International Association for Cryptologic Research

New Reports in the Cryptology ePrint Archive

   2001/089 ( PS PS.GZ )
          Linear broadcast encryption schemes
          Carles Padró and Ignacio Gracia and Sebastià Martín and Paz
   2001/088 ( PS PS.GZ PDF )
          Improving the trade-off between storage and communication in
          broadcast encryption schemes
          Ignacio Gracia and Sebastià Martín and Carles Padró
   2001/087 ( PS PS.GZ )
          A Linear Algebraic Approach to Metering Schemes
          C. Blundo and S. Martìn and B. Masucci and C. Padrò
   2001/086 ( PS PS.GZ PDF )
          Statistical Zero-Knowledge Proofs from Diophantine Equations
          Helger Lipmaa
   2001/085 ( PS PS.GZ PDF )
          Universal Hash Proofs and a Paradigm for Adaptive Chosen
          Ciphertext Secure Public-Key Encryption
          Ronald Cramer and Victor Shoup
   2001/084 ( PS PS.GZ )
          Analysis of the GHS Weil Descent Attack on the ECDLP over
          Characteristic Two Finite Fields of Composite Degree
          Markus Maurer and Alfred Menezes and Edlyn Teske
   2001/083 ( PS PS.GZ )
          On the Constructing of Highly Nonlinear Resilient Boolean
          Functions by Means of Special Matrices
          Maria Fedorova and Yuriy Tarannikov
   2001/082 ( PDF )
          A Description of Protocols for Private Credentials
          Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton
   2001/081 ( PS PS.GZ PDF )
          A Sufficient Condition for Secure Ping--Pong Protocols
          Masao Mori
   2001/080 ( PS PS.GZ )
          COS Ciphers are not "extremely weak"! - The Design Rationale of
          COS Ciphers
          Eric Filiol and Caroline Fontaine
   2001/079 ( PS PS.GZ )
          Authenticated Encryption in the Public-Key Setting: Security
          Notions and Analyses
          Jee Hea An
   2001/078 ( PS PS.GZ PDF )
          The COS Stream Ciphers are Extremely Weak
          Steve Babbage
   2001/077 ( PS PS.GZ PDF )
          A Time-Memory Tradeoff Attack Against LILI-128
          Markku-Juhani Olavi Saarinen
   2001/076 ( PS PS.GZ )
          Communication Complexity and Secure Function Evaluation 
          Moni Naor and Kobbi Nissim
   2001/075 ( PS PS.GZ )
          Pseudo-Random Functions and Factoring
          Moni Naor and Omer Reingold and Alon Rosen
   2001/074 ( PS PS.GZ PDF )
          On the Security of Randomized CBC-MAC Beyond the Birthday
          Paradox Limit - A New Construction
          Eliane Jaulmes and Antoine Joux and Frederic Valette
   2001/073 ( PS PS.GZ )
          Efficient oblivious transfer schemes
          Wen-Guey Tzeng
   2001/072 ( PS PS.GZ )
          On the Goubin-Courtois Attack on TTM
   2001/071 ( PS PS.GZ )
          Ciphertext Can Be Shorter in Multi-User Setting
          Kaoru Kurosawa
   2001/070 ( PS PS.GZ PDF )
          Security Assessment of Hierocrypt and Rijndael against the
          Differential and Linear Cryptanalysis (Extended Abstract)
          Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi
   2001/069 ( PS PS.GZ )
          On the (Im)possibility of Obfuscating Programs
          Boaz Barak and Oded Goldreich and Russell Impagliazzo and
          Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang
   2001/068 ( PS PS.GZ PDF )
          SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
          J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and
          J.Vandewalle and H.Y.Kim
   2001/067 ( PDF )
          An Attack on A Traitor Tracing Scheme
          Jeff Jianxin Yan and Yongdong Wu
   2001/066 ( PS PS.GZ )
   2001/065 ( PS PS.GZ PDF )
          Analysis of chosen plaintext attacks on the WAKE Stream Cipher
          Marina Pudovkina
   2001/064 ( PS PS.GZ )
          An Integer Commitment Scheme based on Groups with Hidden Order
          Ivan Damgard and Eiichiro Fujisaki
   2001/063 ( PS PS.GZ PDF )
          Resettably-Sound Zero-Knowledge and its Applications
          Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda
   2001/062 ( PS PS.GZ PDF )
          Optimal security proofs for PSS and other signature schemes
          Jean-Sébastien Coron
   2001/061 ( PS PS.GZ PDF )
          Clock-Controlled Shift Registers for Key-Stream Generation
   2001/060 ( PS PS.GZ PDF )
          The Security of a Family of Two-Party RSA signature schemes
          Mihir Bellare and Ravi Sandhu
   2001/059 ( PS PS.GZ PDF )
          Revocation and Tracing Schemes for Stateless Receivers
          Dalit Naor and Moni Naor and Jeff Lotspiech
   2001/058 ( PS PS.GZ PDF )
          Efficient Zero-knowledge Authentication Based on a Linear
          Algebra Problem MinRank
          Nicolas T. Courtois
   2001/057 ( PS PS.GZ PDF )
          On the Security of the SPEKE Password-Authenticated Key
          Exchange Protocol
          Philip MacKenzie
   2001/056 ( PS PS.GZ PDF )
          On the Complexity of Matsui's Attack
          P. Junod
   2001/055 ( PS PS.GZ PDF )
          Universally Composable Commitments
          Ran Canetti and Marc Fischlin
   2001/054 ( PS PS.GZ )
          Extending the GHS Weil Descent Attack
          S.D. Galbraith and F. Hess and N.P. Smart
   2001/053 ( PS PS.GZ PDF )
          Security Proofs for the RSA-PSS Signature Scheme and Its
          Jakob Jonsson
   2001/052 ( PDF )
          Differential Probability of Modular Addition with a Constant
          Alexis Warner Machado
   2001/051 ( PS PS.GZ )
          Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log
          n)$ Rounds
          Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
   2001/050 ( PS PS.GZ )
          Elliptic curve Paillier schemes
          Steven D Galbraith
   2001/049 ( PS PS.GZ PDF )
          A known plaintext attack on the ISAAC keystream generator
          Marina Pudovkina
   2001/048 ( PS PS.GZ PDF )
          Forward-Secure Signatures with Optimal Signing and Verifying
          Gene Itkis and Leonid Reyzin
   2001/047 ( PS PS.GZ )
   2001/046 ( PS PS.GZ )
          The simple ideal cipher system
          Boris Ryabko
   2001/045 ( PS PS.GZ )
          The order of encryption and authentication for protecting
          communications (Or: how secure is SSL?)
          Hugo Krawczyk

[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR