New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2002/080 ( PS PS.GZ PDF ) Applications of Multilinear Forms to Cryptography Dan Boneh and Alice Silverberg 2002/079 ( PS PS.GZ ) On the efficiency of the Clock Control Guessing Attack Erik Zenner 2002/078 ( PS PS.GZ PDF ) Provably Fixing the SSH Binary Packet Protocol Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre 2002/077 ( PS PS.GZ PDF ) Key-Insulated Public-Key Cryptosystems Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung 2002/076 ( PDF ) Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP Vlastimil Klima and Tomas Rosa 2002/075 ( PDF ) Fault based cryptanalysis of the Advanced Encryption Standard J.\ Bl\"oemer and J.-P.\ Seifert 2002/074 ( PS PS.GZ ) How to repair ESIGN Louis Granboulan 2002/073 ( PS PS.GZ PDF ) Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures C.\ Aum\"uller and P.\ Bier and P. Hofreiter and W. Fischer and J.-P. Seifert 2002/072 ( PS PS.GZ PDF ) Authenticated Identity-Based Encryption Ben Lynn 2002/071 ( PDF ) Further Results and Considerations on Side Channel Attacks on RSA Vlastimil Klima and Tomas Rosa 2002/070 ( PS PS.GZ PDF ) Weak Keys in MST1 Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt 2002/069 ( PS PS.GZ PDF ) A Distributed and Computationally Secure Key Distribution Scheme Vanesa Daza and Javier Herranz and Carles Padr\'o and Germ\'an S\'aez 2002/068 ( PS PS.GZ ) Improved key recovery of level 1 of the Bluetooth Encryption System Scott Fluhrer 2002/067 ( PS PS.GZ PDF ) (Not So) Random Shuffles of RC4 Ilya Mironov 2002/066 ( PS PS.GZ ) Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV John Black and Phillip Rogaway and Thomas Shrimpton 2002/065 ( PS PS.GZ PDF ) Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization Chanathip Namprempre 2002/064 ( PS PS.GZ PDF ) Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold Mihir Bellare and Adriana Palacio 2002/063 ( PS PS.GZ ) On some Attacks on Multi-prime RSA M Jason Hinek and Mo King Low and Edlyn Teske 2002/062 ( PS PS.GZ PDF ) ABC - A Block Cipher Dieter Schmidt 2002/061 ( PS PS.GZ PDF ) Strengthened Encryption in the CBC Mode Vlastimil Klima and Tomas Rosa 2002/060 ( PS PS.GZ PDF ) A Forward-Secure Public-Key Encryption Scheme Jonathan Katz 2002/059 ( PS PS.GZ ) Universally Composable Notions of Key Exchange and Secure Channels Ran Canetti and Hugo Krawczyk 2002/058 ( PS PS.GZ ) Construction of UOWHF: Tree Hashing Revisited Palash Sarkar 2002/057 ( PS PS.GZ PDF ) A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions Yehuda Lindell 2002/056 ( PS PS.GZ PDF ) Hierarchical ID-Based Cryptography Craig Gentry and Alice Silverberg 2002/055 ( PS PS.GZ PDF ) Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity Manoj Prabhakaran and Amit Sahai 2002/054 ( PS PS.GZ PDF ) Intrusion-Resilient Signatures, or Towards Obsoletion of Certificate Revocation Gene Itkis and Leonid Reyzin 2002/053 ( PS PS.GZ PDF ) Extended Validity and Consistency in Byzantine Agreement Matthias Fitzi and Martin Hirt and Thomas Holenstein and J\"urg Wullschleger 2002/052 ( PS PS.GZ PDF ) A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order Stefan Lucks 2002/051 ( PS PS.GZ PDF ) Fully Distributed Proxy Signature Schemes Javier Herranz and Germ\'an S\'aez 2002/050 ( PS PS.GZ PDF ) Secret sharing schemes with three or four minimal qualified subsets Jaume Martí-Farré and Carles Padró 2002/049 ( PS PS.GZ PDF ) Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties Alexander Kholosha 2002/048 ( PS PS.GZ PDF ) Towards a Uniform Description of Several Group Based Cryptographic Primitives Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt 2002/047 ( PS PS.GZ ) Universal Composition with Joint State Ran Canetti and Tal Rabin 2002/046 ( PS PS.GZ PDF ) On the Security of Joint Signature and Encryption Jee Hea An and Yevgeniy Dodis and Tal Rabin 2002/045 ( PS PS.GZ PDF ) Cryptanalysis of S-DES Dr. K. S. Ooi, Brain Chin Vito 2002/044 ( PS PS.GZ PDF ) Cryptanalysis of Block Ciphers with Overdefined Systems of Equations Nicolas Courtois and Josef Pieprzyk 2002/043 ( PS PS.GZ ) Strict Polynomial-time in Simulation and Extraction Boaz Barak and Yehuda Lindell 2002/042 ( PS PS.GZ ) A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack Edith Elkind and Amit Sahai 2002/041 ( PS PS.GZ ) New Results on Boomerang and Rectangle Attack Eli Biham and Orr Dunkelman and Nathan Keller 2002/040 ( PS PS.GZ PDF ) Secure Computation Without a Broadcast Channel Shafi Goldwasser and Yehuda Lindell 2002/039 ( PS PS.GZ ) Partial Key Escrow Monitoring Scheme Jiang Shaoquan and Zhang Yufeng 2002/038 ( -- withdrawn -- ) A Distributed RSA Signature Scheme for General Access Structures Javier Herranz and Carles Padr\'o and Germ\'an S\'aez 2002/037 ( PS PS.GZ PDF ) An efficient semantically secure elliptic curve cryptosystem based on KMOV scheme David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar 2002/036 ( PS PS.GZ ) Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr 2002/035 ( PS PS.GZ PDF ) Authenticated Three Party Key Agreement Protocols from Pairings Sattam S. Al-Riyami and Kenneth G. Paterson 2002/034 ( PS PS.GZ PDF ) An OAEP Variant With a Tight Security Proof Jakob Jonsson 2002/033 ( PS PS.GZ ) Equivalence between semantic security and indistinguishability against chosen ciphertext attacks Yodai Watanabe and Junji Shikata and Hideki Imai 2002/032 ( PS PS.GZ ) Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields Y. Choie and E. Jeong and E. Lee 2002/031 ( PS PS.GZ ) A Parallelizable Design Principle for Cryptographic Hash Functions Palash Sarkar and Paul J. Schellenberg 2002/030 ( PS PS.GZ ) Adaptive chi-square test and its application to some cryptographic problems. Boris Ryabko
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR