New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.) 2003/182 ( PS PS.GZ PDF )
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti, Shai Halevi, and Jonathan Katz
2003/181 ( PS PS.GZ PDF )
On the Security of Multiple Encryption or
CCA-security+CCA-security=CCA-security?
Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki
Imai
2003/180 ( PS PS.GZ )
Parallelizing Explicit Formula for Arithmetic in the Jacobian
of Hyperelliptic Curves
Pradeep Kumar Mishra and Palash Sarkar
2003/179 ( PS PS.GZ PDF )
VMPC one-way function
Bartosz Zoltak
2003/178 ( PDF )
Constructing Optimistic Fair Exchange Protocols from Committed
Signatures
Huafei Zhu
2003/177 ( PS PS.GZ PDF )
Building Secure Cryptographic Transforms, or How to Encrypt and
MAC
Tadayoshi Kohno and Adriana Palacio and John Black
2003/176 ( PS PS.GZ PDF )
Patterson-Wiedemann Construction Revisited
S. Gangopadhyay and P. H. Keskar and S. Maitra
2003/175 ( PS PS.GZ PDF )
Double-Speed Safe Prime Generation
David Naccache
2003/174 ( PS PS.GZ PDF )
Relaxing Chosen-Ciphertext Security
Ran Canetti and Hugo Krawczyk and Jesper Nielsen
2003/173 ( PS PS.GZ )
Domain Extender for Collision Resistant Hash Functions Using a
Directed Acyclic Graph
Palash Sarkar
2003/172 ( PS PS.GZ PDF )
NAEP: Provable Security in the Presence of Decryption Failures
Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and
William Whyte
2003/171 ( PS PS.GZ PDF )
Scalable Protocols for Authenticated Group Key Exchange
Jonathan Katz and Moti Yung
2003/170 ( PS PS.GZ PDF )
HARPS: HAshed Random Preloaded Subset Key Distribution
Mahalingam Ramkumar and Nasir Memon
2003/169 ( PS PS.GZ PDF )
Properties of the Transformation Semigroup of the Solitaire
Stream Cipher
Boris Pogorelov and Marina Pudovkina
2003/168 ( PS PS.GZ )
Robust discretization, with an application to graphical
passwords
Jean-Camille Birget and Dawei Hong and Nasir Memon
2003/167 ( PDF )
Identity-based Chameleon Hash and Applications
Giuseppe Ateniese and Breno de Medeiros
2003/166 ( PS PS.GZ PDF )
A reduction of the space for the parallelized Pollard lambda
search on elliptic curves over prime finite fields and on
anomalous binary elliptic curves
Igor Semaev
2003/165 ( PDF )
Commitment Capacity of Discrete Memoryless Channels
Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
2003/164 ( PS PS.GZ PDF )
Identity-Based Threshold Decryption
Joonsang Baek and Yuliang Zheng
2003/163 ( PS PS.GZ PDF )
Multipurpose Identity-Based Signcryption : A Swiss Army Knife
for Identity-Based Cryptography
Xavier Boyen
2003/162 ( PS PS.GZ PDF )
Cryptanalysis of the Alleged SecurID Hash Function
Alex Biryukov and Joseph Lano and Bart Preneel
2003/161 ( PS PS.GZ PDF )
Indifferentiability, Impossibility Results on Reductions, and
Applications to the Random Oracle Methodology
Ueli Maurer and Renato Renner and Clemens Holenstein
2003/160 ( PDF )
Tame Transformation Signatures
Jiun-Ming Chen and Bo-Yin Yang
2003/159 ( PS PS.GZ PDF )
An efficient variant of the RSA cryptosystem
Cesar Alison Monteiro Paixão
2003/158 ( PS PS.GZ )
Study of Domain Extension of UOWHF and Its Optimality
Mridul Nandi
2003/157 ( PS PS.GZ )
Some RSA-based Encryption Schemes with Tight Security Reduction
Kaoru Kurosawa and Tsuyoshi Takagi
2003/156 ( PS PS.GZ )
Efficient Proven Secure Public Key Steganography
Tri Van Le
2003/155 ( PDF )
A Formal Proof of Zhu's Signature Scheme
huafei zhu
2003/154 ( PS PS.GZ )
ManTiCore: Encryption with Joint Cipher-State Authentication
Cheryl Beaver and Timothy Draelos and Richard Schroeppel and
Mark Torgerson
2003/153 ( PDF )
Attack on an Identification Scheme Based on Gap Diffie-Hellman
Problem
Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG
2003/152 ( PDF )
Optimal Statistical Power Analysis
Eric Brier and Christophe Clavier and Francis Olivier
2003/151 ( PDF )
Secret sharing schemes on sparse homogeneous access structures
with rank three
Jaume Martí-Farré and Carles Padró
2003/150 ( PS PS.GZ PDF )
On the random-oracle methodology as applied to
length-restricted signature schemes
Ran Canetti and Oded Goldreich and Shai Halevi
2003/149 ( -- withdrawn -- )
Forward-Secure Hierarchical ID-Based Cryptography
Danfeng Yao and Anna Lysyanskaya
2003/148 ( PS PS.GZ PDF )
A Tweakable Enciphering Mode
Shai Halevi and Phillip Rogaway
2003/147 ( PS PS.GZ PDF )
A Parallelizable Enciphering Mode
Shai Halevi and Phillip Rogaway
2003/146 ( PS PS.GZ PDF )
Breaking and Repairing Optimistic Fair Exchange from PODC 2003
Yevgeniy Dodis and Leonid Reyzin
2003/145 ( PS PS.GZ )
Symmetric Authentication Within a Simulatable Cryptographic
Library
Michael Backes and Birgit Pfitzmann and Michael Waidner
2003/144 ( PS PS.GZ PDF )
ID-based tripartite key agreement with signatures
Divya Nalla
2003/143 ( PS PS.GZ PDF )
Elliptic curves suitable for pairing based cryptography
Friederike Brezing and Annegret Weng
2003/142 ( PS PS.GZ )
A New Tree based Domain Extension of UOWHF
Mridul Nandi
2003/141 ( PS PS.GZ PDF )
General Composition and Universal Composability in Secure
Multi-Party Computation
Yehuda Lindell
2003/140 ( PS PS.GZ PDF )
Trading-Off Type-Inference Memory Complexity Against
Communication
Konstantin Hypp\"onen and David Naccache and Elena Trichina and
Alexei Tchoulkine
2003/139 ( PDF )
On the Randomness of the Editing Generator
Enjian Bai and Guozhen Xiao
2003/138 ( PS PS.GZ )
Permutation graphs, fast forward permutations, and
Boaz Tsaban
2003/137 ( PS PS.GZ )
Bernoulli numbers and the probability of a birthday surprise
Boaz Tsaban
2003/136 ( PS PS.GZ )
Efficient linear feedback shift registers with maximal period
Boaz Tsaban and Uzi Vishne
2003/135 ( PS PS.GZ PDF )
Collision Attack on Reduced-Round Camellia
Wen-Ling Wu and Deng-Guo Feng
2003/134 ( -- withdrawn -- )
Direct Sum of Non Normal and Normal Bent Functions Always
Produces Non Normal Bent Functions
Sugata Gangopadhyay and Subhamoy Maitra
2003/133 ( PS PS.GZ PDF )
Minimum Distance between Bent and 1-resilient Boolean Functions
Soumen Maity and Subhamoy Maitra
2003/132 ( PS PS.GZ )
Guaranteeing the diversity of number generators
Adi Shamir and Boaz Tsaban
2003/131 ( PS PS.GZ PDF )
Homomorphic public-key systems based on subgroup membership
problems
Kristian Gjøsteen
2003/130 ( PS PS.GZ PDF )
On the Pseudorandomness of KASUMI Type Permutations
Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa
2003/129 ( PS PS.GZ PDF )
Attack on Han et al.'s ID-based Confirmer (Undeniable)
Signature at ACM-EC'03
Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
2003/128 ( PS PS.GZ )
Weak Fields for ECC
Alfred Menezes and Edlyn Teske and Annegret Weng
2003/127 ( PDF )
Using Information Theory Approach to Randomness Testing
B. Ya. Ryabko and V.A. Monarev
2003/126 ( PS PS.GZ PDF )
Certificateless Public Key Cryptography
Sattam S. Al-Riyami and Kenneth G. Paterson
2003/125 ( PS PS.GZ PDF )
Algebraic Attacks on Combiners with Memory and Several Outputs
Nicolas T. Courtois
2003/124 ( PS PS.GZ )
A General Correlation Theorem
Kishan Chand Gupta and Palash Sarkar
2003/123 ( PS PS.GZ PDF )
Assessing security of some group based cryptosystems
Vladimir Shpilrain
2003/122 ( PDF )
Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party
Key Agreement Protocols
Kyungah Shim
2003/121 ( PS PS.GZ )
A Cryptographically Sound Security Proof of the
Needham-Schroeder-Lowe Public-Key Protocol
Michael Backes and Birgit Pfitzmann
2003/120 ( PS PS.GZ PDF )
Physically Observable Cryptography
Silvio Micali and Leonid Reyzin
2003/119 ( PS PS.GZ PDF )
How Secure Are FPGAs in Cryptographic Applications?
Thomas Wollinger and Christof Paar
2003/118 ( PS PS.GZ )
Visual Crypto Displays Enabling Secure Communications
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring,
Marten van Dijk
2003/117 ( PDF )
An identity-based ring signature scheme from bilinear pairings
Chih-Yin Lin and Tzong-Chen Wu
2003/116 ( PS PS.GZ PDF )
A New ID-based Group Signature Scheme from Bilinear Pairings
Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
2003/115 ( PDF )
Cryptanalysis of ID-based Tripartite Authenticated Key
Agreement Protocols
Kyungah Shim
2003/114 ( PS PS.GZ )
Unifying Simulatability Definitions in Cryptographic Systems
under Different Timing Assumptions
Michael Backes
2003/113 ( PS PS.GZ PDF )
Security Analysis of Shim's Authenticated Key Agreement
Protocols from Pairings
Hung-Min Sun and Bin-Tsan Hsieh
2003/112 ( PS PS.GZ )
Accumulating Composites and Improved Group Signing
Gene Tsudik and Shouhuai Xu
2003/111 ( PDF )
Further Cryptanalysis of some Proxy Signature Schemes
Jiqiang Lv and Jingwei Liu and Xinmei Wang
2003/110 ( PDF )
Proposal on Personal Authentication System in which Biological
Information is embedded in Cryptosystem Key
Yukio Itakura and Shigeo Tsujii
2003/109 ( PS PS.GZ PDF )
Crytanalysis of SAFER++
Alex Biryukov and Christophe De Canni\`ere and Gustaf
Dellkrantz
2003/108 ( PS PS.GZ )
Novel Cyclic and Algebraic Properties of AES
Tri Van Le
2003/107 ( PS PS.GZ PDF )
Fujisaki-Okamoto IND-CCA hybrid encryption revisited
David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and
Jorge L. Villar
2003/106 ( PS PS.GZ PDF )
High-speed encryption and authentication: A patent-free
solution for 10 Gbps network devices
Tadayoshi Kohno and John Viega and Doug Whiting
2003/105 ( PS PS.GZ )
On Diophantine Complexity and Statistical Zero-Knowledge
Arguments
Helger Lipmaa
2003/104 ( PS PS.GZ PDF )
New Proxy Signature, Proxy Blind Signature and Proxy Ring
Signature Schemes from Bilinear Pairing
Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin
2003/103 ( PS PS.GZ PDF )
Security analysis on Nalla-Reddy's ID-based tripartite
authenticated key agreement protocols
Zhongliang Chen
2003/102 ( PDF )
Length-Based Attacks for Certain Group Based Encryption
Rewriting Systems
J. Hughes, and A. Tannenbaum
2003/101 ( -- withdrawn -- )
Cryptanalysis of HFE
Ilia Toli
2003/100 ( PS PS.GZ PDF )
Bounded-Concurrent Secure Two-Party Computation Without Set-Up
Assumptions
Yehuda Lindell
2003/099 ( PS PS.GZ PDF )
Algorithms in Braid Groups
Matthew J. Campagna
2003/098 ( PDF )
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7
Format
Vlastimil Klima and Tomas Rosa
2003/097 ( PS PS.GZ PDF )
Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic
Curves
Jan Pelzl and Thomas Wollinger and Christof Paar
2003/096 ( PS PS.GZ PDF )
Secure Proxy Signature Schemes for Delegation of Signing Rights
Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi
2003/095 ( PS PS.GZ PDF )
Public Key Trace and Revoke Scheme Secure against Adaptive
Chosen Ciphertext Attack
Yevgeniy Dodis and Nelly Fazio
2003/094 ( PS PS.GZ PDF )
Trace Zero Subvariety for Cryptosystems
Tanja Lange
2003/093 ( PS PS.GZ PDF )
More Efficient Provably Secure Steganography
Leonid Reyzin and Scott Russell
2003/092 ( PS PS.GZ PDF )
Provably-Secure Enhancement on 3GPP Authentication and Key
Agreement Protocol
Muxiang Zhang
2003/091 ( PS PS.GZ )
Sequential Aggregate Signatures from Trapdoor Homomorphic
Permutations
Hovav Shacham
2003/090 ( PDF )
A Structured Multisignature Scheme from the Gap Diffie-Hellman
Group
Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang
2003/089 ( PS PS.GZ PDF )
Efficient Public Key Generation for Multivariate Cryptosystems
Christopher Wolf
2003/088 ( PDF )
Elliptic Curve Point Multiplication
A.G.Rostovtsev and E.B.Makhovenko
2003/087 ( PS PS.GZ PDF )
A Practical Elliptic Curve Public Key Encryption Scheme
Provably Secure Against Adaptive Chosen-message Attack
huafei zhu
2003/086 ( PS PS.GZ PDF )
On the Selection of Pairing-Friendly Groups
Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
2003/085 ( PS PS.GZ )
A defect of the implementation schemes of the TTM cryptosystem
Jintai Ding, Dieter Schmidt
2003/084 ( PS PS.GZ )
Cryptanalysis of an implementation scheme of the Tamed
Transformation Method cryptosystem
Jintai Ding, Timonthy Hodges
2003/083 ( PS PS.GZ PDF )
A Forward-Secure Public-Key Encryption Scheme
Ran Canetti and Shai Halevi and Jonathan Katz
2003/082 ( PS PS.GZ PDF )
Stronger Security Bounds for OMAC, TMAC and XCBC
Tetsu Iwata and Kaoru Kurosawa
2003/081 ( PDF )
Primitive Specification for SOBER-128
Philip Hawkes and Greg Rose
2003/080 ( PS PS.GZ PDF )
Non-interactive and Reusable Non-malleable Commitment Schemes
Ivan Damgård and Jens Groth
2003/079 ( PS PS.GZ PDF )
Fast arithmetic on Jacobians of Picard curves
Stéphane Flon and Roger Oyono
2003/078 ( PS PS.GZ PDF )
Relation between simulator-based and comparison-based
definitions of semantic security
Yodai Watanabe and Junji Shikata
2003/077 ( PS PS.GZ PDF )
An Un-Instantiable Random-Oracle-Model Scheme for a
Hybrid-Encryption Problem
Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
2003/076 ( PS PS.GZ PDF )
Goldbachs Conjecture on ECDSA Protocols
N. Vijayarangan, Nitin Agarwal, S. Kasilingam
2003/075 ( PS PS.GZ )
Almost Security of Cryptographic Boolean Functions
Kaoru Kurosawa
2003/074 ( PDF )
Divisible Voting Scheme
Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata
2003/073 ( PDF )
A Scheme for obtaining a Warrant Message from the Digital Proxy
Signatures
Sunder Lal and Amit K Awasthi
2003/072 ( PDF )
Proxy Blind Signature Scheme
Sunder Lal and Amit K Awasthi
2003/071 ( PS PS.GZ PDF )
How to Protect Against a Militant Spammer
Markus Jakobsson and John Linn and Joy Algesheimer
2003/070 ( PS PS.GZ PDF )
A Critique of CCM
P. Rogaway and D. Wagner
2003/069 ( PS PS.GZ PDF )
A Conventional Authenticated-Encryption Mode
M. Bellare and P. Rogaway and D. Wagner
2003/068 ( PS PS.GZ PDF )
On the Security of Some Proxy Signature Schemes
Hung-Min Sun and Bin-Tsan Hsieh
2003/067 ( PS PS.GZ PDF )
Forking Lemmas in the Ring Signatures' Scenario
Javier Herranz and Germ\'an S\'aez
2003/066 ( PS PS.GZ PDF )
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K.C.Reddy
2003/065 ( PS PS.GZ PDF )
Hash Function Balance and its Impact on Birthday Attacks
Mihir Bellare and Tadayoshi Kohno
2003/064 ( PS PS.GZ PDF )
On the Optimality of Linear, Differential and Sequential
Distinguishers
Pascal Junod
2003/063 ( PS PS.GZ PDF )
Initiator-Resilient Universally Composable Key Exchange
Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
2003/062 ( PS PS.GZ )
An n-party Key Agreement Scheme using Bilinear Map
Rana Barua and Ratna Dutta and Palash Sarkar
2003/061 ( PDF )
Hidden Polynomial Cryptosystems
Ilia Toli
2003/060 ( PS PS.GZ PDF )
Isomorphism Classes of Picard Curves over Finite Fields
Jong Won Lee
2003/059 ( -- withdrawn -- )
A Transitive Signature Scheme Provably Secure Against Adaptive
Chosen-message Attack
Huafei Zhu and Bao Feng and Robert H. Deng
2003/058 ( PS PS.GZ PDF )
An Elliptic Curve Trapdoor System
Edlyn Teske
2003/057 ( PS PS.GZ )
Secure Multiplication of Shared Secrets in the Exponent
Mario Di Raimondo and Rosario Gennaro
2003/056 ( PS PS.GZ PDF )
Computing of Trust in Distributed Networks
Huafei Zhu and Bao Feng and Robert H. Deng
2003/055 ( PDF )
A New Approach to Prevent Blackmailing in E-Cash
Xiaofeng Chen and Fangguo Zhang and Yumin Wang
2003/054 ( PS PS.GZ PDF )
ID based Cryptosystems with Pairing on Elliptic Curve
Ryuichi SAKAI and Masao KASAHARA
2003/053 ( PS PS.GZ )
Tate-pairing implementations for tripartite key agreement
Iwan Duursma and Hyang-Sook Lee
2003/052 ( PDF )
Attacking RSA-based Sessions in SSL/TLS
Vlastimil Klima and Ondrej Pokorny and Tomas Rosa
2003/051 ( PS PS.GZ )
How to Predict the Output of a Hardware Random Number Generator
Markus Dichtl
2003/050 ( PS PS.GZ PDF )
Concealment and its Applications to Authenticated Encryption
Yevgeniy Dodis and Jee Hea An
2003/049 ( PS PS.GZ PDF )
Hidden Number Problem in Small Subgroups
Igor Shparlinski and Arne Winterhof
2003/048 ( PS PS.GZ PDF )
Compounding Secret Sharing Schemes
E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
2003/047 ( PS PS.GZ PDF )
A Construction of 100 bit Public-Key Cryptosystem and Digital
Signature Scheme
Masao KASAHARA and Ryuichi SAKAI
2003/046 ( PS PS.GZ PDF )
Remarks on Saeednia's Identity-based Society Oriented Signature
Scheme with Anonymous Signers
Guilin Wang, and Bo Zhu
2003/045 ( PDF )
An algorithm to obtain an RSA modulus with a large private key
L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A.
Queiruga Dios
2003/044 ( -- withdrawn -- )
Signcryption scheme for Identity-based Cryptosystems
Divya Nalla, K.C.Reddy
2003/043 ( PS PS.GZ PDF )
Parallel Signcryption with OAEP, PSS-R, and other Feistel
Paddings
Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish
2003/042 ( PS PS.GZ )
Timed Fair Exchange of Standard Signatures
Juan A. Garay and Carl Pomerance
2003/041 ( PS PS.GZ )
A new statistical distinguisher for the shrinking generator
Jovan Dj. Golic and Renato Menicocci
2003/040 ( PS PS.GZ )
Computing Walsh Transform from the Algebraic Normal Form of a
Boolean Function
Kishan Chand Gupta and Palash Sarkar
2003/039 ( PS PS.GZ PDF )
Torus-based cryptography
Karl Rubin and Alice Silverberg
2003/038 ( PS PS.GZ PDF )
Pretty-Simple Password-Authenticated Key-Exchange Under
Standard Assumptions
Kazukuni Kobara and Hideki Imai
2003/037 ( PS PS.GZ PDF )
Strengthening Zero-Knowledge Protocols using Signatures
Juan A. Garay and Philip MacKenzie and Ke Yang
2003/036 ( PS PS.GZ PDF )
Cryptanalysis of a public-key encryption scheme based on the
polynomial reconstruction problem
Jean-Sebastien Coron
2003/035 ( PDF )
On alternative approach for verifiable secret sharing
Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR