New Reports in the Cryptology ePrint Archive
Note: The 1996-1999 contents of the Theory of Cryptology Library have been automatically included in the Cryptology ePrint Archive for the years prior to 2000.2000/049 ( PS PS.GZ )
Spectral Domain Analysis of Correlation Immune and Resilient Boolean
Functions
Palash Sarkar
2000/048 ( PS PS.GZ )
New Constructions of Resilent and Correlation Immune Boolean Functions
achieving Upper Bounds on Nonlinearity
Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar
2000/047 ( PS PS.GZ )
Highly Nonlinear Balanced Boolean Functions with very good
Autocorrelation Property
Subhamoy Maitra
2000/046 ( PS PS.GZ PDF )
The Saturation Attack - a Bait for Twofish
Stefan Lucks
2000/045 ( PS PS.GZ PDF )
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
Assumptions
Ronald Cramer and Ivan Damg{\aa}rd and Philip MacKenzie
2000/044 ( PS PS.GZ PDF )
Provably Secure Password-Authenticated Key Exchange Using
Diffie-Hellman
Victor Boyko and Philip MacKenzie and Sarvar Patel
2000/043 ( PS PS.GZ )
Constructions and Bounds for Unconditionally Secure Commitment Schemes
C. Blundo and B. Masucci and D.R. Stinson and R. Wei
2000/042 ( PS PS.GZ )
Constructing Pseudo-Random Permutations with a Prescribed Structure
Moni Naor and Omer Reingold
2000/041 ( PS PS.GZ )
On Symmetrically Private Information Retrieval
Sanjeev Kumar Mishra
2000/040 ( PS PS.GZ )
Decimation Attack of Stream Ciphers
Eric FILIOL
2000/039 ( PS PS.GZ )
Encryption Modes with Almost Free Message Integrity
Charanjit S. Jutla
2000/038 ( PS PS.GZ )
On the Complexity of Verifiable Secret Sharing and Multi-Party
Computation
Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski
2000/037 ( PS PS.GZ )
General Secure Multi-Party Computation from any Linear Secret Sharing
Scheme
Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer
2000/036 ( PS PS.GZ )
Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous
Diophantine Approximation
Jean-Pierre Seifert
2000/035 ( PS PS.GZ )
Electronic Jury Voting Protocols
Alejandro Hevia and Marcos Kiwi
2000/034 ( PS PS.GZ PDF )
Random Oracles in Constantinople: Practical Asynchronous Byzantine
Agreement using Cryptography
Christian Cachin and Klaus Kursawe and Victor Shoup
2000/033 ( PS PS.GZ PDF )
The Complete Distribution of Linear Probabilities of MARS' s-box
Kazumaro Aoki
2000/032 ( PS PS.GZ )
Anonymous Fingerprinting with Direct Non-Repudiation
Birgit Pfitzmann, Ahmad-Reza Sadeghi
2000/031 ( PS PS.GZ PDF )
Forward Security in Threshold Signature Schemes
Michel Abdalla and Sara Miner and Chanathip Namprempre
2000/030 ( PS PS.GZ )
Secure Multiparty Computation of Approximations
Joan Feigenbaum and Jessica Fong and Martin Strauss and Rebecca N.
Wright
2000/029 ( PS PS.GZ )
Concrete Security Characterizations of PRFs and PRPs: Reductions and
Applications
Anand Desai and Sara Miner
2000/028 ( PS PS.GZ )
An Information-Theoretic Model for Steganography
Christian Cachin
2000/027 ( PS PS.GZ PDF )
Accountable Certificate Management using Undeniable Attestations
Ahto Buldas and Peeter Laud and Helger Lipmaa
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR