Quantum key distribution using Mean King problem with modified measurement schemes. | 0 | 0.34 | 2012 |
HB♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response | 0 | 0.34 | 2012 |
Non-binary quasi-cyclic quantum LDPC codes | 6 | 0.50 | 2011 |
Unconditionally secure electronic voting | 0 | 0.34 | 2010 |
LDPC codes with fixed initialization decoding over binary symmetric channel | 1 | 0.38 | 2010 |
Wolf Fingerprints Against Minutiae Count Matching Systems | 1 | 0.37 | 2010 |
How to strengthen the security of RSA-OAEP | 1 | 0.37 | 2010 |
A note on a fatal error of optimized LFC private information retrieval scheme and its corrected results | 0 | 0.34 | 2010 |
Efficient and adaptively secure append-only signature | 0 | 0.34 | 2009 |
Universally Composable And Statistically Secure Verifiable Secret Sharing Scheme Based On Pre-Distributed Data | 7 | 0.46 | 2009 |
Dual-Policy Attribute Based Encryption | 21 | 0.99 | 2009 |
New security layer for overlay networks. | 0 | 0.34 | 2009 |
Smallest Size Of Circulant Matrix For Regular (3, L) And (4, L) Quasi-Cyclic Ldpc Codes With Girth 6 | 2 | 0.41 | 2009 |
Combining Public Key Encryption With Keyword Search And Public Key Encryption | 8 | 0.43 | 2009 |
Constructing better KEMs with partial message recovery | 1 | 0.38 | 2009 |
Semantic security for the McEliece cryptosystem without random oracles | 47 | 1.63 | 2008 |
The Commitment Capacity of the Gaussian Channel Is Infinite | 11 | 0.67 | 2008 |
Strong Anonymous Signatures | 2 | 0.38 | 2008 |
Error-correcting codes and cryptography | 0 | 0.34 | 2008 |
Formal security treatments for signatures from identity-based encryption | 7 | 0.45 | 2007 |
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation | 5 | 0.50 | 2007 |
A secure threshold anonymous password-authenticated key exchange protocol | 15 | 0.76 | 2007 |
An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths | 12 | 0.77 | 2007 |
A CDH-based strongly unforgeable signature without collision resistant hash function | 4 | 0.40 | 2007 |
Efficient hybrid encryption from ID-based encryption | 21 | 0.78 | 2007 |
Quantum Quasi-Cyclic Ldpc Codes | 40 | 2.24 | 2007 |
Anonymous pay-TV system with secure revenue sharing | 0 | 0.34 | 2007 |
Trade-Off Traitor Tracing | 0 | 0.34 | 2007 |
Decimation-Based Fast Correlation Attack | 0 | 0.34 | 2007 |
Generic combination of public key encryption with keyword search and public key encryption | 27 | 1.21 | 2007 |
On the key-privacy issue of McEliece public-key encryption | 2 | 0.40 | 2007 |
Algebraic cryptanalysis of 58-round SHA-1 | 14 | 0.87 | 2007 |
On The Oblivious Transfer Capacity Of The Erasure Channel | 16 | 0.87 | 2006 |
Unconditionally Secure Anonymous Encryption and Group Authentication | 21 | 0.99 | 2006 |
Unconditionally secure chaffing-and-winnowing: a relationship between encryption and authentication | 3 | 0.40 | 2006 |
An Efficient Group Signature Scheme from Bilinear Maps | 55 | 1.96 | 2006 |
A New Security Architecture For Personal Networks | 1 | 0.38 | 2006 |
Efficient shared-key authentication scheme from any weak pseudorandom function | 0 | 0.34 | 2006 |
A short random fingerprinting code against a small number of pirates | 12 | 1.56 | 2006 |
On achieving chosen ciphertext security with decryption errors | 0 | 0.34 | 2006 |
Lightweight Privacy For Ubiquitous Devices | 0 | 0.34 | 2006 |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security | 1 | 0.35 | 2006 |
A general formulation of algebraic and fast correlation attacks based on dedicated sample decimation | 7 | 0.50 | 2006 |
Generic transforms to acquire CCA-Security for identity based encryption: the cases of FOPKC and REACT | 11 | 0.69 | 2006 |
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge | 0 | 0.34 | 2006 |
An authentication and key exchange protocol for secure credential services | 1 | 0.36 | 2006 |
Bit Commitment over Gaussian Channels | 2 | 0.38 | 2006 |
Forward-Secure and searchable broadcast encryption with short ciphertexts and private keys | 10 | 0.71 | 2006 |
Relation between the XL Algorithm and Gröbner Basis Algorithms | 2 | 0.49 | 2006 |
Improvements on security proofs of some identity based encryption schemes | 3 | 0.39 | 2005 |