Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 2006
Page
Title
Finding Characteristic Polynomials with Jump Indices
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
Formal Proof for the Correctness of RSA-PSS
An Analysis of the Hermes8 Stream Ciphers
Certificate-Based Encryption Without Random Oracles
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack
Sound Computational Interpretation of Formal Hashes
Efficient Use of Random Delays
A Family of Dunces: Trivial RFID Identification and Authentication Protocols
Secure Positioning of Mobile Terminals with Simplex Radio Communication
Message Modification for Step 21-23 on SHA-0
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Threshold and Proactive Pseudo-Random Permutations
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks
Mitigating Dictionary Attacks on Password-Protected Local Storage
Hermes8 : A Low-Complexity Low-Power Stream Cipher
On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
Fundamental problems in provable security and cryptography
Cryptographic hash functions from expander graphs
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
A Method to Implement Direct Anonymous Attestation
Deniable Authentication and Key Exchange
Improving the Decoding Efficiency of Private Search
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys
Signatures for Network Coding
Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
Does Privacy Require True Randomness?
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Constant Round Group Key Exchange with Logarithmic Computational Complexity
Cryptanalysis of recently proposed Remote User Authentication Schemes
Unrestricted Aggregate Signatures
Authenticated Hybrid Encryption for Multiple Recipients
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
Improved cryptanalysis of Py
Conjunctive, Subset, and Range Queries on Encrypted Data
On a Variation of Kurosawa-Desmedt Encryption Scheme
Predicting Secret Keys via Branch Prediction
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Efficient Ring Signatures without Random Oracles
Arithmetic of Generalized Jacobians
On Authentication with HMAC and Non-Random Properties
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
Hard Homogeneous Spaces
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Ideal Multipartite Secret Sharing Schemes
Vector Stream Cipher Instant Key Recovery
Fast Algorithms for the Free Riders Problem in Broadcast Encryption
Message Authentication on 64-bit Architectures
The Collision Intractability of MDC-2 in the Ideal Cipher Model
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field
Visual secret sharing scheme with autostereogram
Two-Round AES Differentials
Forward-Secure Signatures with Untrusted Update
Linkable Democratic Group Signatures
A Fully Collusion Resistant Broadcast, Trace, and Revoke System
Reactively Simulatable Certified Mail
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Attacks and Modifications of CJC's E-voting Scheme
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
New features for JPEG Steganalysis
Linear Integer Secret Sharing and Distributed Exponentiation
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions
Fully Collusion Resistant Traitor Tracing
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Efficient Primitives from Exponentiation in Zp
Identity-Based Encryption Gone Wild
Cryptographically Sound Theorem Proving
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation
New Results on Multipartite Access Structures
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability
Crossword Puzzle Attack on NLS
Note on Design Criteria for Rainbow-Type Multivariates
Secure Device Pairing based on a Visual Channel
Efficient ID-based Threshold Signature Schemes without Pairings
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
A d-Sequence based Recursive Random Number Generator
Cryptanalysis of the CFVZ cryptosystem
Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme
How to Build a Low-Cost, Extended-Range RFID Skimmer
ElGamal type signature schemes for n-dimensional vector spaces
Multicollision Attacks on some Generalized Sequential Hash Functions
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields
Key Exchange Protocols: Security Definition, Proof Method and Applications
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
Key Exchange Using Passwords and Long Keys
On the Necessity of Rewinding in Secure Multiparty Computation
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
High Security Pairing-Based Cryptography Revisited
Weaknesses of the FORK-256 compression function
An Efficient ID-based Signature Scheme from Pairings
Chameleon-Based Deniable Authenticated Key Agreement Protocol
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
CMSS -- An Improved Merkle Signature Scheme
Provably Secure Universal Steganographic Systems
Efficient Pseudorandom Generators Based on the DDH Assumption
Perturbing and Protecting a Traceable Block Cipher
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction
On Expected Constant-Round Protocols for Byzantine Agreement
Computational Soundness of Formal Indistinguishability and Static Equivalence
Simple and Flexible Private Revocation Checking
The Average Transmission Overhead of Broadcast Encryption
Scalar Multiplication on Koblitz Curves using Double Bases
Invisible Designated Confirmer Signatures without Random Oracles
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
Automated Security Proofs with Sequences of Games
An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation
The experimental distinguishing attack on RC4
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security
Designated Verifier Signature Scheme Based on Braid Groups
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
Extended Double-Base Number System with applications to Elliptic Curve Cryptography
Stronger Security of Authenticated Key Exchange
On the Security of Generalized Jacobian Cryptosystems
How to Construct Sufficient Condition in Searching Collisions of MD5
Improved Efficiency for Private Stable Matching
ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM
Discrete Logarithms in Generalized Jacobians
A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement
Colliding Message Pair for 53-Step HAS-160
On Secret Sharing Schemes, Matroids and Polymatroids
A ID-Based Deniable Authentication Protocol on pairings
Verifiable Random Permutations
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Towards Provably Secure Group Key Agreement Building on Group Theory
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
Efficient Identity-based Signatures Secure in the Standard Model
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine
A New family of Ideal Multipartite Access Structure Based on MSP
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast
Cryptanalyses of Some Multimedia Encryption Schemes
Browsers Defenses Against Phishing, Spoofing and Malware
MV3: A new word based stream cipher using rapid mixing and revolving buffers
Cryptography from Anonymity
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Verifiably Encrypted Signature Scheme with Threshold Adjudication
Analysis of the Linux Random Number Generator
A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons
Private and Efficient Stable Marriages (Matching)
On the Feasibility of Consistent Computations
Generic Transformation to Strongly Unforgeable Signatures
A Tree-based Model of Unicast Stream Authentication
Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1
Secure Sketch for Multi-Sets
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist
The Complexity of Online Memory Checking
A Note On Side-Channels Resulting From Dynamic Compilation
Cryptanalysis of RSA with constrained keys
Impossible Differential Cryptanalysis of ARIA and Camellia
RSA and a higher degree diophantine equation
On the Power of Simple Branch Prediction Analysis
Cryptanalysis of the MEM Mode of Operation
Foundations of Secure E-Commerce: The Order Layer
MAC Reforgeability
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
Sequential Aggregate Signatures and Multisignatures without Random Oracles
A new stream cipher: DICING
A Cryptographic Tour of the IPsec Standards
Concurrent Non-Malleable Zero Knowledge
Gr\"obner Basis Based Cryptanalysis of SHA-1
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability
Public Key Encryption with Keyword Search based on K-Resilient IBE
Information-theoretic analysis of coating PUFs
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge
Efficient Blind and Partially Blind Signatures Without Random Oracles
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Security of VSH in the Real World
Generic Construction of (Identity-based) Perfect Concurrent Signatures
Fast Collision Attack on MD5
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
Tunnels in Hash Functions: MD5 Collisions Within a Minute
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Further Refinement of Pairing Computation Based on Miller's Algorithm
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric
The number field sieve for integers of low weight
Revisit of KD04
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
A Latency-Free Election Scheme
A Simpler Sieving Device: Combining ECM and TWIRL
An Attack on a Certificateless Signature Scheme
The Eta Pairing Revisited
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles
Attacking LCCC Batch Verification of RSA Signatures
RadioGat\'un, a belt-and-mill hash function
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
A DoS Attack Against the Integrity-Less ESP (IPSec)
A New Construction of Time Capsule Signature
Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3
Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five
A taxonomy of pairing-friendly elliptic curves
Fast exponentiation via prime finite field isomorphism
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
Robust Final-Round Cache-Trace Attacks Against AES
Conjectured Security of the ANSI-NIST Elliptic Curve RNG
Distortion maps for genus two curves
On construction of non-normal Boolean functions
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions
Repairing Attacks on a Password-Based Group Key Agreement
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Key Privacy for Identity Based Encryption
A New Key Exchange Primitive Based on the Triple Decomposition Problem
Counting Prime Numbers with Short Binary Signed Representation
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
On Security of Sovereign Joins
Designated Confirmer Signatures Revisited
Cryptanalysis on an Algorithm for Efficient Digital Signatures
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves
Traitor tracing scheme with constant ciphertext rate against powerful pirates
ECGSC: Elliptic Curve based Generalized Signcryption Scheme
Design and Analysis of a Hash Ring-iterative Structure
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
On Security Models and Compilers for Group Key Exchange Protocols
On the existence of distortion maps on ordinary elliptic curves
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
A Note on the Security of NTRUSign
Simulatable Security and Polynomially Bounded Concurrent Composition
Survey on Security Requirements and Models for Group Key Exchange
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
Traceable Ring Signature
Conditional Reactive Simulatability
Revisit of CS98
Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security
Identity Based Strong Designated Verifier Signature Scheme
The Tate Pairing via Elliptic Nets
The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction
The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL
Identity Based Strong Designated Verifier Proxy Signature Schemes
Defining Strong Privacy for RFID
Security-Focused Survey on Group Key Exchange Protocols
Trace-Driven Cache Attacks on AES
Security Protocols with Isotropic Channels
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
Revisiting the Efficiency of Malicious Two-Party Computation
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
The Layered Games Framework for Specifications and Analysis of Security Protocols
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Rational Secret Sharing, Revisited
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Blinded Fault Resistant Exponentiation
On the cost of cryptanalytic attacks
Implementing Cryptographic Pairings on Smartcards
Algebraic Cryptanalysis of the Data Encryption Standard
PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit
Completeness of Formal Hashes in the Standard Model
Faugere's F5 Algorithm Revisited
New Integrated proof Method on Iterated Hash Structure and New Structures
Universally Composable Blind Signatures in the Plain Model
Computational Indistinguishability between Quantum States and Its Cryptographic Application
Redundancy of the Wang-Yu Sufficient Conditions
A method of construction of balanced functions with optimum algebraic immunity
Cryptography in the Multi-string Model
Demonstrating data possession and uncheatable data transfer
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
Simulation-Based Security with Inexhaustible Interactive Turing Machines
A NEW MAC: LAMA
Pairing based Mutual Authentication Scheme Using Smart Cards
Galois Field Commitment Scheme
On the Relationships Between Notions of Simulation-Based Security
Preimage Attack on Hashing with Polynomials proposed at ICISC'06
New Public Key Authentication Frameworks with Lite Certification Authority
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
Independent Zero-Knowledge Sets
Preimage Attack on Parallel FFT-Hashing
The Hardness of the DHK Problem in the Generic Group Model
Zero Knowledge and Soundness are Symmetric
An efficient way to access an array at a secret index
On the Minimal Embedding Field
An Efficient ID-based Proxy Signature Scheme from Pairings
Authenticated Interleaved Encryption \\
Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006
The Recent Attack of Nie et al On TTM is Faulty
A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings
Analysis of Privacy-Preserving Element Reduction of Multiset
Cryptanalysis of 4-Pass HAVAL
Some New Hidden Ideal Cryptosystems
A Summary of McEliece-Type Cryptosystems and their Security
The REESSE1+ Public-key Cryptosystem
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods
Universally Composable Three-Party Key Distribution
Classification of Signature-only Signature Models
Long-term Security and Universal Composability
Pairings for Cryptographers
Perfect NIZK with Adaptive Soundness
General Secret Sharing Based on the Chinese Remainder Theorem
Security Analysis of Voice-over-IP Protocols
Towards Trustworthy e-Voting using Paper Receipts
How Fast can be Algebraic Attacks on Block Ciphers ?
The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant
Simplified pairing computation and security implications
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm
Visual Cryptography Schemes with Optimal Pixel Expansion
Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4
Key confirmation and adaptive corruptions in the protocol security logic
On a new invariant of Boolean functions
On Computing Products of Pairings
From Weak to Strong Watermarking
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing
Frobenius expansion and the Diffie Hellman problem
Universally Composable Security with Global Setup
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
Information Theoretic Bounds on Authentication Systems in Query Model
Counting points on elliptic curves in medium characteristic
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity
On the (Im-)Possibility of Extending Coin Toss
Searching for Shapes in Cryptographic Protocols (extended version)
A New Cryptosystem Based On Hidden Order Groups
Statistically-Hiding Commitment from Any One-Way Function
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
On Zigzag Functions and Related Objects in New Metric
Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions
On the pseudo-random generator ISAAC
There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings
On the Limits of Point Function Obfuscation
A New Type of Group Signature Scheme
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
On Signatures of Knowledge
An attack on the certificateless signature scheme from EUC Workshops 2006
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Deterministic and Efficiently Searchable Encryption
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
A class of quadratic APN binomials inequivalent to power functions
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
Unconditionally secure chaffing and winnowing with short authentication tags
Towards a Separation of Semantic and CCA Security for Public Key Encryption
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator
Universally Composable and Forward Secure RFID Authentication and Key Exchange
A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
Secure Cryptographic Workflow in the Standard Model
(Hierarchical Identity-Based) Threshold Ring Signatures
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Self-Generated-Certificate Public Key Cryptosystem
Hybrid Protocol For Password-based Key Exchange in Three-party Setting
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Key Replacement Attack on a Certificateless Signature Scheme
On ZK-Crypt, Book Stack, and Statistical Tests
How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation
Cryptographically Private Support Vector Machines
Indistinguishability Amplification
Identity-based Key Agreement Protocols From Pairings
Linear Approximating to Integer Addition
Improvement of recently proposed Remote User Authentication Schemes
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing
Efficient Tate Pairing Computation Using Double-Base Chains
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications
Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
Generalization of the Selective-ID Security Model for HIBE Protocols
On Post-Modern Cryptography
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
Improved Collision and Preimage Resistance Bounds on PGV Schemes
ID-Based Ring Signature Scheme secure in the Standard Model
Obfuscation for Cryptographic Purposes
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
Security and Composition of Cryptographic Protocols: A Tutorial
Private Information Retrieval Using Trusted Hardware
Prime Order Primitive Subgroups in Torus-Based Cryptography
Minimal Weight and Colexicographically Minimal Integer Representations
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
White Box Cryptography: Another Attempt
A Survey of Certificateless Encryption Schemes and Security Models
An Attack on Disguised Elliptic Curves
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
On the security of a group key agreement protocol
Luby-Rackoff Ciphers from Weak Round Functions?
Multiplication and Squaring on Pairing-Friendly Fields
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion
Identity-Based Proxy Re-encryption
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms
Statistical Analysis of the MARS Block Cipher
New Technique for Solving Sparse Equation Systems
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Password-Authenticated Multi-Party Key Exchange with Different Passwords
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Dynamic Cryptographic Hash Functions
Multi-Dimensional Montgomery Ladders for Elliptic Curves
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants
Cryptanalysis of REESSE1+ Public Key Cryptosystem
What Hashes Make RSA-OAEP Secure?
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Generalizations of the Karatsuba Algorithm for Efficient Implementations
Countermeasures for the Simple Branch Prediction Analysis
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
The Fairness of Perfect Concurrent Signatures
A New Identity Based Encryption Scheme From Pairing
An Elliptic Curve Processor Suitable For RFID-Tags
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization
Inductive Trace Properties for Computational Security
Another Look at "Provable Security". II
Another Look at Generic Groups
A handy multi-coupon system
Improvement to AKS algorithm
A simple generalization of El-Gamal cryptosystem to non-abelian groups
RFID Security: Tradeoffs between Security and Efficiency
Application of ECM to a Class of RSA keys
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?
Searchable Index Schemes for Groups : Security vs. Efficiency
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
Computing Zeta Functions of Nondegenerate Curves
A Stronger Definition for Anonymous Electronic Cash
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Length-based cryptanalysis: The case of Thompson's Group
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems
ON THE POSTQUANTUM CIPHER SCHEME
Factoring Class Polynomials over the Genus Field
Disguising tori and elliptic curves
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240
Linear Cryptanalysis of CTC
Accelerating Cryptanalysis with the Method of Four Russians
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Hard Instances of the Constrained Discrete Logarithm Problem
Applications of SAT Solvers to Cryptanalysis of Hash Functions
Malicious KGC Attacks in Certificateless Cryptography
Efficient Divisor Class Halving on Genus Two Curves
Cryptanalysis of a Cognitive Authentication Scheme
Homomorphic Cryptosystems and their Applications
Simplified Submission of Inputs to Protocols
Geometric constructions of optimal linear perfect hash families
A Note On Game-Hopping Proofs
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks
Provably Secure Subsitution of Cryptographic Tools
Logical Concepts in Cryptography
Pairing Calculation on Supersingular Genus 2 Curves
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
Group Key Agreement for Ad Hoc Networks
A Simple and Unified Method of Proving Unpredictability
Further Discussions on the Security of a Nominative Signature Scheme
KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
Breaking and Fixing Public-Key Kerberos
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation