year |
venue |
title |
pages |
2010 | asiacrypt | The Degree of Regularity of HFE Systems | online |
2010 | asiacrypt | The Round Complexity of Verifiable Secret Sharing: The Statistical Case | online |
2010 | asiacrypt | Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | online |
2010 | asiacrypt | General Perfectly Secure Message Transmission Using Linear Codes | online |
2010 | asiacrypt | Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model | online |
2010 | asiacrypt | A Group Signature Scheme from Lattice Assumptions | online |
2010 | asiacrypt | On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields | online |
2010 | asiacrypt | Faster Fully Homomorphic Encryption | online |
2010 | asiacrypt | Generic Compilers for Authenticated Key Exchange | online |
2010 | asiacrypt | On Invertible Sampling and Adaptive Security | online |
2010 | asiacrypt | The Semi-Generic Group Model and Applications to Pairing-Based Cryptography | online |
2010 | asiacrypt | Rotational Rebound Attacks on Reduced Skein | online |
2010 | asiacrypt | Efficient String-Commitment from Weak Bit-Commitment | online |
2010 | asiacrypt | Computationally Secure Pattern Matching in the Presence of Malicious Adversaries | online |
2010 | asiacrypt | Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl | online |
2010 | asiacrypt | Collision Attacks against the Knudsen-Preneel Compression Functions | online |
2010 | asiacrypt | Optimistic Concurrent Zero Knowledge | online |
2010 | asiacrypt | Improved Single-Key Attacks on 8-Round AES-192 and AES-256 | online |
2010 | asiacrypt | The World Is Not Enough: Another Look on Second-Order DPA | online |
2010 | asiacrypt | Efficient Public-Key Cryptography in the Presence of Key Leakage | online |
2010 | asiacrypt | Leakage Resilient ElGamal Encryption | online |
2010 | asiacrypt | Finding Second Preimages of Short Messages for Hamsi-256 | online |
2010 | asiacrypt | Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition | online |
2010 | asiacrypt | A Closer Look at Anonymity and Robustness in Encryption Schemes | online |
2010 | asiacrypt | Short Non-interactive Zero-Knowledge Proofs | online |
2010 | asiacrypt | Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions | online |
2010 | asiacrypt | Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems | online |
2010 | asiacrypt | A Forward-Secure Symmetric-Key Derivation Protocol - How to Improve Classical DUKPT | online |
2010 | asiacrypt | Structured Encryption and Controlled Disclosure | online |
2010 | asiacrypt | Constant-Size Commitments to Polynomials and Their Applications | online |
2010 | asiacrypt | A Byte-Based Guess and Determine Attack on SOSEMANUK | online |
2010 | asiacrypt | Lattice-Based Blind Signatures | online |
2010 | asiacrypt | Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures | online |
2010 | asiacrypt | Random Oracles with(out) Programmability | online |
2010 | asiacrypt | Short Pairing-Based Non-interactive Zero-Knowledge Arguments | online |
2010 | asiacrypt | Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings | online |
2010 | asiacrypt | Cryptographic Hash Functions and the SHA-3 Competition | |
2010 | asiacrypt | Cryptography, from Theory to Practice: A Personal Perspective | |
2010 | ches | Is Theoretical Cryptography Any Good in Practice? | |
2010 | ches | Cars and Voting Machines: Embedded Systems in the Field | |
2010 | ches | The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes | online |
2010 | ches | An Alternative to Error Correction for SRAM-Like PUFs | online |
2010 | ches | Quark: A Lightweight Hash | online |
2010 | ches | PRINTcipher: A Block Cipher for IC-Printing | online |
2010 | ches | Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection | online |
2010 | ches | Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract) | online |
2010 | ches | Coordinate Blinding over Large Prime Fields | online |
2010 | ches | Provably Secure Higher-Order Masking of AES | online |
2010 | ches | ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware | online |
2010 | ches | Public Key Perturbation of Randomized RSA Implementations | online |
2010 | ches | Mixed Bases for Efficient Inversion in $F((2^2)^2)^2$ and Conversion Matrices of SubBytes of {AES} | online |
2010 | ches | Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings | |
2010 | ches | Efficient Techniques for High-Speed Elliptic Curve Cryptography | online |
2010 | ches | Correlation-Enhanced Power Analysis Collision Attack | online |
2010 | ches | 256 Bit Standardized Crypto for 650 GE - GOST Revisited | online |
2010 | ches | New High Entropy Element for FPGA Based True Random Number Generators | online |
2010 | ches | Sponge-Based Pseudo-Random Number Generators | online |
2010 | ches | When Failure Analysis Meets Side-Channel Attacks | online |
2010 | ches | Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures | online |
2010 | ches | Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 | online |
2010 | ches | A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over $F_p$ | online |
2010 | ches | Side-Channel Analysis of Six SHA-3 Candidates | online |
2010 | ches | New Results on Instruction Cache Attacks | online |
2010 | ches | Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs | online |
2010 | ches | Developing a Hardware Evaluation Method for SHA-3 Candidates | online |
2010 | ches | Algebraic Side-Channel Analysis in the Presence of Errors | online |
2010 | ches | XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework | online |
2010 | ches | Fault Sensitivity Analysis | online |
2010 | ches | Flash Memory 'Bumping' Attacks | online |
2010 | ches | Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version) | online |
2010 | ches | Fast Exhaustive Search for Polynomial Systems in F2 | online |
2010 | crypto | Zero Knowledge -- 25 Years | |
2010 | crypto | Efficient Chosen-Ciphertext Security via Extractable Hash Proofs | online |
2010 | crypto | On Generalized Feistel Networks | online |
2010 | crypto | On Strong Simulation and Composable Point Obfuscation | online |
2010 | crypto | Oblivious RAM Revisited | online |
2010 | crypto | i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits | online |
2010 | crypto | Protecting Cryptographic Keys against Continual Leakage | online |
2010 | crypto | Factorization of a 768-Bit RSA Modulus | online |
2010 | crypto | Universally Composable Incoercibility | online |
2010 | crypto | Structure-Preserving Signatures and Commitments to Group Elements | online |
2010 | crypto | Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness | online |
2010 | crypto | Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost | online |
2010 | crypto | Cryptographic Extraction and Key Derivation: The HKDF Scheme | online |
2010 | crypto | Time Space Tradeoffs for Attacks against One-Way Functions and PRGs | online |
2010 | crypto | Securing Computation against Continuous Leakage | online |
2010 | crypto | Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks | online |
2010 | crypto | Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks | online |
2010 | crypto | Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption | online |
2010 | crypto | Concurrent Non-Malleable Zero Knowledge Proofs | online |
2010 | crypto | Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers | online |
2010 | crypto | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | online |
2010 | crypto | Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography | online |
2010 | crypto | Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE | online |
2010 | crypto | Equivalence of Uniform Key Agreement and Composition Insecurity | online |
2010 | crypto | Protocols for Multiparty Coin Toss with Dishonest Majority | online |
2010 | crypto | An Efficient and Parallel Gaussian Sampler for Lattices | online |
2010 | crypto | A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security | online |
2010 | crypto | Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries | online |
2010 | crypto | Credential Authenticated Identification and Key Exchange | online |
2010 | crypto | Secure Multiparty Computation with Minimal Interaction | online |
2010 | crypto | Correcting Errors in RSA Private Keys | online |
2010 | crypto | Improved Differential Attacks for ECHO and Grøstl | online |
2010 | crypto | Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back) | online |
2010 | crypto | Additively Homomorphic Encryption with d-Operand Multiplications | online |
2010 | crypto | On the Efficiency of Classical and Quantum Oblivious Transfer Reductions | online |
2010 | crypto | Instantiability of RSA-OAEP under Chosen-Plaintext Attack | online |
2010 | crypto | Efficient Indifferentiable Hashing into Ordinary Elliptic Curves | online |
2010 | crypto | Sampling in a Quantum Population, and Applications | online |
2010 | crypto | Password-Authenticated Session-Key Generation on the Internet in the Plain Model | online |
2010 | crypto | Improved Delegation of Computation Using Fully Homomorphic Encryption | online |
2010 | crypto | Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings | online |
2010 | eprint | A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0 | online |
2010 | eprint | On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption | online |
2010 | eprint | Improved Agreeing-Gluing Algorithm | online |
2010 | eprint | From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks | online |
2010 | eprint | A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption | online |
2010 | eprint | Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks | online |
2010 | eprint | Mean value formulas for twisted Edwards curves | online |
2010 | eprint | Distinguisher for Shabal's Permutation Function | online |
2010 | eprint | Small Scale Variants Of The Block Cipher PRESENT | online |
2010 | eprint | Faster Computation of Self-pairings | online |
2010 | eprint | CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure | online |
2010 | eprint | Security Analysis of a Threshold Proxy Signature Scheme | online |
2010 | eprint | i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits | online |
2010 | eprint | Privacy-friendly Incentives and their Application to Wikipedia (Extended Version) | online |
2010 | eprint | Some Applications of Lattice Based Root Finding Techniques | online |
2010 | eprint | On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack | online |
2010 | eprint | A New Framework for Password-Based Authenticated Key Exchange | online |
2010 | eprint | Comments on five smart card based password authentication protocols | online |
2010 | eprint | On the Insecurity of Parallel Repetition for Leakage Resilience | online |
2010 | eprint | On Small Subgroup Non-confinement Attack | online |
2010 | eprint | Privacy-Preserving RFID Systems: Model and Constructions | online |
2010 | eprint | Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm | online |
2010 | eprint | Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf | online |
2010 | eprint | Ring signature with divided private key | online |
2010 | eprint | Flaws in Differential Cryptanalysis of Reduced Round PRESENT | online |
2010 | eprint | Secure and Fast Implementations of Two Involution Ciphers | online |
2010 | eprint | Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations | online |
2010 | eprint | Founding Cryptography on Tamper-Proof Hardware Tokens | online |
2010 | eprint | The collision security of Tandem-DM in the ideal cipher model | online |
2010 | eprint | Efficient Public-Key Cryptography in the Presence of Key Leakage | online |
2010 | eprint | Wild McEliece | online |
2010 | eprint | the upper bounds on differntial characteristics in block cipher SMS4 | online |
2010 | eprint | Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials | online |
2010 | eprint | Genus 2 Curves with Complex Multiplication | online |
2010 | eprint | Optimal Adversary Behavior for the Serial Model of Financial Attack Trees | online |
2010 | eprint | Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$ | online |
2010 | eprint | Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics | online |
2010 | eprint | A variant of the F4 algorithm | online |
2010 | eprint | On Strong Simulation and Composable Point Obfuscation | online |
2010 | eprint | Identity-Based Encryption Secure under Selective Opening Attack | online |
2010 | eprint | Perfectly Balanced Boolean Functions and Goli\'c Conjecture | online |
2010 | eprint | A Flaw in The Internal State Recovery Attack on ALPHA-MAC | online |
2010 | eprint | Computationally Sound Verification of Source Code | online |
2010 | eprint | Stange's Elliptic Nets and Coxeter Group F4 | online |
2010 | eprint | Distinguishing Properties of Higher Order Derivatives of Boolean Functions | online |
2010 | eprint | 1024XKS - A High Security Software Oriented Block Cipher Revisited | online |
2010 | eprint | Cryptanalysis and Improvement of A New Electronic Travelers Check Scheme Based on One-way Hash Function | online |
2010 | eprint | Golay Complementary Sequences Over the QAM Constellation | online |
2010 | eprint | White-Box Cryptography and SPN ciphers. LRC method | online |
2010 | eprint | Black-Box Constructions of Protocols for Secure Computation | online |
2010 | eprint | Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks | online |
2010 | eprint | Comment on four two-party authentication protocols | online |
2010 | eprint | Binomial Sieve Series -- a Prospective Cryptographic Tool | online |
2010 | eprint | Improved Fault Attack on FOX | online |
2010 | eprint | Synchronized Aggregate Signatures: New Definitions, Constructions and Applications | online |
2010 | eprint | Evolutionary Cipher against Differential Power Attack | online |
2010 | eprint | Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm | online |
2010 | eprint | A Meet-in-the-Middle Attack on ARIA | online |
2010 | eprint | CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow | online |
2010 | eprint | Dismantling SecureMemory, CryptoMemory and CryptoRF | online |
2010 | eprint | KIST: A new encryption algorithm based on splay | online |
2010 | eprint | On a conjecture about binary strings distribution | online |
2010 | eprint | Parallelizing the Camellia and SMS4 Block Ciphers - Extended version | online |
2010 | eprint | On Foundation and Construction of Physical Unclonable Functions | online |
2010 | eprint | Security Improvement on a Password-Authenticated Group Key Exchange Protocol | online |
2010 | eprint | Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup | online |
2010 | eprint | Random Oracles in a Quantum World | online |
2010 | eprint | Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA | online |
2010 | eprint | A Family of Implementation-Friendly BN Elliptic Curves | online |
2010 | eprint | A Reflection on the Security of Two-Party Key Establishment Protocols | online |
2010 | eprint | Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates | online |
2010 | eprint | Sanitizable signatures with strong transparency in the standard model | online |
2010 | eprint | Homomorphic One-Way Function Trees and Application in Collusion-Free Multicast Key Distribution | online |
2010 | eprint | A Comparison of Cryptanalytic Tradeoff Algorithms | online |
2010 | eprint | AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS | online |
2010 | eprint | On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields | online |
2010 | eprint | The PASSERINE Public Key Encryption and Authentication Mechanism | online |
2010 | eprint | Identity Based Online/Offline Encryption Scheme | online |
2010 | eprint | Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512 | online |
2010 | eprint | A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity | online |
2010 | eprint | The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA | online |
2010 | eprint | The World is Not Enough: Another Look on Second-Order DPA | online |
2010 | eprint | Arithmetic of Supersingular Koblitz Curves in Characteristic Three | online |
2010 | eprint | Cryptanalysis of a DoS-resistant ID-based password authentication | online |
2010 | eprint | Selecting Parameters for the Rainbow Signature Scheme - Extended Version - | online |
2010 | eprint | A Simple BGN-type Cryptosystem from LWE | online |
2010 | eprint | Achieving Leakage Resilience Through Dual System Encryption | online |
2010 | eprint | Preventing Pollution Attacks in Multi-Source Network Coding | online |
2010 | eprint | Embedded Extended Visual Cryptography Schemes | online |
2010 | eprint | Rational Secret Sharing AS Extensive Games | online |
2010 | eprint | Piret and Quisquater's DFA on AES Revisited | online |
2010 | eprint | New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation | online |
2010 | eprint | Provably Secure Higher-Order Masking of AES | online |
2010 | eprint | New software speed records for cryptographic pairings | online |
2010 | eprint | Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade | online |
2010 | eprint | Certificateless Signcryption without Pairing | online |
2010 | eprint | Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity | online |
2010 | eprint | Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy | online |
2010 | eprint | New Construction of Identity-based Proxy Re-encryption | online |
2010 | eprint | New generic algorithms for hard knapsacks | online |
2010 | eprint | Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs | online |
2010 | eprint | J-PAKE: Authenticated Key Exchange Without PKI | online |
2010 | eprint | Short One-Time Signatures | online |
2010 | eprint | On Designated Verifier Signature Schemes | online |
2010 | eprint | Side-channel Analysis of Six SHA-3 Candidates | online |
2010 | eprint | Non-Transferable Proxy Re-Encryption | online |
2010 | eprint | Sequential Rationality in Cryptographic Protocols | online |
2010 | eprint | Speeding Up The Widepipe: Secure and Fast Hashing | online |
2010 | eprint | Secure Guaranteed Computation | online |
2010 | eprint | Identity-Based Online/Offline Key Encapsulation and Encryption | online |
2010 | eprint | Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary | online |
2010 | eprint | On E-Vote Integrity in the Case of Malicious Voter Computers | online |
2010 | eprint | Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault | online |
2010 | eprint | Cryptography Against Continuous Memory Attacks | online |
2010 | eprint | Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting | online |
2010 | eprint | Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts | online |
2010 | eprint | Homomorphic Signatures over Binary Fields: Secure Network Coding with Small Coefficients | online |
2010 | eprint | The Rebound Attack and Subspace Distinguishers: Application to Whirlpool | online |
2010 | eprint | Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol | online |
2010 | eprint | A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer | online |
2010 | eprint | Optimal Authentication of Operations on Dynamic Sets | online |
2010 | eprint | Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs | online |
2010 | eprint | Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets | online |
2010 | eprint | Impossible Differential Cryptanalysis on E2 | online |
2010 | eprint | Improving the performance of Luffa Hash Algorithm | online |
2010 | eprint | Robust Combiner for Obfuscators | online |
2010 | eprint | Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring | online |
2010 | eprint | Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure | online |
2010 | eprint | CCA2 Secure Certificateless Encryption Schemes Based on RSA | online |
2010 | eprint | Certificateless generalized signcryption | online |
2010 | eprint | On extended algebraic immunity | online |
2010 | eprint | On Protecting Cryptographic Keys Against Continual Leakage | online |
2010 | eprint | Efficient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation | online |
2010 | eprint | Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey | online |
2010 | eprint | Unconditionally Secure Rational Secret Sharing in Standard Communication Networks | online |
2010 | eprint | Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares | online |
2010 | eprint | Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves | online |
2010 | eprint | Identity-Based Authenticated Asymmetric Group Key Agreement Protocol | online |
2010 | eprint | Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE | online |
2010 | eprint | Practical-time Attack on the Full MMB Block Cipher | online |
2010 | eprint | Quantum Proofs of Knowledge | online |
2010 | eprint | Composable Security Analysis of OS Services | online |
2010 | eprint | How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes | online |
2010 | eprint | On the q-Strong Diffie-Hellman Problem | online |
2010 | eprint | Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework | online |
2010 | eprint | Secure Code Update for Embedded Devices via Proofs of Secure Erasure | online |
2010 | eprint | New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m) | online |
2010 | eprint | Tracker: Security and Privacy for RFID-based Supply Chains | online |
2010 | eprint | (If) Size Matters: Size-Hiding Private Set Intersection | online |
2010 | eprint | Solving Generalized Small Inverse Problems | online |
2010 | eprint | Some Observations on Indifferentiability | online |
2010 | eprint | Improved Differential Attacks for ECHO and Grostl | online |
2010 | eprint | Efficient Implementation of the Orlandi Protocol Extended Version | online |
2010 | eprint | A Security Weakness in a Generic Construction of a Group Key Exchange Protocol | online |
2010 | eprint | Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) | online |
2010 | eprint | A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$ | online |
2010 | eprint | Practical NFC Peer-to-Peer Relay Attack using Mobile Phones | online |
2010 | eprint | Concurrent composition in the bounded quantum storage model | online |
2010 | eprint | A calculus for game-based security proofs | online |
2010 | eprint | Throughput-Optimal Routing in Unreliable Networks | online |
2010 | eprint | On Representable Matroids and Ideal Secret Sharing | online |
2010 | eprint | Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials | online |
2010 | eprint | Cooperative Provable Data Possession | online |
2010 | eprint | Attribute-based group key establishment | online |
2010 | eprint | Accountability: Definition and Relationship to Verifiability | online |
2010 | eprint | A New Security Model for Authenticated Key Agreement | online |
2010 | eprint | Collusion Free Protocol for Correlated Element Selection Problem | online |
2010 | eprint | One-round and authenticated three-party multiple key exchange protocol from parings | online |
2010 | eprint | Weaknesses of a dynamic ID-based remote user authentication scheme | online |
2010 | eprint | Improved Delegation of Computation using Fully Homomorphic Encryption | online |
2010 | eprint | Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios | online |
2010 | eprint | Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity | online |
2010 | eprint | Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset | online |
2010 | eprint | Towards a Theory of Trust Based Collaborative Search | online |
2010 | eprint | Quantifying Trust | online |
2010 | eprint | A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem | online |
2010 | eprint | Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others | online |
2010 | eprint | Rational Secret Sharing without Broadcast | online |
2010 | eprint | Collusion Free Protocol for Rational Secret Sharing | online |
2010 | eprint | Modeling Attacks on Physical Unclonable Functions | online |
2010 | eprint | A supplement to Liu et al.'s certificateless signcryption scheme in the standard model | online |
2010 | eprint | Separable Hash Functions | online |
2010 | eprint | Cryptanalysis of XXTEA | online |
2010 | eprint | Automorphism group of the set of all bent functions | online |
2010 | eprint | On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature | online |
2010 | eprint | Transfinite Cryptography | online |
2010 | eprint | Feasible Attack on the 13-round AES-256 | online |
2010 | eprint | Practical ID-based Encryption for Wireless Sensor Network | online |
2010 | eprint | On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions | online |
2010 | eprint | Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network | online |
2010 | eprint | Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA | online |
2010 | eprint | Halving on Binary Edwards Curves | online |
2010 | eprint | On FPGA-based implementations of Gr\{o}stl | online |
2010 | eprint | Skew-Frobenius map on twisted Edwards curve | online |
2010 | eprint | Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT | online |
2010 | eprint | Factorization of a 768-bit RSA modulus | online |
2010 | eprint | Cube Test Analysis of the Statistical Behavior of CubeHash and Skein | online |
2010 | eprint | Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience | online |
2010 | eprint | Lattice Reduction and Polynomial Solving | online |
2010 | eprint | A DAA Scheme Requiring Less TPM Resources | online |
2010 | eprint | Cryptographic Extraction and Key Derivation: The HKDF Scheme | online |
2010 | eprint | The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions | online |
2010 | eprint | CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles | online |
2010 | eprint | Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII | online |
2010 | eprint | Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition | online |
2010 | eprint | Related Key Cryptanalysis of the LEX Stream Cipher | online |
2010 | eprint | Two improved authenticated multiple key exchange protocols | online |
2010 | eprint | Differential Cache Trace Attack Against CLEFIA | online |
2010 | eprint | Key-Controlled Order-Preserving Encryption | online |
2010 | eprint | A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony | online |
2010 | eprint | LAB Form for Iterated Hash Functions | online |
2010 | eprint | A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs | online |
2010 | eprint | Factorization of RSA-180 | online |
2010 | eprint | Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures? | online |
2010 | eprint | Selecting Parameters for Secure McEliece-based Cryptosystems | online |
2010 | eprint | Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | online |
2010 | eprint | Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore | online |
2010 | eprint | A new one-time signature scheme from syndrome decoding | online |
2010 | eprint | Symmetric States and their Structure: Improved Analysis of CubeHash | online |
2010 | eprint | Scalability and Security Conflict for RFID Authentication Protocols | online |
2010 | eprint | Online/Offline Identity-Based Signcryption Re-visited | online |
2010 | eprint | Related-Key Boomerang and Rectangle Attacks | online |
2010 | eprint | Position-Based Quantum Cryptography | online |
2010 | eprint | Number of Jacobi quartic curves over finite fields | online |
2010 | eprint | Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs | online |
2010 | eprint | A note on ``Improved Fast Correlation Attacks on Stream Ciphers" | online |
2010 | eprint | Adaptively Secure Broadcast Encryption with Short Ciphertexts | online |
2010 | eprint | Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships | online |
2010 | eprint | Cryptography Resilient to Continual Memory Leakage | online |
2010 | eprint | Differential Fault Analysis on AES with 192 and 256-Bit Keys | online |
2010 | eprint | On the Round Complexity of Covert Computation | online |
2010 | eprint | Authentication schemes from actions on graphs, groups, or rings | online |
2010 | eprint | Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation | online |
2010 | eprint | New Methodologies for Differential-Linear Cryptanalysis and Its Extensions | online |
2010 | eprint | Protocols for Reliable and Secure Message Transmission | online |
2010 | eprint | Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth | online |
2010 | eprint | Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish | online |
2010 | eprint | A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings | online |
2010 | eprint | Recursive Information Hiding in Visual Cryptography | online |
2010 | eprint | A secure anonymous communication scheme in vehicular ad hoc networks from pairings | online |
2010 | eprint | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer | online |
2010 | eprint | On Achieving the "Best of Both Worlds" in Secure Multiparty Computation | online |
2010 | eprint | A SAT-based preimage analysis of reduced KECCAK hash functions | online |
2010 | eprint | On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions | online |
2010 | eprint | On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions | online |
2010 | eprint | Class Invariants by the CRT Method | online |
2010 | eprint | Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography | online |
2010 | eprint | An Information Theoretic Perspective on the Differential Fault Analysis against AES | online |
2010 | eprint | Lattice-based Identity-Based Broadcast Encryption Scheme | online |
2010 | eprint | Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model | online |
2010 | eprint | A Two-Party Protocol with Trusted Initializer for Computing the Inner Product | online |
2010 | eprint | On the order of the polynomial $x^p-x-a$ | online |
2010 | eprint | Intractable Problems in Cryptography | online |
2010 | eprint | Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption | online |
2010 | eprint | Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card | online |
2010 | eprint | An Improved Timestamp-Based Password Remote User Authentication Scheme | online |
2010 | eprint | A Low-Area yet Performant FPGA Implementation of Shabal | online |
2010 | eprint | Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves | online |
2010 | eprint | Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities | online |
2010 | eprint | Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions | online |
2010 | eprint | Computing genus 2 curves from invariants on the Hilbert moduli space | online |
2010 | eprint | On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields | online |
2010 | eprint | Ideal Key Derivation and Encryption in Simulation-based Security | online |
2010 | eprint | Batch Groth-Sahai | online |
2010 | eprint | Hash-based Multivariate Public Key Cryptosystems | online |
2010 | eprint | The Effects of the Omission of Last Round's MixColumns on AES | online |
2010 | eprint | Correlation-Enhanced Power Analysis Collision Attack | online |
2010 | eprint | A modified eCK model with stronger security for tripartite authenticated key exchange | online |
2010 | eprint | On the Indifferentiability of the Gr{\o}stl Hash Function | online |
2010 | eprint | Differential and invertibility properties of BLAKE (full version) | online |
2010 | eprint | Faster Fully Homomorphic Encryption | online |
2010 | eprint | A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods | online |
2010 | eprint | Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers | online |
2010 | eprint | Efficient chaotic permutations for image encryption algorithms | online |
2010 | eprint | On generalized Feistel networks | online |
2010 | eprint | A New Chaos-Based Cryptosystem for Secure Transmitted Images | online |
2010 | eprint | Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design | online |
2010 | eprint | Lower Bounds for Straight Line Factoring | online |
2010 | eprint | Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange | online |
2010 | eprint | An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem | online |
2010 | eprint | Cryptanalysis of the Compression Function of SIMD | online |
2010 | eprint | On Symmetric Encryption and Point Obfuscation | online |
2010 | eprint | On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing | online |
2010 | eprint | Authenticating Aggregate Range Queries over Multidimensional Dataset | online |
2010 | eprint | On security of a remote user authentication scheme without using smart cards | online |
2010 | eprint | A Principle for Cryptographic Protocols Beyond Security, Less Parameters | online |
2010 | eprint | Impossible Differential Cryptanalysis of SPN Ciphers | online |
2010 | eprint | Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol | online |
2010 | eprint | Attacking M&M Collective Signature Scheme | online |
2010 | eprint | Logical cryptoanalysis on the example of the cryptosystem DES | online |
2010 | eprint | Co-Z Addition Formulae and Binary Ladders on Elliptic Curves | online |
2010 | eprint | An Improved Timing Attack with Error Detection on RSA-CRT | online |
2010 | eprint | The analytical property for $\zeta(s)$ | online |
2010 | eprint | Credential Authenticated Identification and Key Exchange | online |
2010 | eprint | Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation | online |
2010 | eprint | Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment | online |
2010 | eprint | Security weakness of two authenticated key exchange protocols from pairings | online |
2010 | eprint | Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256 | online |
2010 | eprint | Fast Exhaustive Search for Polynomial Systems in $F_2$ | online |
2010 | eprint | Solinas primes of small weight for fixed sizes | online |
2010 | eprint | Weaknesses of a dynamic ID-based remote user authentication scheme | online |
2010 | eprint | A New Framework for RFID Privacy | online |
2010 | eprint | Efficient Techniques for High-Speed Elliptic Curve Cryptography | online |
2010 | eprint | Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding | online |
2010 | eprint | A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm | online |
2010 | eprint | Privacy-Preserving Matching Protocols for Attributes and Strings | online |
2010 | eprint | A Note On Gottesman-Chuang Quantum Signature Scheme | online |
2010 | eprint | Differential Cryptanalysis of SMS4 Block Cipher | online |
2010 | eprint | Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost | online |
2010 | eprint | Differential Fault Analysis on SMS4 Using a Single Fault | online |
2010 | eprint | On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010 | online |
2010 | eprint | New Advances on Privacy-Preserving Policy Reconciliation | online |
2010 | eprint | On isotopisms of commutative presemifields and CCZ-equivalence of functions | online |
2010 | eprint | An Anonymous ID-based Encryption Revisited | online |
2010 | eprint | Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function | online |
2010 | eprint | Some Observations on TWIS Block Cipher | online |
2010 | eprint | Improved Single-Key Attacks on 8-round AES | online |
2010 | eprint | A Pairing-Based DAA Scheme Further Reducing TPM Resources | online |
2010 | eprint | Security Analysis of SIMD | online |
2010 | eprint | Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead | online |
2010 | eprint | Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images | online |
2010 | eprint | Type-II Optimal Polynomial Bases | online |
2010 | eprint | Effect of the Dependent Paths in Linear Hull | online |
2010 | eprint | Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles | online |
2010 | eprint | Privacy-Preserving Multi-Objective Evolutionary Algorithms | online |
2010 | eprint | 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree | online |
2010 | eprint | Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption | online |
2010 | eprint | Approximating Addition by XOR: how to go all the way | online |
2010 | eprint | Signatures for Multi-source Network Coding | online |
2010 | eprint | Related-Key Boomerang Attack on Block Cipher SQUARE | online |
2010 | eprint | On the Security of Pseudorandomized Information-Theoretically Secure Schemes | online |
2010 | eprint | Concurrent Knowledge Extraction in the Public-Key Model | online |
2010 | eprint | Terrorists in Parliament, Distributed Rational Consensus | online |
2010 | eprint | A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra | online |
2010 | eprint | A Distinguisher for High Rate McEliece Cryptosystems | online |
2010 | eprint | Private and Continual Release of Statistics | online |
2010 | eprint | Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars | online |
2010 | eprint | ECC2K-130 on Cell CPUs | online |
2010 | eprint | Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme | online |
2010 | eprint | Multiple Bytes Differential Fault Analysis on CLEFIA | online |
2010 | eprint | Security Proof of AugPAKE | online |
2010 | eprint | Modular Design of Efficient Secure Function Evaluation Protocols | online |
2010 | eprint | Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors | online |
2010 | eprint | Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols | online |
2010 | eprint | Efficient Differential Fault Analysis for AES | online |
2010 | eprint | The Eris hybrid cipher | online |
2010 | eprint | Practical-Titled Attack on AES-128 Using Chosen-Text Relations | online |
2010 | eprint | Predicate-Based Key Exchange | online |
2010 | eprint | Pushing the Limits of ECM | online |
2010 | eprint | One Round Group Key Exchange with Forward Security in the Standard Model | online |
2010 | eprint | A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols | online |
2010 | eprint | Attribute-based Authenticated Key Exchange | online |
2010 | eprint | A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm | online |
2010 | eprint | Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems | online |
2010 | eprint | A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme | online |
2010 | eprint | A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model | online |
2010 | eprint | Fixed Argument Pairings | online |
2010 | eprint | MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions | online |
2010 | eprint | Identity Based Public Verifiable Signcryption Scheme | online |
2010 | eprint | An Efficient and Parallel Gaussian Sampler for Lattices | online |
2010 | eprint | Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves | online |
2010 | eprint | Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography | online |
2010 | eprint | Robust RFID Authentication Protocol with Formal Proof and Its Feasibility | online |
2010 | eprint | Solving a 676-bit Discrete Logarithm Problem in $GF(3^{6n})$ | online |
2010 | eprint | Efficient Generalized Signcryption Schemes | online |
2010 | eprint | Distinguishers for the Compression Function and Output Transformation of Hamsi-256 | online |
2010 | eprint | Time-Specific Encryption | online |
2010 | eprint | Security Weaknesses in Two Certificateless Signcryption Schemes | online |
2010 | eprint | Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids | online |
2010 | eprint | New Impossible Di®erential Attacks on AES | online |
2010 | eprint | Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems | online |
2010 | eprint | A Random Number Generator Based on Isogenies Operations | online |
2010 | eprint | A Security Enhancement and Proof for Authentication and Key Agreement (AKA) | online |
2010 | eprint | Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR | online |
2010 | eprint | Decentralizing Attribute-Based Encryption | online |
2010 | eprint | Secret Sharing Extensions based on the Chinese Remainder Theorem | online |
2010 | eprint | A Digital Signature Using Multivariate Functions on Quaternion Ring | online |
2010 | eprint | Parallel Enumeration of Shortest Lattice Vectors | online |
2010 | eprint | Cryptographic Pairings Based on Elliptic Nets | online |
2010 | eprint | A Zero-One Law for Deterministic 2-Party Secure Computation | online |
2010 | eprint | High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves | online |
2010 | eprint | Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security | online |
2010 | eprint | Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE | online |
2010 | eprint | Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security | online |
2010 | eprint | Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes | online |
2010 | eprint | Fair Blind Signatures without Random Oracles | online |
2010 | eprint | CCA-Secure PRE Scheme without Public Verifiability | online |
2010 | eprint | Constructing Verifiable Random Functions with Large Input Spaces | online |
2010 | eprint | The Fiat--Shamir Transform for Group and Ring Signature Schemes | online |
2010 | eprint | The Extended Access Control for Machine Readable Travel Documents | online |
2010 | eprint | Identity Based Self Delegated Signature - Self Proxy Signatures | online |
2010 | eprint | Avoiding Full Extension Field Arithmetic in Pairing Computations | online |
2010 | eprint | On the Security of Identity Based Threshold Unsigncryption Schemes | online |
2010 | eprint | Bias in the nonlinear filter generator output sequence | online |
2010 | eprint | On the Use of Financial Data as a Random Beacon | online |
2010 | eprint | Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography | online |
2010 | eprint | Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties | online |
2010 | eprint | Adaptive Concurrent Non-Malleability with Bare Public-Keys | online |
2010 | eprint | An Analysis of Affine Coordinates for Pairing Computation | online |
2010 | eprint | Perfectly Secure Oblivious RAM Without Random Oracles | online |
2010 | eprint | A Compact FPGA Implementation of the SHA-3 Candidate ECHO | online |
2010 | eprint | Practical Adaptive Oblivious Transfer from a Simple Assumption | online |
2010 | eprint | TASTY: Tool for Automating Secure Two-partY computations | online |
2010 | eprint | Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption | online |
2010 | eprint | Oblivious RAM Revisited | online |
2010 | eprint | On zero practical significance of Key recovery attack on full GOST block cipher with zero time and memory | online |
2010 | eprint | Starfish on Strike | online |
2010 | eprint | CCA-Secure PRE Scheme without Random Oracles | online |
2010 | eprint | One-Round Password-Based Authenticated Key Exchange | online |
2010 | eprint | Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model | online |
2010 | eprint | Double Ciphertext Mode : A Proposal for Secure Backup | online |
2010 | eprint | The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem | online |
2010 | eprint | Finding discrete logarithms with a set orbit distinguisher | online |
2010 | eprint | A Security Evaluation of DNSSEC with NSEC3 | online |
2010 | eprint | Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves | online |
2010 | eprint | Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator | online |
2010 | eprint | Decoding square-free Goppa codes over $\F_p$ | online |
2010 | eprint | Cryptographic Agility and its Relation to Circular Encryption | online |
2010 | eprint | Hashing into Hessian Curves | online |
2010 | eprint | Proposal of a Signature Scheme based on STS Trapdoor | online |
2010 | eprint | On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption | online |
2010 | eprint | How to Construct Space Efficient Revocable IBE from Non-monotonic ABE | online |
2010 | eprint | Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function | online |
2010 | eprint | Universal One-Way Hash Functions via Inaccessible Entropy | online |
2010 | eprint | Identity Based Online/Offline Signcryption Scheme | online |
2010 | eprint | Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack | online |
2010 | eprint | Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring | online |
2010 | eprint | Security of Encryption Schemes in Weakened Random Oracle Models | online |
2010 | eprint | Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation | online |
2010 | eprint | Delaying Mismatched Field Multiplications in Pairing Computations | online |
2010 | eprint | Pairing computation on curves with efficiently computable endomorphism and small embedding degree | online |
2010 | eprint | A Hardware Wrapper for the SHA-3 Hash Algorithms | online |
2010 | eprint | Analysis of an internet voting protocol | online |
2010 | eprint | Cryptographic Aspects of Real Hyperelliptic Curves | online |
2010 | eprint | Security Reductions of the Second Round SHA-3 Candidates | online |
2010 | eprint | On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks | online |
2010 | eprint | Deterministic Encoding and Hashing to Odd Hyperelliptic Curves | online |
2010 | eprint | CCA-Secure Cryptosystem from Lattice | online |
2010 | eprint | Huff's Model for Elliptic Curves | online |
2010 | eprint | Update-Optimal Authenticated Structures Based on Lattices | online |
2010 | eprint | Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions | online |
2010 | eprint | Relation for Algebraic Attack on E0 combiner | online |
2010 | eprint | First-Order Side-Channel Attacks on the Permutation Tables Countermeasure Extended Version | online |
2010 | eprint | Low Voltage Fault Attacks to AES and RSA on General Purpose Processors | online |
2010 | eprint | BoostReduce - A Framework For Strong Lattice Basis Reduction | online |
2010 | eprint | Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation | online |
2010 | eprint | A Combinatorial Analysis of HC-128 | online |
2010 | eprint | On the claimed privacy of EC-RAC III | online |
2010 | eprint | On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings | online |
2010 | eprint | Signing on Elements in Bilinear Groups for Modular Protocol Design | online |
2010 | eprint | The impossibility of computationally sound XOR | online |
2010 | eprint | Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves - | online |
2010 | eprint | Elliptic curves in Huff's model | online |
2010 | eprint | On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption | online |
2010 | eprint | Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks | online |
2010 | eprint | On Robust Key Agreement Based on Public Key Authentication | online |
2010 | eprint | Interplay between (im)perfectness, synchrony and connectivity: The Case of Probabilistic Reliable Communication | online |
2010 | eprint | Estimating the Security of Lattice-based Cryptosystems | online |
2010 | eprint | A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment | online |
2010 | eprint | On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP | online |
2010 | eprint | Horizontal Correlation Analysis on Exponentiation | online |
2010 | eurocrypt | Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings | online |
2010 | eurocrypt | A Simple BGN-Type Cryptosystem from LWE | online |
2010 | eurocrypt | On the Impossibility of Three-Move Blind Signature Schemes | online |
2010 | eurocrypt | Bonsai Trees, or How to Delegate a Lattice Basis | online |
2010 | eurocrypt | Algebraic Cryptanalysis of McEliece Variants with Compact Keys | online |
2010 | eurocrypt | Lattice Enumeration Using Extreme Pruning | online |
2010 | eurocrypt | Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | online |
2010 | eurocrypt | Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption | online |
2010 | eurocrypt | Stam's Collision Resistance Conjecture | online |
2010 | eurocrypt | Secure Obfuscation for Encrypted Signatures | online |
2010 | eurocrypt | On Ideal Lattices and Learning with Errors over Rings | online |
2010 | eurocrypt | Universally Composable Quantum Multi-party Computation | online |
2010 | eurocrypt | Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups | online |
2010 | eurocrypt | New Generic Algorithms for Hard Knapsacks | online |
2010 | eurocrypt | Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation | online |
2010 | eurocrypt | Efficient Lattice (H)IBE in the Standard Model | online |
2010 | eurocrypt | Public-Key Encryption in the Bounded-Retrieval Model | online |
2010 | eurocrypt | Computational Soundness, Co-induction, and Encryption Cycles | online |
2010 | eurocrypt | Cryptography between Wonderland and Underland | online |
2010 | eurocrypt | Constructing Verifiable Random Functions with Large Input Spaces | online |
2010 | eurocrypt | Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR | online |
2010 | eurocrypt | Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others | online |
2010 | eurocrypt | Efficient Device-Independent Quantum Key Distribution | online |
2010 | eurocrypt | Adaptively Secure Broadcast | online |
2010 | eurocrypt | Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions | online |
2010 | eurocrypt | Cryptographic Agility and Its Relation to Circular Encryption | online |
2010 | eurocrypt | Bounded Key-Dependent Message Security | online |
2010 | eurocrypt | Adaptive Trapdoor Functions and Chosen-Ciphertext Security | online |
2010 | eurocrypt | Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | online |
2010 | eurocrypt | Fully Homomorphic Encryption over the Integers | online |
2010 | eurocrypt | Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography | online |
2010 | eurocrypt | Universal One-Way Hash Functions via Inaccessible Entropy | online |
2010 | eurocrypt | Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks | online |
2010 | eurocrypt | Secure Message Transmission with Small Public Discussion | online |
2010 | eurocrypt | Partial Fairness in Secure Two-Party Computation | online |
2010 | fse | Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher | online |
2010 | fse | Higher Order Differential Attack on Step-Reduced Variants of Luffa v1 | online |
2010 | fse | Finding Preimages of Tiger Up to 23 Steps | online |
2010 | fse | Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations | online |
2010 | fse | A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs | online |
2010 | fse | Domain Extension for Enhanced Target Collision-Resistant Hash Functions | online |
2010 | fse | The Survey of Cryptanalysis on Hash Functions | |
2010 | fse | A Provable-Security Perspective on the Development of Hash Functions | |
2010 | fse | Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers | online |
2010 | fse | Cryptanalysis of the DECT Standard Cipher | online |
2010 | fse | Another Look at Complementation Properties | online |
2010 | fse | Differential and Invertibility Properties of BLAKE | online |
2010 | fse | How to Thwart Birthday Attacks against MACs via Small Randomness | online |
2010 | fse | Fast Software AES Encryption | online |
2010 | fse | Pseudo-cryptanalysis of the Original Blue Midnight Wish | online |
2010 | fse | Improving the Generalized Feistel | online |
2010 | fse | Attacking the Knudsen-Preneel Compression Functions | online |
2010 | fse | Cryptanalysis of ESSENCE | online |
2010 | fse | Rebound Attack on Reduced-Round Versions of JH | online |
2010 | fse | Security Analysis of the Mode of JH Hash Function | online |
2010 | fse | Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships | online |
2010 | fse | Nonlinear Equivalence of Stream Ciphers | online |
2010 | fse | Rotational Cryptanalysis of ARX | online |
2010 | fse | Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited | online |
2010 | jofc | Structural Cryptanalysis of SASAS | 505-518 |
2010 | jofc | Cryptanalysis of MD2 | 72-90 |
2010 | jofc | Parallel and Concurrent Security of the HB and HB+ Protocols | 402-421 |
2010 | jofc | The RSA Group is Pseudo-Free | 169-186 |
2010 | jofc | Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries | 422-456 |
2010 | jofc | On d-Multiplicative Secret Sharing | 580-593 |
2010 | jofc | On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits | 1-36 |
2010 | jofc | Discrete Logarithm Problems with Auxiliary Inputs | 457-476 |
2010 | jofc | Secure Computation of the Median (and Other Elements of Specified Ranks) | 373-401 |
2010 | jofc | Obfuscation for Cryptographic Purposes | 121-168 |
2010 | jofc | A Taxonomy of Pairing-Friendly Elliptic Curves | 224-280 |
2010 | jofc | On the Efficient Generation of Prime-Order Elliptic Curves | 477-503 |
2010 | jofc | An Analysis of the Blockcipher-Based Hash Functions from PGV | 519-545 |
2010 | jofc | How Should We Solve Search Problems Privately? | 344-371 |
2010 | jofc | Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries | 281-343 |
2010 | jofc | A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack | 91-120 |
2010 | jofc | Efficient Cache Attacks on AES, and Countermeasures | 37-71 |
2010 | jofc | Long-Term Security and Universal Composability | 594-671 |
2010 | jofc | A Verifiable Secret Shuffle of Homomorphic Encryptions | 546-579 |
2010 | jofc | The TLS Handshake Protocol: A Modular Analysis | 187-223 |
2010 | pkc | Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings | online |
2010 | pkc | Unlinkability of Sanitizable Signatures | online |
2010 | pkc | Implicit Factoring with Shared Most Significant and Middle Bits | online |
2010 | pkc | Identity-Based Aggregate and Multi-Signature Schemes Based on RSA | online |
2010 | pkc | Secure Network Coding over the Integers | online |
2010 | pkc | Solving a 676-Bit Discrete Logarithm Problem in $GF(3^{6n})$ | online |
2010 | pkc | Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions | online |
2010 | pkc | Preventing Pollution Attacks in Multi-source Network Coding | online |
2010 | pkc | Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA | online |
2010 | pkc | Confidential Signatures and Deterministic Signcryption | online |
2010 | pkc | Text Search Protocols with Simulation Based Security | online |
2010 | pkc | Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments | online |
2010 | pkc | Constant Size Ciphertexts in Threshold Attribute-Based Encryption | online |
2010 | pkc | Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes | online |
2010 | pkc | Faster Pairing Computations on Curves with High-Degree Twists | online |
2010 | pkc | Mathematics, Cryptography, Security | |
2010 | pkc | CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model | online |
2010 | pkc | Duality in Lattice Based Cryptography | |
2010 | pkc | Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting | online |
2010 | pkc | Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval | online |
2010 | pkc | Multi-query Computationally-Private Information Retrieval with Constant Communication Rate | online |
2010 | pkc | Security of Encryption Schemes in Weakened Random Oracle Models | online |
2010 | pkc | Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions | online |
2010 | pkc | Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More | 499-517 |
2010 | pkc | Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem | online |
2010 | pkc | Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model | online |
2010 | pkc | More Constructions of Lossy and Correlation-Secure Trapdoor Functions | online |
2010 | pkc | Efficient Set Operations in the Presence of Malicious Adversaries | online |
2010 | pkc | On the Feasibility of Consistent Computations | online |
2010 | pkc | Groth-Sahai Proofs Revisited | online |
2010 | pkc | Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation | online |
2010 | pkc | Efficient Arithmetic on Hessian Curves | online |
2010 | tcc | Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings | online |
2010 | tcc | Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model | online |
2010 | tcc | Almost Optimal Bounds for Direct Product Threshold Theorem | online |
2010 | tcc | Composition of Zero-Knowledge Proofs with Efficient Provers | online |
2010 | tcc | On Symmetric Encryption and Point Obfuscation | online |
2010 | tcc | Ideal Hierarchical Secret Sharing Schemes | online |
2010 | tcc | On Related-Secret Pseudorandomness | online |
2010 | tcc | Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs | online |
2010 | tcc | Bounds on the Sample Complexity for Private Learning and Private Data Release | online |
2010 | tcc | Secure Computation and Its Diverse Applications | online |
2010 | tcc | Private Coins versus Public Coins in Zero-Knowledge Proof Systems | online |
2010 | tcc | Efficient, Robust and Constant-Round Distributed RSA Key Generation | online |
2010 | tcc | An Efficient Parallel Repetition Theorem | online |
2010 | tcc | Public-Key Encryption Schemes with Auxiliary Inputs | online |
2010 | tcc | Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge | online |
2010 | tcc | On the Necessary and Sufficient Assumptions for UC Computation | online |
2010 | tcc | From Passive to Covert Security at Low Cost | online |
2010 | tcc | On Complete Primitives for Fairness | online |
2010 | tcc | Rationality in the Full-Information Model | online |
2010 | tcc | Parallel Repetition Theorems for Interactive Arguments | online |
2010 | tcc | Efficiency Limitations for Σ-Protocols for Group Homomorphisms | online |
2010 | tcc | A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch | online |
2010 | tcc | A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems | online |
2010 | tcc | Delayed-Key Message Authentication for Streams | online |
2010 | tcc | Founding Cryptography on Tamper-Proof Hardware Tokens | online |
2010 | tcc | Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens | online |
2010 | tcc | Privacy-Enhancing Cryptography: From Theory into Practice | online |
2010 | tcc | A Domain Extender for the Ideal Cipher | online |
2010 | tcc | Obfuscation of Hyperplane Membership | online |
2010 | tcc | Leakage-Resilient Signatures | online |
2010 | tcc | Efficient Rational Secret Sharing in Standard Communication Networks | online |
2010 | tcc | Robust Encryption | online |
2010 | tcc | Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems | online |
2010 | tcc | New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts | online |
2010 | tcc | Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs | online |
2010 | tcc | Public-Key Cryptographic Primitives Provably as Secure as Subset Sum | online |