year |
venue |
title |
pages |
2007 | asiacrypt | Cryptanalysis of the Tiger Hash Function | online |
2007 | asiacrypt | Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys | online |
2007 | asiacrypt | How to Build a Hash Function from Any Collision-Resistant Function | online |
2007 | asiacrypt | A Simple Variant of the Merkle-Damgård Scheme with a Permutation | online |
2007 | asiacrypt | Relations Among Notions of Non-malleability for Encryption | online |
2007 | asiacrypt | Multi-party Indirect Indexing and Applications | online |
2007 | asiacrypt | Bounded CCA2-Secure Encryption | online |
2007 | asiacrypt | Authenticated Key Exchange and Key Encapsulation in the Standard Model | online |
2007 | asiacrypt | Symmetric Key Cryptography on Modern Graphics Hardware | online |
2007 | asiacrypt | Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions | online |
2007 | asiacrypt | On Tweaking Luby-Rackoff Blockciphers | online |
2007 | asiacrypt | Efficient Byzantine Agreement with Faulty Minority | online |
2007 | asiacrypt | Simple and Efficient Perfectly-Secure Asynchronous MPC | online |
2007 | asiacrypt | Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings | online |
2007 | asiacrypt | Miniature CCA2 PK Encryption: Tight Security Without Redundancy | online |
2007 | asiacrypt | Cryptanalysis of Grindahl | online |
2007 | asiacrypt | A Key Recovery Attack on Edon80 | online |
2007 | asiacrypt | Information-Theoretic Security Without an Honest Majority | online |
2007 | asiacrypt | Two-Party Computing with Encrypted Data | online |
2007 | asiacrypt | Blind Identity-Based Encryption and Simulatable Oblivious Transfer | online |
2007 | asiacrypt | Group Encryption | online |
2007 | asiacrypt | Seven-Property-Preserving Iterated Hashing: ROX | online |
2007 | asiacrypt | Anonymous Quantum Communication | online |
2007 | asiacrypt | Known-Key Distinguishers for Some Block Ciphers | online |
2007 | asiacrypt | Faster Addition and Doubling on Elliptic Curves | online |
2007 | asiacrypt | A Non-interactive Shuffle with Pairing Based Verifiability | online |
2007 | asiacrypt | Obtaining Universally Composable Security: Towards the Bare Bones of Trust | online |
2007 | asiacrypt | Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions | online |
2007 | asiacrypt | When e-th Roots Become Easier Than Factoring | online |
2007 | asiacrypt | Fully Anonymous Group Signatures Without Random Oracles | online |
2007 | asiacrypt | On Efficient Message Authentication Via Block Cipher Design Techniques | online |
2007 | asiacrypt | Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations | online |
2007 | asiacrypt | On Privacy Models for RFID | online |
2007 | asiacrypt | A Kilobit Special Number Field Sieve Factorization | online |
2007 | asiacrypt | Boosting Merkle-Damgård Hashing for Message Authentication | online |
2007 | asiacrypt | Secure Protocols with Asymmetric Trust | online |
2007 | ches | Side Channel Cryptanalysis of a Higher Order Masking Scheme | online |
2007 | ches | FPGA Design of Self-certified Signature Verification on Koblitz Curves | online |
2007 | ches | A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter | online |
2007 | ches | RF-DNA: Radio-Frequency Certificates of Authenticity | online |
2007 | ches | How to Maximize the Potential of FPGA Resources for Modular Exponentiation | online |
2007 | ches | CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method | online |
2007 | ches | Gaussian Mixture Models for Higher-Order Side Channel Analysis | online |
2007 | ches | Differential Behavioral Analysis | online |
2007 | ches | On the Implementation of a Fast Prime Generation Algorithm | online |
2007 | ches | Collision Attacks on AES-Based MAC: Alpha-MAC | online |
2007 | ches | Power Analysis Resistant AES Implementation with Instruction Set Extensions | online |
2007 | ches | Masking and Dual-Rail Logic Don't Add Up | online |
2007 | ches | DPA-Resistance Without Routing Constraints? | online |
2007 | ches | AES Encryption Implementation and Analysis on Commodity Graphics Processing Units | online |
2007 | ches | Trustworthy Hardware | |
2007 | ches | Contactless authentication protocols for MRTDs | |
2007 | ches | RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? | online |
2007 | ches | Secret External Encodings Do Not Prevent Transient Fault Analysis | online |
2007 | ches | Evaluation of the Masked Logic Style MDPL on a Prototype Chip | online |
2007 | ches | PRESENT: An Ultra-Lightweight Block Cipher | online |
2007 | ches | Two New Techniques of Side-Channel Cryptanalysis | online |
2007 | ches | MAME: A Compression Function with Reduced Hardware Requirements | online |
2007 | ches | High-Speed True Random Number Generation with Logic Gates Only | online |
2007 | ches | Arithmetic Operators for Pairing-Based Cryptography | online |
2007 | ches | On the Power of Bitslice Implementation on Intel Core2 Processor | online |
2007 | ches | Multi-gigabit GCM-AES Architecture Optimized for FPGAs | online |
2007 | ches | Power and EM Attacks on Passive 13.56 MHz RFID Devices | online |
2007 | ches | TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks | online |
2007 | ches | Information Theoretic Evaluation of Side-Channel Resistant Logic Styles | online |
2007 | ches | A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations | online |
2007 | ches | Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA | online |
2007 | ches | FPGA Intrinsic PUFs and Their Use for IP Protection | online |
2007 | ches | Highly Regular Right-to-Left Algorithms for Scalar Multiplication | online |
2007 | ches | Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings | online |
2007 | crypto | Leaking Secrets: Exploring the Chasm Between Strong Algorithms and Strong Systems | |
2007 | crypto | Secure Hybrid Encryption from Weakened Key Encapsulation | online |
2007 | crypto | Information Security Economics - and Beyond | online |
2007 | crypto | Deterministic and Efficiently Searchable Encryption | online |
2007 | crypto | Amplifying Collision Resistance: A Complexity-Theoretic Treatment | online |
2007 | crypto | Security-Amplifying Combiners for Collision-Resistant Hash Functions | online |
2007 | crypto | Secure Identification and QKD in the Bounded-Quantum-Storage Model | online |
2007 | crypto | Practical Cryptanalysis of SFLASH | online |
2007 | crypto | Invertible Universal Hashing and the TET Encryption Mode | online |
2007 | crypto | Improved Analysis of Kannan's Shortest Lattice Vector Algorithm | online |
2007 | crypto | Rerandomizable RCCA Encryption | online |
2007 | crypto | A Tight High-Order Entropic Quantum Uncertainty Relation with Applications | online |
2007 | crypto | On Secure Multi-party Computation in Black-Box Groups | online |
2007 | crypto | Cryptography in the Multi-string Model | online |
2007 | crypto | Universally-Composable Two-Party Computation in Two Rounds | online |
2007 | crypto | Cryptography with Constant Input Locality | online |
2007 | crypto | Public Key Encryption That Allows PIR Queries | online |
2007 | crypto | Simulatable VRFs with Applications to Multi-theorem NIZK | online |
2007 | crypto | Scalable and Unconditionally Secure Multiparty Computation | online |
2007 | crypto | A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness | online |
2007 | crypto | Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach | online |
2007 | crypto | A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073 | online |
2007 | crypto | Hash Functions and the (Amplified) Boomerang Attack | online |
2007 | crypto | Pirate Evolution: How to Make the Most of Your Traitor Keys | online |
2007 | crypto | Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | online |
2007 | crypto | How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? | online |
2007 | crypto | Indistinguishability Amplification | online |
2007 | crypto | Domain Extension of Public Random Functions: Beyond the Birthday Barrier | online |
2007 | crypto | Random Oracles and Auxiliary Input | online |
2007 | crypto | A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU | online |
2007 | crypto | Reducing Trust in the PKG in Identity Based Cryptosystems | online |
2007 | crypto | Chernoff-Type Direct Product Theorems | online |
2007 | crypto | How Should We Solve Search Problems Privately? | online |
2007 | crypto | A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator | online |
2007 | crypto | A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra | online |
2007 | crypto | Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings | online |
2007 | eprint | Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions | online |
2007 | eprint | Secure Hybrid Encryption from Weakened Key Encapsulation | online |
2007 | eprint | Improved Security Analysis of PMAC | online |
2007 | eprint | Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol | online |
2007 | eprint | An improved collision probability for CBC-MAC and PMAC | online |
2007 | eprint | Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables | online |
2007 | eprint | From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme | online |
2007 | eprint | Relations Among Notions of Plaintext Awareness | online |
2007 | eprint | A New Type of Cipher: DICING_CSB | online |
2007 | eprint | Improved security analysis of OMAC | online |
2007 | eprint | Cryptanalysis of white box DES implementations | online |
2007 | eprint | Fully Resilient Traitor Tracing Scheme using Key Update | online |
2007 | eprint | Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman | online |
2007 | eprint | Strengthening the Tree-Based Hash Protocols against Compromise of some Tags | online |
2007 | eprint | Best Quadratic Approximations of Cubic Boolean Functions | online |
2007 | eprint | Linearization Attacks Against Syndrome Based Hashes | online |
2007 | eprint | Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 | online |
2007 | eprint | Construction of efficient and secure Pairing Algorithm and its Application | online |
2007 | eprint | New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures | online |
2007 | eprint | Secret sharing on infinite graphs | online |
2007 | eprint | Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation | online |
2007 | eprint | The Security of the Extended Codebook (XCB) Mode of Operation | online |
2007 | eprint | Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes | online |
2007 | eprint | Optimizing Multiprecision Multiplication for Public Key Cryptography | online |
2007 | eprint | Authorship Proof for Textual Document | online |
2007 | eprint | A Note on Automata-based Dynamic Convolutional Cryptosystems | online |
2007 | eprint | Reflection Attacks on Product Ciphers | online |
2007 | eprint | On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials | online |
2007 | eprint | Design and Primitive Specification for Shannon | online |
2007 | eprint | Compression Functions Suitable for the Multi-Property-Preserving Transform | online |
2007 | eprint | A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three | online |
2007 | eprint | A Forward Secure Remote User Authentication Scheme | online |
2007 | eprint | Direct Reduction of String (1,2)-OT to Rabin's OT | online |
2007 | eprint | A Bound on the Size of Separating Hash Families | online |
2007 | eprint | New Constructions of Fuzzy Identity-Based Encryption | online |
2007 | eprint | On Non-Randomness of the Permutation after RC4 Key Scheduling | online |
2007 | eprint | A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator | online |
2007 | eprint | Novel Approaches for Improving the Power Consumption Models in Correlation Analysis | online |
2007 | eprint | Security Arguments for a Class of ID-based Signatures | online |
2007 | eprint | Locally Invertible Boolean Mappings | online |
2007 | eprint | Special block cipher family DN and new generation SNMAC-type hash function family HDN | online |
2007 | eprint | Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242 | online |
2007 | eprint | Forward-secure RFID Authentication and Key Exchange | online |
2007 | eprint | Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound | online |
2007 | eprint | Forward-Secure Sequential Aggregate Authentication | online |
2007 | eprint | A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields | online |
2007 | eprint | Compiler Assisted Elliptic Curve Cryptography | online |
2007 | eprint | A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three | online |
2007 | eprint | Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition | online |
2007 | eprint | Secure Similarity Search | online |
2007 | eprint | Cryptanalysis of the KeeLoq block cipher | online |
2007 | eprint | Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode | online |
2007 | eprint | Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments | online |
2007 | eprint | Formal Certification of Code-Based Cryptographic Proofs | online |
2007 | eprint | Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians | online |
2007 | eprint | Security under Key-Dependent Inputs | online |
2007 | eprint | The simplest method for constructing APN polynomials EA-inequivalent to power functions | online |
2007 | eprint | SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME | online |
2007 | eprint | A Survey of Single Database PIR: Techniques and Applications | online |
2007 | eprint | Improving Upon the TET Mode of Operation | online |
2007 | eprint | Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries | online |
2007 | eprint | On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks | online |
2007 | eprint | Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3 | online |
2007 | eprint | A New Security Definition for Public Key Encryption Schemes and Its Applications | online |
2007 | eprint | Algebraic and Slide Attacks on KeeLoq | online |
2007 | eprint | On the Big Gap Between $|p|$ and $|q|$ in DSA | online |
2007 | eprint | Constructing new APN functions from known ones | online |
2007 | eprint | Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2} | online |
2007 | eprint | Algebraic Lower Bounds for Computing on Encrypted Data | online |
2007 | eprint | Identifying Ideal Lattices | online |
2007 | eprint | How to Derive Lower Bound on Oblivious Transfer Reduction | online |
2007 | eprint | Attribute-Based Encryption with Non-Monotonic Access Structures | online |
2007 | eprint | Low-Density Attack Revisited | online |
2007 | eprint | Towards Provable Security for Routing Protocols in Mobile ad Hoc Networks | online |
2007 | eprint | Faster and Shorter Password-Authenticated Key Exchange | online |
2007 | eprint | Efficient Hierarchical Identity Based Signature in the Standard Model | online |
2007 | eprint | Efficient Password-based Authenticated Key Exchange without Public Information | online |
2007 | eprint | Nominative Signature: Application, Security Model and Construction | online |
2007 | eprint | Secure Identification and QKD in the Bounded-Quantum-Storage Model | online |
2007 | eprint | Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected) | online |
2007 | eprint | A Tight High-Order Entropic Quantum Uncertainty Relation With Applications | online |
2007 | eprint | Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version) | online |
2007 | eprint | A Tunable Broadcast Encryption Scheme | online |
2007 | eprint | A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard | online |
2007 | eprint | Remote Power Analysis of {RFID} Tags | online |
2007 | eprint | Public Key Encryption that Allows PIR Queries | online |
2007 | eprint | Isolated Proofs of Knowledge and Isolated Zero Knowledge | online |
2007 | eprint | A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants | online |
2007 | eprint | Universally Composable Multiparty Computation with Partially Isolated Parties | online |
2007 | eprint | Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy | online |
2007 | eprint | Towards Key-Dependent Message Security in the Standard Model | online |
2007 | eprint | Almost Secure (1-Round, n-Channel) Message Transmission Scheme | online |
2007 | eprint | New Constructions for UC Secure Computation using Tamper-proof Hardware | online |
2007 | eprint | On bent functions with zero second derivatives | online |
2007 | eprint | Encryption Techniques for Secure Database Outsourcing | online |
2007 | eprint | MPC vs. SFE: Perfect Security in a Unified Corruption Model | online |
2007 | eprint | A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat | online |
2007 | eprint | How To Find Many Collisions of 3-Pass HAVAL | online |
2007 | eprint | Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised) | online |
2007 | eprint | Weakly only Unforgeable Signature and Its Application in Group Signature | online |
2007 | eprint | VHASH Security | online |
2007 | eprint | Revisiting an Efficient Elliptic Curve Key Agreement Protocol | online |
2007 | eprint | On the Security of a Class of Image Encryption Scheme | online |
2007 | eprint | Deniable Authentication on the Internet | online |
2007 | eprint | Efficient Implementation of the Pairing on Mobilephones using BREW | online |
2007 | eprint | Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code | online |
2007 | eprint | Multi-Party Indirect Indexing and Applications | online |
2007 | eprint | Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions | online |
2007 | eprint | A New Security Model for Cross-Realm C2C-PAKE Protocol | online |
2007 | eprint | MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL | online |
2007 | eprint | Updated standards for validating elliptic curves | online |
2007 | eprint | Non-Interactive Proofs for Integer Multiplication | online |
2007 | eprint | Security Analysis of WAPI Authentication and Key Exchange Protocol | online |
2007 | eprint | Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy | online |
2007 | eprint | Analysis of Underlying Assumptions in NIST DRBGs | online |
2007 | eprint | An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers | online |
2007 | eprint | Secure computation on incomplete networks | online |
2007 | eprint | Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations | online |
2007 | eprint | Lai-Massey Scheme and Quasi-Feistel Networks | online |
2007 | eprint | On the security of an image encryption scheme | online |
2007 | eprint | A Framework for Efficient and Composable Oblivious Transfer | online |
2007 | eprint | Arithmetic Operators for Pairing-Based Cryptography | online |
2007 | eprint | Statistically Hiding Sets | online |
2007 | eprint | PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP | online |
2007 | eprint | On Tweaking Luby-Rackoff Blockciphers | online |
2007 | eprint | HAPADEP: Human Asisted Pure Audio Device Pairing | online |
2007 | eprint | A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval | online |
2007 | eprint | Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants | online |
2007 | eprint | New Local Collisions for the SHA-2 Hash Family | online |
2007 | eprint | Generic Certificateless Encryption in the Standard Model | online |
2007 | eprint | Multiparty Computation to Generate Secret Permutations | online |
2007 | eprint | Somos Sequence Near-Addition Formulas and Modular Theta Functions | online |
2007 | eprint | Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures | online |
2007 | eprint | Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves | online |
2007 | eprint | Secret sharing on the infinite ladder | online |
2007 | eprint | Classes of Quadratic APN Trinomials and Hexanomials and Related Structures | online |
2007 | eprint | A Block Cipher based PRNG Secure Against Side-Channel Key Recovery | online |
2007 | eprint | Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits | online |
2007 | eprint | A Note on Signature Standards | online |
2007 | eprint | Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications | online |
2007 | eprint | Improving the Round Complexity of 'Round-Optimal' VSS | online |
2007 | eprint | Practical Password Recovery on an MD5 Challenge and Response | online |
2007 | eprint | Intrusion-Resilient Secret Sharing | online |
2007 | eprint | On the Role of Scheduling in Simulation-Based Security | online |
2007 | eprint | Sufficient Conditions for Computational Intractability Regarding Generic Algorithms | online |
2007 | eprint | Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic | online |
2007 | eprint | Proxy Re-encryption Systems for Identity-based Encryption | online |
2007 | eprint | Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings | online |
2007 | eprint | Statistical Testing for Disk Encryption Modes of Operations | online |
2007 | eprint | Isodual Reduction of Lattices | online |
2007 | eprint | Fuzzy Private Matching (Extended Abstract) | online |
2007 | eprint | A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA | online |
2007 | eprint | A Proof of Security of a Mesh Security Architecture | online |
2007 | eprint | Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem | online |
2007 | eprint | Pairings on Jacobians of Hyperelliptic Curves | online |
2007 | eprint | An Improved Distinguisher for Dragon | online |
2007 | eprint | Breaking the Symmetry: a Way to Resist the New Differential Attack | online |
2007 | eprint | How to Enrich the Message Space of a Cipher | online |
2007 | eprint | Cryptanalysis of Rational Multivariate Public Key Cryptosystems | online |
2007 | eprint | Construction of Pairing-Friendly Elliptic Curves | online |
2007 | eprint | Reducing Trust in the PKG in Identity Based Cryptosystems | online |
2007 | eprint | Privacy-Preserving Distributed Set Intersection | online |
2007 | eprint | Universally Composable Multi-Party Computation with an Unreliable Common Reference String | online |
2007 | eprint | On the Decomposition of an Element of Jacobian of a Hyperelliptic Curve | online |
2007 | eprint | FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY | online |
2007 | eprint | An Enhanced ID-based Deniable Authentication Protocol on Pairings | online |
2007 | eprint | Group-oriented encryption secure against collude attack | online |
2007 | eprint | High Efficiency Feedback Shift Register: $\sigma-$LFSR | online |
2007 | eprint | On the Authentication of One Popular Signcryption Scheme | online |
2007 | eprint | Quadratic Almost Perfect Nonlinear Functions With Many Terms | online |
2007 | eprint | A Meet-in-the-Middle Collision Attack Against the New FORK-256 | online |
2007 | eprint | A Zero-Knowledge Identification and Key Agreement Protocol | online |
2007 | eprint | On Factoring Arbitrary Integers with Known Bits | online |
2007 | eprint | Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity | online |
2007 | eprint | Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose | online |
2007 | eprint | Smooth Projective Hashing and Two-Message Oblivious Transfer | online |
2007 | eprint | An Efficient Range-Bounded Commitment Scheme | online |
2007 | eprint | Rerandomizable RCCA Encryption | online |
2007 | eprint | Fast Point Multiplication on Elliptic Curves of Even Order | online |
2007 | eprint | Breaking 104 bit WEP in less than 60 seconds | online |
2007 | eprint | Algebraic Structure Defectoscopy | online |
2007 | eprint | Certificateless Encryption Schemes Strongly Secure in the Standard Model | online |
2007 | eprint | On The Inequivalence Of Ness-Helleseth APN Functions | online |
2007 | eprint | On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan | online |
2007 | eprint | X-FCSR: a new software oriented stream cipher based upon FCSRs | online |
2007 | eprint | Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS | online |
2007 | eprint | Cryptanalysis of Two New Instances of TTM Cryptosystem | online |
2007 | eprint | Rebuttal of overtaking VEST | online |
2007 | eprint | Oblivious Transfer via McEliece's PKC and Permuted Kernels | online |
2007 | eprint | Attacking the IPsec Standards in Encryption-only Configurations | online |
2007 | eprint | Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol | online |
2007 | eprint | An Interesting Member ID-based Group Signature | online |
2007 | eprint | Non-Interactive Anonymous Credentials | online |
2007 | eprint | CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts | online |
2007 | eprint | On the insecurity of interchanged use of OFB and CBC modes of operation | online |
2007 | eprint | Computationally Sound Mechanized Proofs of Correspondence Assertions | online |
2007 | eprint | (Convertible) Undeniable Signatures without Random Oracles | online |
2007 | eprint | An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem | online |
2007 | eprint | Analysis of Local Optima in Block Ciphers | online |
2007 | eprint | Some Results on Anonymity in Hybrid Encryption | online |
2007 | eprint | On Ciphertext Undetectability | online |
2007 | eprint | Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions | online |
2007 | eprint | Interactive and Noninteractive Zero Knowledge Coincide in the Help Model | online |
2007 | eprint | Equivocal Blind Signatures and Adaptive UC-Security | online |
2007 | eprint | Implementing Cryptographic Pairings over Barreto-Naehrig Curves | online |
2007 | eprint | New Communication-Efficient Oblivious Transfer Protocols Based on Pairings | online |
2007 | eprint | A novel public key crypto system based on semi-modules over quotient semi-rings | online |
2007 | eprint | Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift | online |
2007 | eprint | A Fast Protocol for Computationally Private Information Retrieval | online |
2007 | eprint | Efficient ID-based Signature Without Trusted PKG | online |
2007 | eprint | Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithm | online |
2007 | eprint | Fair Exchange Signature Schemes | online |
2007 | eprint | Almost-everywhere Secure Computation | online |
2007 | eprint | Multivariates Polynomials for Hashing | online |
2007 | eprint | Second Preimage Attacks on Dithered Hash Functions | online |
2007 | eprint | Efficient Pairing Computation on Curves | online |
2007 | eprint | Proxy Re-Signature Schemes without Random Oracles | online |
2007 | eprint | The Delivery and Evidences Layer | online |
2007 | eprint | On the security defects of an image encryption scheme | online |
2007 | eprint | Hidden Identity-Based Signatures | online |
2007 | eprint | A Short Signature Scheme in the Standard Model | online |
2007 | eprint | Practical Cryptanalysis of SFLASH | online |
2007 | eprint | Ceremony Design and Analysis | online |
2007 | eprint | An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol | online |
2007 | eprint | REMARKS ON IBE SCHEME OF WANG AND CAO | online |
2007 | eprint | Offline/Online Mixing | online |
2007 | eprint | Another Look at Automated Theorem-Proving | online |
2007 | eprint | Two New Examples of TTM | online |
2007 | eprint | Robust, Anonymous RFID Authentication with Constant Key-Lookup | online |
2007 | eprint | Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments | online |
2007 | eprint | Turbo SHA-2 | online |
2007 | eprint | Time Capsule Signature: Efficient and Provably Secure Constructions | online |
2007 | eprint | Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products | online |
2007 | eprint | Using decision problems in public key cryptography | online |
2007 | eprint | Secure PRNGs from Specialized Polynomial Maps over Any $F_q$ | online |
2007 | eprint | Practical Compact E-Cash | online |
2007 | eprint | How to Model Bounded Computation in Long-Lived Systems | online |
2007 | eprint | Towards Generating Secure Keys for Braid Cryptography | online |
2007 | eprint | Provably Secure Grouping-proofs for RFID tags | online |
2007 | eprint | Generators of Jacobians of Hyperelliptic Curves | online |
2007 | eprint | Differential Cryptanalysis of PRESENT | online |
2007 | eprint | Deterministic History-Independent Strategies for Storing Information on Write-Once Memories | online |
2007 | eprint | Building a Collision-Resistant Compression Function from Non-Compressing Primitives | online |
2007 | eprint | CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited | online |
2007 | eprint | Inverted Edwards coordinates | online |
2007 | eprint | Cryptographic Hardness based on the Decoding of Reed-Solomon Codes | online |
2007 | eprint | Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol | online |
2007 | eprint | Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions | online |
2007 | eprint | Proposing a Master One-Way Function | online |
2007 | eprint | Efficient Non-interactive Proof Systems for Bilinear Groups | online |
2007 | eprint | Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack | online |
2007 | eprint | Computational Semantics for Basic Protocol Logic - A Stochastic Approach | online |
2007 | eprint | Optimizing double-base elliptic-curve single-scalar multiplication | online |
2007 | eprint | ConSum v0: An Experimental Cipher | online |
2007 | eprint | Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol | online |
2007 | eprint | A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher | online |
2007 | eprint | Hash Function Design Principles Supporting Variable Output Lengths from One Small Function | online |
2007 | eprint | Attribute Based Group Signature Scheme | online |
2007 | eprint | Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three | online |
2007 | eprint | Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing | online |
2007 | eprint | An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings | online |
2007 | eprint | Collusion-Resistant Group Key Management Using Attribute-Based Encryption | online |
2007 | eprint | Cryptanalysis of the Random Number Generator of the Windows Operating System | online |
2007 | eprint | Bingo Voting: Secure and coercion-free voting using a trusted random number generator | online |
2007 | eprint | A Critical Analysis and Improvement of AACS Drive-Host Authentication | online |
2007 | eprint | Secure Deniable Authenticated Key Establishment for Internet Protocols | online |
2007 | eprint | The role of help in Classical and Quantum Zero-Knowledge | online |
2007 | eprint | Yet Another MicroArchitectural Attack: Exploiting I-cache | online |
2007 | eprint | Structural Identity-Based Encryption | online |
2007 | eprint | Inductive Proof Method for Computational Secrecy | online |
2007 | eprint | Finding Low Weight Polynomial Multiples Using Lattices | online |
2007 | eprint | Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords | online |
2007 | eprint | When e-th Roots Become Easier Than Factoring | online |
2007 | eprint | Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time | online |
2007 | eprint | On prime-order elliptic curves with embedding degrees k=3,4 and 6 | online |
2007 | eprint | Random Oracles and Auxiliary Input | online |
2007 | eprint | Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10 | online |
2007 | eprint | On the Security of Protocols with Logarithmic Communication Complexity | online |
2007 | eprint | Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros | online |
2007 | eprint | Clone Resistant Mutual Authentication for Low-Cost RFID Technology | online |
2007 | eprint | Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves | online |
2007 | eprint | Chosen-Ciphertext Secure Proxy Re-Encryption | online |
2007 | eprint | On compressible pairings and their computation | online |
2007 | eprint | Batch Verification of Short Signatures | online |
2007 | eprint | Cryptanalysis of LASH | online |
2007 | eprint | Provable Secure Generalized Signcryption | online |
2007 | eprint | Notions of Efficiency in Simulation Paradigm | online |
2007 | eprint | Counting hyperelliptic curves that admit a Koblitz model | online |
2007 | eprint | Trapdoors for Hard Lattices and New Cryptographic Constructions | online |
2007 | eprint | Embedding Degree of Hyperelliptic Curves with Complex Multiplication | online |
2007 | eprint | An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees | online |
2007 | eprint | Seven-Property-Preserving Iterated Hashing: ROX | online |
2007 | eprint | Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$ | online |
2007 | eprint | Space-Efficient Identity Based Encryption Without Pairings | online |
2007 | eprint | Irreducibility to the One-More Evaluation Problems: More May Be Less | online |
2007 | eprint | Utility Sampling for Trust Metrics in PKI | online |
2007 | eprint | New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B | online |
2007 | eprint | New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three | online |
2007 | eprint | Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes | online |
2007 | eprint | A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring | online |
2007 | eprint | Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing | online |
2007 | eprint | A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields | online |
2007 | eprint | Multiparty Key Agreement Using Bilinear Map | online |
2007 | eprint | Optimistic Fair Exchange in a Multi-user Setting | online |
2007 | eprint | An Improved Remote User Authentication Scheme using Bilinear Pairings | online |
2007 | eprint | Provably Secure Ciphertext Policy ABE | online |
2007 | eprint | Faster Group Operations on Special Elliptic Curves | online |
2007 | eprint | Provable password-based tripartite key agreement protocol | online |
2007 | eprint | Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems | online |
2007 | eprint | New FORK-256 | online |
2007 | eprint | Template Attacks with a Power Model | online |
2007 | eprint | Fully Anonymous Group Signatures without Random Oracles | online |
2007 | eprint | Tight bounds between algebraic immunity and nonlinearities of high orders | online |
2007 | eprint | Executing Modular Exponentiation on a Graphics Accelerator | online |
2007 | eprint | Proposal of a new efficient public key system for encryption and digital signatures | online |
2007 | eprint | An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol | online |
2007 | eprint | A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol | online |
2007 | eprint | Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption | online |
2007 | eprint | Weak adaptive chosen ciphertext secure hybrid encryption scheme | online |
2007 | eprint | Deniable Internet Key-Exchange | online |
2007 | eprint | Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description | online |
2007 | eprint | Optimal Irreducible Polynomials for GF(2^m) Arithmetic | online |
2007 | eprint | Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions | online |
2007 | eprint | Some Identity Based Strong Bi-Designated Verifier Signature Schemes | online |
2007 | eprint | Short Group Signature without Random Oracles | online |
2007 | eprint | Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities | online |
2007 | eprint | Precise Concurrent Zero Knowledge | online |
2007 | eprint | Verifying Statistical Zero Knowledge with Approximate Implementations | online |
2007 | eprint | Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field | online |
2007 | eprint | An Efficient Certificateless Signature Scheme | online |
2007 | eprint | On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups | online |
2007 | eprint | On-Line Ciphers and the Hash-CBC Constructions | online |
2007 | eprint | Efficient Certificateless Signatures Suitable for Aggregation | online |
2007 | eprint | Mutual Information Analysis -- A Universal Differential Side-Channel Attack | online |
2007 | eprint | Analysis and optimization of elliptic-curve single-scalar multiplication | online |
2007 | eprint | A Framework for Game-Based Security Proofs | online |
2007 | eprint | Precise Zero-Knowledge in Concurrent Setting | online |
2007 | eprint | ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures | online |
2007 | eprint | Comparing Implementation Efficiency of Ordinary and Squared Pairings | online |
2007 | eprint | The BBG HIBE Has Limited Delegation | online |
2007 | eprint | Saving Private Randomness in One-Way Functions and Pseudorandom Generators | online |
2007 | eprint | Provable Data Possession at Untrusted Stores | online |
2007 | eprint | Practical Anonymous Divisible E-Cash From Bounded Accumulators | online |
2007 | eprint | Kipnis-Shamir's Attack on HFE Revisited | online |
2007 | eprint | Guarantees for Customers of Incentive Anonymizing Networks | online |
2007 | eprint | Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption | online |
2007 | eprint | Verifiable Attribute-based Encryption | online |
2007 | eprint | A kilobit special number field sieve factorization | online |
2007 | eprint | Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures | online |
2007 | eprint | Automatic Search of Differential Path in MD4 | online |
2007 | eprint | Efficient GF(3m) Multiplication Algorithm for eta T Pairing | online |
2007 | eprint | On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity | online |
2007 | eprint | Secure Computation Without Authentication | online |
2007 | eprint | RC4 State Information at Any Stage Reveals the Secret Key | online |
2007 | eprint | A Synthetic Indifferentiability Analysis of Block Cipher based Hash Functions | online |
2007 | eprint | Bilateral Unknown Key-Share Attacks in Key Agreement Protocols | online |
2007 | eprint | Improved Impossible Differential Cryptanalysis of CLEFIA | online |
2007 | eprint | Efficient chosen ciphertext secure PKE scheme with short ciphertext | online |
2007 | eprint | Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model | online |
2007 | eprint | Scalable Storage Scheme from Forward Key Rotation | online |
2007 | eprint | On the hash function of ODH | online |
2007 | eprint | The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$ | online |
2007 | eprint | Group Password-Authenticated Key Exchange from Identity-Based Cryptosystem | online |
2007 | eprint | Unlinkable Randomizable Signature and Its Application in Group Signature | online |
2007 | eprint | Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification | online |
2007 | eprint | Matrix Power S-Box Construction | online |
2007 | eprint | Attacks on the WEP protocol | online |
2007 | eprint | Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free | online |
2007 | eprint | New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba | online |
2007 | eprint | Unlinkable Divisible Digital Cash without Trusted Third Party | online |
2007 | eprint | Authenticated Key Exchange and Key Encapsulation Without Random Oracles | online |
2007 | eprint | Identity-Based Broadcast Encryption | online |
2007 | eprint | Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path | online |
2007 | eprint | Differential Cryptanalysis in Stream Ciphers | online |
2007 | eprint | Obtaining Universally Composable Security: Towards the Bare Bones of Trust | online |
2007 | eprint | A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC | online |
2007 | eprint | A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography | online |
2007 | eprint | Generalized Key Delegation for Hierarchical Identity-Based Encryption | online |
2007 | eprint | Towards Security Limits in Side-Channel Attacks | online |
2007 | eprint | On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions | online |
2007 | eprint | A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems | online |
2007 | eprint | On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature | online |
2007 | eprint | Generalized mix functions and orthogonal equitable rectangles | online |
2007 | eprint | Related-Key Statistical Cryptanalysis | online |
2007 | eprint | AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM | online |
2007 | eprint | Domain Extension of Public Random Functions: Beyond the Birthday Barrier | online |
2007 | eprint | New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py | online |
2007 | eprint | Secure Two-Party k-Means Clustering | online |
2007 | eprint | A new paradigm of chosen ciphertext secure public key encryption scheme | online |
2007 | eprint | On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography | online |
2007 | eprint | Provable-Security Analysis of Authenticated Encryption in Kerberos | online |
2007 | eprint | Blind Identity-Based Encryption and Simulatable Oblivious Transfer | online |
2007 | eprint | Certificateless Ring Signatures | online |
2007 | eprint | Forward-secure Key Evolution in Wireless Sensor Networks | online |
2007 | eprint | Long-lived digital integrity using short-lived hash functions | online |
2007 | eprint | Making Large Hash Functions From Small Compression Functions | online |
2007 | eprint | A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms | online |
2007 | eprint | Attribute Based Group Signature with Revocation | online |
2007 | eprint | Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions | online |
2007 | eprint | PORs: Proofs of Retrievability for Large Files | online |
2007 | eprint | A Note on the Relay Attacks on e-passports: The Case of Czech e-passports | online |
2007 | eprint | Incorporating Temporal Capabilities in Existing Key Management Schemes | online |
2007 | eprint | BEDA: Button-Enabled Device Pairing | online |
2007 | eprint | A Note on the Ate Pairing | online |
2007 | eprint | 1. AES seems weak. 2. Linear time secure cryptography | online |
2007 | eprint | Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker | online |
2007 | eprint | Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings | online |
2007 | eprint | A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols | online |
2007 | eprint | A Verifiable Voting Protocol based on Farnel | online |
2007 | eprint | Choosing the correct elliptic curve in the CM method | online |
2007 | eprint | Fully Secure Proxy Re-Encryption without Random Oracles | online |
2007 | eprint | Efficient Identity Based Signature in Standard Model | online |
2007 | eprint | Aspects of Pairing Inversion | online |
2007 | eprint | A Forward-Secure Signature with Backward-Secure Detection | online |
2007 | eprint | Families of genus 2 curves with small embedding degree | online |
2007 | eprint | UICE: A High-Performance Cryptographic Module for SoC and RFID Applications | online |
2007 | eprint | Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem | online |
2007 | eprint | Algebraic Immunity Hierarchy of Boolean Functions | online |
2007 | eprint | The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks | online |
2007 | eprint | An Efficient One-move Nominative Signature Scheme | online |
2007 | eprint | Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking | online |
2007 | eprint | New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 | online |
2007 | eprint | Privacy-Protecting Coupon System Revisited | online |
2007 | eprint | Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model | online |
2007 | eprint | Efficient Dynamic k-Times Anonymous Authentication | online |
2007 | eprint | Efficiency Improvement for NTRU | online |
2007 | eprint | One-Round ID-Based Blind Signature Scheme without ROS Assumption | online |
2007 | eprint | The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks | online |
2007 | eprint | Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006 | online |
2007 | eprint | Which Languages Have 4-Round Zero-Knowledge Proofs? | online |
2007 | eprint | New Public Key Cryptosystems Using Polynomials over Non-commutative Rings | online |
2007 | eprint | Filling the Gap between Voters and Cryptography in e-Voting | online |
2007 | eprint | Computing endomorphism rings of Jacobians of genus 2 curves over finite fields | online |
2007 | eprint | CRUST: Cryptographic Remote Untrusted Storage without Public Keys | online |
2007 | eprint | Universally Composable Key-evolving Signature | online |
2007 | eprint | Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography | online |
2007 | eprint | Interactive two-channel message authentication based on interactive-collision Resistant hash functions | online |
2007 | eprint | Merging Pret-a-Voter and PunchScan | online |
2007 | eprint | Optimised versions of the Ate and Twisted Ate Pairings | online |
2007 | eprint | High Integrity Elections | online |
2007 | eprint | Invertible Universal Hashing and the TET Encryption Mode | online |
2007 | eprint | Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms | online |
2007 | eprint | Group Encryption | online |
2007 | eprint | Cryptanalysis of a Hash Function Proposed at ICISC 2006 | online |
2007 | eprint | VEST Ciphers | online |
2007 | eprint | Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles | online |
2007 | eprint | Group Decryption | online |
2007 | eprint | Group-based Proxy Re-encryption scheme | online |
2007 | eprint | Key Agreement from Signatures: Improved Protocols and Anonymous Extension | online |
2007 | eprint | `Good' Pseudo-Random Binary Sequences from Elliptic Curves | online |
2007 | eprint | Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions | online |
2007 | eprint | Prolific Codes with the Identifiable Parent Property | online |
2007 | eprint | TinyTate: Identity-Based Encryption for Sensor Networks | online |
2007 | eprint | Cryptanalysis of a class of cryptographic hash functions | online |
2007 | eprint | Two Trivial Attacks on Trivium | online |
2007 | eprint | A Framework for Iterative Hash Functions - HAIFA | online |
2007 | eprint | On Perfectly Balanced Boolean Functions | online |
2007 | eprint | Lossy Trapdoor Functions and Their Applications | online |
2007 | eprint | Efficient Hybrid Encryption from ID-Based Encryption | online |
2007 | eprint | On solving sparse algebraic equations over finite fields II | online |
2007 | eprint | Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers | online |
2007 | eprint | A Pollard-like pseudorandom number generator over EC | online |
2007 | eprint | Private Locally Decodable Codes | online |
2007 | eprint | Analysis of countermeasures against access driven cache attacks on AES | online |
2007 | eprint | Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol | online |
2007 | eprint | Provably Secure Framework for Information Aggregation is Sensor Networks | online |
2007 | eprint | Verifying Data Integrity with Few Queries to Untrusted Memory | online |
2007 | eprint | HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach | online |
2007 | eprint | Solving MRHS linear equations | online |
2007 | eprint | A General Construction of Tweakable Block Ciphers and Different Modes of Operations | online |
2007 | eprint | The Effectiveness of Receipt-Based Attacks on ThreeBallot | online |
2007 | eurocrypt | Non-interactive Proofs for Integer Multiplication | online |
2007 | eurocrypt | Ate Pairing on Hyperelliptic Curves | online |
2007 | eurocrypt | A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security | online |
2007 | eurocrypt | Universally Composable Multi-party Computation Using Tamper-Proof Hardware | online |
2007 | eurocrypt | An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries | online |
2007 | eurocrypt | Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings | online |
2007 | eurocrypt | Elliptic Curves and Cryptography: Invention and Impact | |
2007 | eurocrypt | Divisible E-Cash Systems Can Be Truly Anonymous | online |
2007 | eurocrypt | Range Extension for Weak PRFs; The Good, the Bad, and the Ugly | online |
2007 | eurocrypt | Secure Computation from Random Error Correcting Codes | online |
2007 | eurocrypt | Atomic Secure Multi-party Multiplication with Low Communication | online |
2007 | eurocrypt | Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit | online |
2007 | eurocrypt | Round-Efficient Secure Computation in Point-to-Point Networks | online |
2007 | eurocrypt | Feistel Networks Made Public, and Applications | online |
2007 | eurocrypt | Cryptanalysis of SFLASH with Slightly Modified Parameters | online |
2007 | eurocrypt | Ideal Multipartite Secret Sharing Schemes | online |
2007 | eurocrypt | Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist | online |
2007 | eurocrypt | The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks | online |
2007 | eurocrypt | An L (1/3 + epsilon ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves | online |
2007 | eurocrypt | Oblivious-Transfer Amplification | online |
2007 | eurocrypt | Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model | online |
2007 | eurocrypt | Zero Knowledge and Soundness Are Symmetric | online |
2007 | eurocrypt | Efficient Two-Party Secure Computation on Committed Inputs | online |
2007 | eurocrypt | Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities | online |
2007 | eurocrypt | The Collision Intractability of MDC-2 in the Ideal-Cipher Model | online |
2007 | eurocrypt | Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility | online |
2007 | eurocrypt | Revisiting the Efficiency of Malicious Two-Party Computation | online |
2007 | eurocrypt | Cryptanalysis of the Sidelnikov Cryptosystem | online |
2007 | eurocrypt | Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability | online |
2007 | eurocrypt | Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables | online |
2007 | eurocrypt | Mesh Signatures | online |
2007 | eurocrypt | General Ad Hoc Encryption from Exponent Inversion IBE | online |
2007 | eurocrypt | Batch Verification of Short Signatures | online |
2007 | eurocrypt | Simulatable Adaptive Oblivious Transfer | online |
2007 | eurocrypt | Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy | online |
2007 | fse | Groebner Bases. Applications in Cryptology | |
2007 | fse | Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers | online |
2007 | fse | Differential-Linear Attacks Against the Stream Cipher Phelix | online |
2007 | fse | On the Security of IV Dependent Stream Ciphers | online |
2007 | fse | Improved Slide Attacks | online |
2007 | fse | A New Attack on 6-Round IDEA | online |
2007 | fse | Generalized Correlation Analysis of Vectorial Boolean Functions | online |
2007 | fse | Producing Collisions for Panama, Instantaneously | online |
2007 | fse | Bad and Good Ways of Post-processing Biased Physical Random Numbers | online |
2007 | fse | Improving the Security of MACs Via Randomized Message Preprocessing | online |
2007 | fse | Two General Attacks on Pomaranch-Like Keystream Generators | online |
2007 | fse | Perfect Block Ciphers with Small Blocks | 452-465 |
2007 | fse | Overtaking VEST | online |
2007 | fse | A New Class of Weak Keys for Blowfish | online |
2007 | fse | Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 | online |
2007 | fse | The Grindahl Hash Functions | online |
2007 | fse | New Lightweight DES Variants | online |
2007 | fse | Message Freedom in MD4 and MD5 Collisions: Application to APOP | online |
2007 | fse | An Analysis of XSL Applied to BES | online |
2007 | fse | Cryptanalysis of FORK-256 | online |
2007 | fse | New Bounds for PMAC, TMAC, and XCBC | online |
2007 | fse | Cryptanalysis of Achterbahn-128/80 | online |
2007 | fse | How to Enrich the Message Space of a Cipher | online |
2007 | fse | New Message Difference for MD4 | online |
2007 | fse | Security Analysis of Constructions Combining FIL Random Oracles | online |
2007 | fse | The 128-Bit Blockcipher CLEFIA (Extended Abstract) | online |
2007 | fse | Algebraic Cryptanalysis of 58-Round SHA-1 | online |
2007 | fse | An Analytical Model for Time-Driven Cache Attacks | online |
2007 | fse | Analysis of QUAD | online |
2007 | fse | Algebraic Immunity of S-Boxes and Augmented Functions | online |
2007 | jofc | Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1 | 389-392 |
2007 | jofc | Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) | 395 |
2007 | jofc | Hierarchical Threshold Secret Sharing | 237-264 |
2007 | jofc | Secure Distributed Key Generation for Discrete-Log Based Cryptosystems | 51-83 |
2007 | jofc | Primality Proving via One Round in ECPP and One Iteration in AKS | 375-387 |
2007 | jofc | The Security of the IAPM and IACBC Modes | 153-163 |
2007 | jofc | Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring | 39-50 |
2007 | jofc | Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication | 115-149 |
2007 | jofc | On Unconditionally Secure Distributed Oblivious Transfer | 323-373 |
2007 | jofc | Robust Information-Theoretic Private Information Retrieval | 295-321 |
2007 | jofc | Constant-Round Oblivious Transfer in the Bounded Storage Model | 165-202 |
2007 | jofc | Formal Proofs for the Security of Signcryption | 203-235 |
2007 | jofc | Robust and Efficient Sharing of RSA Functions | 393 |
2007 | jofc | Scalable Protocols for Authenticated Group Key Exchange | 85-113 |
2007 | jofc | Another Look at "Provable Security" | 3-37 |
2007 | jofc | RSA-Based Undeniable Signatures | 394 |
2007 | jofc | A Forward-Secure Public-Key Encryption Scheme | 265-294 |
2007 | pkc | Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings | online |
2007 | pkc | A Direct Anonymous Attestation Scheme for Embedded Devices | 16-30 |
2007 | pkc | Risk Measures and a New Central Limit Theorem under Nonlinear Expectation | |
2007 | pkc | Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 | 107-117 |
2007 | pkc | Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman | 282-297 |
2007 | pkc | Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures | 134-149 |
2007 | pkc | Self-Generated-Certificate Public Key Encryption Without Pairing | online |
2007 | pkc | Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol | 343-360 |
2007 | pkc | A Survey of Single-Database Private Information Retrieval: Techniques and Applications | 393-411 |
2007 | pkc | Parallel Key-Insulated Public Key Encryption Without Random Oracles | 298-314 |
2007 | pkc | Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol | 76-88 |
2007 | pkc | Verifiable Shuffle of Large Size Ciphertexts | 377-392 |
2007 | pkc | Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA | 412-425 |
2007 | pkc | Efficient Ring Signatures Without Random Oracles | 166-180 |
2007 | pkc | On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures | 43-60 |
2007 | pkc | Identity-Based Traitor Tracing | 361-376 |
2007 | pkc | Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles | 201-216 |
2007 | pkc | A Closer Look at PKI: Security and Efficiency | 458-475 |
2007 | pkc | Full-Domain Subgroup Hiding and Constant-Size Group Signatures | 1-15 |
2007 | pkc | Improved On-Line/Off-Line Threshold Signatures | 217-232 |
2007 | pkc | Knowledge-Binding Commitments with Applications in Time-Stamping | 150-165 |
2007 | pkc | Fast Batch Verification of Multiple Signatures | 442-457 |
2007 | pkc | High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems | 233-248 |
2007 | pkc | l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography | 266-281 |
2007 | pkc | Optimistic Fair Exchange in a Multi-user Setting | 118-133 |
2007 | pkc | Cryptanalysis of HFE with Internal Perturbation | 249-265 |
2007 | pkc | Efficient Pseudorandom Generators Based on the DDH Assumption | 426-441 |
2007 | pkc | Anonymous Signatures Made Easy | 31-42 |
2007 | pkc | Traceable Ring Signature | 181-200 |
2007 | pkc | New Chosen-Ciphertext Attacks on NTRU | 89-106 |
2007 | pkc | Practical and Secure Solutions for Integer Comparison | 330-342 |
2007 | pkc | Multi-bit Cryptosystems Based on Lattice Problems | 315-329 |
2007 | pkc | Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions | 61-75 |
2007 | tcc | Towards Optimal and Efficient Perfectly Secure Message Transmission | online |
2007 | tcc | On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits | online |
2007 | tcc | Perfect NIZK with Adaptive Soundness | online |
2007 | tcc | How to Shuffle in Public | online |
2007 | tcc | Weakly-Private Secret Sharing Schemes | online |
2007 | tcc | Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries | online |
2007 | tcc | Universally Composable Security with Global Setup | online |
2007 | tcc | Lower Bounds for Non-interactive Zero-Knowledge | online |
2007 | tcc | On Secret Sharing Schemes, Matroids and Polymatroids | online |
2007 | tcc | Intrusion-Resilient Key Exchange in the Bounded Retrieval Model | online |
2007 | tcc | Conjunctive, Subset, and Range Queries on Encrypted Data | online |
2007 | tcc | Multi-authority Attribute Based Encryption | online |
2007 | tcc | Unifying Classical and Quantum Key Distillation | online |
2007 | tcc | Designated Confirmer Signatures Revisited | online |
2007 | tcc | Towards a Separation of Semantic and CCA Security for Public Key Encryption | online |
2007 | tcc | On the Necessity of Rewinding in Secure Multiparty Computation | online |
2007 | tcc | Long-Term Security and Universal Composability | online |
2007 | tcc | Parallel Repetition of Computationally Sound Protocols Revisited | online |
2007 | tcc | Obfuscation for Cryptographic Purposes | online |
2007 | tcc | Evaluating Branching Programs on Encrypted Data | online |
2007 | tcc | Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions | online |
2007 | tcc | Does Privacy Require True Randomness? | online |
2007 | tcc | Tackling Adaptive Corruptions in Multicast Encryption Protocols | online |
2007 | tcc | Private Approximation of Clustering and Vertex Cover | online |
2007 | tcc | Secure Linear Algebra Using Linearly Recurrent Sequences | online |
2007 | tcc | On Best-Possible Obfuscation | online |
2007 | tcc | From Weak to Strong Watermarking | online |
2007 | tcc | Robuster Combiners for Oblivious Transfer | online |
2007 | tcc | Securely Obfuscating Re-encryption | online |
2007 | tcc | One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments | online |
2007 | tcc | (Password) Authenticated Key Establishment: From 2-Party to Group | online |
2007 | tcc | Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings | online |
2007 | tcc | Number-theoretic Assumptions | |
2007 | tcc | Ad-Hoc Constructions | |
2007 | tcc | Lattice Problems | |