New Reports in the Cryptology ePrint Archive

2000/026 ( PS PS.GZ )
     Authentication and Key Agreement via Memorable Password
     Taekyoung Kwon
2000/025 ( PS PS.GZ PDF )
     Authenticated Encryption: Relations among notions and analysis of the
generic composition paradigm
     Mihir Bellare and Chanathip Namprempre
2000/024 ( PS PS.GZ )
     Security of the Most Significant Bits of the Shamir Message Passing
Scheme
     Maria Isabel Gonzalez Vasco and Igor E. Shparlinski
2000/023 ( PS PS.GZ )
     Security of Polynomial Transformations of the Diffie--Hellman Key
     Igor E. Shparlinski
2000/022 ( PS PS.GZ PDF )
     ACE: The Advanced Cryptographic Engine
     Thomas Schweinberger and Victor Shoup
2000/021 ( PS PS.GZ PDF )
     An Efficient Identification Scheme Based on Permuted Patterns
     Shahrokh Saeednia
2000/020 ( PS PS.GZ )
     On the Security of Diffie--Hellman Bits
     Maria Isabel Gonzalez Vasco and Igor E. Shparlinski
2000/019 ( PS PS.GZ )
     Threshold Cryptography Secure Against the Adaptive Adversary,
Concurrently
     Anna Lysyanskaya
2000/018 ( PS PS.GZ PDF )
     Fast Verification of Any Remote Procedure Call: Short
Witness-Indistinguishable One-Round Proofs for NP
     William Aiello, Sandeep Bhatt, Rafail Ostrovsky, and S. Rajagopalan
2000/017 ( PS PS.GZ PDF )
     Lower Bounds on the Efficiency of Generic Cryptographic Constructions
     Rosario Gennaro and Luca Trevisan
2000/016 ( PS PS.GZ PDF )
     Cryptanalysis of RSA with small prime difference
     Benne de Weger
2000/015 ( PS PS.GZ PDF )
     Identification Protocols Secure Against Reset Attacks
     Mihir Bellare and Shafi Goldwasser and Silvio Micali
2000/014 ( PS PS.GZ PDF )
     Authenticated Key Exchange Secure Against Dictionary Attacks
     Mihir Bellare and David Pointcheval and Phillip Rogaway
2000/013 ( PS PS.GZ PDF )
     Concurrent Zero-Knowledge in Poly-logarithmic Rounds
     Joe Kilian and Erez Petrank
2000/012 ( PDF )
     Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature
Scheme from Crypto'97
     DaeHun Nyang and JooSeok Song
2000/011 ( PDF )
     Tailored Key Encryption (TaKE) Tailoring a key for a given pair of
plaintext/ciphertext
     Gideon Samid
2000/010 ( PS PS.GZ PDF )
     The Security of Chaffing and Winnowing
     Mihir Bellare and Alexandra Boldyreva
2000/009 ( PS PS.GZ )
     New Directions in Design of Resilient Boolean Functions
     Palash Sarkar and Subhamoy Maitra
2000/008 ( PS PS.GZ )
     Efficient Protocols based on Probabilistic Encryption using Composite
Degree Residue Classes
     Ivan Damg{\aa}rd and Mads Jurik
2000/007 ( PS PS.GZ PDF )
     Public Electronic Contract Protocol
     Tak-Ming Law
2000/006 ( PS PS.GZ PDF )
     An Encryption Algorithm and Key-stream Generator for Chinese Text
Messages by Character Internal Code Structure
     Tak-Ming Law
2000/005 ( PS PS.GZ )
     On Resilient Boolean Functions with Maximal Possible Nonlinearity
     Yuriy Tarannikov
2000/004 ( PS PS.GZ )
     Combinatorial Properties of Frameproof and Traceability Codes
     J.N. Staddon and D.R. Stinson and R. Wei
2000/003 ( -- withdrawn -- )
     Implications of the Nontriviality of Entropy Approximation
     Marc Fischlin
2000/002 ( PS PS.GZ )
     A New Forward-Secure Digital Signature Scheme
     Michel Abdalla and Leonid Reyzin
2000/001 ( PS PS.GZ )
     On Security Preserving Reductions -- Revised Terminology
     Oded Goldreich


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR