Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Publications of EPRINT 2004
Page
Title
Generating more MNT elliptic curves
A note on L\'opez-Dahab coordinates
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
Positive Results and Techniques for Obfuscation
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
TTS: Rank Attacks in Tame-Like Multivariate PKCs
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model
An Oblivious Transfer Protocol with Log-Squared Communication
Hardness amplification of weakly verifiable puzzles
Pairing-Based Cryptographic Protocols : A Survey
Multicollision Attacks on Generalized Hash Functions
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
Code-Based Game-Playing Proofs and the Security of Triple Encryption
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC?s
Sequences of games: a tool for taming complexity in security proofs
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC?s against Differential Power Analysis
Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem
Synthesis of Secure FPGA Implementations
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
Easy decision-Diffie-Hellman groups
Oblivious Transfer Is Symmetric
An IBE Scheme to Exchange Authenticated Secret Keys
Security on Generalized Feistel Scheme with SP Round Function
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
Divisors in Residue Classes, Constructively
An Hybrid Mode of Operation
Request for Review of Key Wrap Algorithms
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Foundations of Group Signatures: The Case of Dynamic Groups
A comb method to render ECC resistant against Side Channel Attacks
Analysis of the WinZip encryption method
Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
Pairing-Based One-Round Tripartite Key Agreement Protocols
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures
HENKOS Stream Cipher
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Scan Based Side Channel Attack on Data Encryption Standard
A DPA Attack on the Improved Ha-Moon Algorithm
Evaluating elliptic curve based KEMs in the light of pairings
Multivariable public--key cryptosystems
The CS2 Block Cipher
Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
Fuzzy Identity Based Encryption
Practical Cryptography in High Dimensional Tori
Using primitive subgroups to do more with fewer bits
Direct Division in Factor Rings
Efficient Batch Verification of Signature Schemes based on Bilinear Maps
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
Practical Attacks on Digital Signatures Using MD5 Message Digest
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
MD5 To Be Considered Harmful Someday
A New Stream Cipher HC-256
Reusable Cryptographic Fuzzy Extractors
A Provably Secure Nyberg-Rueppel Signature Variant with Applications
Secure Computation of the Mean and Related Statistics
Block Ciphers and Stream Ciphers: The State of the Art
Equivalent Keys in HFE, C$^*$, and variations
GNFS Factoring Statistics of RSA-100, 110, ..., 150
Superfluous Keys in Multivariate Quadratic Asymmetric Systems
On the Ambiguity of Concurrent Signatures
A new security proof for Damg?rd's ElGamal
How To Re-initialize a Hash Chain
Rethinking the security of some authenticated group key agreement schemes
Attacking a Public Key Cryptosystem Based on Tree Replacement
Finding good differential patterns for attacks on SHA-1
Secure Hashed Diffie-Hellman over Non-DDH Groups
Ordinary abelian varieties having small embedding degree
The Sorcerer?s Apprentice Guide to Fault Attacks
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key
Provably Secure Masking of AES
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
The Exact Security of an Identity Based Signature and its Applications
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
Cryptanalysis of SFlash v3
Tracing-by-Linking Group Signautres
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
Construction and Traversal of Hash Chain with Public Links
Receipt-Free Homomorphic Elections and Write-in Ballots
On The Security of Two Key-Updating Signature Schemes
Capacity and Examples of Template Protecting Biometric Authentication Systems
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs
Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic
A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms
Concealing Complex Policies with Hidden Credentials
Efficient Pairing Computation on Supersingular Abelian Varieties
Designing Against the `Overdefined System of Equations' Attack
Cryptanalysis of RCES/RSES Image Encryption Scheme
The Vulnerability of SSL to Chosen Plaintext Attack
New Distributed Ring Signatures for General Families of Signing Subsets
Relation between XL algorithm and Groebner Bases Algorithms
On the Security and Composability of the One Time Pad
Improved Identity-Based Signcryption
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
Efficient and Forward-Secure Identity-Based Signcryption
Fast addition on non-hyperelliptic genus $3$ curves
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
A New Two-Party Identity-Based Authenticated Key Agreement
On security of XTR public key cryptosystems against Side Channel Attacks
Universally Composable DKG with Linear Number of Exponentiations
EME*: extending EME to handle arbitrary-length messages with associated data
Two Software Normal Basis Multiplication Algorithms for GF(2n)
DDH-based Group Key Agreement in a Mobile Environment
Elastic Block Ciphers
Generalizing Kedlaya's order counting based on Miura Theory
Private Inference Control
A New ID-based Signature with Batch Verification
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
Secret Handshakes from CA-Oblivious Encryption
Secure and Efficient Masking of AES - A Mission Impossible?
More Efficient Server Assisted One Time Signatures
CompChall: Addressing Password Guessing Attacks
New GF(2n) Parallel Multiplier Using Redundant Representation
How to Disembed a Program?
New Notions of Security: Achieving Universal Composability without Trusted Setup
Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
Elastic AES
Elliptic Curve based Signcryption and its Multi-party Schemes
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
Electromagnetic Side Channels of an FPGA Implementation of AES
Near-Collisions of SHA-0
Key Recovery Method for CRT Implementation of RSA
Provably Secure Delegation-by-Certification Proxy Signature Schemes
Secure and Efficient AES Software Implementation for Smart Caards
An Authenticated Certificateless Public Key Encryption Scheme
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$
Another Look at ``Provable Security''
A double large prime variation for small genus hyperelliptic index calculus
Controlling Spam by Secure Internet Content Selection
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
Why Quantum Cryptography?
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
Mobile Terminal Security
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Scalable Public-Key Tracing and Revoking
Improvement of Th?Leriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
ID-based Cryptography from Composite Degree Residuosity
A comparison of MNT curves and supersingular curves
FRMAC, a Fast Randomized Message Authentication Code
A Secure and Efficient Key Exchange Protocol for Mobile Communications
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
Regional Blackouts: Protection of Broadcast Content on 3G Networks
Efficient Consistency Proofs for Generalized Queries on a Committed Database
Short Signatures Without Random Oracles
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
Secure Identity Based Encryption Without Random Oracles
Short Group Signatures
A Proof of Yao's Protocol for Secure Two-Party Computation
A Biometric Identity Based Signature Scheme
Updating the Parameters of a Threshold Scheme by Minimal Broadcast
Optimal Updating of Ideal Threshold Schemes
Identity Based Threshold Ring Signature
Efficient Identity-Based Encryption Without Random Oracles
On the Composition of Authenticated Byzantine Agreement
Simpler Session-Key Generation from Short Random Passwords
A New Forward Secure Signature Scheme
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
On the Existence of low-degree Equations for Algebraic Attacks
A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
Computing Modular Polynomials
Distributed Ring Signatures for Identity-Based Scenarios
Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations
Security Pitfalls of an efficient remote user authentication scheme using smart cards
The Security and Performance of the Galois/Counter Mode of Operation (Full Version)
A Note on An Encryption Scheme of Kurosawa and Desmedt
Signed Binary Representations Revisited
Password Based Key Exchange with Mutual Authentication
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
Long Modular Multiplication for Cryptographic Applications
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
On Cheating Immune Secret Sharing
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing
Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions
How to Cheat at Chess: A Security Analysis of the Internet Chess Club
Authenticated tree parity machine key exchange
Direct Anonymous Attestation
ID-Based Proxy Signature Using Bilinear Pairings
On Corrective Patterns for the SHA-2 Family
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
The Security and Efficiency of Micciancio's Cryptosystem
Hybrid Cryptography
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality
Tree Parity Machine Rekeying Architectures
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
Plaintext-Simulatability
Entropic Security and the Encryption of High Entropy Messages
On Oleshchuk's Public Key Cryptosystem
Towards Plaintext-Aware Public-Key Encryption without Random Oracles
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
The Polynomial Composition Problem in $(\mathbb{Z}/n\mathbb{Z})[X]$
Vectorial Boolean functions and induced algebraic equations
Lower Bounds for Non-Black-Box Zero Knowledge
Sign Change Fault Attacks On Elliptic Curve Cryptosystems
DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes
A Provable Secure Scheme for Partially Blind Signatures
Timed-Release and Key-Insulated Public Key Encryption
Extending the Resynchronization Attack
Password-Based Authenticated Key Exchange in the Three-Party Setting
On the security of some nonrepudiable threshold proxy signature schemes with known signers
Cryptographic Implications of Hess' Generalized GHS Attack
Forgery Attacks on Chang et al.'s signature scheme with message recovery
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
Geometric Key Establishment
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2
Combinatorial group theory and public key cryptography
On the Key Exposure Problem in Chameleon Hashes
Signcryption in Hierarchical Identity Based Cryptosystem
On codes, matroids and secure multi-party computation from linear secret sharing schemes
Upper and Lower Bounds on Black-Box Steganography
Vectorial fast correlation attacks
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Identity Based Threshold Proxy Signature
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Design Principles for Iterated Hash Functions
New paradigms for digital generation and post-processing of random data
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
On the supports of the Walsh transforms of Boolean functions
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Escrow-Free Encryption Supporting Cryptographic Workflow
On Boolean Functions with Generalized Cryptographic Properties
Secure Group Communications over Combined Wired/Wireless Networks
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al
Musings on the Wang et al. MD5 Collision
sSCADA: Securing SCADA Infrastructure Communications
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
Separable Linkable Threshold Ring Signatures
On the Role of the Inner State Size in Stream Ciphers
Untraceability of Wang-Fu Group Signature Scheme
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
Cryptanalysis of Threshold-Multisignature Schemes
Universal Undeniable Signatures
An Enhanced and Secure Protocol for Authenticated Key Exchange
Protocol Initialization for the Framework of Universal Composability
The Mundja Streaming MAC
Traceable Signatures
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
An e-Voting Scheme with Improved Resistance to Bribe and Coercion
Fast Pseudo-Hadamard Transforms
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
Known-Plaintext Attack Against a Permutation Based Video
Experimenting with Faults, Lattices and the DSA
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
The Extended Codebook (XCB) Mode of Operation
Cryptanalysis of a Provably Secure Cryptographic Hash Function
Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
An AGM-type elliptic curve point counting algorithm in characteristic three
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
New Monotone Span Programs from Old
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
Fault and Side-Channel Attacks on Pairing Based Cryptography
Corrections of the NIST Statistical Test Suite for Randomness
ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Generation of random Picard curves for cryptography
Optimal Signcryption from Any Trapdoor Permutation
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
Externalized Fingerprint Matching
Almost Ideal Contrast Visual Cryptography with Reversing
Privacy-Enhanced Searches Using Encrypted Bloom Filters
A New Designated Confirmer Signature Variant with Intended Recipient
RDS: Remote Distributed Scheme for Protecting Mobile Agents
Fault attack on the DVB Common Scrambling Algorithm
Exponential S-boxes
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
Clarifying Obfuscation: Improving the Security of White-Box Encoding
The Rabbit Stream Cipher - Design and Security Analysis
The CSQUARE Transform
Asynchronous Proactive RSA
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
Provably Secure Authentication of Digital Media Through Invertible Watermarks
Custodian-Hiding Verifiable Encryption
Solving Systems of Differential Equations of Addition
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$
Designs of Efficient Secure Large Hash Values
Summation polynomials and the discrete logarithm problem on elliptic curves
Post-Quantum Signatures
Compressed Pairings
Nominative Proxy Signature Schemes
New Approaches to Password Authenticated Key Exchange based on RSA
Security Flaws in a Pairing-based Group Signature Scheme
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
Relating Symbolic and Cryptographic Secrecy
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
Single Database Private Information Retrieval with Logarithmic Communication
Security of Wang-Li Threshold Signature Scheme
A Provably Secure Scheme for Restrictive Partially Blind Signatures
Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields
Chameleon Hashing without Key Exposure
Second Preimages on n-bit Hash Functions for Much Less than 2^n Work
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
A note on efficient computation of cube roots in characteristic 3
Cryptanalysis of a timestamp-based password authentication scheme
The Static Diffie-Hellman Problem
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto??s two-party identity-based key agreement
Multi-sequences with d-perfect property
The Power of Verification Queries in Message Authentication and Authenticated Encryption
Transitive Signatures Based on Non-adaptive Standard Signatures
A Verifiable Random Function With Short Proofs and Keys
Lower Bounds and Impossibility Results for Concurrent Self Composition
Hierarchical Group Signatures
Revision of Tractable Rational Map Cryptosystem
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
Cryptanalysis of a threshold proxy signature with known signers
Tail-MAC: A Message Authentication Scheme for Stream Ciphers
A Technical Comparison of IPSec and SSL
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
Privacy Preserving Keyword Searches on Remote Encrypted Data
Adaptively-Secure, Non-Interactive Public-Key Encryption
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Efficient and Universally Composable Committed Oblivious Transfer and Applications
Badger - A Fast and Provably Secure MAC
Redundant Trinomials for Finite Fields of Characteristic $2$
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
On Multiple Linear Approximations
The conjugacy search problem in public key cryptography: unnecessary and insufficient