Cryptology ePrint Archive: Listing for 2005


2005/469 ( PDF )
A lower bound on the higher order nonlinearity of algebraic immune functions
C. Carlet
2005/468 ( PDF )
Blind Attacks on Engineering Samples
Vanessa Gratzer and David Naccache
2005/467 ( PDF )
A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)
Ricardo Corin and Jerry den Hartog
2005/466 ( PDF )
Cryptanalysis of the Yang -Wang's password authentication schemes
Jue-Sam Chou and Ming-De Yang and Guey-Chuen Lee
2005/465 ( PDF )
A sequence approach to constructing perfect hash families
S.G. Barwick and W.-A. Jackson
2005/464 ( PS PS.GZ PDF )
Equivalent Keys in Multivariate Quadratic Public Key Systems
Christopher Wolf and Bart Preneel
2005/463 ( PDF )
More short signatures without random oracles
Victor K. Wei and Tsz Hon Yuen
2005/462 ( PS PS.GZ PDF )
A Simplified Quadratic Frobenius Primality Test
Martin Seysen
2005/461 ( PS PS.GZ PDF )
Parallel and Concurrent Security of the HB and HB+ Protocols
Jonathan Katz and Ji Sun Shin
2005/460 ( PDF )
One-Time HNP or Attacks on a Flawed El Gamal Revisited
Tomas Rosa
2005/459 ( PS PS.GZ PDF )
A Practical Attack on the Root Problem in Braid Groups
Anja Groch and Dennis Hofheinz and Rainer Steinwandt
2005/458 ( PS PS.GZ PDF )
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations
James A. Muir
2005/457 ( PDF )
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol
Jue-Sam Chou and Chu-Hsing Lin and Chia-Hung Chiu
2005/456 ( PDF )
A Secure Scheme for Authenticated Encryption
Fuw-Yi Yang
2005/455 ( PDF )
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange
Robert W. Zhu and Xiaojian Tian and Duncan S. Wong
2005/454 ( PS PS.GZ PDF )
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics
Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi
2005/453 ( PDF )
Further Constructions of Almost Resilient Functions
Pinhui Ke and Jie Zhang and Qiaoyan Wen
2005/452 ( PDF )
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
Ran Canetti and Ling Cheung and Dilsun Kaynar and Moses Liskov and Nancy Lynch and Olivier Pereira and Roberto Segala
2005/451 ( PDF )
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols
Jue-Sam Chou and Yalin Chen and Ming-De Yang
2005/450 ( PDF )
Improvement of Manik et al.¡¦s remote user authentication scheme
Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin
2005/449 ( PDF )
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count
Longjiang Qu and Guozhu Feng and Chao Li
2005/448 ( PS PS.GZ PDF )
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)
Souradyuti Paul and Bart Preneel
2005/447 ( PDF )
A new key exchange protocol based on the decomposition problem
Vladimir Shpilrain and Alexander Ushakov
2005/446 ( PDF )
Democratic Group Signatures on Example of Joint Ventures
Mark Manulis
2005/445 ( PS PS.GZ PDF )
An Anonymous Authentication Scheme for Trusted Computing Platform
HE GE
2005/444 ( PDF )
Privacy-Preserving Polling using Playing Cards
Sid Stamm and Markus Jakobsson
2005/443 ( PDF )
Revised: Block Cipher Based Hash Function Construction From PGV
Duo Lei
2005/442 ( PDF )
One-Time Signatures Revisited: Have They Become Practical?
Dalit Naor and Amir Shenhav and Avishai Wool
2005/441 ( PS PS.GZ PDF )
Tight bound between nonlinearity and algebraic immunity
Mikhail Lobanov
2005/440 ( -- withdrawn -- )
HB++: a Lightweight Authentication Protocol Secure against Some Attacks
Julien Bringer and Hervé Chabanne and Emmanuelle Dottax
2005/439 ( PDF )
A note on the n-spendable extension of Ferguson's single-term off-line coins
T. C. Lam
2005/438 ( PS PS.GZ PDF )
Minimal Assumptions for Efficient Mercurial Commitments
Yevgeniy Dodis
2005/437 ( -- withdrawn -- )
On Boolean functions with maximum algebraic immunity
Enes Pasalic
2005/436 ( PDF )
A Note on the Kasami Power Function
Doreen Hertel
2005/435 ( PDF )
Concurrent Blind Signatures without Random Oracles
Aggelos Kiayias and Hong-Sheng Zhou
2005/434 ( PDF )
Prompted User Retrieval of Secret Entropy: The Passmaze Protocol
Daniel R. L. Brown
2005/433 ( PDF )
Proxy Re-Signatures: New Definitions, Algorithms, and Applications
Giuseppe Ateniese and Susan Hohenberger
2005/432 ( PS PS.GZ PDF )
On the Security of Kaweichel
Dieter Schmidt
2005/431 ( PS PS.GZ PDF )
Is it possible to have CBE from CL-PKE?
Bo Gyeong Kang and Je Hong Park
2005/430 ( PDF )
F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei
2005/429 ( PDF )
Signature from a New Subgroup Assumption
Victor K. Wei
2005/428 ( PS PS.GZ PDF )
Loud and Clear: Human-Verifiable Authentication Based on Audio
Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun
2005/427 ( PDF )
Solutions to Key Exposure Problem in Ring Signature
Joseph K. Liu and Duncan S. Wong
2005/426 ( PDF )
On the Security of a Certificateless Public-Key Encryption
Zhenfeng Zhang and Dengguo Feng
2005/425 ( PDF )
Improved Collision Attack on Hash Function MD5
Jie Liang and Xuejia Lai
2005/424 ( PS PS.GZ PDF )
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Sven Laur and N. Asokan and Kaisa Nyberg
2005/423 ( -- withdrawn -- )
ID-based signature and Key-insulated threshold signature
Jin Li and Fangguo Zhang
2005/422 ( PDF )
On Anonymity of Group Signatures
Zhou Sujing and Lin Dongdai
2005/421 ( PS PS.GZ )
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
Michael Backes and Birgit Pfitzmann and Andre Scedrov
2005/420 ( PS PS.GZ PDF )
Efficient Scalar Multiplication by Isogeny Decompositions
Christophe Doche and Thomas Icart and David R. Kohel
2005/419 ( PDF )
Unified Point Addition Formul{\ae} and Side-Channel Attacks
Douglas Stebila and Nicolas Th\'eriault
2005/418 ( PDF )
Generic On-Line/Off-Line Threshold Signatures
Chris Crutchfield and David Molnar and David Turner and David Wagner
2005/417 ( PS PS.GZ PDF )
Correlation-Resistant Storage via Keyword-Searchable Encryption
Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose
2005/416 ( PDF )
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Kenneth G. Paterson and Arnold K.L. Yau
2005/415 ( -- withdrawn -- )
A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512
Benjamin Gittins and Howard A. Landman and Sean O'Neil and Ron Kelson
2005/414 ( -- withdrawn -- )
Authenticated Encryption Mode of VEST Ciphers
Sean O'Neil and Benjamin Gittins
2005/413 ( -- withdrawn -- )
VEST Hardware-Dedicated Stream Ciphers
Sean O'Neil and Benjamin Gittins and Howard A. Landman
2005/412 ( PDF )
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles
Tsz Hon Yuen and Victor K. Wei
2005/411 ( PDF )
More Compact E-Cash with Efficient Coin Tracing
Victor K. Wei
2005/410 ( PDF )
Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows
Victor K. Wei
2005/409 ( -- withdrawn -- )
Intrusion-Resilient Authentication in the Limited Communication Model
David Cash and Yan Zong Ding and Wenke Lee and Richard Lipton
2005/408 ( PDF )
Compartmented Secret Sharing Based on the Chinese Remainder Theorem
Sorin Iftene
2005/407 ( PDF )
Anonymous Signature Schemes
Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang
2005/406 ( PS PS.GZ PDF )
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited
Dominique Unruh
2005/405 ( PS PS.GZ PDF )
Building Better Signcryption Schemes with Tag-KEMs
Tor E. Bj{\o}rstad and Alexander W. Dent
2005/404 ( PDF )
Preventing Attacks on Machine Readable Travel Documents (MRTDs)
Gaurav S. Kc and Paul A. Karger
2005/403 ( PDF )
Collisions in the Original Version of a Chaotic Hash Function
Scott Contini
2005/402 ( PS PS.GZ PDF )
Some Analysis of Radix-r Representations
Dong-Guk Han and Tsuyoshi Takagi
2005/401 ( PS PS.GZ PDF )
A Computationally Sound Mechanized Prover for Security Protocols
Bruno Blanchet
2005/400 ( PDF )
Improved Collision Attack on MD5
Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta
2005/399 ( PS PS.GZ )
On affine rank of spectrum support for plateaued function
Yuriy Tarannikov
2005/398 ( PDF )
Preliminary Analysis of DHA-256
IAIK Krypto Group
2005/397 ( PDF )
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
Neil Kauer and Tony Suarez and Yuliang Zheng
2005/396 ( PS PS.GZ PDF )
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
Pallavi Joshi and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
2005/395 ( PDF )
Secure Group Key Establishment Revisited
Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2005/394 ( PDF )
How to Shuffle in Public
Ben Adida and Douglas Wikstr\"{o}m
2005/393 ( PS PS.GZ PDF )
Multivariate Quadratic Polynomials in Public Key Cryptography
Christopher Wolf
2005/392 ( PDF )
An Efficient Variant of RSA Cryptosystem
Sahadeo Padhye
2005/391 ( PS PS.GZ PDF )
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1
Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto
2005/390 ( PS PS.GZ PDF )
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto and Edward Dawson
2005/389 ( PS PS.GZ PDF )
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
KyungKeun Lee and JoongHyo Oh and SangJae Moon
2005/388 ( PDF )
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
YongBin Zhou and DengGuo Feng
2005/387 ( PDF )
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)
C. Carlet
2005/386 ( PS PS.GZ PDF )
A New Short Signature Scheme Without Random Oracles from Bilinear Pairings
Fangguo Zhang, Xiaofeng Chen, Willy Susilo and Yi Mu
2005/385 ( PDF )
Practical Group Signatures without Random Oracles
Giuseppe Ateniese and Jan Camenisch and Susan Hohenberger and Breno de Medeiros
2005/384 ( PS PS.GZ PDF )
Some Explicit Formulae of NAF and its Left-to-Right Analogue
Dong-Guk Han and Tetsuya Izu and Tsuyoshi Takagi
2005/383 ( PS PS.GZ PDF )
Key Mixing in Block Ciphers through Addition modulo $2^n$
Debdeep Mukhopadhyay and Dipanwita RoyChowdhury
2005/382 ( PDF )
One-Wayness Equivalent to General Factoring
Kaoru Kurosawa and Tsuyoshi Takagi
2005/381 ( PDF )
Compact Group Signatures Without Random Oracles
Xavier Boyen and Brent Waters
2005/380 ( PDF )
Breaking RSA May Be As Difficult As Factoring
Daniel R. L. Brown
2005/379 ( PS PS.GZ PDF )
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Jonathan Katz and Yehuda Lindell
2005/378 ( PDF )
A New Protocol for Conditional Disclosure of Secrets And Its Applications
Sven Laur and Helger Lipmaa
2005/377 ( PS PS.GZ PDF )
Exclusion-Intersection Encryption
Sherman S.M. Chow and Siu-Ming Yiu
2005/376 ( PDF )
Representing small identically self-dual matroids by self-dual codes
Carles Padro and Ignacio Gracia
2005/375 ( PDF )
Truncated differential cryptanalysis of five rounds of Salsa20
Paul Crowley
2005/374 ( PDF )
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7
Kunpeng Wang, Bao Li
2005/373 ( PS PS.GZ PDF )
Efficient Broadcast Encryption Scheme with Log-Key Storage
Yong Ho Hwang and Pil Joong Lee
2005/372 ( PDF )
Secret color images sharing schemes based on XOR operation
Dao-Shun Wang, Lei Zhang, Ning Ma and Lian-Sheng Huang
2005/371 ( PDF )
On a Traitor Tracing Scheme from ACISP 2003
Dongvu Tonien
2005/370 ( PS PS.GZ PDF )
Resource Fairness and Composability of Cryptographic Protocols
Juan A. Garay and Philip MacKenzie and Manoj Prabhakaran and Ke Yang
2005/369 ( PDF )
Secure and {\sl Practical} Identity-Based Encryption
David Naccache
2005/368 ( PDF )
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
David Molnar and Matt Piotrowski and David Schultz and David Wagner
2005/367 ( PDF )
Searchable Keyword-Based Encryption
Dong Jin Park, Juyoung Cha, and Pil Joong Lee
2005/366 ( PS PS.GZ PDF )
Efficient Compilers for Authenticated Group Key Exchange
Qiang Tang and Chris J. Mitchell
2005/365 ( PS PS.GZ PDF )
Derandomization in Cryptography
Boaz Barak and Shien Jin Ong and Salil Vadhan
2005/364 ( PS PS.GZ PDF )
Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs
Amitabh Saxena
2005/363 ( PDF )
Elliptic Curves with Low Embedding Degree
Florian Luca and Igor E. Shparlinski
2005/362 ( PS PS.GZ PDF )
On a (Flawed) Proposal to Build More Pairing-Friendly Curves
Michael Scott and Paulo S. L. M. Barreto
2005/361 ( PS PS.GZ PDF )
Strict Avalanche Criterion Over Finite Fields
Yuan Li and T.W.Cusick
2005/360 ( PS PS.GZ )
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security
Jens Matthias-Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt
2005/359 ( PS PS.GZ PDF )
An infinite class of quadratic APN functions which are not equivalent to power mappings
L. Budaghyan and C. Carlet and P. Felke and G. Leander
2005/358 ( PDF )
Normal Basis Multiplication Algorithms for GF(2n) (Full Version)
Haining Fan and Duo Liu and Yiqi Dai
2005/357 ( PDF )
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Kyung-Ah Shim
2005/356 ( PDF )
Exponential Memory-Bound Functions for Proof of Work Protocols
Fabien Coelho
2005/355 ( PS PS.GZ PDF )
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
Rongxing Lu and Zhenfu Cao
2005/354 ( PS PS.GZ PDF )
Pairing-Based Two-Party Authenticated Key Agreement Protocol
Rongxing Lu and Zhenfu Cao and Renwang Su and Jun Shao
2005/353 ( PS PS.GZ PDF )
On the Security of A Group Signature Scheme
Jianhong Zhang, Wei Zou,
2005/352 ( PS PS.GZ PDF )
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Danilo Gligoroski
2005/351 ( PS PS.GZ PDF )
Errors in Computational Complexity Proofs for Protocols
Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
2005/350 ( PS PS.GZ )
Is SHA-1 conceptually sound?
Charanjit S. Jutla and Anindya C. Patthak
2005/349 ( PS PS.GZ PDF )
Oblivious Transfer and Linear Functions
Ivan B. Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner
2005/348 ( -- withdrawn -- )
On Proofs of Security for Certificateless Cryptosystems
Alexander W. Dent and Caroline Kudla
2005/347 ( -- withdrawn -- )
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman
Song Han and Elizabeth Chang and Tharam Dillon
2005/346 ( PS PS.GZ )
Batch Verification of Validity of Bids in Homomorphic E-auction
Kun Peng, Colin Boyd and Ed Dawson
2005/345 ( PDF )
Group Signatures with Efficient Concurrent Join
Aggelos Kiayias and Moti Yung
2005/344 ( PS PS.GZ PDF )
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.
Tapan Rai
2005/343 ( PS PS.GZ PDF )
Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings
Amitabh Saxena and Serguey Priymak and Ben Soh
2005/342 ( PDF )
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
Pu Duan and Shi Cui and Choong Wah Chan
2005/341 ( PS PS.GZ PDF )
A Universally Composable Scheme for Electronic Cash
Marten Trolin
2005/340 ( -- withdrawn -- )
A New Approach to Counteract DPA Attacks on Block Ciphers
Christophe Giraud and Emmanuel Prouff
2005/339 ( PS PS.GZ PDF )
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings
Zhaohui Cheng and Liqun Chen and Richard Comley and Qiang Tang
2005/338 ( PDF )
An Improved Power Analysis Attack Against Camellia's Key Schedule
Lu Xiao and Howard M. Heys
2005/337 ( PDF )
Statistical Multiparty Computation Based on Random Walks on Graphs
Liangliang Xiao, Mulan Liu, and Zhifang Zhang
2005/336 ( PDF )
Pairing-based identification schemes
David Freeman
2005/335 ( PS PS.GZ PDF )
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems
Amitabh Saxena and Ben Soh
2005/334 ( PS PS.GZ PDF )
Secure Key-Updating for Lazy Revocation
Michael Backes and Christian Cachin and Alina Oprea
2005/333 ( PDF )
Universally Composable Disk Encryption Schemes
Ivan Damg{\aa}rd and Kasper Dupont
2005/332 ( PS PS.GZ PDF )
Classification of Cubic $(n-4)$-resilient Boolean Functions
An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel
2005/331 ( PS PS.GZ PDF )
A Fuzzy Sketch with Trapdoor
Julien Bringer and Hervé Chabanne and Quoc Dung Do
2005/330 ( PDF )
A Dedicated Processor for the eta Pairing
Robert Ronan and Colm O hEigeartaigh and Colin Murphy and Michael Scott and Tim Kerins and W.P. Marnane
2005/329 ( PDF )
Cryptographic Protocols to Prevent Spam
Amir Herzberg
2005/328 ( PDF )
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
Jonathan Katz and Chiu-Yuen Koo
2005/327 ( PS PS.GZ PDF )
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee
2005/326 ( PDF )
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2005/325 ( PS PS.GZ PDF )
An Effective Method to Implement Group Signature with Revocation
HE GE
2005/324 ( PS PS.GZ PDF )
Extracting bits from coordinates of a point of an elliptic curve
Nicolas G\"urel
2005/323 ( PDF )
The Weil pairing on elliptic curves over C
Steven D. Galbraith
2005/322 ( PDF )
Evolutionary Design of Trace Form Bent Functions
Min yang and Qingshu Meng and Huanguo Zhang
2005/321 ( PS PS.GZ PDF )
Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)
Liam Keliher and Jiayuan Sui
2005/320 ( PDF )
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung and Benoit Chevallier-Mames and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang
2005/319 ( PS PS.GZ PDF )
ID-based Restrictive Partially Blind Signatures and Applications
Xiaofeng Chen and Fangguo Zhang and Shengli Liu
2005/318 ( PDF )
Bounds on Birthday Attack Times
Michael J. Wiener
2005/317 ( PS PS.GZ PDF )
Ring Signatures without Random Oracles
Sherman S. M. Chow and Joseph K. Liu and Victor K. Wei and Tsz Hon Yuen
2005/316 ( PS PS.GZ PDF )
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Dong-Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyo Il Chung
2005/315 ( PDF )
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
David Molnar and Andrea Soppera and David Wagner
2005/314 ( PS PS.GZ PDF )
Fast genus 2 arithmetic based on Theta functions
P. Gaudry
2005/313 ( PS PS.GZ PDF )
Deterministic Identity-Based Signatures for Partial Aggregation
Javier Herranz
2005/312 ( PDF )
A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations
Xijin Tang and Yong Feng
2005/311 ( PDF )
What do S-boxes Say in Differential Side Channel Attacks?
Cecile Canovas and Jessy Clediere
2005/310 ( PS PS.GZ PDF )
Meta Ring Signature
Hiroyuki OKAZAKI and Ryuichi SAKAI and Masao KASAHARA
2005/309 ( PS PS.GZ PDF )
A New Efficient ID-Based Authenticated Key Agreement Protocol
Quan Yuan and Songping Li
2005/308 ( PDF )
Adaptable Group-Oriented Signature
Chunbo Ma, Jun Ao, and Dake He
2005/307 ( PS PS.GZ PDF )
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited
K. Bentahar
2005/306 ( PDF )
Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---
Yasuyuki MURAKAMI, Masao KASAHARA
2005/305 ( PDF )
Steganography with Imperfect Samplers
Anna Lysyanskaya and Maria Meyerovich
2005/304 ( PS PS.GZ PDF )
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
Adam Bender and Jonathan Katz and Ruggero Morselli
2005/303 ( PDF )
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Kevin Fu and Seny Kamara and Tadayoshi Kohno
2005/302 ( PS PS.GZ PDF )
Elliptic Curves for Pairing Applications
Angela Murphy and Noel Fitzpatrick
2005/301 ( PDF )
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Paris Kitsos
2005/300 ( PS PS.GZ PDF )
Towards Security Two-part Authenticated Key Agreement Protocols
Songping Li and Quan Yuan and Jin Li
2005/299 ( PDF )
Nonlinearity of the Round Function
Marcin Kontak and Janusz Szmidt
2005/298 ( PDF )
Keeping Denial-of-Service Attackers in the Dark
Gal Badishi and Amir Herzberg and Idit Keidar
2005/297 ( PS PS.GZ PDF )
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
Maithili Narasimha and Gene Tsudik
2005/296 ( PS PS.GZ PDF )
A Key Establishment IP-Core for Ubiquitous Computing
Markus Volkmer and Sebastian Wallner
2005/295 ( PS PS.GZ PDF )
Hidden Exponent RSA and Efficient Key Distribution
HE GE
2005/294 ( PS PS.GZ PDF )
On Fairness in Simulatability-based Cryptographic Systems
Michael Backes and Dennis Hofheinz and J\"orn M\"uller-Quade and Dominique Unruh
2005/293 ( PDF )
Speeding Up Pairing Computation
Colm O hEigeartaigh
2005/292 ( PDF )
Improved Integral Cryptanalysis of FOX Block Cipher
Wu Wenling, Zhang Wentao, and Feng Dengguo
2005/291 ( PDF )
Cryptography In the Bounded Quantum-Storage Model
Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner
2005/290 ( PS PS.GZ PDF )
Perfect Non-Interactive Zero Knowledge for NP
Jens Groth and Rafail Ostrovsky and Amit Sahai
2005/289 ( PS PS.GZ PDF )
Overview of Key Agreement Protocols
Ratna Dutta and Rana Barua
2005/288 ( PS PS.GZ PDF )
Direct Chosen Ciphertext Security from Identity-Based Techniques
Xavier Boyen and Qixiang Mei and Brent Waters
2005/287 ( PS PS.GZ PDF )
Provable Efficient Certificateless Public Key Encryption
Yijuan Shi and Jianhua Li
2005/286 ( PS PS.GZ PDF )
Concurrent Zero Knowledge without Complexity Assumptions
Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil Vadhan
2005/285 ( PS PS.GZ PDF )
Generalizations of RSA public key cryptosystems
Li Banghe
2005/284 ( PS PS.GZ PDF )
Foundations and Applications for Secure Triggers
Ariel Futoransky and Emiliano Kargieman and Carlos Sarraute and Ariel Waissbein
2005/283 ( PS PS.GZ PDF )
Revisiting Oblivious Signature-Based Envelopes
Samad Nasserian, Gene Tsudik
2005/282 ( PS PS.GZ PDF )
Spreading Alerts Quietly and the Subgroup Escape Problem
James Aspnes and Zoë Diamadi and Kristian Gjøsteen and René Peralta and Aleksandr Yampolskiy
2005/281 ( PDF )
Herding Hash Functions and the Nostradamus Attack
John Kelsey and Tadayoshi Kohno
2005/280 ( PS PS.GZ PDF )
Partitioned Cache Architecture as a Side-Channel Defence Mechanism
D. Page
2005/279 ( PS PS.GZ PDF )
Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model
Bao Li and Hongda Li and Guangwu Xu and Haixia Xu
2005/278 ( PS PS.GZ PDF )
A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
Katja Schmidt-Samoa
2005/277 ( PS PS.GZ PDF )
Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions
Fumiyuki Momose and Jinhui Chao
2005/276 ( PDF )
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Jung Hee Cheon and Dong Hoon Lee
2005/275 ( PDF )
Explicit Construction of Secure Frameproof Codes
Dongvu Tonien and Reihaneh Safavi-Naini
2005/274 ( PDF )
Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign
Jeff Hoffstein and Nick Howgrave-Graham and Jill Pipher and Joseph H. Silverman and William Whyte
2005/273 ( PDF )
CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III
P G Vaidya and Sajini Anand
2005/272 ( PDF )
An Authentication Protocol For Mobile Agents Using Bilinear Pairings
Amitabh Saxena and Ben Soh
2005/271 ( PS PS.GZ PDF )
Cache attacks and Countermeasures: the Case of AES
Dag Arne Osvik and Adi Shamir and Eran Tromer
2005/270 ( PS PS.GZ PDF )
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
2005/269 ( PS PS.GZ PDF )
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing
Junghyun Nam, Seungjoo Kim, and Dongho Won
2005/268 ( PDF )
Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI
Shujun Li and Heung-Yeung Shum
2005/267 ( PS PS.GZ PDF )
Stream Cipher Design based on Jumping Finite State Machines
Cees J.A. Jansen
2005/266 ( PS PS.GZ PDF )
A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code
Charanjit S. Jutla and Anindya C. Patthak
2005/265 ( PS PS.GZ PDF )
Security Analysis of KEA Authenticated Key Exchange Protocol
Kristin Lauter and Anton Mityagin
2005/264 ( PS PS.GZ PDF )
On an authentication scheme based on the Root Problem in the braid group
Boaz Tsaban
2005/263 ( PDF )
Wang's sufficient conditions of MD5 are not sufficient
Jun Yajima and Takeshi Shimoyama
2005/262 ( PS PS.GZ PDF )
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Ivan Damg{\aa}rd and Yuval Ishai
2005/261 ( PS PS.GZ PDF )
The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model
Alexander W. Dent
2005/260 ( PS PS.GZ PDF )
Powered Tate Pairing Computation
Bo Gyeong Kang and Je Hong Park
2005/259 ( PS PS.GZ PDF )
Efficient Delegation of Pairing Computation
Bo Gyeong Kang and Moon Sung Lee and Je Hong Park
2005/258 ( PS PS.GZ PDF )
Relations Among Notions of Security for Identity Based Encryption Schemes
Nuttapong Attrapadung and Yang Cui and Goichiro Hanaoka and Hideki Imai and Kanta Matsuura and Peng Yang and Rui Zhang
2005/257 ( PS PS.GZ PDF )
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY
Jin Hong and Woo-Hwan Kim
2005/256 ( PDF )
Fuzzy Universal Hashing and Approximate Authentication
Reihaneh Safavi-Naini and Dongvu Tonien
2005/255 ( PDF )
Inoculating Multivariate Schemes Against Differential Attacks
Jintai Ding and Jason E. Gower
2005/254 ( PS PS.GZ PDF )
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi
2005/253 ( PS PS.GZ PDF )
Security Notions for Identity Based Encryption
David Galindo and Ichiro Hasuo
2005/252 ( PDF )
Faster Pairings using an Elliptic Curve with an Efficient Endomorphism
Michael Scott
2005/251 ( PS PS.GZ PDF )
Feistel Schemes and Bi-Linear Cryptanalysis
Nicolas Courtois
2005/250 ( PDF )
The topology of covert conflict
Shishir Nagaraja, Ross Anderson
2005/249 ( -- withdrawn -- )
Efficient Certificateless Public Key Encryption
Yijuan Shi and Jianhua Li
2005/248 ( PS PS.GZ PDF )
Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing
Michael Szydlo and Yiqun Lisa Yin
2005/247 ( PS PS.GZ PDF )
A Simple and Provably Good Code for SHA Message Expansion
Charanjit S. Jutla and Anindya C. Patthak
2005/246 ( PS PS.GZ PDF )
A Verifiable Secret Shuffle of Homomorphic Encryptions
Jens Groth
2005/245 ( PS PS.GZ PDF )
On the Algebraic Immunity of Symmetric Boolean Functions
An Braeken and Bart Preneel
2005/244 ( PS PS.GZ PDF )
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
Boaz Tsaban
2005/243 ( PS PS.GZ PDF )
Cryptanalysis of Sfinks
Nicolas T. Courtois
2005/242 ( PS PS.GZ PDF )
Private Searching On Streaming Data
Rafail Ostrovsky and William E. Skeith III
2005/241 ( PS PS.GZ )
On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities
Hao Chen and Liqing Xu
2005/240 ( PS PS.GZ PDF )
Attack on Okamoto et al.'s New Short Signature Schemes
Fangguo Zhang and Xiaofeng Chen
2005/239 ( PDF )
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
Raylin Tso and Ying Miao and Takeshi Okamoto and Eiji Okamoto
2005/238 ( -- withdrawn -- )
Simple and Provable Secure Strong Designated Verifier Signature Schemes
Raylin Tso and Takeshi Okamoto and Eiji Okamoto
2005/237 ( PDF )
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
Henri Gilbert and Matt Robshaw and Herve Sibert
2005/236 ( PDF )
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves
Pu Duan and Shi Cui and Choong Wah Chan
2005/235 ( PS PS.GZ PDF )
Tree Parity Machine Rekeying Architectures for Embedded Security
Markus Volkmer and Sebastian Wallner
2005/234 ( PDF )
LILI-II is not Broken
William Millan and Ed Dawson
2005/233 ( PDF )
On the Entropy of Arcfour Keys
Luke O'Connor
2005/232 ( PS PS.GZ PDF )
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
Markus Volkmer and Sebastian Wallner
2005/231 ( PS PS.GZ PDF )
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Boaz Tsaban
2005/230 ( -- withdrawn -- )
Yet Another Short Signatures Without Random Oracles from Bilinear Pairings
Fangguo Zhang and Xiaofeng Chen
2005/229 ( PS PS.GZ PDF )
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
Deepak Kumar Dalai and Subhamoy Maitra and Sumanta Sarkar
2005/228 ( PS PS.GZ PDF )
Efficient Doubling on Genus 3 Curves over Binary Fields
Xinxin Fan and Thomas Wollinger and Yumin Wang
2005/227 ( PS PS.GZ PDF )
Threshold Ring Signatures Efficient for Large Sets of Signers
K. Maneva-Jakimoska and G. Jakimoski and M. Burmester
2005/226 ( PS PS.GZ PDF )
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Liqun Chen and Zhaohui Cheng
2005/225 ( PDF )
Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving
Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger
2005/224 ( PS PS.GZ PDF )
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction
L. Chen and Z. Cheng and J. Malone-Lee and N.P. Smart
2005/223 ( PS PS.GZ PDF )
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
Ayan Mahalanobis
2005/222 ( PS PS.GZ PDF )
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
Min Feng and Bin B.Zhu and Maozhi Xu and Shipeng Li
2005/221 ( PS PS.GZ PDF )
Constant Round Dynamic Group Key Agreement
Ratna Dutta and Rana Barua
2005/220 ( PS PS.GZ )
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
Michael Backes and Birgit Pfitzmann
2005/219 ( PS PS.GZ PDF )
Cryptanalysis of a 32-bit RC4-like Stream Cipher
Hongjun Wu
2005/218 ( PS PS.GZ PDF )
The conjugacy problem and related problems in lattice-ordered groups
W. Charles Holland and Boaz Tsaban
2005/217 ( PS PS.GZ PDF )
Efficient Identity-Based Key Encapsulation to Multiple Parties
M. Barbosa and P. Farshim
2005/216 ( PDF )
A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret
Hassan Jameel and Sungyoung Lee
2005/215 ( PS PS.GZ PDF )
Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes
Jason E. Holt
2005/214 ( PS PS.GZ PDF )
TMTO With Multiple Data: Analysis and New Single Table Trade-offs
Sourav Mukhopadhyay and Palash Sarkar
2005/213 ( -- withdrawn -- )
A Counter-based MAC Revisited: Towards Better Security
Eonkyung Lee
2005/212 ( PDF )
Probability distributions of Correlation and Differentials in Block Ciphers
Joan Daemen and Vincent Rijmen
2005/211 ( PDF )
Games and the Impossibility of Realizable Ideal Functionality
Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov
2005/210 ( PS PS.GZ PDF )
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
John Black
2005/209 ( PS PS.GZ PDF )
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
Jin Wook Byun and Dong Hoon Lee
2005/208 ( -- withdrawn -- )
On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm
Daniel R. L. Brown
2005/207 ( PS PS.GZ PDF )
Some Thoughts on Time-Memory-Data Tradeoffs
Alex Biryukov
2005/206 ( PDF )
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols
Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock
2005/205 ( PDF )
Another look at HMQV
Alfred Menezes
2005/204 ( PS PS.GZ PDF )
An Algebraic Masking Method to Protect AES Against Power Attacks
Nicolas Courtois and Louis Goubin
2005/203 ( PS PS.GZ PDF )
On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions
Nicolas Courtois and Blandine Debraize and Eric Garrido
2005/202 ( PS PS.GZ PDF )
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
Nicolas Courtois
2005/201 ( PS PS.GZ PDF )
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
Zhaohui Cheng and Liqun Chen
2005/200 ( PDF )
Block ciphers sensitive to Groebner Basis Attacks
Johannes Buchmann and Andrei Pychkine and Ralf-Philipp Weinmann
2005/199 ( -- withdrawn -- )
Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security
Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa
2005/198 ( PS PS.GZ PDF )
Universally Composable Time-Stamping Schemes with Audit
Ahto Buldas and Peeter Laud and Märt Saarepera and Jan Willemson
2005/197 ( PDF )
Weaknesses in two group Diffie-Hellman key exchange protocols
Qiang Tang and Liqun Chen
2005/196 ( PS PS.GZ PDF )
Universally Composable Password-Based Key Exchange
Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Philip MacKenzie
2005/195 ( PS PS.GZ PDF )
Twin RSA
Arjen K. Lenstra and Benjamin M.M. de Weger
2005/194 ( PDF )
Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography
Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, and Tomohiko Uyematsu
2005/193 ( PS PS.GZ PDF )
VSH, an Efficient and Provable Collision Resistant Hash Function
Scott Contini and Arjen K. Lenstra and Ron Steinfeld
2005/192 ( PS PS.GZ PDF )
On the security and the efficiency of the Merkle signature scheme
Carlos Coronado
2005/191 ( PDF )
Public Key Encryption with Keyword Search Revisited
Joonsang Baek and Reihaneh Safavi-Naini and Willy Susilo
2005/190 ( PDF )
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"
SeongHan Shin and Kazukuni Kobara and Hideki Imai
2005/189 ( PDF )
A Weak-Randomizer Attack on RSA-OAEP with e = 3
Daniel R. L. Brown
2005/188 ( PS PS.GZ PDF )
Group Signature where Group Manager, Members and Open Authority are Identity-Based
Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang
2005/187 ( PDF )
How To Exchange Secrets with Oblivious Transfer
Michael O. Rabin
2005/186 ( -- withdrawn -- )
Linkability of Several Blind Signature Schemes
Xuesheng Zhong
2005/185 ( PDF )
Security properties of two provably secure conference key agreement protocols
Qiang Tang and Chris J. Mitchell
2005/184 ( PDF )
Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families
Dongvu Tonien and Reihaneh Safavi-Naini
2005/183 ( PDF )
PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications
Thierry Moreau
2005/182 ( PDF )
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
Chih-I Wang, Chun-I Fan, and D. J. Guan
2005/181 ( PS PS.GZ PDF )
A plausible approach to computer-aided cryptographic proofs
Shai Halevi
2005/180 ( PDF )
A Note on Secure Key Issuing in ID-based Cryptography
XU Chunxiang and ZHOU Junhui and QIN Zhiguang
2005/179 ( PS PS.GZ PDF )
Intrusion-Resilience via the Bounded-Storage Model
Stefan Dziembowski
2005/178 ( PDF )
Analyzing Unlinkability of Some Group Signatures
Zhou Sujing and Lin Dongdai
2005/177 ( PDF )
Secret sharing on the $d$-dimensional cube
Laszlo Csirmaz
2005/176 ( PDF )
HMQV: A High-Performance Secure Diffie-Hellman Protocol
Hugo Krawczyk
2005/175 ( PS PS.GZ PDF )
A 32-bit RC4-like Keystream Generator
Yassir Nawaz and Kishan Chand Gupta and Guang Gong
2005/174 ( PS PS.GZ PDF )
On the Automatic Construction of Indistinguishable Operations
Manuel Barbosa and Dan Page
2005/173 ( PDF )
Weaknesses in a leakage-resilient authenticated key transport protocol
Qiang Tang and Chris J. Mitchell
2005/172 ( -- withdrawn -- )
Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy
Radu Sion and Bogdan Carbunar
2005/171 ( PS PS.GZ PDF )
Towards computationally sound symbolic analysis of key exchange protocols
Prateek Gupta and Vitaly Shmatikov
2005/170 ( PDF )
Unclonable Group Identification
Ivan Damg{\aa}rd and Kasper Dupont and Michael {\O}stergaard Pedersen
2005/169 ( PS PS.GZ PDF )
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
Shai Halevi and Paul A. Karger and Dalit Naor
2005/168 ( PS PS.GZ PDF )
Dynamic k-Times Anonymous Authentication
Lan Nguyen and Rei Safavi-Naini
2005/167 ( -- withdrawn -- )
Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems
YoungJu Choie and Jaemyung Kim and Eunjeong Lee
2005/166 ( PDF )
Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems
Eunjeong Lee and Yoonjin Lee
2005/165 ( PDF )
CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER
Makoto Matsumoto and Takuji Nishimura and Mariko Hagita and Mutsuo Saito
2005/164 ( PDF )
A Distinguish attack on COSvd Ciphers
Mohammad Ali Orumiehchi ha and Dr.R. Mirghadri
2005/163 ( PDF )
Modeling Insider Attacks on Group Key-Exchange Protocols
Jonathan Katz and Ji Sun Shin
2005/162 ( PS PS.GZ PDF )
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa
2005/161 ( PDF )
Multiple forgery attacks against Message Authentication Codes
David A. McGrew and Scott R. Fluhrer
2005/160 ( PS PS.GZ PDF )
First Steps Toward a Cryptography-Aware Language and Compiler
M. Barbosa and R. Noad and D. Page and N.P. Smart
2005/159 ( PS PS.GZ PDF )
On Constructing Parallel Pseudorandom Generators from One-Way Functions
Emanuele Viola
2005/158 ( PDF )
Geometric Cryptosystem
Arkady Berenstein and Leon Chernyak
2005/157 ( PDF )
FOX Algorithm Implementation: a hardware design approach
Colm O'Keeffe and Emanuel Popovici
2005/156 ( PDF )
On the security of some password-based key agreement schemes
Qiang Tang and Chris J. Mitchell
2005/155 ( PS PS.GZ )
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays
Eli Biham and Jennifer Seberry
2005/154 ( PS PS.GZ PDF )
Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol
Marius C. Silaghi and Gerhard Friedrich
2005/153 ( PDF )
On Security of Koyama Schemes
Sahadeo Padhye
2005/152 ( PS PS.GZ PDF )
On High-Rate Cryptographic Compression Functions
Richard Ostertag and Martin Stanek
2005/151 ( PDF )
Improved Collision Attack on MD4
Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta
2005/150 ( PS PS.GZ PDF )
Secure Delegation of Elliptic-Curve Pairing
Benoit Chevallier-Mames and Jean-Sebastien Coron and Noel McCullagh and David Naccache and Michael Scott
2005/149 ( PDF )
Conditionally Verifiable Signatures
Aldar C-F. Chan and Ian F. Blake
2005/148 ( PDF )
On Universal Composable Security of Time-Stamping Protocols
Toshihiko Matsuo and Shin'ichiro Matsuo
2005/147 ( PDF )
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware
Jong Youl Choi and Philippe Golle and Markus Jakobsson
2005/146 ( PDF )
A High Speed Architecture for Galois/Counter Mode of Operation (GCM)
Bo Yang, Sambit Mishra, Ramesh Karri
2005/145 ( PDF )
Small Secure Sketch for Point-Set Difference
Ee-Chien Chang and Qiming Li
2005/144 ( PS PS.GZ PDF )
Kaweichel, an Extension of Blowfish for 64-Bit Architectures
Dieter Schmidt
2005/143 ( PDF )
Multiparty Computation Based on Connectivity of Graphs
Liangliang Xiao and Mulan Liu and Zhifang Zhang
2005/142 ( PDF )
Broadcast Encryption with Random Key Pre-distribution Schemes
Mahalingam Ramkumar
2005/141 ( PDF )
Enhanced password-based key establishment protocol
Qiang Tang and Chris J. Mitchell
2005/140 ( PS PS.GZ PDF )
How to Split a Shared Secret into Shared Bits in Constant-Round
Ivan Damg{\aa}rd and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft
2005/139 ( PDF )
Scaling security in pairing-based protocols
Michael Scott
2005/138 ( PDF )
I-HARPS: An Efficient Key Pre-distribution Scheme
Mahalingam Ramkumar
2005/137 ( PS PS.GZ )
A Sender Verifiable Mix-Net and a New Proof of a Shuffle
Douglas Wikström
2005/136 ( PDF )
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
Jung Hee Cheon and Nam-su Jho and Myung-Hwan Kim and Eun Sun Yoo
2005/135 ( PS PS.GZ PDF )
Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model
Jacques Patarin and Paul Camion
2005/134 ( PDF )
Broadcast Authentication With Hashed Random Preloaded Subsets
Mahalingam Ramkumar
2005/133 ( PS PS.GZ PDF )
Pairing-Friendly Elliptic Curves of Prime Order
Paulo S. L. M. Barreto and Michael Naehrig
2005/132 ( PS PS.GZ PDF )
Formal Notions of Anonymity for Peer-to-peer Networks
Jiejun Kong
2005/131 ( PS PS.GZ PDF )
Dynamic Group Key Agreement in Tree-Based Setting
Ratna Dutta and Rana Barua
2005/130 ( -- withdrawn -- )
Results on Rotation Symmetric Boolean Functions on Even Number Variable
pinhui ke,changzhu ling,wenqiao yan
2005/129 ( PS PS.GZ PDF )
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases
Zhaohui Cheng and Manos Nistazakis and Richard Comley and Luminita Vasiu
2005/128 ( -- withdrawn -- )
Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials
Xijin Tang and Yong Feng
2005/127 ( PDF )
Browser Model for Security Analysis of Browser-Based Protocols
Thomas Groß and Birgit Pfitzmann and Ahmad-Reza Sadeghi
2005/126 ( PDF )
On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator
Shahram Khazaei, Mahmood Salmasizadeh and Javad Mohajeri
2005/125 ( PS PS.GZ PDF )
SPA Resistant Left-to-Right Integer Recodings
Nicolas Th\'eriault
2005/124 ( PS PS.GZ PDF )
Append-Only Signatures
Eike Kiltz and Anton Mityagin and Saurabh Panjwani and Barath Raghavan
2005/123 ( PS PS.GZ PDF )
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
Lan Nguyen
2005/122 ( PDF )
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004
Xinyi Huang and Willy Susilo and Yi Mu
2005/121 ( PDF )
Pass-thoughts: Authenticating With Our Minds
Julie Thorpe and P.C. van Oorschot and Anil Somayaji
2005/120 ( PDF )
On Designatedly Verified (Non-interactive) Watermarking Schemes
Malapati Raja Sekhar and Takeshi Okamoto and Eiji Okamato
2005/119 ( PS PS.GZ PDF )
Index Calculus in Class Groups of Plane Curves of Small Degree
Claus Diem
2005/118 ( PS PS.GZ PDF )
Results on Rotation Symmetric Bent Functions
Deepak Kumar Dalai and Subhamoy Maitra
2005/117 ( PS PS.GZ PDF )
Boneh-Franklin Identity Based Encryption Revisited
David Galindo
2005/116 ( PS PS.GZ PDF )
On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems
Nigel Smart and Frederik Vercauteren
2005/115 ( PS PS.GZ PDF )
Characteristics of Key-Dependent S-Boxes: the Case of Twofish
Marco Macchetti
2005/114 ( PS PS.GZ PDF )
Intrusion-Resilient Secure Channels
Gene Itkis and Robert McNerney Jr. and Scott W. Russell
2005/113 ( PS PS.GZ PDF )
Partially Fixed Point Multiplication
Majid Khabbazian, T. Aaron Gulliver and Vijay K. Bhargava
2005/112 ( PS PS.GZ PDF )
On the relationship between squared pairings and plain pairings
Bo Gyeong Kang and Je Hong Park
2005/111 ( PDF )
Weak Composite Diffie-Hellman is not Weaker than Factoring
Kooshiar Azimian, Javad Mohajeri and Mahmoud Salmasizadeh
2005/110 ( PS PS.GZ PDF )
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.
Ayan Mahalanobis
2005/109 ( PDF )
A Public Key Cryptosystem Based on Singular Cubic Curve
Sahadeo Padhye
2005/108 ( PS PS.GZ PDF )
Efficient Identity-Based and Authenticated Key Agreement Protocol
Yongge Wang
2005/107 ( PDF )
A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher
Ophir Levy and Avishai Wool
2005/106 ( PS PS.GZ PDF )
How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
Boaz Barak and Amit Sahai
2005/105 ( PS PS.GZ PDF )
On Error Correction in the Exponent
Chris Peikert
2005/104 ( PS PS.GZ )
On estimating the lattice security of NTRU
Nick Howgrave-Graham and Jeff Hoffstein and Jill Pipher and William Whyte
2005/103 ( PS PS.GZ PDF )
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
Fangguo Zhang and Xiaofeng Chen
2005/102 ( PDF )
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications
Vlastimil Klima
2005/101 ( PDF )
Soundness and Completeness of Formal Logics of Symmetric Encryption
Gergei Bana
2005/100 ( PDF )
almost enumeration of 8-variable bent functions
Qingshu Meng and Huanguo Zhang and Jingsong Cui and Min Yang
2005/099 ( PDF )
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes
Miodrag J. Mihaljevic and Marc P.C. Fossorier and Hideki Imai
2005/098 ( PS PS.GZ PDF )
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme
Yassine Lakhnech and Laurent Mazare
2005/097 ( PS PS.GZ PDF )
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation
Yassine Lakhnech and Laurent Mazare
2005/096 ( PS PS.GZ PDF )
Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$
David Jedlicka
2005/095 ( PS PS.GZ PDF )
Security and Privacy Issues in E-passports
Ari Juels and David Molnar and David Wagner
2005/094 ( PS PS.GZ PDF )
A Survey on ID-Based Cryptographic Primitives
M. Choudary Gorantla and Raju Gangishetti and Ashutosh Saxena
2005/093 ( PDF )
An ID-Based Key Agreement Scheme from pairing
Guohong Xie
2005/092 ( PS PS.GZ )
PRF Domain Extension Using DAGs
Charanjit Jutla
2005/091 ( PDF )
Distributed Phishing Attacks
Markus Jakobsson and Adam Young
2005/090 ( PS PS.GZ PDF )
Rediscovery of Time Memory Tradeoffs
Jin Hong and Palash Sarkar
2005/089 ( PDF )
Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions
Hans Dobbertin and Gregor Leander
2005/088 ( PDF )
The MAC function Pelican 2.0
Joan Daemen and Vincent Rijmen
2005/087 ( PDF )
AES side channel attack protection using random isomorphisms
Rostovtsev A.G. and Shemyakina O.V.
2005/086 ( PDF )
Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)
Henry Ng
2005/085 ( -- withdrawn -- )
A new structural attack for GPT and variants
R. Overbeck
2005/084 ( PS PS.GZ PDF )
On Resistance of DES to Related-Key Differential Cryptanalysis
Goce Jakimoski and Yvo Desmedt
2005/083 ( PDF )
Security notions for disk encryption
Kristian Gjøsteen
2005/082 ( PS PS.GZ PDF )
Some properties of an FSE 2005 Hash Proposal
Lars R. Knudsen
2005/081 ( -- withdrawn -- )
Smashing SMASH
Norbert Pramstaller and Christian Rechberger and Vincent Rijmen
2005/080 ( PDF )
A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification
R. Venkatesh and C. Sanjeevakumar and M. Kasi Rajan and L. Sudarsan and N. Srinivasan
2005/079 ( PS PS.GZ PDF )
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism
Marius C Silaghi
2005/078 ( PS PS.GZ PDF )
Duality between Multiplication and Modular Reduction
Wieland Fischer and Jean-Pierre Seifert
2005/077 ( PS PS.GZ PDF )
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations
Christopher Wolf and Bart Preneel
2005/076 ( PDF )
Pairing-Based Cryptography at High Security Levels
Neal Koblitz and Alfred Menezes
2005/075 ( PDF )
Finding MD5 Collisions – a Toy For a Notebook
Vlastimil Klima
2005/074 ( PS PS.GZ PDF )
Computationally sound implementations of equational theories against passive adversaries
Mathieu Baudet and V{\'e}ronique Cortier and Steve Kremer
2005/073 ( PS PS.GZ PDF )
BROADCAST ENCRYPTION $\pi$
Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo
2005/072 ( PS PS.GZ PDF )
Practical Lattice Basis Sampling Reduction
Johannes Buchmann and Christoph Ludwig
2005/071 ( -- withdrawn -- )
A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields
Dabi Zou and Dongdai Lin
2005/070 ( PDF )
On public-key cryptosystems based on combinatorial group theory
Jean-Camille Birget and Spyros S. Magliveras and Michal Sramka
2005/069 ( PS PS.GZ PDF )
Fast Elliptic Curve Point Multiplication using Double-Base Chains
V. S. Dimitrov and L. Imbert and P. K. Mishra
2005/068 ( PS PS.GZ PDF )
N-adic Summation-Shrinking Generator. Basic properties and empirical evidences.
Zhaneta Tasheva and Borislav Bedzhev and Borislav Stoyanov
2005/067 ( PDF )
Colliding X.509 Certificates
Arjen Lenstra and Xiaoyun Wang and Benne de Weger
2005/066 ( PS PS.GZ PDF )
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
Eike Kiltz
2005/065 ( PS PS.GZ PDF )
Efficient hardware for the Tate pairing calculation in characteristic three
T. Kerins and W. P. Marnane and E. M. Popovici and P. S. L. M. Barreto
2005/064 ( PDF )
On Efficient Key Agreement Protocols
Anish Mathuria and Vipul Jain
2005/063 ( -- withdrawn -- )
On the Key Schedule of Blowfish
Dieter Schmidt
2005/062 ( -- withdrawn -- )
Cryptanalysis of One Fair E-cash System
LiHua Liu and Zhengjun Cao
2005/061 ( PS PS.GZ PDF )
Key Derivation and Randomness Extraction
Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval
2005/060 ( PDF )
Compact E-Cash
Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya
2005/059 ( PDF )
Secret sharing schemes on graphs
Laszlo Csirmaz
2005/058 ( PS PS.GZ PDF )
Generic Constructions of Identity-Based and Certificateless KEMs
K. Bentahar and P. Farshim and J. Malone-Lee and N.P. Smart
2005/057 ( PDF )
Tight Reductions among Strong Die-Hellman Assumptions
Victor K. Wei
2005/056 ( PS PS.GZ PDF )
Deniable Authentication with RSA and Multicasting
Daniel R. L. Brown
2005/055 ( PS PS.GZ PDF )
Untraceability of Two Group Signature Schemes
Zhengjun Cao
2005/054 ( -- withdrawn -- )
Comment on cryptanalysis of Tseng et al.¡¦s authenticated encryption schemes
Yi-Hwa Chen and Jinn-Ke Jan
2005/053 ( PDF )
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent
Hung-Min Sun and Mu-En Wu
2005/052 ( PDF )
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
Ziv Kfir and Avishai Wool
2005/051 ( PS PS.GZ PDF )
A Note on Shor's Quantum Algorithm for Prime Factorization
Zhengjun Cao
2005/050 ( PDF )
David Chaum's Voter Verification using Encrypted Paper Receipts
Poorvi L. Vora
2005/049 ( PDF )
Adversarial Model for Radio Frequency Identification
Gildas Avoine
2005/048 ( PDF )
Cryptanalysis of two identification schemes based on an ID-based cryptosystem
Qiang Tang and Chris J. Mitchell
2005/047 ( PDF )
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Qiang Tang and Chris J. Mitchell
2005/046 ( PDF )
New Approaches for Deniable Authentication
Mario Di Raimondo and Rosario Gennaro
2005/045 ( PDF )
Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
Nick Howgrave-Graham and Joseph H. Silverman and William Whyte
2005/044 ( PS PS.GZ PDF )
On the affine classification of cubic bent functions
Sergey Agievich
2005/043 ( PS PS.GZ PDF )
An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption
Hsiao-Ying Lin and Wen-Guey Tzeng
2005/042 ( PS PS.GZ PDF )
Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications
Logachev~O.A. and Salnikov~A.A. and Yaschenko~V.V.
2005/041 ( PS PS.GZ PDF )
On the Security of a Group Signature Scheme with Strong Separability
Lihua Liu and Zhengjun Cao
2005/040 ( PS PS.GZ PDF )
Unfairness of a protocol for certified delivery
Juan M. Estevez-Tapiador and Almudena Alcaide
2005/039 ( PDF )
Distinguishing Stream Ciphers with Convolutional Filters
Joan Daemen and Gilles Van Assche
2005/038 ( -- withdrawn -- )
Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants
Yi-Hwa Chen and Jinn-Ke Jan
2005/037 ( PS PS.GZ PDF )
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
Claude Castelluccia and Einar Mykletun and Gene Tsudik
2005/036 ( PS PS.GZ PDF )
Concurrent Composition of Secure Protocols in the Timing Model
Yael Kalai and Yehuda Lindell and Manoj Prabhakaran
2005/035 ( PS PS.GZ PDF )
An Efficient CDH-based Signature Scheme With a Tight Security Reduction
Benoit Chevallier-Mames
2005/034 ( PDF )
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)
Gene Tsudik and Shouhuai Xu
2005/033 ( PDF )
An Attack on CFB Mode Encryption As Used By OpenPGP
Serge Mister and Robert Zuccherato
2005/032 ( PS PS.GZ PDF )
On the Notion of Statistical Security in Simulatability Definitions
Dennis Hofheinz and Dominique Unruh
2005/031 ( PS PS.GZ PDF )
The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves
Iwan Duursma and Negar Kiyavash
2005/030 ( PDF )
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves.
A. A. Kalele and V. R. Sule
2005/029 ( PS PS.GZ PDF )
A model and architecture for pseudo-random generation with applications to /dev/random
Boaz Barak and Shai Halevi
2005/028 ( PDF )
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger
2005/027 ( PS PS.GZ PDF )
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Masayuki ABE and Rosario Gennaro and Kaoru Kurosawa
2005/026 ( PS PS.GZ )
Techniques for random maskin in hardware
Jovan Dj. Golic
2005/025 ( PS PS.GZ PDF )
Analysis of Affinely Equivalent Boolean Functions
Meng Qing-shu and Yang min and Zhang Huan-guo and Liu Yu-zhen
2005/024 ( PDF )
Weak keys of the Diffe Hellman key exchange I
A. A. Kalele and V. R. Sule
2005/023 ( PDF )
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
Masao Kasahara
2005/022 ( PS PS.GZ PDF )
An Improved and Efficient Countermeasure against Power Analysis Attacks
ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and Sung-Hyun Kim
2005/021 ( PS PS.GZ )
Partial Hiding in Public-Key Cryptography
Eabhnat N\'{\i} Fhloinn and Michael Purser
2005/020 ( PS PS.GZ PDF )
(De)Compositions of Cryptographic Schemes and their Applications to Protocols
R. Janvier and Y. Lakhnech and L. Mazare
2005/019 ( PDF )
The Full Abstraction of the UC Framework
Jes{\'u}s F. Almansa
2005/018 ( PDF )
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Dan Boneh and Craig Gentry and Brent Waters
2005/017 ( PDF )
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
Roberto M. Avanzi
2005/016 ( PS PS.GZ PDF )
Narrow T-functions
Magnus Daum
2005/015 ( PS PS.GZ PDF )
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Dan Boneh and Xavier Boyen and Eu-Jin Goh
2005/014 ( PS PS.GZ )
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words
Ludovic Perret
2005/013 ( PDF )
Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols
Hung-Yu Chien
2005/012 ( PS PS.GZ PDF )
Efficient Certificateless Public Key Encryption
Zhaohui Cheng and Richard Comley
2005/011 ( PDF )
An Improved Elegant Method to Re-initialize Hash Chains
Yuanchao Zhao and Daoben Li
2005/010 ( PS PS.GZ PDF )
Update on SHA-1
Vincent Rijmen and Elisabeth Oswald
2005/009 ( PDF )
Mixing properties of triangular feedback shift registers
Bernd Schomburg
2005/008 ( PS PS.GZ PDF )
Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004
J. Wu and R. Wei
2005/007 ( PS PS.GZ PDF )
The Misuse of RC4 in Microsoft Word and Excel
Hongjun Wu
2005/006 ( PS PS.GZ )
A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$.
Pradeep Kumar Mishra and Kishan Chand Gupta
2005/005 ( PS PS.GZ PDF )
A sufficient condition for key-privacy
Shai Halevi
2005/004 ( PS PS.GZ PDF )
Benes and Butterfly schemes revisited
Jacques Patarin and Audrey Montreuil
2005/003 ( PDF )
Cryptanalysis of Hiji-bij-bij (HBB)
Vlastimil Klima
2005/002 ( PS PS.GZ PDF )
Logcrypt: Forward Security and Public Verification for Secure Audit Logs
Jason E. Holt and Kent E. Seamons
2005/001 ( PS PS.GZ PDF )
On Obfuscating Point Functions
Hoeteck Wee


[ Cryptology ePrint archive ]