![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IACR Cryptology ePrint Archive, Volume 2005
Volume 2005, 2005
- Hoeteck Wee:
On Obfuscating Point Functions. 1 - Jason E. Holt, Kent E. Seamons:
Logcrypt: Forward Security and Public Verification for Secure Audit Logs. 2 - Vlastimil Klíma:
Cryptanalysis of Hiji-bij-bij (HBB). 3 - Jacques Patarin, Audrey Montreuil:
Benes and Butterfly schemes revisited. 4 - Shai Halevi:
A sufficient condition for key-privacy. 5 - Pradeep Kumar Mishra, Kishan Chand Gupta:
A Metric on the Set of Elliptic Curves over Fp. 6 - Hongjun Wu:
The Misuse of RC4 in Microsoft Word and Excel. 7 - Jiang Wu, Ruizhong Wei:
Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004. 8 - Bernd Schomburg:
Mixing properties of triangular feedback shift registers. 9 - Vincent Rijmen, Elisabeth Oswald:
Update on SHA-1. 10 - Yuanchao Zhao, Daoben Li:
An Improved Elegant Method to Re-initialize Hash Chains. 11 - Zhaohui Cheng, Richard Comley:
Efficient Certificateless Public Key Encryption. 12 - Hung-Yu Chien:
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols. 13 - Ludovic Perret:
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words. 14 - Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. 15 - Magnus Daum:
Narrow T-functions. 16 - Roberto Maria Avanzi:
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives. 17 - Dan Boneh, Craig Gentry, Brent Waters:
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. 18 - Jesús F. Almansa:
The Full Abstraction of the UC Framework. 19 - Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
(De)Compositions of Cryptographic Schemes and their Applications to Protocols. 20 - Eabhnat Ní Fhloinn, Michael Purser:
Partial Hiding in Public-Key Cryptography. 21 - ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim:
An Improved and Efficient Countermeasure against Power Analysis Attacks. 22 - Masao Kasahara:
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness. 23 - A. A. Kalele, Virendra R. Sule:
Weak keys of the Diffe Hellman key exchange I. 24 - Qingshu Meng, Min Yang, Huanguo Zhang, Yuzhen Liu:
Analysis of Affinely Equivalent Boolean Functions. 25 - Jovan Dj. Golic:
Techniques for random maskin in hardware. 26 - Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. 27 - Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. 28 - Boaz Barak, Shai Halevi:
A model and architecture for pseudo-random generation with applications to /dev/random. 29 - A. A. Kalele, Virendra R. Sule:
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves. 30 - Iwan M. Duursma, Negar Kiyavash:
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves. 31 - Dennis Hofheinz, Dominique Unruh:
On the Notion of Statistical Security in Simulatability Definitions. 32 - Serge Mister, Robert J. Zuccherato:
An Attack on CFB Mode Encryption As Used By OpenPGP. 33 - Gene Tsudik, Shouhuai Xu:
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication). 34 - Benoît Chevallier-Mames:
An Efficient CDH-based Signature Scheme With a Tight Security Reduction. 35 - Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran:
Concurrent Composition of Secure Protocols in the Timing Model. 36 - Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. 37 - (Withdrawn) Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants. 38
- Joan Daemen, Gilles Van Assche:
Distinguishing Stream Ciphers with Convolutional Filters. 39 - Juan M. Estévez-Tapiador, Almudena Alcaide:
Unfairness of a protocol for certified delivery. 40 - Lihua Liu, Zhengjun Cao:
On the Security of a Group Signature Scheme with Strong Separability. 41 - O. A. Logachev, A. A. Salnikov, V. V. Yashchenko:
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications. 42 - Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption. 43 - Sergey Agievich:
On the affine classification of cubic bent functions. 44 - Nick Howgrave-Graham, Joseph H. Silverman, William Whyte:
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. 45 - Mario Di Raimondo, Rosario Gennaro:
New Approaches for Deniable Authentication. 46 - Qiang Tang
, Chris J. Mitchell:
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme. 47 - Qiang Tang
, Chris J. Mitchell:
Cryptanalysis of two identification schemes based on an ID-based cryptosystem. 48 - Gildas Avoine:
Adversarial Model for Radio Frequency Identification. 49 - Poorvi L. Vora:
David Chaum's Voter Verification using Encrypted Paper Receipts. 50 - Zhengjun Cao:
A Note on Shor's Quantum Algorithm for Prime Factorization. 51 - Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. 52 - Hung-Min Sun, Mu-En Wu:
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. 53 - (Withdrawn) Comment on cryptanalysis of Tseng et al.¡¦s authenticated encryption schemes. 54
- Zhengjun Cao:
Untraceability of Two Group Signature Schemes. 55 - Daniel R. L. Brown:
Deniable Authentication with RSA and Multicasting. 56 - Victor K. Wei:
Tight Reductions among Strong Di e-Hellman Assumptions. 57 - Kamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel P. Smart:
Generic Constructions of Identity-Based and Certificateless KEMs. 58 - László Csirmaz:
Secret sharing schemes on graphs. 59 - Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. 60 - Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval:
Key Derivation and Randomness Extraction. 61 - (Withdrawn) Cryptanalysis of One Fair E-cash System. 62
- (Withdrawn) On the Key Schedule of Blowfish. 63
- Anish Mathuria, Vipul Jain:
On Efficient Key Agreement Protocols. 64 - Tim Kerins, William P. Marnane, Emanuel M. Popovici, Paulo S. L. M. Barreto:
Efficient hardware for the Tate pairing calculation in characteristic three. 65 - Eike Kiltz:
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. 66 - Arjen K. Lenstra, Xiaoyun Wang, Benne de Weger:
Colliding X.509 Certificates. 67 - Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov:
N-adic Summation-Shrinking Generator. Basic properties and empirical evidences. 68 - Vassil S. Dimitrov, Laurent Imbert, P. K. Mishra:
Fast Elliptic Curve Point Multiplication using Double-Base Chains. 69 - Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka:
On public-key cryptosystems based on combinatorial group theory. 70 - (Withdrawn) A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields. 71
- Johannes Buchmann, Christoph Ludwig:
Practical Lattice Basis Sampling Reduction. 72 - Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo:
Broadcast Encryption π. 73 - Mathieu Baudet, Véronique Cortier, Steve Kremer:
Computationally sound implementations of equational theories against passive adversaries. 74 - Vlastimil Klíma:
Finding MD5 Collisions - a Toy For a Notebook. 75 - Neal Koblitz, Alfred Menezes:
Pairing-Based Cryptography at High Security Levels. 76 - Christopher Wolf, Bart Preneel:
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. 77 - Wieland Fischer, Jean-Pierre Seifert:
Duality between Multiplication and Modular Reduction. 78 - Marius-Calin Silaghi:
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism. 79 - R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan:
A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification. 80 - (Withdrawn) Smashing SMASH. 81
- Lars R. Knudsen:
Some properties of an FSE 2005 Hash Proposal. 82 - Kristian Gjøsteen:
Security notions for disk encryption. 83 - Goce Jakimoski, Yvo Desmedt:
On Resistance of DES to Related-Key Differential Cryptanalysis. 84 - (Withdrawn) A new structural attack for GPT and variants. 85
- Henry Ng:
Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia). 86 - Rostovtsev A. G., Shemyakina O. V.:
AES side channel attack protection using random isomorphisms. 87 - Joan Daemen, Vincent Rijmen:
The Pelican MAC Function. 88 - Hans Dobbertin, Gregor Leander:
Cryptographer's Toolkit for Construction of 8-Bit Bent Functions. 89 - Jin Hong, Palash Sarkar:
Rediscovery of Time Memory Tradeoffs. 90 - Markus Jakobsson, Adam L. Young:
Distributed Phishing Attacks. 91 - Charanjit S. Jutla:
PRF Domain Extension Using DAGs. 92 - Guohong Xie:
An ID-Based Key Agreement Scheme from pairing. 93 - M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena:
A Survey on ID-Based Cryptographic Primitives. 94 - Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. 95 - David Jedlicka:
Almost Perfect Nonlinear Monomials over GF(2n) for Infinitely Many n. 96 - Yassine Lakhnech, Laurent Mazaré:
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation. 97 - Yassine Lakhnech, Laurent Mazaré:
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme. 98 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes. 99 - Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang:
almost enumeration of 8-variable bent functions. 100 - Gergei Bana:
Soundness and Completeness of Formal Logics of Symmetric Encryption. 101 - Vlastimil Klíma:
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications. 102 - Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. 103 - Nick Howgrave-Graham, Jeffrey Hoffstein, Jill Pipher, William Whyte:
On estimating the lattice security of NTRU. 104 - Chris Peikert:
On Error Correction in the Exponent. 105 - Boaz Barak, Amit Sahai:
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation. 106 - Ophir Levy, Avishai Wool:
A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher. 107 - Yongge Wang:
Efficient Identity-Based and Authenticated Key Agreement Protocol. 108 - Sahadeo Padhye:
A Public Key Cryptosystem Based on Singular Cubic Curve. 109 - Ayan Mahalanobis:
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups. 110 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:
Weak Composite Diffie-Hellman is not Weaker than Factoring. 111 - Bo Gyeong Kang, Je Hong Park:
On the relationship between squared pairings and plain pairings. 112 - Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava:
Partially Fixed Point Multiplication. 113 - Gene Itkis, Robert McNerney, Scott Russell:
Intrusion-Resilient Secure Channels. 114 - Marco Macchetti:
Characteristics of Key-Dependent S-Boxes: the Case of Twofish. 115 - Nigel P. Smart, Frederik Vercauteren:
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems. 116 - David Galindo:
Boneh-Franklin Identity Based Encryption Revisited. 117 - Deepak Kumar Dalai, Subhamoy Maitra:
Results on Rotation Symmetric Bent Functions. 118 - Claus Diem:
Index Calculus in Class Groups of Plane Curves of Small Degree. 119 - Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamoto:
On Designatedly Verified (Non-interactive) Watermarking Schemes. 120 - Julie Thorpe, Paul C. van Oorschot, Anil Somayaji:
Pass-thoughts: Authenticating With Our Minds. 121 - Xinyi Huang, Willy Susilo, Yi Mu:
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. 122 - Lan Nguyen:
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation. 123 - Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan:
Append-Only Signatures. 124 - Nicolas Thériault:
SPA Resistant Left-to-Right Integer Recodings. 125 - Shahram Khazaei, Mahmoud Salmasizadeh, Javad Mohajeri:
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator. 126 - Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. 127 - (Withdrawn) Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials. 128
- Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu:
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. 129 - (Withdrawn) Results on Rotation Symmetric Boolean Functions on Even Number Variable. 130
- Ratna Dutta, Rana Barua:
Dynamic Group Key Agreement in Tree-Based Setting. 131 - Jiejun Kong:
Formal Notions of Anonymity for Peer-to-peer Networks. 132 - Paulo S. L. M. Barreto, Michael Naehrig:
Pairing-Friendly Elliptic Curves of Prime Order. 133 - Mahalingam Ramkumar:
Broadcast Authentication With Hashed Random Preloaded Subsets. 134 - Jacques Patarin, Paul Camion:
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model. 135 - Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo:
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. 136 - Douglas Wikström:
A Sender Verifiable Mix-Net and a New Proof of a Shuffle. 137 - Mahalingam Ramkumar:
I-HARPS: An Efficient Key Pre-distribution Scheme. 138 - Michael Scott:
Scaling security in pairing-based protocols. 139 - Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft:
How to Split a Shared Secret into Shared Bits in Constant-Round. 140 - Qiang Tang
, Chris J. Mitchell:
Enhanced password-based key establishment protocol. 141 - Mahalingam Ramkumar:
Broadcast Encryption with Random Key Pre-distribution Schemes. 142 - Liangliang Xiao, Mulan Liu, Zhifang Zhang:
Multiparty Computation Based on Connectivity of Graphs. 143 - Dieter Schmidt:
Kaweichel, an Extension of Blowfish for 64-Bit Architectures. 144 - Ee-Chien Chang, Qiming Li:
Small Secure Sketch for Point-Set Difference. 145 - Bo Yang, Sambit Mishra, Ramesh Karri
:
A High Speed Architecture for Galois/Counter Mode of Operation (GCM). 146 - Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware. 147 - Toshihiko Matsuo, Shin'ichiro Matsuo:
On Universal Composable Security of Time-Stamping Protocols. 148 - Aldar C.-F. Chan, Ian F. Blake:
Conditionally Verifiable Signatures. 149 - Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott:
Secure Delegation of Elliptic-Curve Pairing. 150 - Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4. 151 - Richard Ostertág, Martin Stanek:
On High-Rate Cryptographic Compression Functions. 152 - Sahadeo Padhye:
On Security of Koyama Schemes. 153 - Marius-Calin Silaghi, Gerhard Friedrich:
Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol. 154 - Eli Biham, Jennifer Seberry:
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays. 155 - Qiang Tang
, Chris J. Mitchell:
On the security of some password-based key agreement schemes. 156 - Colm O'Keeffe, Emanuel M. Popovici:
FOX Algorithm Implementation: a hardware design approach. 157 - Arkady Berenstein, Leon Chernyak:
Geometric Cryptosystem. 158 - Emanuele Viola:
On Constructing Parallel Pseudorandom Generators from One-Way Functions. 159 - Manuel Barbosa, Richard Noad, Daniel Page, Nigel P. Smart:
First Steps Toward a Cryptography-Aware Language and Compiler. 160 - David A. McGrew, Scott R. Fluhrer:
Multiple forgery attacks against Message Authentication Codes. 161 - Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa:
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. 162 - Jonathan Katz, Ji Sun Shin:
Modeling Insider Attacks on Group Key-Exchange Protocols. 163 - Mohammad Ali Orumiehchiha, R. Mirghadri:
A Distinguish attack on COSvd Ciphers. 164 - Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito:
CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER. 165 - Eunjeong Lee, Yoonjin Lee:
Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems. 166 - (Withdrawn) Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems. 167
- Lan Nguyen, Reihaneh Safavi-Naini:
Dynamic k-Times Anonymous Authentication. 168 - Shai Halevi, Paul A. Karger, Dalit Naor:
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control. 169 - Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen:
Unclonable Group Identification. 170 - Prateek Gupta, Vitaly Shmatikov:
Towards computationally sound symbolic analysis of key exchange protocols. 171 - (Withdrawn) Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy. 172
- Qiang Tang
, Chris J. Mitchell:
Weaknesses in a leakage-resilient authenticated key transport protocol. 173 - Manuel Barbosa, Dan Page:
On the Automatic Construction of Indistinguishable Operations. 174 - Yassir Nawaz, Kishan Chand Gupta, Guang Gong:
A 32-bit RC4-like Keystream Generator. 175 - Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol. 176 - László Csirmaz:
Secret sharing on the d-dimensional cube. 177 - Sujing Zhou, Dongdai Lin:
Analyzing Unlinkability of Some Group Signatures. 178 - Stefan Dziembowski
:
Intrusion-Resilience via the Bounded-Storage Model. 179 - Chunxiang Xu, Junhui Zhou, Zhiguang Qin:
A Note on Secure Key Issuing in ID-based Cryptography. 180 - Shai Halevi:
A plausible approach to computer-aided cryptographic proofs. 181 - Chih-I Wang, Chun-I Fan, D. J. Guan:
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol. 182 - Thierry Moreau:
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications. 183 - Dongvu Tonien, Reihaneh Safavi-Naini:
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families. 184 - Qiang Tang
, Chris J. Mitchell:
Security properties of two provably secure conference key agreement protocols. 185 - (Withdrawn) Linkability of Several Blind Signature Schemes. 186
- Michael O. Rabin:
How To Exchange Secrets with Oblivious Transfer. 187 - Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature where Group Manager, Members and Open Authority are Identity-Based. 188 - Daniel R. L. Brown:
A Weak-Randomizer Attack on RSA-OAEP with e = 3. 189 - SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA". 190 - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Public Key Encryption with Keyword Search Revisited. 191 - Carlos Coronado:
On the security and the efficiency of the Merkle signature scheme. 192 - Scott Contini, Arjen K. Lenstra, Ron Steinfeld:
VSH, an Efficient and Provable Collision Resistant Hash Function. 193 - Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu:
Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography. 194 - Arjen K. Lenstra, Benjamin M. M. de Weger:
Twin RSA. 195 - Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie:
Universally Composable Password-Based Key Exchange. 196 - Qiang Tang
, Liqun Chen:
Weaknesses in two group Diffie-Hellman key exchange protocols. 197 - Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
:
Universally Composable Time-Stamping Schemes with Audit. 198 - (Withdrawn) Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security. 199
- Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann:
Block ciphers sensitive to Groebner Basis Attacks. 200 - Zhaohui Cheng, Liqun Chen:
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants. 201 - Nicolas T. Courtois:
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES. 202 - Nicolas T. Courtois, Blandine Debraize, Eric Garrido:
On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions. 203 - Nicolas T. Courtois, Louis Goubin:
An Algebraic Masking Method to Protect AES Against Power Attacks. 204 - Alfred Menezes:
Another look at HMQV. 205 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols. 206 - Alex Biryukov:
Some Thoughts on Time-Memory-Data Tradeoffs. 207 - (Withdrawn) On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm. 208
- Jin Wook Byun, Dong Hoon Lee:
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. 209 - John Black:
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. 210 - Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality. 211 - Joan Daemen, Vincent Rijmen:
Probability distributions of Correlation and Differentials in Block Ciphers. 212 - (Withdrawn) A Counter-based MAC Revisited: Towards Better Security. 213
- Sourav Mukhopadhyay, Palash Sarkar:
TMTO With Multiple Data: Analysis and New Single Table Trade-offs. 214 - Jason E. Holt:
Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes. 215 - Hassan Jameel, Sungyoung Lee:
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret. 216 - Manuel Barbosa, Pooya Farshim:
Efficient Identity-Based Key Encapsulation to Multiple Parties. 217 - W. Charles Holland, Boaz Tsaban:
The conjugacy problem and related problems in lattice-ordered groups. 218 - Hongjun Wu:
Cryptanalysis of a 32-bit RC4-like Stream Cipher. 219 - Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-style XOR. 220 - Ratna Dutta, Rana Barua:
Constant Round Dynamic Group Key Agreement. 221 - Min Feng, Bin B. Zhu, MaoZhi Xu, Shipeng Li:
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis. 222 - Ayan Mahalanobis:
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups. 223 - Liqun Chen, Zhaohui Cheng, John Malone-Lee, Nigel P. Smart:
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction. 224 - Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger:
Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving. 225 - Liqun Chen, Zhaohui Cheng:
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. 226 - K. Maneva-Jakimoska, Goce Jakimoski, Mike Burmester:
Threshold Ring Signatures Efficient for Large Sets of Signers. 227 - Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. 228 - Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar:
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. 229 - (Withdrawn) Yet Another Short Signatures Without Random Oracles from Bilinear Pairings. 230
- Boaz Tsaban:
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards. 231 - Markus Volkmer, Sebastian Wallner:
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines. 232 - Luke O'Connor:
On the Entropy of Arcfour Keys. 233 - William Millan, Ed Dawson:
LILI-II is not Broken. 234 - Markus Volkmer, Sebastian Wallner:
Tree Parity Machine Rekeying Architectures for Embedded Security. 235 - Pu Duan, Shi Cui, Choong Wah Chan:
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves. 236 - Henri Gilbert, Matthew J. B. Robshaw, Hervé Sibert:
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol. 237 - (Withdrawn) Simple and Provable Secure Strong Designated Verifier Signature Schemes. 238
- Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment. 239 - Fangguo Zhang, Xiaofeng Chen:
Attack on Okamoto et al.'s New Short Signature Schemes. 240 - Hao Chen, Liqing Xu:
On the binary sequences with high GF(2) linear complexities and low GF(p) linear complexities. 241 - Rafail Ostrovsky, William E. Skeith III:
Private Searching On Streaming Data. 242 - Nicolas T. Courtois:
Cryptanalysis of Sfinks. 243 - Boaz Tsaban:
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1. 244 - An Braeken, Bart Preneel:
On the Algebraic Immunity of Symmetric Boolean Functions. 245 - Jens Groth:
A Verifiable Secret Shuffle of Homomorphic Encryptions. 246 - Charanjit S. Jutla, Anindya C. Patthak:
A Simple and Provably Good Code for SHA Message Expansion. 247 - Michael Szydlo, Yiqun Lisa Yin:
Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing. 248 - (Withdrawn) Efficient Certificateless Public Key Encryption. 249
- Shishir Nagaraja, Ross J. Anderson:
The topology of covert conflict. 250 - Nicolas T. Courtois:
Feistel Schemes and Bi-Linear Cryptanalysis. 251 - Michael Scott:
Faster Pairings using an Elliptic Curve with an Efficient Endomorphism. 252 - David Galindo, Ichiro Hasuo
:
Security Notions for Identity Based Encryption. 253 - Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. 254 - Jintai Ding, Jason E. Gower:
Inoculating Multivariate Schemes Against Differential Attacks. 255 - Reihaneh Safavi-Naini, Dongvu Tonien:
Fuzzy Universal Hashing and Approximate Authentication. 256 - Jin Hong, Woo-Hwan Kim:
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. 257 - Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. 258 - Bo Gyeong Kang, Moon Sung Lee, Je Hong Park:
Efficient Delegation of Pairing Computation. 259 - Bo Gyeong Kang, Je Hong Park:
Powered Tate Pairing Computation. 260 - Alexander W. Dent:
The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model. 261 - Ivan Damgård, Yuval Ishai:
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. 262 - Jun Yajima, Takeshi Shimoyama:
Wang's sufficient conditions of MD5 are not sufficient. 263 - Boaz Tsaban:
On an authentication scheme based on the Root Problem in the braid group. 264 - Kristin E. Lauter, Anton Mityagin:
Security Analysis of KEA Authenticated Key Exchange Protocol. 265 - Charanjit S. Jutla, Anindya C. Patthak:
A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code. 266 - Cees J. A. Jansen:
Stream Cipher Design based on Jumping Finite State Machines. 267 - Shujun Li, Heung-Yeung Shum:
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI. 268 - Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing. 269 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. 270 - Dag Arne Osvik, Adi Shamir, Eran Tromer:
Cache attacks and Countermeasures: the Case of AES. 271 - Amitabh Saxena, Ben Soh:
An Authentication Protocol For Mobile Agents Using Bilinear Pairings. 272 - P. G. Vaidya, Sajini Anand:
CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III. 273 - Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte:
Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign. 274 - Dongvu Tonien, Reihaneh Safavi-Naini:
Explicit Construction of Secure Frameproof Codes. 275 - Jung Hee Cheon, Dong Hoon Lee:
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. 276 - Fumiyuki Momose, Jinhui Chao:
Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions. 277 - Katja Schmidt-Samoa:
A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications. 278 - Bao Li, Hongda Li, Guangwu Xu, Haixia Xu:
Efficient reduction of 1 out of n oblivious transfers in random oracle model. 279 - Dan Page:
Partitioned Cache Architecture as a Side-Channel Defence Mechanism. 280 - John Kelsey, Tadayoshi Kohno:
Herding Hash Functions and the Nostradamus Attack. 281 - James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy:
Spreading Alerts Quietly and the Subgroup Escape Problem. 282 - Samad Nasserian, Gene Tsudik:
Revisiting Oblivious Signature-Based Envelopes. 283 - Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein:
Foundations and Applications for Secure Triggers. 284 - Banghe Li:
Generalizations of RSA public key cryptosystems. 285 - Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan:
Concurrent Zero Knowledge without Complexity Assumptions. 286 - Yijuan Shi, Jianhua Li:
Provable Efficient Certificateless Public Key Encryption. 287 - Xavier Boyen, Qixiang Mei, Brent Waters:
Direct Chosen Ciphertext Security from Identity-Based Techniques. 288 - Ratna Dutta, Rana Barua:
Overview of Key Agreement Protocols. 289 - Jens Groth, Rafail Ostrovsky, Amit Sahai:
Perfect Non-Interactive Zero Knowledge for NP. 290 - Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Cryptography In the Bounded Quantum-Storage Model. 291 - Wenling Wu, Wentao Zhang, Dengguo Feng:
Improved Integral Cryptanalysis of FOX Block Cipher. 292 - Colm O'hEigeartaigh:
Speeding Up Pairing Computation. 293 - Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:
On Fairness in Simulatability-based Cryptographic Systems. 294 - He Ge:
Hidden Exponent RSA and Efficient Key Distribution. 295 - Markus Volkmer, Sebastian Wallner:
A Key Establishment IP-Core for Ubiquitous Computing. 296 - Maithili Narasimha, Gene Tsudik:
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining. 297 - Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark. 298 - Marcin Kontak, Janusz Szmidt:
Nonlinearity of the Round Function. 299 - Songping Li, Quan Yuan, Jin Li:
Towards Security Two-part Authenticated Key Agreement Protocols. 300 - Paris Kitsos:
On the Hardware Implementation of the MICKEY-128 Stream Cipher. 301 - Angela Murphy, Noel Fitzpatrick:
Elliptic Curves for Pairing Applications. 302 - Kevin Fu, Seny Kamara, Tadayoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. 303 - Adam Bender, Jonathan Katz, Ruggero Morselli:
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. 304 - Anna Lysyanskaya, Maria Meyerovich:
Steganography with Imperfect Samplers. 305 - Yasuyuki Murakami, Masao Kasahara:
Murakami-Kasahara ID-based Key Sharing Scheme Revisited - In Comparison with Maurer-Yacobi Schemes -. 306 - Kamel Bentahar:
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. 307 - Chunbo Ma, Jun Ao, Dake He:
Adaptable Group-Oriented Signature. 308 - Quan Yuan, Songping Li:
A New Efficient ID-Based Authenticated Key Agreement Protocol. 309 - Hiroyuki Okazaki, Ryuichi Sakai, Masao Kasahara:
Meta Ring Signature. 310 - Cécile Canovas, Jessy Clédière:
What do S-boxes Say in Differential Side Channel Attacks? 311 - Xijin Tang, Yong Feng:
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations. 312 - Javier Herranz:
Deterministic Identity-Based Signatures for Partial Aggregation. 313 - Pierrick Gaudry:
Fast genus 2 arithmetic based on Theta functions. 314 - David Molnar, Andrea Soppera, David A. Wagner:
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. 315 - Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. 316 - Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen:
Ring Signatures without Random Oracles. 317 - Michael J. Wiener:
Bounds on Birthday Attack Times. 318 - Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based Restrictive Partially Blind Signatures and Applications. 319 - Nuttapong Attrapadung, Benoît Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. 320 - Liam Keliher, Jiayuan Sui:
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES). 321 - Min Yang, Qingshu Meng, Huanguo Zhang:
Evolutionary Design of Trace Form Bent Functions. 322 - Steven D. Galbraith:
The Weil pairing on elliptic curves over C. 323 - Nicolas Gürel:
Extracting bits from coordinates of a point of an elliptic curve. 324 - He Ge:
An Effective Method to Implement Group Signature with Revocation. 325 - Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity. 326 - Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. 327 - Jonathan Katz, Chiu-Yuen Koo:
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions. 328 - Amir Herzberg:
Cryptographic Protocols to Prevent Spam. 329 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane:
A Dedicated Processor for the eta Pairing. 330 - Julien Bringer, Hervé Chabanne, Quoc Dung Do:
A Fuzzy Sketch with Trapdoor. 331 - An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Cubic (n-4)-resilient Boolean Functions. 332 - Ivan Damgård, Kasper Dupont:
Universally Composable Disk Encryption Schemes. 333 - Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation. 334 - Amitabh Saxena, Ben Soh:
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems. 335 - David Freeman:
Pairing-based identification schemes. 336 - Liangliang Xiao, Mulan Liu, Zhifang Zhang:
Statistical Multiparty Computation Based on Random Walks on Graphs. 337 - Lu Xiao, Howard M. Heys:
An Improved Power Analysis Attack Against Camellia's Key Schedule. 338 - Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
:
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. 339 - (Withdrawn) A New Approach to Counteract DPA Attacks on Block Ciphers. 340
- Mårten Trolin:
A Universally Composable Scheme for Electronic Cash. 341 - Pu Duan, Shi Cui, Choong Wah Chan:
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems. 342 - Amitabh Saxena, Serguey Priymak, Ben Soh:
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings. 343 - Tapan Rai:
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems. 344 - Aggelos Kiayias, Moti Yung:
Group Signatures with Efficient Concurrent Join. 345 - Kun Peng, Colin Boyd, Ed Dawson:
Batch Verification of Validity of Bids in Homomorphic E-auction. 346 - (Withdrawn) Knapsack Diffie-Hellman: A New Family of Diffie-Hellman. 347
- (Withdrawn) On Proofs of Security for Certificateless Cryptosystems. 348
- Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Oblivious Transfer and Linear Functions. 349 - Charanjit S. Jutla, Anindya C. Patthak:
Is SHA-1 conceptually sound? 350 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols. 351 - Danilo Gligoroski:
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations. 352 - Jianhong Zhang, Wei Zou:
On the Security of A Group Signature Scheme. 353 - Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao:
Pairing-Based Two-Party Authenticated Key Agreement Protocol. 354 - Rongxing Lu, Zhenfu Cao:
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks. 355 - Fabien Coelho:
Exponential Memory-Bound Functions for Proof of Work Protocols. 356 - Kyung-Ah Shim:
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings. 357 - Haining Fan, Duo Liu, Yiqi Dai:
Normal Basis Multiplication Algorithms for GF(2n) (Full Version). 358 - Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. 359 - Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security. 360 - Yuan Li, Thomas W. Cusick:
Strict Avalanche Criterion Over Finite Fields. 361 - Michael Scott, Paulo S. L. M. Barreto:
On a (Flawed) Proposal to Build More Pairing-Friendly Curves. 362 - Florian Luca, Igor E. Shparlinski:
Elliptic Curves with Low Embedding Degree. 363 - Amitabh Saxena:
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs. 364 - Boaz Barak, Shien Jin Ong, Salil P. Vadhan:
Derandomization in Cryptography. 365 - Qiang Tang
, Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange. 366 - Dong Jin Park, Juyoung Cha, Pil Joong Lee:
Searchable Keyword-Based Encryption. 367 - David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. 368 - David Naccache:
Secure and Practical Identity-Based Encryption. 369 - Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang:
Resource Fairness and Composability of Cryptographic Protocols. 370 - Dongvu Tonien:
On a Traitor Tracing Scheme from ACISP 2003. 371 - Daoshun Wang, Lei Zhang, Ning Ma, Lian-Sheng Huang:
Secret color images sharing schemes based on XOR operation. 372 - Yong Ho Hwang, Pil Joong Lee:
Efficient Broadcast Encryption Scheme with Log-Key Storage. 373 - Kunpeng Wang, Bao Li:
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7. 374 - Paul Crowley:
Truncated differential cryptanalysis of five rounds of Salsa20. 375 - Carles Padró, Ignacio Gracia:
Representing small identically self-dual matroids by self-dual codes. 376 - Sherman S. M. Chow, Siu-Ming Yiu:
Exclusion-Intersection Encryption. 377 - Sven Laur, Helger Lipmaa:
A New Protocol for Conditional Disclosure of Secrets And Its Applications. 378 - Jonathan Katz, Yehuda Lindell:
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. 379 - Daniel R. L. Brown:
Breaking RSA May Be As Difficult As Factoring. 380 - Xavier Boyen, Brent Waters:
Compact Group Signatures Without Random Oracles. 381 - Kaoru Kurosawa, Tsuyoshi Takagi:
One-Wayness Equivalent to General Factoring. 382 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Key Mixing in Block Ciphers through Addition modulo 2n. 383 - Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi:
Some Explicit Formulae of NAF and its Left-to-Right Analogue. 384 - Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros:
Practical Group Signatures without Random Oracles. 385 - Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu:
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings. 386 - Claude Carlet:
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version). 387 - Yongbin Zhou, Dengguo Feng:
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing. 388 - KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon:
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. 389 - Praveen Gauravaram, William Millan, Juanma González Nieto, Ed Dawson:
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function. 390 - Praveen Gauravaram, William Millan, Juanma González Nieto:
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. 391 - Sahadeo Padhye:
An Efficient Variant of RSA Cryptosystem. 392 - Christopher Wolf:
Multivariate Quadratic Polynomials in Public Key Cryptography. 393 - Ben Adida, Douglas Wikström:
How to Shuffle in Public. 394 - Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Secure Group Key Establishment Revisited. 395 - Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. 396 - Neil Kauer, Tony Suarez, Yuliang Zheng:
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms. 397 - Preliminary Analysis of DHA-256. 398
- Yuriy V. Tarannikov:
On affine rank of spectrum support for plateaued function. 399 - Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD5. 400 - Bruno Blanchet:
A Computationally Sound Mechanized Prover for Security Protocols. 401 - Dong-Guk Han, Tsuyoshi Takagi:
Some Analysis of Radix-r Representations. 402 - Scott Contini:
Collisions in the Original Version of a Chaotic Hash Function. 403 - Gaurav S. Kc, Paul A. Karger:
Preventing Attacks on Machine Readable Travel Documents (MRTDs). 404 - Tor E. Bjørstad, Alexander W. Dent:
Building Better Signcryption Schemes with Tag-KEMs. 405 - Dominique Unruh:
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited. 406 - Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang:
Anonymous Signature Schemes. 407 - Sorin Iftene:
Compartmented Secret Sharing Based on the Chinese Remainder Theorem. 408 - (Withdrawn) Intrusion-Resilient Authentication in the Limited Communication Model. 409
- Victor K. Wei:
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows. 410 - Victor K. Wei:
More Compact E-Cash with Efficient Coin Tracing. 411 - Tsz Hon Yuen, Victor K. Wei:
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles. 412 - (Withdrawn) VEST Hardware-Dedicated Stream Ciphers. 413
- (Withdrawn) Authenticated Encryption Mode of VEST Ciphers. 414
- (Withdrawn) A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512. 415
- Kenneth G. Paterson, Arnold K. L. Yau:
Cryptography in Theory and Practice: The Case of Encryption in IPsec. 416 - Lucas Ballard, Matthew Green, Breno de Medeiros, Fabian Monrose:
Correlation-Resistant Storage via Keyword-Searchable Encryption. 417 - Chris Crutchfield, David Molnar, David Turner, David A. Wagner:
Generic On-Line/Off-Line Threshold Signatures. 418 - Douglas Stebila, Nicolas Thériault:
Unified Point Addition Formulæ and Side-Channel Attacks. 419 - Christophe Doche, Thomas Icart, David R. Kohel:
Efficient Scalar Multiplication by Isogeny Decompositions. 420 - Michael Backes, Birgit Pfitzmann, Andre Scedrov:
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. 421 - Sujing Zhou, Dongdai Lin:
On Anonymity of Group Signatures. 422 - (Withdrawn) ID-based signature and Key-insulated threshold signature. 423
- Sven Laur, N. Asokan, Kaisa Nyberg:
Efficient Mutual Data Authentication Using Manually Authenticated Strings. 424 - Jie Liang, Xuejia Lai:
Improved Collision Attack on Hash Function MD5. 425 - Zhenfeng Zhang, Dengguo Feng:
On the Security of a Certificateless Public-Key Encryption. 426 - Joseph K. Liu, Duncan S. Wong:
Solutions to Key Exposure Problem in Ring Signature. 427 - Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio. 428 - Victor K. Wei:
Signature from a New Subgroup Assumption. 429 - Duo Lei:
F-HASH: Securing Hash Functions Using Feistel Chaining. 430 - Bo Gyeong Kang, Je Hong Park:
Is it possible to have CBE from CL-PKE? 431 - Dieter Schmidt:
On the Security of Kaweichel. 432 - Giuseppe Ateniese, Susan Hohenberger:
Proxy Re-Signatures: New Definitions, Algorithms, and Applications. 433 - Daniel R. L. Brown:
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol. 434 - Aggelos Kiayias, Hong-Sheng Zhou:
Concurrent Blind Signatures without Random Oracles. 435 - Doreen Hertel:
A Note on the Kasami Power Function. 436 - (Withdrawn) On Boolean functions with maximum algebraic immunity. 437
- Yevgeniy Dodis:
Minimal Assumptions for Efficient Mercurial Commitments. 438 - T. C. Lam:
A note on the n-spendable extension of Ferguson's single-term off-line coins. 439 - (Withdrawn) HB++: a Lightweight Authentication Protocol Secure against Some Attacks. 440
- Mikhail Lobanov:
Tight bound between nonlinearity and algebraic immunity. 441 - Dalit Naor, Amir Shenhav, Avishai Wool:
One-Time Signatures Revisited: Have They Become Practical? 442 - Duo Lei:
Revised: Block Cipher Based Hash Function Construction From PGV. 443 - Sid Stamm, Markus Jakobsson:
Privacy-Preserving Polling using Playing Cards. 444 - He Ge:
An Anonymous Authentication Scheme for Trusted Computing Platform. 445 - Mark Manulis:
Democratic Group Signatures on Example of Joint Ventures. 446 - Vladimir Shpilrain, Alexander Ushakov:
A new key exchange protocol based on the decomposition problem. 447 - Souradyuti Paul, Bart Preneel:
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version). 448 - Longjiang Qu, GuoZhu Feng, Chao Li:
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count. 449 - Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin:
Improvement of Manik et al.¡¦s remote user authentication scheme. 450 - Jue-Sam Chou, Yalin Chen, Ming-De Yang:
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. 451 - Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses D. Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala:
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol. 452 - Pinhui Ke, Jie Zhang, Qiaoyan Wen:
Further Constructions of Almost Resilient Functions. 453 - Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics. 454 - Robert W. Zhu, Xiaojian Tian, Duncan S. Wong:
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange. 455 - Fuw-Yi Yang:
A Secure Scheme for Authenticated Encryption. 456 - Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu:
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol. 457 - James A. Muir:
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. 458 - Anja Groch, Dennis Hofheinz, Rainer Steinwandt:
A Practical Attack on the Root Problem in Braid Groups. 459 - Tomás Rosa:
One-Time HNP or Attacks on a Flawed El Gamal Revisited. 460 - Jonathan Katz, Ji Sun Shin:
Parallel and Concurrent Security of the HB and HB+ Protocols. 461 - Martin Seysen:
A Simplified Quadratic Frobenius Primality Test. 462 - Victor K. Wei, Tsz Hon Yuen:
More short signatures without random oracles. 463 - Christopher Wolf, Bart Preneel:
Equivalent Keys in Multivariate Quadratic Public Key Systems. 464 - Susan G. Barwick, Wen-Ai Jackson:
A sequence approach to constructing perfect hash families. 465 - Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee:
Cryptanalysis of the Yang -Wang's password authentication schemes. 466 - Ricardo Corin, Jerry den Hartog:
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version). 467 - Vanessa Gratzer, David Naccache:
Blind Attacks on Engineering Samples. 468 - Claude Carlet:
A lower bound on the higher order nonlinearity of algebraic immune functions. 469
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.