Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 2005
Page
Title
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
Blind Attacks on Engineering Samples
Games and the Impossibility of Realizable Ideal Functionality
A lower bound on the higher order nonlinearity of algebraic immune functions
Probability distributions of Correlation and Differentials in Block Ciphers
A Counter-based MAC Revisited: Towards Better Security
TMTO With Multiple Data: Analysis and New Single Table Trade-offs
Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret
Efficient Identity-Based Key Encapsulation to Multiple Parties
The conjugacy problem and related problems in lattice-ordered groups
Cryptanalysis of a 32-bit RC4-like Stream Cipher
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
Constant Round Dynamic Group Key Agreement
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Threshold Ring Signatures Efficient for Large Sets of Signers
Efficient Doubling on Genus 3 Curves over Binary Fields
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Yet Another Short Signatures Without Random Oracles from Bilinear Pairings
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
On the Entropy of Arcfour Keys
LILI-II is not Broken
Tree Parity Machine Rekeying Architectures for Embedded Security
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
Simple and Provable Secure Strong Designated Verifier Signature Schemes
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
Attack on Okamoto et al.'s New Short Signature Schemes
On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities
Cryptanalysis of Sfinks
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
On the Algebraic Immunity of Symmetric Boolean Functions
A Verifiable Secret Shuffle of Homomorphic Encryptions
A Simple and Provably Good Code for SHA Message Expansion
Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing
Efficient Certificateless Public Key Encryption
The topology of covert conflict
Feistel Schemes and Bi-Linear Cryptanalysis
Faster Pairings using an Elliptic Curve with an Efficient Endomorphism
Security Notions for Identity Based Encryption
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Inoculating Multivariate Schemes Against Differential Attacks
Fuzzy Universal Hashing and Approximate Authentication
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
Relations Among Notions of Security for Identity Based Encryption Schemes
Efficient Delegation of Pairing Computation
Powered Tate Pairing Computation
The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
On Obfuscating Point Functions
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Logcrypt: Forward Security and Public Verification for Secure Audit Logs
Wang's sufficient conditions of MD5 are not sufficient
Cryptanalysis of Hiji-bij-bij (HBB)
On an authentication scheme based on the Root Problem in the braid group
Benes and Butterfly schemes revisited
Security Analysis of KEA Authenticated Key Exchange Protocol
A sufficient condition for key-privacy
A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code
A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$
Stream Cipher Design based on Jumping Finite State Machines
The Misuse of RC4 in Microsoft Word and Excel
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI
Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing
Mixing properties of triangular feedback shift registers
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Update on SHA-1
Cache attacks and Countermeasures: the Case of AES
An Improved Elegant Method to Re-initialize Hash Chains
An Authentication Protocol For Mobile Agents Using Bilinear Pairings
Efficient Certificateless Public Key Encryption
CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
Explicit Construction of Secure Frameproof Codes
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Narrow T-functions
Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model
The Full Abstraction of the UC Framework
Partitioned Cache Architecture as a Side-Channel Defence Mechanism
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
Herding Hash Functions and the Nostradamus Attack
Partial Hiding in Public-Key Cryptography
Spreading Alerts Quietly and the Subgroup Escape Problem
An Improved and Efficient Countermeasure against Power Analysis Attacks
Revisiting Oblivious Signature-Based Envelopes
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
Foundations and Applications for Secure Triggers
Weak keys of the Diffe Hellman key exchange I
Generalizations of RSA public key cryptosystems
Analysis of Affinely Equivalent Boolean Functions
Concurrent Zero Knowledge without Complexity Assumptions
Techniques for random maskin in hardware
Provable Efficient Certificateless Public Key Encryption
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Direct Chosen Ciphertext Security from Identity-Based Techniques
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Overview of Key Agreement Protocols
A model and architecture for pseudo-random generation with applications to /dev/random
Perfect Non-Interactive Zero Knowledge for NP
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves
Cryptography In the Bounded Quantum-Storage Model
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
Improved Integral Cryptanalysis of FOX Block Cipher
On the Notion of Statistical Security in Simulatability Definitions
Speeding Up Pairing Computation
An Attack on CFB Mode Encryption As Used By OpenPGP
On Fairness in Simulatability-based Cryptographic Systems
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)
Hidden Exponent RSA and Efficient Key Distribution
An Efficient CDH-based Signature Scheme With a Tight Security Reduction
A Key Establishment IP-Core for Ubiquitous Computing
Concurrent Composition of Secure Protocols in the Timing Model
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants
Keeping Denial-of-Service Attackers in the Dark
Distinguishing Stream Ciphers with Convolutional Filters
Nonlinearity of the Round Function
Unfairness of a protocol for certified delivery
Towards Security Two-part Authenticated Key Agreement Protocols
On the Security of a Group Signature Scheme with Strong Separability
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
Elliptic Curves for Pairing Applications
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
On the affine classification of cubic bent functions
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
Steganography with Imperfect Samplers
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
Cryptanalysis of two identification schemes based on an ID-based cryptosystem
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
Adversarial Model for Radio Frequency Identification
Adaptable Group-Oriented Signature
David Chaum's Voter Verification using Encrypted Paper Receipts
A New Efficient ID-Based Authenticated Key Agreement Protocol
A Note on Shor's Quantum Algorithm for Prime Factorization
Meta Ring Signature
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
What do S-boxes Say in Differential Side Channel Attacks?
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
Comment on cryptanalysis of Tseng et al.??s authenticated encryption schemes
Deterministic Identity-Based Signatures for Partial Aggregation
Untraceability of Two Group Signature Schemes
Fast genus 2 arithmetic based on Theta functions
Deniable Authentication with RSA and Multicasting
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
Tight Reductions among Strong Die-Hellman Assumptions
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Generic Constructions of Identity-Based and Certificateless KEMs
Ring Signatures without Random Oracles
Secret sharing schemes on graphs
Bounds on Birthday Attack Times
Compact E-Cash
ID-based Restrictive Partially Blind Signatures and Applications
Key Derivation and Randomness Extraction
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptanalysis of One Fair E-cash System
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
On the Key Schedule of Blowfish
Evolutionary Design of Trace Form Bent Functions
On Efficient Key Agreement Protocols
The Weil pairing on elliptic curves over C
Efficient hardware for the Tate pairing calculation in characteristic three
Extracting bits from coordinates of a point of an elliptic curve
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
An Effective Method to Implement Group Signature with Revocation
Colliding X.509 Certificates
A Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
N-adic Summation-Shrinking Generator. Basic properties and empirical evidences
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Fast Elliptic Curve Point Multiplication using Double-Base Chains
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
On public-key cryptosystems based on combinatorial group theory
Cryptographic Protocols to Prevent Spam
A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields
A Dedicated Processor for the eta Pairing
Practical Lattice Basis Sampling Reduction
A Fuzzy Sketch with Trapdoor
BROADCAST ENCRYPTION $\pi$
Classification of Cubic $(n-4)$-resilient Boolean Functions
Computationally sound implementations of equational theories against passive adversaries
Universally Composable Disk Encryption Schemes
Finding MD5 Collisions ? a Toy For a Notebook
Secure Key-Updating for Lazy Revocation
Pairing-Based Cryptography at High Security Levels
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
Pairing-based identification schemes
Duality between Multiplication and Modular Reduction
Statistical Multiparty Computation Based on Random Walks on Graphs
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
An Improved Power Analysis Attack Against Camellia's Key Schedule
A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
Smashing SMASH
A New Approach to Counteract DPA Attacks on Block Ciphers
Some properties of an FSE 2005 Hash Proposal
A Universally Composable Scheme for Electronic Cash
Security notions for disk encryption
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
On Resistance of DES to Related-Key Differential Cryptanalysis
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
A new structural attack for GPT and variants
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems
Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)
Group Signatures with Efficient Concurrent Join
AES side channel attack protection using random isomorphisms
Batch Verification of Validity of Bids in Homomorphic E-auction
The Pelican MAC Function
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions
On Proofs of Security for Certificateless Cryptosystems
Rediscovery of Time Memory Tradeoffs
Oblivious Transfer and Linear Functions
Distributed Phishing Attacks
Is SHA-1 conceptually sound?
PRF Domain Extension Using DAGs
Errors in Computational Complexity Proofs for Protocols
An ID-Based Key Agreement Scheme from pairing
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
A Survey on ID-Based Cryptographic Primitives
On the Security of A Group Signature Scheme
Security and Privacy Issues in E-passports
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
Exponential Memory-Bound Functions for Proof of Work Protocols
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
almost enumeration of 8-variable bent functions
Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
Soundness and Completeness of Formal Logics of Symmetric Encryption
An infinite class of quadratic APN functions which are not equivalent to power mappings
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
Strict Avalanche Criterion Over Finite Fields
On estimating the lattice security of NTRU
On a (Flawed) Proposal to Build More Pairing-Friendly Curves
On Error Correction in the Exponent
Elliptic Curves with Low Embedding Degree
How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher
Derandomization in Cryptography
Efficient Identity-Based and Authenticated Key Agreement Protocol
Efficient Compilers for Authenticated Group Key Exchange
A Public Key Cryptosystem Based on Singular Cubic Curve
Searchable Keyword-Based Encryption
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
Weak Composite Diffie-Hellman is not Weaker than Factoring
Secure and {\sl Practical} Identity-Based Encryption
On the relationship between squared pairings and plain pairings
Resource Fairness and Composability of Cryptographic Protocols
Partially Fixed Point Multiplication
On a Traitor Tracing Scheme from ACISP 2003
Intrusion-Resilient Secure Channels
Secret color images sharing schemes based on XOR operation
Characteristics of Key-Dependent S-Boxes: the Case of Twofish
Efficient Broadcast Encryption Scheme with Log-Key Storage
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
Boneh-Franklin Identity Based Encryption Revisited
Truncated differential cryptanalysis of five rounds of Salsa20
Results on Rotation Symmetric Bent Functions
Representing small identically self-dual matroids by self-dual codes
Index Calculus in Class Groups of Plane Curves of Small Degree
Exclusion-Intersection Encryption and Its Application to Searchable Encryption
On Designatedly Verified (Non-interactive) Watermarking Schemes
A New Protocol for Conditional Disclosure of Secrets And Its Applications
Pass-thoughts: Authenticating With Our Minds
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
Breaking RSA May Be As Difficult As Factoring
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
Compact Group Signatures Without Random Oracles
Append-Only Signatures
One-Wayness Equivalent to General Factoring
SPA Resistant Left-to-Right Integer Recodings
Key Mixing in Block Ciphers through Addition modulo $2^n$
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
Some Explicit Formulae of NAF and its Left-to-Right Analogue
Browser Model for Security Analysis of Browser-Based Protocols
Practical Group Signatures without Random Oracles
Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
Results on Rotation Symmetric Boolean Functions on Even Number Variable
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
Dynamic Group Key Agreement in Tree-Based Setting
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
Formal Notions of Anonymity for Peer-to-peer Networks
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
Pairing-Friendly Elliptic Curves of Prime Order
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
Broadcast Authentication With Hashed Random Preloaded Subsets
An Efficient Variant of RSA Cryptosystem with Semantic Security
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
Multivariate Quadratic Polynomials in Public Key Cryptography
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
How to Shuffle in Public
A Sender Verifiable Mix-Net and a New Proof of a Shuffle
Secure Group Key Establishment Revisited
I-HARPS: An Efficient Key Pre-distribution Scheme
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
Scaling security in pairing-based protocols
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
How to Split a Shared Secret into Shared Bits in Constant-Round
Preliminary Analysis of DHA-256
Enhanced password-based key establishment protocol
On affine rank of spectrum support for plateaued function
Broadcast Encryption with Random Key Pre-distribution Schemes
Improved Collision Attack on MD5
Multiparty Computation Based on Connectivity of Graphs
A Computationally Sound Mechanized Prover for Security Protocols
Kaweichel, an Extension of Blowfish for 64-Bit Architectures
Some Analysis of Radix-r Representations
Small Secure Sketch for Point-Set Difference
Collisions in the Original Version of a Chaotic Hash Function
A High Speed Architecture for Galois/Counter Mode of Operation (GCM)
Preventing Attacks on Machine Readable Travel Documents (MRTDs)
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware
Building Better Signcryption Schemes with Tag-KEMs
On Universal Composable Security of Time-Stamping Protocols
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
Conditionally Verifiable Signatures
Anonymous Signature Schemes
Secure Delegation of Elliptic-Curve Pairing
Intrusion-Resilient Authentication in the Limited Communication Model
Improved Collision Attack on MD4
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
On High-Rate Cryptographic Compression Functions
More Compact E-Cash with Efficient Coin Tracing
On Security of Koyama Schemes
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol
VEST Hardware-Dedicated Stream Ciphers
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
Authenticated Encryption Mode of VEST Ciphers
On the security of some password-based key agreement schemes
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
FOX Algorithm Implementation: a hardware design approach
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Geometric Cryptosystem
Correlation-Resistant Storage via Keyword-Searchable Encryption
On Constructing Parallel Pseudorandom Generators from One-Way Functions
Generic On-Line/Off-Line Threshold Signatures
First Steps Toward a Cryptography-Aware Language and Compiler
Unified Point Addition Formul{\ae} and Side-Channel Attacks
Multiple forgery attacks against Message Authentication Codes
Efficient Scalar Multiplication by Isogeny Decompositions
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Modeling Insider Attacks on Group Key-Exchange Protocols
On Anonymity of Group Signatures
A Distinguish attack on COSvd Ciphers
ID-based signature and Key-insulated threshold signature
CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems
Improved Collision Attack on Hash Function MD5
Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems
On the Security of a Certificateless Public-Key Encryption
Dynamic k-Times Anonymous Authentication
Solutions to Key Exposure Problem in Ring Signature
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
Loud and Clear: Human-Verifiable Authentication Based on Audio
Unclonable Group Identification
Signature from a New Subgroup Assumption
Towards computationally sound symbolic analysis of key exchange protocols
F-HASH: Securing Hash Functions Using Feistel Chaining
Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy
Is it possible to have CBE from CL-PKE?
Weaknesses in a leakage-resilient authenticated key transport protocol
On the Security of Kaweichel
On the Automatic Construction of Indistinguishable Operations
Proxy Re-Signatures: New Definitions, Algorithms, and Applications
A 32-bit RC4-like Keystream Generator
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
HMQV: A High-Performance Secure Diffie-Hellman Protocol
Concurrent Blind Signatures without Random Oracles
Secret sharing on the $d$-dimensional cube
A Note on the Kasami Power Function
Analyzing Unlinkability of Some Group Signatures
On Boolean functions with maximum algebraic immunity
Intrusion-Resilience via the Bounded-Storage Model
Minimal Assumptions for Efficient Mercurial Commitments
A Note on Secure Key Issuing in ID-based Cryptography
A note on the n-spendable extension of Ferguson's single-term off-line coins
A plausible approach to computer-aided cryptographic proofs
HB++: a Lightweight Authentication Protocol Secure against Some Attacks
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
Tight bound between nonlinearity and algebraic immunity
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
One-Time Signatures Revisited: Have They Become Practical?
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families
Revised: Block Cipher Based Hash Function Construction From PGV
Security properties of two provably secure conference key agreement protocols
Privacy-Preserving Polling using Playing Cards
Linkability of Several Blind Signature Schemes
An Anonymous Authentication Scheme for Trusted Computing Platform
How To Exchange Secrets with Oblivious Transfer
Democratic Group Signatures on Example of Joint Ventures
Group Signature where Group Manager, Members and Open Authority are Identity-Based
A new key exchange protocol based on the decomposition problem
A Weak-Randomizer Attack on RSA-OAEP with e = 3
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
Public Key Encryption with Keyword Search Revisited
Improvement of Manik et al.??s remote user authentication scheme
On the security and the efficiency of the Merkle signature scheme
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
VSH, an Efficient and Provable Collision Resistant Hash Function
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography
Further Constructions of Almost Resilient Functions
Twin RSA
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
Universally Composable Password-Based Key Exchange
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
Weaknesses in two group Diffie-Hellman key exchange protocols
A Secure Scheme for Authenticated Encryption
Universally Composable Time-Stamping Schemes with Audit
Weakness of shim??s New ID-based tripartite multiple-key agreement protocol
Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
Block ciphers sensitive to Groebner Basis Attacks
A Practical Attack on the Root Problem in Braid Groups
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
One-Time HNP or Attacks on a Flawed El Gamal Revisited
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
Parallel and Concurrent Security of the HB and HB+ Protocols
On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions
A Simplified Quadratic Frobenius Primality Test
An Algebraic Masking Method to Protect AES Against Power Attacks
More short signatures without random oracles
Another look at HMQV
Equivalent Keys in Multivariate Quadratic Public Key Systems
Some Thoughts on Time-Memory-Data Tradeoffs
A sequence approach to constructing perfect hash families
On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm
Cryptanalysis of the Yang -Wang's password authentication schemes