, Kazumaro Aoki
, Jens Franke
, Arjen K. Lenstra
, Emmanuel Thomé
, Joppe W. Bos
, Pierrick Gaudry
, Alexander Kruppa
, Peter L. Montgomery
, Dag Arne Osvik
, Herman J. J. te Riele
, Andrey Timofeev
, Paul Zimmermann
: Factorization of a 768-bit RSA modulus.
: A DAA Scheme Requiring Less TPM Resources.
: A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs.
, Bart Mennink
: Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
: New Methodologies for Differential-Linear Cryptanalysis and Its Extensions.
, Tao Wang
: Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth.
, Yalin Chen
: A secure anonymous communication scheme in vehicular ad hoc networks from pairings.
: On the order of the polynomial xp-x-a.
, Lei Hu
: On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields.
: A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods.
: Efficient chaotic permutations for image encryption algorithms.
: A New Chaos-Based Cryptosystem for Secure Transmitted Images.
, Jianhua Chen
, Jin Hu
: An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem.
: A Principle for Cryptographic Protocols Beyond Security, Less Parameters.
, Tao Wang
: Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment.
: Insecure "Provably Secure Network Coding" and Homomorphic Authentication Schemes for Network Coding.
: An Anonymous ID-based Encryption Revisited.
: Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles.
: 2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree.
: Approximating Addition by XOR: how to go all the way.
: A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra.
: An Efficient and Parallel Gaussian Sampler for Lattices.
: New Impossible Di®erential Attacks on AES.
: On zero practical significance of "Key recovery attack on full GOST block cipher with zero time and memory".
Simon R. Blackburn
: The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin-Abu cryptosystem.
, Zichen Li
: Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack.
, Jipeng Zhou
: On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks.
: Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -.
: On Robust Key Agreement Based on Public Key Authentication.
: On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP.
: A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0.
: A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption.
: Mean value formulas for twisted Edwards curves.
: On Small Subgroup Non-confinement Attack.
Mohammad Sadeq Dousti
: Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm.
, Vanessa Vitse
: Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on E(Fq5).
: 1024XKS - A High Security Software Oriented Block Cipher Revisited.
: A Reflection on the Security of Two-Party Key Establishment Protocols.
: On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields.
, Yingpu Deng
: A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity.
: Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE.
, Shuqin Fan
: New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m).
: Improved Differential Attacks for ECHO and Grostl.
: A Security Weakness in a Generic Construction of a Group Key Exchange Protocol.
, Shafi Goldwasser
: Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back).
: A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree k>2.
: Concurrent composition in the bounded quantum storage model.
: Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials.
: One-round and authenticated three-party multiple key exchange protocol from parings.
: Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset.
: Towards a Theory of Trust Based Collaborative Search.
: A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem.
, Ivica Nikolic
: Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
: Collusion Free Protocol for Rational Secret Sharing.
, Sugata Gangopadhyay
: On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions.
Andrey V. Pavlov
: Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA.
: Cube Test Analysis of the Statistical Behavior of CubeHash and Skein.
: Cryptographic Extraction and Key Derivation: The HKDF Scheme.
, Qiuliang Xu
: Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition.
: Two improved authenticated multiple key exchange protocols.
: LAB Form for Iterated Hash Functions.
: Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation.
: Recursive Information Hiding in Visual Cryptography.
: Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography.
: Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities.
: A Note On Gottesman-Chuang Quantum Signature Scheme.
, Yunlei Zhao
: On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
: Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function.
: Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme.
: Practical-Titled Attack on AES-128 Using Chosen-Text Relations.
: A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme.
Ezekiel J. Kachisa
: Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.
A. N. Alekseychuk
: Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids.
: A Security Enhancement and Proof for Authentication and Key Agreement (AKA).
: A Digital Signature Using Multivariate Functions on Quaternion Ring.
: Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves.
, Zhenfu Cao
: On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption.