New Reports in the Cryptology ePrint Archive
2000/026 ( PS PS.GZ ) Authentication and Key Agreement via Memorable Password Taekyoung Kwon 2000/025 ( PS PS.GZ PDF ) Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm Mihir Bellare and Chanathip Namprempre 2000/024 ( PS PS.GZ ) Security of the Most Significant Bits of the Shamir Message Passing Scheme Maria Isabel Gonzalez Vasco and Igor E. Shparlinski 2000/023 ( PS PS.GZ ) Security of Polynomial Transformations of the Diffie--Hellman Key Igor E. Shparlinski 2000/022 ( PS PS.GZ PDF ) ACE: The Advanced Cryptographic Engine Thomas Schweinberger and Victor Shoup 2000/021 ( PS PS.GZ PDF ) An Efficient Identification Scheme Based on Permuted Patterns Shahrokh Saeednia 2000/020 ( PS PS.GZ ) On the Security of Diffie--Hellman Bits Maria Isabel Gonzalez Vasco and Igor E. Shparlinski 2000/019 ( PS PS.GZ ) Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently Anna Lysyanskaya 2000/018 ( PS PS.GZ PDF ) Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP William Aiello, Sandeep Bhatt, Rafail Ostrovsky, and S. Rajagopalan 2000/017 ( PS PS.GZ PDF ) Lower Bounds on the Efficiency of Generic Cryptographic Constructions Rosario Gennaro and Luca Trevisan 2000/016 ( PS PS.GZ PDF ) Cryptanalysis of RSA with small prime difference Benne de Weger 2000/015 ( PS PS.GZ PDF ) Identification Protocols Secure Against Reset Attacks Mihir Bellare and Shafi Goldwasser and Silvio Micali 2000/014 ( PS PS.GZ PDF ) Authenticated Key Exchange Secure Against Dictionary Attacks Mihir Bellare and David Pointcheval and Phillip Rogaway 2000/013 ( PS PS.GZ PDF ) Concurrent Zero-Knowledge in Poly-logarithmic Rounds Joe Kilian and Erez Petrank 2000/012 ( PDF ) Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97 DaeHun Nyang and JooSeok Song 2000/011 ( PDF ) Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext Gideon Samid 2000/010 ( PS PS.GZ PDF ) The Security of Chaffing and Winnowing Mihir Bellare and Alexandra Boldyreva 2000/009 ( PS PS.GZ ) New Directions in Design of Resilient Boolean Functions Palash Sarkar and Subhamoy Maitra 2000/008 ( PS PS.GZ ) Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes Ivan Damg{\aa}rd and Mads Jurik 2000/007 ( PS PS.GZ PDF ) Public Electronic Contract Protocol Tak-Ming Law 2000/006 ( PS PS.GZ PDF ) An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure Tak-Ming Law 2000/005 ( PS PS.GZ ) On Resilient Boolean Functions with Maximal Possible Nonlinearity Yuriy Tarannikov 2000/004 ( PS PS.GZ ) Combinatorial Properties of Frameproof and Traceability Codes J.N. Staddon and D.R. Stinson and R. Wei 2000/003 ( -- withdrawn -- ) Implications of the Nontriviality of Entropy Approximation Marc Fischlin 2000/002 ( PS PS.GZ ) A New Forward-Secure Digital Signature Scheme Michel Abdalla and Leonid Reyzin 2000/001 ( PS PS.GZ ) On Security Preserving Reductions -- Revised Terminology Oded Goldreich
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR