New Reports in the Cryptology ePrint Archive
2001/089 ( PS PS.GZ ) Linear broadcast encryption schemes Carles Padró and Ignacio Gracia and Sebastià Martín and Paz Morillo 2001/088 ( PS PS.GZ PDF ) Improving the trade-off between storage and communication in broadcast encryption schemes Ignacio Gracia and Sebastià Martín and Carles Padró 2001/087 ( PS PS.GZ ) A Linear Algebraic Approach to Metering Schemes C. Blundo and S. Martìn and B. Masucci and C. Padrò 2001/086 ( PS PS.GZ PDF ) Statistical Zero-Knowledge Proofs from Diophantine Equations Helger Lipmaa 2001/085 ( PS PS.GZ PDF ) Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer and Victor Shoup 2001/084 ( PS PS.GZ ) Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree Markus Maurer and Alfred Menezes and Edlyn Teske 2001/083 ( PS PS.GZ ) On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices Maria Fedorova and Yuriy Tarannikov 2001/082 ( PDF ) A Description of Protocols for Private Credentials Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton Stiglic 2001/081 ( PS PS.GZ PDF ) A Sufficient Condition for Secure Ping--Pong Protocols Masao Mori 2001/080 ( PS PS.GZ ) COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers Eric Filiol and Caroline Fontaine 2001/079 ( PS PS.GZ ) Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses Jee Hea An 2001/078 ( PS PS.GZ PDF ) The COS Stream Ciphers are Extremely Weak Steve Babbage 2001/077 ( PS PS.GZ PDF ) A Time-Memory Tradeoff Attack Against LILI-128 Markku-Juhani Olavi Saarinen 2001/076 ( PS PS.GZ ) Communication Complexity and Secure Function Evaluation Moni Naor and Kobbi Nissim 2001/075 ( PS PS.GZ ) Pseudo-Random Functions and Factoring Moni Naor and Omer Reingold and Alon Rosen 2001/074 ( PS PS.GZ PDF ) On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction Eliane Jaulmes and Antoine Joux and Frederic Valette 2001/073 ( PS PS.GZ ) Efficient oblivious transfer schemes Wen-Guey Tzeng 2001/072 ( PS PS.GZ ) On the Goubin-Courtois Attack on TTM T.Moh 2001/071 ( PS PS.GZ ) Ciphertext Can Be Shorter in Multi-User Setting Kaoru Kurosawa 2001/070 ( PS PS.GZ PDF ) Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract) Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi Kawamura 2001/069 ( PS PS.GZ ) On the (Im)possibility of Obfuscating Programs Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang 2001/068 ( PS PS.GZ PDF ) SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and J.Vandewalle and H.Y.Kim 2001/067 ( PDF ) An Attack on A Traitor Tracing Scheme Jeff Jianxin Yan and Yongdong Wu 2001/066 ( PS PS.GZ ) IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON KIM 2001/065 ( PS PS.GZ PDF ) Analysis of chosen plaintext attacks on the WAKE Stream Cipher Marina Pudovkina 2001/064 ( PS PS.GZ ) An Integer Commitment Scheme based on Groups with Hidden Order Ivan Damgard and Eiichiro Fujisaki 2001/063 ( PS PS.GZ PDF ) Resettably-Sound Zero-Knowledge and its Applications Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell 2001/062 ( PS PS.GZ PDF ) Optimal security proofs for PSS and other signature schemes Jean-Sébastien Coron 2001/061 ( PS PS.GZ PDF ) Clock-Controlled Shift Registers for Key-Stream Generation A.Kholosha 2001/060 ( PS PS.GZ PDF ) The Security of a Family of Two-Party RSA signature schemes Mihir Bellare and Ravi Sandhu 2001/059 ( PS PS.GZ PDF ) Revocation and Tracing Schemes for Stateless Receivers Dalit Naor and Moni Naor and Jeff Lotspiech 2001/058 ( PS PS.GZ PDF ) Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank Nicolas T. Courtois 2001/057 ( PS PS.GZ PDF ) On the Security of the SPEKE Password-Authenticated Key Exchange Protocol Philip MacKenzie 2001/056 ( PS PS.GZ PDF ) On the Complexity of Matsui's Attack P. Junod 2001/055 ( PS PS.GZ PDF ) Universally Composable Commitments Ran Canetti and Marc Fischlin 2001/054 ( PS PS.GZ ) Extending the GHS Weil Descent Attack S.D. Galbraith and F. Hess and N.P. Smart 2001/053 ( PS PS.GZ PDF ) Security Proofs for the RSA-PSS Signature Scheme and Its Variants Jakob Jonsson 2001/052 ( PDF ) Differential Probability of Modular Addition with a Constant Operand Alexis Warner Machado 2001/051 ( PS PS.GZ ) Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen 2001/050 ( PS PS.GZ ) Elliptic curve Paillier schemes Steven D Galbraith 2001/049 ( PS PS.GZ PDF ) A known plaintext attack on the ISAAC keystream generator Marina Pudovkina 2001/048 ( PS PS.GZ PDF ) Forward-Secure Signatures with Optimal Signing and Verifying Gene Itkis and Leonid Reyzin 2001/047 ( PS PS.GZ ) ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM T.MOH 2001/046 ( PS PS.GZ ) The simple ideal cipher system Boris Ryabko 2001/045 ( PS PS.GZ ) The order of encryption and authentication for protecting communications (Or: how secure is SSL?) Hugo Krawczyk
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR