Cryptology ePrint Archive: Listing for 2000
- 2000/069 (PDF)
- New constructions of resilient Boolean functions with maximal nonlinearity
- Yuriy Tarannikov
- 2000/068 (PDF)
- A Content Certified E-mail Protocol with a Public Mailbox
- Tak-Ming Law
- 2000/067 (PDF)
- Universally Composable Security: A New Paradigm for Cryptographic Protocols
- Ran Canetti
- 2000/066 (PDF)
- A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
- Birgit Pfitzmann, Michael Waidner
- 2000/065 (PDF)
- How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes
- Masashi Mitomo, Kaoru Kurosawa
- 2000/064 (PDF)
- On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators
- Oded Goldreich, Vered Rosen
- 2000/063 (PDF)
- Candidate One-Way Functions Based on Expander Graphs
- Oded Goldreich
- 2000/061 (PDF)
- RSA-OAEP is Secure under the RSA Assumption
- Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
- 2000/060 (PDF)
- OAEP Reconsidered
- Victor Shoup
- 2000/059 (PDF)
- Essential Shannon Security with Keys Smaller Than the Encrypted Message
- Gideon Samid
- 2000/058 (PDF)
- Graph-Based Authentication of Digital Streams
- Sara Miner, Jessica Staddon
- 2000/057 (PDF)
- Session-Key Generation using Human Passwords Only
- Oded Goldreich, Yehuda Lindell
- 2000/056 (PDF)
- A Complete Problem for Statistical Zero Knowledge
- Amit Sahai, Salil Vadhan
- 2000/055 (PDF)
- Multiparty Computation from Threshold Homomorphic Encryption
- Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen
- 2000/054 (PDF)
- Correlation Immune Boolean Functions with Very High Nonlinearity
- Subhamoy Maitra
- 2000/053 (PDF)
- A Construction of Resilient Functions with High Nonlinearity
- Thomas Johansson, Enes Pasalic
- 2000/052 (PDF)
- CRYPTANALYSIS OF THE A5/2 ALGORITHM
- Slobodan Petrovic, Amparo Fúster-Sabater
- 2000/051 (PDF)
- Reducing the Gate Count of Bitslice DES
- Matthew Kwan
- 2000/050 (PDF)
- Spectral Analysis of High Order Correlation Immune Functions
- Yuriy Tarannikov, Denis Kirienko
- 2000/049 (PDF)
- Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
- Palash Sarkar
- 2000/048 (PDF)
- New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity
- Enes Pasalic, Thomas Johansson, Subhamoy Maitra, Palash Sarkar
- 2000/047 (PDF)
- Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property
- Subhamoy Maitra
- 2000/046 (PDF)
- The Saturation Attack - a Bait for Twofish
- Stefan Lucks
- 2000/045 (PDF)
- Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions
- Ronald Cramer, Ivan Damgård, Philip MacKenzie
- 2000/044 (PDF)
- Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
- Victor Boyko, Philip MacKenzie, Sarvar Patel
- 2000/043 (PDF)
- Constructions and Bounds for Unconditionally Secure Commitment Schemes
- C. Blundo, B. Masucci, D. R. Stinson, R. Wei
- 2000/042 (PDF)
- Constructing Pseudo-Random Permutations with a Prescribed Structure
- Moni Naor, Omer Reingold
- 2000/041 (PDF)
- On Symmetrically Private Information Retrieval
- Sanjeev Kumar Mishra
- 2000/040 (PDF)
- Decimation Attack of Stream Ciphers
- Eric FILIOL
- 2000/039 (PDF)
- Encryption Modes with Almost Free Message Integrity
- Charanjit S. Jutla
- 2000/038 (PDF)
- On the Complexity of Verifiable Secret Sharing and Multi-Party Computation
- Ronald Cramer, Ivan Damgård, Stefan Dziembowski
- 2000/037 (PDF)
- General Secure Multi-Party Computation from any Linear Secret Sharing Scheme
- Ronald Cramer, Ivan Damgård, Ueli Maurer
- 2000/036 (PDF)
- Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation
- Jean-Pierre Seifert
- 2000/035 (PDF)
- Electronic Jury Voting Protocols
- Alejandro Hevia, Marcos Kiwi
- 2000/034 (PDF)
- Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography
- Christian Cachin, Klaus Kursawe, Victor Shoup
- 2000/033 (PDF)
- The Complete Distribution of Linear Probabilities of MARS' s-box
- Kazumaro Aoki
- 2000/032 (PDF)
- Anonymous Fingerprinting with Direct Non-Repudiation
- Birgit Pfitzmann, Ahmad-Reza Sadeghi
- 2000/031 (PDF)
- Forward Security in Threshold Signature Schemes
- Michel Abdalla, Sara Miner, Chanathip Namprempre
- 2000/029 (PDF)
- Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
- Anand Desai, Sara Miner
- 2000/028 (PDF)
- An Information-Theoretic Model for Steganography
- Christian Cachin
- 2000/027 (PDF)
- Accountable Certificate Management using Undeniable Attestations
- Ahto Buldas, Peeter Laud, Helger Lipmaa
- 2000/026 (PDF)
- Authentication and Key Agreement via Memorable Password
- Taekyoung Kwon
- 2000/025 (PDF)
- Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
- Mihir Bellare, Chanathip Namprempre
- 2000/024 (PDF)
- Security of the Most Significant Bits of the Shamir Message Passing Scheme
- Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
- 2000/023 (PDF)
- Security of Polynomial Transformations of the Diffie--Hellman Key
- Igor Shparlinski
- 2000/022 (PDF)
- ACE: The Advanced Cryptographic Engine
- Thomas Schweinberger, Victor Shoup
- 2000/021 (PDF)
- An Efficient Identification Scheme Based on Permuted Patterns
- Shahrokh Saeednia
- 2000/020 (PDF)
- On the Security of Diffie--Hellman Bits
- Maria Isabel Gonzalez Vasco, Igor E. Shparlinski
- 2000/019 (PDF)
- Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently
- Anna Lysyanskaya
- 2000/017 (PDF)
- Lower Bounds on the Efficiency of Generic Cryptographic Constructions
- Rosario Gennaro, Luca Trevisan
- 2000/015 (PDF)
- Identification Protocols Secure Against Reset Attacks
- Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali
- 2000/014 (PDF)
- Authenticated Key Exchange Secure Against Dictionary Attacks
- Mihir Bellare, David Pointcheval, Phillip Rogaway
- 2000/013 (PDF)
- Concurrent Zero-Knowledge in Poly-logarithmic Rounds
- Joe Kilian, Erez Petrank
- 2000/011 (PDF)
- Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext
- Gideon Samid
- 2000/010 (PDF)
- The Security of Chaffing and Winnowing
- Mihir Bellare, Alexandra Boldyreva
- 2000/009 (PDF)
- New Directions in Design of Resilient Boolean Functions
- Palash Sarkar, Subhamoy Maitra
- 2000/008 (PDF)
- Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes
- Ivan Damgård, Mads Jurik
- 2000/007 (PDF)
- Public Electronic Contract Protocol
- Tak-Ming Law
- 2000/006 (PDF)
- An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
- Tak-Ming Law
- 2000/005 (PDF)
- On Resilient Boolean Functions with Maximal Possible Nonlinearity
- Yuriy Tarannikov
- 2000/004 (PDF)
- Combinatorial Properties of Frameproof and Traceability Codes
- J. N. Staddon, D. R. Stinson, R. Wei
- 2000/002 (PDF)
- A New Forward-Secure Digital Signature Scheme
- Michel Abdalla, Leonid Reyzin
- 2000/001 (PDF)
- On Security Preserving Reductions -- Revised Terminology
- Oded Goldreich
[ Cryptology ePrint archive]