New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.) 2004/143 ( PS PS.GZ PDF )
Short Signatures, Provable Security, Generic Attacks and
Computational Security of Multivariate Polynomial Schemes such
as HFE, Quartz and Sflash
Nicolas T. Courtois
2004/142 ( PDF )
A New Signcryption Scheme and its Threshold Protocol
Yiliang Han and Guangming Wu and Xiaoyuan Yang
2004/141 ( PS PS.GZ PDF )
Elastic AES
Debra L. Cook and Moti Yung and Angelos D. Keromytis
2004/140 ( PDF )
Hardware Implementation of the 64-bit MISTY1 Block Cipher
Paris Kitsos
2004/139 ( PS PS.GZ PDF )
New Notions of Security: Achieving Universal Composability
without Trusted Setup
Manoj Prabhakaran and Amit Sahai
2004/138 ( PS PS.GZ PDF )
How to Disembed a Program?
Benoit Chevallier-Mames and David Naccache and Pascal Paillier
and David Pointcheval
2004/137 ( PDF )
New GF(2n) Parallel Multiplier Using Redundant Representation
Haining Fan
2004/136 ( PDF )
A Protocol for Countering Online Dictionary Attacks
Vipul Goyal and Virendra Kumar and Mayank Singh
2004/135 ( PDF )
More Efficient Server Assisted One Time Signatures
Vipul Goyal
2004/134 ( PDF )
Secure and Efficient Masking of AES - A Mission Impossible?
Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller
2004/133 ( PS PS.GZ PDF )
Secret Handshakes from CA-Oblivious Encryption
Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik
2004/132 ( PS PS.GZ PDF )
On Small Characteristic Algebraic Tori in Pairing-Based
Cryptography
R. Granger, D. Page and M. Stam
2004/131 ( PS PS.GZ PDF )
A New ID-based Signature with Batch Verification
Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon
2004/130 ( PS PS.GZ PDF )
Private Inference Control
David Woodruff and Jessica Staddon
2004/129 ( PS PS.GZ PDF )
Generalizing Kedlaya's order counting based on Miura Theory
Joe Suzuki
2004/128 ( PS PS.GZ PDF )
Elastic Block Ciphers
Debra L. Cook and Moti Yung and Angelos D. Keromytis
2004/127 ( PS PS.GZ PDF )
DDH-based Group Key Agreement for Mobile Computing
Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won
2004/126 ( PS PS.GZ )
Two Software Normal Basis Multiplication Algorithms for GF(2n)
Haining Fan and Yiqi Dai
2004/125 ( PS PS.GZ PDF )
EME*: extending EME to handle arbitrary-length messages with
associated data
Shai Halevi
2004/124 ( PS PS.GZ )
Universally Composable DKG with Linear Number of
Exponentiations
Douglas Wikström
2004/123 ( PS PS.GZ PDF )
On security of XTR public key cryptosystems against Side
Channel Attacks
Dong-Guk Han and Jongin Lim and Kouichi Sakurai
2004/122 ( PS PS.GZ PDF )
A New Two-Party Identity-Based Authenticated Key Agreement
Noel McCullagh and Paulo S. L. M. Barreto
2004/121 ( PS PS.GZ PDF )
Fast and Proven Secure Blind Identity-Based Signcryption from
Pairings
Tsz Hon Yuen and Victor K. Wei
2004/120 ( PS PS.GZ PDF )
One-Way IND-CNA Key Setup - a Step Towards Provably Secure
Symmetric Encryption
Bartosz Zoltak
2004/119 ( PS PS.GZ PDF )
Adaptively Secure Feldman VSS and Applications to
Universally-Composable Threshold Cryptography
Masayuki Abe and Serge Fehr
2004/118 ( PS PS.GZ PDF )
Fast addition on non-hyperelliptic genus $3$ curves
Stéphane Flon and Roger Oyono and Christophe Ritzenthaler
2004/117 ( PS PS.GZ PDF )
Efficient and Forward-Secure Identity-Based Signcryption
Noel McCullagh and Paulo S. L. M. Barreto
2004/116 ( PS PS.GZ PDF )
On the Limitations of Universally Composable Two-Party
Computation Without Set-up Assumptions
Ran Canetti and Eyal Kushilevitz and Yehuda Lindell
2004/115 ( PS PS.GZ PDF )
Provably-Secure and Communication-Efficient Scheme for Dynamic
Group Key Exchange
Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won
2004/114 ( PS PS.GZ )
Improved Identity-Based Signcryption
Liqun Chen and John Malone-Lee
2004/113 ( PS PS.GZ PDF )
On the Security and Composability of the One Time Pad
Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade
2004/112 ( PDF )
Relation between XL algorithm and Groebner Bases Algorithms
M. Sugita and M. Kawazoe and H. Imai
2004/111 ( PS PS.GZ PDF )
The Vulnerability of SSL to Chosen Plaintext Attack
Gregory V. Bard
2004/110 ( PDF )
Designing Against the `Overdefined System of Equations' Attack
Carlisle Adams
2004/109 ( PDF )
Concealing Complex Policies with Hidden Credentials
Robert Bradshaw and Jason Holt and Kent Seamons
2004/108 ( PS PS.GZ PDF )
Two Improved Partially Blind Signature Schemes from Bilinear
Pairings
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
2004/107 ( PS PS.GZ PDF )
Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and
optimization of their arithmetic
Bertrand BYRAMJEE and Sylvain DUQUESNE
2004/106 ( PDF )
Capacity and Examples of Template Protecting Biometric
Authentication Systems
P. Tuyls and J. Goseling
2004/105 ( PS PS.GZ PDF )
Receipt-Free Homomorphic Elections and Write-in Ballots
Alessandro Acquisti
2004/104 ( PS PS.GZ PDF )
A Trapdoor-free and Efficient Group Signature Scheme from
Bilinear Pairings
Lan Nguyen
2004/103 ( PS PS.GZ PDF )
Cryptanalysis of SFlash v3
Jintai Ding and Dieter Schmidt
2004/102 ( PS PS.GZ PDF )
The Exact Security of an Identity Based Signature and its
Applications
Benoît Libert and Jean-Jacques Quisquater
2004/101 ( PS PS.GZ PDF )
Provably Secure Masking of AES
Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel
2004/100 ( PDF )
The Sorcerers Apprentice Guide to Fault Attacks
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall
and Claire Whelan
2004/099 ( PS PS.GZ )
Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro and Hugo Krawczyk and Tal Rabin
2004/098 ( PS PS.GZ PDF )
Attacking a Public Key Cryptosystem Based on Tree Replacement
María Isabel González Vasco and David Pérez García
2004/097 ( PDF )
How To Re-initialize a Hash Chain
Vipul Goyal
2004/096 ( -- withdrawn -- )
On the Ambiguity of Concurrent Signatures
Yi Mu and Fangguo Zhang and Willy Susilo
2004/095 ( PS PS.GZ PDF )
GNFS Factoring Statistics of RSA-100, 110, ..., 150
Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki
Ueda
2004/094 ( PS PS.GZ PDF )
Block Ciphers and Stream Ciphers: The State of the Art
Alex Biryukov
2004/093 ( PS PS.GZ PDF )
A Provably Secure Nyberg-Rueppel Signature Variant with
Applications
Giuseppe Ateniese and Breno de Medeiros
2004/092 ( PS PS.GZ PDF )
A New Stream Cipher HC-256
Hongjun Wu
2004/091 ( PDF )
Signature Bouquets: Immutability for Aggregated/Condensed
Signatures
Einar Mykletun and Maithili Narasimha and Gene Tsudik
2004/090 ( PS PS.GZ PDF )
Provably Secure Authenticated Tree Based Group Key Agreement
Protocol
Ratna Dutta and Rana Barua and and Palash Sarkar
2004/089 ( PS PS.GZ PDF )
Security of Random Key Pre-distribution Schemes With Limited
Tamper Resistance
Mahalingam Ramkumar and Nasir Memon
2004/088 ( -- withdrawn -- )
Efficient Batch Verification of Signature Schemes based on
Bilinear Maps
Noel McCullagh
2004/087 ( PS PS.GZ PDF )
Using primitive subgroups to do more with fewer bits
K. Rubin and A. Silverberg
2004/086 ( PDF )
Fuzzy Identity Based Encryption
Amit Sahai and Brent R. Waters
2004/085 ( PDF )
The CS2 Block Cipher
Tom St Denis
2004/084 ( PDF )
Evaluating elliptic curve based KEMs in the light of pairings
David Galindo and Sebastia Martin and Jorge L. Villar
2004/083 ( PDF )
Scan Based Side Channel Attack on Data Encryption Standard
Bo Yang and Kaijie Wu and Ramesh Karri
2004/082 ( PS PS.GZ )
Secure Asynchronous Reactive Systems
Michael Backes and Birgit Pfitzmann and Michael Waidner
2004/081 ( PDF )
Rewriting Variables: the Complexity of Fast Algebraic Attacks
on Stream Ciphers
Philip Hawkes and Gregory G. Rose
2004/080 ( PDF )
HENKOS STREAM CIPHER
Marius Oliver Gheorghita and Dominic Bucerzan
2004/079 ( PS PS.GZ PDF )
Pairing-Based One-Round Tripartite Key Agreement Protocols
Zhaohui Cheng and Luminita Vasiu and Richard Comley
2004/078 ( PS PS.GZ PDF )
Analysis of the WinZip encryption method
Tadayoshi Kohno
2004/077 ( PS PS.GZ PDF )
Foundations of Group Signatures: The Case of Dynamic Groups
Mihir Bellare and Haixia Shi and Chong Zhang
2004/076 ( PS PS.GZ PDF )
Group Signatures: Provable Security, Efficient Constructions
and Anonymity from Trapdoor-Holders
Aggelos Kiayias and Moti Yung
2004/075 ( PDF )
An Hybrid Mode of Operation
Alexis W. Machado
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR