![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IACR Cryptology ePrint Archive, Volume 2006
Volume 2006, 2006
- Doerte K. Rappe:
Homomorphic Cryptosystems and their Applications. 1 - Susan G. Barwick, Wen-Ai Jackson:
Geometric constructions of optimal linear perfect hash families. 2 - Dragos Trinca:
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. 3 - Lea Kissner, David Molnar:
Provably Secure Subsitution of Cryptographic Tools. 4 - Colm O'hEigeartaigh, Michael Scott:
Pairing Calculation on Supersingular Genus 2 Curves. 5 - Lijun Liao:
Group Key Agreement for Ad Hoc Networks. 6 - Lifeng Guo, Guilin Wang, Duncan S. Wong:
Further Discussions on the Security of a Nominative Signature Scheme. 7 - James A. Muir:
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers. 8 - Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad:
Breaking and Fixing Public-Key Kerberos. 9 - Steve Babbage, Matthew Dodd:
Finding Characteristic Polynomials with Jump Indices. 10 - Christina Lindenberg, Kai Wirt, Johannes Buchmann:
Formal Proof for the Correctness of RSA-PSS. 11 - Paz Morillo, Carla Ràfols:
Certificate-Based Encryption Without Random Oracles. 12 - Hung-Yu Chien:
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings. 13 - Flavio D. Garcia, Peter van Rossum:
Sound Computational Interpretation of Formal Hashes. 14 - Gene Tsudik:
A Family of Dunces: Trivial RFID Identification and Authentication Protocols. 15 - Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Message Modification for Step 21-23 on SHA-0. 16 - Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung:
Threshold and Proactive Pseudo-Random Permutations. 17 - Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra:
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks. 18 - Ulrich Kaiser:
Hermes8 : A Low-Complexity Low-Power Stream Cipher. 19 - Adam D. Smith:
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes. 20 - Denis Xavier Charles, Eyal Z. Goren, Kristin E. Lauter:
Cryptographic hash functions from expander graphs. 21 - He Ge:
A Method to Implement Direct Anonymous Attestation. 23 - George Danezis, Claudia Díaz:
Improving the Decoding Efficiency of Private Search. 24 - Denis Xavier Charles, Kamal Jain, Kristin E. Lauter:
Signatures for Network Coding. 25 - David Freeman:
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10. 26 - Vladimir Bayev:
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms. 27 - Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena:
Cryptanalysis of recently proposed Remote User Authentication Schemes. 28 - Stéphanie Alt:
Authenticated Hybrid Encryption for Multiple Recipients. 29 - Paul Crowley:
Improved cryptanalysis of Py. 30 - Le Trieu Phong, Wakaha Ogata:
On a Variation of Kurosawa-Desmedt Encryption Scheme. 31 - Deepak Kumar Dalai, Subhamoy Maitra:
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators. 32 - Isabelle Déchène:
Arithmetic of Generalized Jacobians. 33 - Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. 34 - Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar Abbas Saqib, Nareli Cruz Cortés:
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials. 35 - Sean O'Neil:
Vector Stream Cipher Instant Key Recovery. 36 - Ted Krovetz:
Message Authentication on 64-bit Architectures. 37 - Jintai Ding, Jason E. Gower, Dieter Schmidt:
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. 38 - Joan Daemen, Vincent Rijmen:
Two-Round AES Differentials. 39 - Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. 40 - Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. 41 - Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. 42 - Mihir Bellare:
New Proofs for NMAC and HMAC: Security Without Collision-Resistance. 43 - Ivan Damgård, Rune Thorbek:
Linear Integer Secret Sharing and Distributed Exponentiation. 44 - Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing. 45 - Shaoquan Jiang:
Efficient Primitives from Exponentiation in Zp. 46 - Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. 47 - Javier Herranz, Germán Sáez:
New Results on Multipartite Access Structures. 48 - Joo Yeon Cho, Josef Pieprzyk:
Crossword Puzzle Attack on NLS. 49 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel. 50 - Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems. 51 - Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert:
Software mitigations to hedge AES against cache-based software side channel vulnerabilities. 52 - Joan-Josep Climent, Elisa Gorla, Joachim Rosenthal:
Cryptanalysis of the CFVZ cryptosystem. 53 - Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. 54 - Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on some Generalized Sequential Hash Functions. 55 - Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Key Exchange Protocols: Security Definition, Proof Method and Applications. 56 - Vladimir Kolesnikov, Charles Rackoff:
Key Exchange Using Passwords and Long Keys. 57 - Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. 58 - Robert Granger, Dan Page, Nigel P. Smart:
High Security Pairing-Based Cryptography Revisited. 59 - (Withdrawn) An Efficient ID-based Signature Scheme from Pairings. 60
- (Withdrawn) A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries. 62
- Boris Ryabko, Daniil Ryabko:
Provably Secure Universal Steganographic Systems. 63 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
:
Perturbing and Protecting a Traceable Block Cipher. 64 - Jonathan Katz, Chiu-Yuen Koo:
On Expected Constant-Round Protocols for Byzantine Agreement. 65 - John Solis, Gene Tsudik:
Simple and Flexible Private Revocation Checking. 66 - Roberto Avanzi, Francesco Sica:
Scalar Multiplication on Koblitz Curves using Double Bases. 67 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. 68 - Bruno Blanchet, David Pointcheval:
Automated Security Proofs with Sequences of Games. 69 - Sergey Doroshenko, Boris Ryabko:
The experimental distinguishing attack on RC4. 70 - Ueli Maurer, Johan Sjödin:
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security. 71 - Yaniv Shaked, Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's. 72 - Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:
Stronger Security of Authenticated Key Exchange. 73 - Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Condition in Searching Collisions of MD5. 74 - Tomohiro Harayama:
On the Weil Sum Evaluation of Central Polynomial in Multivariate Quadratic Cryptosystem. 75 - (Withdrawn) A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement. 76
- Jaume Martí-Farré, Carles Padró:
On Secret Sharing Schemes, Matroids and Polymatroids. 77 - Yevgeniy Dodis, Prashant Puniya:
Verifiable Random Permutations. 78 - Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:
Towards Provably Secure Group Key Agreement Building on Group Theory. 79 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Efficient Identity-based Signatures Secure in the Standard Model. 80 - David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. 81 - HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. 82 - Amir Herzberg:
Browsers Defenses Against Phishing, Spoofing and Malware. 83 - Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography from Anonymity. 84 - Xavier Boyen, Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). 85 - Zvi Gutterman, Benny Pinkas, Tzachy Reinman:
Analysis of the Linux Random Number Generator. 86 - Barath Raghavan, Saurabh Panjwani, Anton Mityagin:
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons. 87 - Sven Laur, Helger Lipmaa:
On the Feasibility of Consistent Computations. 88 - Goce Jakimoski, Yvo Desmedt:
A Tree-based Model of Unicast Stream Authentication. 89 - Ee-Chien Chang, Vadym Fedyukovych, Qiming Li:
Secure Sketch for Multi-Sets. 90 - Moni Naor, Guy N. Rothblum:
The Complexity of Online Memory Checking. 91 - Abderrahmane Nitaj:
Cryptanalysis of RSA with constrained keys. 92 - Abderrahmane Nitaj:
RSA and a higher degree diophantine equation. 93 - Peng Wang, Dengguo Feng, Wenling Wu:
Cryptanalysis of the MEM Mode of Operation. 94 - John Black, Martin Cochran:
MAC Reforgeability. 95 - Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures without Random Oracles. 96 - Kenneth G. Paterson:
A Cryptographic Tour of the IPsec Standards. 97 - Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Gröbner Basis Based Cryptanalysis of SHA-1. 98 - Dongvu Tonien, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. 99 - Sujing Zhou, Dongdai Lin:
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability. 100 - Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. 101 - Tatsuaki Okamoto:
Efficient Blind and Partially Blind Signatures Without Random Oracles. 102 - Markku-Juhani O. Saarinen:
Security of VSH in the Real World. 103 - Marc Stevens:
Fast Collision Attack on MD5. 104 - Vlastimil Klíma:
Tunnels in Hash Functions: MD5 Collisions Within a Minute. 105 - Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further Refinement of Pairing Computation Based on Miller's Algorithm. 106 - Oliver Schirokauer:
The number field sieve for integers of low weight. 107 - Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. 108 - Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt:
A Simpler Sieving Device: Combining ECM and TWIRL. 109 - Florian Hess, Nigel P. Smart, Frederik Vercauteren:
The Eta Pairing Revisited. 110 - Martin Stanek:
Attacking LCCC Batch Verification of RSA Signatures. 111 - Markus Volkmer:
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines. 112 - Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. 113 - Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo:
Tate pairing for y2=x5-αx in Characteristic Five. 114 - Alexander Rostovtsev:
Fast exponentiation via prime finite field isomorphism. 115 - Mario Lamberger, Norbert Pramstaller, Vincent Rijmen:
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass. 116 - Daniel R. L. Brown:
Conjectured Security of the ANSI-NIST Elliptic Curve RNG. 117 - Sugata Gangopadhyay, Deepmala Sharma:
On construction of non-normal Boolean functions. 118 - (Withdrawn) Repairing Attacks on a Password-Based Group Key Agreement. 119
- Jason E. Holt:
Key Privacy for Identity Based Encryption. 120 - José de Jesús Angel Angel, Guillermo Morales-Luna:
Counting Prime Numbers with Short Binary Signed Representation. 121 - Eike Kiltz:
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. 122 - Douglas Wikström:
Designated Confirmer Signatures Revisited. 123 - Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. 124 - Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee:
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves. 125 - Yiliang Han, Xiaoyuan Yang:
ECGSC: Elliptic Curve based Generalized Signcryption Scheme. 126 - Sourav Mukhopadhyay, Palash Sarkar:
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm. 127 - Denis Xavier Charles:
On the existence of distortion maps on ordinary elliptic curves. 128 - Wei Han, Dong Zheng, Kefei Chen:
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. 129 - Dennis Hofheinz, Dominique Unruh:
Simulatable Security and Polynomially Bounded Concurrent Composition. 130 - Mike Burmester, Tri Van Le, Breno de Medeiros:
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. 131 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. 132 - Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio César López-Hernández:
Low Complexity Bit-Parallel Square Root Computation over GF(2m) for all Trinomials. 133 - Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena:
Identity Based Strong Designated Verifier Signature Scheme. 134 - Duo Lei, Da Lin, Chao Li, Keqin Feng, Longjiang Qu:
The Design Principle of Hash Function with Merkle-Damgård Construction. 135 - Gregory V. Bard:
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. 136 - Ari Juels, Stephen A. Weis:
Defining Strong Privacy for RFID. 137 - Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES. 138 - François-Xavier Standaert, Tal Malkin, Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version). 139 - Jiejun Kong:
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks. 140 - Shahram Khazaei, Mahdi M. Hasanzadeh, Mohammad S. Kiaei:
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers. 141 - S. Dov Gordon, Jonathan Katz:
Rational Secret Sharing, Revisited. 142 - Guillaume Fumaroli, David Vigilant:
Blinded Fault Resistant Exponentiation. 143 - Michael Scott, Neil Costigan, Wesam Abdulwahab:
Implementing Cryptographic Pairings on Smartcards. 144 - Alexander Rostovtsev, Anton Stolbunov:
Public-Key Cryptosystem Based on Isogenies. 145 - Flavio D. Garcia, Peter van Rossum:
Completeness of Formal Hashes in the Standard Model. 146 - Duo Lei:
New Integrated proof Method on Iterated Hash Structure and New Structures. 147 - Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability between Quantum States and Its Cryptographic Application. 148 - Claude Carlet:
A method of construction of balanced functions with optimum algebraic immunity. 149 - Décio Luiz Gazzoni Filho, Paulo Sérgio Licciardi Messeder Barreto:
Demonstrating data possession and uncheatable data transfer. 150 - Ralf Küsters:
Simulation-Based Security with Inexhaustible Interactive Turing Machines. 151 - G. Shailaja, K. Phani Kumar, Ashutosh Saxena:
Pairing based Mutual Authentication Scheme Using Smart Cards. 152 - Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. 153 - Xiaolei Dong, Licheng Wang, Zhenfu Cao:
New Public Key Authentication Frameworks with Lite Certification Authority. 154 - Rosario Gennaro, Silvio Micali:
Independent Zero-Knowledge Sets. 155 - Alexander W. Dent:
The Hardness of the DHK Problem in the Generic Group Model. 156 - Timothy Atkinson, Marius-Calin Silaghi:
An efficient way to access an array at a secret index. 157 - Chunxiang Gu, Yuefei Zhu:
An Efficient ID-based Proxy Signature Scheme from Pairings. 158 - (Withdrawn) Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006. 159
- (Withdrawn) A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings. 160
- Zhang-yi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng:
Cryptanalysis of 4-Pass HAVAL. 161 - Daniela Engelbert, Raphael Overbeck, Arthur Schmidt:
A Summary of McEliece-Type Cryptosystems and their Security. 162 - Gregory V. Bard:
Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods. 163 - Zhengjun Cao:
Classification of Signature-only Signature Models. 164 - Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart:
Pairings for Cryptographers. 165 - Sorin Iftene:
General Secret Sharing Based on the Chinese Remainder Theorem. 166 - Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won:
Towards Trustworthy e-Voting using Paper Receipts. 167 - Nicolas T. Courtois:
How Fast can be Algebraic Attacks on Block Ciphers ? 168 - Steven D. Galbraith, Colm O'hEigeartaigh, Caroline Sheedy:
Simplified pairing computation and security implications. 169 - Carlo Blundo, Stelvio Cimato, Alfredo De Santis:
Visual Cryptography Schemes with Optimal Pixel Expansion. 170 - Prateek Gupta, Vitaly Shmatikov:
Key confirmation and adaptive corruptions in the protocol security logic. 171 - Robert Granger, Nigel P. Smart:
On Computing Products of Pairings. 172 - Le Trieu Phong, Wakaha Ogata:
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model. 173 - (Withdrawn) Frobenius expansion and the Diffie Hellman problem. 174
- Moni Naor, Gil Segev, Adam D. Smith:
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. 175 - Antoine Joux, Reynald Lercier:
Counting points on elliptic curves in medium characteristic. 176 - Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh:
On the (Im-)Possibility of Extending Coin Toss. 177 - Amitabh Saxena, Ben Soh:
A New Cryptosystem Based On Hidden Order Groups. 178 - Chang Shu, Soonhak Kwon, Kris Gaj:
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields. 179 - Dmitry Khovratovich:
Divisibility of the Hamming Weight by 2k and Monomial Criteria for Boolean Functions. 180 - Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel:
There exist Boolean functions on n (odd) variables having nonlinearity > 2n-1 - 2(n-1)/2 if and only if n>7. 181 - Arvind Narayanan, Vitaly Shmatikov:
On the Limits of Point Function Obfuscation. 182 - Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. 183 - Melissa Chase, Anna Lysyanskaya:
On Signatures of Knowledge. 184 - Minh-Huyen Nguyen, Shien Jin Ong, Salil P. Vadhan:
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function. 185 - Mihir Bellare, Alexandra Boldyreva, Adam O'Neill:
Deterministic and Efficiently Searchable Encryption. 186 - Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. 187 - Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. 188 - Douglas R. Stinson:
Unconditionally secure chaffing and winnowing with short authentication tags. 189 - Berry Schoenmakers, Andrey Sidorenko:
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator. 190 - Sahadeo Padhye:
A Public Key Cryptosystem Based on Pell Equation. 191 - Osman Kocar:
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior. 192 - Victor K. Wei, Tsz Hon Yuen:
(Hierarchical Identity-Based) Threshold Ring Signatures. 193 - (Withdrawn) Self-Generated-Certificate Public Key Cryptosystem. 194
- Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing. 195 - Sergey Doroshenko, Andrei Fionov, A. Lubkin, V. A. Monarev, Boris Ryabko:
On ZK-Crypt, Book Stack, and Statistical Tests. 196 - Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. 197 - Sven Laur, Helger Lipmaa, Taneli Mielikäinen:
Cryptographically Private Support Vector Machines. 198 - Liqun Chen, Zhaohui Cheng, Nigel P. Smart:
Identity-based Key Agreement Protocols From Pairings. 199 - Guanfei Fang, Genxun huang:
Improvement of recently proposed Remote User Authentication Schemes. 200 - Changan Zhao, Fangguo Zhang, Jiwu Huang:
Efficient Tate Pairing Computation Using Double-Base Chains. 201 - Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo:
Ate pairing for y2=x5-αx in characteristic five. 202 - Sanjit Chatterjee, Palash Sarkar:
Generalization of the Selective-ID Security Model for HIBE Protocols. 203 - Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar:
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems. 204 - (Withdrawn) ID-Based Ring Signature Scheme secure in the Standard Model. 205
- Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. 206 - Javier Herranz, Dennis Hofheinz, Eike Kiltz:
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure. 207 - Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. 208 - Clemens Heuberger, James A. Muir:
Minimal Weight and Colexicographically Minimal Integer Representations. 209 - Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. 210 - Alexander W. Dent:
A Survey of Certificateless Encryption Schemes and Security Models. 211 - Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. 212 - Ueli Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin:
Luby-Rackoff Ciphers from Weak Round Functions? 213 - Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String. 214 - Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. 215 - Nicolas Méloni:
Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. 216 - Andrey Pestunov:
Statistical Analysis of the MARS Block Cipher. 217 - Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi:
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. 218 - Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. 219 - Daniel R. L. Brown:
Multi-Dimensional Montgomery Ladders for Elliptic Curves. 220 - Phillip Rogaway, Thomas Shrimpton:
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem. 221 - Raphael Overbeck:
Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants. 222 - Daniel R. L. Brown:
What Hashes Make RSA-OAEP Secure? 223 - André Weimerskirch, Christof Paar:
Generalizations of the Karatsuba Algorithm for Efficient Implementations. 224 - Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. 225 - Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. 226 - Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, Ingrid Verbauwhede:
An Elliptic Curve Processor Suitable For RFID-Tags. 227 - Mihir Bellare, Amit Sahai:
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. 228 - Neal Koblitz, Alfred Menezes:
Another Look at "Provable Security". II. 229 - Neal Koblitz, Alfred Menezes:
Another Look at Generic Groups. 230 - Sébastien Canard, Aline Gouget, Emeline Hufschmitt:
A handy multi-coupon system. 231 - Roman Popovych:
Improvement to AKS algorithm. 232 - Ayan Mahalanobis:
A simple generalization of El-Gamal cryptosystem to non-abelian groups. 233 - Ivan Damgård, Michael Østergaard Pedersen:
RFID Security: Tradeoffs between Security and Efficiency. 234 - Abderrahmane Nitaj:
Application of ECM to a Class of RSA keys. 235 - Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. 236 - Claire Whelan, Michael Scott:
Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure? 237 - (Withdrawn) Searchable Index Schemes for Groups : Security vs. Efficiency. 238
- Yi Deng, Dongdai Lin:
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption. 239 - Wouter Castryck, Jan Denef, Frederik Vercauteren:
Computing Zeta Functions of Nondegenerate Curves. 240 - Mårten Trolin:
A Stronger Definition for Anonymous Electronic Cash. 241 - Haina Zhang, Shaohui Wang, Xiaoyun Wang:
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers. 242 - Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. 243 - Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Length-based cryptanalysis: The case of Thompson's Group. 244 - K. Phani Kumar, G. Shailaja, Ashutosh Saxena:
Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems. 245 - Jaroslav Hruby:
On the Postquantum Cipher Scheme. 246 - (Withdrawn) Factoring Class Polynomials over the Genus Field. 247
- Steven D. Galbraith:
Disguising tori and elliptic curves. 248 - Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek Diker Yücel:
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240. 249 - Orr Dunkelman, Nathan Keller:
Linear Cryptanalysis of CTC. 250 - Gregory V. Bard:
Accelerating Cryptanalysis with the Method of Four Russians. 251 - Maurizio Adriano Strangio:
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. 252 - Ilya Mironov, Anton Mityagin, Kobbi Nissim:
Hard Instances of the Constrained Discrete Logarithm Problem. 253 - Ilya Mironov, Lintao Zhang:
Applications of SAT Solvers to Cryptanalysis of Hash Functions. 254 - Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. 255 - Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti:
Constant-Round Concurrent NMWI and its relation to NMZK. 256 - Peter Birkner:
Efficient Divisor Class Halving on Genus Two Curves. 257 - Philippe Golle, David A. Wagner:
Cryptanalysis of a Cognitive Authentication Scheme. 258 - Douglas Wikström:
Simplified Submission of Inputs to Protocols. 259 - Alexander W. Dent:
A Note On Game-Hopping Proofs. 260 - Frédéric Didier:
Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks. 261 - Simon Kramer:
Logical Concepts in Cryptography. 262 - Dragos Trinca:
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems. 263 - Mridul Nandi:
A Simple and Unified Method of Proving Unpredictability. 264 - Javier Herranz, Dennis Hofheinz, Eike Kiltz:
Some (in)sufficient conditions for secure hybrid encryption. 265 - Michael Backes, Peeter Laud:
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis. 266 - Mihir Bellare, Tadayoshi Kohno, Victor Shoup:
Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation. 267 - Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism. 268 - Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. 269 - Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme. 270 - Gregory V. Bard:
Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack. 271 - Olivier Benoît, Michael Tunstall:
Efficient Use of Random Delays. 272 - Mikio Fujii:
Secure Positioning of Mobile Terminals with Simplex Radio Communication. 273 - Debasis Giri, P. D. Srivastava:
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings. 274 - Debrup Chakraborty, Palash Sarkar:
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random. 275 - Ran Canetti, Shai Halevi, Michael Steiner:
Mitigating Dictionary Attacks on Password-Protected Local Storage. 276 - Oded Goldreich:
On Expected Probabilistic Polynomial-Time Adversaries - A suggestion for restricted definitions and their benefits. 277 - Alexander W. Dent:
Fundamental problems in provable security and cryptography. 278 - Sanjit Chatterjee, Palash Sarkar:
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique). 279 - Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. 280 - Phillip Rogaway:
Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys. 281 - (Withdrawn) Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing). 282
- Carl Bosley, Yevgeniy Dodis:
Does Privacy Require True Randomness? 283 - Junghyun Nam, Youngsook Lee, Dongho Won:
Constant Round Group Key Exchange with Logarithmic Computational Complexity. 284 - Mihir Bellare, Chanathip Namprempre, Gregory Neven:
Unrestricted Aggregate Signatures. 285 - Sujing Zhou, Dongdai Lin:
Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps. 286 - Dan Boneh, Brent Waters:
Conjunctive, Subset, and Range Queries on Encrypted Data. 287 - Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Predicting Secret Keys via Branch Prediction. 288 - Hovav Shacham, Brent Waters:
Efficient Ring Signatures without Random Oracles. 289 - Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-Random Properties. 290 - Jean Marc Couveignes:
Hard Homogeneous Spaces. 291 - Oriol Farràs, Jaume Martí-Farré, Carles Padró:
Ideal Multipartite Secret Sharing Schemes. 292 - Zulfikar Ramzan, David P. Woodruff:
Fast Algorithms for the Free Riders Problem in Broadcast Encryption. 293 - John P. Steinberger:
The Collision Intractability of MDC-2 in the Ideal Cipher Model. 294 - Feng Yi, Daoshun Wang, Yiqi Dai:
Visual secret sharing scheme with autostereogram. 295 - David Galindo, Javier Herranz, Eike Kiltz:
On the Generic Construction of Identity-Based Signatures with Additional Properties. 296 - Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-Secure Signatures with Untrusted Update. 297 - Dan Boneh, Brent Waters:
A Fully Collusion Resistant Broadcast, Trace, and Revoke System. 298 - Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:
Efficient Implementation of Tate Pairing on a Mobile Phone using Java. 299 - (Withdrawn) Attacks and Modifications of CJC's E-voting Scheme. 300
- Johann Barbier, Eric Filiol, Kichenakoumar Mayoura:
New features for JPEG Steganalysis. 301 - Atefeh Mashatan, Douglas R. Stinson:
Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. 302 - Eric Filiol:
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption. 303 - Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. 304 - Vassil S. Dimitrov, Kimmo U. Järvinen, Michael J. Jacobson Jr., W. F. Chan, Zhun Huang:
Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation. 305 - Alexander W. Dent, Qiang Tang
:
Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability. 306 - Jintai Ding, Lei Hu, Bo-Yin Yang, Jiun-Ming Chen:
Note on Design Criteria for Rainbow-Type Multivariates. 307 - Jun Shao, Zhenfu Cao, Licheng Wang:
Efficient ID-based Threshold Signature Schemes without Pairings. 308 - Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. 309 - Abhishek Parakh:
A d-Sequence based Recursive Random Number Generator. 310 - (Withdrawn) Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature Scheme. 311
- Iwan M. Duursma, Seungkook Park:
ElGamal type signature schemes for n-dimensional vector spaces. 312 - Lars Elmegaard-Fessel:
Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields. 313 - Yi Deng, Giovanni Di Crescenzo, Dongdai Lin:
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model. 314 - Michael Backes, Jörn Müller-Quade, Dominique Unruh:
On the Necessity of Rewinding in Secure Multiparty Computation. 315 - Sarang Aravamuthan, Viswanatha Rao Thumparthy:
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks. 316 - Krystian Matusiewicz, Scott Contini, Josef Pieprzyk:
Weaknesses of the FORK-256 compression function. 317 - Chunbo Ma, Jun Ao, Jianhua Li:
Chameleon-Based Deniable Authenticated Key Agreement Protocol. 318 - Scott Contini, Yiqun Lisa Yin:
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. 319 - Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich:
CMSS - An Improved Merkle Signature Scheme. 320 - Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko:
Efficient Pseudorandom Generators Based on the DDH Assumption. 321 - Yassir Nawaz, Kishan Chand Gupta, Guang Gong:
Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction. 322 - Gergei Bana, Payman Mohassel, Till Stegers:
Computational Soundness of Formal Indistinguishability and Static Equivalence. 323 - Sarang Aravamuthan, Sachin Lodha:
The Average Transmission Overhead of Broadcast Encryption. 324 - Victor K. Wei:
Invisible Designated Confirmer Signatures without Random Oracles. 325 - Jonathan Katz, Adam D. Smith:
Analyzing the HB and HB+ Protocols in the "Large Error" Case. 326 - Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Algorithm for the ηT Pairing Calculation in Characteristic Three and its Hardware Implementation. 327 - Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. 328 - Shi-hua Zou, Ji-wen Zeng, Jun-jie Quan:
Designated Verifier Signature Scheme Based on Braid Groups. 329 - Christophe Doche, Laurent Imbert:
Extended Double-Base Number System with applications to Elliptic Curve Cryptography. 330 - Isabelle Déchène:
On the Security of Generalized Jacobian Cryptosystems. 331 - Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Improved Efficiency for Private Stable Matching. 332 - Steven D. Galbraith, Benjamin A. Smith:
Discrete Logarithms in Generalized Jacobians. 333 - Florian Mendel:
Colliding Message Pair for 53-Step HAS-160. 334 - Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A ID-Based Deniable Authentication Protocol on pairings. 335 - Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. 336 - Douglas R. Stinson, Jiang Wu:
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol. 337 - Fagen Li, Yupu Hu, Shuanggen Liu:
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings. 338 - (Withdrawn) A New family of Ideal Multipartite Access Structure Based on MSP. 339
- Chengqing Li:
Cryptanalyses of Some Multimedia Encryption Schemes. 340 - Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers. 341 - Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings. 342 - M. Choudary Gorantla, Ashutosh Saxena:
Verifiably Encrypted Signature Scheme with Threshold Adjudication. 343 - Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. 344 - Timothy Atkinson, Roman Barták, Marius-Calin Silaghi, E. Tuleu, Markus Zanker:
Private and Efficient Stable Marriages (Matching). 345 - Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. 346 - Fumiyuki Momose, Jinhui Chao:
Classification of Weil Restrictions Obtained by (2, ..., 2) Coverings of P1. 347 - Krzysztof Pietrzak:
Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist. 348 - Dan Page:
A Note On Side-Channels Resulting From Dynamic Compilation. 349 - Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of ARIA and Camellia. 350 - Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
On the Power of Simple Branch Prediction Analysis. 351 - Amir Herzberg, Igal Yoffe:
Foundations of Secure E-Commerce: The Order Layer. 352 - Zhenjie Huang, Kefei Chen, Yumin Wang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. 353 - An-Ping Li:
A new stream cipher: DICING. 354 - Boaz Barak, Manoj Prabhakaran, Amit Sahai:
Concurrent Non-Malleable Zero Knowledge. 355 - Emilia Käsper, Sven Laur, Helger Lipmaa:
Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds. 356 - Su-Jeong Choi, Simon R. Blackburn, Peter R. Wild:
Cryptanalysis of a homomorphic public-key cryptosystem over a finite group. 357 - Dalia Khader:
Public Key Encryption with Keyword Search based on K-Resilient IBE. 358 - Mihir Bellare, Oded Goldreich:
On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge. 359 - Marc Stevens, Arjen K. Lenstra, Benne de Weger:
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities. 360 - Sherman S. M. Chow, Willy Susilo:
Generic Construction of (Identity-based) Perfect Concurrent Signatures. 361 - Palash Sarkar, Sanjit Chatterjee:
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks. 362 - (Withdrawn) A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. 363
- Gregory V. Bard:
Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric. 364 - (Withdrawn) Revisit of KD04. 365
- Kristian Gjøsteen:
A Latency-Free Election Scheme. 366 - Xuefei Cao, Kenneth G. Paterson, Weidong Kou:
An Attack on a Certificateless Signature Scheme. 367 - Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. 368 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:
RadioGatún, a belt-and-mill hash function. 369 - Ventzislav Nikov:
A DoS Attack Against the Integrity-Less ESP (IPSec). 370 - Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Tim Kerins, Paulo S. L. M. Barreto:
Hardware Implementation of the ηT Pairing in Characteristic 3. 371 - David Freeman, Michael Scott, Edlyn Teske:
A taxonomy of pairing-friendly elliptic curves. 372 - Joseph K. Liu, Man Ho Au, Willy Susilo:
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model. 373 - Joseph Bonneau:
Robust Final-Round Cache-Trace Attacks Against AES. 374 - Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin A. Smith:
Distortion maps for genus two curves. 375 - Vlastimil Klíma:
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions. 376 - James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt:
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. 377 - Yesem Kurt:
A New Key Exchange Primitive Based on the Triple Decomposition Problem. 378 - Matthew J. Campagna:
Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator. 379 - Einar Mykletun, Gene Tsudik:
On Security of Sovereign Joins. 380 - Fuw-Yi Yang:
Cryptanalysis on an Algorithm for Efficient Digital Signatures. 381 - E-yong Kim, Hwangnam Kim, Kunsoo Park:
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks. 382 - Thomas Sirvent:
Traitor tracing scheme with constant ciphertext rate against powerful pirates. 383 - Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang:
Design and Analysis of a Hash Ring-iterative Structure. 384 - Emmanuel Bresson, Mark Manulis, Jörg Schwenk:
On Security Models and Compilers for Group Key Exchange Protocols. 385 - Mark Wooding:
The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange. 386 - Phong Q. Nguyen:
A Note on the Security of NTRUSign. 387 - Mark Manulis:
Survey on Security Requirements and Models for Group Key Exchange. 388 - Eiichiro Fujisaki, Koutarou Suzuki:
Traceable Ring Signature. 389 - (Withdrawn) Revisit of CS98. 390
- Ronald Cramer, Dennis Hofheinz, Eike Kiltz:
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security. 391 - Katherine E. Stange:
The Tate Pairing via Elliptic Nets. 392 - (Withdrawn) The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable. 393
- Sunder Lal, Vandani Verma:
Identity Based Strong Designated Verifier Proxy Signature Schemes. 394 - Mark Manulis:
Security-Focused Survey on Group Key Exchange Protocols. 395 - Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan:
Security Protocols with Isotropic Channels. 396 - David P. Woodruff:
Revisiting the Efficiency of Malicious Two-Party Computation. 397 - Amir Herzberg, Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols. 398 - Mihir Bellare, Thomas Ristenpart:
Multi-Property-Preserving Hash Domain Extension and the EMD Transform. 399 - Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. 400 - (Withdrawn) On the cost of cryptanalytic attacks. 401
- Nicolas T. Courtois, Gregory V. Bard:
Algebraic Cryptanalysis of the Data Encryption Standard. 402 - Willi Geiselmann, Rainer Steinwandt:
Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit. 403 - Till Stegers:
Faugere's F5 Algorithm Revisited. 404 - Aslak Bakke Buan, Kristian Gjøsteen, Lillian Kråkmo:
Universally Composable Blind Signatures in the Plain Model. 405 - Yuto Nakano, Hidenori Kuwakado, Masakatu Morii:
Redundancy of the Wang-Yu Sufficient Conditions. 406 - Jens Groth, Rafail Ostrovsky:
Cryptography in the Multi-string Model. 407 - Goichiro Hanaoka, Hideki Imai:
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. 408 - An-Ping Li:
A new Mac: LAMA. 409 - Alexandre Pinto, Andre Souto, Armando Matos, Luis Filipe Coelho Antunes:
Galois Field Commitment Scheme. 410 - Donghoon Chang:
Preimage Attack on Hashing with Polynomials proposed at ICISC'06. 411 - Donghoon Chang:
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash. 412 - Donghoon Chang:
Preimage Attack on Parallel FFT-Hashing. 413 - Shien Jin Ong, Salil P. Vadhan:
Zero Knowledge and Soundness are Symmetric. 414 - Laura Hitt:
On the Minimal Embedding Field. 415 - Claude Castelluccia:
Authenticated Interleaved Encryption. 416 - Tzuong-Tsieng Moh:
The Recent Attack of Nie et al On TTM is Faulty. 417 - Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong:
Analysis of Privacy-Preserving Element Reduction of Multiset. 418 - Ilia Toli:
Some New Hidden Ideal Cryptosystems. 419 - Shenghui Su, Shuwang Lü:
The REESSE1+ Public Key Cryptosystem v2.2. 420 - Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu:
Universally Composable Three-Party Key Distribution. 421 - Jörn Müller-Quade, Dominique Unruh:
Long-term Security and Universal Composability. 422 - Masayuki Abe, Serge Fehr:
Perfect NIZK with Adaptive Soundness. 423 - Prateek Gupta, Vitaly Shmatikov:
Security Analysis of Voice-over-IP Protocols. 424 - (Withdrawn) The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant. 426
- Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi:
Pairing-friendly elliptic curves with small security loss by Cheon's algorithm. 427 - Lilya Budaghyan, Claude Carlet, Gregor Leander:
Another class of quadratic APN binomials over F2n: the case n divisible by 4. 428 - Sugata Gangopadhyay, Deepmala Sharma:
On a new invariant of Boolean functions. 429 - Nicholas Hopper, David Molnar, David A. Wagner:
From Weak to Strong Watermarking. 430 - Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing. 431 - Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish:
Universally Composable Security with Global Setup. 432 - Reihaneh Safavi-Naini, Peter R. Wild:
Information Theoretic Bounds on Authentication Systems in Query Model. 433 - Deepak Kumar Dalai, Subhamoy Maitra:
Balanced Boolean Functions with (more than) Maximum Algebraic Immunity. 434 - Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols (extended version). 435 - Iftach Haitner, Omer Reingold:
Statistically-Hiding Commitment from Any One-Way Function. 436 - An Braeken, Ventzislav Nikov, Svetla Nikova:
On Zigzag Functions and Related Objects in New Metric. 437 - Jean-Philippe Aumasson:
On the pseudo-random generator ISAAC. 438 - Jun Zhong, Dake He:
A New Type of Group Blind Signature Scheme Based on Bilinear Pairings. 439 - Jun Zhong, Dake He:
A New Type of Group Signature Scheme. 440 - Donghoon Chang, Mridul Nandi:
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. 441 - Je Hong Park:
An attack on the certificateless signature scheme from EUC Workshops 2006. 442 - Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. 443 - Chris Peikert, Alon Rosen:
Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors. 444 - Lilya Budaghyan, Claude Carlet, Gregor Leander:
A class of quadratic APN binomials inequivalent to power functions. 445 - Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo:
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles). 446 - Yael Gertner, Tal Malkin, Steven A. Myers:
Towards a Separation of Semantic and CCA Security for Public Key Encryption. 447 - Tri Van Le, Mike Burmester, Breno de Medeiros:
Universally Composable and Forward Secure RFID Authentication and Key Exchange. 448 - Mihir Bellare, Phillip Rogaway:
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals. 449 - Manuel Barbosa, Pooya Farshim:
Secure Cryptographic Workflow in the Standard Model. 450 - Jongsung Kim:
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms. 451 - TingMao Chang, Jin Zhou, YaJuan Zhang, Yuefei Zhu:
Hybrid Protocol For Password-based Key Exchange in Three-party Setting. 452 - Zhenfeng Zhang, Dengguo Feng:
Key Replacement Attack on a Certificateless Signature Scheme. 453 - Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. 454 - Jonathan Katz:
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation. 455 - Ueli Maurer, Krzysztof Pietrzak, Renato Renner:
Indistinguishability Amplification. 456 - An-Ping Li:
Linear Approximating to Integer Addition. 457 - Aggelos Kiayias, Moti Yung:
Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing. 458 - Claude Carlet:
Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. 459 - Donghoon Chang:
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006. 460 - Oded Goldreich:
On Post-Modern Cryptography. 461 - Lei Duo, Chao Li:
Improved Collision and Preimage Resistance Bounds on PGV Schemes. 462 - Dennis Hofheinz, John Malone-Lee, Martijn Stam:
Obfuscation for Cryptographic Purposes. 463 - Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. 464 - Ran Canetti:
Security and Composition of Cryptographic Protocols: A Tutorial. 465 - Jason E. Gower:
Prime Order Primitive Subgroups in Torus-Based Cryptography. 466 - Donghoon Chang, Moti Yung:
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions). 467 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax
:
White Box Cryptography: Another Attempt. 468 - David Mireles:
An Attack on Disguised Elliptic Curves. 469 - Qiang Tang
:
On the security of a group key agreement protocol. 470 - Augusto Jun Devegili, Colm O'hEigeartaigh, Michael Scott, Ricardo Dahab:
Multiplication and Squaring on Pairing-Friendly Fields. 471 - Luís Teixeira d'Aguiar Norton Brandao:
A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment. 472 - Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. 473 - Changan Zhao, Fangguo Zhang, Jiwu Huang:
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms. 474 - Håvard Raddum, Igor A. Semaev:
New Technique for Solving Sparse Equation Systems. 475 - Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Password-Authenticated Multi-Party Key Exchange with Different Passwords. 476 - William R. Speirs II, Samuel S. Wagstaff Jr.:
Dynamic Cryptographic Hash Functions. 477 - Donghoon Chang:
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA. 478 - Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes. 479 - Shengli Liu, Fangguo Zhang:
Cryptanalysis of REESSE1+ Public Key Cryptosystem. 480 - Donghoon Chang:
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions. 481 - Giovanni Agosta, Gerardo Pelosi:
Countermeasures for the Simple Branch Prediction Analysis. 482 - Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. 483 - (Withdrawn) A New Identity Based Encryption Scheme From Pairing. 484
- Hidenori Kuwakado, Masakatu Morii:
Indifferentiability of Single-Block-Length and Rate-1 Compression Functions. 485 - Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Trace Properties for Computational Security. 486
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.