New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2003/034 ( PS PS.GZ PDF )
On the (In)security of the Fiat-Shamir Paradigm
Shafi Goldwasser and Yael Tauman
2003/033 ( PDF )
Integral Cryptanalysis on reduced-round Safer++
Gilles Piret and Jean-Jacques Quisquater
2003/032 ( PS PS.GZ PDF )
A Framework for Password-Based Authenticated Key Exchange
Rosario Gennaro and Yehuda Lindell
2003/031 ( PS PS.GZ PDF )
Cryptographic Tamper Evidence
Gene Itkis
2003/030 ( PS PS.GZ PDF )
Efficient Multi-Party Computation over Rings
Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz
2003/029 ( PS PS.GZ PDF )
Universal Padding Schemes for RSA with Optimal Bandwidth of Message
Recovery
Wenbo Mao and John Malone-Lee
2003/028 ( PS PS.GZ PDF )
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient
Faults
Mathieu Ciet and Marc Joye
2003/027 ( PS PS.GZ )
Cryptographic Randomized Response Techniques
Andris Ambainis and Markus Jakobsson and Helger Lipmaa
2003/026 ( PDF )
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to
Elliptic Curves
Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar
2003/025 ( PS PS.GZ )
Homomorphic public-key cryptosystems and encrypting boolean circuits
D.Grigoriev. I.Ponomarenko
2003/024 ( PS PS.GZ PDF )
On Modeling IND-CCA Security in Cryptographic Protocols
Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
2003/023 ( PS PS.GZ PDF )
New identity based signcryption schemes from pairings
Benoît Libert and Jean-Jacques Quisquater
2003/022 ( PS PS.GZ PDF )
Did Filiol Break AES ?
Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas
Pornin and Michael Scott
2003/021 ( PS PS.GZ PDF )
An Online Auction Mechanism with Tradeoffs Between Bid Privacy,
Cognitive Cost and Number of Rounds
Helger Lipmaa
2003/020 ( PS PS.GZ PDF )
Attacks based on Conditional Correlations against the Nonlinear Filter
Generator
Bernhard L\"ohlein
2003/019 ( PS PS.GZ )
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy
Problem
Jung Hee Cheon and Byungheup Jun
2003/018 ( PS PS.GZ PDF )
An Authenticated Group Key Agreement Protocol on Braid groups
HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
2003/017 ( PS PS.GZ )
Perfect Hash Families with Few Functions
Simon R. Blackburn
2003/016 ( PS PS.GZ PDF )
A Threshold GQ Signature Scheme
Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng
2003/015 ( PS PS.GZ PDF )
A Universally Composable Cryptographic Library
Michael Backes and Birgit Pfitzmann and Michael Waidner
2003/014 ( PS PS.GZ )
Hiji-bij-bij: A New Stream Cipher with Self-Synchronizing and MAC Modes
of Operation
Palash Sarkar
2003/013 ( PS PS.GZ PDF )
Security Constraints on the Oswald-Aigner Exponentiation Algorithm
Colin D. Walter
2003/012 ( PS PS.GZ PDF )
The number of initial states of the RC4 cipher with the same cycle
structure
Marina Pudovkina
2003/011 ( PS PS.GZ PDF )
Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
Fangguo Zhang and Kwangjo Kim
2003/010 ( PDF )
Differential Fault Analysis on A.E.S.
P. Dusart, G. Letourneux and O. Vivolo
2003/009 ( PS PS.GZ )
Domain Extenders for UOWHFs: A Generic Lower Bound on Key Expansion and
a Finite Binary Tree Algorithm
Palash Sarkar
2003/008 ( PS PS.GZ )
DFA on AES
Christophe Giraud
2003/007 ( PS PS.GZ PDF )
A Price Negotiable Transaction System
Huafei Zhu
2003/006 ( PS PS.GZ PDF )
Secure Multi-Party Computation from any Linear Secret Sharing Scheme
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005 ( PS PS.GZ PDF )
Distributing the Encryption and Decryption of a Block Cipher
Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild
2003/004 ( PS PS.GZ PDF )
ID-based tripartite Authenticated Key Agreement Protocols from pairings
Divya Nalla, and K.C.Reddy
2003/003 ( PS PS.GZ )
Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers -
The AES Case
Eric FILIOL
2003/002 ( PS PS.GZ PDF )
Imperfect Decryption and an Attack on the NTRU Encryption Scheme
John Proos
2003/001 ( PDF )
A Mode of Operation with Partial Encryption and Message Integrity
Philip Hawkes and Gregory G. Rose
2002/195 ( PS PS.GZ )
An addition to the paper: A polarisation based visual crypto system and
its secret sharing schemes
H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen, P. Tuyls
2002/194 ( PS PS.GZ )
A polarisation based Visual Crypto System and its Secret Sharing
Schemes
P. Tuyls, H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen
2002/193 ( PS PS.GZ PDF )
A Note on Ideal Tripartite Access Structures
Michael J. Collins
2002/192 ( PS PS.GZ PDF )
Proofs of Security for Password-Based Key Exchange (IEEE P1363 AuthA
Protocol and Extensions)
Emmanuel Bresson and Olivier Chevassut and David Pointcheval
2002/191 ( PS PS.GZ )
A Linearization Attack on the Bluetooth Key Stream Generator
Frederik Armknecht
2002/190 ( PS PS.GZ )
Parallelizable Authentication Trees
Eric Hall and Charanjit S. Jutla
2002/189 ( PS PS.GZ )
Bit-Slice Auction Circuit
Kaoru Kurosawa and Wakaha Ogata
2002/188 ( PS PS.GZ PDF )
Chosen-Ciphertext Attacks on Optimized NTRU
Jin Hong and Jae Woo Han and Daesung Kwon and Daewan Han
2002/187 ( PS PS.GZ PDF )
Entity Authentication Schemes Using Braid Word Reduction
Herv\'e SIBERT and Patrick DEHORNOY and Marc GIRAULT
2002/186 ( PS PS.GZ )
Zero-Knowledge twenty years after its invention
Oded Goldreich
2002/185 ( PDF )
Turing, a fast stream cipher
Greg Rose and Philip Hawkes
2002/184 ( PS PS.GZ PDF )
Identity Based Authenticated Key Agreement from Pairings
Liqun Chen and Caroline Kudla
2002/183 ( PS PS.GZ PDF )
Simple backdoors to RSA key generation
Claude Cr\'epeau and Alain Slakmon
2002/182 ( PS PS.GZ )
Oblivious Keyword Search
Wakaha Ogata and Kaoru Kurosawa
2002/181 ( PS PS.GZ PDF )
Counting Points on the Jacobian Variety of a Hyperelliptic Curve
defined by $y^2=x^5+ax$ over a Prime Field
Eisaku Furukawa and Mitsuru Kawazoe and Tetsuya Takahashi
2002/180 ( PS PS.GZ )
OMAC: One-Key CBC MAC
Tetsu Iwata and Kaoru Kurosawa
2002/179 ( PS PS.GZ PDF )
Parallel Algorithm for Multiplication on Elliptic Curves
Juan Manuel Garcia Garcia and Rolando Menchaca Garcia
2002/178 ( PS PS.GZ PDF )
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
Fangguo Zhang, Shengli Liu and Kwangjo Kim
2002/177 ( PDF )
two attacks on xia-you Group Signature
Jianhong Zhang Jilin Wang Yumin Wang
2002/176 ( PS PS.GZ PDF )
Theoretical Analysis of ``Correlations in RC6''
Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
2002/175 ( PS PS.GZ )
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham
2002/174 ( PS PS.GZ PDF )
A Designer's Guide to KEMs
Alexander W. Dent
2002/173 ( PS PS.GZ PDF )
Efficient Group Signatures without Trapdoors
Giuseppe Ateniese and Breno de Medeiros
2002/172 ( PS PS.GZ PDF )
PECDSA. How to build a DL-based digital signature scheme with the best
proven security
Louis Granboulan
2002/171 ( PS PS.GZ PDF )
Statistical weaknesses in the alleged RC4 keystream generator
Marina Pudovkina
2002/170 ( PS PS.GZ )
An Analysis of RMAC
Jack Lloyd
2002/169 ( PS PS.GZ PDF )
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
D. Page
2002/168 ( PS PS.GZ PDF )
New Signature Scheme Using Conjugacy Problem
Ki Hyoung Ko and Doo Ho Choi and Mi Sung Cho and Jang Won Lee
2002/167 ( PS PS.GZ PDF )
Cryptanalysis of Two New Signature Schemes
Fangguo Zhang and Kwangjo Kim
2002/166 ( PS PS.GZ PDF )
Multi-Party Authenticated Key Agreement Protocols from Multilinear
Forms
Ho-Kyu Lee and Hyang-Sook Lee and Young-Ran Lee
2002/165 ( PS PS.GZ PDF )
Coercion-Resistant Electronic Elections
Ari Juels and Markus Jakobsson
2002/164 ( PS PS.GZ )
Authenticated ID-based Key Exchange and remote log-in with insecure
token and PIN number
Mike Scott
2002/163 ( PS PS.GZ PDF )
Man-in-the-Middle in Tunnelled Authentication Protocols
N. Asokan and Valtteri Niemi and Kaisa Nyberg
2002/162 ( PS PS.GZ PDF )
On Constructing Locally Computable Extractors and Cryptosystems in the
Bounded Storage Model
Salil P. Vadhan
2002/161 ( PS PS.GZ PDF )
Practical Verifiable Encryption and Decryption of Discrete Logarithms
Jan Camenisch and Victor Shoup
2002/160 ( PS PS.GZ PDF )
Cryptology and Physical Security: Rights Amplification in Master-Keyed
Mechanical Locks
Matt Blaze
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR