Cryptology ePrint Archive: Listing for 2004
Regex
2004/377 (PDF ) New Distributed Ring Signatures for General Families of Signing Subsets Javier Herranz, Germán Sáez
2004/376 (PDF ) Cryptanalysis of RCES/RSES Image Encryption Scheme Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo
2004/375 (PDF ) Efficient Pairing Computation on Supersingular Abelian Varieties Paulo S. L. M. Barreto, Steven Galbraith, Colm O hEigeartaigh, Michael Scott
2004/374 (PDF ) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo
2004/373 (PDF ) Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang, Dingyi Pei, Zhuojun Liu
2004/371 (PDF ) Construction and Traversal of Hash Chain with Public Links Vipul Goyal
2004/370 (PDF ) Tracing-by-Linking Group Signautres Victor K. Wei
2004/369 (PDF ) SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks Filipe Rosado da-Fonseca
2004/368 (PDF ) Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek
2004/367 (PDF ) On the Affine Transformations of HFE-Cryptosystems and Systems with Branches Patrick Felke
2004/366 (PDF ) Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita
2004/365 (PDF ) Ordinary abelian varieties having small embedding degree Steven D. Galbraith, J. McKee, P. Valenca
2004/364 (PDF ) Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz, Josef Pieprzyk
2004/363 (PDF ) Rethinking the security of some authenticated group key agreement schemes Qiang Tang, Chris J. Mitchell
2004/362 (PDF ) A new security proof for Damgård's ElGamal Kristian Gjøsteen
2004/361 (PDF ) Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf, Bart Preneel
2004/360 (PDF ) Equivalent Keys in HFE, C$^*$, and variations Christopher Wolf, Bart Preneel
2004/359 (PDF ) Secure Computation of the Mean and Related Statistics Eike Kiltz, Gregor Leander, John Malone-Lee
2004/358 (PDF ) Reusable Cryptographic Fuzzy Extractors Xavier Boyen
2004/357 (PDF ) MD5 To Be Considered Harmful Someday Dan Kaminsky
2004/356 (PDF ) Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle
2004/355 (PDF ) A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting, Po-Yueh Hung
2004/354 (PDF ) Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra Alexander Maximov
2004/353 (PDF ) Direct Division in Factor Rings Patrick Fitzpatrick, Christopher Wolf
2004/352 (PDF ) Practical Cryptography in High Dimensional Tori Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David Woodruff
2004/350 (PDF ) Multivariable public--key cryptosystems Jintai Ding, Dieter Schmidt
2004/349 (PDF ) A DPA Attack on the Improved Ha-Moon Algorithm Dong Jin PARK, Pil Joong LEE
2004/348 (PDF ) A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords Junghyun Nam, Seungjoo Kim, Dongho Won
2004/347 (PDF ) Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields'' Marco Macchetti
2004/346 (PDF ) Random Switching Logic: A Countermeasure against DPA based on Transition Probability Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
2004/345 (PDF ) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
2004/344 (PDF ) Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte
2004/343 (PDF ) Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols Kim-Kwang Raymond Choo
2004/342 (PDF ) A comb method to render ECC resistant against Side Channel Attacks Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
2004/341 (PDF ) Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli
2004/340 (PDF ) Request for Review of Key Wrap Algorithms Morris Dworkin
2004/339 (PDF ) Divisors in Residue Classes, Constructively Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj
2004/338 (PDF ) Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2004/337 (PDF ) Security on Generalized Feistel Scheme with SP Round Function Wu Wenling, Zhang Wentao, Lin Dongdai
2004/336 (PDF ) Oblivious Transfer Is Symmetric Stefan Wolf, Jürg Wullschleger
2004/335 (PDF ) Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions Haitner Iftach, Shaltiel Ronen
2004/334 (PDF ) Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange) Ran Canetti, Jonathan Herzog
2004/333 (PDF ) Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem Marius-Calin Silaghi
2004/332 (PDF ) Sequences of games: a tool for taming complexity in security proofs Victor Shoup
2004/331 (PDF ) Code-Based Game-Playing Proofs and the Security of Triple Encryption Mihir Bellare, Phillip Rogaway
2004/330 (PDF ) Multicollision Attacks on Generalized Hash Functions M. Nandi, D. R. Stinson
2004/329 (PDF ) Hardness amplification of weakly verifiable puzzles Ran Canetti, Shai Halevi, Michael Steiner
2004/327 (PDF ) Efficient Identity Based Ring Signature Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui
2004/326 (PDF ) Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme Zhengjun Cao
2004/325 (PDF ) Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules Mitsuhiro HATTORI, Shoichi HIROSE, Susumu YOSHIDA
2004/324 (PDF ) On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions G. Laccetti, G. Schmid
2004/323 (PDF ) A note on López-Dahab coordinates Tanja Lange
2004/322 (PDF ) Separable and Anonymous Identity-Based Key Issuing Ai-fen Sui, Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, H. W. Chan
2004/321 (PDF ) The conjugacy search problem in public key cryptography: unnecessary and insufficient Vladimir Shpilrain, Alexander Ushakov
2004/320 (PDF ) Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults Alfonso De Gregorio
2004/319 (PDF ) Badger - A Fast and Provably Secure MAC Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner
2004/318 (PDF ) Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation Martin Hirt, Jesper Buus Nielsen
2004/317 (PDF ) Adaptively-Secure, Non-Interactive Public-Key Encryption Ran Canetti, Shai Halevi, Jonathan Katz
2004/316 (PDF ) On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme Zhengjun Cao
2004/315 (PDF ) Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes Qin Wang, Zhenfu Cao
2004/314 (PDF ) A Technical Comparison of IPSec and SSL AbdelNasir Alshamsi, Takamichi Saito
2004/313 (PDF ) Cryptanalysis of a threshold proxy signature with known signers Fuw-Yi Yang, Jinn-Ke Jan, Woei-Jiunn Jeng
2004/312 (PDF ) Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves David Jao, Stephen D. Miller, Ramarathnam Venkatesan
2004/311 (PDF ) Hierarchical Group Signatures Marten Trolin, Douglas Wikstrom
2004/310 (PDF ) A Verifiable Random Function With Short Proofs and Keys Yevgeniy Dodis, Aleksandr Yampolskiy
2004/309 (PDF ) The Power of Verification Queries in Message Authentication and Authenticated Encryption Mihir Bellare, Oded Goldreich, Anton Mityagin
2004/308 (PDF ) Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement Guohong Xie
2004/307 (PDF ) Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme Zhengjun Cao
2004/306 (PDF ) The Static Diffie-Hellman Problem Daniel R. L. Brown, Robert P. Gallant
2004/305 (PDF ) A note on efficient computation of cube roots in characteristic 3 Paulo S. L. M. Barreto
2004/304 (PDF ) Second Preimages on n-bit Hash Functions for Much Less than 2^n Work John Kelsey, Bruce Schneier
2004/303 (PDF ) Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields Soonhak Kwon
2004/302 (PDF ) Security of Wang-Li Threshold Signature Scheme Lifeng Guo
2004/301 (PDF ) VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme Bartosz Zoltak
2004/300 (PDF ) Relating Symbolic and Cryptographic Secrecy Michael Backes, Birgit Pfitzmann
2004/299 (PDF ) Security Flaws in a Pairing-based Group Signature Scheme Zhengjun Cao, Sherman S. M. Chow
2004/298 (PDF ) Nominative Proxy Signature Schemes Zuo-Wen Tan, Zhuo-Jun Liu
2004/297 (PDF ) Post-Quantum Signatures Johannes Buchmann, Carlos Coronado, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann
2004/296 (PDF ) Designs of Efficient Secure Large Hash Values Mridul Nandi
2004/295 (PDF ) An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security Jiang Wu, Ruizhong Wei
2004/294 (PDF ) Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher Souradyuti Paul, Bart Preneel
2004/293 (PDF ) Provably Secure Authentication of Digital Media Through Invertible Watermarks Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
2004/292 (PDF ) Asynchronous Proactive RSA Ruishan Zhang, Kefei Chen
2004/291 (PDF ) The Rabbit Stream Cipher - Design and Security Analysis Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner
2004/290 (PDF ) The Security of the FDH Variant of Chaum's Undeniable Signature Scheme Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
2004/289 (PDF ) Fault attack on the DVB Common Scrambling Algorithm Kai Wirt
2004/287 (PDF ) Almost Ideal Contrast Visual Cryptography with Reversing Duong Quang Viet, Kaoru Kurosawa
2004/286 (PDF ) Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions Daniele Micciancio
2004/285 (PDF ) Generation of random Picard curves for cryptography Annegret Weng
2004/284 (PDF ) ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui
2004/283 (PDF ) Fault and Side-Channel Attacks on Pairing Based Cryptography D. Page, F. Vercauteren
2004/282 (PDF ) New Monotone Span Programs from Old Ventzislav Nikov, Svetla Nikova
2004/281 (PDF ) Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation Patrick P. Tsang, Victor K. Wei
2004/280 (PDF ) Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme Zhengjun Cao
2004/279 (PDF ) Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien
2004/278 (PDF ) The Extended Codebook (XCB) Mode of Operation David A. McGrew, Scott R. Fluhrer
2004/277 (PDF ) Experimenting with Faults, Lattices and the DSA David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
2004/276 (PDF ) Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions C. Carlet
2004/275 (PDF ) An e-Voting Scheme with Improved Resistance to Bribe and Coercion Wei-Chi Ku, Chun-Ming Ho
2004/274 (PDF ) A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS Meng Qing-shu, Yang min, Zhang huan-guo, Cui jing-song
2004/273 (PDF ) Cryptanalysis of Threshold-Multisignature schemes Lifeng Guo
2004/272 (PDF ) A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security Tom Shrimpton
2004/271 (PDF ) The Mundja Streaming MAC Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/270 (PDF ) An Enhanced and Secure Protocol for Authenticated Key Exchange Fuw-Yi Yang, Jinn-Ke Jan
2004/269 (PDF ) Cryptanalysis of Threshold-Multisignature Schemes Lifeng Guo
2004/268 (PDF ) Untraceability of Wang-Fu Group Signature Scheme Zhengjun Cao, Lihua Liu
2004/267 (PDF ) Separable Linkable Threshold Ring Signatures Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
2004/266 (PDF ) A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods M. Khabbazian, T. A. Gulliver
2004/265 (PDF ) sSCADA: Securing SCADA Infrastructure Communications Yongge Wang, Bei-Tseng Chu
2004/264 (PDF ) Musings on the Wang et al. MD5 Collision Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/263 (PDF ) Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems Christopher Wolf, Bart Preneel
2004/262 (PDF ) Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. Lihua Liu, Zhengjun Cao
2004/261 (PDF ) Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption Dan Boneh, Jonathan Katz
2004/260 (PDF ) Secure Group Communications over Combined Wired/Wireless Networks Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won
2004/259 (PDF ) On Boolean Functions with Generalized Cryptographic Properties An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
2004/258 (PDF ) Escrow-Free Encryption Supporting Cryptographic Workflow S. S. Al-Riyami, J. Malone-Lee, N. P. Smart
2004/257 (PDF ) A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme Junghyun Nam, Seungjoo Kim, Dongho Won
2004/256 (PDF ) On the supports of the Walsh transforms of Boolean functions Claude Carlet, Sihem Mesnager
2004/255 (PDF ) A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
2004/254 (PDF ) New paradigms for digital generation and post-processing of random data Jovan Dj. Golic
2004/253 (PDF ) Design Principles for Iterated Hash Functions Stefan Lucks
2004/252 (PDF ) Security Proofs for Identity-Based Identification and Signature Schemes Mihir Bellare, Chanathip Namprempre, Gregory Neven
2004/251 (PDF ) Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices Junghyun Nam, Seungjoo Kim, Dongho Won
2004/250 (PDF ) Identity Based Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/249 (PDF ) Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng, Richard Comley
2004/248 (PDF ) Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties An Braeken, Yuri Borissov, Svetla Nikova, Bart Preneel
2004/247 (PDF ) Vectorial fast correlation attacks Jovan Dj. Golic, Guglielmo Morgari
2004/246 (PDF ) Upper and Lower Bounds on Black-Box Steganography Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
2004/245 (PDF ) On codes, matroids and secure multi-party computation from linear secret sharing schemes Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jimenez Urroz, Gregor Leander, Jaume Marti-Farre, Carles Padro
2004/244 (PDF ) Signcryption in Hierarchical Identity Based Cryptosystem Sherman S. M. Chow, Tsz Hon Yuen, Lucas C. K. Hui, S. M. Yiu
2004/243 (PDF ) On the Key Exposure Problem in Chameleon Hashes Giuseppe Ateniese, Breno de Medeiros
2004/242 (PDF ) Combinatorial group theory and public key cryptography Vladimir Shpilrain, Gabriel Zapata
2004/241 (PDF ) A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2 Colm O hEigeartaigh
2004/240 (PDF ) A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura
2004/239 (PDF ) Geometric Key Establishment Arkady Berenstein, Leon Chernyak
2004/238 (PDF ) Security Analysis of A Dynamic ID-based Remote User Authentication Scheme Amit K Awasthi, Sunder Lal
2004/237 (PDF ) Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC Christopher Wolf, An Braeken, Bart Preneel
2004/236 (PDF ) Forgery Attacks on Chang et al.'s signature scheme with message recovery FU Xiaotong, XU Chunxiang, XIAO Guozhen
2004/235 (PDF ) Cryptographic Implications of Hess' Generalized GHS Attack Alfred Menezes, Edlyn Teske
2004/234 (PDF ) On the security of some nonrepudiable threshold proxy signature schemes with known signers Zuo-Wen Tan, Zhuo-Jun Liu
2004/233 (PDF ) Password-Based Authenticated Key Exchange in the Three-Party Setting Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
2004/232 (PDF ) Extending the Resynchronization Attack Frederik Armknecht, Joseph Lano, Bart Preneel
2004/231 (PDF ) Timed-Release and Key-Insulated Public Key Encryption Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
2004/230 (PDF ) A Provable Secure Scheme for Partially Blind Signatures Fuw-Yi Yang, Jinn-Ke Jan
2004/229 (PDF ) Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes Xin Lu, Zhi Ma, Dengguo Feng
2004/228 (PDF ) DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$ Honggang Hu, Dengguo Feng
2004/227 (PDF ) Sign Change Fault Attacks On Elliptic Curve Cryptosystems Johannes Blömer, Martin Otto, Jean-Pierre Seifert
2004/226 (PDF ) Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak, Yehuda Lindell, Salil Vadhan
2004/225 (PDF ) Vectorial Boolean functions and induced algebraic equations Jovan Dj. Golic
2004/224 (PDF ) The Polynomial Composition Problem in (Z/nZ)[X] Marc Joye, David Naccache, Stephanie Porte
2004/223 (PDF ) Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves Xinxin Fan, Yumin Wang
2004/222 (PDF ) A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes An Braeken, Christopher Wolf, Bart Preneel
2004/221 (PDF ) Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare, Adriana Palacio
2004/220 (PDF ) On Oleshchuk's Public Key Cryptosystem Heiko Stamer, Friedrich Otto
2004/219 (PDF ) Entropic Security and the Encryption of High Entropy Messages Yevgeniy Dodis, Adam Smith
2004/218 (PDF ) Plaintext-Simulatability Eiichiro Fujisaki
2004/217 (PDF ) Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice Aggelos Kiayias, Moti Yung
2004/216 (PDF ) Tree Parity Machine Rekeying Architectures Markus Volkmer, Sebastian Wallner
2004/215 (PDF ) Transitive Signatures: New Schemes and Proofs Mihir Bellare, Gregory Neven
2004/214 (PDF ) Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality An Braeken, Christopher Wolf, Bart Preneel
2004/213 (PDF ) Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery Fangguo Zhang
2004/212 (PDF ) ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
2004/211 (PDF ) Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing Ian F. Blake, Aldar C-F. Chan
2004/210 (PDF ) Hybrid Cryptography Alexander W. Dent
2004/209 (PDF ) The Security and Efficiency of Micciancio's Cryptosystem Christoph Ludwig
2004/208 (PDF ) Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring Jean-Sebastien Coron, Alexander May
2004/207 (PDF ) On Corrective Patterns for the SHA-2 Family Philip Hawkes, Michael Paddon, Gregory G. Rose
2004/206 (PDF ) ID-Based Proxy Signature Using Bilinear Pairings Jing Xu, Zhenfeng Zhang, Dengguo Feng
2004/205 (PDF ) Direct Anonymous Attestation Ernie Brickell, Jan Camenisch, Liqun Chen
2004/204 (PDF ) Authenticated tree parity machine key exchange Markus Volkmer, Andre Schaumburg
2004/203 (PDF ) How to Cheat at Chess: A Security Analysis of the Internet Chess Club John Black, Martin Cochran, Ryan Gardner
2004/202 (PDF ) Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions Yuri Borissov, An Braeken, Svetla Nikova
2004/201 (PDF ) Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He
2004/200 (PDF ) On Cheating Immune Secret Sharing An Braeken, Svetla Nikova, Ventzislav Nikov
2004/199 (PDF ) Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu
2004/198 (PDF ) Long Modular Multiplication for Cryptographic Applications Laszlo Hars
2004/197 (PDF ) SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation Helmut Kahl
2004/196 (PDF ) Password Based Key Exchange with Mutual Authentication Shaoquan Jiang, Guang Gong
2004/195 (PDF ) Signed Binary Representations Revisited Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
2004/194 (PDF ) A Note on An Encryption Scheme of Kurosawa and Desmedt Rosario Gennaro, Victor Shoup
2004/193 (PDF ) The Security and Performance of the Galois/Counter Mode of Operation (Full Version) David A. McGrew, John Viega
2004/191 (PDF ) Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations Pradeep Kumar Mishra
2004/190 (PDF ) Distributed Ring Signatures for Identity-Based Scenarios Javier Herranz, Germán Sáez
2004/189 (PDF ) Computing Modular Polynomials Denis Charles, Kristin Lauter
2004/188 (PDF ) Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
2004/187 (PDF ) Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater
2004/185 (PDF ) On the Existence of low-degree Equations for Algebraic Attacks Frederik Armknecht
2004/184 (PDF ) ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings Amit K Awasthi, Sunder Lal
2004/183 (PDF ) A New Forward Secure Signature Scheme Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
2004/182 (PDF ) Simpler Session-Key Generation from Short Random Passwords Minh-Huyen Nguyen, Salil Vadhan
2004/181 (PDF ) On the Composition of Authenticated Byzantine Agreement Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
2004/180 (PDF ) Efficient Identity-Based Encryption Without Random Oracles Brent R. Waters
2004/179 (PDF ) Identity Based Threshold Ring Signature Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2004/178 (PDF ) Optimal Updating of Ideal Threshold Schemes S. G. Barwick, W. -A. Jackson, K. M. Martin, C. M. O'Keefe
2004/177 (PDF ) Updating the Parameters of a Threshold Scheme by Minimal Broadcast S. G. Barwick, W. -A. Jackson, K. M. Martin
2004/176 (PDF ) A Biometric Identity Based Signature Scheme Andrew Burnett, Adam Duffy, Tom Dowling
2004/175 (PDF ) A Proof of Yao's Protocol for Secure Two-Party Computation Yehuda Lindell, Benny Pinkas
2004/174 (PDF ) Short Group Signatures Dan Boneh, Xavier Boyen, Hovav Shacham
2004/173 (PDF ) Secure Identity Based Encryption Without Random Oracles Dan Boneh, Xavier Boyen
2004/172 (PDF ) Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles Dan Boneh, Xavier Boyen
2004/171 (PDF ) Short Signatures Without Random Oracles Dan Boneh, Xavier Boyen
2004/170 (PDF ) Efficient Consistency Proofs for Generalized Queries on a Committed Database Rafail Ostrovsky, Charles Rackoff, Adam Smith
2004/169 (PDF ) Regional Blackouts: Protection of Broadcast Content on 3G Networks. Alexander W. Dent, Allan Tomlinson
2004/168 (PDF ) Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack T. Moh, J. M. Chen, Boyin Yang
2004/167 (PDF ) A Secure and Efficient Key Exchange Protocol for Mobile Communications Fuw-Yi Yang, Jinn-Ke Jan
2004/166 (PDF ) FRMAC, a Fast Randomized Message Authentication Code Eliane Jaulmes, Reynald Lercier
2004/165 (PDF ) A comparison of MNT curves and supersingular curves D. Page, N. P. Smart, F. Vercauteren
2004/164 (PDF ) ID-based Cryptography from Composite Degree Residuosity Man Ho Au, Victor K. Wei
2004/162 (PDF ) On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission Ivan Damgaard, Thomas Pedersen, Louis Salvail
2004/161 (PDF ) Improvement of Thériault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus Ko-ichi Nagao
2004/160 (PDF ) Scalable Public-Key Tracing and Revoking Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
2004/159 (PDF ) Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks Gergely Acs, Levente Buttyan, Istvan Vajda
2004/158 (PDF ) Mobile Terminal Security Olivier Benoit, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan
2004/157 (PDF ) Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three R. Granger, D. Page, M. Stam
2004/156 (PDF ) Quantum cryptography: a practical information security perspective Kenneth G. Paterson, Fred Piper, Ruediger Schack
2004/155 (PDF ) Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks Amir Herzberg, Ahmad Gbara
2004/154 (PDF ) Controlling Spam by Secure Internet Content Selection Amir Herzberg
2004/153 (PDF ) A double large prime variation for small genus hyperelliptic index calculus P. Gaudry, E. Thomë, N. Thëriault, C. Diem
2004/152 (PDF ) Another Look at ``Provable Security'' Neal Koblitz, Alfred Menezes
2004/151 (PDF ) Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$ Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi
2004/150 (PDF ) An Authenticated Certificateless Public Key Encryption Scheme Young-Ran Lee, Hyang-Sook Lee
2004/149 (PDF ) Secure and Efficient AES Software Implementation for Smart Caards E. Trichina, L. Korkishko
2004/148 (PDF ) Provably Secure Delegation-by-Certification Proxy Signature Schemes Zuowen Tan, Zhuojun Liu
2004/147 (PDF ) Key Recovery Method for CRT Implementation of RSA Matthew J. Campagna, Amit Sethi
2004/146 (PDF ) Near-Collisions of SHA-0 Eli Biham, Rafi Chen
2004/145 (PDF ) Electromagnetic Side Channels of an FPGA Implementation of AES Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier
2004/144 (PDF ) Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables Alexander Maximov, Martin Hell, Subhamoy Maitra
2004/143 (PDF ) Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash Nicolas T. Courtois
2004/141 (PDF ) Elastic AES Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/139 (PDF ) New Notions of Security: Achieving Universal Composability without Trusted Setup Manoj Prabhakaran, Amit Sahai
2004/138 (PDF ) How to Disembed a Program? Benoit Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval
2004/137 (PDF ) New GF(2n) Parallel Multiplier Using Redundant Representation Haining Fan, Yiqi Dai
2004/136 (PDF ) CompChall: Addressing Password Guessing Attacks Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
2004/135 (PDF ) More Efficient Server Assisted One Time Signatures Vipul Goyal
2004/134 (PDF ) Secure and Efficient Masking of AES - A Mission Impossible? Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller
2004/133 (PDF ) Secret Handshakes from CA-Oblivious Encryption Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
2004/132 (PDF ) On Small Characteristic Algebraic Tori in Pairing-Based Cryptography R. Granger, D. Page, M. Stam
2004/131 (PDF ) A New ID-based Signature with Batch Verification Jung Hee Cheon, Yongdae Kim, Hyo Jin Yoon
2004/130 (PDF ) Private Inference Control David Woodruff, Jessica Staddon
2004/129 (PDF ) Generalizing Kedlaya's order counting based on Miura Theory Joe Suzuki
2004/128 (PDF ) Elastic Block Ciphers Debra L. Cook, Moti Yung, Angelos D. Keromytis
2004/127 (PDF ) DDH-based Group Key Agreement in a Mobile Environment Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won
2004/126 (PDF ) Two Software Normal Basis Multiplication Algorithms for GF(2n) Haining Fan, Yiqi Dai
2004/125 (PDF ) EME*: extending EME to handle arbitrary-length messages with associated data Shai Halevi
2004/124 (PDF ) Universally Composable DKG with Linear Number of Exponentiations Douglas Wikström
2004/123 (PDF ) On security of XTR public key cryptosystems against Side Channel Attacks Dong-Guk Han, Jongin Lim, Kouichi Sakurai
2004/122 (PDF ) A New Two-Party Identity-Based Authenticated Key Agreement Noel McCullagh, Paulo S. L. M. Barreto
2004/121 (PDF ) Fast and Proven Secure Blind Identity-Based Signcryption from Pairings Tsz Hon Yuen, Victor K. Wei
2004/120 (PDF ) Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup Bartosz Zoltak
2004/119 (PDF ) Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography Masayuki Abe, Serge Fehr
2004/118 (PDF ) Fast addition on non-hyperelliptic genus $3$ curves Stéphane Flon, Roger Oyono, Christophe Ritzenthaler
2004/117 (PDF ) Efficient and Forward-Secure Identity-Based Signcryption Noel McCullagh, Paulo S. L. M. Barreto
2004/116 (PDF ) On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
2004/115 (PDF ) Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won
2004/114 (PDF ) Improved Identity-Based Signcryption Liqun Chen, John Malone-Lee
2004/113 (PDF ) On the Security and Composability of the One Time Pad Dominik Raub, Rainer Steinwandt, Joern Mueller-Quade
2004/112 (PDF ) Relation between XL algorithm and Groebner Bases Algorithms M. Sugita, M. Kawazoe, H. Imai
2004/111 (PDF ) The Vulnerability of SSL to Chosen Plaintext Attack Gregory V. Bard
2004/110 (PDF ) Designing Against the `Overdefined System of Equations' Attack Carlisle Adams
2004/109 (PDF ) Concealing Complex Policies with Hidden Credentials Robert Bradshaw, Jason Holt, Kent Seamons
2004/108 (PDF ) Two Improved Partially Blind Signature Schemes from Bilinear Pairings Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu, K. P. Chow
2004/107 (PDF ) Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic Bertrand BYRAMJEE, Sylvain DUQUESNE
2004/106 (PDF ) Capacity and Examples of Template Protecting Biometric Authentication Systems P. Tuyls, J. Goseling
2004/105 (PDF ) Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti
2004/104 (PDF ) Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings Lan Nguyen, Rei Safavi-Naini
2004/103 (PDF ) Cryptanalysis of SFlash v3 Jintai Ding, Dieter Schmidt
2004/102 (PDF ) The Exact Security of an Identity Based Signature and its Applications Benoît Libert, Jean-Jacques Quisquater
2004/101 (PDF ) Provably Secure Masking of AES Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel
2004/100 (PDF ) The Sorcerer’s Apprentice Guide to Fault Attacks Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan
2004/099 (PDF ) Secure Hashed Diffie-Hellman over Non-DDH Groups Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2004/098 (PDF ) Attacking a Public Key Cryptosystem Based on Tree Replacement María Isabel González Vasco, David Pérez García
2004/097 (PDF ) How To Re-initialize a Hash Chain Vipul Goyal
2004/095 (PDF ) GNFS Factoring Statistics of RSA-100, 110, ..., 150 Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda
2004/094 (PDF ) Block Ciphers and Stream Ciphers: The State of the Art Alex Biryukov
2004/093 (PDF ) A Provably Secure Nyberg-Rueppel Signature Variant with Applications Giuseppe Ateniese, Breno de Medeiros
2004/092 (PDF ) A New Stream Cipher HC-256 Hongjun Wu
2004/091 (PDF ) Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili Narasimha, Gene Tsudik
2004/090 (PDF ) Provably Secure Authenticated Tree Based Group Key Agreement Protocol Ratna Dutta, Rana Barua, Palash Sarkar
2004/089 (PDF ) Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance Mahalingam Ramkumar, Nasir Memon
2004/087 (PDF ) Using primitive subgroups to do more with fewer bits K. Rubin, A. Silverberg
2004/086 (PDF ) Fuzzy Identity Based Encryption Amit Sahai, Brent Waters
2004/085 (PDF ) The CS2 Block Cipher Tom St Denis
2004/084 (PDF ) Evaluating elliptic curve based KEMs in the light of pairings David Galindo, Sebastia Martin, Jorge L. Villar
2004/083 (PDF ) Scan Based Side Channel Attack on Data Encryption Standard Bo Yang, Kaijie Wu, Ramesh Karri
2004/082 (PDF ) The Reactive Simulatability (RSIM) Framework for Asynchronous Systems Michael Backes, Birgit Pfitzmann, Michael Waidner
2004/081 (PDF ) Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers Philip Hawkes, Gregory G. Rose
2004/080 (PDF ) HENKOS Stream Cipher Marius Oliver Gheorghita
2004/079 (PDF ) Pairing-Based One-Round Tripartite Key Agreement Protocols Zhaohui Cheng, Luminita Vasiu, Richard Comley
2004/078 (PDF ) Analysis of the WinZip encryption method Tadayoshi Kohno
2004/077 (PDF ) Foundations of Group Signatures: The Case of Dynamic Groups Mihir Bellare, Haixia Shi, Chong Zhang
2004/076 (PDF ) Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders Aggelos Kiayias, Moti Yung
2004/075 (PDF ) An Hybrid Mode of Operation Alexis W. Machado
2004/074 (PDF ) Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael Liam Keliher, Henk Meijer, Stafford Tavares
2004/073 (PDF ) Index calculus for abelian varieties and the elliptic curve discrete logarithm problem Pierrick Gaudry
2004/072 (PDF ) Asymmetric Cryptography: Hidden Field Equations Christopher Wolf, Bart Preneel
2004/071 (PDF ) An IBE Scheme to Exchange Authenticated Secret Keys Waldyr Benits Jr, Routo Terada
2004/070 (PDF ) Easy decision-Diffie-Hellman groups Steven D Galbraith, Victor Rotger
2004/069 (PDF ) A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
2004/068 (PDF ) Synthesis of Secure FPGA Implementations Kris Tiri, Ingrid Verbauwhede
2004/067 (PDF ) Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis Kris Tiri, Ingrid Verbauwhede
2004/066 (PDF ) A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s. Kris Tiri, Ingrid Verbauwhede
2004/065 (PDF ) Refinements of Miller's Algorithm for Computing Weil/Tate Pairing Ian Blake, Kumar Murty, Guangwu Xu
2004/064 (PDF ) Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua, Palash Sarkar
2004/063 (PDF ) An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa
2004/062 (PDF ) On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions John Black, Martin Cochran, Thomas Shrimpton
2004/061 (PDF ) TTS: Rank Attacks in Tame-Like Multivariate PKCs Bo-Yin Yang, Jiun-Ming Chen
2004/060 (PDF ) Positive Results and Techniques for Obfuscation Benjamin Lynn, Manoj Prabhakaran, Amit Sahai
2004/059 (PDF ) Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library Michael Backes, Birgit Pfitzmann
2004/058 (PDF ) Generating more MNT elliptic curves Michael Scott, Paulo S. L. M Barreto
2004/057 (PDF ) On Multiple Linear Approximations Alex Biryukov, Christophe De Cannière, Michael Quisquater
2004/055 (PDF ) Redundant Trinomials for Finite Fields of Characteristic $2$ Christophe Doche
2004/054 (PDF ) Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
2004/053 (PDF ) Efficient and Universally Composable Committed Oblivious Transfer and Applications Juan Garay, Philip MacKenzie, Ke Yang
2004/052 (PDF ) The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures Tal Malkin, Satoshi Obana, Moti Yung
2004/051 (PDF ) Privacy Preserving Keyword Searches on Remote Encrypted Data Yan-Cheng Chang, Michael Mitzenmacher
2004/050 (PDF ) Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1 Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
2004/049 (PDF ) Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm Christophe Clavier
2004/048 (PDF ) Tail-MAC: A Message Authentication Scheme for Stream Ciphers Bartosz Zoltak
2004/047 (PDF ) On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes Yodai Watanabe
2004/046 (PDF ) Revision of Tractable Rational Map Cryptosystem Lih-Chung Wang, Fei-Hwang Chang
2004/045 (PDF ) Lower Bounds and Impossibility Results for Concurrent Self Composition Yehuda Lindell
2004/044 (PDF ) Transitive Signatures Based on Non-adaptive Standard Signatures Zhou Sujing
2004/043 (PDF ) Multi-sequences with d-perfect property Xiutao Feng, Quanlong Wang, Zongduo Dai
2004/041 (PDF ) Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries Cheng-Kang Chu, Wen-Guey Tzeng
2004/040 (PDF ) Cryptanalysis of a timestamp-based password authentication scheme Lizhen Yang, Kefei Chen
2004/039 (PDF ) A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups Victor K. Wei
2004/038 (PDF ) Chameleon Hashing without Key Exposure Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2004/037 (PDF ) A Provably Secure Scheme for Restrictive Partially Blind Signatures Fuw-Yi Yang, Jinn-Ke Jan
2004/036 (PDF ) Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang
2004/035 (PDF ) Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance Phillip Rogaway, Thomas Shrimpton
2004/034 (PDF ) s(n) An Arithmetic Function of Some Interest, and Related Arithmetic Gideon Samid
2004/033 (PDF ) New Approaches to Password Authenticated Key Exchange based on RSA Muxiang Zhang
2004/032 (PDF ) Compressed Pairings Michael Scott, Paulo S. L. M. Barreto
2004/031 (PDF ) Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev
2004/030 (PDF ) Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$. Colin Stahlke
2004/029 (PDF ) Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems Guido Bertoni, Luca Breveglieri, Thomas Wollinger, Christof Paar
2004/028 (PDF ) Custodian-Hiding Verifiable Encryption Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/027 (PDF ) Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups Joseph K. Liu, Victor K. Wei, Duncan S. Wong
2004/026 (PDF ) The CSQUARE Transform Tom St Denis
2004/025 (PDF ) Clarifying Obfuscation: Improving the Security of White-Box Encoding Hamilton E. Link, William D. Neumann
2004/024 (PDF ) Exponential S-boxes Sergey Agievich, Andrey Afonenko
2004/023 (PDF ) RDS: Remote Distributed Scheme for Protecting Mobile Agents Asnat Dadon-Elichai
2004/022 (PDF ) Privacy-Enhanced Searches Using Encrypted Bloom Filters Steven M. Bellovin, William R. Cheswick
2004/021 (PDF ) Externalized Fingerprint Matching Claude Barral, Jean-Sébastien Coron, David Naccache
2004/020 (PDF ) Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
2004/019 (PDF ) New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms Tetsu Iwata, Tadayoshi Kohno
2004/018 (PDF ) Corrections of the NIST Statistical Test Suite for Randomness Song-Ju Kim, Ken Umeno, Akio Hasegawa
2004/017 (PDF ) Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints M. Scott
2004/016 (PDF ) A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer Dennis Hofheinz, Joern Mueller-Quade
2004/015 (PDF ) An AGM-type elliptic curve point counting algorithm in characteristic three Trond Stølen Gustavsen, Kristian Ranestad
2004/014 (PDF ) Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions Sugata Gangopadhyay, Subhamoy Maitra
2004/013 (PDF ) Cryptanalysis of a Provably Secure Cryptographic Hash Function Jean-Sebastien Coron, Antoine Joux
2004/012 (PDF ) Pitfalls in public key cryptosystems based on free partially commutative monoids and groups Maria Isabel Gonzalez Vasco, Rainer Steinwandt
2004/011 (PDF ) Known-Plaintext Attack Against a Permutation Based Video Adam J. Slagell
2004/010 (PDF ) Fast Pseudo-Hadamard Transforms Tom St Denis
2004/009 (PDF ) Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay, Philip MacKenzie, Ke Yang
2004/008 (PDF ) The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols Mihir Bellare, Adriana Palacio
2004/007 (PDF ) Traceable Signatures Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
2004/006 (PDF ) Protocol Initialization for the Framework of Universal Composability Boaz Barak, Yehuda Lindell, Tal Rabin
2004/005 (PDF ) Universal Undeniable Signatures Huafei Zhu
2004/003 (PDF ) On the Role of the Inner State Size in Stream Ciphers Erik Zenner
2004/002 (PDF ) Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation Yuichi Komano, Kazuo Ohta
[ Cryptology ePrint archive ]