Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 2010
Page
Title
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
Improved Agreeing-Gluing Algorithm
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption
Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks
Mean value formulas for twisted Edwards curves
Distinguisher for Shabal's Permutation Function
Small Scale Variants Of The Block Cipher PRESENT
Faster Computation of Self-pairings
CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure
Security Analysis of a Threshold Proxy Signature Scheme
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
Some Applications of Lattice Based Root Finding Techniques
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
A New Framework for Password-Based Authenticated Key Exchange
Comments on five smart card based password authentication protocols
On the Insecurity of Parallel Repetition for Leakage Resilience
On Small Subgroup Non-confinement Attack
Privacy-Preserving RFID Systems: Model and Constructions
Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm
Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf
Ring signature with divided private key
Flaws in Differential Cryptanalysis of Reduced Round PRESENT
Secure and Fast Implementations of Two Involution Ciphers
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
Founding Cryptography on Tamper-Proof Hardware Tokens
The collision security of Tandem-DM in the ideal cipher model
Efficient Public-Key Cryptography in the Presence of Key Leakage
Wild McEliece
the upper bounds on differntial characteristics in block cipher SMS4
Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials
Genus 2 Curves with Complex Multiplication
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$
Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics
A variant of the F4 algorithm
On Strong Simulation and Composable Point Obfuscation
Identity-Based Encryption Secure under Selective Opening Attack
Perfectly Balanced Boolean Functions and Goli\'c Conjecture
A Flaw in The Internal State Recovery Attack on ALPHA-MAC
Computationally Sound Verification of Source Code
Stange's Elliptic Nets and Coxeter Group F4
Distinguishing Properties of Higher Order Derivatives of Boolean Functions
1024XKS - A High Security Software Oriented Block Cipher Revisited
Cryptanalysis and Improvement of A New Electronic Traveler?s Check Scheme Based on One-way Hash Function
Golay Complementary Sequences Over the QAM Constellation
White-Box Cryptography and SPN ciphers. LRC method
Black-Box Constructions of Protocols for Secure Computation
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks
Comment on four two-party authentication protocols
Binomial Sieve Series -- a Prospective Cryptographic Tool
Improved Fault Attack on FOX
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
Evolutionary Cipher against Differential Power Attack
Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm
A Meet-in-the-Middle Attack on ARIA
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow
Dismantling SecureMemory, CryptoMemory and CryptoRF
KIST: A new encryption algorithm based on splay
On a conjecture about binary strings distribution
Parallelizing the Camellia and SMS4 Block Ciphers - Extended version
On Foundation and Construction of Physical Unclonable Functions
Security Improvement on a Password-Authenticated Group Key Exchange Protocol
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup
Random Oracles in a Quantum World
Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA
A Family of Implementation-Friendly BN Elliptic Curves
A Reflection on the Security of Two-Party Key Establishment Protocols
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates
Sanitizable signatures with strong transparency in the standard model
Homomorphic One-Way Function Trees and Application in Collusion-Free Multicast Key Distribution
A Comparison of Cryptanalytic Tradeoff Algorithms
AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS
On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields
The PASSERINE Public Key Encryption and Authentication Mechanism
Identity Based Online/Offline Encryption Scheme
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
The World is Not Enough: Another Look on Second-Order DPA
Arithmetic of Supersingular Koblitz Curves in Characteristic Three
Cryptanalysis of a DoS-resistant ID-based password authentication
Selecting Parameters for the Rainbow Signature Scheme - Extended Version -
A Simple BGN-type Cryptosystem from LWE
Achieving Leakage Resilience Through Dual System Encryption
Preventing Pollution Attacks in Multi-Source Network Coding
Embedded Extended Visual Cryptography Schemes
Rational Secret Sharing AS Extensive Games
Piret and Quisquater's DFA on AES Revisited
New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation
Provably Secure Higher-Order Masking of AES
New software speed records for cryptographic pairings
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
Certificateless Signcryption without Pairing
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
New Construction of Identity-based Proxy Re-encryption
New generic algorithms for hard knapsacks
Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
J-PAKE: Authenticated Key Exchange Without PKI
Short One-Time Signatures
On Designated Verifier Signature Schemes
Side-channel Analysis of Six SHA-3 Candidates
Non-Transferable Proxy Re-Encryption
Sequential Rationality in Cryptographic Protocols
Speeding Up The Widepipe: Secure and Fast Hashing
Secure Guaranteed Computation
Identity-Based Online/Offline Key Encapsulation and Encryption
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary
On E-Vote Integrity in the Case of Malicious Voter Computers
Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
Cryptography Against Continuous Memory Attacks
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Homomorphic Signatures over Binary Fields: Secure Network Coding with Small Coefficients
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol
A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer
Optimal Authentication of Operations on Dynamic Sets
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Impossible Differential Cryptanalysis on E2
Improving the performance of Luffa Hash Algorithm
Robust Combiner for Obfuscators
Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring
Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure
CCA2 Secure Certificateless Encryption Schemes Based on RSA
Certificateless generalized signcryption
On extended algebraic immunity
On Protecting Cryptographic Keys Against Continual Leakage
Efficient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
Unconditionally Secure Rational Secret Sharing in Standard Communication Networks
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares
Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE
Practical-time Attack on the Full MMB Block Cipher
Quantum Proofs of Knowledge
Composable Security Analysis of OS Services
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes
On the q-Strong Diffie-Hellman Problem
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)
Tracker: Security and Privacy for RFID-based Supply Chains
(If) Size Matters: Size-Hiding Private Set Intersection
Solving Generalized Small Inverse Problems
Some Observations on Indifferentiability
Improved Differential Attacks for ECHO and Grostl
Efficient Implementation of the Orlandi Protocol Extended Version
A Security Weakness in a Generic Construction of a Group Key Exchange Protocol
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones
Concurrent composition in the bounded quantum storage model
A calculus for game-based security proofs
Throughput-Optimal Routing in Unreliable Networks
On Representable Matroids and Ideal Secret Sharing
Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Cooperative Provable Data Possession
Attribute-based group key establishment
Accountability: Definition and Relationship to Verifiability
A New Security Model for Authenticated Key Agreement
Collusion Free Protocol for Correlated Element Selection Problem
One-round and authenticated three-party multiple key exchange protocol from parings
Weaknesses of a dynamic ID-based remote user authentication scheme
Improved Delegation of Computation using Fully Homomorphic Encryption
Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios
Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset
Towards a Theory of Trust Based Collaborative Search
Quantifying Trust
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Rational Secret Sharing without Broadcast
Collusion Free Protocol for Rational Secret Sharing
Modeling Attacks on Physical Unclonable Functions
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model
Separable Hash Functions
Cryptanalysis of XXTEA
Automorphism group of the set of all bent functions
On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature
Transfinite Cryptography
Feasible Attack on the 13-round AES-256
Practical ID-based Encryption for Wireless Sensor Network
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA
Halving on Binary Edwards Curves
On FPGA-based implementations of Gr\{o}stl
Skew-Frobenius map on twisted Edwards curve
Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT
Factorization of a 768-bit RSA modulus
Cube Test Analysis of the Statistical Behavior of CubeHash and Skein
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
Lattice Reduction and Polynomial Solving
A DAA Scheme Requiring Less TPM Resources
Cryptographic Extraction and Key Derivation: The HKDF Scheme
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
Related Key Cryptanalysis of the LEX Stream Cipher
Two improved authenticated multiple key exchange protocols
Differential Cache Trace Attack Against CLEFIA
Key-Controlled Order-Preserving Encryption
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
LAB Form for Iterated Hash Functions
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs
Factorization of RSA-180
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Selecting Parameters for Secure McEliece-based Cryptosystems
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore
A new one-time signature scheme from syndrome decoding
Symmetric States and their Structure: Improved Analysis of CubeHash
Scalability and Security Conflict for RFID Authentication Protocols
Online/Offline Identity-Based Signcryption Re-visited
Related-Key Boomerang and Rectangle Attacks
Position-Based Quantum Cryptography
Number of Jacobi quartic curves over finite fields
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
Adaptively Secure Broadcast Encryption with Short Ciphertexts
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Cryptography Resilient to Continual Memory Leakage
Differential Fault Analysis on AES with 192 and 256-Bit Keys
On the Round Complexity of Covert Computation
Authentication schemes from actions on graphs, groups, or rings
Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
New Methodologies for Differential-Linear Cryptanalysis and Its Extensions
Protocols for Reliable and Secure Message Transmission
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth
Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings
Recursive Information Hiding in Visual Cryptography
A secure anonymous communication scheme in vehicular ad hoc networks from pairings
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
A SAT-based preimage analysis of reduced KECCAK hash functions
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions
On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions
Class Invariants by the CRT Method
Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography
An Information Theoretic Perspective on the Differential Fault Analysis against AES
Lattice-based Identity-Based Broadcast Encryption Scheme
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
On the order of the polynomial $x^p-x-a$
Intractable Problems in Cryptography
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
An Improved Timestamp-Based Password Remote User Authentication Scheme
A Low-Area yet Performant FPGA Implementation of Shabal
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions
Computing genus 2 curves from invariants on the Hilbert moduli space
On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields
Ideal Key Derivation and Encryption in Simulation-based Security
Batch Groth-Sahai
Hash-based Multivariate Public Key Cryptosystems
The Effects of the Omission of Last Round's MixColumns on AES
Correlation-Enhanced Power Analysis Collision Attack
A modified eCK model with stronger security for tripartite authenticated key exchange
On the Indifferentiability of the Gr{\o}stl Hash Function
Differential and invertibility properties of BLAKE (full version)
Faster Fully Homomorphic Encryption
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers
Efficient chaotic permutations for image encryption algorithms
On generalized Feistel networks
A New Chaos-Based Cryptosystem for Secure Transmitted Images
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design
Lower Bounds for Straight Line Factoring
Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange
An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem
Cryptanalysis of the Compression Function of SIMD
On Symmetric Encryption and Point Obfuscation
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing
Authenticating Aggregate Range Queries over Multidimensional Dataset
On security of a remote user authentication scheme without using smart cards
A Principle for Cryptographic Protocols Beyond Security, Less Parameters
Impossible Differential Cryptanalysis of SPN Ciphers
Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Attacking M&M Collective Signature Scheme
Logical cryptoanalysis on the example of the cryptosystem DES
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
An Improved Timing Attack with Error Detection on RSA-CRT
The analytical property for $\zeta(s)$
Credential Authenticated Identification and Key Exchange
Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Security weakness of two authenticated key exchange protocols from pairings
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Fast Exhaustive Search for Polynomial Systems in $F_2$
Solinas primes of small weight for fixed sizes
Weaknesses of a dynamic ID-based remote user authentication scheme
A New Framework for RFID Privacy
Efficient Techniques for High-Speed Elliptic Curve Cryptography
Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Privacy-Preserving Matching Protocols for Attributes and Strings
A Note On Gottesman-Chuang Quantum Signature Scheme
Differential Cryptanalysis of SMS4 Block Cipher
Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost
Differential Fault Analysis on SMS4 Using a Single Fault
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
New Advances on Privacy-Preserving Policy Reconciliation
On isotopisms of commutative presemifields and CCZ-equivalence of functions
An Anonymous ID-based Encryption Revisited
Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
Some Observations on TWIS Block Cipher
Improved Single-Key Attacks on 8-round AES
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Security Analysis of SIMD
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Type-II Optimal Polynomial Bases
Effect of the Dependent Paths in Linear Hull
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles
Privacy-Preserving Multi-Objective Evolutionary Algorithms
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
Approximating Addition by XOR: how to go all the way
Signatures for Multi-source Network Coding
Related-Key Boomerang Attack on Block Cipher SQUARE
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Concurrent Knowledge Extraction in the Public-Key Model
Terrorists in Parliament, Distributed Rational Consensus
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra
A Distinguisher for High Rate McEliece Cryptosystems
Private and Continual Release of Statistics
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
ECC2K-130 on Cell CPUs
Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme
Multiple Bytes Differential Fault Analysis on CLEFIA
Security Proof of AugPAKE
Modular Design of Efficient Secure Function Evaluation Protocols
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols
Efficient Differential Fault Analysis for AES
The Eris hybrid cipher
Practical-Titled Attack on AES-128 Using Chosen-Text Relations
Predicate-Based Key Exchange
Pushing the Limits of ECM
One Round Group Key Exchange with Forward Security in the Standard Model
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
Attribute-based Authenticated Key Exchange
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model
Fixed Argument Pairings
MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions
Identity Based Public Verifiable Signcryption Scheme
An Efficient and Parallel Gaussian Sampler for Lattices
Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility
Solving a 676-bit Discrete Logarithm Problem in $GF(3^{6n})$
Efficient Generalized Signcryption Schemes
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Time-Specific Encryption
Security Weaknesses in Two Certificateless Signcryption Schemes
Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids
New Impossible Di®erential Attacks on AES
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
A Random Number Generator Based on Isogenies Operations
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
Decentralizing Attribute-Based Encryption
Secret Sharing Extensions based on the Chinese Remainder Theorem
A Digital Signature Using Multivariate Functions on Quaternion Ring
Parallel Enumeration of Shortest Lattice Vectors
Cryptographic Pairings Based on Elliptic Nets
A Zero-One Law for Deterministic 2-Party Secure Computation
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
Fair Blind Signatures without Random Oracles
CCA-Secure PRE Scheme without Public Verifiability
Constructing Veri?able Random Functions with Large Input Spaces
The Fiat--Shamir Transform for Group and Ring Signature Schemes
The Extended Access Control for Machine Readable Travel Documents
Identity Based Self Delegated Signature - Self Proxy Signatures
Avoiding Full Extension Field Arithmetic in Pairing Computations
On the Security of Identity Based Threshold Unsigncryption Schemes
Bias in the nonlinear filter generator output sequence
On the Use of Financial Data as a Random Beacon
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties
Adaptive Concurrent Non-Malleability with Bare Public-Keys
An Analysis of Affine Coordinates for Pairing Computation
Perfectly Secure Oblivious RAM Without Random Oracles
A Compact FPGA Implementation of the SHA-3 Candidate ECHO
Practical Adaptive Oblivious Transfer from a Simple Assumption
TASTY: Tool for Automating Secure Two-partY computations
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Oblivious RAM Revisited
On zero practical significance of ?Key recovery attack on full GOST block cipher with zero time and memory?
Starfish on Strike
CCA-Secure PRE Scheme without Random Oracles
One-Round Password-Based Authenticated Key Exchange
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model
Double Ciphertext Mode : A Proposal for Secure Backup
The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem
Finding discrete logarithms with a set orbit distinguisher
A Security Evaluation of DNSSEC with NSEC3
Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Decoding square-free Goppa codes over $\F_p$
Cryptographic Agility and its Relation to Circular Encryption
Hashing into Hessian Curves
Proposal of a Signature Scheme based on STS Trapdoor
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption
How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function
Universal One-Way Hash Functions via Inaccessible Entropy
Identity Based Online/Offline Signcryption Scheme
Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring
Security of Encryption Schemes in Weakened Random Oracle Models
Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
Delaying Mismatched Field Multiplications in Pairing Computations
Pairing computation on curves with efficiently computable endomorphism and small embedding degree
A Hardware Wrapper for the SHA-3 Hash Algorithms
Analysis of an internet voting protocol
Cryptographic Aspects of Real Hyperelliptic Curves
Security Reductions of the Second Round SHA-3 Candidates
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
CCA-Secure Cryptosystem from Lattice
Huff's Model for Elliptic Curves
Update-Optimal Authenticated Structures Based on Lattices
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
Relation for Algebraic Attack on E0 combiner
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure ?Extended Version?
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors
BoostReduce - A Framework For Strong Lattice Basis Reduction
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
A Combinatorial Analysis of HC-128
On the claimed privacy of EC-RAC III
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Signing on Elements in Bilinear Groups for Modular Protocol Design
The impossibility of computationally sound XOR
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -
Elliptic curves in Huff's model
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption
Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks
On Robust Key Agreement Based on Public Key Authentication
Interplay between (im)perfectness, synchrony and connectivity: The Case of Probabilistic Reliable Communication
Estimating the Security of Lattice-based Cryptosystems
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
Horizontal Correlation Analysis on Exponentiation