New Reports in the Cryptology ePrint Archive
2002/030 ( PS PS.GZ )
Adaptive chi-square test and its application to some cryptographic
problems.
Boris Ryabko
2002/029 ( PS PS.GZ PDF )
Efficient Computation Modulo a Shared Secret with Application to the
Generation of Shared Safe-Prime Products
Joy Algesheimer and Jan Camenisch and Victor Shoup
2002/028 ( PS PS.GZ PDF )
A Universal Forgery of Hess's Second ID-based Signature against the
Known-message Attack
Jung Hee Cheon
2002/027 ( PS PS.GZ PDF )
Efficient and Non-Malleable Proofs of Plaintext Knowledge and
Applications
Jonathan Katz
2002/026 ( PS PS.GZ )
Generic Groups, Collision Resistance, and ECDSA
Daniel R. L. Brown
2002/025 ( PS PS.GZ PDF )
Making Mix Nets Robust For Electronic Voting By Randomized Partial
Checking
Markus Jakobsson and Ari Juels and Ron Rivest
2002/024 ( PS PS.GZ PDF )
Timed Release of Standard Digital Signatures
Juan Garay and Markus Jakobsson
2002/023 ( PS PS.GZ PDF )
Almost Optimal Hash Sequence Traversal
Don Coppersmith and Markus Jakobsson
2002/022 ( PS PS.GZ PDF )
From Identification to Signatures via the Fiat-Shamir Transform:
Minimizing Assumptions for Security and Forward-Security
Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip
Namprempre
2002/021 ( PS PS.GZ )
Spectral Analysis of Boolean Functions under Non-uniformity of
Arguments
Kanstantsin Miranovich
2002/020 ( PS PS.GZ PDF )
Cryptanalysis of stream ciphers with linear masking
Don Coppersmith and Shai Halevi and Charanjit Jutla
2002/019 ( PS PS.GZ PDF )
Scream: a software-efficient stream cipher
Shai Halevi and Don Coppersmith and Charanjit Jutla
2002/018 ( PS PS.GZ )
An Identity-Based Signature from Gap Diffie-Hellman Groups
Jae Choon Cha and Jung Hee Cheon
2002/017 ( PS PS.GZ PDF )
The Cramer-Shoup Strong-RSA Signature Scheme Revisited
Marc Fischlin
2002/016 ( PDF )
Content Extraction Signatures
Ron Steinfeld and Laurence Bull and Yuliang Zheng
2002/015 ( PDF )
Security proofs of cryptographic protocols
Eva Jencusova
2002/014 ( PS PS.GZ PDF )
Better than BiBa: Short One-time Signatures with Fast Signing and
Verifying
Leonid Reyzin and Natan Reyzin
2002/013 ( PS PS.GZ PDF )
Generic Lower Bounds for Root Extraction and Signature Schemes in
General Groups
Ivan Damgard and Maciej Koprowski
2002/012 ( PS PS.GZ PDF )
Exponent Group Signature Schemes and Efficient Identity Based Signature
Schemes Based on Pairings
F. Hess
2002/011 ( PS PS.GZ )
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length
Messages
Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier,
David Pointcheval and Christophe Tymen
2002/010 ( PS PS.GZ )
Cut and Paste Attacks with Java
Serge Lefranc and David Naccache
2002/009 ( PS PS.GZ PDF )
Tree-based Group Key Agreement
Yongdae Kim and Adrian Perrig and Gene Tsudik
2002/008 ( PS PS.GZ PDF )
Efficient Algorithms for Pairing-based Cryptosystems
Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott
2002/007 ( PS PS.GZ PDF )
Parallel scalar multiplication on general elliptic curves over
$\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and
Jean-Pierre Seifert
2002/006 ( PDF )
The best and worst of supersingular abelian varieties in cryptology
Karl Rubin and Alice Silverberg
2002/005 ( PS PS.GZ )
Cryptanalysis of Stream Cipher COS (2,128) Mode I
Hongjun Wu and Feng Bao
2002/004 ( PS PS.GZ PDF )
ID-based Signatures from Pairings on Elliptic Curves
Kenneth G. Paterson
2002/003 ( PS PS.GZ )
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
2002/002 ( PS PS.GZ PDF )
Extracting Witnesses from Proofs of Knowledge in the Random Oracle
Model
Jens Groth
2002/001 ( PS PS.GZ PDF )
Fractal Hash Sequence Representation and Traversal
Markus Jakobsson
------------------------------------------------------------------------
2001/113 ( PDF )
Efficient Revocation of Anonymous Group Membership
Jan Camenisch and Anna Lysyanskaya
2001/112 ( PS PS.GZ PDF )
A Proposal for an ISO Standard for Public Key Encryption
Victor Shoup
2001/111 ( PS PS.GZ )
An Identity Based Authenticated Key Agreement Protocol Based on the
Weil Pairing
N.P. Smart
2001/110 ( PS PS.GZ )
RSA hybrid encryption schemes
Louis Granboulan
2001/109 ( PDF )
New Notions of Soundness and Simultaneous Resettability in the
Public-Key Model
Yunlei ZHAO
2001/108 ( PS PS.GZ PDF )
Design and Analysis of Practical Public-Key Encryption Schemes Secure
against Adaptive Chosen Ciphertext Attack
Ronald Cramer and Victor Shoup
2001/107 ( PS PS.GZ PDF )
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Yehuda Lindell
2001/106 ( PS PS.GZ PDF )
Cryptanalysis of the COS (2,128) Stream Ciphers
Steve Babbage
2001/105 ( PS PS.GZ )
Universal Arguments and their Applications
Boaz Barak and Oded Goldreich
2001/104 ( PS PS.GZ )
Concurrent Zero-Knowledge With Timing, Revisited
Oded Goldreich
2001/103 ( PS PS.GZ PDF )
Countermeasures against Side-Channel Attacks for Elliptic Curve
Cryptosystems
Antonio Bellezza
2001/102 ( PS PS.GZ PDF )
An Extended Quadratic Frobenius Primality Test with Average Case Error
Estimates
Ivan Damg{\aa}rd and Gudmund Frandsen
2001/101 ( PDF )
Quasi-Efficient Revocation of Group Signatures
Giuseppe Ateniese and Gene Tsudik
2001/100 ( PS PS.GZ )
A Short Note on Girault's Self-Certified Model
Shahrokh Saeednia
2001/099 ( PS PS.GZ )
Linear Code Implies Public-Key Traitor Tracing
Kaoru Kurosawa and Takuya Yoshida
2001/098 ( PS PS.GZ PDF )
Fast hashing onto elliptic curves over fields of characteristic 3
Paulo S. L. M. Barreto and Hae Yong Kim
2001/097 ( PS PS.GZ )
An Efficient MAC for Short Messages
Sarvar Patel
2001/096 ( PS PS.GZ )
Constructing elliptic curves with a given number of points over a
finite field
Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan
2001/095 ( PS PS.GZ PDF )
Secure Vickrey Auctions without Threshold Trust
Helger Lipmaa and N. Asokan and Valtteri Niemi
2001/094 ( PS PS.GZ )
Slope packings and coverings, and generic algorithms for the discrete
logarithm problem
M. Chateauneuf and A.C.H. Ling and D.R. Stinson
2001/093 ( PS PS.GZ PDF )
Threshold Cryptosystems Based on Factoring
Jonathan Katz and Moti Yung
2001/092 ( PS PS.GZ PDF )
BDD-based Cryptanalysis of Keystream Generators
Matthias Krause
2001/091 ( PS PS.GZ PDF )
Perfect Hiding and Perfect Binding Universally Composable Commitment
Schemes with Constant Expansion Factor
Ivan Damgård and Jesper B. Nielsen
2001/090 ( PS PS.GZ PDF )
Identity Based Encryption From the Weil Pairing
Dan Boneh and Matthew Franklin
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR