New Reports in the Cryptology ePrint Archive
2000/026 ( PS PS.GZ )
Authentication and Key Agreement via Memorable Password
Taekyoung Kwon
2000/025 ( PS PS.GZ PDF )
Authenticated Encryption: Relations among notions and analysis of the
generic composition paradigm
Mihir Bellare and Chanathip Namprempre
2000/024 ( PS PS.GZ )
Security of the Most Significant Bits of the Shamir Message Passing
Scheme
Maria Isabel Gonzalez Vasco and Igor E. Shparlinski
2000/023 ( PS PS.GZ )
Security of Polynomial Transformations of the Diffie--Hellman Key
Igor E. Shparlinski
2000/022 ( PS PS.GZ PDF )
ACE: The Advanced Cryptographic Engine
Thomas Schweinberger and Victor Shoup
2000/021 ( PS PS.GZ PDF )
An Efficient Identification Scheme Based on Permuted Patterns
Shahrokh Saeednia
2000/020 ( PS PS.GZ )
On the Security of Diffie--Hellman Bits
Maria Isabel Gonzalez Vasco and Igor E. Shparlinski
2000/019 ( PS PS.GZ )
Threshold Cryptography Secure Against the Adaptive Adversary,
Concurrently
Anna Lysyanskaya
2000/018 ( PS PS.GZ PDF )
Fast Verification of Any Remote Procedure Call: Short
Witness-Indistinguishable One-Round Proofs for NP
William Aiello, Sandeep Bhatt, Rafail Ostrovsky, and S. Rajagopalan
2000/017 ( PS PS.GZ PDF )
Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Rosario Gennaro and Luca Trevisan
2000/016 ( PS PS.GZ PDF )
Cryptanalysis of RSA with small prime difference
Benne de Weger
2000/015 ( PS PS.GZ PDF )
Identification Protocols Secure Against Reset Attacks
Mihir Bellare and Shafi Goldwasser and Silvio Micali
2000/014 ( PS PS.GZ PDF )
Authenticated Key Exchange Secure Against Dictionary Attacks
Mihir Bellare and David Pointcheval and Phillip Rogaway
2000/013 ( PS PS.GZ PDF )
Concurrent Zero-Knowledge in Poly-logarithmic Rounds
Joe Kilian and Erez Petrank
2000/012 ( PDF )
Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature
Scheme from Crypto'97
DaeHun Nyang and JooSeok Song
2000/011 ( PDF )
Tailored Key Encryption (TaKE) Tailoring a key for a given pair of
plaintext/ciphertext
Gideon Samid
2000/010 ( PS PS.GZ PDF )
The Security of Chaffing and Winnowing
Mihir Bellare and Alexandra Boldyreva
2000/009 ( PS PS.GZ )
New Directions in Design of Resilient Boolean Functions
Palash Sarkar and Subhamoy Maitra
2000/008 ( PS PS.GZ )
Efficient Protocols based on Probabilistic Encryption using Composite
Degree Residue Classes
Ivan Damg{\aa}rd and Mads Jurik
2000/007 ( PS PS.GZ PDF )
Public Electronic Contract Protocol
Tak-Ming Law
2000/006 ( PS PS.GZ PDF )
An Encryption Algorithm and Key-stream Generator for Chinese Text
Messages by Character Internal Code Structure
Tak-Ming Law
2000/005 ( PS PS.GZ )
On Resilient Boolean Functions with Maximal Possible Nonlinearity
Yuriy Tarannikov
2000/004 ( PS PS.GZ )
Combinatorial Properties of Frameproof and Traceability Codes
J.N. Staddon and D.R. Stinson and R. Wei
2000/003 ( -- withdrawn -- )
Implications of the Nontriviality of Entropy Approximation
Marc Fischlin
2000/002 ( PS PS.GZ )
A New Forward-Secure Digital Signature Scheme
Michel Abdalla and Leonid Reyzin
2000/001 ( PS PS.GZ )
On Security Preserving Reductions -- Revised Terminology
Oded Goldreich
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR