New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2002/159 ( PS PS.GZ PDF )
Key-Collision Attacks Against RMAC
Tadayoshi Kohno
2002/158 ( PS PS.GZ )
The Book of Rijndaels
Elad Barkan and Eli Biham
2002/157 ( PS PS.GZ )
In How Many Ways Can You Write Rijndael?
Elad Barkan and Eli Biham
2002/156 ( PS PS.GZ )
Validating Digital Signatures without Time-Stamping and Certificate
Revocation
Jianying Zhou, Feng Bao, and Robert Deng
2002/155 ( PS PS.GZ PDF )
Secure Bilinear Diffie-Hellman Bits
Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
2002/154 ( PS PS.GZ PDF )
On multi-exponentiation in cryptography
Roberto M. Avanzi
2002/153 ( PS PS.GZ PDF )
Weighted Coordinates on Genus 2 Hyperelliptic Curves
Tanja Lange
2002/152 ( PS PS.GZ PDF )
A note on Weak Keys of PES, IDEA and some Extended Variants
Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle
2002/151 ( PDF )
Selective disclosure blinded credential sets
Jason Holt and Kent E. Seamons
2002/150 ( PS PS.GZ PDF )
Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature
Schemes
Guilin Wang, Jianying Zhou, and Robert H. Deng
2002/149 ( PS PS.GZ PDF )
About Filliol's Observations on DES, AES and Hash Functions (draft)
Nicolas T. Courtois
2002/148 ( PS PS.GZ PDF )
The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
Phillip Rogaway
2002/147 ( PS PS.GZ PDF )
Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
Tanja Lange
2002/146 ( PS PS.GZ PDF )
Bauer-Berson-Feiertag attack revisited
Jun-Bum Shin and Kwang H. Lee
2002/145 ( PS PS.GZ )
Cryptanalysis of MQV with partially known nonces
P.J. Leadbitter, N.P. Smart
2002/144 ( PS PS.GZ PDF )
On Some Algebraic Structures in the AES Round Function
A.M. Youssef and S.E. Tavares
2002/143 ( PS PS.GZ PDF )
An Attack on the Isomorphisms of Polynomials Problem with One Secret
Willi Geiselmann and Willi Meier and Rainer Steinwandt
2002/142 ( PDF )
On the Applicability of Distinguishing Attacks Against Stream Ciphers
Greg Rose and Philip Hawkes
2002/141 ( PS PS.GZ PDF )
Applying General Access Structure to Proactive Secret Sharing Schemes
Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle
2002/140 ( PS PS.GZ PDF )
Universally Composable Two-Party and Multi-Party Secure Computation
Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai
2002/139 ( PS PS.GZ )
Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2002/138 ( PS PS.GZ PDF )
On the Security of HFE, HFEv- and Quartz
Nicolas T. Courtois and Magnus Daum and Patrick Felke
2002/137 ( PS PS.GZ PDF )
Provably Secure Steganography
Nicholas J. Hopper and John Langford and Luis von Ahn
2002/136 ( PS PS.GZ )
Practical Non-Interactive Key Distribution Based on Pairings
R\'egis Dupont and Andreas Enge
2002/135 ( PS PS.GZ PDF )
Cryptanalysis-tolerant Commitment and Hashing
Amir Herzberg
2002/134 ( PS PS.GZ PDF )
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl
2002/133 ( PS PS.GZ PDF )
Efficient Construction of (Distributed) Verifiable Random Functions
Yevgeniy Dodis
2002/132 ( PS PS.GZ )
Tight Lower Bound on Linear Authenticated Encryption
Charanjit S. Jutla
2002/131 ( PS PS.GZ PDF )
An Improved Pseudorandom Generator Based on Hardness of Factoring
Nenad Dedic and Leonid Reyzin and Salil Vadhan
2002/130 ( PS PS.GZ PDF )
OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA
Primitives
Kazukuni Kobara and Hideki Imai
2002/129 ( PDF )
On Key-collisions in (EC)DSA Schemes
Tomas Rosa
2002/128 ( PS PS.GZ PDF )
Perfectly Secure Message Transmission Revisited
Yvo Desmedt and Yongge Wang
2002/127 ( PS PS.GZ )
Power of a Public Random Permutation and its Application to
Authenticated-Encryption
Kaoru Kurosawa
2002/126 ( PS PS.GZ PDF )
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real
Difference
Ahmad-Reza Sadeghi and Michael Steiner
2002/125 ( PS PS.GZ PDF )
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
Olivier Billet and Marc Joye
2002/124 ( PS PS.GZ PDF )
On Optimal Hash Tree Traversal for Interval Time-Stamping
Helger Lipmaa
2002/123 ( PS PS.GZ )
New covering radius of Reed-Muller codes for $t$-resilient functions
Kaoru Kurosawa, Tetsu Iwata and Takayuki Yoshiwara
2002/122 ( PS PS.GZ PDF )
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with
Pairings
Fangguo Zhang, Shengli Liu and Kwangjo Kim
2002/121 ( PS PS.GZ PDF )
Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields
via Explicit Formulae
Tanja Lange
2002/120 ( PS PS.GZ )
Security Analysis of IKE's Signature-based Key-Exchange Protocol
Ran Canetti and Hugo Krawczyk
2002/119 ( PDF )
Provably Secure Public-Key Encryption for Length-Preserving Chaumian
Mixes
Bodo M\"oller
2002/118 ( PS PS.GZ PDF )
Efficient threshold signature, multisignature and blind signature
schemes based on the Gap-Diffie-Hellman-group signature scheme
Alexandra Boldyreva
2002/117 ( PS PS.GZ )
Diffie-Hellman Problems and Bilinear Maps
Jung Hee Cheon and Dong Hoon Lee
2002/116 ( PS PS.GZ )
How to convert any ID-based Signature Schemes
Claude Castelluccia
2002/115 ( PS PS.GZ )
Universal Padding Schemes for RSA
Jean-Sébastien Coron and Marc Joye and David Naccache and Pascal
Paillier
2002/114 ( PS PS.GZ )
Point Multiplication on Ordinary Elliptic Curves over Fields of
Characteristic Three
N.P. Smart and J. Westwood
2002/113 ( PS PS.GZ )
A Note on the Bilinear Diffie-Hellman Assumption
Yacov Yacobi
2002/112 ( PS PS.GZ )
An Efficient Procedure to Double and Add Points on an Elliptic Curve
Kirsten Eisentraeger, Kristin Lauter, and Peter L. Montgomery
2002/111 ( PS PS.GZ )
On Linear Redundancy in the AES S-Box
Joanne Fuller and William Millan
2002/110 ( PS PS.GZ )
The GGM Construction does NOT yield Correlation Intractable Function
Ensembles
Oded Goldreich
2002/109 ( PDF )
A New Class of Unsafe Primes
Qi Cheng
2002/108 ( PS PS.GZ PDF )
Clock-Controlled Alternating Step Generator
Ali Adel Kanso
2002/107 ( PS PS.GZ PDF )
Efficient Arithmetic on Hyperelliptic Curves
Tanja Lange
2002/106 ( PS PS.GZ PDF )
Secret sharing schemes on access structures with intersection number
equal to one
Jaume Marti-Farre and Carles Padro
2002/105 ( PS PS.GZ PDF )
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in
Characteristic 2
Jan Denef and Frederik Vercauteren
2002/104 ( PS PS.GZ PDF )
Forward-Secure Signatures with Fast Key Update
Anton Kozlov and Leonid Reyzin
2002/103 ( PS PS.GZ PDF )
On the Power of Claw-Free Permutations
Yevgeniy Dodis and Leonid Reyzin
2002/102 ( PS PS.GZ PDF )
Applying General Access Structure to Metering Schemes
Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle
2002/101 ( PS PS.GZ PDF )
An Upper Bound on the Size of a Code with the $k$-Identifiable Parent
Property
Simon R. Blackburn
2002/100 ( PS PS.GZ )
Encryption-Scheme Security in the Presence of Key-Dependent Messages
J. Black and P. Rogaway and T. Shrimpton
2002/099 ( PS PS.GZ )
A New Statistical Testing for Symmetric Ciphers and Hash Functions
Eric Filiol
2002/098 ( PS PS.GZ PDF )
Identity-Based Signcryption
John Malone-Lee
2002/097 ( PS PS.GZ PDF )
A new public key encryption scheme provably secure against adaptive
chosen cipher-text attack
Huafei Zhu
2002/096 ( PS PS.GZ PDF )
Generating Large Non-Singular Matrices over an Arbitrary Field with
Blocks of Full Rank
James Xiao and Yongxin Zhou
2002/095 ( PDF )
The (a, b)-Shrinking Generator
Ali Adel Kanso
2002/094 ( PS PS.GZ )
Building curves with arbitrary small MOV degree over finite prime
fields
R. Dupont and A. Enge and F. Morain
2002/093 ( PS PS.GZ PDF )
A Fuzzy Vault Scheme
Ari Juels and Madhu Sudan
2002/092 ( PS PS.GZ PDF )
TMAC: Two-Key CBC MAC
Kaoru Kurosawa and Tetsu Iwata
2002/091 ( PS PS.GZ )
Multiplicative Masking and Power Analysis of AES
Jovan Dj. Goli\'{c}
2002/090 ( PS PS.GZ PDF )
Efficient and Concurrent Zero-Knowledge from any public coin HVZK
protocol
Daniele Micciancio and Erez Petrank
2002/089 ( PS PS.GZ )
On Chosen Ciphertext Security of Multiple Encryptions
Oded Goldreich, Yoad Lustig and Moni Naor
2002/088 ( PS PS.GZ PDF )
Constructing Elliptic Curves with Prescribed Embedding Degrees
Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
2002/087 ( PS PS.GZ PDF )
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of
Toyocrypt
Nicolas T. Courtois
2002/086 ( PS PS.GZ PDF )
Adapting the weaknesses of the Random Oracle model to the Generic Group
model.
Alexander W. Dent
2002/085 ( PS PS.GZ )
Efficient and Player-Optimal Strong Consensus
Matthias Fitzi and Juan A. Garay
2002/084 ( PDF )
Guaranteed Delivery for Secure Electronic Commerce and Payments
Amir Herzberg
2002/083 ( PS PS.GZ PDF )
A semantically secure elliptic curve RSA scheme with small expansion
factor
David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L.
Villar
2002/082 ( PS PS.GZ )
Authentication of Quantum Messages
Howard Barnum and Claude Crepeau and Daniel Gottesman and Adam Smith
and Alain Tapp
2002/081 ( PS PS.GZ PDF )
Some Applications of Threshold Signature Schemes to Distributed
Protocols
Vanesa Daza and Javier Herranz and Germ\'an S\'aez
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR