year |
venue |
title |
pages |
2008 | asiacrypt | An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity | online |
2008 | asiacrypt | Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings | online |
2008 | asiacrypt | On the Security of HB# against a Man-in-the-Middle Attack | online |
2008 | asiacrypt | Twisted Edwards Curves Revisited | online |
2008 | asiacrypt | Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits | online |
2008 | asiacrypt | Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes | online |
2008 | asiacrypt | Breaking the F-FCSR-H Stream Cipher in Real Time | online |
2008 | asiacrypt | On the Validity of the phi-Hiding Assumption in Cryptographic Protocols | 344-354 |
2008 | asiacrypt | A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting | online |
2008 | asiacrypt | MPC vs. SFE : Unconditional and Computational Security | 1-18 |
2008 | asiacrypt | OAEP Is Secure under Key-Dependent Messages | online |
2008 | asiacrypt | Some Perspectives on Complexity-Based Cryptography | online |
2008 | asiacrypt | Ambiguous Optimistic Fair Exchange | online |
2008 | asiacrypt | Compact Proofs of Retrievability | online |
2008 | asiacrypt | Preimage Attacks on 3, 4, and 5-Pass HAVAL | online |
2008 | asiacrypt | Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems | online |
2008 | asiacrypt | Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks | online |
2008 | asiacrypt | Graph Design for Secure Multiparty Computation over Non-Abelian Groups | online |
2008 | asiacrypt | A New Attack on the LEX Stream Cipher | online |
2008 | asiacrypt | How to Fill Up Merkle-Damgård Hash Functions | 272-289 |
2008 | asiacrypt | Speeding Up the Pollard Rho Method on Prime Fields | online |
2008 | asiacrypt | Efficient Protocols for Set Membership and Range Proofs | online |
2008 | asiacrypt | An Improved Impossible Differential Attack on MISTY1 | online |
2008 | asiacrypt | Rigorous and Efficient Short Lattice Vectors Enumeration | online |
2008 | asiacrypt | Slide Attacks on a Class of Hash Functions | online |
2008 | asiacrypt | Generalized Identity Based and Broadcast Encryption Schemes | online |
2008 | asiacrypt | A Modular Security Analysis of the TLS Handshake Protocol | online |
2008 | asiacrypt | Universally Composable Adaptive Oblivious Transfer | online |
2008 | asiacrypt | Chosen Ciphertext Security with Optimal Ciphertext Overhead | online |
2008 | asiacrypt | Limits of Constructive Security Proofs | online |
2008 | asiacrypt | Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems | online |
2008 | asiacrypt | Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption | online |
2008 | asiacrypt | Towards Robust Computation on Encrypted Data | online |
2008 | asiacrypt | Hash Functions from Sigma Protocols and Improvements to VSH | online |
2008 | asiacrypt | Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography | online |
2008 | asiacrypt | Computer Algebra and Cryptography | |
2008 | ches | Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings | online |
2008 | ches | Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths | online |
2008 | ches | A Vision for Platform Security | online |
2008 | ches | Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration | online |
2008 | ches | Divided Backend Duplication Methodology for Balanced Dual Rail Routing | online |
2008 | ches | RFID and Its Vulnerability to Faults | online |
2008 | ches | RSA-Past, Present, Future | online |
2008 | ches | Mutual Information Analysis | online |
2008 | ches | Fast Digital TRNG Based on Metastable Ring Oscillator | online |
2008 | ches | A Real-World Attack Breaking A5/1 within Hours | online |
2008 | ches | RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks | online |
2008 | ches | A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases | online |
2008 | ches | The Carry Leakage on the Randomized Exponent Countermeasure | online |
2008 | ches | A Design for a Physical RNG with Robust Entropy Estimators | online |
2008 | ches | A Very Compact Hardware Implementation of the MISTY1 Block Cipher | online |
2008 | ches | Hash Functions and RFID Tags: Mind the Gap | online |
2008 | ches | Efficient Helper Data Key Extractor on FPGAs | online |
2008 | ches | High-Performance Concurrent Error Detection Scheme for AES Hardware | online |
2008 | ches | Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography | online |
2008 | ches | Exploiting the Power of GPUs for Asymmetric Cryptography | online |
2008 | ches | Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? | online |
2008 | ches | Binary Edwards Curves | online |
2008 | ches | Perturbating RSA Public Keys: An Improved Attack | online |
2008 | ches | Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages | online |
2008 | ches | Attacking State-of-the-Art Software Countermeasures-A Case Study for AES | online |
2008 | ches | Ultra High Performance ECC over NIST Primes on Commercial FPGAs | online |
2008 | ches | Multiple-Differential Side-Channel Collision Attacks on AES | online |
2008 | ches | A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis | online |
2008 | ches | Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs | online |
2008 | ches | Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform | online |
2008 | crypto | How to Solve it: New Techniques in Algebraic Cryptanalysis | |
2008 | crypto | The MD6 hash function | |
2008 | crypto | Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs | online |
2008 | crypto | Founding Cryptography on Oblivious Transfer - Efficiently | online |
2008 | crypto | Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles | online |
2008 | crypto | Distributed Private Data Analysis: Simultaneously Solving How and What | online |
2008 | crypto | Collusion-Free Protocols in the Mediated Model | online |
2008 | crypto | One-Time Programs | online |
2008 | crypto | Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions | online |
2008 | crypto | A Framework for Efficient and Composable Oblivious Transfer | online |
2008 | crypto | Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems | online |
2008 | crypto | Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms | online |
2008 | crypto | Cryptanalysis of the GOST Hash Function | online |
2008 | crypto | New State Recovery Attack on RC4 | online |
2008 | crypto | Communication Complexity in Algebraic Two-Party Protocols | online |
2008 | crypto | Preimages for Reduced SHA-0 and SHA-1 | online |
2008 | crypto | Improved Bounds on Security Reductions for Discrete Log Based Signatures | online |
2008 | crypto | Circular-Secure Encryption from Decision Diffie-Hellman | online |
2008 | crypto | Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers | online |
2008 | crypto | Programmable Hash Functions and Their Applications | online |
2008 | crypto | Compression from Collisions, or Why CRHF Combiners Have a Long Output | online |
2008 | crypto | New Efficient Attacks on Statistical Disclosure Control Mechanisms | online |
2008 | crypto | On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles | online |
2008 | crypto | Scalable Multiparty Computation with Nearly Optimal Work and Resilience | online |
2008 | crypto | Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations | online |
2008 | crypto | Public-Key Locally-Decodable Codes | online |
2008 | crypto | Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys | online |
2008 | crypto | Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries | online |
2008 | crypto | Cryptanalysis of MinRank | online |
2008 | crypto | On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme | online |
2008 | crypto | Adaptive One-Way Functions and Applications | online |
2008 | crypto | The Random Oracle Model and the Ideal Cipher Model Are Equivalent | online |
2008 | crypto | Bug Attacks | online |
2008 | crypto | Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings | online |
2008 | crypto | Dynamic Threshold Public-Key Encryption | online |
2008 | eprint | On the economic payoff of forensic systems when used to trace Counterfeited Software and content | online |
2008 | eprint | The computational SLR: a logic for reasoning about computational indistinguishability | online |
2008 | eprint | New balanced Boolean functions satisfying all the main cryptographic criteria | online |
2008 | eprint | Pairing with Supersingular Trace Zero Varieties Revisited | online |
2008 | eprint | Cryptanalysis of an Authentication Scheme Using Truncated Polynomials | online |
2008 | eprint | Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension | online |
2008 | eprint | The Random Oracle Model and the Ideal Cipher Model are Equivalent | online |
2008 | eprint | HAIL: A High-Availability and Integrity Layer for Cloud Storage | online |
2008 | eprint | Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks | online |
2008 | eprint | Dynamic Threshold Cryptosystem without Group Manager | online |
2008 | eprint | Cryptanalysis of a client-to-client password-authenticated key agreement protocol | online |
2008 | eprint | A Hardware Interface for Hashing Algorithms | online |
2008 | eprint | Construction of Resilient Functions with Multiple Cryptographic Criteria | online |
2008 | eprint | Pairings on hyperelliptic curves with a real model | online |
2008 | eprint | Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols | online |
2008 | eprint | Provable Security of Digital Signatures in the Tamper-Proof Device Model | online |
2008 | eprint | Multi-Recipient Signcryption for Secure Wireless Group Communication | online |
2008 | eprint | An Efficient Identity-based Ring Signcryption Scheme | online |
2008 | eprint | Embedding in Two Least Significant Bits with Wet Paper Coding | online |
2008 | eprint | ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES | online |
2008 | eprint | Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol | online |
2008 | eprint | ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY | online |
2008 | eprint | Fuzzy Identity Based Signature | online |
2008 | eprint | ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS | online |
2008 | eprint | On Collisions of Hash Functions Turbo SHA-2 | online |
2008 | eprint | 2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period | online |
2008 | eprint | Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions | online |
2008 | eprint | FACTORING IS EQUIVALENT TO GENERIC RSA | online |
2008 | eprint | Information Theoretic Evaluation of Side-Channel Resistant Logic Styles | online |
2008 | eprint | The Hidden Root Problem | online |
2008 | eprint | Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation | online |
2008 | eprint | Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited | online |
2008 | eprint | Efficient One-round Key Exchange in the Standard Model | online |
2008 | eprint | Slide Attacks on a Class of Hash Functions | online |
2008 | eprint | Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves | online |
2008 | eprint | A Complete Treatment of 2-party SFE in the Information-Theoretic Setting with Applications to Long-Term Security | online |
2008 | eprint | Generic Attacks for the Xor of k random permutations | online |
2008 | eprint | Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors | online |
2008 | eprint | A Proof of Security in O(2^n) for the Xor of Two Random Permutations | online |
2008 | eprint | Information-Theoretically Secure Voting Without an Honest Majority | online |
2008 | eprint | A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II | online |
2008 | eprint | Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles | online |
2008 | eprint | The Encrypted Elliptic Curve Hash | online |
2008 | eprint | Adaptive Security in Broadcast Encryption Systems | online |
2008 | eprint | Twisted Edwards Curves | online |
2008 | eprint | Searching for Low Weight Codewords in Linear Binary Codes | online |
2008 | eprint | Simulatable Adaptive Oblivious Transfer | online |
2008 | eprint | Collision attacks against 22-step SHA-512 | online |
2008 | eprint | On the Practicality of Short Signature Batch Verification | online |
2008 | eprint | Attacking Step Reduced SHA-2 Family in a Unified Framework | online |
2008 | eprint | ECM using Edwards curves | online |
2008 | eprint | Some Observations on Strengthening the SHA-2 Family | online |
2008 | eprint | New State Recovery Attack on RC4 | online |
2008 | eprint | On White-Box Cryptography and Obfuscation | online |
2008 | eprint | Disjunctive Multi-Level Secret Sharing | online |
2008 | eprint | Twisted Ate Pairing on Hyperelliptic Curves and Applications | online |
2008 | eprint | Computing Pairings Using x-Coordinates Only | online |
2008 | eprint | Certificate-Based Signature Schemes without Pairings or Random Oracles | online |
2008 | eprint | CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption | online |
2008 | eprint | Signcryption with Proxy Re-encryption | online |
2008 | eprint | Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis | online |
2008 | eprint | A strategy for any DAA Issuer and an additional verification by a Host | online |
2008 | eprint | Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods | online |
2008 | eprint | An Improved Robust Fuzzy Extractor | online |
2008 | eprint | General Certificateless Encryption and Timed-Release Encryption | online |
2008 | eprint | Delegating Capabilities in Predicate Encryption Systems | online |
2008 | eprint | Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes | online |
2008 | eprint | FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three | online |
2008 | eprint | Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication | online |
2008 | eprint | Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher | online |
2008 | eprint | Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$ | online |
2008 | eprint | Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks | online |
2008 | eprint | Blind Signature Scheme over Braid Groups | online |
2008 | eprint | Attacks on Singelee and Preneel's protocol | online |
2008 | eprint | HB#: Increasing the Security and Efficiency of HB+ | online |
2008 | eprint | Breaking the Akiyama-Goto cryptosystem | online |
2008 | eprint | Non-Cyclic Subgroups of Jacobians of Genus Two Curves | online |
2008 | eprint | Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography | online |
2008 | eprint | Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors | online |
2008 | eprint | One-Up Problem for (EC)DSA | online |
2008 | eprint | Authenticating with Attributes | online |
2008 | eprint | Authenticated Byzantine Generals Strike Again | online |
2008 | eprint | Merkle Puzzles are Optimal | online |
2008 | eprint | How to Launch A Birthday Attack Against DES | online |
2008 | eprint | Lower Bounds on Signatures From Symmetric Primitives | online |
2008 | eprint | Sharemind: a framework for fast privacy-preserving computations | online |
2008 | eprint | Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation | online |
2008 | eprint | Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization | online |
2008 | eprint | Efficient Fully-Simulatable Oblivious Transfer | online |
2008 | eprint | How to Protect Yourself without Perfect Shredding | online |
2008 | eprint | Generic Attacks on Feistel Schemes | online |
2008 | eprint | Another approach to pairing computation in Edwards coordinates | online |
2008 | eprint | Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures | online |
2008 | eprint | Playing Hide-and-Seek with a Focused Mobile Adversary: Maximizing Data Survival in Unattended Sensor Networks | online |
2008 | eprint | A New Blind Identity-Based Signature Scheme with Message Recovery | online |
2008 | eprint | A New Message Recognition Protocol for Ad Hoc Pervasive Networks | online |
2008 | eprint | New Results on Unconditionally Secure Multireceiver Manual Authentication | online |
2008 | eprint | Foundations of Group Key Management Framework, Security Model and a Generic Construction | online |
2008 | eprint | Efficient and Generalized Pairing Computation on Abelian Varieties | online |
2008 | eprint | Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits | online |
2008 | eprint | A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights | online |
2008 | eprint | Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme | online |
2008 | eprint | Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks | online |
2008 | eprint | Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems | online |
2008 | eprint | Cryptanalysis of CRUSH hash structure | online |
2008 | eprint | An analysis of the infrastructure in real function fields | online |
2008 | eprint | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | online |
2008 | eprint | Cheon's algorithm, pairing inversion and the discrete logarithm problem | online |
2008 | eprint | Threshold RSA for Dynamic and Ad-Hoc Groups | online |
2008 | eprint | Accountability of Perfect Concurrent Signature | online |
2008 | eprint | David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware | online |
2008 | eprint | Secure Biometric Authentication With Improved Accuracy | online |
2008 | eprint | Fair Traceable Multi-Group Signatures | online |
2008 | eprint | Complete Fairness in Secure Two-Party Computation | online |
2008 | eprint | Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths | online |
2008 | eprint | The CCA2-Security of Hybrid Damgård's ElGamal | online |
2008 | eprint | An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries | online |
2008 | eprint | Identity-Based Directed Signature Scheme from Bilinear Pairings | online |
2008 | eprint | Multi-PKG ID based signcryption | online |
2008 | eprint | Combinatorial batch codes | online |
2008 | eprint | New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version) | online |
2008 | eprint | Full Security: Fuzzy Identity Based Encryption | online |
2008 | eprint | New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version) | online |
2008 | eprint | Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs | online |
2008 | eprint | Breaking One-Round Key-Agreement Protocols in the Random Oracle Model | online |
2008 | eprint | Revocation Systems with Very Small Private Keys | online |
2008 | eprint | Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version) | online |
2008 | eprint | Attacks on RFID Protocols | online |
2008 | eprint | cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards | online |
2008 | eprint | Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers | online |
2008 | eprint | Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated) | online |
2008 | eprint | Improved efficiency of Kiltz07-KEM | online |
2008 | eprint | Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields | online |
2008 | eprint | A new almost perfect nonlinear function which is not quadratic | online |
2008 | eprint | Physical Cryptanalysis of KeeLoq Code Hopping Applications | online |
2008 | eprint | Scratch, Click & Vote: E2E voting over the Internet | online |
2008 | eprint | Buying random votes is as hard as buying no-votes | online |
2008 | eprint | RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension | online |
2008 | eprint | Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields | online |
2008 | eprint | Compact Signatures for Network Coding | online |
2008 | eprint | Abelian varieties with prescribed embedding degree | online |
2008 | eprint | Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving | online |
2008 | eprint | Computing Hilbert Class Polynomials | online |
2008 | eprint | Attacking and defending the McEliece cryptosystem | online |
2008 | eprint | Efficient Sequential Aggregate Signed Data | online |
2008 | eprint | Yet Another Secure Distance-Bounding Protocol | online |
2008 | eprint | Remarks on the NFS complexity | online |
2008 | eprint | Public Key Block Cipher Based on Multivariate Quadratic Quasigroups | online |
2008 | eprint | Infringing and Improving Password Security of a Three-Party Key Exchange Protocol | online |
2008 | eprint | A correction to ``Efficient and Secure Comparison for On-Line Auctions'' | online |
2008 | eprint | High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m) | online |
2008 | eprint | Efficient Quantum-immune Blind Signatures | online |
2008 | eprint | The Twin Diffie-Hellman Problem and Applications | online |
2008 | eprint | A new identity based proxy signature scheme | online |
2008 | eprint | Multiparty Computation Goes Live | online |
2008 | eprint | RSA-TBOS Signcryption with Proxy Re-encryption | online |
2008 | eprint | HENKOS Cryptanalysis-Related keys attack | online |
2008 | eprint | Revisit of Group-based Unidirectional Proxy Re-encryption Scheme | online |
2008 | eprint | Generators of Jacobians of Genus Two Curves | online |
2008 | eprint | Two attacks on a sensor network key distribution scheme of Cheng and Agrawal | online |
2008 | eprint | Another Glance At Blockcipher Based Hashing | online |
2008 | eprint | Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption | online |
2008 | eprint | The SIP security enhanced by using pairing-assisted Massey-Omura signcryption | online |
2008 | eprint | Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance | online |
2008 | eprint | Compact Proofs of Retrievability | online |
2008 | eprint | SMS4 Encryption Algorithm for Wireless Networks | online |
2008 | eprint | On the Chikazawa-Inoue ID based key system | online |
2008 | eprint | Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext | online |
2008 | eprint | On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak | online |
2008 | eprint | A Secure Remote User Authentication Scheme with Smart Cards | online |
2008 | eprint | Results from a Search for the Best Linear Approximation of a Block Cipher | online |
2008 | eprint | Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications | online |
2008 | eprint | Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems | online |
2008 | eprint | Explicit hard instances of the shortest vector problem | online |
2008 | eprint | A Short Proof of the PRP/PRF Switching Lemma | online |
2008 | eprint | Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields | online |
2008 | eprint | Homomorphic Encryption with CCA Security | online |
2008 | eprint | Public Key Cryptography from Different Assumptions | online |
2008 | eprint | Pairing-Based Onion Routing with Improved Forward Secrecy | online |
2008 | eprint | New attacks on ISO key establishment protocols | online |
2008 | eprint | Template Attacks on ECDSA | online |
2008 | eprint | Modified Huang-Wang's Convertible Nominative Signature Scheme | online |
2008 | eprint | Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes | online |
2008 | eprint | An improvement of discrete Tardos fingerprinting codes | online |
2008 | eprint | On the Security of Chien's Ultralightweight RFID Authentication Protocol | online |
2008 | eprint | High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms | online |
2008 | eprint | ID based generalized signcryption | online |
2008 | eprint | On construction of signature schemes based on birational permutations over noncommutative rings | online |
2008 | eprint | All Pairings Are in a Group | online |
2008 | eprint | Efficient ID-Based Signcryption Schemes for Multiple Receivers | online |
2008 | eprint | Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary | online |
2008 | eprint | Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme | online |
2008 | eprint | Towards a Theory of White-Box Security | online |
2008 | eprint | Efficient RFID authentication protocols based on pseudorandom sequence generators | online |
2008 | eprint | A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm | online |
2008 | eprint | Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption | online |
2008 | eprint | An improved preimage attack on MD2 | online |
2008 | eprint | An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction | online |
2008 | eprint | Improving upon HCTR and matching attacks for Hash-Counter-Hash approach | online |
2008 | eprint | Remote Integrity Check with Dishonest Storage Server | online |
2008 | eprint | A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation | online |
2008 | eprint | Information Leakage in Optimal Anonymized and Diversified Data | online |
2008 | eprint | An Efficient SPRP-secure Construction based on Pseudo Random Involution | online |
2008 | eprint | Iterative Probabilistic Reconstruction of RC4 Internal States | online |
2008 | eprint | New ID-based Fair Blind Signatures | online |
2008 | eprint | Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? | online |
2008 | eprint | Universally Composable Undeniable Signature | online |
2008 | eprint | Higher Order Differential Cryptanalysis of Multivariate Hash Functions | online |
2008 | eprint | Strongly Unforgeable ID-based Signatures Without Random Oracles | online |
2008 | eprint | Flaws in Some Efficient Self-Healing Key Distribution Schemes with Revocation | online |
2008 | eprint | Optimal Pairings | online |
2008 | eprint | On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles | online |
2008 | eprint | Fairness with an Honest Minority and a Rational Majority | online |
2008 | eprint | Weaknesses in HENKOS Stream Cipher | online |
2008 | eprint | On Security Notions for Verifiable Encrypted Signature | online |
2008 | eprint | On DDos Attack against Proxy in Re-encryption and Re-signature | online |
2008 | eprint | The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences | online |
2008 | eprint | An argument for rank metric | online |
2008 | eprint | Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields | online |
2008 | eprint | Using Commutative Encryption to Share a Secret | online |
2008 | eprint | Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary | online |
2008 | eprint | A protocol for K-multiple substring matching | online |
2008 | eprint | Degradation and Amplification of Computational Hardness | online |
2008 | eprint | History-Independent Cuckoo Hashing | online |
2008 | eprint | Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security | online |
2008 | eprint | Argument of knowledge of a bounded error | online |
2008 | eprint | Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings | online |
2008 | eprint | An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES) | online |
2008 | eprint | Cryptanalysis of White-Box Implementations | online |
2008 | eprint | IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices | online |
2008 | eprint | Knapsack cryptosystems built on NP-hard instances | online |
2008 | eprint | The Cost of False Alarms in Hellman and Rainbow Tradeoffs | online |
2008 | eprint | Private Branching Programs: On Communication-Efficient Cryptocomputing | online |
2008 | eprint | An argument for Hamiltonicity | online |
2008 | eprint | New Differential-Algebraic Attacks and Reparametrization of Rainbow | online |
2008 | eprint | Zcipher Algorithm Specification | online |
2008 | eprint | Collisions for Round-Reduced LAKE | online |
2008 | eprint | Entropy Bounds for Traffic Confirmation | online |
2008 | eprint | On the Design of Secure Double Block Length Hash Functions with Rate 1 | online |
2008 | eprint | Unique Shortest Vector Problem for max norm is NP-hard | online |
2008 | eprint | THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD | online |
2008 | eprint | {Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library | online |
2008 | eprint | Democratic Group Signatures with Threshold Traceability | online |
2008 | eprint | Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting | online |
2008 | eprint | Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132 | online |
2008 | eprint | New Directions in Cryptanalysis of Self-synchronizing Stream Ciphers | online |
2008 | eprint | Scalable and Efficient Provable Data Possession | online |
2008 | eprint | Compartmented Threshold RSA Based on the Chinese Remainder Theorem | online |
2008 | eprint | A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$ | online |
2008 | eprint | Unconditionally Reliable Message Transmission in Directed Hypergraphs | online |
2008 | eprint | Chosen-Ciphertext Security via Correlated Products | online |
2008 | eprint | Enumeration of Balanced Symmetric Functions over GF(p) | online |
2008 | eprint | Exponentiation in pairing-friendly groups using homomorphisms | online |
2008 | eprint | Analysis and Improvement of Authenticatable Ring Signcryption Scheme | online |
2008 | eprint | Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication | online |
2008 | eprint | A New Randomness Extraction Paradigm for Hybrid Encryption | online |
2008 | eprint | Linear Bandwidth Naccache-Stern Encryption | online |
2008 | eprint | Efficient Asynchronous Multiparty Computation with Optimal Resilience | online |
2008 | eprint | Public key encryption and encryption emulation attacks | online |
2008 | eprint | Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages | online |
2008 | eprint | New proofs for old modes | online |
2008 | eprint | Attribute-Based Encryption with Key Cloning Protection | online |
2008 | eprint | TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote | online |
2008 | eprint | Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs | online |
2008 | eprint | Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style | online |
2008 | eprint | The Enigmatique Toolkit | online |
2008 | eprint | A Simple Derivation for the Frobenius Pseudoprime Test | online |
2008 | eprint | On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks | online |
2008 | eprint | Pairing Lattices | online |
2008 | eprint | Efficient Rational Secret Sharing in the Standard Communication Model | online |
2008 | eprint | Machine Learning Attacks Against the ASIRRA CAPTCHA | online |
2008 | eprint | Password Mistyping in Two-Factor-Authenticated Key Exchange | online |
2008 | eprint | A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation | online |
2008 | eprint | A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack | online |
2008 | eprint | A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2 | online |
2008 | eprint | Improving the Rules of the DPA Contest | online |
2008 | eprint | Controlling access to personal data through Accredited Symmetrically Private Information Retrieval | online |
2008 | eprint | Analysis of RC4 and Proposal of Additional Layers for Better Security Margin | online |
2008 | eprint | Analysis of Step-Reduced SHA-256 | online |
2008 | eprint | Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form | online |
2008 | eprint | Collisions and other Non-Random Properties for Step-Reduced SHA-256 | online |
2008 | eprint | A NEW HASH ALGORITHM$:$ Khichidi$-$1 | online |
2008 | eprint | Sound and Fine-grain Specification of Cryptographic Tasks | online |
2008 | eprint | Cryptanalysis of the Improved Cellular Message Encryption Algorithm | online |
2008 | eprint | The arithmetic of characteristic 2 Kummer surfaces | online |
2008 | eprint | Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security | online |
2008 | eprint | Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption | online |
2008 | eprint | A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature | online |
2008 | eprint | Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations | online |
2008 | eprint | Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols | online |
2008 | eprint | Constant-Size Dynamic $k$-TAA | online |
2008 | eprint | Secure Arithmetic Computation with No Honest Majority | online |
2008 | eprint | More Discriminants with the Brezing-Weng Method | online |
2008 | eprint | Optimal Subset-Difference Broadcast Encryption with Free Riders | online |
2008 | eprint | Oblivious Transfer based on the McEliece Assumptions} | online |
2008 | eprint | Small Odd Prime Field Multivariate PKCs | online |
2008 | eprint | Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM | online |
2008 | eprint | How Risky is the Random-Oracle Model? | online |
2008 | eprint | Reducing Complexity Assumptions for Oblivious Transfer | online |
2008 | eprint | Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home | online |
2008 | eprint | Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality | online |
2008 | eprint | A non-delegatable identity-based strong designated verifier signature scheme | online |
2008 | eprint | Attacking Reduced Round SHA-256 | online |
2008 | eprint | Attribute-Based Ring Signatures | online |
2008 | eprint | Certificateless Signcryption | online |
2008 | eprint | Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer | online |
2008 | eprint | A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information | online |
2008 | eprint | Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs | online |
2008 | eprint | Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System | online |
2008 | eprint | Full Security:Fuzzy Identity Based Encryption | online |
2008 | eprint | Dynamic SHA-2 | online |
2008 | eprint | A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model | online |
2008 | eprint | A Real-World Attack Breaking A5/1 within Hours | online |
2008 | eprint | BGKM: An Efficient Secure Broadcasting Group Key Management Scheme | online |
2008 | eprint | Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication | online |
2008 | eprint | Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL | online |
2008 | eprint | Toy Factoring by Newton's Method | online |
2008 | eprint | New Impossible Differential Attacks on AES | online |
2008 | eprint | Robust Combiners for White-Box Security | online |
2008 | eprint | Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary | online |
2008 | eprint | Impossible Differential Cryptanalysis of CLEFIA | online |
2008 | eprint | Non-Malleable Obfuscation | online |
2008 | eprint | Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers | online |
2008 | eprint | Key-Private Proxy Re-Encryption | online |
2008 | eprint | Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour | online |
2008 | eprint | Explicit hard instances of the shortest vector problem | online |
2008 | eprint | The Walsh Spectrum of a New Family of APN Functions | online |
2008 | eprint | Secure Certificateless Public Key Encryption without Redundancy | online |
2008 | eprint | A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties | online |
2008 | eprint | Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures | online |
2008 | eprint | On Black-Box Ring Extraction and Integer Factorization | online |
2008 | eprint | Some Observations on SHAMATA | online |
2008 | eprint | Secure Online Elections in Practice | online |
2008 | eprint | Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation | online |
2008 | eprint | DISH: Distributed Self-Healing in Unattended Sensor Networks | online |
2008 | eprint | On the Security of Fully Collusion Resistant Traitor Tracing Schemes | online |
2008 | eprint | A non-interactive deniable authentication scheme based on designated verifier proofs | online |
2008 | eprint | Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC | online |
2008 | eprint | A Proxy Signature Scheme over Braid Groups | online |
2008 | eprint | Combined (identity-based) public key schemes | online |
2008 | eprint | Modular polynomials for genus 2 | online |
2008 | eprint | Fast hashing to G2 on pairing friendly curves | online |
2008 | eprint | Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks | online |
2008 | eprint | Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? | online |
2008 | eprint | Universally Composable Adaptive Oblivious Transfer | online |
2008 | eprint | The Generic Hardness of Subset Membership Problems under the Factoring Assumption | online |
2008 | eprint | On the (Im)Possibility of Key Dependent Encryption | online |
2008 | eprint | Slid Pairs in Salsa20 and Trivium | online |
2008 | eprint | Improved lower bound on the number of balanced symmetric functions over GF(p) | online |
2008 | eprint | Breaking RSA Generically is Equivalent to Factoring | online |
2008 | eprint | Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards | online |
2008 | eprint | Public-Key Encryption with Efficient Amortized Updates | online |
2008 | eprint | Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols | online |
2008 | eprint | Topology Knowledge Versus Fault Tolerance: The Case of Probabilistic Communication Or: How Far Must You See to Hear Reliably? | online |
2008 | eprint | Possibility and impossibility results for selective decommitments | online |
2008 | eprint | The $F_f$-Family of Protocols for RFID-Privacy and Authentication | online |
2008 | eprint | Understanding Phase Shifting Equivalent Keys and Exhaustive Search | online |
2008 | eprint | Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions | online |
2008 | eprint | Cryptanalysing the Critical Group | online |
2008 | eprint | Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography | online |
2008 | eprint | Binary Edwards Curves | online |
2008 | eprint | Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary | online |
2008 | eprint | On Round Complexity of Unconditionally Secure VSS | online |
2008 | eprint | Delegatable Anonymous Credentials | online |
2008 | eprint | Full Cryptanalysis of LPS and Morgenstern Hash Function | online |
2008 | eprint | On CCA1-Security of Elgamal And Damg{\aa}rd's Elgamal | online |
2008 | eprint | Non-Linear Reduced Round Attacks Against SHA-2 Hash family | online |
2008 | eprint | Collusion-Free Multiparty Computation in the Mediated Model | online |
2008 | eprint | Proofs of Retrievability: Theory and Implementation | online |
2008 | eprint | An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials | online |
2008 | eprint | New construction of Boolean functions with maximun algebraic immunity | online |
2008 | eprint | Divisible On-line/Off-line Signatures | online |
2008 | eprint | Algebraic Techniques in Differential Cryptanalysis | online |
2008 | eprint | Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem | online |
2008 | eprint | Optimal Discretization for High-Entropy Graphical Passwords | online |
2008 | eprint | New AES software speed records | online |
2008 | eprint | An Efficient ID-based Ring Signature Scheme from Pairings | online |
2008 | eprint | A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family | online |
2008 | eprint | Imaginary quadratic orders with given prime factor of class number | online |
2008 | eprint | A New Approach for Algebraically Homomorphic Encryption | online |
2008 | eprint | Proofs of Knowledge with Several Challenge Values | online |
2008 | eprint | On Kasami Bent Functions | online |
2008 | eprint | Restricted Adaptive Oblivious Transfer | online |
2008 | eprint | Elliptic divisibility sequences and the elliptic curve discrete logarithm problem | online |
2008 | eprint | Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 | online |
2008 | eprint | A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks | online |
2008 | eprint | On the Secure Obfuscation of Deterministic Finite Automata | online |
2008 | eprint | Inside the Hypercube | online |
2008 | eprint | A New Approach to Secure Logging | online |
2008 | eprint | Almost-Asynchronous MPC with Faulty Minority | online |
2008 | eprint | Privacy-Preserving Audit and Extraction of Digital Contents | online |
2008 | eprint | On differences of quadratic residues | online |
2008 | eprint | An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme | online |
2008 | eprint | Collision attack on NaSHA-512 | online |
2008 | eprint | Information Leakage of Flip-Flops in DPA-Resistant Logic Styles | online |
2008 | eprint | A new class of Bent functions in Polynomial Forms | online |
2008 | eprint | How to Build a Hash Function from any Collision-Resistant Function | online |
2008 | eprint | New Applications of Differential Bounds of the SDS Structure | online |
2008 | eprint | User-Sure-and-Safe Key Retrieval | online |
2008 | eprint | Comments on two multi-server authentication protocols | online |
2008 | eprint | Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks | online |
2008 | eprint | Investigating the DPA-Resistance Property of Charge Recovery Logics | online |
2008 | eprint | The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption | online |
2008 | eprint | A Tamper-Evident Voting Machine Resistant to Covert Channels | online |
2008 | eprint | ECM on Graphics Cards | online |
2008 | eprint | Endomorphisms for faster elliptic curve cryptography on a large class of curves | online |
2008 | eprint | Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1 | online |
2008 | eprint | An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs | online |
2008 | eprint | Dynamic Provable Data Possession | online |
2008 | eprint | A New Family of Perfect Nonlinear Binomials | online |
2008 | eprint | Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme | online |
2008 | eprint | Secure Multiparty Computation for Privacy-Preserving Data Mining | online |
2008 | eprint | Sphinx: A Compact and Provably Secure Mix Format | online |
2008 | eprint | Security needs in embedded systems | online |
2008 | eprint | Properties of Cryptographic Hash Functions | online |
2008 | eprint | Simultaneous field divisions: an extension of Montgomery's trick | online |
2008 | eprint | Signing a Linear Subspace: Signature Schemes for Network Coding | online |
2008 | eprint | On The Security of The ElGamal Encryption Scheme and Damgards Variant | online |
2008 | eprint | Usable Optimistic Fair Exchange | online |
2008 | eprint | How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG | online |
2008 | eprint | Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem | online |
2008 | eprint | Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing | online |
2008 | eprint | Double-Base Number System for Multi-Scalar Multiplications | online |
2008 | eprint | Privacy-Preserving Matching of DNA Profiles | online |
2008 | eprint | On the Design of Secure and Fast Double Block Length Hash Functions | online |
2008 | eprint | Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem | online |
2008 | eprint | On the Correctness of An Approach Against Side-channel attacks | online |
2008 | eprint | On Software Parallel Implementation of Cryptographic Pairings | online |
2008 | eprint | CM construction of genus 2 curves with p-rank 1 | online |
2008 | eprint | Partial Fairness in Secure Two-Party Computation | online |
2008 | eprint | Efficient Post-quantum Blind Signatures | online |
2008 | eprint | Efficient Receipt-Free Ballot Casting Resistant to Covert Channels | online |
2008 | eprint | Cube Attacks on Tweakable Black Box Polynomials | online |
2008 | eprint | Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme | online |
2008 | eprint | Generating genus two hyperelliptic curves over large characteristic finite fields | online |
2008 | eprint | Computing the Bilinear Pairings on Elliptic Curves with Automorphisms | online |
2008 | eprint | Collision Attack on the Waterfall Hash Function | online |
2008 | eprint | Complexity Analysis of a Fast Modular Multiexponentiation Algorithm | online |
2008 | eprint | Generating Shorter Bases for Hard Random Lattices | online |
2008 | eprint | Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption | online |
2008 | eprint | LEGO for Two Party Secure Computation | online |
2008 | eprint | Reducing the Complexity of the Weil Pairing Computation | online |
2008 | eprint | On the Role of KGC for Proxy Re-encryption in Identity Based Setting | online |
2008 | eprint | The Multireceiver Commitment Schemes | online |
2008 | eprint | On a New Formal Proof Model for RFID Location Privacy | online |
2008 | eprint | Multi-Factor Password-Authenticated Key Exchange | online |
2008 | eprint | Semi-free start collision attack on Blender | online |
2008 | eprint | On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics | online |
2008 | eprint | Modeling Computational Security in Long-Lived Systems, Version 2 | online |
2008 | eprint | A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices | online |
2008 | eprint | Additive Homomorphic Encryption with t-Operand Multiplications | online |
2008 | eprint | Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms | online |
2008 | eprint | Session-state Reveal is stronger than Ephemeral Key Reveal: Breaking the NAXOS key exchange protocol | online |
2008 | eprint | Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation | online |
2008 | eprint | New Related-Key Boomerang Attacks on AES | online |
2008 | eprint | Analysis and Details of the Random Cipher Output Mode Of Operation Primitives | online |
2008 | eprint | Cryptanalysis of the Hash Function LUX-256 | online |
2008 | eprint | Essentially Optimal Universally Composable Oblivious Transfer | online |
2008 | eprint | Improved Cryptanalysis of SHAMATA-BC | online |
2008 | eprint | Efficient Conversion of Secret-shared Values Between Different Fields | online |
2008 | eprint | Sharing DSS by the Chinese Remainder Theorem | online |
2008 | eprint | Encryption-On-Demand: Practical and Theoretical Considerations | online |
2008 | eprint | Automatic Generation of Sound Zero-Knowledge Protocols | online |
2008 | eprint | On the Security of a Visual Cryptography Scheme for Color Images | online |
2008 | eprint | Oblivious Transfer from Weak Noisy Channels | online |
2008 | eprint | An ID-based Authenticated Key Exchange Protocol based on Bilinear Diffie-Hellman Problem | online |
2008 | eprint | One-Round Authenticated Key Agreement from Weak Secrets | online |
2008 | eprint | Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme | online |
2008 | eprint | Simple and Efficient Asynchronous Byzantine Agreement with Optimal Resilience | online |
2008 | eprint | Proxy Key Re-encapsulation Mechanism for Group Communications | online |
2008 | eprint | Hash Functions from Sigma Protocols and Improvements to VSH | online |
2008 | eprint | New Impossible Differential Cryptanalysis of ARIA | online |
2008 | eprint | GUC-Secure Set-Intersection Computation | online |
2008 | eprint | Revisiting Wiener's Attack -- New Weak Keys in RSA | online |
2008 | eprint | From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol | online |
2008 | eprint | Identification and Privacy: Zero-Knowledge is not Enough | online |
2008 | eprint | Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC | online |
2008 | eprint | A New Collision Differential For MD5 With Its Full Differential Path | online |
2008 | eprint | Unconditionally Secure Multiparty Set Intersection Re-Visited | online |
2008 | eprint | A Novel Probabilistic Passive Attack on the Protocols HB and HB+ | online |
2008 | eprint | Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification | online |
2008 | eprint | Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary | online |
2008 | eprint | A Recursive Threshold Visual Cryptography Scheme | online |
2008 | eprint | On Resettably-Sound Resttable Zero Knowledege Arguments | online |
2008 | eprint | Cryptanalysis of RadioGatun | online |
2008 | eprint | On CCA1-Security of Elgamal And Damg{\aa}rd Cryptosystems | online |
2008 | eprint | Comments on two password based protocols | online |
2008 | eprint | Constant-Round Concurrent Non-Malleable Commitments and Decommitments | online |
2008 | eprint | Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift | online |
2008 | eprint | A Modular Security Analysis of the TLS Handshake Protocol | online |
2008 | eprint | Obtaining and solving systems of equations in key variables only for the small variants of AES | online |
2008 | eprint | Local Affinity Based Inversion of Filter Generators | online |
2008 | eprint | Lower Bounds on Black-Box Ring Extraction | online |
2008 | eprint | Cryptanalysis of ID-Based Signcryption Scheme for Multiple Receivers | online |
2008 | eprint | A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol | online |
2008 | eprint | Recognition in Ad Hoc Pervasive Networks | online |
2008 | eprint | New Collision attacks Against Up To 24-step SHA-2 | online |
2008 | eprint | Leakage-Resilient Cryptography in the Standard Model | online |
2008 | eprint | Novel Precomputation Schemes for Elliptic Curve Cryptosystems | online |
2008 | eprint | Practical Attacks on HB and HB+ Protocols | online |
2008 | eprint | Odd-Char Multivariate Hidden Field Equations | online |
2008 | eprint | Enumeration of Homogeneous Rotation Symmetric functions over GF(p) | online |
2008 | eprint | Authenticated Adversarial Routing | online |
2008 | eurocrypt | From Gamekeeping to Poaching - Information Forensics and Associated Challenges | |
2008 | eurocrypt | The Growth and Development of Public Key Cryptography | |
2008 | eurocrypt | Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle | online |
2008 | eurocrypt | Predicting Lattice Reduction | online |
2008 | eurocrypt | Zero-Knowledge Sets with Short Proofs | online |
2008 | eurocrypt | Precise Concurrent Zero Knowledge | online |
2008 | eurocrypt | Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves | online |
2008 | eurocrypt | Protocols and Lower Bounds for Failure Localization in the Internet | online |
2008 | eurocrypt | Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves | online |
2008 | eurocrypt | Threshold RSA for Dynamic and Ad-Hoc Groups | online |
2008 | eurocrypt | The Twin Diffie-Hellman Problem and Applications | online |
2008 | eurocrypt | New Constructions for UC Secure Computation Using Tamper-Proof Hardware | online |
2008 | eurocrypt | Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products | online |
2008 | eurocrypt | Obfuscating Point Functions with Multibit Output | online |
2008 | eurocrypt | Efficient Non-interactive Proof Systems for Bilinear Groups | online |
2008 | eurocrypt | Almost-Everywhere Secure Computation | online |
2008 | eurocrypt | Collisions for the LPS Expander Graph Hash Function | online |
2008 | eurocrypt | Second Preimage Attacks on Dithered Hash Functions | online |
2008 | eurocrypt | HB#: Increasing the Security and Efficiency of HB+ | online |
2008 | eurocrypt | Key Recovery on Hidden Monomial Multivariate Schemes | online |
2008 | eurocrypt | David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware | online |
2008 | eurocrypt | Towards Key-Dependent Message Security in the Standard Model | online |
2008 | eurocrypt | Security/Efficiency Tradeoffs for Permutation-Based Hashing | online |
2008 | eurocrypt | Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors | online |
2008 | eurocrypt | Efficient Sequential Aggregate Signed Data | online |
2008 | eurocrypt | A Practical Attack on KeeLoq | online |
2008 | eurocrypt | Proving Tight Security for Rabin-Williams Signatures | online |
2008 | eurocrypt | On the Indifferentiability of the Sponge Construction | online |
2008 | eurocrypt | Isolated Proofs of Knowledge and Isolated Zero Knowledge | online |
2008 | eurocrypt | New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | online |
2008 | eurocrypt | Efficient Two Party and Multi Party Computation Against Covert Adversaries | online |
2008 | eurocrypt | A New Mode of Operation for Block Ciphers and Length-Preserving MACs | online |
2008 | eurocrypt | Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme | online |
2008 | eurocrypt | Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings | online |
2008 | eurocrypt | HB#: Increasing the Security and Efficiency of HB+ | 361-378 |
2008 | fse | Cryptanalysis of LASH | online |
2008 | fse | SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags | online |
2008 | fse | Impossible Differential Cryptanalysis of CLEFIA | online |
2008 | fse | A Meet-in-the-Middle Attack on 8-Round AES | online |
2008 | fse | Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL | online |
2008 | fse | The Hash Function Family LAKE | online |
2008 | fse | Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis | online |
2008 | fse | A Unified Approach to Related-Key Attacks | online |
2008 | fse | Algebraic and Slide Attacks on KeeLoq | online |
2008 | fse | Improved Indifferentiability Security Analysis of chopMD Hash Function | online |
2008 | fse | Entropy of the Internal State of an FCSR in Galois Representation | online |
2008 | fse | SWIFFT: A Modest Proposal for FFT Hashing | online |
2008 | fse | Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent | online |
2008 | fse | Collisions for Step-Reduced SHA-256 | online |
2008 | fse | On the Salsa20 Core Function | online |
2008 | fse | Efficient Reconstruction of RC4 Keys from Internal States | online |
2008 | fse | New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru | online |
2008 | fse | Post-Processing Functions for a Biased Physical Random Number Generator | online |
2008 | fse | A (Second) Preimage Attack on the GOST Hash Function | online |
2008 | fse | Differential Fault Analysis of Trivium | online |
2008 | fse | How to Encrypt with a Malicious Random Number Generator | online |
2008 | fse | Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator | online |
2008 | fse | MD4 is Not One-Way | online |
2008 | fse | Bit-Pattern Based Integral Attack | online |
2008 | fse | New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba | online |
2008 | fse | Hash functions and SHA-3 | |
2008 | fse | Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers | online |
2008 | fse | An Improved Security Bound for HCTR | online |
2008 | fse | New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 | online |
2008 | fse | Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation | online |
2008 | fse | Collisions on SHA-0 in One Hour | online |
2008 | fse | A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier | online |
2008 | jofc | Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | 350-391 |
2008 | jofc | Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs | 303-349 |
2008 | jofc | Index Calculus in Class Groups of Non-hyperelliptic Curves of Genus Three | 593-611 |
2008 | jofc | Simpler Session-Key Generation from Short Random Passwords | 52-96 |
2008 | jofc | Tag-KEM/DEM: A New Framework for Hybrid Encryption | 97-130 |
2008 | jofc | On Probability of Success in Linear and Differential Cryptanalysis | 131-147 |
2008 | jofc | Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes | 280-301 |
2008 | jofc | Practical Construction and Analysis of Pseudo-Randomness Primitives | 1-26 |
2008 | jofc | Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups | 149-177 |
2008 | jofc | Lower Bounds and Impossibility Results for Concurrent Self Composition | 200-249 |
2008 | jofc | Generic Constructions of Identity-Based and Certificateless KEMs | 178-199 |
2008 | jofc | Cryptanalysis of ISO/IEC 9796-1 | 27-51 |
2008 | jofc | Probabilistic Reliability and Privacy of Communication Using Multicast in General Neighbor Networks | 250-279 |
2008 | jofc | Cryptanalysis of an E0-like Combiner with Memory | 430-457 |
2008 | jofc | On the Relationships between Notions of Simulation-Based Security | 492-546 |
2008 | jofc | Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm | 469-491 |
2008 | jofc | Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication | 392-429 |
2008 | jofc | New Binding-Concealing Trade-Offs for Quantum String Commitment | 579-592 |
2008 | jofc | Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson's Group | 458-468 |
2008 | jofc | Encryption Modes with Almost Free Message Integrity | 547-578 |
2008 | pkc | Lattice-Based Identification Schemes Secure Under Active Attacks | online |
2008 | pkc | Efficient Simultaneous Broadcast | online |
2008 | pkc | Completely Non-malleable Encryption Revisited | online |
2008 | pkc | Online-Untransferable Signatures | online |
2008 | pkc | Cryptographic Test Correction | online |
2008 | pkc | SAS-Based Group Authentication and Key Agreement Protocols | online |
2008 | pkc | Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time | online |
2008 | pkc | A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents | online |
2008 | pkc | Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption | online |
2008 | pkc | Recovering NTRU Secret Key from Inversion Oracles | online |
2008 | pkc | Total Break of the l-IC Signature Scheme | online |
2008 | pkc | Relations Among Notions of Plaintext Awareness | online |
2008 | pkc | An Analysis of the Vector Decomposition Problem | online |
2008 | pkc | Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? | online |
2008 | pkc | An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm | online |
2008 | pkc | Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results | online |
2008 | pkc | Proxy Signatures Secure Against Proxy Key Exposure | online |
2008 | pkc | New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields | online |
2008 | pkc | A Digital Signature Scheme Based on CVPinfinity | online |
2008 | pkc | Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures | online |
2008 | pkc | Security of Digital Signature Schemes in Weakened Random Oracle Models | online |
2008 | pkc | Certificateless Encryption Schemes Strongly Secure in the Standard Model | online |
2008 | pkc | The Role of Discrete Logarithms in Designing Secure CryptoSystems | |
2008 | pkc | How to Secretly Extract Hidden Secret Keys: A State of the Attacks | |
2008 | pkc | Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings | online |
2008 | tcc | Faster and Shorter Password-Authenticated Key Exchange | online |
2008 | tcc | Multi-property Preserving Combiners for Hash Functions | online |
2008 | tcc | P-signatures and Noninteractive Anonymous Credentials | online |
2008 | tcc | The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization | online |
2008 | tcc | General Properties of Quantum Zero-Knowledge Proofs | online |
2008 | tcc | An Equivalence Between Zero Knowledge and Commitments | online |
2008 | tcc | Concurrent Non-malleable Commitments from Any One-Way Function | online |
2008 | tcc | Matroids Can Be Far from Ideal Secret Sharing | online |
2008 | tcc | Saving Private Randomness in One-Way Functions and Pseudorandom Generators | online |
2008 | tcc | Bridging Game Theory and Cryptography: Recent Results and Future Directions | online |
2008 | tcc | Lower Bounds on Implementing Robust and Resilient Mediators | online |
2008 | tcc | A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval | online |
2008 | tcc | Equivocal Blind Signatures and Adaptive UC-Security | online |
2008 | tcc | OT-Combiners via Secure Computation | online |
2008 | tcc | Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | online |
2008 | tcc | Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency | online |
2008 | tcc | Cryptography and Game Theory: Designing Protocols for Exchanging Information | online |
2008 | tcc | Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker | online |
2008 | tcc | On Seed-Incompressible Functions | online |
2008 | tcc | Basing Weak Public-Key Cryptography on Strong One-Way Functions | online |
2008 | tcc | MPC vs. SFE: Perfect Security in a Unified Corruption Model | online |
2008 | tcc | Perfectly-Secure MPC with Linear Communication Complexity | online |
2008 | tcc | Asymptotically Efficient Lattice-Based Digital Signatures | online |
2008 | tcc | The Layered Games Framework for Specifications and Analysis of Security Protocols | online |
2008 | tcc | Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model | online |
2008 | tcc | Which Languages Have 4-Round Zero-Knowledge Proofs? | online |
2008 | tcc | Degradation and Amplification of Computational Hardness | online |
2008 | tcc | Universally Composable Multi-party Computation with an Unreliable Common Reference String | online |
2008 | tcc | Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries | online |
2008 | tcc | Fast Private Norm Estimation and Heavy Hitters | online |
2008 | tcc | How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge | online |
2008 | tcc | Verifiably Secure Devices | online |
2008 | tcc | On Constant-Round Concurrent Zero-Knowledge | online |
2008 | tcc | Semi-honest to Malicious Oblivious Transfer - The Black-Box Way | online |
2008 | tcc | A Survey of Game-Theoretic Approaches for the Design and Analysis of Protocols | |
2008 | tcc | Randomness Extractors and their Cryptographic Applications | |
2008 | tcc | Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008 | online |