year |
venue |
title |
pages |
2006 | asiacrypt | Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions | online |
2006 | asiacrypt | Relationship Between Standard Model Plaintext Awareness and Message Hiding | online |
2006 | asiacrypt | New Cryptanalytic Results on IDEA | online |
2006 | asiacrypt | A Scalable Password-Based Group Key Exchange Protocol in the Standard Model | online |
2006 | asiacrypt | New Approach for Selectively Convertible Undeniable Signature Schemes | online |
2006 | asiacrypt | New Guess-and-Determine Attack on the Self-Shrinking Generator | online |
2006 | asiacrypt | On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms | online |
2006 | asiacrypt | A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols | online |
2006 | asiacrypt | Finding SHA-1 Characteristics: General Results and Applications | online |
2006 | asiacrypt | Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution | online |
2006 | asiacrypt | Analysis of One Popular Group Signature Scheme | online |
2006 | asiacrypt | Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys | online |
2006 | asiacrypt | Secure Sketch for Biometric Templates | online |
2006 | asiacrypt | Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity | online |
2006 | asiacrypt | Extending Scalar Multiplication Using Double Bases | online |
2006 | asiacrypt | KFC - The Krazy Feistel Cipher | online |
2006 | asiacrypt | Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption | online |
2006 | asiacrypt | Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding | online |
2006 | asiacrypt | Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions | online |
2006 | asiacrypt | On the (In)security of Stream Ciphers Based on Arrays and Modular Addition | online |
2006 | asiacrypt | Multi-Property-Preserving Hash Domain Extension and the EMD Transform | online |
2006 | asiacrypt | Combining Compression Functions and Block Cipher-Based Hash Functions | online |
2006 | asiacrypt | HIBE With Short Public Parameters Without Random Oracle | online |
2006 | asiacrypt | On the Security of OAEP | online |
2006 | asiacrypt | Improved Collision Search for SHA-0 | online |
2006 | asiacrypt | On the Generic Construction of Identity-Based Signatures with Additional Properties | online |
2006 | asiacrypt | The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography | online |
2006 | asiacrypt | A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants | online |
2006 | asiacrypt | Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures | online |
2006 | asiacrypt | On the Provable Security of an Efficient RSA-Based Pseudorandom Generator | online |
2006 | asiacrypt | Random Graphs in Cryptography | |
2006 | ches | Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations | online |
2006 | ches | Optically Enhanced Position-Locked Power Analysis | online |
2006 | ches | Read-Proof Hardware from Protective Coatings | online |
2006 | ches | A Generalized Method of Differential Fault Attack Against AES Cryptosystem | online |
2006 | ches | Offline Hardware/Software Authentication for Reconfigurable Platforms | online |
2006 | ches | Towards Security Limits in Side-Channel Attacks | online |
2006 | ches | The Outer Limits of RFID Security | online |
2006 | ches | Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors | online |
2006 | ches | Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller | online |
2006 | ches | Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker | online |
2006 | ches | A Proposition for Correlation Power Analysis Enhancement | online |
2006 | ches | Provably Secure S-Box Implementation Based on Fourier Transform | online |
2006 | ches | Unified Point Addition Formulæ and Side-Channel Attacks | online |
2006 | ches | Superscalar Coprocessor for High-Speed Curve-Based Cryptography | online |
2006 | ches | Challenges for Trusted Computing | online |
2006 | ches | Implementing Cryptographic Pairings on Smartcards | online |
2006 | ches | Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks | online |
2006 | ches | NanoCMOS-Molecular Realization of Rijndael | online |
2006 | ches | Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style | online |
2006 | ches | HIGHT: A New Block Cipher Suitable for Low-Resource Device | online |
2006 | ches | SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form | online |
2006 | ches | Integer Factoring Utilizing PC Cluster | online |
2006 | ches | Template Attacks in Principal Subspaces | online |
2006 | ches | Cache-Collision Timing Attacks Against AES | online |
2006 | ches | Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits | online |
2006 | ches | Why One Should Also Secure RSA Public Key Elements | online |
2006 | ches | Three-Phase Dual-Rail Pre-charge Logic | online |
2006 | ches | Improving SHA-2 Hardware Implementations | online |
2006 | ches | Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage | online |
2006 | ches | FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers | online |
2006 | ches | Power Attack on Small RSA Public Exponent | online |
2006 | ches | Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware | online |
2006 | ches | Templates vs. Stochastic Methods | online |
2006 | ches | High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching | online |
2006 | ches | Fast Generation of Prime Numbers on Portable Devices: An Update | online |
2006 | crypto | Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models | online |
2006 | crypto | Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | online |
2006 | crypto | Lattice-Based Cryptography | online |
2006 | crypto | Cryptographic Protocols for Electronic Voting | online |
2006 | crypto | A Method for Making Password-Based Key Exchange Resilient to Server Compromise | online |
2006 | crypto | Asymptotically Optimal Two-Round Perfectly Secure Message Transmission | online |
2006 | crypto | Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs | online |
2006 | crypto | New Proofs for NMAC and HMAC: Security Without Collision-Resistance | online |
2006 | crypto | Automated Security Proofs with Sequences of Games | online |
2006 | crypto | Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) | online |
2006 | crypto | Mitigating Dictionary Attacks on Password-Protected Local Storage | online |
2006 | crypto | On the Higher Order Nonlinearities of Algebraic Immune Functions | online |
2006 | crypto | On Signatures of Knowledge | online |
2006 | crypto | When Random Sampling Preserves Privacy | online |
2006 | crypto | Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields | online |
2006 | crypto | Oblivious Transfer and Linear Functions | online |
2006 | crypto | Scalable Secure Multiparty Computation | online |
2006 | crypto | Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets | online |
2006 | crypto | On Forward-Secure Storage | online |
2006 | crypto | Cryptanalysis of 2R- Schemes | online |
2006 | crypto | Round-Optimal Composable Blind Signatures in the Common Reference String Model | online |
2006 | crypto | Rankin's Constant and Blockwise Lattice Reduction | online |
2006 | crypto | Inverting HFE Is Quasipolynomial | online |
2006 | crypto | Non-interactive Zaps and New Techniques for NIZK | online |
2006 | crypto | On the Power of the Randomized Iterate | online |
2006 | crypto | Random Selection with an Adversarial Majority | online |
2006 | crypto | Strengthening Digital Signatures Via Randomized Hashing | online |
2006 | crypto | On the Impossibility of Efficiently Combining Collision Resistant Hash Functions | online |
2006 | crypto | Robust Multiparty Computation with Linear Communication Complexity | online |
2006 | crypto | On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation | online |
2006 | crypto | The Number Field Sieve in the Medium Prime Case | online |
2006 | crypto | On Expected Constant-Round Protocols for Byzantine Agreement | online |
2006 | crypto | Rationality and Adversarial Behavior in Multi-party Computation | online |
2006 | crypto | On Robust Combiners for Private Information Retrieval and Other Primitives | online |
2006 | crypto | Receipt-Free Universally-Verifiable Voting with Everlasting Privacy | online |
2006 | crypto | Fast Algorithms for the Free Riders Problem in Broadcast Encryption | online |
2006 | eurocrypt | Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol | online |
2006 | eurocrypt | Our Data, Ourselves: Privacy Via Distributed Noise Generation | online |
2006 | eurocrypt | Sequential Aggregate Signatures and Multisignatures Without Random Oracles | online |
2006 | eurocrypt | Practical Identity-Based Encryption Without Random Oracles | online |
2006 | eurocrypt | Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects | online |
2006 | eurocrypt | Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures | online |
2006 | eurocrypt | Compact Group Signatures Without Random Oracles | online |
2006 | eurocrypt | Hiding Secret Points Amidst Chaff | online |
2006 | eurocrypt | Oblivious Transfer Is Symmetric | online |
2006 | eurocrypt | Luby-Rackoff Ciphers from Weak Round Functions? | online |
2006 | eurocrypt | Language Modeling and Encryption on Packet Switched Networks | online |
2006 | eurocrypt | Security Analysis of the Strong Diffie-Hellman Problem | online |
2006 | eurocrypt | How to Strengthen Pseudo-random Generators by Using Compression | online |
2006 | eurocrypt | Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt | online |
2006 | eurocrypt | Perfect Non-interactive Zero Knowledge for NP | online |
2006 | eurocrypt | VSH, an Efficient and Provable Collision-Resistant Hash Function | online |
2006 | eurocrypt | Cryptography in Theory and Practice: The Case of Encryption in IPsec | online |
2006 | eurocrypt | The Function Field Sieve in the Medium Prime Case | online |
2006 | eurocrypt | Parallel and Concurrent Security of the HB and HB+ Protocols | online |
2006 | eurocrypt | Composition Implies Adaptive Security in Minicrypt | online |
2006 | eurocrypt | Herding Hash Functions and the Nostradamus Attack | online |
2006 | eurocrypt | Efficient Binary Conversion for Paillier Encrypted Values | online |
2006 | eurocrypt | Optimal Reductions Between Oblivious Transfers Using Interactive Hashing | online |
2006 | eurocrypt | Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys | online |
2006 | eurocrypt | On the (Im-)Possibility of Extending Coin Toss | online |
2006 | eurocrypt | Information-Theoretic Conditions for Two-Party Secure Function Evaluation | online |
2006 | eurocrypt | A Provable-Security Treatment of the Key-Wrap Problem | online |
2006 | eurocrypt | QUAD: A Practical Stream Cipher with Provable Security | online |
2006 | eurocrypt | Unclonable Group Identification | online |
2006 | eurocrypt | Private Circuits II: Keeping Secrets in Tamperable Circuits | online |
2006 | eurocrypt | Simplified Threshold RSA with Adaptive and Proactive Security | online |
2006 | eurocrypt | The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model | online |
2006 | eurocrypt | The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs | online |
2006 | eurocrypt | Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks | online |
2006 | eurocrypt | Symplectic Lattice Reduction and NTRU | online |
2006 | fse | How to Make a Difference: Early History of Differential Cryptanalysis | |
2006 | fse | Cryptanalysis of the Stream Cipher DECIM | online |
2006 | fse | Chosen-Ciphertext Attacks Against MOSQUITO | online |
2006 | fse | Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators | online |
2006 | fse | Some Plausible Constructions of Double-Block-Length Hash Functions | online |
2006 | fse | Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions | online |
2006 | fse | Cryptanalysis of Grain | online |
2006 | fse | The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function | online |
2006 | fse | A Study of the MD5 Attacks: Insights and Improvements | online |
2006 | fse | A Zero-Dimensional Gröbner Basis for AES-128 | online |
2006 | fse | A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation | online |
2006 | fse | Computing the Algebraic Immunity Efficiently | online |
2006 | fse | Pseudorandom Permutation Families over Abelian Groups | online |
2006 | fse | A New Dedicated 256-Bit Hash Function: FORK-256 | online |
2006 | fse | New Blockcipher Modes of Operation with Beyond the Birthday Bound Security | online |
2006 | fse | Cryptanalysis of Achterbahn | online |
2006 | fse | Collisions and Near-Collisions for Reduced-Round Tiger | online |
2006 | fse | How Far Can We Go on the x64 Processors? | online |
2006 | fse | Analysis of Step-Reduced SHA-256 | online |
2006 | fse | The Impact of Carries on the Complexity of Collision Attacks on SHA-1 | online |
2006 | fse | Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations | online |
2006 | fse | Upper Bounds on Algebraic Immunity of Boolean Power Functions | online |
2006 | fse | Improved Linear Distinguishers for SNOW 2.0 | online |
2006 | fse | Distinguishing Attacks on the Stream Cipher Py | online |
2006 | fse | Searching for Differential Paths in MD4 | online |
2006 | fse | On Feistel Structures Using a Diffusion Switching Mechanism | online |
2006 | fse | Resynchronization Attacks on WG and LEX | online |
2006 | fse | Cryptanalysis of the Full HAVAL with 4 and 5 Passes | online |
2006 | jofc | An Elliptic Curve Trapdoor System | 115-133 |
2006 | jofc | Session-Key Generation Using Human Passwords Only | 241-340 |
2006 | jofc | On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order | 463-487 |
2006 | jofc | Strengthening Zero-Knowledge Protocols Using Signatures | 169-209 |
2006 | jofc | On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions | 135-167 |
2006 | jofc | An Improved Real-Quadratic-Field-Based Key Exchange Procedure | 211-239 |
2006 | jofc | Characterization of Security Notions for Probabilistic Private-Key Encryption | 67-95 |
2006 | jofc | Threshold Password-Authenticated Key Exchange | 27-66 |
2006 | jofc | Elliptic Curves with Low Embedding Degree | 553-562 |
2006 | jofc | Private Computation: k-Connected versus 1-Connected Networks | 341-357 |
2006 | jofc | An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate | 489-520 |
2006 | jofc | Completeness in Two-Party Secure Computation: A Computational View | 521-552 |
2006 | jofc | A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions | 359-377 |
2006 | jofc | A Proof of the Security of Quantum Key Distribution | 381-439 |
2006 | jofc | Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers | 441-462 |
2006 | jofc | An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 | 1-25 |
2006 | jofc | The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives | 97-114 |
2006 | pkc | Curve25519: New Diffie-Hellman Speed Records | online |
2006 | pkc | Identity-Based Aggregate Signatures | online |
2006 | pkc | Building Better Signcryption Schemes with Tag-KEMs | online |
2006 | pkc | An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve | online |
2006 | pkc | New Attacks on RSA with Small Secret CRT-Exponents | online |
2006 | pkc | Strongly Unforgeable Signatures Based on Computational Diffie-Hellman | online |
2006 | pkc | Parallel Key-Insulated Public Key Encryption | online |
2006 | pkc | Generalization of the Selective-ID Security Model for HIBE Protocols | online |
2006 | pkc | Encoding-Free ElGamal Encryption Without Random Oracles | online |
2006 | pkc | The Twist-AUgmented Technique for Key Exchange | online |
2006 | pkc | Security-Mediated Certificateless Cryptography | online |
2006 | pkc | Conditional Oblivious Cast | online |
2006 | pkc | Linear Integer Secret Sharing and Distributed Exponentiation | online |
2006 | pkc | Generic On-Line/Off-Line Threshold Signatures | online |
2006 | pkc | Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm | online |
2006 | pkc | Cryptography and the Internet: Where It Is, Where It Isn't, Where it Should Be --- and Why It Isn't There | |
2006 | pkc | The Power of Identification Schemes | online |
2006 | pkc | New Online/Offline Signature Schemes Without Random Oracles | online |
2006 | pkc | Security Analysis of KEA Authenticated Key Exchange Protocol | online |
2006 | pkc | On Constructing Certificateless Cryptosystems from Identity Based Encryption | online |
2006 | pkc | Provably Secure Steganography with Imperfect Sampling | online |
2006 | pkc | Collision-Resistant No More: Hash-and-Sign Paradigm Revisited | online |
2006 | pkc | Efficient Polynomial Operations in the Shared-Coefficients Setting | online |
2006 | pkc | Efficiency Tradeoffs for Malicious Two-Party Computation | online |
2006 | pkc | High-Order Attacks Against the Exponent Splitting Protection | online |
2006 | pkc | Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol | online |
2006 | pkc | SAS-Based Authenticated Key Agreement | online |
2006 | pkc | Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption | online |
2006 | pkc | k-Times Anonymous Authentication with a Constant Proving Cost | online |
2006 | pkc | An Attack on a Modified Niederreiter Encryption Scheme | online |
2006 | pkc | Anonymous Signature Schemes | online |
2006 | pkc | On the Limitations of the Spread of an IBE-to-PKE Transformation | online |
2006 | pkc | Password-Based Group Key Exchange in a Constant Number of Rounds | online |
2006 | pkc | Inoculating Multivariate Schemes Against Differential Attacks | online |
2006 | pkc | Efficient Scalar Multiplication by Isogeny Decompositions | online |
2006 | tcc | Efficient Multi-party Computation with Dispute Control | online |
2006 | tcc | On Matroids and Non-ideal Secret Sharing | online |
2006 | tcc | Communication Efficient Secure Linear Algebra | online |
2006 | tcc | Efficient Blind and Partially Blind Signatures Without Random Oracles | online |
2006 | tcc | On Error Correction in the Exponent | online |
2006 | tcc | Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles | online |
2006 | tcc | Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices | online |
2006 | tcc | Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols | online |
2006 | tcc | Mercurial Commitments: Minimal Assumptions and Efficient Constructions | online |
2006 | tcc | Finding Pessiland | online |
2006 | tcc | Interactive Zero-Knowledge with Restricted Random Oracles | online |
2006 | tcc | Perfectly Secure Password Protocols in the Bounded Retrieval Model | online |
2006 | tcc | Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation | online |
2006 | tcc | Non-interactive Zero-Knowledge from Homomorphic Encryption | online |
2006 | tcc | Games and the Impossibility of Realizable Ideal Functionality | online |
2006 | tcc | On the Relation Between the Ideal Cipher and the Random Oracle Models | online |
2006 | tcc | Separating Sources for Encryption and Secret Sharing | online |
2006 | tcc | Threshold and Proactive Pseudo-Random Permutations | online |
2006 | tcc | Calibrating Noise to Sensitivity in Private Data Analysis | online |
2006 | tcc | Intrusion-Resilience Via the Bounded-Storage Model | online |
2006 | tcc | Round-Optimal and Efficient Verifiable Secret Sharing | online |
2006 | tcc | Resource Fairness and Composability of Cryptographic Protocols | online |
2006 | tcc | Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness | online |
2006 | tcc | Polylogarithmic Private Approximations and Efficient Matching | online |
2006 | tcc | PRF Domain Extension Using DAGs | online |
2006 | tcc | Chosen-Ciphertext Security from Tag-Based Encryption | online |
2006 | tcc | Key Exchange Using Passwords and Long Keys | online |
2006 | tcc | Secure Computation with Partial Message Loss | online |
2006 | tcc | On the Complexity of Parallel Hardness Amplification for One-Way Functions | online |
2006 | tcc | Generalized Environmental Security from Number Theoretic Assumptions | online |
2006 | tcc | Concurrent Zero Knowledge Without Complexity Assumptions | online |