New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2003/034 ( PS PS.GZ PDF ) On the (In)security of the Fiat-Shamir Paradigm Shafi Goldwasser and Yael Tauman 2003/033 ( PDF ) Integral Cryptanalysis on reduced-round Safer++ Gilles Piret and Jean-Jacques Quisquater 2003/032 ( PS PS.GZ PDF ) A Framework for Password-Based Authenticated Key Exchange Rosario Gennaro and Yehuda Lindell 2003/031 ( PS PS.GZ PDF ) Cryptographic Tamper Evidence Gene Itkis 2003/030 ( PS PS.GZ PDF ) Efficient Multi-Party Computation over Rings Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz 2003/029 ( PS PS.GZ PDF ) Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery Wenbo Mao and John Malone-Lee 2003/028 ( PS PS.GZ PDF ) Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults Mathieu Ciet and Marc Joye 2003/027 ( PS PS.GZ ) Cryptographic Randomized Response Techniques Andris Ambainis and Markus Jakobsson and Helger Lipmaa 2003/026 ( PDF ) Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar 2003/025 ( PS PS.GZ ) Homomorphic public-key cryptosystems and encrypting boolean circuits D.Grigoriev. I.Ponomarenko 2003/024 ( PS PS.GZ PDF ) On Modeling IND-CCA Security in Cryptographic Protocols Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt 2003/023 ( PS PS.GZ PDF ) New identity based signcryption schemes from pairings Benoît Libert and Jean-Jacques Quisquater 2003/022 ( PS PS.GZ PDF ) Did Filiol Break AES ? Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott 2003/021 ( PS PS.GZ PDF ) An Online Auction Mechanism with Tradeoffs Between Bid Privacy, Cognitive Cost and Number of Rounds Helger Lipmaa 2003/020 ( PS PS.GZ PDF ) Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard L\"ohlein 2003/019 ( PS PS.GZ ) A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem Jung Hee Cheon and Byungheup Jun 2003/018 ( PS PS.GZ PDF ) An Authenticated Group Key Agreement Protocol on Braid groups HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE 2003/017 ( PS PS.GZ ) Perfect Hash Families with Few Functions Simon R. Blackburn 2003/016 ( PS PS.GZ PDF ) A Threshold GQ Signature Scheme Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng 2003/015 ( PS PS.GZ PDF ) A Universally Composable Cryptographic Library Michael Backes and Birgit Pfitzmann and Michael Waidner 2003/014 ( PS PS.GZ ) Hiji-bij-bij: A New Stream Cipher with Self-Synchronizing and MAC Modes of Operation Palash Sarkar 2003/013 ( PS PS.GZ PDF ) Security Constraints on the Oswald-Aigner Exponentiation Algorithm Colin D. Walter 2003/012 ( PS PS.GZ PDF ) The number of initial states of the RC4 cipher with the same cycle structure Marina Pudovkina 2003/011 ( PS PS.GZ PDF ) Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme Fangguo Zhang and Kwangjo Kim 2003/010 ( PDF ) Differential Fault Analysis on A.E.S. P. Dusart, G. Letourneux and O. Vivolo 2003/009 ( PS PS.GZ ) Domain Extenders for UOWHFs: A Generic Lower Bound on Key Expansion and a Finite Binary Tree Algorithm Palash Sarkar 2003/008 ( PS PS.GZ ) DFA on AES Christophe Giraud 2003/007 ( PS PS.GZ PDF ) A Price Negotiable Transaction System Huafei Zhu 2003/006 ( PS PS.GZ PDF ) Secure Multi-Party Computation from any Linear Secret Sharing Scheme Ventzislav Nikov, Svetla Nikova, Bart Preneel 2003/005 ( PS PS.GZ PDF ) Distributing the Encryption and Decryption of a Block Cipher Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild 2003/004 ( PS PS.GZ PDF ) ID-based tripartite Authenticated Key Agreement Protocols from pairings Divya Nalla, and K.C.Reddy 2003/003 ( PS PS.GZ ) Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case Eric FILIOL 2003/002 ( PS PS.GZ PDF ) Imperfect Decryption and an Attack on the NTRU Encryption Scheme John Proos 2003/001 ( PDF ) A Mode of Operation with Partial Encryption and Message Integrity Philip Hawkes and Gregory G. Rose 2002/195 ( PS PS.GZ ) An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen, P. Tuyls 2002/194 ( PS PS.GZ ) A polarisation based Visual Crypto System and its Secret Sharing Schemes P. Tuyls, H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen 2002/193 ( PS PS.GZ PDF ) A Note on Ideal Tripartite Access Structures Michael J. Collins 2002/192 ( PS PS.GZ PDF ) Proofs of Security for Password-Based Key Exchange (IEEE P1363 AuthA Protocol and Extensions) Emmanuel Bresson and Olivier Chevassut and David Pointcheval 2002/191 ( PS PS.GZ ) A Linearization Attack on the Bluetooth Key Stream Generator Frederik Armknecht 2002/190 ( PS PS.GZ ) Parallelizable Authentication Trees Eric Hall and Charanjit S. Jutla 2002/189 ( PS PS.GZ ) Bit-Slice Auction Circuit Kaoru Kurosawa and Wakaha Ogata 2002/188 ( PS PS.GZ PDF ) Chosen-Ciphertext Attacks on Optimized NTRU Jin Hong and Jae Woo Han and Daesung Kwon and Daewan Han 2002/187 ( PS PS.GZ PDF ) Entity Authentication Schemes Using Braid Word Reduction Herv\'e SIBERT and Patrick DEHORNOY and Marc GIRAULT 2002/186 ( PS PS.GZ ) Zero-Knowledge twenty years after its invention Oded Goldreich 2002/185 ( PDF ) Turing, a fast stream cipher Greg Rose and Philip Hawkes 2002/184 ( PS PS.GZ PDF ) Identity Based Authenticated Key Agreement from Pairings Liqun Chen and Caroline Kudla 2002/183 ( PS PS.GZ PDF ) Simple backdoors to RSA key generation Claude Cr\'epeau and Alain Slakmon 2002/182 ( PS PS.GZ ) Oblivious Keyword Search Wakaha Ogata and Kaoru Kurosawa 2002/181 ( PS PS.GZ PDF ) Counting Points on the Jacobian Variety of a Hyperelliptic Curve defined by $y^2=x^5+ax$ over a Prime Field Eisaku Furukawa and Mitsuru Kawazoe and Tetsuya Takahashi 2002/180 ( PS PS.GZ ) OMAC: One-Key CBC MAC Tetsu Iwata and Kaoru Kurosawa 2002/179 ( PS PS.GZ PDF ) Parallel Algorithm for Multiplication on Elliptic Curves Juan Manuel Garcia Garcia and Rolando Menchaca Garcia 2002/178 ( PS PS.GZ PDF ) Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433) Fangguo Zhang, Shengli Liu and Kwangjo Kim 2002/177 ( PDF ) two attacks on xia-you Group Signature Jianhong Zhang Jilin Wang Yumin Wang 2002/176 ( PS PS.GZ PDF ) Theoretical Analysis of ``Correlations in RC6'' Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba 2002/175 ( PS PS.GZ ) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham 2002/174 ( PS PS.GZ PDF ) A Designer's Guide to KEMs Alexander W. Dent 2002/173 ( PS PS.GZ PDF ) Efficient Group Signatures without Trapdoors Giuseppe Ateniese and Breno de Medeiros 2002/172 ( PS PS.GZ PDF ) PECDSA. How to build a DL-based digital signature scheme with the best proven security Louis Granboulan 2002/171 ( PS PS.GZ PDF ) Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina 2002/170 ( PS PS.GZ ) An Analysis of RMAC Jack Lloyd 2002/169 ( PS PS.GZ PDF ) Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel D. Page 2002/168 ( PS PS.GZ PDF ) New Signature Scheme Using Conjugacy Problem Ki Hyoung Ko and Doo Ho Choi and Mi Sung Cho and Jang Won Lee 2002/167 ( PS PS.GZ PDF ) Cryptanalysis of Two New Signature Schemes Fangguo Zhang and Kwangjo Kim 2002/166 ( PS PS.GZ PDF ) Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms Ho-Kyu Lee and Hyang-Sook Lee and Young-Ran Lee 2002/165 ( PS PS.GZ PDF ) Coercion-Resistant Electronic Elections Ari Juels and Markus Jakobsson 2002/164 ( PS PS.GZ ) Authenticated ID-based Key Exchange and remote log-in with insecure token and PIN number Mike Scott 2002/163 ( PS PS.GZ PDF ) Man-in-the-Middle in Tunnelled Authentication Protocols N. Asokan and Valtteri Niemi and Kaisa Nyberg 2002/162 ( PS PS.GZ PDF ) On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model Salil P. Vadhan 2002/161 ( PS PS.GZ PDF ) Practical Verifiable Encryption and Decryption of Discrete Logarithms Jan Camenisch and Victor Shoup 2002/160 ( PS PS.GZ PDF ) Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR