Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Publications of EPRINT 2007
Page
Title
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Secure Hybrid Encryption from Weakened Key Encapsulation
Improved Security Analysis of PMAC
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
An improved collision probability for CBC-MAC and PMAC
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme
Relations Among Notions of Plaintext Awareness
A New Type of Cipher: DICING_CSB
Improved security analysis of OMAC
Cryptanalysis of white box DES implementations
Fully Resilient Traitor Tracing Scheme using Key Update
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
Strengthening the Tree-Based Hash Protocols against Compromise of some Tags
Best Quadratic Approximations of Cubic Boolean Functions
Linearization Attacks Against Syndrome Based Hashes
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Construction of efficient and secure Pairing Algorithm and its Application
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Secret sharing on infinite graphs
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation
The Security of the Extended Codebook (XCB) Mode of Operation
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Optimizing Multiprecision Multiplication for Public Key Cryptography
Authorship Proof for Textual Document
A Note on Automata-based Dynamic Convolutional Cryptosystems
Reflection Attacks on Product Ciphers
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials
Design and Primitive Specification for Shannon
Compression Functions Suitable for the Multi-Property-Preserving Transform
A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three
A Forward Secure Remote User Authentication Scheme
Direct Reduction of String (1,2)-OT to Rabin's OT
A Bound on the Size of Separating Hash Families
New Constructions of Fuzzy Identity-Based Encryption
On Non-Randomness of the Permutation after RC4 Key Scheduling
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Novel Approaches for Improving the Power Consumption Models in Correlation Analysis
Security Arguments for a Class of ID-based Signatures
Locally Invertible Boolean Mappings
Special block cipher family DN and new generation SNMAC-type hash function family HDN
Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242
Forward-secure RFID Authentication and Key Exchange
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Forward-Secure Sequential Aggregate Authentication
A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields
Compiler Assisted Elliptic Curve Cryptography
A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
Secure Similarity Search
Cryptanalysis of the KeeLoq block cipher
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
Formal Certification of Code-Based Cryptographic Proofs
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians
Security under Key-Dependent Inputs
The simplest method for constructing APN polynomials EA-inequivalent to power functions
SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME
A Survey of Single Database PIR: Techniques and Applications
Improving Upon the TET Mode of Operation
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3
A New Security Definition for Public Key Encryption Schemes and Its Applications
Algebraic and Slide Attacks on KeeLoq
On the Big Gap Between $|p|$ and $|q|$ in DSA
Constructing new APN functions from known ones
Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}
Algebraic Lower Bounds for Computing on Encrypted Data
Identifying Ideal Lattices
How to Derive Lower Bound on Oblivious Transfer Reduction
Attribute-Based Encryption with Non-Monotonic Access Structures
Low-Density Attack Revisited
Towards Provable Security for Routing Protocols in Mobile ad Hoc Networks
Faster and Shorter Password-Authenticated Key Exchange
Efficient Hierarchical Identity Based Signature in the Standard Model
Efficient Password-based Authenticated Key Exchange without Public Information
Nominative Signature: Application, Security Model and Construction
Secure Identification and QKD in the Bounded-Quantum-Storage Model
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)
A Tunable Broadcast Encryption Scheme
A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard
Remote Power Analysis of {RFID} Tags
Public Key Encryption that Allows PIR Queries
Isolated Proofs of Knowledge and Isolated Zero Knowledge
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
Universally Composable Multiparty Computation with Partially Isolated Parties
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
Towards Key-Dependent Message Security in the Standard Model
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
New Constructions for UC Secure Computation using Tamper-proof Hardware
On bent functions with zero second derivatives
Encryption Techniques for Secure Database Outsourcing
MPC vs. SFE: Perfect Security in a Unified Corruption Model
A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat
How To Find Many Collisions of 3-Pass HAVAL
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
Weakly only Unforgeable Signature and Its Application in Group Signature
VHASH Security
Revisiting an Efficient Elliptic Curve Key Agreement Protocol
On the Security of a Class of Image Encryption Scheme
Deniable Authentication on the Internet
Efficient Implementation of the Pairing on Mobilephones using BREW
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
Multi-Party Indirect Indexing and Applications
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
A New Security Model for Cross-Realm C2C-PAKE Protocol
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Updated standards for validating elliptic curves
Non-Interactive Proofs for Integer Multiplication
Security Analysis of WAPI Authentication and Key Exchange Protocol
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
Analysis of Underlying Assumptions in NIST DRBGs
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers
Secure computation on incomplete networks
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Lai-Massey Scheme and Quasi-Feistel Networks
On the security of an image encryption scheme
A Framework for Efficient and Composable Oblivious Transfer
Arithmetic Operators for Pairing-Based Cryptography
Statistically Hiding Sets
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
On Tweaking Luby-Rackoff Blockciphers
HAPADEP: Human Asisted Pure Audio Device Pairing
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants
New Local Collisions for the SHA-2 Hash Family
Generic Certificateless Encryption in the Standard Model
Multiparty Computation to Generate Secret Permutations
Somos Sequence Near-Addition Formulas and Modular Theta Functions
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves
Secret sharing on the infinite ladder
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits
A Note on Signature Standards
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Improving the Round Complexity of 'Round-Optimal' VSS
Practical Password Recovery on an MD5 Challenge and Response
Intrusion-Resilient Secret Sharing
On the Role of Scheduling in Simulation-Based Security
Sufficient Conditions for Computational Intractability Regarding Generic Algorithms
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic
Proxy Re-encryption Systems for Identity-based Encryption
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Statistical Testing for Disk Encryption Modes of Operations
Isodual Reduction of Lattices
Fuzzy Private Matching (Extended Abstract)
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA
A Proof of Security of a Mesh Security Architecture
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem
Pairings on Jacobians of Hyperelliptic Curves
An Improved Distinguisher for Dragon
Breaking the Symmetry: a Way to Resist the New Differential Attack
How to Enrich the Message Space of a Cipher
Cryptanalysis of Rational Multivariate Public Key Cryptosystems
Construction of Pairing-Friendly Elliptic Curves
Reducing Trust in the PKG in Identity Based Cryptosystems
Privacy-Preserving Distributed Set Intersection
Universally Composable Multi-Party Computation with an Unreliable Common Reference String
On the Decomposition of an Element of Jacobian of a Hyperelliptic Curve
FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY
An Enhanced ID-based Deniable Authentication Protocol on Pairings
Group-oriented encryption secure against collude attack
High Efficiency Feedback Shift Register: $\sigma-$LFSR
On the Authentication of One Popular Signcryption Scheme
Quadratic Almost Perfect Nonlinear Functions With Many Terms
A Meet-in-the-Middle Collision Attack Against the New FORK-256
A Zero-Knowledge Identification and Key Agreement Protocol
On Factoring Arbitrary Integers with Known Bits
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity
Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose
Smooth Projective Hashing and Two-Message Oblivious Transfer
An Efficient Range-Bounded Commitment Scheme
Rerandomizable RCCA Encryption
Fast Point Multiplication on Elliptic Curves of Even Order
Breaking 104 bit WEP in less than 60 seconds
Algebraic Structure Defectoscopy
Certificateless Encryption Schemes Strongly Secure in the Standard Model
On The Inequivalence Of Ness-Helleseth APN Functions
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan
X-FCSR: a new software oriented stream cipher based upon FCSRs
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
Cryptanalysis of Two New Instances of TTM Cryptosystem
Rebuttal of overtaking VEST
Oblivious Transfer via McEliece's PKC and Permuted Kernels
Attacking the IPsec Standards in Encryption-only Configurations
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol
An Interesting Member ID-based Group Signature
Non-Interactive Anonymous Credentials
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
On the insecurity of interchanged use of OFB and CBC modes of operation
Computationally Sound Mechanized Proofs of Correspondence Assertions
(Convertible) Undeniable Signatures without Random Oracles
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem
Analysis of Local Optima in Block Ciphers
Some Results on Anonymity in Hybrid Encryption
On Ciphertext Undetectability
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions
Interactive and Noninteractive Zero Knowledge Coincide in the Help Model
Equivocal Blind Signatures and Adaptive UC-Security
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
A novel public key crypto system based on semi-modules over quotient semi-rings
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift
A Fast Protocol for Computationally Private Information Retrieval
Efficient ID-based Signature Without Trusted PKG
Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithm
Fair Exchange Signature Schemes
Almost-everywhere Secure Computation
Multivariates Polynomials for Hashing
Second Preimage Attacks on Dithered Hash Functions
Efficient Pairing Computation on Curves
Proxy Re-Signature Schemes without Random Oracles
The Delivery and Evidences Layer
On the security defects of an image encryption scheme
Hidden Identity-Based Signatures
A Short Signature Scheme in the Standard Model
Practical Cryptanalysis of SFLASH
Ceremony Design and Analysis
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol
REMARKS ON IBE SCHEME OF WANG AND CAO
Offline/Online Mixing
Another Look at Automated Theorem-Proving
Two New Examples of TTM
Robust, Anonymous RFID Authentication with Constant Key-Lookup
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments
Turbo SHA-2
Time Capsule Signature: Efficient and Provably Secure Constructions
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Using decision problems in public key cryptography
Secure PRNGs from Specialized Polynomial Maps over Any $F_q$
Practical Compact E-Cash
How to Model Bounded Computation in Long-Lived Systems
Towards Generating Secure Keys for Braid Cryptography
Provably Secure Grouping-proofs for RFID tags
Generators of Jacobians of Hyperelliptic Curves
Differential Cryptanalysis of PRESENT
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited
Inverted Edwards coordinates
Cryptographic Hardness based on the Decoding of Reed-Solomon Codes
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol
Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions
Proposing a Master One-Way Function
Efficient Non-interactive Proof Systems for Bilinear Groups
Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Optimizing double-base elliptic-curve single-scalar multiplication
ConSum v0: An Experimental Cipher
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
Hash Function Design Principles Supporting Variable Output Lengths from One Small Function
Attribute Based Group Signature Scheme
Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three
Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
Collusion-Resistant Group Key Management Using Attribute-Based Encryption
Cryptanalysis of the Random Number Generator of the Windows Operating System
Bingo Voting: Secure and coercion-free voting using a trusted random number generator
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Secure Deniable Authenticated Key Establishment for Internet Protocols
The role of help in Classical and Quantum Zero-Knowledge
Yet Another MicroArchitectural Attack: Exploiting I-cache
Structural Identity-Based Encryption
Inductive Proof Method for Computational Secrecy
Finding Low Weight Polynomial Multiples Using Lattices
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
When e-th Roots Become Easier Than Factoring
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
On prime-order elliptic curves with embedding degrees k=3,4 and 6
Random Oracles and Auxiliary Input
Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10
On the Security of Protocols with Logarithmic Communication Complexity
Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros
Clone Resistant Mutual Authentication for Low-Cost RFID Technology
Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves
Chosen-Ciphertext Secure Proxy Re-Encryption
On compressible pairings and their computation
Batch Verification of Short Signatures
Cryptanalysis of LASH
Provable Secure Generalized Signcryption
Notions of Efficiency in Simulation Paradigm
Counting hyperelliptic curves that admit a Koblitz model
Trapdoors for Hard Lattices and New Cryptographic Constructions
Embedding Degree of Hyperelliptic Curves with Complex Multiplication
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees
Seven-Property-Preserving Iterated Hashing: ROX
Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$
Space-Efficient Identity Based Encryption Without Pairings
Irreducibility to the One-More Evaluation Problems: More May Be Less
Utility Sampling for Trust Metrics in PKI
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields
Multiparty Key Agreement Using Bilinear Map
Optimistic Fair Exchange in a Multi-user Setting
An Improved Remote User Authentication Scheme using Bilinear Pairings
Provably Secure Ciphertext Policy ABE
Faster Group Operations on Special Elliptic Curves
Provable password-based tripartite key agreement protocol
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems
New FORK-256
Template Attacks with a Power Model
Fully Anonymous Group Signatures without Random Oracles
Tight bounds between algebraic immunity and nonlinearities of high orders
Executing Modular Exponentiation on a Graphics Accelerator
Proposal of a new efficient public key system for encryption and digital signatures
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption
Weak adaptive chosen ciphertext secure hybrid encryption scheme
Deniable Internet Key-Exchange
Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description
Optimal Irreducible Polynomials for GF(2^m) Arithmetic
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Some Identity Based Strong Bi-Designated Verifier Signature Schemes
Short Group Signature without Random Oracles
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
Precise Concurrent Zero Knowledge
Verifying Statistical Zero Knowledge with Approximate Implementations
Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field
An Efficient Certificateless Signature Scheme
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
On-Line Ciphers and the Hash-CBC Constructions
Efficient Certificateless Signatures Suitable for Aggregation
Mutual Information Analysis -- A Universal Differential Side-Channel Attack
Analysis and optimization of elliptic-curve single-scalar multiplication
A Framework for Game-Based Security Proofs
Precise Zero-Knowledge in Concurrent Setting
ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures
Comparing Implementation Efficiency of Ordinary and Squared Pairings
The BBG HIBE Has Limited Delegation
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
Provable Data Possession at Untrusted Stores
Practical Anonymous Divisible E-Cash From Bounded Accumulators
Kipnis-Shamir's Attack on HFE Revisited
Guarantees for Customers of Incentive Anonymizing Networks
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
Verifiable Attribute-based Encryption
A kilobit special number field sieve factorization
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Automatic Search of Differential Path in MD4
Efficient GF(3m) Multiplication Algorithm for eta T Pairing
On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity
Secure Computation Without Authentication
RC4 State Information at Any Stage Reveals the Secret Key
A Synthetic Indifferentiability Analysis of Block Cipher based Hash Functions
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Improved Impossible Differential Cryptanalysis of CLEFIA
Efficient chosen ciphertext secure PKE scheme with short ciphertext
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
Scalable Storage Scheme from Forward Key Rotation
On the hash function of ODH
The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$
Group Password-Authenticated Key Exchange from Identity-Based Cryptosystem
Unlinkable Randomizable Signature and Its Application in Group Signature
Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification
Matrix Power S-Box Construction
Attacks on the WEP protocol
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Unlinkable Divisible Digital Cash without Trusted Third Party
Authenticated Key Exchange and Key Encapsulation Without Random Oracles
Identity-Based Broadcast Encryption
Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path
Differential Cryptanalysis in Stream Ciphers
Obtaining Universally Composable Security: Towards the Bare Bones of Trust
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Towards Security Limits in Side-Channel Attacks
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature
Generalized mix functions and orthogonal equitable rectangles
Related-Key Statistical Cryptanalysis
AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Secure Two-Party k-Means Clustering
A new paradigm of chosen ciphertext secure public key encryption scheme
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Provable-Security Analysis of Authenticated Encryption in Kerberos
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Certificateless Ring Signatures
Forward-secure Key Evolution in Wireless Sensor Networks
Long-lived digital integrity using short-lived hash functions
Making Large Hash Functions From Small Compression Functions
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
Attribute Based Group Signature with Revocation
Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions
PORs: Proofs of Retrievability for Large Files
A Note on the Relay Attacks on e-passports: The Case of Czech e-passports
Incorporating Temporal Capabilities in Existing Key Management Schemes
BEDA: Button-Enabled Device Pairing
A Note on the Ate Pairing
1. AES seems weak. 2. Linear time secure cryptography
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
A Verifiable Voting Protocol based on Farnel
Choosing the correct elliptic curve in the CM method
Fully Secure Proxy Re-Encryption without Random Oracles
Efficient Identity Based Signature in Standard Model
Aspects of Pairing Inversion
A Forward-Secure Signature with Backward-Secure Detection
Families of genus 2 curves with small embedding degree
UICE: A High-Performance Cryptographic Module for SoC and RFID Applications
Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
Algebraic Immunity Hierarchy of Boolean Functions
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
An Efficient One-move Nominative Signature Scheme
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Privacy-Protecting Coupon System Revisited
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Efficient Dynamic k-Times Anonymous Authentication
Efficiency Improvement for NTRU
One-Round ID-Based Blind Signature Scheme without ROS Assumption
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006
Which Languages Have 4-Round Zero-Knowledge Proofs?
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
Filling the Gap between Voters and Cryptography in e-Voting
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
CRUST: Cryptographic Remote Untrusted Storage without Public Keys
Universally Composable Key-evolving Signature
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Interactive two-channel message authentication based on interactive-collision Resistant hash functions
Merging Pret-a-Voter and PunchScan
Optimised versions of the Ate and Twisted Ate Pairings
High Integrity Elections
Invertible Universal Hashing and the TET Encryption Mode
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Group Encryption
Cryptanalysis of a Hash Function Proposed at ICISC 2006
VEST Ciphers
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles
Group Decryption
Group-based Proxy Re-encryption scheme
Key Agreement from Signatures: Improved Protocols and Anonymous Extension
`Good' Pseudo-Random Binary Sequences from Elliptic Curves
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Prolific Codes with the Identifiable Parent Property
TinyTate: Identity-Based Encryption for Sensor Networks
Cryptanalysis of a class of cryptographic hash functions
Two Trivial Attacks on Trivium
A Framework for Iterative Hash Functions - HAIFA
On Perfectly Balanced Boolean Functions
Lossy Trapdoor Functions and Their Applications
Efficient Hybrid Encryption from ID-Based Encryption
On solving sparse algebraic equations over finite fields II
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers
A Pollard-like pseudorandom number generator over EC
Private Locally Decodable Codes
Analysis of countermeasures against access driven cache attacks on AES
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
Provably Secure Framework for Information Aggregation is Sensor Networks
Verifying Data Integrity with Few Queries to Untrusted Memory
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
Solving MRHS linear equations
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
The Effectiveness of Receipt-Based Attacks on ThreeBallot