New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2003/253 ( PDF ) Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations Roberto Maria Avanzi 2003/252 ( PS PS.GZ PDF ) On Simulation-Sound Trapdoor Commitments Philip MacKenzie and Ke Yang 2003/251 ( PDF ) Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields EunKyung Jeong 2003/250 ( PS PS.GZ PDF ) Breaking the Stream Cipher Whitenoise Hongjun Wu 2003/249 ( PDF ) Software Specifications For Tinnitus Utilizing Whitenoise Substitution Stream Cipher Stephen Boren and Andre Brisson 2003/248 ( PS PS.GZ PDF ) Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n) Izuru Kitamura and Masanobu Katagi 2003/247 ( PDF ) ID-based Authenticated Two Round Multi-Party Key Agreement Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang 2003/246 ( PDF ) A Hybrid Encryption Protocol for Quantum Digital Signature Xin L¨¹ and Deng-guo Feng 2003/245 ( PS PS.GZ PDF ) A Key Substitution Attack on SFLASH^{v3} Willi Geiselmann and Rainer Steinwandt 2003/244 ( PS PS.GZ PDF ) Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le and Kaoru Kurosawa 2003/243 ( PS PS.GZ PDF ) An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures Guilin Wang 2003/242 ( PS PS.GZ PDF ) Improved Weil and Tate pairings for elliptic and hyperelliptic curves Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery 2003/241 ( PS PS.GZ PDF ) Hybrid Broadcast Encryption and Security Analysis Shaoquan Jiang and Guang Gong 2003/240 ( PS PS.GZ PDF ) How to Break and Repair a Universally Composable Signature Functionality Michael Backes and Dennis Hofheinz 2003/239 ( PS PS.GZ PDF ) On Universally Composable Notions of Security for Signature, Certification and Authentication Ran Canetti 2003/238 ( PDF ) Chameleon Signature from Bilinear Pairing Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang 2003/237 ( PS PS.GZ PDF ) Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye 2003/236 ( PDF ) Combinational Logic Design for AES SubByte Transformation on Masked Data Elena Trichina 2003/235 ( PS PS.GZ PDF ) Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints Yevgeniy Dodis and Leonid Reyzin and Adam Smith 2003/234 ( PS PS.GZ ) Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary Gene Itkis and Peng Xie 2003/233 ( PS PS.GZ PDF ) Public Key Steganography Luis von Ahn and Nicholas J. Hopper 2003/232 ( PS PS.GZ PDF ) The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm Chunming Tang and Zhuojun Liu and Jinwang Liu 2003/231 ( PS PS.GZ PDF ) Public-Key Steganography with Active Attacks Michael Backes and Christian Cachin 2003/230 ( PS PS.GZ PDF ) A Fast Provably Secure Cryptographic Hash Function Daniel Augot and Matthieu Finiasz and Nicolas Sendrier 2003/229 ( PS PS.GZ PDF ) Algebraic Attacks on Summation Generators Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon 2003/228 ( PDF ) Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu 2003/227 ( PS PS.GZ PDF ) Attacks on a Secure Group Communication Scheme With Hierarchical Access Control Willi Geiselmann and Rainer Steinwandt 2003/226 ( PS PS.GZ PDF ) On the Security of a Group Signature Scheme with Forward Security Guilin Wang 2003/225 ( PS PS.GZ ) A Practical Parallel Domain Extender for UOWHF Palash Sarkar 2003/224 ( PDF ) Two Protocols from the Tate Pairing Noel McCullagh and Michael Scott 2003/223 ( PS PS.GZ PDF ) Cryptanalysis of a Cryptosystem based on Drinfeld modules Simon R. Blackburn, Carlos Cid and Steven D. Galbraith 2003/222 ( PS PS.GZ PDF ) A Verifiable Secret Sharing Scheme with Statistical zero-knowledge Chunming Tang and Zhuojun Liu and Mingsheng Wang 2003/221 ( PS PS.GZ PDF ) A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism Jung Hee Cheon and Hyun Soo Nam 2003/220 ( PS PS.GZ PDF ) A short comment on the affine parts of SFLASH^{v3} Willi Geiselmann and Rainer Steinwandt 2003/219 ( PS PS.GZ PDF ) Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 2003/218 ( PDF ) A Security Evaluation of Whitenoise David Wagner 2003/217 ( PS PS.GZ PDF ) Chemical Combinatorial Attacks on Keyboards Eric Brier and David Naccache and Pascal Paillier 2003/216 ( PS PS.GZ PDF ) Building Secure Indexes for Searching Efficiently on Encrypted Compressed Data. Eu-Jin Goh 2003/215 ( PDF ) Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC Bo Yang and Ramesh Karri and David Mcgrew 2003/214 ( PS PS.GZ ) Multi-trapdoor Commitments and their Applications to Proofs of Knowledge Secure under Concurrent Man-in-the-middle Attacks Rosario Gennaro 2003/213 ( PS PS.GZ PDF ) Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$ Y.Choie and E.Jeong 2003/212 ( PS PS.GZ PDF ) High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two Jan Pelzl and Thomas Wollinger and Christof Paar 2003/211 ( PS PS.GZ PDF ) SFLASHv3, a fast asymmetric signature scheme Nicolas T. Courtois, Louis Goubin and Jacques Patarin 2003/210 ( PS PS.GZ PDF ) On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes Ventzislav Nikov and Svetla Nikova 2003/209 ( PS PS.GZ PDF ) Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003 Daniel Augot and Matthieu Finiasz and Pierre Loidreau 2003/208 ( PS PS.GZ PDF ) ID-Based Chameleon Hashes from Bilinear Pairings Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo 2003/207 ( PS PS.GZ PDF ) Security Flaws in Several Group Signatures Proposed by Popescu Guilin Wang, and Sihan Qing 2003/206 ( PS PS.GZ PDF ) Identity Based Undeniable Signatures Benoît Libert and Jean-Jacques Quisquater 2003/205 ( PS PS.GZ PDF ) Improved Cryptanalysis of SecurID Scott Contini and Yiqun Lisa Yin 2003/204 ( PDF ) A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials ZENG Xiangyong and HU Lei 2003/203 ( PS PS.GZ PDF ) A Timing Attack on Hyperelliptic Curve Cryptosystems Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi 2003/202 ( PS PS.GZ PDF ) Yet Another Sieving Device Willi Geiselmann and Rainer Steinwandt 2003/201 ( PDF ) an attack on a multisignature scheme Zheng dong & KF.chen 2003/200 ( PDF ) Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature Zheng Dong , Shengli Liu & kefei Chen 2003/199 ( PS PS.GZ PDF ) Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Simon R. Blackburn and Kenneth G. Paterson 2003/198 ( PS PS.GZ PDF ) Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria Kishan Chand Gupta and Palash Sarkar 2003/197 ( PS PS.GZ PDF ) Revisiting fully distributed proxy signature schemes Javier Herranz and German Saez 2003/196 ( PS PS.GZ PDF ) Security Analysis of Some Proxy Signatures Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng 2003/195 ( PDF ) Searchable Public Key Encryption Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano 2003/194 ( PS PS.GZ PDF ) Security Analysis of Several Group Signature Schemes Guilin Wang 2003/193 ( PS PS.GZ PDF ) Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk 2003/192 ( PS PS.GZ PDF ) Universal Designated-Verifier Signatures Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk 2003/191 ( PS PS.GZ ) Projective Coordinates Leak David Naccache and Nigel Smart and Jacques Stern 2003/190 ( -- withdrawn -- ) Extending Joux's Protocol to Multi Party Key Agreement Rana Barua and Ratna Dutta and Palash Sarkar 2003/189 ( PDF ) Cryptanalysis of publicly verifiable authenticated encryption Zuhua Shao 2003/188 ( PDF ) A New Forward Secure Signature Scheme using Bilinear Maps Fei Hu and Chwan-Hwa Wu and J. D. Irwin 2003/187 ( PS PS.GZ ) Resource Bounded Unprovability of Computational Lower Bounds Tatsuaki Okamoto and Ryo Kashima 2003/186 ( PS PS.GZ PDF ) Safe Prime Generation with a Combined Sieve Michael J. Wiener 2003/185 ( PS PS.GZ PDF ) VMPC Stream Cipher Bartosz Zoltak 2003/184 ( PS PS.GZ PDF ) What do DES S-boxes Say to Each Other ? Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin 2003/183 ( PDF ) Certificate-Based Encryption and the Certificate Revocation Problem Craig Gentry 2003/182 ( PS PS.GZ PDF ) Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti, Shai Halevi, and Jonathan Katz
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR