New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2002/080 ( PS PS.GZ PDF )
Applications of Multilinear Forms to Cryptography
Dan Boneh and Alice Silverberg
2002/079 ( PS PS.GZ )
On the efficiency of the Clock Control Guessing Attack
Erik Zenner
2002/078 ( PS PS.GZ PDF )
Provably Fixing the SSH Binary Packet Protocol
Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
2002/077 ( PS PS.GZ PDF )
Key-Insulated Public-Key Cryptosystems
Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung
2002/076 ( PDF )
Attack on Private Signature Keys of the OpenPGP Format, PGP(TM)
Programs and Other Applications Compatible with OpenPGP
Vlastimil Klima and Tomas Rosa
2002/075 ( PDF )
Fault based cryptanalysis of the Advanced Encryption Standard
J.\ Bl\"oemer and J.-P.\ Seifert
2002/074 ( PS PS.GZ )
How to repair ESIGN
Louis Granboulan
2002/073 ( PS PS.GZ PDF )
Fault attacks on RSA with CRT: Concrete Results and Practical
Countermeasures
C.\ Aum\"uller and P.\ Bier and P. Hofreiter and W. Fischer and J.-P.
Seifert
2002/072 ( PS PS.GZ PDF )
Authenticated Identity-Based Encryption
Ben Lynn
2002/071 ( PDF )
Further Results and Considerations on Side Channel Attacks on RSA
Vlastimil Klima and Tomas Rosa
2002/070 ( PS PS.GZ PDF )
Weak Keys in MST1
Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Consuelo
Martinez and Rainer Steinwandt
2002/069 ( PS PS.GZ PDF )
A Distributed and Computationally Secure Key Distribution Scheme
Vanesa Daza and Javier Herranz and Carles Padr\'o and Germ\'an S\'aez
2002/068 ( PS PS.GZ )
Improved key recovery of level 1 of the Bluetooth Encryption System
Scott Fluhrer
2002/067 ( PS PS.GZ PDF )
(Not So) Random Shuffles of RC4
Ilya Mironov
2002/066 ( PS PS.GZ )
Black-Box Analysis of the Block-Cipher-Based Hash-Function
Constructions from PGV
John Black and Phillip Rogaway and Thomas Shrimpton
2002/065 ( PS PS.GZ PDF )
Secure Channels based on Authenticated Encryption Schemes: A Simple
Characterization
Chanathip Namprempre
2002/064 ( PS PS.GZ PDF )
Protecting against Key Exposure: Strongly Key-Insulated Encryption with
Optimal Threshold
Mihir Bellare and Adriana Palacio
2002/063 ( PS PS.GZ )
On some Attacks on Multi-prime RSA
M Jason Hinek and Mo King Low and Edlyn Teske
2002/062 ( PS PS.GZ PDF )
ABC - A Block Cipher
Dieter Schmidt
2002/061 ( PS PS.GZ PDF )
Strengthened Encryption in the CBC Mode
Vlastimil Klima and Tomas Rosa
2002/060 ( PS PS.GZ PDF )
A Forward-Secure Public-Key Encryption Scheme
Jonathan Katz
2002/059 ( PS PS.GZ )
Universally Composable Notions of Key Exchange and Secure Channels
Ran Canetti and Hugo Krawczyk
2002/058 ( PS PS.GZ )
Construction of UOWHF: Tree Hashing Revisited
Palash Sarkar
2002/057 ( PS PS.GZ PDF )
A Simpler Construction of CCA2-Secure Public-Key Encryption Under
General Assumptions
Yehuda Lindell
2002/056 ( PS PS.GZ PDF )
Hierarchical ID-Based Cryptography
Craig Gentry and Alice Silverberg
2002/055 ( PS PS.GZ PDF )
Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
Manoj Prabhakaran and Amit Sahai
2002/054 ( PS PS.GZ PDF )
Intrusion-Resilient Signatures, or Towards Obsoletion of Certificate
Revocation
Gene Itkis and Leonid Reyzin
2002/053 ( PS PS.GZ PDF )
Extended Validity and Consistency in Byzantine Agreement
Matthias Fitzi and Martin Hirt and Thomas Holenstein and J\"urg
Wullschleger
2002/052 ( PS PS.GZ PDF )
A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon
Order
Stefan Lucks
2002/051 ( PS PS.GZ PDF )
Fully Distributed Proxy Signature Schemes
Javier Herranz and Germ\'an S\'aez
2002/050 ( PS PS.GZ PDF )
Secret sharing schemes with three or four minimal qualified subsets
Jaume Martí-Farré and Carles Padró
2002/049 ( PS PS.GZ PDF )
Tensor Transform of Boolean Functions and Related Algebraic and
Probabilistic Properties
Alexander Kholosha
2002/048 ( PS PS.GZ PDF )
Towards a Uniform Description of Several Group Based Cryptographic
Primitives
Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt
2002/047 ( PS PS.GZ )
Universal Composition with Joint State
Ran Canetti and Tal Rabin
2002/046 ( PS PS.GZ PDF )
On the Security of Joint Signature and Encryption
Jee Hea An and Yevgeniy Dodis and Tal Rabin
2002/045 ( PS PS.GZ PDF )
Cryptanalysis of S-DES
Dr. K. S. Ooi, Brain Chin Vito
2002/044 ( PS PS.GZ PDF )
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Nicolas Courtois and Josef Pieprzyk
2002/043 ( PS PS.GZ )
Strict Polynomial-time in Simulation and Extraction
Boaz Barak and Yehuda Lindell
2002/042 ( PS PS.GZ )
A Unified Methodology For Constructing Public-Key Encryption Schemes
Secure Against Adaptive Chosen-Ciphertext Attack
Edith Elkind and Amit Sahai
2002/041 ( PS PS.GZ )
New Results on Boomerang and Rectangle Attack
Eli Biham and Orr Dunkelman and Nathan Keller
2002/040 ( PS PS.GZ PDF )
Secure Computation Without a Broadcast Channel
Shafi Goldwasser and Yehuda Lindell
2002/039 ( PS PS.GZ )
Partial Key Escrow Monitoring Scheme
Jiang Shaoquan and Zhang Yufeng
2002/038 ( -- withdrawn -- )
A Distributed RSA Signature Scheme for General Access Structures
Javier Herranz and Carles Padr\'o and Germ\'an S\'aez
2002/037 ( PS PS.GZ PDF )
An efficient semantically secure elliptic curve cryptosystem based on
KMOV scheme
David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L.
Villar
2002/036 ( PS PS.GZ )
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
Ronald Cramer and Serge Fehr
2002/035 ( PS PS.GZ PDF )
Authenticated Three Party Key Agreement Protocols from Pairings
Sattam S. Al-Riyami and Kenneth G. Paterson
2002/034 ( PS PS.GZ PDF )
An OAEP Variant With a Tight Security Proof
Jakob Jonsson
2002/033 ( PS PS.GZ )
Equivalence between semantic security and indistinguishability against
chosen ciphertext attacks
Yodai Watanabe and Junji Shikata and Hideki Imai
2002/032 ( PS PS.GZ )
Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
Y. Choie and E. Jeong and E. Lee
2002/031 ( PS PS.GZ )
A Parallelizable Design Principle for Cryptographic Hash Functions
Palash Sarkar and Paul J. Schellenberg
2002/030 ( PS PS.GZ )
Adaptive chi-square test and its application to some cryptographic
problems.
Boris Ryabko
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR