Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eprint 2003
Page
Title
A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack
Isomorphism Classes of Picard Curves over Finite Fields
Hidden Polynomial Cryptosystems
Extending Joux's Protocol to Multi Party Key Agreement
Initiator-Resilient Universally Composable Key Exchange
On the Optimality of Linear, Differential and Sequential Distinguishers
Hash Function Balance and its Impact on Birthday Attacks
Forking Lemmas in the Ring Signatures' Scenario
On the Security of Some Proxy Signature Schemes
EAX: A Conventional Authenticated-Encryption Mode
A Critique of CCM
How to Protect Against a Militant Spammer
Proxy Blind Signature Scheme
A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Divisible Voting Scheme
Almost Security of Cryptographic Boolean Functions
Goldbach?s Conjecture on ECDSA Protocols
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
Relation among simulator-based and comparison-based definitions of semantic security
Fast arithmetic on Jacobians of Picard curves
Non-interactive and Reusable Non-malleable Commitment Schemes
Primitive Specification for SOBER-128
Stronger Security Bounds for OMAC, TMAC and XCBC
A Forward-Secure Public-Key Encryption Scheme
Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
A defect of the implementation schemes of the TTM cryptosystem
On the Selection of Pairing-Friendly Groups
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
Elliptic Curve Point Multiplication
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
Sequential Aggregate Signatures from Trapdoor Permutations
Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
Simple Stateless Steganography
Trace Zero Subvariety for Cryptosystems
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Secure Proxy Signature Schemes for Delegation of Signing Rights
Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
Algorithms in Braid Groups
Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
Cryptanalysis of HFE
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
CWC: A high-performance conventional authenticated encryption mode
Fujisaki-Okamoto IND-CCA hybrid encryption revisited
Novel Cyclic and Algebraic Properties of AES
Crytanalysis of SAFER++
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
Further Cryptanalysis of some Proxy Signature Schemes
Accumulating Composites and Improved Group Signing
Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
A New ID-based Group Signature Scheme from Bilinear Pairings
An identity-based ring signature scheme from bilinear pairings
Visual Crypto Displays Enabling Secure Communications
How Secure Are FPGAs in Cryptographic Applications?
Physically Observable Cryptography
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
Assessing security of some group based cryptosystems
A General Correlation Theorem
Algebraic Attacks on Combiners with Memory and Several Outputs
Certificateless Public Key Cryptography
Using Information Theory Approach to Randomness Testing
Weak Fields for ECC
Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
On the Pseudorandomness of KASUMI Type Permutations
Homomorphic public-key systems based on subgroup membership problems
Guaranteeing the diversity of number generators
Minimum Distance between Bent and 1-resilient Boolean Functions
Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
Collision Attack on Reduced-Round Camellia
Efficient linear feedback shift registers with maximal period
Bernoulli numbers and the probability of a birthday surprise
Permutation graphs, fast forward permutations, and
On the Randomness of the Editing Generator
Trading-Off Type-Inference Memory Complexity Against Communication
General Composition and Universal Composability in Secure Multiparty Computation
A New Tree based Domain Extension of UOWHF
Elliptic curves suitable for pairing based cryptography
ID-based tripartite key agreement with signatures
Symmetric Authentication Within a Simulatable Cryptographic Library
Breaking and Repairing Optimistic Fair Exchange from PODC 2003
A Parallelizable Enciphering Mode
A Tweakable Enciphering Mode
Forward-Secure Hierarchical ID-Based Cryptography
On the random-oracle methodology as applied to length-restricted signature schemes
Optimal Statistical Power Analysis
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
ManTiCore: Encryption with Joint Cipher-State Authentication
A Formal Proof of Zhu's Signature Scheme
Efficient Provably Secure Public Key Steganography
Some RSA-based Encryption Schemes with Tight Security Reduction
A Sufficient Condition and Optimal Domain Extension of UOWHF
An efficient variant of the RSA cryptosystem
A More Secure and Efficacious TTS Signature Scheme
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
Cryptanalysis of the Alleged SecurID Hash Function
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
Identity-Based Threshold Decryption
Commitment Capacity of Discrete Memoryless Channels
A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves
Identity-based Chameleon Hash and Applications
Robust discretization, with an application to graphical passwords
Properties of the Transformation Semigroup of the Solitaire Stream Cipher
HARPS: HAshed Random Preloaded Subset Key Distribution
Scalable Protocols for Authenticated Group Key Exchange
NAEP: Provable Security in the Presence of Decryption Failures
Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
Relaxing Chosen-Ciphertext Security
Double-Speed Safe Prime Generation
Patterson-Wiedemann Construction Revisited
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Constructing Optimistic Fair Exchange Protocols from Committed Signatures
VMPC One-Way Function
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Chosen-Ciphertext Security from Identity-Based Encryption
Certificate-Based Encryption and the Certificate Revocation Problem
What do DES S-boxes Say to Each Other ?
VMPC Stream Cipher
Safe Prime Generation with a Combined Sieve
Resource Bounded Unprovability of Computational Lower Bounds
A New Forward Secure Signature Scheme using Bilinear Maps
Cryptanalysis of publicly verifiable authenticated encryption
Projective Coordinates Leak
Universal Designated-Verifier Signatures
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Security Analysis of Several Group Signature Schemes
Public Key Encryption with keyword Search
Security Analysis of Some Proxy Signatures
Revisiting fully distributed proxy signature schemes
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
an attack on a multisignature scheme
Yet Another Sieving Device
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials
Improved Cryptanalysis of SecurID
Identity Based Undeniable Signatures
Security Flaws in Several Group Signatures Proposed by Popescu
ID-Based Chameleon Hashes from Bilinear Pairings
Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
SFLASHv3, a fast asymmetric signature scheme
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$
Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols
Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC
Secure Indexes
Chemical Combinatorial Attacks on Keyboards
A Security Evaluation of Whitenoise
Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
A short comment on the affine parts of SFLASH^{v3}
A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
Cryptanalysis of a Cryptosystem based on Drinfeld modules
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
On the Security of a Group Signature Scheme with Forward Security
Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
Verifiably Committed Signatures Provably Secure in The Standard Complexity Model
Algebraic Attacks on Summation Generators
A Fast Provably Secure Cryptographic Hash Function
Public-Key Steganography with Active Attacks
The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm
Public Key Steganography
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Combinational Logic Design for AES SubByte Transformation on Masked Data
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
Chameleon Signature from Bilinear Pairing
Universally Composable Signatures, Certification and Authentication
How to Break and Repair a Universally Composable Signature Functionality
Hybrid Broadcast Encryption and Security Analysis
Improved Weil and Tate pairings for elliptic and hyperelliptic curves
An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
A Key Substitution Attack on SFLASH^{v3}
Quantum Digital Signature Based on Quantum One-way Functions
ID-based Authenticated Two Round Multi-Party Key Agreement
Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)
Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)
Breaking the Stream Cipher Whitenoise
Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields
On Simulation-Sound Trapdoor Commitments
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
Committing Encryption and Publicly-Verifiable SignCryption
Improved Constructions for Universal Re-encryption
On the Security of a Multi-Party Certified Email Protocol
Trading Inversions for Multiplications in Elliptic Curve Cryptography
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices
Attack on Two ID-based Authenticated Group Key Agreement Schemes
An Improved ID-based Authenticated Group Key Agreement Scheme
A provably secure ID-based ring signature scheme
A Mode of Operation with Partial Encryption and Message Integrity
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Imperfect Decryption and an Attack on the NTRU Encryption Scheme
Inversion of Several Field Elements: A New Parallel Algorithm
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Distributing the Encryption and Decryption of a Block Cipher
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case
A Price Negotiable Transaction System
DFA on AES
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
Differential Fault Analysis on A.E.S
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
The number of initial states of the RC4 cipher with the same cycle structure
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
A Universally Composable Cryptographic Library
A Threshold GQ Signature Scheme
Perfect Hash Families with Few Functions
An Authenticated Group Key Agreement Protocol on Braid groups
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
Attacks based on Conditional Correlations against the Nonlinear Filter Generator
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
Did Filiol Break AES ?
New identity based signcryption schemes from pairings
On Modeling IND-CCA Security in Cryptographic Protocols
Homomorphic public-key cryptosystems and encrypting boolean circuits
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
Cryptographic Randomized Response Techniques
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery
Efficient Multi-Party Computation over Rings
Cryptographic Tamper Evidence
A Framework for Password-Based Authenticated Key Exchange
Integral Cryptanalysis on reduced-round Safer++
On the (In)security of the Fiat-Shamir Paradigm
On alternative approach for verifiable secret sharing
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
Strengthening Zero-Knowledge Protocols using Signatures
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Torus-based cryptography
A new statistical distinguisher for the shrinking generator
Timed Fair Exchange of Standard Signatures
Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings
Signcryption scheme for Identity-based Cryptosystems
An algorithm to obtain an RSA modulus with a large private key
Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers
A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme
Compounding Secret Sharing Schemes
Hidden Number Problem in Small Subgroups
Concealment and its Applications to Authenticated Encryption
How to Predict the Output of a Hardware Random Number Generator
Attacking RSA-based Sessions in SSL/TLS
Tate-pairing implementations for tripartite key agreement
ID based Cryptosystems with Pairing on Elliptic Curve
A New Approach to Prevent Blackmailing in E-Cash
Computing of Trust in Distributed Networks
Secure Multiplication of Shared Secrets in the Exponent
An Elliptic Curve Trapdoor System