Professional Documents
Culture Documents
Textbook Information Security and Cryptology 12Th International Conference Inscrypt 2016 Beijing China November 4 6 2016 Revised Selected Papers 1St Edition Kefei Chen Ebook All Chapter PDF
Textbook Information Security and Cryptology 12Th International Conference Inscrypt 2016 Beijing China November 4 6 2016 Revised Selected Papers 1St Edition Kefei Chen Ebook All Chapter PDF
https://textbookfull.com/product/information-security-and-
cryptology-13th-international-conference-inscrypt-2017-xian-
china-november-3-5-2017-revised-selected-papers-1st-edition-
xiaofeng-chen/
https://textbookfull.com/product/information-security-and-
cryptology-10th-international-conference-inscrypt-2014-beijing-
china-december-13-15-2014-revised-selected-papers-1st-edition-
dongdai-lin/
https://textbookfull.com/product/information-security-practice-
and-experience-12th-international-conference-
ispec-2016-zhangjiajie-china-november-16-18-2016-proceedings-1st-
Radio Frequency Identification and IoT Security 12th
International Workshop RFIDSec 2016 Hong Kong China
November 30 December 2 2016 Revised Selected Papers 1st
Edition Gerhard P. Hancke
https://textbookfull.com/product/radio-frequency-identification-
and-iot-security-12th-international-workshop-rfidsec-2016-hong-
kong-china-november-30-december-2-2016-revised-selected-
papers-1st-edition-gerhard-p-hancke/
https://textbookfull.com/product/machine-translation-12th-china-
workshop-cwmt-2016-urumqi-china-august-25-26-2016-revised-
selected-papers-1st-edition-muyun-yang/
https://textbookfull.com/product/information-security-and-
cryptology-icisc-2013-16th-international-conference-seoul-korea-
november-27-29-2013-revised-selected-papers-1st-edition-hyang-
sook-lee/
Information Security
and Cryptology
12th International Conference, Inscrypt 2016
Beijing, China, November 4–6, 2016
Revised Selected Papers
123
Lecture Notes in Computer Science 10143
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7410
Kefei Chen Dongdai Lin
•
Information Security
and Cryptology
12th International Conference, Inscrypt 2016
Beijing, China, November 4–6, 2016
Revised Selected Papers
123
Editors
Kefei Chen Moti Yung
School of Science Snapchat Inc.
Hangzhou Normal University Columbia University
Hangzhou New York, NY
China USA
Dongdai Lin
Institute of Information Engineering
SKLOIS
Beijing
China
This volume contains the papers presented at Inscrypt 2016: the 12th China Interna-
tional Conference on Information Security and Cryptology held during November 4–6,
2016, in Beijing, China. Inscrypt is a well-recognized annual international forum for
security researchers and cryptographers to exchange ideas and present their work, and
is held every year in China.
The conference received 93 submissions. Each submission was reviewed by two to
four Program Committee members. The Program Committee, after some deliberation,
decided to accept 32 papers. The overall acceptance rate is, therefore, about 34.4%.
Inscrypt 2016 was held in cooperation with the International Association of Cryp-
tologic Research (IACR), and was co-organized by the State Key Laboratory of
Information Security (SKLOIS) of the Chinese Academy of Sciences (CAS) and the
Chinese Association for Cryptologic Research (CACR). The conference could not have
been a success without the support of these organizations, and we sincerely thank them
for their continued assistance and help.
We would also like to thank the authors who submitted their papers to Inscrypt
2016, and the conference attendees for their interest and support. We thank the
Organizing Committee for their time and effort dedicated to arranging the conference.
This allowed us to focus on selecting papers and dealing with the scientific program.
We thank the Program Committee members and the external reviewers for their hard
work in reviewing the submissions; the conference would not have been possible
without their expert reviews. Finally, we thank the EasyChair system and its operators,
for making the entire process of managing the conference convenient.
in cooperation with
General Chair
Dongdai Lin Institute of Information Engineering, CAS, China
Steering Committee
Feng Bao Huawei International, Singapore
Kefei Chen Hangzhou Normal University, China
Dawu Gu Shanghai Jiao Tong University, China
Xinyi Huang Fujian Normal University, China
Hui Li Xidian University, China
Dongdai Lin Chinese Academy of Sciences, China
Peng Liu Pennsylvania State University, USA
Wen-feng Qi National Digital Switching System Engineering
and Technological Research Center, China
Meiqin Wang Shandong University, China
Xiaofeng Wang Indiana University at Bloomington, USA
Xiaoyun Wang Tsinghua University, China
Jian Weng Jinan University, China
Moti Yung Snapchat Inc. and Columbia University, USA
Fangguo Zhang Sun Yat-Sen University, China
Huanguo Zhang Wuhan University, China
VIII Inscrypt 2016
External Reviewers
Yonzheng Wu Zhen Ma
Yuexin Zhang Zheng Guo
Yupeng Jiang Zhenyu Huang
Zehong Chen Zhenzhen Bao
Zengpeng Li Zhiyuan Guo
Zeqing Guo
Contents
Symmetric Ciphers
Public-Key Cryptosystems
Achieving IND-CCA Security for Functional Encryption for Inner Products . . . 119
Shiwei Zhang, Yi Mu, and Guomin Yang
Homomorphic Encryption
Leakage-Resilient
Post-quantum Cryptography
Elliptic Curves
1 Introduction
With the widespread appliance of sensor nodes, RFID tags and other low
resource devices, lightweight block cipher has been designed to satisfy the new
ubiquitous but constraint cryptography environment. A number of lightweight
block ciphers have been proposed in recent years, like PRESENT [1], KATAN &
KTANTAN [2], LBlock [3], SIMON, SPECK [4] etc.
SKINNY [5] is a family of lightweight tweakable block ciphers, whose goal
is to compete with NSA’s recent design SIMON in terms of hardware/software
performances, while providing in addition much stronger security guarantees
with regards to differential/linear attacks. The designers gave a basic security
evaluation of SKINNY against traditional block cipher cryptanalysis, includ-
ing differential cryptanalysis, linear cryptanalysis, meet-in-the-middle (MITM)
attack and so on. In the part of MITM attack, the designers claim that they do
not think improving brute force attack by a small factor will turn into serious
vulnerability in future. However, for SKINNY64/64 with a short key size of 64
bits, it will be not secure enough as a result of the enhanced computing. There-
fore, optimized brute force attack will surely has a non-ignorable impact on the
security of full round SKINNY64/64.
MITM attack, which is introduced by Diffie and Hellman in 1977 [6], is a
typical method in the cryptanalysis of block cipher. MITM attack has been
c Springer International Publishing AG 2017
K. Chen et al. (Eds.): Inscrypt 2016, LNCS 10143, pp. 3–17, 2017.
DOI: 10.1007/978-3-319-54705-3 1
4 Y. Zheng and W. Wu
2 Description of SKINNY
We introduce the notations and give a brief description of SKINNY.
2.1 Notations
K: master key of block cipher
tk: the initial tweakey
tk[i]: the i -th cell of tk
Xr : 64-bit input of the r -th round function
Xri,j : the i -th and j -th cell of Xr .
where each cell is a nibble (in the n = 64 case) or a byte (in the n = 128 case).
We denote ISi,j the cell of the internal state located at Row i and Column j,
and s the size of a cell.
SKINNY follows the TWEAKEY framework form [8] and thus takes a
tweakey input instead of a key or a pair key/tweak. For block size n, there
are versions with tweakey size t = n, t = 2n and t = 3n, and the numbers of
rounds are 32,36,40 for n = 64, and 40,48,56 for n = 128. z = t/n is the tweakey
size to block size ratio, and the initialization of the tweakey state is performed
by simply setting for 0 ≤ i ≤ 15 : T K1[i] = tk[i] when z = 1, T K1[i] = tk[i] and
T K2[i] = tk[16 + i] when z = 2, and T K1[i] = tk[i], T K2[i] = tk[16 + i] and
T K3[i] = tk[32 + i] when z = 3. tk = tk[0]||tk[1]|| · · · ||tk[16z − 1] is the tweakey
input and tk[i] is an s-bit cell.
The round encryption of SKINNY is depicted in Fig. 1.
Subcells. An s-bit S-box is applied to every cell of the cipher internal state.
AddConstants. Round constants are combined with the state.
AddRoundTweakey. For i = {0, 1}, j = {0, 1, 2, 3}:
ISi,j = ISi,j ⊕ T K1i,j when z = 1,
ISi,j = ISi,j ⊕ T K1i,j ⊕ T K2i,j when z = 2,
ISi,j = ISi,j ⊕ T K1i,j ⊕ T K2i,j ⊕ T K3i,j when z = 3.
Then the tweakey arrays are updated as Fig. 2.
1010
If for all i, j ∈ {0, · · · , 2d − 1}, Sj = fK[i,j] (Pi ), the 3-tuple [{Pi }, {Sj },
{K[i, j]}] is called a balanced d × d –dimensional biclique (Fig. 3).
If f is a subcipher that connects 2d plaintexts to 2d states with 2d+d
keys (d = d ), we define the corresponding structure an unbalanced d × d -
dimensional biclique. Take the d × 2d -dimensional biclique we use later for
example: f is a subcipher that connects 2d plaintexts {Pi } to 22d states {Sj1 ,j2 }
with keys {K[i, j1 , j2 ]}. If Sj1 ,j2 = fK[i,j1 ,j2 ] (Pi ) for all i, j1 , j2 ∈ {0, · · · , 2d − 1},
3-tuple [{Pi }, {Sj1 ,j2 }, {K[i, j1 , j2 ]}] is called an unbalanced biclique.
Besides dimension, the length, defined as the number of rounds f covers, is
the other important parameter of a biclique.
Biclique Attack of Block Cipher SKINNY 7
We define the key groups with respect to the master key and enumerate the
groups by 256 base keys. We divide the key space into 256 groups of 28 keys
each. The base keys of these groups are all possible 64-bit values with the {2}-th
and {10}-th cell fixed to 0 and the remaining 56 bits running over all values. For
each key group, the following steps are applied.
We denote the 28 keys in one group by tk[i, j](i, j ∈ {0, 1}4 ) and the different
values are distinguished as: tk[i, j]{2} = i, tk[i, j]{10} = j.
For a fixed i, the keys tk[i, j](j ∈ {0, 1}4 ) share common 60 bits and are
only different in the {10}-th cell. Similarly, the keys tk[i, j](i ∈ {0, 1}4 ) are only
different in the {2}-th cell. In the sequel, the difference will be called active. As
Table 2 shows, round subkeys computed during the key schedule share common
values in parts noted 0, and subkeys noted with 1 are influenced active.
Then we construct a biclique covering 28 keys.
Step 3. Decrypt S0 under different keys tk[i, 0](0 < i < 24 ) and let Pi be the cor-
responding plaintexts (Fig. 5, Right). This process shares common starting with
the inverse basic computation. Similarly, keys {tk[i, 0](0 < i < 24 )} are only dif-
ferent in the {2}-th cell and the influence of the keys difference is marked with red
color.
10 Y. Zheng and W. Wu
tk[0,j] tk[i,0]
Now, we have two differential trails P0 −−−−→ Sj (j ∈ {0, 1}4 ) and Pi −−−−→
S0 (i ∈ {0, 1}4 ). Owing to the low diffusion of the key schedule and encryption
algorithm, these two differential trails share no active S-boxes as demonstrated
in Fig. 5.
tk[i,j]
We obtain a 4 × 4 -dimensional biclique for each key group: Pi −−−−→
Sj (i, j ∈ {0, 1}4 ).
Fig. 6. Process of partial matching over 26 rounds (balanced biclique) (Color figure
online).
We test 28 keys under 8-bit matching, so the number of remaining key candidates
should be 256 . Exhaustively test the remaining key candidates in each key group
until the correct key is found.
4.5 Complexity
Now we evaluate the complexity of the whole attack. The construction of biclique
and the process of matching are applied to 256 key groups successively and each
key group only includes 28 keys. So the memory complexity will not exceed 28
full-round SKINNY64/64 states.
Data Complexity. We fix P0 = 0(64) for every biclique and all the plaintexts are
same in X00,1,11,14 , so the data complexity will not exceed 248 chosen plaintexts.
Time Complexity. The basic computation costs 16 S-boxes for each round, 96
S-boxes in total. Computing Pi (0 < i < 24 ), 29 S-boxes need to be computed 24
times. Similarly, computing Sj (0 < j < 24 ) involves 25 S-boxes 24 times. As a
result, a biclique is constructed with complexity of 960 S-boxes.
In the matching part, we compute the 8-bit matching variable from two
directions. It needs 24 × (55 + 24 × 129) S-boxes in the forward direction and
24 × (55 + 24 × 101) S-boxes in the backward direction. In total, it costs 60640
S-boxes per biclique.
The whole computational complexity is:
960 + 60640
T C = 256 ( ) + 256 ≈ 262.92
512
We exhaustively searched each key group, so the success probability is 1.
In this section, we show the process of key recovery attack with unbalanced
4 × 8-dimensional bicliques on full round SKINNY64/64 in detail. This process
follows the basic strategy in Sect. 4 but differs in the way of S-boxes counting.
We choose cell tk[6] and tk[8, 11] as original positions of key difference.
We divide the key space into 252 groups of 212 keys each. The base keys of these
groups are all possible 64-bit values with the {6}-th, {8}-th and {10}-th cell
fixed to 0, and the remaining 52 bits running over all values.
There are 212 keys in one group and they share common 52 bits except {6}-
th, {8}-th and {10}-th cells. We denote them by tk[i, j1 , j2 ](i, j1 , j2 ∈ {0, 1}4 )
Biclique Attack of Block Cipher SKINNY 13
and the different values are distinguished as: tk[i, j1 , j2 ]{6} = i, tk[i, j1 , j2 ]{8} =
j1 , tk[i, j1 , j2 ]{11} = j2 .
Round subkeys share common values and are influenced active during key
schedule should be computed. Due to the similarity with Table 2 and limitation
in paper space, we will not list it here.
These two differential trails share no active S-boxes during first 6 rounds as
tk[i,j1 ,j2 ]
demonstrated in Fig. 7. It is obvious that Pi −−−−−−→ Sj1 ,j2 (i, j1 , j2 ∈ {0, 1}4 ).
Fig. 8. Process of partial matching over 26 rounds (unbalanced biclique) (Color figure
online).
Biclique Attack of Block Cipher SKINNY 15
represent active parts. Altogether, for a single Sj1 ,j2 , the matching values can
be obtained after computing 129 S-boxes 24 times and 55 S-boxes once.
Backward computation. Now we evaluate the amount of S-boxes in backward
direction. First of all, ask for the encryptions of plaintexts Pi (i ∈ {0, 1}4 ) and
get 24 ciphertexts Ci . Decrypt ciphertexts Ci with the keys tk[i, j1 , j2 ](j1 , j2 ∈
0,10
{0, 1}4 ) to X19 . Taking a fixed Ci for example, the process of backward match-
ing can be described as right part of Fig. 8. There is no difference between the
S-boxes marked by blue color and we can skip the computation of the states with-
out color. The green parts are influenced by the difference between tk[i, j1 , 0] and
tk[i, 0, 0] only, so need to be computed 24 times. The red parts are influenced
by the difference between tk[i, 0, j2 ] and tk[i, 0, 0] only, so need to be computed
24 times. The yellow parts are influenced by both the above two differences, so
need to be computed 28 times. Altogether, for a single Ci , the matching values
can be obtained after computing 89 S-boxes 28 times, 28 S-boxes 24 times and
39 S-boxes once.
5.5 Complexity
The construction of biclique and the process of matching are applied to 252 key
groups exhaustively and each key group only includes 212 keys. So the memory
complexity will not exceed 212 full-round SKINNY64/64 states.
Data Complexity. We fix P0 = 0(64) for every biclique and all the plaintexts share
the same values in X03,9,13 , so the data complexity will not exceed 252 chosen
plaintexts.
Time Complexity. As before, in order to get Pi (0 < i < 24 ), we need to compute
27 S-boxes 24 times. Similarly, computing Sj1 ,j2 (0 < j1 , j2 < 24 ) involves 17
S-boxes 24 times and 18 S-boxes 28 times. Thus, a biclique is constructed with
complexity of 96 + 432 + 4880 = 5408 S-boxes.
In the matching part, it spends 28 × (55 + 24 × 129) = 542464 S-boxes
in forward direction and 24 × (39 + 24 × 28 + 28 × 89) = 372336 S-boxes in
backward direction.
The whole computational complexity is:
5408 + 542464 + 372336
T C = 252 ( ) + 256 ≈ 262.82
512
If we choose tk[i, j1 , j2 ]{1} = i, tk[i, j1 , j2 ]{12} = j1 , tk[i, j1 , j2 ]{15} = j2 , the
data complexity will be 248 , and the time complexity will be 262.86 , which is still
better than 262.92 as in balanced biclique attack.
16 Y. Zheng and W. Wu
6 Other Results
Due to the simple tweakey schedule, the biclique with dimension d × d when
z = 1 can be easily extended to biclique with dimension 2d × 2d when z = 2,
and to biclique with dimension 3d × 3d when z = 3. The key recovery attack
will be similar with the attack of SKINNY64/64. Here, we give our parameters
and results in Table 3.
7 Conclusion
Our results are summarized in Table 3. Moreover, we find that the number of
encryption round of SKINNY64/64 needs to be increased by 4 rounds to 36
rounds, so as to be secure against full round biclique attack.
Whether the sieve-in-the-middle technique proposed by Anne Canteaut etc.
at CRYPTO 2013 can be introduced to improve the complexity, especially the
time complexity of SKINNY64/64, will be the future work.
References
1. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw,
M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher.
In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466.
Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2 31
2. De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN a family
of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.)
CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009)
Biclique Attack of Block Cipher SKINNY 17
3. Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G.
(eds.) ACNS 2011. LNCS, vol. 6715, pp. 327–344. Springer, Heidelberg (2011).
doi:10.1007/978-3-642-21554-4 19
4. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The
SIMON and SPECK block ciphers on AVR 8-bit microcontrollers. In: Eisenbarth,
T., Öztürk, E. (eds.) LightSec 2014. LNCS, vol. 8898, pp. 3–20. Springer, Cham
(2015). doi:10.1007/978-3-319-16363-5 1
5. Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant
MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp.
123–153. Springer, Heidelberg (2016). doi:10.1007/978-3-662-53008-5 5
6. Diffie, W., Hellman, M.E.: Special feature exhaustive cryptanalysis of the NBS data
encryption standard. Computer 10(6), 74–84 (1977)
7. Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full
AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344–
371. Springer, Heidelberg (2011). doi:10.1007/978-3-642-25385-0 19
8. Jean, J., Nikolić, I., Peyrin, T.: Tweaks and keys for block ciphers: the TWEAKEY
framework. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp.
274–288. Springer, Heidelberg (2014). doi:10.1007/978-3-662-45608-8 15
Another random document with
no related content on Scribd:
Billy Jack.
LP43345.
Billy Two Hats.
LP43310.
Biology today.
MP25430.
Bird predators of the mountain water world.
MP24792.
Birth of a nation.
LP43201.
Birth of a notion.
R576597.
Bison.
MU8911.
Black pirate.
LP43608.
Blake, Robert R.
MP25291.
MP25292.
Blatty, William Peter.
LP42969.
Blaze of noon.
R574034.
Blessings of liberty.
LP42994.
Blind goddess.
LF152.
Blind spot.
R572330.
Blonde for a day.
R569728.
Blondie knows best.
R567675.
Blondie’s big moment.
R575614.
Blondie’s holiday.
R575615.
Blood feud.
LP43280.
Blood line.
LP43329.
Blue Christmas.
MP25097.
Blue Racer series.
LP43130.
LP43137.
Blue skies.
R574028.
Blume in love.
LP42955.
BNA Communications, Inc.
MP25013.
MP25135.
MP25136.
MP25291.
MP25292.
Bobby Riggs.
MP25125.
Bobcat hunting.
MP24782.
Bobcat: mother and cubs.
MP24783.
Bobwin Associates, Inc.
LP42942.
LP42943.
Body English — elementary.
MP25366.
Bold ones.
LP43103 - LP43104.
LP43106 - LP43117.
LP43188.
Boltons Trading Corporation.
LP43608.
Boot.
LP43404.
Bootle Beetle.
R577487.
Bootleggers.
LP43576.
Borden, Dick.
MP25166.
Born to kill.
R575635.
Boston Blackie and the law.
R567580.
Botulism.
LP43178.
Boulevard Communication Group, Inc.
MU8892.
Boulle, Pierre.
LP43205.
Bowery bombshell.
R569473.
Bow Wow Boutique.
LP43515.
Box, Sidney.
LF139.
LF140.
Boy and his dog.
R576593.
Boyd, Grace Bradley.
R573666.
R573667.
R575365.
R578418.
Boyd, William L.
R573666.
R573667.
R575365.
R578418.
Boy of Quebec.
MP25203.
Boy Scouts of America, North Brunswick, NJ.
MP24982.
Brakes and clutches.
MP25274.
Brakhage, Stan.
MP25380 - MP25384.
Brasher doubloon.
R573495.
Bread and wine.
MP24901.
Breaking of the habit.
LP43045.
Breezy.
LP43605.
Brekke, Paul.
MP25434.
Brener, Michel.
MU8896 - MU8901.
Bride and gloom.
R577563.
Brigham Young University, Provo, UT.
LP42982.
MP24897 - MP24899.
Brigham Young University, Provo, UT. Motion Picture Department.
LP42982.
MP24897 - MP24899.
Bringing up father.
R577413.
Brink of doom.
LP43587.
Broken gun.
LP43625.
Bronco babes.
R578363.
Brooklyn Botanic Garden.
MP25416.
Brothers.
R578285.
Brother Sun, Sister Moon.
LP42961.
Brouillet, Frank R.
MP25429.
Brown, David.
LP43102.
Brown wolf.
LP43090.
Broyles, Allebaugh and Davis, Inc.
MP25202.
Brushfire.
LP43180.
Brush with death.
LP43473.
Brute man.
R569739.
Buck privates come home.
R574037.
Buffalo Bill rides again.
R572753.
Bulldog Drummond at bay.
B578531.
Bullfighting.
LP43541.
Bullfrogs protecting territory.
MP24778.
Bulo Productions, Inc.
LP43617.
Burke Museum.
LP42981.
Business and office.
LP42946.
Business man’s lunch.
MP24929.
Busting.
LP43134.
But Jack was a good driver.
MP25464.
Butterfly.
LP43128.
By Hoot or by crook.
LP43635.
C
Cadre Films.
MP25181.
Cahill, United States Marshal.
LP42957.
Calculus in motion.
MP24732.
MP25051 - MP25057.
Calcutta.
R578390.
Calendar.
LF150.
California.
R574031.
California gold rush.
MP25421.
Caller.
LP43401.
Calling on Costa Rica.
R572097.
Camaro versus competition.
MU8944.
Camel.
MP24755.
Camera, action, murder.
LP43435.
Camino.
MU8945.
Camouflage beneath the sea.
MP24776.
Campus, Steve.
MP25165.
Campus (Steve) Productions, Inc.
MP25165.
MP25330 - MP25335.
Cana Media, Inc.
MU9016.
Cancel my reservation.
LP43625.
Candidate for murder.
LP43270.
Candy and Dick.
MP24851.
Caprice Classic versus LTD Brougham.
MU8949.
Caprice Estate versus Country Squire.
MU8946.
Capricorn murders.
LP43271.
Captive.
LP43255.
Carbon dioxide: Preparation.
MP24975.
Cardboard cavalier.
LF153.
Care is no cure.
LP43287.
Carnival.
LF129.
R574819.
Carnow, Lawrence Edward.
LP42983.
Carolyn Lois White’s preschool years at home: 1969 - 1973.
MU8991.
Carr, Clark.
MP24829.
Carters meet Frankie Avalon.
LP43521.
Casanova, Joseph.
MP25299 - MP25300.
MP25316 - MP25320.
MP25398 - MP25399.
Case of impotence.
LP43188.
Casey Productions, Ltd.
LF125.
Casler, Christopher G.
MU8905.
Caspary, Vera.
LF124.
Cassidy (Hopalong) Productions, Inc.
R573666.
R573667.
R575365.
R578418.
Catalon Productions.
MU9013.
Catch a ring that isn’t there.
LP43396.
Cat concerto.
R574264.
Cate and McGlone Films.
MP24737.
Caterpillar.
LP43050.
MU8994.
Cat fishin’.
R570603.
Catholic dilemma.
MP25091.
Cation analysis: Chromatography and ion exchange.
MP25304.
Cation analysis: Wet chemical methods.
MP25303.
Cats.
LP43528.
Cat trouble.
R579973.
Cause of liberty.
LP43064.
Cavern of chance.
R577567.
CBS evening news with Walter Cronkite.
MU8862 - MU8891.
MU8913 - MU8935.
MU8953 - MU8967.
MU8976 - MU8985.
CBS News.
LP43357 - LP43369.
MP25084 - MP25107.
CBS News special.
MP25084.
MP25086 - MP25100.
MP25104 - MP25107.
CBS Television Network.
LP42947.
LP42948.
LP42949.
LP43048.
LP43049.
Centennial summer.
R567997.
Center for Mass Communications of Columbia University Press. SEE
Columbia University Press. Center for Mass Communications.
Center for Southern Folklore.
MP25277.
Centron Corporation.
MP25137.
MP25138.
MP25139.
Centron Corporation, Inc.
MP25064.
MP25065.
MP25113.
MP25325.
Centron Educational Films.
MP25113.
Cervantes (Paalo) Ltd., a subsidiary of Colgate Palmolive Company.
SEE Colgate Palmolive Company. Paalo Cervantes, Ltd.
Chain other than roller chain.
MP24928.
Challenge in the air.
MP24938.
Challenge of the mountains.
MP25485.
Challenge to Hollywood.
R568206.
Chamber theater — secondary.
MP25377.
Chandar, the black leopard of Ceylon.
LP43193.
LP43195.
Chappaquiddick report.
MP25089.
Charade.
LP43214 - LP43225.
Charger / Coronet / Chevelle and Torino comparison.
MP25033.
Chariot.
LP42958.
Charley Varrick.
LP43604.
Charlie Barnet and his orchestra.
R578386.
Charlie gave me your number.
LP43145.
Charlie Spivak and his orchestra.
R578385.
Chartoff, Robert.
LP43134.
Chase of the onager.
MP25440.
Chaser.
LP43452.
Cheetah.
LP42936.
Chemical change.
MP25222.
Chemical hazards.
MP25232.
Chemical properties.
MP25229.
Chess game.
LU3674.
Chevelle versus competition.
MU8948.
Chevrolet Motor Division, General Motors Corporation. SEE General
Motors Corporation. Chevrolet Motor Division.
Chevrolet trucks, 1974 pickup comparison.
MU8947.
Childbirth.
MP24986.
Child of divorce.
R570312.
Children of the fields.
LP42942.
Chinatown.
LP43628.
Chinese sunset.
LP43040.
Chlorine and the firefighter.
MP25290.
Chlorine Institute, Inc.
MP25290.
Choice.
LP43324.
Choice not chance - career development in New Jersey.
MP25062.
Choral reading — secondary.
MP25371.
Christian Science Board of Directors.
MU8968.
MU8969.
MU8970.
Christmas looking.
LP43120.
Chromatography and ion exchange.
MP25304.
Chrysler Corporation.
MP25021 - MP25036.
MP25140 - MP25146.
MP25321 - MP25322.
MP25400 - MP25401.
Chrysler Newport versus Buick LeSabre and Olds 88.
MP25022.
CIBA Corporation. CIBA Pharmaceutical Company.
MP25255 - MP25259.
MP25265 - MP25267.
CIBA Pharmaceutical Company, division of CIBA Corporation. SEE
CIBA Corporation. CIBA Pharmaceutical Company.
CIBA Pharmaceutical Products, Inc.
MP25254.
MP25260 - MP25264.
MP25268.
CICS applications programming.
MP25127 - MP25131.
Cigarette girl.
R572327.
Cinderella liberty.
LP43260.
Cine Film.
LP43118.
Cineguild.
LF146.
Cinema Center Films.
LP43129.
LP43370.
Cinemasonics, Inc.
MU8975.
Cinevision, Ltee.
LP42933.
LP42934.
LP42935.
Cipher in the snow.
LP42982.
Circle of power.
LP43334.
Circus horse.
R571696.
Citizen’s arrest — 484.
LP43380.
City builders.
MP25335.
City University of New York. Board of Higher Education. SEE
Queens College, Flushing, NY.
Civilizations of ancient America.
MP24744.
Civil War: promise of reconstruction.
LP43091.
Civil War: the anguish of emancipation.
LP43092.
Clarion call.
MU8968.
Clash.
LP43591.
Claudia and David.
R568000.
Clean and quiet town.
LP42993.
Clearing timber on construction work.
MP25329.
Clear with a civilian.
LP43376.
LP43377.
Cleaver, Bill.
LP43371.
Cleaver, Vera.
LP43371.
Clemens, Samuel Langhorne.
MP25284.
Cleopatra Jones.
LP42954.
Climates and seasons.
MP25205.
Clothing: a pair of blue jeans.
LP43077.
Clown of the jungle.
R570686.
CMC. SEE Columbia University Press. Center for Mass
Communications.
Coca-Cola Company.
MP25166.
Cockatoos for two.
R572337.
Code of the West.
R575633.
Coding classroom activities situations utilizing the teacher self
appraisal observation system.
MP25047.
Coding classroom discussion situations utilizing the teacher self
appraisal observation system.
MP25045.
Coding classroom introduction situations utilizing the teacher self
appraisal observation system.
MP25044.
Coding classroom review situations utilizing the teacher self
appraisal observation system.
MP25046.
Coffee planters near Kilimanjaro.
MP24873.
Cold, hard cash.
LP43440.
Colgate Palmolive Company.
MP24842 - MP24843.
MP24977 - MP24981.
MP25041.
MP25424.
MP25426.
MP25443.
MP25490 - MP25493.
Colgate Palmolive Company. Paalo Cervantes, Ltd.
MP24910.
Columbia Broadcasting System, Inc.
LP42947 - LP42949.
LP43048 - LP43049.
LP43357 - LP43369.
MP25084 - MP25107.
MU8862 - MU8891.
MU8913 - MU8935.
MU8953 - MU8967.
MU8976 - MU8985.
Columbia Pictures Corporation.
R567579 - R567593.
R567675.
R570066 - R570073.
R570076 - R570080.
R572325 - R572336.
R572338.
R572340 - R572344.
R575614 - R575615.
R577558 - R577569.
R577572 - R577575.
R578420 - R578431.
R578896 - R578908.
Columbia Pictures Industries, Inc.
LP43203.
LP43356.
R567579 - R567593.
R570066 - R570080.
R572325 - R572344.
R577558 - R577575.
R578420 - R578431.
R578896 - R578908.
Columbia Pictures Industries, Inc. Learning Company of America.
LP43050 - LP43064.
LP43067 - LP43098.
LP43264.
Columbia University Press. Center for Mass Communications.
MP24896.
Columbus and Isabella.
LP43368.
Combatants.
LP43289.
Come over to my house.
LP42942 - LP42943.
LP43312 - LP43317.
Comet Productions, Inc.
R568607.
R568608.
Commonwealth Film Unit of Australia.
MP24875.
Communicable diseases.
MP25262.
Communications Foundation, Inc.
LP43574.
Community sing.
R567590.
R570077.
R572341.
R577573.
R578421.
R578907.
Compact truck features and comparison.
MP25021.
Concavity and points of inflection.
MP25054.
Concept Films.
MP24841.
Concept instancing of role enactment.
MP25332.
Concrete evidence.
LP43021.
Concrete finishing.
MP25171.
Condemned.
LP43482.
Condition: red.
LP43244.
Coney Island eats.
MU8951.
Confession.
LP43328.
Conflict.
LP43327.
Conflict and awareness: a film series on human values.
MP25463 - MP25470.
Conformation in ring compounds.
MP25299.
Conformations of cyclohexane.
MP25319.
Conqueror Films, Inc.
LU3666.
Conrack.
LP43373.
Conroy, Pat.
LP43373.
Conscience.
LP43524.
Conspiracy.
LP43341.
Conspiracy of silence.
LP43006.
Consultants Associated, Inc.
MP24959 - MP24967.
MP25182 - MP25201.
MP25436.
Consumers Power Company.
LP43126.
MP24938.
MP24939.
Controllers’ functions and general accounting.
MP25453.
Controlling absenteeism.
MP25013.