New Reports in the Cryptology ePrint Archive
2001/007 ( PS PS.GZ ) Are 'Strong' Primes Needed for RSA Ron RIvest & Robert Silverman 2001/006 ( PS PS.GZ PDF ) Secure and Efficient Asynchronous Broadcast Protocols Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup 2001/005 ( PS PS.GZ PDF ) A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme Ilya Mironov 2001/004 ( -- withdrawn -- ) MinRank problem and Zero-knowledge authentication Nicolas T. Courtois 2001/003 ( PS PS.GZ ) Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups Antoine Joux and Kim Nguyen 2001/002 ( PS PS.GZ PDF ) The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko 2001/001 ( PS PS.GZ PDF ) Efficient Algorithms for Computing Differential Properties of Addition Helger Lipmaa, Shiho Moriai 2000/069 ( PS PS.GZ ) New constructions of resilient Boolean functions with maximal nonlinearity Yuriy Tarannikov 2000/068 ( PDF ) A Content Certified E-mail Protocol with a Public Mailbox Tak-Ming Law 2000/067 ( PS PS.GZ ) A unified framework for analyzing security of protocols Ran Canetti 2000/066 ( PS PS.GZ ) A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission Birgit Pfitzmann and Michael Waidner 2000/065 ( PS PS.GZ ) How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes Masashi Mitomo and Kaoru Kurosawa 2000/064 ( PS PS.GZ ) On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators Oded Goldreich and Vered Rosen 2000/063 ( PS PS.GZ ) Candidate One-Way Functions Based on Expander Graphs Oded Goldreich 2000/062 ( -- withdrawn -- ) Non-Deforming Digital Watermarks Gideon Samid 2000/061 ( PS PS.GZ PDF ) RSA-OAEP is Still Alive! Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern 2000/060 ( PS PS.GZ PDF ) OAEP Reconsidered Victor Shoup 2000/059 ( PDF ) Essential Shannon Security with Keys Smaller Than the Encrypted Message Gideon Samid 2000/058 ( PS PS.GZ ) Graph-Based Authentication of Digital Streams Sara Miner and Jessica Staddon 2000/057 ( PS PS.GZ PDF ) Session-Key Generation using Human Passwords Only Oded Goldreich and Yehuda Lindell 2000/056 ( PS PS.GZ ) A Complete Problem for Statistical Zero Knowledge Amit Sahai and Salil Vadhan 2000/055 ( PS PS.GZ PDF ) Multiparty Computation from Threshold Homomorphic Encryption Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen 2000/054 ( PS PS.GZ ) Correlation Immune Boolean Functions with Very High Nonlinearity Subhamoy Maitra 2000/053 ( PS PS.GZ PDF ) A Construction of Resilient Functions with High Nonlinearity Thomas Johansson and Enes Pasalic 2000/052 ( PDF ) CRYPTANALYSIS OF THE A5/2 ALGORITHM Slobodan Petrovic and Amparo Fúster-Sabater 2000/051 ( PS PS.GZ ) Reducing the Gate Count of Bitslice DES Matthew Kwan 2000/050 ( PS PS.GZ ) Spectral Analysis of High Order Correlation Immune Functions Yuriy Tarannikov and Denis Kirienko
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR