year |
venue |
title |
pages |
2005 | asiacrypt | Some Attacks Against a Double Length Hash Proposal | online |
2005 | asiacrypt | Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation | online |
2005 | asiacrypt | Universally Anonymizable Public-Key Encryption | online |
2005 | asiacrypt | Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings | online |
2005 | asiacrypt | Modular Security Proofs for Key Agreement Protocols | online |
2005 | asiacrypt | A Related-Key Rectangle Attack on the Full KASUMI | online |
2005 | asiacrypt | New Improvements of Davies-Murphy Cryptanalysis | online |
2005 | asiacrypt | A Simple Threshold Authenticated Key Exchange from Short Secrets | online |
2005 | asiacrypt | Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation | online |
2005 | asiacrypt | A Sender Verifiable Mix-Net and a New Proof of a Shuffle | online |
2005 | asiacrypt | New Applications of Time Memory Data Tradeoffs | online |
2005 | asiacrypt | Universally Convertible Directed Signatures | online |
2005 | asiacrypt | Privacy-Preserving Graph Algorithms in the Semi-honest Model | online |
2005 | asiacrypt | Adapting Density Attacks to Low-Weight Knapsacks | online |
2005 | asiacrypt | Spreading Alerts Quietly and the Subgroup Escape Problem | online |
2005 | asiacrypt | Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations | online |
2005 | asiacrypt | Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) | online |
2005 | asiacrypt | Updatable Zero-Knowledge Databases | online |
2005 | asiacrypt | Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps | online |
2005 | asiacrypt | Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log | online |
2005 | asiacrypt | A Failure-Friendly Design Principle for Hash Functions | online |
2005 | asiacrypt | A Practical Attack on the Fixed RC4 in the WEP Mode | online |
2005 | asiacrypt | Fast Computation of Large Distributions and Its Cryptographic Applications | online |
2005 | asiacrypt | Examining Indistinguishability-Based Proof Models for Key Establishment Protocols | online |
2005 | asiacrypt | Errors in Computational Complexity Proofs for Protocols | online |
2005 | asiacrypt | Quantum Anonymous Transmissions | online |
2005 | asiacrypt | An Analysis of the XSL Algorithm | online |
2005 | asiacrypt | Simple and Tight Bounds for Information Reconciliation and Privacy Amplification | online |
2005 | asiacrypt | A Near-Practical Attack Against B Mode of HBB | online |
2005 | asiacrypt | Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains | online |
2005 | asiacrypt | Linear Cryptanalysis of the TSC Family of Stream Ciphers | online |
2005 | asiacrypt | Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps | online |
2005 | asiacrypt | Revealing Additional Information in Two-Party Computations | online |
2005 | asiacrypt | Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs | online |
2005 | asiacrypt | Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? | online |
2005 | asiacrypt | Server-Aided Verification: Theory and Practice | online |
2005 | asiacrypt | Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes | online |
2005 | asiacrypt | Hash Functions: Past, Present and Future | |
2005 | asiacrypt | Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application | online |
2005 | ches | Using an RSA Accelerator for Modular Inversion | online |
2005 | ches | Data Remanence in Flash Memory Devices | online |
2005 | ches | Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings | 237-249 |
2005 | ches | DPA Leakage Models for CMOS Logic Circuits | online |
2005 | ches | Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment | online |
2005 | ches | Security Evaluation Against Electromagnetic Analysis at Design Time | online |
2005 | ches | What Identity Systems Can and Cannot Do | |
2005 | ches | Security of Identification Products: How to Manage | |
2005 | ches | Trusted Computing in Embedded Systems | |
2005 | ches | Successfully Attacking Masked AES Hardware Implementations | online |
2005 | ches | Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings | online |
2005 | ches | Templates as Master Keys | online |
2005 | ches | EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA | 250-264 |
2005 | ches | Energy-Efficient Software Implementation of Long Integer Modular Arithmetic | online |
2005 | ches | The "Backend Duplication" Method | online |
2005 | ches | Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP | online |
2005 | ches | Fast Truncated Multiplication for Cryptographic Applications | online |
2005 | ches | Design of Testable Random Bit Generators | online |
2005 | ches | A Very Compact S-Box for AES | online |
2005 | ches | SHARK: A Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers | online |
2005 | ches | On Second-Order Differential Power Analysis | online |
2005 | ches | A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis | online |
2005 | ches | Bipartite Modular Multiplication | online |
2005 | ches | Resistance of Randomized Projective Coordinates Against Power Analysis | online |
2005 | ches | Efficient Hardware for the Tate Pairing Calculation in Characteristic Three | online |
2005 | ches | Masking at Gate Level in the Presence of Glitches | online |
2005 | ches | Security Limits for Compromising Emanations | online |
2005 | ches | Secure Data Management in Trusted Computing | online |
2005 | ches | Further Hidden Markov Model Cryptanalysis | online |
2005 | ches | Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization | online |
2005 | ches | AES on FPGA from the Fastest to the Smallest | online |
2005 | ches | Hardware Acceleration of the Tate Pairing in Characteristic Three | online |
2005 | ches | Short Memory Scalar Multiplication on Koblitz Curves | online |
2005 | ches | Improved Higher-Order Side-Channel Attacks with FPGA Experiments | online |
2005 | ches | Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints | online |
2005 | ches | A Stochastic Model for Differential Side Channel Cryptanalysis | online |
2005 | crypto | Secure Communications over Insecure Channels Based on Short Authenticated Strings | online |
2005 | crypto | Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors | online |
2005 | crypto | Bilinear Maps in Cryptography | |
2005 | crypto | A Practical Attack on a Braid Group Based Cryptographic Protocol | online |
2005 | crypto | Efficient Collision Search Attacks on SHA-0 | online |
2005 | crypto | Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes | online |
2005 | crypto | Finding Collisions in the Full SHA-1 | online |
2005 | crypto | The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption | online |
2005 | crypto | New Monotones and Lower Bounds in Unconditional Two-Party Computation | online |
2005 | crypto | Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys | online |
2005 | crypto | A Formal Treatment of Onion Routing | online |
2005 | crypto | On the Discrete Logarithm Problem on Algebraic Tori | online |
2005 | crypto | Private Searching on Streaming Data | online |
2005 | crypto | An Efficient CDH-Based Signature Scheme with a Tight Security Reduction | online |
2005 | crypto | Unconditional Characterizations of Non-interactive Zero-Knowledge | online |
2005 | crypto | One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption | online |
2005 | crypto | Simple and Efficient Shuffling with Provable Correctness and ZK Privacy | online |
2005 | crypto | Composition Does Not Imply Adaptive Security | online |
2005 | crypto | Generic Transformation for Scalable Broadcast Encryption Schemes | online |
2005 | crypto | Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings | online |
2005 | crypto | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | online |
2005 | crypto | Merkle-Damgård Revisited: How to Construct a Hash Function | online |
2005 | crypto | Privacy-Preserving Set Operations | online |
2005 | crypto | On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes | online |
2005 | crypto | Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | online |
2005 | crypto | Impossibility and Feasibility Results for Zero Knowledge with Public Keys | online |
2005 | crypto | Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator | online |
2005 | crypto | Improved Security Analyses for CBC MACs | online |
2005 | crypto | Authenticating Pervasive Devices with Human Protocols | online |
2005 | crypto | A Quantum Cipher with Near Optimal Key-Recycling | online |
2005 | crypto | HMQV: A High-Performance Secure Diffie-Hellman Protocol | online |
2005 | crypto | Secure Computation Without Authentication | online |
2005 | crypto | Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems | online |
2005 | crypto | On the Generic Insecurity of the Full Domain Hash | online |
2005 | crypto | Pebbling and Proofs of Work | online |
2005 | eprint | Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols | online |
2005 | eprint | A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version) | online |
2005 | eprint | The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function | online |
2005 | eprint | Blind Attacks on Engineering Samples | online |
2005 | eprint | Games and the Impossibility of Realizable Ideal Functionality | online |
2005 | eprint | A lower bound on the higher order nonlinearity of algebraic immune functions | online |
2005 | eprint | Probability distributions of Correlation and Differentials in Block Ciphers | online |
2005 | eprint | A Counter-based MAC Revisited: Towards Better Security | online |
2005 | eprint | TMTO With Multiple Data: Analysis and New Single Table Trade-offs | online |
2005 | eprint | Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes | online |
2005 | eprint | A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret | online |
2005 | eprint | Efficient Identity-Based Key Encapsulation to Multiple Parties | online |
2005 | eprint | The conjugacy problem and related problems in lattice-ordered groups | online |
2005 | eprint | Cryptanalysis of a 32-bit RC4-like Stream Cipher | online |
2005 | eprint | Limits of the Cryptographic Realization of Dolev-Yao-style XOR | online |
2005 | eprint | Constant Round Dynamic Group Key Agreement | online |
2005 | eprint | Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis | online |
2005 | eprint | Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups | online |
2005 | eprint | An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction | online |
2005 | eprint | Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving | online |
2005 | eprint | Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme | online |
2005 | eprint | Threshold Ring Signatures Efficient for Large Sets of Signers | online |
2005 | eprint | Efficient Doubling on Genus 3 Curves over Binary Fields | online |
2005 | eprint | Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity | online |
2005 | eprint | Yet Another Short Signatures Without Random Oracles from Bilinear Pairings | online |
2005 | eprint | Fast generators for the Diffie-Hellman key agreement protocol and malicious standards | online |
2005 | eprint | Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines | online |
2005 | eprint | On the Entropy of Arcfour Keys | online |
2005 | eprint | LILI-II is not Broken | online |
2005 | eprint | Tree Parity Machine Rekeying Architectures for Embedded Security | online |
2005 | eprint | Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves | online |
2005 | eprint | An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol | online |
2005 | eprint | Simple and Provable Secure Strong Designated Verifier Signature Schemes | online |
2005 | eprint | A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment | online |
2005 | eprint | Attack on Okamoto et al.'s New Short Signature Schemes | online |
2005 | eprint | On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities | online |
2005 | eprint | Cryptanalysis of Sfinks | online |
2005 | eprint | Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1 | online |
2005 | eprint | On the Algebraic Immunity of Symmetric Boolean Functions | online |
2005 | eprint | A Verifiable Secret Shuffle of Homomorphic Encryptions | online |
2005 | eprint | A Simple and Provably Good Code for SHA Message Expansion | online |
2005 | eprint | Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing | online |
2005 | eprint | Efficient Certificateless Public Key Encryption | online |
2005 | eprint | The topology of covert conflict | online |
2005 | eprint | Feistel Schemes and Bi-Linear Cryptanalysis | online |
2005 | eprint | Faster Pairings using an Elliptic Curve with an Efficient Endomorphism | online |
2005 | eprint | Security Notions for Identity Based Encryption | online |
2005 | eprint | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | online |
2005 | eprint | Inoculating Multivariate Schemes Against Differential Attacks | online |
2005 | eprint | Fuzzy Universal Hashing and Approximate Authentication | online |
2005 | eprint | TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY | online |
2005 | eprint | Relations Among Notions of Security for Identity Based Encryption Schemes | online |
2005 | eprint | Efficient Delegation of Pairing Computation | online |
2005 | eprint | Powered Tate Pairing Computation | online |
2005 | eprint | The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model | online |
2005 | eprint | On Obfuscating Point Functions | online |
2005 | eprint | Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator | online |
2005 | eprint | Logcrypt: Forward Security and Public Verification for Secure Audit Logs | online |
2005 | eprint | Wang's sufficient conditions of MD5 are not sufficient | online |
2005 | eprint | Cryptanalysis of Hiji-bij-bij (HBB) | online |
2005 | eprint | On an authentication scheme based on the Root Problem in the braid group | online |
2005 | eprint | Benes and Butterfly schemes revisited | online |
2005 | eprint | Security Analysis of KEA Authenticated Key Exchange Protocol | online |
2005 | eprint | A sufficient condition for key-privacy | online |
2005 | eprint | A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code | online |
2005 | eprint | A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$ | online |
2005 | eprint | Stream Cipher Design based on Jumping Finite State Machines | online |
2005 | eprint | The Misuse of RC4 in Microsoft Word and Excel | online |
2005 | eprint | Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI | online |
2005 | eprint | Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004 | online |
2005 | eprint | Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing | online |
2005 | eprint | Mixing properties of triangular feedback shift registers | online |
2005 | eprint | Examining Indistinguishability-Based Proof Models for Key Establishment Protocols | online |
2005 | eprint | Update on SHA-1 | online |
2005 | eprint | Cache attacks and Countermeasures: the Case of AES | online |
2005 | eprint | An Improved Elegant Method to Re-initialize Hash Chains | online |
2005 | eprint | An Authentication Protocol For Mobile Agents Using Bilinear Pairings | online |
2005 | eprint | Efficient Certificateless Public Key Encryption | online |
2005 | eprint | CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III | online |
2005 | eprint | Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols | online |
2005 | eprint | Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign | online |
2005 | eprint | A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words | online |
2005 | eprint | Explicit Construction of Secure Frameproof Codes | online |
2005 | eprint | Hierarchical Identity Based Encryption with Constant Size Ciphertext | online |
2005 | eprint | Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations | online |
2005 | eprint | Narrow T-functions | online |
2005 | eprint | Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions | online |
2005 | eprint | Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives | online |
2005 | eprint | A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications | online |
2005 | eprint | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | online |
2005 | eprint | Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model | online |
2005 | eprint | The Full Abstraction of the UC Framework | online |
2005 | eprint | Partitioned Cache Architecture as a Side-Channel Defence Mechanism | online |
2005 | eprint | (De)Compositions of Cryptographic Schemes and their Applications to Protocols | online |
2005 | eprint | Herding Hash Functions and the Nostradamus Attack | online |
2005 | eprint | Partial Hiding in Public-Key Cryptography | online |
2005 | eprint | Spreading Alerts Quietly and the Subgroup Escape Problem | online |
2005 | eprint | An Improved and Efficient Countermeasure against Power Analysis Attacks | online |
2005 | eprint | Revisiting Oblivious Signature-Based Envelopes | online |
2005 | eprint | A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | online |
2005 | eprint | Foundations and Applications for Secure Triggers | online |
2005 | eprint | Weak keys of the Diffe Hellman key exchange I | online |
2005 | eprint | Generalizations of RSA public key cryptosystems | online |
2005 | eprint | Analysis of Affinely Equivalent Boolean Functions | online |
2005 | eprint | Concurrent Zero Knowledge without Complexity Assumptions | online |
2005 | eprint | Techniques for random maskin in hardware | online |
2005 | eprint | Provable Efficient Certificateless Public Key Encryption | online |
2005 | eprint | Tag-KEM/DEM: A New Framework for Hybrid Encryption | online |
2005 | eprint | Direct Chosen Ciphertext Security from Identity-Based Techniques | online |
2005 | eprint | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage | online |
2005 | eprint | Overview of Key Agreement Protocols | online |
2005 | eprint | A model and architecture for pseudo-random generation with applications to /dev/random | online |
2005 | eprint | Perfect Non-Interactive Zero Knowledge for NP | online |
2005 | eprint | Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves | online |
2005 | eprint | Cryptography In the Bounded Quantum-Storage Model | online |
2005 | eprint | The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves | online |
2005 | eprint | Improved Integral Cryptanalysis of FOX Block Cipher | online |
2005 | eprint | On the Notion of Statistical Security in Simulatability Definitions | online |
2005 | eprint | Speeding Up Pairing Computation | online |
2005 | eprint | An Attack on CFB Mode Encryption As Used By OpenPGP | online |
2005 | eprint | On Fairness in Simulatability-based Cryptographic Systems | online |
2005 | eprint | Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication) | online |
2005 | eprint | Hidden Exponent RSA and Efficient Key Distribution | online |
2005 | eprint | An Efficient CDH-based Signature Scheme With a Tight Security Reduction | online |
2005 | eprint | A Key Establishment IP-Core for Ubiquitous Computing | online |
2005 | eprint | Concurrent Composition of Secure Protocols in the Timing Model | online |
2005 | eprint | DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining | online |
2005 | eprint | Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants | online |
2005 | eprint | Keeping Denial-of-Service Attackers in the Dark | online |
2005 | eprint | Distinguishing Stream Ciphers with Convolutional Filters | online |
2005 | eprint | Nonlinearity of the Round Function | online |
2005 | eprint | Unfairness of a protocol for certified delivery | online |
2005 | eprint | Towards Security Two-part Authenticated Key Agreement Protocols | online |
2005 | eprint | On the Security of a Group Signature Scheme with Strong Separability | online |
2005 | eprint | On the Hardware Implementation of the MICKEY-128 Stream Cipher | online |
2005 | eprint | Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications | online |
2005 | eprint | Elliptic Curves for Pairing Applications | online |
2005 | eprint | An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption | online |
2005 | eprint | Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage | online |
2005 | eprint | On the affine classification of cubic bent functions | online |
2005 | eprint | Ring Signatures: Stronger Definitions, and Constructions without Random Oracles | online |
2005 | eprint | Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 | online |
2005 | eprint | Steganography with Imperfect Samplers | online |
2005 | eprint | Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme | online |
2005 | eprint | Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes--- | online |
2005 | eprint | Cryptanalysis of two identification schemes based on an ID-based cryptosystem | online |
2005 | eprint | The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited | online |
2005 | eprint | Adversarial Model for Radio Frequency Identification | online |
2005 | eprint | Adaptable Group-Oriented Signature | online |
2005 | eprint | David Chaum's Voter Verification using Encrypted Paper Receipts | online |
2005 | eprint | A New Efficient ID-Based Authenticated Key Agreement Protocol | online |
2005 | eprint | A Note on Shor's Quantum Algorithm for Prime Factorization | online |
2005 | eprint | Meta Ring Signature | online |
2005 | eprint | Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems | online |
2005 | eprint | What do S-boxes Say in Differential Side Channel Attacks? | online |
2005 | eprint | An Approach Towards Rebalanced RSA-CRT with Short Public Exponent | online |
2005 | eprint | A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations | online |
2005 | eprint | Comment on cryptanalysis of Tseng et al.??s authenticated encryption schemes | online |
2005 | eprint | Deterministic Identity-Based Signatures for Partial Aggregation | online |
2005 | eprint | Untraceability of Two Group Signature Schemes | online |
2005 | eprint | Fast genus 2 arithmetic based on Theta functions | online |
2005 | eprint | Deniable Authentication with RSA and Multicasting | online |
2005 | eprint | A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags | online |
2005 | eprint | Tight Reductions among Strong Die-Hellman Assumptions | online |
2005 | eprint | Collision Attack on XTR and a Countermeasure with a Fixed Pattern | online |
2005 | eprint | Generic Constructions of Identity-Based and Certificateless KEMs | online |
2005 | eprint | Ring Signatures without Random Oracles | online |
2005 | eprint | Secret sharing schemes on graphs | online |
2005 | eprint | Bounds on Birthday Attack Times | online |
2005 | eprint | Compact E-Cash | online |
2005 | eprint | ID-based Restrictive Partially Blind Signatures and Applications | online |
2005 | eprint | Key Derivation and Randomness Extraction | online |
2005 | eprint | Efficient Identity-Based Encryption with Tight Security Reduction | online |
2005 | eprint | Cryptanalysis of One Fair E-cash System | online |
2005 | eprint | Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES) | online |
2005 | eprint | On the Key Schedule of Blowfish | online |
2005 | eprint | Evolutionary Design of Trace Form Bent Functions | online |
2005 | eprint | On Efficient Key Agreement Protocols | online |
2005 | eprint | The Weil pairing on elliptic curves over C | online |
2005 | eprint | Efficient hardware for the Tate pairing calculation in characteristic three | online |
2005 | eprint | Extracting bits from coordinates of a point of an elliptic curve | online |
2005 | eprint | Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation | online |
2005 | eprint | An Effective Method to Implement Group Signature with Revocation | online |
2005 | eprint | Colliding X.509 Certificates | online |
2005 | eprint | A Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity | online |
2005 | eprint | N-adic Summation-Shrinking Generator. Basic properties and empirical evidences | online |
2005 | eprint | On the Security of Encryption Modes of MD4, MD5 and HAVAL | online |
2005 | eprint | Fast Elliptic Curve Point Multiplication using Double-Base Chains | online |
2005 | eprint | On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions | online |
2005 | eprint | On public-key cryptosystems based on combinatorial group theory | online |
2005 | eprint | Cryptographic Protocols to Prevent Spam | online |
2005 | eprint | A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields | online |
2005 | eprint | A Dedicated Processor for the eta Pairing | online |
2005 | eprint | Practical Lattice Basis Sampling Reduction | online |
2005 | eprint | A Fuzzy Sketch with Trapdoor | online |
2005 | eprint | BROADCAST ENCRYPTION $\pi$ | online |
2005 | eprint | Classification of Cubic $(n-4)$-resilient Boolean Functions | online |
2005 | eprint | Computationally sound implementations of equational theories against passive adversaries | online |
2005 | eprint | Universally Composable Disk Encryption Schemes | online |
2005 | eprint | Finding MD5 Collisions ? a Toy For a Notebook | online |
2005 | eprint | Secure Key-Updating for Lazy Revocation | online |
2005 | eprint | Pairing-Based Cryptography at High Security Levels | online |
2005 | eprint | One-Way Signature Chaining - A New Paradigm For Group Cryptosystems | online |
2005 | eprint | Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations | online |
2005 | eprint | Pairing-based identification schemes | online |
2005 | eprint | Duality between Multiplication and Modular Reduction | online |
2005 | eprint | Statistical Multiparty Computation Based on Random Walks on Graphs | online |
2005 | eprint | Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism | online |
2005 | eprint | An Improved Power Analysis Attack Against Camellia's Key Schedule | online |
2005 | eprint | A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification | online |
2005 | eprint | Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings | online |
2005 | eprint | Smashing SMASH | online |
2005 | eprint | A New Approach to Counteract DPA Attacks on Block Ciphers | online |
2005 | eprint | Some properties of an FSE 2005 Hash Proposal | online |
2005 | eprint | A Universally Composable Scheme for Electronic Cash | online |
2005 | eprint | Security notions for disk encryption | online |
2005 | eprint | Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems | online |
2005 | eprint | On Resistance of DES to Related-Key Differential Cryptanalysis | online |
2005 | eprint | Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings | online |
2005 | eprint | A new structural attack for GPT and variants | online |
2005 | eprint | Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems | online |
2005 | eprint | Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) | online |
2005 | eprint | Group Signatures with Efficient Concurrent Join | online |
2005 | eprint | AES side channel attack protection using random isomorphisms | online |
2005 | eprint | Batch Verification of Validity of Bids in Homomorphic E-auction | online |
2005 | eprint | The Pelican MAC Function | online |
2005 | eprint | Knapsack Diffie-Hellman: A New Family of Diffie-Hellman | online |
2005 | eprint | Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions | online |
2005 | eprint | On Proofs of Security for Certificateless Cryptosystems | online |
2005 | eprint | Rediscovery of Time Memory Tradeoffs | online |
2005 | eprint | Oblivious Transfer and Linear Functions | online |
2005 | eprint | Distributed Phishing Attacks | online |
2005 | eprint | Is SHA-1 conceptually sound? | online |
2005 | eprint | PRF Domain Extension Using DAGs | online |
2005 | eprint | Errors in Computational Complexity Proofs for Protocols | online |
2005 | eprint | An ID-Based Key Agreement Scheme from pairing | online |
2005 | eprint | Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations | online |
2005 | eprint | A Survey on ID-Based Cryptographic Primitives | online |
2005 | eprint | On the Security of A Group Signature Scheme | online |
2005 | eprint | Security and Privacy Issues in E-passports | online |
2005 | eprint | Pairing-Based Two-Party Authenticated Key Agreement Protocol | online |
2005 | eprint | Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation | online |
2005 | eprint | ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks | online |
2005 | eprint | Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme | online |
2005 | eprint | Exponential Memory-Bound Functions for Proof of Work Protocols | online |
2005 | eprint | Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes | online |
2005 | eprint | Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings | online |
2005 | eprint | almost enumeration of 8-variable bent functions | online |
2005 | eprint | Normal Basis Multiplication Algorithms for GF(2n) (Full Version) | online |
2005 | eprint | Soundness and Completeness of Formal Logics of Symmetric Encryption | online |
2005 | eprint | An infinite class of quadratic APN functions which are not equivalent to power mappings | online |
2005 | eprint | Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications | online |
2005 | eprint | Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security | online |
2005 | eprint | Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 | online |
2005 | eprint | Strict Avalanche Criterion Over Finite Fields | online |
2005 | eprint | On estimating the lattice security of NTRU | online |
2005 | eprint | On a (Flawed) Proposal to Build More Pairing-Friendly Curves | online |
2005 | eprint | On Error Correction in the Exponent | online |
2005 | eprint | Elliptic Curves with Low Embedding Degree | online |
2005 | eprint | How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation | online |
2005 | eprint | Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs | online |
2005 | eprint | A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher | online |
2005 | eprint | Derandomization in Cryptography | online |
2005 | eprint | Efficient Identity-Based and Authenticated Key Agreement Protocol | online |
2005 | eprint | Efficient Compilers for Authenticated Group Key Exchange | online |
2005 | eprint | A Public Key Cryptosystem Based on Singular Cubic Curve | online |
2005 | eprint | Searchable Keyword-Based Encryption | online |
2005 | eprint | Diffie-Hellman key exchange protocol and non-abelian nilpotent groups | online |
2005 | eprint | The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks | online |
2005 | eprint | Weak Composite Diffie-Hellman is not Weaker than Factoring | online |
2005 | eprint | Secure and {\sl Practical} Identity-Based Encryption | online |
2005 | eprint | On the relationship between squared pairings and plain pairings | online |
2005 | eprint | Resource Fairness and Composability of Cryptographic Protocols | online |
2005 | eprint | Partially Fixed Point Multiplication | online |
2005 | eprint | On a Traitor Tracing Scheme from ACISP 2003 | online |
2005 | eprint | Intrusion-Resilient Secure Channels | online |
2005 | eprint | Secret color images sharing schemes based on XOR operation | online |
2005 | eprint | Characteristics of Key-Dependent S-Boxes: the Case of Twofish | online |
2005 | eprint | Efficient Broadcast Encryption Scheme with Log-Key Storage | online |
2005 | eprint | On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems | online |
2005 | eprint | Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7 | online |
2005 | eprint | Boneh-Franklin Identity Based Encryption Revisited | online |
2005 | eprint | Truncated differential cryptanalysis of five rounds of Salsa20 | online |
2005 | eprint | Results on Rotation Symmetric Bent Functions | online |
2005 | eprint | Representing small identically self-dual matroids by self-dual codes | online |
2005 | eprint | Index Calculus in Class Groups of Plane Curves of Small Degree | online |
2005 | eprint | Exclusion-Intersection Encryption and Its Application to Searchable Encryption | online |
2005 | eprint | On Designatedly Verified (Non-interactive) Watermarking Schemes | online |
2005 | eprint | A New Protocol for Conditional Disclosure of Secrets And Its Applications | online |
2005 | eprint | Pass-thoughts: Authenticating With Our Minds | online |
2005 | eprint | Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs | online |
2005 | eprint | Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004 | online |
2005 | eprint | Breaking RSA May Be As Difficult As Factoring | online |
2005 | eprint | Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation | online |
2005 | eprint | Compact Group Signatures Without Random Oracles | online |
2005 | eprint | Append-Only Signatures | online |
2005 | eprint | One-Wayness Equivalent to General Factoring | online |
2005 | eprint | SPA Resistant Left-to-Right Integer Recodings | online |
2005 | eprint | Key Mixing in Block Ciphers through Addition modulo $2^n$ | online |
2005 | eprint | On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator | online |
2005 | eprint | Some Explicit Formulae of NAF and its Left-to-Right Analogue | online |
2005 | eprint | Browser Model for Security Analysis of Browser-Based Protocols | online |
2005 | eprint | Practical Group Signatures without Random Oracles | online |
2005 | eprint | Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials | online |
2005 | eprint | A New Short Signature Scheme Without Random Oracles from Bilinear Pairings | online |
2005 | eprint | On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases | online |
2005 | eprint | On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version) | online |
2005 | eprint | Results on Rotation Symmetric Boolean Functions on Even Number Variable | online |
2005 | eprint | Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing | online |
2005 | eprint | Dynamic Group Key Agreement in Tree-Based Setting | online |
2005 | eprint | How to Generate Universally Verifiable Signatures in Ad-Hoc Networks | online |
2005 | eprint | Formal Notions of Anonymity for Peer-to-peer Networks | online |
2005 | eprint | 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function | online |
2005 | eprint | Pairing-Friendly Elliptic Curves of Prime Order | online |
2005 | eprint | Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 | online |
2005 | eprint | Broadcast Authentication With Hashed Random Preloaded Subsets | online |
2005 | eprint | An Efficient Variant of RSA Cryptosystem with Semantic Security | online |
2005 | eprint | Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model | online |
2005 | eprint | Multivariate Quadratic Polynomials in Public Key Cryptography | online |
2005 | eprint | Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption | online |
2005 | eprint | How to Shuffle in Public | online |
2005 | eprint | A Sender Verifiable Mix-Net and a New Proof of a Shuffle | online |
2005 | eprint | Secure Group Key Establishment Revisited | online |
2005 | eprint | I-HARPS: An Efficient Key Pre-distribution Scheme | online |
2005 | eprint | Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata | online |
2005 | eprint | Scaling security in pairing-based protocols | online |
2005 | eprint | Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms | online |
2005 | eprint | How to Split a Shared Secret into Shared Bits in Constant-Round | online |
2005 | eprint | Preliminary Analysis of DHA-256 | online |
2005 | eprint | Enhanced password-based key establishment protocol | online |
2005 | eprint | On affine rank of spectrum support for plateaued function | online |
2005 | eprint | Broadcast Encryption with Random Key Pre-distribution Schemes | online |
2005 | eprint | Improved Collision Attack on MD5 | online |
2005 | eprint | Multiparty Computation Based on Connectivity of Graphs | online |
2005 | eprint | A Computationally Sound Mechanized Prover for Security Protocols | online |
2005 | eprint | Kaweichel, an Extension of Blowfish for 64-Bit Architectures | online |
2005 | eprint | Some Analysis of Radix-r Representations | online |
2005 | eprint | Small Secure Sketch for Point-Set Difference | online |
2005 | eprint | Collisions in the Original Version of a Chaotic Hash Function | online |
2005 | eprint | A High Speed Architecture for Galois/Counter Mode of Operation (GCM) | online |
2005 | eprint | Preventing Attacks on Machine Readable Travel Documents (MRTDs) | online |
2005 | eprint | Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware | online |
2005 | eprint | Building Better Signcryption Schemes with Tag-KEMs | online |
2005 | eprint | On Universal Composable Security of Time-Stamping Protocols | online |
2005 | eprint | Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited | online |
2005 | eprint | Conditionally Verifiable Signatures | online |
2005 | eprint | Anonymous Signature Schemes | online |
2005 | eprint | Secure Delegation of Elliptic-Curve Pairing | online |
2005 | eprint | Intrusion-Resilient Authentication in the Limited Communication Model | online |
2005 | eprint | Improved Collision Attack on MD4 | online |
2005 | eprint | Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows | online |
2005 | eprint | On High-Rate Cryptographic Compression Functions | online |
2005 | eprint | More Compact E-Cash with Efficient Coin Tracing | online |
2005 | eprint | On Security of Koyama Schemes | online |
2005 | eprint | Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles | online |
2005 | eprint | Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol | online |
2005 | eprint | VEST Hardware-Dedicated Stream Ciphers | online |
2005 | eprint | Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays | online |
2005 | eprint | Authenticated Encryption Mode of VEST Ciphers | online |
2005 | eprint | On the security of some password-based key agreement schemes | online |
2005 | eprint | A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512 | online |
2005 | eprint | FOX Algorithm Implementation: a hardware design approach | online |
2005 | eprint | Cryptography in Theory and Practice: The Case of Encryption in IPsec | online |
2005 | eprint | Geometric Cryptosystem | online |
2005 | eprint | Correlation-Resistant Storage via Keyword-Searchable Encryption | online |
2005 | eprint | On Constructing Parallel Pseudorandom Generators from One-Way Functions | online |
2005 | eprint | Generic On-Line/Off-Line Threshold Signatures | online |
2005 | eprint | First Steps Toward a Cryptography-Aware Language and Compiler | online |
2005 | eprint | Unified Point Addition Formul{\ae} and Side-Channel Attacks | online |
2005 | eprint | Multiple forgery attacks against Message Authentication Codes | online |
2005 | eprint | Efficient Scalar Multiplication by Isogeny Decompositions | online |
2005 | eprint | A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem | online |
2005 | eprint | Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles | online |
2005 | eprint | Modeling Insider Attacks on Group Key-Exchange Protocols | online |
2005 | eprint | On Anonymity of Group Signatures | online |
2005 | eprint | A Distinguish attack on COSvd Ciphers | online |
2005 | eprint | ID-based signature and Key-insulated threshold signature | online |
2005 | eprint | CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER | online |
2005 | eprint | Efficient Mutual Data Authentication Using Manually Authenticated Strings | online |
2005 | eprint | Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems | online |
2005 | eprint | Improved Collision Attack on Hash Function MD5 | online |
2005 | eprint | Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems | online |
2005 | eprint | On the Security of a Certificateless Public-Key Encryption | online |
2005 | eprint | Dynamic k-Times Anonymous Authentication | online |
2005 | eprint | Solutions to Key Exposure Problem in Ring Signature | online |
2005 | eprint | Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control | online |
2005 | eprint | Loud and Clear: Human-Verifiable Authentication Based on Audio | online |
2005 | eprint | Unclonable Group Identification | online |
2005 | eprint | Signature from a New Subgroup Assumption | online |
2005 | eprint | Towards computationally sound symbolic analysis of key exchange protocols | online |
2005 | eprint | F-HASH: Securing Hash Functions Using Feistel Chaining | online |
2005 | eprint | Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy | online |
2005 | eprint | Is it possible to have CBE from CL-PKE? | online |
2005 | eprint | Weaknesses in a leakage-resilient authenticated key transport protocol | online |
2005 | eprint | On the Security of Kaweichel | online |
2005 | eprint | On the Automatic Construction of Indistinguishable Operations | online |
2005 | eprint | Proxy Re-Signatures: New Definitions, Algorithms, and Applications | online |
2005 | eprint | A 32-bit RC4-like Keystream Generator | online |
2005 | eprint | Prompted User Retrieval of Secret Entropy: The Passmaze Protocol | online |
2005 | eprint | HMQV: A High-Performance Secure Diffie-Hellman Protocol | online |
2005 | eprint | Concurrent Blind Signatures without Random Oracles | online |
2005 | eprint | Secret sharing on the $d$-dimensional cube | online |
2005 | eprint | A Note on the Kasami Power Function | online |
2005 | eprint | Analyzing Unlinkability of Some Group Signatures | online |
2005 | eprint | On Boolean functions with maximum algebraic immunity | online |
2005 | eprint | Intrusion-Resilience via the Bounded-Storage Model | online |
2005 | eprint | Minimal Assumptions for Efficient Mercurial Commitments | online |
2005 | eprint | A Note on Secure Key Issuing in ID-based Cryptography | online |
2005 | eprint | A note on the n-spendable extension of Ferguson's single-term off-line coins | online |
2005 | eprint | A plausible approach to computer-aided cryptographic proofs | online |
2005 | eprint | HB++: a Lightweight Authentication Protocol Secure against Some Attacks | online |
2005 | eprint | Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol | online |
2005 | eprint | Tight bound between nonlinearity and algebraic immunity | online |
2005 | eprint | PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications | online |
2005 | eprint | One-Time Signatures Revisited: Have They Become Practical? | online |
2005 | eprint | Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families | online |
2005 | eprint | Revised: Block Cipher Based Hash Function Construction From PGV | online |
2005 | eprint | Security properties of two provably secure conference key agreement protocols | online |
2005 | eprint | Privacy-Preserving Polling using Playing Cards | online |
2005 | eprint | Linkability of Several Blind Signature Schemes | online |
2005 | eprint | An Anonymous Authentication Scheme for Trusted Computing Platform | online |
2005 | eprint | How To Exchange Secrets with Oblivious Transfer | online |
2005 | eprint | Democratic Group Signatures on Example of Joint Ventures | online |
2005 | eprint | Group Signature where Group Manager, Members and Open Authority are Identity-Based | online |
2005 | eprint | A new key exchange protocol based on the decomposition problem | online |
2005 | eprint | A Weak-Randomizer Attack on RSA-OAEP with e = 3 | online |
2005 | eprint | On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version) | online |
2005 | eprint | Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA" | online |
2005 | eprint | On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count | online |
2005 | eprint | Public Key Encryption with Keyword Search Revisited | online |
2005 | eprint | Improvement of Manik et al.??s remote user authentication scheme | online |
2005 | eprint | On the security and the efficiency of the Merkle signature scheme | online |
2005 | eprint | Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols | online |
2005 | eprint | VSH, an Efficient and Provable Collision Resistant Hash Function | online |
2005 | eprint | Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol | online |
2005 | eprint | Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography | online |
2005 | eprint | Further Constructions of Almost Resilient Functions | online |
2005 | eprint | Twin RSA | online |
2005 | eprint | Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics | online |
2005 | eprint | Universally Composable Password-Based Key Exchange | online |
2005 | eprint | Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange | online |
2005 | eprint | Weaknesses in two group Diffie-Hellman key exchange protocols | online |
2005 | eprint | A Secure Scheme for Authenticated Encryption | online |
2005 | eprint | Universally Composable Time-Stamping Schemes with Audit | online |
2005 | eprint | Weakness of shim??s New ID-based tripartite multiple-key agreement protocol | online |
2005 | eprint | Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security | online |
2005 | eprint | Seifert's RSA Fault Attack: Simplified Analysis and Generalizations | online |
2005 | eprint | Block ciphers sensitive to Groebner Basis Attacks | online |
2005 | eprint | A Practical Attack on the Root Problem in Braid Groups | online |
2005 | eprint | On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants | online |
2005 | eprint | One-Time HNP or Attacks on a Flawed El Gamal Revisited | online |
2005 | eprint | The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES | online |
2005 | eprint | Parallel and Concurrent Security of the HB and HB+ Protocols | online |
2005 | eprint | On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions | online |
2005 | eprint | A Simplified Quadratic Frobenius Primality Test | online |
2005 | eprint | An Algebraic Masking Method to Protect AES Against Power Attacks | online |
2005 | eprint | More short signatures without random oracles | online |
2005 | eprint | Another look at HMQV | online |
2005 | eprint | Equivalent Keys in Multivariate Quadratic Public Key Systems | online |
2005 | eprint | Some Thoughts on Time-Memory-Data Tradeoffs | online |
2005 | eprint | A sequence approach to constructing perfect hash families | online |
2005 | eprint | On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm | online |
2005 | eprint | Cryptanalysis of the Yang -Wang's password authentication schemes | online |
2005 | eurocrypt | Collisions of SHA-0 and Reduced SHA-1 | online |
2005 | eurocrypt | Related-Key Boomerang and Rectangle Attacks | online |
2005 | eurocrypt | On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions | online |
2005 | eurocrypt | Partial Key Exposure Attacks on RSA up to Full Size Exponents | online |
2005 | eurocrypt | Predicting and Distinguishing Attacks on RC4 Keystream Generator | online |
2005 | eurocrypt | Floating-Point LLL Revisited | online |
2005 | eurocrypt | Confusion, Quagmire and Irrelevancy: An Optimist's View of the Future of Cryptographic Research | |
2005 | eurocrypt | Counting points on elliptic curves: past, present and future | |
2005 | eurocrypt | Secure Remote Authentication Using Biometric Data | online |
2005 | eurocrypt | Cryptanalysis of the Hash Functions MD4 and RIPEMD | online |
2005 | eurocrypt | How to Break MD5 and Other Hash Functions | online |
2005 | eurocrypt | Efficient Identity-Based Encryption Without Random Oracles | online |
2005 | eurocrypt | Mercurial Commitments with Applications to Zero-Knowledge Sets | online |
2005 | eurocrypt | Differential Cryptanalysis for Multivariate Schemes | online |
2005 | eurocrypt | One-Way Chain Based Broadcast Encryption Schemes | online |
2005 | eurocrypt | The RSA Group is Pseudo-Free | online |
2005 | eurocrypt | Compact E-Cash | online |
2005 | eurocrypt | Reducing Complexity Assumptions for Statistically-Hiding Commitment | online |
2005 | eurocrypt | A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem | online |
2005 | eurocrypt | On Robust Combiners for Oblivious Transfer and Other Primitives | online |
2005 | eurocrypt | A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers | online |
2005 | eurocrypt | Smooth Projective Hashing and Two-Message Oblivious Transfer | online |
2005 | eurocrypt | Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings | online |
2005 | eurocrypt | Universally Composable Password-Based Key Exchange | online |
2005 | eurocrypt | Computational Indistinguishability Between Quantum States and Its Cryptographic Application | online |
2005 | eurocrypt | Hierarchical Identity Based Encryption with Constant Size Ciphertext | online |
2005 | eurocrypt | Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes | online |
2005 | eurocrypt | Second Preimages on n-Bit Hash Functions for Much Less than 2n Work | online |
2005 | eurocrypt | Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract) | online |
2005 | eurocrypt | Public Traceability in Traitor Tracing Schemes | online |
2005 | eurocrypt | Group Signatures with Efficient Concurrent Join | online |
2005 | eurocrypt | Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM | online |
2005 | eurocrypt | Stronger Security Bounds for Wegman-Carter-Shoup Authenticators | online |
2005 | eurocrypt | 3-Move Undeniable Signature Scheme | online |
2005 | eurocrypt | Fuzzy Identity-Based Encryption | online |
2005 | eurocrypt | Practical Cryptography in High Dimensional Tori | online |
2005 | fse | How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms | online |
2005 | fse | Two Attacks Against the HBB Stream Cipher | online |
2005 | fse | New Attacks Against Reduced-Round Versions of IDEA | online |
2005 | fse | New Applications of T-Functions in Block Ciphers and Hash Functions | online |
2005 | fse | SMASH - A Cryptographic Hash Function | online |
2005 | fse | Preimage and Collision Attacks on MD2 | online |
2005 | fse | Two-Pass Authenticated Encryption Faster Than Generic Composition | online |
2005 | fse | Unbiased Random Sequences from Quasigroup String Transformations | online |
2005 | fse | How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors | online |
2005 | fse | Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers | online |
2005 | fse | Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model | online |
2005 | fse | Attacks and Protection of Hash Functions | |
2005 | fse | A Side-Channel Analysis Resistant Description of the AES S-Box | online |
2005 | fse | DPA Attacks and S-Boxes | online |
2005 | fse | Some Attacks on the Bit-Search Generator | online |
2005 | fse | A New Class of Single Cycle T-Functions | online |
2005 | fse | Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 | online |
2005 | fse | Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers | online |
2005 | fse | The ANF of the Composition of Addition and Multiplication mod 2n with a Boolean Function | online |
2005 | fse | Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs | online |
2005 | fse | A New MAC Construction ALRED and a Specific Instance ALPHA-MAC | online |
2005 | fse | Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity | online |
2005 | fse | F-FCSR: Design of a New Class of Stream Ciphers | online |
2005 | fse | Narrow T-Functions | online |
2005 | fse | The Poly1305-AES Message-Authentication Code | online |
2005 | fse | A New Distinguisher for Clock Controlled Stream Ciphers | online |
2005 | fse | New Combined Attacks on Block Ciphers | online |
2005 | fse | Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 | online |
2005 | fse | Analysis of the Non-linear Part of Mugi | online |
2005 | fse | Small Scale Variants of the AES | online |
2005 | fse | Analysis of the Bit-Search Generator and Sequence Compression Techniques | online |
2005 | jofc | Minimal Complete Primitives for Secure Multi-Party Computation | 37-61 |
2005 | jofc | Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials | 291-311 |
2005 | jofc | Polynomial and Normal Bases for Finite Fields | 337-355 |
2005 | jofc | CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions | 111-131 |
2005 | jofc | An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem | 91-110 |
2005 | jofc | Analysis and Design of Distributed Key Distribution Centers | 391-414 |
2005 | jofc | Secure Multi-Party Computation without Agreement | 247-287 |
2005 | jofc | Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography | 219-246 |
2005 | jofc | Preface | 187-189 |
2005 | jofc | Secure Classical Bit Commitment Using Fixed Capacity Communication Channels | 313-335 |
2005 | jofc | Partial Key Recovery Attack Against RMAC | 375-389 |
2005 | jofc | Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security | 133-165 |
2005 | jofc | Computationally Secure Oblivious Transfer | 1-35 |
2005 | jofc | Analysis of the Sliding Window Powering Algorithm | 63-76 |
2005 | jofc | Byzantine Agreement Given Partial Broadcast | 191-217 |
2005 | jofc | The Complexity of Certain Multi-Exponentiation Techniques in Cryptography | 357-373 |
2005 | jofc | Building Curves with Arbitrary Small MOV Degree over Finite Prime Fields | 79-89 |
2005 | jofc | Low Bandwidth Dynamic Traitor Tracing Schemes | 167-183 |
2005 | pkc | Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption | online |
2005 | pkc | Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order | online |
2005 | pkc | Breaking a Cryptographic Protocol with Pseudoprimes | online |
2005 | pkc | Symmetric Subgroup Membership Problems | online |
2005 | pkc | A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible | online |
2005 | pkc | The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity | online |
2005 | pkc | Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring | online |
2005 | pkc | From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited | online |
2005 | pkc | Improved Identity-Based Signcryption | online |
2005 | pkc | Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries | online |
2005 | pkc | Securing RSA-KEM via the AES | online |
2005 | pkc | Cryptanalysis of the Tractable Rational Map Cryptosystem | online |
2005 | pkc | Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions | online |
2005 | pkc | Experimenting with Faults, Lattices and the DSA | online |
2005 | pkc | The Security of the FDH Variant of Chaum's Undeniable Signature Scheme | online |
2005 | pkc | Optimizing Robustness While Generating Shared Secret Safe Primes | online |
2005 | pkc | On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods | online |
2005 | pkc | Converse Results to the Wiener Attack on RSA | online |
2005 | pkc | RSA with Balanced Short Exponents and Its Application to Entity Authentication | online |
2005 | pkc | Tractable Rational Map Signature | online |
2005 | pkc | Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems | online |
2005 | pkc | A New Related Message Attack on RSA | online |
2005 | pkc | Fast Multi-computations with Integer Similarity Strategy | online |
2005 | pkc | Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings | online |
2005 | pkc | One-Time Verifier-Based Encrypted Key Exchange | online |
2005 | pkc | Password-Based Authenticated Key Exchange in the Three-Party Setting | online |
2005 | pkc | Cryptanalysis of HFEv and Internal Perturbation of HFE | online |
2005 | pkc | CBE from CL-PKE: A Generic Construction and Efficient Schemes | online |
2005 | pkc | A Verifiable Random Function with Short Proofs and Keys | online |
2005 | tcc | Public-Key Steganography with Active Attacks | online |
2005 | tcc | Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs | online |
2005 | tcc | The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives | online |
2005 | tcc | Characterizing Ideal Weighted Threshold Secret Sharing | online |
2005 | tcc | The Universal Composable Security of Quantum Key Distribution | online |
2005 | tcc | Evaluating 2-DNF Formulas on Ciphertexts | online |
2005 | tcc | Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation | online |
2005 | tcc | Universally Composable Privacy Amplification Against Quantum Adversaries | online |
2005 | tcc | Adaptively-Secure, Non-interactive Public-Key Encryption | online |
2005 | tcc | Hardness Amplification of Weakly Verifiable Puzzles | online |
2005 | tcc | Toward Privacy in Public Databases | online |
2005 | tcc | A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes | online |
2005 | tcc | Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation | online |
2005 | tcc | On the Relationships Between Notions of Simulation-Based Security | online |
2005 | tcc | Upper and Lower Bounds on Black-Box Steganography | online |
2005 | tcc | Error Correction in the Bounded Storage Model | online |
2005 | tcc | Chosen-Ciphertext Security of Multiple Encryption | online |
2005 | tcc | Entropic Security and the Encryption of High Entropy Messages | online |
2005 | tcc | Keyword Search and Oblivious Pseudorandom Functions | online |
2005 | tcc | Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem | online |
2005 | tcc | Cryptography in Subgroups of Zn | online |
2005 | tcc | Comparing Two Notions of Simulatability | online |
2005 | tcc | Fair-Zero Knowledge | online |
2005 | tcc | How to Securely Outsource Cryptographic Computations | online |
2005 | tcc | Sufficient Conditions for Collision-Resistant Hashing | online |
2005 | tcc | Further Simplifications in Proactive RSA Signatures | online |
2005 | tcc | Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs | online |
2005 | tcc | Secure Computation of the Mean and Related Statistics | online |
2005 | tcc | Optimal Error Correction Against Computationally Bounded Noise | online |
2005 | tcc | Adaptive Security of Symbolic Encryption | online |
2005 | tcc | A Universally Composable Secure Channel Based on the KEM-DEM Framework | online |
2005 | tcc | Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings | online |
2005 | tcc | On Hardness Amplification of One-Way Functions | online |