Stop the war!
Остановите войну!
for scientists:
default search action
IACR Cryptology ePrint Archive, Volume 2004
Volume 2004, 2004
- Yuichi Komano, Kazuo Ohta:
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation. 2 - Erik Zenner:
On the Role of the Inner State Size in Stream Ciphers. 3 - Huafei Zhu:
Universal Undeniable Signatures. 5 - Boaz Barak, Yehuda Lindell, Tal Rabin:
Protocol Initialization for the Framework of Universal Composability. 6 - Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Traceable Signatures. 7 - Mihir Bellare, Adriana Palacio:
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. 8 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness. 9 - Tom St. Denis:
Fast Pseudo-Hadamard Transforms. 10 - Adam J. Slagell:
Known-Plaintext Attack Against a Permutation Based Video. 11 - María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. 12 - Jean-Sébastien Coron, Antoine Joux:
Cryptanalysis of a Provably Secure Cryptographic Hash Function. 13 - Sugata Gangopadhyay, Subhamoy Maitra:
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions. 14 - Trond Stølen Gustavsen, Kristian Ranestad:
An AGM-type elliptic curve point counting algorithm in characteristic three. 15 - Dennis Hofheinz, Jörn Müller-Quade:
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer. 16 - Michael Scott:
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints. 17 - Song-Ju Kim, Ken Umeno, Akio Hasegawa:
Corrections of the NIST Statistical Test Suite for Randomness. 18 - Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. 19 - Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Optimal Signcryption from Any Trapdoor Permutation. 20 - Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. 21 - Steven M. Bellovin, William R. Cheswick:
Privacy-Enhanced Searches Using Encrypted Bloom Filters. 22 - Asnat Dadon-Elichai:
RDS: Remote Distributed Scheme for Protecting Mobile Agents. 23 - Sergey Agievich, Andrey Afonenko:
Exponential S-boxes. 24 - Hamilton E. Link, William D. Neumann:
Clarifying Obfuscation: Improving the Security of White-Box Encoding. 25 - Tom St. Denis:
The CSQUARE Transform. 26 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. 27 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. 28 - Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. 29 - Colin Stahlke:
Point Compression on Jacobians of Hyperelliptic Curves over Fq. 30 - Igor A. Semaev:
Summation polynomials and the discrete logarithm problem on elliptic curves. 31 - Michael Scott, Paulo S. L. M. Barreto:
Compressed Pairings. 32 - Muxiang Zhang:
New Approaches to Password Authenticated Key Exchange based on RSA. 33 - Gideon Samid:
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic. 34 - Phillip Rogaway, Thomas Shrimpton:
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. 35 - Yan-Cheng Chang:
Single Database Private Information Retrieval with Logarithmic Communication. 36 - Fuw-Yi Yang, Jinn-ke Jan:
A Provably Secure Scheme for Restrictive Partially Blind Signatures. 37 - Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing without Key Exposure. 38 - Victor K. Wei:
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. 39 - Lizhen Yang, Kefei Chen:
Cryptanalysis of a timestamp-based password authentication scheme. 40 - Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries. 41 - (Withdrawn) Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge. 42
- Xiutao Feng, Quanlong Wang, Zongduo Dai:
Multi-sequences with d-perfect property. 43 - Sujing Zhou:
Transitive Signatures Based on Non-adaptive Standard Signatures. 44 - Yehuda Lindell:
Lower Bounds and Impossibility Results for Concurrent Self Composition. 45 - Lih-Chung Wang, Fei-Hwang Chang:
Revision of Tractable Rational Map Cryptosystem. 46 - Yodai Watanabe:
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes. 47 - Bartosz Zoltak:
Tail-MAC: A Message Authentication Scheme for Stream Ciphers. 48 - Christophe Clavier:
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm. 49 - Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen:
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. 50 - Yan-Cheng Chang, Michael Mitzenmacher:
Privacy Preserving Keyword Searches on Remote Encrypted Data. 51 - Tal Malkin, Satoshi Obana, Moti Yung:
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. 52 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Efficient and Universally Composable Committed Oblivious Transfer and Applications. 53 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. 54 - Christophe Doche:
Redundant Trinomials for Finite Fields of Characteristic 2. 55 - Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. 57 - Michael Scott, Paulo S. L. M. Barreto:
Generating more MNT elliptic curves. 58 - Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. 59 - Ben Lynn, Manoj Prabhakaran, Amit Sahai:
Positive Results and Techniques for Obfuscation. 60 - Bo-Yin Yang, Jiun-Ming Chen:
TTS: Rank Attacks in Tame-Like Multivariate PKCs. 61 - John Black, Martin Cochran, Thomas Shrimpton:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. 62 - Helger Lipmaa:
An Oblivious Transfer Protocol with Log-Squared Communication. 63 - Ratna Dutta, Rana Barua, Palash Sarkar:
Pairing-Based Cryptographic Protocols : A Survey. 64 - Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing. 65 - Kris Tiri, Ingrid Verbauwhede:
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC's. 66 - Kris Tiri, Ingrid Verbauwhede:
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC's against Differential Power Analysis. 67 - Kris Tiri, Ingrid Verbauwhede:
Synthesis of Secure FPGA Implementations. 68 - Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. 69 - Steven D. Galbraith, Victor Rotger:
Easy decision-Diffie-Hellman groups. 70 - Waldyr D. Benits Jr., Routo Terada:
An IBE Scheme to Exchange Authenticated Secret Keys. 71 - Christopher Wolf, Bart Preneel:
Asymmetric Cryptography: Hidden Field Equations. 72 - Pierrick Gaudry:
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem. 73 - Liam Keliher, Henk Meijer, Stafford E. Tavares:
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael. 74 - Alexis Warner Machado:
An Hybrid Mode of Operation. 75 - Aggelos Kiayias, Moti Yung:
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. 76 - Mihir Bellare, Haixia Shi, Chong Zhang:
Foundations of Group Signatures: The Case of Dynamic Groups. 77 - Tadayoshi Kohno:
Analysis of the WinZip encryption method. 78 - Zhaohui Cheng, Luminita Vasiu, Richard Comley:
Pairing-Based One-Round Tripartite Key Agreement Protocols. 79 - Marius Oliver Gheorghita:
HENKOS Stream Cipher. 80 - Philip Hawkes, Gregory G. Rose:
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers. 81 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. 82 - Bo Yang, Kaijie Wu, Ramesh Karri:
Scan Based Side Channel Attack on Data Encryption Standard. 83 - David Galindo, Sebastià Martín Molleví, Jorge L. Villar:
Evaluating elliptic curve based KEMs in the light of pairings. 84 - Tom St. Denis:
The CS2 Block Cipher. 85 - Amit Sahai, Brent Waters:
Fuzzy Identity Based Encryption. 86 - Karl Rubin, Alice Silverberg:
Using primitive subgroups to do more with fewer bits. 87 - (Withdrawn) Efficient Batch Verification of Signature Schemes based on Bilinear Maps. 88
- Mahalingam Ramkumar, Nasir D. Memon:
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. 89 - Ratna Dutta, Rana Barua, Palash Sarkar:
Provably Secure Authenticated Tree Based Group Key Agreement Protocol. 90 - Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. 91 - Hongjun Wu:
A New Stream Cipher HC-256. 92 - Giuseppe Ateniese, Breno de Medeiros:
A Provably Secure Nyberg-Rueppel Signature Variant with Applications. 93 - Alex Biryukov:
Block Ciphers and Stream Ciphers: The State of the Art. 94 - Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda:
GNFS Factoring Statistics of RSA-100, 110, ..., 150. 95 - (Withdrawn) On the Ambiguity of Concurrent Signatures. 96
- Vipul Goyal:
How To Re-initialize a Hash Chain. 97 - María Isabel González Vasco, David Pérez-García:
Attacking a Public Key Cryptosystem Based on Tree Replacement. 98 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. 99 - Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan:
The Sorcerer's Apprentice Guide to Fault Attacks. 100 - Johannes Blömer, Jorge Guajardo, Volker Krummel:
Provably Secure Masking of AES. 101 - Benoît Libert, Jean-Jacques Quisquater:
The Exact Security of an Identity Based Signature and its Applications. 102 - Jintai Ding, Dieter Schmidt:
Cryptanalysis of SFlash v3. 103 - Lan Nguyen, Reihaneh Safavi-Naini:
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings. 104 - Alessandro Acquisti:
Receipt-Free Homomorphic Elections and Write-in Ballots. 105 - Pim Tuyls, Jasper Goseling:
Capacity and Examples of Template Protecting Biometric Authentication Systems. 106 - Bertrand Byramjee, Sylvain Duquesne:
Classification of genus 2 curves over F2n and optimization of their arithmetic. 107 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. 108 - Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons:
Concealing Complex Policies with Hidden Credentials. 109 - Carlisle Adams:
Designing Against the 'Overdefined System of Equations' Attack. 110 - Gregory V. Bard:
The Vulnerability of SSL to Chosen Plaintext Attack. 111 - Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Relation between XL algorithm and Gröbner Bases Algorithms. 112 - Dominik Raub, Rainer Steinwandt, Jörn Müller-Quade:
On the Security and Composability of the One Time Pad. 113 - Liqun Chen, John Malone-Lee:
Improved Identity-Based Signcryption. 114 - Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won:
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange. 115 - Ran Canetti, Eyal Kushilevitz, Yehuda Lindell:
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions. 116 - Noel McCullagh, Paulo S. L. M. Barreto:
Efficient and Forward-Secure Identity-Based Signcryption. 117 - Stéphane Flon, Roger Oyono, Christophe Ritzenthaler:
Fast addition on non-hyperelliptic genus 3 curves. 118 - Masayuki Abe, Serge Fehr:
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. 119 - Bartosz Zoltak:
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup. 120 - Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. 121 - Noel McCullagh, Paulo S. L. M. Barreto:
A New Two-Party Identity-Based Authenticated Key Agreement. 122 - Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On security of XTR public key cryptosystems against Side Channel Attacks. 123 - Douglas Wikström:
Universally Composable DKG with Linear Number of Exponentiations. 124 - Shai Halevi:
EME*: extending EME to handle arbitrary-length messages with associated data. 125 - Haining Fan, Yiqi Dai:
Two Software Normal Basis Multiplication Algorithms for GF(2n). 126 - Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won:
DDH-based Group Key Agreement in a Mobile Environment. 127 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic Block Ciphers. 128 - Joe Suzuki:
Generalizing Kedlaya's order counting based on Miura Theory. 129 - David P. Woodruff, Jessica Staddon:
Private Inference Control. 130 - Jung Hee Cheon, Yongdae Kim, HyoJin Yoon:
A New ID-based Signature with Batch Verification. 131 - Robert Granger, Dan Page, Martijn Stam:
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography. 132 - Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. 133 - Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller:
Secure and Efficient Masking of AES - A Mission Impossible? 134 - Vipul Goyal:
More Efficient Server Assisted One Time Signatures. 135 - Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. 136 - Haining Fan, Yiqi Dai:
New GF(2n) Parallel Multiplier Using Redundant Representation. 137 - Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval:
How to Disembed a Program? 138 - Manoj Prabhakaran, Amit Sahai:
New Notions of Security: Achieving Universal Composability without Trusted Setup. 139 - (Withdrawn) Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher. 140
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic AES. 141 - (Withdrawn) Elliptic Curve based Signcryption and its Multi-party Schemes. 142
- Nicolas T. Courtois:
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash. 143 - Alexander Maximov, Martin Hell, Subhamoy Maitra:
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables. 144 - Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax, Hervé Pelletier:
Electromagnetic Side Channels of an FPGA Implementation of AES. 145 - Eli Biham, Rafi Chen:
Near-Collisions of SHA-0. 146 - Matthew J. Campagna, Amit Sethi:
Key Recovery Method for CRT Implementation of RSA. 147