1. | |
|
|
2. |
Logcrypt: Forward Security and Public Verification for Secure Audit ... |
03/07 00:29 | | |
2. | |
|
|
3. |
Cryptanalysis of Hiji-bij-bij (HBB) |
03/07 00:29 | | |
3. | |
|
|
4. |
Benes and Butterfly schemes revisited |
03/07 00:29 | | |
4. | |
|
|
5. |
A sufficient condition for key-privacy |
03/07 01:13 | | (4) |
5. | |
|
|
6. |
A Metric on the Set of Elliptic Curves over ${mathbf F}_p$. |
03/07 00:29 | | |
6. | |
|
|
7. |
The Misuse of RC4 in Microsoft Word and Excel |
03/07 00:29 | | |
7. | |
|
|
9. |
Mixing properties of triangular feedback shift registers |
03/07 00:29 | | |
8. | |
|
|
10. |
Update on SHA-1 |
03/07 01:11 | | |
9. | |
|
|
11. |
An Improved Elegant Method to Re-initialize Hash Chains |
03/07 00:29 | | |
10. | |
|
|
12. |
Efficient Certificateless Public Key Encryption |
03/07 00:29 | | |
11. | |
|
|
13. |
Comments: Insider attack on Cheng et al.s pairing-based tripartite k... |
03/07 00:29 | | |
12. | |
|
|
14. |
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyn... |
03/07 00:29 | | |
13. | |
|
|
15. |
Hierarchical Identity Based Encryption with Constant Size Ciphertext |
03/07 00:29 | | |
14. | |
|
|
17. |
Side Channel Attacks on Implementations of Curve-Based Cryptographic... |
03/07 00:29 | | |
15. | |
|
|
18. |
Collusion Resistant Broadcast Encryption With Short Ciphertexts and ... |
03/07 01:11 | | |
16. | |
|
|
19. |
The Full Abstraction of the UC Framework |
03/07 00:29 | | |
17. | |
|
|
20. |
(De)Compositions of Cryptographic Schemes and their Applications to ... |
03/07 00:29 | | |
18. | |
|
|
21. |
Partial Hiding in Public-Key Cryptography |
03/07 00:29 | | |
19. | |
|
|
22. |
An Improved and Efficient Countermeasure against Power Analysis Atta... |
03/07 00:29 | | |
20. | |
|
|
23. |
A Construction of Public-Key Cryptosystem Using Algebraic Coding on ... |
03/07 00:29 | | |
21. | |
|
|
24. |
On the Diffie-Hellman problem over $GL_{n}$ |
03/07 00:29 | | |
22. | |
|
|
25. |
Analysis of Affinely Equivalent Boolean Functions |
03/07 00:29 | | |
23. | |
|
|
26. |
Techniques for random maskin in hardware |
03/07 00:29 | | |
24. | |
|
|
28. |
Improved Proxy Re-Encryption Schemes with Applications to Secure Dis... |
03/07 01:11 | | |
25. | |
|
|
30. |
Weak keys of pairing based Diffie Hellman schemes on elliptic curves |
03/07 01:11 | | |
26. | |
|
|
32. |
On the Notion of Statistical Security in Simulatability Definitions |
03/07 00:29 | | |
27. | |
|
|
34. |
An Efficient CDH-based Signature Scheme With a Tight Security Reduct... |
03/07 00:29 | | |
28. | |
|
|
36. |
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes |
03/07 00:29 | | |
29. | |
|
|
37. |
Distinguishing Stream Ciphers with Convolutional Filters |
03/07 00:29 | | |
30. | |
|
|
38. |
Unfairness of a protocol for certified delivery |
03/07 00:29 | | |
31. | |
|
|
39. |
On the Security of a Group Signature Scheme with Strong Separability |
03/07 00:29 | | |
32. | |
|
|
40. |
Polyhedrons over Finite Abelian Groups and Their Cryptographic Appli... |
03/07 00:29 | | |
33. | |
|
|
41. |
An Efficient Solution to The Millionaires Problem Based on Homomorph... |
03/07 00:29 | | |
34. | |
|
|
42. |
On the affine classification of cubic bent functions |
03/07 00:29 | | |
35. | |
|
|
43. |
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 |
03/07 00:29 | | |
36. | |
|
|
44. |
New Approaches for Deniable Authentication |
03/07 00:29 | | |
37. | |
|
|
45. |
Cryptanalysis of an anonymous wireless authentication and conference... |
03/07 00:29 | | |
38. | |
|
|
46. |
Cryptanalysis of two identification schemes based on an ID-based cry... |
03/07 01:11 | | |
39. | |
|
|
47. |
Adversarial Model for Radio Frequency Identification |
03/07 00:29 | | |
40. | |
|
|
48. |
David Chaum's Voter Verification using Encrypted Paper Receipts |
03/07 00:29 | | |
41. | |
|
|
49. |
A Note on Shor's Quantum Algorithm for Prime Factorization |
03/07 00:29 | | |
42. | |
|
|
50. |
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard... |
03/07 00:29 | | |
43. | |
|
|
51. |
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent |
03/07 00:29 | | |
44. | |
|
|
101. |
A sufficient condition for key-privacy |
03/07 00:29 | | |