New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2002/159 ( PS PS.GZ PDF ) Key-Collision Attacks Against RMAC Tadayoshi Kohno 2002/158 ( PS PS.GZ ) The Book of Rijndaels Elad Barkan and Eli Biham 2002/157 ( PS PS.GZ ) In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham 2002/156 ( PS PS.GZ ) Validating Digital Signatures without Time-Stamping and Certificate Revocation Jianying Zhou, Feng Bao, and Robert Deng 2002/155 ( PS PS.GZ PDF ) Secure Bilinear Diffie-Hellman Bits Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski 2002/154 ( PS PS.GZ PDF ) On multi-exponentiation in cryptography Roberto M. Avanzi 2002/153 ( PS PS.GZ PDF ) Weighted Coordinates on Genus 2 Hyperelliptic Curves Tanja Lange 2002/152 ( PS PS.GZ PDF ) A note on Weak Keys of PES, IDEA and some Extended Variants Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle 2002/151 ( PDF ) Selective disclosure blinded credential sets Jason Holt and Kent E. Seamons 2002/150 ( PS PS.GZ PDF ) Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes Guilin Wang, Jianying Zhou, and Robert H. Deng 2002/149 ( PS PS.GZ PDF ) About Filliol's Observations on DES, AES and Hash Functions (draft) Nicolas T. Courtois 2002/148 ( PS PS.GZ PDF ) The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP) Phillip Rogaway 2002/147 ( PS PS.GZ PDF ) Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves Tanja Lange 2002/146 ( PS PS.GZ PDF ) Bauer-Berson-Feiertag attack revisited Jun-Bum Shin and Kwang H. Lee 2002/145 ( PS PS.GZ ) Cryptanalysis of MQV with partially known nonces P.J. Leadbitter, N.P. Smart 2002/144 ( PS PS.GZ PDF ) On Some Algebraic Structures in the AES Round Function A.M. Youssef and S.E. Tavares 2002/143 ( PS PS.GZ PDF ) An Attack on the Isomorphisms of Polynomials Problem with One Secret Willi Geiselmann and Willi Meier and Rainer Steinwandt 2002/142 ( PDF ) On the Applicability of Distinguishing Attacks Against Stream Ciphers Greg Rose and Philip Hawkes 2002/141 ( PS PS.GZ PDF ) Applying General Access Structure to Proactive Secret Sharing Schemes Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle 2002/140 ( PS PS.GZ PDF ) Universally Composable Two-Party and Multi-Party Secure Computation Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai 2002/139 ( PS PS.GZ ) Reaction Attacks on Public Key Cryptosystems Based on the Word Problem Maria Isabel Gonzalez Vasco and Rainer Steinwandt 2002/138 ( PS PS.GZ PDF ) On the Security of HFE, HFEv- and Quartz Nicolas T. Courtois and Magnus Daum and Patrick Felke 2002/137 ( PS PS.GZ PDF ) Provably Secure Steganography Nicholas J. Hopper and John Langford and Luis von Ahn 2002/136 ( PS PS.GZ ) Practical Non-Interactive Key Distribution Based on Pairings R\'egis Dupont and Andreas Enge 2002/135 ( PS PS.GZ PDF ) Cryptanalysis-tolerant Commitment and Hashing Amir Herzberg 2002/134 ( PS PS.GZ PDF ) Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl 2002/133 ( PS PS.GZ PDF ) Efficient Construction of (Distributed) Verifiable Random Functions Yevgeniy Dodis 2002/132 ( PS PS.GZ ) Tight Lower Bound on Linear Authenticated Encryption Charanjit S. Jutla 2002/131 ( PS PS.GZ PDF ) An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedic and Leonid Reyzin and Salil Vadhan 2002/130 ( PS PS.GZ PDF ) OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives Kazukuni Kobara and Hideki Imai 2002/129 ( PDF ) On Key-collisions in (EC)DSA Schemes Tomas Rosa 2002/128 ( PS PS.GZ PDF ) Perfectly Secure Message Transmission Revisited Yvo Desmedt and Yongge Wang 2002/127 ( PS PS.GZ ) Power of a Public Random Permutation and its Application to Authenticated-Encryption Kaoru Kurosawa 2002/126 ( PS PS.GZ PDF ) Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference Ahmad-Reza Sadeghi and Michael Steiner 2002/125 ( PS PS.GZ PDF ) The Jacobi Model of an Elliptic Curve and Side-Channel Analysis Olivier Billet and Marc Joye 2002/124 ( PS PS.GZ PDF ) On Optimal Hash Tree Traversal for Interval Time-Stamping Helger Lipmaa 2002/123 ( PS PS.GZ ) New covering radius of Reed-Muller codes for $t$-resilient functions Kaoru Kurosawa, Tetsu Iwata and Takayuki Yoshiwara 2002/122 ( PS PS.GZ PDF ) ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings Fangguo Zhang, Shengli Liu and Kwangjo Kim 2002/121 ( PS PS.GZ PDF ) Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae Tanja Lange 2002/120 ( PS PS.GZ ) Security Analysis of IKE's Signature-based Key-Exchange Protocol Ran Canetti and Hugo Krawczyk 2002/119 ( PDF ) Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M\"oller 2002/118 ( PS PS.GZ PDF ) Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme Alexandra Boldyreva 2002/117 ( PS PS.GZ ) Diffie-Hellman Problems and Bilinear Maps Jung Hee Cheon and Dong Hoon Lee 2002/116 ( PS PS.GZ ) How to convert any ID-based Signature Schemes Claude Castelluccia 2002/115 ( PS PS.GZ ) Universal Padding Schemes for RSA Jean-Sébastien Coron and Marc Joye and David Naccache and Pascal Paillier 2002/114 ( PS PS.GZ ) Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three N.P. Smart and J. Westwood 2002/113 ( PS PS.GZ ) A Note on the Bilinear Diffie-Hellman Assumption Yacov Yacobi 2002/112 ( PS PS.GZ ) An Efficient Procedure to Double and Add Points on an Elliptic Curve Kirsten Eisentraeger, Kristin Lauter, and Peter L. Montgomery 2002/111 ( PS PS.GZ ) On Linear Redundancy in the AES S-Box Joanne Fuller and William Millan 2002/110 ( PS PS.GZ ) The GGM Construction does NOT yield Correlation Intractable Function Ensembles Oded Goldreich 2002/109 ( PDF ) A New Class of Unsafe Primes Qi Cheng 2002/108 ( PS PS.GZ PDF ) Clock-Controlled Alternating Step Generator Ali Adel Kanso 2002/107 ( PS PS.GZ PDF ) Efficient Arithmetic on Hyperelliptic Curves Tanja Lange 2002/106 ( PS PS.GZ PDF ) Secret sharing schemes on access structures with intersection number equal to one Jaume Marti-Farre and Carles Padro 2002/105 ( PS PS.GZ PDF ) An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2 Jan Denef and Frederik Vercauteren 2002/104 ( PS PS.GZ PDF ) Forward-Secure Signatures with Fast Key Update Anton Kozlov and Leonid Reyzin 2002/103 ( PS PS.GZ PDF ) On the Power of Claw-Free Permutations Yevgeniy Dodis and Leonid Reyzin 2002/102 ( PS PS.GZ PDF ) Applying General Access Structure to Metering Schemes Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle 2002/101 ( PS PS.GZ PDF ) An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property Simon R. Blackburn 2002/100 ( PS PS.GZ ) Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black and P. Rogaway and T. Shrimpton 2002/099 ( PS PS.GZ ) A New Statistical Testing for Symmetric Ciphers and Hash Functions Eric Filiol 2002/098 ( PS PS.GZ PDF ) Identity-Based Signcryption John Malone-Lee 2002/097 ( PS PS.GZ PDF ) A new public key encryption scheme provably secure against adaptive chosen cipher-text attack Huafei Zhu 2002/096 ( PS PS.GZ PDF ) Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank James Xiao and Yongxin Zhou 2002/095 ( PDF ) The (a, b)-Shrinking Generator Ali Adel Kanso 2002/094 ( PS PS.GZ ) Building curves with arbitrary small MOV degree over finite prime fields R. Dupont and A. Enge and F. Morain 2002/093 ( PS PS.GZ PDF ) A Fuzzy Vault Scheme Ari Juels and Madhu Sudan 2002/092 ( PS PS.GZ PDF ) TMAC: Two-Key CBC MAC Kaoru Kurosawa and Tetsu Iwata 2002/091 ( PS PS.GZ ) Multiplicative Masking and Power Analysis of AES Jovan Dj. Goli\'{c} 2002/090 ( PS PS.GZ PDF ) Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol Daniele Micciancio and Erez Petrank 2002/089 ( PS PS.GZ ) On Chosen Ciphertext Security of Multiple Encryptions Oded Goldreich, Yoad Lustig and Moni Naor 2002/088 ( PS PS.GZ PDF ) Constructing Elliptic Curves with Prescribed Embedding Degrees Paulo S. L. M. Barreto and Ben Lynn and Michael Scott 2002/087 ( PS PS.GZ PDF ) Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt Nicolas T. Courtois 2002/086 ( PS PS.GZ PDF ) Adapting the weaknesses of the Random Oracle model to the Generic Group model. Alexander W. Dent 2002/085 ( PS PS.GZ ) Efficient and Player-Optimal Strong Consensus Matthias Fitzi and Juan A. Garay 2002/084 ( PDF ) Guaranteed Delivery for Secure Electronic Commerce and Payments Amir Herzberg 2002/083 ( PS PS.GZ PDF ) A semantically secure elliptic curve RSA scheme with small expansion factor David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar 2002/082 ( PS PS.GZ ) Authentication of Quantum Messages Howard Barnum and Claude Crepeau and Daniel Gottesman and Adam Smith and Alain Tapp 2002/081 ( PS PS.GZ PDF ) Some Applications of Threshold Signature Schemes to Distributed Protocols Vanesa Daza and Javier Herranz and Germ\'an S\'aez
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR