New Reports in the Cryptology ePrint Archive


   2001/044 
          Optimistic Asynchronous Multi-Party Contract Signing with
          Reduced Number of Rounds
          Birgit Baum-Waidner
   2001/043
          Cryptanalysis of the Vesta-2M Stream Cipher
          Marina Pudovkina
   2001/042 
          Simple Forward-Secure Signatures From Any Signature Scheme
          Hugo Krawczyk
   2001/041
          Solving Elliptic Curve Discrete Logarithm Problems Using Weil
          Descent
          Michael Jacobson and Alfred Menezes and Andreas Stein
   2001/040 
          Analysis of Key-Exchange Protocols and Their Use for Building
          Secure Channels
          Ran Canetti and Hugo Krawczyk
   2001/039 
          Robust Software Tokens: Towards Securing a Digital Identity
          Taekyoung Kwon
   2001/038 
          Flaws in differential cryptanalysis of Skipjack
          Louis Granboulan
   2001/037
          EMpowering Side-Channel Attacks
          Josyula R. Rao and Pankaj Rohatgi
   2001/036 
          Anti-persistence: History Independent Data Structures
          Moni Naor and Vanessa Teague
   2001/035
          Forward security in private key cryptography
          Mihir Bellare and Bennet Yee
   2001/034 
          Composition and Efficiency Tradeoffs for Forward-Secure Digital
          Signatures
          Tal Malkin and Daniele Micciancio and Sara Miner
   2001/033
          Dual of New Method for Upper Bounding the Maximum Average
          Linear Hull Probability for SPNs
          Liam Keliher and Henk Meijer and Stafford Tavares
   2001/032
          Efficient and Non-Interactive Non-Malleable Commitment
          Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky
          and Adam Smith
   2001/031
          Efficient Password-Authenticated Key Exchange Using
          Human-Memorable Passwords
          Jonathan Katz and Rafail Ostrovsky and Moti Yung
   2001/030
          On the Power of Nonlinear Secret-Sharing
          Amos Beimel and Yuval Ishai
   2001/029
          On multivariate signature-only public key cryptosystems
          Nicolas T. Courtois
   2001/028
          Efficient Encryption for Rich Message Spaces Under General
          Assumptions
          Alexander Russell and Hong Wang
   2001/027
          PMAC
          Phillip Rogaway and John Black 
   2001/026
          OCB Mode
          Phillip Rogaway and Mihir Bellare and John Black and Ted
          Krovetz
   2001/025 
          Cryptanalysis of some elliptic curve based cryptosystems of
          Paillier
          Steven D. Galbraith
   2001/024 
          Secure Multiparty Computation of Approximations
          Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim
          and Martin Strauss and Rebecca N. Wright
   2001/023
          Robustness for Free in Unconditional Multi-Party Computation
          Martin Hirt and Ueli Maurer
   2001/022
          Optimistic Asynchronous Atomic Broadcast
          Klaus Kursawe and Victor Shoup
   2001/021 
          The Rectangle Attack - Rectangling the Serpent
          Biham Eli, Orr Dunkelman, Nathan Keller
   2001/020 
          Some observations on the theory of cryptographic hash functions
          D.R. Stinson
   2001/019
          An Efficient System for Non-transferable Anonymous Credentials
          with Optional Anonymity Revocation
          Jan Camenisch and Anna Lysyanskaya
   2001/018 
          Analysis of a Subset Sum Randomizer
          Peter Gemmell and Anna Johnston
   2001/017
          On adaptive vs. non-adaptive security of multiparty protocols
          Ran Canetti and Ivan Damgard and Stefan Dziembowski and Yuval
          Ishai and Tal Malkin
   2001/016 
          Efficient Traitor Tracing Algorithms using List Decoding
          Alice Silverberg and Jessica Staddon and Judy Walker
   2001/015
          An observation regarding Jutla's modes of operation
          Shai Halevi
   2001/014
          Timed-Release Cryptography
          Wenbo Mao
   2001/013 
          Digitally Watermarking RSA Moduli
          Anna M. Johnston
   2001/012
          Ciphers with Arbitrary Finite Domains
          John Black and Phillip Rogaway
   2001/011
          New Zero-knowledge Undeniable Signatures - Forgery of Signature
          Equivalent to Factorisation
          Wenbo Mao
   2001/010
          How to achieve a McEliece-based Digital Signature Scheme
          Nicolas Courtois, Matthieu Finiasz and Nicolas Sendrier
   2001/009 
          Robust key-evolving public key encryption schemes
          Wen-Guey Tzeng, Zhi-Jia Tzeng
   2001/008
          Fully Distributed Threshold RSA under Standard Assumptions
          Pierre-Alain Fouque and Jacques Stern
   2001/007 
          Are 'Strong' Primes Needed for RSA
          Ron RIvest & Robert Silverman
   2001/006
          Secure and Efficient Asynchronous Broadcast Protocols
          Christian Cachin and Klaus Kursawe and Frank Petzold and Victor
          Shoup


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR