New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
2003/034 ( PS PS.GZ PDF )
     On the (In)security of the Fiat-Shamir Paradigm
     Shafi Goldwasser and Yael Tauman
2003/033 ( PDF )
     Integral Cryptanalysis on reduced-round Safer++
     Gilles Piret and Jean-Jacques Quisquater
2003/032 ( PS PS.GZ PDF )
     A Framework for Password-Based Authenticated Key Exchange
     Rosario Gennaro and Yehuda Lindell
2003/031 ( PS PS.GZ PDF )
     Cryptographic Tamper Evidence
     Gene Itkis
2003/030 ( PS PS.GZ PDF )
     Efficient Multi-Party Computation over Rings
     Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz
2003/029 ( PS PS.GZ PDF )
     Universal Padding Schemes for RSA with Optimal Bandwidth of Message
     Recovery
     Wenbo Mao and John Malone-Lee
2003/028 ( PS PS.GZ PDF )
     Elliptic Curve Cryptosystems in the Presence of Permanent and Transient
     Faults
     Mathieu Ciet and Marc Joye
2003/027 ( PS PS.GZ )
     Cryptographic Randomized Response Techniques
     Andris Ambainis and Markus Jakobsson and Helger Lipmaa
2003/026 ( PDF )
     Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to
     Elliptic Curves
     Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar
2003/025 ( PS PS.GZ )
     Homomorphic public-key cryptosystems and encrypting boolean circuits
     D.Grigoriev. I.Ponomarenko
2003/024 ( PS PS.GZ PDF )
     On Modeling IND-CCA Security in Cryptographic Protocols
     Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
2003/023 ( PS PS.GZ PDF )
     New identity based signcryption schemes from pairings
     Benoît Libert and Jean-Jacques Quisquater
2003/022 ( PS PS.GZ PDF )
     Did Filiol Break AES ?
     Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas
     Pornin and Michael Scott
2003/021 ( PS PS.GZ PDF )
     An Online Auction Mechanism with Tradeoffs Between Bid Privacy,
     Cognitive Cost and Number of Rounds
     Helger Lipmaa
2003/020 ( PS PS.GZ PDF )
     Attacks based on Conditional Correlations against the Nonlinear Filter
     Generator
     Bernhard L\"ohlein
2003/019 ( PS PS.GZ )
     A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy
     Problem
     Jung Hee Cheon and Byungheup Jun
2003/018 ( PS PS.GZ PDF )
     An Authenticated Group Key Agreement Protocol on Braid groups
     HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
2003/017 ( PS PS.GZ )
     Perfect Hash Families with Few Functions
     Simon R. Blackburn
2003/016 ( PS PS.GZ PDF )
     A Threshold GQ Signature Scheme
     Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng
2003/015 ( PS PS.GZ PDF )
     A Universally Composable Cryptographic Library
     Michael Backes and Birgit Pfitzmann and Michael Waidner
2003/014 ( PS PS.GZ )
     Hiji-bij-bij: A New Stream Cipher with Self-Synchronizing and MAC Modes
     of Operation
     Palash Sarkar
2003/013 ( PS PS.GZ PDF )
     Security Constraints on the Oswald-Aigner Exponentiation Algorithm
     Colin D. Walter
2003/012 ( PS PS.GZ PDF )
     The number of initial states of the RC4 cipher with the same cycle
     structure
     Marina Pudovkina
2003/011 ( PS PS.GZ PDF )
     Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
     Fangguo Zhang and Kwangjo Kim
2003/010 ( PDF )
     Differential Fault Analysis on A.E.S.
     P. Dusart, G. Letourneux and O. Vivolo
2003/009 ( PS PS.GZ )
     Domain Extenders for UOWHFs: A Generic Lower Bound on Key Expansion and
     a Finite Binary Tree Algorithm
     Palash Sarkar
2003/008 ( PS PS.GZ )
     DFA on AES
     Christophe Giraud
2003/007 ( PS PS.GZ PDF )
     A Price Negotiable Transaction System
     Huafei Zhu
2003/006 ( PS PS.GZ PDF )
     Secure Multi-Party Computation from any Linear Secret Sharing Scheme
     Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005 ( PS PS.GZ PDF )
     Distributing the Encryption and Decryption of a Block Cipher
     Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild
2003/004 ( PS PS.GZ PDF )
     ID-based tripartite Authenticated Key Agreement Protocols from pairings
     Divya Nalla, and K.C.Reddy
2003/003 ( PS PS.GZ )
     Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers -
     The AES Case
     Eric FILIOL
2003/002 ( PS PS.GZ PDF )
     Imperfect Decryption and an Attack on the NTRU Encryption Scheme
     John Proos
2003/001 ( PDF )
     A Mode of Operation with Partial Encryption and Message Integrity
     Philip Hawkes and Gregory G. Rose
2002/195 ( PS PS.GZ )
     An addition to the paper: A polarisation based visual crypto system and
     its secret sharing schemes
     H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen, P. Tuyls
2002/194 ( PS PS.GZ )
     A polarisation based Visual Crypto System and its Secret Sharing
     Schemes
     P. Tuyls, H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen
2002/193 ( PS PS.GZ PDF )
     A Note on Ideal Tripartite Access Structures
     Michael J. Collins
2002/192 ( PS PS.GZ PDF )
     Proofs of Security for Password-Based Key Exchange (IEEE P1363 AuthA
     Protocol and Extensions)
     Emmanuel Bresson and Olivier Chevassut and David Pointcheval
2002/191 ( PS PS.GZ )
     A Linearization Attack on the Bluetooth Key Stream Generator
     Frederik Armknecht
2002/190 ( PS PS.GZ )
     Parallelizable Authentication Trees
     Eric Hall and Charanjit S. Jutla
2002/189 ( PS PS.GZ )
     Bit-Slice Auction Circuit
     Kaoru Kurosawa and Wakaha Ogata
2002/188 ( PS PS.GZ PDF )
     Chosen-Ciphertext Attacks on Optimized NTRU
     Jin Hong and Jae Woo Han and Daesung Kwon and Daewan Han
2002/187 ( PS PS.GZ PDF )
     Entity Authentication Schemes Using Braid Word Reduction
     Herv\'e SIBERT and Patrick DEHORNOY and Marc GIRAULT
2002/186 ( PS PS.GZ )
     Zero-Knowledge twenty years after its invention
     Oded Goldreich
2002/185 ( PDF )
     Turing, a fast stream cipher
     Greg Rose and Philip Hawkes
2002/184 ( PS PS.GZ PDF )
     Identity Based Authenticated Key Agreement from Pairings
     Liqun Chen and Caroline Kudla
2002/183 ( PS PS.GZ PDF )
     Simple backdoors to RSA key generation
     Claude Cr\'epeau and Alain Slakmon
2002/182 ( PS PS.GZ )
     Oblivious Keyword Search
     Wakaha Ogata and Kaoru Kurosawa
2002/181 ( PS PS.GZ PDF )
     Counting Points on the Jacobian Variety of a Hyperelliptic Curve
     defined by $y^2=x^5+ax$ over a Prime Field
     Eisaku Furukawa and Mitsuru Kawazoe and Tetsuya Takahashi
2002/180 ( PS PS.GZ )
     OMAC: One-Key CBC MAC
     Tetsu Iwata and Kaoru Kurosawa
2002/179 ( PS PS.GZ PDF )
     Parallel Algorithm for Multiplication on Elliptic Curves
     Juan Manuel Garcia Garcia and Rolando Menchaca Garcia
2002/178 ( PS PS.GZ PDF )
     Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
     Fangguo Zhang, Shengli Liu and Kwangjo Kim
2002/177 ( PDF )
     two attacks on xia-you Group Signature
     Jianhong Zhang Jilin Wang Yumin Wang
2002/176 ( PS PS.GZ PDF )
     Theoretical Analysis of ``Correlations in RC6''
     Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
2002/175 ( PS PS.GZ )
     Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
     Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham
2002/174 ( PS PS.GZ PDF )
     A Designer's Guide to KEMs
     Alexander W. Dent
2002/173 ( PS PS.GZ PDF )
     Efficient Group Signatures without Trapdoors
     Giuseppe Ateniese and Breno de Medeiros
2002/172 ( PS PS.GZ PDF )
     PECDSA. How to build a DL-based digital signature scheme with the best
     proven security
     Louis Granboulan
2002/171 ( PS PS.GZ PDF )
     Statistical weaknesses in the alleged RC4 keystream generator
     Marina Pudovkina
2002/170 ( PS PS.GZ )
     An Analysis of RMAC
     Jack Lloyd
2002/169 ( PS PS.GZ PDF )
     Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
     D. Page
2002/168 ( PS PS.GZ PDF )
     New Signature Scheme Using Conjugacy Problem
     Ki Hyoung Ko and Doo Ho Choi and Mi Sung Cho and Jang Won Lee
2002/167 ( PS PS.GZ PDF )
     Cryptanalysis of Two New Signature Schemes
     Fangguo Zhang and Kwangjo Kim
2002/166 ( PS PS.GZ PDF )
     Multi-Party Authenticated Key Agreement Protocols from Multilinear
     Forms
     Ho-Kyu Lee and Hyang-Sook Lee and Young-Ran Lee
2002/165 ( PS PS.GZ PDF )
     Coercion-Resistant Electronic Elections
     Ari Juels and Markus Jakobsson
2002/164 ( PS PS.GZ )
     Authenticated ID-based Key Exchange and remote log-in with insecure
     token and PIN number
     Mike Scott
2002/163 ( PS PS.GZ PDF )
     Man-in-the-Middle in Tunnelled Authentication Protocols
     N. Asokan and Valtteri Niemi and Kaisa Nyberg
2002/162 ( PS PS.GZ PDF )
     On Constructing Locally Computable Extractors and Cryptosystems in the
     Bounded Storage Model
     Salil P. Vadhan
2002/161 ( PS PS.GZ PDF )
     Practical Verifiable Encryption and Decryption of Discrete Logarithms
     Jan Camenisch and Victor Shoup
2002/160 ( PS PS.GZ PDF )
     Cryptology and Physical Security: Rights Amplification in Master-Keyed
     Mechanical Locks
     Matt Blaze


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR