Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Publications of EPRINT 2002
Page
Title
Fractal Hash Sequence Representation and Traversal
Evaluating Security of Voting Schemes in the Universal Composability Framework
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
ID-based Signatures from Pairings on Elliptic Curves
Cryptanalysis of Stream Cipher COS (2,128) Mode I
Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
Efficient Algorithms for Pairing-Based Cryptosystems
Tree-based Group Key Agreement
Cut and Paste Attacks with Java
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
Better than BiBa: Short One-time Signatures with Fast Signing and Verifying
Security proofs of cryptographic protocols
Content Extraction Signatures
The Cramer-Shoup Strong-RSA Signature Scheme Revisited
An Identity-Based Signature from Gap Diffie-Hellman Groups
Scream: a software-efficient stream cipher
Cryptanalysis of stream ciphers with linear masking
Spectral Analysis of Boolean Functions under Non-uniformity of Arguments
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
Almost Optimal Hash Sequence Traversal
Timed Release of Standard Digital Signatures
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
Generic Groups, Collision Resistance, and ECDSA
Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications
A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
Adaptive chi-square test and its application to some cryptographic problems
A Parallelizable Design Principle for Cryptographic Hash Functions
Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
An OAEP Variant With a Tight Security Proof
Tripartite Authenticated Key Agreement Protocols from Pairings
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
An efficient semantically secure elliptic curve cryptosystem based on KMOV
A Distributed RSA Signature Scheme for General Access Structures
Partial Key Escrow Monitoring Scheme
Secure Computation Without Agreement
New Results on Boomerang and Rectangle Attack
A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack
Strict Polynomial-time in Simulation and Extraction
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Cryptanalysis of S-DES
On the Security of Joint Signature and Encryption
Universal Composition with Joint State
Towards a Uniform Description of Several Group Based Cryptographic Primitives
Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
Secret sharing schemes with three or four minimal qualified subsets
Fully Distributed Proxy Signature Schemes
A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order
Extended Validity and Consistency in Byzantine Agreement
SiBIR: Signer-Base Intrusion-Resilient Signatures
Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
Hierarchical ID-Based Cryptography
A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
Construction of UOWHF: Tree Hashing Revisited
Universally Composable Notions of Key Exchange and Secure Channels
A Forward-Secure Public-Key Encryption Scheme
Strengthened Encryption in the CBC Mode
ABC - A Block Cipher
On some Attacks on Multi-prime RSA
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold
Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
(Not So) Random Shuffles of RC4
Improved key recovery of level 1 of the Bluetooth Encryption System
A Distributed and Computationally Secure Key Distribution Scheme
Weak Keys in MST1
Further Results and Considerations on Side Channel Attacks on RSA
Authenticated Identity-Based Encryption
Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures
How to repair ESIGN
Fault based cryptanalysis of the Advanced Encryption Standard
Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP
Key-Insulated Public-Key Cryptosystems
On the efficiency of the Clock Control Guessing Attack
Applications of Multilinear Forms to Cryptography
Some Applications of Threshold Signature Schemes to Distributed Protocols
Authentication of Quantum Messages
A semantically secure elliptic curve RSA scheme with small expansion factor
Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
Efficient and Player-Optimal Strong Consensus
Adapting the weaknesses of the Random Oracle model to the Generic Group model
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
Constructing Elliptic Curves with Prescribed Embedding Degrees
On Chosen Ciphertext Security of Multiple Encryptions
Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol
Multiplicative Masking and Power Analysis of AES
TMAC: Two-Key CBC MAC
A Fuzzy Vault Scheme
Building curves with arbitrary small MOV degree over finite prime fields
The (a, b)-Shrinking Generator
Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank
A new public key encryption scheme provably secure against adaptive chosen cipher-text attack
Identity-Based Signcryption
A New Statistical Testing for Symmetric Ciphers and Hash Functions
Encryption-Scheme Security in the Presence of Key-Dependent Messages
An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property
Applying General Access Structure to Metering Schemes
On the Power of Claw-Free Permutations
Forward-Secure Signatures with Fast Key Update
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
Secret sharing schemes on access structures with intersection number equal to one
Efficient Arithmetic on Hyperelliptic Curves
Clock-Controlled Alternating Step Generator
A New Class of Unsafe Primes
The GGM Construction does NOT yield Correlation Intractable Function Ensembles
On Linear Redundancy in the AES S-Box
An Efficient Procedure to Double and Add Points on an Elliptic Curve
A Note on the Bilinear Diffie-Hellman Assumption
Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three
Universal Padding Schemes for RSA
How to convert any ID-based Signature Schemes
Diffie-Hellman Problems and Bilinear Maps
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme
Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
Security Analysis of IKE's Signature-based Key-Exchange Protocol
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
New covering radius of Reed-Muller codes for $t$-resilient functions
On Optimal Hash Tree Traversal for Interval Time-Stamping
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
Power of a Public Random Permutation and its Application to Authenticated-Encryption
Perfectly Secure Message Transmission Revisited
Key-collisions in (EC)DSA: Attacking Non-repudiation
OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives
An Improved Pseudorandom Generator Based on Hardness of Factoring
Tight Lower Bound on Linear Authenticated Encryption
Efficient Construction of (Distributed) Verifiable Random Functions
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
Tolerant Combiners: Resilient Cryptographic Design
Practical Non-Interactive Key Distribution Based on Pairings
Provably Secure Steganography
On the Security of HFE, HFEv- and Quartz
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
Universally Composable Two-Party and Multi-Party Secure Computation
Applying General Access Structure to Proactive Secret Sharing Schemes
On the Applicability of Distinguishing Attacks Against Stream Ciphers
An Attack on the Isomorphisms of Polynomials Problem with One Secret
On Some Algebraic Structures in the AES Round Function
Cryptanalysis of MQV with partially known nonces
Bauer-Berson-Feiertag attack revisited
Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
About Filliol's Observations on DES, AES and Hash Functions (draft)
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
Selective disclosure credential sets
A note on Weak Keys of PES, IDEA and some Extended Variants
Weighted Coordinates on Genus 2 Hyperelliptic Curves
On multi-exponentiation in cryptography
Secure Bilinear Diffie-Hellman Bits
Validating Digital Signatures without Time-Stamping and Certificate Revocation
In How Many Ways Can You Write Rijndael?
The Book of Rijndaels
Related-Key and Key-Collision Attacks Against RMAC
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Practical Verifiable Encryption and Decryption of Discrete Logarithms
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
Man-in-the-Middle in Tunnelled Authentication Protocols
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
Coercion-Resistant Electronic Elections
Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms
Cryptanalysis of Two New Signature Schemes
New Signature Scheme Using Conjugacy Problem
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
An Analysis of RMAC
Statistical weaknesses in the alleged RC4 keystream generator
PECDSA. How to build a DL-based digital signature scheme with the best proven security
Efficient Group Signatures without Trapdoors
A Designer's Guide to KEMs
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Theoretical Analysis of ``Correlations in RC6''
two attacks on xia-you Group Signature
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
Parallel Algorithm for Multiplication on Elliptic Curves
OMAC: One-Key CBC MAC
Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields
Oblivious Keyword Search
Simple backdoors to RSA key generation
Identity Based Authenticated Key Agreement Protocols from Pairings
Turing, a fast stream cipher
Zero-Knowledge twenty years after its invention
Entity Authentication Schemes Using Braid Word Reduction
Key recovery attacks on NTRU without ciphertext validation routine
Bit-Slice Auction Circuit
Parallelizable Authentication Trees
A Linearization Attack on the Bluetooth Key Stream Generator
Security Proofs for an Efficient Password-Based Key Exchange
A Note on Ideal Tripartite Access Structures
A polarisation based Visual Crypto System and its Secret Sharing Schemes
An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes