default search action
IACR Cryptology ePrint Archive, Volume 2006
Volume 2006, 2006
- Doerte K. Rappe:
Homomorphic Cryptosystems and their Applications. 1 - Susan G. Barwick, Wen-Ai Jackson:
Geometric constructions of optimal linear perfect hash families. 2 - Dragos Trinca:
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. 3 - Lea Kissner, David Molnar:
Provably Secure Subsitution of Cryptographic Tools. 4 - Colm O'hEigeartaigh, Michael Scott:
Pairing Calculation on Supersingular Genus 2 Curves. 5 - Lijun Liao:
Group Key Agreement for Ad Hoc Networks. 6 - Lifeng Guo, Guilin Wang, Duncan S. Wong:
Further Discussions on the Security of a Nominative Signature Scheme. 7 - James A. Muir:
A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers. 8 - Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad:
Breaking and Fixing Public-Key Kerberos. 9 - Steve Babbage, Matthew Dodd:
Finding Characteristic Polynomials with Jump Indices. 10 - Christina Lindenberg, Kai Wirt, Johannes Buchmann:
Formal Proof for the Correctness of RSA-PSS. 11 - Paz Morillo, Carla Ràfols:
Certificate-Based Encryption Without Random Oracles. 12 - Hung-Yu Chien:
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings. 13 - Flavio D. Garcia, Peter van Rossum:
Sound Computational Interpretation of Formal Hashes. 14 - Gene Tsudik:
A Family of Dunces: Trivial RFID Identification and Authentication Protocols. 15 - Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Message Modification for Step 21-23 on SHA-0. 16 - Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung:
Threshold and Proactive Pseudo-Random Permutations. 17 - Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra:
Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks. 18 - Ulrich Kaiser:
Hermes8 : A Low-Complexity Low-Power Stream Cipher. 19 - Adam D. Smith:
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes. 20 - Denis Xavier Charles, Eyal Z. Goren, Kristin E. Lauter:
Cryptographic hash functions from expander graphs. 21 - He Ge:
A Method to Implement Direct Anonymous Attestation. 23 - George Danezis, Claudia Díaz:
Improving the Decoding Efficiency of Private Search. 24 - Denis Xavier Charles, Kamal Jain, Kristin E. Lauter:
Signatures for Network Coding. 25 - David Freeman:
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10. 26 - Vladimir Bayev:
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms. 27 - Thulasi Goriparthi, Manik Lal Das, Atul Negi, Ashutosh Saxena:
Cryptanalysis of recently proposed Remote User Authentication Schemes. 28 - Stéphanie Alt:
Authenticated Hybrid Encryption for Multiple Recipients. 29 - Paul Crowley:
Improved cryptanalysis of Py. 30 - Le Trieu Phong, Wakaha Ogata:
On a Variation of Kurosawa-Desmedt Encryption Scheme. 31 - Deepak Kumar Dalai, Subhamoy Maitra:
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators. 32 - Isabelle Déchène:
Arithmetic of Generalized Jacobians. 33 - Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. 34 - Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Nazar Abbas Saqib, Nareli Cruz Cortés:
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials. 35 - Sean O'Neil:
Vector Stream Cipher Instant Key Recovery. 36 - Ted Krovetz:
Message Authentication on 64-bit Architectures. 37 - Jintai Ding, Jason E. Gower, Dieter Schmidt:
Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field. 38 - Joan Daemen, Vincent Rijmen:
Two-Round AES Differentials. 39 - Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. 40 - Birgit Pfitzmann, Matthias Schunter, Michael Waidner:
Reactively Simulatable Certified Mail. 41 - Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. 42 - Mihir Bellare:
New Proofs for NMAC and HMAC: Security Without Collision-Resistance. 43 - Ivan Damgård, Rune Thorbek:
Linear Integer Secret Sharing and Distributed Exponentiation. 44 - Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing. 45 - Shaoquan Jiang:
Efficient Primitives from Exponentiation in Zp. 46 - Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. 47 - Javier Herranz, Germán Sáez:
New Results on Multipartite Access Structures. 48 - Joo Yeon Cho, Josef Pieprzyk:
Crossword Puzzle Attack on NLS. 49 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel. 50 - Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems. 51 - Ernie Brickell, Gary Graunke, Michael Neve, Jean-Pierre Seifert:
Software mitigations to hedge AES against cache-based software side channel vulnerabilities. 52 - Joan-Josep Climent, Elisa Gorla, Joachim Rosenthal:
Cryptanalysis of the CFVZ cryptosystem. 53 - Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. 54 - Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on some Generalized Sequential Hash Functions. 55 - Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Key Exchange Protocols: Security Definition, Proof Method and Applications. 56 - Vladimir Kolesnikov, Charles Rackoff:
Key Exchange Using Passwords and Long Keys. 57 - Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. 58 - Robert Granger, Dan Page, Nigel P. Smart:
High Security Pairing-Based Cryptography Revisited. 59 - (Withdrawn) An Efficient ID-based Signature Scheme from Pairings. 60
- (Withdrawn) A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries. 62
- Boris Ryabko, Daniil Ryabko:
Provably Secure Universal Steganographic Systems. 63 - Julien Bringer, Hervé Chabanne, Emmanuelle Dottax:
Perturbing and Protecting a Traceable Block Cipher. 64 - Jonathan Katz, Chiu-Yuen Koo:
On Expected Constant-Round Protocols for Byzantine Agreement. 65 - John Solis, Gene Tsudik:
Simple and Flexible Private Revocation Checking. 66 - Roberto Avanzi, Francesco Sica:
Scalar Multiplication on Koblitz Curves using Double Bases. 67 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. 68 - Bruno Blanchet, David Pointcheval:
Automated Security Proofs with Sequences of Games. 69 - Sergey Doroshenko, Boris Ryabko:
The experimental distinguishing attack on RC4. 70 - Ueli Maurer, Johan Sjödin:
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security. 71 - Yaniv Shaked, Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's. 72 - Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:
Stronger Security of Authenticated Key Exchange. 73 - Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Condition in Searching Collisions of MD5. 74 - Tomohiro Harayama:
On the Weil Sum Evaluation of Central Polynomial in Multivariate Quadratic Cryptosystem. 75 - (Withdrawn) A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement. 76
- Jaume Martí-Farré, Carles Padró:
On Secret Sharing Schemes, Matroids and Polymatroids. 77 - Yevgeniy Dodis, Prashant Puniya:
Verifiable Random Permutations. 78 - Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt:
Towards Provably Secure Group Key Agreement Building on Group Theory. 79 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Efficient Identity-based Signatures Secure in the Standard Model. 80 - David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine. 81 - HariGovind V. Ramasamy, Christian Cachin:
Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast. 82 - Amir Herzberg:
Browsers Defenses Against Phishing, Spoofing and Malware. 83 - Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography from Anonymity. 84 - Xavier Boyen, Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). 85 - Zvi Gutterman, Benny Pinkas, Tzachy Reinman:
Analysis of the Linux Random Number Generator. 86 - Barath Raghavan, Saurabh Panjwani, Anton Mityagin:
Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons. 87 - Sven Laur, Helger Lipmaa:
On the Feasibility of Consistent Computations. 88 - Goce Jakimoski, Yvo Desmedt:
A Tree-based Model of Unicast Stream Authentication. 89 - Ee-Chien Chang, Vadym Fedyukovych, Qiming Li:
Secure Sketch for Multi-Sets. 90 - Moni Naor, Guy N. Rothblum:
The Complexity of Online Memory Checking. 91 - Abderrahmane Nitaj:
Cryptanalysis of RSA with constrained keys. 92 - Abderrahmane Nitaj:
RSA and a higher degree diophantine equation. 93 - Peng Wang, Dengguo Feng, Wenling Wu:
Cryptanalysis of the MEM Mode of Operation. 94 - John Black, Martin Cochran:
MAC Reforgeability. 95 - Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures without Random Oracles. 96 - Kenneth G. Paterson:
A Cryptographic Tour of the IPsec Standards. 97 - Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Gröbner Basis Based Cryptanalysis of SHA-1. 98 - Dongvu Tonien, Reihaneh Safavi-Naini:
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. 99 - Sujing Zhou, Dongdai Lin:
A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability. 100 - Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. 101 - Tatsuaki Okamoto:
Efficient Blind and Partially Blind Signatures Without Random Oracles. 102 - Markku-Juhani O. Saarinen:
Security of VSH in the Real World. 103 - Marc Stevens:
Fast Collision Attack on MD5. 104 - Vlastimil Klíma:
Tunnels in Hash Functions: MD5 Collisions Within a Minute. 105 - Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further Refinement of Pairing Computation Based on Miller's Algorithm. 106 - Oliver Schirokauer:
The number field sieve for integers of low weight. 107 - Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. 108 - Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt:
A Simpler Sieving Device: Combining ECM and TWIRL. 109 - Florian Hess, Nigel P. Smart, Frederik Vercauteren:
The Eta Pairing Revisited. 110 - Martin Stanek:
Attacking LCCC Batch Verification of RSA Signatures. 111 - Markus Volkmer:
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines. 112 - Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. 113 - Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo:
Tate pairing for y2=x5-αx in Characteristic Five. 114 - Alexander Rostovtsev:
Fast exponentiation via prime finite field isomorphism. 115 - Mario Lamberger, Norbert Pramstaller, Vincent Rijmen:
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass. 116 - Daniel R. L. Brown:
Conjectured Security of the ANSI-NIST Elliptic Curve RNG. 117 - Sugata Gangopadhyay, Deepmala Sharma:
On construction of non-normal Boolean functions. 118 - (Withdrawn) Repairing Attacks on a Password-Based Group Key Agreement. 119
- Jason E. Holt:
Key Privacy for Identity Based Encryption. 120 - José de Jesús Angel Angel, Guillermo Morales-Luna:
Counting Prime Numbers with Short Binary Signed Representation. 121 - Eike Kiltz:
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. 122 - Douglas Wikström:
Designated Confirmer Signatures Revisited. 123 - Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. 124 - Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee:
Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves. 125 - Yiliang Han, Xiaoyuan Yang:
ECGSC: Elliptic Curve based Generalized Signcryption Scheme. 126 - Sourav Mukhopadhyay, Palash Sarkar:
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm. 127 - Denis Xavier Charles:
On the existence of distortion maps on ordinary elliptic curves. 128 - Wei Han, Dong Zheng, Kefei Chen:
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. 129 - Dennis Hofheinz, Dominique Unruh:
Simulatable Security and Polynomially Bounded Concurrent Composition. 130 - Mike Burmester, Tri Van Le, Breno de Medeiros:
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. 131 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. 132 - Francisco Rodríguez-Henríquez, Guillermo Morales-Luna, Julio César López-Hernández:
Low Complexity Bit-Parallel Square Root Computation over GF(2m) for all Trinomials. 133 - Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena:
Identity Based Strong Designated Verifier Signature Scheme. 134 - Duo Lei, Da Lin, Chao Li, Keqin Feng, Longjiang Qu:
The Design Principle of Hash Function with Merkle-Damgård Construction. 135 - Gregory V. Bard:
A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. 136 - Ari Juels, Stephen A. Weis:
Defining Strong Privacy for RFID. 137 - Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES. 138 - François-Xavier Standaert, Tal Malkin, Moti Yung:
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version). 139 - Jiejun Kong:
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks. 140