|
|
1. |
On Obfuscating Point Functions |
|
|
2. |
Logcrypt: Forward Security and Public Verification for Secure Audit ... |
|
|
3. |
Cryptanalysis of Hiji-bij-bij (HBB) |
|
|
4. |
Benes and Butterfly schemes revisited |
|
|
6. |
A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. |
|
|
7. |
The Misuse of RC4 in Microsoft Word and Excel |
|
|
9. |
Mixing properties of triangular feedback shift registers |
|
|
11. |
An Improved Elegant Method to Re-initialize Hash Chains |
|
|
13. |
Comments: Insider attack on Cheng et al.s pairing-based tripartite k... |
|
|
14. |
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyn... |
|
|
15. |
Hierarchical Identity Based Encryption with Constant Size Ciphertext |
|
|
17. |
Side Channel Attacks on Implementations of Curve-Based Cryptographic... |
|
|
18. |
Collusion Resistant Broadcast Encryption With Short Ciphertexts and ... |
|
|
20. |
(De)Compositions of Cryptographic Schemes and their Applications to ... |
|
|
21. |
Partial Hiding in Public-Key Cryptography |
|
|
22. |
An Improved and Efficient Countermeasure against Power Analysis Atta... |
|
|
23. |
A Construction of Public-Key Cryptosystem Using Algebraic Coding on ... |
|
|
24. |
On the Diffie-Hellman problem over $GL_{n}$ |
|
|
26. |
Techniques for random maskin in hardware |
|
|
27. |
Tag-KEM/DEM: A New Framework for Hybrid Encryption |
|
|
28. |
Improved Proxy Re-Encryption Schemes with Applications to Secure Dis... |
|
|
29. |
A model and architecture for pseudo-random generation with applicati... |
|
|
31. |
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves |
|
|
32. |
On the Notion of Statistical Security in Simulatability Definitions |
|
|
33. |
A Flexible Framework for Secret Handshakes |
|
|
34. |
An Efficient CDH-based Signature Scheme With a Tight Security Reduct... |
|
|
35. |
Concurrent Composition of Secure Protocols in the Timing Model |
|
|
36. |
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes |
|
|
37. |
Distinguishing Stream Ciphers with Convolutional Filters |
|
|
38. |
Unfairness of a protocol for certified delivery |
|
|
39. |
On the Security of a Group Signature Scheme with Strong Separability |
|
|
40. |
Polyhedrons over Finite Abelian Groups and Their Cryptographic Appli... |
|
|
41. |
An Efficient Solution to The Millionaires Problem Based on Homomorph... |
|
|
42. |
On the affine classification of cubic bent functions |
|
|
43. |
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 |
|
|
45. |
Cryptanalysis of an anonymous wireless authentication and conference... |
|
|
46. |
Cryptanalysis of two identification schemes based on an ID-based cry... |
|
|
48. |
David Chaum's Voter Verification using Encrypted Paper Receipts |
|
|
49. |
A Note on Shor's Quantum Algorithm for Prime Factorization |
|
|
50. |
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard... |
|
|
51. |
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent |
|
|
53. |
Untraceability of Two Group Signature Schemes |
|
|
54. |
Key Derivation and Randomness Extraction |
|
|
101. |
A sufficient condition for key-privacy |