Cryptology ePrint Archive: Listing for 2001
-
2001/113 ( PDF )
- Efficient Revocation of Anonymous Group Membership
- Jan Camenisch and Anna Lysyanskaya
-
2001/112 ( PS PS.GZ PDF )
- A Proposal for an ISO Standard for Public Key Encryption
- Victor Shoup
-
2001/111 ( PS PS.GZ )
- An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
- N.P. Smart
-
2001/110 ( PS PS.GZ )
- RSA hybrid encryption schemes
- Louis Granboulan
-
2001/109 ( PDF )
- New Notions of Soundness and Simultaneous Resettability in the Public-Key Model
- Yunlei ZHAO
-
2001/108 ( PS PS.GZ PDF )
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Ronald Cramer and Victor Shoup
-
2001/107 ( PS PS.GZ PDF )
- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
- Yehuda Lindell
-
2001/106 ( PS PS.GZ PDF )
- Cryptanalysis of the COS (2,128) Stream Ciphers
- Steve Babbage
-
2001/105 ( PS PS.GZ )
- Universal Arguments and their Applications
- Boaz Barak and Oded Goldreich
-
2001/104 ( PS PS.GZ )
- Concurrent Zero-Knowledge With Timing, Revisited
- Oded Goldreich
-
2001/103 ( PS PS.GZ PDF )
- Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems
- Antonio Bellezza
-
2001/102 ( PS PS.GZ PDF )
- An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates
- Ivan Damgård and Gudmund Frandsen
-
2001/101 ( PDF )
- Quasi-Efficient Revocation of Group Signatures
- Giuseppe Ateniese and Dawn Song and Gene Tsudik
-
2001/100 ( PS PS.GZ )
- A Note on Girault's Self-Certified Model
- Shahrokh Saeednia
-
2001/099 ( PS PS.GZ )
- Linear Code Implies Public-Key Traitor Tracing
- Kaoru Kurosawa and Takuya Yoshida
-
2001/098 ( PS PS.GZ PDF )
- Fast hashing onto elliptic curves over fields of characteristic 3
- Paulo S. L. M. Barreto and Hae Yong Kim
-
2001/097 ( PS PS.GZ )
- An Efficient MAC for Short Messages
- Sarvar Patel
-
2001/096 ( PS PS.GZ )
- Constructing elliptic curves with a given number of points over a finite field
- Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan
-
2001/095 ( PS PS.GZ PDF )
- Secure Vickrey Auctions without Threshold Trust
- Helger Lipmaa and N. Asokan and Valtteri Niemi
-
2001/094 ( PS PS.GZ )
- Slope packings and coverings, and generic algorithms for the discrete logarithm problem
- M. Chateauneuf and A.C.H. Ling and D.R. Stinson
-
2001/093 ( PS PS.GZ PDF )
- Threshold Cryptosystems Based on Factoring
- Jonathan Katz and Moti Yung
-
2001/092 ( PS PS.GZ PDF )
- BDD-based Cryptanalysis of Keystream Generators
- Matthias Krause
-
2001/091 ( PS PS.GZ PDF )
- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
- Ivan Damgĺrd and Jesper B. Nielsen
-
2001/090 ( PS PS.GZ PDF )
- Identity Based Encryption From the Weil Pairing
- Dan Boneh and Matthew Franklin
-
2001/089 ( PS PS.GZ )
- Linear broadcast encryption schemes
- Carles Padró and Ignacio Gracia and Sebastiŕ Martín and Paz Morillo
-
2001/088 ( PS PS.GZ PDF )
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Ignacio Gracia and Sebastiŕ Martín and Carles Padró
-
2001/087 ( PS PS.GZ )
- A Linear Algebraic Approach to Metering Schemes
- C. Blundo and S. Martěn and B. Masucci and C. Padrň
-
2001/086 ( PS PS.GZ )
- Statistical Zero-Knowledge Proofs from Diophantine Equations
- Helger Lipmaa
-
2001/085 ( PS PS.GZ PDF )
- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
- Ronald Cramer and Victor Shoup
-
2001/084 ( PS PS.GZ )
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
- Markus Maurer and Alfred Menezes and Edlyn Teske
-
2001/083 ( PS PS.GZ )
- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices
- Maria Fedorova and Yuriy Tarannikov
-
2001/082 ( PDF )
- A Description of Protocols for Private Credentials
- Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton Stiglic
-
2001/081 ( PS PS.GZ PDF )
- A Sufficient Condition for Secure Ping--Pong Protocols
- Masao Mori
-
2001/080 ( PS PS.GZ )
- COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers
- Eric Filiol and Caroline Fontaine
-
2001/079 ( PS PS.GZ )
- Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses
- Jee Hea An
-
2001/078 ( PS PS.GZ PDF )
- The COS Stream Ciphers are Extremely Weak
- Steve Babbage
-
2001/077 ( PS PS.GZ PDF )
- A Time-Memory Tradeoff Attack Against LILI-128
- Markku-Juhani Olavi Saarinen
-
2001/076 ( PS PS.GZ )
- Communication Complexity and Secure Function Evaluation
- Moni Naor and Kobbi Nissim
-
2001/075 ( PS PS.GZ )
- Pseudo-Random Functions and Factoring
- Moni Naor and Omer Reingold and Alon Rosen
-
2001/074 ( PS PS.GZ )
- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction
- Eliane Jaulmes and Antoine Joux and Frederic Valette
-
2001/073 ( PS PS.GZ )
- Efficient oblivious transfer schemes
- Wen-Guey Tzeng
-
2001/072 ( PS PS.GZ PDF )
- On the Goubin-Courtois Attack on TTM
- T.Moh and Jiun-Ming Chen
-
2001/071 ( PS PS.GZ )
- Multi-Recipient Public-Key Encryption with Shortened Ciphertext
- Kaoru Kurosawa
-
2001/070 ( PS PS.GZ PDF )
- Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)
- Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi Kawamura
-
2001/069 ( PS PS.GZ )
- On the (Im)possibility of Obfuscating Programs
- Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang
-
2001/068 ( PS PS.GZ PDF )
- SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers
- J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and J.Vandewalle and H.Y.Kim
-
2001/067 ( PDF )
- An Attack on A Traitor Tracing Scheme
- Jeff Jianxin Yan and Yongdong Wu
-
2001/066 ( PS PS.GZ )
- IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS
- SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON KIM
-
2001/065 ( PS PS.GZ PDF )
- Analysis of chosen plaintext attacks on the WAKE Stream Cipher
- Marina Pudovkina
-
2001/064 ( PS PS.GZ )
- An Integer Commitment Scheme based on Groups with Hidden Order
- Ivan Damgard and Eiichiro Fujisaki
-
2001/063 ( PS PS.GZ PDF )
- Resettably-Sound Zero-Knowledge and its Applications
- Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell
-
2001/062 ( PS PS.GZ PDF )
- Optimal security proofs for PSS and other signature schemes
- Jean-Sébastien Coron
-
2001/061 ( PS PS.GZ PDF )
- Clock-Controlled Shift Registers for Key-Stream Generation
- Alexander Kholosha
-
2001/060 ( PS PS.GZ PDF )
- The Security of Practical Two-Party RSA Signature Schemes
- Mihir Bellare and Ravi Sandhu
-
2001/059 ( PDF )
- Revocation and Tracing Schemes for Stateless Receivers
- Dalit Naor and Moni Naor and Jeff Lotspiech
-
2001/058 ( PS PS.GZ PDF )
- Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank
- Nicolas T. Courtois
-
2001/057 ( PS PS.GZ PDF )
- On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
- Philip MacKenzie
-
2001/056 ( PS PS.GZ PDF )
- On the Complexity of Matsui's Attack
- P. Junod
-
2001/055 ( PS PS.GZ PDF )
- Universally Composable Commitments
- Ran Canetti and Marc Fischlin
-
2001/054 ( PS PS.GZ )
- Extending the GHS Weil Descent Attack
- S.D. Galbraith and F. Hess and N.P. Smart
-
2001/053 ( PS PS.GZ )
- Security Proofs for the RSA-PSS Signature Scheme and Its Variants
- Jakob Jonsson
-
2001/052 ( PDF )
- Differential Probability of Modular Addition with a Constant Operand
- Alexis Warner Machado
-
2001/051 ( PS PS.GZ )
- Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds
- Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen
-
2001/050 ( PS PS.GZ )
- Elliptic curve Paillier schemes
- Steven D Galbraith
-
2001/049 ( PS PS.GZ PDF )
- A known plaintext attack on the ISAAC keystream generator
- Marina Pudovkina
-
2001/048 ( PS PS.GZ PDF )
- Forward-Secure Signatures with Optimal Signing and Verifying
- Gene Itkis and Leonid Reyzin
-
2001/047 ( PS PS.GZ )
- ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM
- T.MOH
-
2001/046 ( PS PS.GZ )
- The simple ideal cipher system
- Boris Ryabko
-
2001/045 ( PS PS.GZ )
- The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
- Hugo Krawczyk
-
2001/044 ( PS PS.GZ )
- Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds
- Birgit Baum-Waidner
-
2001/043 ( PS PS.GZ PDF )
- Cryptanalysis of the Vesta-2M Stream Cipher
- Marina Pudovkina
-
2001/042 ( PS PS.GZ )
- Simple Forward-Secure Signatures From Any Signature Scheme
- Hugo Krawczyk
-
2001/041 ( PS PS.GZ PDF )
- Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent
- Michael Jacobson and Alfred Menezes and Andreas Stein
-
2001/040 ( PS PS.GZ )
- Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
- Ran Canetti and Hugo Krawczyk
-
2001/039 ( PDF )
- Robust Software Tokens: Towards Securing a Digital Identity
- Taekyoung Kwon
-
2001/038 ( PS PS.GZ )
- Flaws in differential cryptanalysis of Skipjack
- Louis Granboulan
-
2001/037 ( PS PS.GZ PDF )
- EMpowering Side-Channel Attacks
- Josyula R. Rao and Pankaj Rohatgi
-
2001/036 ( PS PS.GZ )
- Anti-persistence: History Independent Data Structures
- Moni Naor and Vanessa Teague
-
2001/035 ( PS PS.GZ PDF )
- Forward-Security in Private-Key Cryptography
- Mihir Bellare and Bennet Yee
-
2001/034 ( PS PS.GZ )
- Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures
- Tal Malkin and Daniele Micciancio and Sara Miner
-
2001/033 ( PS PS.GZ PDF )
- Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs
- Liam Keliher and Henk Meijer and Stafford Tavares
-
2001/032 ( PS PS.GZ PDF )
- Efficient and Non-Interactive Non-Malleable Commitment
- Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam Smith
-
2001/031 ( PS PS.GZ PDF )
- Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
- Jonathan Katz and Rafail Ostrovsky and Moti Yung
-
2001/030 ( PS PS.GZ PDF )
- On the Power of Nonlinear Secret-Sharing
- Amos Beimel and Yuval Ishai
-
2001/029 ( PS PS.GZ PDF )
- On multivariate signature-only public key cryptosystems
- Nicolas T. Courtois
-
2001/028 ( PS PS.GZ PDF )
- Efficient Encryption for Rich Message Spaces Under General Assumptions
- Alexander Russell and Hong Wang
-
2001/027 ( PS PS.GZ PDF )
- A Block-Cipher Mode of Operation for Parallelizable Message Authentication
- John Black and Phillip Rogaway
-
2001/026 ( PS PS.GZ PDF )
- OCB Mode
- Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz
-
2001/025 ( -- withdrawn -- )
- Cryptanalysis of some elliptic curve based cryptosystems of Paillier
- Steven D. Galbraith
-
2001/024 ( PS PS.GZ )
- Secure Multiparty Computation of Approximations
- Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright
-
2001/023 ( PS PS.GZ PDF )
- Robustness for Free in Unconditional Multi-Party Computation
- Martin Hirt and Ueli Maurer
-
2001/022 ( PS PS.GZ PDF )
- Optimistic Asynchronous Atomic Broadcast
- Klaus Kursawe and Victor Shoup
-
2001/021 ( PS PS.GZ )
- The Rectangle Attack - Rectangling the Serpent
- Biham Eli, Orr Dunkelman, Nathan Keller
-
2001/020 ( PS PS.GZ )
- Some observations on the theory of cryptographic hash functions
- D.R. Stinson
-
2001/019 ( PS PS.GZ PDF )
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- Jan Camenisch and Anna Lysyanskaya
-
2001/018 ( PS PS.GZ )
- Analysis of a Subset Sum Randomizer
- Peter Gemmell and Anna Johnston
-
2001/017 ( PS PS.GZ PDF )
- On adaptive vs. non-adaptive security of multiparty protocols
- Ran Canetti and Ivan Damgard and Stefan Dziembowski and Yuval Ishai and Tal Malkin
-
2001/016 ( PS PS.GZ )
- Efficient Traitor Tracing Algorithms using List Decoding
- Alice Silverberg and Jessica Staddon and Judy Walker
-
2001/015 ( PS PS.GZ PDF )
- An observation regarding Jutla's modes of operation
- Shai Halevi
-
2001/014 ( PS PS.GZ PDF )
- Timed-Release Cryptography
- Wenbo Mao
-
2001/013 ( PS PS.GZ )
- Digitally Watermarking RSA Moduli
- Anna M. Johnston
-
2001/012 ( PS PS.GZ PDF )
- Ciphers with Arbitrary Finite Domains
- John Black and Phillip Rogaway
-
2001/011 ( PS PS.GZ PDF )
- New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation
- Wenbo Mao
-
2001/010 ( PS PS.GZ )
- How to achieve a McEliece-based Digital Signature Scheme
- Nicolas Courtois, Matthieu Finiasz and Nicolas Sendrier
-
2001/009 ( PS PS.GZ )
- Robust key-evolving public key encryption schemes
- Wen-Guey Tzeng, Zhi-Jia Tzeng
-
2001/008 ( PS PS.GZ PDF )
- Fully Distributed Threshold RSA under Standard Assumptions
- Pierre-Alain Fouque and Jacques Stern
-
2001/007 ( PS PS.GZ )
- Are 'Strong' Primes Needed for RSA
- Ron RIvest & Robert Silverman
-
2001/006 ( PS PS.GZ PDF )
- Secure and Efficient Asynchronous Broadcast Protocols
- Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup
-
2001/005 ( PS PS.GZ PDF )
- A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme
- Ilya Mironov
-
2001/004 ( -- withdrawn -- )
- MinRank problem and Zero-knowledge authentication
- Nicolas T. Courtois
-
2001/003 ( PS PS.GZ )
- Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups
- Antoine Joux and Kim Nguyen
-
2001/002 ( PS PS.GZ PDF )
- The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme
- M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko
-
2001/001 ( PS PS.GZ PDF )
- Efficient Algorithms for Computing Differential Properties of Addition
- Helger Lipmaa, Shiho Moriai
[ Cryptology ePrint archive ]