: Families of genus 2 curves with small embedding degree.
, Zhenfu Cao
: Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem.
: Privacy-Protecting Coupon System Revisited.
: Efficient Dynamic k-Times Anonymous Authentication.
: Invertible Universal Hashing and the TET Encryption Mode.
: From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme.
: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman.
: Reflection Attacks on Product Ciphers.
: Special block cipher family DN and new generation SNMAC-type hash function family HDN.
: Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition.
: Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians.
: The simplest method for constructing APN polynomials EA-inequivalent to power functions.
, Michael Scott
: Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3.
: Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected).
, Sven Laur
: Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version).
, Howard M. Heys
: A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard.
: A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants.
, Jianhua Li
: Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy.
, Dominik Raub
: Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.
: Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants.
, Álvar Ibeas
: Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits.
, Zhenfu Cao
: Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.
: Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic.
: A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA.
Woo Sug Kang
: Construction of Pairing-Friendly Elliptic Curves.
: Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field.
: Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity.
: On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan.
: Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS.
: Computationally Sound Mechanized Proofs of Correspondence Assertions.
: New Communication-Efficient Oblivious Transfer Protocols Based on Pairings.
: Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift.
: Two New Examples of TTM.
: CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited.
: A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher.
: Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing.
: Yet Another MicroArchitectural Attack: Exploiting I-cache.
: Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
, Wen-Guey Tzeng
: Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2).
Kwang Ho Kim
, So In Kim
: A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields.
: Fully Anonymous Group Signatures without Random Oracles.
: Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption.
: Optimal Irreducible Polynomials for GF(2^m) Arithmetic.
, Jiangtao Li
: Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities.
: A Framework for Game-Based Security Proofs.
: The constructing of 3-resilient Boolean functions of 9 variables with nonlinearity 240.
Jesper Buus Nielsen
: Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free.
, Yuqing Zhang
: A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography.
: Long-lived digital integrity using short-lived hash functions.
: Attribute Based Group Signature with Revocation.
Warren D. Smith
: 1. AES seems weak. 2. Linear time secure cryptography.
, Qiaoyan Wen
: Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings.
: Efficient Identity Based Signature in Standard Model.
: UICE: A High-Performance Cryptographic Module for SoC and RFID Applications.
: Which Languages Have 4-Round Zero-Knowledge Proofs?
Jeroen van de Graaf
: Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan.
, Sarah Shoup
: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles.
: On solving sparse algebraic equations over finite fields II.
, Subhamoy Maitra
: Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables.
: A Note on Automata-based Dynamic Convolutional Cryptosystems.
: A Forward Secure Remote User Authentication Scheme.
, Melek Diker Yücel
: Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242.
: Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound.
Kwang Ho Kim
: A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields.
, Kris Tiri
: On the complexity of side-channel attacks on AES-256 - methodology and quantitative results on cache attacks.
: On the Big Gap Between |p| and |q| in DSA.
: Faster and Shorter Password-Authenticated Key Exchange.
: Remote Power Analysis of RFID Tags.
: Updated standards for validating elliptic curves.
: Analysis of Underlying Assumptions in NIST DRBGs.
: Secure multi-party computation on incomplete networks.