New Reports in the Cryptology ePrint Archive

Note: The 1996-1999 contents of the Theory of Cryptology Library have been automatically included in the Cryptology ePrint Archive for the years prior to 2000.
2000/049 ( PS PS.GZ )
     Spectral Domain Analysis of Correlation Immune and Resilient Boolean
     Functions
     Palash Sarkar
2000/048 ( PS PS.GZ )
     New Constructions of Resilent and Correlation Immune Boolean Functions
     achieving Upper Bounds on Nonlinearity
     Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar
2000/047 ( PS PS.GZ )
     Highly Nonlinear Balanced Boolean Functions with very good
     Autocorrelation Property
     Subhamoy Maitra
2000/046 ( PS PS.GZ PDF )
     The Saturation Attack - a Bait for Twofish
     Stefan Lucks
2000/045 ( PS PS.GZ PDF )
     Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
     Assumptions
     Ronald Cramer and Ivan Damg{\aa}rd and Philip MacKenzie
2000/044 ( PS PS.GZ PDF )
     Provably Secure Password-Authenticated Key Exchange Using
     Diffie-Hellman
     Victor Boyko and Philip MacKenzie and Sarvar Patel
2000/043 ( PS PS.GZ )
     Constructions and Bounds for Unconditionally Secure Commitment Schemes
     C. Blundo and B. Masucci and D.R. Stinson and R. Wei
2000/042 ( PS PS.GZ )
     Constructing Pseudo-Random Permutations with a Prescribed Structure
     Moni Naor and Omer Reingold
2000/041 ( PS PS.GZ )
     On Symmetrically Private Information Retrieval
     Sanjeev Kumar Mishra
2000/040 ( PS PS.GZ )
     Decimation Attack of Stream Ciphers
     Eric FILIOL
2000/039 ( PS PS.GZ )
     Encryption Modes with Almost Free Message Integrity
     Charanjit S. Jutla
2000/038 ( PS PS.GZ )
     On the Complexity of Verifiable Secret Sharing and Multi-Party
     Computation
     Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski
2000/037 ( PS PS.GZ )
     General Secure Multi-Party Computation from any Linear Secret Sharing
     Scheme
     Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer
2000/036 ( PS PS.GZ )
     Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous
     Diophantine Approximation
     Jean-Pierre Seifert
2000/035 ( PS PS.GZ )
     Electronic Jury Voting Protocols
     Alejandro Hevia and Marcos Kiwi
2000/034 ( PS PS.GZ PDF )
     Random Oracles in Constantinople: Practical Asynchronous Byzantine
     Agreement using Cryptography
     Christian Cachin and Klaus Kursawe and Victor Shoup
2000/033 ( PS PS.GZ PDF )
     The Complete Distribution of Linear Probabilities of MARS' s-box
     Kazumaro Aoki
2000/032 ( PS PS.GZ )
     Anonymous Fingerprinting with Direct Non-Repudiation
     Birgit Pfitzmann, Ahmad-Reza Sadeghi
2000/031 ( PS PS.GZ PDF )
     Forward Security in Threshold Signature Schemes
     Michel Abdalla and Sara Miner and Chanathip Namprempre
2000/030 ( PS PS.GZ )
     Secure Multiparty Computation of Approximations
     Joan Feigenbaum and Jessica Fong and Martin Strauss and Rebecca N.
     Wright
2000/029 ( PS PS.GZ )
     Concrete Security Characterizations of PRFs and PRPs: Reductions and
     Applications
     Anand Desai and Sara Miner
2000/028 ( PS PS.GZ )
     An Information-Theoretic Model for Steganography
     Christian Cachin
2000/027 ( PS PS.GZ PDF )
     Accountable Certificate Management using Undeniable Attestations
     Ahto Buldas and Peeter Laud and Helger Lipmaa


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR