|
|
|
Cryptanalysis of the SFLASH Signature Scheme (Extended Abstract) |
|
|
1 | (4) |
|
|
|
|
|
On the Evolution of User Authentication: Non-bilateral Factors |
|
|
5 | (6) |
|
|
Digital Signature Schemes |
|
|
|
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message |
|
|
11 | (14) |
|
|
|
|
Provably Secure Identity-Based Undeniable Signatures with Selective and Unversal Convertibility |
|
|
25 | (15) |
|
|
|
|
|
An Efficient ID-Based Proxy Signature Scheme from Pairings |
|
|
40 | (11) |
|
|
|
|
|
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent |
|
|
51 | (15) |
|
|
|
|
Linear Slide Attacks on the KeeLoq Block Cipher |
|
|
66 | (15) |
|
|
|
|
A Key Predistribution Scheme Based on 3-Designs |
|
|
81 | (12) |
|
|
|
|
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting |
|
|
93 | (15) |
|
|
|
|
A Provably Secure One-Pass Two-Party Key Establishment Protocol |
|
|
108 | (15) |
|
|
|
|
|
|
Zero Knowledge and Secure Computation Protocols |
|
|
|
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption |
|
|
123 | (15) |
|
|
|
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries |
|
|
138 | (15) |
|
|
|
|
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extactor |
|
|
153 | (14) |
|
|
|
|
|
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures |
|
|
167 | (15) |
|
|
|
|
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks |
|
|
182 | (10) |
|
|
|
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images |
|
|
192 | (9) |
|
|
|
|
Stream Cipher and Pseudorandmness |
|
|
|
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks |
|
|
201 | (15) |
|
|
|
|
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity |
|
|
216 | (15) |
|
|
|
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves |
|
|
231 | (15) |
|
|
|
|
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators |
|
|
246 | (10) |
|
|
|
|
|
|
Linear Equation on Polynomial Single Cycle T-Functions |
|
|
256 | (15) |
|
|
|
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables |
|
|
271 | (12) |
|
|
|
|
|
Anonymity and k-Choice Identities |
|
|
283 | (15) |
|
|
|
Deniable Authentication on the Internet (Extended Abstract) |
|
|
298 | (15) |
|
|
Orthogonality between Key Privacy and Data Privacy, Revisited |
|
|
313 | (15) |
|
|
|
|
Unlinkable Randomizable Signature and Its Application in Group Signature |
|
|
328 | (15) |
|
|
|
|
|
An Improved Collision Attack on MD5 Algorithm |
|
|
343 | (15) |
|
|
|
Multivariates Polynomials for Hashing |
|
|
358 | (14) |
|
|
|
|
|
Efficient Public Key Encryption with Keyword Search Schemes from Pairings |
|
|
372 | (12) |
|
|
|
|
Multi-Identity Single-Key Decryption without Random Oracles |
|
|
384 | (15) |
|
|
|
|
|
|
|
Kipnis-Shamir Attack on HFE Revisited |
|
|
399 | (13) |
|
|
|
|
Cryptanalysis of General Lu-Lee Type Systems |
|
|
412 | (15) |
|
|
|
|
|
A Timing-Resistant Elliptic Curve Backdoor in RSA |
|
|
427 | (15) |
|
|
|
|
|
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol |
|
|
442 | (15) |
|
|
|
|
|
|
|
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control |
|
|
457 | (6) |
|
|
|
|
Systems Security and Trusted Computing |
|
|
|
Building Trusted Sub-domain for the Grid with Trusted Computing |
|
|
463 | (9) |
|
|
|
|
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM |
|
|
472 | (10) |
|
|
|
|
|
|
Online Tracing Scanning Worm with Sliding Window |
|
|
482 | (15) |
|
|
|
|
|
A New Proactive Defense Model Based on Intrusion Deception and Traceback |
|
|
497 | (10) |
|
|
|
On Modeling Post Decryption Error Processes in UMTS Air Interface |
|
|
507 | (10) |
|
|
|
A Simple, Smart and Extensible Framework for Network Security Measurement |
|
|
517 | (16) |
|
|
|
Author Index |
|
533 | |