default search action
IACR Cryptology ePrint Archive, Volume 2007
Volume 2007, 2007
- Laura Hitt:
Families of genus 2 curves with small embedding degree. 1 - (Withdrawn) Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem. 2
- Johann Großschädl, Alexander Szekely, Stefan Tillich:
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks. 3 - Jue-Sam Chou, Yalin Chen, Chung-Ju Chan:
Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking. 4 - Lan Nguyen:
Privacy-Protecting Coupon System Revisited. 5 - Lan Nguyen:
Efficient Dynamic k-Times Anonymous Authentication. 6 - Wei Gao, Xueli Wang, Guilin Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. 7 - Dong Hoon Lee, Je Hong Park, Jae Woo Han:
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006. 8 - Zhenfu Cao, Xiaolei Dong, Licheng Wang:
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings. 9 - David Freeman, Kristin E. Lauter:
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields. 10 - Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu:
Universally Composable Key-evolving Signature. 11 - Atefeh Mashatan, Douglas R. Stinson:
Interactive two-channel message authentication based on interactive-collision Resistant hash functions. 12 - Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto:
Optimised versions of the Ate and Twisted Ate Pairings. 13 - Shai Halevi:
Invertible Universal Hashing and the TET Encryption Mode. 14 - Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Group Encryption. 15 - (Withdrawn) VEST Ciphers. 16
- Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu, Yumin Wang:
Group Decryption. 17 - Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-based Key Agreement and Anonymous Extension. 18 - Changshe Ma, Jian Weng, Dong Zheng:
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions. 19 - Leonardo B. Oliveira, Diego F. Aranha, Eduardo Morais, Felipe Daguano, Julio López, Ricardo Dahab:
TinyTate: Identity-Based Encryption for Sensor Networks. 20 - Alexander Maximov, Alex Biryukov:
Two Trivial Attacks on Trivium. 21 - O. A. Logachev:
On Perfectly Balanced Boolean Functions. 22 - Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient Hybrid Encryption from ID-Based Encryption. 23 - Gregory V. Bard, Nicolas T. Courtois, Chris Jefferson:
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers. 24 - Rafail Ostrovsky, Omkant Pandey, Amit Sahai:
Private Locally Decodable Codes. 25 - Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang:
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol. 26 - (Withdrawn) Verifying Data Integrity with Few Queries to Untrusted Memory. 27
- Debrup Chakraborty, Palash Sarkar:
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. 28 - Debrup Chakraborty, Palash Sarkar:
A General Construction of Tweakable Block Ciphers and Different Modes of Operations. 29 - Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. 30 - Mridul Nandi, Avradip Mandal:
Improved Security Analysis of PMAC. 31 - Avradip Mandal, Mridul Nandi:
An improved collision probability for CBC-MAC and PMAC. 32 - Eike Kiltz:
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme. 33 - An-Ping Li:
A New Type of Cipher: DICING_CSB. 34 - Louis Goubin, Jean-Michel Masereel, Michaël Quisquater:
Cryptanalysis of white box DES implementations. 35 - Eike Kiltz:
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. 36 - Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Best Quadratic Approximations of Cubic Boolean Functions. 37 - Joo Yeon Cho, Josef Pieprzyk:
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. 38 - Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert:
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. 39 - Pradeep Kumar Mishra, Vassil S. Dimitrov:
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. 40 - Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. 41 - Jiang Wu, Douglas R. Stinson:
Authorship Proof for Textual Document. 42 - Orhun Kara:
Reflection Attacks on Product Ciphers. 43 - Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries:
Design and Primitive Specification for Shannon. 44 - Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
A Coprocessor for the Final Exponentiation of the etaT Pairing in Characteristic Three. 45 - Kaoru Kurosawa, Takeshi Koshiba:
Direct Reduction of String (1, 2)-OT to Rabin's OT. 46 - Joonsang Baek, Willy Susilo, Jianying Zhou:
New Constructions of Fuzzy Identity-Based Encryption. 47 - Daniel R. L. Brown, Kristian Gjøsteen:
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. 48 - Jin Zhou, YaJuan Zhang, Yuefei Zhu:
Security Arguments for a Class of ID-based Signatures. 49 - Vlastimil Klíma:
Special block cipher family DN and new generation SNMAC-type hash function family HDN. 50 - Tri Van Le, Mike Burmester, Breno de Medeiros:
Forward-secure RFID Authentication and Key Exchange. 51 - Di Ma, Gene Tsudik:
Forward-Secure Sequential Aggregate Authentication. 52 - Manuel Barbosa, Andrew Moss, Dan Page:
Compiler Assisted Elliptic Curve Cryptography. 53 - Souradyuti Paul:
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition. 54 - Andrey Bogdanov:
Cryptanalysis of the KeeLoq block cipher. 55 - Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. 56 - David Freeman:
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians. 57 - Lilya Budaghyan:
The simplest method for constructing APN polynomials EA-inequivalent to power functions. 58 - Rafail Ostrovsky, William E. Skeith III:
A Survey of Single Database PIR: Techniques and Applications. 59 - Yonatan Aumann, Yehuda Lindell:
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. 60 - Neil Costigan, Michael Scott:
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3. 61 - Nicolas T. Courtois, Gregory V. Bard, David A. Wagner:
Algebraic and Slide Attacks on KeeLoq. 62 - Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. 63 - Rafail Ostrovsky, William E. Skeith III:
Algebraic Lower Bounds for Computing on Encrypted Data. 64 - Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba:
How to Derive Lower Bound on Oblivious Transfer Reduction. 65 - Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama:
Low-Density Attack Revisited. 66 - (Withdrawn) Efficient Hierarchical Identity Based Signature in the Standard Model. 68
- Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. 69 - Alexander Maximov:
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected). 70 - Ahto Buldas, Sven Laur:
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version). 71 - (Withdrawn) A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard. 72
- Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III:
Public Key Encryption that Allows PIR Queries. 73 - Hovav Shacham:
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. 74 - Gautham Sekar, Souradyuti Paul, Bart Preneel:
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy. 75 - Kaoru Kurosawa, Kazuhiro Suzuki:
Almost Secure (1-Round, n-Channel) Message Transmission Scheme. 76 - (Withdrawn) On bent functions with zero second derivatives. 77
- Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas:
MPC vs. SFE: Perfect Security in a Unified Corruption Model. 78 - Kazuhiro Suzuki, Kaoru Kurosawa:
How To Find Many Collisions of 3-Pass HAVAL. 79 - (Withdrawn) Weakly only Unforgeable Signature and Its Application in Group Signature. 80
- Maurizio Adriano Strangio:
Revisiting an Efficient Elliptic Curve Key Agreement Protocol. 81 - Shaoquan Jiang:
Deniable Authentication on the Internet. 82 - Brett Hemenway, Rafail Ostrovsky:
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code. 83 - Sanjit Chatterjee, Palash Sarkar:
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions. 84 - Hongbo Yu, Xiaoyun Wang:
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. 85 - Ivan Damgård, Rune Thorbek:
Non-Interactive Proofs for Integer Multiplication. 86 - Jie Liu, Jianhua Li:
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy. 87 - Domingo Gómez, Jaime Gutierrez, Álvar Ibeas:
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers. 88 - Ueli Maurer, Dominik Raub:
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. 89 - (Withdrawn) On the security of an image encryption scheme. 90
- Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto:
Arithmetic Operators for Pairing-Based Cryptography. 91 - Grzegorz Wojtenko:
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP. 92 - Claudio Soriente, Gene Tsudik, Ersin Uzun:
HAPADEP: Human Asisted Pure Audio Device Pairing. 93 - Xavier Boyen:
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants. 94 - Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption in the Standard Model. 95 - R. Wm. Gosper, Rich Schroeppel:
Somos Sequence Near-Addition Formulas and Modular Theta Functions. 96 - Christian Robenhagen Ravnshøj:
Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves. 97 - Lilya Budaghyan, Claude Carlet:
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures. 98 - Jaime Gutierrez, Álvar Ibeas:
Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits. 99 - Shengbao Wang, Zhenfu Cao:
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications. 100 - Yu Sasaki, Go Yamamoto, Kazumaro Aoki:
Practical Password Recovery on an MD5 Challenge and Response. 101 - Ran Canetti, Ling Cheung, Nancy A. Lynch, Olivier Pereira:
On the Role of Scheduling in Simulation-Based Security. 102 - Roberto Avanzi:
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic. 103 - Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel:
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. 104 - Nicholas A. Howgrave-Graham:
Isodual Reduction of Lattices. 105 - Masao Kasahara:
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA. 106 - Yasuyuki Murakami, Takeshi Nasako:
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem. 107 - Joo Yeon Cho, Josef Pieprzyk:
An Improved Distinguisher for Dragon. 108 - Thomas Ristenpart, Phillip Rogaway:
How to Enrich the Message Space of a Cipher. 109 - Woo Sug Kang:
Construction of Pairing-Friendly Elliptic Curves. 110 - Qingsong Ye, Huaxiong Wang, Christophe Tartary:
Privacy-Preserving Distributed Set Intersection. 111 - Koh-ichi Nagao:
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field. 112 - Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-based Deniable Authentication Protocol on Pairings. 113 - Guang Zeng, Wenbao Han, Kaicheng He:
High Efficiency Feedback Shift Register: sigma-LFSR. 114 - Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire:
Quadratic Almost Perfect Nonlinear Functions With Many Terms. 115 - Douglas R. Stinson, Jiang Wu:
A Zero-Knowledge Identification and Key Agreement Protocol. 116 - Sihem Mesnager:
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity. 117 - Shai Halevi, Yael Tauman Kalai:
Smooth Projective Hashing and Two-Message Oblivious Transfer. 118 - Manoj Prabhakaran, Mike Rosulek:
Rerandomizable RCCA Encryption. 119 - Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin:
Breaking 104 bit WEP in less than 60 seconds. 120 - Alexander W. Dent, Benoît Libert, Kenneth G. Paterson:
Certificateless Encryption Schemes Strongly Secure in the Standard Model. 121 - Qiang Tang:
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan. 122 - Berkant Ustaoglu:
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. 123 - Benjamin Gittins, Howard A. Landman:
Rebuttal of overtaking VEST. 124 - Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. 125 - Sujing Zhou, Dongdai Lin:
An Interesting Member ID-based Group Signature. 126 - Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. 127 - Bruno Blanchet:
Computationally Sound Mechanized Proofs of Correspondence Assertions. 128 - Cameron McDonald, Chris Charnes, Josef Pieprzyk:
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem. 129 - Yuan Tian, Zhi-Yu Chen, Yuee Jin, Feng Jin, Huihui Ma:
Some Results on Anonymity in Hybrid Encryption. 130 - Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini:
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions. 131 - Aggelos Kiayias, Hong-Sheng Zhou:
Equivocal Blind Signatures and Adaptive UC-Security. 132 - Helger Lipmaa:
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. 133 - Osman Kocar:
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift. 134 - Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang:
Efficient ID-based Signature Without Trusted PKG. 135 - (Withdrawn) Fair Exchange Signature Schemes. 136
- Jintai Ding, Bo-Yin Yang:
Multivariates Polynomials for Hashing. 137 - Rongquan Feng, Hongfeng Wu:
Efficient Pairing Computation on Curves. 138 - Amir Herzberg, Igal Yoffe:
The Delivery and Evidences Layer. 139 - Aggelos Kiayias, Hong-Sheng Zhou:
Hidden Identity-Based Signatures. 140 - Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. 141 - Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol. 142 - Ben Adida, Douglas Wikström:
Offline/Online Mixing. 143 - Tzuong-Tsieng Moh:
Two New Examples of TTM. 144