New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)- 2004/074 ( PS PS.GZ PDF )
- Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
- Liam Keliher and Henk Meijer and Stafford Tavares
- 2004/073 ( PS PS.GZ )
- Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
- Pierrick Gaudry
- 2004/072 ( PS PS.GZ PDF )
- Asymmetric Cryptography: Hidden Field Equations
- Christopher Wolf and Bart Preneel
- 2004/071 ( PS PS.GZ PDF )
- An IBE Scheme to Exchange Authenticated Secret Keys
- Benits Jr, Waldyr and Terada, Routo
- 2004/070 ( PS PS.GZ PDF )
- Easy decision-Diffie-Hellman groups
- Steven D Galbraith and Victor Rotger
- 2004/069 ( PS PS.GZ )
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
- Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai
- 2004/068 ( PDF )
- Synthesis of Secure FPGA Implementations
- Kris Tiri and Ingrid Verbauwhede
- 2004/067 ( PDF )
- Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis
- Kris Tiri and Ingrid Verbauwhede
- 2004/066 ( PDF )
- A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
- Kris Tiri and Ingrid Verbauwhede
- 2004/065 ( PS PS.GZ PDF )
- Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
- Ian Blake, Kumar Murty, and Guangwu Xu
- 2004/064 ( PS PS.GZ )
- Pairing-Based Cryptography : A Survey
- Ratna Dutta and Rana Barua and Palash Sarkar
- 2004/063 ( PS PS.GZ )
- Computationally Private Information Retrieval with Quasilogarithmic Total Communication
- Helger Lipmaa
- 2004/062 ( PS PS.GZ PDF )
- On the Impossibility of Highly Efficient Blockcipher-Based Hash Functions
- John Black and Martin Cochran and Thomas Shrimpton
- 2004/061 ( PS PS.GZ PDF )
- Rank Attacks and Defence in Tame-Like Multivariate PKC's
- Bo-Yin Yang and Jiun-Ming Chen
- 2004/060 ( PS PS.GZ PDF )
- Positive Results and Techniques for Obfuscation
- Benjamin Lynn and Manoj Prabhakaran and Amit Sahai
- 2004/059 ( PS PS.GZ )
- Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
- Michael Backes and Birgit Pfitzmann
- 2004/058 ( PS PS.GZ PDF )
- Generating more MNT elliptic curves
- Michael Scott and Paulo S.L.M Barreto
- 2004/057 ( PS PS.GZ PDF )
- On Multiple Linear Approximations
- Alex Biryukov and Christophe De Canni\`ere and Michael Quisquater
- 2004/055 ( PS PS.GZ PDF )
- Redundant Trinomials for Finite Fields of Characteristic $2$
- Christophe Doche
- 2004/054 ( PS PS.GZ PDF )
- Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
- 2004/053 ( PS PS.GZ PDF )
- Efficient and Universally Composable Committed Oblivious Transfer and Applications
- Juan Garay and Philip MacKenzie and Ke Yang
- 2004/052 ( PS PS.GZ PDF )
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
- Tal Malkin and Satoshi Obana and Moti Yung
- 2004/051 ( PS PS.GZ PDF )
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Yan-Cheng Chang and Michael Mitzenmacher
- 2004/050 ( PS PS.GZ PDF )
- Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
- Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
- 2004/049 ( PS PS.GZ )
- Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
- Christophe Clavier
- 2004/048 ( PS PS.GZ PDF )
- Tail-MAC Scheme for Stream Ciphers and Example Application with VMPC
- Bartosz Zoltak
- 2004/047 ( PS PS.GZ )
- On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
- Yodai Watanabe
- 2004/046 ( PS PS.GZ PDF )
- Tractable Rational Map Cryptosystem
- Lih-Chung Wang and Fei-Hwang Chang
- 2004/045 ( PS PS.GZ PDF )
- Lower Bounds and Impossibility Results for Concurrent Self Composition
- Yehuda Lindell
- 2004/044 ( PS PS.GZ PDF )
- Transitive Signatures Based on Non-adaptive Standard Signatures
- Zhou Sujing
- 2004/043 ( PS PS.GZ PDF )
- Multi-sequences with d-perfect property
- Xiutao Feng, Quanlong Wang and Zongduo Dai
- 2004/042 ( PDF )
- Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
- 2004/041 ( PS PS.GZ )
- Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
- Cheng-Kang Chu and Wen-Guey Tzeng
- 2004/040 ( PS PS.GZ PDF )
- Cryptanalysis of a timestamp-based password authentication scheme
- Lizhen Yang, Kefei Chen
- 2004/039 ( PDF )
- A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
- Victor K. Wei
- 2004/038 ( PS PS.GZ PDF )
- Chameleon Hashing without Key Exposure
- Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
- 2004/037 ( PS PS.GZ )
- A Provably Secure Scheme for Restrictive Partially Blind Signatures
- Fuw-Yi Yang and Jinn-Ke Jan
- 2004/036 ( PS PS.GZ PDF )
- Single Database Private Information Retrieval with Logarithmic Communication
- Yan-Cheng Chang
- 2004/035 ( PDF )
- Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
- Phillip Rogaway and Thomas Shrimpton
- 2004/034 ( PDF )
- s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
- Gideon Samid
- 2004/033 ( PS PS.GZ PDF )
- New Approaches to Password Authenticated Key Exchange based on RSA
- Muxiang Zhang
- 2004/032 ( PS PS.GZ PDF )
- Compressed Pairings
- Michael Scott and Paulo S. L. M. Barreto
- 2004/031 ( PS PS.GZ PDF )
- Summation polynomials and the discrete logarithm problem on elliptic curves
- Igor Semaev
- 2004/030 ( PDF )
- Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
- Colin Stahlke
- 2004/029 ( PDF )
- Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
- Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar
- 2004/028 ( PDF )
- Verifiable Encryption in Anonymous Ad Hoc Groups
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
- 2004/027 ( PDF )
- Linkable and Anonymous Signature for Ad Hoc Groups
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
- 2004/026 ( PS PS.GZ PDF )
- The CSQUARE Transform
- Tom St Denis
- 2004/025 ( PDF )
- Clarifying Obfuscation: Improving the Security of White-Box Encoding
- Hamilton E. Link and William D. Neumann
- 2004/024 ( PS PS.GZ PDF )
- Exponential S-boxes
- Sergey Agievich and Andrey Afonenko
- 2004/023 ( PDF )
- RDS: Remote Distributed Scheme for Protecting Mobile Agents
- Asnat Dadon-Elichai
- 2004/022 ( PS PS.GZ PDF )
- Privacy-Enhanced Searches Using Encrypted Bloom Filters
- Steven M. Bellovin and William R. Cheswick
- 2004/021 ( PS PS.GZ PDF )
- Externalized Fingerprint Matching
- Claude Barral and Jean-S\'{e}bastien Coron and David Naccache
- 2004/020 ( PS PS.GZ PDF )
- Optimal Signcryption from Any Trapdoor Permutation
- Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish
- 2004/019 ( PS PS.GZ PDF )
- New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
- Tetsu Iwata and Tadayoshi Kohno
- 2004/018 ( PS PS.GZ PDF )
- Corrections of the NIST Statistical Test Suite for Randomness
- Song-Ju Kim and Ken Umeno and Akio Hasegawa
- 2004/017 ( PS PS.GZ )
- Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
- M. Scott
- 2004/016 ( PS PS.GZ PDF )
- A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
- Dennis Hofheinz and Joern Mueller-Quade
- 2004/015 ( PDF )
- An AGM-type elliptic curve point counting algorithm in characteristic three
- Trond St{\o}len Gustavsen and Kristian Ranestad
- 2004/014 ( PS PS.GZ PDF )
- Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
- Sugata Gangopadhyay and Subhamoy Maitra
- 2004/013 ( PS PS.GZ PDF )
- Cryptanalysis of a Provably Secure Cryptographic Hash Function
- Jean-Sebastien Coron and Antoine Joux
- 2004/012 ( PS PS.GZ PDF )
- Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
- Maria Isabel Gonzalez Vasco and Rainer Steinwandt
- 2004/011 ( PDF )
- Known-Plaintext Attack Against a Permutation Based Video
- Adam J. Slagell
- 2004/010 ( PDF )
- Fast Pseudo-Hadamard Transforms
- Tom St Denis
- 2004/009 ( PS PS.GZ PDF )
- Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
- Juan A. Garay and Philip MacKenzie and Ke Yang
- 2004/008 ( PS PS.GZ PDF )
- The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
- Mihir Bellare and Adriana Palacio
- 2004/007 ( PS PS.GZ PDF )
- Traceable Signatures
- Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
- 2004/006 ( PS PS.GZ )
- Protocol Initialization for the Framework of Universal Composability
- Boaz Barak and Yehuda Lindell and Tal Rabin
- 2004/005 ( PDF )
- Universal Undeniable Signatures
- Huafei Zhu
- 2004/004 ( PS PS.GZ PDF )
- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
- Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
- 2004/003 ( PS PS.GZ )
- On the Role of the Inner State Size in Stream Ciphers
- Erik Zenner
- 2004/002 ( PS PS.GZ PDF )
- Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
- Yuichi Komano and Kazuo Ohta
- 2003/265 ( PS PS.GZ )
- Concurrent Zero-Knowledge with Concurrent Soundness in the Bare Public-Key Model
- Yunlei ZHAO
- 2003/264 ( PS PS.GZ )
- Inversion of Several Field Elements: A New Parallel Algorithm
- Pradeep Kumar Mishra and Palash Sarkar
- 2003/263 ( PS PS.GZ PDF )
- Security Analysis of Lal and Awasthi's Proxy Signature Schemes
- Manik Lal Das and Ashutosh Saxena and V P Gulati
- 2003/262 ( PS PS.GZ PDF )
- A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
- 2003/261 ( PS PS.GZ PDF )
- A provably secure ID-based ring signature scheme
- Javier Herranz and Germ\'an S\'aez
- 2003/260 ( PDF )
- An Improved ID-based Authenticated Group Key Agreement Scheme
- Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
- 2003/259 ( PS PS.GZ PDF )
- Attack on Two ID-based Authenticated Group Key Agreement Schemes
- Fangguo Zhang and Xiaofeng Chen
- 2003/258 ( PDF )
- Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
- Marcin Rogawski
- 2003/257 ( PS PS.GZ PDF )
- Trading Inversions for Multiplications in Elliptic Curve Cryptography
- Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery
- 2003/256 ( PDF )
- On the Security of a Multi-Party Certified Email Protocol
- Jianying Zhou
- 2003/255 ( PS PS.GZ PDF )
- Improved Constructions for Universal Re-encryption.
- Peter Fairbrother
- 2003/254 ( PDF )
- Committing Encryption and Publicly-Verifiable SignCryption
- Yitchak Gertner and Amir Herzberg
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR