Technical Reports
2013 Technical Reports

F. Huo and G. Gong
A New Efficient Physical Layer OFDM Encryption Scheme
pdf
CACR 201301

Z. Wang, G. Gong and N. Yu
New Polyphase Sequence Families with Low Correlation Derived
from the Weil Bound of Exponential Sums
pdf
CACR 201302

T. Wu and G. Gong
The Weakness of Integrity Protection for LTE
pdf
CACR 201303

Z. Wang and G. Gong
Correlation of Binary Sequence Families Derived from
Multiplicative Character of Finite Fields
pdf
CACR 201304

C. Devet
Evaluating Private Information Retrieval on the Cloud
pdf
CACR 201305

X. Fan and G. Gong
Specification of the Stream Cipher WG16 Based Confidentiality and
Integrity Algorithms
pdf
CACR 201306

A. Sanchez and F. RodriguezHenriquez
NEON Implementation of an AttributeBased Encryption Scheme
pdf
CACR 201307

R. Henry and I. Goldberg
Batch Proofs of Partial Knowledge
pdf
CACR 201308

M. AlSabah and I. Goldberg
PCTCP: PerCircuit TCPoverIPSec Transport for Anonymous Communication
Overlay Networks
pdf
CACR 201309

T. Wang and I. Goldberg
Improved Website Fingerprinting on Tor
pdf
CACR 201310

Y. Huang and I. Goldberg
Outsourced Private Information Retrieval with Pricing and Access Control
pdf
CACR 201311

M. Cenk and M. Anwar Hasan
Efficient Multiplication in Characteristic Three Fields
pdf
CACR 201312

P. Tysowski and M. Anwar Hasan
Hybrid AttributeBased Encryption and ReEncryption for Scalable
Mobile Applications in Clouds
pdf
CACR 201313

T. Oliveira, J. Lopez, D. Aranha and F. RodriguezHenriquez
Two is the Fastest Prime
pdf
CACR 201314

K. Mandal, G. Gong, X. Fan and M. Aagaard
Optimal Parameters for the WG Stream Cipher Family
pdf
CACR 201315

M. AlSabah, K. Bauer, T. Elahi and I. Goldberg
The Path Less Travelled: Overcoming Tor's Bottlenecks with
Traffic Splitting
pdf
CACR 201316

N. Koblitz and A. Menezes
Another Look at Security Theorems for 1Key Nested MACs
pdf
CACR 201317

G. Weng, Y. Tan and G. Gong
On Quadratic Almost Perfect Nonlinear Functions and Their Related
Algebraic Object
pdf
CACR 201318

G. Gong, Y. Tan and B. Zhu
Enhanced Criteria on Differential Uniformity and Nonlinearity of
Cryptographically Significant Functions
pdf
CACR 201319

B. Liu and U. Hengartner
Privacypreserving Social Recommendations in Geosocial Networks
pdf
CACR 201320

H. Hu. S. Shao, G. Gong and T. Helleseth
The Proof of Lin's Conjecture via the DecimationHadamard Transform
pdf
CACR 201321

G. Adj, A. Menezes, T. Oliveira and F. RodriguezHenriquez
Weakness of $F_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography
pdf
CACR 201322

X. Fan, N. Zidaric, M. Aagaard and G. Gong
Efficient Hardware Implementation of the Stream Cipher WG16 with
Composite Field Arithmetic
pdf
CACR 201323

B. Zhu, X. Fan and G. Gong
Loxin  A Universal Solution to PasswordFree Login
pdf
CACR 201324

R. Azarderakhsh and K. Karabina
A Comparison of Double Point Multiplication Algorithms and their
Implementation over Binary Elliptic Curves
pdf
CACR 201325

R. Henry and I. Goldberg
Thinking Inside the BLAC Box: Smarter Protocols for Faster Anonymous
Blacklisting
pdf
CACR 201326

M. Shantz and E. Teske
Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev
Polynomials, Weil Descent and Gröbner Bases Methods  an
Experimental Study
pdf
CACR 201327

G. Adj, A. Menezes, T. Oliveira and F. RodriguezHenriquez
Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete
Logarithm Cryptography
pdf
CACR 201328

J. Hoffsetin, J. Pipher, J. Schanck, J. Silverman and W. Whyte
Practical Signatures from the Partial Fourier Recovery Problem
pdf
CACR 201329

T. Wang and I. Goldberg
Comparing Website Fingerprinting Attacks and Defenses
pdf
CACR 201330
