New Reports in the Cryptology ePrint Archive


2001/007 ( PS PS.GZ )
     Are 'Strong' Primes Needed for RSA
     Ron RIvest & Robert Silverman
2001/006 ( PS PS.GZ PDF )
     Secure and Efficient Asynchronous Broadcast Protocols
     Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup
2001/005 ( PS PS.GZ PDF )
     A Note on Cryptanalysis of the Preliminary Version of the NTRU
Signature Scheme
     Ilya Mironov
2001/004 ( -- withdrawn -- )
     MinRank problem and Zero-knowledge authentication
     Nicolas T. Courtois
2001/003 ( PS PS.GZ )
     Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic
groups
     Antoine Joux and Kim Nguyen
2001/002 ( PS PS.GZ PDF )
     The Power of RSA Inversion Oracles and the Security of Chaum's
RSA-Based Blind Signature Scheme
     M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko
2001/001 ( PS PS.GZ PDF )
     Efficient Algorithms for Computing Differential Properties of Addition
     Helger Lipmaa, Shiho Moriai
2000/069 ( PS PS.GZ )
     New constructions of resilient Boolean functions with maximal
nonlinearity
     Yuriy Tarannikov
2000/068 ( PDF )
     A Content Certified E-mail Protocol with a Public Mailbox
     Tak-Ming Law
2000/067 ( PS PS.GZ )
     A unified framework for analyzing security of protocols
     Ran Canetti
2000/066 ( PS PS.GZ )
     A Model for Asynchronous Reactive Systems and its Application to Secure
Message Transmission
     Birgit Pfitzmann and Michael Waidner
2000/065 ( PS PS.GZ )
     How to Encrypt Long Messages without Large Size Symmetric/Asymmetric
Encryption Schemes
     Masashi Mitomo and Kaoru Kurosawa
2000/064 ( PS PS.GZ )
     On the Security of Modular Exponentiation with Application to the
Construction of Pseudorandom Generators
     Oded Goldreich and Vered Rosen
2000/063 ( PS PS.GZ )
     Candidate One-Way Functions Based on Expander Graphs
     Oded Goldreich
2000/062 ( -- withdrawn -- )
     Non-Deforming Digital Watermarks
     Gideon Samid
2000/061 ( PS PS.GZ PDF )
     RSA-OAEP is Still Alive!
     Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and
Jacques Stern
2000/060 ( PS PS.GZ PDF )
     OAEP Reconsidered
     Victor Shoup
2000/059 ( PDF )
     Essential Shannon Security with Keys Smaller Than the Encrypted Message
     Gideon Samid
2000/058 ( PS PS.GZ )
     Graph-Based Authentication of Digital Streams
     Sara Miner and Jessica Staddon
2000/057 ( PS PS.GZ PDF )
     Session-Key Generation using Human Passwords Only
     Oded Goldreich and Yehuda Lindell
2000/056 ( PS PS.GZ )
     A Complete Problem for Statistical Zero Knowledge
     Amit Sahai and Salil Vadhan
2000/055 ( PS PS.GZ PDF )
     Multiparty Computation from Threshold Homomorphic Encryption
     Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen
2000/054 ( PS PS.GZ )
     Correlation Immune Boolean Functions with Very High Nonlinearity
     Subhamoy Maitra
2000/053 ( PS PS.GZ PDF )
     A Construction of Resilient Functions with High Nonlinearity
     Thomas Johansson and Enes Pasalic
2000/052 ( PDF )
     CRYPTANALYSIS OF THE A5/2 ALGORITHM
     Slobodan Petrovic and Amparo Fúster-Sabater
2000/051 ( PS PS.GZ )
     Reducing the Gate Count of Bitslice DES
     Matthew Kwan
2000/050 ( PS PS.GZ )
     Spectral Analysis of High Order Correlation Immune Functions
     Yuriy Tarannikov and Denis Kirienko


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR