Cryptology ePrint Archive: Listing for 2004
-
2004/377 ( PS PS.GZ PDF )
- New Distributed Ring Signatures for General Families of Signing Subsets
- Javier Herranz and Germán Sáez
-
2004/376 ( PDF )
- Cryptanalysis of RCES/RSES Image Encryption Scheme
- Shujun Li and Chengqing Li and Guanrong Chen and Kwok-Tung Lo
-
2004/375 ( PS PS.GZ PDF )
- Efficient Pairing Computation on Supersingular Abelian Varieties
- Paulo S. L. M. Barreto and Steven Galbraith and Colm O hEigeartaigh and Michael Scott
-
2004/374 ( PDF )
- A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
- Shujun Li and Chengqing Li and Guanrong Chen and Nikolaos G. Bourbakis and Kwok-Tung Lo
-
2004/373 ( PS PS.GZ PDF )
- Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs
- Chunming Tang and Dingyi Pei and Zhuojun Liu
-
2004/372 ( -- withdrawn -- )
- On The Security of Two Key-Updating Signature Schemes
- Xingyang Guo
-
2004/371 ( PDF )
- Construction and Traversal of Hash Chain with Public Links
- Vipul Goyal
-
2004/370 ( PDF )
- Tracing-by-Linking Group Signautres
- Victor K. Wei
-
2004/369 ( PDF )
- SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
- Filipe Rosado da-Fonseca
-
2004/368 ( PS PS.GZ PDF )
- Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
- Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek
-
2004/367 ( PS PS.GZ PDF )
- On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
- Patrick Felke
-
2004/366 ( PDF )
- Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key
- Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita
-
2004/365 ( PS PS.GZ PDF )
- Ordinary abelian varieties having small embedding degree
- Steven D. Galbraith, and J. McKee and P. Valenca
-
2004/364 ( PS PS.GZ PDF )
- Finding good differential patterns for attacks on SHA-1
- Krystian Matusiewicz and Josef Pieprzyk
-
2004/363 ( PDF )
- Rethinking the security of some authenticated group key agreement schemes
- Qiang Tang and Chris J. Mitchell
-
2004/362 ( PDF )
- A new security proof for Damgĺrd's ElGamal
- Kristian Gjřsteen
-
2004/361 ( PS PS.GZ PDF )
- Superfluous Keys in Multivariate Quadratic Asymmetric Systems
- Christopher Wolf and Bart Preneel
-
2004/360 ( PS PS.GZ PDF )
- Equivalent Keys in HFE, C$^*$, and variations
- Christopher Wolf and Bart Preneel
-
2004/359 ( PS PS.GZ PDF )
- Secure Computation of the Mean and Related Statistics
- Eike Kiltz and Gregor Leander and John Malone-Lee
-
2004/358 ( PS PS.GZ PDF )
- Reusable Cryptographic Fuzzy Extractors
- Xavier Boyen
-
2004/357 ( PDF )
- MD5 To Be Considered Harmful Someday
- Dan Kaminsky
-
2004/356 ( PDF )
- Practical Attacks on Digital Signatures Using MD5 Message Digest
- Ondrej Mikle
-
2004/355 ( PDF )
- A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates
- Pei-yih Ting and Po-Yueh Hung
-
2004/354 ( PS PS.GZ )
- Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra
- Alexander Maximov
-
2004/353 ( PS PS.GZ PDF )
- Direct Division in Factor Rings
- Patrick Fitzpatrick and Christopher Wolf
-
2004/352 ( PS PS.GZ PDF )
- Practical Cryptography in High Dimensional Tori
- Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David Woodruff
-
2004/351 ( -- withdrawn -- )
- Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
- ZhenFeng ZHANG and YongBin ZHOU and DengGuo FENG
-
2004/350 ( PS PS.GZ PDF )
- Multivariable public--key cryptosystems
- Jintai Ding and Dieter Schmidt
-
2004/349 ( PS PS.GZ PDF )
- A DPA Attack on the Improved Ha-Moon Algorithm
- Dong Jin PARK and Pil Joong LEE
-
2004/348 ( PS PS.GZ PDF )
- A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2004/347 ( PS PS.GZ PDF )
- Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''
- Marco Macchetti
-
2004/346 ( PS PS.GZ PDF )
- Random Switching Logic: A Countermeasure against DPA based on Transition Probability
- Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa
-
2004/345 ( PS PS.GZ PDF )
- On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited
- Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock and Greg Maitland
-
2004/344 ( PDF )
- Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures
- Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte
-
2004/343 ( PDF )
- Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols
- Kim-Kwang Raymond Choo
-
2004/342 ( PS PS.GZ PDF )
- A comb method to render ECC resistant against Side Channel Attacks
- Mustapha Hedabou and Pierre Pinel and Lucien Bénéteau
-
2004/341 ( PS PS.GZ PDF )
- Reducing Complexity Assumptions for Statistically-Hiding Commitment
- Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli
-
2004/340 ( PDF )
- Request for Review of Key Wrap Algorithms
- Morris Dworkin
-
2004/339 ( PS PS.GZ )
- Divisors in Residue Classes, Constructively
- Don Coppersmith and Nick Howgrave-Graham and S. V. Nagaraj
-
2004/338 ( PS PS.GZ PDF )
- Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
- Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai
-
2004/337 ( PDF )
- Security on Generalized Feistel Scheme with SP Round Function
- Wu Wenling and Zhang Wentao and Lin Dongdai
-
2004/336 ( PS PS.GZ PDF )
- Oblivious Transfer Is Symmetric
- Stefan Wolf and Jürg Wullschleger
-
2004/335 ( PS PS.GZ )
- Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
- Haitner Iftach and Shaltiel Ronen
-
2004/334 ( PDF )
- Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)
- Ran Canetti and Jonathan Herzog
-
2004/333 ( PS PS.GZ PDF )
- Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem
- Marius-Calin Silaghi
-
2004/332 ( PDF )
- Sequences of games: a tool for taming complexity in security proofs
- Victor Shoup
-
2004/331 ( PDF )
- Code-Based Game-Playing Proofs and the Security of Triple Encryption
- Mihir Bellare and Phillip Rogaway
-
2004/330 ( PS PS.GZ )
- Multicollision Attacks on Generalized Hash Functions
- M. Nandi and D. R. Stinson
-
2004/329 ( PS PS.GZ PDF )
- Hardness amplification of weakly verifiable puzzles
- Ran Canetti and Shai Halevi and Michael Steiner
-
2004/328 ( -- withdrawn -- )
- Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model
- Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee
-
2004/327 ( PS PS.GZ PDF )
- Efficient Identity Based Ring Signature
- Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui
-
2004/326 ( PS PS.GZ PDF )
- Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme
- Zhengjun Cao
-
2004/325 ( PS PS.GZ PDF )
- Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules
- Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA
-
2004/324 ( PDF )
- On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions
- G. Laccetti and G. Schmid
-
2004/323 ( PS PS.GZ PDF )
- A note on López-Dahab coordinates
- Tanja Lange
-
2004/322 ( PS PS.GZ PDF )
- Separable and Anonymous Identity-Based Key Issuing
- Ai-fen Sui and Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow and W.W. Tsang and C.F. Chong and K.H. Pun and H.W. Chan
-
2004/321 ( PDF )
- The conjugacy search problem in public key cryptography: unnecessary and insufficient
- Vladimir Shpilrain and Alexander Ushakov
-
2004/320 ( PS PS.GZ PDF )
- Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
- Alfonso De Gregorio
-
2004/319 ( PS PS.GZ PDF )
- Badger - A Fast and Provably Secure MAC
- Martin Boesgaard and Ove Scavenius and Thomas Pedersen and Thomas Christensen and Erik Zenner
-
2004/318 ( PS PS.GZ PDF )
- Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
- Martin Hirt and Jesper Buus Nielsen
-
2004/317 ( PS PS.GZ PDF )
- Adaptively-Secure, Non-Interactive Public-Key Encryption
- Ran Canetti and Shai Halevi and Jonathan Katz
-
2004/316 ( PS PS.GZ PDF )
- On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme
- Zhengjun Cao
-
2004/315 ( PDF )
- Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
- Qin Wang, Zhenfu Cao
-
2004/314 ( PDF )
- A Technical Comparison of IPSec and SSL
- AbdelNasir Alshamsi and Takamichi Saito
-
2004/313 ( PS PS.GZ PDF )
- Cryptanalysis of a threshold proxy signature with known signers
- Fuw-Yi Yang, Jinn-Ke Jan, and Woei-Jiunn Jeng
-
2004/312 ( PS PS.GZ PDF )
- Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
- David Jao and Stephen D. Miller and Ramarathnam Venkatesan
-
2004/311 ( PS PS.GZ PDF )
- Hierarchical Group Signatures
- Marten Trolin and Douglas Wikstrom
-
2004/310 ( PS PS.GZ PDF )
- A Verifiable Random Function With Short Proofs and Keys
- Yevgeniy Dodis and Aleksandr Yampolskiy
-
2004/309 ( PS PS.GZ PDF )
- The Power of Verification Queries in Message Authentication and Authenticated Encryption
- Mihir Bellare and Oded Goldreich and Anton Mityagin
-
2004/308 ( PDF )
- Cryptanalysis of Noel McCullagh and Paulo S. L. M. BarretoĄŻs two-party identity-based key agreement
- Guohong Xie
-
2004/307 ( PS PS.GZ PDF )
- Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme
- Zhengjun Cao
-
2004/306 ( PS PS.GZ )
- The Static Diffie-Hellman Problem
- Daniel R. L. Brown and Robert P. Gallant
-
2004/305 ( PS PS.GZ PDF )
- A note on efficient computation of cube roots in characteristic 3
- Paulo S. L. M. Barreto
-
2004/304 ( PDF )
- Second Preimages on n-bit Hash Functions for Much Less than 2^n Work
- John Kelsey and Bruce Schneier
-
2004/303 ( PS PS.GZ PDF )
- Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields
- Soonhak Kwon
-
2004/302 ( PDF )
- Security of Wang-Li Threshold Signature Scheme
- Lifeng Guo
-
2004/301 ( PS PS.GZ PDF )
- VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
- Bartosz Zoltak
-
2004/300 ( PS PS.GZ )
- Relating Symbolic and Cryptographic Secrecy
- Michael Backes and Birgit Pfitzmann
-
2004/299 ( PS PS.GZ PDF )
- Security Flaws in a Pairing-based Group Signature Scheme
- Zhengjun Cao and Sherman S.M. Chow
-
2004/298 ( PDF )
- Nominative Proxy Signature Schemes
- Zuo-Wen Tan,Zhuo-Jun Liu
-
2004/297 ( PS PS.GZ PDF )
- Post-Quantum Signatures
- Johannes Buchmann and Carlos Coronado and Martin Döring and Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and Arthur Schmidt and Ulrich Vollmer and Ralf-Philipp Weinmann
-
2004/296 ( PS PS.GZ PDF )
- Designs of Efficient Secure Large Hash Values
- Mridul Nandi
-
2004/295 ( PS PS.GZ PDF )
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
- Jiang Wu and Ruizhong Wei
-
2004/294 ( PS PS.GZ PDF )
- Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher
- Souradyuti Paul and Bart Preneel
-
2004/293 ( PS PS.GZ )
- Provably Secure Authentication of Digital Media Through Invertible Watermarks
- Jana Dittmann and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith
-
2004/292 ( PS PS.GZ PDF )
- Asynchronous Proactive RSA
- Ruishan Zhang and Kefei Chen
-
2004/291 ( PS PS.GZ PDF )
- The Rabbit Stream Cipher - Design and Security Analysis
- Martin Boesgaard and Thomas Pedersen and Mette Vesterager and Erik Zenner
-
2004/290 ( PS PS.GZ PDF )
- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
- Wakaha Ogata and Kaoru Kurosawa and Swee-Huay Heng
-
2004/289 ( PDF )
- Fault attack on the DVB Common Scrambling Algorithm
- Kai Wirt
-
2004/288 ( -- withdrawn -- )
- A New Designated Confirmer Signature Variant with Intended Recipient
- Yong Li and Dingyi Pei
-
2004/287 ( PS PS.GZ PDF )
- Almost Ideal Contrast Visual Cryptography with Reversing
- Duong Quang Viet and Kaoru Kurosawa
-
2004/286 ( PS PS.GZ )
- Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions
- Daniele Micciancio
-
2004/285 ( PS PS.GZ PDF )
- Generation of random Picard curves for cryptography
- Annegret Weng
-
2004/284 ( PS PS.GZ PDF )
- ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS
- Qingshu Meng and Huanguo Zhang and Min Yang and Jingsong Cui
-
2004/283 ( PS PS.GZ PDF )
- Fault and Side-Channel Attacks on Pairing Based Cryptography
- D. Page and F. Vercauteren
-
2004/282 ( PS PS.GZ PDF )
- New Monotone Span Programs from Old
- Ventzislav Nikov and Svetla Nikova
-
2004/281 ( PS PS.GZ PDF )
- Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
- Patrick P. Tsang and Victor K. Wei
-
2004/280 ( PS PS.GZ PDF )
- Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme
- Zhengjun Cao
-
2004/279 ( PS PS.GZ PDF )
- Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic
- Jean-Claude Bajard and Laurent Imbert and Graham A. Jullien
-
2004/278 ( PDF )
- The Extended Codebook (XCB) Mode of Operation
- David A. McGrew and Scott R. Fluhrer
-
2004/277 ( PDF )
- Experimenting with Faults, Lattices and the DSA
- David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan
-
2004/276 ( PDF )
- Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions
- C. Carlet
-
2004/275 ( PDF )
- An e-Voting Scheme with Improved Resistance to Bribe and Coercion
- Wei-Chi Ku and Chun-Ming Ho
-
2004/274 ( PDF )
- A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS
- Meng Qing-shu and Yang min and Zhang huan-guo and Cui jing-song
-
2004/273 ( PDF )
- Cryptanalysis of Threshold-Multisignature schemes
- Lifeng Guo
-
2004/272 ( PDF )
- A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
- Tom Shrimpton
-
2004/271 ( PDF )
- The Mundja Streaming MAC
- Philip Hawkes and Michael Paddon and Gregory G. Rose
-
2004/270 ( PS PS.GZ PDF )
- An Enhanced and Secure Protocol for Authenticated Key Exchange
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/269 ( PDF )
- Cryptanalysis of Threshold-Multisignature Schemes
- Lifeng Guo
-
2004/268 ( PS PS.GZ PDF )
- Untraceability of Wang-Fu Group Signature Scheme
- Zhengjun Cao and Lihua Liu
-
2004/267 ( PS PS.GZ PDF )
- Separable Linkable Threshold Ring Signatures
- Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong
-
2004/266 ( PS PS.GZ PDF )
- A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
- M. Khabbazian and T.A. Gulliver
-
2004/265 ( PDF )
- sSCADA: Securing SCADA Infrastructure Communications
- Yongge Wang and Bei-Tseng Chu
-
2004/264 ( PDF )
- Musings on the Wang et al. MD5 Collision
- Philip Hawkes and Michael Paddon and Gregory G. Rose
-
2004/263 ( PS PS.GZ PDF )
- Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems
- Christopher Wolf and Bart Preneel
-
2004/262 ( PS PS.GZ PDF )
- Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
- Lihua Liu and Zhengjun Cao
-
2004/261 ( PS PS.GZ PDF )
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
- Dan Boneh and Jonathan Katz
-
2004/260 ( PS PS.GZ PDF )
- Secure Group Communications over Combined Wired/Wireless Networks
- Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won
-
2004/259 ( PS PS.GZ PDF )
- On Boolean Functions with Generalized Cryptographic Properties
- An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
-
2004/258 ( PS PS.GZ PDF )
- Escrow-Free Encryption Supporting Cryptographic Workflow
- S.S. Al-Riyami and J. Malone-Lee and N.P. Smart
-
2004/257 ( PS PS.GZ PDF )
- A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2004/256 ( PDF )
- On the supports of the Walsh transforms of Boolean functions
- Claude Carlet and Sihem Mesnager
-
2004/255 ( PS PS.GZ PDF )
- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
- Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi
-
2004/254 ( PS PS.GZ )
- New paradigms for digital generation and post-processing of random data
- Jovan Dj. Golic
-
2004/253 ( PDF )
- Design Principles for Iterated Hash Functions
- Stefan Lucks
-
2004/252 ( PS PS.GZ PDF )
- Security Proofs for Identity-Based Identification and Signature Schemes
- Mihir Bellare and Chanathip Namprempre and Gregory Neven
-
2004/251 ( PS PS.GZ PDF )
- Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices
- Junghyun Nam, Seungjoo Kim, and Dongho Won
-
2004/250 ( PDF )
- Identity Based Threshold Proxy Signature
- Jing Xu and Zhenfeng Zhang and Dengguo Feng
-
2004/249 ( PS PS.GZ PDF )
- Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
- Zhaohui Cheng and Richard Comley
-
2004/248 ( PS PS.GZ PDF )
- Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties
- An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
-
2004/247 ( PS PS.GZ )
- Vectorial fast correlation attacks
- Jovan Dj. Golic and Guglielmo Morgari
-
2004/246 ( PS PS.GZ PDF )
- Upper and Lower Bounds on Black-Box Steganography
- Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell
-
2004/245 ( PDF )
- On codes, matroids and secure multi-party computation from linear secret sharing schemes
- Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jimenez Urroz and Gregor Leander and Jaume Marti-Farre and Carles Padro
-
2004/244 ( PS PS.GZ PDF )
- Signcryption in Hierarchical Identity Based Cryptosystem
- Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu
-
2004/243 ( PDF )
- On the Key Exposure Problem in Chameleon Hashes
- Giuseppe Ateniese and Breno de Medeiros
-
2004/242 ( PS PS.GZ PDF )
- Combinatorial group theory and public key cryptography
- Vladimir Shpilrain and Gabriel Zapata
-
2004/241 ( PDF )
- A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2
- Colm O hEigeartaigh
-
2004/240 ( PS PS.GZ PDF )
- A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields
- Seigo Arita and Kazuto Matsuo and Koh-ichi Nagao and Mahoro Shimura
-
2004/239 ( PDF )
- Geometric Key Establishment
- Arkady Berenstein and Leon Chernyak
-
2004/238 ( PDF )
- Security Analysis of A Dynamic ID-based Remote User Authentication Scheme
- Amit K Awasthi and Sunder Lal
-
2004/237 ( PS PS.GZ PDF )
- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC
- Christopher Wolf and An Braeken and Bart Preneel
-
2004/236 ( PDF )
- Forgery Attacks on Chang et al.'s signature scheme with message recovery
- FU Xiaotong, XU Chunxiang and XIAO Guozhen
-
2004/235 ( PDF )
- Cryptographic Implications of Hess' Generalized GHS Attack
- Alfred Menezes and Edlyn Teske
-
2004/234 ( PDF )
- On the security of some nonrepudiable threshold proxy signature schemes with known signers
- Zuo-Wen Tan and Zhuo-Jun Liu
-
2004/233 ( PS PS.GZ PDF )
- Password-Based Authenticated Key Exchange in the Three-Party Setting
- Michel Abdalla and Pierre-Alain Fouque and David Pointcheval
-
2004/232 ( PS PS.GZ PDF )
- Extending the Resynchronization Attack
- Frederik Armknecht and Joseph Lano and Bart Preneel
-
2004/231 ( PS PS.GZ PDF )
- Timed-Release and Key-Insulated Public Key Encryption
- Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and Ivan Osipkov
-
2004/230 ( PS PS.GZ PDF )
- A Provable Secure Scheme for Partially Blind Signatures
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/229 ( PS PS.GZ PDF )
- Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes
- Xin L¨š and Zhi Ma and Dengguo Feng
-
2004/228 ( PS PS.GZ PDF )
- DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$
- Honggang Hu and Dengguo Feng
-
2004/227 ( PS PS.GZ PDF )
- Sign Change Fault Attacks On Elliptic Curve Cryptosystems
- Johannes Blömer and Martin Otto and Jean-Pierre Seifert
-
2004/226 ( PS PS.GZ PDF )
- Lower Bounds for Non-Black-Box Zero Knowledge
- Boaz Barak and Yehuda Lindell and Salil Vadhan
-
2004/225 ( PS PS.GZ )
- Vectorial Boolean functions and induced algebraic equations
- Jovan Dj. Golic
-
2004/224 ( PS PS.GZ PDF )
- The Polynomial Composition Problem in (Z/nZ)[X]
- Marc Joye and David Naccache and Stephanie Porte
-
2004/223 ( PDF )
- Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves
- Xinxin Fan and Yumin Wang
-
2004/222 ( PS PS.GZ PDF )
- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
- An Braeken and Christopher Wolf and Bart Preneel
-
2004/221 ( PS PS.GZ PDF )
- Towards Plaintext-Aware Public-Key Encryption without Random Oracles
- Mihir Bellare and Adriana Palacio
-
2004/220 ( PS PS.GZ PDF )
- On Oleshchuk's Public Key Cryptosystem
- Heiko Stamer and Friedrich Otto
-
2004/219 ( PS PS.GZ PDF )
- Entropic Security and the Encryption of High Entropy Messages
- Yevgeniy Dodis and Adam Smith
-
2004/218 ( PDF )
- Plaintext-Simulatability
- Eiichiro Fujisaki
-
2004/217 ( PS PS.GZ PDF )
- Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice
- Aggelos Kiayias and Moti Yung
-
2004/216 ( PS PS.GZ PDF )
- Tree Parity Machine Rekeying Architectures
- Markus Volkmer and Sebastian Wallner
-
2004/215 ( PS PS.GZ PDF )
- Transitive Signatures: New Schemes and Proofs
- Mihir Bellare and Gregory Neven
-
2004/214 ( PS PS.GZ PDF )
- Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality
- An Braeken, Christopher Wolf, and Bart Preneel
-
2004/213 ( PS PS.GZ PDF )
- Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery
- Fangguo Zhang
-
2004/212 ( PS PS.GZ PDF )
- ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
- Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya
-
2004/211 ( PS PS.GZ PDF )
- Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
- Ian F. Blake and Aldar C-F. Chan
-
2004/210 ( PS PS.GZ PDF )
- Hybrid Cryptography
- Alexander W. Dent
-
2004/209 ( PS PS.GZ PDF )
- The Security and Efficiency of Micciancio's Cryptosystem
- Christoph Ludwig
-
2004/208 ( PS PS.GZ PDF )
- Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring
- Jean-Sebastien Coron and Alexander May
-
2004/207 ( PDF )
- On Corrective Patterns for the SHA-2 Family
- Philip Hawkes and Michael Paddon and Gregory G. Rose
-
2004/206 ( PDF )
- ID-Based Proxy Signature Using Bilinear Pairings
- Jing Xu and Zhenfeng Zhang and Dengguo Feng
-
2004/205 ( PDF )
- Direct Anonymous Attestation
- Ernie Brickell and Jan Camenisch and Liqun Chen
-
2004/204 ( PS PS.GZ PDF )
- Authenticated tree parity machine key exchange
- Markus Volkmer and Andre Schaumburg
-
2004/203 ( PS PS.GZ PDF )
- How to Cheat at Chess: A Security Analysis of the Internet Chess Club
- John Black and Martin Cochran and Ryan Gardner
-
2004/202 ( PS PS.GZ PDF )
- Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions
- Yuri Borissov, An Braeken, Svetla Nikova
-
2004/201 ( PS PS.GZ PDF )
- Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing
- Chunming Tang and Dingyi Pei and Zhuojun Liu and Yong He
-
2004/200 ( PS PS.GZ PDF )
- On Cheating Immune Secret Sharing
- An Braeken, Svetla Nikova, Ventzislav Nikov
-
2004/199 ( PDF )
- Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
- Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu
-
2004/198 ( PDF )
- Long Modular Multiplication for Cryptographic Applications
- Laszlo Hars
-
2004/197 ( PS PS.GZ PDF )
- SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation
- Helmut Kahl
-
2004/196 ( PS PS.GZ PDF )
- Password Based Key Exchange with Mutual Authentication
- Shaoquan Jiang and Guang Gong
-
2004/195 ( PS PS.GZ PDF )
- Signed Binary Representations Revisited
- Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and Tsuyoshi Takagi
-
2004/194 ( PDF )
- A Note on An Encryption Scheme of Kurosawa and Desmedt
- Rosario Gennaro and Victor Shoup
-
2004/193 ( PDF )
- The Security and Performance of the Galois/Counter Mode of Operation (Full Version)
- David A. McGrew and John Viega
-
2004/192 ( -- withdrawn -- )
- Security Pitfalls of an efficient remote user authentication scheme using smart cards
- Manoj Kumar
-
2004/191 ( PS PS.GZ )
- Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations
- Pradeep Kumar Mishra
-
2004/190 ( PS PS.GZ PDF )
- Distributed Ring Signatures for Identity-Based Scenarios
- Javier Herranz and Germán Sáez
-
2004/189 ( PDF )
- Computing Modular Polynomials
- Denis Charles and Kristin Lauter
-
2004/188 ( PS PS.GZ PDF )
- Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design
- Vincent Carlier and Hervé Chabanne and Emmanuelle Dottax
-
2004/187 ( PS PS.GZ PDF )
- Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version
- Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques Quisquater
-
2004/186 ( -- withdrawn -- )
- A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
- Manoj Kumar
-
2004/185 ( PS PS.GZ PDF )
- On the Existence of low-degree Equations for Algebraic Attacks
- Frederik Armknecht
-
2004/184 ( PS PS.GZ PDF )
- ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
- Amit K Awasthi and Sunder Lal
-
2004/183 ( PS PS.GZ PDF )
- A New Forward Secure Signature Scheme
- Bo Gyeong Kang and Je Hong Park and Sang Geun Hahn
-
2004/182 ( PS PS.GZ PDF )
- Simpler Session-Key Generation from Short Random Passwords
- Minh-Huyen Nguyen and Salil Vadhan
-
2004/181 ( PS PS.GZ PDF )
- On the Composition of Authenticated Byzantine Agreement
- Yehuda Lindell and Anna Lysyanskaya and Tal Rabin
-
2004/180 ( PDF )
- Efficient Identity-Based Encryption Without Random Oracles
- Brent R. Waters
-
2004/179 ( PS PS.GZ PDF )
- Identity Based Threshold Ring Signature
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu
-
2004/178 ( PDF )
- Optimal Updating of Ideal Threshold Schemes
- S. G. Barwick and W.-A. Jackson and K. M. Martin and C. M. O'Keefe
-
2004/177 ( PDF )
- Updating the Parameters of a Threshold Scheme by Minimal Broadcast
- S. G. Barwick and W.-A. Jackson and K. M. Martin
-
2004/176 ( PDF )
- A Biometric Identity Based Signature Scheme
- Andrew Burnett and Adam Duffy and Tom Dowling
-
2004/175 ( PDF )
- A Proof of Yao's Protocol for Secure Two-Party Computation
- Yehuda Lindell and Benny Pinkas
-
2004/174 ( PS PS.GZ PDF )
- Short Group Signatures
- Dan Boneh and Xavier Boyen and Hovav Shacham
-
2004/173 ( PS PS.GZ PDF )
- Secure Identity Based Encryption Without Random Oracles
- Dan Boneh and Xavier Boyen
-
2004/172 ( PS PS.GZ PDF )
- Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
- Dan Boneh and Xavier Boyen
-
2004/171 ( PS PS.GZ PDF )
- Short Signatures Without Random Oracles
- Dan Boneh and Xavier Boyen
-
2004/170 ( PS PS.GZ PDF )
- Efficient Consistency Proofs for Generalized Queries on a Committed Database
- Rafail Ostrovsky and Charles Rackoff and Adam Smith
-
2004/169 ( PDF )
- Regional Blackouts: Protection of Broadcast Content on 3G Networks.
- Alexander W. Dent and Allan Tomlinson
-
2004/168 ( PS PS.GZ )
- Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack
- T.Moh and J.M.Chen and Boyin Yang
-
2004/167 ( PS PS.GZ PDF )
- A Secure and Efficient Key Exchange Protocol for Mobile Communications
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/166 ( PDF )
- FRMAC, a Fast Randomized Message Authentication Code
- Eliane Jaulmes and Reynald Lercier
-
2004/165 ( PDF )
- A comparison of MNT curves and supersingular curves
- D. Page and N.P. Smart and F. Vercauteren
-
2004/164 ( PDF )
- ID-based Cryptography from Composite Degree Residuosity
- Man Ho Au and Victor K. Wei
-
2004/163 ( -- withdrawn -- )
- On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
- Manoj Kumar
-
2004/162 ( PS PS.GZ PDF )
- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
- Ivan Damgaard and Thomas Pedersen and Louis Salvail
-
2004/161 ( PS PS.GZ PDF )
- Improvement of ThLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus
- Ko-ichi Nagao
-
2004/160 ( PS PS.GZ PDF )
- Scalable Public-Key Tracing and Revoking
- Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung
-
2004/159 ( PS PS.GZ PDF )
- Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
- Gergely Acs and Levente Buttyan and Istvan Vajda
-
2004/158 ( PDF )
- Mobile Terminal Security
- Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and Stéphane Socié and Claire Whelan
-
2004/157 ( PS PS.GZ PDF )
- Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
- R. Granger and D. Page and M. Stam
-
2004/156 ( PDF )
- Quantum cryptography: a practical information security perspective
- Kenneth G. Paterson and Fred Piper and Ruediger Schack
-
2004/155 ( PDF )
- Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks
- Amir Herzberg and Ahmad Gbara
-
2004/154 ( PDF )
- Controlling Spam by Secure Internet Content Selection
- Amir Herzberg
-
2004/153 ( PS PS.GZ PDF )
- A double large prime variation for small genus hyperelliptic index calculus
- P. Gaudry and E. Thomé and N. Thériault and C. Diem
-
2004/152 ( PDF )
- Another Look at ``Provable Security''
- Neal Koblitz and Alfred Menezes
-
2004/151 ( PDF )
- Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$
- Mitsuhiro Haneda and Mitsuru Kawazoe and Tetsuya Takahashi
-
2004/150 ( PS PS.GZ PDF )
- An Authenticated Certificateless Public Key Encryption Scheme
- Young-Ran Lee and Hyang-Sook Lee
-
2004/149 ( PDF )
- Secure and Efficient AES Software Implementation for Smart Caards
- E. Trichina and L. Korkishko
-
2004/148 ( PDF )
- Provably Secure Delegation-by-Certification Proxy Signature Schemes
- Zuowen Tan and Zhuojun Liu
-
2004/147 ( PS PS.GZ PDF )
- Key Recovery Method for CRT Implementation of RSA
- Matthew J. Campagna and Amit Sethi
-
2004/146 ( PS PS.GZ )
- Near-Collisions of SHA-0
- Eli Biham, Rafi Chen
-
2004/145 ( PS PS.GZ PDF )
- Electromagnetic Side Channels of an FPGA Implementation of AES
- Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax and Hervé Pelletier
-
2004/144 ( PS PS.GZ )
- Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables
- Alexander Maximov and Martin Hell and Subhamoy Maitra
-
2004/143 ( PS PS.GZ PDF )
- Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
- Nicolas T. Courtois
-
2004/142 ( -- withdrawn -- )
- Elliptic Curve based Signcryption and its Multi-party Schemes
- Yiliang HAN and Xiaoyuan YANG
-
2004/141 ( PS PS.GZ PDF )
- Elastic AES
- Debra L. Cook and Moti Yung and Angelos D. Keromytis
-
2004/140 ( -- withdrawn -- )
- Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher
- P. Kitsos and M. D. Galanis and O. Koufopavlou
-
2004/139 ( PS PS.GZ PDF )
- New Notions of Security: Achieving Universal Composability without Trusted Setup
- Manoj Prabhakaran and Amit Sahai
-
2004/138 ( PS PS.GZ PDF )
- How to Disembed a Program?
- Benoit Chevallier-Mames and David Naccache and Pascal Paillier and David Pointcheval
-
2004/137 ( PDF )
- New GF(2n) Parallel Multiplier Using Redundant Representation
- Haining Fan and Yiqi Dai
-
2004/136 ( PDF )
- CompChall: Addressing Password Guessing Attacks
- Vipul Goyal and Virendra Kumar and Mayank Singh and Ajith Abraham and Sugata Sanyal
-
2004/135 ( PDF )
- More Efficient Server Assisted One Time Signatures
- Vipul Goyal
-
2004/134 ( PDF )
- Secure and Efficient Masking of AES - A Mission Impossible?
- Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller
-
2004/133 ( PS PS.GZ PDF )
- Secret Handshakes from CA-Oblivious Encryption
- Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik
-
2004/132 ( PS PS.GZ PDF )
- On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
- R. Granger and D. Page and M. Stam
-
2004/131 ( PS PS.GZ PDF )
- A New ID-based Signature with Batch Verification
- Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon
-
2004/130 ( PS PS.GZ PDF )
- Private Inference Control
- David Woodruff and Jessica Staddon
-
2004/129 ( PS PS.GZ PDF )
- Generalizing Kedlaya's order counting based on Miura Theory
- Joe Suzuki
-
2004/128 ( PS PS.GZ PDF )
- Elastic Block Ciphers
- Debra L. Cook and Moti Yung and Angelos D. Keromytis
-
2004/127 ( PS PS.GZ PDF )
- DDH-based Group Key Agreement in a Mobile Environment
- Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won
-
2004/126 ( PDF )
- Two Software Normal Basis Multiplication Algorithms for GF(2n)
- Haining Fan and Yiqi Dai
-
2004/125 ( PS PS.GZ PDF )
- EME*: extending EME to handle arbitrary-length messages with associated data
- Shai Halevi
-
2004/124 ( PS PS.GZ )
- Universally Composable DKG with Linear Number of Exponentiations
- Douglas Wikström
-
2004/123 ( PS PS.GZ PDF )
- On security of XTR public key cryptosystems against Side Channel Attacks
- Dong-Guk Han and Jongin Lim and Kouichi Sakurai
-
2004/122 ( PDF )
- A New Two-Party Identity-Based Authenticated Key Agreement
- Noel McCullagh and Paulo S. L. M. Barreto
-
2004/121 ( PS PS.GZ PDF )
- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
- Tsz Hon Yuen and Victor K. Wei
-
2004/120 ( PS PS.GZ PDF )
- Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup
- Bartosz Zoltak
-
2004/119 ( PS PS.GZ PDF )
- Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
- Masayuki Abe and Serge Fehr
-
2004/118 ( PS PS.GZ PDF )
- Fast addition on non-hyperelliptic genus $3$ curves
- Stéphane Flon and Roger Oyono and Christophe Ritzenthaler
-
2004/117 ( PS PS.GZ PDF )
- Efficient and Forward-Secure Identity-Based Signcryption
- Noel McCullagh and Paulo S. L. M. Barreto
-
2004/116 ( PS PS.GZ PDF )
- On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions
- Ran Canetti and Eyal Kushilevitz and Yehuda Lindell
-
2004/115 ( PS PS.GZ PDF )
- Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
- Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won
-
2004/114 ( PS PS.GZ )
- Improved Identity-Based Signcryption
- Liqun Chen and John Malone-Lee
-
2004/113 ( PS PS.GZ PDF )
- On the Security and Composability of the One Time Pad
- Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade
-
2004/112 ( PDF )
- Relation between XL algorithm and Groebner Bases Algorithms
- M. Sugita and M. Kawazoe and H. Imai
-
2004/111 ( PS PS.GZ PDF )
- The Vulnerability of SSL to Chosen Plaintext Attack
- Gregory V. Bard
-
2004/110 ( PDF )
- Designing Against the `Overdefined System of Equations' Attack
- Carlisle Adams
-
2004/109 ( PDF )
- Concealing Complex Policies with Hidden Credentials
- Robert Bradshaw and Jason Holt and Kent Seamons
-
2004/108 ( PS PS.GZ PDF )
- Two Improved Partially Blind Signature Schemes from Bilinear Pairings
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
-
2004/107 ( PS PS.GZ PDF )
- Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic
- Bertrand BYRAMJEE and Sylvain DUQUESNE
-
2004/106 ( PDF )
- Capacity and Examples of Template Protecting Biometric Authentication Systems
- P. Tuyls and J. Goseling
-
2004/105 ( PS PS.GZ PDF )
- Receipt-Free Homomorphic Elections and Write-in Ballots
- Alessandro Acquisti
-
2004/104 ( PS PS.GZ PDF )
- Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings
- Lan Nguyen and Rei Safavi-Naini
-
2004/103 ( PS PS.GZ PDF )
- Cryptanalysis of SFlash v3
- Jintai Ding and Dieter Schmidt
-
2004/102 ( PS PS.GZ PDF )
- The Exact Security of an Identity Based Signature and its Applications
- Benoît Libert and Jean-Jacques Quisquater
-
2004/101 ( PS PS.GZ PDF )
- Provably Secure Masking of AES
- Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel
-
2004/100 ( PDF )
- The Sorcerers Apprentice Guide to Fault Attacks
- Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan
-
2004/099 ( PS PS.GZ PDF )
- Secure Hashed Diffie-Hellman over Non-DDH Groups
- Rosario Gennaro and Hugo Krawczyk and Tal Rabin
-
2004/098 ( PS PS.GZ PDF )
- Attacking a Public Key Cryptosystem Based on Tree Replacement
- María Isabel González Vasco and David Pérez García
-
2004/097 ( PDF )
- How To Re-initialize a Hash Chain
- Vipul Goyal
-
2004/096 ( -- withdrawn -- )
- On the Ambiguity of Concurrent Signatures
- Yi Mu and Fangguo Zhang and Willy Susilo
-
2004/095 ( PS PS.GZ PDF )
- GNFS Factoring Statistics of RSA-100, 110, ..., 150
- Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki Ueda
-
2004/094 ( PS PS.GZ PDF )
- Block Ciphers and Stream Ciphers: The State of the Art
- Alex Biryukov
-
2004/093 ( PS PS.GZ PDF )
- A Provably Secure Nyberg-Rueppel Signature Variant with Applications
- Giuseppe Ateniese and Breno de Medeiros
-
2004/092 ( PS PS.GZ PDF )
- A New Stream Cipher HC-256
- Hongjun Wu
-
2004/091 ( PDF )
- Signature Bouquets: Immutability for Aggregated/Condensed Signatures
- Einar Mykletun and Maithili Narasimha and Gene Tsudik
-
2004/090 ( PDF )
- Provably Secure Authenticated Tree Based Group Key Agreement Protocol
- Ratna Dutta and Rana Barua and and Palash Sarkar
-
2004/089 ( PS PS.GZ PDF )
- Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance
- Mahalingam Ramkumar and Nasir Memon
-
2004/088 ( -- withdrawn -- )
- Efficient Batch Verification of Signature Schemes based on Bilinear Maps
- Noel McCullagh
-
2004/087 ( PS PS.GZ PDF )
- Using primitive subgroups to do more with fewer bits
- K. Rubin and A. Silverberg
-
2004/086 ( PDF )
- Fuzzy Identity Based Encryption
- Amit Sahai and Brent Waters
-
2004/085 ( PDF )
- The CS2 Block Cipher
- Tom St Denis
-
2004/084 ( PDF )
- Evaluating elliptic curve based KEMs in the light of pairings
- David Galindo and Sebastia Martin and Jorge L. Villar
-
2004/083 ( PDF )
- Scan Based Side Channel Attack on Data Encryption Standard
- Bo Yang and Kaijie Wu and Ramesh Karri
-
2004/082 ( PDF )
- The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2004/081 ( PDF )
- Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers
- Philip Hawkes and Gregory G. Rose
-
2004/080 ( PDF )
- HENKOS Stream Cipher
- Marius Oliver Gheorghita
-
2004/079 ( PDF )
- Pairing-Based One-Round Tripartite Key Agreement Protocols
- Zhaohui Cheng and Luminita Vasiu and Richard Comley
-
2004/078 ( PS PS.GZ PDF )
- Analysis of the WinZip encryption method
- Tadayoshi Kohno
-
2004/077 ( PS PS.GZ PDF )
- Foundations of Group Signatures: The Case of Dynamic Groups
- Mihir Bellare and Haixia Shi and Chong Zhang
-
2004/076 ( PS PS.GZ PDF )
- Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders
- Aggelos Kiayias and Moti Yung
-
2004/075 ( PDF )
- An Hybrid Mode of Operation
- Alexis W. Machado
-
2004/074 ( PS PS.GZ PDF )
- Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael
- Liam Keliher and Henk Meijer and Stafford Tavares
-
2004/073 ( PS PS.GZ )
- Index calculus for abelian varieties and the elliptic curve discrete logarithm problem
- Pierrick Gaudry
-
2004/072 ( PS PS.GZ PDF )
- Asymmetric Cryptography: Hidden Field Equations
- Christopher Wolf and Bart Preneel
-
2004/071 ( PS PS.GZ PDF )
- An IBE Scheme to Exchange Authenticated Secret Keys
- Benits Jr, Waldyr and Terada, Routo
-
2004/070 ( PS PS.GZ PDF )
- Easy decision-Diffie-Hellman groups
- Steven D Galbraith and Victor Rotger
-
2004/069 ( PS PS.GZ )
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
- Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai
-
2004/068 ( PDF )
- Synthesis of Secure FPGA Implementations
- Kris Tiri and Ingrid Verbauwhede
-
2004/067 ( PDF )
- Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security ICs against Differential Power Analysis
- Kris Tiri and Ingrid Verbauwhede
-
2004/066 ( PDF )
- A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security ICs.
- Kris Tiri and Ingrid Verbauwhede
-
2004/065 ( PS PS.GZ PDF )
- Refinements of Miller's Algorithm for Computing Weil/Tate Pairing
- Ian Blake, Kumar Murty, and Guangwu Xu
-
2004/064 ( PS PS.GZ PDF )
- Pairing-Based Cryptographic Protocols : A Survey
- Ratna Dutta and Rana Barua and Palash Sarkar
-
2004/063 ( PS PS.GZ PDF )
- An Oblivious Transfer Protocol with Log-Squared Communication
- Helger Lipmaa
-
2004/062 ( PS PS.GZ PDF )
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- John Black and Martin Cochran and Thomas Shrimpton
-
2004/061 ( PS PS.GZ PDF )
- TTS: Rank Attacks in Tame-Like Multivariate PKCs
- Bo-Yin Yang and Jiun-Ming Chen
-
2004/060 ( PS PS.GZ PDF )
- Positive Results and Techniques for Obfuscation
- Benjamin Lynn and Manoj Prabhakaran and Amit Sahai
-
2004/059 ( PS PS.GZ )
- Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
- Michael Backes and Birgit Pfitzmann
-
2004/058 ( PS PS.GZ PDF )
- Generating more MNT elliptic curves
- Michael Scott and Paulo S.L.M Barreto
-
2004/057 ( PS PS.GZ PDF )
- On Multiple Linear Approximations
- Alex Biryukov and Christophe De Cannière and Michael Quisquater
-
2004/055 ( PS PS.GZ PDF )
- Redundant Trinomials for Finite Fields of Characteristic $2$
- Christophe Doche
-
2004/054 ( PS PS.GZ PDF )
- Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
-
2004/053 ( PS PS.GZ PDF )
- Efficient and Universally Composable Committed Oblivious Transfer and Applications
- Juan Garay and Philip MacKenzie and Ke Yang
-
2004/052 ( PS PS.GZ PDF )
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
- Tal Malkin and Satoshi Obana and Moti Yung
-
2004/051 ( PS PS.GZ PDF )
- Privacy Preserving Keyword Searches on Remote Encrypted Data
- Yan-Cheng Chang and Michael Mitzenmacher
-
2004/050 ( PS PS.GZ PDF )
- Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
- Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen
-
2004/049 ( PS PS.GZ )
- Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm
- Christophe Clavier
-
2004/048 ( PS PS.GZ PDF )
- Tail-MAC: A Message Authentication Scheme for Stream Ciphers
- Bartosz Zoltak
-
2004/047 ( PS PS.GZ )
- On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes
- Yodai Watanabe
-
2004/046 ( PS PS.GZ PDF )
- Revision of Tractable Rational Map Cryptosystem
- Lih-Chung Wang and Fei-Hwang Chang
-
2004/045 ( PS PS.GZ PDF )
- Lower Bounds and Impossibility Results for Concurrent Self Composition
- Yehuda Lindell
-
2004/044 ( PS PS.GZ PDF )
- Transitive Signatures Based on Non-adaptive Standard Signatures
- Zhou Sujing
-
2004/043 ( PS PS.GZ PDF )
- Multi-sequences with d-perfect property
- Xiutao Feng, Quanlong Wang and Zongduo Dai
-
2004/042 ( -- withdrawn -- )
- Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
-
2004/041 ( PS PS.GZ )
- Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries
- Cheng-Kang Chu and Wen-Guey Tzeng
-
2004/040 ( PS PS.GZ PDF )
- Cryptanalysis of a timestamp-based password authentication scheme
- Lizhen Yang, Kefei Chen
-
2004/039 ( PDF )
- A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups
- Victor K. Wei
-
2004/038 ( PS PS.GZ PDF )
- Chameleon Hashing without Key Exposure
- Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
-
2004/037 ( PS PS.GZ )
- A Provably Secure Scheme for Restrictive Partially Blind Signatures
- Fuw-Yi Yang and Jinn-Ke Jan
-
2004/036 ( PS PS.GZ PDF )
- Single Database Private Information Retrieval with Logarithmic Communication
- Yan-Cheng Chang
-
2004/035 ( PS PS.GZ PDF )
- Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
- Phillip Rogaway and Thomas Shrimpton
-
2004/034 ( PDF )
- s(n) An Arithmetic Function of Some Interest, and Related Arithmetic
- Gideon Samid
-
2004/033 ( PS PS.GZ PDF )
- New Approaches to Password Authenticated Key Exchange based on RSA
- Muxiang Zhang
-
2004/032 ( PS PS.GZ PDF )
- Compressed Pairings
- Michael Scott and Paulo S. L. M. Barreto
-
2004/031 ( PS PS.GZ PDF )
- Summation polynomials and the discrete logarithm problem on elliptic curves
- Igor Semaev
-
2004/030 ( PDF )
- Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.
- Colin Stahlke
-
2004/029 ( PDF )
- Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
- Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar
-
2004/028 ( PS PS.GZ )
- Custodian-Hiding Verifiable Encryption
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
-
2004/027 ( PDF )
- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
- Joseph K. Liu and Victor K. Wei and Duncan S. Wong
-
2004/026 ( PS PS.GZ PDF )
- The CSQUARE Transform
- Tom St Denis
-
2004/025 ( PDF )
- Clarifying Obfuscation: Improving the Security of White-Box Encoding
- Hamilton E. Link and William D. Neumann
-
2004/024 ( PS PS.GZ PDF )
- Exponential S-boxes
- Sergey Agievich and Andrey Afonenko
-
2004/023 ( PDF )
- RDS: Remote Distributed Scheme for Protecting Mobile Agents
- Asnat Dadon-Elichai
-
2004/022 ( PS PS.GZ PDF )
- Privacy-Enhanced Searches Using Encrypted Bloom Filters
- Steven M. Bellovin and William R. Cheswick
-
2004/021 ( PS PS.GZ PDF )
- Externalized Fingerprint Matching
- Claude Barral and Jean-Sébastien Coron and David Naccache
-
2004/020 ( PS PS.GZ PDF )
- Optimal Signcryption from Any Trapdoor Permutation
- Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish
-
2004/019 ( PS PS.GZ PDF )
- New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
- Tetsu Iwata and Tadayoshi Kohno
-
2004/018 ( PS PS.GZ PDF )
- Corrections of the NIST Statistical Test Suite for Randomness
- Song-Ju Kim and Ken Umeno and Akio Hasegawa
-
2004/017 ( PS PS.GZ )
- Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints
- M. Scott
-
2004/016 ( PS PS.GZ PDF )
- A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer
- Dennis Hofheinz and Joern Mueller-Quade
-
2004/015 ( PDF )
- An AGM-type elliptic curve point counting algorithm in characteristic three
- Trond Stølen Gustavsen and Kristian Ranestad
-
2004/014 ( PS PS.GZ PDF )
- Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions
- Sugata Gangopadhyay and Subhamoy Maitra
-
2004/013 ( PS PS.GZ PDF )
- Cryptanalysis of a Provably Secure Cryptographic Hash Function
- Jean-Sebastien Coron and Antoine Joux
-
2004/012 ( PS PS.GZ PDF )
- Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
- Maria Isabel Gonzalez Vasco and Rainer Steinwandt
-
2004/011 ( PDF )
- Known-Plaintext Attack Against a Permutation Based Video
- Adam J. Slagell
-
2004/010 ( PDF )
- Fast Pseudo-Hadamard Transforms
- Tom St Denis
-
2004/009 ( PS PS.GZ PDF )
- Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness
- Juan A. Garay and Philip MacKenzie and Ke Yang
-
2004/008 ( PS PS.GZ PDF )
- The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
- Mihir Bellare and Adriana Palacio
-
2004/007 ( PS PS.GZ PDF )
- Traceable Signatures
- Aggelos Kiayias and Yiannis Tsiounis and Moti Yung
-
2004/006 ( PS PS.GZ )
- Protocol Initialization for the Framework of Universal Composability
- Boaz Barak and Yehuda Lindell and Tal Rabin
-
2004/005 ( PDF )
- Universal Undeniable Signatures
- Huafei Zhu
-
2004/004 ( -- withdrawn -- )
- None
- None
-
2004/003 ( PS PS.GZ )
- On the Role of the Inner State Size in Stream Ciphers
- Erik Zenner
-
2004/002 ( PS PS.GZ PDF )
- Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
- Yuichi Komano and Kazuo Ohta
[ Cryptology ePrint archive ]