IACR Cryptology ePrint Archive, Volume 2007
Volume 2007, 2007
- (Withdrawn) Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem. 2
- Johann Großschädl, Alexander Szekely, Stefan Tillich:
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks. 3 - Jue-Sam Chou, Yalin Chen, Chung-Ju Chan:
Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking. 4 - Wei Gao, Xueli Wang, Guilin Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. 7 - Dong Hoon Lee, Je Hong Park, Jae Woo Han:
Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006. 8 - Zhenfu Cao, Xiaolei Dong, Licheng Wang:
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings. 9 - David Freeman, Kristin E. Lauter:
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields. 10 - Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu:
Universally Composable Key-evolving Signature. 11 - Atefeh Mashatan, Douglas R. Stinson:
Interactive two-channel message authentication based on interactive-collision Resistant hash functions. 12 - Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto:
Optimised versions of the Ate and Twisted Ate Pairings. 13 - (Withdrawn) VEST Ciphers. 16
- Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-based Key Agreement and Anonymous Extension. 18 - Changshe Ma, Jian Weng, Dong Zheng:
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions. 19 - Leonardo B. Oliveira, Diego F. Aranha, Eduardo Morais, Felipe Daguano, Julio López, Ricardo Dahab:
TinyTate: Identity-Based Encryption for Sensor Networks. 20 - Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient Hybrid Encryption from ID-Based Encryption. 23 - Gregory V. Bard, Nicolas Courtois, Chris Jefferson:
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers. 24 - Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang:
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol. 26 - (Withdrawn) Verifying Data Integrity with Few Queries to Untrusted Memory. 27
- Debrup Chakraborty, Palash Sarkar:
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. 28 - Debrup Chakraborty, Palash Sarkar:
A General Construction of Tweakable Block Ciphers and Different Modes of Operations. 29 - Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. 30 - Eike Kiltz:
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme. 33 - Louis Goubin, Jean-Michel Masereel, Michaël Quisquater:
Cryptanalysis of white box DES implementations. 35 - Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis:
Best Quadratic Approximations of Cubic Boolean Functions. 37 - Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert:
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. 39 - Pradeep Kumar Mishra, Vassil S. Dimitrov:
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. 40 - Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. 41 - Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries:
Design and Primitive Specification for Shannon. 44 - Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
A Coprocessor for the Final Exponentiation of the etaT Pairing in Characteristic Three. 45 - Joonsang Baek, Willy Susilo, Jianying Zhou:
New Constructions of Fuzzy Identity-Based Encryption. 47 - Daniel R. L. Brown, Kristian Gjøsteen:
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. 48 - Vlastimil Klíma:
Special block cipher family DN and new generation SNMAC-type hash function family HDN. 50 - Tri Van Le, Mike Burmester, Breno de Medeiros:
Forward-secure RFID Authentication and Key Exchange. 51 - Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. 56 - David Freeman:
Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians. 57 - Lilya Budaghyan:
The simplest method for constructing APN polynomials EA-inequivalent to power functions. 58 - Rafail Ostrovsky, William E. Skeith III:
A Survey of Single Database PIR: Techniques and Applications. 59 - Yonatan Aumann, Yehuda Lindell:
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. 60 - Neil Costigan, Michael Scott:
Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3. 61 - Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba:
How to Derive Lower Bound on Oblivious Transfer Reduction. 65 - (Withdrawn) Efficient Hierarchical Identity Based Signature in the Standard Model. 68
- Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. 69 - Alexander Maximov:
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected). 70 - Ahto Buldas, Sven Laur:
Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version). 71 - (Withdrawn) A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard. 72
- Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III:
Public Key Encryption that Allows PIR Queries. 73 - Hovav Shacham:
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. 74 - Gautham Sekar, Souradyuti Paul, Bart Preneel:
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy. 75 - (Withdrawn) On bent functions with zero second derivatives. 77
- Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas:
MPC vs. SFE: Perfect Security in a Unified Corruption Model. 78 - (Withdrawn) Weakly only Unforgeable Signature and Its Application in Group Signature. 80
- Brett Hemenway, Rafail Ostrovsky:
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code. 83 - Sanjit Chatterjee, Palash Sarkar:
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions. 84 - Hongbo Yu, Xiaoyun Wang:
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. 85 - Jie Liu, Jianhua Li:
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy. 87 - Domingo Gómez, Jaime Gutierrez, Álvar Ibeas:
An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers. 88 - Ueli Maurer, Dominik Raub:
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. 89 - (Withdrawn) On the security of an image encryption scheme. 90
- Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto:
Arithmetic Operators for Pairing-Based Cryptography. 91 - R. Wm. Gosper, Rich Schroeppel:
Somos Sequence Near-Addition Formulas and Modular Theta Functions. 96 - Lilya Budaghyan, Claude Carlet:
Classes of Quadratic APN Trinomials and Hexanomials and Related Structures. 98 - Jaime Gutierrez, Álvar Ibeas:
Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits. 99 - Shengbao Wang, Zhenfu Cao:
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications. 100 - Yu Sasaki, Go Yamamoto, Kazumaro Aoki:
Practical Password Recovery on an MD5 Challenge and Response. 101 - Ran Canetti, Ling Cheung, Nancy A. Lynch, Olivier Pereira:
On the Role of Scheduling in Simulation-Based Security. 102 - Roberto Avanzi:
Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic. 103 - Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel:
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. 104 - Masao Kasahara:
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA. 106 - Yasuyuki Murakami, Takeshi Nasako:
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem. 107 - Qingsong Ye, Huaxiong Wang, Christophe Tartary:
Privacy-Preserving Distributed Set Intersection. 111 - Koh-ichi Nagao:
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field. 112 - Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-based Deniable Authentication Protocol on Pairings. 113 - Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire:
Quadratic Almost Perfect Nonlinear Functions With Many Terms. 115 - Sihem Mesnager:
Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity. 117 - Alexander W. Dent, Benoît Libert, Kenneth G. Paterson:
Certificateless Encryption Schemes Strongly Secure in the Standard Model. 121 - Qiang Tang:
On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan. 122 - Berkant Ustaoglu:
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. 123 - Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. 125 - Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. 127 - Cameron McDonald, Chris Charnes, Josef Pieprzyk:
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem. 129 - Yuan Tian, Zhi-Yu Chen, Yuee Jin, Feng Jin, Huihui Ma:
Some Results on Anonymity in Hybrid Encryption. 130 - Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini:
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions. 131 - Osman Kocar:
Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift. 134 - Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang:
Efficient ID-based Signature Without Trusted PKG. 135 - (Withdrawn) Fair Exchange Signature Schemes. 136