New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.) 2003/253 ( PDF )
Aspects of Hyperelliptic Curves over Large Prime Fields in
Software Implementations
Roberto Maria Avanzi
2003/252 ( PS PS.GZ PDF )
On Simulation-Sound Trapdoor Commitments
Philip MacKenzie and Ke Yang
2003/251 ( PDF )
Isomorphism Classes of Hyperelliptic Curves of genus 3 over
finite fields
EunKyung Jeong
2003/250 ( PS PS.GZ PDF )
Breaking the Stream Cipher Whitenoise
Hongjun Wu
2003/249 ( PDF )
Software Specifications For Tinnitus Utilizing Whitenoise
Substitution Stream Cipher
Stephen Boren and Andre Brisson
2003/248 ( PS PS.GZ PDF )
Efficient Implementation of Genus Three Hyperelliptic Curve
Cryptography over GF(2^n)
Izuru Kitamura and Masanobu Katagi
2003/247 ( PDF )
ID-based Authenticated Two Round Multi-Party Key Agreement
Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
2003/246 ( PDF )
A Hybrid Encryption Protocol for Quantum Digital Signature
Xin L¨¹ and Deng-guo Feng
2003/245 ( PS PS.GZ PDF )
A Key Substitution Attack on SFLASH^{v3}
Willi Geiselmann and Rainer Steinwandt
2003/244 ( PS PS.GZ PDF )
Efficient Public Key Steganography Secure Against Adaptively
Chosen Stegotext Attacks
Tri Van Le and Kaoru Kurosawa
2003/243 ( PS PS.GZ PDF )
An Attack on Not-interactive Designated Verifier Proofs for
Undeniable Signatures
Guilin Wang
2003/242 ( PS PS.GZ PDF )
Improved Weil and Tate pairings for elliptic and hyperelliptic
curves
Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery
2003/241 ( PS PS.GZ PDF )
Hybrid Broadcast Encryption and Security Analysis
Shaoquan Jiang and Guang Gong
2003/240 ( PS PS.GZ PDF )
How to Break and Repair a Universally Composable Signature
Functionality
Michael Backes and Dennis Hofheinz
2003/239 ( PS PS.GZ PDF )
On Universally Composable Notions of Security for Signature,
Certification and Authentication
Ran Canetti
2003/238 ( PDF )
Chameleon Signature from Bilinear Pairing
Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
2003/237 ( PS PS.GZ PDF )
Low-Cost Solutions for Preventing Simple Side-Channel Analysis:
Side-Channel Atomicity
Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye
2003/236 ( PDF )
Combinational Logic Design for AES SubByte Transformation on
Masked Data
Elena Trichina
2003/235 ( PS PS.GZ PDF )
Fuzzy Extractors and Cryptography, or How to Use Your
Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
2003/234 ( PS PS.GZ )
Generalized Key-Evolving Signature Schemes or How to Foil an
Armed Adversary
Gene Itkis and Peng Xie
2003/233 ( PS PS.GZ PDF )
Public Key Steganography
Luis von Ahn and Nicholas J. Hopper
2003/232 ( PS PS.GZ PDF )
The Statistical Zero-knowledge Proof for Blum Integer Based on
Discrete Logarithm
Chunming Tang and Zhuojun Liu and Jinwang Liu
2003/231 ( PS PS.GZ PDF )
Public-Key Steganography with Active Attacks
Michael Backes and Christian Cachin
2003/230 ( PS PS.GZ PDF )
A Fast Provably Secure Cryptographic Hash Function
Daniel Augot and Matthieu Finiasz and Nicolas Sendrier
2003/229 ( PS PS.GZ PDF )
Algebraic Attacks on Summation Generators
Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and
Dukjae Moon
2003/228 ( PDF )
Verifiably Committed Signatures Provably Secure in The Standard
Complexity Model
Huafei Zhu
2003/227 ( PS PS.GZ PDF )
Attacks on a Secure Group Communication Scheme With
Hierarchical Access Control
Willi Geiselmann and Rainer Steinwandt
2003/226 ( PS PS.GZ PDF )
On the Security of a Group Signature Scheme with Forward
Security
Guilin Wang
2003/225 ( PS PS.GZ )
A Practical Parallel Domain Extender for UOWHF
Palash Sarkar
2003/224 ( PDF )
Two Protocols from the Tate Pairing
Noel McCullagh and Michael Scott
2003/223 ( PS PS.GZ PDF )
Cryptanalysis of a Cryptosystem based on Drinfeld modules
Simon R. Blackburn, Carlos Cid and Steven D. Galbraith
2003/222 ( PS PS.GZ PDF )
A Verifiable Secret Sharing Scheme with Statistical
zero-knowledge
Chunming Tang and Zhuojun Liu and Mingsheng Wang
2003/221 ( PS PS.GZ PDF )
A Cryptanalysis of the Original Domingo-Ferrer's Algebraic
Privacy Homomophism
Jung Hee Cheon and Hyun Soo Nam
2003/220 ( PS PS.GZ PDF )
A short comment on the affine parts of SFLASH^{v3}
Willi Geiselmann and Rainer Steinwandt
2003/219 ( PS PS.GZ PDF )
Cryptanalysis of the Repaired Public-key Encryption Scheme
Based on the Polynomial Reconstruction Problem
Jean-Sebastien Coron
2003/218 ( PDF )
A Security Evaluation of Whitenoise
David Wagner
2003/217 ( PS PS.GZ PDF )
Chemical Combinatorial Attacks on Keyboards
Eric Brier and David Naccache and Pascal Paillier
2003/216 ( PS PS.GZ PDF )
Building Secure Indexes for Searching Efficiently on Encrypted
Compressed Data.
Eu-Jin Goh
2003/215 ( PDF )
Divide and Concatenate: A Scalable Hardware Architecture for
Universal MAC
Bo Yang and Ramesh Karri and David Mcgrew
2003/214 ( PS PS.GZ )
Multi-trapdoor Commitments and their Applications to Proofs of
Knowledge Secure under Concurrent Man-in-the-middle Attacks
Rosario Gennaro
2003/213 ( PS PS.GZ PDF )
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over
$\mathbb{F}_{2^n}$
Y.Choie and E.Jeong
2003/212 ( PS PS.GZ PDF )
High Performance Arithmetic for Hyperelliptic Curve
Cryptosystems of Genus Two
Jan Pelzl and Thomas Wollinger and Christof Paar
2003/211 ( PS PS.GZ PDF )
SFLASHv3, a fast asymmetric signature scheme
Nicolas T. Courtois, Louis Goubin and Jacques Patarin
2003/210 ( PS PS.GZ PDF )
On a Relation Between Verifiable Secret Sharing Schemes and a
Class of Error-Correcting Codes
Ventzislav Nikov and Svetla Nikova
2003/209 ( PS PS.GZ PDF )
Using the Trace Operator to repair the Polynomial
Reconstruction based Cryptosystem presented at Eurocrypt 2003
Daniel Augot and Matthieu Finiasz and Pierre Loidreau
2003/208 ( PS PS.GZ PDF )
ID-Based Chameleon Hashes from Bilinear Pairings
Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
2003/207 ( PS PS.GZ PDF )
Security Flaws in Several Group Signatures Proposed by Popescu
Guilin Wang, and Sihan Qing
2003/206 ( PS PS.GZ PDF )
Identity Based Undeniable Signatures
Benoît Libert and Jean-Jacques Quisquater
2003/205 ( PS PS.GZ PDF )
Improved Cryptanalysis of SecurID
Scott Contini and Yiqun Lisa Yin
2003/204 ( PDF )
A Composition Construction of Bent-Like Boolean Functions from
Quadratic Polynomials
ZENG Xiangyong and HU Lei
2003/203 ( PS PS.GZ PDF )
A Timing Attack on Hyperelliptic Curve Cryptosystems
Masanobu Katagi and Izuru Kitamura and Toru Akishita and
Tsuyoshi Takagi
2003/202 ( PS PS.GZ PDF )
Yet Another Sieving Device
Willi Geiselmann and Rainer Steinwandt
2003/201 ( PDF )
an attack on a multisignature scheme
Zheng dong & KF.chen
2003/200 ( PDF )
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
Zheng Dong , Shengli Liu & kefei Chen
2003/199 ( PS PS.GZ PDF )
Cryptanalysis of a Message Authentication Code due to Cary and
Venkatesan
Simon R. Blackburn and Kenneth G. Paterson
2003/198 ( PS PS.GZ PDF )
Construction of Perfect Nonlinear and Maximally Nonlinear
Multi-Output Boolean Functions Satisfying Higher Order Strict
Avalanche Criteria
Kishan Chand Gupta and Palash Sarkar
2003/197 ( PS PS.GZ PDF )
Revisiting fully distributed proxy signature schemes
Javier Herranz and German Saez
2003/196 ( PS PS.GZ PDF )
Security Analysis of Some Proxy Signatures
Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
2003/195 ( PDF )
Searchable Public Key Encryption
Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and
Giuseppe Persiano
2003/194 ( PS PS.GZ PDF )
Security Analysis of Several Group Signature Schemes
Guilin Wang
2003/193 ( PS PS.GZ PDF )
Efficient Extension of Standard Schnorr/RSA signatures into
Universal Designated-Verifier Signatures
Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk
2003/192 ( PS PS.GZ PDF )
Universal Designated-Verifier Signatures
Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef
Pieprzyk
2003/191 ( PS PS.GZ )
Projective Coordinates Leak
David Naccache and Nigel Smart and Jacques Stern
2003/190 ( -- withdrawn -- )
Extending Joux's Protocol to Multi Party Key Agreement
Rana Barua and Ratna Dutta and Palash Sarkar
2003/189 ( PDF )
Cryptanalysis of publicly verifiable authenticated encryption
Zuhua Shao
2003/188 ( PDF )
A New Forward Secure Signature Scheme using Bilinear Maps
Fei Hu and Chwan-Hwa Wu and J. D. Irwin
2003/187 ( PS PS.GZ )
Resource Bounded Unprovability of Computational Lower Bounds
Tatsuaki Okamoto and Ryo Kashima
2003/186 ( PS PS.GZ PDF )
Safe Prime Generation with a Combined Sieve
Michael J. Wiener
2003/185 ( PS PS.GZ PDF )
VMPC Stream Cipher
Bartosz Zoltak
2003/184 ( PS PS.GZ PDF )
What do DES S-boxes Say to Each Other ?
Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin
2003/183 ( PDF )
Certificate-Based Encryption and the Certificate Revocation
Problem
Craig Gentry
2003/182 ( PS PS.GZ PDF )
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti, Shai Halevi, and Jonathan Katz
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR