Cryptology ePrint Archive: Listing for 2002
- 2002/195 (PDF)
- An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes
- H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen, P. Tuyls
- 2002/194 (PDF)
- A polarisation based Visual Crypto System and its Secret Sharing Schemes
- P. Tuyls, H. D. L. Hollmann, J. H. v. Lint, L. Tolhuizen
- 2002/193 (PDF)
- A Note on Ideal Tripartite Access Structures
- Michael J. Collins
- 2002/192 (PDF)
- Security Proofs for an Efficient Password-Based Key Exchange
- Emmanuel Bresson, Olivier Chevassut, David Pointcheval
- 2002/191 (PDF)
- A Linearization Attack on the Bluetooth Key Stream Generator
- Frederik Armknecht
- 2002/190 (PDF)
- Parallelizable Authentication Trees
- Eric Hall, Charanjit S. Jutla
- 2002/189 (PDF)
- Bit-Slice Auction Circuit
- Kaoru Kurosawa, Wakaha Ogata
- 2002/188 (PDF)
- Key recovery attacks on NTRU without ciphertext validation routine
- Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
- 2002/187 (PDF)
- Entity Authentication Schemes Using Braid Word Reduction
- Hervé SIBERT, Patrick DEHORNOY, Marc GIRAULT
- 2002/186 (PDF)
- Zero-Knowledge twenty years after its invention
- Oded Goldreich
- 2002/185 (PDF)
- Turing, a fast stream cipher
- Greg Rose, Philip Hawkes
- 2002/184 (PDF)
- Identity Based Authenticated Key Agreement Protocols from Pairings
- Liqun Chen, Caroline Kudla
- 2002/183 (PDF)
- Simple backdoors to RSA key generation
- Claude Crépeau, Alain Slakmon
- 2002/182 (PDF)
- Oblivious Keyword Search
- Wakaha Ogata, Kaoru Kurosawa
- 2002/181 (PDF)
- Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields
- Eisaku Furukawa, Mitsuru Kawazoe, Tetsuya Takahashi
- 2002/180 (PDF)
- OMAC: One-Key CBC MAC
- Tetsu Iwata, Kaoru Kurosawa
- 2002/179 (PDF)
- Parallel Algorithm for Multiplication on Elliptic Curves
- Juan Manuel Garcia Garcia, Rolando Menchaca Garcia
- 2002/178 (PDF)
- Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)
- Fangguo Zhang, Shengli Liu, Kwangjo Kim
- 2002/177 (PDF)
- two attacks on xia-you Group Signature
- Jianhong Zhang, Jilin Wang, Yumin Wang
- 2002/176 (PDF)
- Theoretical Analysis of ``Correlations in RC6''
- Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
- 2002/175 (PDF)
- Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
- Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
- 2002/174 (PDF)
- A Designer's Guide to KEMs
- Alexander W. Dent
- 2002/173 (PDF)
- Efficient Group Signatures without Trapdoors
- Giuseppe Ateniese, Breno de Medeiros
- 2002/172 (PDF)
- PECDSA. How to build a DL-based digital signature scheme with the best proven security
- Louis Granboulan
- 2002/171 (PDF)
- Statistical weaknesses in the alleged RC4 keystream generator
- Marina Pudovkina
- 2002/170 (PDF)
- An Analysis of RMAC
- Jack Lloyd
- 2002/169 (PDF)
- Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel
- D. Page
- 2002/168 (PDF)
- New Signature Scheme Using Conjugacy Problem
- Ki Hyoung Ko, Doo Ho Choi, Mi Sung Cho, Jang Won Lee
- 2002/167 (PDF)
- Cryptanalysis of Two New Signature Schemes
- Fangguo Zhang, Kwangjo Kim
- 2002/166 (PDF)
- Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms
- Ho-Kyu Lee, Hyang-Sook Lee, Young-Ran Lee
- 2002/165 (PDF)
- Coercion-Resistant Electronic Elections
- Ari Juels, Dario Catalano, Markus Jakobsson
- 2002/164 (PDF)
- Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
- Mike Scott
- 2002/163 (PDF)
- Man-in-the-Middle in Tunnelled Authentication Protocols
- N. Asokan, Valtteri Niemi, Kaisa Nyberg
- 2002/162 (PDF)
- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
- Salil P. Vadhan
- 2002/161 (PDF)
- Practical Verifiable Encryption and Decryption of Discrete Logarithms
- Jan Camenisch, Victor Shoup
- 2002/160 (PDF)
- Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
- Matt Blaze
- 2002/159 (PDF)
- Related-Key and Key-Collision Attacks Against RMAC
- Tadayoshi Kohno
- 2002/158 (PDF)
- The Book of Rijndaels
- Elad Barkan, Eli Biham
- 2002/157 (PDF)
- In How Many Ways Can You Write Rijndael?
- Elad Barkan, Eli Biham
- 2002/155 (PDF)
- Secure Bilinear Diffie-Hellman Bits
- Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski
- 2002/154 (PDF)
- On multi-exponentiation in cryptography
- Roberto M. Avanzi
- 2002/153 (PDF)
- Weighted Coordinates on Genus 2 Hyperelliptic Curves
- Tanja Lange
- 2002/152 (PDF)
- A note on Weak Keys of PES, IDEA and some Extended Variants
- Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
- 2002/151 (PDF)
- Selective disclosure credential sets
- Jason E. Holt, Kent E. Seamons
- 2002/150 (PDF)
- Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes
- Guilin Wang, Jianying Zhou, Robert H. Deng
- 2002/149 (PDF)
- About Filliol's Observations on DES, AES and Hash Functions (draft)
- Nicolas T. Courtois
- 2002/148 (PDF)
- The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)
- Phillip Rogaway
- 2002/147 (PDF)
- Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves
- Tanja Lange
- 2002/146 (PDF)
- Bauer-Berson-Feiertag attack revisited
- Jun-Bum Shin, Kwang H. Lee
- 2002/145 (PDF)
- Cryptanalysis of MQV with partially known nonces
- P. J. Leadbitter, N. P. Smart
- 2002/144 (PDF)
- On Some Algebraic Structures in the AES Round Function
- A. M. Youssef, S. E. Tavares
- 2002/143 (PDF)
- An Attack on the Isomorphisms of Polynomials Problem with One Secret
- Willi Geiselmann, Willi Meier, Rainer Steinwandt
- 2002/142 (PDF)
- On the Applicability of Distinguishing Attacks Against Stream Ciphers
- Greg Rose, Philip Hawkes
- 2002/141 (PDF)
- Applying General Access Structure to Proactive Secret Sharing Schemes
- Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
- 2002/140 (PDF)
- Universally Composable Two-Party and Multi-Party Secure Computation
- Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai
- 2002/139 (PDF)
- Reaction Attacks on Public Key Cryptosystems Based on the Word Problem
- Maria Isabel Gonzalez Vasco, Rainer Steinwandt
- 2002/138 (PDF)
- On the Security of HFE, HFEv- and Quartz
- Nicolas T. Courtois, Magnus Daum, Patrick Felke
- 2002/137 (PDF)
- Provably Secure Steganography
- Nicholas J. Hopper, John Langford, Luis von Ahn
- 2002/136 (PDF)
- Practical Non-Interactive Key Distribution Based on Pairings
- Régis Dupont, Andreas Enge
- 2002/135 (PDF)
- Folklore, Practice and Theory of Robust Combiners
- Amir Herzberg
- 2002/134 (PDF)
- Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
- Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
- 2002/133 (PDF)
- Efficient Construction of (Distributed) Verifiable Random Functions
- Yevgeniy Dodis
- 2002/132 (PDF)
- Tight Lower Bound on Linear Authenticated Encryption
- Charanjit S. Jutla
- 2002/131 (PDF)
- An Improved Pseudorandom Generator Based on Hardness of Factoring
- Nenad Dedic, Leonid Reyzin, Salil Vadhan
- 2002/130 (PDF)
- OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives
- Kazukuni Kobara, Hideki Imai
- 2002/129 (PDF)
- Key-collisions in (EC)DSA: Attacking Non-repudiation
- Tomas Rosa
- 2002/128 (PDF)
- Perfectly Secure Message Transmission Revisited
- Yvo Desmedt, Yongge Wang
- 2002/127 (PDF)
- Power of a Public Random Permutation and its Application to Authenticated-Encryption
- Kaoru Kurosawa
- 2002/126 (PDF)
- Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
- Ahmad-Reza Sadeghi, Michael Steiner
- 2002/125 (PDF)
- The Jacobi Model of an Elliptic Curve and Side-Channel Analysis
- Olivier Billet, Marc Joye
- 2002/124 (PDF)
- On Optimal Hash Tree Traversal for Interval Time-Stamping
- Helger Lipmaa
- 2002/123 (PDF)
- New covering radius of Reed-Muller codes for $t$-resilient functions
- Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara
- 2002/122 (PDF)
- ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
- Fangguo Zhang, Shengli Liu, Kwangjo Kim
- 2002/121 (PDF)
- Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae
- Tanja Lange
- 2002/120 (PDF)
- Security Analysis of IKE's Signature-based Key-Exchange Protocol
- Ran Canetti, Hugo Krawczyk
- 2002/119 (PDF)
- Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
- Bodo Möller
- 2002/118 (PDF)
- Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme
- Alexandra Boldyreva
- 2002/117 (PDF)
- Diffie-Hellman Problems and Bilinear Maps
- Jung Hee Cheon, Dong Hoon Lee
- 2002/116 (PDF)
- How to convert any ID-based Signature Schemes
- Claude Castelluccia
- 2002/115 (PDF)
- Universal Padding Schemes for RSA
- Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier
- 2002/114 (PDF)
- Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three
- N. P. Smart, J. Westwood
- 2002/113 (PDF)
- A Note on the Bilinear Diffie-Hellman Assumption
- Yacov Yacobi
- 2002/112 (PDF)
- An Efficient Procedure to Double and Add Points on an Elliptic Curve
- Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
- 2002/111 (PDF)
- On Linear Redundancy in the AES S-Box
- Joanne Fuller, William Millan
- 2002/110 (PDF)
- The GGM Construction does NOT yield Correlation Intractable Function Ensembles
- Oded Goldreich
- 2002/109 (PDF)
- A New Class of Unsafe Primes
- Qi Cheng
- 2002/107 (PDF)
- Efficient Arithmetic on Hyperelliptic Curves
- Tanja Lange
- 2002/106 (PDF)
- Secret sharing schemes on access structures with intersection number equal to one
- Jaume Marti-Farre, Carles Padro
- 2002/105 (PDF)
- An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
- Jan Denef, Frederik Vercauteren
- 2002/104 (PDF)
- Forward-Secure Signatures with Fast Key Update
- Anton Kozlov, Leonid Reyzin
- 2002/103 (PDF)
- On the Power of Claw-Free Permutations
- Yevgeniy Dodis, Leonid Reyzin
- 2002/102 (PDF)
- Applying General Access Structure to Metering Schemes
- Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
- 2002/101 (PDF)
- An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property
- Simon R. Blackburn
- 2002/100 (PDF)
- Encryption-Scheme Security in the Presence of Key-Dependent Messages
- J. Black, P. Rogaway, T. Shrimpton
- 2002/099 (PDF)
- A New Statistical Testing for Symmetric Ciphers and Hash Functions
- Eric Filiol
- 2002/098 (PDF)
- Identity-Based Signcryption
- John Malone-Lee
- 2002/096 (PDF)
- Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank
- James Xiao, Yongxin Zhou
- 2002/094 (PDF)
- Building curves with arbitrary small MOV degree over finite prime fields
- R. Dupont, A. Enge, F. Morain
- 2002/093 (PDF)
- A Fuzzy Vault Scheme
- Ari Juels, Madhu Sudan
- 2002/092 (PDF)
- TMAC: Two-Key CBC MAC
- Kaoru Kurosawa, Tetsu Iwata
- 2002/091 (PDF)
- Multiplicative Masking and Power Analysis of AES
- Jovan Dj. Golić
- 2002/090 (PDF)
- Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol
- Daniele Micciancio, Erez Petrank
- 2002/089 (PDF)
- On Chosen Ciphertext Security of Multiple Encryptions
- Oded Goldreich, Yoad Lustig, Moni Naor
- 2002/088 (PDF)
- Constructing Elliptic Curves with Prescribed Embedding Degrees
- Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
- 2002/087 (PDF)
- Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
- Nicolas T. Courtois
- 2002/086 (PDF)
- Adapting the weaknesses of the Random Oracle model to the Generic Group model.
- Alexander W. Dent
- 2002/085 (PDF)
- Efficient and Player-Optimal Strong Consensus
- Matthias Fitzi, Juan A. Garay
- 2002/084 (PDF)
- Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer
- Amir Herzberg
- 2002/083 (PDF)
- A semantically secure elliptic curve RSA scheme with small expansion factor
- David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
- 2002/082 (PDF)
- Authentication of Quantum Messages
- Howard Barnum, Claude Crepeau, Daniel Gottesman, Adam Smith, Alain Tapp
- 2002/081 (PDF)
- Some Applications of Threshold Signature Schemes to Distributed Protocols
- Vanesa Daza, Javier Herranz, Germán Sáez
- 2002/080 (PDF)
- Applications of Multilinear Forms to Cryptography
- Dan Boneh, Alice Silverberg
- 2002/079 (PDF)
- On the efficiency of the Clock Control Guessing Attack
- Erik Zenner
- 2002/078 (PDF)
- Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
- Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre
- 2002/077 (PDF)
- Key-Insulated Public-Key Cryptosystems
- Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
- 2002/076 (PDF)
- Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP
- Vlastimil Klima, Tomas Rosa
- 2002/075 (PDF)
- Fault based cryptanalysis of the Advanced Encryption Standard
- J. Blöemer, J. -P. Seifert
- 2002/074 (PDF)
- How to repair ESIGN
- Louis Granboulan
- 2002/073 (PDF)
- Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures
- C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, J. -P. Seifert
- 2002/072 (PDF)
- Authenticated Identity-Based Encryption
- Ben Lynn
- 2002/071 (PDF)
- Further Results and Considerations on Side Channel Attacks on RSA
- Vlastimil Klima, Tomas Rosa
- 2002/070 (PDF)
- Weak Keys in MST1
- Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
- 2002/069 (PDF)
- A Distributed and Computationally Secure Key Distribution Scheme
- Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
- 2002/068 (PDF)
- Improved key recovery of level 1 of the Bluetooth Encryption System
- Scott Fluhrer
- 2002/067 (PDF)
- (Not So) Random Shuffles of RC4
- Ilya Mironov
- 2002/066 (PDF)
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
- John Black, Phillip Rogaway, Thomas Shrimpton
- 2002/065 (PDF)
- Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization
- Chanathip Namprempre
- 2002/064 (PDF)
- Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold
- Mihir Bellare, Adriana Palacio
- 2002/063 (PDF)
- On some Attacks on Multi-prime RSA
- M Jason Hinek, Mo King Low, Edlyn Teske
- 2002/062 (PDF)
- ABC - A Block Cipher
- Dieter Schmidt
- 2002/061 (PDF)
- Strengthened Encryption in the CBC Mode
- Vlastimil Klima, Tomas Rosa
- 2002/060 (PDF)
- A Forward-Secure Public-Key Encryption Scheme
- Jonathan Katz
- 2002/059 (PDF)
- Universally Composable Notions of Key Exchange and Secure Channels
- Ran Canetti, Hugo Krawczyk
- 2002/058 (PDF)
- Construction of UOWHF: Tree Hashing Revisited
- Palash Sarkar
- 2002/057 (PDF)
- A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions
- Yehuda Lindell
- 2002/056 (PDF)
- Hierarchical ID-Based Cryptography
- Craig Gentry, Alice Silverberg
- 2002/055 (PDF)
- Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity
- Manoj Prabhakaran, Amit Sahai
- 2002/054 (PDF)
- SiBIR: Signer-Base Intrusion-Resilient Signatures
- Gene Itkis, Leonid Reyzin
- 2002/053 (PDF)
- Extended Validity and Consistency in Byzantine Agreement
- Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
- 2002/052 (PDF)
- A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order
- Stefan Lucks
- 2002/051 (PDF)
- Fully Distributed Proxy Signature Schemes
- Javier Herranz, Germán Sáez
- 2002/050 (PDF)
- Secret sharing schemes with three or four minimal qualified subsets
- Jaume Martí-Farré, Carles Padró
- 2002/049 (PDF)
- Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties
- Alexander Kholosha, Henk C. A. van Tilborg
- 2002/048 (PDF)
- Towards a Uniform Description of Several Group Based Cryptographic Primitives
- Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt
- 2002/047 (PDF)
- Universal Composition with Joint State
- Ran Canetti, Tal Rabin
- 2002/046 (PDF)
- On the Security of Joint Signature and Encryption
- Jee Hea An, Yevgeniy Dodis, Tal Rabin
- 2002/045 (PDF)
- Cryptanalysis of S-DES
- Dr. K. S. Ooi, Brain Chin Vito
- 2002/044 (PDF)
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Nicolas Courtois, Josef Pieprzyk
- 2002/043 (PDF)
- Strict Polynomial-time in Simulation and Extraction
- Boaz Barak, Yehuda Lindell
- 2002/042 (PDF)
- A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack
- Edith Elkind, Amit Sahai
- 2002/041 (PDF)
- New Results on Boomerang and Rectangle Attack
- Eli Biham, Orr Dunkelman, Nathan Keller
- 2002/040 (PDF)
- Secure Computation Without Agreement
- Shafi Goldwasser, Yehuda Lindell
- 2002/039 (PDF)
- Partial Key Escrow Monitoring Scheme
- Jiang Shaoquan, Zhang Yufeng
- 2002/037 (PDF)
- An efficient semantically secure elliptic curve cryptosystem based on KMOV
- David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
- 2002/036 (PDF)
- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups
- Ronald Cramer, Serge Fehr
- 2002/035 (PDF)
- Tripartite Authenticated Key Agreement Protocols from Pairings
- Sattam S. Al-Riyami, Kenneth G. Paterson
- 2002/034 (PDF)
- An OAEP Variant With a Tight Security Proof
- Jakob Jonsson
- 2002/033 (PDF)
- Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
- Yodai Watanabe, Junji Shikata, Hideki Imai
- 2002/032 (PDF)
- Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields
- Y. Choie, E. Jeong, E. Lee
- 2002/031 (PDF)
- A Parallelizable Design Principle for Cryptographic Hash Functions
- Palash Sarkar, Paul J. Schellenberg
- 2002/030 (PDF)
- Adaptive chi-square test and its application to some cryptographic problems.
- Boris Ryabko
- 2002/029 (PDF)
- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products
- Joy Algesheimer, Jan Camenisch, Victor Shoup
- 2002/028 (PDF)
- A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack
- Jung Hee Cheon
- 2002/027 (PDF)
- Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications
- Jonathan Katz
- 2002/026 (PDF)
- Generic Groups, Collision Resistance, and ECDSA
- Daniel R. L. Brown
- 2002/025 (PDF)
- Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking
- Markus Jakobsson, Ari Juels, Ron Rivest
- 2002/023 (PDF)
- Almost Optimal Hash Sequence Traversal
- Don Coppersmith, Markus Jakobsson
- 2002/022 (PDF)
- From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
- Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
- 2002/021 (PDF)
- Spectral Analysis of Boolean Functions under Non-uniformity of Arguments
- Kanstantsin Miranovich
- 2002/020 (PDF)
- Cryptanalysis of stream ciphers with linear masking
- Don Coppersmith, Shai Halevi, Charanjit Jutla
- 2002/019 (PDF)
- Scream: a software-efficient stream cipher
- Shai Halevi, Don Coppersmith, Charanjit Jutla
- 2002/018 (PDF)
- An Identity-Based Signature from Gap Diffie-Hellman Groups
- Jae Choon Cha, Jung Hee Cheon
- 2002/017 (PDF)
- The Cramer-Shoup Strong-RSA Signature Scheme Revisited
- Marc Fischlin
- 2002/016 (PDF)
- Content Extraction Signatures
- Ron Steinfeld, Laurence Bull, Yuliang Zheng
- 2002/015 (PDF)
- Security proofs of cryptographic protocols
- Eva Jencusova
- 2002/014 (PDF)
- Better than BiBa: Short One-time Signatures with Fast Signing and Verifying
- Leonid Reyzin, Natan Reyzin
- 2002/013 (PDF)
- Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups
- Ivan Damgard, Maciej Koprowski
- 2002/012 (PDF)
- Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings
- F. Hess
- 2002/011 (PDF)
- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages
- Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
- 2002/010 (PDF)
- Cut and Paste Attacks with Java
- Serge Lefranc, David Naccache
- 2002/009 (PDF)
- Tree-based Group Key Agreement
- Yongdae Kim, Adrian Perrig, Gene Tsudik
- 2002/008 (PDF)
- Efficient Algorithms for Pairing-Based Cryptosystems
- Paulo S. L. M. Barreto, Hae Y. Kim, Ben Lynn, Michael Scott
- 2002/007 (PDF)
- Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks
- Wieland Fischer, Christophe Giraud, Erik Woodward Knudsen, Jean-Pierre Seifert
- 2002/006 (PDF)
- The best and worst of supersingular abelian varieties in cryptology
- Karl Rubin, Alice Silverberg
- 2002/005 (PDF)
- Cryptanalysis of Stream Cipher COS (2,128) Mode I
- Hongjun Wu, Feng Bao
- 2002/004 (PDF)
- ID-based Signatures from Pairings on Elliptic Curves
- Kenneth G. Paterson
- 2002/003 (PDF)
- Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher
- Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle
- 2002/002 (PDF)
- Evaluating Security of Voting Schemes in the Universal Composability Framework
- Jens Groth
- 2002/001 (PDF)
- Fractal Hash Sequence Representation and Traversal
- Markus Jakobsson
[ Cryptology ePrint archive]