International Association for Cryptologic Research

New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
   2003/182 ( PS PS.GZ PDF )
          Chosen-Ciphertext Security from Identity-Based Encryption
          Ran Canetti, Shai Halevi, and Jonathan Katz
          
   2003/181 ( PS PS.GZ PDF )
          On the Security of Multiple Encryption or
          CCA-security+CCA-security=CCA-security?
          Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki
          Imai
          
   2003/180 ( PS PS.GZ )
          Parallelizing Explicit Formula for Arithmetic in the Jacobian
          of Hyperelliptic Curves
          Pradeep Kumar Mishra and Palash Sarkar
          
   2003/179 ( PS PS.GZ PDF )
          VMPC one-way function
          Bartosz Zoltak
          
   2003/178 ( PDF )
          Constructing Optimistic Fair Exchange Protocols from Committed
          Signatures
          Huafei Zhu
          
   2003/177 ( PS PS.GZ PDF )
          Building Secure Cryptographic Transforms, or How to Encrypt and
          MAC
          Tadayoshi Kohno and Adriana Palacio and John Black
          
   2003/176 ( PS PS.GZ PDF )
          Patterson-Wiedemann Construction Revisited
          S. Gangopadhyay and P. H. Keskar and S. Maitra
          
   2003/175 ( PS PS.GZ PDF )
          Double-Speed Safe Prime Generation
          David Naccache
          
   2003/174 ( PS PS.GZ PDF )
          Relaxing Chosen-Ciphertext Security
          Ran Canetti and Hugo Krawczyk and Jesper Nielsen
          
   2003/173 ( PS PS.GZ )
          Domain Extender for Collision Resistant Hash Functions Using a
          Directed Acyclic Graph
          Palash Sarkar
          
   2003/172 ( PS PS.GZ PDF )
          NAEP: Provable Security in the Presence of Decryption Failures
          Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and
          William Whyte
          
   2003/171 ( PS PS.GZ PDF )
          Scalable Protocols for Authenticated Group Key Exchange
          Jonathan Katz and Moti Yung
          
   2003/170 ( PS PS.GZ PDF )
          HARPS: HAshed Random Preloaded Subset Key Distribution
          Mahalingam Ramkumar and Nasir Memon
          
   2003/169 ( PS PS.GZ PDF )
          Properties of the Transformation Semigroup of the Solitaire
          Stream Cipher 
          Boris Pogorelov and Marina Pudovkina 
          
   2003/168 ( PS PS.GZ )
          Robust discretization, with an application to graphical
          passwords
          Jean-Camille Birget and Dawei Hong and Nasir Memon
          
   2003/167 ( PDF )
          Identity-based Chameleon Hash and Applications
          Giuseppe Ateniese and Breno de Medeiros 
          
   2003/166 ( PS PS.GZ PDF )
          A reduction of the space for the parallelized Pollard lambda
          search on elliptic curves over prime finite fields and on
          anomalous binary elliptic curves
          Igor Semaev
          
   2003/165 ( PDF )
          Commitment Capacity of Discrete Memoryless Channels
          Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
          
   2003/164 ( PS PS.GZ PDF )
          Identity-Based Threshold Decryption
          Joonsang Baek and Yuliang Zheng
          
   2003/163 ( PS PS.GZ PDF )
          Multipurpose Identity-Based Signcryption : A Swiss Army Knife
          for Identity-Based Cryptography
          Xavier Boyen
          
   2003/162 ( PS PS.GZ PDF )
          Cryptanalysis of the Alleged SecurID Hash Function
          Alex Biryukov and Joseph Lano and Bart Preneel
          
   2003/161 ( PS PS.GZ PDF )
          Indifferentiability, Impossibility Results on Reductions, and
          Applications to the Random Oracle Methodology
          Ueli Maurer and Renato Renner and Clemens Holenstein
          
   2003/160 ( PDF )
          Tame Transformation Signatures
          Jiun-Ming Chen and Bo-Yin Yang
          
   2003/159 ( PS PS.GZ PDF )
          An efficient variant of the RSA cryptosystem
          Cesar Alison Monteiro Paixão
          
   2003/158 ( PS PS.GZ )
          Study of Domain Extension of UOWHF and Its Optimality
          Mridul Nandi
          
   2003/157 ( PS PS.GZ )
          Some RSA-based Encryption Schemes with Tight Security Reduction
          Kaoru Kurosawa and Tsuyoshi Takagi 
          
   2003/156 ( PS PS.GZ )
          Efficient Proven Secure Public Key Steganography
          Tri Van Le
          
   2003/155 ( PDF )
          A Formal Proof of Zhu's Signature Scheme
          huafei zhu
          
   2003/154 ( PS PS.GZ )
          ManTiCore: Encryption with Joint Cipher-State Authentication
          Cheryl Beaver and Timothy Draelos and Richard Schroeppel and
          Mark Torgerson
          
   2003/153 ( PDF )
          Attack on an Identification Scheme Based on Gap Diffie-Hellman
          Problem
          Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG
          
   2003/152 ( PDF )
          Optimal Statistical Power Analysis
          Eric Brier and Christophe Clavier and Francis Olivier
          
   2003/151 ( PDF )
          Secret sharing schemes on sparse homogeneous access structures
          with rank three
          Jaume Martí-Farré and Carles Padró
          
   2003/150 ( PS PS.GZ PDF )
          On the random-oracle methodology as applied to
          length-restricted signature schemes
          Ran Canetti and Oded Goldreich and Shai Halevi
          
   2003/149 ( -- withdrawn -- )
          Forward-Secure Hierarchical ID-Based Cryptography
          Danfeng Yao and Anna Lysyanskaya
          
   2003/148 ( PS PS.GZ PDF )
          A Tweakable Enciphering Mode
          Shai Halevi and Phillip Rogaway
          
   2003/147 ( PS PS.GZ PDF )
          A Parallelizable Enciphering Mode
          Shai Halevi and Phillip Rogaway
          
   2003/146 ( PS PS.GZ PDF )
          Breaking and Repairing Optimistic Fair Exchange from PODC 2003
          Yevgeniy Dodis and Leonid Reyzin
          
   2003/145 ( PS PS.GZ )
          Symmetric Authentication Within a Simulatable Cryptographic
          Library
          Michael Backes and Birgit Pfitzmann and Michael Waidner
          
   2003/144 ( PS PS.GZ PDF )
          ID-based tripartite key agreement with signatures
          Divya Nalla
          
   2003/143 ( PS PS.GZ PDF )
          Elliptic curves suitable for pairing based cryptography
          Friederike Brezing and Annegret Weng
          
   2003/142 ( PS PS.GZ )
          A New Tree based Domain Extension of UOWHF
          Mridul Nandi
          
   2003/141 ( PS PS.GZ PDF )
          General Composition and Universal Composability in Secure
          Multi-Party Computation
          Yehuda Lindell
          
   2003/140 ( PS PS.GZ PDF )
          Trading-Off Type-Inference Memory Complexity Against
          Communication
          Konstantin Hypp\"onen and David Naccache and Elena Trichina and
          Alexei Tchoulkine
          
   2003/139 ( PDF )
          On the Randomness of the Editing Generator
          Enjian Bai and Guozhen Xiao
          
   2003/138 ( PS PS.GZ )
          Permutation graphs, fast forward permutations, and
          Boaz Tsaban
          
   2003/137 ( PS PS.GZ )
          Bernoulli numbers and the probability of a birthday surprise
          Boaz Tsaban
          
   2003/136 ( PS PS.GZ )
          Efficient linear feedback shift registers with maximal period
          Boaz Tsaban and Uzi Vishne
          
   2003/135 ( PS PS.GZ PDF )
          Collision Attack on Reduced-Round Camellia
          Wen-Ling Wu and Deng-Guo Feng
          
   2003/134 ( -- withdrawn -- )
          Direct Sum of Non Normal and Normal Bent Functions Always
          Produces Non Normal Bent Functions
          Sugata Gangopadhyay and Subhamoy Maitra
          
   2003/133 ( PS PS.GZ PDF )
          Minimum Distance between Bent and 1-resilient Boolean Functions
          Soumen Maity and Subhamoy Maitra
          
   2003/132 ( PS PS.GZ )
          Guaranteeing the diversity of number generators
          Adi Shamir and Boaz Tsaban
          
   2003/131 ( PS PS.GZ PDF )
          Homomorphic public-key systems based on subgroup membership
          problems
          Kristian Gjøsteen
          
   2003/130 ( PS PS.GZ PDF )
          On the Pseudorandomness of KASUMI Type Permutations
          Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa
          
   2003/129 ( PS PS.GZ PDF )
          Attack on Han et al.'s ID-based Confirmer (Undeniable)
          Signature at ACM-EC'03 
          Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
          
   2003/128 ( PS PS.GZ )
          Weak Fields for ECC
          Alfred Menezes and Edlyn Teske and Annegret Weng
          
   2003/127 ( PDF )
          Using Information Theory Approach to Randomness Testing
          B. Ya. Ryabko and V.A. Monarev
          
   2003/126 ( PS PS.GZ PDF )
          Certificateless Public Key Cryptography
          Sattam S. Al-Riyami and Kenneth G. Paterson
          
   2003/125 ( PS PS.GZ PDF )
          Algebraic Attacks on Combiners with Memory and Several Outputs
          Nicolas T. Courtois
          
   2003/124 ( PS PS.GZ )
          A General Correlation Theorem
          Kishan Chand Gupta and Palash Sarkar 
          
   2003/123 ( PS PS.GZ PDF )
          Assessing security of some group based cryptosystems
          Vladimir Shpilrain
          
   2003/122 ( PDF )
          Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party
          Key Agreement Protocols
          Kyungah Shim
          
   2003/121 ( PS PS.GZ )
          A Cryptographically Sound Security Proof of the
          Needham-Schroeder-Lowe Public-Key Protocol
          Michael Backes and Birgit Pfitzmann
          
   2003/120 ( PS PS.GZ PDF )
          Physically Observable Cryptography
          Silvio Micali and Leonid Reyzin
          
   2003/119 ( PS PS.GZ PDF )
          How Secure Are FPGAs in Cryptographic Applications?
          Thomas Wollinger and Christof Paar
          
   2003/118 ( PS PS.GZ )
          Visual Crypto Displays Enabling Secure Communications
          Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring,
          Marten van Dijk
          
   2003/117 ( PDF )
          An identity-based ring signature scheme from bilinear pairings
          Chih-Yin Lin and Tzong-Chen Wu
          
   2003/116 ( PS PS.GZ PDF )
          A New ID-based Group Signature Scheme from Bilinear Pairings
          Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim 
          
   2003/115 ( PDF )
          Cryptanalysis of ID-based Tripartite Authenticated Key
          Agreement Protocols
          Kyungah Shim
          
   2003/114 ( PS PS.GZ )
          Unifying Simulatability Definitions in Cryptographic Systems
          under Different Timing Assumptions
          Michael Backes
          
   2003/113 ( PS PS.GZ PDF )
          Security Analysis of Shim's Authenticated Key Agreement
          Protocols from Pairings
          Hung-Min Sun and Bin-Tsan Hsieh
          
   2003/112 ( PS PS.GZ )
          Accumulating Composites and Improved Group Signing
          Gene Tsudik and Shouhuai Xu
          
   2003/111 ( PDF )
          Further Cryptanalysis of some Proxy Signature Schemes
          Jiqiang Lv and Jingwei Liu and Xinmei Wang
          
   2003/110 ( PDF )
          Proposal on Personal Authentication System in which Biological
          Information is embedded in Cryptosystem Key
          Yukio Itakura and Shigeo Tsujii
          
   2003/109 ( PS PS.GZ PDF )
          Crytanalysis of SAFER++
          Alex Biryukov and Christophe De Canni\`ere and Gustaf
          Dellkrantz
          
   2003/108 ( PS PS.GZ )
          Novel Cyclic and Algebraic Properties of AES
          Tri Van Le
          
   2003/107 ( PS PS.GZ PDF )
          Fujisaki-Okamoto IND-CCA hybrid encryption revisited
          David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and
          Jorge L. Villar
          
   2003/106 ( PS PS.GZ PDF )
          High-speed encryption and authentication: A patent-free
          solution for 10 Gbps network devices
          Tadayoshi Kohno and John Viega and Doug Whiting
          
   2003/105 ( PS PS.GZ )
          On Diophantine Complexity and Statistical Zero-Knowledge
          Arguments
          Helger Lipmaa
          
   2003/104 ( PS PS.GZ PDF )
          New Proxy Signature, Proxy Blind Signature and Proxy Ring
          Signature Schemes from Bilinear Pairing
          Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin 
          
   2003/103 ( PS PS.GZ PDF )
          Security analysis on Nalla-Reddy's ID-based tripartite
          authenticated key agreement protocols
          Zhongliang Chen
          
   2003/102 ( PDF )
          Length-Based Attacks for Certain Group Based Encryption
          Rewriting Systems
          J. Hughes, and A. Tannenbaum
          
   2003/101 ( -- withdrawn -- )
          Cryptanalysis of HFE
          Ilia Toli
          
   2003/100 ( PS PS.GZ PDF )
          Bounded-Concurrent Secure Two-Party Computation Without Set-Up
          Assumptions
          Yehuda Lindell
          
   2003/099 ( PS PS.GZ PDF )
          Algorithms in Braid Groups
          Matthew J. Campagna
          
   2003/098 ( PDF )
          Side Channel Attacks on CBC Encrypted Messages in the PKCS#7
          Format
          Vlastimil Klima and Tomas Rosa
          
   2003/097 ( PS PS.GZ PDF )
          Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic
          Curves
          Jan Pelzl and Thomas Wollinger and Christof Paar
          
   2003/096 ( PS PS.GZ PDF )
          Secure Proxy Signature Schemes for Delegation of Signing Rights
          Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi
          
   2003/095 ( PS PS.GZ PDF )
          Public Key Trace and Revoke Scheme Secure against Adaptive
          Chosen Ciphertext Attack
          Yevgeniy Dodis and Nelly Fazio
          
   2003/094 ( PS PS.GZ PDF )
          Trace Zero Subvariety for Cryptosystems
          Tanja Lange
          
   2003/093 ( PS PS.GZ PDF )
          More Efficient Provably Secure Steganography
          Leonid Reyzin and Scott Russell
          
   2003/092 ( PS PS.GZ PDF )
          Provably-Secure Enhancement on 3GPP Authentication and Key
          Agreement Protocol
          Muxiang Zhang
          
   2003/091 ( PS PS.GZ )
          Sequential Aggregate Signatures from Trapdoor Homomorphic
          Permutations
          Hovav Shacham
          
   2003/090 ( PDF )
          A Structured Multisignature Scheme from the Gap Diffie-Hellman
          Group
          Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang
          
   2003/089 ( PS PS.GZ PDF )
          Efficient Public Key Generation for Multivariate Cryptosystems
          Christopher Wolf
          
   2003/088 ( PDF )
          Elliptic Curve Point Multiplication
          A.G.Rostovtsev and E.B.Makhovenko
          
   2003/087 ( PS PS.GZ PDF )
          A Practical Elliptic Curve Public Key Encryption Scheme
          Provably Secure Against Adaptive Chosen-message Attack
          huafei zhu
          
   2003/086 ( PS PS.GZ PDF )
          On the Selection of Pairing-Friendly Groups
          Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
          
   2003/085 ( PS PS.GZ )
          A defect of the implementation schemes of the TTM cryptosystem
          Jintai Ding, Dieter Schmidt 
          
   2003/084 ( PS PS.GZ )
          Cryptanalysis of an implementation scheme of the Tamed
          Transformation Method cryptosystem
          Jintai Ding, Timonthy Hodges
          
   2003/083 ( PS PS.GZ PDF )
          A Forward-Secure Public-Key Encryption Scheme
          Ran Canetti and Shai Halevi and Jonathan Katz
          
   2003/082 ( PS PS.GZ PDF )
          Stronger Security Bounds for OMAC, TMAC and XCBC
          Tetsu Iwata and Kaoru Kurosawa
          
   2003/081 ( PDF )
          Primitive Specification for SOBER-128
          Philip Hawkes and Greg Rose
          
   2003/080 ( PS PS.GZ PDF )
          Non-interactive and Reusable Non-malleable Commitment Schemes
          Ivan Damgård and Jens Groth
          
   2003/079 ( PS PS.GZ PDF )
          Fast arithmetic on Jacobians of Picard curves
          Stéphane Flon and Roger Oyono
          
   2003/078 ( PS PS.GZ PDF )
          Relation between simulator-based and comparison-based
          definitions of semantic security
          Yodai Watanabe and Junji Shikata
          
   2003/077 ( PS PS.GZ PDF )
          An Un-Instantiable Random-Oracle-Model Scheme for a
          Hybrid-Encryption Problem
          Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
          
   2003/076 ( PS PS.GZ PDF )
          Goldbachs Conjecture on ECDSA Protocols
          N. Vijayarangan, Nitin Agarwal, S. Kasilingam
          
   2003/075 ( PS PS.GZ )
          Almost Security of Cryptographic Boolean Functions
          Kaoru Kurosawa
          
   2003/074 ( PDF )
          Divisible Voting Scheme
          Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata
          
   2003/073 ( PDF )
          A Scheme for obtaining a Warrant Message from the Digital Proxy
          Signatures
          Sunder Lal and Amit K Awasthi
          
   2003/072 ( PDF )
          Proxy Blind Signature Scheme
          Sunder Lal and Amit K Awasthi
          
   2003/071 ( PS PS.GZ PDF )
          How to Protect Against a Militant Spammer
          Markus Jakobsson and John Linn and Joy Algesheimer
          
   2003/070 ( PS PS.GZ PDF )
          A Critique of CCM
          P. Rogaway and D. Wagner
          
   2003/069 ( PS PS.GZ PDF )
          A Conventional Authenticated-Encryption Mode
          M. Bellare and P. Rogaway and D. Wagner
          
   2003/068 ( PS PS.GZ PDF )
          On the Security of Some Proxy Signature Schemes
          Hung-Min Sun and Bin-Tsan Hsieh
          
   2003/067 ( PS PS.GZ PDF )
          Forking Lemmas in the Ring Signatures' Scenario
          Javier Herranz and Germ\'an S\'aez
          
   2003/066 ( PS PS.GZ PDF )
          Signcryption scheme for Identity-based Cryptosystems
          Divya Nalla, K.C.Reddy 
          
   2003/065 ( PS PS.GZ PDF )
          Hash Function Balance and its Impact on Birthday Attacks
          Mihir Bellare and Tadayoshi Kohno
          
   2003/064 ( PS PS.GZ PDF )
          On the Optimality of Linear, Differential and Sequential
          Distinguishers
          Pascal Junod
          
   2003/063 ( PS PS.GZ PDF )
          Initiator-Resilient Universally Composable Key Exchange
          Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt 
          
   2003/062 ( PS PS.GZ )
          An n-party Key Agreement Scheme using Bilinear Map
          Rana Barua and Ratna Dutta and Palash Sarkar
          
   2003/061 ( PDF )
          Hidden Polynomial Cryptosystems
          Ilia Toli
          
   2003/060 ( PS PS.GZ PDF )
          Isomorphism Classes of Picard Curves over Finite Fields
          Jong Won Lee
          
   2003/059 ( -- withdrawn -- )
          A Transitive Signature Scheme Provably Secure Against Adaptive
          Chosen-message Attack
          Huafei Zhu and Bao Feng and Robert H. Deng
          
   2003/058 ( PS PS.GZ PDF )
          An Elliptic Curve Trapdoor System
          Edlyn Teske
          
   2003/057 ( PS PS.GZ )
          Secure Multiplication of Shared Secrets in the Exponent
          Mario Di Raimondo and Rosario Gennaro
          
   2003/056 ( PS PS.GZ PDF )
          Computing of Trust in Distributed Networks
          Huafei Zhu and Bao Feng and Robert H. Deng
          
   2003/055 ( PDF )
          A New Approach to Prevent Blackmailing in E-Cash
          Xiaofeng Chen and Fangguo Zhang and Yumin Wang
          
   2003/054 ( PS PS.GZ PDF )
          ID based Cryptosystems with Pairing on Elliptic Curve
          Ryuichi SAKAI and Masao KASAHARA
          
   2003/053 ( PS PS.GZ )
          Tate-pairing implementations for tripartite key agreement
          Iwan Duursma and Hyang-Sook Lee
          
   2003/052 ( PDF )
          Attacking RSA-based Sessions in SSL/TLS
          Vlastimil Klima and Ondrej Pokorny and Tomas Rosa
          
   2003/051 ( PS PS.GZ )
          How to Predict the Output of a Hardware Random Number Generator
          Markus Dichtl
          
   2003/050 ( PS PS.GZ PDF )
          Concealment and its Applications to Authenticated Encryption
          Yevgeniy Dodis and Jee Hea An
          
   2003/049 ( PS PS.GZ PDF )
          Hidden Number Problem in Small Subgroups
          Igor Shparlinski and Arne Winterhof
          
   2003/048 ( PS PS.GZ PDF )
          Compounding Secret Sharing Schemes
          E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera 
          
   2003/047 ( PS PS.GZ PDF )
          A Construction of 100 bit Public-Key Cryptosystem and Digital
          Signature Scheme
          Masao KASAHARA and Ryuichi SAKAI
          
   2003/046 ( PS PS.GZ PDF )
          Remarks on Saeednia's Identity-based Society Oriented Signature
          Scheme with Anonymous Signers
          Guilin Wang, and Bo Zhu
          
   2003/045 ( PDF )
          An algorithm to obtain an RSA modulus with a large private key
          L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A.
          Queiruga Dios
          
   2003/044 ( -- withdrawn -- )
          Signcryption scheme for Identity-based Cryptosystems
          Divya Nalla, K.C.Reddy 
          
   2003/043 ( PS PS.GZ PDF )
          Parallel Signcryption with OAEP, PSS-R, and other Feistel
          Paddings
          Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish
          
   2003/042 ( PS PS.GZ )
          Timed Fair Exchange of Standard Signatures
          Juan A. Garay and Carl Pomerance
          
   2003/041 ( PS PS.GZ )
          A new statistical distinguisher for the shrinking generator
          Jovan Dj. Golic and Renato Menicocci
          
   2003/040 ( PS PS.GZ )
          Computing Walsh Transform from the Algebraic Normal Form of a
          Boolean Function
          Kishan Chand Gupta and Palash Sarkar
          
   2003/039 ( PS PS.GZ PDF )
          Torus-based cryptography
          Karl Rubin and Alice Silverberg
          
   2003/038 ( PS PS.GZ PDF )
          Pretty-Simple Password-Authenticated Key-Exchange Under
          Standard Assumptions
          Kazukuni Kobara and Hideki Imai
          
   2003/037 ( PS PS.GZ PDF )
          Strengthening Zero-Knowledge Protocols using Signatures
          Juan A. Garay and Philip MacKenzie and Ke Yang
          
   2003/036 ( PS PS.GZ PDF )
          Cryptanalysis of a public-key encryption scheme based on the
          polynomial reconstruction problem
          Jean-Sebastien Coron
          
   2003/035 ( PDF )
          On alternative approach for verifiable secret sharing
          Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
          


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR