Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 2000
Page
Title
On Security Preserving Reductions -- Revised Terminology
A New Forward-Secure Digital Signature Scheme
Implications of the Nontriviality of Entropy Approximation
Combinatorial Properties of Frameproof and Traceability Codes
On Resilient Boolean Functions with Maximal Possible Nonlinearity
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
Public Electronic Contract Protocol
Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
New Directions in Design of Resilient Boolean Functions
The Security of Chaffing and Winnowing
Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext
Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97
Concurrent Zero-Knowledge in Poly-logarithmic Rounds
Authenticated Key Exchange Secure Against Dictionary Attacks
Identification Protocols Secure Against Reset Attacks
Cryptanalysis of RSA with small prime difference
Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP
Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently
On the Security of Diffie--Hellman Bits
An Efficient Identification Scheme Based on Permuted Patterns
ACE: The Advanced Cryptographic Engine
Security of Polynomial Transformations of the Diffie--Hellman Key
Security of the Most Significant Bits of the Shamir Message Passing Scheme
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
Authentication and Key Agreement via Memorable Password
Accountable Certificate Management using Undeniable Attestations
An Information-Theoretic Model for Steganography
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Secure Multiparty Computation of Approximations
Forward Security in Threshold Signature Schemes
Anonymous Fingerprinting with Direct Non-Repudiation
The Complete Distribution of Linear Probabilities of MARS' s-box
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography
Electronic Jury Voting Protocols
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation
General Secure Multi-Party Computation from any Linear Secret Sharing Scheme
On the Complexity of Verifiable Secret Sharing and Multi-Party Computation
Encryption Modes with Almost Free Message Integrity
Decimation Attack of Stream Ciphers
On Symmetrically Private Information Retrieval
Constructing Pseudo-Random Permutations with a Prescribed Structure
Constructions and Bounds for Unconditionally Secure Commitment Schemes
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
The Saturation Attack - a Bait for Twofish
Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
Spectral Analysis of High Order Correlation Immune Functions
Reducing the Gate Count of Bitslice DES
CRYPTANALYSIS OF THE A5/2 ALGORITHM
A Construction of Resilient Functions with High Nonlinearity
Correlation Immune Boolean Functions with Very High Nonlinearity
Multiparty Computation from Threshold Homomorphic Encryption
A Complete Problem for Statistical Zero Knowledge
Session-Key Generation using Human Passwords Only
Graph-Based Authentication of Digital Streams
Essential Shannon Security with Keys Smaller Than the Encrypted Message
OAEP Reconsidered
RSA-OAEP is Secure under the RSA Assumption
Non-Deforming Digital Watermarks
Candidate One-Way Functions Based on Expander Graphs
On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
Universally Composable Security: A New Paradigm for Cryptographic Protocols
A Content Certified E-mail Protocol with a Public Mailbox
New constructions of resilient Boolean functions with maximal nonlinearity