New Reports in the Cryptology ePrint Archive

(The list contains reports posted since the last newsletter issue appeared.)
2004/074 ( PS PS.GZ PDF )
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
Liam Keliher and Henk Meijer and Stafford Tavares
2004/073 ( PS PS.GZ )
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
Pierrick Gaudry
2004/072 ( PS PS.GZ PDF )
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
2004/071 ( PS PS.GZ PDF )
An IBE Scheme to Exchange Authenticated Secret Keys
Benits Jr, Waldyr and Terada, Routo
2004/070 ( PS PS.GZ PDF )
Easy decision-Diffie-Hellman groups
Steven D Galbraith and Victor Rotger
2004/069 ( PS PS.GZ )
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai
2004/068 ( PDF )
Synthesis of Secure FPGA Implementations
Kris Tiri and Ingrid Verbauwhede
2004/067 ( PDF )
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis
Kris Tiri and Ingrid Verbauwhede
2004/066 ( PDF )
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
Kris Tiri and Ingrid Verbauwhede
2004/065 ( PS PS.GZ PDF )
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
Ian Blake, Kumar Murty, and Guangwu Xu
2004/064 ( PS PS.GZ )
Pairing-Based Cryptography : A Survey
Ratna Dutta and Rana Barua and Palash Sarkar
2004/063 ( PS PS.GZ )
Computationally Private Information Retrieval with Quasilogarithmic Total Communication
Helger Lipmaa
2004/062 ( PS PS.GZ PDF )
On the Impossibility of Highly Efficient Blockcipher-Based Hash Functions
John Black and Martin Cochran and Thomas Shrimpton
2004/061 ( PS PS.GZ PDF )
Rank Attacks and Defence in Tame-Like Multivariate PKC's
Bo-Yin Yang and Jiun-Ming Chen
2004/060 ( PS PS.GZ PDF )
Positive Results and Techniques for Obfuscation
Benjamin Lynn and Manoj Prabhakaran and Amit Sahai
2004/059 ( PS PS.GZ )
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Michael Backes and Birgit Pfitzmann
2004/058 ( PS PS.GZ PDF )
Generating more MNT elliptic curves
Michael Scott and Paulo S.L.M Barreto
2004/057 ( PS PS.GZ PDF )
On Multiple Linear Approximations
Alex Biryukov and Christophe De Canni\`ere and Michael Quisquater
2004/055 ( PS PS.GZ PDF )
Redundant Trinomials for Finite Fields of Characteristic $2$
Christophe Doche
2004/054 ( PS PS.GZ PDF )
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
2004/053 ( PS PS.GZ PDF )
Efficient and Universally Composable Committed Oblivious Transfer and Applications
Juan Garay and Philip MacKenzie and Ke Yang
2004/052 ( PS PS.GZ PDF )
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Tal Malkin and Satoshi Obana and Moti Yung
2004/051 ( PS PS.GZ PDF )
Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang and Michael Mitzenmacher
2004/050 ( PS PS.GZ PDF )
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
2004/049 ( PS PS.GZ )
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Christophe Clavier
2004/048 ( PS PS.GZ PDF )
Tail-MAC Scheme for Stream Ciphers and Example Application with VMPC
Bartosz Zoltak
2004/047 ( PS PS.GZ )
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
Yodai Watanabe
2004/046 ( PS PS.GZ PDF )
Tractable Rational Map Cryptosystem
Lih-Chung Wang and Fei-Hwang Chang
2004/045 ( PS PS.GZ PDF )
Lower Bounds and Impossibility Results for Concurrent Self Composition
Yehuda Lindell
2004/044 ( PS PS.GZ PDF )
Transitive Signatures Based on Non-adaptive Standard Signatures
Zhou Sujing
2004/043 ( PS PS.GZ PDF )
Multi-sequences with d-perfect property
Xiutao Feng, Quanlong Wang and Zongduo Dai
2004/042 ( PDF )
Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
Joseph K. Liu and Victor K. Wei and Duncan S. Wong
2004/041 ( PS PS.GZ )
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
Cheng-Kang Chu and Wen-Guey Tzeng
2004/040 ( PS PS.GZ PDF )
Cryptanalysis of a timestamp-based password authentication scheme
Lizhen Yang, Kefei Chen
2004/039 ( PDF )
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
Victor K. Wei
2004/038 ( PS PS.GZ PDF )
Chameleon Hashing without Key Exposure
Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
2004/037 ( PS PS.GZ )
A Provably Secure Scheme for Restrictive Partially Blind Signatures
Fuw-Yi Yang and Jinn-Ke Jan
2004/036 ( PS PS.GZ PDF )
Single Database Private Information Retrieval with Logarithmic Communication
Yan-Cheng Chang
2004/035 ( PDF )
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
Phillip Rogaway and Thomas Shrimpton
2004/034 ( PDF )
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
Gideon Samid
2004/033 ( PS PS.GZ PDF )
New Approaches to Password Authenticated Key Exchange based on RSA
Muxiang Zhang
2004/032 ( PS PS.GZ PDF )
Compressed Pairings
Michael Scott and Paulo S. L. M. Barreto
2004/031 ( PS PS.GZ PDF )
Summation polynomials and the discrete logarithm problem on elliptic curves
Igor Semaev
2004/030 ( PDF )
Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
Colin Stahlke
2004/029 ( PDF )
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar
2004/028 ( PDF )
Verifiable Encryption in Anonymous Ad Hoc Groups
Joseph K. Liu and Victor K. Wei and Duncan S. Wong
2004/027 ( PDF )
Linkable and Anonymous Signature for Ad Hoc Groups
Joseph K. Liu and Victor K. Wei and Duncan S. Wong
2004/026 ( PS PS.GZ PDF )
The CSQUARE Transform
Tom St Denis
2004/025 ( PDF )
Clarifying Obfuscation: Improving the Security of White-Box Encoding
Hamilton E. Link and William D. Neumann
2004/024 ( PS PS.GZ PDF )
Exponential S-boxes
Sergey Agievich and Andrey Afonenko
2004/023 ( PDF )
RDS: Remote Distributed Scheme for Protecting Mobile Agents
Asnat Dadon-Elichai
2004/022 ( PS PS.GZ PDF )
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Steven M. Bellovin and William R. Cheswick
2004/021 ( PS PS.GZ PDF )
Externalized Fingerprint Matching
Claude Barral and Jean-S\'{e}bastien Coron and David Naccache
2004/020 ( PS PS.GZ PDF )
Optimal Signcryption from Any Trapdoor Permutation
Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish
2004/019 ( PS PS.GZ PDF )
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu Iwata and Tadayoshi Kohno
2004/018 ( PS PS.GZ PDF )
Corrections of the NIST Statistical Test Suite for Randomness
Song-Ju Kim and Ken Umeno and Akio Hasegawa
2004/017 ( PS PS.GZ )
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
M. Scott
2004/016 ( PS PS.GZ PDF )
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
Dennis Hofheinz and Joern Mueller-Quade
2004/015 ( PDF )
An AGM-type elliptic curve point counting algorithm in characteristic three
Trond St{\o}len Gustavsen and Kristian Ranestad
2004/014 ( PS PS.GZ PDF )
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
Sugata Gangopadhyay and Subhamoy Maitra
2004/013 ( PS PS.GZ PDF )
Cryptanalysis of a Provably Secure Cryptographic Hash Function
Jean-Sebastien Coron and Antoine Joux
2004/012 ( PS PS.GZ PDF )
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2004/011 ( PDF )
Known-Plaintext Attack Against a Permutation Based Video
Adam J. Slagell
2004/010 ( PDF )
Fast Pseudo-Hadamard Transforms
Tom St Denis
2004/009 ( PS PS.GZ PDF )
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
Juan A. Garay and Philip MacKenzie and Ke Yang
2004/008 ( PS PS.GZ PDF )
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
Mihir Bellare and Adriana Palacio
2004/007 ( PS PS.GZ PDF )
Traceable Signatures
Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
2004/006 ( PS PS.GZ )
Protocol Initialization for the Framework of Universal Composability
Boaz Barak and Yehuda Lindell and Tal Rabin
2004/005 ( PDF )
Universal Undeniable Signatures
Huafei Zhu
2004/004 ( PS PS.GZ PDF )
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
2004/003 ( PS PS.GZ )
On the Role of the Inner State Size in Stream Ciphers
Erik Zenner
2004/002 ( PS PS.GZ PDF )
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
Yuichi Komano and Kazuo Ohta
2003/265 ( PS PS.GZ )
Concurrent Zero-Knowledge with Concurrent Soundness in the Bare Public-Key Model
Yunlei ZHAO
2003/264 ( PS PS.GZ )
Inversion of Several Field Elements: A New Parallel Algorithm
Pradeep Kumar Mishra and Palash Sarkar
2003/263 ( PS PS.GZ PDF )
Security Analysis of Lal and Awasthi's Proxy Signature Schemes
Manik Lal Das and Ashutosh Saxena and V P Gulati
2003/262 ( PS PS.GZ PDF )
A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
2003/261 ( PS PS.GZ PDF )
A provably secure ID-based ring signature scheme
Javier Herranz and Germ\'an S\'aez
2003/260 ( PDF )
An Improved ID-based Authenticated Group Key Agreement Scheme
Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/259 ( PS PS.GZ PDF )
Attack on Two ID-based Authenticated Group Key Agreement Schemes
Fangguo Zhang and Xiaofeng Chen
2003/258 ( PDF )
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
Marcin Rogawski
2003/257 ( PS PS.GZ PDF )
Trading Inversions for Multiplications in Elliptic Curve Cryptography
Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery
2003/256 ( PDF )
On the Security of a Multi-Party Certified Email Protocol
Jianying Zhou
2003/255 ( PS PS.GZ PDF )
Improved Constructions for Universal Re-encryption.
Peter Fairbrother
2003/254 ( PDF )
Committing Encryption and Publicly-Verifiable SignCryption
Yitchak Gertner and Amir Herzberg


[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR