New Reports in the Cryptology ePrint Archive
(The list contains reports posted since the last newsletter issue appeared.)2004/330 ( PDF ) Multicollision Attacks on Generalized Hash Functions M. Nandi and D. R. Stinson 2004/329 ( PS PS.GZ PDF ) Hardness amplification of weakly verifiable puzzles Ran Canetti and Shai Halevi and Michael Steiner 2004/328 ( PDF ) Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee 2004/327 ( PS PS.GZ PDF ) Efficient Identity Based Ring Signature Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui 2004/326 ( PS PS.GZ PDF ) Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme Zhengjun Cao 2004/325 ( PDF ) Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA 2004/324 ( PDF ) On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions G. Laccetti and G. Schmid 2004/323 ( PS PS.GZ PDF ) A note on L\'opez-Dahab coordinates Tanja Lange 2004/322 ( PS PS.GZ PDF ) Secure and Anonymous Identity-Based Key Issuing without Secure Channel Ai-fen Sui and Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow and W.W. Tsang and C.F. Chong and K.H. Pun and H.W. Chan 2004/321 ( PDF ) The conjugacy search problem in public key cryptography: unnecessary and insufficient Vladimir Shpilrain and Alexander Ushakov 2004/320 ( PS PS.GZ PDF ) Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults Alfonso De Gregorio 2004/319 ( PS PS.GZ PDF ) Badger - A Fast and Provably Secure MAC Martin Boesgaard and Thomas Christensen and Erik Zenner 2004/318 ( PS PS.GZ PDF ) Upper Bounds on the Communication Complexity of Cryptographic Multiparty Computation Martin Hirt and Jesper Buus Nielsen 2004/317 ( PS PS.GZ PDF ) Adaptively-Secure, Non-Interactive Public-Key Encryption Ran Canetti and Shai Halevi and Jonathan Katz 2004/316 ( PS PS.GZ PDF ) On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao 2004/315 ( PDF ) Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes Qin Wang, Zhenfu Cao 2004/314 ( PDF ) A Technical Comparison of IPSec and SSL AbdelNasir Alshamsi and Takamichi Saito 2004/313 ( PS PS.GZ PDF ) Cryptanalysis of a threshold proxy signature with known signers Fuw-Yi Yang, Jinn-Ke Jan, and Woei-Jiunn Jeng 2004/312 ( PS PS.GZ PDF ) Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves David Jao and Stephen D. Miller and Ramarathnam Venkatesan 2004/311 ( PS PS.GZ PDF ) Hierarchical Group Signatures Marten Trolin and Douglas Wikstrom 2004/310 ( PS PS.GZ ) A Verifiable Random Function With Short Proofs and Keys Yevgeniy Dodis and Aleksandr Yampolskiy 2004/309 ( PS PS.GZ PDF ) The Power of Verification Queries in Message Authentication and Authenticated Encryption Mihir Bellare and Oded Goldreich and Anton Mityagin 2004/308 ( PDF ) Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement Guohong Xie 2004/307 ( PS PS.GZ PDF ) Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme Zhengjun Cao 2004/306 ( PS PS.GZ ) The Static Diffie-Hellman Problem Daniel R. L. Brown and Robert P. Gallant 2004/305 ( PS PS.GZ PDF ) A note on efficient computation of cube roots in characteristic 3 Paulo S. L. M. Barreto 2004/304 ( PDF ) Second Preimages on n-bit Hash Functions for Much Less than 2^n Work John Kelsey and Bruce Schneier 2004/303 ( PS PS.GZ PDF ) Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields Soonhak Kwon 2004/302 ( PDF ) Security of Wang-Li Threshold Signature Scheme Lifeng Guo 2004/301 ( PS PS.GZ PDF ) VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme Bartosz Zoltak 2004/300 ( PS PS.GZ ) Relating Symbolic and Cryptographic Secrecy Michael Backes and Birgit Pfitzmann 2004/299 ( PS PS.GZ PDF ) Security Flaws in a Pairing-based Group Signature Scheme Zhengjun Cao and Sherman S.M. Chow 2004/298 ( PDF ) Nominative Proxy Signature Schemes Zuo-Wen Tan,Zhuo-Jun Liu 2004/297 ( PS PS.GZ PDF ) Post-Quantum Signatures Johannes Buchmann and Carlos Coronado and Martin Döring and Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and Arthur Schmidt and Ulrich Vollmer and Ralf-Philipp Weinmann 2004/296 ( PDF ) A Class of secure Double Length Hash Functions Mridul Nandi 2004/295 ( PS PS.GZ PDF ) An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security Jiang Wu and Ruizhong Wei 2004/294 ( PS PS.GZ PDF ) Optimal Lower Bounds on the Number of Queries for Solving Differential Equations of Addition Souradyuti Paul and Bart Preneel 2004/293 ( PS PS.GZ ) Provably Secure Authentication of Digital Media Through Invertible Watermarks Jana Dittmann and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith 2004/292 ( PS PS.GZ PDF ) Asynchronous Proactive RSA Ruishan Zhang and Kefei Chen 2004/291 ( PS PS.GZ PDF ) The Rabbit Stream Cipher - Design and Security Analysis Martin Boesgaard and Thomas Pedersen and Mette Vesterager and Erik Zenner 2004/290 ( PS PS.GZ PDF ) The Security of the FDH Variant of Chaum's Undeniable Signature Scheme Wakaha Ogata and Kaoru Kurosawa and Swee-Huay Heng 2004/289 ( PDF ) Fault attack on the DVB Common Scrambling Algorithm Kai Wirt 2004/288 ( PS PS.GZ PDF ) A New Designated Confirmer Signature Variant with Intended Recipient Yong Li and Dingyi Pei 2004/287 ( PS PS.GZ PDF ) Almost Ideal Contrast Visual Cryptography with Reversing Duong Quang Viet and Kaoru Kurosawa 2004/286 ( PS PS.GZ ) Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions Daniele Micciancio 2004/285 ( PS PS.GZ PDF ) Generation of random Picard curves for cryptography Annegret Weng 2004/284 ( PDF ) ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS Qingshu Meng and Huanguo Zhang and Min Yang and Jingsong Cui 2004/283 ( PS PS.GZ PDF ) Fault and Side-Channel Attacks on Pairing Based Cryptography D. Page and F. Vercauteren 2004/282 ( PS PS.GZ PDF ) New Monotone Span Programs from Old Ventzislav Nikov and Svetla Nikova 2004/281 ( PS PS.GZ PDF ) Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation Patrick P. Tsang and Victor K. Wei 2004/280 ( PS PS.GZ PDF ) Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme Zhengjun Cao 2004/279 ( PS PS.GZ PDF ) Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic Jean-Claude Bajard and Laurent Imbert and Graham A. Jullien 2004/278 ( PDF ) The Extended Codebook (XCB) Mode of Operation David A. McGrew and Scott R. Fluhrer 2004/277 ( PDF ) Experimenting with Faults, Lattices and the DSA David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan 2004/276 ( PDF ) Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions C. Carlet 2004/275 ( PDF ) An e-Voting Scheme with Improved Resistance to Bribe and Coercion Wei-Chi Ku and Chun-Ming Ho 2004/274 ( PDF ) A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS Meng Qing-shu and Yang min and Zhang huan-guo and Cui jing-song 2004/273 ( PDF ) Cryptanalysis of Threshold-Multisignature schemes Lifeng Guo 2004/272 ( PDF ) A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security Tom Shrimpton 2004/271 ( PDF ) The Mundja Streaming MAC Philip Hawkes and Michael Paddon and Gregory G. Rose 2004/270 ( PS PS.GZ PDF ) An Enhanced and Secure Protocol for Authenticated Key Exchange Fuw-Yi Yang and Jinn-Ke Jan 2004/269 ( PDF ) Cryptanalysis of Threshold-Multisignature Schemes Lifeng Guo 2004/268 ( PS PS.GZ PDF ) Untraceability of Wang-Fu Group Signature Scheme Zhengjun Cao and Lihua Liu 2004/267 ( PS PS.GZ PDF ) Separable Linkable Threshold Ring Signatures Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong 2004/266 ( PS PS.GZ PDF ) A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods M. Khabbazian and T.A. Gulliver 2004/265 ( PDF ) sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu 2004/264 ( PDF ) Musings on the Wang et al. MD5 Collision Philip Hawkes and Michael Paddon and Gregory G. Rose 2004/263 ( PS PS.GZ PDF ) Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems Christopher Wolf and Bart Preneel 2004/262 ( PS PS.GZ PDF ) Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. Lihua Liu and Zhengjun Cao 2004/261 ( PS PS.GZ PDF ) Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption Dan Boneh and Jonathan Katz 2004/260 ( PS PS.GZ PDF ) Secure Group Communications over Combined Wired/Wireless Networks Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won 2004/259 ( PS PS.GZ PDF ) On Boolean Functions with Generalized Cryptographic Properties An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel 2004/258 ( PS PS.GZ ) Escrow-Free Encryption Supporting Cryptographic Workflow S.S. Al-Riyami and J. Malone-Lee and N.P. Smart 2004/257 ( PS PS.GZ PDF ) Interleaving Attack on ID-based Conference Key Distribution Schemes Junghyun Nam, Seungjoo Kim, and Dongho Won 2004/256 ( PDF ) On the supports of the Walsh transforms of Boolean functions Claude Carlet and Sihem Mesnager 2004/255 ( PS PS.GZ PDF ) A Point Halving Algorithm for Hyperelliptic Curves Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi 2004/254 ( PS PS.GZ ) New paradigms for digital generation and post-processing of random data Jovan Dj. Golic 2004/253 ( PDF ) Design Principles for Iterated Hash Functions Stefan Lucks 2004/252 ( PS PS.GZ PDF ) Security Proofs for Identity-Based Identification and Signature Schemes Mihir Bellare and Chanathip Namprempre and Gregory Neven 2004/251 ( PS PS.GZ PDF ) Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices Junghyun Nam, Seungjoo Kim, and Dongho Won 2004/250 ( PDF ) Identity Based Threshold Proxy Signature Jing Xu and Zhenfeng Zhang and Dengguo Feng 2004/249 ( PS PS.GZ PDF ) Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley 2004/248 ( PS PS.GZ PDF ) Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel 2004/247 ( PS PS.GZ ) Vectorial fast correlation attacks Jovan Dj. Golic and Guglielmo Morgari 2004/246 ( PS PS.GZ PDF ) Upper and Lower Bounds on Black-Box Steganography Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell 2004/245 ( PDF ) On codes, matroids and secure multi-party computation from linear secret sharing schemes Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jimenez Urroz and Gregor Leander and Jaume Marti-Farre and Carles Padro 2004/244 ( PDF ) Signcryption in Hierarchical Identity Based Cryptosystem Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu 2004/243 ( PDF ) On the Key Exposure Problem in Chameleon Hashes Giuseppe Ateniese and Breno de Medeiros 2004/242 ( PS PS.GZ PDF ) Combinatorial group theory and public key cryptography Vladimir Shpilrain and Gabriel Zapata 2004/241 ( PDF ) A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2 Colm O hEigeartaigh 2004/240 ( PS PS.GZ PDF ) A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields Seigo Arita and Kazuto Matsuo and Koh-ichi Nagao and Mahoro Shimura 2004/239 ( PDF ) Geometric Key Establishment Arkady Berenstein and Leon Chernyak 2004/238 ( PDF ) Security Analysis of A Dynamic ID-based Remote User Authentication Scheme Amit K Awasthi and Sunder Lal 2004/237 ( PS PS.GZ PDF ) Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC Christopher Wolf and An Braeken and Bart Preneel 2004/236 ( PDF ) Forgery Attacks on Chang et al.'s signature scheme with message recovery FU Xiaotong, XU Chunxiang and XIAO Guozhen 2004/235 ( PDF ) Cryptographic Implications of Hess' Generalized GHS Attack Alfred Menezes and Edlyn Teske 2004/234 ( PDF ) On the security of some nonrepudiable threshold proxy signature schemes with known signers Zuo-Wen Tan and Zhuo-Jun Liu 2004/233 ( PS PS.GZ PDF ) Password-Based Authenticated Key Exchange in the Three-Party Setting Michel Abdalla and Pierre-Alain Fouque and David Pointcheval 2004/232 ( PS PS.GZ PDF ) Extending the Resynchronization Attack Frederik Armknecht and Joseph Lano and Bart Preneel 2004/231 ( PS PS.GZ PDF ) New Approaches to Timed-Release Cryptography Ivan Osipkov and Yongdae Kim and Jung Hee Cheon 2004/230 ( PS PS.GZ PDF ) A Provable Secure Scheme for Partially Blind Signatures Fuw-Yi Yang and Jinn-Ke Jan 2004/229 ( PS PS.GZ PDF ) Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes Xin L¨¹ and Zhi Ma and Dengguo Feng 2004/228 ( PS PS.GZ PDF ) DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$ Honggang Hu and Dengguo Feng 2004/227 ( PS PS.GZ PDF ) Sign Change Fault Attacks On Elliptic Curve Cryptosystems Johannes Blömer and Martin Otto and Jean-Pierre Seifert 2004/226 ( PS PS.GZ PDF ) Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak and Yehuda Lindell and Salil Vadhan 2004/225 ( PS PS.GZ ) Vectorial Boolean functions and induced algebraic equations Jovan Dj. Golic 2004/224 ( PS PS.GZ ) The Polynomial Composition Problem in $(\mathbb{Z}/n\mathbb{Z})[X]$ Marc Joye and David Naccache and St\'ephanie Porte 2004/223 ( PDF ) Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves Xinxin Fan and Yumin Wang 2004/222 ( PS PS.GZ PDF ) A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes An Braeken and Christopher Wolf and Bart Preneel 2004/221 ( PS PS.GZ PDF ) Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio 2004/220 ( PS PS.GZ PDF ) On Oleshchuk's Public Key Cryptosystem Heiko Stamer and Friedrich Otto 2004/219 ( PS PS.GZ PDF ) Entropic Security and the Encryption of High Entropy Messages Yevgeniy Dodis and Adam Smith 2004/218 ( PDF ) Plaintext-Simulatability Eiichiro Fujisaki 2004/217 ( PS PS.GZ PDF ) Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice Aggelos Kiayias and Moti Yung 2004/216 ( PS PS.GZ PDF ) Tree Parity Machine Rekeying Architectures Markus Volkmer and Sebastian Wallner 2004/215 ( PS PS.GZ PDF ) Transitive Signatures: New Schemes and Proofs Mihir Bellare and Gregory Neven 2004/214 ( PS PS.GZ PDF ) Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality An Braeken, Christopher Wolf, and Bart Preneel 2004/213 ( PS PS.GZ PDF ) Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery Fangguo Zhang 2004/212 ( PS PS.GZ PDF ) ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya 2004/211 ( PS PS.GZ PDF ) Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing Ian F. Blake and Aldar C-F. Chan 2004/210 ( PS PS.GZ PDF ) Hybrid Cryptography Alexander W. Dent 2004/209 ( PS PS.GZ PDF ) The Security and Efficiency of Micciancio's Cryptosystem Christoph Ludwig 2004/208 ( PS PS.GZ PDF ) Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sebastien Coron and Alexander May 2004/207 ( PDF ) On Corrective Patterns for the SHA-2 Family Philip Hawkes and Michael Paddon and Gregory G. Rose 2004/206 ( PDF ) ID-Based Proxy Signature Using Bilinear Pairings Jing Xu and Zhenfeng Zhang and Dengguo Feng 2004/205 ( PDF ) Direct Anonymous Attestation Ernie Brickell and Jan Camenisch and Liqun Chen 2004/204 ( PS PS.GZ PDF ) Authenticated tree parity machine key exchange Markus Volkmer and Andre Schaumburg 2004/203 ( PS PS.GZ PDF ) How to Cheat at Chess: A Security Analysis of the Internet Chess Club John Black and Martin Cochran and Ryan Gardner 2004/202 ( PS PS.GZ PDF ) Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions Yuri Borissov, An Braeken, Svetla Nikova 2004/201 ( PS PS.GZ PDF ) Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang and Dingyi Pei and Zhuojun Liu and Yong He 2004/200 ( PS PS.GZ PDF ) On Cheating Immune Secret Sharing An Braeken, Svetla Nikova, Ventzislav Nikov 2004/199 ( PDF ) Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu 2004/198 ( PDF ) Long Modular Multiplication for Cryptographic Applications Laszlo Hars 2004/197 ( PS PS.GZ PDF ) SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation Helmut Kahl 2004/196 ( PS PS.GZ PDF ) Password Based Key Exchange with Mutual Authentication Shaoquan Jiang and Guang Gong 2004/195 ( PS PS.GZ PDF ) Signed Binary Representations Revisited Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and Tsuyoshi Takagi 2004/194 ( PDF ) A Note on An Encryption Scheme of Kurosawa and Desmedt Rosario Gennaro and Victor Shoup 2004/193 ( PDF ) The Security and Performance of the Galois/Counter Mode of Operation (Full Version) David A. McGrew and John Viega 2004/192 ( -- withdrawn -- ) Security Pitfalls of an efficient remote user authentication scheme using smart cards Manoj Kumar 2004/191 ( PS PS.GZ ) Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations Pradeep Kumar Mishra 2004/190 ( PS PS.GZ PDF ) Distributed Ring Signatures for Identity-Based Scenarios Javier Herranz and Germ\'an S\'aez 2004/189 ( PS PS.GZ PDF ) Computing Modular Polynomials Denis Charles and Kristin Lauter 2004/188 ( PS PS.GZ PDF ) Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design Vincent Carlier and Hervé Chabanne and Emmanuelle Dottax 2004/187 ( PS PS.GZ PDF ) Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques Quisquater 2004/186 ( -- withdrawn -- ) A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy Manoj Kumar 2004/185 ( PS PS.GZ PDF ) On the Existence of low-degree Equations for Algebraic Attacks Frederik Armknecht 2004/184 ( PS PS.GZ PDF ) ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings Amit K Awasthi and Sunder Lal 2004/183 ( PS PS.GZ PDF ) A New Forward Secure Signature Scheme Bo Gyeong Kang and Je Hong Park and Sang Geun Hahn 2004/182 ( PS PS.GZ PDF ) Simpler Session-Key Generation from Short Random Passwords Minh-Huyen Nguyen and Salil Vadhan 2004/181 ( PS PS.GZ PDF ) On the Composition of Authenticated Byzantine Agreement Yehuda Lindell and Anna Lysyanskaya and Tal Rabin 2004/180 ( PDF ) Efficient Identity-Based Encryption Without Random Oracles Brent R. Waters 2004/179 ( PS PS.GZ PDF ) Identity Based Threshold Ring Signature Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu 2004/178 ( PDF ) Optimal Updating of Ideal Threshold Schemes S. G. Barwick and W.-A. Jackson and K. M. Martin and C. M. O'Keefe 2004/177 ( PDF ) Updating the Parameters of a Threshold Scheme by Minimal Broadcast S. G. Barwick and W.-A. Jackson and K. M. Martin 2004/176 ( PDF ) A Biometric Identity Based Signature Scheme Andrew Burnett and Adam Duffy and Tom Dowling 2004/175 ( PS PS.GZ PDF ) A Proof of Yao's Protocol for Secure Two-Party Computation Yehuda Lindell and Benny Pinkas 2004/174 ( PS PS.GZ PDF ) Short Group Signatures Dan Boneh and Xavier Boyen and Hovav Shacham 2004/173 ( PS PS.GZ PDF ) Secure Identity Based Encryption Without Random Oracles Dan Boneh and Xavier Boyen 2004/172 ( PS PS.GZ PDF ) Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles Dan Boneh and Xavier Boyen 2004/171 ( PS PS.GZ PDF ) Short Signatures Without Random Oracles Dan Boneh and Xavier Boyen 2004/170 ( PS PS.GZ PDF ) Efficient Consistency Proofs for Generalized Queries on a Committed Database Rafail Ostrovsky and Charles Rackoff and Adam Smith 2004/169 ( PDF ) Regional Blackouts: Protection of Broadcast Content on 3G Networks. Alexander W. Dent and Allan Tomlinson 2004/168 ( PS PS.GZ ) Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack T.Moh and J.M.Chen and Boyin Yang 2004/167 ( PS PS.GZ PDF ) A Secure and Efficient Key Exchange Protocol for Mobile Communications Fuw-Yi Yang and Jinn-Ke Jan 2004/166 ( PDF ) FRMAC, a Fast Randomized Message Authentication Code Eliane Jaulmes and Reynald Lercier 2004/165 ( PS PS.GZ ) A comparison of MNT curves and supersingular curves D. Page and N.P. Smart and F. Vercauteren 2004/164 ( PDF ) ID-based Cryptography from Composite Degree Residuosity Man Ho Au and Victor K. Wei 2004/163 ( -- withdrawn -- ) On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards Manoj Kumar 2004/162 ( PS PS.GZ PDF ) On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission Ivan Damgaard and Thomas Pedersen and Louis Salvail 2004/161 ( PS PS.GZ PDF ) Improvement of ThLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus Ko-ichi Nagao 2004/160 ( PS PS.GZ PDF ) Scalable Public-Key Tracing and Revoking Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung 2004/159 ( PS PS.GZ PDF ) Towards Provable Security for Ad Hoc Routing Protocols Levente Butty\'{a}n and Istv\'{a}n Vajda 2004/158 ( PDF ) Mobile Terminal Security Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and St\'ephane Soci\'e and Claire Whelan 2004/157 ( PS PS.GZ PDF ) Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three R. Granger and D. Page and M. Stam 2004/156 ( PS PS.GZ PDF ) Why Quantum Cryptography? Kenneth G. Paterson and Fred Piper and Ruediger Schack 2004/155 ( PDF ) TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks Amir Herzberg and Ahmad Gbara 2004/154 ( PDF ) Controlling Spam by Secure Internet Content Selection Amir Herzberg 2004/153 ( PS PS.GZ PDF ) A double large prime variation for small genus hyperelliptic index calculus Pierrick Gaudry and Emmanuel Thomé 2004/152 ( PS PS.GZ PDF ) Another Look at ``Provable Security'' Neal Koblitz and Alfred Menezes 2004/151 ( PDF ) Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$ Mitsuhiro Haneda and Mitsuru Kawazoe and Tetsuya Takahashi 2004/150 ( PS PS.GZ PDF ) An Authenticated Certificateless Public Key Encryption Scheme Young-Ran Lee and Hyang-Sook Lee 2004/149 ( PDF ) Secure and Efficient AES Software Implementation for Smart Caards E. Trichina and L. Korkishko 2004/148 ( PDF ) Provably Secure Delegation-by-Certification Proxy Signature Schemes Zuowen Tan and Zhuojun Liu 2004/147 ( PS PS.GZ PDF ) Key Recovery Method for CRT Implementation of RSA Matthew J. Campagna and Amit Sethi 2004/146 ( PS PS.GZ ) Near-Collisions of SHA-0 Eli Biham, Rafi Chen 2004/145 ( PS PS.GZ PDF ) Electromagnetic Side Channels of an FPGA Implementation of AES Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax and Hervé Pelletier 2004/144 ( PS PS.GZ ) Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables Alexander Maximov and Martin Hell and Subhamoy Maitra
[ IACR home page | IACR Newsletter page and archive | This issue ] © IACR