year |
venue |
title |
pages |
2006 | asiacrypt | Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions | online |
2006 | asiacrypt | Relationship Between Standard Model Plaintext Awareness and Message Hiding | online |
2006 | asiacrypt | New Cryptanalytic Results on IDEA | online |
2006 | asiacrypt | A Scalable Password-Based Group Key Exchange Protocol in the Standard Model | online |
2006 | asiacrypt | New Approach for Selectively Convertible Undeniable Signature Schemes | online |
2006 | asiacrypt | New Guess-and-Determine Attack on the Self-Shrinking Generator | online |
2006 | asiacrypt | On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms | online |
2006 | asiacrypt | A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols | online |
2006 | asiacrypt | Finding SHA-1 Characteristics: General Results and Applications | online |
2006 | asiacrypt | Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution | online |
2006 | asiacrypt | Analysis of One Popular Group Signature Scheme | online |
2006 | asiacrypt | Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys | online |
2006 | asiacrypt | Secure Sketch for Biometric Templates | online |
2006 | asiacrypt | Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity | online |
2006 | asiacrypt | Extending Scalar Multiplication Using Double Bases | online |
2006 | asiacrypt | KFC - The Krazy Feistel Cipher | online |
2006 | asiacrypt | Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption | online |
2006 | asiacrypt | Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding | online |
2006 | asiacrypt | Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions | online |
2006 | asiacrypt | On the (In)security of Stream Ciphers Based on Arrays and Modular Addition | online |
2006 | asiacrypt | Multi-Property-Preserving Hash Domain Extension and the EMD Transform | online |
2006 | asiacrypt | Combining Compression Functions and Block Cipher-Based Hash Functions | online |
2006 | asiacrypt | HIBE With Short Public Parameters Without Random Oracle | online |
2006 | asiacrypt | On the Security of OAEP | online |
2006 | asiacrypt | Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings | online |
2006 | asiacrypt | Improved Collision Search for SHA-0 | online |
2006 | asiacrypt | On the Generic Construction of Identity-Based Signatures with Additional Properties | online |
2006 | asiacrypt | The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography | online |
2006 | asiacrypt | A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants | online |
2006 | asiacrypt | Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures | online |
2006 | asiacrypt | On the Provable Security of an Efficient RSA-Based Pseudorandom Generator | online |
2006 | asiacrypt | Random Graphs in Cryptography | |
2006 | ches | Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations | online |
2006 | ches | Optically Enhanced Position-Locked Power Analysis | online |
2006 | ches | Read-Proof Hardware from Protective Coatings | online |
2006 | ches | A Generalized Method of Differential Fault Attack Against AES Cryptosystem | online |
2006 | ches | Offline Hardware/Software Authentication for Reconfigurable Platforms | online |
2006 | ches | Towards Security Limits in Side-Channel Attacks | online |
2006 | ches | The Outer Limits of RFID Security | online |
2006 | ches | Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors | online |
2006 | ches | Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller | online |
2006 | ches | Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker | online |
2006 | ches | A Proposition for Correlation Power Analysis Enhancement | online |
2006 | ches | Provably Secure S-Box Implementation Based on Fourier Transform | online |
2006 | ches | Unified Point Addition Formulæ and Side-Channel Attacks | online |
2006 | ches | Superscalar Coprocessor for High-Speed Curve-Based Cryptography | online |
2006 | ches | Challenges for Trusted Computing | online |
2006 | ches | Implementing Cryptographic Pairings on Smartcards | online |
2006 | ches | Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks | online |
2006 | ches | NanoCMOS-Molecular Realization of Rijndael | online |
2006 | ches | Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style | online |
2006 | ches | HIGHT: A New Block Cipher Suitable for Low-Resource Device | online |
2006 | ches | SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form | online |
2006 | ches | Integer Factoring Utilizing PC Cluster | online |
2006 | ches | Template Attacks in Principal Subspaces | online |
2006 | ches | Cache-Collision Timing Attacks Against AES | online |
2006 | ches | Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits | online |
2006 | ches | Why One Should Also Secure RSA Public Key Elements | online |
2006 | ches | Three-Phase Dual-Rail Pre-charge Logic | online |
2006 | ches | Improving SHA-2 Hardware Implementations | online |
2006 | ches | Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage | online |
2006 | ches | FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers | online |
2006 | ches | Power Attack on Small RSA Public Exponent | online |
2006 | ches | Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware | online |
2006 | ches | Templates vs. Stochastic Methods | online |
2006 | ches | High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching | online |
2006 | ches | Fast Generation of Prime Numbers on Portable Devices: An Update | online |
2006 | ches | Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings | online |
2006 | crypto | Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models | online |
2006 | crypto | Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | online |
2006 | crypto | Lattice-Based Cryptography | online |
2006 | crypto | Cryptographic Protocols for Electronic Voting | online |
2006 | crypto | A Method for Making Password-Based Key Exchange Resilient to Server Compromise | online |
2006 | crypto | Asymptotically Optimal Two-Round Perfectly Secure Message Transmission | online |
2006 | crypto | Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs | online |
2006 | crypto | New Proofs for NMAC and HMAC: Security Without Collision-Resistance | online |
2006 | crypto | Automated Security Proofs with Sequences of Games | online |
2006 | crypto | Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) | online |
2006 | crypto | Mitigating Dictionary Attacks on Password-Protected Local Storage | online |
2006 | crypto | On the Higher Order Nonlinearities of Algebraic Immune Functions | online |
2006 | crypto | On Signatures of Knowledge | online |
2006 | crypto | When Random Sampling Preserves Privacy | online |
2006 | crypto | Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields | online |
2006 | crypto | Oblivious Transfer and Linear Functions | online |
2006 | crypto | Scalable Secure Multiparty Computation | online |
2006 | crypto | Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets | online |
2006 | crypto | On Forward-Secure Storage | online |
2006 | crypto | Cryptanalysis of 2R- Schemes | online |
2006 | crypto | Round-Optimal Composable Blind Signatures in the Common Reference String Model | online |
2006 | crypto | Rankin's Constant and Blockwise Lattice Reduction | online |
2006 | crypto | Inverting HFE Is Quasipolynomial | online |
2006 | crypto | Non-interactive Zaps and New Techniques for NIZK | online |
2006 | crypto | On the Power of the Randomized Iterate | online |
2006 | crypto | Random Selection with an Adversarial Majority | online |
2006 | crypto | Strengthening Digital Signatures Via Randomized Hashing | online |
2006 | crypto | On the Impossibility of Efficiently Combining Collision Resistant Hash Functions | online |
2006 | crypto | Robust Multiparty Computation with Linear Communication Complexity | online |
2006 | crypto | On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation | online |
2006 | crypto | The Number Field Sieve in the Medium Prime Case | online |
2006 | crypto | On Expected Constant-Round Protocols for Byzantine Agreement | online |
2006 | crypto | Rationality and Adversarial Behavior in Multi-party Computation | online |
2006 | crypto | On Robust Combiners for Private Information Retrieval and Other Primitives | online |
2006 | crypto | Receipt-Free Universally-Verifiable Voting with Everlasting Privacy | online |
2006 | crypto | Fast Algorithms for the Free Riders Problem in Broadcast Encryption | online |
2006 | crypto | Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings | online |
2006 | eprint | Finding Characteristic Polynomials with Jump Indices | online |
2006 | eprint | On the Equivalence of Several Security Notions of Key Encapsulation Mechanism | online |
2006 | eprint | Formal Proof for the Correctness of RSA-PSS | online |
2006 | eprint | An Analysis of the Hermes8 Stream Ciphers | online |
2006 | eprint | Certificate-Based Encryption Without Random Oracles | online |
2006 | eprint | Formal Analysis and Systematic Construction of Two-factor Authentication Scheme | online |
2006 | eprint | Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings | online |
2006 | eprint | Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack | online |
2006 | eprint | Sound Computational Interpretation of Formal Hashes | online |
2006 | eprint | Efficient Use of Random Delays | online |
2006 | eprint | A Family of Dunces: Trivial RFID Identification and Authentication Protocols | online |
2006 | eprint | Secure Positioning of Mobile Terminals with Simplex Radio Communication | online |
2006 | eprint | Message Modification for Step 21-23 on SHA-0 | online |
2006 | eprint | An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings | online |
2006 | eprint | Threshold and Proactive Pseudo-Random Permutations | online |
2006 | eprint | A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random | online |
2006 | eprint | Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks | online |
2006 | eprint | Mitigating Dictionary Attacks on Password-Protected Local Storage | online |
2006 | eprint | Hermes8 : A Low-Complexity Low-Power Stream Cipher | online |
2006 | eprint | On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits | online |
2006 | eprint | Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes | online |
2006 | eprint | Fundamental problems in provable security and cryptography | online |
2006 | eprint | Cryptographic hash functions from expander graphs | online |
2006 | eprint | On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique) | online |
2006 | eprint | A Method to Implement Direct Anonymous Attestation | online |
2006 | eprint | Deniable Authentication and Key Exchange | online |
2006 | eprint | Improving the Decoding Efficiency of Private Search | online |
2006 | eprint | Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys | online |
2006 | eprint | Signatures for Network Coding | online |
2006 | eprint | Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing) | online |
2006 | eprint | Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10 | online |
2006 | eprint | Does Privacy Require True Randomness? | online |
2006 | eprint | Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms | online |
2006 | eprint | Constant Round Group Key Exchange with Logarithmic Computational Complexity | online |
2006 | eprint | Cryptanalysis of recently proposed Remote User Authentication Schemes | online |
2006 | eprint | Unrestricted Aggregate Signatures | online |
2006 | eprint | Authenticated Hybrid Encryption for Multiple Recipients | online |
2006 | eprint | Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps | online |
2006 | eprint | Improved cryptanalysis of Py | online |
2006 | eprint | Conjunctive, Subset, and Range Queries on Encrypted Data | online |
2006 | eprint | On a Variation of Kurosawa-Desmedt Encryption Scheme | online |
2006 | eprint | Predicting Secret Keys via Branch Prediction | online |
2006 | eprint | Reducing the Number of Homogeneous Linear Equations in Finding Annihilators | online |
2006 | eprint | Efficient Ring Signatures without Random Oracles | online |
2006 | eprint | Arithmetic of Generalized Jacobians | online |
2006 | eprint | On Authentication with HMAC and Non-Random Properties | online |
2006 | eprint | Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles | online |
2006 | eprint | Hard Homogeneous Spaces | online |
2006 | eprint | Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials | online |
2006 | eprint | Ideal Multipartite Secret Sharing Schemes | online |
2006 | eprint | Vector Stream Cipher Instant Key Recovery | online |
2006 | eprint | Fast Algorithms for the Free Riders Problem in Broadcast Encryption | online |
2006 | eprint | Message Authentication on 64-bit Architectures | online |
2006 | eprint | The Collision Intractability of MDC-2 in the Ideal Cipher Model | online |
2006 | eprint | Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field | online |
2006 | eprint | Visual secret sharing scheme with autostereogram | online |
2006 | eprint | Two-Round AES Differentials | online |
2006 | eprint | Forward-Secure Signatures with Untrusted Update | online |
2006 | eprint | Linkable Democratic Group Signatures | online |
2006 | eprint | A Fully Collusion Resistant Broadcast, Trace, and Revoke System | online |
2006 | eprint | Reactively Simulatable Certified Mail | online |
2006 | eprint | Efficient Implementation of Tate Pairing on a Mobile Phone using Java | online |
2006 | eprint | Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms | online |
2006 | eprint | Attacks and Modifications of CJC's E-voting Scheme | online |
2006 | eprint | New Proofs for NMAC and HMAC: Security Without Collision-Resistance | online |
2006 | eprint | New features for JPEG Steganalysis | online |
2006 | eprint | Linear Integer Secret Sharing and Distributed Exponentiation | online |
2006 | eprint | Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions | online |
2006 | eprint | Fully Collusion Resistant Traitor Tracing | online |
2006 | eprint | Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption | online |
2006 | eprint | Efficient Primitives from Exponentiation in Zp | online |
2006 | eprint | Identity-Based Encryption Gone Wild | online |
2006 | eprint | Cryptographically Sound Theorem Proving | online |
2006 | eprint | Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation | online |
2006 | eprint | New Results on Multipartite Access Structures | online |
2006 | eprint | Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability | online |
2006 | eprint | Crossword Puzzle Attack on NLS | online |
2006 | eprint | Note on Design Criteria for Rainbow-Type Multivariates | online |
2006 | eprint | Secure Device Pairing based on a Visual Channel | online |
2006 | eprint | Efficient ID-based Threshold Signature Schemes without Pairings | online |
2006 | eprint | Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems | online |
2006 | eprint | Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data | online |
2006 | eprint | Software mitigations to hedge AES against cache-based software side channel vulnerabilities | online |
2006 | eprint | A d-Sequence based Recursive Random Number Generator | online |
2006 | eprint | Cryptanalysis of the CFVZ cryptosystem | online |
2006 | eprint | Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme | online |
2006 | eprint | How to Build a Low-Cost, Extended-Range RFID Skimmer | online |
2006 | eprint | ElGamal type signature schemes for n-dimensional vector spaces | online |
2006 | eprint | Multicollision Attacks on some Generalized Sequential Hash Functions | online |
2006 | eprint | Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields | online |
2006 | eprint | Key Exchange Protocols: Security Definition, Proof Method and Applications | online |
2006 | eprint | Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model | online |
2006 | eprint | Key Exchange Using Passwords and Long Keys | online |
2006 | eprint | On the Necessity of Rewinding in Secure Multiparty Computation | online |
2006 | eprint | Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario | online |
2006 | eprint | A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks | online |
2006 | eprint | High Security Pairing-Based Cryptography Revisited | online |
2006 | eprint | Weaknesses of the FORK-256 compression function | online |
2006 | eprint | An Efficient ID-based Signature Scheme from Pairings | online |
2006 | eprint | Chameleon-Based Deniable Authenticated Key Agreement Protocol | online |
2006 | eprint | | online |
2006 | eprint | Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions | online |
2006 | eprint | A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries | online |
2006 | eprint | CMSS -- An Improved Merkle Signature Scheme | online |
2006 | eprint | Provably Secure Universal Steganographic Systems | online |
2006 | eprint | Efficient Pseudorandom Generators Based on the DDH Assumption | online |
2006 | eprint | Perturbing and Protecting a Traceable Block Cipher | online |
2006 | eprint | Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction | online |
2006 | eprint | On Expected Constant-Round Protocols for Byzantine Agreement | online |
2006 | eprint | Computational Soundness of Formal Indistinguishability and Static Equivalence | online |
2006 | eprint | Simple and Flexible Private Revocation Checking | online |
2006 | eprint | The Average Transmission Overhead of Broadcast Encryption | online |
2006 | eprint | Scalar Multiplication on Koblitz Curves using Double Bases | online |
2006 | eprint | Invisible Designated Confirmer Signatures without Random Oracles | online |
2006 | eprint | Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes | online |
2006 | eprint | Analyzing the HB and HB+ Protocols in the ``Large Error'' Case | online |
2006 | eprint | Automated Security Proofs with Sequences of Games | online |
2006 | eprint | An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation | online |
2006 | eprint | The experimental distinguishing attack on RC4 | online |
2006 | eprint | Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks | online |
2006 | eprint | A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security | online |
2006 | eprint | Designated Verifier Signature Scheme Based on Braid Groups | online |
2006 | eprint | Cryptanalysis of the Bluetooth E0 Cipher using OBDD's | online |
2006 | eprint | Extended Double-Base Number System with applications to Elliptic Curve Cryptography | online |
2006 | eprint | Stronger Security of Authenticated Key Exchange | online |
2006 | eprint | On the Security of Generalized Jacobian Cryptosystems | online |
2006 | eprint | How to Construct Sufficient Condition in Searching Collisions of MD5 | online |
2006 | eprint | Improved Efficiency for Private Stable Matching | online |
2006 | eprint | ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM | online |
2006 | eprint | Discrete Logarithms in Generalized Jacobians | online |
2006 | eprint | A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement | online |
2006 | eprint | Colliding Message Pair for 53-Step HAS-160 | online |
2006 | eprint | On Secret Sharing Schemes, Matroids and Polymatroids | online |
2006 | eprint | A ID-Based Deniable Authentication Protocol on pairings | online |
2006 | eprint | Verifiable Random Permutations | online |
2006 | eprint | High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems | online |
2006 | eprint | Towards Provably Secure Group Key Agreement Building on Group Theory | online |
2006 | eprint | An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol | online |
2006 | eprint | Efficient Identity-based Signatures Secure in the Standard Model | online |
2006 | eprint | Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings | online |
2006 | eprint | Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine | online |
2006 | eprint | A New family of Ideal Multipartite Access Structure Based on MSP | online |
2006 | eprint | Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast | online |
2006 | eprint | Cryptanalyses of Some Multimedia Encryption Schemes | online |
2006 | eprint | Browsers Defenses Against Phishing, Spoofing and Malware | online |
2006 | eprint | MV3: A new word based stream cipher using rapid mixing and revolving buffers | online |
2006 | eprint | Cryptography from Anonymity | online |
2006 | eprint | A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings | online |
2006 | eprint | Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) | online |
2006 | eprint | Verifiably Encrypted Signature Scheme with Threshold Adjudication | online |
2006 | eprint | Analysis of the Linux Random Number Generator | online |
2006 | eprint | A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority | online |
2006 | eprint | Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons | online |
2006 | eprint | Private and Efficient Stable Marriages (Matching) | online |
2006 | eprint | On the Feasibility of Consistent Computations | online |
2006 | eprint | Generic Transformation to Strongly Unforgeable Signatures | online |
2006 | eprint | A Tree-based Model of Unicast Stream Authentication | online |
2006 | eprint | Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1 | online |
2006 | eprint | Secure Sketch for Multi-Sets | online |
2006 | eprint | Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist | online |
2006 | eprint | The Complexity of Online Memory Checking | online |
2006 | eprint | A Note On Side-Channels Resulting From Dynamic Compilation | online |
2006 | eprint | Cryptanalysis of RSA with constrained keys | online |
2006 | eprint | Impossible Differential Cryptanalysis of ARIA and Camellia | online |
2006 | eprint | RSA and a higher degree diophantine equation | online |
2006 | eprint | On the Power of Simple Branch Prediction Analysis | online |
2006 | eprint | Cryptanalysis of the MEM Mode of Operation | online |
2006 | eprint | Foundations of Secure E-Commerce: The Order Layer | online |
2006 | eprint | MAC Reforgeability | online |
2006 | eprint | Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes | online |
2006 | eprint | Sequential Aggregate Signatures and Multisignatures without Random Oracles | online |
2006 | eprint | A new stream cipher: DICING | online |
2006 | eprint | A Cryptographic Tour of the IPsec Standards | online |
2006 | eprint | Concurrent Non-Malleable Zero Knowledge | online |
2006 | eprint | Gr\"obner Basis Based Cryptanalysis of SHA-1 | online |
2006 | eprint | Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds | online |
2006 | eprint | An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families | online |
2006 | eprint | Cryptanalysis of a homomorphic public-key cryptosystem over a finite group | online |
2006 | eprint | A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability | online |
2006 | eprint | Public Key Encryption with Keyword Search based on K-Resilient IBE | online |
2006 | eprint | Information-theoretic analysis of coating PUFs | online |
2006 | eprint | On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge | online |
2006 | eprint | Efficient Blind and Partially Blind Signatures Without Random Oracles | online |
2006 | eprint | Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities | online |
2006 | eprint | Security of VSH in the Real World | online |
2006 | eprint | Generic Construction of (Identity-based) Perfect Concurrent Signatures | online |
2006 | eprint | Fast Collision Attack on MD5 | online |
2006 | eprint | Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks | online |
2006 | eprint | Tunnels in Hash Functions: MD5 Collisions Within a Minute | online |
2006 | eprint | A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols | online |
2006 | eprint | Further Refinement of Pairing Computation Based on Miller's Algorithm | online |
2006 | eprint | Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric | online |
2006 | eprint | The number field sieve for integers of low weight | online |
2006 | eprint | Revisit of KD04 | online |
2006 | eprint | Efficient Public Key Encryption with Keyword Search Schemes from Pairings | online |
2006 | eprint | A Latency-Free Election Scheme | online |
2006 | eprint | A Simpler Sieving Device: Combining ECM and TWIRL | online |
2006 | eprint | An Attack on a Certificateless Signature Scheme | online |
2006 | eprint | The Eta Pairing Revisited | online |
2006 | eprint | Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles | online |
2006 | eprint | Attacking LCCC Batch Verification of RSA Signatures | online |
2006 | eprint | RadioGat\'un, a belt-and-mill hash function | online |
2006 | eprint | Entity Authentication and Authenticated Key Exchange with Tree Parity Machines | online |
2006 | eprint | A DoS Attack Against the Integrity-Less ESP (IPSec) | online |
2006 | eprint | A New Construction of Time Capsule Signature | online |
2006 | eprint | Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3 | online |
2006 | eprint | Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five | online |
2006 | eprint | A taxonomy of pairing-friendly elliptic curves | online |
2006 | eprint | Fast exponentiation via prime finite field isomorphism | online |
2006 | eprint | Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model | online |
2006 | eprint | Second Preimages for Iterated Hash Functions Based on a b-Block Bypass | online |
2006 | eprint | Robust Final-Round Cache-Trace Attacks Against AES | online |
2006 | eprint | Conjectured Security of the ANSI-NIST Elliptic Curve RNG | online |
2006 | eprint | Distortion maps for genus two curves | online |
2006 | eprint | On construction of non-normal Boolean functions | online |
2006 | eprint | A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions | online |
2006 | eprint | Repairing Attacks on a Password-Based Group Key Agreement | online |
2006 | eprint | Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards | online |
2006 | eprint | Key Privacy for Identity Based Encryption | online |
2006 | eprint | A New Key Exchange Primitive Based on the Triple Decomposition Problem | online |
2006 | eprint | Counting Prime Numbers with Short Binary Signed Representation | online |
2006 | eprint | Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator | online |
2006 | eprint | Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts | online |
2006 | eprint | On Security of Sovereign Joins | online |
2006 | eprint | Designated Confirmer Signatures Revisited | online |
2006 | eprint | Cryptanalysis on an Algorithm for Efficient Digital Signatures | online |
2006 | eprint | Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving | online |
2006 | eprint | Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks | online |
2006 | eprint | Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves | online |
2006 | eprint | Traitor tracing scheme with constant ciphertext rate against powerful pirates | online |
2006 | eprint | ECGSC: Elliptic Curve based Generalized Signcryption Scheme | online |
2006 | eprint | Design and Analysis of a Hash Ring-iterative Structure | online |
2006 | eprint | A New Cryptanalytic Time/Memory/Data Trade-off Algorithm | online |
2006 | eprint | On Security Models and Compilers for Group Key Exchange Protocols | online |
2006 | eprint | On the existence of distortion maps on ordinary elliptic curves | online |
2006 | eprint | The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange | online |
2006 | eprint | Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i | online |
2006 | eprint | A Note on the Security of NTRUSign | online |
2006 | eprint | Simulatable Security and Polynomially Bounded Concurrent Composition | online |
2006 | eprint | Survey on Security Requirements and Models for Group Key Exchange | online |
2006 | eprint | Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols | online |
2006 | eprint | Traceable Ring Signature | online |
2006 | eprint | Conditional Reactive Simulatability | online |
2006 | eprint | Revisit of CS98 | online |
2006 | eprint | Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials | online |
2006 | eprint | A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security | online |
2006 | eprint | Identity Based Strong Designated Verifier Signature Scheme | online |
2006 | eprint | The Tate Pairing via Elliptic Nets | online |
2006 | eprint | The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction | online |
2006 | eprint | The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable | online |
2006 | eprint | A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL | online |
2006 | eprint | Identity Based Strong Designated Verifier Proxy Signature Schemes | online |
2006 | eprint | Defining Strong Privacy for RFID | online |
2006 | eprint | Security-Focused Survey on Group Key Exchange Protocols | online |
2006 | eprint | Trace-Driven Cache Attacks on AES | online |
2006 | eprint | Security Protocols with Isotropic Channels | online |
2006 | eprint | A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) | online |
2006 | eprint | Revisiting the Efficiency of Malicious Two-Party Computation | online |
2006 | eprint | GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks | online |
2006 | eprint | The Layered Games Framework for Specifications and Analysis of Security Protocols | online |
2006 | eprint | Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers | online |
2006 | eprint | Multi-Property-Preserving Hash Domain Extension and the EMD Transform | online |
2006 | eprint | Rational Secret Sharing, Revisited | online |
2006 | eprint | Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions | online |
2006 | eprint | Blinded Fault Resistant Exponentiation | online |
2006 | eprint | On the cost of cryptanalytic attacks | online |
2006 | eprint | Implementing Cryptographic Pairings on Smartcards | online |
2006 | eprint | Algebraic Cryptanalysis of the Data Encryption Standard | online |
2006 | eprint | PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES | online |
2006 | eprint | Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit | online |
2006 | eprint | Completeness of Formal Hashes in the Standard Model | online |
2006 | eprint | Faugere's F5 Algorithm Revisited | online |
2006 | eprint | New Integrated proof Method on Iterated Hash Structure and New Structures | online |
2006 | eprint | Universally Composable Blind Signatures in the Plain Model | online |
2006 | eprint | Computational Indistinguishability between Quantum States and Its Cryptographic Application | online |
2006 | eprint | Redundancy of the Wang-Yu Sufficient Conditions | online |
2006 | eprint | A method of construction of balanced functions with optimum algebraic immunity | online |
2006 | eprint | Cryptography in the Multi-string Model | online |
2006 | eprint | Demonstrating data possession and uncheatable data transfer | online |
2006 | eprint | A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries | online |
2006 | eprint | Simulation-Based Security with Inexhaustible Interactive Turing Machines | online |
2006 | eprint | A NEW MAC: LAMA | online |
2006 | eprint | Pairing based Mutual Authentication Scheme Using Smart Cards | online |
2006 | eprint | Galois Field Commitment Scheme | online |
2006 | eprint | On the Relationships Between Notions of Simulation-Based Security | online |
2006 | eprint | Preimage Attack on Hashing with Polynomials proposed at ICISC'06 | online |
2006 | eprint | New Public Key Authentication Frameworks with Lite Certification Authority | online |
2006 | eprint | Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash | online |
2006 | eprint | Independent Zero-Knowledge Sets | online |
2006 | eprint | Preimage Attack on Parallel FFT-Hashing | online |
2006 | eprint | The Hardness of the DHK Problem in the Generic Group Model | online |
2006 | eprint | Zero Knowledge and Soundness are Symmetric | online |
2006 | eprint | An efficient way to access an array at a secret index | online |
2006 | eprint | On the Minimal Embedding Field | online |
2006 | eprint | An Efficient ID-based Proxy Signature Scheme from Pairings | online |
2006 | eprint | Authenticated Interleaved Encryption \\ | online |
2006 | eprint | Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006 | online |
2006 | eprint | The Recent Attack of Nie et al On TTM is Faulty | online |
2006 | eprint | A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings | online |
2006 | eprint | Analysis of Privacy-Preserving Element Reduction of Multiset | online |
2006 | eprint | Cryptanalysis of 4-Pass HAVAL | online |
2006 | eprint | Some New Hidden Ideal Cryptosystems | online |
2006 | eprint | A Summary of McEliece-Type Cryptosystems and their Security | online |
2006 | eprint | The REESSE1+ Public-key Cryptosystem | online |
2006 | eprint | Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods | online |
2006 | eprint | Universally Composable Three-Party Key Distribution | online |
2006 | eprint | Classification of Signature-only Signature Models | online |
2006 | eprint | Long-term Security and Universal Composability | online |
2006 | eprint | Pairings for Cryptographers | online |
2006 | eprint | Perfect NIZK with Adaptive Soundness | online |
2006 | eprint | General Secret Sharing Based on the Chinese Remainder Theorem | online |
2006 | eprint | Security Analysis of Voice-over-IP Protocols | online |
2006 | eprint | Towards Trustworthy e-Voting using Paper Receipts | online |
2006 | eprint | How Fast can be Algebraic Attacks on Block Ciphers ? | online |
2006 | eprint | The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant | online |
2006 | eprint | Simplified pairing computation and security implications | online |
2006 | eprint | Pairing-friendly elliptic curves with small security loss by Cheon's algorithm | online |
2006 | eprint | Visual Cryptography Schemes with Optimal Pixel Expansion | online |
2006 | eprint | Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4 | online |
2006 | eprint | Key confirmation and adaptive corruptions in the protocol security logic | online |
2006 | eprint | On a new invariant of Boolean functions | online |
2006 | eprint | On Computing Products of Pairings | online |
2006 | eprint | From Weak to Strong Watermarking | online |
2006 | eprint | Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model | online |
2006 | eprint | Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing | online |
2006 | eprint | Frobenius expansion and the Diffie Hellman problem | online |
2006 | eprint | Universally Composable Security with Global Setup | online |
2006 | eprint | Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models | online |
2006 | eprint | Information Theoretic Bounds on Authentication Systems in Query Model | online |
2006 | eprint | Counting points on elliptic curves in medium characteristic | online |
2006 | eprint | Balanced Boolean Functions with (more than) Maximum Algebraic Immunity | online |
2006 | eprint | On the (Im-)Possibility of Extending Coin Toss | online |
2006 | eprint | Searching for Shapes in Cryptographic Protocols (extended version) | online |
2006 | eprint | A New Cryptosystem Based On Hidden Order Groups | online |
2006 | eprint | Statistically-Hiding Commitment from Any One-Way Function | online |
2006 | eprint | FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields | online |
2006 | eprint | On Zigzag Functions and Related Objects in New Metric | online |
2006 | eprint | Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions | online |
2006 | eprint | On the pseudo-random generator ISAAC | online |
2006 | eprint | There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$ | online |
2006 | eprint | A New Type of Group Blind Signature Scheme Based on Bilinear Pairings | online |
2006 | eprint | On the Limits of Point Function Obfuscation | online |
2006 | eprint | A New Type of Group Signature Scheme | online |
2006 | eprint | Information-Theoretic Conditions for Two-Party Secure Function Evaluation | online |
2006 | eprint | General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity | online |
2006 | eprint | On Signatures of Knowledge | online |
2006 | eprint | An attack on the certificateless signature scheme from EUC Workshops 2006 | online |
2006 | eprint | Statistical Zero-Knowledge Arguments for NP from Any One-Way Function | online |
2006 | eprint | Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups | online |
2006 | eprint | Deterministic and Efficiently Searchable Encryption | online |
2006 | eprint | Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors | online |
2006 | eprint | On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 | online |
2006 | eprint | A class of quadratic APN binomials inequivalent to power functions | online |
2006 | eprint | New Blockcipher Modes of Operation with Beyond the Birthday Bound Security | online |
2006 | eprint | New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles) | online |
2006 | eprint | Unconditionally secure chaffing and winnowing with short authentication tags | online |
2006 | eprint | Towards a Separation of Semantic and CCA Security for Public Key Encryption | online |
2006 | eprint | Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator | online |
2006 | eprint | Universally Composable and Forward Secure RFID Authentication and Key Exchange | online |
2006 | eprint | A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION | online |
2006 | eprint | Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals | online |
2006 | eprint | DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior | online |
2006 | eprint | Secure Cryptographic Workflow in the Standard Model | online |
2006 | eprint | (Hierarchical Identity-Based) Threshold Ring Signatures | online |
2006 | eprint | Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms | online |
2006 | eprint | Self-Generated-Certificate Public Key Cryptosystem | online |
2006 | eprint | Hybrid Protocol For Password-based Key Exchange in Three-party Setting | online |
2006 | eprint | An Efficient ID-based Digital Signature with Message Recovery Based on Pairing | online |
2006 | eprint | Key Replacement Attack on a Certificateless Signature Scheme | online |
2006 | eprint | On ZK-Crypt, Book Stack, and Statistical Tests | online |
2006 | eprint | How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication | online |
2006 | eprint | A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication | online |
2006 | eprint | On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation | online |
2006 | eprint | Cryptographically Private Support Vector Machines | online |
2006 | eprint | Indistinguishability Amplification | online |
2006 | eprint | Identity-based Key Agreement Protocols From Pairings | online |
2006 | eprint | Linear Approximating to Integer Addition | online |
2006 | eprint | Improvement of recently proposed Remote User Authentication Schemes | online |
2006 | eprint | Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing | online |
2006 | eprint | Efficient Tate Pairing Computation Using Double-Base Chains | online |
2006 | eprint | Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications | online |
2006 | eprint | Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five | online |
2006 | eprint | Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 | online |
2006 | eprint | Generalization of the Selective-ID Security Model for HIBE Protocols | online |
2006 | eprint | On Post-Modern Cryptography | online |
2006 | eprint | Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems | online |
2006 | eprint | Improved Collision and Preimage Resistance Bounds on PGV Schemes | online |
2006 | eprint | ID-Based Ring Signature Scheme secure in the Standard Model | online |
2006 | eprint | Obfuscation for Cryptographic Purposes | online |
2006 | eprint | On the Provable Security of an Efficient RSA-Based Pseudorandom Generator | online |
2006 | eprint | Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006 | online |
2006 | eprint | The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure | online |
2006 | eprint | Security and Composition of Cryptographic Protocols: A Tutorial | online |
2006 | eprint | Private Information Retrieval Using Trusted Hardware | online |
2006 | eprint | Prime Order Primitive Subgroups in Torus-Based Cryptography | online |
2006 | eprint | Minimal Weight and Colexicographically Minimal Integer Representations | online |
2006 | eprint | Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions) | online |
2006 | eprint | Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions | online |
2006 | eprint | White Box Cryptography: Another Attempt | online |
2006 | eprint | A Survey of Certificateless Encryption Schemes and Security Models | online |
2006 | eprint | An Attack on Disguised Elliptic Curves | online |
2006 | eprint | Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes | online |
2006 | eprint | On the security of a group key agreement protocol | online |
2006 | eprint | Luby-Rackoff Ciphers from Weak Round Functions? | online |
2006 | eprint | Multiplication and Squaring on Pairing-Friendly Fields | online |
2006 | eprint | Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String | online |
2006 | eprint | A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment | online |
2006 | eprint | Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion | online |
2006 | eprint | Identity-Based Proxy Re-encryption | online |
2006 | eprint | Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains | online |
2006 | eprint | Speeding up the Bilinear Pairings Computation on Curves with Automorphisms | online |
2006 | eprint | Statistical Analysis of the MARS Block Cipher | online |
2006 | eprint | New Technique for Solving Sparse Equation Systems | online |
2006 | eprint | Computationally Sound Symbolic Secrecy in the Presence of Hash Functions | online |
2006 | eprint | Password-Authenticated Multi-Party Key Exchange with Different Passwords | online |
2006 | eprint | Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos | online |
2006 | eprint | Dynamic Cryptographic Hash Functions | online |
2006 | eprint | Multi-Dimensional Montgomery Ladders for Elliptic Curves | online |
2006 | eprint | Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA | online |
2006 | eprint | Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem | online |
2006 | eprint | Efficient Provably-Secure Hierarchical Key Assignment Schemes | online |
2006 | eprint | Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants | online |
2006 | eprint | Cryptanalysis of REESSE1+ Public Key Cryptosystem | online |
2006 | eprint | What Hashes Make RSA-OAEP Secure? | online |
2006 | eprint | A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions | online |
2006 | eprint | Generalizations of the Karatsuba Algorithm for Efficient Implementations | online |
2006 | eprint | Countermeasures for the Simple Branch Prediction Analysis | online |
2006 | eprint | Provably-Secure Time-Bound Hierarchical Key Assignment Schemes | online |
2006 | eprint | New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes | online |
2006 | eprint | The Fairness of Perfect Concurrent Signatures | online |
2006 | eprint | A New Identity Based Encryption Scheme From Pairing | online |
2006 | eprint | An Elliptic Curve Processor Suitable For RFID-Tags | online |
2006 | eprint | Indifferentiability of Single-Block-Length and Rate-1 Compression Functions | online |
2006 | eprint | Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization | online |
2006 | eprint | Inductive Trace Properties for Computational Security | online |
2006 | eprint | Another Look at "Provable Security". II | online |
2006 | eprint | Another Look at Generic Groups | online |
2006 | eprint | A handy multi-coupon system | online |
2006 | eprint | Improvement to AKS algorithm | online |
2006 | eprint | A simple generalization of El-Gamal cryptosystem to non-abelian groups | online |
2006 | eprint | RFID Security: Tradeoffs between Security and Efficiency | online |
2006 | eprint | Application of ECM to a Class of RSA keys | online |
2006 | eprint | Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security | online |
2006 | eprint | Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure? | online |
2006 | eprint | Searchable Index Schemes for Groups : Security vs. Efficiency | online |
2006 | eprint | Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption | online |
2006 | eprint | Computing Zeta Functions of Nondegenerate Curves | online |
2006 | eprint | A Stronger Definition for Anonymous Electronic Cash | online |
2006 | eprint | The Probability Advantages of Two Linear Expressions in Symmetric Ciphers | online |
2006 | eprint | Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields | online |
2006 | eprint | Length-based cryptanalysis: The case of Thompson's Group | online |
2006 | eprint | Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems | online |
2006 | eprint | ON THE POSTQUANTUM CIPHER SCHEME | online |
2006 | eprint | Factoring Class Polynomials over the Genus Field | online |
2006 | eprint | Disguising tori and elliptic curves | online |
2006 | eprint | Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240 | online |
2006 | eprint | Linear Cryptanalysis of CTC | online |
2006 | eprint | Accelerating Cryptanalysis with the Method of Four Russians | online |
2006 | eprint | On the Resilience of Key Agreement Protocols to Key Compromise Impersonation | online |
2006 | eprint | Hard Instances of the Constrained Discrete Logarithm Problem | online |
2006 | eprint | Applications of SAT Solvers to Cryptanalysis of Hash Functions | online |
2006 | eprint | Malicious KGC Attacks in Certificateless Cryptography | online |
2006 | eprint | Efficient Divisor Class Halving on Genus Two Curves | online |
2006 | eprint | Cryptanalysis of a Cognitive Authentication Scheme | online |
2006 | eprint | Homomorphic Cryptosystems and their Applications | online |
2006 | eprint | Simplified Submission of Inputs to Protocols | online |
2006 | eprint | Geometric constructions of optimal linear perfect hash families | online |
2006 | eprint | A Note On Game-Hopping Proofs | online |
2006 | eprint | Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography | online |
2006 | eprint | Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks | online |
2006 | eprint | Provably Secure Subsitution of Cryptographic Tools | online |
2006 | eprint | Logical Concepts in Cryptography | online |
2006 | eprint | Pairing Calculation on Supersingular Genus 2 Curves | online |
2006 | eprint | Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems | online |
2006 | eprint | Group Key Agreement for Ad Hoc Networks | online |
2006 | eprint | A Simple and Unified Method of Proving Unpredictability | online |
2006 | eprint | Further Discussions on the Security of a Nominative Signature Scheme | online |
2006 | eprint | KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption | online |
2006 | eprint | A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers | online |
2006 | eprint | Computationally Sound Secrecy Proofs by Mechanized Flow Analysis | online |
2006 | eprint | Breaking and Fixing Public-Key Kerberos | online |
2006 | eprint | Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation | online |
2006 | eurocrypt | Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol | online |
2006 | eurocrypt | Our Data, Ourselves: Privacy Via Distributed Noise Generation | online |
2006 | eurocrypt | Sequential Aggregate Signatures and Multisignatures Without Random Oracles | online |
2006 | eurocrypt | Practical Identity-Based Encryption Without Random Oracles | online |
2006 | eurocrypt | Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects | online |
2006 | eurocrypt | Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures | online |
2006 | eurocrypt | Compact Group Signatures Without Random Oracles | online |
2006 | eurocrypt | Hiding Secret Points Amidst Chaff | online |
2006 | eurocrypt | Oblivious Transfer Is Symmetric | online |
2006 | eurocrypt | Luby-Rackoff Ciphers from Weak Round Functions? | online |
2006 | eurocrypt | Language Modeling and Encryption on Packet Switched Networks | online |
2006 | eurocrypt | Security Analysis of the Strong Diffie-Hellman Problem | online |
2006 | eurocrypt | How to Strengthen Pseudo-random Generators by Using Compression | online |
2006 | eurocrypt | Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt | online |
2006 | eurocrypt | Perfect Non-interactive Zero Knowledge for NP | online |
2006 | eurocrypt | VSH, an Efficient and Provable Collision-Resistant Hash Function | online |
2006 | eurocrypt | Cryptography in Theory and Practice: The Case of Encryption in IPsec | online |
2006 | eurocrypt | The Function Field Sieve in the Medium Prime Case | online |
2006 | eurocrypt | Parallel and Concurrent Security of the HB and HB+ Protocols | online |
2006 | eurocrypt | Composition Implies Adaptive Security in Minicrypt | online |
2006 | eurocrypt | Herding Hash Functions and the Nostradamus Attack | online |
2006 | eurocrypt | Efficient Binary Conversion for Paillier Encrypted Values | online |
2006 | eurocrypt | Optimal Reductions Between Oblivious Transfers Using Interactive Hashing | online |
2006 | eurocrypt | Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings | online |
2006 | eurocrypt | Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys | online |
2006 | eurocrypt | On the (Im-)Possibility of Extending Coin Toss | online |
2006 | eurocrypt | Information-Theoretic Conditions for Two-Party Secure Function Evaluation | online |
2006 | eurocrypt | A Provable-Security Treatment of the Key-Wrap Problem | online |
2006 | eurocrypt | QUAD: A Practical Stream Cipher with Provable Security | online |
2006 | eurocrypt | Unclonable Group Identification | online |
2006 | eurocrypt | Private Circuits II: Keeping Secrets in Tamperable Circuits | online |
2006 | eurocrypt | Simplified Threshold RSA with Adaptive and Proactive Security | online |
2006 | eurocrypt | The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model | online |
2006 | eurocrypt | The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs | online |
2006 | eurocrypt | Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks | online |
2006 | eurocrypt | Symplectic Lattice Reduction and NTRU | online |
2006 | fse | How to Make a Difference: Early History of Differential Cryptanalysis | |
2006 | fse | Cryptanalysis of the Stream Cipher DECIM | online |
2006 | fse | Chosen-Ciphertext Attacks Against MOSQUITO | online |
2006 | fse | Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators | online |
2006 | fse | Some Plausible Constructions of Double-Block-Length Hash Functions | online |
2006 | fse | Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions | online |
2006 | fse | Cryptanalysis of Grain | online |
2006 | fse | The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function | online |
2006 | fse | A Study of the MD5 Attacks: Insights and Improvements | online |
2006 | fse | A Zero-Dimensional Gröbner Basis for AES-128 | online |
2006 | fse | A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation | online |
2006 | fse | Computing the Algebraic Immunity Efficiently | online |
2006 | fse | Pseudorandom Permutation Families over Abelian Groups | online |
2006 | fse | A New Dedicated 256-Bit Hash Function: FORK-256 | online |
2006 | fse | New Blockcipher Modes of Operation with Beyond the Birthday Bound Security | online |
2006 | fse | Cryptanalysis of Achterbahn | online |
2006 | fse | Collisions and Near-Collisions for Reduced-Round Tiger | online |
2006 | fse | How Far Can We Go on the x64 Processors? | online |
2006 | fse | Analysis of Step-Reduced SHA-256 | online |
2006 | fse | The Impact of Carries on the Complexity of Collision Attacks on SHA-1 | online |
2006 | fse | Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations | online |
2006 | fse | Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers | online |
2006 | fse | Upper Bounds on Algebraic Immunity of Boolean Power Functions | online |
2006 | fse | Improved Linear Distinguishers for SNOW 2.0 | online |
2006 | fse | Distinguishing Attacks on the Stream Cipher Py | online |
2006 | fse | Searching for Differential Paths in MD4 | online |
2006 | fse | On Feistel Structures Using a Diffusion Switching Mechanism | online |
2006 | fse | Resynchronization Attacks on WG and LEX | online |
2006 | fse | Cryptanalysis of the Full HAVAL with 4 and 5 Passes | online |
2006 | jofc | An Elliptic Curve Trapdoor System | 115-133 |
2006 | jofc | Session-Key Generation Using Human Passwords Only | 241-340 |
2006 | jofc | On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order | 463-487 |
2006 | jofc | Strengthening Zero-Knowledge Protocols Using Signatures | 169-209 |
2006 | jofc | On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions | 135-167 |
2006 | jofc | An Improved Real-Quadratic-Field-Based Key Exchange Procedure | 211-239 |
2006 | jofc | Characterization of Security Notions for Probabilistic Private-Key Encryption | 67-95 |
2006 | jofc | Threshold Password-Authenticated Key Exchange | 27-66 |
2006 | jofc | Elliptic Curves with Low Embedding Degree | 553-562 |
2006 | jofc | Private Computation: k-Connected versus 1-Connected Networks | 341-357 |
2006 | jofc | An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate | 489-520 |
2006 | jofc | Completeness in Two-Party Secure Computation: A Computational View | 521-552 |
2006 | jofc | A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions | 359-377 |
2006 | jofc | A Proof of the Security of Quantum Key Distribution | 381-439 |
2006 | jofc | Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers | 441-462 |
2006 | jofc | An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 | 1-25 |
2006 | jofc | The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives | 97-114 |
2006 | pkc | Curve25519: New Diffie-Hellman Speed Records | online |
2006 | pkc | Identity-Based Aggregate Signatures | online |
2006 | pkc | Building Better Signcryption Schemes with Tag-KEMs | online |
2006 | pkc | An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve | online |
2006 | pkc | New Attacks on RSA with Small Secret CRT-Exponents | online |
2006 | pkc | Strongly Unforgeable Signatures Based on Computational Diffie-Hellman | online |
2006 | pkc | Parallel Key-Insulated Public Key Encryption | online |
2006 | pkc | Generalization of the Selective-ID Security Model for HIBE Protocols | online |
2006 | pkc | Encoding-Free ElGamal Encryption Without Random Oracles | online |
2006 | pkc | The Twist-AUgmented Technique for Key Exchange | online |
2006 | pkc | Security-Mediated Certificateless Cryptography | online |
2006 | pkc | Conditional Oblivious Cast | online |
2006 | pkc | Linear Integer Secret Sharing and Distributed Exponentiation | online |
2006 | pkc | Generic On-Line/Off-Line Threshold Signatures | online |
2006 | pkc | Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm | online |
2006 | pkc | Cryptography and the Internet: Where It Is, Where It Isn't, Where it Should Be --- and Why It Isn't There | |
2006 | pkc | The Power of Identification Schemes | online |
2006 | pkc | New Online/Offline Signature Schemes Without Random Oracles | online |
2006 | pkc | Security Analysis of KEA Authenticated Key Exchange Protocol | online |
2006 | pkc | On Constructing Certificateless Cryptosystems from Identity Based Encryption | online |
2006 | pkc | Provably Secure Steganography with Imperfect Sampling | online |
2006 | pkc | Collision-Resistant No More: Hash-and-Sign Paradigm Revisited | online |
2006 | pkc | Efficient Polynomial Operations in the Shared-Coefficients Setting | online |
2006 | pkc | Efficiency Tradeoffs for Malicious Two-Party Computation | online |
2006 | pkc | High-Order Attacks Against the Exponent Splitting Protection | online |
2006 | pkc | Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol | online |
2006 | pkc | SAS-Based Authenticated Key Agreement | online |
2006 | pkc | Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings | online |
2006 | pkc | Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption | online |
2006 | pkc | k-Times Anonymous Authentication with a Constant Proving Cost | online |
2006 | pkc | An Attack on a Modified Niederreiter Encryption Scheme | online |
2006 | pkc | Anonymous Signature Schemes | online |
2006 | pkc | On the Limitations of the Spread of an IBE-to-PKE Transformation | online |
2006 | pkc | Password-Based Group Key Exchange in a Constant Number of Rounds | online |
2006 | pkc | Inoculating Multivariate Schemes Against Differential Attacks | online |
2006 | pkc | Efficient Scalar Multiplication by Isogeny Decompositions | online |
2006 | tcc | Efficient Multi-party Computation with Dispute Control | online |
2006 | tcc | On Matroids and Non-ideal Secret Sharing | online |
2006 | tcc | Communication Efficient Secure Linear Algebra | online |
2006 | tcc | Efficient Blind and Partially Blind Signatures Without Random Oracles | online |
2006 | tcc | On Error Correction in the Exponent | online |
2006 | tcc | Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles | online |
2006 | tcc | Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices | online |
2006 | tcc | Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols | online |
2006 | tcc | Mercurial Commitments: Minimal Assumptions and Efficient Constructions | online |
2006 | tcc | Finding Pessiland | online |
2006 | tcc | Interactive Zero-Knowledge with Restricted Random Oracles | online |
2006 | tcc | Perfectly Secure Password Protocols in the Bounded Retrieval Model | online |
2006 | tcc | Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation | online |
2006 | tcc | Non-interactive Zero-Knowledge from Homomorphic Encryption | online |
2006 | tcc | Games and the Impossibility of Realizable Ideal Functionality | online |
2006 | tcc | On the Relation Between the Ideal Cipher and the Random Oracle Models | online |
2006 | tcc | Separating Sources for Encryption and Secret Sharing | online |
2006 | tcc | Threshold and Proactive Pseudo-Random Permutations | online |
2006 | tcc | Calibrating Noise to Sensitivity in Private Data Analysis | online |
2006 | tcc | Intrusion-Resilience Via the Bounded-Storage Model | online |
2006 | tcc | Round-Optimal and Efficient Verifiable Secret Sharing | online |
2006 | tcc | Resource Fairness and Composability of Cryptographic Protocols | online |
2006 | tcc | Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness | online |
2006 | tcc | Polylogarithmic Private Approximations and Efficient Matching | online |
2006 | tcc | PRF Domain Extension Using DAGs | online |
2006 | tcc | Chosen-Ciphertext Security from Tag-Based Encryption | online |
2006 | tcc | Key Exchange Using Passwords and Long Keys | online |
2006 | tcc | Secure Computation with Partial Message Loss | online |
2006 | tcc | On the Complexity of Parallel Hardness Amplification for One-Way Functions | online |
2006 | tcc | Generalized Environmental Security from Number Theoretic Assumptions | online |
2006 | tcc | Concurrent Zero Knowledge Without Complexity Assumptions | online |
2006 | tcc | Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings | online |