New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2004/143 ( PS PS.GZ PDF ) Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash Nicolas T. Courtois 2004/142 ( PDF ) A New Signcryption Scheme and its Threshold Protocol Yiliang Han and Guangming Wu and Xiaoyuan Yang 2004/141 ( PS PS.GZ PDF ) Elastic AES Debra L. Cook and Moti Yung and Angelos D. Keromytis 2004/140 ( PDF ) Hardware Implementation of the 64-bit MISTY1 Block Cipher Paris Kitsos 2004/139 ( PS PS.GZ PDF ) New Notions of Security: Achieving Universal Composability without Trusted Setup Manoj Prabhakaran and Amit Sahai 2004/138 ( PS PS.GZ PDF ) How to Disembed a Program? Benoit Chevallier-Mames and David Naccache and Pascal Paillier and David Pointcheval 2004/137 ( PDF ) New GF(2n) Parallel Multiplier Using Redundant Representation Haining Fan 2004/136 ( PDF ) A Protocol for Countering Online Dictionary Attacks Vipul Goyal and Virendra Kumar and Mayank Singh 2004/135 ( PDF ) More Efficient Server Assisted One Time Signatures Vipul Goyal 2004/134 ( PDF ) Secure and Efficient Masking of AES - A Mission Impossible? Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller 2004/133 ( PS PS.GZ PDF ) Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik 2004/132 ( PS PS.GZ PDF ) On Small Characteristic Algebraic Tori in Pairing-Based Cryptography R. Granger, D. Page and M. Stam 2004/131 ( PS PS.GZ PDF ) A New ID-based Signature with Batch Verification Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon 2004/130 ( PS PS.GZ PDF ) Private Inference Control David Woodruff and Jessica Staddon 2004/129 ( PS PS.GZ PDF ) Generalizing Kedlaya's order counting based on Miura Theory Joe Suzuki 2004/128 ( PS PS.GZ PDF ) Elastic Block Ciphers Debra L. Cook and Moti Yung and Angelos D. Keromytis 2004/127 ( PS PS.GZ PDF ) DDH-based Group Key Agreement for Mobile Computing Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won 2004/126 ( PS PS.GZ ) Two Software Normal Basis Multiplication Algorithms for GF(2n) Haining Fan and Yiqi Dai 2004/125 ( PS PS.GZ PDF ) EME*: extending EME to handle arbitrary-length messages with associated data Shai Halevi 2004/124 ( PS PS.GZ ) Universally Composable DKG with Linear Number of Exponentiations Douglas Wikström 2004/123 ( PS PS.GZ PDF ) On security of XTR public key cryptosystems against Side Channel Attacks Dong-Guk Han and Jongin Lim and Kouichi Sakurai 2004/122 ( PS PS.GZ PDF ) A New Two-Party Identity-Based Authenticated Key Agreement Noel McCullagh and Paulo S. L. M. Barreto 2004/121 ( PS PS.GZ PDF ) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings Tsz Hon Yuen and Victor K. Wei 2004/120 ( PS PS.GZ PDF ) One-Way IND-CNA Key Setup - a Step Towards Provably Secure Symmetric Encryption Bartosz Zoltak 2004/119 ( PS PS.GZ PDF ) Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography Masayuki Abe and Serge Fehr 2004/118 ( PS PS.GZ PDF ) Fast addition on non-hyperelliptic genus $3$ curves Stéphane Flon and Roger Oyono and Christophe Ritzenthaler 2004/117 ( PS PS.GZ PDF ) Efficient and Forward-Secure Identity-Based Signcryption Noel McCullagh and Paulo S. L. M. Barreto 2004/116 ( PS PS.GZ PDF ) On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions Ran Canetti and Eyal Kushilevitz and Yehuda Lindell 2004/115 ( PS PS.GZ PDF ) Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won 2004/114 ( PS PS.GZ ) Improved Identity-Based Signcryption Liqun Chen and John Malone-Lee 2004/113 ( PS PS.GZ PDF ) On the Security and Composability of the One Time Pad Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade 2004/112 ( PDF ) Relation between XL algorithm and Groebner Bases Algorithms M. Sugita and M. Kawazoe and H. Imai 2004/111 ( PS PS.GZ PDF ) The Vulnerability of SSL to Chosen Plaintext Attack Gregory V. Bard 2004/110 ( PDF ) Designing Against the `Overdefined System of Equations' Attack Carlisle Adams 2004/109 ( PDF ) Concealing Complex Policies with Hidden Credentials Robert Bradshaw and Jason Holt and Kent Seamons 2004/108 ( PS PS.GZ PDF ) Two Improved Partially Blind Signature Schemes from Bilinear Pairings Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow 2004/107 ( PS PS.GZ PDF ) Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic Bertrand BYRAMJEE and Sylvain DUQUESNE 2004/106 ( PDF ) Capacity and Examples of Template Protecting Biometric Authentication Systems P. Tuyls and J. Goseling 2004/105 ( PS PS.GZ PDF ) Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti 2004/104 ( PS PS.GZ PDF ) A Trapdoor-free and Efficient Group Signature Scheme from Bilinear Pairings Lan Nguyen 2004/103 ( PS PS.GZ PDF ) Cryptanalysis of SFlash v3 Jintai Ding and Dieter Schmidt 2004/102 ( PS PS.GZ PDF ) The Exact Security of an Identity Based Signature and its Applications Benoît Libert and Jean-Jacques Quisquater 2004/101 ( PS PS.GZ PDF ) Provably Secure Masking of AES Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel 2004/100 ( PDF ) The Sorcerers Apprentice Guide to Fault Attacks Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan 2004/099 ( PS PS.GZ ) Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro and Hugo Krawczyk and Tal Rabin 2004/098 ( PS PS.GZ PDF ) Attacking a Public Key Cryptosystem Based on Tree Replacement María Isabel González Vasco and David Pérez García 2004/097 ( PDF ) How To Re-initialize a Hash Chain Vipul Goyal 2004/096 ( -- withdrawn -- ) On the Ambiguity of Concurrent Signatures Yi Mu and Fangguo Zhang and Willy Susilo 2004/095 ( PS PS.GZ PDF ) GNFS Factoring Statistics of RSA-100, 110, ..., 150 Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki Ueda 2004/094 ( PS PS.GZ PDF ) Block Ciphers and Stream Ciphers: The State of the Art Alex Biryukov 2004/093 ( PS PS.GZ PDF ) A Provably Secure Nyberg-Rueppel Signature Variant with Applications Giuseppe Ateniese and Breno de Medeiros 2004/092 ( PS PS.GZ PDF ) A New Stream Cipher HC-256 Hongjun Wu 2004/091 ( PDF ) Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun and Maithili Narasimha and Gene Tsudik 2004/090 ( PS PS.GZ PDF ) Provably Secure Authenticated Tree Based Group Key Agreement Protocol Ratna Dutta and Rana Barua and and Palash Sarkar 2004/089 ( PS PS.GZ PDF ) Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance Mahalingam Ramkumar and Nasir Memon 2004/088 ( -- withdrawn -- ) Efficient Batch Verification of Signature Schemes based on Bilinear Maps Noel McCullagh 2004/087 ( PS PS.GZ PDF ) Using primitive subgroups to do more with fewer bits K. Rubin and A. Silverberg 2004/086 ( PDF ) Fuzzy Identity Based Encryption Amit Sahai and Brent R. Waters 2004/085 ( PDF ) The CS2 Block Cipher Tom St Denis 2004/084 ( PDF ) Evaluating elliptic curve based KEMs in the light of pairings David Galindo and Sebastia Martin and Jorge L. Villar 2004/083 ( PDF ) Scan Based Side Channel Attack on Data Encryption Standard Bo Yang and Kaijie Wu and Ramesh Karri 2004/082 ( PS PS.GZ ) Secure Asynchronous Reactive Systems Michael Backes and Birgit Pfitzmann and Michael Waidner 2004/081 ( PDF ) Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers Philip Hawkes and Gregory G. Rose 2004/080 ( PDF ) HENKOS STREAM CIPHER Marius Oliver Gheorghita and Dominic Bucerzan 2004/079 ( PS PS.GZ PDF ) Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng and Luminita Vasiu and Richard Comley 2004/078 ( PS PS.GZ PDF ) Analysis of the WinZip encryption method Tadayoshi Kohno 2004/077 ( PS PS.GZ PDF ) Foundations of Group Signatures: The Case of Dynamic Groups Mihir Bellare and Haixia Shi and Chong Zhang 2004/076 ( PS PS.GZ PDF ) Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders Aggelos Kiayias and Moti Yung 2004/075 ( PDF ) An Hybrid Mode of Operation Alexis W. Machado
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR