Cryptology ePrint Archive: Listing for 2004

2004/377 ( PS PS.GZ PDF )
New Distributed Ring Signatures for General Families of Signing Subsets
Javier Herranz and Germ\'an S\'aez
2004/376 ( PDF )
Cryptanalysis of RCES/RSES Image Encryption Scheme
Shujun Li and Chengqing Li and Guanrong Chen and Kwok-Tung Lo
2004/375 ( PS PS.GZ PDF )
Efficient Pairing Computation on Supersingular Abelian Varieties
Paulo S. L. M. Barreto and Steven Galbraith and Colm O hEigeartaigh and Michael Scott
2004/374 ( PDF )
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Shujun Li and Chengqing Li and Guanrong Chen and Nikolaos G. Bourbakis and Kwok-Tung Lo
2004/373 ( PS PS.GZ PDF )
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs
Chunming Tang and Dingyi Pei and Zhuojun Liu
2004/372 ( -- withdrawn -- )
On The Security of Two Key-Updating Signature Schemes
Xingyang Guo
2004/371 ( PDF )
Construction and Traversal of Hash Chain with Public Links
Vipul Goyal
2004/370 ( PDF )
Tracing-by-Linking Group Signautres
Victor K. Wei
2004/369 ( PDF )
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
Filipe Rosado da-Fonseca
2004/368 ( PS PS.GZ PDF )
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek
2004/367 ( PS PS.GZ PDF )
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
Patrick Felke
2004/366 ( PDF )
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key
Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
2004/365 ( PS PS.GZ PDF )
Ordinary abelian varieties having small embedding degree
Steven D. Galbraith, and J. McKee and P. Valenca
2004/364 ( PS PS.GZ PDF )
Finding good differential patterns for attacks on SHA-1
Krystian Matusiewicz and Josef Pieprzyk
2004/363 ( PDF )
Rethinking the security of some authenticated group key agreement schemes
Qiang Tang and Chris J. Mitchell
2004/362 ( PDF )
A new security proof for Damgĺrd's ElGamal
Kristian Gjřsteen
2004/361 ( PS PS.GZ PDF )
Superfluous Keys in Multivariate Quadratic Asymmetric Systems
Christopher Wolf and Bart Preneel
2004/360 ( PS PS.GZ PDF )
Equivalent Keys in HFE, C$^*$, and variations
Christopher Wolf and Bart Preneel
2004/359 ( PS PS.GZ PDF )
Secure Computation of the Mean and Related Statistics
Eike Kiltz and Gregor Leander and John Malone-Lee
2004/358 ( PS PS.GZ PDF )
Reusable Cryptographic Fuzzy Extractors
Xavier Boyen
2004/357 ( PDF )
MD5 To Be Considered Harmful Someday
Dan Kaminsky
2004/356 ( PDF )
Practical Attacks on Digital Signatures Using MD5 Message Digest
Ondrej Mikle
2004/355 ( PDF )
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
Pei-yih Ting and Po-Yueh Hung
2004/354 ( PS PS.GZ )
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra
Alexander Maximov
2004/353 ( PS PS.GZ PDF )
Direct Division in Factor Rings
Patrick Fitzpatrick and Christopher Wolf
2004/352 ( PS PS.GZ PDF )
Practical Cryptography in High Dimensional Tori
Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David Woodruff
2004/351 ( -- withdrawn -- )
Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
ZhenFeng ZHANG and YongBin ZHOU and DengGuo FENG
2004/350 ( PS PS.GZ PDF )
Multivariable public--key cryptosystems
Jintai Ding and Dieter Schmidt
2004/349 ( PS PS.GZ PDF )
A DPA Attack on the Improved Ha-Moon Algorithm
Dong Jin PARK and Pil Joong LEE
2004/348 ( PS PS.GZ PDF )
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
Junghyun Nam, Seungjoo Kim, and Dongho Won
2004/347 ( PS PS.GZ PDF )
Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''
Marco Macchetti
2004/346 ( PS PS.GZ PDF )
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa
2004/345 ( PS PS.GZ PDF )
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited
Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock and Greg Maitland
2004/344 ( PDF )
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures
Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte
2004/343 ( PDF )
Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
Kim-Kwang Raymond Choo
2004/342 ( PS PS.GZ PDF )
A comb method to render ECC resistant against Side Channel Attacks
Mustapha Hedabou and Pierre Pinel and Lucien Bénéteau
2004/341 ( PS PS.GZ PDF )
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli
2004/340 ( PDF )
Request for Review of Key Wrap Algorithms
Morris Dworkin
2004/339 ( PS PS.GZ )
Divisors in Residue Classes, Constructively
Don Coppersmith and Nick Howgrave-Graham and S. V. Nagaraj
2004/338 ( PS PS.GZ PDF )
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai
2004/337 ( PDF )
Security on Generalized Feistel Scheme with SP Round Function
Wu Wenling and Zhang Wentao and Lin Dongdai
2004/336 ( PS PS.GZ PDF )
Oblivious Transfer Is Symmetric
Stefan Wolf and J\"urg Wullschleger
2004/335 ( PS PS.GZ )
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
Haitner Iftach and Shaltiel Ronen
2004/334 ( PDF )
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
Ran Canetti and Jonathan Herzog
2004/333 ( PS PS.GZ PDF )
Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem
Marius-Calin Silaghi
2004/332 ( PDF )
Sequences of games: a tool for taming complexity in security proofs
Victor Shoup
2004/331 ( PDF )
Code-Based Game-Playing Proofs and the Security of Triple Encryption
Mihir Bellare and Phillip Rogaway
2004/330 ( PS PS.GZ )
Multicollision Attacks on Generalized Hash Functions
M. Nandi and D. R. Stinson
2004/329 ( PS PS.GZ PDF )
Hardness amplification of weakly verifiable puzzles
Ran Canetti and Shai Halevi and Michael Steiner
2004/328 ( -- withdrawn -- )
Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model
Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee
2004/327 ( PS PS.GZ PDF )
Efficient Identity Based Ring Signature
Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui
2004/326 ( PS PS.GZ PDF )
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
Zhengjun Cao
2004/325 ( PS PS.GZ PDF )
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA
2004/324 ( PDF )
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
G. Laccetti and G. Schmid
2004/323 ( PS PS.GZ PDF )
A note on L\'opez-Dahab coordinates
Tanja Lange
2004/322 ( PS PS.GZ PDF )
Separable and Anonymous Identity-Based Key Issuing
Ai-fen Sui and Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow and W.W. Tsang and C.F. Chong and K.H. Pun and H.W. Chan
2004/321 ( PDF )
The conjugacy search problem in public key cryptography: unnecessary and insufficient
Vladimir Shpilrain and Alexander Ushakov
2004/320 ( PS PS.GZ PDF )
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
Alfonso De Gregorio
2004/319 ( PS PS.GZ PDF )
Badger - A Fast and Provably Secure MAC
Martin Boesgaard and Ove Scavenius and Thomas Pedersen and Thomas Christensen and Erik Zenner
2004/318 ( PS PS.GZ PDF )
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Martin Hirt and Jesper Buus Nielsen
2004/317 ( PS PS.GZ PDF )
Adaptively-Secure, Non-Interactive Public-Key Encryption
Ran Canetti and Shai Halevi and Jonathan Katz
2004/316 ( PS PS.GZ PDF )
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
Zhengjun Cao
2004/315 ( PDF )
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
Qin Wang, Zhenfu Cao
2004/314 ( PDF )
A Technical Comparison of IPSec and SSL
AbdelNasir Alshamsi and Takamichi Saito
2004/313 ( PS PS.GZ PDF )
Cryptanalysis of a threshold proxy signature with known signers
Fuw-Yi Yang, Jinn-Ke Jan, and Woei-Jiunn Jeng
2004/312 ( PS PS.GZ PDF )
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
David Jao and Stephen D. Miller and Ramarathnam Venkatesan
2004/311 ( PS PS.GZ PDF )
Hierarchical Group Signatures
Marten Trolin and Douglas Wikstrom
2004/310 ( PS PS.GZ PDF )
A Verifiable Random Function With Short Proofs and Keys
Yevgeniy Dodis and Aleksandr Yampolskiy
2004/309 ( PS PS.GZ PDF )
The Power of Verification Queries in Message Authentication and Authenticated Encryption
Mihir Bellare and Oded Goldreich and Anton Mityagin
2004/308 ( PDF )
Cryptanalysis of Noel McCullagh and Paulo S. L. M. BarretoĄŻs two-party identity-based key agreement
Guohong Xie
2004/307 ( PS PS.GZ PDF )
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
Zhengjun Cao
2004/306 ( PS PS.GZ )
The Static Diffie-Hellman Problem
Daniel R. L. Brown and Robert P. Gallant
2004/305 ( PS PS.GZ PDF )
A note on efficient computation of cube roots in characteristic 3
Paulo S. L. M. Barreto
2004/304 ( PDF )
Second Preimages on n-bit Hash Functions for Much Less than 2^n Work
John Kelsey and Bruce Schneier
2004/303 ( PS PS.GZ PDF )
Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields
Soonhak Kwon
2004/302 ( PDF )
Security of Wang-Li Threshold Signature Scheme
Lifeng Guo
2004/301 ( PS PS.GZ PDF )
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
Bartosz Zoltak
2004/300 ( PS PS.GZ )
Relating Symbolic and Cryptographic Secrecy
Michael Backes and Birgit Pfitzmann
2004/299 ( PS PS.GZ PDF )
Security Flaws in a Pairing-based Group Signature Scheme
Zhengjun Cao and Sherman S.M. Chow
2004/298 ( PDF )
Nominative Proxy Signature Schemes
Zuo-Wen Tan,Zhuo-Jun Liu
2004/297 ( PS PS.GZ PDF )
Post-Quantum Signatures
Johannes Buchmann and Carlos Coronado and Martin Döring and Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and Arthur Schmidt and Ulrich Vollmer and Ralf-Philipp Weinmann
2004/296 ( PS PS.GZ PDF )
Designs of Efficient Secure Large Hash Values
Mridul Nandi
2004/295 ( PS PS.GZ PDF )
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
Jiang Wu and Ruizhong Wei
2004/294 ( PS PS.GZ PDF )
Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher
Souradyuti Paul and Bart Preneel
2004/293 ( PS PS.GZ )
Provably Secure Authentication of Digital Media Through Invertible Watermarks
Jana Dittmann and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith
2004/292 ( PS PS.GZ PDF )
Asynchronous Proactive RSA
Ruishan Zhang and Kefei Chen
2004/291 ( PS PS.GZ PDF )
The Rabbit Stream Cipher - Design and Security Analysis
Martin Boesgaard and Thomas Pedersen and Mette Vesterager and Erik Zenner
2004/290 ( PS PS.GZ PDF )
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
Wakaha Ogata and Kaoru Kurosawa and Swee-Huay Heng
2004/289 ( PDF )
Fault attack on the DVB Common Scrambling Algorithm
Kai Wirt
2004/288 ( -- withdrawn -- )
A New Designated Confirmer Signature Variant with Intended Recipient
Yong Li and Dingyi Pei
2004/287 ( PS PS.GZ PDF )
Almost Ideal Contrast Visual Cryptography with Reversing
Duong Quang Viet and Kaoru Kurosawa
2004/286 ( PS PS.GZ )
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
Daniele Micciancio
2004/285 ( PS PS.GZ PDF )
Generation of random Picard curves for cryptography
Annegret Weng
2004/284 ( PS PS.GZ PDF )
Qingshu Meng and Huanguo Zhang and Min Yang and Jingsong Cui
2004/283 ( PS PS.GZ PDF )
Fault and Side-Channel Attacks on Pairing Based Cryptography
D. Page and F. Vercauteren
2004/282 ( PS PS.GZ PDF )
New Monotone Span Programs from Old
Ventzislav Nikov and Svetla Nikova
2004/281 ( PS PS.GZ PDF )
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Patrick P. Tsang and Victor K. Wei
2004/280 ( PS PS.GZ PDF )
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
Zhengjun Cao
2004/279 ( PS PS.GZ PDF )
Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic
Jean-Claude Bajard and Laurent Imbert and Graham A. Jullien
2004/278 ( PDF )
The Extended Codebook (XCB) Mode of Operation
David A. McGrew and Scott R. Fluhrer
2004/277 ( PDF )
Experimenting with Faults, Lattices and the DSA
David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan
2004/276 ( PDF )
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
C. Carlet
2004/275 ( PDF )
An e-Voting Scheme with Improved Resistance to Bribe and Coercion
Wei-Chi Ku and Chun-Ming Ho
2004/274 ( PDF )
Meng Qing-shu and Yang min and Zhang huan-guo and Cui jing-song
2004/273 ( PDF )
Cryptanalysis of Threshold-Multisignature schemes
Lifeng Guo
2004/272 ( PDF )
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
Tom Shrimpton
2004/271 ( PDF )
The Mundja Streaming MAC
Philip Hawkes and Michael Paddon and Gregory G. Rose
2004/270 ( PS PS.GZ PDF )
An Enhanced and Secure Protocol for Authenticated Key Exchange
Fuw-Yi Yang and Jinn-Ke Jan
2004/269 ( PDF )
Cryptanalysis of Threshold-Multisignature Schemes
Lifeng Guo
2004/268 ( PS PS.GZ PDF )
Untraceability of Wang-Fu Group Signature Scheme
Zhengjun Cao and Lihua Liu
2004/267 ( PS PS.GZ PDF )
Separable Linkable Threshold Ring Signatures
Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong
2004/266 ( PS PS.GZ PDF )
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
M. Khabbazian and T.A. Gulliver
2004/265 ( PDF )
sSCADA: Securing SCADA Infrastructure Communications
Yongge Wang and Bei-Tseng Chu
2004/264 ( PDF )
Musings on the Wang et al. MD5 Collision
Philip Hawkes and Michael Paddon and Gregory G. Rose
2004/263 ( PS PS.GZ PDF )
Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
Christopher Wolf and Bart Preneel
2004/262 ( PS PS.GZ PDF )
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
Lihua Liu and Zhengjun Cao
2004/261 ( PS PS.GZ PDF )
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
Dan Boneh and Jonathan Katz
2004/260 ( PS PS.GZ PDF )
Secure Group Communications over Combined Wired/Wireless Networks
Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won
2004/259 ( PS PS.GZ PDF )
On Boolean Functions with Generalized Cryptographic Properties
An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
2004/258 ( PS PS.GZ PDF )
Escrow-Free Encryption Supporting Cryptographic Workflow
S.S. Al-Riyami and J. Malone-Lee and N.P. Smart
2004/257 ( PS PS.GZ PDF )
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Junghyun Nam, Seungjoo Kim, and Dongho Won
2004/256 ( PDF )
On the supports of the Walsh transforms of Boolean functions
Claude Carlet and Sihem Mesnager
2004/255 ( PS PS.GZ PDF )
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi
2004/254 ( PS PS.GZ )
New paradigms for digital generation and post-processing of random data
Jovan Dj. Golic
2004/253 ( PDF )
Design Principles for Iterated Hash Functions
Stefan Lucks
2004/252 ( PS PS.GZ PDF )
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare and Chanathip Namprempre and Gregory Neven
2004/251 ( PS PS.GZ PDF )
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
Junghyun Nam, Seungjoo Kim, and Dongho Won
2004/250 ( PDF )
Identity Based Threshold Proxy Signature
Jing Xu and Zhenfeng Zhang and Dengguo Feng
2004/249 ( PS PS.GZ PDF )
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Zhaohui Cheng and Richard Comley
2004/248 ( PS PS.GZ PDF )
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties
An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
2004/247 ( PS PS.GZ )
Vectorial fast correlation attacks
Jovan Dj. Golic and Guglielmo Morgari
2004/246 ( PS PS.GZ PDF )
Upper and Lower Bounds on Black-Box Steganography
Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell
2004/245 ( PDF )
On codes, matroids and secure multi-party computation from linear secret sharing schemes
Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jimenez Urroz and Gregor Leander and Jaume Marti-Farre and Carles Padro
2004/244 ( PS PS.GZ PDF )
Signcryption in Hierarchical Identity Based Cryptosystem
Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu
2004/243 ( PDF )
On the Key Exposure Problem in Chameleon Hashes
Giuseppe Ateniese and Breno de Medeiros
2004/242 ( PS PS.GZ PDF )
Combinatorial group theory and public key cryptography
Vladimir Shpilrain and Gabriel Zapata
2004/241 ( PDF )
A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2
Colm O hEigeartaigh
2004/240 ( PS PS.GZ PDF )
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
Seigo Arita and Kazuto Matsuo and Koh-ichi Nagao and Mahoro Shimura
2004/239 ( PDF )
Geometric Key Establishment
Arkady Berenstein and Leon Chernyak
2004/238 ( PDF )
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
Amit K Awasthi and Sunder Lal
2004/237 ( PS PS.GZ PDF )
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
Christopher Wolf and An Braeken and Bart Preneel
2004/236 ( PDF )
Forgery Attacks on Chang et al.'s signature scheme with message recovery
FU Xiaotong, XU Chunxiang and XIAO Guozhen
2004/235 ( PDF )
Cryptographic Implications of Hess' Generalized GHS Attack
Alfred Menezes and Edlyn Teske
2004/234 ( PDF )
On the security of some nonrepudiable threshold proxy signature schemes with known signers
Zuo-Wen Tan and Zhuo-Jun Liu
2004/233 ( PS PS.GZ PDF )
Password-Based Authenticated Key Exchange in the Three-Party Setting
Michel Abdalla and Pierre-Alain Fouque and David Pointcheval
2004/232 ( PS PS.GZ PDF )
Extending the Resynchronization Attack
Frederik Armknecht and Joseph Lano and Bart Preneel
2004/231 ( PS PS.GZ PDF )
Timed-Release and Key-Insulated Public Key Encryption
Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and Ivan Osipkov
2004/230 ( PS PS.GZ PDF )
A Provable Secure Scheme for Partially Blind Signatures
Fuw-Yi Yang and Jinn-Ke Jan
2004/229 ( PS PS.GZ PDF )
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes
Xin L¨š and Zhi Ma and Dengguo Feng
2004/228 ( PS PS.GZ PDF )
Honggang Hu and Dengguo Feng
2004/227 ( PS PS.GZ PDF )
Sign Change Fault Attacks On Elliptic Curve Cryptosystems
Johannes Blömer and Martin Otto and Jean-Pierre Seifert
2004/226 ( PS PS.GZ PDF )
Lower Bounds for Non-Black-Box Zero Knowledge
Boaz Barak and Yehuda Lindell and Salil Vadhan
2004/225 ( PS PS.GZ )
Vectorial Boolean functions and induced algebraic equations
Jovan Dj. Golic
2004/224 ( PS PS.GZ PDF )
The Polynomial Composition Problem in (Z/nZ)[X]
Marc Joye and David Naccache and Stephanie Porte
2004/223 ( PDF )
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
Xinxin Fan and Yumin Wang
2004/222 ( PS PS.GZ PDF )
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
An Braeken and Christopher Wolf and Bart Preneel
2004/221 ( PS PS.GZ PDF )
Towards Plaintext-Aware Public-Key Encryption without Random Oracles
Mihir Bellare and Adriana Palacio
2004/220 ( PS PS.GZ PDF )
On Oleshchuk's Public Key Cryptosystem
Heiko Stamer and Friedrich Otto
2004/219 ( PS PS.GZ PDF )
Entropic Security and the Encryption of High Entropy Messages
Yevgeniy Dodis and Adam Smith
2004/218 ( PDF )
Eiichiro Fujisaki
2004/217 ( PS PS.GZ PDF )
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
Aggelos Kiayias and Moti Yung
2004/216 ( PS PS.GZ PDF )
Tree Parity Machine Rekeying Architectures
Markus Volkmer and Sebastian Wallner
2004/215 ( PS PS.GZ PDF )
Transitive Signatures: New Schemes and Proofs
Mihir Bellare and Gregory Neven
2004/214 ( PS PS.GZ PDF )
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality
An Braeken, Christopher Wolf, and Bart Preneel
2004/213 ( PS PS.GZ PDF )
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery
Fangguo Zhang
2004/212 ( PS PS.GZ PDF )
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya
2004/211 ( PS PS.GZ PDF )
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
Ian F. Blake and Aldar C-F. Chan
2004/210 ( PS PS.GZ PDF )
Hybrid Cryptography
Alexander W. Dent
2004/209 ( PS PS.GZ PDF )
The Security and Efficiency of Micciancio's Cryptosystem
Christoph Ludwig
2004/208 ( PS PS.GZ PDF )
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
Jean-Sebastien Coron and Alexander May
2004/207 ( PDF )
On Corrective Patterns for the SHA-2 Family
Philip Hawkes and Michael Paddon and Gregory G. Rose
2004/206 ( PDF )
ID-Based Proxy Signature Using Bilinear Pairings
Jing Xu and Zhenfeng Zhang and Dengguo Feng
2004/205 ( PDF )
Direct Anonymous Attestation
Ernie Brickell and Jan Camenisch and Liqun Chen
2004/204 ( PS PS.GZ PDF )
Authenticated tree parity machine key exchange
Markus Volkmer and Andre Schaumburg
2004/203 ( PS PS.GZ PDF )
How to Cheat at Chess: A Security Analysis of the Internet Chess Club
John Black and Martin Cochran and Ryan Gardner
2004/202 ( PS PS.GZ PDF )
Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions
Yuri Borissov, An Braeken, Svetla Nikova
2004/201 ( PS PS.GZ PDF )
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing
Chunming Tang and Dingyi Pei and Zhuojun Liu and Yong He
2004/200 ( PS PS.GZ PDF )
On Cheating Immune Secret Sharing
An Braeken, Svetla Nikova, Ventzislav Nikov
2004/199 ( PDF )
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
2004/198 ( PDF )
Long Modular Multiplication for Cryptographic Applications
Laszlo Hars
2004/197 ( PS PS.GZ PDF )
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
Helmut Kahl
2004/196 ( PS PS.GZ PDF )
Password Based Key Exchange with Mutual Authentication
Shaoquan Jiang and Guang Gong
2004/195 ( PS PS.GZ PDF )
Signed Binary Representations Revisited
Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and Tsuyoshi Takagi
2004/194 ( PDF )
A Note on An Encryption Scheme of Kurosawa and Desmedt
Rosario Gennaro and Victor Shoup
2004/193 ( PDF )
The Security and Performance of the Galois/Counter Mode of Operation (Full Version)
David A. McGrew and John Viega
2004/192 ( -- withdrawn -- )
Security Pitfalls of an efficient remote user authentication scheme using smart cards
Manoj Kumar
2004/191 ( PS PS.GZ )
Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations
Pradeep Kumar Mishra
2004/190 ( PS PS.GZ PDF )
Distributed Ring Signatures for Identity-Based Scenarios
Javier Herranz and Germ\'an S\'aez
2004/189 ( PDF )
Computing Modular Polynomials
Denis Charles and Kristin Lauter
2004/188 ( PS PS.GZ PDF )
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
Vincent Carlier and Hervé Chabanne and Emmanuelle Dottax
2004/187 ( PS PS.GZ PDF )
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques Quisquater
2004/186 ( -- withdrawn -- )
A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
Manoj Kumar
2004/185 ( PS PS.GZ PDF )
On the Existence of low-degree Equations for Algebraic Attacks
Frederik Armknecht
2004/184 ( PS PS.GZ PDF )
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Amit K Awasthi and Sunder Lal
2004/183 ( PS PS.GZ PDF )
A New Forward Secure Signature Scheme
Bo Gyeong Kang and Je Hong Park and Sang Geun Hahn
2004/182 ( PS PS.GZ PDF )
Simpler Session-Key Generation from Short Random Passwords
Minh-Huyen Nguyen and Salil Vadhan
2004/181 ( PS PS.GZ PDF )
On the Composition of Authenticated Byzantine Agreement
Yehuda Lindell and Anna Lysyanskaya and Tal Rabin
2004/180 ( PDF )
Efficient Identity-Based Encryption Without Random Oracles
Brent R. Waters
2004/179 ( PS PS.GZ PDF )
Identity Based Threshold Ring Signature
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu
2004/178 ( PDF )
Optimal Updating of Ideal Threshold Schemes
S. G. Barwick and W.-A. Jackson and K. M. Martin and C. M. O'Keefe
2004/177 ( PDF )
Updating the Parameters of a Threshold Scheme by Minimal Broadcast
S. G. Barwick and W.-A. Jackson and K. M. Martin
2004/176 ( PDF )
A Biometric Identity Based Signature Scheme
Andrew Burnett and Adam Duffy and Tom Dowling
2004/175 ( PDF )
A Proof of Yao's Protocol for Secure Two-Party Computation
Yehuda Lindell and Benny Pinkas
2004/174 ( PS PS.GZ PDF )
Short Group Signatures
Dan Boneh and Xavier Boyen and Hovav Shacham
2004/173 ( PS PS.GZ PDF )
Secure Identity Based Encryption Without Random Oracles
Dan Boneh and Xavier Boyen
2004/172 ( PS PS.GZ PDF )
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
Dan Boneh and Xavier Boyen
2004/171 ( PS PS.GZ PDF )
Short Signatures Without Random Oracles
Dan Boneh and Xavier Boyen
2004/170 ( PS PS.GZ PDF )
Efficient Consistency Proofs for Generalized Queries on a Committed Database
Rafail Ostrovsky and Charles Rackoff and Adam Smith
2004/169 ( PDF )
Regional Blackouts: Protection of Broadcast Content on 3G Networks.
Alexander W. Dent and Allan Tomlinson
2004/168 ( PS PS.GZ )
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
T.Moh and J.M.Chen and Boyin Yang
2004/167 ( PS PS.GZ PDF )
A Secure and Efficient Key Exchange Protocol for Mobile Communications
Fuw-Yi Yang and Jinn-Ke Jan
2004/166 ( PDF )
FRMAC, a Fast Randomized Message Authentication Code
Eliane Jaulmes and Reynald Lercier
2004/165 ( PDF )
A comparison of MNT curves and supersingular curves
D. Page and N.P. Smart and F. Vercauteren
2004/164 ( PDF )
ID-based Cryptography from Composite Degree Residuosity
Man Ho Au and Victor K. Wei
2004/163 ( -- withdrawn -- )
On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
Manoj Kumar
2004/162 ( PS PS.GZ PDF )
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
Ivan Damgaard and Thomas Pedersen and Louis Salvail
2004/161 ( PS PS.GZ PDF )
Improvement of ThLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
Ko-ichi Nagao
2004/160 ( PS PS.GZ PDF )
Scalable Public-Key Tracing and Revoking
Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung
2004/159 ( PS PS.GZ PDF )
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Gergely Acs and Levente Buttyan and Istvan Vajda
2004/158 ( PDF )
Mobile Terminal Security
Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and St\'ephane Soci\'e and Claire Whelan
2004/157 ( PS PS.GZ PDF )
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
R. Granger and D. Page and M. Stam
2004/156 ( PDF )
Quantum cryptography: a practical information security perspective
Kenneth G. Paterson and Fred Piper and Ruediger Schack
2004/155 ( PDF )
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
Amir Herzberg and Ahmad Gbara
2004/154 ( PDF )
Controlling Spam by Secure Internet Content Selection
Amir Herzberg
2004/153 ( PS PS.GZ PDF )
A double large prime variation for small genus hyperelliptic index calculus
P. Gaudry and E. Thom{\'e} and N. Th{\'e}riault and C. Diem
2004/152 ( PDF )
Another Look at ``Provable Security''
Neal Koblitz and Alfred Menezes
2004/151 ( PDF )
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$
Mitsuhiro Haneda and Mitsuru Kawazoe and Tetsuya Takahashi
2004/150 ( PS PS.GZ PDF )
An Authenticated Certificateless Public Key Encryption Scheme
Young-Ran Lee and Hyang-Sook Lee
2004/149 ( PDF )
Secure and Efficient AES Software Implementation for Smart Caards
E. Trichina and L. Korkishko
2004/148 ( PDF )
Provably Secure Delegation-by-Certification Proxy Signature Schemes
Zuowen Tan and Zhuojun Liu
2004/147 ( PS PS.GZ PDF )
Key Recovery Method for CRT Implementation of RSA
Matthew J. Campagna and Amit Sethi
2004/146 ( PS PS.GZ )
Near-Collisions of SHA-0
Eli Biham, Rafi Chen
2004/145 ( PS PS.GZ PDF )
Electromagnetic Side Channels of an FPGA Implementation of AES
Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax and Hervé Pelletier
2004/144 ( PS PS.GZ )
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
Alexander Maximov and Martin Hell and Subhamoy Maitra
2004/143 ( PS PS.GZ PDF )
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
Nicolas T. Courtois
2004/142 ( -- withdrawn -- )
Elliptic Curve based Signcryption and its Multi-party Schemes
Yiliang HAN and Xiaoyuan YANG
2004/141 ( PS PS.GZ PDF )
Elastic AES
Debra L. Cook and Moti Yung and Angelos D. Keromytis
2004/140 ( -- withdrawn -- )
Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
P. Kitsos and M. D. Galanis and O. Koufopavlou
2004/139 ( PS PS.GZ PDF )
New Notions of Security: Achieving Universal Composability without Trusted Setup
Manoj Prabhakaran and Amit Sahai
2004/138 ( PS PS.GZ PDF )
How to Disembed a Program?
Benoit Chevallier-Mames and David Naccache and Pascal Paillier and David Pointcheval
2004/137 ( PDF )
New GF(2n) Parallel Multiplier Using Redundant Representation
Haining Fan and Yiqi Dai
2004/136 ( PDF )
CompChall: Addressing Password Guessing Attacks
Vipul Goyal and Virendra Kumar and Mayank Singh and Ajith Abraham and Sugata Sanyal
2004/135 ( PDF )
More Efficient Server Assisted One Time Signatures
Vipul Goyal
2004/134 ( PDF )
Secure and Efficient Masking of AES - A Mission Impossible?
Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller
2004/133 ( PS PS.GZ PDF )
Secret Handshakes from CA-Oblivious Encryption
Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik
2004/132 ( PS PS.GZ PDF )
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
R. Granger and D. Page and M. Stam
2004/131 ( PS PS.GZ PDF )
A New ID-based Signature with Batch Verification
Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon
2004/130 ( PS PS.GZ PDF )
Private Inference Control
David Woodruff and Jessica Staddon
2004/129 ( PS PS.GZ PDF )
Generalizing Kedlaya's order counting based on Miura Theory
Joe Suzuki
2004/128 ( PS PS.GZ PDF )
Elastic Block Ciphers
Debra L. Cook and Moti Yung and Angelos D. Keromytis
2004/127 ( PS PS.GZ PDF )
DDH-based Group Key Agreement in a Mobile Environment
Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won
2004/126 ( PDF )
Two Software Normal Basis Multiplication Algorithms for GF(2n)
Haining Fan and Yiqi Dai
2004/125 ( PS PS.GZ PDF )
EME*: extending EME to handle arbitrary-length messages with associated data
Shai Halevi
2004/124 ( PS PS.GZ )
Universally Composable DKG with Linear Number of Exponentiations
Douglas Wikström
2004/123 ( PS PS.GZ PDF )
On security of XTR public key cryptosystems against Side Channel Attacks
Dong-Guk Han and Jongin Lim and Kouichi Sakurai
2004/122 ( PDF )
A New Two-Party Identity-Based Authenticated Key Agreement
Noel McCullagh and Paulo S. L. M. Barreto
2004/121 ( PS PS.GZ PDF )
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
Tsz Hon Yuen and Victor K. Wei
2004/120 ( PS PS.GZ PDF )
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
Bartosz Zoltak
2004/119 ( PS PS.GZ PDF )
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
Masayuki Abe and Serge Fehr
2004/118 ( PS PS.GZ PDF )
Fast addition on non-hyperelliptic genus $3$ curves
Stéphane Flon and Roger Oyono and Christophe Ritzenthaler
2004/117 ( PS PS.GZ PDF )
Efficient and Forward-Secure Identity-Based Signcryption
Noel McCullagh and Paulo S. L. M. Barreto
2004/116 ( PS PS.GZ PDF )
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
Ran Canetti and Eyal Kushilevitz and Yehuda Lindell
2004/115 ( PS PS.GZ PDF )
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won
2004/114 ( PS PS.GZ )
Improved Identity-Based Signcryption
Liqun Chen and John Malone-Lee
2004/113 ( PS PS.GZ PDF )
On the Security and Composability of the One Time Pad
Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade
2004/112 ( PDF )
Relation between XL algorithm and Groebner Bases Algorithms
M. Sugita and M. Kawazoe and H. Imai
2004/111 ( PS PS.GZ PDF )
The Vulnerability of SSL to Chosen Plaintext Attack
Gregory V. Bard
2004/110 ( PDF )
Designing Against the `Overdefined System of Equations' Attack
Carlisle Adams
2004/109 ( PDF )
Concealing Complex Policies with Hidden Credentials
Robert Bradshaw and Jason Holt and Kent Seamons
2004/108 ( PS PS.GZ PDF )
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
2004/107 ( PS PS.GZ PDF )
Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic
Bertrand BYRAMJEE and Sylvain DUQUESNE
2004/106 ( PDF )
Capacity and Examples of Template Protecting Biometric Authentication Systems
P. Tuyls and J. Goseling
2004/105 ( PS PS.GZ PDF )
Receipt-Free Homomorphic Elections and Write-in Ballots
Alessandro Acquisti
2004/104 ( PS PS.GZ PDF )
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
Lan Nguyen and Rei Safavi-Naini
2004/103 ( PS PS.GZ PDF )
Cryptanalysis of SFlash v3
Jintai Ding and Dieter Schmidt
2004/102 ( PS PS.GZ PDF )
The Exact Security of an Identity Based Signature and its Applications
Benoît Libert and Jean-Jacques Quisquater
2004/101 ( PS PS.GZ PDF )
Provably Secure Masking of AES
Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel
2004/100 ( PDF )
The Sorcerer’s Apprentice Guide to Fault Attacks
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan
2004/099 ( PS PS.GZ PDF )
Secure Hashed Diffie-Hellman over Non-DDH Groups
Rosario Gennaro and Hugo Krawczyk and Tal Rabin
2004/098 ( PS PS.GZ PDF )
Attacking a Public Key Cryptosystem Based on Tree Replacement
María Isabel González Vasco and David Pérez García
2004/097 ( PDF )
How To Re-initialize a Hash Chain
Vipul Goyal
2004/096 ( -- withdrawn -- )
On the Ambiguity of Concurrent Signatures
Yi Mu and Fangguo Zhang and Willy Susilo
2004/095 ( PS PS.GZ PDF )
GNFS Factoring Statistics of RSA-100, 110, ..., 150
Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki Ueda
2004/094 ( PS PS.GZ PDF )
Block Ciphers and Stream Ciphers: The State of the Art
Alex Biryukov
2004/093 ( PS PS.GZ PDF )
A Provably Secure Nyberg-Rueppel Signature Variant with Applications
Giuseppe Ateniese and Breno de Medeiros
2004/092 ( PS PS.GZ PDF )
A New Stream Cipher HC-256
Hongjun Wu
2004/091 ( PDF )
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun and Maithili Narasimha and Gene Tsudik
2004/090 ( PDF )
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
Ratna Dutta and Rana Barua and and Palash Sarkar
2004/089 ( PS PS.GZ PDF )
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
Mahalingam Ramkumar and Nasir Memon
2004/088 ( -- withdrawn -- )
Efficient Batch Verification of Signature Schemes based on Bilinear Maps
Noel McCullagh
2004/087 ( PS PS.GZ PDF )
Using primitive subgroups to do more with fewer bits
K. Rubin and A. Silverberg
2004/086 ( PDF )
Fuzzy Identity Based Encryption
Amit Sahai and Brent Waters
2004/085 ( PDF )
The CS2 Block Cipher
Tom St Denis
2004/084 ( PDF )
Evaluating elliptic curve based KEMs in the light of pairings
David Galindo and Sebastia Martin and Jorge L. Villar
2004/083 ( PDF )
Scan Based Side Channel Attack on Data Encryption Standard
Bo Yang and Kaijie Wu and Ramesh Karri
2004/082 ( PDF )
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
Michael Backes and Birgit Pfitzmann and Michael Waidner
2004/081 ( PDF )
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
Philip Hawkes and Gregory G. Rose
2004/080 ( PDF )
HENKOS Stream Cipher
Marius Oliver Gheorghita
2004/079 ( PDF )
Pairing-Based One-Round Tripartite Key Agreement Protocols
Zhaohui Cheng and Luminita Vasiu and Richard Comley
2004/078 ( PS PS.GZ PDF )
Analysis of the WinZip encryption method
Tadayoshi Kohno
2004/077 ( PS PS.GZ PDF )
Foundations of Group Signatures: The Case of Dynamic Groups
Mihir Bellare and Haixia Shi and Chong Zhang
2004/076 ( PS PS.GZ PDF )
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders
Aggelos Kiayias and Moti Yung
2004/075 ( PDF )
An Hybrid Mode of Operation
Alexis W. Machado
2004/074 ( PS PS.GZ PDF )
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
Liam Keliher and Henk Meijer and Stafford Tavares
2004/073 ( PS PS.GZ )
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
Pierrick Gaudry
2004/072 ( PS PS.GZ PDF )
Asymmetric Cryptography: Hidden Field Equations
Christopher Wolf and Bart Preneel
2004/071 ( PS PS.GZ PDF )
An IBE Scheme to Exchange Authenticated Secret Keys
Benits Jr, Waldyr and Terada, Routo
2004/070 ( PS PS.GZ PDF )
Easy decision-Diffie-Hellman groups
Steven D Galbraith and Victor Rotger
2004/069 ( PS PS.GZ )
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai
2004/068 ( PDF )
Synthesis of Secure FPGA Implementations
Kris Tiri and Ingrid Verbauwhede
2004/067 ( PDF )
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis
Kris Tiri and Ingrid Verbauwhede
2004/066 ( PDF )
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
Kris Tiri and Ingrid Verbauwhede
2004/065 ( PS PS.GZ PDF )
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
Ian Blake, Kumar Murty, and Guangwu Xu
2004/064 ( PS PS.GZ PDF )
Pairing-Based Cryptographic Protocols : A Survey
Ratna Dutta and Rana Barua and Palash Sarkar
2004/063 ( PS PS.GZ PDF )
An Oblivious Transfer Protocol with Log-Squared Communication
Helger Lipmaa
2004/062 ( PS PS.GZ PDF )
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
John Black and Martin Cochran and Thomas Shrimpton
2004/061 ( PS PS.GZ PDF )
TTS: Rank Attacks in Tame-Like Multivariate PKCs
Bo-Yin Yang and Jiun-Ming Chen
2004/060 ( PS PS.GZ PDF )
Positive Results and Techniques for Obfuscation
Benjamin Lynn and Manoj Prabhakaran and Amit Sahai
2004/059 ( PS PS.GZ )
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Michael Backes and Birgit Pfitzmann
2004/058 ( PS PS.GZ PDF )
Generating more MNT elliptic curves
Michael Scott and Paulo S.L.M Barreto
2004/057 ( PS PS.GZ PDF )
On Multiple Linear Approximations
Alex Biryukov and Christophe De Canni\`ere and Michael Quisquater
2004/055 ( PS PS.GZ PDF )
Redundant Trinomials for Finite Fields of Characteristic $2$
Christophe Doche
2004/054 ( PS PS.GZ PDF )
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
2004/053 ( PS PS.GZ PDF )
Efficient and Universally Composable Committed Oblivious Transfer and Applications
Juan Garay and Philip MacKenzie and Ke Yang
2004/052 ( PS PS.GZ PDF )
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Tal Malkin and Satoshi Obana and Moti Yung
2004/051 ( PS PS.GZ PDF )
Privacy Preserving Keyword Searches on Remote Encrypted Data
Yan-Cheng Chang and Michael Mitzenmacher
2004/050 ( PS PS.GZ PDF )
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
2004/049 ( PS PS.GZ )
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
Christophe Clavier
2004/048 ( PS PS.GZ PDF )
Tail-MAC: A Message Authentication Scheme for Stream Ciphers
Bartosz Zoltak
2004/047 ( PS PS.GZ )
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
Yodai Watanabe
2004/046 ( PS PS.GZ PDF )
Revision of Tractable Rational Map Cryptosystem
Lih-Chung Wang and Fei-Hwang Chang
2004/045 ( PS PS.GZ PDF )
Lower Bounds and Impossibility Results for Concurrent Self Composition
Yehuda Lindell
2004/044 ( PS PS.GZ PDF )
Transitive Signatures Based on Non-adaptive Standard Signatures
Zhou Sujing
2004/043 ( PS PS.GZ PDF )
Multi-sequences with d-perfect property
Xiutao Feng, Quanlong Wang and Zongduo Dai
2004/042 ( -- withdrawn -- )
Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
Joseph K. Liu and Victor K. Wei and Duncan S. Wong
2004/041 ( PS PS.GZ )
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
Cheng-Kang Chu and Wen-Guey Tzeng
2004/040 ( PS PS.GZ PDF )
Cryptanalysis of a timestamp-based password authentication scheme
Lizhen Yang, Kefei Chen
2004/039 ( PDF )
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
Victor K. Wei
2004/038 ( PS PS.GZ PDF )
Chameleon Hashing without Key Exposure
Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
2004/037 ( PS PS.GZ )
A Provably Secure Scheme for Restrictive Partially Blind Signatures
Fuw-Yi Yang and Jinn-Ke Jan
2004/036 ( PS PS.GZ PDF )
Single Database Private Information Retrieval with Logarithmic Communication
Yan-Cheng Chang
2004/035 ( PS PS.GZ PDF )
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
Phillip Rogaway and Thomas Shrimpton
2004/034 ( PDF )
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
Gideon Samid
2004/033 ( PS PS.GZ PDF )
New Approaches to Password Authenticated Key Exchange based on RSA
Muxiang Zhang
2004/032 ( PS PS.GZ PDF )
Compressed Pairings
Michael Scott and Paulo S. L. M. Barreto
2004/031 ( PS PS.GZ PDF )
Summation polynomials and the discrete logarithm problem on elliptic curves
Igor Semaev
2004/030 ( PDF )
Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
Colin Stahlke
2004/029 ( PDF )
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar
2004/028 ( PS PS.GZ )
Custodian-Hiding Verifiable Encryption
Joseph K. Liu and Victor K. Wei and Duncan S. Wong
2004/027 ( PDF )
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
Joseph K. Liu and Victor K. Wei and Duncan S. Wong
2004/026 ( PS PS.GZ PDF )
The CSQUARE Transform
Tom St Denis
2004/025 ( PDF )
Clarifying Obfuscation: Improving the Security of White-Box Encoding
Hamilton E. Link and William D. Neumann
2004/024 ( PS PS.GZ PDF )
Exponential S-boxes
Sergey Agievich and Andrey Afonenko
2004/023 ( PDF )
RDS: Remote Distributed Scheme for Protecting Mobile Agents
Asnat Dadon-Elichai
2004/022 ( PS PS.GZ PDF )
Privacy-Enhanced Searches Using Encrypted Bloom Filters
Steven M. Bellovin and William R. Cheswick
2004/021 ( PS PS.GZ PDF )
Externalized Fingerprint Matching
Claude Barral and Jean-S\'{e}bastien Coron and David Naccache
2004/020 ( PS PS.GZ PDF )
Optimal Signcryption from Any Trapdoor Permutation
Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish
2004/019 ( PS PS.GZ PDF )
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu Iwata and Tadayoshi Kohno
2004/018 ( PS PS.GZ PDF )
Corrections of the NIST Statistical Test Suite for Randomness
Song-Ju Kim and Ken Umeno and Akio Hasegawa
2004/017 ( PS PS.GZ )
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
M. Scott
2004/016 ( PS PS.GZ PDF )
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
Dennis Hofheinz and Joern Mueller-Quade
2004/015 ( PDF )
An AGM-type elliptic curve point counting algorithm in characteristic three
Trond St{\o}len Gustavsen and Kristian Ranestad
2004/014 ( PS PS.GZ PDF )
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
Sugata Gangopadhyay and Subhamoy Maitra
2004/013 ( PS PS.GZ PDF )
Cryptanalysis of a Provably Secure Cryptographic Hash Function
Jean-Sebastien Coron and Antoine Joux
2004/012 ( PS PS.GZ PDF )
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2004/011 ( PDF )
Known-Plaintext Attack Against a Permutation Based Video
Adam J. Slagell
2004/010 ( PDF )
Fast Pseudo-Hadamard Transforms
Tom St Denis
2004/009 ( PS PS.GZ PDF )
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
Juan A. Garay and Philip MacKenzie and Ke Yang
2004/008 ( PS PS.GZ PDF )
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
Mihir Bellare and Adriana Palacio
2004/007 ( PS PS.GZ PDF )
Traceable Signatures
Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
2004/006 ( PS PS.GZ )
Protocol Initialization for the Framework of Universal Composability
Boaz Barak and Yehuda Lindell and Tal Rabin
2004/005 ( PDF )
Universal Undeniable Signatures
Huafei Zhu
2004/004 ( -- withdrawn -- )
2004/003 ( PS PS.GZ )
On the Role of the Inner State Size in Stream Ciphers
Erik Zenner
2004/002 ( PS PS.GZ PDF )
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
Yuichi Komano and Kazuo Ohta

[ Cryptology ePrint archive ]