Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Publications of EPRINT 2008
Page
Title
On the economic payoff of forensic systems when used to trace Counterfeited Software and content
The computational SLR: a logic for reasoning about computational indistinguishability
New balanced Boolean functions satisfying all the main cryptographic criteria
Pairing with Supersingular Trace Zero Varieties Revisited
Cryptanalysis of an Authentication Scheme Using Truncated Polynomials
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
The Random Oracle Model and the Ideal Cipher Model are Equivalent
HAIL: A High-Availability and Integrity Layer for Cloud Storage
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
Dynamic Threshold Cryptosystem without Group Manager
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
A Hardware Interface for Hashing Algorithms
Construction of Resilient Functions with Multiple Cryptographic Criteria
Pairings on hyperelliptic curves with a real model
Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Multi-Recipient Signcryption for Secure Wireless Group Communication
An Efficient Identity-based Ring Signcryption Scheme
Embedding in Two Least Significant Bits with Wet Paper Coding
ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY
Fuzzy Identity Based Signature
ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS
On Collisions of Hash Functions Turbo SHA-2
2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period
Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
FACTORING IS EQUIVALENT TO GENERIC RSA
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
The Hidden Root Problem
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited
Efficient One-round Key Exchange in the Standard Model
Slide Attacks on a Class of Hash Functions
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves
A Complete Treatment of 2-party SFE in the Information-Theoretic Setting with Applications to Long-Term Security
Generic Attacks for the Xor of k random permutations
Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors
A Proof of Security in O(2^n) for the Xor of Two Random Permutations
Information-Theoretically Secure Voting Without an Honest Majority
A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
The Encrypted Elliptic Curve Hash
Adaptive Security in Broadcast Encryption Systems
Twisted Edwards Curves
Searching for Low Weight Codewords in Linear Binary Codes
Simulatable Adaptive Oblivious Transfer
Collision attacks against 22-step SHA-512
On the Practicality of Short Signature Batch Verification
Attacking Step Reduced SHA-2 Family in a Unified Framework
ECM using Edwards curves
Some Observations on Strengthening the SHA-2 Family
New State Recovery Attack on RC4
On White-Box Cryptography and Obfuscation
Disjunctive Multi-Level Secret Sharing
Twisted Ate Pairing on Hyperelliptic Curves and Applications
Computing Pairings Using x-Coordinates Only
Certificate-Based Signature Schemes without Pairings or Random Oracles
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
Signcryption with Proxy Re-encryption
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
A strategy for any DAA Issuer and an additional verification by a Host
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods
An Improved Robust Fuzzy Extractor
General Certificateless Encryption and Timed-Release Encryption
Delegating Capabilities in Predicate Encryption Systems
Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes
FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three
Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Blind Signature Scheme over Braid Groups
Attacks on Singelee and Preneel's protocol
HB#: Increasing the Security and Efficiency of HB+
Breaking the Akiyama-Goto cryptosystem
Non-Cyclic Subgroups of Jacobians of Genus Two Curves
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
One-Up Problem for (EC)DSA
Authenticating with Attributes
Authenticated Byzantine Generals Strike Again
Merkle Puzzles are Optimal
How to Launch A Birthday Attack Against DES
Lower Bounds on Signatures From Symmetric Primitives
Sharemind: a framework for fast privacy-preserving computations
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Efficient Fully-Simulatable Oblivious Transfer
How to Protect Yourself without Perfect Shredding
Generic Attacks on Feistel Schemes
Another approach to pairing computation in Edwards coordinates
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Playing Hide-and-Seek with a Focused Mobile Adversary: Maximizing Data Survival in Unattended Sensor Networks
A New Blind Identity-Based Signature Scheme with Message Recovery
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
New Results on Unconditionally Secure Multireceiver Manual Authentication
Foundations of Group Key Management Framework, Security Model and a Generic Construction
Efficient and Generalized Pairing Computation on Abelian Varieties
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
Cryptanalysis of CRUSH hash structure
An analysis of the infrastructure in real function fields
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Cheon's algorithm, pairing inversion and the discrete logarithm problem
Threshold RSA for Dynamic and Ad-Hoc Groups
Accountability of Perfect Concurrent Signature
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Secure Biometric Authentication With Improved Accuracy
Fair Traceable Multi-Group Signatures
Complete Fairness in Secure Two-Party Computation
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
The CCA2-Security of Hybrid Damgård's ElGamal
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Identity-Based Directed Signature Scheme from Bilinear Pairings
Multi-PKG ID based signcryption
Combinatorial batch codes
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)
Full Security: Fuzzy Identity Based Encryption
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
Breaking One-Round Key-Agreement Protocols in the Random Oracle Model
Revocation Systems with Very Small Private Keys
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)
Attacks on RFID Protocols
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards
Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)
Improved efficiency of Kiltz07-KEM
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
A new almost perfect nonlinear function which is not quadratic
Physical Cryptanalysis of KeeLoq Code Hopping Applications
Scratch, Click & Vote: E2E voting over the Internet
Buying random votes is as hard as buying no-votes
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension
Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields
Compact Signatures for Network Coding
Abelian varieties with prescribed embedding degree
Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving
Computing Hilbert Class Polynomials
Attacking and defending the McEliece cryptosystem
Efficient Sequential Aggregate Signed Data
Yet Another Secure Distance-Bounding Protocol
Remarks on the NFS complexity
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
A correction to ``Efficient and Secure Comparison for On-Line Auctions''
High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)
Efficient Quantum-immune Blind Signatures
The Twin Diffie-Hellman Problem and Applications
A new identity based proxy signature scheme
Multiparty Computation Goes Live
RSA-TBOS Signcryption with Proxy Re-encryption
HENKOS Cryptanalysis-Related keys attack
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Generators of Jacobians of Genus Two Curves
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
Another Glance At Blockcipher Based Hashing
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption
The SIP security enhanced by using pairing-assisted Massey-Omura signcryption
Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance
Compact Proofs of Retrievability
SMS4 Encryption Algorithm for Wireless Networks
On the Chikazawa-Inoue ID based key system
Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak
A Secure Remote User Authentication Scheme with Smart Cards
Results from a Search for the Best Linear Approximation of a Block Cipher
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
Explicit hard instances of the shortest vector problem
A Short Proof of the PRP/PRF Switching Lemma
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields
Homomorphic Encryption with CCA Security
Public Key Cryptography from Different Assumptions
Pairing-Based Onion Routing with Improved Forward Secrecy
New attacks on ISO key establishment protocols
Template Attacks on ECDSA
Modified Huang-Wang's Convertible Nominative Signature Scheme
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes
An improvement of discrete Tardos fingerprinting codes
On the Security of Chien's Ultralightweight RFID Authentication Protocol
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
ID based generalized signcryption
On construction of signature schemes based on birational permutations over noncommutative rings
All Pairings Are in a Group
Efficient ID-Based Signcryption Schemes for Multiple Receivers
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Towards a Theory of White-Box Security
Efficient RFID authentication protocols based on pseudorandom sequence generators
A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
An improved preimage attack on MD2
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach
Remote Integrity Check with Dishonest Storage Server
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation
Information Leakage in Optimal Anonymized and Diversified Data
An Efficient SPRP-secure Construction based on Pseudo Random Involution
Iterative Probabilistic Reconstruction of RC4 Internal States
New ID-based Fair Blind Signatures
Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?
Universally Composable Undeniable Signature
Higher Order Differential Cryptanalysis of Multivariate Hash Functions
Strongly Unforgeable ID-based Signatures Without Random Oracles
Flaws in Some Efficient Self-Healing Key Distribution Schemes with Revocation
Optimal Pairings
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Fairness with an Honest Minority and a Rational Majority
Weaknesses in HENKOS Stream Cipher
On Security Notions for Verifiable Encrypted Signature
On DDos Attack against Proxy in Re-encryption and Re-signature
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
An argument for rank metric
Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields
Using Commutative Encryption to Share a Secret
Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
A protocol for K-multiple substring matching
Degradation and Amplification of Computational Hardness
History-Independent Cuckoo Hashing
Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
Argument of knowledge of a bounded error
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)
Cryptanalysis of White-Box Implementations
IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices
Knapsack cryptosystems built on NP-hard instances
The Cost of False Alarms in Hellman and Rainbow Tradeoffs
Private Branching Programs: On Communication-Efficient Cryptocomputing
An argument for Hamiltonicity
New Differential-Algebraic Attacks and Reparametrization of Rainbow
Zcipher Algorithm Specification
Collisions for Round-Reduced LAKE
Entropy Bounds for Traffic Confirmation
On the Design of Secure Double Block Length Hash Functions with Rate 1
Unique Shortest Vector Problem for max norm is NP-hard
THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD
{Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
Democratic Group Signatures with Threshold Traceability
Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting
Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132
New Directions in Cryptanalysis of Self-synchronizing Stream Ciphers
Scalable and Efficient Provable Data Possession
Compartmented Threshold RSA Based on the Chinese Remainder Theorem
A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
Unconditionally Reliable Message Transmission in Directed Hypergraphs
Chosen-Ciphertext Security via Correlated Products
Enumeration of Balanced Symmetric Functions over GF(p)
Exponentiation in pairing-friendly groups using homomorphisms
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication
A New Randomness Extraction Paradigm for Hybrid Encryption
Linear Bandwidth Naccache-Stern Encryption
Efficient Asynchronous Multiparty Computation with Optimal Resilience
Public key encryption and encryption emulation attacks
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages
New proofs for old modes
Attribute-Based Encryption with Key Cloning Protection
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style
The Enigmatique Toolkit
A Simple Derivation for the Frobenius Pseudoprime Test
On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks
Pairing Lattices
Efficient Rational Secret Sharing in the Standard Communication Model
Machine Learning Attacks Against the ASIRRA CAPTCHA
Password Mistyping in Two-Factor-Authenticated Key Exchange
A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2
Improving the Rules of the DPA Contest
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Analysis of Step-Reduced SHA-256
Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form
Collisions and other Non-Random Properties for Step-Reduced SHA-256
A NEW HASH ALGORITHM$:$ Khichidi$-$1
Sound and Fine-grain Specification of Cryptographic Tasks
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
The arithmetic of characteristic 2 Kummer surfaces
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security
Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption
A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature
Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
Constant-Size Dynamic $k$-TAA
Secure Arithmetic Computation with No Honest Majority
More Discriminants with the Brezing-Weng Method
Optimal Subset-Difference Broadcast Encryption with Free Riders
Oblivious Transfer based on the McEliece Assumptions}
Small Odd Prime Field Multivariate PKCs
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM
How Risky is the Random-Oracle Model?
Reducing Complexity Assumptions for Oblivious Transfer
Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
A non-delegatable identity-based strong designated verifier signature scheme
Attacking Reduced Round SHA-256
Attribute-Based Ring Signatures
Certificateless Signcryption
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
Full Security:Fuzzy Identity Based Encryption
Dynamic SHA-2
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
A Real-World Attack Breaking A5/1 within Hours
BGKM: An Efficient Secure Broadcasting Group Key Management Scheme
Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Toy Factoring by Newton's Method
New Impossible Differential Attacks on AES
Robust Combiners for White-Box Security
Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary
Impossible Differential Cryptanalysis of CLEFIA
Non-Malleable Obfuscation
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
Key-Private Proxy Re-Encryption
Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour
Explicit hard instances of the shortest vector problem
The Walsh Spectrum of a New Family of APN Functions
Secure Certificateless Public Key Encryption without Redundancy
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures
On Black-Box Ring Extraction and Integer Factorization
Some Observations on SHAMATA
Secure Online Elections in Practice
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
DISH: Distributed Self-Healing in Unattended Sensor Networks
On the Security of Fully Collusion Resistant Traitor Tracing Schemes
A non-interactive deniable authentication scheme based on designated verifier proofs
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
A Proxy Signature Scheme over Braid Groups
Combined (identity-based) public key schemes
Modular polynomials for genus 2
Fast hashing to G2 on pairing friendly curves
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?
Universally Composable Adaptive Oblivious Transfer
The Generic Hardness of Subset Membership Problems under the Factoring Assumption
On the (Im)Possibility of Key Dependent Encryption
Slid Pairs in Salsa20 and Trivium
Improved lower bound on the number of balanced symmetric functions over GF(p)
Breaking RSA Generically is Equivalent to Factoring
Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards
Public-Key Encryption with Efficient Amortized Updates
Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols
Topology Knowledge Versus Fault Tolerance: The Case of Probabilistic Communication Or: How Far Must You See to Hear Reliably?
Possibility and impossibility results for selective decommitments
The $F_f$-Family of Protocols for RFID-Privacy and Authentication
Understanding Phase Shifting Equivalent Keys and Exhaustive Search
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
Cryptanalysing the Critical Group
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
Binary Edwards Curves
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
On Round Complexity of Unconditionally Secure VSS
Delegatable Anonymous Credentials
Full Cryptanalysis of LPS and Morgenstern Hash Function
On CCA1-Security of Elgamal And Damg{\aa}rd's Elgamal
Non-Linear Reduced Round Attacks Against SHA-2 Hash family
Collusion-Free Multiparty Computation in the Mediated Model
Proofs of Retrievability: Theory and Implementation
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
New construction of Boolean functions with maximun algebraic immunity
Divisible On-line/Off-line Signatures
Algebraic Techniques in Differential Cryptanalysis
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
Optimal Discretization for High-Entropy Graphical Passwords
New AES software speed records
An Efficient ID-based Ring Signature Scheme from Pairings
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
Imaginary quadratic orders with given prime factor of class number
A New Approach for Algebraically Homomorphic Encryption
Proofs of Knowledge with Several Challenge Values
On Kasami Bent Functions
Restricted Adaptive Oblivious Transfer
Elliptic divisibility sequences and the elliptic curve discrete logarithm problem
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
On the Secure Obfuscation of Deterministic Finite Automata
Inside the Hypercube
A New Approach to Secure Logging
Almost-Asynchronous MPC with Faulty Minority
Privacy-Preserving Audit and Extraction of Digital Contents
On differences of quadratic residues
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
Collision attack on NaSHA-512
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
A new class of Bent functions in Polynomial Forms
How to Build a Hash Function from any Collision-Resistant Function
New Applications of Differential Bounds of the SDS Structure
User-Sure-and-Safe Key Retrieval
Comments on two multi-server authentication protocols
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
Investigating the DPA-Resistance Property of Charge Recovery Logics
The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption
A Tamper-Evident Voting Machine Resistant to Covert Channels
ECM on Graphics Cards
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
Dynamic Provable Data Possession
A New Family of Perfect Nonlinear Binomials
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
Secure Multiparty Computation for Privacy-Preserving Data Mining
Sphinx: A Compact and Provably Secure Mix Format
Security needs in embedded systems
Properties of Cryptographic Hash Functions
Simultaneous field divisions: an extension of Montgomery's trick
Signing a Linear Subspace: Signature Schemes for Network Coding
On The Security of The ElGamal Encryption Scheme and Damgards Variant
Usable Optimistic Fair Exchange
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing
Double-Base Number System for Multi-Scalar Multiplications
Privacy-Preserving Matching of DNA Profiles
On the Design of Secure and Fast Double Block Length Hash Functions
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem
On the Correctness of An Approach Against Side-channel attacks
On Software Parallel Implementation of Cryptographic Pairings
CM construction of genus 2 curves with p-rank 1
Partial Fairness in Secure Two-Party Computation
Efficient Post-quantum Blind Signatures
Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
Cube Attacks on Tweakable Black Box Polynomials
Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme
Generating genus two hyperelliptic curves over large characteristic finite fields
Computing the Bilinear Pairings on Elliptic Curves with Automorphisms
Collision Attack on the Waterfall Hash Function
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm
Generating Shorter Bases for Hard Random Lattices
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
LEGO for Two Party Secure Computation
Reducing the Complexity of the Weil Pairing Computation
On the Role of KGC for Proxy Re-encryption in Identity Based Setting
The Multireceiver Commitment Schemes
On a New Formal Proof Model for RFID Location Privacy
Multi-Factor Password-Authenticated Key Exchange
Semi-free start collision attack on Blender
On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics
Modeling Computational Security in Long-Lived Systems, Version 2
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
Additive Homomorphic Encryption with t-Operand Multiplications
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms
Session-state Reveal is stronger than Ephemeral Key Reveal: Breaking the NAXOS key exchange protocol
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation
New Related-Key Boomerang Attacks on AES
Analysis and Details of the Random Cipher Output Mode Of Operation Primitives
Cryptanalysis of the Hash Function LUX-256
Essentially Optimal Universally Composable Oblivious Transfer
Improved Cryptanalysis of SHAMATA-BC
Efficient Conversion of Secret-shared Values Between Different Fields
Sharing DSS by the Chinese Remainder Theorem
Encryption-On-Demand: Practical and Theoretical Considerations
Automatic Generation of Sound Zero-Knowledge Protocols
On the Security of a Visual Cryptography Scheme for Color Images
Oblivious Transfer from Weak Noisy Channels
An ID-based Authenticated Key Exchange Protocol based on Bilinear Diffie-Hellman Problem
One-Round Authenticated Key Agreement from Weak Secrets
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
Simple and Efficient Asynchronous Byzantine Agreement with Optimal Resilience
Proxy Key Re-encapsulation Mechanism for Group Communications
Hash Functions from Sigma Protocols and Improvements to VSH
New Impossible Differential Cryptanalysis of ARIA
GUC-Secure Set-Intersection Computation
Revisiting Wiener's Attack -- New Weak Keys in RSA
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol
Identification and Privacy: Zero-Knowledge is not Enough
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
A New Collision Differential For MD5 With Its Full Differential Path
Unconditionally Secure Multiparty Set Intersection Re-Visited
A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
A Recursive Threshold Visual Cryptography Scheme
On Resettably-Sound Resttable Zero Knowledege Arguments
Cryptanalysis of RadioGatun
On CCA1-Security of Elgamal And Damg{\aa}rd Cryptosystems
Comments on two password based protocols
Constant-Round Concurrent Non-Malleable Commitments and Decommitments
Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift
A Modular Security Analysis of the TLS Handshake Protocol
Obtaining and solving systems of equations in key variables only for the small variants of AES
Local Affinity Based Inversion of Filter Generators
Lower Bounds on Black-Box Ring Extraction
Cryptanalysis of ID-Based Signcryption Scheme for Multiple Receivers
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Recognition in Ad Hoc Pervasive Networks
New Collision attacks Against Up To 24-step SHA-2
Leakage-Resilient Cryptography in the Standard Model
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Practical Attacks on HB and HB+ Protocols
Odd-Char Multivariate Hidden Field Equations
Enumeration of Homogeneous Rotation Symmetric functions over GF(p)
Authenticated Adversarial Routing