year |
venue |
title |
pages |
2004 | asiacrypt | k-Times Anonymous Authentication (Extended Abstract) | online |
2004 | asiacrypt | Improved Setup Assumptions for 3-Round Resettable Zero Knowledge | online |
2004 | asiacrypt | Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings | online |
2004 | asiacrypt | The Davies-Murphy Power Attack | online |
2004 | asiacrypt | Higher Order Universal One-Way Hash Functions | online |
2004 | asiacrypt | On the Generalized Linear Equivalence of Functions Over Finite Fields | online |
2004 | asiacrypt | New Approaches to Password Authenticated Key Exchange Based on RSA | online |
2004 | asiacrypt | Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings | online |
2004 | asiacrypt | On Provably Secure Time-Stamping Schemes | online |
2004 | asiacrypt | Sieving Using Bucket Sort | online |
2004 | asiacrypt | On the Security of MOR Public Key Cryptosystem | online |
2004 | asiacrypt | Comparison Between XL and Gröbner Basis Algorithms | online |
2004 | asiacrypt | Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups | online |
2004 | asiacrypt | Secret Handshakes from CA-Oblivious Encryption | online |
2004 | asiacrypt | How Far Can We Go Beyond Linear Cryptanalysis? | online |
2004 | asiacrypt | Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes | online |
2004 | asiacrypt | Towards Plaintext-Aware Public-Key Encryption Without Random Oracles | online |
2004 | asiacrypt | A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates | online |
2004 | asiacrypt | Strong Conditional Oblivious Transfer and Computing on Intervals | online |
2004 | asiacrypt | OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding | online |
2004 | asiacrypt | Privacy in Non-private Environments | online |
2004 | asiacrypt | Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 | online |
2004 | asiacrypt | Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract) | online |
2004 | asiacrypt | Information Security in Korea IT839 Strategy | online |
2004 | asiacrypt | Time-Memory Trade-Off Attacks on Multiplications and T-Functions | online |
2004 | asiacrypt | Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC | online |
2004 | asiacrypt | The XL-Algorithm and a Conjecture from Commutative Algebra | online |
2004 | asiacrypt | Generic Homomorphic Undeniable Signatures | online |
2004 | asiacrypt | The MD2 Hash Function Is Not One-Way | online |
2004 | asiacrypt | Practical Two-Party Computation Based on the Conditional Gate | online |
2004 | asiacrypt | Masking Based Domain Extenders for UOWHFs: Bounds and Constructions | online |
2004 | asiacrypt | Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices | online |
2004 | asiacrypt | Stream Ciphers: Dead or Alive? | online |
2004 | asiacrypt | Eliminating Random Permutation Oracles in the Even-Mansour Cipher | online |
2004 | asiacrypt | On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds | online |
2004 | asiacrypt | Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice | online |
2004 | asiacrypt | Constant-Round Authenticated Group Key Exchange for Dynamic Groups | online |
2004 | asiacrypt | Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes | online |
2004 | ches | Improving the Security of Dual-Rail Circuits | online |
2004 | ches | Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? | online |
2004 | ches | Towards Efficient Second-Order Power Analysis | online |
2004 | ches | Simple Power Analysis of Unified Code for ECC Double and Add | online |
2004 | ches | TTS: High-Speed Signatures on a Low-Cost Smart Card | online |
2004 | ches | Physical Information Security | |
2004 | ches | Quantum Cryptography | |
2004 | ches | From Proof to Practice: Real - World Cryptography | |
2004 | ches | Efficient Countermeasures against RPA, DPA, and SPA | online |
2004 | ches | Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings | online |
2004 | ches | A Low-Cost ECC Coprocessor for Smartcards | online |
2004 | ches | Instruction Set Extensions for Fast Arithmetic in Finite Fields GF( p) and GF(2m) | online |
2004 | ches | Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations | online |
2004 | ches | Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs | online |
2004 | ches | Leak Resistant Arithmetic | online |
2004 | ches | An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications | online |
2004 | ches | Long Modular Multiplication for Cryptographic Applications | online |
2004 | ches | Correlation Power Analysis with a Leakage Model | online |
2004 | ches | A Differential Fault Attack Against Early Rounds of (Triple-)DES | online |
2004 | ches | Fault Analysis of Stream Ciphers | online |
2004 | ches | How to Disembed a Program? | online |
2004 | ches | Concurrent Error Detection Schemes for Involution Ciphers | online |
2004 | ches | Strong Authentication for RFID Systems Using the AES Algorithm | online |
2004 | ches | Defeating Countermeasures Based on Randomized BSD Representations | online |
2004 | ches | Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography | online |
2004 | ches | Public Key Authentication with One (Online) Single Addition | online |
2004 | ches | Attacking DSA Under a Repeated Bits Assumption | online |
2004 | ches | Enhancing Collision Attacks | online |
2004 | ches | DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction | online |
2004 | ches | Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems | online |
2004 | ches | Switching Blindings with a View Towards IDEA | online |
2004 | ches | Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve | online |
2004 | ches | Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic | online |
2004 | ches | XTR Implementation on Reconfigurable Hardware | online |
2004 | ches | A New Attack with Side Channel Leakage During Exponent Recoding Computations | online |
2004 | ches | A Collision-Attack on AES: Combining Side Channel- and Differential-Attack | online |
2004 | crypto | Near-Collisions of SHA-0 | online |
2004 | crypto | An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators | online |
2004 | crypto | Signature Schemes and Anonymous Credentials from Bilinear Maps | online |
2004 | crypto | Faster Correlation Attack on Bluetooth Keystream Generator E0 | online |
2004 | crypto | Non-interactive Timestamping in the Bounded Storage Model | online |
2004 | crypto | 14 Years of Chosen Ciphertext Security: A Survey of Public Key Encryption | |
2004 | crypto | Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness | online |
2004 | crypto | Secure Identity Based Encryption Without Random Oracles | online |
2004 | crypto | Short Group Signatures | online |
2004 | crypto | Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks | online |
2004 | crypto | How to Compress Rabin Ciphertexts and Signatures (and More) | online |
2004 | crypto | IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange | online |
2004 | crypto | Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring | online |
2004 | crypto | Efficient Tree-Based Revocation in Groups of Low-State Devices | online |
2004 | crypto | Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers | online |
2004 | crypto | On Multiple Linear Approximations | online |
2004 | crypto | Signed Binary Representations Revisited | online |
2004 | crypto | On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields | online |
2004 | crypto | Complete Classification of Bilinear Hard-Core Functions | online |
2004 | crypto | Security of Random Feistel Schemes with 5 or More Rounds | online |
2004 | crypto | Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? | online |
2004 | crypto | Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings | online |
2004 | crypto | Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography | online |
2004 | crypto | Feistel Schemes and Bi-linear Cryptanalysis | online |
2004 | crypto | Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model | online |
2004 | crypto | Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks | online |
2004 | crypto | Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions | online |
2004 | crypto | The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols | online |
2004 | crypto | Compressed Pairings | online |
2004 | crypto | Round-Optimal Secure Two-Party Computation | online |
2004 | crypto | A New Paradigm of Hybrid Encryption Scheme | online |
2004 | crypto | Asymptotically Optimal Communication for Torus-Based Cryptography | online |
2004 | crypto | Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes | online |
2004 | crypto | Optimal Perfectly Secure Message Transmission | online |
2004 | crypto | Privacy-Preserving Datamining on Vertically Partitioned Databases | online |
2004 | crypto | Security, Liberty, and Electronic Communications | online |
2004 | eprint | Generating more MNT elliptic curves | online |
2004 | eprint | A note on L\'opez-Dahab coordinates | online |
2004 | eprint | Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library | online |
2004 | eprint | On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions | online |
2004 | eprint | Positive Results and Techniques for Obfuscation | online |
2004 | eprint | Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules | online |
2004 | eprint | TTS: Rank Attacks in Tame-Like Multivariate PKCs | online |
2004 | eprint | Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme | online |
2004 | eprint | On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions | online |
2004 | eprint | Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model | online |
2004 | eprint | An Oblivious Transfer Protocol with Log-Squared Communication | online |
2004 | eprint | Hardness amplification of weakly verifiable puzzles | online |
2004 | eprint | Pairing-Based Cryptographic Protocols : A Survey | online |
2004 | eprint | Multicollision Attacks on Generalized Hash Functions | online |
2004 | eprint | Refinements of Miller's Algorithm for Computing Weil/Tate Pairing | online |
2004 | eprint | Code-Based Game-Playing Proofs and the Security of Triple Encryption | online |
2004 | eprint | A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC?s | online |
2004 | eprint | Sequences of games: a tool for taming complexity in security proofs | online |
2004 | eprint | Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC?s against Differential Power Analysis | online |
2004 | eprint | Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem | online |
2004 | eprint | Synthesis of Secure FPGA Implementations | online |
2004 | eprint | Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange) | online |
2004 | eprint | A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model | online |
2004 | eprint | Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions | online |
2004 | eprint | Easy decision-Diffie-Hellman groups | online |
2004 | eprint | Oblivious Transfer Is Symmetric | online |
2004 | eprint | An IBE Scheme to Exchange Authenticated Secret Keys | online |
2004 | eprint | Security on Generalized Feistel Scheme with SP Round Function | online |
2004 | eprint | Index calculus for abelian varieties and the elliptic curve discrete logarithm problem | online |
2004 | eprint | Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application | online |
2004 | eprint | Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael | online |
2004 | eprint | Divisors in Residue Classes, Constructively | online |
2004 | eprint | An Hybrid Mode of Operation | online |
2004 | eprint | Request for Review of Key Wrap Algorithms | online |
2004 | eprint | Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders | online |
2004 | eprint | Reducing Complexity Assumptions for Statistically-Hiding Commitment | online |
2004 | eprint | Foundations of Group Signatures: The Case of Dynamic Groups | online |
2004 | eprint | A comb method to render ECC resistant against Side Channel Attacks | online |
2004 | eprint | Analysis of the WinZip encryption method | online |
2004 | eprint | Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols | online |
2004 | eprint | Pairing-Based One-Round Tripartite Key Agreement Protocols | online |
2004 | eprint | Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures | online |
2004 | eprint | HENKOS Stream Cipher | online |
2004 | eprint | Random Switching Logic: A Countermeasure against DPA based on Transition Probability | online |
2004 | eprint | Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers | online |
2004 | eprint | Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields'' | online |
2004 | eprint | The Reactive Simulatability (RSIM) Framework for Asynchronous Systems | online |
2004 | eprint | A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords | online |
2004 | eprint | Scan Based Side Channel Attack on Data Encryption Standard | online |
2004 | eprint | A DPA Attack on the Improved Ha-Moon Algorithm | online |
2004 | eprint | Evaluating elliptic curve based KEMs in the light of pairings | online |
2004 | eprint | Multivariable public--key cryptosystems | online |
2004 | eprint | The CS2 Block Cipher | online |
2004 | eprint | Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security | online |
2004 | eprint | Fuzzy Identity Based Encryption | online |
2004 | eprint | Practical Cryptography in High Dimensional Tori | online |
2004 | eprint | Using primitive subgroups to do more with fewer bits | online |
2004 | eprint | Direct Division in Factor Rings | online |
2004 | eprint | Efficient Batch Verification of Signature Schemes based on Bilinear Maps | online |
2004 | eprint | Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra | online |
2004 | eprint | Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance | online |
2004 | eprint | A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates | online |
2004 | eprint | Provably Secure Authenticated Tree Based Group Key Agreement Protocol | online |
2004 | eprint | Practical Attacks on Digital Signatures Using MD5 Message Digest | online |
2004 | eprint | Signature Bouquets: Immutability for Aggregated/Condensed Signatures | online |
2004 | eprint | MD5 To Be Considered Harmful Someday | online |
2004 | eprint | A New Stream Cipher HC-256 | online |
2004 | eprint | Reusable Cryptographic Fuzzy Extractors | online |
2004 | eprint | A Provably Secure Nyberg-Rueppel Signature Variant with Applications | online |
2004 | eprint | Secure Computation of the Mean and Related Statistics | online |
2004 | eprint | Block Ciphers and Stream Ciphers: The State of the Art | online |
2004 | eprint | Equivalent Keys in HFE, C$^*$, and variations | online |
2004 | eprint | GNFS Factoring Statistics of RSA-100, 110, ..., 150 | online |
2004 | eprint | Superfluous Keys in Multivariate Quadratic Asymmetric Systems | online |
2004 | eprint | On the Ambiguity of Concurrent Signatures | online |
2004 | eprint | A new security proof for Damg?rd's ElGamal | online |
2004 | eprint | How To Re-initialize a Hash Chain | online |
2004 | eprint | Rethinking the security of some authenticated group key agreement schemes | online |
2004 | eprint | Attacking a Public Key Cryptosystem Based on Tree Replacement | online |
2004 | eprint | Finding good differential patterns for attacks on SHA-1 | online |
2004 | eprint | Secure Hashed Diffie-Hellman over Non-DDH Groups | online |
2004 | eprint | Ordinary abelian varieties having small embedding degree | online |
2004 | eprint | The Sorcerer?s Apprentice Guide to Fault Attacks | online |
2004 | eprint | Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key | online |
2004 | eprint | Provably Secure Masking of AES | online |
2004 | eprint | On the Affine Transformations of HFE-Cryptosystems and Systems with Branches | online |
2004 | eprint | The Exact Security of an Identity Based Signature and its Applications | online |
2004 | eprint | Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience | online |
2004 | eprint | Cryptanalysis of SFlash v3 | online |
2004 | eprint | Tracing-by-Linking Group Signautres | online |
2004 | eprint | Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings | online |
2004 | eprint | Construction and Traversal of Hash Chain with Public Links | online |
2004 | eprint | Receipt-Free Homomorphic Elections and Write-in Ballots | online |
2004 | eprint | On The Security of Two Key-Updating Signature Schemes | online |
2004 | eprint | Capacity and Examples of Template Protecting Biometric Authentication Systems | online |
2004 | eprint | Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs | online |
2004 | eprint | Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic | online |
2004 | eprint | A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms | online |
2004 | eprint | Concealing Complex Policies with Hidden Credentials | online |
2004 | eprint | Efficient Pairing Computation on Supersingular Abelian Varieties | online |
2004 | eprint | Designing Against the `Overdefined System of Equations' Attack | online |
2004 | eprint | Cryptanalysis of RCES/RSES Image Encryption Scheme | online |
2004 | eprint | The Vulnerability of SSL to Chosen Plaintext Attack | online |
2004 | eprint | New Distributed Ring Signatures for General Families of Signing Subsets | online |
2004 | eprint | Relation between XL algorithm and Groebner Bases Algorithms | online |
2004 | eprint | On the Security and Composability of the One Time Pad | online |
2004 | eprint | Improved Identity-Based Signcryption | online |
2004 | eprint | Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange | online |
2004 | eprint | On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions | online |
2004 | eprint | Efficient and Forward-Secure Identity-Based Signcryption | online |
2004 | eprint | Fast addition on non-hyperelliptic genus $3$ curves | online |
2004 | eprint | Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography | online |
2004 | eprint | Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup | online |
2004 | eprint | Fast and Proven Secure Blind Identity-Based Signcryption from Pairings | online |
2004 | eprint | A New Two-Party Identity-Based Authenticated Key Agreement | online |
2004 | eprint | On security of XTR public key cryptosystems against Side Channel Attacks | online |
2004 | eprint | Universally Composable DKG with Linear Number of Exponentiations | online |
2004 | eprint | EME*: extending EME to handle arbitrary-length messages with associated data | online |
2004 | eprint | Two Software Normal Basis Multiplication Algorithms for GF(2n) | online |
2004 | eprint | DDH-based Group Key Agreement in a Mobile Environment | online |
2004 | eprint | Elastic Block Ciphers | online |
2004 | eprint | Generalizing Kedlaya's order counting based on Miura Theory | online |
2004 | eprint | Private Inference Control | online |
2004 | eprint | A New ID-based Signature with Batch Verification | online |
2004 | eprint | On Small Characteristic Algebraic Tori in Pairing-Based Cryptography | online |
2004 | eprint | Secret Handshakes from CA-Oblivious Encryption | online |
2004 | eprint | Secure and Efficient Masking of AES - A Mission Impossible? | online |
2004 | eprint | More Efficient Server Assisted One Time Signatures | online |
2004 | eprint | CompChall: Addressing Password Guessing Attacks | online |
2004 | eprint | New GF(2n) Parallel Multiplier Using Redundant Representation | online |
2004 | eprint | How to Disembed a Program? | online |
2004 | eprint | New Notions of Security: Achieving Universal Composability without Trusted Setup | online |
2004 | eprint | Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher | online |
2004 | eprint | Elastic AES | online |
2004 | eprint | Elliptic Curve based Signcryption and its Multi-party Schemes | online |
2004 | eprint | Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash | online |
2004 | eprint | Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables | online |
2004 | eprint | Electromagnetic Side Channels of an FPGA Implementation of AES | online |
2004 | eprint | Near-Collisions of SHA-0 | online |
2004 | eprint | Key Recovery Method for CRT Implementation of RSA | online |
2004 | eprint | Provably Secure Delegation-by-Certification Proxy Signature Schemes | online |
2004 | eprint | Secure and Efficient AES Software Implementation for Smart Caards | online |
2004 | eprint | An Authenticated Certificateless Public Key Encryption Scheme | online |
2004 | eprint | Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$ | online |
2004 | eprint | Another Look at ``Provable Security'' | online |
2004 | eprint | A double large prime variation for small genus hyperelliptic index calculus | online |
2004 | eprint | Controlling Spam by Secure Internet Content Selection | online |
2004 | eprint | Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks | online |
2004 | eprint | Why Quantum Cryptography? | online |
2004 | eprint | Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three | online |
2004 | eprint | Mobile Terminal Security | online |
2004 | eprint | Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks | online |
2004 | eprint | Scalable Public-Key Tracing and Revoking | online |
2004 | eprint | Improvement of Th?Leriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus | online |
2004 | eprint | On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission | online |
2004 | eprint | On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards | online |
2004 | eprint | ID-based Cryptography from Composite Degree Residuosity | online |
2004 | eprint | A comparison of MNT curves and supersingular curves | online |
2004 | eprint | FRMAC, a Fast Randomized Message Authentication Code | online |
2004 | eprint | A Secure and Efficient Key Exchange Protocol for Mobile Communications | online |
2004 | eprint | Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack | online |
2004 | eprint | Regional Blackouts: Protection of Broadcast Content on 3G Networks | online |
2004 | eprint | Efficient Consistency Proofs for Generalized Queries on a Committed Database | online |
2004 | eprint | Short Signatures Without Random Oracles | online |
2004 | eprint | Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles | online |
2004 | eprint | Secure Identity Based Encryption Without Random Oracles | online |
2004 | eprint | Short Group Signatures | online |
2004 | eprint | A Proof of Yao's Protocol for Secure Two-Party Computation | online |
2004 | eprint | A Biometric Identity Based Signature Scheme | online |
2004 | eprint | Updating the Parameters of a Threshold Scheme by Minimal Broadcast | online |
2004 | eprint | Optimal Updating of Ideal Threshold Schemes | online |
2004 | eprint | Identity Based Threshold Ring Signature | online |
2004 | eprint | Efficient Identity-Based Encryption Without Random Oracles | online |
2004 | eprint | On the Composition of Authenticated Byzantine Agreement | online |
2004 | eprint | Simpler Session-Key Generation from Short Random Passwords | online |
2004 | eprint | A New Forward Secure Signature Scheme | online |
2004 | eprint | ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings | online |
2004 | eprint | On the Existence of low-degree Equations for Algebraic Attacks | online |
2004 | eprint | A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy | online |
2004 | eprint | Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version | online |
2004 | eprint | Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design | online |
2004 | eprint | Computing Modular Polynomials | online |
2004 | eprint | Distributed Ring Signatures for Identity-Based Scenarios | online |
2004 | eprint | Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations | online |
2004 | eprint | Security Pitfalls of an efficient remote user authentication scheme using smart cards | online |
2004 | eprint | The Security and Performance of the Galois/Counter Mode of Operation (Full Version) | online |
2004 | eprint | A Note on An Encryption Scheme of Kurosawa and Desmedt | online |
2004 | eprint | Signed Binary Representations Revisited | online |
2004 | eprint | Password Based Key Exchange with Mutual Authentication | online |
2004 | eprint | SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation | online |
2004 | eprint | Long Modular Multiplication for Cryptographic Applications | online |
2004 | eprint | Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD | online |
2004 | eprint | On Cheating Immune Secret Sharing | online |
2004 | eprint | Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing | online |
2004 | eprint | Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions | online |
2004 | eprint | How to Cheat at Chess: A Security Analysis of the Internet Chess Club | online |
2004 | eprint | Authenticated tree parity machine key exchange | online |
2004 | eprint | Direct Anonymous Attestation | online |
2004 | eprint | ID-Based Proxy Signature Using Bilinear Pairings | online |
2004 | eprint | On Corrective Patterns for the SHA-2 Family | online |
2004 | eprint | Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring | online |
2004 | eprint | The Security and Efficiency of Micciancio's Cryptosystem | online |
2004 | eprint | Hybrid Cryptography | online |
2004 | eprint | Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing | online |
2004 | eprint | ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption | online |
2004 | eprint | Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery | online |
2004 | eprint | Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality | online |
2004 | eprint | Tree Parity Machine Rekeying Architectures | online |
2004 | eprint | Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice | online |
2004 | eprint | Plaintext-Simulatability | online |
2004 | eprint | Entropic Security and the Encryption of High Entropy Messages | online |
2004 | eprint | On Oleshchuk's Public Key Cryptosystem | online |
2004 | eprint | Towards Plaintext-Aware Public-Key Encryption without Random Oracles | online |
2004 | eprint | Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves | online |
2004 | eprint | The Polynomial Composition Problem in $(\mathbb{Z}/n\mathbb{Z})[X]$ | online |
2004 | eprint | Vectorial Boolean functions and induced algebraic equations | online |
2004 | eprint | Lower Bounds for Non-Black-Box Zero Knowledge | online |
2004 | eprint | Sign Change Fault Attacks On Elliptic Curve Cryptosystems | online |
2004 | eprint | DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$ | online |
2004 | eprint | Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes | online |
2004 | eprint | A Provable Secure Scheme for Partially Blind Signatures | online |
2004 | eprint | Timed-Release and Key-Insulated Public Key Encryption | online |
2004 | eprint | Extending the Resynchronization Attack | online |
2004 | eprint | Password-Based Authenticated Key Exchange in the Three-Party Setting | online |
2004 | eprint | On the security of some nonrepudiable threshold proxy signature schemes with known signers | online |
2004 | eprint | Cryptographic Implications of Hess' Generalized GHS Attack | online |
2004 | eprint | Forgery Attacks on Chang et al.'s signature scheme with message recovery | online |
2004 | eprint | Security Analysis of A Dynamic ID-based Remote User Authentication Scheme | online |
2004 | eprint | Geometric Key Establishment | online |
2004 | eprint | A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields | online |
2004 | eprint | A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2 | online |
2004 | eprint | Combinatorial group theory and public key cryptography | online |
2004 | eprint | On the Key Exposure Problem in Chameleon Hashes | online |
2004 | eprint | Signcryption in Hierarchical Identity Based Cryptosystem | online |
2004 | eprint | On codes, matroids and secure multi-party computation from linear secret sharing schemes | online |
2004 | eprint | Upper and Lower Bounds on Black-Box Steganography | online |
2004 | eprint | Vectorial fast correlation attacks | online |
2004 | eprint | Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties | online |
2004 | eprint | Attacks On An ISO/IEC 11770-2 Key Establishment Protocol | online |
2004 | eprint | Identity Based Threshold Proxy Signature | online |
2004 | eprint | Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices | online |
2004 | eprint | Design Principles for Iterated Hash Functions | online |
2004 | eprint | New paradigms for digital generation and post-processing of random data | online |
2004 | eprint | A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two | online |
2004 | eprint | On the supports of the Walsh transforms of Boolean functions | online |
2004 | eprint | A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme | online |
2004 | eprint | Escrow-Free Encryption Supporting Cryptographic Workflow | online |
2004 | eprint | On Boolean Functions with Generalized Cryptographic Properties | online |
2004 | eprint | Secure Group Communications over Combined Wired/Wireless Networks | online |
2004 | eprint | Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption | online |
2004 | eprint | Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al | online |
2004 | eprint | Musings on the Wang et al. MD5 Collision | online |
2004 | eprint | sSCADA: Securing SCADA Infrastructure Communications | online |
2004 | eprint | A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods | online |
2004 | eprint | Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation | online |
2004 | eprint | Separable Linkable Threshold Ring Signatures | online |
2004 | eprint | On the Role of the Inner State Size in Stream Ciphers | online |
2004 | eprint | Untraceability of Wang-Fu Group Signature Scheme | online |
2004 | eprint | Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings | online |
2004 | eprint | Cryptanalysis of Threshold-Multisignature Schemes | online |
2004 | eprint | Universal Undeniable Signatures | online |
2004 | eprint | An Enhanced and Secure Protocol for Authenticated Key Exchange | online |
2004 | eprint | Protocol Initialization for the Framework of Universal Composability | online |
2004 | eprint | The Mundja Streaming MAC | online |
2004 | eprint | Traceable Signatures | online |
2004 | eprint | A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security | online |
2004 | eprint | The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols | online |
2004 | eprint | A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS | online |
2004 | eprint | Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness | online |
2004 | eprint | An e-Voting Scheme with Improved Resistance to Bribe and Coercion | online |
2004 | eprint | Fast Pseudo-Hadamard Transforms | online |
2004 | eprint | Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions | online |
2004 | eprint | Known-Plaintext Attack Against a Permutation Based Video | online |
2004 | eprint | Experimenting with Faults, Lattices and the DSA | online |
2004 | eprint | Pitfalls in public key cryptosystems based on free partially commutative monoids and groups | online |
2004 | eprint | The Extended Codebook (XCB) Mode of Operation | online |
2004 | eprint | Cryptanalysis of a Provably Secure Cryptographic Hash Function | online |
2004 | eprint | Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic | online |
2004 | eprint | Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions | online |
2004 | eprint | Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme | online |
2004 | eprint | An AGM-type elliptic curve point counting algorithm in characteristic three | online |
2004 | eprint | Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation | online |
2004 | eprint | A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer | online |
2004 | eprint | New Monotone Span Programs from Old | online |
2004 | eprint | Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints | online |
2004 | eprint | Fault and Side-Channel Attacks on Pairing Based Cryptography | online |
2004 | eprint | Corrections of the NIST Statistical Test Suite for Randomness | online |
2004 | eprint | ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS | online |
2004 | eprint | New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms | online |
2004 | eprint | Generation of random Picard curves for cryptography | online |
2004 | eprint | Optimal Signcryption from Any Trapdoor Permutation | online |
2004 | eprint | Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions | online |
2004 | eprint | Externalized Fingerprint Matching | online |
2004 | eprint | Almost Ideal Contrast Visual Cryptography with Reversing | online |
2004 | eprint | Privacy-Enhanced Searches Using Encrypted Bloom Filters | online |
2004 | eprint | A New Designated Confirmer Signature Variant with Intended Recipient | online |
2004 | eprint | RDS: Remote Distributed Scheme for Protecting Mobile Agents | online |
2004 | eprint | Fault attack on the DVB Common Scrambling Algorithm | online |
2004 | eprint | Exponential S-boxes | online |
2004 | eprint | The Security of the FDH Variant of Chaum's Undeniable Signature Scheme | online |
2004 | eprint | Clarifying Obfuscation: Improving the Security of White-Box Encoding | online |
2004 | eprint | The Rabbit Stream Cipher - Design and Security Analysis | online |
2004 | eprint | The CSQUARE Transform | online |
2004 | eprint | Asynchronous Proactive RSA | online |
2004 | eprint | Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups | online |
2004 | eprint | Provably Secure Authentication of Digital Media Through Invertible Watermarks | online |
2004 | eprint | Custodian-Hiding Verifiable Encryption | online |
2004 | eprint | Solving Systems of Differential Equations of Addition | online |
2004 | eprint | Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems | online |
2004 | eprint | An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security | online |
2004 | eprint | Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$ | online |
2004 | eprint | Designs of Efficient Secure Large Hash Values | online |
2004 | eprint | Summation polynomials and the discrete logarithm problem on elliptic curves | online |
2004 | eprint | Post-Quantum Signatures | online |
2004 | eprint | Compressed Pairings | online |
2004 | eprint | Nominative Proxy Signature Schemes | online |
2004 | eprint | New Approaches to Password Authenticated Key Exchange based on RSA | online |
2004 | eprint | Security Flaws in a Pairing-based Group Signature Scheme | online |
2004 | eprint | s(n) An Arithmetic Function of Some Interest, and Related Arithmetic | online |
2004 | eprint | Relating Symbolic and Cryptographic Secrecy | online |
2004 | eprint | Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance | online |
2004 | eprint | VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme | online |
2004 | eprint | Single Database Private Information Retrieval with Logarithmic Communication | online |
2004 | eprint | Security of Wang-Li Threshold Signature Scheme | online |
2004 | eprint | A Provably Secure Scheme for Restrictive Partially Blind Signatures | online |
2004 | eprint | Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields | online |
2004 | eprint | Chameleon Hashing without Key Exposure | online |
2004 | eprint | Second Preimages on n-bit Hash Functions for Much Less than 2^n Work | online |
2004 | eprint | A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups | online |
2004 | eprint | A note on efficient computation of cube roots in characteristic 3 | online |
2004 | eprint | Cryptanalysis of a timestamp-based password authentication scheme | online |
2004 | eprint | The Static Diffie-Hellman Problem | online |
2004 | eprint | Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries | online |
2004 | eprint | Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme | online |
2004 | eprint | Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge | online |
2004 | eprint | Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto??s two-party identity-based key agreement | online |
2004 | eprint | Multi-sequences with d-perfect property | online |
2004 | eprint | The Power of Verification Queries in Message Authentication and Authenticated Encryption | online |
2004 | eprint | Transitive Signatures Based on Non-adaptive Standard Signatures | online |
2004 | eprint | A Verifiable Random Function With Short Proofs and Keys | online |
2004 | eprint | Lower Bounds and Impossibility Results for Concurrent Self Composition | online |
2004 | eprint | Hierarchical Group Signatures | online |
2004 | eprint | Revision of Tractable Rational Map Cryptosystem | online |
2004 | eprint | Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves | online |
2004 | eprint | On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes | online |
2004 | eprint | Cryptanalysis of a threshold proxy signature with known signers | online |
2004 | eprint | Tail-MAC: A Message Authentication Scheme for Stream Ciphers | online |
2004 | eprint | A Technical Comparison of IPSec and SSL | online |
2004 | eprint | Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm | online |
2004 | eprint | Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes | online |
2004 | eprint | Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1 | online |
2004 | eprint | On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme | online |
2004 | eprint | Privacy Preserving Keyword Searches on Remote Encrypted Data | online |
2004 | eprint | Adaptively-Secure, Non-Interactive Public-Key Encryption | online |
2004 | eprint | The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures | online |
2004 | eprint | Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation | online |
2004 | eprint | Efficient and Universally Composable Committed Oblivious Transfer and Applications | online |
2004 | eprint | Badger - A Fast and Provably Secure MAC | online |
2004 | eprint | Redundant Trinomials for Finite Fields of Characteristic $2$ | online |
2004 | eprint | Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults | online |
2004 | eprint | On Multiple Linear Approximations | online |
2004 | eprint | The conjugacy search problem in public key cryptography: unnecessary and insufficient | online |
2004 | eurocrypt | Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data | online |
2004 | eurocrypt | Secure Hashed Diffie-Hellman over Non-DDH Groups | online |
2004 | eurocrypt | Black-Box Composition Does Not Imply Adaptive Security | online |
2004 | eurocrypt | Immunizing Encryption Schemes from Decryption Errors | online |
2004 | eurocrypt | On Generating the Initial Key in the Bounded-Storage Model | online |
2004 | eurocrypt | Merkle Tree Traversal in Log Space and Time | online |
2004 | eurocrypt | Projective Coordinates Leak | online |
2004 | eurocrypt | Hash Function Balance and Its Impact on Birthday Attacks | online |
2004 | eurocrypt | Positive Results and Techniques for Obfuscation | online |
2004 | eurocrypt | Sequential Aggregate Signatures from Trapdoor Permutations | online |
2004 | eurocrypt | The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures | online |
2004 | eurocrypt | Security Proofs for Identity-Based Identification and Signature Schemes | online |
2004 | eurocrypt | Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 | online |
2004 | eurocrypt | Paradigms for Multiparty Computation | |
2004 | eurocrypt | Multi-party Computation with Hybrid Security | online |
2004 | eurocrypt | On Simulation-Sound Trapdoor Commitments | online |
2004 | eurocrypt | Dining Cryptographers Revisited | online |
2004 | eurocrypt | Algebraic Attacks and Decomposition of Boolean Functions | online |
2004 | eurocrypt | Concurrent Signatures | online |
2004 | eurocrypt | Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme | online |
2004 | eurocrypt | Optimal Communication Complexity of Generic Multicast Key Distribution | online |
2004 | eurocrypt | Finding Small Roots of Bivariate Integer Polynomial Equations Revisited | online |
2004 | eurocrypt | Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings | online |
2004 | eurocrypt | Chosen-Ciphertext Security from Identity-Based Encryption | online |
2004 | eurocrypt | Short Signatures Without Random Oracles | online |
2004 | eurocrypt | Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles | online |
2004 | eurocrypt | Public Key Encryption with Keyword Search | online |
2004 | eurocrypt | Practical Large-Scale Distributed Key Generation | online |
2004 | eurocrypt | Traceable Signatures | online |
2004 | eurocrypt | The Exact Price for Unconditionally Secure Asymmetric Cryptography | online |
2004 | eurocrypt | An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem | online |
2004 | eurocrypt | Secure Computation of the k th-Ranked Element | online |
2004 | eurocrypt | On the Hardness of Information-Theoretic Multiparty Computation | online |
2004 | eurocrypt | On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission | online |
2004 | eurocrypt | Public-Key Steganography | online |
2004 | eurocrypt | Efficient Private Matching and Set Intersection | online |
2004 | eurocrypt | Anonymous Identification in Ad Hoc Groups | online |
2004 | eurocrypt | Construction of Secure Random Curves of Genus 2 over Prime Fields | online |
2004 | fse | New Cryptographic Primitives Based on Multiword T-Functions | online |
2004 | fse | Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST | online |
2004 | fse | CWC: A High-Performance Conventional Authenticated Encryption Mode | online |
2004 | fse | Algebraic Attacks on Summation Generators | online |
2004 | fse | On the Additive Differential Probability of Exclusive-Or | online |
2004 | fse | Ciphers Secure against Related-Key Attacks | online |
2004 | fse | Minimum Distance between Bent and 1-Resilient Boolean Functions | online |
2004 | fse | On Linear Approximation of Modulo Sum | online |
2004 | fse | Improved Linear Consistency Attack on Irregular Clocked Keystream Generators | online |
2004 | fse | Differential Attacks against the Helix Stream Cipher | online |
2004 | fse | A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher | online |
2004 | fse | Towards a Unifying View of Block Cipher Cryptanalysis | online |
2004 | fse | Nonce-Based Symmetric Encryption | online |
2004 | fse | Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines | online |
2004 | fse | Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance | online |
2004 | fse | A MAC Forgery Attack on SOBER-128 | online |
2004 | fse | Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers | online |
2004 | fse | New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms | online |
2004 | fse | Two Power Analysis Attacks against One-Mask Methods | online |
2004 | fse | Fast Software-Based Attacks on SecurID | online |
2004 | fse | Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices | online |
2004 | fse | ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware | online |
2004 | fse | VMPC One-Way Function and Stream Cipher | online |
2004 | fse | Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions | online |
2004 | fse | Improving Fast Algebraic Attacks | online |
2004 | fse | The EAX Mode of Operation | online |
2004 | fse | Correlation Attacks Using a New Class of Weak Feedback Polynomials | online |
2004 | fse | Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan | online |
2004 | fse | Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering | online |
2004 | fse | A Weakness of the Linear Part of Stream Cipher MUGI | online |
2004 | fse | A New Stream Cipher HC-256 | online |
2004 | fse | Resistance of S-Boxes against Algebraic Attacks | online |
2004 | jofc | Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing | 125-151 |
2004 | jofc | Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model | 43-77 |
2004 | jofc | RSA-OAEP Is Secure under the RSA Assumption | 81-104 |
2004 | jofc | Short Signatures from the Weil Pairing | 297-319 |
2004 | jofc | Preface | 1-3 |
2004 | jofc | Adaptive versus Non-Adaptive Security of Multi-Party Protocols | 153-207 |
2004 | jofc | Nearly One-Sided Tests and the Goldreich?Levin Predicate | 209-229 |
2004 | jofc | A One Round Protocol for Tripartite Diffie-Hellman | 263-276 |
2004 | jofc | Preface | 233 |
2004 | jofc | The Weil Pairing, and Its Efficient Calculation | 235-261 |
2004 | jofc | Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems | 277-296 |
2004 | jofc | The Full Cost of Cryptanalytic Attacks | 105-124 |
2004 | jofc | Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors | 27-42 |
2004 | jofc | Efficient Implementation of Pairing-Based Cryptosystems | 321-334 |
2004 | jofc | Optimal Randomizer Efficiency in the Bounded-Storage Model | 5-26 |
2004 | pkc | Fast Arithmetic on Jacobians of Picard Curves | online |
2004 | pkc | Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism | online |
2004 | pkc | Identity-Based Threshold Decryption | online |
2004 | pkc | Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability | online |
2004 | pkc | A First Approach to Provide Anonymity in Attribute Certificates | online |
2004 | pkc | Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem | online |
2004 | pkc | Secret Exponent Attacks on RSA-type Schemes with Moduli N= prq | online |
2004 | pkc | A Generalized Wiener Attack on RSA | online |
2004 | pkc | Constant Round Authenticated Group Key Agreement via Distributed Computation | online |
2004 | pkc | New Security Results on Encrypted Key Exchange | online |
2004 | pkc | An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications | online |
2004 | pkc | Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model | online |
2004 | pkc | Efficient ID-based Group Key Agreement with Bilinear Maps | online |
2004 | pkc | Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 | online |
2004 | pkc | Short Exponent Diffie-Hellman Problems | online |
2004 | pkc | Personal Privacy in the Public Key Setting: The Next Frontier | |
2004 | pkc | From Digital Signature to ID-based Identification/Signature | online |
2004 | pkc | Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups | online |
2004 | pkc | Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point | online |
2004 | pkc | Undeniable Signatures Based on Characters: How to Sign with One Bit | online |
2004 | pkc | A Correct, Private, and Efficient Mix Network | online |
2004 | pkc | General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" | online |
2004 | pkc | A Nonuniform Algorithm for the Hidden Number Problem in Subgroups | online |
2004 | pkc | Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures | online |
2004 | pkc | New Results on the Hardness of Diffie-Hellman Bits | online |
2004 | pkc | On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? | online |
2004 | pkc | A Point Compression Method for Elliptic Curves Defined over GF(2 n) | online |
2004 | pkc | An Efficient Signature Scheme from Bilinear Pairings and Its Applications | online |
2004 | pkc | A Distributed Online Certificate Status Protocol with a Single Public Key | online |
2004 | pkc | Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 | online |
2004 | pkc | A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation | online |
2004 | pkc | On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny | online |
2004 | pkc | Cryptographic Randomized Response Techniques | online |
2004 | pkc | QuasiModo: Efficient Certificate Validation and Revocation | online |
2004 | tcc | Lower Bounds for Concurrent Self Composition | 203-222 |
2004 | tcc | A General Composition Theorem for Secure Reactive Systems | 336-354 |
2004 | tcc | On the Possibility of One-Message Weak Zero-Knowledge | 121-132 |
2004 | tcc | Soundness of Formal Encryption in the Presence of Active Adversaries | 133-151 |
2004 | tcc | Simpler Session-Key Generation from Short Random Passwords | 428-445 |
2004 | tcc | A Quantitative Approach to Reductions in Secure Computation | 238-257 |
2004 | tcc | On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes | 40-57 |
2004 | tcc | Notions of Reducibility between Cryptographic Primitives | 1-20 |
2004 | tcc | On the Notion of Pseudo-Free Groups | 505-521 |
2004 | tcc | A Note on Constant-Round Zero-Knowledge Proofs for NP | 191-202 |
2004 | tcc | Hierarchical Threshold Secret Sharing | 473-490 |
2004 | tcc | Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation | 223-237 |
2004 | tcc | A Universally Composable Mix-Net | 317-335 |
2004 | tcc | Computational Collapse of Quantum State with Application to Oblivious Transfer | 374-393 |
2004 | tcc | Unfair Noisy Channels and Oblivious Transfer | 355-373 |
2004 | tcc | Constant-Round Oblivious Transfer in the Bounded Storage Model | 446-472 |
2004 | tcc | List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument | 101-120 |
2004 | tcc | Efficient and Universally Composable Committed Oblivious Transfer and Applications | 297-316 |
2004 | tcc | Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering | 258-277 |
2004 | tcc | Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes | 77-100 |
2004 | tcc | Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems | 152-170 |
2004 | tcc | Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations | 394-409 |
2004 | tcc | Universally Composable Commitments Using Random Oracles | 58-76 |
2004 | tcc | On Compressing Encrypted Data without the Encryption Key | 491-504 |
2004 | tcc | Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract) | 171-190 |
2004 | tcc | Composition of Random Systems: When Two Weak Make One Strong | 410-427 |
2004 | tcc | Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology | 21-39 |
2004 | tcc | Physically Observable Cryptography (Extended Abstract) | 278-296 |
2004 | tcc | Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings | online |