New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2003/182 ( PS PS.GZ PDF ) Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti, Shai Halevi, and Jonathan Katz 2003/181 ( PS PS.GZ PDF ) On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai 2003/180 ( PS PS.GZ ) Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra and Palash Sarkar 2003/179 ( PS PS.GZ PDF ) VMPC one-way function Bartosz Zoltak 2003/178 ( PDF ) Constructing Optimistic Fair Exchange Protocols from Committed Signatures Huafei Zhu 2003/177 ( PS PS.GZ PDF ) Building Secure Cryptographic Transforms, or How to Encrypt and MAC Tadayoshi Kohno and Adriana Palacio and John Black 2003/176 ( PS PS.GZ PDF ) Patterson-Wiedemann Construction Revisited S. Gangopadhyay and P. H. Keskar and S. Maitra 2003/175 ( PS PS.GZ PDF ) Double-Speed Safe Prime Generation David Naccache 2003/174 ( PS PS.GZ PDF ) Relaxing Chosen-Ciphertext Security Ran Canetti and Hugo Krawczyk and Jesper Nielsen 2003/173 ( PS PS.GZ ) Domain Extender for Collision Resistant Hash Functions Using a Directed Acyclic Graph Palash Sarkar 2003/172 ( PS PS.GZ PDF ) NAEP: Provable Security in the Presence of Decryption Failures Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte 2003/171 ( PS PS.GZ PDF ) Scalable Protocols for Authenticated Group Key Exchange Jonathan Katz and Moti Yung 2003/170 ( PS PS.GZ PDF ) HARPS: HAshed Random Preloaded Subset Key Distribution Mahalingam Ramkumar and Nasir Memon 2003/169 ( PS PS.GZ PDF ) Properties of the Transformation Semigroup of the Solitaire Stream Cipher Boris Pogorelov and Marina Pudovkina 2003/168 ( PS PS.GZ ) Robust discretization, with an application to graphical passwords Jean-Camille Birget and Dawei Hong and Nasir Memon 2003/167 ( PDF ) Identity-based Chameleon Hash and Applications Giuseppe Ateniese and Breno de Medeiros 2003/166 ( PS PS.GZ PDF ) A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves Igor Semaev 2003/165 ( PDF ) Commitment Capacity of Discrete Memoryless Channels Andreas Winter, Anderson C. A. Nascimento, Hideki Imai 2003/164 ( PS PS.GZ PDF ) Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 2003/163 ( PS PS.GZ PDF ) Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography Xavier Boyen 2003/162 ( PS PS.GZ PDF ) Cryptanalysis of the Alleged SecurID Hash Function Alex Biryukov and Joseph Lano and Bart Preneel 2003/161 ( PS PS.GZ PDF ) Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology Ueli Maurer and Renato Renner and Clemens Holenstein 2003/160 ( PDF ) Tame Transformation Signatures Jiun-Ming Chen and Bo-Yin Yang 2003/159 ( PS PS.GZ PDF ) An efficient variant of the RSA cryptosystem Cesar Alison Monteiro Paixão 2003/158 ( PS PS.GZ ) Study of Domain Extension of UOWHF and Its Optimality Mridul Nandi 2003/157 ( PS PS.GZ ) Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa and Tsuyoshi Takagi 2003/156 ( PS PS.GZ ) Efficient Proven Secure Public Key Steganography Tri Van Le 2003/155 ( PDF ) A Formal Proof of Zhu's Signature Scheme huafei zhu 2003/154 ( PS PS.GZ ) ManTiCore: Encryption with Joint Cipher-State Authentication Cheryl Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson 2003/153 ( PDF ) Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG 2003/152 ( PDF ) Optimal Statistical Power Analysis Eric Brier and Christophe Clavier and Francis Olivier 2003/151 ( PDF ) Secret sharing schemes on sparse homogeneous access structures with rank three Jaume Martí-Farré and Carles Padró 2003/150 ( PS PS.GZ PDF ) On the random-oracle methodology as applied to length-restricted signature schemes Ran Canetti and Oded Goldreich and Shai Halevi 2003/149 ( -- withdrawn -- ) Forward-Secure Hierarchical ID-Based Cryptography Danfeng Yao and Anna Lysyanskaya 2003/148 ( PS PS.GZ PDF ) A Tweakable Enciphering Mode Shai Halevi and Phillip Rogaway 2003/147 ( PS PS.GZ PDF ) A Parallelizable Enciphering Mode Shai Halevi and Phillip Rogaway 2003/146 ( PS PS.GZ PDF ) Breaking and Repairing Optimistic Fair Exchange from PODC 2003 Yevgeniy Dodis and Leonid Reyzin 2003/145 ( PS PS.GZ ) Symmetric Authentication Within a Simulatable Cryptographic Library Michael Backes and Birgit Pfitzmann and Michael Waidner 2003/144 ( PS PS.GZ PDF ) ID-based tripartite key agreement with signatures Divya Nalla 2003/143 ( PS PS.GZ PDF ) Elliptic curves suitable for pairing based cryptography Friederike Brezing and Annegret Weng 2003/142 ( PS PS.GZ ) A New Tree based Domain Extension of UOWHF Mridul Nandi 2003/141 ( PS PS.GZ PDF ) General Composition and Universal Composability in Secure Multi-Party Computation Yehuda Lindell 2003/140 ( PS PS.GZ PDF ) Trading-Off Type-Inference Memory Complexity Against Communication Konstantin Hypp\"onen and David Naccache and Elena Trichina and Alexei Tchoulkine 2003/139 ( PDF ) On the Randomness of the Editing Generator Enjian Bai and Guozhen Xiao 2003/138 ( PS PS.GZ ) Permutation graphs, fast forward permutations, and Boaz Tsaban 2003/137 ( PS PS.GZ ) Bernoulli numbers and the probability of a birthday surprise Boaz Tsaban 2003/136 ( PS PS.GZ ) Efficient linear feedback shift registers with maximal period Boaz Tsaban and Uzi Vishne 2003/135 ( PS PS.GZ PDF ) Collision Attack on Reduced-Round Camellia Wen-Ling Wu and Deng-Guo Feng 2003/134 ( -- withdrawn -- ) Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions Sugata Gangopadhyay and Subhamoy Maitra 2003/133 ( PS PS.GZ PDF ) Minimum Distance between Bent and 1-resilient Boolean Functions Soumen Maity and Subhamoy Maitra 2003/132 ( PS PS.GZ ) Guaranteeing the diversity of number generators Adi Shamir and Boaz Tsaban 2003/131 ( PS PS.GZ PDF ) Homomorphic public-key systems based on subgroup membership problems Kristian Gjøsteen 2003/130 ( PS PS.GZ PDF ) On the Pseudorandomness of KASUMI Type Permutations Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa 2003/129 ( PS PS.GZ PDF ) Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo 2003/128 ( PS PS.GZ ) Weak Fields for ECC Alfred Menezes and Edlyn Teske and Annegret Weng 2003/127 ( PDF ) Using Information Theory Approach to Randomness Testing B. Ya. Ryabko and V.A. Monarev 2003/126 ( PS PS.GZ PDF ) Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson 2003/125 ( PS PS.GZ PDF ) Algebraic Attacks on Combiners with Memory and Several Outputs Nicolas T. Courtois 2003/124 ( PS PS.GZ ) A General Correlation Theorem Kishan Chand Gupta and Palash Sarkar 2003/123 ( PS PS.GZ PDF ) Assessing security of some group based cryptosystems Vladimir Shpilrain 2003/122 ( PDF ) Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols Kyungah Shim 2003/121 ( PS PS.GZ ) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol Michael Backes and Birgit Pfitzmann 2003/120 ( PS PS.GZ PDF ) Physically Observable Cryptography Silvio Micali and Leonid Reyzin 2003/119 ( PS PS.GZ PDF ) How Secure Are FPGAs in Cryptographic Applications? Thomas Wollinger and Christof Paar 2003/118 ( PS PS.GZ ) Visual Crypto Displays Enabling Secure Communications Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk 2003/117 ( PDF ) An identity-based ring signature scheme from bilinear pairings Chih-Yin Lin and Tzong-Chen Wu 2003/116 ( PS PS.GZ PDF ) A New ID-based Group Signature Scheme from Bilinear Pairings Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim 2003/115 ( PDF ) Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols Kyungah Shim 2003/114 ( PS PS.GZ ) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions Michael Backes 2003/113 ( PS PS.GZ PDF ) Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings Hung-Min Sun and Bin-Tsan Hsieh 2003/112 ( PS PS.GZ ) Accumulating Composites and Improved Group Signing Gene Tsudik and Shouhuai Xu 2003/111 ( PDF ) Further Cryptanalysis of some Proxy Signature Schemes Jiqiang Lv and Jingwei Liu and Xinmei Wang 2003/110 ( PDF ) Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key Yukio Itakura and Shigeo Tsujii 2003/109 ( PS PS.GZ PDF ) Crytanalysis of SAFER++ Alex Biryukov and Christophe De Canni\`ere and Gustaf Dellkrantz 2003/108 ( PS PS.GZ ) Novel Cyclic and Algebraic Properties of AES Tri Van Le 2003/107 ( PS PS.GZ PDF ) Fujisaki-Okamoto IND-CCA hybrid encryption revisited David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar 2003/106 ( PS PS.GZ PDF ) High-speed encryption and authentication: A patent-free solution for 10 Gbps network devices Tadayoshi Kohno and John Viega and Doug Whiting 2003/105 ( PS PS.GZ ) On Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa 2003/104 ( PS PS.GZ PDF ) New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin 2003/103 ( PS PS.GZ PDF ) Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols Zhongliang Chen 2003/102 ( PDF ) Length-Based Attacks for Certain Group Based Encryption Rewriting Systems J. Hughes, and A. Tannenbaum 2003/101 ( -- withdrawn -- ) Cryptanalysis of HFE Ilia Toli 2003/100 ( PS PS.GZ PDF ) Bounded-Concurrent Secure Two-Party Computation Without Set-Up Assumptions Yehuda Lindell 2003/099 ( PS PS.GZ PDF ) Algorithms in Braid Groups Matthew J. Campagna 2003/098 ( PDF ) Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klima and Tomas Rosa 2003/097 ( PS PS.GZ PDF ) Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves Jan Pelzl and Thomas Wollinger and Christof Paar 2003/096 ( PS PS.GZ PDF ) Secure Proxy Signature Schemes for Delegation of Signing Rights Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi 2003/095 ( PS PS.GZ PDF ) Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack Yevgeniy Dodis and Nelly Fazio 2003/094 ( PS PS.GZ PDF ) Trace Zero Subvariety for Cryptosystems Tanja Lange 2003/093 ( PS PS.GZ PDF ) More Efficient Provably Secure Steganography Leonid Reyzin and Scott Russell 2003/092 ( PS PS.GZ PDF ) Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol Muxiang Zhang 2003/091 ( PS PS.GZ ) Sequential Aggregate Signatures from Trapdoor Homomorphic Permutations Hovav Shacham 2003/090 ( PDF ) A Structured Multisignature Scheme from the Gap Diffie-Hellman Group Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang 2003/089 ( PS PS.GZ PDF ) Efficient Public Key Generation for Multivariate Cryptosystems Christopher Wolf 2003/088 ( PDF ) Elliptic Curve Point Multiplication A.G.Rostovtsev and E.B.Makhovenko 2003/087 ( PS PS.GZ PDF ) A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack huafei zhu 2003/086 ( PS PS.GZ PDF ) On the Selection of Pairing-Friendly Groups Paulo S. L. M. Barreto and Ben Lynn and Michael Scott 2003/085 ( PS PS.GZ ) A defect of the implementation schemes of the TTM cryptosystem Jintai Ding, Dieter Schmidt 2003/084 ( PS PS.GZ ) Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem Jintai Ding, Timonthy Hodges 2003/083 ( PS PS.GZ PDF ) A Forward-Secure Public-Key Encryption Scheme Ran Canetti and Shai Halevi and Jonathan Katz 2003/082 ( PS PS.GZ PDF ) Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata and Kaoru Kurosawa 2003/081 ( PDF ) Primitive Specification for SOBER-128 Philip Hawkes and Greg Rose 2003/080 ( PS PS.GZ PDF ) Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård and Jens Groth 2003/079 ( PS PS.GZ PDF ) Fast arithmetic on Jacobians of Picard curves Stéphane Flon and Roger Oyono 2003/078 ( PS PS.GZ PDF ) Relation between simulator-based and comparison-based definitions of semantic security Yodai Watanabe and Junji Shikata 2003/077 ( PS PS.GZ PDF ) An Un-Instantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem Mihir Bellare and Alexandra Boldyreva and Adriana Palacio 2003/076 ( PS PS.GZ PDF ) Goldbachs Conjecture on ECDSA Protocols N. Vijayarangan, Nitin Agarwal, S. Kasilingam 2003/075 ( PS PS.GZ ) Almost Security of Cryptographic Boolean Functions Kaoru Kurosawa 2003/074 ( PDF ) Divisible Voting Scheme Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata 2003/073 ( PDF ) A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures Sunder Lal and Amit K Awasthi 2003/072 ( PDF ) Proxy Blind Signature Scheme Sunder Lal and Amit K Awasthi 2003/071 ( PS PS.GZ PDF ) How to Protect Against a Militant Spammer Markus Jakobsson and John Linn and Joy Algesheimer 2003/070 ( PS PS.GZ PDF ) A Critique of CCM P. Rogaway and D. Wagner 2003/069 ( PS PS.GZ PDF ) A Conventional Authenticated-Encryption Mode M. Bellare and P. Rogaway and D. Wagner 2003/068 ( PS PS.GZ PDF ) On the Security of Some Proxy Signature Schemes Hung-Min Sun and Bin-Tsan Hsieh 2003/067 ( PS PS.GZ PDF ) Forking Lemmas in the Ring Signatures' Scenario Javier Herranz and Germ\'an S\'aez 2003/066 ( PS PS.GZ PDF ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K.C.Reddy 2003/065 ( PS PS.GZ PDF ) Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare and Tadayoshi Kohno 2003/064 ( PS PS.GZ PDF ) On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod 2003/063 ( PS PS.GZ PDF ) Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt 2003/062 ( PS PS.GZ ) An n-party Key Agreement Scheme using Bilinear Map Rana Barua and Ratna Dutta and Palash Sarkar 2003/061 ( PDF ) Hidden Polynomial Cryptosystems Ilia Toli 2003/060 ( PS PS.GZ PDF ) Isomorphism Classes of Picard Curves over Finite Fields Jong Won Lee 2003/059 ( -- withdrawn -- ) A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack Huafei Zhu and Bao Feng and Robert H. Deng 2003/058 ( PS PS.GZ PDF ) An Elliptic Curve Trapdoor System Edlyn Teske 2003/057 ( PS PS.GZ ) Secure Multiplication of Shared Secrets in the Exponent Mario Di Raimondo and Rosario Gennaro 2003/056 ( PS PS.GZ PDF ) Computing of Trust in Distributed Networks Huafei Zhu and Bao Feng and Robert H. Deng 2003/055 ( PDF ) A New Approach to Prevent Blackmailing in E-Cash Xiaofeng Chen and Fangguo Zhang and Yumin Wang 2003/054 ( PS PS.GZ PDF ) ID based Cryptosystems with Pairing on Elliptic Curve Ryuichi SAKAI and Masao KASAHARA 2003/053 ( PS PS.GZ ) Tate-pairing implementations for tripartite key agreement Iwan Duursma and Hyang-Sook Lee 2003/052 ( PDF ) Attacking RSA-based Sessions in SSL/TLS Vlastimil Klima and Ondrej Pokorny and Tomas Rosa 2003/051 ( PS PS.GZ ) How to Predict the Output of a Hardware Random Number Generator Markus Dichtl 2003/050 ( PS PS.GZ PDF ) Concealment and its Applications to Authenticated Encryption Yevgeniy Dodis and Jee Hea An 2003/049 ( PS PS.GZ PDF ) Hidden Number Problem in Small Subgroups Igor Shparlinski and Arne Winterhof 2003/048 ( PS PS.GZ PDF ) Compounding Secret Sharing Schemes E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera 2003/047 ( PS PS.GZ PDF ) A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme Masao KASAHARA and Ryuichi SAKAI 2003/046 ( PS PS.GZ PDF ) Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers Guilin Wang, and Bo Zhu 2003/045 ( PDF ) An algorithm to obtain an RSA modulus with a large private key L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A. Queiruga Dios 2003/044 ( -- withdrawn -- ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K.C.Reddy 2003/043 ( PS PS.GZ PDF ) Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish 2003/042 ( PS PS.GZ ) Timed Fair Exchange of Standard Signatures Juan A. Garay and Carl Pomerance 2003/041 ( PS PS.GZ ) A new statistical distinguisher for the shrinking generator Jovan Dj. Golic and Renato Menicocci 2003/040 ( PS PS.GZ ) Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function Kishan Chand Gupta and Palash Sarkar 2003/039 ( PS PS.GZ PDF ) Torus-based cryptography Karl Rubin and Alice Silverberg 2003/038 ( PS PS.GZ PDF ) Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions Kazukuni Kobara and Hideki Imai 2003/037 ( PS PS.GZ PDF ) Strengthening Zero-Knowledge Protocols using Signatures Juan A. Garay and Philip MacKenzie and Ke Yang 2003/036 ( PS PS.GZ PDF ) Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem Jean-Sebastien Coron 2003/035 ( PDF ) On alternative approach for verifiable secret sharing Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR