default search action
IACR Cryptology ePrint Archive, Volume 2010, 2010
- Jacques Patarin:
Transfinite Cryptography. 1 - Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based Encryption for Wireless Sensor Network. 2 - Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network. 3 - Qiping Lin, Fangguo Zhang:
Halving on Binary Edwards Curves. 4 - Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng:
Skew-Frobenius map on twisted Edwards curve. 5 - Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann:
Factorization of a 768-bit RSA modulus. 6 - Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. 7 - Liqun Chen:
A DAA Scheme Requiring Less TPM Resources. 8 - Xuelian Li, Yupu Hu, Juntao Gao:
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions. 9 - Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII. 10 - Chester Rebeiro, Debdeep Mukhopadhyay:
Differential Cache Trace Attack Against CLEFIA. 12 - Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. 13 - Mridul Nandi:
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs. 14 - Jorge Guajardo, Bart Mennink:
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures? 15 - Jian Guo, San Ling, Christian Rechberger, Huaxiong Wang:
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. 16 - Paulo S. L. M. Barreto, Rafael Misoczki:
A new one-time signature scheme from syndrome decoding. 17 - Imran Erguler, Emin Anarim:
Scalability and Security Conflict for RFID Authentication Protocols. 18 - Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks. 19 - Rongquan Feng, Hongfeng Wu:
Number of Jacobi quartic curves over finite fields. 20 - Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong:
A note on "Improved Fast Correlation Attacks on Stream Ciphers". 21 - Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. 22 - Junko Takahashi, Toshinori Fukunaga:
Differential Fault Analysis on AES with 192 and 256-Bit Keys. 23 - Dima Grigoriev, Vladimir Shpilrain:
Authentication schemes from actions on graphs, groups, or rings. 24 - Jiqiang Lu:
New Methodologies for Differential-Linear Cryptanalysis and Its Extensions. 25 - Xin-jie Zhao, Tao Wang:
Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth. 26 - Yalin Chen, Jue-Sam Chou, Xian-Wu Hou:
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings. 27 - Jue-Sam Chou, Yalin Chen:
A secure anonymous communication scheme in vehicular ad hoc networks from pairings. 28 - Yuval Ishai, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank:
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation. 29 - Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay:
On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions. 30 - Andreas Enge, Andrew V. Sutherland:
Class Invariants by the CRT Method. 31 - Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta:
An Information Theoretic Perspective on the Differential Fault Analysis against AES. 32 - Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup:
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. 33 - Xiwang Cao:
On the order of the polynomial xp-x-a. 34 - Goichiro Hanaoka, Kaoru Kurosawa:
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption. 35 - (Withdrawn) An Enhanced Remote User Authentication Scheme. 36
- Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. 37 - Arnaud Boscher, Helena Handschuh, Elena Trichina:
Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions. 38 - Xiwang Cao, Lei Hu:
On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields. 39 - Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud:
Batch Groth-Sahai. 40 - Orr Dunkelman, Nathan Keller:
The Effects of the Omission of Last Round's MixColumns on AES. 41 - Qingfeng Cheng, Chuangui Ma, Fushan Wei:
A modified eCK model with stronger security for tripartite authenticated key exchange. 42 - Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and invertibility properties of BLAKE (full version). 43 - (Withdrawn) A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods. 44
- (Withdrawn) Efficient chaotic permutations for image encryption algorithms. 45
- (Withdrawn) A New Chaos-Based Cryptosystem for Secure Transmitted Images. 46
- Daniel R. L. Brown:
Lower Bounds for Straight Line Factoring. 47 - (Withdrawn) An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem. 48
- Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs:
On Symmetric Encryption and Point Obfuscation. 49 - Jia Xu, Ee-Chien Chang:
Authenticating Aggregate Range Queries over Multidimensional Dataset. 50 - Zhengjun Cao:
A Principle for Cryptographic Protocols Beyond Security, Less Parameters. 51 - (Withdrawn) Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. 52
- Anatoly D. Plotnikov:
Logical cryptoanalysis on the example of the cryptosystem DES. 53 - Cai-Sen Chen, Tao Wang, Jun-Jian Tian:
An Improved Timing Attack with Error Detection on RSA-CRT. 54 - Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup:
Credential Authenticated Identification and Key Exchange. 55 - Xin-jie Zhao, Tao Wang:
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment. 56 - Çagdas Çalik, Meltem Sönmez Turan:
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256. 57 - José de Jesús Angel Angel, Guillermo Morales-Luna:
Solinas primes of small weight for fixed sizes. 58 - Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. 59 - Yongge Wang:
Insecure "Provably Secure Network Coding" and Homomorphic Authentication Schemes for Network Coding. 60 - Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu:
Privacy-Preserving Matching Protocols for Attributes and Strings. 61 - Bozhan Su, Wenling Wu, Wentao Zhang:
Differential Cryptanalysis of SMS4 Block Cipher. 62 - Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 Using a Single Fault. 63 - Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis:
New Advances on Privacy-Preserving Policy Reconciliation. 64 - Zhengjun Cao:
An Anonymous ID-based Encryption Revisited. 65 - Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Some Observations on TWIS Block Cipher. 66 - Ernie Brickell, Jiangtao Li:
A Pairing-Based DAA Scheme Further Reducing TPM Resources. 67 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. 68 - Daniel J. Bernstein, Tanja Lange:
Type-II Optimal Polynomial Bases. 69 - Markus Rückert:
Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles. 70 - Didier Alquié:
2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree. 71 - Didier Alquié:
Approximating Addition by XOR: how to go all the way. 72 - Bonwook Koo, Yongjin Yeom, Jung Hwan Song:
Related-Key Boomerang Attack on Block Cipher SQUARE. 73 - Andrew C. Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. 74 - Mehdi Vasef:
A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra. 75 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Private and Continual Release of Statistics. 76 - Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe:
ECC2K-130 on Cell CPUs. 77 - Xin-jie Zhao, Tao Wang, Jing-zhe Gao:
Multiple Bytes Differential Fault Analysis on CLEFIA. 78 - Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design. 79 - Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols. 80 - Sandy Harris:
The Eris hybrid cipher. 81 - James Birkett, Douglas Stebila:
Predicate-Based Key Exchange. 82 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
One Round Group Key Exchange with Forward Security in the Standard Model. 83 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-based Authenticated Key Exchange. 84 - Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems. 85 - Zvika Brakerski, Yael Tauman Kalai:
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model. 86 - Christopher Wolf, Bart Preneel:
MQ*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions. 87 - Chris Peikert:
An Efficient and Parallel Gaussian Sampler for Lattices. 88 - Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. 89 - Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-bit Discrete Logarithm Problem in GF(36n). 90 - Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. 91 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Security Weaknesses in Two Certificateless Signcryption Schemes. 92 - Zheng Yuan:
New Impossible Di®erential Attacks on AES. 93 - Debiao He, Jianhua Chen, Jin Hu:
A Random Number Generator Based on Isogenies Operations. 94 - Kenneth G. Paterson, Gaven J. Watson:
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. 95 - Kamer Kaya, Ali Aydin Selçuk:
Secret Sharing Extensions based on the Chinese Remainder Theorem. 96 - Özgür Dagdelen, Michael Schneider:
Parallel Enumeration of Shortest Lattice Vectors. 97 - Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:
A Zero-One Law for Deterministic 2-Party Secure Computation. 98 - Brett Hemenway, Rafail Ostrovsky:
Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security. 99 - Brett Hemenway, Steve Lu, Rafail Ostrovsky:
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security. 100 - Georg Fuchsbauer, Damien Vergnaud:
Fair Blind Signatures without Random Oracles. 101 - Susan Hohenberger, Brent Waters:
Constructing Verifiable Random Functions with Large Input Spaces. 102 - Rafik Chaabouni, Serge Vaudenay:
The Extended Access Control for Machine Readable Travel Documents. 103 - Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. 104 - Sui-Guan Teo, Leonie Simpson, Ed Dawson:
Bias in the nonlinear filter generator output sequence. 105 - Ivan Damgård, Yuval Ishai, Mikkel Krøigaard:
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography. 106 - Andrew C. Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. 107 - Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen:
Perfectly Secure Oblivious RAM Without Random Oracles. 108 - Matthew Green, Susan Hohenberger:
Practical Adaptive Oblivious Transfer from Simple Assumptions. 109 - Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. 110 - Vladimir Rudskoy:
On zero practical significance of "Key recovery attack on full GOST block cipher with zero time and memory". 111 - Jun Shao, Zhenfu Cao, Peng Liu:
CCA-Secure PRE Scheme without Random Oracles. 112 - Xu An Wang, Xiaoyuan Yang:
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model. 113 - Simon R. Blackburn:
The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin-Abu cryptosystem. 114 - Jason Bau, John C. Mitchell:
A Security Evaluation of DNSSEC with NSEC3. 115 - M. Abdelaziz Elaabid, Sylvain Guilley:
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. 116 - Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash:
Cryptographic Agility and its Relation to Circular Encryption. 117 - Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita:
Proposal of a Signature Scheme based on STS Trapdoor. 118 - (Withdrawn) How to Construct Space Efficient Revocable IBE from Non-monotonic ABE. 119
- Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee:
Universal One-Way Hash Functions via Inaccessible Entropy. 120 - (Withdrawn) Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. 121
- Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa:
Security of Encryption Schemes in Weakened Random Oracle Models. 122 - Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. 123 - Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilton, Neil Hanley, Máire O'Neill, William P. Marnane:
A Hardware Wrapper for the SHA-3 Hash Algorithms. 124 - Michael J. Jacobson Jr., Renate Scheidler, Andreas Stein:
Cryptographic Aspects of Real Hyperelliptic Curves. 125 - Jian-Zhu Lu, Jipeng Zhou:
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks. 126 - (Withdrawn) CCA-Secure Cryptosystem from Lattice. 127
- (Withdrawn) Update-Optimal Authenticated Structures Based on Lattices. 128
- N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary:
Relation for Algebraic Attack on E0 combiner. 129 - Alessandro Barenghi, Guido Bertoni, Luca Breveglieri, Mauro Pellicioli, Gerardo Pelosi:
Low Voltage Fault Attacks to AES and RSA on General Purpose Processors. 130 - Jooyoung Lee, John P. Steinberger:
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation. 131 - Junfeng Fan, Jens Hermans, Frederik Vercauteren:
On the claimed privacy of EC-RAC III. 132 - Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo:
Signing on Elements in Bilinear Groups for Modular Protocol Design. 133 - Masaaki Shirase:
Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -. 134 - Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud:
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption. 135 - Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. 136