International Association for Cryptologic Research

New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
   2004/330 ( PDF )
          Multicollision Attacks on Generalized Hash Functions
          M. Nandi and D. R. Stinson

   2004/329 ( PS PS.GZ PDF )
          Hardness amplification of weakly verifiable puzzles
          Ran Canetti and Shai Halevi and Michael Steiner

   2004/328 ( PDF )
          Security  Analysis  of  a  2/3-rate  Double  Length Compression
          Function in Black-Box Model
          Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee

   2004/327 ( PS PS.GZ PDF )
          Efficient Identity Based Ring Signature
          Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui

   2004/326 ( PS PS.GZ PDF )
          Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
          Zhengjun Cao

   2004/325 ( PDF )
          Complexity  of the Collision and Near-Collision Attack on SHA-0
          with Different Message Schedules
          Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA

   2004/324 ( PDF )
          On  a  Probabilistic  Approach  to  the  Security  Analysis  of
          Cryptographic Hash Functions
          G. Laccetti and G. Schmid

   2004/323 ( PS PS.GZ PDF )
          A note on L\'opez-Dahab coordinates
          Tanja Lange

   2004/322 ( PS PS.GZ PDF )
          Secure  and Anonymous Identity-Based Key Issuing without Secure
          Channel
          Ai-fen  Sui  and  Sherman S.M. Chow and Lucas C.K. Hui and S.M.
          Yiu  and  K.P.  Chow and W.W. Tsang and C.F. Chong and K.H. Pun
          and H.W. Chan

   2004/321 ( PDF )
          The  conjugacy  search  problem  in  public  key  cryptography:
          unnecessary and insufficient
          Vladimir Shpilrain and Alexander Ushakov

   2004/320 ( PS PS.GZ PDF )
          Upper  Bounds  for  the  Selection  of  the  Cryptographic  Key
          Lifetimes: Bounding the Risk of Key Exposure in the Presence of
          Faults
          Alfonso De Gregorio

   2004/319 ( PS PS.GZ PDF )
          Badger - A Fast and Provably Secure MAC
          Martin Boesgaard and Thomas Christensen and Erik Zenner

   2004/318 ( PS PS.GZ PDF )
          Upper  Bounds  on the Communication Complexity of Cryptographic
          Multiparty Computation
          Martin Hirt and Jesper Buus Nielsen

   2004/317 ( PS PS.GZ PDF )
          Adaptively-Secure, Non-Interactive Public-Key Encryption
          Ran Canetti and Shai Halevi and Jonathan Katz

   2004/316 ( PS PS.GZ PDF )
          On  a  Threshold  Group  Signature  Scheme  and  a  Fair  Blind
          Signature Scheme
          Zhengjun Cao

   2004/315 ( PDF )
          Security  Arguments  for  Partial Delegation with Warrant Proxy
          Signature Schemes
          Qin Wang, Zhenfu Cao

   2004/314 ( PDF )
          A Technical Comparison of IPSec and SSL
          AbdelNasir Alshamsi and Takamichi Saito

   2004/313 ( PS PS.GZ PDF )
          Cryptanalysis of a threshold proxy signature with known signers
          Fuw-Yi Yang, Jinn-Ke Jan, and Woei-Jiunn Jeng

   2004/312 ( PS PS.GZ PDF )
          Ramanujan Graphs and the Random Reducibility of Discrete Log on
          Isogenous Elliptic Curves
          David Jao and Stephen D. Miller and Ramarathnam Venkatesan

   2004/311 ( PS PS.GZ PDF )
          Hierarchical Group Signatures
          Marten Trolin and Douglas Wikstrom

   2004/310 ( PS PS.GZ )
          A Verifiable Random Function With Short Proofs and Keys
          Yevgeniy Dodis and Aleksandr Yampolskiy

   2004/309 ( PS PS.GZ PDF )
          The Power of Verification Queries in Message Authentication and
          Authenticated Encryption
          Mihir Bellare and Oded Goldreich and Anton Mityagin

   2004/308 ( PDF )
          Cryptanalysis  of  Noel McCullagh and Paulo S. L. M. Barreto¡¯s
          two-party identity-based key agreement
          Guohong Xie

   2004/307 ( PS PS.GZ PDF )
          Universal  Forgeability of Wang-Wu-Wang Key-Insulated Signature
          Scheme
          Zhengjun Cao

   2004/306 ( PS PS.GZ )
          The Static Diffie-Hellman Problem
          Daniel R. L. Brown and Robert P. Gallant

   2004/305 ( PS PS.GZ PDF )
          A note on efficient computation of cube roots in characteristic
          3
          Paulo S. L. M. Barreto

   2004/304 ( PDF )
          Second Preimages on n-bit Hash Functions for Much Less than 2^n
          Work
          John Kelsey and Bruce Schneier

   2004/303 ( PS PS.GZ PDF )
          Efficient  Tate  Pairing Computation for Supersingular Elliptic
          Curves over Binary Fields
          Soonhak Kwon

   2004/302 ( PDF )
          Security of Wang-Li Threshold Signature Scheme 
          Lifeng Guo

   2004/301 ( PS PS.GZ PDF )
          VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
          Bartosz Zoltak

   2004/300 ( PS PS.GZ )
          Relating Symbolic and Cryptographic Secrecy
          Michael Backes and Birgit Pfitzmann

   2004/299 ( PS PS.GZ PDF )
          Security Flaws in a Pairing-based Group Signature Scheme
          Zhengjun Cao and Sherman S.M. Chow

   2004/298 ( PDF )
          Nominative Proxy Signature Schemes
          Zuo-Wen Tan,Zhuo-Jun Liu

   2004/297 ( PS PS.GZ PDF )
          Post-Quantum Signatures
          Johannes  Buchmann  and  Carlos Coronado and Martin Döring and
          Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and
          Arthur Schmidt and Ulrich Vollmer and Ralf-Philipp Weinmann

   2004/296 ( PDF )
          A Class of secure Double Length Hash Functions
          Mridul Nandi

   2004/295 ( PS PS.GZ PDF )
          An  Access  Control  Scheme for Partially Ordered Set Hierarchy
          with Provable Security
          Jiang Wu and Ruizhong Wei

   2004/294 ( PS PS.GZ PDF )
          Optimal  Lower  Bounds  on  the  Number  of Queries for Solving
          Differential Equations of Addition
          Souradyuti Paul and Bart Preneel

   2004/293 ( PS PS.GZ )
          Provably   Secure   Authentication  of  Digital  Media  Through
          Invertible Watermarks
          Jana Dittmann and Stefan Katzenbeisser and Christian Schallhart
          and Helmut Veith

   2004/292 ( PS PS.GZ PDF )
          Asynchronous Proactive RSA
          Ruishan Zhang and Kefei Chen

   2004/291 ( PS PS.GZ PDF )
          The Rabbit Stream Cipher - Design and Security Analysis
          Martin  Boesgaard  and Thomas Pedersen and Mette Vesterager and
          Erik Zenner

   2004/290 ( PS PS.GZ PDF )
          The Security of the FDH Variant of Chaum's Undeniable Signature
          Scheme
          Wakaha Ogata and Kaoru Kurosawa and Swee-Huay Heng 

   2004/289 ( PDF )
          Fault attack on the DVB Common Scrambling Algorithm
          Kai Wirt

   2004/288 ( PS PS.GZ PDF )
          A  New  Designated  Confirmer  Signature  Variant with Intended
          Recipient
          Yong Li and Dingyi Pei

   2004/287 ( PS PS.GZ PDF )
          Almost Ideal Contrast Visual Cryptography with Reversing
          Duong Quang Viet and Kaoru Kurosawa

   2004/286 ( PS PS.GZ )
          Generalized  compact  knapsacks, cyclic lattices, and efficient
          one-way functions from worst-case complexity assumptions
          Daniele Micciancio

   2004/285 ( PS PS.GZ PDF )
          Generation of random Picard curves for cryptography
          Annegret Weng

   2004/284 ( PDF )
          ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS
          Qingshu Meng and Huanguo Zhang and Min Yang and Jingsong Cui

   2004/283 ( PS PS.GZ PDF )
          Fault and Side-Channel Attacks on Pairing Based Cryptography
          D. Page and F. Vercauteren

   2004/282 ( PS PS.GZ PDF )
          New Monotone Span Programs from Old
          Ventzislav Nikov and Svetla Nikova

   2004/281 ( PS PS.GZ PDF )
          Short   Linkable  Ring  Signatures  for  E-Voting,  E-Cash  and
          Attestation
          Patrick P. Tsang and Victor K. Wei

   2004/280 ( PS PS.GZ PDF )
          Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
          Zhengjun Cao

   2004/279 ( PS PS.GZ PDF )
          Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial
          Residue Arithmetic
          Jean-Claude Bajard and Laurent Imbert and Graham A. Jullien

   2004/278 ( PDF )
          The Extended Codebook (XCB) Mode of Operation
          David A. McGrew and Scott R. Fluhrer

   2004/277 ( PDF )
          Experimenting with Faults, Lattices and the DSA
          David  Naccache  and  Phong  Q. Nguyen and Michael Tunstall and
          Claire Whelan

   2004/276 ( PDF )
          Improving  the  algebraic  immunity  of resilient and nonlinear
          functions and constructing bent functions
          C. Carlet

   2004/275 ( PDF )
          An  e-Voting  Scheme  with  Improved  Resistance  to  Bribe and
          Coercion
          Wei-Chi Ku and Chun-Ming Ho

   2004/274 ( PDF )
          A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS
          Meng Qing-shu and Yang min and Zhang huan-guo and Cui jing-song

   2004/273 ( PDF )
          Cryptanalysis of Threshold-Multisignature schemes
          Lifeng Guo

   2004/272 ( PDF )
          A  Characterization  of  Authenticated-Encryption  as a Form of
          Chosen-Ciphertext Security
          Tom Shrimpton

   2004/271 ( PDF )
          The Mundja Streaming MAC
          Philip Hawkes and Michael Paddon and Gregory G. Rose

   2004/270 ( PS PS.GZ PDF )
          An Enhanced and Secure Protocol for Authenticated Key Exchange
          Fuw-Yi Yang and Jinn-Ke Jan

   2004/269 ( PDF )
          Cryptanalysis of Threshold-Multisignature Schemes
          Lifeng Guo

   2004/268 ( PS PS.GZ PDF )
          Untraceability of Wang-Fu Group Signature Scheme
          Zhengjun Cao and Lihua Liu

   2004/267 ( PS PS.GZ PDF )
          Separable Linkable Threshold Ring Signatures
          Patrick  P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho
          Au and Joseph K. Liu and Duncan S. Wong

   2004/266 ( PS PS.GZ PDF )
          A  New  Minimal Average Weight Representation for Left-to-Right
          Point Multiplication Methods
          M. Khabbazian and T.A. Gulliver

   2004/265 ( PDF )
          sSCADA: Securing SCADA Infrastructure Communications
          Yongge Wang and Bei-Tseng Chu 

   2004/264 ( PDF )
          Musings on the Wang et al. MD5 Collision
          Philip Hawkes and Michael Paddon and Gregory G. Rose

   2004/263 ( PS PS.GZ PDF )
          Applications  of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic
          Public Key Systems
          Christopher Wolf and Bart Preneel

   2004/262 ( PS PS.GZ PDF )
          Universal  Forgeability  of  a  Forward-Secure  Blind Signature
          Scheme Proposed by Duc et al.
          Lihua Liu and Zhengjun Cao

   2004/261 ( PS PS.GZ PDF )
          Improved  Efficiency  for  CCA-Secure Cryptosystems Built Using
          Identity-Based Encryption
          Dan Boneh and Jonathan Katz

   2004/260 ( PS PS.GZ PDF )
          Secure   Group   Communications  over  Combined  Wired/Wireless
          Networks
          Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won

   2004/259 ( PS PS.GZ PDF )
          On Boolean Functions with Generalized Cryptographic Properties
          An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel

   2004/258 ( PS PS.GZ )
          Escrow-Free Encryption Supporting Cryptographic Workflow
          S.S. Al-Riyami and J. Malone-Lee and N.P. Smart

   2004/257 ( PS PS.GZ PDF )
          Interleaving  Attack  on  ID-based  Conference Key Distribution
          Schemes
          Junghyun Nam, Seungjoo Kim, and Dongho Won

   2004/256 ( PDF )
          On the supports of the Walsh transforms of Boolean functions
          Claude Carlet and Sihem Mesnager

   2004/255 ( PS PS.GZ PDF )
          A Point Halving Algorithm for Hyperelliptic Curves
          Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi

   2004/254 ( PS PS.GZ )
          New  paradigms  for  digital  generation and post-processing of
          random data
          Jovan Dj. Golic

   2004/253 ( PDF )
          Design Principles for Iterated Hash Functions
          Stefan Lucks

   2004/252 ( PS PS.GZ PDF )
          Security Proofs for Identity-Based Identification and Signature
          Schemes
          Mihir Bellare and Chanathip Namprempre and Gregory Neven

   2004/251 ( PS PS.GZ PDF )
          Attacks  on  Bresson-Chevassut-Essiari-Pointcheval's  Group Key
          Agreement Scheme for Low-Power Mobile Devices
          Junghyun Nam, Seungjoo Kim, and Dongho Won

   2004/250 ( PDF )
          Identity Based Threshold Proxy Signature
          Jing Xu and Zhenfeng Zhang and Dengguo Feng

   2004/249 ( PS PS.GZ PDF )
          Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
          Zhaohui Cheng and Richard Comley

   2004/248 ( PS PS.GZ PDF )
          Classification of Boolean Functions of 6 Variables or Less with
          Respect to Cryptographic Properties
          An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel

   2004/247 ( PS PS.GZ )
          Vectorial fast correlation attacks
          Jovan Dj. Golic and Guglielmo Morgari

   2004/246 ( PS PS.GZ PDF )
          Upper and Lower Bounds on Black-Box Steganography
          Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell

   2004/245 ( PDF )
          On  codes,  matroids  and  secure  multi-party computation from
          linear secret sharing schemes
          Ronald  Cramer  and  Vanesa  Daza  and Ignacio Gracia and Jorge
          Jimenez  Urroz  and  Gregor  Leander  and Jaume Marti-Farre and
          Carles Padro

   2004/244 ( PDF )
          Signcryption in Hierarchical Identity Based Cryptosystem
          Sherman  S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M.
          Yiu

   2004/243 ( PDF )
          On the Key Exposure Problem in Chameleon Hashes
          Giuseppe Ateniese and Breno de Medeiros

   2004/242 ( PS PS.GZ PDF )
          Combinatorial group theory and public key cryptography
          Vladimir Shpilrain and Gabriel Zapata

   2004/241 ( PDF )
          A Comparison of Point Counting methods for Hyperelliptic Curves
          over Prime Fields and Fields of Characteristic 2
          Colm O hEigeartaigh

   2004/240 ( PS PS.GZ PDF )
          A Weil Descent Attack against Elliptic Curve Cryptosystems over
          Quartic Extension Fields
          Seigo  Arita  and  Kazuto  Matsuo and Koh-ichi Nagao and Mahoro
          Shimura

   2004/239 ( PDF )
          Geometric Key Establishment
          Arkady Berenstein and Leon Chernyak 

   2004/238 ( PDF )
          Security   Analysis   of   A   Dynamic   ID-based  Remote  User
          Authentication Scheme
          Amit K Awasthi and Sunder Lal

   2004/237 ( PS PS.GZ PDF )
          Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
          Christopher Wolf and An Braeken and Bart Preneel

   2004/236 ( PDF )
          Forgery Attacks on Chang et al.'s signature scheme with message
          recovery
          FU Xiaotong, XU Chunxiang and XIAO Guozhen

   2004/235 ( PDF )
          Cryptographic Implications of Hess' Generalized GHS Attack
          Alfred Menezes and Edlyn Teske

   2004/234 ( PDF )
          On the security of some nonrepudiable threshold proxy signature
          schemes with known signers
          Zuo-Wen Tan and Zhuo-Jun Liu

   2004/233 ( PS PS.GZ PDF )
          Password-Based  Authenticated  Key  Exchange in the Three-Party
          Setting
          Michel Abdalla and Pierre-Alain Fouque and David Pointcheval

   2004/232 ( PS PS.GZ PDF )
          Extending the Resynchronization Attack
          Frederik Armknecht and Joseph Lano and Bart Preneel

   2004/231 ( PS PS.GZ PDF )
          New Approaches to Timed-Release Cryptography
          Ivan Osipkov and Yongdae Kim and Jung Hee Cheon

   2004/230 ( PS PS.GZ PDF )
          A Provable Secure Scheme for Partially Blind Signatures
          Fuw-Yi Yang and Jinn-Ke Jan

   2004/229 ( PS PS.GZ PDF )
          Secure       Direct       Communication      Using      Quantum
          Calderbank-Shor-Steane Codes
          Xin L¨¹ and Zhi Ma and Dengguo Feng

   2004/228 ( PS PS.GZ PDF )
          DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES
          AND  THE  HIGHEST  LEVEL  SEQUENCES OF PRIMITIVE SEQUENCES OVER
          $Z_{2^l}$
          Honggang Hu and Dengguo Feng

   2004/227 ( PS PS.GZ PDF )
          Sign Change Fault Attacks On Elliptic Curve Cryptosystems
          Johannes Blömer and Martin Otto and Jean-Pierre Seifert

   2004/226 ( PS PS.GZ PDF )
          Lower Bounds for Non-Black-Box Zero Knowledge
          Boaz Barak and Yehuda Lindell and Salil Vadhan

   2004/225 ( PS PS.GZ )
          Vectorial Boolean functions and induced algebraic equations
          Jovan Dj. Golic

   2004/224 ( PS PS.GZ )
          The Polynomial Composition Problem in
          $(\mathbb{Z}/n\mathbb{Z})[X]$
          Marc Joye and David Naccache and St\'ephanie Porte

   2004/223 ( PDF )
          Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
          Xinxin Fan and Yumin Wang

   2004/222 ( PS PS.GZ PDF )
          A Study of the Security of Unbalanced Oil and Vinegar Signature
          Schemes
          An Braeken and Christopher Wolf and Bart Preneel

   2004/221 ( PS PS.GZ PDF )
          Towards  Plaintext-Aware  Public-Key  Encryption without Random
          Oracles
          Mihir Bellare and Adriana Palacio

   2004/220 ( PS PS.GZ PDF )
          On Oleshchuk's Public Key Cryptosystem
          Heiko Stamer and Friedrich Otto

   2004/219 ( PS PS.GZ PDF )
          Entropic Security and the Encryption of High Entropy Messages
          Yevgeniy Dodis and Adam Smith

   2004/218 ( PDF )
          Plaintext-Simulatability
          Eiichiro Fujisaki

   2004/217 ( PS PS.GZ PDF )
          Cryptanalyzing  the  Polynomial-Reconstruction based Public-Key
          System Under Optimal Parameter Choice
          Aggelos Kiayias and Moti Yung

   2004/216 ( PS PS.GZ PDF )
          Tree Parity Machine Rekeying Architectures
          Markus Volkmer and Sebastian Wallner

   2004/215 ( PS PS.GZ PDF )
          Transitive Signatures: New Schemes and Proofs
          Mihir Bellare and Gregory Neven

   2004/214 ( PS PS.GZ PDF )
          Classification of Highly Nonlinear Boolean Power Functions with
          a Randomised Algorithm for Checking Normality
          An Braeken, Christopher Wolf, and Bart Preneel

   2004/213 ( PS PS.GZ PDF )
          Cryptanalysis  of  Chang et al.'s Signature Scheme with Message
          Recovery
          Fangguo Zhang

   2004/212 ( PS PS.GZ PDF )
          ID-Based  Encryption  for Complex Hierarchies with Applications
          to Forward Security and Broadcast Encryption
          Danfeng  Yao  and  Nelly  Fazio  and  Yevgeniy  Dodis  and Anna
          Lysyanskaya

   2004/211 ( PS PS.GZ PDF )
          Scalable,  Server-Passive,  User-Anonymous Timed Release Public
          Key Encryption from Bilinear Pairing
          Ian F. Blake and Aldar C-F. Chan

   2004/210 ( PS PS.GZ PDF )
          Hybrid Cryptography
          Alexander W. Dent

   2004/209 ( PS PS.GZ PDF )
          The Security and Efficiency of Micciancio's Cryptosystem
          Christoph Ludwig

   2004/208 ( PS PS.GZ PDF )
          Deterministic  Polynomial Time Equivalence of Computing the RSA
          Secret Key and Factoring
          Jean-Sebastien Coron and Alexander May

   2004/207 ( PDF )
          On Corrective Patterns for the SHA-2 Family
          Philip Hawkes and Michael Paddon and Gregory G. Rose

   2004/206 ( PDF )
          ID-Based Proxy Signature Using Bilinear Pairings
          Jing Xu and Zhenfeng Zhang and Dengguo Feng

   2004/205 ( PDF )
          Direct Anonymous Attestation 
          Ernie Brickell and Jan Camenisch and Liqun Chen

   2004/204 ( PS PS.GZ PDF )
          Authenticated tree parity machine key exchange
          Markus Volkmer and Andre Schaumburg

   2004/203 ( PS PS.GZ PDF )
          How  to  Cheat  at  Chess:  A Security Analysis of the Internet
          Chess Club
          John Black and Martin Cochran and Ryan Gardner

   2004/202 ( PS PS.GZ PDF )
          Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the
          Set of Resilient Functions
          Yuri Borissov, An Braeken, Svetla Nikova

   2004/201 ( PS PS.GZ PDF )
          Non-Interactive   and   Information-Theoretic  Secure  Publicly
          Verifiable Secret Sharing
          Chunming Tang and Dingyi Pei and Zhuojun Liu and Yong He

   2004/200 ( PS PS.GZ PDF )
          On Cheating Immune Secret Sharing
          An Braeken, Svetla Nikova, Ventzislav Nikov

   2004/199 ( PDF )
          Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
          Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu

   2004/198 ( PDF )
          Long Modular Multiplication for Cryptographic Applications
          Laszlo Hars

   2004/197 ( PS PS.GZ PDF )
          SPA-based   attack  against  the  modular  reduction  within  a
          partially secured RSA-CRT implementation
          Helmut Kahl

   2004/196 ( PS PS.GZ PDF )
          Password Based Key Exchange with Mutual Authentication
          Shaoquan Jiang and Guang Gong

   2004/195 ( PS PS.GZ PDF )
          Signed Binary Representations Revisited
          Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and
          Tsuyoshi Takagi

   2004/194 ( PDF )
          A Note on An Encryption Scheme of Kurosawa and Desmedt
          Rosario Gennaro and Victor Shoup

   2004/193 ( PDF )
          The  Security  and  Performance  of  the Galois/Counter Mode of
          Operation (Full Version)
          David A. McGrew and John Viega

   2004/192 ( -- withdrawn -- )
          Security  Pitfalls  of  an efficient remote user authentication
          scheme using smart cards
          Manoj Kumar

   2004/191 ( PS PS.GZ )
          Scalar   Multiplication   in   Elliptic   Curve  Cryptosystems:
          Pipelining with Pre-computations
          Pradeep Kumar Mishra

   2004/190 ( PS PS.GZ PDF )
          Distributed Ring Signatures for Identity-Based Scenarios
          Javier Herranz and Germ\'an S\'aez

   2004/189 ( PS PS.GZ PDF )
          Computing Modular Polynomials
          Denis Charles and Kristin Lauter

   2004/188 ( PS PS.GZ PDF )
          Grey   Box  Implementation  of  Block  Ciphers  Preserving  the
          Confidentiality of their Design
          Vincent Carlier and Hervé Chabanne and Emmanuelle Dottax

   2004/187 ( PS PS.GZ PDF )
          Parallel FPGA Implementation of RSA with Residue Number Systems
          - Can side-channel threats be avoided? - Extended version
          Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques
          Quisquater

   2004/186 ( -- withdrawn -- )
          A  New Remote User Authentication Scheme Using Smart Cards with
          Forward Secrecy
          Manoj Kumar

   2004/185 ( PS PS.GZ PDF )
          On the Existence of low-degree Equations for Algebraic Attacks
          Frederik Armknecht

   2004/184 ( PS PS.GZ PDF )
          ID-based  Ring  Signature and Proxy Ring Signature Schemes from
          Bilinear Pairings
          Amit K Awasthi and Sunder Lal

   2004/183 ( PS PS.GZ PDF )
          A New Forward Secure Signature Scheme 
          Bo Gyeong Kang and Je Hong Park and Sang Geun Hahn 

   2004/182 ( PS PS.GZ PDF )
          Simpler Session-Key Generation from Short Random Passwords
          Minh-Huyen Nguyen and Salil Vadhan

   2004/181 ( PS PS.GZ PDF )
          On the Composition of Authenticated Byzantine Agreement
          Yehuda Lindell and Anna Lysyanskaya and Tal Rabin

   2004/180 ( PDF )
          Efficient Identity-Based Encryption Without Random Oracles
          Brent R. Waters

   2004/179 ( PS PS.GZ PDF )
          Identity Based Threshold Ring Signature
          Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu

   2004/178 ( PDF )
          Optimal Updating of Ideal Threshold Schemes
          S.  G.  Barwick  and  W.-A.  Jackson and K. M. Martin and C. M.
          O'Keefe

   2004/177 ( PDF )
          Updating  the  Parameters  of  a  Threshold  Scheme  by Minimal
          Broadcast
          S. G. Barwick and W.-A. Jackson and K. M. Martin

   2004/176 ( PDF )
          A Biometric Identity Based Signature Scheme
          Andrew Burnett and Adam Duffy and Tom Dowling

   2004/175 ( PS PS.GZ PDF )
          A Proof of Yao's Protocol for Secure Two-Party Computation
          Yehuda Lindell and Benny Pinkas

   2004/174 ( PS PS.GZ PDF )
          Short Group Signatures
          Dan Boneh and Xavier Boyen and Hovav Shacham

   2004/173 ( PS PS.GZ PDF )
          Secure Identity Based Encryption Without Random Oracles
          Dan Boneh and Xavier Boyen

   2004/172 ( PS PS.GZ PDF )
          Efficient Selective-ID Secure Identity Based Encryption Without
          Random Oracles
          Dan Boneh and Xavier Boyen

   2004/171 ( PS PS.GZ PDF )
          Short Signatures Without Random Oracles
          Dan Boneh and Xavier Boyen

   2004/170 ( PS PS.GZ PDF )
          Efficient  Consistency  Proofs  for  Generalized  Queries  on a
          Committed Database
          Rafail Ostrovsky and Charles Rackoff and Adam Smith

   2004/169 ( PDF )
          Regional  Blackouts:  Protection  of  Broadcast  Content  on 3G
          Networks.
          Alexander W. Dent and Allan Tomlinson

   2004/168 ( PS PS.GZ )
          Building  Instances of TTM Immune to the Goubin-Courtois Attack
          and the Ding-Schmidt Attack
          T.Moh and J.M.Chen and Boyin Yang

   2004/167 ( PS PS.GZ PDF )
          A  Secure  and  Efficient  Key  Exchange  Protocol  for  Mobile
          Communications
          Fuw-Yi Yang and Jinn-Ke Jan

   2004/166 ( PDF )
          FRMAC, a Fast Randomized Message Authentication Code
          Eliane Jaulmes and Reynald Lercier

   2004/165 ( PS PS.GZ )
          A comparison of MNT curves and supersingular curves
          D. Page and N.P. Smart and F. Vercauteren

   2004/164 ( PDF )
          ID-based Cryptography from Composite Degree Residuosity
          Man Ho Au and Victor K. Wei

   2004/163 ( -- withdrawn -- )
          On  the  Weaknesses  and  Improvements of an Efficient Password
          Based Remote User Authentication Scheme Using Smart Cards
          Manoj Kumar

   2004/162 ( PS PS.GZ PDF )
          On the Key-Uncertainty of Quantum Ciphers and the Computational
          Security of One-way Quantum Transmission
          Ivan Damgaard and Thomas Pedersen and Louis Salvail

   2004/161 ( PS PS.GZ PDF )
          Improvement  of  ThLeriault  Algorithm  of  Index  Calculus for
          Jacobian of Hyperelliptic Curves of Small Genus
          Ko-ichi Nagao

   2004/160 ( PS PS.GZ PDF )
          Scalable Public-Key Tracing and Revoking
          Yevgeniy  Dodis  and  Nelly  Fazio and Aggelos Kiayias and Moti
          Yung

   2004/159 ( PS PS.GZ PDF )
          Towards Provable Security for Ad Hoc Routing Protocols
          Levente Butty\'{a}n and Istv\'{a}n Vajda

   2004/158 ( PDF )
          Mobile Terminal Security
          Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre
          Girard  and  Helena Handschuh and David Naccache and St\'ephane
          Soci\'e and Claire Whelan

   2004/157 ( PS PS.GZ PDF )
          Hardware and Software Normal Basis Arithmetic for Pairing Based
          Cryptography in Characteristic Three
          R. Granger and D. Page and M. Stam

   2004/156 ( PS PS.GZ PDF )
          Why Quantum Cryptography?
          Kenneth G. Paterson and Fred Piper and Ruediger Schack

   2004/155 ( PDF )
          TrustBar:  Protecting  (even Naïve) Web Users from Spoofing and
          Phishing Attacks
          Amir Herzberg and Ahmad Gbara

   2004/154 ( PDF )
          Controlling Spam by Secure Internet Content Selection
          Amir Herzberg

   2004/153 ( PS PS.GZ PDF )
          A  double  large  prime variation for small genus hyperelliptic
          index calculus
          Pierrick Gaudry and Emmanuel Thomé

   2004/152 ( PS PS.GZ PDF )
          Another Look at ``Provable Security''
          Neal Koblitz and Alfred Menezes

   2004/151 ( PDF )
          Suitable  Curves  for  Genus-4  HCC  over  Prime  Fields: Point
          Counting    Formulae   for   Hyperelliptic   Curves   of   type
          $y^2=x^{2k+1}+ax$
          Mitsuhiro Haneda and Mitsuru Kawazoe and Tetsuya Takahashi

   2004/150 ( PS PS.GZ PDF )
          An Authenticated Certificateless Public Key Encryption Scheme
          Young-Ran Lee and Hyang-Sook Lee

   2004/149 ( PDF )
          Secure  and  Efficient  AES  Software  Implementation for Smart
          Caards
          E. Trichina and L. Korkishko

   2004/148 ( PDF )
          Provably  Secure  Delegation-by-Certification  Proxy  Signature
          Schemes
          Zuowen Tan and Zhuojun Liu

   2004/147 ( PS PS.GZ PDF )
          Key Recovery Method for CRT Implementation of RSA
          Matthew J. Campagna and Amit Sethi

   2004/146 ( PS PS.GZ )
          Near-Collisions of SHA-0
          Eli Biham, Rafi Chen

   2004/145 ( PS PS.GZ PDF )
          Electromagnetic Side Channels of an FPGA Implementation of AES
          Vincent  Carlier,  Hervé  Chabanne, Emmanuelle Dottax and Hervé
          Pelletier

   2004/144 ( PS PS.GZ )
          Plateaued Rotation Symmetric Boolean Functions on Odd Number of
          Variables
          Alexander Maximov and Martin Hell and Subhamoy Maitra


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR