Cryptology ePrint Archive: Listing for 2001


2001/113 ( PDF )
Efficient Revocation of Anonymous Group Membership
Jan Camenisch and Anna Lysyanskaya
2001/112 ( PS PS.GZ PDF )
A Proposal for an ISO Standard for Public Key Encryption
Victor Shoup
2001/111 ( PS PS.GZ )
An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
N.P. Smart
2001/110 ( PS PS.GZ )
RSA hybrid encryption schemes
Louis Granboulan
2001/109 ( PDF )
New Notions of Soundness and Simultaneous Resettability in the Public-Key Model
Yunlei ZHAO
2001/108 ( PS PS.GZ PDF )
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
Ronald Cramer and Victor Shoup
2001/107 ( PS PS.GZ PDF )
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
Yehuda Lindell
2001/106 ( PS PS.GZ PDF )
Cryptanalysis of the COS (2,128) Stream Ciphers
Steve Babbage
2001/105 ( PS PS.GZ )
Universal Arguments and their Applications
Boaz Barak and Oded Goldreich
2001/104 ( PS PS.GZ )
Concurrent Zero-Knowledge With Timing, Revisited
Oded Goldreich
2001/103 ( PS PS.GZ PDF )
Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
Antonio Bellezza
2001/102 ( PS PS.GZ PDF )
An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates
Ivan Damg{\aa}rd and Gudmund Frandsen
2001/101 ( PDF )
Quasi-Efficient Revocation of Group Signatures
Giuseppe Ateniese and Dawn Song and Gene Tsudik
2001/100 ( PS PS.GZ )
A Note on Girault's Self-Certified Model
Shahrokh Saeednia
2001/099 ( PS PS.GZ )
Linear Code Implies Public-Key Traitor Tracing
Kaoru Kurosawa and Takuya Yoshida
2001/098 ( PS PS.GZ PDF )
Fast hashing onto elliptic curves over fields of characteristic 3
Paulo S. L. M. Barreto and Hae Yong Kim
2001/097 ( PS PS.GZ )
An Efficient MAC for Short Messages
Sarvar Patel
2001/096 ( PS PS.GZ )
Constructing elliptic curves with a given number of points over a finite field
Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan
2001/095 ( PS PS.GZ PDF )
Secure Vickrey Auctions without Threshold Trust
Helger Lipmaa and N. Asokan and Valtteri Niemi
2001/094 ( PS PS.GZ )
Slope packings and coverings, and generic algorithms for the discrete logarithm problem
M. Chateauneuf and A.C.H. Ling and D.R. Stinson
2001/093 ( PS PS.GZ PDF )
Threshold Cryptosystems Based on Factoring
Jonathan Katz and Moti Yung
2001/092 ( PS PS.GZ PDF )
BDD-based Cryptanalysis of Keystream Generators
Matthias Krause
2001/091 ( PS PS.GZ PDF )
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
Ivan Damgĺrd and Jesper B. Nielsen
2001/090 ( PS PS.GZ PDF )
Identity Based Encryption From the Weil Pairing
Dan Boneh and Matthew Franklin
2001/089 ( PS PS.GZ )
Linear broadcast encryption schemes
Carles Padró and Ignacio Gracia and Sebastiŕ Martín and Paz Morillo
2001/088 ( PS PS.GZ PDF )
Improving the trade-off between storage and communication in broadcast encryption schemes
Ignacio Gracia and Sebastiŕ Martín and Carles Padró
2001/087 ( PS PS.GZ )
A Linear Algebraic Approach to Metering Schemes
C. Blundo and S. Martěn and B. Masucci and C. Padrň
2001/086 ( PS PS.GZ )
Statistical Zero-Knowledge Proofs from Diophantine Equations
Helger Lipmaa
2001/085 ( PS PS.GZ PDF )
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Ronald Cramer and Victor Shoup
2001/084 ( PS PS.GZ )
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
Markus Maurer and Alfred Menezes and Edlyn Teske
2001/083 ( PS PS.GZ )
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
Maria Fedorova and Yuriy Tarannikov
2001/082 ( PDF )
A Description of Protocols for Private Credentials
Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton Stiglic
2001/081 ( PS PS.GZ PDF )
A Sufficient Condition for Secure Ping--Pong Protocols
Masao Mori
2001/080 ( PS PS.GZ )
COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers
Eric Filiol and Caroline Fontaine
2001/079 ( PS PS.GZ )
Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses
Jee Hea An
2001/078 ( PS PS.GZ PDF )
The COS Stream Ciphers are Extremely Weak
Steve Babbage
2001/077 ( PS PS.GZ PDF )
A Time-Memory Tradeoff Attack Against LILI-128
Markku-Juhani Olavi Saarinen
2001/076 ( PS PS.GZ )
Communication Complexity and Secure Function Evaluation
Moni Naor and Kobbi Nissim
2001/075 ( PS PS.GZ )
Pseudo-Random Functions and Factoring
Moni Naor and Omer Reingold and Alon Rosen
2001/074 ( PS PS.GZ )
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction
Eliane Jaulmes and Antoine Joux and Frederic Valette
2001/073 ( PS PS.GZ )
Efficient oblivious transfer schemes
Wen-Guey Tzeng
2001/072 ( PS PS.GZ PDF )
On the Goubin-Courtois Attack on TTM
T.Moh and Jiun-Ming Chen
2001/071 ( PS PS.GZ )
Multi-Recipient Public-Key Encryption with Shortened Ciphertext
Kaoru Kurosawa
2001/070 ( PS PS.GZ PDF )
Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)
Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi Kawamura
2001/069 ( PS PS.GZ )
On the (Im)possibility of Obfuscating Programs
Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang
2001/068 ( PS PS.GZ PDF )
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and J.Vandewalle and H.Y.Kim
2001/067 ( PDF )
An Attack on A Traitor Tracing Scheme
Jeff Jianxin Yan and Yongdong Wu
2001/066 ( PS PS.GZ )
IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS
SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON KIM
2001/065 ( PS PS.GZ PDF )
Analysis of chosen plaintext attacks on the WAKE Stream Cipher
Marina Pudovkina
2001/064 ( PS PS.GZ )
An Integer Commitment Scheme based on Groups with Hidden Order
Ivan Damgard and Eiichiro Fujisaki
2001/063 ( PS PS.GZ PDF )
Resettably-Sound Zero-Knowledge and its Applications
Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell
2001/062 ( PS PS.GZ PDF )
Optimal security proofs for PSS and other signature schemes
Jean-Sébastien Coron
2001/061 ( PS PS.GZ PDF )
Clock-Controlled Shift Registers for Key-Stream Generation
Alexander Kholosha
2001/060 ( PS PS.GZ PDF )
The Security of Practical Two-Party RSA Signature Schemes
Mihir Bellare and Ravi Sandhu
2001/059 ( PDF )
Revocation and Tracing Schemes for Stateless Receivers
Dalit Naor and Moni Naor and Jeff Lotspiech
2001/058 ( PS PS.GZ PDF )
Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank
Nicolas T. Courtois
2001/057 ( PS PS.GZ PDF )
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
Philip MacKenzie
2001/056 ( PS PS.GZ PDF )
On the Complexity of Matsui's Attack
P. Junod
2001/055 ( PS PS.GZ PDF )
Universally Composable Commitments
Ran Canetti and Marc Fischlin
2001/054 ( PS PS.GZ )
Extending the GHS Weil Descent Attack
S.D. Galbraith and F. Hess and N.P. Smart
2001/053 ( PS PS.GZ )
Security Proofs for the RSA-PSS Signature Scheme and Its Variants
Jakob Jonsson
2001/052 ( PDF )
Differential Probability of Modular Addition with a Constant Operand
Alexis Warner Machado
2001/051 ( PS PS.GZ )
Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds
Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
2001/050 ( PS PS.GZ )
Elliptic curve Paillier schemes
Steven D Galbraith
2001/049 ( PS PS.GZ PDF )
A known plaintext attack on the ISAAC keystream generator
Marina Pudovkina
2001/048 ( PS PS.GZ PDF )
Forward-Secure Signatures with Optimal Signing and Verifying
Gene Itkis and Leonid Reyzin
2001/047 ( PS PS.GZ )
ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
T.MOH
2001/046 ( PS PS.GZ )
The simple ideal cipher system
Boris Ryabko
2001/045 ( PS PS.GZ )
The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
Hugo Krawczyk
2001/044 ( PS PS.GZ )
Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds
Birgit Baum-Waidner
2001/043 ( PS PS.GZ PDF )
Cryptanalysis of the Vesta-2M Stream Cipher
Marina Pudovkina
2001/042 ( PS PS.GZ )
Simple Forward-Secure Signatures From Any Signature Scheme
Hugo Krawczyk
2001/041 ( PS PS.GZ PDF )
Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent
Michael Jacobson and Alfred Menezes and Andreas Stein
2001/040 ( PS PS.GZ )
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Ran Canetti and Hugo Krawczyk
2001/039 ( PDF )
Robust Software Tokens: Towards Securing a Digital Identity
Taekyoung Kwon
2001/038 ( PS PS.GZ )
Flaws in differential cryptanalysis of Skipjack
Louis Granboulan
2001/037 ( PS PS.GZ PDF )
EMpowering Side-Channel Attacks
Josyula R. Rao and Pankaj Rohatgi
2001/036 ( PS PS.GZ )
Anti-persistence: History Independent Data Structures
Moni Naor and Vanessa Teague
2001/035 ( PS PS.GZ PDF )
Forward-Security in Private-Key Cryptography
Mihir Bellare and Bennet Yee
2001/034 ( PS PS.GZ )
Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures
Tal Malkin and Daniele Micciancio and Sara Miner
2001/033 ( PS PS.GZ PDF )
Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
Liam Keliher and Henk Meijer and Stafford Tavares
2001/032 ( PS PS.GZ PDF )
Efficient and Non-Interactive Non-Malleable Commitment
Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam Smith
2001/031 ( PS PS.GZ PDF )
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Jonathan Katz and Rafail Ostrovsky and Moti Yung
2001/030 ( PS PS.GZ PDF )
On the Power of Nonlinear Secret-Sharing
Amos Beimel and Yuval Ishai
2001/029 ( PS PS.GZ PDF )
On multivariate signature-only public key cryptosystems
Nicolas T. Courtois
2001/028 ( PS PS.GZ PDF )
Efficient Encryption for Rich Message Spaces Under General Assumptions
Alexander Russell and Hong Wang
2001/027 ( PS PS.GZ PDF )
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
John Black and Phillip Rogaway
2001/026 ( PS PS.GZ PDF )
OCB Mode
Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz
2001/025 ( -- withdrawn -- )
Cryptanalysis of some elliptic curve based cryptosystems of Paillier
Steven D. Galbraith
2001/024 ( PS PS.GZ )
Secure Multiparty Computation of Approximations
Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright
2001/023 ( PS PS.GZ PDF )
Robustness for Free in Unconditional Multi-Party Computation
Martin Hirt and Ueli Maurer
2001/022 ( PS PS.GZ PDF )
Optimistic Asynchronous Atomic Broadcast
Klaus Kursawe and Victor Shoup
2001/021 ( PS PS.GZ )
The Rectangle Attack - Rectangling the Serpent
Biham Eli, Orr Dunkelman, Nathan Keller
2001/020 ( PS PS.GZ )
Some observations on the theory of cryptographic hash functions
D.R. Stinson
2001/019 ( PS PS.GZ PDF )
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
Jan Camenisch and Anna Lysyanskaya
2001/018 ( PS PS.GZ )
Analysis of a Subset Sum Randomizer
Peter Gemmell and Anna Johnston
2001/017 ( PS PS.GZ PDF )
On adaptive vs. non-adaptive security of multiparty protocols
Ran Canetti and Ivan Damgard and Stefan Dziembowski and Yuval Ishai and Tal Malkin
2001/016 ( PS PS.GZ )
Efficient Traitor Tracing Algorithms using List Decoding
Alice Silverberg and Jessica Staddon and Judy Walker
2001/015 ( PS PS.GZ PDF )
An observation regarding Jutla's modes of operation
Shai Halevi
2001/014 ( PS PS.GZ PDF )
Timed-Release Cryptography
Wenbo Mao
2001/013 ( PS PS.GZ )
Digitally Watermarking RSA Moduli
Anna M. Johnston
2001/012 ( PS PS.GZ PDF )
Ciphers with Arbitrary Finite Domains
John Black and Phillip Rogaway
2001/011 ( PS PS.GZ PDF )
New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation
Wenbo Mao
2001/010 ( PS PS.GZ )
How to achieve a McEliece-based Digital Signature Scheme
Nicolas Courtois, Matthieu Finiasz and Nicolas Sendrier
2001/009 ( PS PS.GZ )
Robust key-evolving public key encryption schemes
Wen-Guey Tzeng, Zhi-Jia Tzeng
2001/008 ( PS PS.GZ PDF )
Fully Distributed Threshold RSA under Standard Assumptions
Pierre-Alain Fouque and Jacques Stern
2001/007 ( PS PS.GZ )
Are 'Strong' Primes Needed for RSA
Ron RIvest & Robert Silverman
2001/006 ( PS PS.GZ PDF )
Secure and Efficient Asynchronous Broadcast Protocols
Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup
2001/005 ( PS PS.GZ PDF )
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme
Ilya Mironov
2001/004 ( -- withdrawn -- )
MinRank problem and Zero-knowledge authentication
Nicolas T. Courtois
2001/003 ( PS PS.GZ )
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
Antoine Joux and Kim Nguyen
2001/002 ( PS PS.GZ PDF )
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko
2001/001 ( PS PS.GZ PDF )
Efficient Algorithms for Computing Differential Properties of Addition
Helger Lipmaa, Shiho Moriai


[ Cryptology ePrint archive ]