New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
2002/159 ( PS PS.GZ PDF )
     Key-Collision Attacks Against RMAC
     Tadayoshi Kohno
2002/158 ( PS PS.GZ )
     The Book of Rijndaels
     Elad Barkan and Eli Biham
2002/157 ( PS PS.GZ )
     In How Many Ways Can You Write Rijndael?
     Elad Barkan and Eli Biham
2002/156 ( PS PS.GZ )
     Validating Digital Signatures without Time-Stamping and Certificate
     Revocation
     Jianying Zhou, Feng Bao, and Robert Deng
2002/155 ( PS PS.GZ PDF )
     Secure Bilinear Diffie-Hellman Bits
     Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
2002/154 ( PS PS.GZ PDF )
     On multi-exponentiation in cryptography
     Roberto M. Avanzi
2002/153 ( PS PS.GZ PDF )
     Weighted Coordinates on Genus 2 Hyperelliptic Curves
     Tanja Lange
2002/152 ( PS PS.GZ PDF )
     A note on Weak Keys of PES, IDEA and some Extended Variants
     Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
2002/151 ( PDF )
     Selective disclosure blinded credential sets
     Jason Holt and Kent E. Seamons
2002/150 ( PS PS.GZ PDF )
     Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature
     Schemes
     Guilin Wang, Jianying Zhou, and Robert H. Deng
2002/149 ( PS PS.GZ PDF )
     About Filliol's Observations on DES, AES and Hash Functions (draft)
     Nicolas T. Courtois
2002/148 ( PS PS.GZ PDF )
     The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
     Phillip Rogaway
2002/147 ( PS PS.GZ PDF )
     Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
     Tanja Lange
2002/146 ( PS PS.GZ PDF )
     Bauer-Berson-Feiertag attack revisited
     Jun-Bum Shin and Kwang H. Lee
2002/145 ( PS PS.GZ )
     Cryptanalysis of MQV with partially known nonces
     P.J. Leadbitter, N.P. Smart
2002/144 ( PS PS.GZ PDF )
     On Some Algebraic Structures in the AES Round Function
     A.M. Youssef and S.E. Tavares
2002/143 ( PS PS.GZ PDF )
     An Attack on the Isomorphisms of Polynomials Problem with One Secret
     Willi Geiselmann and Willi Meier and Rainer Steinwandt
2002/142 ( PDF )
     On the Applicability of Distinguishing Attacks Against Stream Ciphers
     Greg Rose and Philip Hawkes
2002/141 ( PS PS.GZ PDF )
     Applying General Access Structure to Proactive Secret Sharing Schemes
     Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle
2002/140 ( PS PS.GZ PDF )
     Universally Composable Two-Party and Multi-Party Secure Computation
     Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai
2002/139 ( PS PS.GZ )
     Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
     Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2002/138 ( PS PS.GZ PDF )
     On the Security of HFE, HFEv- and Quartz
     Nicolas T. Courtois and Magnus Daum and Patrick Felke
2002/137 ( PS PS.GZ PDF )
     Provably Secure Steganography
     Nicholas J. Hopper and John Langford and Luis von Ahn
2002/136 ( PS PS.GZ )
     Practical Non-Interactive Key Distribution Based on Pairings
     R\'egis Dupont and Andreas Enge
2002/135 ( PS PS.GZ PDF )
     Cryptanalysis-tolerant Commitment and Hashing
     Amir Herzberg
2002/134 ( PS PS.GZ PDF )
     Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
     Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl
2002/133 ( PS PS.GZ PDF )
     Efficient Construction of (Distributed) Verifiable Random Functions
     Yevgeniy Dodis
2002/132 ( PS PS.GZ )
     Tight Lower Bound on Linear Authenticated Encryption
     Charanjit S. Jutla
2002/131 ( PS PS.GZ PDF )
     An Improved Pseudorandom Generator Based on Hardness of Factoring
     Nenad Dedic and Leonid Reyzin and Salil Vadhan
2002/130 ( PS PS.GZ PDF )
     OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA
     Primitives
     Kazukuni Kobara and Hideki Imai
2002/129 ( PDF )
     On Key-collisions in (EC)DSA Schemes
     Tomas Rosa
2002/128 ( PS PS.GZ PDF )
     Perfectly Secure Message Transmission Revisited
     Yvo Desmedt and Yongge Wang
2002/127 ( PS PS.GZ )
     Power of a Public Random Permutation and its Application to
     Authenticated-Encryption
     Kaoru Kurosawa
2002/126 ( PS PS.GZ PDF )
     Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real
     Difference
     Ahmad-Reza Sadeghi and Michael Steiner
2002/125 ( PS PS.GZ PDF )
     The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
     Olivier Billet and Marc Joye
2002/124 ( PS PS.GZ PDF )
     On Optimal Hash Tree Traversal for Interval Time-Stamping
     Helger Lipmaa
2002/123 ( PS PS.GZ )
     New covering radius of Reed-Muller codes for $t$-resilient functions
     Kaoru Kurosawa, Tetsu Iwata and Takayuki Yoshiwara
2002/122 ( PS PS.GZ PDF )
     ID-Based One Round Authenticated Tripartite Key Agreement Protocol with
     Pairings
     Fangguo Zhang, Shengli Liu and Kwangjo Kim
2002/121 ( PS PS.GZ PDF )
     Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields
     via Explicit Formulae
     Tanja Lange
2002/120 ( PS PS.GZ )
     Security Analysis of IKE's Signature-based Key-Exchange Protocol
     Ran Canetti and Hugo Krawczyk
2002/119 ( PDF )
     Provably Secure Public-Key Encryption for Length-Preserving Chaumian
     Mixes
     Bodo M\"oller
2002/118 ( PS PS.GZ PDF )
     Efficient threshold signature, multisignature and blind signature
     schemes based on the Gap-Diffie-Hellman-group signature scheme
     Alexandra Boldyreva
2002/117 ( PS PS.GZ )
     Diffie-Hellman Problems and Bilinear Maps
     Jung Hee Cheon and Dong Hoon Lee
2002/116 ( PS PS.GZ )
     How to convert any ID-based Signature Schemes
     Claude Castelluccia
2002/115 ( PS PS.GZ )
     Universal Padding Schemes for RSA
     Jean-Sébastien Coron and Marc Joye and David Naccache and Pascal
     Paillier
2002/114 ( PS PS.GZ )
     Point Multiplication on Ordinary Elliptic Curves over Fields of
     Characteristic Three
     N.P. Smart and J. Westwood
2002/113 ( PS PS.GZ )
     A Note on the Bilinear Diffie-Hellman Assumption
     Yacov Yacobi
2002/112 ( PS PS.GZ )
     An Efficient Procedure to Double and Add Points on an Elliptic Curve
     Kirsten Eisentraeger, Kristin Lauter, and Peter L. Montgomery
2002/111 ( PS PS.GZ )
     On Linear Redundancy in the AES S-Box
     Joanne Fuller and William Millan
2002/110 ( PS PS.GZ )
     The GGM Construction does NOT yield Correlation Intractable Function
     Ensembles
     Oded Goldreich
2002/109 ( PDF )
     A New Class of Unsafe Primes
     Qi Cheng
2002/108 ( PS PS.GZ PDF )
     Clock-Controlled Alternating Step Generator
     Ali Adel Kanso
2002/107 ( PS PS.GZ PDF )
     Efficient Arithmetic on Hyperelliptic Curves
     Tanja Lange
2002/106 ( PS PS.GZ PDF )
     Secret sharing schemes on access structures with intersection number
     equal to one
     Jaume Marti-Farre and Carles Padro
2002/105 ( PS PS.GZ PDF )
     An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in
     Characteristic 2
     Jan Denef and Frederik Vercauteren
2002/104 ( PS PS.GZ PDF )
     Forward-Secure Signatures with Fast Key Update
     Anton Kozlov and Leonid Reyzin
2002/103 ( PS PS.GZ PDF )
     On the Power of Claw-Free Permutations
     Yevgeniy Dodis and Leonid Reyzin
2002/102 ( PS PS.GZ PDF )
     Applying General Access Structure to Metering Schemes
     Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle
2002/101 ( PS PS.GZ PDF )
     An Upper Bound on the Size of a Code with the $k$-Identifiable Parent
     Property
     Simon R. Blackburn
2002/100 ( PS PS.GZ )
     Encryption-Scheme Security in the Presence of Key-Dependent Messages
     J. Black and P. Rogaway and T. Shrimpton
2002/099 ( PS PS.GZ )
     A New Statistical Testing for Symmetric Ciphers and Hash Functions
     Eric Filiol
2002/098 ( PS PS.GZ PDF )
     Identity-Based Signcryption
     John Malone-Lee
2002/097 ( PS PS.GZ PDF )
     A new public key encryption scheme provably secure against adaptive
     chosen cipher-text attack
     Huafei Zhu
2002/096 ( PS PS.GZ PDF )
     Generating Large Non-Singular Matrices over an Arbitrary Field with
     Blocks of Full Rank
     James Xiao and Yongxin Zhou
2002/095 ( PDF )
     The (a, b)-Shrinking Generator
     Ali Adel Kanso
2002/094 ( PS PS.GZ )
     Building curves with arbitrary small MOV degree over finite prime
     fields
     R. Dupont and A. Enge and F. Morain
2002/093 ( PS PS.GZ PDF )
     A Fuzzy Vault Scheme
     Ari Juels and Madhu Sudan
2002/092 ( PS PS.GZ PDF )
     TMAC: Two-Key CBC MAC
     Kaoru Kurosawa and Tetsu Iwata
2002/091 ( PS PS.GZ )
     Multiplicative Masking and Power Analysis of AES
     Jovan Dj. Goli\'{c}
2002/090 ( PS PS.GZ PDF )
     Efficient and Concurrent Zero-Knowledge from any public coin HVZK
     protocol
     Daniele Micciancio and Erez Petrank
2002/089 ( PS PS.GZ )
     On Chosen Ciphertext Security of Multiple Encryptions
     Oded Goldreich, Yoad Lustig and Moni Naor
2002/088 ( PS PS.GZ PDF )
     Constructing Elliptic Curves with Prescribed Embedding Degrees
     Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
2002/087 ( PS PS.GZ PDF )
     Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of
     Toyocrypt
     Nicolas T. Courtois
2002/086 ( PS PS.GZ PDF )
     Adapting the weaknesses of the Random Oracle model to the Generic Group
     model.
     Alexander W. Dent
2002/085 ( PS PS.GZ )
     Efficient and Player-Optimal Strong Consensus
     Matthias Fitzi and Juan A. Garay
2002/084 ( PDF )
     Guaranteed Delivery for Secure Electronic Commerce and Payments
     Amir Herzberg
2002/083 ( PS PS.GZ PDF )
     A semantically secure elliptic curve RSA scheme with small expansion
     factor
     David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L.
     Villar
2002/082 ( PS PS.GZ )
     Authentication of Quantum Messages
     Howard Barnum and Claude Crepeau and Daniel Gottesman and Adam Smith
     and Alain Tapp
2002/081 ( PS PS.GZ PDF )
     Some Applications of Threshold Signature Schemes to Distributed
     Protocols
     Vanesa Daza and Javier Herranz and Germ\'an S\'aez


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR