New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
   2003/182 ( PS PS.GZ PDF )
          Chosen-Ciphertext Security from Identity-Based Encryption
          Ran Canetti, Shai Halevi, and Jonathan Katz
   2003/181 ( PS PS.GZ PDF )
          On the Security of Multiple Encryption or
          Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki
   2003/180 ( PS PS.GZ )
          Parallelizing Explicit Formula for Arithmetic in the Jacobian
          of Hyperelliptic Curves
          Pradeep Kumar Mishra and Palash Sarkar
   2003/179 ( PS PS.GZ PDF )
          VMPC one-way function
          Bartosz Zoltak
   2003/178 ( PDF )
          Constructing Optimistic Fair Exchange Protocols from Committed
          Huafei Zhu
   2003/177 ( PS PS.GZ PDF )
          Building Secure Cryptographic Transforms, or How to Encrypt and
          Tadayoshi Kohno and Adriana Palacio and John Black
   2003/176 ( PS PS.GZ PDF )
          Patterson-Wiedemann Construction Revisited
          S. Gangopadhyay and P. H. Keskar and S. Maitra
   2003/175 ( PS PS.GZ PDF )
          Double-Speed Safe Prime Generation
          David Naccache
   2003/174 ( PS PS.GZ PDF )
          Relaxing Chosen-Ciphertext Security
          Ran Canetti and Hugo Krawczyk and Jesper Nielsen
   2003/173 ( PS PS.GZ )
          Domain Extender for Collision Resistant Hash Functions Using a
          Directed Acyclic Graph
          Palash Sarkar
   2003/172 ( PS PS.GZ PDF )
          NAEP: Provable Security in the Presence of Decryption Failures
          Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and
          William Whyte
   2003/171 ( PS PS.GZ PDF )
          Scalable Protocols for Authenticated Group Key Exchange
          Jonathan Katz and Moti Yung
   2003/170 ( PS PS.GZ PDF )
          HARPS: HAshed Random Preloaded Subset Key Distribution
          Mahalingam Ramkumar and Nasir Memon
   2003/169 ( PS PS.GZ PDF )
          Properties of the Transformation Semigroup of the Solitaire
          Stream Cipher 
          Boris Pogorelov and Marina Pudovkina 
   2003/168 ( PS PS.GZ )
          Robust discretization, with an application to graphical
          Jean-Camille Birget and Dawei Hong and Nasir Memon
   2003/167 ( PDF )
          Identity-based Chameleon Hash and Applications
          Giuseppe Ateniese and Breno de Medeiros 
   2003/166 ( PS PS.GZ PDF )
          A reduction of the space for the parallelized Pollard lambda
          search on elliptic curves over prime finite fields and on
          anomalous binary elliptic curves
          Igor Semaev
   2003/165 ( PDF )
          Commitment Capacity of Discrete Memoryless Channels
          Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
   2003/164 ( PS PS.GZ PDF )
          Identity-Based Threshold Decryption
          Joonsang Baek and Yuliang Zheng
   2003/163 ( PS PS.GZ PDF )
          Multipurpose Identity-Based Signcryption : A Swiss Army Knife
          for Identity-Based Cryptography
          Xavier Boyen
   2003/162 ( PS PS.GZ PDF )
          Cryptanalysis of the Alleged SecurID Hash Function
          Alex Biryukov and Joseph Lano and Bart Preneel
   2003/161 ( PS PS.GZ PDF )
          Indifferentiability, Impossibility Results on Reductions, and
          Applications to the Random Oracle Methodology
          Ueli Maurer and Renato Renner and Clemens Holenstein
   2003/160 ( PDF )
          Tame Transformation Signatures
          Jiun-Ming Chen and Bo-Yin Yang
   2003/159 ( PS PS.GZ PDF )
          An efficient variant of the RSA cryptosystem
          Cesar Alison Monteiro Paixão
   2003/158 ( PS PS.GZ )
          Study of Domain Extension of UOWHF and Its Optimality
          Mridul Nandi
   2003/157 ( PS PS.GZ )
          Some RSA-based Encryption Schemes with Tight Security Reduction
          Kaoru Kurosawa and Tsuyoshi Takagi 
   2003/156 ( PS PS.GZ )
          Efficient Proven Secure Public Key Steganography
          Tri Van Le
   2003/155 ( PDF )
          A Formal Proof of Zhu's Signature Scheme
          huafei zhu
   2003/154 ( PS PS.GZ )
          ManTiCore: Encryption with Joint Cipher-State Authentication
          Cheryl Beaver and Timothy Draelos and Richard Schroeppel and
          Mark Torgerson
   2003/153 ( PDF )
          Attack on an Identification Scheme Based on Gap Diffie-Hellman
          Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG
   2003/152 ( PDF )
          Optimal Statistical Power Analysis
          Eric Brier and Christophe Clavier and Francis Olivier
   2003/151 ( PDF )
          Secret sharing schemes on sparse homogeneous access structures
          with rank three
          Jaume Martí-Farré and Carles Padró
   2003/150 ( PS PS.GZ PDF )
          On the random-oracle methodology as applied to
          length-restricted signature schemes
          Ran Canetti and Oded Goldreich and Shai Halevi
   2003/149 ( -- withdrawn -- )
          Forward-Secure Hierarchical ID-Based Cryptography
          Danfeng Yao and Anna Lysyanskaya
   2003/148 ( PS PS.GZ PDF )
          A Tweakable Enciphering Mode
          Shai Halevi and Phillip Rogaway
   2003/147 ( PS PS.GZ PDF )
          A Parallelizable Enciphering Mode
          Shai Halevi and Phillip Rogaway
   2003/146 ( PS PS.GZ PDF )
          Breaking and Repairing Optimistic Fair Exchange from PODC 2003
          Yevgeniy Dodis and Leonid Reyzin
   2003/145 ( PS PS.GZ )
          Symmetric Authentication Within a Simulatable Cryptographic
          Michael Backes and Birgit Pfitzmann and Michael Waidner
   2003/144 ( PS PS.GZ PDF )
          ID-based tripartite key agreement with signatures
          Divya Nalla
   2003/143 ( PS PS.GZ PDF )
          Elliptic curves suitable for pairing based cryptography
          Friederike Brezing and Annegret Weng
   2003/142 ( PS PS.GZ )
          A New Tree based Domain Extension of UOWHF
          Mridul Nandi
   2003/141 ( PS PS.GZ PDF )
          General Composition and Universal Composability in Secure
          Multi-Party Computation
          Yehuda Lindell
   2003/140 ( PS PS.GZ PDF )
          Trading-Off Type-Inference Memory Complexity Against
          Konstantin Hypp\"onen and David Naccache and Elena Trichina and
          Alexei Tchoulkine
   2003/139 ( PDF )
          On the Randomness of the Editing Generator
          Enjian Bai and Guozhen Xiao
   2003/138 ( PS PS.GZ )
          Permutation graphs, fast forward permutations, and
          Boaz Tsaban
   2003/137 ( PS PS.GZ )
          Bernoulli numbers and the probability of a birthday surprise
          Boaz Tsaban
   2003/136 ( PS PS.GZ )
          Efficient linear feedback shift registers with maximal period
          Boaz Tsaban and Uzi Vishne
   2003/135 ( PS PS.GZ PDF )
          Collision Attack on Reduced-Round Camellia
          Wen-Ling Wu and Deng-Guo Feng
   2003/134 ( -- withdrawn -- )
          Direct Sum of Non Normal and Normal Bent Functions Always
          Produces Non Normal Bent Functions
          Sugata Gangopadhyay and Subhamoy Maitra
   2003/133 ( PS PS.GZ PDF )
          Minimum Distance between Bent and 1-resilient Boolean Functions
          Soumen Maity and Subhamoy Maitra
   2003/132 ( PS PS.GZ )
          Guaranteeing the diversity of number generators
          Adi Shamir and Boaz Tsaban
   2003/131 ( PS PS.GZ PDF )
          Homomorphic public-key systems based on subgroup membership
          Kristian Gjøsteen
   2003/130 ( PS PS.GZ PDF )
          On the Pseudorandomness of KASUMI Type Permutations
          Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa
   2003/129 ( PS PS.GZ PDF )
          Attack on Han et al.'s ID-based Confirmer (Undeniable)
          Signature at ACM-EC'03 
          Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
   2003/128 ( PS PS.GZ )
          Weak Fields for ECC
          Alfred Menezes and Edlyn Teske and Annegret Weng
   2003/127 ( PDF )
          Using Information Theory Approach to Randomness Testing
          B. Ya. Ryabko and V.A. Monarev
   2003/126 ( PS PS.GZ PDF )
          Certificateless Public Key Cryptography
          Sattam S. Al-Riyami and Kenneth G. Paterson
   2003/125 ( PS PS.GZ PDF )
          Algebraic Attacks on Combiners with Memory and Several Outputs
          Nicolas T. Courtois
   2003/124 ( PS PS.GZ )
          A General Correlation Theorem
          Kishan Chand Gupta and Palash Sarkar 
   2003/123 ( PS PS.GZ PDF )
          Assessing security of some group based cryptosystems
          Vladimir Shpilrain
   2003/122 ( PDF )
          Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party
          Key Agreement Protocols
          Kyungah Shim
   2003/121 ( PS PS.GZ )
          A Cryptographically Sound Security Proof of the
          Needham-Schroeder-Lowe Public-Key Protocol
          Michael Backes and Birgit Pfitzmann
   2003/120 ( PS PS.GZ PDF )
          Physically Observable Cryptography
          Silvio Micali and Leonid Reyzin
   2003/119 ( PS PS.GZ PDF )
          How Secure Are FPGAs in Cryptographic Applications?
          Thomas Wollinger and Christof Paar
   2003/118 ( PS PS.GZ )
          Visual Crypto Displays Enabling Secure Communications
          Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring,
          Marten van Dijk
   2003/117 ( PDF )
          An identity-based ring signature scheme from bilinear pairings
          Chih-Yin Lin and Tzong-Chen Wu
   2003/116 ( PS PS.GZ PDF )
          A New ID-based Group Signature Scheme from Bilinear Pairings
          Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim 
   2003/115 ( PDF )
          Cryptanalysis of ID-based Tripartite Authenticated Key
          Agreement Protocols
          Kyungah Shim
   2003/114 ( PS PS.GZ )
          Unifying Simulatability Definitions in Cryptographic Systems
          under Different Timing Assumptions
          Michael Backes
   2003/113 ( PS PS.GZ PDF )
          Security Analysis of Shim's Authenticated Key Agreement
          Protocols from Pairings
          Hung-Min Sun and Bin-Tsan Hsieh
   2003/112 ( PS PS.GZ )
          Accumulating Composites and Improved Group Signing
          Gene Tsudik and Shouhuai Xu
   2003/111 ( PDF )
          Further Cryptanalysis of some Proxy Signature Schemes
          Jiqiang Lv and Jingwei Liu and Xinmei Wang
   2003/110 ( PDF )
          Proposal on Personal Authentication System in which Biological
          Information is embedded in Cryptosystem Key
          Yukio Itakura and Shigeo Tsujii
   2003/109 ( PS PS.GZ PDF )
          Crytanalysis of SAFER++
          Alex Biryukov and Christophe De Canni\`ere and Gustaf
   2003/108 ( PS PS.GZ )
          Novel Cyclic and Algebraic Properties of AES
          Tri Van Le
   2003/107 ( PS PS.GZ PDF )
          Fujisaki-Okamoto IND-CCA hybrid encryption revisited
          David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and
          Jorge L. Villar
   2003/106 ( PS PS.GZ PDF )
          High-speed encryption and authentication: A patent-free
          solution for 10 Gbps network devices
          Tadayoshi Kohno and John Viega and Doug Whiting
   2003/105 ( PS PS.GZ )
          On Diophantine Complexity and Statistical Zero-Knowledge
          Helger Lipmaa
   2003/104 ( PS PS.GZ PDF )
          New Proxy Signature, Proxy Blind Signature and Proxy Ring
          Signature Schemes from Bilinear Pairing
          Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin 
   2003/103 ( PS PS.GZ PDF )
          Security analysis on Nalla-Reddy's ID-based tripartite
          authenticated key agreement protocols
          Zhongliang Chen
   2003/102 ( PDF )
          Length-Based Attacks for Certain Group Based Encryption
          Rewriting Systems
          J. Hughes, and A. Tannenbaum
   2003/101 ( -- withdrawn -- )
          Cryptanalysis of HFE
          Ilia Toli
   2003/100 ( PS PS.GZ PDF )
          Bounded-Concurrent Secure Two-Party Computation Without Set-Up
          Yehuda Lindell
   2003/099 ( PS PS.GZ PDF )
          Algorithms in Braid Groups
          Matthew J. Campagna
   2003/098 ( PDF )
          Side Channel Attacks on CBC Encrypted Messages in the PKCS#7
          Vlastimil Klima and Tomas Rosa
   2003/097 ( PS PS.GZ PDF )
          Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic
          Jan Pelzl and Thomas Wollinger and Christof Paar
   2003/096 ( PS PS.GZ PDF )
          Secure Proxy Signature Schemes for Delegation of Signing Rights
          Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi
   2003/095 ( PS PS.GZ PDF )
          Public Key Trace and Revoke Scheme Secure against Adaptive
          Chosen Ciphertext Attack
          Yevgeniy Dodis and Nelly Fazio
   2003/094 ( PS PS.GZ PDF )
          Trace Zero Subvariety for Cryptosystems
          Tanja Lange
   2003/093 ( PS PS.GZ PDF )
          More Efficient Provably Secure Steganography
          Leonid Reyzin and Scott Russell
   2003/092 ( PS PS.GZ PDF )
          Provably-Secure Enhancement on 3GPP Authentication and Key
          Agreement Protocol
          Muxiang Zhang
   2003/091 ( PS PS.GZ )
          Sequential Aggregate Signatures from Trapdoor Homomorphic
          Hovav Shacham
   2003/090 ( PDF )
          A Structured Multisignature Scheme from the Gap Diffie-Hellman
          Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang
   2003/089 ( PS PS.GZ PDF )
          Efficient Public Key Generation for Multivariate Cryptosystems
          Christopher Wolf
   2003/088 ( PDF )
          Elliptic Curve Point Multiplication
          A.G.Rostovtsev and E.B.Makhovenko
   2003/087 ( PS PS.GZ PDF )
          A Practical Elliptic Curve Public Key Encryption Scheme
          Provably Secure Against Adaptive Chosen-message Attack
          huafei zhu
   2003/086 ( PS PS.GZ PDF )
          On the Selection of Pairing-Friendly Groups
          Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
   2003/085 ( PS PS.GZ )
          A defect of the implementation schemes of the TTM cryptosystem
          Jintai Ding, Dieter Schmidt 
   2003/084 ( PS PS.GZ )
          Cryptanalysis of an implementation scheme of the Tamed
          Transformation Method cryptosystem
          Jintai Ding, Timonthy Hodges
   2003/083 ( PS PS.GZ PDF )
          A Forward-Secure Public-Key Encryption Scheme
          Ran Canetti and Shai Halevi and Jonathan Katz
   2003/082 ( PS PS.GZ PDF )
          Stronger Security Bounds for OMAC, TMAC and XCBC
          Tetsu Iwata and Kaoru Kurosawa
   2003/081 ( PDF )
          Primitive Specification for SOBER-128
          Philip Hawkes and Greg Rose
   2003/080 ( PS PS.GZ PDF )
          Non-interactive and Reusable Non-malleable Commitment Schemes
          Ivan Damgård and Jens Groth
   2003/079 ( PS PS.GZ PDF )
          Fast arithmetic on Jacobians of Picard curves
          Stéphane Flon and Roger Oyono
   2003/078 ( PS PS.GZ PDF )
          Relation between simulator-based and comparison-based
          definitions of semantic security
          Yodai Watanabe and Junji Shikata
   2003/077 ( PS PS.GZ PDF )
          An Un-Instantiable Random-Oracle-Model Scheme for a
          Hybrid-Encryption Problem
          Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
   2003/076 ( PS PS.GZ PDF )
          Goldbachs Conjecture on ECDSA Protocols
          N. Vijayarangan, Nitin Agarwal, S. Kasilingam
   2003/075 ( PS PS.GZ )
          Almost Security of Cryptographic Boolean Functions
          Kaoru Kurosawa
   2003/074 ( PDF )
          Divisible Voting Scheme
          Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata
   2003/073 ( PDF )
          A Scheme for obtaining a Warrant Message from the Digital Proxy
          Sunder Lal and Amit K Awasthi
   2003/072 ( PDF )
          Proxy Blind Signature Scheme
          Sunder Lal and Amit K Awasthi
   2003/071 ( PS PS.GZ PDF )
          How to Protect Against a Militant Spammer
          Markus Jakobsson and John Linn and Joy Algesheimer
   2003/070 ( PS PS.GZ PDF )
          A Critique of CCM
          P. Rogaway and D. Wagner
   2003/069 ( PS PS.GZ PDF )
          A Conventional Authenticated-Encryption Mode
          M. Bellare and P. Rogaway and D. Wagner
   2003/068 ( PS PS.GZ PDF )
          On the Security of Some Proxy Signature Schemes
          Hung-Min Sun and Bin-Tsan Hsieh
   2003/067 ( PS PS.GZ PDF )
          Forking Lemmas in the Ring Signatures' Scenario
          Javier Herranz and Germ\'an S\'aez
   2003/066 ( PS PS.GZ PDF )
          Signcryption scheme for Identity-based Cryptosystems
          Divya Nalla, K.C.Reddy 
   2003/065 ( PS PS.GZ PDF )
          Hash Function Balance and its Impact on Birthday Attacks
          Mihir Bellare and Tadayoshi Kohno
   2003/064 ( PS PS.GZ PDF )
          On the Optimality of Linear, Differential and Sequential
          Pascal Junod
   2003/063 ( PS PS.GZ PDF )
          Initiator-Resilient Universally Composable Key Exchange
          Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt 
   2003/062 ( PS PS.GZ )
          An n-party Key Agreement Scheme using Bilinear Map
          Rana Barua and Ratna Dutta and Palash Sarkar
   2003/061 ( PDF )
          Hidden Polynomial Cryptosystems
          Ilia Toli
   2003/060 ( PS PS.GZ PDF )
          Isomorphism Classes of Picard Curves over Finite Fields
          Jong Won Lee
   2003/059 ( -- withdrawn -- )
          A Transitive Signature Scheme Provably Secure Against Adaptive
          Chosen-message Attack
          Huafei Zhu and Bao Feng and Robert H. Deng
   2003/058 ( PS PS.GZ PDF )
          An Elliptic Curve Trapdoor System
          Edlyn Teske
   2003/057 ( PS PS.GZ )
          Secure Multiplication of Shared Secrets in the Exponent
          Mario Di Raimondo and Rosario Gennaro
   2003/056 ( PS PS.GZ PDF )
          Computing of Trust in Distributed Networks
          Huafei Zhu and Bao Feng and Robert H. Deng
   2003/055 ( PDF )
          A New Approach to Prevent Blackmailing in E-Cash
          Xiaofeng Chen and Fangguo Zhang and Yumin Wang
   2003/054 ( PS PS.GZ PDF )
          ID based Cryptosystems with Pairing on Elliptic Curve
          Ryuichi SAKAI and Masao KASAHARA
   2003/053 ( PS PS.GZ )
          Tate-pairing implementations for tripartite key agreement
          Iwan Duursma and Hyang-Sook Lee
   2003/052 ( PDF )
          Attacking RSA-based Sessions in SSL/TLS
          Vlastimil Klima and Ondrej Pokorny and Tomas Rosa
   2003/051 ( PS PS.GZ )
          How to Predict the Output of a Hardware Random Number Generator
          Markus Dichtl
   2003/050 ( PS PS.GZ PDF )
          Concealment and its Applications to Authenticated Encryption
          Yevgeniy Dodis and Jee Hea An
   2003/049 ( PS PS.GZ PDF )
          Hidden Number Problem in Small Subgroups
          Igor Shparlinski and Arne Winterhof
   2003/048 ( PS PS.GZ PDF )
          Compounding Secret Sharing Schemes
          E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera 
   2003/047 ( PS PS.GZ PDF )
          A Construction of 100 bit Public-Key Cryptosystem and Digital
          Signature Scheme
          Masao KASAHARA and Ryuichi SAKAI
   2003/046 ( PS PS.GZ PDF )
          Remarks on Saeednia's Identity-based Society Oriented Signature
          Scheme with Anonymous Signers
          Guilin Wang, and Bo Zhu
   2003/045 ( PDF )
          An algorithm to obtain an RSA modulus with a large private key
          L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A.
          Queiruga Dios
   2003/044 ( -- withdrawn -- )
          Signcryption scheme for Identity-based Cryptosystems
          Divya Nalla, K.C.Reddy 
   2003/043 ( PS PS.GZ PDF )
          Parallel Signcryption with OAEP, PSS-R, and other Feistel
          Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish
   2003/042 ( PS PS.GZ )
          Timed Fair Exchange of Standard Signatures
          Juan A. Garay and Carl Pomerance
   2003/041 ( PS PS.GZ )
          A new statistical distinguisher for the shrinking generator
          Jovan Dj. Golic and Renato Menicocci
   2003/040 ( PS PS.GZ )
          Computing Walsh Transform from the Algebraic Normal Form of a
          Boolean Function
          Kishan Chand Gupta and Palash Sarkar
   2003/039 ( PS PS.GZ PDF )
          Torus-based cryptography
          Karl Rubin and Alice Silverberg
   2003/038 ( PS PS.GZ PDF )
          Pretty-Simple Password-Authenticated Key-Exchange Under
          Standard Assumptions
          Kazukuni Kobara and Hideki Imai
   2003/037 ( PS PS.GZ PDF )
          Strengthening Zero-Knowledge Protocols using Signatures
          Juan A. Garay and Philip MacKenzie and Ke Yang
   2003/036 ( PS PS.GZ PDF )
          Cryptanalysis of a public-key encryption scheme based on the
          polynomial reconstruction problem
          Jean-Sebastien Coron
   2003/035 ( PDF )
          On alternative approach for verifiable secret sharing
          Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk

[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR