- Elena Andreeva, Atul Luykx, Bart Mennink:
Provable Security of BLAKE with Non-Ideal Compression Function. IACR Cryptol. ePrint Arch. 2011: 620 (2011) - Elena Andreeva, Bart Mennink, Bart Preneel:
The Parazoa Family: Generalizing the Sponge Hash Functions. IACR Cryptol. ePrint Arch. 2011: 28 (2011) - Rkia Aouinatou, Mostafa Belkasmi:
Identification Based Encryption with RSA-OAEP. Using SEM and Without. IACR Cryptol. ePrint Arch. 2011: 684 (2011) - Benny Applebaum, Andrej Bogdanov, Alon Rosen:
A Dichotomy for Local Small-Bias Generators. IACR Cryptol. ePrint Arch. 2011: 512 (2011) - Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Nor Azman Abu:
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem. IACR Cryptol. ePrint Arch. 2011: 467 (2011) - Seiko Arita:
A constant-round resettably-sound resettable zero-knowledge argument in the BPK model. IACR Cryptol. ePrint Arch. 2011: 404 (2011) - Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. IACR Cryptol. ePrint Arch. 2011: 309 (2011) - Gilad Asharov, Ran Canetti, Carmit Hazay:
Towards a Game Theoretic View of Secure Computation. IACR Cryptol. ePrint Arch. 2011: 137 (2011) - Gilad Asharov, Abhishek Jain, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. IACR Cryptol. ePrint Arch. 2011: 613 (2011) - Gilad Asharov, Yehuda Lindell:
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2011: 136 (2011) - Gildas Avoine, Xavier Carpent:
Yet Another Ultralightweight Authentication Protocol that is Broken. IACR Cryptol. ePrint Arch. 2011: 691 (2011) - Srinath Baba, Srinivas Kotyad, Raghu Teja:
A non-Abelian factorization problem and an associated cryptosystem. IACR Cryptol. ePrint Arch. 2011: 48 (2011) - Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2011: 281 (2011) - Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:
Security Analysis of LMAP++, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 193 (2011) - Dongxia Bai, Leibo Li:
New Impossible Differential Attacks on Camellia. IACR Cryptol. ePrint Arch. 2011: 661 (2011) - Alex Bain, John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
A Domain-Specific Language for Computing on Encrypted Data. IACR Cryptol. ePrint Arch. 2011: 561 (2011) - Balasingham Balamohan:
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS. IACR Cryptol. ePrint Arch. 2011: 578 (2011) - Abhishek Banerjee, Chris Peikert, Alon Rosen:
Pseudorandom Functions and Lattices. IACR Cryptol. ePrint Arch. 2011: 401 (2011) - Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptol. ePrint Arch. 2011: 88 (2011) - Manuel Barbosa, Pooya Farshim:
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation. IACR Cryptol. ePrint Arch. 2011: 215 (2011) - Alexander Barg, Grigory Kabatiansky:
Robust parent-identifying codes and combinatorial arrays. IACR Cryptol. ePrint Arch. 2011: 227 (2011) - Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki:
Monoidic Codes in Cryptography. IACR Cryptol. ePrint Arch. 2011: 371 (2011) - Ayad F. Barsoum, M. Anwar Hasan:
On Verifying Dynamic Multiple Data Copies over Cloud Servers. IACR Cryptol. ePrint Arch. 2011: 447 (2011) - Gilles Barthe, Boris Köpf:
Information-theoretic Bounds for Differentially Private Mechanisms. IACR Cryptol. ePrint Arch. 2011: 71 (2011) - Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III:
Generalized Learning Problems and Applications to Non-Commutative Cryptography. IACR Cryptol. ePrint Arch. 2011: 357 (2011) - Anja Becker, Jean-Sébastien Coron, Antoine Joux:
Improved Generic Algorithms for Hard Knapsacks. IACR Cryptol. ePrint Arch. 2011: 474 (2011) - Mihir Bellare, David Cash, Sriram Keelveedhi:
Ciphers that Securely Encipher their own Keys. IACR Cryptol. ePrint Arch. 2011: 432 (2011) - Mihir Bellare, David Cash, Rachel Miller:
Cryptography Secure Against Related-Key Attacks and Tampering. IACR Cryptol. ePrint Arch. 2011: 252 (2011) - Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek:
Standard Security Does Not Imply Security Against Selective-Opening. IACR Cryptol. ePrint Arch. 2011: 581 (2011)