Security Arguments for Digital Signatures and Blind Signatures | 2000/03/21 | English | 716 |
Short Signatures from the Weil Pairing | 2004/07/30 | English | 438 |
Efficient Quantum Key Distribution Scheme
and a Proof of Its Unconditional Security | 2004/03/03 | English | 346 |
Security and Composition of Multiparty Cryptographic Protocols | 2000/01/01 | English | 257 |
Selecting Cryptographic Key Sizes | 2001/08/14 | English | 170 |
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups | 2007/09/11 | English | 169 |
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities | 1997/09/01 | English | 169 |
Compact Proofs of Retrievability | 2012/09/01 | English | 157 |
The Weil Pairing, and Its Efficient Calculation | 2004/08/12 | English | 154 |
TFHE: Fast Fully Homomorphic Encryption Over the Torus | 2019/04/25 | English | 149 |
Privacy Preserving Data Mining | 2002/06/01 | English | 144 |
A Proof of Security of Yao’s Protocol for Two-Party Computation | 2008/12/09 | English | 141 |
A Taxonomy of Pairing-Friendly Elliptic Curves | 2009/06/18 | English | 114 |
On the Importance of Eliminating Errors in Cryptographic Computations | 2000/11/27 | English | 111 |
Improved Ring Oscillator PUF: An FPGA-friendly Secure Primitive | 2010/10/14 | English | 109 |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | 2007/09/14 | English | 109 |
Hierarchical Threshold Secret Sharing | 2007/02/06 | English | 106 |
A One Round Protocol for Tripartite Diffie–Hellman | 2004/06/23 | English | 102 |
Efficient Cache Attacks on AES, and Countermeasures | 2009/07/23 | English | 102 |
Feedback shift registers, 2-adic span, and combiners with memory | 1997/03/01 | English | 101 |
Mutual Information Analysis: a Comprehensive Study | 2010/10/21 | English | 98 |
Cryptographic Hash Functions from Expander Graphs | 2007/09/15 | English | 93 |
On the Contrast in Visual Cryptography Schemes | 1999/09/01 | English | 88 |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems | 2006/05/24 | English | 86 |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm | 2008/07/30 | English | 85 |
Secure Integration of Asymmetric and Symmetric Encryption Schemes | 2011/12/02 | English | 85 |
FlipIt: The Game of “Stealthy Takeover” | 2012/10/26 | English | 73 |
The Discrete Logarithm Problem on Elliptic Curves of Trace One | 1999/06/01 | English | 73 |
A Proof of the Security of Quantum Key Distribution | 2006/04/24 | English | 71 |
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme | 2003/06/01 | English | 71 |