New Reports in the Cryptology ePrint Archive
2001/089 ( PS PS.GZ )
Linear broadcast encryption schemes
Carles Padró and Ignacio Gracia and Sebastià Martín and Paz
Morillo
2001/088 ( PS PS.GZ PDF )
Improving the trade-off between storage and communication in
broadcast encryption schemes
Ignacio Gracia and Sebastià Martín and Carles Padró
2001/087 ( PS PS.GZ )
A Linear Algebraic Approach to Metering Schemes
C. Blundo and S. Martìn and B. Masucci and C. Padrò
2001/086 ( PS PS.GZ PDF )
Statistical Zero-Knowledge Proofs from Diophantine Equations
Helger Lipmaa
2001/085 ( PS PS.GZ PDF )
Universal Hash Proofs and a Paradigm for Adaptive Chosen
Ciphertext Secure Public-Key Encryption
Ronald Cramer and Victor Shoup
2001/084 ( PS PS.GZ )
Analysis of the GHS Weil Descent Attack on the ECDLP over
Characteristic Two Finite Fields of Composite Degree
Markus Maurer and Alfred Menezes and Edlyn Teske
2001/083 ( PS PS.GZ )
On the Constructing of Highly Nonlinear Resilient Boolean
Functions by Means of Special Matrices
Maria Fedorova and Yuriy Tarannikov
2001/082 ( PDF )
A Description of Protocols for Private Credentials
Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton
Stiglic
2001/081 ( PS PS.GZ PDF )
A Sufficient Condition for Secure Ping--Pong Protocols
Masao Mori
2001/080 ( PS PS.GZ )
COS Ciphers are not "extremely weak"! - The Design Rationale of
COS Ciphers
Eric Filiol and Caroline Fontaine
2001/079 ( PS PS.GZ )
Authenticated Encryption in the Public-Key Setting: Security
Notions and Analyses
Jee Hea An
2001/078 ( PS PS.GZ PDF )
The COS Stream Ciphers are Extremely Weak
Steve Babbage
2001/077 ( PS PS.GZ PDF )
A Time-Memory Tradeoff Attack Against LILI-128
Markku-Juhani Olavi Saarinen
2001/076 ( PS PS.GZ )
Communication Complexity and Secure Function Evaluation
Moni Naor and Kobbi Nissim
2001/075 ( PS PS.GZ )
Pseudo-Random Functions and Factoring
Moni Naor and Omer Reingold and Alon Rosen
2001/074 ( PS PS.GZ PDF )
On the Security of Randomized CBC-MAC Beyond the Birthday
Paradox Limit - A New Construction
Eliane Jaulmes and Antoine Joux and Frederic Valette
2001/073 ( PS PS.GZ )
Efficient oblivious transfer schemes
Wen-Guey Tzeng
2001/072 ( PS PS.GZ )
On the Goubin-Courtois Attack on TTM
T.Moh
2001/071 ( PS PS.GZ )
Ciphertext Can Be Shorter in Multi-User Setting
Kaoru Kurosawa
2001/070 ( PS PS.GZ PDF )
Security Assessment of Hierocrypt and Rijndael against the
Differential and Linear Cryptanalysis (Extended Abstract)
Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi
Kawamura
2001/069 ( PS PS.GZ )
On the (Im)possibility of Obfuscating Programs
Boaz Barak and Oded Goldreich and Russell Impagliazzo and
Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang
2001/068 ( PS PS.GZ PDF )
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and
J.Vandewalle and H.Y.Kim
2001/067 ( PDF )
An Attack on A Traitor Tracing Scheme
Jeff Jianxin Yan and Yongdong Wu
2001/066 ( PS PS.GZ )
IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN
GROUPS
SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON
KIM
2001/065 ( PS PS.GZ PDF )
Analysis of chosen plaintext attacks on the WAKE Stream Cipher
Marina Pudovkina
2001/064 ( PS PS.GZ )
An Integer Commitment Scheme based on Groups with Hidden Order
Ivan Damgard and Eiichiro Fujisaki
2001/063 ( PS PS.GZ PDF )
Resettably-Sound Zero-Knowledge and its Applications
Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda
Lindell
2001/062 ( PS PS.GZ PDF )
Optimal security proofs for PSS and other signature schemes
Jean-Sébastien Coron
2001/061 ( PS PS.GZ PDF )
Clock-Controlled Shift Registers for Key-Stream Generation
A.Kholosha
2001/060 ( PS PS.GZ PDF )
The Security of a Family of Two-Party RSA signature schemes
Mihir Bellare and Ravi Sandhu
2001/059 ( PS PS.GZ PDF )
Revocation and Tracing Schemes for Stateless Receivers
Dalit Naor and Moni Naor and Jeff Lotspiech
2001/058 ( PS PS.GZ PDF )
Efficient Zero-knowledge Authentication Based on a Linear
Algebra Problem MinRank
Nicolas T. Courtois
2001/057 ( PS PS.GZ PDF )
On the Security of the SPEKE Password-Authenticated Key
Exchange Protocol
Philip MacKenzie
2001/056 ( PS PS.GZ PDF )
On the Complexity of Matsui's Attack
P. Junod
2001/055 ( PS PS.GZ PDF )
Universally Composable Commitments
Ran Canetti and Marc Fischlin
2001/054 ( PS PS.GZ )
Extending the GHS Weil Descent Attack
S.D. Galbraith and F. Hess and N.P. Smart
2001/053 ( PS PS.GZ PDF )
Security Proofs for the RSA-PSS Signature Scheme and Its
Variants
Jakob Jonsson
2001/052 ( PDF )
Differential Probability of Modular Addition with a Constant
Operand
Alexis Warner Machado
2001/051 ( PS PS.GZ )
Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log
n)$ Rounds
Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
2001/050 ( PS PS.GZ )
Elliptic curve Paillier schemes
Steven D Galbraith
2001/049 ( PS PS.GZ PDF )
A known plaintext attack on the ISAAC keystream generator
Marina Pudovkina
2001/048 ( PS PS.GZ PDF )
Forward-Secure Signatures with Optimal Signing and Verifying
Gene Itkis and Leonid Reyzin
2001/047 ( PS PS.GZ )
ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
T.MOH
2001/046 ( PS PS.GZ )
The simple ideal cipher system
Boris Ryabko
2001/045 ( PS PS.GZ )
The order of encryption and authentication for protecting
communications (Or: how secure is SSL?)
Hugo Krawczyk
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR