New Reports in the Cryptology ePrint Archive
2001/044
Optimistic Asynchronous Multi-Party Contract Signing with
Reduced Number of Rounds
Birgit Baum-Waidner
2001/043
Cryptanalysis of the Vesta-2M Stream Cipher
Marina Pudovkina
2001/042
Simple Forward-Secure Signatures From Any Signature Scheme
Hugo Krawczyk
2001/041
Solving Elliptic Curve Discrete Logarithm Problems Using Weil
Descent
Michael Jacobson and Alfred Menezes and Andreas Stein
2001/040
Analysis of Key-Exchange Protocols and Their Use for Building
Secure Channels
Ran Canetti and Hugo Krawczyk
2001/039
Robust Software Tokens: Towards Securing a Digital Identity
Taekyoung Kwon
2001/038
Flaws in differential cryptanalysis of Skipjack
Louis Granboulan
2001/037
EMpowering Side-Channel Attacks
Josyula R. Rao and Pankaj Rohatgi
2001/036
Anti-persistence: History Independent Data Structures
Moni Naor and Vanessa Teague
2001/035
Forward security in private key cryptography
Mihir Bellare and Bennet Yee
2001/034
Composition and Efficiency Tradeoffs for Forward-Secure Digital
Signatures
Tal Malkin and Daniele Micciancio and Sara Miner
2001/033
Dual of New Method for Upper Bounding the Maximum Average
Linear Hull Probability for SPNs
Liam Keliher and Henk Meijer and Stafford Tavares
2001/032
Efficient and Non-Interactive Non-Malleable Commitment
Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky
and Adam Smith
2001/031
Efficient Password-Authenticated Key Exchange Using
Human-Memorable Passwords
Jonathan Katz and Rafail Ostrovsky and Moti Yung
2001/030
On the Power of Nonlinear Secret-Sharing
Amos Beimel and Yuval Ishai
2001/029
On multivariate signature-only public key cryptosystems
Nicolas T. Courtois
2001/028
Efficient Encryption for Rich Message Spaces Under General
Assumptions
Alexander Russell and Hong Wang
2001/027
PMAC
Phillip Rogaway and John Black
2001/026
OCB Mode
Phillip Rogaway and Mihir Bellare and John Black and Ted
Krovetz
2001/025
Cryptanalysis of some elliptic curve based cryptosystems of
Paillier
Steven D. Galbraith
2001/024
Secure Multiparty Computation of Approximations
Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim
and Martin Strauss and Rebecca N. Wright
2001/023
Robustness for Free in Unconditional Multi-Party Computation
Martin Hirt and Ueli Maurer
2001/022
Optimistic Asynchronous Atomic Broadcast
Klaus Kursawe and Victor Shoup
2001/021
The Rectangle Attack - Rectangling the Serpent
Biham Eli, Orr Dunkelman, Nathan Keller
2001/020
Some observations on the theory of cryptographic hash functions
D.R. Stinson
2001/019
An Efficient System for Non-transferable Anonymous Credentials
with Optional Anonymity Revocation
Jan Camenisch and Anna Lysyanskaya
2001/018
Analysis of a Subset Sum Randomizer
Peter Gemmell and Anna Johnston
2001/017
On adaptive vs. non-adaptive security of multiparty protocols
Ran Canetti and Ivan Damgard and Stefan Dziembowski and Yuval
Ishai and Tal Malkin
2001/016
Efficient Traitor Tracing Algorithms using List Decoding
Alice Silverberg and Jessica Staddon and Judy Walker
2001/015
An observation regarding Jutla's modes of operation
Shai Halevi
2001/014
Timed-Release Cryptography
Wenbo Mao
2001/013
Digitally Watermarking RSA Moduli
Anna M. Johnston
2001/012
Ciphers with Arbitrary Finite Domains
John Black and Phillip Rogaway
2001/011
New Zero-knowledge Undeniable Signatures - Forgery of Signature
Equivalent to Factorisation
Wenbo Mao
2001/010
How to achieve a McEliece-based Digital Signature Scheme
Nicolas Courtois, Matthieu Finiasz and Nicolas Sendrier
2001/009
Robust key-evolving public key encryption schemes
Wen-Guey Tzeng, Zhi-Jia Tzeng
2001/008
Fully Distributed Threshold RSA under Standard Assumptions
Pierre-Alain Fouque and Jacques Stern
2001/007
Are 'Strong' Primes Needed for RSA
Ron RIvest & Robert Silverman
2001/006
Secure and Efficient Asynchronous Broadcast Protocols
Christian Cachin and Klaus Kursawe and Frank Petzold and Victor
Shoup
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR