Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 2009
Page
Title
Huge 2ndpreimages and collisions of khichidi-1
Enhanced Target Collision Resistant Hash Functions Revisited
Encryption Schemes Secure under Selective Opening Attack
Computing the endomorphism ring of an ordinary elliptic curve over a finite field
A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem
Cascade Encryption Revisited
How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd Hashing by Adopting Indifferentiability
Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method
Adaptive Preimage Resistance and Permutation-based Hash Functions
A note on the security of MST3
A general framework for computational soundness proofs - or - The computational soundness of the applied pi-calculus
Re-randomizable Encryption implies Selective Opening Security
Short Redactable Signatures Using Random Trees
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme
On the Portability of Generalized Schnorr Proofs
A note on Agrawal conjecture
UC-Secure Source Routing Protocol
On Approximating Addition by Exclusive OR
Anonymity in Shared Symmetric Key Primitives
A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor
Communication-Efficient Private Protocols for Longest Common Subsequence
Multi-authority attribute based encryption with honest-but-curious central authority
On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions
Point Compression for Koblitz Elliptic Curves
Correctness of Li Generalization of RSA Cryptosystem
Davies-Meyer Merkle-Damg{\aa}rd Revisited:\\Variants of Indifferentiability and Random Oracles
CCZ-equivalence and Boolean functions
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
Comparing Two Pairing-Based Aggregate Signature Schemes
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)
Combining Computational and Information-Theoretic Security in Multi-Party Computation
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
Key Insulation and Intrusion Resilience Over a Public Channel
On the Security of Tandem-DM
Automatic Approach of Provable Security and its Application for OAEP+
A Very Compact "Perfectly Masked" S-Box for AES (corrected)
On Generalization of Cheon's Algorithm
Traceability Codes
Secret sharing on trees: problem solved
Realizing Hash-and-Sign Signatures under Standard Assumptions
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
A Brief History of Provably-Secure Public-Key Encryption
Polynomial Runtime and Composability
Fast elliptic-curve cryptography on the Cell Broadband Engine
Implementing cryptographic pairings: a magma tutorial
Anonymous signature scheme
Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures
Enhanced Privacy ID from Bilinear Pairing
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
A Single Initialization Server for Multi-Party Cryptography
An efficient fuzzy extractor for limited noise
Trade-Off Between Key Size and Efficiency in Universal Hashing Using Polynomials
Separating two roles of hashing in one-way message authentication
On Algebraic Relations of Serpent S-Boxes
Nofish - A new stream cipher
The Brezing-Weng-Freeman Method for Certain Genus two Hyperelliptic Curves
Comparing With RSA
On the Data Complexity of Statistical Attacks Against Block Ciphers (full version)
Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
Thermocommunication
Attacks on the DECT authentication mechanisms
On fractional correlation immunity of majority functions
Foundations of Non-Malleable Hash and One-Way Functions
1024 - A High Security Software Oriented Block Cipher
ID-GC: An Efficient Identity-based Group Key Management Scheme
Knapsack Cryptosystem on Elliptic Curves
Avoid Mask Re-use in Masked Galois Multipliers
Ensuring Data Storage Security in Cloud Computing
Collision Attack on NaSHA-384/512
Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
Cryptanalysis of Ring Signature and Ring Signcryption Schemes
Constructions of Truly Practical Secure Protocols using Standard Smartcards
Universally Composable Symmetric Encryption
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
Framework for Analyzing Optimistic Fair Exchange with Distributed Arbiters
Computational Oblivious Transfer and Interactive Hashing
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
Cube Attacks on Trivium
On a Conditional Collision Attack on NaSHA-512
Image Encryption by Pixel Property Separation
Adaptively Secure Two-Party Computation with Erasures
A Provably Secure And Efficient Countermeasure Against Timing Attacks
Extensions of the Cube Attack
Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Standard Basis
Overview of Turbo-Code Reconstruction Techniques
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems
On CCZ-equivalence and its use in secondary constructions of bent functions
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB
Construction of large families of pseudorandom subsets using elliptic curves
On Stateless Schemes for Message Authentication Using Pseudorandom Functions
Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication
A Step Towards QC Blind Signatures
On the impossibility of graph secret sharing
Proofs of Retrievability via Hardness Amplification
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions
New commutative semifields defined by PN multinomials
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
NESHA-256, NEw 256-bit Secure Hash Algorithm
Security of Verifiably Encrypted Signatures
Homomorphic Trapdoor Commitments to Group Elements
The Case for Quantum Key Distribution