New Reports in the Cryptology ePrint Archive


   2001/089 ( PS PS.GZ )
          Linear broadcast encryption schemes
          Carles Padró and Ignacio Gracia and Sebastià Martín and Paz
          Morillo
          
   2001/088 ( PS PS.GZ PDF )
          Improving the trade-off between storage and communication in
          broadcast encryption schemes
          Ignacio Gracia and Sebastià Martín and Carles Padró
          
   2001/087 ( PS PS.GZ )
          A Linear Algebraic Approach to Metering Schemes
          C. Blundo and S. Martìn and B. Masucci and C. Padrò
          
   2001/086 ( PS PS.GZ PDF )
          Statistical Zero-Knowledge Proofs from Diophantine Equations
          Helger Lipmaa
          
   2001/085 ( PS PS.GZ PDF )
          Universal Hash Proofs and a Paradigm for Adaptive Chosen
          Ciphertext Secure Public-Key Encryption
          Ronald Cramer and Victor Shoup
          
   2001/084 ( PS PS.GZ )
          Analysis of the GHS Weil Descent Attack on the ECDLP over
          Characteristic Two Finite Fields of Composite Degree
          Markus Maurer and Alfred Menezes and Edlyn Teske
          
   2001/083 ( PS PS.GZ )
          On the Constructing of Highly Nonlinear Resilient Boolean
          Functions by Means of Special Matrices
          Maria Fedorova and Yuriy Tarannikov
          
   2001/082 ( PDF )
          A Description of Protocols for Private Credentials
          Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton
          Stiglic
          
   2001/081 ( PS PS.GZ PDF )
          A Sufficient Condition for Secure Ping--Pong Protocols
          Masao Mori
          
   2001/080 ( PS PS.GZ )
          COS Ciphers are not "extremely weak"! - The Design Rationale of
          COS Ciphers
          Eric Filiol and Caroline Fontaine
          
   2001/079 ( PS PS.GZ )
          Authenticated Encryption in the Public-Key Setting: Security
          Notions and Analyses
          Jee Hea An
          
   2001/078 ( PS PS.GZ PDF )
          The COS Stream Ciphers are Extremely Weak
          Steve Babbage
          
   2001/077 ( PS PS.GZ PDF )
          A Time-Memory Tradeoff Attack Against LILI-128
          Markku-Juhani Olavi Saarinen
          
   2001/076 ( PS PS.GZ )
          Communication Complexity and Secure Function Evaluation 
          Moni Naor and Kobbi Nissim
          
   2001/075 ( PS PS.GZ )
          Pseudo-Random Functions and Factoring
          Moni Naor and Omer Reingold and Alon Rosen
          
   2001/074 ( PS PS.GZ PDF )
          On the Security of Randomized CBC-MAC Beyond the Birthday
          Paradox Limit - A New Construction
          Eliane Jaulmes and Antoine Joux and Frederic Valette
          
   2001/073 ( PS PS.GZ )
          Efficient oblivious transfer schemes
          Wen-Guey Tzeng
          
   2001/072 ( PS PS.GZ )
          On the Goubin-Courtois Attack on TTM
          T.Moh
          
   2001/071 ( PS PS.GZ )
          Ciphertext Can Be Shorter in Multi-User Setting
          Kaoru Kurosawa
          
   2001/070 ( PS PS.GZ PDF )
          Security Assessment of Hierocrypt and Rijndael against the
          Differential and Linear Cryptanalysis (Extended Abstract)
          Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi
          Kawamura
          
   2001/069 ( PS PS.GZ )
          On the (Im)possibility of Obfuscating Programs
          Boaz Barak and Oded Goldreich and Russell Impagliazzo and
          Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang
          
   2001/068 ( PS PS.GZ PDF )
          SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
          J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and
          J.Vandewalle and H.Y.Kim
          
   2001/067 ( PDF )
          An Attack on A Traitor Tracing Scheme
          Jeff Jianxin Yan and Yongdong Wu
          
   2001/066 ( PS PS.GZ )
          IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN
          GROUPS
          SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON
          KIM
          
   2001/065 ( PS PS.GZ PDF )
          Analysis of chosen plaintext attacks on the WAKE Stream Cipher
          Marina Pudovkina
          
   2001/064 ( PS PS.GZ )
          An Integer Commitment Scheme based on Groups with Hidden Order
          Ivan Damgard and Eiichiro Fujisaki
          
   2001/063 ( PS PS.GZ PDF )
          Resettably-Sound Zero-Knowledge and its Applications
          Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda
          Lindell
          
   2001/062 ( PS PS.GZ PDF )
          Optimal security proofs for PSS and other signature schemes
          Jean-Sébastien Coron
          
   2001/061 ( PS PS.GZ PDF )
          Clock-Controlled Shift Registers for Key-Stream Generation
          A.Kholosha
          
   2001/060 ( PS PS.GZ PDF )
          The Security of a Family of Two-Party RSA signature schemes
          Mihir Bellare and Ravi Sandhu
          
   2001/059 ( PS PS.GZ PDF )
          Revocation and Tracing Schemes for Stateless Receivers
          Dalit Naor and Moni Naor and Jeff Lotspiech
          
   2001/058 ( PS PS.GZ PDF )
          Efficient Zero-knowledge Authentication Based on a Linear
          Algebra Problem MinRank
          Nicolas T. Courtois
          
   2001/057 ( PS PS.GZ PDF )
          On the Security of the SPEKE Password-Authenticated Key
          Exchange Protocol
          Philip MacKenzie
          
   2001/056 ( PS PS.GZ PDF )
          On the Complexity of Matsui's Attack
          P. Junod
          
   2001/055 ( PS PS.GZ PDF )
          Universally Composable Commitments
          Ran Canetti and Marc Fischlin
          
   2001/054 ( PS PS.GZ )
          Extending the GHS Weil Descent Attack
          S.D. Galbraith and F. Hess and N.P. Smart
          
   2001/053 ( PS PS.GZ PDF )
          Security Proofs for the RSA-PSS Signature Scheme and Its
          Variants
          Jakob Jonsson
          
   2001/052 ( PDF )
          Differential Probability of Modular Addition with a Constant
          Operand
          Alexis Warner Machado
          
   2001/051 ( PS PS.GZ )
          Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log
          n)$ Rounds
          Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
          
   2001/050 ( PS PS.GZ )
          Elliptic curve Paillier schemes
          Steven D Galbraith
          
   2001/049 ( PS PS.GZ PDF )
          A known plaintext attack on the ISAAC keystream generator
          Marina Pudovkina
          
   2001/048 ( PS PS.GZ PDF )
          Forward-Secure Signatures with Optimal Signing and Verifying
          Gene Itkis and Leonid Reyzin
          
   2001/047 ( PS PS.GZ )
          ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
          T.MOH
          
   2001/046 ( PS PS.GZ )
          The simple ideal cipher system
          Boris Ryabko
          
   2001/045 ( PS PS.GZ )
          The order of encryption and authentication for protecting
          communications (Or: how secure is SSL?)
          Hugo Krawczyk
          


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR