Stop the war!
Остановите войну!
for scientists:
default search action
IACR Cryptology ePrint Archive, Volume 2005
Volume 2005, 2005
- Hoeteck Wee:
On Obfuscating Point Functions. 1 - Jason E. Holt, Kent E. Seamons:
Logcrypt: Forward Security and Public Verification for Secure Audit Logs. 2 - Vlastimil Klíma:
Cryptanalysis of Hiji-bij-bij (HBB). 3 - Jacques Patarin, Audrey Montreuil:
Benes and Butterfly schemes revisited. 4 - Shai Halevi:
A sufficient condition for key-privacy. 5 - Pradeep Kumar Mishra, Kishan Chand Gupta:
A Metric on the Set of Elliptic Curves over Fp. 6 - Hongjun Wu:
The Misuse of RC4 in Microsoft Word and Excel. 7 - Jiang Wu, Ruizhong Wei:
Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004. 8 - Bernd Schomburg:
Mixing properties of triangular feedback shift registers. 9 - Vincent Rijmen, Elisabeth Oswald:
Update on SHA-1. 10 - Yuanchao Zhao, Daoben Li:
An Improved Elegant Method to Re-initialize Hash Chains. 11 - Zhaohui Cheng, Richard Comley:
Efficient Certificateless Public Key Encryption. 12 - Hung-Yu Chien:
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols. 13 - Ludovic Perret:
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words. 14 - Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. 15 - Magnus Daum:
Narrow T-functions. 16 - Roberto Maria Avanzi:
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives. 17 - Dan Boneh, Craig Gentry, Brent Waters:
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. 18 - Jesús F. Almansa:
The Full Abstraction of the UC Framework. 19 - Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
(De)Compositions of Cryptographic Schemes and their Applications to Protocols. 20 - Eabhnat Ní Fhloinn, Michael Purser:
Partial Hiding in Public-Key Cryptography. 21 - ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Wei-Chih Lien, Sung-Hyun Kim:
An Improved and Efficient Countermeasure against Power Analysis Attacks. 22 - Masao Kasahara:
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness. 23 - A. A. Kalele, Virendra R. Sule:
Weak keys of the Diffe Hellman key exchange I. 24 - Qingshu Meng, Min Yang, Huanguo Zhang, Yuzhen Liu:
Analysis of Affinely Equivalent Boolean Functions. 25 - Jovan Dj. Golic:
Techniques for random maskin in hardware. 26 - Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. 27 - Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. 28 - Boaz Barak, Shai Halevi:
A model and architecture for pseudo-random generation with applications to /dev/random. 29 - A. A. Kalele, Virendra R. Sule:
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves. 30 - Iwan M. Duursma, Negar Kiyavash:
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves. 31 - Dennis Hofheinz, Dominique Unruh:
On the Notion of Statistical Security in Simulatability Definitions. 32 - Serge Mister, Robert J. Zuccherato:
An Attack on CFB Mode Encryption As Used By OpenPGP. 33 - Gene Tsudik, Shouhuai Xu:
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication). 34 - Benoît Chevallier-Mames:
An Efficient CDH-based Signature Scheme With a Tight Security Reduction. 35 - Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran:
Concurrent Composition of Secure Protocols in the Timing Model. 36 - Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. 37 - (Withdrawn) Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants. 38
- Joan Daemen, Gilles Van Assche:
Distinguishing Stream Ciphers with Convolutional Filters. 39 - Juan M. Estévez-Tapiador, Almudena Alcaide:
Unfairness of a protocol for certified delivery. 40 - Lihua Liu, Zhengjun Cao:
On the Security of a Group Signature Scheme with Strong Separability. 41 - O. A. Logachev, A. A. Salnikov, V. V. Yashchenko:
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications. 42 - Hsiao-Ying Lin, Wen-Guey Tzeng:
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption. 43 - Sergey Agievich:
On the affine classification of cubic bent functions. 44 - Nick Howgrave-Graham, Joseph H. Silverman, William Whyte:
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. 45 - Mario Di Raimondo, Rosario Gennaro:
New Approaches for Deniable Authentication. 46 - Qiang Tang, Chris J. Mitchell:
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme. 47 - Qiang Tang, Chris J. Mitchell:
Cryptanalysis of two identification schemes based on an ID-based cryptosystem. 48 - Gildas Avoine:
Adversarial Model for Radio Frequency Identification. 49 - Poorvi L. Vora:
David Chaum's Voter Verification using Encrypted Paper Receipts. 50 - Zhengjun Cao:
A Note on Shor's Quantum Algorithm for Prime Factorization. 51 - Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. 52 - Hung-Min Sun, Mu-En Wu:
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. 53 - (Withdrawn) Comment on cryptanalysis of Tseng et al.¡¦s authenticated encryption schemes. 54
- Zhengjun Cao:
Untraceability of Two Group Signature Schemes. 55 - Daniel R. L. Brown:
Deniable Authentication with RSA and Multicasting. 56 - Victor K. Wei:
Tight Reductions among Strong Di e-Hellman Assumptions. 57 - Kamel Bentahar, Pooya Farshim, John Malone-Lee, Nigel P. Smart:
Generic Constructions of Identity-Based and Certificateless KEMs. 58 - László Csirmaz:
Secret sharing schemes on graphs. 59 - Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. 60 - Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval:
Key Derivation and Randomness Extraction. 61 - (Withdrawn) Cryptanalysis of One Fair E-cash System. 62
- (Withdrawn) On the Key Schedule of Blowfish. 63
- Anish Mathuria, Vipul Jain:
On Efficient Key Agreement Protocols. 64 - Tim Kerins, William P. Marnane, Emanuel M. Popovici, Paulo S. L. M. Barreto:
Efficient hardware for the Tate pairing calculation in characteristic three. 65 - Eike Kiltz:
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. 66 - Arjen K. Lenstra, Xiaoyun Wang, Benne de Weger:
Colliding X.509 Certificates. 67 - Zhaneta Tasheva, Borislav Bedzhev, Borislav Stoyanov:
N-adic Summation-Shrinking Generator. Basic properties and empirical evidences. 68 - Vassil S. Dimitrov, Laurent Imbert, P. K. Mishra:
Fast Elliptic Curve Point Multiplication using Double-Base Chains. 69 - Jean-Camille Birget, Spyros S. Magliveras, Michal Sramka:
On public-key cryptosystems based on combinatorial group theory. 70 - (Withdrawn) A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields. 71
- Johannes Buchmann, Christoph Ludwig:
Practical Lattice Basis Sampling Reduction. 72 - Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo:
Broadcast Encryption π. 73 - Mathieu Baudet, Véronique Cortier, Steve Kremer:
Computationally sound implementations of equational theories against passive adversaries. 74 - Vlastimil Klíma:
Finding MD5 Collisions - a Toy For a Notebook. 75 - Neal Koblitz, Alfred Menezes:
Pairing-Based Cryptography at High Security Levels. 76 - Christopher Wolf, Bart Preneel:
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations. 77 - Wieland Fischer, Jean-Pierre Seifert:
Duality between Multiplication and Modular Reduction. 78 - Marius-Calin Silaghi:
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism. 79 - R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, N. Srinivasan:
A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification. 80 - (Withdrawn) Smashing SMASH. 81
- Lars R. Knudsen:
Some properties of an FSE 2005 Hash Proposal. 82 - Kristian Gjøsteen:
Security notions for disk encryption. 83 - Goce Jakimoski, Yvo Desmedt:
On Resistance of DES to Related-Key Differential Cryptanalysis. 84 - (Withdrawn) A new structural attack for GPT and variants. 85
- Henry Ng:
Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia). 86 - Rostovtsev A. G., Shemyakina O. V.:
AES side channel attack protection using random isomorphisms. 87 - Joan Daemen, Vincent Rijmen:
The Pelican MAC Function. 88 - Hans Dobbertin, Gregor Leander:
Cryptographer's Toolkit for Construction of 8-Bit Bent Functions. 89 - Jin Hong, Palash Sarkar:
Rediscovery of Time Memory Tradeoffs. 90 - Markus Jakobsson, Adam L. Young:
Distributed Phishing Attacks. 91 - Charanjit S. Jutla:
PRF Domain Extension Using DAGs. 92 - Guohong Xie:
An ID-Based Key Agreement Scheme from pairing. 93 - M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena:
A Survey on ID-Based Cryptographic Primitives. 94 - Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. 95 - David Jedlicka:
Almost Perfect Nonlinear Monomials over GF(2n) for Infinitely Many n. 96 - Yassine Lakhnech, Laurent Mazaré:
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation. 97 - Yassine Lakhnech, Laurent Mazaré:
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme. 98 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes. 99 - Qingshu Meng, Huanguo Zhang, Jingsong Cui, Min Yang:
almost enumeration of 8-variable bent functions. 100 - Gergei Bana:
Soundness and Completeness of Formal Logics of Symmetric Encryption. 101 - Vlastimil Klíma:
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications. 102 - Fangguo Zhang, Xiaofeng Chen:
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. 103 - Nick Howgrave-Graham, Jeffrey Hoffstein, Jill Pipher, William Whyte:
On estimating the lattice security of NTRU. 104 - Chris Peikert:
On Error Correction in the Exponent. 105 - Boaz Barak, Amit Sahai:
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation. 106 - Ophir Levy, Avishai Wool:
A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher. 107 - Yongge Wang:
Efficient Identity-Based and Authenticated Key Agreement Protocol. 108 - Sahadeo Padhye:
A Public Key Cryptosystem Based on Singular Cubic Curve. 109 - Ayan Mahalanobis:
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups. 110 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:
Weak Composite Diffie-Hellman is not Weaker than Factoring. 111 - Bo Gyeong Kang, Je Hong Park:
On the relationship between squared pairings and plain pairings. 112 - Majid Khabbazian, T. Aaron Gulliver, Vijay K. Bhargava:
Partially Fixed Point Multiplication. 113 - Gene Itkis, Robert McNerney, Scott Russell:
Intrusion-Resilient Secure Channels. 114 - Marco Macchetti:
Characteristics of Key-Dependent S-Boxes: the Case of Twofish. 115 - Nigel P. Smart, Frederik Vercauteren:
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems. 116 - David Galindo:
Boneh-Franklin Identity Based Encryption Revisited. 117 - Deepak Kumar Dalai, Subhamoy Maitra:
Results on Rotation Symmetric Bent Functions. 118 - Claus Diem:
Index Calculus in Class Groups of Plane Curves of Small Degree. 119 - Malapati Raja Sekhar, Takeshi Okamoto, Eiji Okamoto:
On Designatedly Verified (Non-interactive) Watermarking Schemes. 120 - Julie Thorpe, Paul C. van Oorschot, Anil Somayaji:
Pass-thoughts: Authenticating With Our Minds. 121 - Xinyi Huang, Willy Susilo, Yi Mu:
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004. 122 - Lan Nguyen:
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation. 123 - Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan:
Append-Only Signatures. 124 - Nicolas Thériault:
SPA Resistant Left-to-Right Integer Recodings. 125 - Shahram Khazaei, Mahmoud Salmasizadeh, Javad Mohajeri:
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator. 126 - Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols. 127 - (Withdrawn) Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials. 128
- Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu:
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. 129 - (Withdrawn) Results on Rotation Symmetric Boolean Functions on Even Number Variable. 130
- Ratna Dutta, Rana Barua:
Dynamic Group Key Agreement in Tree-Based Setting. 131 - Jiejun Kong:
Formal Notions of Anonymity for Peer-to-peer Networks. 132 - Paulo S. L. M. Barreto, Michael Naehrig:
Pairing-Friendly Elliptic Curves of Prime Order. 133 - Mahalingam Ramkumar:
Broadcast Authentication With Hashed Random Preloaded Subsets. 134 - Jacques Patarin, Paul Camion:
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model. 135 - Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo:
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. 136 - Douglas Wikström:
A Sender Verifiable Mix-Net and a New Proof of a Shuffle. 137 - Mahalingam Ramkumar:
I-HARPS: An Efficient Key Pre-distribution Scheme. 138 - Michael Scott:
Scaling security in pairing-based protocols. 139