New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
   2003/253 ( PDF )
          Aspects of Hyperelliptic Curves over Large Prime Fields in
          Software Implementations
          Roberto Maria Avanzi
          
   2003/252 ( PS PS.GZ PDF )
          On Simulation-Sound Trapdoor Commitments
          Philip MacKenzie and Ke Yang
          
   2003/251 ( PDF )
          Isomorphism Classes of Hyperelliptic Curves of genus 3 over
          finite fields
          EunKyung Jeong
          
   2003/250 ( PS PS.GZ PDF )
          Breaking the Stream Cipher Whitenoise
          Hongjun Wu
          
   2003/249 ( PDF )
          Software Specifications For Tinnitus Utilizing Whitenoise
          Substitution Stream Cipher 
          Stephen Boren and Andre Brisson
          
   2003/248 ( PS PS.GZ PDF )
          Efficient Implementation of Genus Three Hyperelliptic Curve
          Cryptography over GF(2^n)
          Izuru Kitamura and Masanobu Katagi
          
   2003/247 ( PDF )
          ID-based Authenticated Two Round Multi-Party Key Agreement
          Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
          
   2003/246 ( PDF )
          A Hybrid Encryption Protocol for Quantum Digital Signature
          Xin L¨¹ and Deng-guo Feng
          
   2003/245 ( PS PS.GZ PDF )
          A Key Substitution Attack on SFLASH^{v3}
          Willi Geiselmann and Rainer Steinwandt
          
   2003/244 ( PS PS.GZ PDF )
          Efficient Public Key Steganography Secure Against Adaptively
          Chosen Stegotext Attacks
          Tri Van Le and Kaoru Kurosawa
          
   2003/243 ( PS PS.GZ PDF )
          An Attack on Not-interactive Designated Verifier Proofs for
          Undeniable Signatures
          Guilin Wang
          
   2003/242 ( PS PS.GZ PDF )
          Improved Weil and Tate pairings for elliptic and hyperelliptic
          curves
          Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery
          
   2003/241 ( PS PS.GZ PDF )
          Hybrid Broadcast Encryption and Security Analysis
          Shaoquan Jiang and Guang Gong
          
   2003/240 ( PS PS.GZ PDF )
          How to Break and Repair a Universally Composable Signature
          Functionality
          Michael Backes and Dennis Hofheinz
          
   2003/239 ( PS PS.GZ PDF )
          On Universally Composable Notions of Security for Signature,
          Certification and Authentication
          Ran Canetti
          
   2003/238 ( PDF )
          Chameleon Signature from Bilinear Pairing
          Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
          
   2003/237 ( PS PS.GZ PDF )
          Low-Cost Solutions for Preventing Simple Side-Channel Analysis:
          Side-Channel Atomicity
          Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye
          
   2003/236 ( PDF )
          Combinational Logic Design for AES SubByte Transformation on
          Masked Data
          Elena Trichina
          
   2003/235 ( PS PS.GZ PDF )
          Fuzzy Extractors and Cryptography, or How to Use Your
          Fingerprints
          Yevgeniy Dodis and Leonid Reyzin and Adam Smith
          
   2003/234 ( PS PS.GZ )
          Generalized Key-Evolving Signature Schemes or How to Foil an
          Armed Adversary
          Gene Itkis and Peng Xie
          
   2003/233 ( PS PS.GZ PDF )
          Public Key Steganography
          Luis von Ahn and Nicholas J. Hopper
          
   2003/232 ( PS PS.GZ PDF )
          The Statistical Zero-knowledge Proof for Blum Integer Based on
          Discrete Logarithm
          Chunming Tang and Zhuojun Liu and Jinwang Liu
          
   2003/231 ( PS PS.GZ PDF )
          Public-Key Steganography with Active Attacks
          Michael Backes and Christian Cachin
          
   2003/230 ( PS PS.GZ PDF )
          A Fast Provably Secure Cryptographic Hash Function
          Daniel Augot and Matthieu Finiasz and Nicolas Sendrier 
          
   2003/229 ( PS PS.GZ PDF )
          Algebraic Attacks on Summation Generators
          Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and
          Dukjae Moon
          
   2003/228 ( PDF )
          Verifiably Committed Signatures Provably Secure in The Standard
          Complexity Model
          Huafei Zhu
          
   2003/227 ( PS PS.GZ PDF )
          Attacks on a Secure Group Communication Scheme With
          Hierarchical Access Control
          Willi Geiselmann and Rainer Steinwandt
          
   2003/226 ( PS PS.GZ PDF )
          On the Security of a Group Signature Scheme with Forward
          Security
          Guilin Wang
          
   2003/225 ( PS PS.GZ )
          A Practical Parallel Domain Extender for UOWHF
          Palash Sarkar
          
   2003/224 ( PDF )
          Two Protocols from the Tate Pairing
          Noel McCullagh and Michael Scott
          
   2003/223 ( PS PS.GZ PDF )
          Cryptanalysis of a Cryptosystem based on Drinfeld modules
          Simon R. Blackburn, Carlos Cid and Steven D. Galbraith
          
   2003/222 ( PS PS.GZ PDF )
          A Verifiable Secret Sharing Scheme with Statistical
          zero-knowledge
          Chunming Tang and Zhuojun Liu and Mingsheng Wang
          
   2003/221 ( PS PS.GZ PDF )
          A Cryptanalysis of the Original Domingo-Ferrer's Algebraic
          Privacy Homomophism
          Jung Hee Cheon and Hyun Soo Nam
          
   2003/220 ( PS PS.GZ PDF )
          A short comment on the affine parts of SFLASH^{v3}
          Willi Geiselmann and Rainer Steinwandt
          
   2003/219 ( PS PS.GZ PDF )
          Cryptanalysis of the Repaired Public-key Encryption Scheme
          Based on the Polynomial Reconstruction Problem
          Jean-Sebastien Coron
          
   2003/218 ( PDF )
          A Security Evaluation of Whitenoise
          David Wagner
          
   2003/217 ( PS PS.GZ PDF )
          Chemical Combinatorial Attacks on Keyboards
          Eric Brier and David Naccache and Pascal Paillier
          
   2003/216 ( PS PS.GZ PDF )
          Building Secure Indexes for Searching Efficiently on Encrypted
          Compressed Data.
          Eu-Jin Goh
          
   2003/215 ( PDF )
          Divide and Concatenate: A Scalable Hardware Architecture for
          Universal MAC
          Bo Yang and Ramesh Karri and David Mcgrew
          
   2003/214 ( PS PS.GZ )
          Multi-trapdoor Commitments and their Applications to Proofs of
          Knowledge Secure under Concurrent Man-in-the-middle Attacks
          Rosario Gennaro
          
   2003/213 ( PS PS.GZ PDF )
          Isomorphism Classes of Hyperelliptic Curves of Genus 2 over
          $\mathbb{F}_{2^n}$
          Y.Choie and E.Jeong
          
   2003/212 ( PS PS.GZ PDF )
          High Performance Arithmetic for Hyperelliptic Curve
          Cryptosystems of Genus Two
          Jan Pelzl and Thomas Wollinger and Christof Paar
          
   2003/211 ( PS PS.GZ PDF )
          SFLASHv3, a fast asymmetric signature scheme
          Nicolas T. Courtois, Louis Goubin and Jacques Patarin
          
   2003/210 ( PS PS.GZ PDF )
          On a Relation Between Verifiable Secret Sharing Schemes and a
          Class of Error-Correcting Codes
          Ventzislav Nikov and Svetla Nikova
          
   2003/209 ( PS PS.GZ PDF )
          Using the Trace Operator to repair the Polynomial
          Reconstruction based Cryptosystem presented at Eurocrypt 2003
          Daniel Augot and Matthieu Finiasz and Pierre Loidreau
          
   2003/208 ( PS PS.GZ PDF )
          ID-Based Chameleon Hashes from Bilinear Pairings
          Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
          
   2003/207 ( PS PS.GZ PDF )
          Security Flaws in Several Group Signatures Proposed by Popescu
          Guilin Wang, and Sihan Qing
          
   2003/206 ( PS PS.GZ PDF )
          Identity Based Undeniable Signatures
          Benoît Libert and Jean-Jacques Quisquater
          
   2003/205 ( PS PS.GZ PDF )
          Improved Cryptanalysis of SecurID
          Scott Contini and Yiqun Lisa Yin
          
   2003/204 ( PDF )
          A Composition Construction of Bent-Like Boolean Functions from
          Quadratic Polynomials
          ZENG Xiangyong and HU Lei
          
   2003/203 ( PS PS.GZ PDF )
          A Timing Attack on Hyperelliptic Curve Cryptosystems
          Masanobu Katagi and Izuru Kitamura and Toru Akishita and
          Tsuyoshi Takagi
          
   2003/202 ( PS PS.GZ PDF )
          Yet Another Sieving Device
          Willi Geiselmann and Rainer Steinwandt
          
   2003/201 ( PDF )
          an attack on a multisignature scheme
          Zheng dong & KF.chen
          
   2003/200 ( PDF )
          Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
          Zheng Dong , Shengli Liu & kefei Chen
          
   2003/199 ( PS PS.GZ PDF )
          Cryptanalysis of a Message Authentication Code due to Cary and
          Venkatesan
          Simon R. Blackburn and Kenneth G. Paterson
          
   2003/198 ( PS PS.GZ PDF )
          Construction of Perfect Nonlinear and Maximally Nonlinear
          Multi-Output Boolean Functions Satisfying Higher Order Strict
          Avalanche Criteria
          Kishan Chand Gupta and Palash Sarkar
          
   2003/197 ( PS PS.GZ PDF )
          Revisiting fully distributed proxy signature schemes
          Javier Herranz and German Saez
          
   2003/196 ( PS PS.GZ PDF )
          Security Analysis of Some Proxy Signatures
          Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
          
   2003/195 ( PDF )
          Searchable Public Key Encryption
          Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and
          Giuseppe Persiano
          
   2003/194 ( PS PS.GZ PDF )
          Security Analysis of Several Group Signature Schemes
          Guilin Wang
          
   2003/193 ( PS PS.GZ PDF )
          Efficient Extension of Standard Schnorr/RSA signatures into
          Universal Designated-Verifier Signatures
          Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk
          
   2003/192 ( PS PS.GZ PDF )
          Universal Designated-Verifier Signatures
          Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef
          Pieprzyk
          
   2003/191 ( PS PS.GZ )
          Projective Coordinates Leak
          David Naccache and Nigel Smart and Jacques Stern
          
   2003/190 ( -- withdrawn -- )
          Extending Joux's Protocol to Multi Party Key Agreement
          Rana Barua and Ratna Dutta and Palash Sarkar
          
   2003/189 ( PDF )
          Cryptanalysis of publicly verifiable authenticated encryption
          Zuhua Shao
          
   2003/188 ( PDF )
          A New Forward Secure Signature Scheme using Bilinear Maps
          Fei Hu and Chwan-Hwa Wu and J. D. Irwin 
          
   2003/187 ( PS PS.GZ )
          Resource Bounded Unprovability of Computational Lower Bounds 
          Tatsuaki Okamoto and Ryo Kashima
          
   2003/186 ( PS PS.GZ PDF )
          Safe Prime Generation with a Combined Sieve
          Michael J. Wiener
          
   2003/185 ( PS PS.GZ PDF )
          VMPC Stream Cipher
          Bartosz Zoltak
          
   2003/184 ( PS PS.GZ PDF )
          What do DES S-boxes Say to Each Other ?
          Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin
          
   2003/183 ( PDF )
          Certificate-Based Encryption and the Certificate Revocation
          Problem
          Craig Gentry
          
   2003/182 ( PS PS.GZ PDF )
          Chosen-Ciphertext Security from Identity-Based Encryption
          Ran Canetti, Shai Halevi, and Jonathan Katz
          


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR