International Association for Cryptologic Research

New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
2002/080 ( PS PS.GZ PDF )
     Applications of Multilinear Forms to Cryptography
     Dan Boneh and Alice Silverberg
2002/079 ( PS PS.GZ )
     On the efficiency of the Clock Control Guessing Attack
     Erik Zenner
2002/078 ( PS PS.GZ PDF )
     Provably Fixing the SSH Binary Packet Protocol
     Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre
2002/077 ( PS PS.GZ PDF )
     Key-Insulated Public-Key Cryptosystems
     Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung
2002/076 ( PDF )
     Attack on Private Signature Keys of the OpenPGP Format, PGP(TM)
     Programs and Other Applications Compatible with OpenPGP
     Vlastimil Klima and Tomas Rosa
2002/075 ( PDF )
     Fault based cryptanalysis of the Advanced Encryption Standard
     J.\ Bl\"oemer and J.-P.\ Seifert
2002/074 ( PS PS.GZ )
     How to repair ESIGN
     Louis Granboulan
2002/073 ( PS PS.GZ PDF )
     Fault attacks on RSA with CRT: Concrete Results and Practical
     C.\ Aum\"uller and P.\ Bier and P. Hofreiter and W. Fischer and J.-P.
2002/072 ( PS PS.GZ PDF )
     Authenticated Identity-Based Encryption
     Ben Lynn
2002/071 ( PDF )
     Further Results and Considerations on Side Channel Attacks on RSA
     Vlastimil Klima and Tomas Rosa
2002/070 ( PS PS.GZ PDF )
     Weak Keys in MST1
     Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Consuelo
     Martinez and Rainer Steinwandt
2002/069 ( PS PS.GZ PDF )
     A Distributed and Computationally Secure Key Distribution Scheme
     Vanesa Daza and Javier Herranz and Carles Padr\'o and Germ\'an S\'aez
2002/068 ( PS PS.GZ )
     Improved key recovery of level 1 of the Bluetooth Encryption System
     Scott Fluhrer
2002/067 ( PS PS.GZ PDF )
     (Not So) Random Shuffles of RC4
     Ilya Mironov
2002/066 ( PS PS.GZ )
     Black-Box Analysis of the Block-Cipher-Based Hash-Function
     Constructions from PGV
     John Black and Phillip Rogaway and Thomas Shrimpton
2002/065 ( PS PS.GZ PDF )
     Secure Channels based on Authenticated Encryption Schemes: A Simple
     Chanathip Namprempre
2002/064 ( PS PS.GZ PDF )
     Protecting against Key Exposure: Strongly Key-Insulated Encryption with
     Optimal Threshold
     Mihir Bellare and Adriana Palacio
2002/063 ( PS PS.GZ )
     On some Attacks on Multi-prime RSA
     M Jason Hinek and Mo King Low and Edlyn Teske
2002/062 ( PS PS.GZ PDF )
     ABC - A Block Cipher
     Dieter Schmidt
2002/061 ( PS PS.GZ PDF )
     Strengthened Encryption in the CBC Mode
     Vlastimil Klima and Tomas Rosa
2002/060 ( PS PS.GZ PDF )
     A Forward-Secure Public-Key Encryption Scheme
     Jonathan Katz
2002/059 ( PS PS.GZ )
     Universally Composable Notions of Key Exchange and Secure Channels
     Ran Canetti and Hugo Krawczyk
2002/058 ( PS PS.GZ )
     Construction of UOWHF: Tree Hashing Revisited
     Palash Sarkar
2002/057 ( PS PS.GZ PDF )
     A Simpler Construction of CCA2-Secure Public-Key Encryption Under
     General Assumptions
     Yehuda Lindell
2002/056 ( PS PS.GZ PDF )
     Hierarchical ID-Based Cryptography
     Craig Gentry and Alice Silverberg
2002/055 ( PS PS.GZ PDF )
     Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
     Manoj Prabhakaran and Amit Sahai
2002/054 ( PS PS.GZ PDF )
     Intrusion-Resilient Signatures, or Towards Obsoletion of Certificate
     Gene Itkis and Leonid Reyzin
2002/053 ( PS PS.GZ PDF )
     Extended Validity and Consistency in Byzantine Agreement
     Matthias Fitzi and Martin Hirt and Thomas Holenstein and J\"urg
2002/052 ( PS PS.GZ PDF )
     A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon
     Stefan Lucks
2002/051 ( PS PS.GZ PDF )
     Fully Distributed Proxy Signature Schemes
     Javier Herranz and Germ\'an S\'aez
2002/050 ( PS PS.GZ PDF )
     Secret sharing schemes with three or four minimal qualified subsets
     Jaume Martí-Farré and Carles Padró
2002/049 ( PS PS.GZ PDF )
     Tensor Transform of Boolean Functions and Related Algebraic and
     Probabilistic Properties
     Alexander Kholosha
2002/048 ( PS PS.GZ PDF )
     Towards a Uniform Description of Several Group Based Cryptographic
     Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt
2002/047 ( PS PS.GZ )
     Universal Composition with Joint State
     Ran Canetti and Tal Rabin
2002/046 ( PS PS.GZ PDF )
     On the Security of Joint Signature and Encryption
     Jee Hea An and Yevgeniy Dodis and Tal Rabin
2002/045 ( PS PS.GZ PDF )
     Cryptanalysis of S-DES
     Dr. K. S. Ooi, Brain Chin Vito
2002/044 ( PS PS.GZ PDF )
     Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
     Nicolas Courtois and Josef Pieprzyk
2002/043 ( PS PS.GZ )
     Strict Polynomial-time in Simulation and Extraction
     Boaz Barak and Yehuda Lindell
2002/042 ( PS PS.GZ )
     A Unified Methodology For Constructing Public-Key Encryption Schemes
     Secure Against Adaptive Chosen-Ciphertext Attack
     Edith Elkind and Amit Sahai
2002/041 ( PS PS.GZ )
     New Results on Boomerang and Rectangle Attack
     Eli Biham and Orr Dunkelman and Nathan Keller
2002/040 ( PS PS.GZ PDF )
     Secure Computation Without a Broadcast Channel
     Shafi Goldwasser and Yehuda Lindell
2002/039 ( PS PS.GZ )
     Partial Key Escrow Monitoring Scheme
     Jiang Shaoquan and Zhang Yufeng
2002/038 ( -- withdrawn -- )
     A Distributed RSA Signature Scheme for General Access Structures
     Javier Herranz and Carles Padr\'o and Germ\'an S\'aez
2002/037 ( PS PS.GZ PDF )
     An efficient semantically secure elliptic curve cryptosystem based on
     KMOV scheme
     David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L.
2002/036 ( PS PS.GZ )
     Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
     Ronald Cramer and Serge Fehr
2002/035 ( PS PS.GZ PDF )
     Authenticated Three Party Key Agreement Protocols from Pairings
     Sattam S. Al-Riyami and Kenneth G. Paterson
2002/034 ( PS PS.GZ PDF )
     An OAEP Variant With a Tight Security Proof
     Jakob Jonsson
2002/033 ( PS PS.GZ )
     Equivalence between semantic security and indistinguishability against
     chosen ciphertext attacks
     Yodai Watanabe and Junji Shikata and Hideki Imai
2002/032 ( PS PS.GZ )
     Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
     Y. Choie and E. Jeong and E. Lee
2002/031 ( PS PS.GZ )
     A Parallelizable Design Principle for Cryptographic Hash Functions
     Palash Sarkar and Paul J. Schellenberg
2002/030 ( PS PS.GZ )
     Adaptive chi-square test and its application to some cryptographic
     Boris Ryabko

[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR