New Reports in the Cryptology ePrint Archive
Note: The 1996-1999 contents of the Theory of Cryptology Library have been automatically included in the Cryptology ePrint Archive for the years prior to 2000.2000/049 ( PS PS.GZ ) Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions Palash Sarkar 2000/048 ( PS PS.GZ ) New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar 2000/047 ( PS PS.GZ ) Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property Subhamoy Maitra 2000/046 ( PS PS.GZ PDF ) The Saturation Attack - a Bait for Twofish Stefan Lucks 2000/045 ( PS PS.GZ PDF ) Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions Ronald Cramer and Ivan Damg{\aa}rd and Philip MacKenzie 2000/044 ( PS PS.GZ PDF ) Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman Victor Boyko and Philip MacKenzie and Sarvar Patel 2000/043 ( PS PS.GZ ) Constructions and Bounds for Unconditionally Secure Commitment Schemes C. Blundo and B. Masucci and D.R. Stinson and R. Wei 2000/042 ( PS PS.GZ ) Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor and Omer Reingold 2000/041 ( PS PS.GZ ) On Symmetrically Private Information Retrieval Sanjeev Kumar Mishra 2000/040 ( PS PS.GZ ) Decimation Attack of Stream Ciphers Eric FILIOL 2000/039 ( PS PS.GZ ) Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla 2000/038 ( PS PS.GZ ) On the Complexity of Verifiable Secret Sharing and Multi-Party Computation Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski 2000/037 ( PS PS.GZ ) General Secure Multi-Party Computation from any Linear Secret Sharing Scheme Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer 2000/036 ( PS PS.GZ ) Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation Jean-Pierre Seifert 2000/035 ( PS PS.GZ ) Electronic Jury Voting Protocols Alejandro Hevia and Marcos Kiwi 2000/034 ( PS PS.GZ PDF ) Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography Christian Cachin and Klaus Kursawe and Victor Shoup 2000/033 ( PS PS.GZ PDF ) The Complete Distribution of Linear Probabilities of MARS' s-box Kazumaro Aoki 2000/032 ( PS PS.GZ ) Anonymous Fingerprinting with Direct Non-Repudiation Birgit Pfitzmann, Ahmad-Reza Sadeghi 2000/031 ( PS PS.GZ PDF ) Forward Security in Threshold Signature Schemes Michel Abdalla and Sara Miner and Chanathip Namprempre 2000/030 ( PS PS.GZ ) Secure Multiparty Computation of Approximations Joan Feigenbaum and Jessica Fong and Martin Strauss and Rebecca N. Wright 2000/029 ( PS PS.GZ ) Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications Anand Desai and Sara Miner 2000/028 ( PS PS.GZ ) An Information-Theoretic Model for Steganography Christian Cachin 2000/027 ( PS PS.GZ PDF ) Accountable Certificate Management using Undeniable Attestations Ahto Buldas and Peeter Laud and Helger Lipmaa
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR