, Benne de Weger:
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities. 360 - Sherman S. M. Chow, Willy Susilo:
Generic Construction of (Identity-based) Perfect Concurrent Signatures. 361 - Palash Sarkar, Sanjit Chatterjee:
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks. 362 - (Withdrawn) A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. 363
- Gregory V. Bard:
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric. 364 - (Withdrawn) Revisit of KD04. 365
- Kristian Gjøsteen:
A Latency-Free Election Scheme. 366 - Xuefei Cao, Kenneth G. Paterson, Weidong Kou:
An Attack on a Certificateless Signature Scheme. 367 - Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. 368 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
RadioGatún, a belt-and-mill hash function. 369 - Ventzislav Nikov:
A DoS Attack Against the Integrity-Less ESP (IPSec). 370 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Tim Kerins, Paulo S. L. M. Barreto:
Hardware Implementation of the ηT Pairing in Characteristic 3. 371 - David Freeman, Michael Scott, Edlyn Teske:
A taxonomy of pairing-friendly elliptic curves. 372 - Joseph K. Liu, Man Ho Au, Willy Susilo:
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model. 373 - Joseph Bonneau:
Robust Final-Round Cache-Trace Attacks Against AES. 374 - Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin A. Smith:
Distortion maps for genus two curves. 375 - Vlastimil Klíma:
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions. 376 - James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt:
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. 377 - Yesem Kurt:
A New Key Exchange Primitive Based on the Triple Decomposition Problem. 378 - Matthew J. Campagna:
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator. 379 - Einar Mykletun, Gene Tsudik:
On Security of Sovereign Joins. 380 - Fuw-Yi Yang:
Cryptanalysis on an Algorithm for Efficient Digital Signatures. 381 - E-yong Kim, Hwangnam Kim, Kunsoo Park:
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks. 382 - Thomas Sirvent:
Traitor tracing scheme with constant ciphertext rate against powerful pirates. 383 - Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang:
Design and Analysis of a Hash Ring-iterative Structure. 384 - Emmanuel Bresson, Mark Manulis, Jörg Schwenk:
On Security Models and Compilers for Group Key Exchange Protocols. 385 - Mark Wooding:
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange. 386 - Phong Q. Nguyen:
A Note on the Security of NTRUSign. 387 - Mark Manulis:
Survey on Security Requirements and Models for Group Key Exchange. 388 - Eiichiro Fujisaki, Koutarou Suzuki:
Traceable Ring Signature. 389 - (Withdrawn) Revisit of CS98. 390
- Ronald Cramer, Dennis Hofheinz, Eike Kiltz:
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security. 391 - Katherine E. Stange:
The Tate Pairing via Elliptic Nets. 392 - (Withdrawn) The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable. 393
- Sunder Lal, Vandani Verma:
Identity Based Strong Designated Verifier Proxy Signature Schemes. 394 - Mark Manulis:
Security-Focused Survey on Group Key Exchange Protocols. 395 - Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan:
Security Protocols with Isotropic Channels. 396 - David P. Woodruff:
Revisiting the Efficiency of Malicious Two-Party Computation. 397 - Amir Herzberg, Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols. 398 - Mihir Bellare, Thomas Ristenpart:
Multi-Property-Preserving Hash Domain Extension and the EMD Transform. 399 - Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. 400 - (Withdrawn) On the cost of cryptanalytic attacks. 401
- Nicolas T. Courtois, Gregory V. Bard:
Algebraic Cryptanalysis of the Data Encryption Standard. 402 - Willi Geiselmann, Rainer Steinwandt:
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit. 403 - Till Stegers:
Faugere's F5 Algorithm Revisited. 404 - Aslak Bakke Buan, Kristian Gjøsteen, Lillian Kråkmo:
Universally Composable Blind Signatures in the Plain Model. 405 - Yuto Nakano, Hidenori Kuwakado, Masakatu Morii:
Redundancy of the Wang-Yu Sufficient Conditions. 406 - Jens Groth, Rafail Ostrovsky:
Cryptography in the Multi-string Model. 407 - Goichiro Hanaoka, Hideki Imai:
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. 408 - An-Ping Li:
A new Mac: LAMA. 409 - Alexandre Pinto, Andre Souto, Armando Matos, Luis Filipe Coelho Antunes:
Galois Field Commitment Scheme. 410 - Donghoon Chang:
Preimage Attack on Hashing with Polynomials proposed at ICISC'06. 411 - Donghoon Chang:
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash. 412 - Donghoon Chang:
Preimage Attack on Parallel FFT-Hashing. 413 - Shien Jin Ong, Salil P. Vadhan:
Zero Knowledge and Soundness are Symmetric. 414 - Laura Hitt:
On the Minimal Embedding Field. 415 - Claude Castelluccia:
Authenticated Interleaved Encryption. 416 - Tzuong-Tsieng Moh:
The Recent Attack of Nie et al On TTM is Faulty. 417 - Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong:
Analysis of Privacy-Preserving Element Reduction of Multiset. 418 - Ilia Toli:
Some New Hidden Ideal Cryptosystems. 419 - Shenghui Su, Shuwang Lü:
The REESSE1+ Public Key Cryptosystem v2.2. 420 - Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu:
Universally Composable Three-Party Key Distribution. 421 - Jörn Müller-Quade, Dominique Unruh:
Long-term Security and Universal Composability. 422 - Masayuki Abe, Serge Fehr:
Perfect NIZK with Adaptive Soundness. 423 - Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. 424 - (Withdrawn) The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant. 426
- Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi:
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm. 427 - Lilya Budaghyan, Claude Carlet, Gregor Leander:
Another class of quadratic APN binomials over F2n: the case n divisible by 4. 428 - Sugata Gangopadhyay, Deepmala Sharma:
On a new invariant of Boolean functions. 429 - Nicholas Hopper, David Molnar, David A. Wagner:
From Weak to Strong Watermarking. 430 - Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing. 431 - Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish:
Universally Composable Security with Global Setup. 432 - Reihaneh Safavi-Naini, Peter R. Wild:
Information Theoretic Bounds on Authentication Systems in Query Model. 433 - Deepak Kumar Dalai, Subhamoy Maitra:
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity. 434 - Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols (extended version). 435 - Iftach Haitner, Omer Reingold:
Statistically-Hiding Commitment from Any One-Way Function. 436 - An Braeken, Ventzislav Nikov, Svetla Nikova:
On Zigzag Functions and Related Objects in New Metric. 437 - Jean-Philippe Aumasson:
On the pseudo-random generator ISAAC. 438 - Jun Zhong, Dake He:
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings. 439 - Jun Zhong, Dake He:
A New Type of Group Signature Scheme. 440 - Donghoon Chang, Mridul Nandi:
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. 441 - Je Hong Park:
An attack on the certificateless signature scheme from EUC Workshops 2006. 442 - Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. 443 - Chris Peikert, Alon Rosen:
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors. 444 - Lilya Budaghyan, Claude Carlet, Gregor Leander:
A class of quadratic APN binomials inequivalent to power functions. 445 - Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo:
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles). 446 - Yael Gertner, Tal Malkin, Steven A. Myers:
Towards a Separation of Semantic and CCA Security for Public Key Encryption. 447 - Tri Van Le, Mike Burmester, Breno de Medeiros:
Universally Composable and Forward Secure RFID Authentication and Key Exchange. 448 - Mihir Bellare, Phillip Rogaway:
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals. 449 - Manuel Barbosa, Pooya Farshim:
Secure Cryptographic Workflow in the Standard Model. 450 - Jongsung Kim:
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms. 451 - TingMao Chang, Jin Zhou, YaJuan Zhang, Yuefei Zhu:
Hybrid Protocol For Password-based Key Exchange in Three-party Setting. 452 - Zhenfeng Zhang, Dengguo Feng:
Key Replacement Attack on a Certificateless Signature Scheme. 453 - Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. 454 - Jonathan Katz:
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation. 455 - Ueli Maurer, Krzysztof Pietrzak, Renato Renner:
Indistinguishability Amplification. 456 - An-Ping Li:
Linear Approximating to Integer Addition. 457 - Aggelos Kiayias, Moti Yung:
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing. 458 - Claude Carlet:
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. 459 - Donghoon Chang:
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006. 460 - Oded Goldreich:
On Post-Modern Cryptography. 461 - Lei Duo, Chao Li:
Improved Collision and Preimage Resistance Bounds on PGV Schemes. 462 - Dennis Hofheinz, John Malone-Lee, Martijn Stam:
Obfuscation for Cryptographic Purposes. 463 - Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. 464 - Ran Canetti:
Security and Composition of Cryptographic Protocols: A Tutorial. 465 - Jason E. Gower:
Prime Order Primitive Subgroups in Torus-Based Cryptography. 466 - Donghoon Chang, Moti Yung:
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions). 467 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax:
White Box Cryptography: Another Attempt. 468 - David Mireles:
An Attack on Disguised Elliptic Curves. 469 - Qiang Tang:
On the security of a group key agreement protocol. 470 - Augusto Jun Devegili, Colm O'hEigeartaigh, Michael Scott, Ricardo Dahab:
Multiplication and Squaring on Pairing-Friendly Fields. 471 - Luís Teixeira d'Aguiar Norton Brandao:
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment. 472 - Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. 473 - Changan Zhao, Fangguo Zhang, Jiwu Huang:
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms. 474 - Håvard Raddum, Igor A. Semaev:
New Technique for Solving Sparse Equation Systems. 475 - Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Password-Authenticated Multi-Party Key Exchange with Different Passwords. 476 - William R. Speirs II, Samuel S. Wagstaff Jr.:
Dynamic Cryptographic Hash Functions. 477 - Donghoon Chang:
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA. 478 - Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes. 479 - Shengli Liu, Fangguo Zhang:
Cryptanalysis of REESSE1+ Public Key Cryptosystem. 480 - Donghoon Chang:
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions. 481 - Giovanni Agosta, Gerardo Pelosi:
Countermeasures for the Simple Branch Prediction Analysis. 482 - Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. 483 - (Withdrawn) A New Identity Based Encryption Scheme From Pairing. 484
- Hidenori Kuwakado, Masakatu Morii:
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions. 485 - Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Trace Properties for Computational Security. 486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.