International Association for Cryptologic Research

New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
   2004/143 ( PS PS.GZ PDF )
          Short   Signatures,  Provable  Security,  Generic  Attacks  and
          Computational  Security of Multivariate Polynomial Schemes such
          as HFE, Quartz and Sflash 
          Nicolas T. Courtois

   2004/142 ( PDF )
          A New Signcryption Scheme and its Threshold Protocol
          Yiliang Han and Guangming Wu and Xiaoyuan Yang

   2004/141 ( PS PS.GZ PDF )
          Elastic AES
          Debra L. Cook and Moti Yung and Angelos D. Keromytis

   2004/140 ( PDF )
          Hardware Implementation of the 64-bit MISTY1 Block Cipher 
          Paris Kitsos

   2004/139 ( PS PS.GZ PDF )
          New  Notions  of  Security:  Achieving  Universal Composability
          without Trusted Setup
          Manoj Prabhakaran and Amit Sahai

   2004/138 ( PS PS.GZ PDF )
          How to Disembed a Program?
          Benoit  Chevallier-Mames and David Naccache and Pascal Paillier
          and David Pointcheval

   2004/137 ( PDF )
          New GF(2n) Parallel Multiplier Using Redundant Representation
          Haining Fan

   2004/136 ( PDF )
          A Protocol for Countering Online Dictionary Attacks
          Vipul Goyal and Virendra Kumar and Mayank Singh

   2004/135 ( PDF )
          More Efficient Server Assisted One Time Signatures
          Vipul Goyal

   2004/134 ( PDF )
          Secure and Efficient Masking of AES - A Mission Impossible?
          Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller

   2004/133 ( PS PS.GZ PDF )
          Secret Handshakes from CA-Oblivious Encryption
          Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik

   2004/132 ( PS PS.GZ PDF )
          On   Small   Characteristic  Algebraic  Tori  in  Pairing-Based
          Cryptography
          R. Granger, D. Page and M. Stam

   2004/131 ( PS PS.GZ PDF )
          A New ID-based Signature with Batch Verification
          Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon

   2004/130 ( PS PS.GZ PDF )
          Private Inference Control
          David Woodruff and Jessica Staddon

   2004/129 ( PS PS.GZ PDF )
          Generalizing Kedlaya's order counting based on Miura Theory
          Joe Suzuki

   2004/128 ( PS PS.GZ PDF )
          Elastic Block Ciphers
          Debra L. Cook and Moti Yung and Angelos D. Keromytis

   2004/127 ( PS PS.GZ PDF )
          DDH-based Group Key Agreement for Mobile Computing
          Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won

   2004/126 ( PS PS.GZ )
          Two Software Normal Basis Multiplication Algorithms for GF(2n)
          Haining Fan and Yiqi Dai

   2004/125 ( PS PS.GZ PDF )
          EME*:  extending  EME  to handle arbitrary-length messages with
          associated data
          Shai Halevi

   2004/124 ( PS PS.GZ )
          Universally    Composable    DKG    with   Linear   Number   of
          Exponentiations
          Douglas Wikström

   2004/123 ( PS PS.GZ PDF )
          On  security  of  XTR  public  key  cryptosystems  against Side
          Channel Attacks
          Dong-Guk Han and Jongin Lim and Kouichi Sakurai

   2004/122 ( PS PS.GZ PDF )
          A New Two-Party Identity-Based Authenticated Key Agreement
          Noel McCullagh and Paulo S. L. M. Barreto

   2004/121 ( PS PS.GZ PDF )
          Fast  and  Proven Secure Blind Identity-Based Signcryption from
          Pairings
          Tsz Hon Yuen and Victor K. Wei

   2004/120 ( PS PS.GZ PDF )
          One-Way  IND-CNA  Key  Setup  -  a Step Towards Provably Secure
          Symmetric Encryption
          Bartosz Zoltak

   2004/119 ( PS PS.GZ PDF )
          Adaptively    Secure    Feldman   VSS   and   Applications   to
          Universally-Composable Threshold Cryptography
          Masayuki Abe and Serge Fehr

   2004/118 ( PS PS.GZ PDF )
          Fast addition on non-hyperelliptic genus $3$ curves 
          Stéphane Flon and Roger Oyono and Christophe Ritzenthaler 

   2004/117 ( PS PS.GZ PDF )
          Efficient and Forward-Secure Identity-Based Signcryption
          Noel McCullagh and Paulo S. L. M. Barreto

   2004/116 ( PS PS.GZ PDF )
          On   the   Limitations   of  Universally  Composable  Two-Party
          Computation Without Set-up Assumptions
          Ran Canetti and Eyal Kushilevitz and Yehuda Lindell

   2004/115 ( PS PS.GZ PDF )
          Provably-Secure  and Communication-Efficient Scheme for Dynamic
          Group Key Exchange
          Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won

   2004/114 ( PS PS.GZ )
          Improved Identity-Based Signcryption
          Liqun Chen and John Malone-Lee

   2004/113 ( PS PS.GZ PDF )
          On the Security and Composability of the One Time Pad
          Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade

   2004/112 ( PDF )
          Relation between XL algorithm and Groebner Bases Algorithms
          M. Sugita and M. Kawazoe and H. Imai

   2004/111 ( PS PS.GZ PDF )
          The Vulnerability of SSL to Chosen Plaintext Attack
          Gregory V. Bard

   2004/110 ( PDF )
          Designing Against the `Overdefined System of Equations' Attack
          Carlisle Adams

   2004/109 ( PDF )
          Concealing Complex Policies with Hidden Credentials
          Robert Bradshaw and Jason Holt and Kent Seamons

   2004/108 ( PS PS.GZ PDF )
          Two  Improved  Partially  Blind Signature Schemes from Bilinear
          Pairings
          Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow

   2004/107 ( PS PS.GZ PDF )
          Classification  of  genus  2 curves over $\mathbb{F}_{2^n}$ and
          optimization of their arithmetic
          Bertrand BYRAMJEE and Sylvain DUQUESNE

   2004/106 ( PDF )
          Capacity   and   Examples   of  Template  Protecting  Biometric
          Authentication Systems
          P. Tuyls and J. Goseling

   2004/105 ( PS PS.GZ PDF )
          Receipt-Free Homomorphic Elections and Write-in Ballots
          Alessandro Acquisti

   2004/104 ( PS PS.GZ PDF )
          A  Trapdoor-free  and  Efficient  Group  Signature  Scheme from
          Bilinear Pairings
          Lan Nguyen

   2004/103 ( PS PS.GZ PDF )
          Cryptanalysis of SFlash v3
          Jintai Ding and Dieter Schmidt

   2004/102 ( PS PS.GZ PDF )
          The  Exact  Security  of  an  Identity  Based Signature and its
          Applications
          Benoît Libert and Jean-Jacques Quisquater

   2004/101 ( PS PS.GZ PDF )
          Provably Secure Masking of AES
          Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel

   2004/100 ( PDF )
          The Sorcerers Apprentice Guide to Fault Attacks
          Hagai  Bar-El,  Hamid Choukri, David Naccache, Michael Tunstall
          and Claire Whelan

   2004/099 ( PS PS.GZ )
          Secure Hashed Diffie-Hellman over Non-DDH Groups
          Rosario Gennaro and Hugo Krawczyk and Tal Rabin

   2004/098 ( PS PS.GZ PDF )
          Attacking a Public Key Cryptosystem Based on Tree Replacement
          María Isabel González Vasco and David Pérez García

   2004/097 ( PDF )
          How To Re-initialize a Hash Chain
          Vipul Goyal

   2004/096 ( -- withdrawn -- )
          On the Ambiguity of Concurrent Signatures
          Yi Mu and Fangguo Zhang and Willy Susilo

   2004/095 ( PS PS.GZ PDF )
          GNFS Factoring Statistics of RSA-100, 110, ..., 150
          Kazumaro  Aoki  and  Yuji Kida and Takeshi Shimoyama and Hiroki
          Ueda

   2004/094 ( PS PS.GZ PDF )
          Block Ciphers and Stream Ciphers: The State of the Art 
          Alex Biryukov

   2004/093 ( PS PS.GZ PDF )
          A   Provably   Secure  Nyberg-Rueppel  Signature  Variant  with
          Applications
          Giuseppe Ateniese and Breno de Medeiros

   2004/092 ( PS PS.GZ PDF )
          A New Stream Cipher HC-256
          Hongjun Wu

   2004/091 ( PDF )
          Signature   Bouquets:   Immutability  for  Aggregated/Condensed
          Signatures
          Einar Mykletun and Maithili Narasimha and Gene Tsudik

   2004/090 ( PS PS.GZ PDF )
          Provably  Secure  Authenticated  Tree Based Group Key Agreement
          Protocol
          Ratna Dutta and Rana Barua and and Palash Sarkar

   2004/089 ( PS PS.GZ PDF )
          Security  of  Random  Key Pre-distribution Schemes With Limited
          Tamper Resistance
          Mahalingam Ramkumar and Nasir Memon

   2004/088 ( -- withdrawn -- )
          Efficient  Batch  Verification  of  Signature  Schemes based on
          Bilinear Maps
          Noel McCullagh

   2004/087 ( PS PS.GZ PDF )
          Using primitive subgroups to do more with fewer bits
          K. Rubin and A. Silverberg

   2004/086 ( PDF )
          Fuzzy Identity Based Encryption
          Amit Sahai and Brent R. Waters

   2004/085 ( PDF )
          The CS2 Block Cipher
          Tom St Denis

   2004/084 ( PDF )
          Evaluating elliptic curve based KEMs in the light of pairings
          David Galindo and Sebastia Martin and Jorge L. Villar 

   2004/083 ( PDF )
          Scan Based Side Channel Attack on Data Encryption Standard
          Bo Yang and Kaijie Wu and Ramesh Karri 

   2004/082 ( PS PS.GZ )
          Secure Asynchronous Reactive Systems
          Michael Backes and Birgit Pfitzmann and Michael Waidner

   2004/081 ( PDF )
          Rewriting  Variables:  the Complexity of Fast Algebraic Attacks
          on Stream Ciphers
          Philip Hawkes and Gregory G. Rose

   2004/080 ( PDF )
          HENKOS STREAM CIPHER
          Marius Oliver Gheorghita and Dominic Bucerzan

   2004/079 ( PS PS.GZ PDF )
          Pairing-Based One-Round Tripartite Key Agreement Protocols
          Zhaohui Cheng and Luminita Vasiu and Richard Comley

   2004/078 ( PS PS.GZ PDF )
          Analysis of the WinZip encryption method
          Tadayoshi Kohno

   2004/077 ( PS PS.GZ PDF )
          Foundations of Group Signatures: The Case of Dynamic Groups
          Mihir Bellare and Haixia Shi and Chong Zhang

   2004/076 ( PS PS.GZ PDF )
          Group  Signatures:  Provable  Security, Efficient Constructions
          and Anonymity from Trapdoor-Holders
          Aggelos Kiayias and Moti Yung

   2004/075 ( PDF )
          An Hybrid Mode of Operation
          Alexis W. Machado


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR