New Reports in the Cryptology ePrint Archive
2002/030 ( PS PS.GZ ) Adaptive chi-square test and its application to some cryptographic problems. Boris Ryabko 2002/029 ( PS PS.GZ PDF ) Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products Joy Algesheimer and Jan Camenisch and Victor Shoup 2002/028 ( PS PS.GZ PDF ) A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack Jung Hee Cheon 2002/027 ( PS PS.GZ PDF ) Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications Jonathan Katz 2002/026 ( PS PS.GZ ) Generic Groups, Collision Resistance, and ECDSA Daniel R. L. Brown 2002/025 ( PS PS.GZ PDF ) Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking Markus Jakobsson and Ari Juels and Ron Rivest 2002/024 ( PS PS.GZ PDF ) Timed Release of Standard Digital Signatures Juan Garay and Markus Jakobsson 2002/023 ( PS PS.GZ PDF ) Almost Optimal Hash Sequence Traversal Don Coppersmith and Markus Jakobsson 2002/022 ( PS PS.GZ PDF ) From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre 2002/021 ( PS PS.GZ ) Spectral Analysis of Boolean Functions under Non-uniformity of Arguments Kanstantsin Miranovich 2002/020 ( PS PS.GZ PDF ) Cryptanalysis of stream ciphers with linear masking Don Coppersmith and Shai Halevi and Charanjit Jutla 2002/019 ( PS PS.GZ PDF ) Scream: a software-efficient stream cipher Shai Halevi and Don Coppersmith and Charanjit Jutla 2002/018 ( PS PS.GZ ) An Identity-Based Signature from Gap Diffie-Hellman Groups Jae Choon Cha and Jung Hee Cheon 2002/017 ( PS PS.GZ PDF ) The Cramer-Shoup Strong-RSA Signature Scheme Revisited Marc Fischlin 2002/016 ( PDF ) Content Extraction Signatures Ron Steinfeld and Laurence Bull and Yuliang Zheng 2002/015 ( PDF ) Security proofs of cryptographic protocols Eva Jencusova 2002/014 ( PS PS.GZ PDF ) Better than BiBa: Short One-time Signatures with Fast Signing and Verifying Leonid Reyzin and Natan Reyzin 2002/013 ( PS PS.GZ PDF ) Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups Ivan Damgard and Maciej Koprowski 2002/012 ( PS PS.GZ PDF ) Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings F. Hess 2002/011 ( PS PS.GZ ) Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval and Christophe Tymen 2002/010 ( PS PS.GZ ) Cut and Paste Attacks with Java Serge Lefranc and David Naccache 2002/009 ( PS PS.GZ PDF ) Tree-based Group Key Agreement Yongdae Kim and Adrian Perrig and Gene Tsudik 2002/008 ( PS PS.GZ PDF ) Efficient Algorithms for Pairing-based Cryptosystems Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott 2002/007 ( PS PS.GZ PDF ) Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and Jean-Pierre Seifert 2002/006 ( PDF ) The best and worst of supersingular abelian varieties in cryptology Karl Rubin and Alice Silverberg 2002/005 ( PS PS.GZ ) Cryptanalysis of Stream Cipher COS (2,128) Mode I Hongjun Wu and Feng Bao 2002/004 ( PS PS.GZ PDF ) ID-based Signatures from Pairings on Elliptic Curves Kenneth G. Paterson 2002/003 ( PS PS.GZ ) Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle 2002/002 ( PS PS.GZ PDF ) Extracting Witnesses from Proofs of Knowledge in the Random Oracle Model Jens Groth 2002/001 ( PS PS.GZ PDF ) Fractal Hash Sequence Representation and Traversal Markus Jakobsson ------------------------------------------------------------------------ 2001/113 ( PDF ) Efficient Revocation of Anonymous Group Membership Jan Camenisch and Anna Lysyanskaya 2001/112 ( PS PS.GZ PDF ) A Proposal for an ISO Standard for Public Key Encryption Victor Shoup 2001/111 ( PS PS.GZ ) An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing N.P. Smart 2001/110 ( PS PS.GZ ) RSA hybrid encryption schemes Louis Granboulan 2001/109 ( PDF ) New Notions of Soundness and Simultaneous Resettability in the Public-Key Model Yunlei ZHAO 2001/108 ( PS PS.GZ PDF ) Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer and Victor Shoup 2001/107 ( PS PS.GZ PDF ) Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation Yehuda Lindell 2001/106 ( PS PS.GZ PDF ) Cryptanalysis of the COS (2,128) Stream Ciphers Steve Babbage 2001/105 ( PS PS.GZ ) Universal Arguments and their Applications Boaz Barak and Oded Goldreich 2001/104 ( PS PS.GZ ) Concurrent Zero-Knowledge With Timing, Revisited Oded Goldreich 2001/103 ( PS PS.GZ PDF ) Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems Antonio Bellezza 2001/102 ( PS PS.GZ PDF ) An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates Ivan Damg{\aa}rd and Gudmund Frandsen 2001/101 ( PDF ) Quasi-Efficient Revocation of Group Signatures Giuseppe Ateniese and Gene Tsudik 2001/100 ( PS PS.GZ ) A Short Note on Girault's Self-Certified Model Shahrokh Saeednia 2001/099 ( PS PS.GZ ) Linear Code Implies Public-Key Traitor Tracing Kaoru Kurosawa and Takuya Yoshida 2001/098 ( PS PS.GZ PDF ) Fast hashing onto elliptic curves over fields of characteristic 3 Paulo S. L. M. Barreto and Hae Yong Kim 2001/097 ( PS PS.GZ ) An Efficient MAC for Short Messages Sarvar Patel 2001/096 ( PS PS.GZ ) Constructing elliptic curves with a given number of points over a finite field Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan 2001/095 ( PS PS.GZ PDF ) Secure Vickrey Auctions without Threshold Trust Helger Lipmaa and N. Asokan and Valtteri Niemi 2001/094 ( PS PS.GZ ) Slope packings and coverings, and generic algorithms for the discrete logarithm problem M. Chateauneuf and A.C.H. Ling and D.R. Stinson 2001/093 ( PS PS.GZ PDF ) Threshold Cryptosystems Based on Factoring Jonathan Katz and Moti Yung 2001/092 ( PS PS.GZ PDF ) BDD-based Cryptanalysis of Keystream Generators Matthias Krause 2001/091 ( PS PS.GZ PDF ) Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor Ivan Damgård and Jesper B. Nielsen 2001/090 ( PS PS.GZ PDF ) Identity Based Encryption From the Weil Pairing Dan Boneh and Matthew Franklin
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR