Cryptology ePrint Archive: Listing for 2003
Regex
2003/265 (PDF ) Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications Yunlei ZHAO
2003/264 (PDF ) Inversion of Several Field Elements: A New Parallel Algorithm Pradeep Kumar Mishra, Palash Sarkar
2003/263 (PDF ) Security Analysis of Lal and Awasthi's Proxy Signature Schemes Manik Lal Das, Ashutosh Saxena, V P Gulati
2003/262 (PDF ) A Secure Modified ID-Based Undeniable Signature Scheme Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2003/261 (PDF ) A provably secure ID-based ring signature scheme Javier Herranz, Germán Sáez
2003/260 (PDF ) An Improved ID-based Authenticated Group Key Agreement Scheme Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/259 (PDF ) Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang, Xiaofeng Chen
2003/258 (PDF ) Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices. Marcin Rogawski
2003/257 (PDF ) Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
2003/255 (PDF ) Improved Constructions for Universal Re-encryption. Peter Fairbrother
2003/254 (PDF ) Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner, Amir Herzberg
2003/253 (PDF ) Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations Roberto Maria Avanzi
2003/252 (PDF ) On Simulation-Sound Trapdoor Commitments Philip MacKenzie, Ke Yang
2003/251 (PDF ) Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields EunKyung Jeong
2003/250 (PDF ) Breaking the Stream Cipher Whitenoise Hongjun Wu
2003/249 (PDF ) Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004) Stephen Boren, Andre Brisson
2003/248 (PDF ) Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n) Izuru Kitamura, Masanobu Katagi
2003/247 (PDF ) ID-based Authenticated Two Round Multi-Party Key Agreement Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/246 (PDF ) Quantum Digital Signature Based on Quantum One-way Functions Xin L¨¹, Deng-Guo Feng
2003/245 (PDF ) A Key Substitution Attack on SFLASH^{v3} Willi Geiselmann, Rainer Steinwandt
2003/244 (PDF ) Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks Tri Van Le, Kaoru Kurosawa
2003/243 (PDF ) An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures Guilin Wang
2003/242 (PDF ) Improved Weil and Tate pairings for elliptic and hyperelliptic curves Kirsten Eisentraeger, Kristin Lauter, Peter L. Montgomery
2003/241 (PDF ) Hybrid Broadcast Encryption and Security Analysis Shaoquan Jiang, Guang Gong
2003/240 (PDF ) How to Break and Repair a Universally Composable Signature Functionality Michael Backes, Dennis Hofheinz
2003/239 (PDF ) Universally Composable Signatures, Certification and Authentication Ran Canetti
2003/238 (PDF ) Chameleon Signature from Bilinear Pairing Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
2003/237 (PDF ) Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity Benoit Chevallier-Mames, Mathieu Ciet, Marc Joye
2003/236 (PDF ) Combinational Logic Design for AES SubByte Transformation on Masked Data Elena Trichina
2003/235 (PDF ) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
2003/234 (PDF ) Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary Gene Itkis, Peng Xie
2003/233 (PDF ) Public Key Steganography Luis von Ahn, Nicholas J. Hopper
2003/232 (PDF ) The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm Chunming Tang, Zhuojun Liu, Jinwang Liu
2003/231 (PDF ) Public-Key Steganography with Active Attacks Michael Backes, Christian Cachin
2003/230 (PDF ) A Fast Provably Secure Cryptographic Hash Function Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
2003/229 (PDF ) Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
2003/228 (PDF ) Verifiably Committed Signatures Provably Secure in The Standard Complexity Model Huafei Zhu
2003/227 (PDF ) Attacks on a Secure Group Communication Scheme With Hierarchical Access Control Willi Geiselmann, Rainer Steinwandt
2003/226 (PDF ) On the Security of a Group Signature Scheme with Forward Security Guilin Wang
2003/225 (PDF ) Masking Based Domain Extenders for UOWHFs: Bounds and Constructions Palash Sarkar
2003/223 (PDF ) Cryptanalysis of a Cryptosystem based on Drinfeld modules Simon R. Blackburn, Carlos Cid, Steven D. Galbraith
2003/222 (PDF ) A Verifiable Secret Sharing Scheme with Statistical zero-knowledge Chunming Tang, Zhuojun Liu, Mingsheng Wang
2003/221 (PDF ) A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism Jung Hee Cheon, Hyun Soo Nam
2003/220 (PDF ) A short comment on the affine parts of SFLASH^{v3} Willi Geiselmann, Rainer Steinwandt
2003/219 (PDF ) Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron
2003/218 (PDF ) A Security Evaluation of Whitenoise David Wagner
2003/217 (PDF ) Chemical Combinatorial Attacks on Keyboards Eric Brier, David Naccache, Pascal Paillier
2003/216 (PDF ) Secure Indexes Eu-Jin Goh
2003/215 (PDF ) Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC Bo Yang, Ramesh Karri, David Mcgrew
2003/214 (PDF ) Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols Rosario Gennaro
2003/213 (PDF ) Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$ Y. Choie, E. Jeong
2003/212 (PDF ) High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two Jan Pelzl, Thomas Wollinger, Christof Paar
2003/211 (PDF ) SFLASHv3, a fast asymmetric signature scheme Nicolas T. Courtois, Louis Goubin, Jacques Patarin
2003/210 (PDF ) On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes Ventzislav Nikov, Svetla Nikova
2003/209 (PDF ) Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003 Daniel Augot, Matthieu Finiasz, Pierre Loidreau
2003/208 (PDF ) ID-Based Chameleon Hashes from Bilinear Pairings Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/207 (PDF ) Security Flaws in Several Group Signatures Proposed by Popescu Guilin Wang, Sihan Qing
2003/206 (PDF ) Identity Based Undeniable Signatures Benoît Libert, Jean-Jacques Quisquater
2003/205 (PDF ) Improved Cryptanalysis of SecurID Scott Contini, Yiqun Lisa Yin
2003/204 (PDF ) A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials ZENG Xiangyong, HU Lei
2003/203 (PDF ) Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
2003/202 (PDF ) Yet Another Sieving Device Willi Geiselmann, Rainer Steinwandt
2003/201 (PDF ) an attack on a multisignature scheme Zheng Dong, Kefei Chen
2003/200 (PDF ) Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature Zheng Dong, Shengli Liu, kefei Chen
2003/199 (PDF ) Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan Simon R. Blackburn, Kenneth G. Paterson
2003/198 (PDF ) Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria Kishan Chand Gupta, Palash Sarkar
2003/197 (PDF ) Revisiting fully distributed proxy signature schemes Javier Herranz, German Saez
2003/196 (PDF ) Security Analysis of Some Proxy Signatures Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2003/195 (PDF ) Public Key Encryption with keyword Search Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
2003/194 (PDF ) Security Analysis of Several Group Signature Schemes Guilin Wang
2003/193 (PDF ) Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
2003/192 (PDF ) Universal Designated-Verifier Signatures Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
2003/191 (PDF ) Projective Coordinates Leak David Naccache, Nigel Smart, Jacques Stern
2003/189 (PDF ) Cryptanalysis of publicly verifiable authenticated encryption Zuhua Shao
2003/188 (PDF ) A New Forward Secure Signature Scheme using Bilinear Maps Fei Hu, Chwan-Hwa Wu, J. D. Irwin
2003/187 (PDF ) Resource Bounded Unprovability of Computational Lower Bounds Tatsuaki Okamoto, Ryo Kashima
2003/186 (PDF ) Safe Prime Generation with a Combined Sieve Michael J. Wiener
2003/185 (PDF ) VMPC Stream Cipher Bartosz Zoltak
2003/184 (PDF ) What do DES S-boxes Say to Each Other ? Nicolas T. Courtois, Guilhem Castagnos, Louis Goubin
2003/183 (PDF ) Certificate-Based Encryption and the Certificate Revocation Problem Craig Gentry
2003/182 (PDF ) Chosen-Ciphertext Security from Identity-Based Encryption Ran Canetti, Shai Halevi, Jonathan Katz
2003/181 (PDF ) On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2003/180 (PDF ) Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra, Palash Sarkar
2003/179 (PDF ) VMPC One-Way Function Bartosz Zoltak
2003/178 (PDF ) Constructing Optimistic Fair Exchange Protocols from Committed Signatures Huafei Zhu
2003/177 (PDF ) Building Secure Cryptographic Transforms, or How to Encrypt and MAC Tadayoshi Kohno, Adriana Palacio, John Black
2003/176 (PDF ) Patterson-Wiedemann Construction Revisited S. Gangopadhyay, P. H. Keskar, S. Maitra
2003/175 (PDF ) Double-Speed Safe Prime Generation David Naccache
2003/174 (PDF ) Relaxing Chosen-Ciphertext Security Ran Canetti, Hugo Krawczyk, Jesper Nielsen
2003/173 (PDF ) Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration Palash Sarkar
2003/172 (PDF ) NAEP: Provable Security in the Presence of Decryption Failures Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2003/171 (PDF ) Scalable Protocols for Authenticated Group Key Exchange Jonathan Katz, Moti Yung
2003/170 (PDF ) HARPS: HAshed Random Preloaded Subset Key Distribution Mahalingam Ramkumar, Nasir Memon
2003/169 (PDF ) Properties of the Transformation Semigroup of the Solitaire Stream Cipher Boris Pogorelov, Marina Pudovkina
2003/168 (PDF ) Robust discretization, with an application to graphical passwords Jean-Camille Birget, Dawei Hong, Nasir Memon
2003/167 (PDF ) Identity-based Chameleon Hash and Applications Giuseppe Ateniese, Breno de Medeiros
2003/166 (PDF ) A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves Igor Semaev
2003/165 (PDF ) Commitment Capacity of Discrete Memoryless Channels Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
2003/164 (PDF ) Identity-Based Threshold Decryption Joonsang Baek, Yuliang Zheng
2003/163 (PDF ) Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography Xavier Boyen
2003/162 (PDF ) Cryptanalysis of the Alleged SecurID Hash Function Alex Biryukov, Joseph Lano, Bart Preneel
2003/161 (PDF ) Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology Ueli Maurer, Renato Renner, Clemens Holenstein
2003/160 (PDF ) A More Secure and Efficacious TTS Signature Scheme Jiun-Ming Chen, Bo-Yin Yang
2003/159 (PDF ) An efficient variant of the RSA cryptosystem Cesar Alison Monteiro Paixão
2003/158 (PDF ) A Sufficient Condition and Optimal Domain Extension of UOWHF Mridul Nandi
2003/157 (PDF ) Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa, Tsuyoshi Takagi
2003/156 (PDF ) Efficient Provably Secure Public Key Steganography Tri Van Le
2003/155 (PDF ) A Formal Proof of Zhu's Signature Scheme huafei zhu
2003/154 (PDF ) ManTiCore: Encryption with Joint Cipher-State Authentication Cheryl Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson
2003/153 (PDF ) Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem Zhen-Feng ZHANG, Jing XU, Deng-Guo FENG
2003/152 (PDF ) Optimal Statistical Power Analysis Eric Brier, Christophe Clavier, Francis Olivier
2003/151 (PDF ) Secret sharing schemes on sparse homogeneous access structures with rank three Jaume Martí-Farré, Carles Padró
2003/150 (PDF ) On the random-oracle methodology as applied to length-restricted signature schemes Ran Canetti, Oded Goldreich, Shai Halevi
2003/148 (PDF ) A Tweakable Enciphering Mode Shai Halevi, Phillip Rogaway
2003/147 (PDF ) A Parallelizable Enciphering Mode Shai Halevi, Phillip Rogaway
2003/146 (PDF ) Breaking and Repairing Optimistic Fair Exchange from PODC 2003 Yevgeniy Dodis, Leonid Reyzin
2003/145 (PDF ) Symmetric Authentication Within a Simulatable Cryptographic Library Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/144 (PDF ) ID-based tripartite key agreement with signatures Divya Nalla
2003/143 (PDF ) Elliptic curves suitable for pairing based cryptography Friederike Brezing, Annegret Weng
2003/142 (PDF ) A New Tree based Domain Extension of UOWHF Mridul Nandi
2003/141 (PDF ) General Composition and Universal Composability in Secure Multiparty Computation Yehuda Lindell
2003/140 (PDF ) Trading-Off Type-Inference Memory Complexity Against Communication Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
2003/139 (PDF ) On the Randomness of the Editing Generator Enjian Bai, Guozhen Xiao
2003/138 (PDF ) Permutation graphs, fast forward permutations, and Boaz Tsaban
2003/137 (PDF ) Bernoulli numbers and the probability of a birthday surprise Boaz Tsaban
2003/136 (PDF ) Efficient linear feedback shift registers with maximal period Boaz Tsaban, Uzi Vishne
2003/135 (PDF ) Collision Attack on Reduced-Round Camellia Wen-Ling Wu, Deng-Guo Feng
2003/133 (PDF ) Minimum Distance between Bent and 1-resilient Boolean Functions Soumen Maity, Subhamoy Maitra
2003/132 (PDF ) Guaranteeing the diversity of number generators Adi Shamir, Boaz Tsaban
2003/131 (PDF ) Homomorphic public-key systems based on subgroup membership problems Kristian Gjøsteen
2003/130 (PDF ) On the Pseudorandomness of KASUMI Type Permutations Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
2003/129 (PDF ) Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
2003/128 (PDF ) Weak Fields for ECC Alfred Menezes, Edlyn Teske, Annegret Weng
2003/127 (PDF ) Using Information Theory Approach to Randomness Testing B. Ya. Ryabko, V. A. Monarev
2003/126 (PDF ) Certificateless Public Key Cryptography Sattam S. Al-Riyami, Kenneth G. Paterson
2003/125 (PDF ) Algebraic Attacks on Combiners with Memory and Several Outputs Nicolas T. Courtois
2003/124 (PDF ) A General Correlation Theorem Kishan Chand Gupta, Palash Sarkar
2003/123 (PDF ) Assessing security of some group based cryptosystems Vladimir Shpilrain
2003/122 (PDF ) Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols Kyungah Shim
2003/121 (PDF ) A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol Michael Backes, Birgit Pfitzmann
2003/120 (PDF ) Physically Observable Cryptography Silvio Micali, Leonid Reyzin
2003/119 (PDF ) How Secure Are FPGAs in Cryptographic Applications? Thomas Wollinger, Christof Paar
2003/118 (PDF ) Visual Crypto Displays Enabling Secure Communications Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
2003/117 (PDF ) An identity-based ring signature scheme from bilinear pairings Chih-Yin Lin, Tzong-Chen Wu
2003/116 (PDF ) A New ID-based Group Signature Scheme from Bilinear Pairings Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2003/115 (PDF ) Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols Kyungah Shim
2003/114 (PDF ) Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions Michael Backes
2003/113 (PDF ) Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings Hung-Min Sun, Bin-Tsan Hsieh
2003/112 (PDF ) Accumulating Composites and Improved Group Signing Gene Tsudik, Shouhuai Xu
2003/110 (PDF ) Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key Yukio Itakura, Shigeo Tsujii
2003/109 (PDF ) Crytanalysis of SAFER++ Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz
2003/108 (PDF ) Novel Cyclic and Algebraic Properties of AES Tri Van Le
2003/107 (PDF ) Fujisaki-Okamoto IND-CCA hybrid encryption revisited David Galindo, Sebastià Mart\'ın, Paz Morillo, Jorge L. Villar
2003/106 (PDF ) CWC: A high-performance conventional authenticated encryption mode Tadayoshi Kohno, John Viega, Doug Whiting
2003/105 (PDF ) On Diophantine Complexity and Statistical Zero-Knowledge Arguments Helger Lipmaa
2003/104 (PDF ) New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin
2003/103 (PDF ) Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols Zhongliang Chen
2003/102 (PDF ) Length-Based Attacks for Certain Group Based Encryption Rewriting Systems J. Hughes, A. Tannenbaum
2003/100 (PDF ) Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model Yehuda Lindell
2003/099 (PDF ) Algorithms in Braid Groups Matthew J. Campagna
2003/098 (PDF ) Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klima, Tomas Rosa
2003/097 (PDF ) Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves Jan Pelzl, Thomas Wollinger, Christof Paar
2003/096 (PDF ) Secure Proxy Signature Schemes for Delegation of Signing Rights Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi
2003/095 (PDF ) Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack Yevgeniy Dodis, Nelly Fazio
2003/094 (PDF ) Trace Zero Subvariety for Cryptosystems Tanja Lange
2003/093 (PDF ) Simple Stateless Steganography Leonid Reyzin, Scott Russell
2003/092 (PDF ) Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol Muxiang Zhang
2003/091 (PDF ) Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham
2003/090 (PDF ) A Structured Multisignature Scheme from the Gap Diffie-Hellman Group Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang
2003/089 (PDF ) Efficient Public Key Generation for Multivariate Cryptosystems Christopher Wolf
2003/088 (PDF ) Elliptic Curve Point Multiplication A. G. Rostovtsev, E. B. Makhovenko
2003/087 (PDF ) A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack huafei zhu
2003/086 (PDF ) On the Selection of Pairing-Friendly Groups Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
2003/085 (PDF ) A defect of the implementation schemes of the TTM cryptosystem Jintai Ding, Dieter Schmidt
2003/084 (PDF ) Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem Jintai Ding, Timonthy Hodges
2003/083 (PDF ) A Forward-Secure Public-Key Encryption Scheme Ran Canetti, Shai Halevi, Jonathan Katz
2003/082 (PDF ) Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata, Kaoru Kurosawa
2003/081 (PDF ) Primitive Specification for SOBER-128 Philip Hawkes, Greg Rose
2003/080 (PDF ) Non-interactive and Reusable Non-malleable Commitment Schemes Ivan Damgård, Jens Groth
2003/079 (PDF ) Fast arithmetic on Jacobians of Picard curves Stéphane Flon, Roger Oyono
2003/078 (PDF ) Relation among simulator-based and comparison-based definitions of semantic security Yodai Watanabe, Junji Shikata
2003/077 (PDF ) An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
2003/076 (PDF ) Goldbach’s Conjecture on ECDSA Protocols N. Vijayarangan, Nitin Agarwal, S. Kasilingam
2003/075 (PDF ) Almost Security of Cryptographic Boolean Functions Kaoru Kurosawa
2003/074 (PDF ) Divisible Voting Scheme Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
2003/073 (PDF ) A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures Sunder Lal, Amit K Awasthi
2003/072 (PDF ) Proxy Blind Signature Scheme Amit K Awasthi, Sunder Lal
2003/071 (PDF ) How to Protect Against a Militant Spammer Markus Jakobsson, John Linn, Joy Algesheimer
2003/070 (PDF ) A Critique of CCM P. Rogaway, D. Wagner
2003/069 (PDF ) EAX: A Conventional Authenticated-Encryption Mode M. Bellare, P. Rogaway, D. Wagner
2003/068 (PDF ) On the Security of Some Proxy Signature Schemes Hung-Min Sun, Bin-Tsan Hsieh
2003/067 (PDF ) Forking Lemmas in the Ring Signatures' Scenario Javier Herranz, Germán Sáez
2003/066 (PDF ) Signcryption scheme for Identity-based Cryptosystems Divya Nalla, K. C. Reddy
2003/065 (PDF ) Hash Function Balance and its Impact on Birthday Attacks Mihir Bellare, Tadayoshi Kohno
2003/064 (PDF ) On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod
2003/063 (PDF ) Initiator-Resilient Universally Composable Key Exchange Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/062 (PDF ) Extending Joux's Protocol to Multi Party Key Agreement Rana Barua, Ratna Dutta, Palash Sarkar
2003/061 (PDF ) Hidden Polynomial Cryptosystems Ilia Toli
2003/060 (PDF ) Isomorphism Classes of Picard Curves over Finite Fields Jong Won Lee
2003/058 (PDF ) An Elliptic Curve Trapdoor System Edlyn Teske
2003/057 (PDF ) Secure Multiplication of Shared Secrets in the Exponent Mario Di Raimondo, Rosario Gennaro
2003/056 (PDF ) Computing of Trust in Distributed Networks Huafei Zhu, Bao Feng, Robert H. Deng
2003/055 (PDF ) A New Approach to Prevent Blackmailing in E-Cash Xiaofeng Chen, Fangguo Zhang, Yumin Wang
2003/054 (PDF ) ID based Cryptosystems with Pairing on Elliptic Curve Ryuichi SAKAI, Masao KASAHARA
2003/053 (PDF ) Tate-pairing implementations for tripartite key agreement Iwan Duursma, Hyang-Sook Lee
2003/052 (PDF ) Attacking RSA-based Sessions in SSL/TLS Vlastimil Klima, Ondrej Pokorny, Tomas Rosa
2003/051 (PDF ) How to Predict the Output of a Hardware Random Number Generator Markus Dichtl
2003/050 (PDF ) Concealment and its Applications to Authenticated Encryption Yevgeniy Dodis, Jee Hea An
2003/049 (PDF ) Hidden Number Problem in Small Subgroups Igor Shparlinski, Arne Winterhof
2003/048 (PDF ) Compounding Secret Sharing Schemes E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
2003/047 (PDF ) A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme Masao KASAHARA, Ryuichi SAKAI
2003/046 (PDF ) Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers Guilin Wang, Bo Zhu
2003/045 (PDF ) An algorithm to obtain an RSA modulus with a large private key L. Hernández Encinas, J. Muñoz Masqué, A. Queiruga Dios
2003/042 (PDF ) Timed Fair Exchange of Standard Signatures Juan A. Garay, Carl Pomerance
2003/041 (PDF ) A new statistical distinguisher for the shrinking generator Jovan Dj. Golic, Renato Menicocci
2003/040 (PDF ) Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function Kishan Chand Gupta, Palash Sarkar
2003/039 (PDF ) Torus-based cryptography Karl Rubin, Alice Silverberg
2003/038 (PDF ) Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions Kazukuni Kobara, Hideki Imai
2003/037 (PDF ) Strengthening Zero-Knowledge Protocols using Signatures Juan A. Garay, Philip MacKenzie, Ke Yang
2003/036 (PDF ) Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem Jean-Sebastien Coron
2003/035 (PDF ) On alternative approach for verifiable secret sharing Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
2003/034 (PDF ) On the (In)security of the Fiat-Shamir Paradigm Shafi Goldwasser, Yael Tauman
2003/033 (PDF ) Integral Cryptanalysis on reduced-round Safer++ Gilles Piret, Jean-Jacques Quisquater
2003/032 (PDF ) A Framework for Password-Based Authenticated Key Exchange Rosario Gennaro, Yehuda Lindell
2003/031 (PDF ) Cryptographic Tamper Evidence Gene Itkis
2003/030 (PDF ) Efficient Multi-Party Computation over Rings Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz
2003/028 (PDF ) Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults Mathieu Ciet, Marc Joye
2003/027 (PDF ) Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, Helger Lipmaa
2003/026 (PDF ) Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update) Jan Pelzl, Thomas Wollinger, Jorge Guajardo, Christof Paar
2003/025 (PDF ) Homomorphic public-key cryptosystems and encrypting boolean circuits D. Grigoriev., I. Ponomarenko
2003/024 (PDF ) On Modeling IND-CCA Security in Cryptographic Protocols Dennis Hofheinz, Joern Mueller-Quade, Rainer Steinwandt
2003/023 (PDF ) New identity based signcryption schemes from pairings Benoît Libert, Jean-Jacques Quisquater
2003/022 (PDF ) Did Filiol Break AES ? Nicolas T. Courtois, Robert T. Johnson, Pascal Junod, Thomas Pornin, Michael Scott
2003/021 (PDF ) Interleaving Cryptography and Mechanism Design: The Case of Online Auctions Edith Elkind, Helger Lipmaa
2003/020 (PDF ) Attacks based on Conditional Correlations against the Nonlinear Filter Generator Bernhard Löhlein
2003/019 (PDF ) A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem Jung Hee Cheon, Byungheup Jun
2003/018 (PDF ) An Authenticated Group Key Agreement Protocol on Braid groups HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
2003/017 (PDF ) Perfect Hash Families with Few Functions Simon R. Blackburn
2003/016 (PDF ) A Threshold GQ Signature Scheme Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng
2003/015 (PDF ) A Universally Composable Cryptographic Library Michael Backes, Birgit Pfitzmann, Michael Waidner
2003/014 (PDF ) Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation Palash Sarkar
2003/013 (PDF ) Security Constraints on the Oswald-Aigner Exponentiation Algorithm Colin D. Walter
2003/012 (PDF ) The number of initial states of the RC4 cipher with the same cycle structure Marina Pudovkina
2003/011 (PDF ) Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme Fangguo Zhang, Kwangjo Kim
2003/010 (PDF ) Differential Fault Analysis on A.E.S. O. Vivolo, P. Dusart, G. Letourneux
2003/009 (PDF ) Domain Extenders for UOWHF: A Finite Binary Tree Algorithm Palash Sarkar
2003/008 (PDF ) DFA on AES Christophe Giraud
2003/006 (PDF ) Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003/005 (PDF ) Distributing the Encryption and Decryption of a Block Cipher Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang, Peter R. Wild
2003/004 (PDF ) ID-based tripartite Authenticated Key Agreement Protocols from pairings Divya Nalla, K. C. Reddy
2003/003 (PDF ) Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case Eric FILIOL
2003/002 (PDF ) Imperfect Decryption and an Attack on the NTRU Encryption Scheme John Proos
2003/001 (PDF ) A Mode of Operation with Partial Encryption and Message Integrity Philip Hawkes, Gregory G. Rose
[ Cryptology ePrint archive ]