Technical Reports
2006 Technical Reports

B. Ansari and M. Anwar Hasan
High Performance Architecture of Elliptic Curve Scalar Multiplication
pdf
CACR 200601

H. Fan and M. Anwar Hasan
A New Approach to Subquadratic Space Complexity Parallel Multipliers
for Extended Binary Fields
pdf
CACR 200602

I. Dechene
Arithmetic of Generalized Jacobians
pdf
CACR 200603

K. Hoeper and G. Gong
Bootstrapping Security in Mobile Ad Hoc Networks Using IdentityBased
Schemes with Key Revocation
pdf
CACR 200604

G. Gong
Design of Signal Sets with Low Intraference for CDMA Applications in
Networking Environment
pdf
CACR 200605

G. Gong, S. Golomb and H. Song
A Note on Low Correlation Zone Signal Sets
pdf
CACR 200606

R. Avanzi, N. Thériault and Z. Wang
Rethinking Low Genus Hyperelliptic Jacobian Arithmetic over
Binary Fields: Interplay of Field Arithmetic and Explicit Formulae
pdf
CACR 200607

N. Yu and G. Gong
Crosscorrelation Properties of Binary Sequences with Ideal
TwoLevel Autocorrelation
pdf
CACR 200608

Y. Nawaz, G. Gong and K. Gupta
Upper Bounds on Algebraic Immunity of Boolean Power Functions
pdf
CACR 200609

O. Ahmadi and G. Vega
On the Parity of the Number of Irreducible Factors of SelfReciprocal
Polynomials over Finite Fields
pdf
CACR 200610

D. Brown
Conjectured Security of the ANSINIST Elliptic Curve RNG
pdf
CACR 200611

S. BayatSarmadi and M. Anwar Hasan
On Concurrent Detection of Errors in Polynomial Basis Multiplication
pdf
CACR 200612

H. Fan and M. Anwar Hasan
Alternative to the Karatsuba Algorithm for Software Implementation of
GF(2^n) Multiplication
pdf
CACR 200613

R. Oyono
Nonhyperelliptic modular Jacobians of dimension 3
pdf
CACR 200614

J. Hinek and D. Stinson
An inequality about factors of multivariate polynomials
pdf
CACR 200615

J. Hinek
On the security of multiprime RSA
pdf
CACR 200616

D. Stinson
Unconditionally secure chaffing and winnowing with short
authentication tags
pdf
CACR 200617

D. Stinson and R. Wei
Some results on query processes and reconstruction functions for
unconditionally secure 2server 1round binary private information
retrieval protocols
pdf
CACR 200618

N. Koblitz and A. Menezes
Another look at "provable security". II
pdf
CACR 200619

N. Koblitz and A. Menezes
Another look at generic groups
pdf
CACR 200620

O. Ahmadi, D. Hankerson and A. Menezes
Formulas for cube roots in F_{3m}
pdf
CACR 200621

N. Ebeid and M. Anwar Hasan
$\tau$adic representations of integers
pdf
CACR 200622

J. Chung and M. Anwar Hasan
Montgomery reduction algorithm for modular multiplication using
lowweight polynomial form integers
pdf
CACR 200623

J. Chung and M. Anwar Hasan
Asymmetric squaring formulae
pdf
CACR 200624

K. Gupta and P. Sarkar
Computing partial Walsh transform from the algebraic normal form
of a Boolean function
ps
CACR 200625

H. Fan and M. Anwar Hasan
Subquadratic multiplication using optimal normal bases
pdf
CACR 200626

U. Hengartner
Enhancing user privacy in locationbased services
pdf
CACR 200627

N. Yu and G. Gong
On asymptotic optimality of binary sequence families
pdf
CACR 200628

N. Yu and G. Gong
New binary sequences with optimal autocorrelation magnitude
pdf
CACR 200629

A. Mashatan and D. Stinson
Noninteractive twochannel message authentication based on
hybridcollision resistant hash functions
pdf
CACR 200630

S. BayatSaramdi and M. Anwar Hasan
Concurrent error detection in polynomial basis multiplication
using linear codes
pdf
CACR 200631

H. Fan and M. Anwar Hasan
Comments on Montgomery's "Five, six and seventerm Karatsubalike
formulae"
pdf
CACR 200632

K. Gupta, Y. Nawaz and G. Gong
Upper bound for algebraic immunity on a subclass of Maiorana
McFarland class of Bent functions
ps
CACR 200633

Y. Nawaz, K. Gupta and G. Gong
Algebraic immunity of Sboxes based on power mappings: Analysis
and construction
pdf
CACR 200634

I. Déchène
On the security of generalized Jacobian cryptosystems
pdf
CACR 200635

D. Chang, K. Gupta and M. Nandi
RC4hash: A new hash function based on RC4
pdf
CACR 200636

D. Stinson and J. Wu
An efficient and secure twoflow zeroknowledge identification protocol
pdf
CACR 200637

X. Fan, T. Wollinger and G. Gong
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems
pdf
CACR 200638

C. Eagle, M. Omar, D. Panario and B. Richmond
Averagecase analysis of two revocation schemes for stateless receivers
pdf
CACR 200639

I. Goldberg
Improving the Robustness of Private Information Retrieval
pdf
CACR 200640

A. DominguezOviedo and M. Anwar Hasan
Improved ErrorDetection and FaultTolerance in ECSM Using
Input Randomization
pdf
CACR 200641
