New Reports in the Cryptology ePrint Archive


2002/030 ( PS PS.GZ )
     Adaptive chi-square test and its application to some cryptographic
     problems.
     Boris Ryabko
2002/029 ( PS PS.GZ PDF )
     Efficient Computation Modulo a Shared Secret with Application to the
     Generation of Shared Safe-Prime Products
     Joy Algesheimer and Jan Camenisch and Victor Shoup
2002/028 ( PS PS.GZ PDF )
     A Universal Forgery of Hess's Second ID-based Signature against the
     Known-message Attack
     Jung Hee Cheon
2002/027 ( PS PS.GZ PDF )
     Efficient and Non-Malleable Proofs of Plaintext Knowledge and
     Applications
     Jonathan Katz
2002/026 ( PS PS.GZ )
     Generic Groups, Collision Resistance, and ECDSA
     Daniel R. L. Brown
2002/025 ( PS PS.GZ PDF )
     Making Mix Nets Robust For Electronic Voting By Randomized Partial
     Checking
     Markus Jakobsson and Ari Juels and Ron Rivest
2002/024 ( PS PS.GZ PDF )
     Timed Release of Standard Digital Signatures
     Juan Garay and Markus Jakobsson
2002/023 ( PS PS.GZ PDF )
     Almost Optimal Hash Sequence Traversal
     Don Coppersmith and Markus Jakobsson
2002/022 ( PS PS.GZ PDF )
     From Identification to Signatures via the Fiat-Shamir Transform:
     Minimizing Assumptions for Security and Forward-Security
     Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip
     Namprempre
2002/021 ( PS PS.GZ )
     Spectral Analysis of Boolean Functions under Non-uniformity of
     Arguments
     Kanstantsin Miranovich
2002/020 ( PS PS.GZ PDF )
     Cryptanalysis of stream ciphers with linear masking
     Don Coppersmith and Shai Halevi and Charanjit Jutla
2002/019 ( PS PS.GZ PDF )
     Scream: a software-efficient stream cipher
     Shai Halevi and Don Coppersmith and Charanjit Jutla
2002/018 ( PS PS.GZ )
     An Identity-Based Signature from Gap Diffie-Hellman Groups
     Jae Choon Cha and Jung Hee Cheon
2002/017 ( PS PS.GZ PDF )
     The Cramer-Shoup Strong-RSA Signature Scheme Revisited
     Marc Fischlin
2002/016 ( PDF )
     Content Extraction Signatures
     Ron Steinfeld and Laurence Bull and Yuliang Zheng
2002/015 ( PDF )
     Security proofs of cryptographic protocols
     Eva Jencusova
2002/014 ( PS PS.GZ PDF )
     Better than BiBa: Short One-time Signatures with Fast Signing and
     Verifying
     Leonid Reyzin and Natan Reyzin
2002/013 ( PS PS.GZ PDF )
     Generic Lower Bounds for Root Extraction and Signature Schemes in
     General Groups
     Ivan Damgard and Maciej Koprowski
2002/012 ( PS PS.GZ PDF )
     Exponent Group Signature Schemes and Efficient Identity Based Signature
     Schemes Based on Pairings
     F. Hess
2002/011 ( PS PS.GZ )
     Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length
     Messages
     Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier,
     David Pointcheval and Christophe Tymen
2002/010 ( PS PS.GZ )
     Cut and Paste Attacks with Java
     Serge Lefranc and David Naccache
2002/009 ( PS PS.GZ PDF )
     Tree-based Group Key Agreement
     Yongdae Kim and Adrian Perrig and Gene Tsudik
2002/008 ( PS PS.GZ PDF )
     Efficient Algorithms for Pairing-based Cryptosystems
     Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott
2002/007 ( PS PS.GZ PDF )
     Parallel scalar multiplication on general elliptic curves over
     $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
     Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and
     Jean-Pierre Seifert
2002/006 ( PDF )
     The best and worst of supersingular abelian varieties in cryptology
     Karl Rubin and Alice Silverberg
2002/005 ( PS PS.GZ )
     Cryptanalysis of Stream Cipher COS (2,128) Mode I
     Hongjun Wu and Feng Bao
2002/004 ( PS PS.GZ PDF )
     ID-based Signatures from Pairings on Elliptic Curves
     Kenneth G. Paterson
2002/003 ( PS PS.GZ )
     Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
     Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
2002/002 ( PS PS.GZ PDF )
     Extracting Witnesses from Proofs of Knowledge in the Random Oracle
     Model
     Jens Groth
2002/001 ( PS PS.GZ PDF )
     Fractal Hash Sequence Representation and Traversal
     Markus Jakobsson

  ------------------------------------------------------------------------

2001/113 ( PDF )
     Efficient Revocation of Anonymous Group Membership
     Jan Camenisch and Anna Lysyanskaya
2001/112 ( PS PS.GZ PDF )
     A Proposal for an ISO Standard for Public Key Encryption
     Victor Shoup
2001/111 ( PS PS.GZ )
     An Identity Based Authenticated Key Agreement Protocol Based on the
     Weil Pairing
     N.P. Smart
2001/110 ( PS PS.GZ )
     RSA hybrid encryption schemes
     Louis Granboulan
2001/109 ( PDF )
     New Notions of Soundness and Simultaneous Resettability in the
     Public-Key Model
     Yunlei ZHAO
2001/108 ( PS PS.GZ PDF )
     Design and Analysis of Practical Public-Key Encryption Schemes Secure
     against Adaptive Chosen Ciphertext Attack
     Ronald Cramer and Victor Shoup
2001/107 ( PS PS.GZ PDF )
     Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
     Yehuda Lindell
2001/106 ( PS PS.GZ PDF )
     Cryptanalysis of the COS (2,128) Stream Ciphers
     Steve Babbage
2001/105 ( PS PS.GZ )
     Universal Arguments and their Applications
     Boaz Barak and Oded Goldreich
2001/104 ( PS PS.GZ )
     Concurrent Zero-Knowledge With Timing, Revisited
     Oded Goldreich
2001/103 ( PS PS.GZ PDF )
     Countermeasures against Side-Channel Attacks for Elliptic Curve
     Cryptosystems
     Antonio Bellezza
2001/102 ( PS PS.GZ PDF )
     An Extended Quadratic Frobenius Primality Test with Average Case Error
     Estimates
     Ivan Damg{\aa}rd and Gudmund Frandsen
2001/101 ( PDF )
     Quasi-Efficient Revocation of Group Signatures
     Giuseppe Ateniese and Gene Tsudik
2001/100 ( PS PS.GZ )
     A Short Note on Girault's Self-Certified Model
     Shahrokh Saeednia
2001/099 ( PS PS.GZ )
     Linear Code Implies Public-Key Traitor Tracing
     Kaoru Kurosawa and Takuya Yoshida
2001/098 ( PS PS.GZ PDF )
     Fast hashing onto elliptic curves over fields of characteristic 3
     Paulo S. L. M. Barreto and Hae Yong Kim
2001/097 ( PS PS.GZ )
     An Efficient MAC for Short Messages
     Sarvar Patel
2001/096 ( PS PS.GZ )
     Constructing elliptic curves with a given number of points over a
     finite field
     Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan
2001/095 ( PS PS.GZ PDF )
     Secure Vickrey Auctions without Threshold Trust
     Helger Lipmaa and N. Asokan and Valtteri Niemi
2001/094 ( PS PS.GZ )
     Slope packings and coverings, and generic algorithms for the discrete
     logarithm problem
     M. Chateauneuf and A.C.H. Ling and D.R. Stinson
2001/093 ( PS PS.GZ PDF )
     Threshold Cryptosystems Based on Factoring
     Jonathan Katz and Moti Yung
2001/092 ( PS PS.GZ PDF )
     BDD-based Cryptanalysis of Keystream Generators
     Matthias Krause
2001/091 ( PS PS.GZ PDF )
     Perfect Hiding and Perfect Binding Universally Composable Commitment
     Schemes with Constant Expansion Factor
     Ivan Damgård and Jesper B. Nielsen
2001/090 ( PS PS.GZ PDF )
     Identity Based Encryption From the Weil Pairing
     Dan Boneh and Matthew Franklin


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR