New Reports in the Cryptology ePrint Archive
2001/007 ( PS PS.GZ )
Are 'Strong' Primes Needed for RSA
Ron RIvest & Robert Silverman
2001/006 ( PS PS.GZ PDF )
Secure and Efficient Asynchronous Broadcast Protocols
Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup
2001/005 ( PS PS.GZ PDF )
A Note on Cryptanalysis of the Preliminary Version of the NTRU
Signature Scheme
Ilya Mironov
2001/004 ( -- withdrawn -- )
MinRank problem and Zero-knowledge authentication
Nicolas T. Courtois
2001/003 ( PS PS.GZ )
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic
groups
Antoine Joux and Kim Nguyen
2001/002 ( PS PS.GZ PDF )
The Power of RSA Inversion Oracles and the Security of Chaum's
RSA-Based Blind Signature Scheme
M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko
2001/001 ( PS PS.GZ PDF )
Efficient Algorithms for Computing Differential Properties of Addition
Helger Lipmaa, Shiho Moriai
2000/069 ( PS PS.GZ )
New constructions of resilient Boolean functions with maximal
nonlinearity
Yuriy Tarannikov
2000/068 ( PDF )
A Content Certified E-mail Protocol with a Public Mailbox
Tak-Ming Law
2000/067 ( PS PS.GZ )
A unified framework for analyzing security of protocols
Ran Canetti
2000/066 ( PS PS.GZ )
A Model for Asynchronous Reactive Systems and its Application to Secure
Message Transmission
Birgit Pfitzmann and Michael Waidner
2000/065 ( PS PS.GZ )
How to Encrypt Long Messages without Large Size Symmetric/Asymmetric
Encryption Schemes
Masashi Mitomo and Kaoru Kurosawa
2000/064 ( PS PS.GZ )
On the Security of Modular Exponentiation with Application to the
Construction of Pseudorandom Generators
Oded Goldreich and Vered Rosen
2000/063 ( PS PS.GZ )
Candidate One-Way Functions Based on Expander Graphs
Oded Goldreich
2000/062 ( -- withdrawn -- )
Non-Deforming Digital Watermarks
Gideon Samid
2000/061 ( PS PS.GZ PDF )
RSA-OAEP is Still Alive!
Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and
Jacques Stern
2000/060 ( PS PS.GZ PDF )
OAEP Reconsidered
Victor Shoup
2000/059 ( PDF )
Essential Shannon Security with Keys Smaller Than the Encrypted Message
Gideon Samid
2000/058 ( PS PS.GZ )
Graph-Based Authentication of Digital Streams
Sara Miner and Jessica Staddon
2000/057 ( PS PS.GZ PDF )
Session-Key Generation using Human Passwords Only
Oded Goldreich and Yehuda Lindell
2000/056 ( PS PS.GZ )
A Complete Problem for Statistical Zero Knowledge
Amit Sahai and Salil Vadhan
2000/055 ( PS PS.GZ PDF )
Multiparty Computation from Threshold Homomorphic Encryption
Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen
2000/054 ( PS PS.GZ )
Correlation Immune Boolean Functions with Very High Nonlinearity
Subhamoy Maitra
2000/053 ( PS PS.GZ PDF )
A Construction of Resilient Functions with High Nonlinearity
Thomas Johansson and Enes Pasalic
2000/052 ( PDF )
CRYPTANALYSIS OF THE A5/2 ALGORITHM
Slobodan Petrovic and Amparo Fúster-Sabater
2000/051 ( PS PS.GZ )
Reducing the Gate Count of Bitslice DES
Matthew Kwan
2000/050 ( PS PS.GZ )
Spectral Analysis of High Order Correlation Immune Functions
Yuriy Tarannikov and Denis Kirienko
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR