Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2008.bht:"
@article{DBLP:journals/iacr/AbdallaBN08, author = {Michel Abdalla and Mihir Bellare and Gregory Neven}, title = {Robust Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2008}, url = {http://eprint.iacr.org/2008/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeKO08, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, title = {Chosen Ciphertext Security with Optimal Ciphertext Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2008}, url = {http://eprint.iacr.org/2008/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdidaN08, author = {Ben Adida and C. Andrew Neff}, title = {Efficient Receipt-Free Ballot Casting Resistant to Covert Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2008}, url = {http://eprint.iacr.org/2008/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdidaN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdikariDI08, author = {Jithra Adikari and Vassil S. Dimitrov and Laurent Imbert}, title = {Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2008}, url = {http://eprint.iacr.org/2008/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdikariDI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdikariDM08, author = {Jithra Adikari and Vassil S. Dimitrov and Pradeep Kumar Mishra}, title = {Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2008}, url = {http://eprint.iacr.org/2008/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdikariDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalM08, author = {Divesh Aggarwal and Ueli Maurer}, title = {Breaking {RSA} Generically is Equivalent to Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2008}, url = {http://eprint.iacr.org/2008/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkKS08, author = {Murat Ak and Kamer Kaya and Ali Aydin Sel{\c{c}}uk}, title = {Optimal Subset-Difference Broadcast Encryption with Free Riders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2008}, url = {http://eprint.iacr.org/2008/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtC08, author = {Martin R. Albrecht and Carlos Cid}, title = {Algebraic Techniques in Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2008}, url = {http://eprint.iacr.org/2008/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliH08, author = {Kashif Ali and Howard M. Heys}, title = {Results from a Search for the Best Linear Approximation of a Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2008}, url = {http://eprint.iacr.org/2008/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AltmannJR08, author = {Kristina Altmann and Tibor Jager and Andy Rupp}, title = {On Black-Box Ring Extraction and Integer Factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2008}, url = {http://eprint.iacr.org/2008/156}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AltmannJR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenP08, author = {Jo{\"{e}}l Alwen and Chris Peikert}, title = {Generating Shorter Bases for Hard Random Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2008}, url = {http://eprint.iacr.org/2008/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmirBO08, author = {Yair Amir and Paul Bunn and Rafail Ostrovsky}, title = {Authenticated Adversarial Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2008}, url = {http://eprint.iacr.org/2008/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmirBO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Anderson08, author = {W. Erik Anderson}, title = {On the Secure Obfuscation of Deterministic Finite Automata}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2008}, url = {http://eprint.iacr.org/2008/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Anderson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AraujoR08, author = {Roberto Ara{\'{u}}jo and Peter Y. A. Ryan}, title = {Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2008}, url = {http://eprint.iacr.org/2008/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AraujoR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtS08, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi}, title = {A New Approach for Algebraically Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2008}, url = {http://eprint.iacr.org/2008/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtalayKK08, author = {Adem Atalay and Orhun Kara and Ferhat Karako{\c{c}}}, title = {Improved Cryptanalysis of {SHAMATA-BC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2008}, url = {http://eprint.iacr.org/2008/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtalayKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBH08, author = {Giuseppe Ateniese and Karyn Benson and Susan Hohenberger}, title = {Key-Private Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2008}, url = {http://eprint.iacr.org/2008/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AteniesePMT08, author = {Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik}, title = {Scalable and Efficient Provable Data Possession}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2008}, url = {http://eprint.iacr.org/2008/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AteniesePMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuSM08, author = {Man Ho Au and Willy Susilo and Yi Mu}, title = {Constant-Size Dynamic k-TAA}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2008}, url = {http://eprint.iacr.org/2008/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonBMNP08, author = {Jean{-}Philippe Aumasson and Eric Brier and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Inside the Hypercube}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2008}, url = {http://eprint.iacr.org/2008/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonBMNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonMM08, author = {Jean{-}Philippe Aumasson and Willi Meier and Florian Mendel}, title = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2008}, url = {http://eprint.iacr.org/2008/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziHP08, author = {Roberto Maria Avanzi and Clemens Heuberger and Helmut Prodinger}, title = {Redundant tau-adic Expansions {I:} Non-Adjacent Digit Sets and their Applications to Scalar Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2008}, url = {http://eprint.iacr.org/2008/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvoineT08, author = {Gildas Avoine and Aslan Tchamkerten}, title = {An asymptotically optimal {RFID} protocol against relay attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2008}, url = {http://eprint.iacr.org/2008/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvoineT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesK08, author = {Michael Backes and Boris K{\"{o}}pf}, title = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2008}, url = {http://eprint.iacr.org/2008/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesU08, author = {Michael Backes and Dominique Unruh}, title = {Computational soundness of symbolic zero-knowledge proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2008}, url = {http://eprint.iacr.org/2008/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSLZ08, author = {Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou}, title = {A New Variant of the Cramer-Shoup {KEM} Secure against Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2008}, url = {http://eprint.iacr.org/2008/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheriNS08, author = {Nasour Bagheri and Majid Naderi and Babak Sadeghiyan}, title = {Cryptanalysis of {CRUSH} hash structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2008}, url = {http://eprint.iacr.org/2008/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheriNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BangerterCKS008, author = {Endre Bangerter and Jan Camenisch and Stephan Krenn and Ahmad{-}Reza Sadeghi and Thomas Schneider}, title = {Automatic Generation of Sound Zero-Knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2008}, url = {http://eprint.iacr.org/2008/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BangerterCKS008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakM08, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Merkle Puzzles are Optimal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2008}, url = {http://eprint.iacr.org/2008/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakM08a, author = {Boaz Barak and Mohammad Mahmoody{-}Ghidary}, title = {Lower Bounds on Signatures From Symmetric Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2008}, url = {http://eprint.iacr.org/2008/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakM08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakW08, author = {Boaz Barak and Avi Wigderson}, title = {Public Key Cryptography from Different Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2008}, url = {http://eprint.iacr.org/2008/335}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaCBS08, author = {Manuel Barbosa and St{\'{e}}phane Cauchie and Thierry Brouard and Sim{\~{a}}o Melo de Sousa}, title = {Secure Biometric Authentication With Improved Accuracy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2008}, url = {http://eprint.iacr.org/2008/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaCBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaF08, author = {Manuel Barbosa and Pooya Farshim}, title = {Certificateless Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2008}, url = {http://eprint.iacr.org/2008/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckT08, author = {Martin Beck and Erik Tews}, title = {Practical attacks against {WEP} and {WPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2008}, url = {http://eprint.iacr.org/2008/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beerliova-TrubiniovaHN08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt and Jesper Buus Nielsen}, title = {Almost-Asynchronous {MPC} with Faulty Minority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2008}, url = {http://eprint.iacr.org/2008/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaHN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeldingBEL08, author = {Juliana Belding and Reinier Br{\"{o}}ker and Andreas Enge and Kristin E. Lauter}, title = {Computing Hilbert Class Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2008}, url = {http://eprint.iacr.org/2008/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeldingBEL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Belenkiy08, author = {Mira Belenkiy}, title = {Disjunctive Multi-Level Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2008}, url = {http://eprint.iacr.org/2008/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Belenkiy08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelenkiyCCKLS08, author = {Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham}, title = {Delegatable Anonymous Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2008}, url = {http://eprint.iacr.org/2008/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelenkiyCCKLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareFOR08, author = {Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart}, title = {Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2008}, url = {http://eprint.iacr.org/2008/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareFOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareR08, author = {Mihir Bellare and Todor Ristov}, title = {A Characterization of Chameleon Hash Functions and New, Efficient Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2008}, url = {http://eprint.iacr.org/2008/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BengerCF08, author = {Naomi Benger and Manuel Charlemagne and David Mandell Freeman}, title = {On the security of pairing-friendly Abelian varieties over non-prime fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2008}, url = {http://eprint.iacr.org/2008/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BengerCF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenjumeaCLY08, author = {Vicente Benjumea and Seung Geol Choi and Javier L{\'{o}}pez and Moti Yung}, title = {Fair Traceable Multi-Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2008}, url = {http://eprint.iacr.org/2008/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenjumeaCLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerbainGS08, author = {C{\^{o}}me Berbain and Aline Gouget and Herv{\'{e}} Sibert}, title = {Understanding Phase Shifting Equivalent Keys and Exhaustive Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2008}, url = {http://eprint.iacr.org/2008/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerbainGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBJLP08, author = {Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters}, title = {Twisted Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2008}, url = {http://eprint.iacr.org/2008/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBJLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBLP08, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {{ECM} using Edwards curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2008}, url = {http://eprint.iacr.org/2008/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCLY08, author = {Daniel J. Bernstein and Tien{-}Ren Chen and Chen{-}Mou Cheng and Tanja Lange and Bo{-}Yin Yang}, title = {{ECM} on Graphics Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2008}, url = {http://eprint.iacr.org/2008/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLF08, author = {Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi}, title = {Binary Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2008}, url = {http://eprint.iacr.org/2008/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP08, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Attacking and defending the McEliece cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2008}, url = {http://eprint.iacr.org/2008/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinS08, author = {Daniel J. Bernstein and Peter Schwabe}, title = {New {AES} software speed records}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2008}, url = {http://eprint.iacr.org/2008/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDOR08, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {A Comparison Between Hardware Accelerators for the Modified Tate Pairing over F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\) and F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2008}, url = {http://eprint.iacr.org/2008/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDOR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2008}, url = {http://eprint.iacr.org/2008/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaskarCLMVY08, author = {Raghav Bhaskar and K. Chandrasekaran and Satyanarayana V. Lokam and Peter L. Montgomery and Ramarathnam Venkatesan and Yacov Yacobi}, title = {On The Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2008}, url = {http://eprint.iacr.org/2008/525}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaskarCLMVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bicakci08, author = {Kemal Bicakci}, title = {Optimal Discretization for High-Entropy Graphical Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2008}, url = {http://eprint.iacr.org/2008/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bicakci08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Billings08, author = {Christopher Billings}, title = {The Enigmatique Toolkit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2008}, url = {http://eprint.iacr.org/2008/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Billings08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BissonS08, author = {Gaetan Bisson and Takakazu Satoh}, title = {More Discriminants with the Brezing-Weng Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2008}, url = {http://eprint.iacr.org/2008/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BissonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blackburn08, author = {Simon R. Blackburn}, title = {Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete Logarithm Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2008}, url = {http://eprint.iacr.org/2008/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blackburn08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassKMNS08, author = {Erik{-}Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa}, title = {The F\({}_{\mbox{f}}\)-Family of Protocols for RFID-Privacy and Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2008}, url = {http://eprint.iacr.org/2008/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassKMNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovERW08, author = {Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf}, title = {Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2008}, url = {http://eprint.iacr.org/2008/349}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovERW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovLW08, author = {Dan Bogdanov and Sven Laur and Jan Willemson}, title = {Sharemind: a framework for fast privacy-preserving computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2008}, url = {http://eprint.iacr.org/2008/289}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogetoftCDGJKNNNPST08, author = {Peter Bogetoft and Dan Lund Christensen and Ivan Damg{\aa}rd and Martin Geisler and Thomas P. Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael I. Schwartzbach and Tomas Toft}, title = {Multiparty Computation Goes Live}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2008}, url = {http://eprint.iacr.org/2008/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogetoftCDGJKNNNPST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaFO08, author = {Alexandra Boldyreva and Serge Fehr and Adam O'Neill}, title = {On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2008}, url = {http://eprint.iacr.org/2008/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaFO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehFKW08, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2008}, url = {http://eprint.iacr.org/2008/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehFKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersJO08, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, title = {Proofs of Retrievability: Theory and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2008}, url = {http://eprint.iacr.org/2008/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersJO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersJO08a, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, title = {{HAIL:} {A} High-Availability and Integrity Layer for Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2008}, url = {http://eprint.iacr.org/2008/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersJO08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydCNP08, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, title = {Efficient One-round Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2008}, url = {http://eprint.iacr.org/2008/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrickellCL08, author = {Ernie Brickell and Liqun Chen and Jiangtao Li}, title = {Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2008}, url = {http://eprint.iacr.org/2008/104}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrickellCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerC08, author = {Julien Bringer and Herv{\'{e}} Chabanne}, title = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2008}, url = {http://eprint.iacr.org/2008/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCI08, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, title = {Identification and Privacy: Zero-Knowledge is not Enough}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2008}, url = {http://eprint.iacr.org/2008/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadbentT08, author = {Anne Broadbent and Alain Tapp}, title = {Information-Theoretically Secure Voting Without an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2008}, url = {http://eprint.iacr.org/2008/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadbentT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrokerL08, author = {Reinier Br{\"{o}}ker and Kristin E. Lauter}, title = {Modular polynomials for genus 2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2008}, url = {http://eprint.iacr.org/2008/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrokerL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown08, author = {Daniel R. L. Brown}, title = {The Encrypted Elliptic Curve Hash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2008}, url = {http://eprint.iacr.org/2008/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown08a, author = {Daniel R. L. Brown}, title = {Toy Factoring by Newton's Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2008}, url = {http://eprint.iacr.org/2008/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown08b, author = {Daniel R. L. Brown}, title = {User-Sure-and-Safe Key Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2008}, url = {http://eprint.iacr.org/2008/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown08c, author = {Daniel R. L. Brown}, title = {One-Up Problem for {(EC)DSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2008}, url = {http://eprint.iacr.org/2008/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruekersKKT08, author = {Fons Bruekers and Stefan Katzenbeisser and Klaus Kursawe and Pim Tuyls}, title = {Privacy-Preserving Matching of {DNA} Profiles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2008}, url = {http://eprint.iacr.org/2008/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruekersKKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannL08, author = {Johannes Buchmann and Richard Lindner}, title = {Secure Parameters for {SWIFFT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2008}, url = {http://eprint.iacr.org/2008/493}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannLR008, author = {Johannes Buchmann and Richard Lindner and Markus R{\"{u}}ckert and Michael Schneider}, title = {Explicit hard instances of the shortest vector problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2008}, url = {http://eprint.iacr.org/2008/333}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannLR008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BulyginB08, author = {Stanislav Bulygin and Michael Brickenstein}, title = {Obtaining and solving systems of equations in key variables only for the small variants of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2008}, url = {http://eprint.iacr.org/2008/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BulyginB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurmesterST08, author = {Mike Burmester and Reihaneh Safavi{-}Naini and Gelareh Taban}, title = {Secure Random Key Pre-Distribution Against Semi-Honest Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2008}, url = {http://eprint.iacr.org/2008/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurmesterST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischCS08, author = {Jan Camenisch and Nishanth Chandran and Victor Shoup}, title = {A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2008}, url = {http://eprint.iacr.org/2008/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischKS08, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2008}, url = {http://eprint.iacr.org/2008/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischNS08, author = {Jan Camenisch and Gregory Neven and Abhi Shelat}, title = {Simulatable Adaptive Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2008}, url = {http://eprint.iacr.org/2008/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCKLP08, author = {Ran Canetti and Ling Cheung and Dilsun Kirli Kaynar and Nancy A. Lynch and Olivier Pereira}, title = {Modeling Computational Security in Long-Lived Systems, Version 2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2008}, url = {http://eprint.iacr.org/2008/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCKLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiEGL08, author = {Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah{-}Yoh Lim}, title = {How to Protect Yourself without Perfect Shredding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2008}, url = {http://eprint.iacr.org/2008/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiEGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiV08, author = {Ran Canetti and Mayank Varia}, title = {Non-Malleable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2008}, url = {http://eprint.iacr.org/2008/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao08, author = {Zhengjun Cao}, title = {How to Launch {A} Birthday Attack Against {DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2008}, url = {http://eprint.iacr.org/2008/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletF08, author = {Claude Carlet and Keqin Feng}, title = {New balanced Boolean functions satisfying all the main cryptographic criteria}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2008}, url = {http://eprint.iacr.org/2008/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarrijoTIN08, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento}, title = {A Novel Probabilistic Passive Attack on the Protocols {HB} and {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2008}, url = {http://eprint.iacr.org/2008/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarrijoTIN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashKS08, author = {David Cash and Eike Kiltz and Victor Shoup}, title = {The Twin Diffie-Hellman Problem and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2008}, url = {http://eprint.iacr.org/2008/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastryckGF08, author = {Wouter Castryck and Steven D. Galbraith and Reza Rezaeian Farashahi}, title = {Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2008}, url = {http://eprint.iacr.org/2008/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastryckGF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cesena08, author = {Emanuele Cesena}, title = {Pairing with Supersingular Trace Zero Varieties Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2008}, url = {http://eprint.iacr.org/2008/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cesena08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranOS08, author = {Nishanth Chandran and Rafail Ostrovsky and William E. Skeith III}, title = {Public-Key Encryption with Efficient Amortized Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2008}, url = {http://eprint.iacr.org/2008/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranOS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangHSL08, author = {Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee}, title = {Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2008}, url = {http://eprint.iacr.org/2008/460}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangHSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangN08, author = {Donghoon Chang and Mridul Nandi}, title = {A Short Proof of the {PRP/PRF} Switching Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2008}, url = {http://eprint.iacr.org/2008/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangSHL08, author = {Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee}, title = {Improved Cryptanalysis of {APOP-MD4} and {NMAC-MD4} using New Differential Paths}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2008}, url = {http://eprint.iacr.org/2008/048}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangSHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangSHL08a, author = {Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee}, title = {Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2008}, url = {http://eprint.iacr.org/2008/407}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangSHL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangX08, author = {Ee{-}Chien Chang and Jia Xu}, title = {Remote Integrity Check with Dishonest Storage Server}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2008}, url = {http://eprint.iacr.org/2008/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChardinM08, author = {Thomas Chardin and Rapha{\"{e}}l Marinier}, title = {Cryptanalysis of the Improved Cellular Message Encryption Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2008}, url = {http://eprint.iacr.org/2008/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChardinM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCCCDKLY08, author = {Anna Inn{-}Tung Chen and Ming{-}Shing Chen and Tien{-}Ren Chen and Chen{-}Mou Cheng and Jintai Ding and Eric Li{-}Hsiang Kuo and Frost Li and Bo{-}Yin Yang}, title = {Small Odd Prime Field Multivariate PKCs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2008}, url = {http://eprint.iacr.org/2008/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCCCDKLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCDWY08, author = {Chia{-}Hsin Owen Chen and Ming{-}Shing Chen and Jintai Ding and Fabian Werner and Bo{-}Yin Yang}, title = {Odd-Char Multivariate Hidden Field Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2008}, url = {http://eprint.iacr.org/2008/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCDWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHC08, author = {Yalin Chen and Chun{-}Hui Huang and Jue{-}Sam Chou}, title = {Comments on two multi-server authentication protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2008}, url = {http://eprint.iacr.org/2008/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenM08, author = {Liqun Chen and Chris J. Mitchell}, title = {Parsing ambiguities in authentication and key establishment protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2008}, url = {http://eprint.iacr.org/2008/419}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMS08, author = {Zhimin Chen and Sergey Morozov and Patrick Schaumont}, title = {A Hardware Interface for Hashing Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2008}, url = {http://eprint.iacr.org/2008/529}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenSHC08, author = {Yalin Chen and Hung{-}Min Sun and Chun{-}Hui Huang and Jue{-}Sam Chou}, title = {Comments on two password based protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2008}, url = {http://eprint.iacr.org/2008/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenSHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheongK08, author = {Kai{-}Yuen Cheong and Takeshi Koshiba}, title = {Reducing Complexity Assumptions for Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2008}, url = {http://eprint.iacr.org/2008/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheongK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesNS08, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Jacques Stern}, title = {Linear Bandwidth Naccache-Stern Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2008}, url = {http://eprint.iacr.org/2008/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowRR08, author = {Sherman S. M. Chow and Volker Roth and Eleanor Gilbert Rieffel}, title = {General Certificateless Encryption and Timed-Release Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2008}, url = {http://eprint.iacr.org/2008/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoyK08, author = {Jiali Choy and Khoongming Khoo}, title = {New Applications of Differential Bounds of the {SDS} Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2008}, url = {http://eprint.iacr.org/2008/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoyK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CookYK08, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2008}, url = {http://eprint.iacr.org/2008/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CookYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronPS08, author = {Jean{-}S{\'{e}}bastien Coron and Jacques Patarin and Yannick Seurin}, title = {The Random Oracle Model and the Ideal Cipher Model are Equivalent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2008}, url = {http://eprint.iacr.org/2008/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cortez-DuarteRBO08, author = {Nidia Cortez{-}Duarte and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Jean{-}Luc Beuchat and Eiji Okamoto}, title = {A Pipelined Karatsuba-Ofman Multiplier over GF(3\({}^{\mbox{97}}\)) Amenable for Pairing Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2008}, url = {http://eprint.iacr.org/2008/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cortez-DuarteRBO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoullGH08, author = {Scott E. Coull and Matthew Green and Susan Hohenberger}, title = {Access Controls for Oblivious and Anonymous Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2008}, url = {http://eprint.iacr.org/2008/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoullGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisNO08, author = {Nicolas T. Courtois and Karsten Nohl and Sean O'Neil}, title = {Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2008}, url = {http://eprint.iacr.org/2008/166}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisNO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDFPW08, author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr{\'{o}} and Daniel Wichs}, title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2008}, url = {http://eprint.iacr.org/2008/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDFPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cremers08, author = {Cas J. F. Cremers}, title = {Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the {NAXOS} Authenticated Key Exchange protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2008}, url = {http://eprint.iacr.org/2008/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cremers08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DArcoS08, author = {Paolo D'Arco and Alfredo De Santis}, title = {From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2008}, url = {http://eprint.iacr.org/2008/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DArcoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGK08, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {A correction to "Efficient and Secure Comparison for On-Line Auctions"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2008}, url = {http://eprint.iacr.org/2008/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGKN08, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard and Jesper Buus Nielsen}, title = {Asynchronous Multiparty Computation: Theory and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2008}, url = {http://eprint.iacr.org/2008/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNO08, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Claudio Orlandi}, title = {Essentially Optimal Universally Composable Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2008}, url = {http://eprint.iacr.org/2008/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT08, author = {Ivan Damg{\aa}rd and Rune Thorbek}, title = {Efficient Conversion of Secret-shared Values Between Different Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2008}, url = {http://eprint.iacr.org/2008/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT08a, author = {Ivan Damg{\aa}rd and Nikos Triandopoulos}, title = {Supporting Non-membership Proofs with Bilinear-map Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2008}, url = {http://eprint.iacr.org/2008/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisG08, author = {George Danezis and Ian Goldberg}, title = {Sphinx: {A} Compact and Provably Secure Mix Format}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2008}, url = {http://eprint.iacr.org/2008/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHMR08, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {Extended Access Structures and Their Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2008}, url = {http://eprint.iacr.org/2008/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHS08, author = {Vanesa Daza and Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {Flaws in Some Self-Healing Key Distribution Schemes with Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2008}, url = {http://eprint.iacr.org/2008/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Deng08, author = {Yi Deng}, title = {Resettably-Sound Resettable Zero Knowledge Arguments for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2008}, url = {http://eprint.iacr.org/2008/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Deng08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeursenR08, author = {Ton van Deursen and Sasa Radomirovic}, title = {Attacks on {RFID} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2008}, url = {http://eprint.iacr.org/2008/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeursenR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeursenR08a, author = {Ton van Deursen and Sasa Radomirovic}, title = {On a New Formal Proof Model for {RFID} Location Privacy (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2008}, url = {http://eprint.iacr.org/2008/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeursenR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeusajuteB08, author = {Alexandre M. Deusajute and Paulo S. L. M. Barreto}, title = {The {SIP} Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2008}, url = {http://eprint.iacr.org/2008/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeusajuteB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DichtlMS08, author = {Markus Dichtl and Bernd Meyer and Hermann Seuschek}, title = {{SPICE} Simulation of a "Provably Secure" True Random Number Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2008}, url = {http://eprint.iacr.org/2008/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DichtlMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiffieL08, author = {Whitfield Diffie and George Ledin}, title = {{SMS4} Encryption Algorithm for Wireless Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2008}, url = {http://eprint.iacr.org/2008/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiffieL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingYCCC08, author = {Jintai Ding and Bo{-}Yin Yang and Chia{-}Hsin Owen Chen and Ming{-}Shing Chen and Chen{-}Mou Cheng}, title = {New Differential-Algebraic Attacks and Reparametrization of Rainbow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2008}, url = {http://eprint.iacr.org/2008/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingYCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurS08, author = {Itai Dinur and Adi Shamir}, title = {Cube Attacks on Tweakable Black Box Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2008}, url = {http://eprint.iacr.org/2008/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DocheKS08, author = {Christophe Doche and David R. Kohel and Francesco Sica}, title = {Double-Base Number System for Multi-Scalar Multiplications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2008}, url = {http://eprint.iacr.org/2008/388}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DocheKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisW08, author = {Yevgeniy Dodis and Daniel Wichs}, title = {Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2008}, url = {http://eprint.iacr.org/2008/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyGMN08, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {Oblivious Transfer based on the McEliece Assumptions\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2008}, url = {http://eprint.iacr.org/2008/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyGMN08a, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {On the Composability of Statistically Secure Bit Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2008}, url = {http://eprint.iacr.org/2008/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyMN08, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {A {CCA2} Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2008}, url = {http://eprint.iacr.org/2008/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuW08, author = {Hongzhen Du and Qiaoyan Wen}, title = {Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2008}, url = {http://eprint.iacr.org/2008/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dujella08, author = {Andrej Dujella}, title = {A variant of Wiener's attack on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2008}, url = {http://eprint.iacr.org/2008/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dujella08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanK08, author = {Orr Dunkelman and Nathan Keller}, title = {Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2008}, url = {http://eprint.iacr.org/2008/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaM08, author = {Saurabh Dutta and Jyotsna Kumar Mandal}, title = {An Approach to ensure Information Security through 252-Bit Integrated Encryption System {(IES)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2008}, url = {http://eprint.iacr.org/2008/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuttaM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiP08, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Leakage-Resilient Cryptography in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2008}, url = {http://eprint.iacr.org/2008/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EdelP08, author = {Yves Edel and Alexander Pott}, title = {A new almost perfect nonlinear function which is not quadratic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2008}, url = {http://eprint.iacr.org/2008/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EdelP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisenbarthKMPSS08, author = {Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, title = {Physical Cryptanalysis of KeeLoq Code Hopping Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2008}, url = {http://eprint.iacr.org/2008/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EisenbarthKMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/El-HadedyGK08, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein J. Knapskog}, title = {High Performance Implementation of a Public Key Block Cipher - MQQ, for {FPGA} Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2008}, url = {http://eprint.iacr.org/2008/339}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/El-HadedyGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkamchouchiA08, author = {Hassan M. Elkamchouchi and Yasmine Abouelseoud}, title = {A New Blind Identity-Based Signature Scheme with Message Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2008}, url = {http://eprint.iacr.org/2008/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkamchouchiA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkamchouchiA08a, author = {Hassan M. Elkamchouchi and Yasmine Abouelseoud}, title = {A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2008}, url = {http://eprint.iacr.org/2008/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkamchouchiA08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErwayKPT08, author = {C. Christopher Erway and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Charalampos Papamanthou and Roberto Tamassia}, title = {Dynamic Provable Data Possession}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2008}, url = {http://eprint.iacr.org/2008/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ErwayKPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Evain08, author = {Laurent Evain}, title = {Knapsack cryptosystems built on NP-hard instances}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2008}, url = {http://eprint.iacr.org/2008/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Evain08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FangC08, author = {Chengfang Fang and Ee{-}Chien Chang}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2008}, url = {http://eprint.iacr.org/2008/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FangWRXB08, author = {Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian}, title = {Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without {ROM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2008}, url = {http://eprint.iacr.org/2008/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FangWRXB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FangX08, author = {Liming Fang and Jinyue Xia}, title = {Full Security: Fuzzy Identity Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2008}, url = {http://eprint.iacr.org/2008/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FangX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaugereP08, author = {Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, title = {Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2008}, url = {http://eprint.iacr.org/2008/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaugereP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fedyukovych08, author = {Vadym Fedyukovych}, title = {A strategy for any {DAA} Issuer and an additional verification by a Host}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2008}, url = {http://eprint.iacr.org/2008/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fedyukovych08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fedyukovych08a, author = {Vadym Fedyukovych}, title = {An argument for rank metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2008}, url = {http://eprint.iacr.org/2008/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fedyukovych08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fedyukovych08b, author = {Vadym Fedyukovych}, title = {Argument of knowledge of a bounded error}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2008}, url = {http://eprint.iacr.org/2008/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fedyukovych08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fedyukovych08c, author = {Vadym Fedyukovych}, title = {An argument for Hamiltonicity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2008}, url = {http://eprint.iacr.org/2008/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fedyukovych08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FedyukovychS08, author = {Vadym Fedyukovych and Vitaliy Sharapov}, title = {A protocol for K-multiple substring matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2008}, url = {http://eprint.iacr.org/2008/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FedyukovychS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerraraGHP08, author = {Anna Lisa Ferrara and Matthew Green and Susan Hohenberger and Michael {\O}stergaard Pedersen}, title = {Practical Short Signature Batch Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2008}, url = {http://eprint.iacr.org/2008/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerraraGHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziN08, author = {Matthias Fitzi and Jesper Buus Nielsen}, title = {On the Number of Synchronous Rounds Required for Byzantine Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2008}, url = {http://eprint.iacr.org/2008/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischmannFG08, author = {Ewan Fleischmann and Christian Forler and Michael Gorski}, title = {Classification of the {SHA-3} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2008}, url = {http://eprint.iacr.org/2008/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischmannFG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischmannG08, author = {Ewan Fleischmann and Michael Gorski}, title = {Some Observations on {SHAMATA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2008}, url = {http://eprint.iacr.org/2008/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischmannG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer08, author = {Scott R. Fluhrer}, title = {Collision Attack on the Waterfall Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2008}, url = {http://eprint.iacr.org/2008/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Freeman08, author = {David Freeman}, title = {A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2008}, url = {http://eprint.iacr.org/2008/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Freeman08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreemanSS08, author = {David Mandell Freeman and Peter Stevenhagen and Marco Streng}, title = {Abelian varieties with prescribed embedding degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2008}, url = {http://eprint.iacr.org/2008/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FreemanSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuLQL08, author = {Shaojing Fu and Chao Li and Longjiang Qu and Ping Li}, title = {Enumeration of Balanced Symmetric Functions over GF(p)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2008}, url = {http://eprint.iacr.org/2008/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuLQL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerKN08, author = {Georg Fuchsbauer and Jonathan Katz and David Naccache}, title = {Efficient Rational Secret Sharing in Standard Communication Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2008}, url = {http://eprint.iacr.org/2008/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerP08, author = {Georg Fuchsbauer and David Pointcheval}, title = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2008}, url = {http://eprint.iacr.org/2008/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerP08a, author = {Georg Fuchsbauer and David Pointcheval}, title = {Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2008}, url = {http://eprint.iacr.org/2008/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerP08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrP08, author = {Thomas Fuhr and Thomas Peyrin}, title = {Cryptanalysis of RadioGatun}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2008}, url = {http://eprint.iacr.org/2008/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujitaTT08, author = {Ryou Fujita and Kohtaro Tadaki and Shigeo Tsujii}, title = {Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2008}, url = {http://eprint.iacr.org/2008/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujitaTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GajekMPSS08, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad{-}Reza Sadeghi and J{\"{o}}rg Schwenk}, title = {Universally Composable Security Analysis of {TLS} - Secure Sessions with Handshake and Record Layer Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2008}, url = {http://eprint.iacr.org/2008/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GajekMPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHM08, author = {Steven D. Galbraith and Michael Harrison and David J. Mireles Morales}, title = {Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2008}, url = {http://eprint.iacr.org/2008/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithL08, author = {Steven D. Galbraith and Xibin Lin}, title = {Computing Pairings Using x-Coordinates Only}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2008}, url = {http://eprint.iacr.org/2008/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithLM08, author = {Steven D. Galbraith and Xibin Lin and David J. Mireles Morales}, title = {Pairings on hyperelliptic curves with a real model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2008}, url = {http://eprint.iacr.org/2008/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithLS08, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, title = {Endomorphisms for faster elliptic curve cryptography on a large class of curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2008}, url = {http://eprint.iacr.org/2008/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithS08, author = {Steven D. Galbraith and Michael Scott}, title = {Exponentiation in pairing-friendly groups using homomorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2008}, url = {http://eprint.iacr.org/2008/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWXT08, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, title = {Divisible On-line/Off-line Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2008}, url = {http://eprint.iacr.org/2008/447}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaoWXT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKZ08, author = {Juan A. Garay and Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {A Framework for the Sound Specification of Cryptographic Tasks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2008}, url = {http://eprint.iacr.org/2008/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayWZ08, author = {Juan A. Garay and Daniel Wichs and Hong{-}Sheng Zhou}, title = {Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2008}, url = {http://eprint.iacr.org/2008/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaudryL08, author = {Pierrick Gaudry and David Lubicz}, title = {The arithmetic of characteristic 2 Kummer surfaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2008}, url = {http://eprint.iacr.org/2008/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaudryL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GebhardtIS08, author = {Max Gebhardt and Georg Illies and Werner Schindler}, title = {Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2008}, url = {http://eprint.iacr.org/2008/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GebhardtIS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GendrullisNR08, author = {Timo Gendrullis and Martin Novotn{\'{y}} and Andy Rupp}, title = {A Real-World Attack Breaking {A5/1} within Hours}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2008}, url = {http://eprint.iacr.org/2008/147}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GendrullisNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroHKR08, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin}, title = {Threshold {RSA} for Dynamic and Ad-Hoc Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2008}, url = {http://eprint.iacr.org/2008/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroHKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroHKRRW08, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen}, title = {Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2008}, url = {http://eprint.iacr.org/2008/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroHKRRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH08, author = {Craig Gentry and Shai Halevi}, title = {Hierarchical Identity Based Encryption with Polynomially Many Levels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2008}, url = {http://eprint.iacr.org/2008/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryW08, author = {Craig Gentry and Brent Waters}, title = {Adaptive Security in Broadcast Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2008}, url = {http://eprint.iacr.org/2008/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gheorghita08, author = {Marius Oliver Gheorghita}, title = {{HENKOS} Cryptanalysis-Related keys attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2008}, url = {http://eprint.iacr.org/2008/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gheorghita08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, title = {HB{\#}: Increasing the Security and Efficiency of {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2008}, url = {http://eprint.iacr.org/2008/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiMK08, author = {Danilo Gligoroski and Smile Markovski and Svein J. Knapskog}, title = {Public Key Block Cipher Based on Multivariate Quadratic Quasigroups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2008}, url = {http://eprint.iacr.org/2008/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GolebiewskiMZZ08, author = {Zbigniew Golebiewski and Krzysztof Majcher and Filip Zag{\'{o}}rski and Marcin Zawada}, title = {Practical Attacks on {HB} and {HB+} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2008}, url = {http://eprint.iacr.org/2008/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GolebiewskiMZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GolicM08, author = {Jovan Dj. Golic and Guglielmo Morgari}, title = {Iterative Probabilistic Reconstruction of {RC4} Internal States}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2008}, url = {http://eprint.iacr.org/2008/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GolicM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Golle08, author = {Philippe Golle}, title = {Machine Learning Attacks Against the {ASIRRA} {CAPTCHA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2008}, url = {http://eprint.iacr.org/2008/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Golle08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonHKL08, author = {S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell}, title = {Complete Fairness in Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2008}, url = {http://eprint.iacr.org/2008/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonHKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonK08, author = {S. Dov Gordon and Jonathan Katz}, title = {Partial Fairness in Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2008}, url = {http://eprint.iacr.org/2008/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonK08a, author = {S. Dov Gordon and Jonathan Katz}, title = {Complete Fairness in Multi-Party Computation Without an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2008}, url = {http://eprint.iacr.org/2008/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonK08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorskiL08, author = {Michael Gorski and Stefan Lucks}, title = {New Related-Key Boomerang Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2008}, url = {http://eprint.iacr.org/2008/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorskiL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorskiLP08, author = {Michael Gorski and Stefan Lucks and Thomas Peyrin}, title = {Slide Attacks on a Class of Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2008}, url = {http://eprint.iacr.org/2008/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorskiLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalS08, author = {Vipul Goyal and Amit Sahai}, title = {Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2008}, url = {http://eprint.iacr.org/2008/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrabherGP08, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Dan Page}, title = {On Software Parallel Implementation of Cryptographic Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2008}, url = {http://eprint.iacr.org/2008/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrabherGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrasslS08, author = {Markus Grassl and Rainer Steinwandt}, title = {Cryptanalysis of an Authentication Scheme Using Truncated Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2008}, url = {http://eprint.iacr.org/2008/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrasslS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenH08, author = {Matthew Green and Susan Hohenberger}, title = {Universally Composable Adaptive Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2008}, url = {http://eprint.iacr.org/2008/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaGBS08, author = {Anuj Gupta and Prasant Gopal and Piyush Bansal and Kannan Srinathan}, title = {Authenticated Byzantine Generals in Dual Failure Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2008}, url = {http://eprint.iacr.org/2008/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaGBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guttman08, author = {Joshua D. Guttman}, title = {Cryptographic Protocol Composition via the Authentication Tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2008}, url = {http://eprint.iacr.org/2008/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guttman08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerH08, author = {Iftach Haitner and Thomas Holenstein}, title = {On the (Im)Possibility of Key Dependent Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2008}, url = {http://eprint.iacr.org/2008/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviR08, author = {Shai Halevi and Tal Rabin}, title = {Degradation and Amplification of Computational Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2008}, url = {http://eprint.iacr.org/2008/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanGW08, author = {Yiliang Han and Xiaolin Gui and Xu An Wang}, title = {Multi-Recipient Signcryption for Secure Wireless Group Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2008}, url = {http://eprint.iacr.org/2008/253}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaK08, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2008}, url = {http://eprint.iacr.org/2008/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HankersonKM08, author = {Darrel Hankerson and Koray Karabina and Alfred Menezes}, title = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2008}, url = {http://eprint.iacr.org/2008/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HankersonKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Harris08, author = {David G. Harris}, title = {Simultaneous field divisions: an extension of Montgomery's trick}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2008}, url = {http://eprint.iacr.org/2008/199}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Harris08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Harris08a, author = {Sandy Harris}, title = {Exploring Cipherspace: Combining stream ciphers and block ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2008}, url = {http://eprint.iacr.org/2008/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Harris08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HashizumeMC08, author = {Naoki Hashizume and Fumiyuki Momose and Jinhui Chao}, title = {On Implementation of {GHS} Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2008}, url = {http://eprint.iacr.org/2008/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HashizumeMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeningerS08, author = {Nadia Heninger and Hovav Shacham}, title = {Reconstructing {RSA} Private Keys from Random Key Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2008}, url = {http://eprint.iacr.org/2008/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeningerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herranz08, author = {Javier Herranz}, title = {Restricted Adaptive Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2008}, url = {http://eprint.iacr.org/2008/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herranz08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerzbergS08, author = {Amir Herzberg and Haya Schulmann}, title = {Robust Combiners for Software Hardening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2008}, url = {http://eprint.iacr.org/2008/150}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerzbergS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerzbergSSC08, author = {Amir Herzberg and Haya Schulmann and Amitabh Saxena and Bruno Crispo}, title = {Towards a Theory of White-Box Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2008}, url = {http://eprint.iacr.org/2008/087}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerzbergSSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hess08, author = {Florian Hess}, title = {Pairing Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2008}, url = {http://eprint.iacr.org/2008/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hess08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Heuberger08, author = {Clemens Heuberger}, title = {Redundant tau-adic Expansions {II:} Non-Optimality and Chaotic Behaviour}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2008}, url = {http://eprint.iacr.org/2008/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Heuberger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeubergerM08, author = {Clemens Heuberger and James A. Muir}, title = {Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2008}, url = {http://eprint.iacr.org/2008/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeubergerM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HinekJSS08, author = {M. Jason Hinek and Shaoquan Jiang and Reihaneh Safavi{-}Naini and Siamak Fayyaz Shahandashti}, title = {Attribute-Based Encryption with Key Cloning Protection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2008}, url = {http://eprint.iacr.org/2008/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HinekJSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HisilWCD08, author = {H{\"{u}}seyin Hisil and Kenneth Koon{-}Ho Wong and Gary Carter and Ed Dawson}, title = {Twisted Edwards Curves Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2008}, url = {http://eprint.iacr.org/2008/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HisilWCD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HochS08, author = {Jonathan J. Hoch and Adi Shamir}, title = {On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2008}, url = {http://eprint.iacr.org/2008/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HochS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hofheinz08, author = {Dennis Hofheinz}, title = {Possibility and impossibility results for selective decommitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2008}, url = {http://eprint.iacr.org/2008/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hofheinz08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzW08, author = {Dennis Hofheinz and Enav Weinreb}, title = {Searchable encryption with decryption in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2008}, url = {http://eprint.iacr.org/2008/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hong08, author = {Jin Hong}, title = {The Cost of False Alarms in Hellman and Rainbow Tradeoffs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2008}, url = {http://eprint.iacr.org/2008/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hong08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongJKLM08, author = {Jin Hong and Kyung Chul Jeong and Eun Young Kwon and In{-}Sok Lee and Daegun Ma}, title = {Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2008}, url = {http://eprint.iacr.org/2008/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongJKLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hosseini-Khayat08, author = {Saied Hosseini{-}Khayat}, title = {Using Commutative Encryption to Share a Secret}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2008}, url = {http://eprint.iacr.org/2008/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hosseini-Khayat08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangC08, author = {Hai Huang and Zhenfu Cao}, title = {An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2008}, url = {http://eprint.iacr.org/2008/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangC08a, author = {Hai Huang and Zhenfu Cao}, title = {Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2008}, url = {http://eprint.iacr.org/2008/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangC08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IfteneCG08, author = {Sorin Iftene and {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and Manuela Grindei}, title = {Compartmented Threshold {RSA} Based on the Chinese Remainder Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2008}, url = {http://eprint.iacr.org/2008/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IfteneCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IndesteegeMPR08, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, title = {Collisions and other Non-Random Properties for Step-Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2008}, url = {http://eprint.iacr.org/2008/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IndesteegeMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonicaJ08, author = {Sorina Ionica and Antoine Joux}, title = {Another approach to pairing computation in Edwards coordinates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2008}, url = {http://eprint.iacr.org/2008/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonicaJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiPS08, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, title = {Secure Arithmetic Computation with No Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2008}, url = {http://eprint.iacr.org/2008/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IvanovV08, author = {P. Ivanov and Jos{\'{e}} Felipe Voloch}, title = {Breaking the Akiyama-Goto cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2008}, url = {http://eprint.iacr.org/2008/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IvanovV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IzbenkoKK08, author = {Yuriy I. Izbenko and Vladyslav Kovtun and Alexandr Kuznetsov}, title = {The Design of Boolean Functions by Modified Hill Climbing Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2008}, url = {http://eprint.iacr.org/2008/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IzbenkoKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerS08, author = {Tibor Jager and J{\"{o}}rg Schwenk}, title = {The Generic Hardness of Subset Membership Problems under the Factoring Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2008}, url = {http://eprint.iacr.org/2008/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jaiyeola08, author = {Temitope Gbolahan Jaiyeola}, title = {On Middle Universal Weak and Cross Inverse Property Loops with Equal Lenght of Inveres Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2008}, url = {http://eprint.iacr.org/2008/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jaiyeola08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jaiyeola08a, author = {Temitope Gbolahan Jaiyeola}, title = {On Middle Universal m-Inverse Quasigroups and Their Applications to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2008}, url = {http://eprint.iacr.org/2008/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jaiyeola08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaiyeolaA08, author = {Temitope Gbolahan Jaiyeola and John Olushola Adeniran}, title = {On a Cryptographic Identity in Osborn Loops}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2008}, url = {http://eprint.iacr.org/2008/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaiyeolaA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhanwarB08, author = {Mahabir Prasad Jhanwar and Rana Barua}, title = {A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2008}, url = {http://eprint.iacr.org/2008/088}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JhanwarB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaWYX08, author = {Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu}, title = {Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2008}, url = {http://eprint.iacr.org/2008/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaWYX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangCWWD08, author = {Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng}, title = {High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2\({}^{\mbox{m}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2008}, url = {http://eprint.iacr.org/2008/066}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangCWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinWX08, author = {Haimin Jin and Duncan S. Wong and Yinlong Xu}, title = {Complexity Analysis of a Fast Modular Multiexponentiation Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2008}, url = {http://eprint.iacr.org/2008/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinZDW08, author = {Zhengping Jin and Huijuan Zuo and Hongzhen Du and Qiaoyan Wen}, title = {An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2008}, url = {http://eprint.iacr.org/2008/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinZDW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxLNT08, author = {Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom{\'{e}}}, title = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2008}, url = {http://eprint.iacr.org/2008/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxLNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsPP08, author = {Ari Juels and Ravikanth Pappu and Bryan Parno}, title = {Unidirectional Key Distribution Across Time and Space with Applications to {RFID} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2008}, url = {http://eprint.iacr.org/2008/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JungK08, author = {Bae Eun Jung and Hee Jean Kim}, title = {On the Chikazawa-Inoue {ID} based key system}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2008}, url = {http://eprint.iacr.org/2008/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JungK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JunodKL08, author = {Pascal Junod and Alexandre Karlov and Arjen K. Lenstra}, title = {Improving the Boneh-Franklin Traitor Tracing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2008}, url = {http://eprint.iacr.org/2008/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JunodKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiR08, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {An Improved Robust Fuzzy Extractor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2008}, url = {http://eprint.iacr.org/2008/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiR08a, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {Key Agreement from Close Secrets over Unsecured Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2008}, url = {http://eprint.iacr.org/2008/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarglPS08, author = {Anton Kargl and Stefan Pyka and Hermann Seuschek}, title = {Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2008}, url = {http://eprint.iacr.org/2008/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarglPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaruturiGSC08, author = {Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and C. Pandu Rangan}, title = {Foundations of Group Key Management - Framework, Security Model and a Generic Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2008}, url = {http://eprint.iacr.org/2008/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaruturiGSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KateZG08, author = {Aniket Kate and Gregory M. Zaverucha and Ian Goldberg}, title = {Pairing-Based Onion Routing with Improved Forward Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2008}, url = {http://eprint.iacr.org/2008/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KateZG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzL08, author = {Jonathan Katz and Yehuda Lindell}, title = {Collusion-Free Multiparty Computation in the Mediated Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2008}, url = {http://eprint.iacr.org/2008/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawazoeT08, author = {Mitsuru Kawazoe and Tetsuya Takahashi}, title = {Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type y\({}^{\mbox{2}}\)=x\({}^{\mbox{5}}\)+ax}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2008}, url = {http://eprint.iacr.org/2008/026}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawazoeT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KayaS08, author = {Kamer Kaya and Ali Aydin Sel{\c{c}}uk}, title = {Sharing {DSS} by the Chinese Remainder Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2008}, url = {http://eprint.iacr.org/2008/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KayaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ke08, author = {Pinhui Ke}, title = {Improved lower bound on the number of balanced symmetric functions over GF(p)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2008}, url = {http://eprint.iacr.org/2008/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ke08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khader08, author = {Dalia Khader}, title = {Authenticating with Attributes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2008}, url = {http://eprint.iacr.org/2008/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khader08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhatirM08, author = {Mehrdad Khatir and Amir Moradi}, title = {Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2008}, url = {http://eprint.iacr.org/2008/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhatirM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhazaeiM08, author = {Shahram Khazaei and Willi Meier}, title = {New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2008}, url = {http://eprint.iacr.org/2008/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhazaeiM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhoatT08, author = {Th{\^{a}}n Quang Kho{\'{a}}t and Nguyen Hong Tan}, title = {Unique Shortest Vector Problem for max norm is NP-hard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2008}, url = {http://eprint.iacr.org/2008/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhoatT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhovratovichN08, author = {Dmitry Khovratovich and Ivica Nikolic}, title = {Cryptanalysis of EnRUPT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2008}, url = {http://eprint.iacr.org/2008/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhovratovichN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPSY08, author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung}, title = {A New Randomness Extraction Paradigm for Hybrid Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2008}, url = {http://eprint.iacr.org/2008/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzV08, author = {Eike Kiltz and Yevgeniy Vahlis}, title = {{CCA2} Secure {IBE:} Standard Model Efficiency through Authenticated Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2008}, url = {http://eprint.iacr.org/2008/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKHS08, author = {Tae Hyun Kim and Jongsung Kim and Seokhie Hong and Jaechul Sung}, title = {Linear and Differential Cryptanalysis of Reduced {SMS4} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2008}, url = {http://eprint.iacr.org/2008/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimT08, author = {Jihye Kim and Gene Tsudik}, title = {Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2008}, url = {http://eprint.iacr.org/2008/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirtaneR08, author = {Varad Kirtane and C. Pandu Rangan}, title = {{RSA-TBOS} Signcryption with Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2008}, url = {http://eprint.iacr.org/2008/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirtaneR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirtaneR08a, author = {Varad Kirtane and C. Pandu Rangan}, title = {Side Channel Attack Resistant Implementation of Multi-Power {RSA} using Hensel Lifting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2008}, url = {http://eprint.iacr.org/2008/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirtaneR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Klima08, author = {Vlastimil Kl{\'{\i}}ma}, title = {On Collisions of Hash Functions Turbo {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2008}, url = {http://eprint.iacr.org/2008/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Klima08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzKM08, author = {Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes}, title = {Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2008}, url = {http://eprint.iacr.org/2008/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovR08, author = {Vladimir Kolesnikov and Charles Rackoff}, title = {Password Mistyping in Two-Factor-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2008}, url = {http://eprint.iacr.org/2008/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KounavisG08, author = {Michael E. Kounavis and Shay Gueron}, title = {Vortex: {A} New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2008}, url = {http://eprint.iacr.org/2008/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KounavisG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KovtunPK08, author = {Vladyslav Kovtun and Jan Pelzl and Alexandr Kuznetsov}, title = {Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2008}, url = {http://eprint.iacr.org/2008/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KovtunPK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KovtunW08, author = {Vladyslav Kovtun and Thomas J. Wollinger}, title = {Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2008}, url = {http://eprint.iacr.org/2008/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KovtunW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kumar08, author = {Manoj Kumar}, title = {A Secure Remote User Authentication Scheme with Smart Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2008}, url = {http://eprint.iacr.org/2008/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kumar08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunzlerMR08, author = {Robin K{\"{u}}nzler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominik Raub}, title = {Secure Computability of Functions in the {IT} setting with Dishonest Majority and Applications to Long-Term Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2008}, url = {http://eprint.iacr.org/2008/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunzlerMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KupcuL08, author = {Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Anna Lysyanskaya}, title = {Usable Optimistic Fair Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2008}, url = {http://eprint.iacr.org/2008/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KupcuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2008}, url = {http://eprint.iacr.org/2008/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaF08, author = {Kaoru Kurosawa and Jun Furukawa}, title = {Universally Composable Undeniable Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2008}, url = {http://eprint.iacr.org/2008/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaS08, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2008}, url = {http://eprint.iacr.org/2008/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT08, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2008}, url = {http://eprint.iacr.org/2008/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiZ08, author = {Miroslaw Kutylowski and Filip Zag{\'{o}}rski}, title = {Scratch, Click {\&} Vote: {E2E} voting over the Internet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2008}, url = {http://eprint.iacr.org/2008/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalK08, author = {Sunder Lal and Prashant Kushwah}, title = {Multi-PKG {ID} based signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2008}, url = {http://eprint.iacr.org/2008/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalK08a, author = {Sunder Lal and Prashant Kushwah}, title = {{ID} based generalized signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2008}, url = {http://eprint.iacr.org/2008/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalK08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalV08, author = {Sunder Lal and Vandani Verma}, title = {Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2008}, url = {http://eprint.iacr.org/2008/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangerSB08, author = {Lucie Langer and Axel Schmidt and Johannes Buchmann}, title = {Secure Online Elections in Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2008}, url = {http://eprint.iacr.org/2008/157}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LangerSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudN08, author = {Peeter Laud and Long Ngo}, title = {Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2008}, url = {http://eprint.iacr.org/2008/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterS08, author = {Kristin E. Lauter and Katherine E. Stange}, title = {The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2008}, url = {http://eprint.iacr.org/2008/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Layouni08, author = {Mohamed Layouni}, title = {Controlling access to personal data through Accredited Symmetrically Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2008}, url = {http://eprint.iacr.org/2008/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Layouni08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLP08, author = {Eunjeong Lee and Hyang{-}Sook Lee and Cheol{-}Min Park}, title = {Efficient and Generalized Pairing Computation on Abelian Varieties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2008}, url = {http://eprint.iacr.org/2008/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeP08, author = {Jooyoung Lee and Je Hong Park}, title = {Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2008}, url = {http://eprint.iacr.org/2008/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeP08a, author = {Jooyoung Lee and Choon Sik Park}, title = {An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2008}, url = {http://eprint.iacr.org/2008/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeP08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeY08, author = {Jooyoung Lee and Yongjin Yeom}, title = {Efficient {RFID} authentication protocols based on pseudorandom sequence generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2008}, url = {http://eprint.iacr.org/2008/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeungNW08, author = {Bert W. Leung and Felix Y. Ng and Duncan S. Wong}, title = {On the Security of a Visual Cryptography Scheme for Color Images}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2008}, url = {http://eprint.iacr.org/2008/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeungNW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentN08, author = {Ga{\"{e}}tan Leurent and Phong Q. Nguyen}, title = {How Risky is the Random-Oracle Model?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2008}, url = {http://eprint.iacr.org/2008/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Levin08, author = {Ilya O. Levin}, title = {Zcipher Algorithm Specification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2008}, url = {http://eprint.iacr.org/2008/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Levin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoSW08, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2008}, url = {http://eprint.iacr.org/2008/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiFLX08, author = {HongDa Li and Dengguo Feng and Bao Li and Haixia Xue}, title = {Round-Optimal Zero-Knowledge Proofs of Knowledge for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2008}, url = {http://eprint.iacr.org/2008/524}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiFLX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiHL08, author = {Yunfeng Li and Dake He and Xianhui Lu}, title = {Accountability of Perfect Concurrent Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2008}, url = {http://eprint.iacr.org/2008/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiK08, author = {Jin Li and Kwangjo Kim}, title = {Attribute-Based Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2008}, url = {http://eprint.iacr.org/2008/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiST08, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Analysis and Improvement of Authenticatable Ring Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2008}, url = {http://eprint.iacr.org/2008/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSZL08, author = {Ruilin Li and Bing Sun and Peng Zhang and Chao Li}, title = {New Impossible Differential Cryptanalysis of {ARIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2008}, url = {http://eprint.iacr.org/2008/227}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiSZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiXG08, author = {Ji Li and Liangyu Xu and Xu Guan}, title = {Collision attack on NaSHA-512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2008}, url = {http://eprint.iacr.org/2008/519}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiXG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiY08, author = {Fagen Li and Yong Yu}, title = {An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2008}, url = {http://eprint.iacr.org/2008/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiaoW08, author = {Xin Liao and Qiao{-}Yan Wen}, title = {Embedding in Two Least Significant Bits with Wet Paper Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2008}, url = {http://eprint.iacr.org/2008/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiaoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lifliand08, author = {Michael Lifliand}, title = {Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2008}, url = {http://eprint.iacr.org/2008/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lifliand08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell08, author = {Yehuda Lindell}, title = {Efficient Fully-Simulatable Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2008}, url = {http://eprint.iacr.org/2008/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP08, author = {Yehuda Lindell and Benny Pinkas}, title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2008}, url = {http://eprint.iacr.org/2008/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP08a, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Multiparty Computation for Privacy-Preserving Data Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2008}, url = {http://eprint.iacr.org/2008/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa08, author = {Helger Lipmaa}, title = {Private Branching Programs: On Communication-Efficient Cryptocomputing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2008}, url = {http://eprint.iacr.org/2008/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa08a, author = {Helger Lipmaa}, title = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2008}, url = {http://eprint.iacr.org/2008/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBSZ08, author = {Joseph K. Liu and Joonsang Baek and Willy Susilo and Jianying Zhou}, title = {Certificate-Based Signature Schemes without Pairings or Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2008}, url = {http://eprint.iacr.org/2008/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Loebenberger08, author = {Daniel Loebenberger}, title = {A Simple Derivation for the Frobenius Pseudoprime Test}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2008}, url = {http://eprint.iacr.org/2008/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Loebenberger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LogachevN08, author = {Oleg A. Logachev and D. S. Nazarova}, title = {Local Affinity Based Inversion of Filter Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2008}, url = {http://eprint.iacr.org/2008/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LogachevN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Longa08, author = {Patrick Longa}, title = {Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2008}, url = {http://eprint.iacr.org/2008/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Longa08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaG08, author = {Patrick Longa and Catherine H. Gebotys}, title = {Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2008}, url = {http://eprint.iacr.org/2008/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaG08a, author = {Patrick Longa and Catherine H. Gebotys}, title = {Novel Precomputation Schemes for Elliptic Curve Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2008}, url = {http://eprint.iacr.org/2008/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaG08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaM08, author = {Patrick Longa and Ali Miri}, title = {New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2008}, url = {http://eprint.iacr.org/2008/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaM08a, author = {Patrick Longa and Ali Miri}, title = {New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2008}, url = {http://eprint.iacr.org/2008/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaM08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuDKK08, author = {Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim}, title = {New Impossible Differential Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2008}, url = {http://eprint.iacr.org/2008/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuDKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLH08, author = {Xianhui Lu and Xuejia Lai and Dake He}, title = {Improved efficiency of Kiltz07-KEM}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2008}, url = {http://eprint.iacr.org/2008/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuQ08, author = {Lu Zhao and Qiao{-}Yan Wen}, title = {2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2008}, url = {http://eprint.iacr.org/2008/259}, timestamp = {Sat, 06 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL08, author = {Yiyuan Luo and Xuejia Lai}, title = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2008}, url = {http://eprint.iacr.org/2008/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lyubashevsky08, author = {Vadim Lyubashevsky}, title = {The n\({}^{\mbox{c}}\)-Unique Shortest Vector Problem is Hard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2008}, url = {http://eprint.iacr.org/2008/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lyubashevsky08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaA08, author = {Chunbo Ma and Jun Ao}, title = {Proxy Key Re-encapsulation Mechanism for Group Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2008}, url = {http://eprint.iacr.org/2008/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaA08a, author = {Chunbo Ma and Jun Ao}, title = {Revisit of Group-based Unidirectional Proxy Re-encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2008}, url = {http://eprint.iacr.org/2008/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaA08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaT08, author = {Di Ma and Gene Tsudik}, title = {{DISH:} Distributed Self-Healing in Unattended Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2008}, url = {http://eprint.iacr.org/2008/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaT08a, author = {Di Ma and Gene Tsudik}, title = {A New Approach to Secure Logging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2008}, url = {http://eprint.iacr.org/2008/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaceSQ08, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2008}, url = {http://eprint.iacr.org/2008/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaceSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mahalanobis08, author = {Ayan Mahalanobis}, title = {A simple generalization of the ElGamal cryptosystem to non-abelian groups {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2008}, url = {http://eprint.iacr.org/2008/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mahalanobis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraP08, author = {Subhamoy Maitra and Goutam Paul}, title = {Analysis of {RC4} and Proposal of Additional Layers for Better Security Margin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2008}, url = {http://eprint.iacr.org/2008/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraPR08, author = {Subhamoy Maitra and Goutam Paul and Shashwat Raizada}, title = {Some Observations on {HC-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2008}, url = {http://eprint.iacr.org/2008/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraS08, author = {Subhamoy Maitra and Santanu Sarkar}, title = {Revisiting Wiener's Attack - New Weak Keys in {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2008}, url = {http://eprint.iacr.org/2008/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR08, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2008}, url = {http://eprint.iacr.org/2008/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR08a, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2008}, url = {http://eprint.iacr.org/2008/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MallZ08, author = {Daniel Mall and Qing Zhong}, title = {Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x{\_}132}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2008}, url = {http://eprint.iacr.org/2008/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MallZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Manuel08, author = {St{\'{e}}phane Manuel}, title = {Classification and Generation of Disturbance Vectors for Collision Attacks against {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2008}, url = {http://eprint.iacr.org/2008/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Manuel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisLKBQ08, author = {Mark Manulis and Damien Leroy and Fran{\c{c}}ois Koeune and Olivier Bonaventure and Jean{-}Jacques Quisquater}, title = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2008}, url = {http://eprint.iacr.org/2008/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisLKBQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinPS08, author = {Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2008}, url = {http://eprint.iacr.org/2008/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MashatanS08, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {Recognition in Ad Hoc Pervasive Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2008}, url = {http://eprint.iacr.org/2008/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MashatanS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MashatanS08a, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {A New Message Recognition Protocol for Ad Hoc Pervasive Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2008}, url = {http://eprint.iacr.org/2008/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MashatanS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MathuriaS08, author = {Anish Mathuria and G. Sriram}, title = {New attacks on {ISO} key establishment protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2008}, url = {http://eprint.iacr.org/2008/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MathuriaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaximovK08, author = {Alexander Maximov and Dmitry Khovratovich}, title = {New State Recovery Attack on {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2008}, url = {http://eprint.iacr.org/2008/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaximovK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MedwedO08, author = {Marcel Medwed and Elisabeth Oswald}, title = {Template Attacks on {ECDSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2008}, url = {http://eprint.iacr.org/2008/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MedwedO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelchorGH08, author = {Carlos Aguilar Melchor and Philippe Gaborit and Javier Herranz}, title = {Additively Homomorphic Encryption with d-Operand Multiplications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2008}, url = {http://eprint.iacr.org/2008/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelchorGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelPRR08, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, title = {Analysis of Step-Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2008}, url = {http://eprint.iacr.org/2008/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelPRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelS08, author = {Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Collisions for Round-Reduced {LAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2008}, url = {http://eprint.iacr.org/2008/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mesnager08, author = {Sihem Mesnager}, title = {A new class of Bent functions in Polynomial Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2008}, url = {http://eprint.iacr.org/2008/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mesnager08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MichielsGH08, author = {Wil Michiels and Paul Gorissen and Henk D. L. Hollmann}, title = {Cryptanalysis of White-Box Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2008}, url = {http://eprint.iacr.org/2008/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MichielsGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiltersenNT08, author = {Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos}, title = {Privacy-Enhancing First-Price Auctions Using Rational Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2008}, url = {http://eprint.iacr.org/2008/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiltersenNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedDB08, author = {Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann}, title = {Algebraic Cryptanalysis of {MQQ} Public Key Cryptosystem by MutantXL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2008}, url = {http://eprint.iacr.org/2008/451}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MohamedDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Moody08, author = {Dustin Moody}, title = {The Diffie-Hellman problem and generalization of Verheul's theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2008}, url = {http://eprint.iacr.org/2008/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Moody08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiEPRPSS08, author = {Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh}, title = {Information Leakage of Flip-Flops in DPA-Resistant Logic Styles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2008}, url = {http://eprint.iacr.org/2008/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiEPRPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiKSS08, author = {Amir Moradi and Mehrdad Khatir and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, title = {Investigating the DPA-Resistance Property of Charge Recovery Logics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2008}, url = {http://eprint.iacr.org/2008/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiKSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Morales-Luna08, author = {Guillermo Morales{-}Luna}, title = {On differences of quadratic residues}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2008}, url = {http://eprint.iacr.org/2008/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Morales-Luna08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Morales08, author = {David J. Mireles Morales}, title = {An analysis of the infrastructure in real function fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2008}, url = {http://eprint.iacr.org/2008/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Morales08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Morales08a, author = {David J. Mireles Morales}, title = {Cheon's algorithm, pairing inversion and the discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2008}, url = {http://eprint.iacr.org/2008/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Morales08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoranS08, author = {Tal Moran and Gil Segev}, title = {David and Goliath Commitments: {UC} Computation for Asymmetric Parties Using Tamper-Proof Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2008}, url = {http://eprint.iacr.org/2008/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoranS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorrisseySW08, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {A Modular Security Analysis of the {TLS} Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2008}, url = {http://eprint.iacr.org/2008/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorrisseySW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MunillaP08, author = {Jorge Munilla and Alberto Peinado}, title = {Attacks on Singelee and Preneel's protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2008}, url = {http://eprint.iacr.org/2008/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MunillaP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheS08, author = {David Naccache and Igor E. Shparlinski}, title = {Divisibility, Smoothness and Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2008}, url = {http://eprint.iacr.org/2008/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakagamiTOKM08, author = {Hidehiko Nakagami and Ryoichi Teramura and Toshihiro Ohigashi and Hidenori Kuwakado and Masakatu Morii}, title = {A Chosen {IV} Attack Using Phase Shifting Equivalent Keys against {DECIM} v2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2008}, url = {http://eprint.iacr.org/2008/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakagamiTOKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nam08, author = {Junghyun Nam}, title = {Infringing and Improving Password Security of a Three-Party Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2008}, url = {http://eprint.iacr.org/2008/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nam08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi08, author = {Mridul Nandi}, title = {Improving upon {HCTR} and matching attacks for Hash-Counter-Hash approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2008}, url = {http://eprint.iacr.org/2008/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi08a, author = {Mridul Nandi}, title = {A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2008}, url = {http://eprint.iacr.org/2008/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi08b, author = {Mridul Nandi}, title = {An Efficient SPRP-secure Construction based on Pseudo Random Involution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2008}, url = {http://eprint.iacr.org/2008/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi08c, author = {Mridul Nandi}, title = {Two New Efficient CCA-Secure Online Ciphers: {MHCBC} and {MCBC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2008}, url = {http://eprint.iacr.org/2008/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorSW08, author = {Moni Naor and Gil Segev and Udi Wieder}, title = {History-Independent Cuckoo Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2008}, url = {http://eprint.iacr.org/2008/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Neven08, author = {Gregory Neven}, title = {Efficient Sequential Aggregate Signed Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2008}, url = {http://eprint.iacr.org/2008/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Neven08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenO08, author = {Jesper Buus Nielsen and Claudio Orlandi}, title = {{LEGO} for Two Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2008}, url = {http://eprint.iacr.org/2008/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovV08, author = {Ventzislav Nikov and Marc Vauclair}, title = {Yet Another Secure Distance-Bounding Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2008}, url = {http://eprint.iacr.org/2008/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NoackS08, author = {Andreas Noack and Stefan Spitz}, title = {Dynamic Threshold Cryptosystem without Group Manager}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2008}, url = {http://eprint.iacr.org/2008/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NoackS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NuidaFHKWOI08, author = {Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and Kazuto Ogawa and Hideki Imai}, title = {An improvement of discrete Tardos fingerprinting codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2008}, url = {http://eprint.iacr.org/2008/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NuidaFHKWOI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OConnor08, author = {Luke O'Connor}, title = {Entropy Bounds for Traffic Confirmation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2008}, url = {http://eprint.iacr.org/2008/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OConnor08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OConnorMNS08, author = {Laura Hitt O'Connor and Gary McGuire and Michael Naehrig and Marco Streng}, title = {A {CM} construction for curves of genus 2 with p-rank 1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2008}, url = {http://eprint.iacr.org/2008/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OConnorMNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OguraU08, author = {Naoki Ogura and Shigenori Uchiyama}, title = {Remarks on the Attack of Fouque et al. against the lIC Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2008}, url = {http://eprint.iacr.org/2008/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OguraU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OngPRV08, author = {Shien Jin Ong and David C. Parkes and Alon Rosen and Salil P. Vadhan}, title = {Fairness with an Honest Minority and a Rational Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2008}, url = {http://eprint.iacr.org/2008/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OngPRV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OsinS08, author = {Denis Osin and Vladimir Shpilrain}, title = {Public key encryption and encryption emulation attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2008}, url = {http://eprint.iacr.org/2008/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OsinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyPV08, author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti}, title = {Constant-Round Concurrent Non-Malleable Commitments and Decommitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2008}, url = {http://eprint.iacr.org/2008/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanD08, author = {Yanbin Pan and Yingpu Deng}, title = {Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2008}, url = {http://eprint.iacr.org/2008/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pandey08, author = {Omkant Pandey}, title = {Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2008}, url = {http://eprint.iacr.org/2008/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pandey08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParakhK08, author = {Abhishek Parakh and Subhash C. Kak}, title = {A Recursive Threshold Visual Cryptography Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2008}, url = {http://eprint.iacr.org/2008/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParakhK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pasalic08, author = {Enes Pasalic}, title = {Key differentiation attacks on stream ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2008}, url = {http://eprint.iacr.org/2008/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pasalic08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin08, author = {Jacques Patarin}, title = {Generic Attacks for the Xor of k random permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2008}, url = {http://eprint.iacr.org/2008/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin08a, author = {Jacques Patarin}, title = {A Proof of Security in O(2\({}^{\mbox{n}}\)) for the Xor of Two Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2008}, url = {http://eprint.iacr.org/2008/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin08b, author = {Jacques Patarin}, title = {Generic Attacks on Feistel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2008}, url = {http://eprint.iacr.org/2008/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS08, author = {Maura B. Paterson and Douglas R. Stinson}, title = {Two attacks on a sensor network key distribution scheme of Cheng and Agrawal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2008}, url = {http://eprint.iacr.org/2008/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSW08, author = {Maura B. Paterson and Douglas R. Stinson and Ruizhong Wei}, title = {Combinatorial batch codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2008}, url = {http://eprint.iacr.org/2008/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCASR08, author = {Arpita Patra and Ashish Choudhury and B. V. Ashwinkumar and Kannan Srinathan and C. Pandu Rangan}, title = {Perfectly Secure Message Transmission Tolerating Mixed Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2008}, url = {http://eprint.iacr.org/2008/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCASR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCGR08, author = {Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan}, title = {Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2008}, url = {http://eprint.iacr.org/2008/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCGR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Statistically Reliable and Secure Message Transmission in Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2008}, url = {http://eprint.iacr.org/2008/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08a, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Round Efficient Unconditionally Secure Multiparty Computation Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2008}, url = {http://eprint.iacr.org/2008/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08b, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Efficient Asynchronous Byzantine Agreement with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2008}, url = {http://eprint.iacr.org/2008/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08c, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan}, title = {Efficient Asynchronous Multiparty Computation with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2008}, url = {http://eprint.iacr.org/2008/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR08d, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Multiparty Set Intersection Re-Visited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2008}, url = {http://eprint.iacr.org/2008/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCRR08, author = {Arpita Patra and Ashish Choudhary and Tal Rabin and C. Pandu Rangan}, title = {The Round Complexity of Verifiable Secret Sharing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2008}, url = {http://eprint.iacr.org/2008/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCRS08, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan}, title = {Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2008}, url = {http://eprint.iacr.org/2008/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pautot08, author = {Fabrice J. P. R. Pautot}, title = {Some Formal Solutions in Side-channel Cryptanalysis - An Introduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2008}, url = {http://eprint.iacr.org/2008/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pautot08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Peikert08, author = {Chris Peikert}, title = {Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2008}, url = {http://eprint.iacr.org/2008/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Peikert08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitLQ08, author = {Christophe Petit and Kristin E. Lauter and Jean{-}Jacques Quisquater}, title = {Full Cryptanalysis of {LPS} and Morgenstern Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2008}, url = {http://eprint.iacr.org/2008/173}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitLQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhongO08, author = {Le Trieu Phong and Wakaha Ogata}, title = {Blind {HIBE} and its Applications to Identity-Based Blind Signature and Blind Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2008}, url = {http://eprint.iacr.org/2008/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhongO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietroMSST08, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2008}, url = {http://eprint.iacr.org/2008/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietroMSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PopoveniucS08, author = {Stefan Popoveniuc and Jonathan Stanton}, title = {Buying random votes is as hard as buying no-votes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2008}, url = {http://eprint.iacr.org/2008/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PopoveniucS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranR08, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Homomorphic Encryption with {CCA} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2008}, url = {http://eprint.iacr.org/2008/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Priemuth-SchmidB08, author = {Deike Priemuth{-}Schmid and Alex Biryukov}, title = {Slid Pairs in Salsa20 and Trivium}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2008}, url = {http://eprint.iacr.org/2008/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Priemuth-SchmidB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaiB08, author = {Tapan Rai and Stanislav Bulygin}, title = {Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2008}, url = {http://eprint.iacr.org/2008/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaiB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ramkumar08, author = {Mahalingam Ramkumar}, title = {Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2008}, url = {http://eprint.iacr.org/2008/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ramkumar08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj08, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2008}, url = {http://eprint.iacr.org/2008/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj08a, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Non-Cyclic Subgroups of Jacobians of Genus Two Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2008}, url = {http://eprint.iacr.org/2008/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj08b, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Generators of Jacobians of Genus Two Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2008}, url = {http://eprint.iacr.org/2008/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RistenpartS08, author = {Thomas Ristenpart and Thomas Shrimpton}, title = {How to Build a Hash Function from any Collision-Resistant Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2008}, url = {http://eprint.iacr.org/2008/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RistenpartS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivainDP08, author = {Matthieu Rivain and Emmanuelle Dottax and Emmanuel Prouff}, title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2008}, url = {http://eprint.iacr.org/2008/021}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivainDP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rjasko08, author = {Michal Rjasko}, title = {Properties of Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2008}, url = {http://eprint.iacr.org/2008/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rjasko08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RosenS08, author = {Alon Rosen and Gil Segev}, title = {Chosen-Ciphertext Security via Correlated Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2008}, url = {http://eprint.iacr.org/2008/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RosenS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RosenS08a, author = {Alon Rosen and Gil Segev}, title = {Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2008}, url = {http://eprint.iacr.org/2008/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RosenS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rostovtsev08, author = {Alexander Rostovtsev}, title = {Imaginary quadratic orders with given prime factor of class number}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2008}, url = {http://eprint.iacr.org/2008/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rostovtsev08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rostovtsev08a, author = {Alexander Rostovtsev}, title = {Linear equivalence between elliptic curves in Weierstrass and Hesse form}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2008}, url = {http://eprint.iacr.org/2008/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rostovtsev08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ruckert08, author = {Markus R{\"{u}}ckert}, title = {Lattice-based Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2008}, url = {http://eprint.iacr.org/2008/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ruckert08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/S08, author = {Anoop M. S.}, title = {Security needs in embedded systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2008}, url = {http://eprint.iacr.org/2008/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/S08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SKR08, author = {Chandrasekar S. and Ambika K. and C. Pandu Rangan}, title = {Signcryption with Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2008}, url = {http://eprint.iacr.org/2008/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sadeghi008, author = {Ahmad{-}Reza Sadeghi and Thomas Schneider}, title = {Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2008}, url = {http://eprint.iacr.org/2008/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sadeghi008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid08, author = {Gideon Samid}, title = {Encryption-On-Demand: Practical and Theoretical Considerations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2008}, url = {http://eprint.iacr.org/2008/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS08, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Attacking Reduced Round {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2008}, url = {http://eprint.iacr.org/2008/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS08a, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Non-Linear Reduced Round Attacks Against {SHA-2} Hash family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2008}, url = {http://eprint.iacr.org/2008/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS08b, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Searching for Low Weight Codewords in Linear Binary Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2008}, url = {http://eprint.iacr.org/2008/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS08c, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {New Collision attacks Against Up To 24-step {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2008}, url = {http://eprint.iacr.org/2008/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS08d, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {A Combinatorial Analysis of Recent Attacks on Step Reduced {SHA-2} Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2008}, url = {http://eprint.iacr.org/2008/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS08e, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {A New Hash Family Obtained by Modifying the {SHA-2} Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2008}, url = {http://eprint.iacr.org/2008/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS08e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar08, author = {Palash Sarkar}, title = {Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2008}, url = {http://eprint.iacr.org/2008/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar08a, author = {Palash Sarkar}, title = {A New Multi-Linear Universal Hash Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2008}, url = {http://eprint.iacr.org/2008/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarMS08, author = {Santanu Sarkar and Subhamoy Maitra and Sumanta Sarkar}, title = {{RSA} Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2008}, url = {http://eprint.iacr.org/2008/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SatoOO08, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Strongly Unforgeable ID-based Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2008}, url = {http://eprint.iacr.org/2008/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SatoOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Satoh08, author = {Takakazu Satoh}, title = {Generating genus two hyperelliptic curves over large characteristic finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2008}, url = {http://eprint.iacr.org/2008/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Satoh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaxenaWP08, author = {Amitabh Saxena and Brecht Wyseur and Bart Preneel}, title = {White-Box Cryptography: Formal Notions and (Im)possibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2008}, url = {http://eprint.iacr.org/2008/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaxenaWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ScottBCPK08, author = {Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa}, title = {On the final exponentiation for calculating pairings on ordinary elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2008}, url = {http://eprint.iacr.org/2008/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ScottBCPK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ScottBCPK08a, author = {Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa}, title = {Fast hashing to {G2} on pairing friendly curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2008}, url = {http://eprint.iacr.org/2008/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ScottBCPK08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVGKR08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, title = {Provably Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2008}, url = {http://eprint.iacr.org/2008/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVGKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVGKR08a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, title = {On the Provable Security of Multi-Receiver Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2008}, url = {http://eprint.iacr.org/2008/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVGKR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVJC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and C. Pandu Rangan}, title = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2008}, url = {http://eprint.iacr.org/2008/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVJC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVKGC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and C. Pandu Rangan}, title = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption {(IBBSC)} Scheme for Wireless Ad-hoc Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2008}, url = {http://eprint.iacr.org/2008/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVKGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVSC08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and C. Pandu Rangan}, title = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2008}, url = {http://eprint.iacr.org/2008/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Semaev08, author = {Igor A. Semaev}, title = {New hash function designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2008}, url = {http://eprint.iacr.org/2008/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Semaev08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeoHH08, author = {Seog Chung Seo and Dong{-}Guk Han and Seokhie Hong}, title = {TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2\({}^{\mbox{m}}\)) on 8-bit MICAz Mote}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2008}, url = {http://eprint.iacr.org/2008/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeoHH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShachamW08, author = {Hovav Shacham and Brent Waters}, title = {Compact Proofs of Retrievability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2008}, url = {http://eprint.iacr.org/2008/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShachamW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShahSB08, author = {Mehul A. Shah and Ram Swaminathan and Mary Baker}, title = {Privacy-Preserving Audit and Extraction of Digital Contents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2008}, url = {http://eprint.iacr.org/2008/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShahSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SharmaG08, author = {Deepmala Sharma and Sugata Gangopadhyay}, title = {On Kasami Bent Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2008}, url = {http://eprint.iacr.org/2008/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SharmaG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenSW08, author = {Emily Shen and Elaine Shi and Brent Waters}, title = {Predicate Privacy in Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2008}, url = {http://eprint.iacr.org/2008/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiW08, author = {Elaine Shi and Brent Waters}, title = {Delegating Capabilities in Predicate Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2008}, url = {http://eprint.iacr.org/2008/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinKI08, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, title = {A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2008}, url = {http://eprint.iacr.org/2008/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinKI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShipseyS08, author = {Rachel Shipsey and Christine Swart}, title = {Elliptic divisibility sequences and the elliptic curve discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2008}, url = {http://eprint.iacr.org/2008/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShipseyS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkoricOVS08, author = {Boris Skoric and Chibuzo Obi and Evgeny A. Verbitskiy and Berry Schoenmakers}, title = {Sharp lower bounds on the extractable randomness from non-uniform sources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2008}, url = {http://eprint.iacr.org/2008/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkoricOVS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sotakova08, author = {Miroslava Sot{\'{a}}kov{\'{a}}}, title = {Breaking One-Round Key-Agreement Protocols in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2008}, url = {http://eprint.iacr.org/2008/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sotakova08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrinathanPCR08, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Reliable Message Transmission in Directed Hypergraphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2008}, url = {http://eprint.iacr.org/2008/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrinathanPCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrinathanPCR08a, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2008}, url = {http://eprint.iacr.org/2008/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrinathanPCR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stachowiak08, author = {Grzegorz Stachowiak}, title = {Proofs of Knowledge with Several Challenge Values}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2008}, url = {http://eprint.iacr.org/2008/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stachowiak08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stam08, author = {Martijn Stam}, title = {Blockcipher Based Hashing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2008}, url = {http://eprint.iacr.org/2008/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stam08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertBMV08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat{-}Charvillon}, title = {Improving the Rules of the {DPA} Contest}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2008}, url = {http://eprint.iacr.org/2008/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertBMV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaUS08, author = {Douglas Stebila and Poornaprajna Udupi and Sheueling Chang Shantz}, title = {Multi-Factor Password-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2008}, url = {http://eprint.iacr.org/2008/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaUS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuLM08, author = {Zhitu Su and Hui Li and Jianfeng Ma}, title = {Polynomials for Ate Pairing and Ate\({}_{\mbox{i}}\) Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2008}, url = {http://eprint.iacr.org/2008/202}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SuLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sullivan08, author = {Nicholas T. Sullivan}, title = {Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2008}, url = {http://eprint.iacr.org/2008/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sullivan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLCY08, author = {Xun Sun and Jianhua Li and Gongliang Chen and Shutang Yang}, title = {Identity-Based Directed Signature Scheme from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2008}, url = {http://eprint.iacr.org/2008/305}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunLCY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunTW08, author = {Hung{-}Min Sun and Wei{-}Chih Ting and King{-}Hang Wang}, title = {On the Security of Chien's Ultralightweight {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2008}, url = {http://eprint.iacr.org/2008/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunWSGW08, author = {Hung{-}Min Sun and Mu{-}En Wu and Ron Steinfeld and Jian Guo and Huaxiong Wang}, title = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2008}, url = {http://eprint.iacr.org/2008/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunWSGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunZ08, author = {Yinxia Sun and Futai Zhang}, title = {Secure Certificateless Public Key Encryption without Redundancy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2008}, url = {http://eprint.iacr.org/2008/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangPLYW08, author = {Chunming Tang and Dingyi Pei and Zhuojun Liu and Zheng{-}an Yao and Mingsheng Wang}, title = {Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2008}, url = {http://eprint.iacr.org/2008/034}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangPLYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ThandraMB08, author = {Prasanth Kumar Thandra and S. A. V. Satya Murty and R. Balasubramanian}, title = {Weaknesses in {HENKOS} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2008}, url = {http://eprint.iacr.org/2008/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ThandraMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Thomsen08, author = {S{\o}ren S. Thomsen}, title = {An improved preimage attack on {MD2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2008}, url = {http://eprint.iacr.org/2008/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Thomsen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TianW08, author = {Yuan Tian and Ying Wang}, title = {GUC-Secure Set-Intersection Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2008}, url = {http://eprint.iacr.org/2008/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TianW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsujiiTF08, author = {Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita}, title = {Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2008}, url = {http://eprint.iacr.org/2008/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsujiiTF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Varnovsky08, author = {Nick Varnovsky}, title = {Provable Security of Digital Signatures in the Tamper-Proof Device Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2008}, url = {http://eprint.iacr.org/2008/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Varnovsky08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VascoHS08, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Florian Hess and Rainer Steinwandt}, title = {Combined (identity-based) public key schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2008}, url = {http://eprint.iacr.org/2008/466}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VascoHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VasishtaGGBMPSK08, author = {Pranav K. Vasishta and Anuj Gupta and Prasant Gopal and Piyush Bansal and Rishabh Mukherjee and M. Poornima and Kannan Srinathan and Kishore Kothapalli}, title = {How Far Must You See To Hear Reliably}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2008}, url = {http://eprint.iacr.org/2008/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VasishtaGGBMPSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vercauteren08, author = {Frederik Vercauteren}, title = {Optimal Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2008}, url = {http://eprint.iacr.org/2008/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vercauteren08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vercauteren08a, author = {Frederik Vercauteren}, title = {The Hidden Root Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2008}, url = {http://eprint.iacr.org/2008/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vercauteren08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Verma08, author = {Girraj Kumar Verma}, title = {Blind Signature Scheme over Braid Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2008}, url = {http://eprint.iacr.org/2008/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Verma08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Verma08a, author = {Girraj Kumar Verma}, title = {New ID-based Fair Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2008}, url = {http://eprint.iacr.org/2008/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Verma08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Verma08b, author = {Girraj Kumar Verma}, title = {A Proxy Signature Scheme over Braid Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2008}, url = {http://eprint.iacr.org/2008/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Verma08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vielhaber08, author = {Michael Vielhaber}, title = {TRIVIUM's output partially autocancels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2008}, url = {http://eprint.iacr.org/2008/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vielhaber08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang08, author = {Bin Wang}, title = {A non-interactive deniable authentication scheme based on designated verifier proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2008}, url = {http://eprint.iacr.org/2008/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang08a, author = {Shuhong Wang}, title = {The Multireceiver Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2008}, url = {http://eprint.iacr.org/2008/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang08b, author = {Bin Wang}, title = {A new identity based proxy signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2008}, url = {http://eprint.iacr.org/2008/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang08d, author = {Bin Wang}, title = {A non-delegatable identity-based strong designated verifier signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2008}, url = {http://eprint.iacr.org/2008/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCCW08, author = {Shengbao Wang and Zhenfu Cao and Kim{-}Kwang Raymond Choo and Lihua Wang}, title = {Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2008}, url = {http://eprint.iacr.org/2008/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangCCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangFH08, author = {Yongjuan Wang and Shuqin Fan and Wenbao Han}, title = {New construction of Boolean functions with maximun algebraic immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2008}, url = {http://eprint.iacr.org/2008/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangFH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangFWZ08, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, title = {On the Correctness of An Approach Against Side-channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2008}, url = {http://eprint.iacr.org/2008/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangFWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangS08, author = {Shuhong Wang and Reihaneh Safavi{-}Naini}, title = {New Results on Unconditionally Secure Multireceiver Manual Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2008}, url = {http://eprint.iacr.org/2008/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYH08, author = {Xu An Wang and Xiaoyuan Yang and Yiliang Han}, title = {On Security Notions for Verifiable Encrypted Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2008}, url = {http://eprint.iacr.org/2008/098}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYL08, author = {Xu An Wang and Xiaoyuan Yang and Fagen Li}, title = {On the Role of {PKG} for Proxy Re-encryption in Identity Based Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2008}, url = {http://eprint.iacr.org/2008/410}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ08, author = {Fengjiao Wang and Yuqing Zhang}, title = {Cryptanalysis of a client-to-client password-authenticated key agreement protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2008}, url = {http://eprint.iacr.org/2008/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters08, author = {Brent Waters}, title = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2008}, url = {http://eprint.iacr.org/2008/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengDLCLW08, author = {Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xu An Wang}, title = {Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2008}, url = {http://eprint.iacr.org/2008/509}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengDLCLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wooding08, author = {Mark Wooding}, title = {New proofs for old modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2008}, url = {http://eprint.iacr.org/2008/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wooding08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuD08, author = {Yongdong Wu and Robert H. Deng}, title = {On the Security of Fully Collusion Resistant Traitor Tracing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2008}, url = {http://eprint.iacr.org/2008/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuFW08, author = {Shuang Wu and Dengguo Feng and Wenling Wu}, title = {Cryptanalysis of the Hash Function {LUX-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2008}, url = {http://eprint.iacr.org/2008/520}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuFW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuS08, author = {Jiang Wu and Douglas R. Stinson}, title = {On The Security of The ElGamal Encryption Scheme and Damgard's Variant}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2008}, url = {http://eprint.iacr.org/2008/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuS08a, author = {Jiang Wu and Douglas R. Stinson}, title = {How To Ensure Forward and Backward Untraceability of {RFID} Identification Schemes By Using {A} Robust {PRBG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2008}, url = {http://eprint.iacr.org/2008/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wullschleger08, author = {J{\"{u}}rg Wullschleger}, title = {Oblivious Transfer from Weak Noisy Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2008}, url = {http://eprint.iacr.org/2008/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wullschleger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiaWFRB08, author = {Jinyue Xia and Jiandong Wang and Liming Fang and Yongjun Ren and Shizhu Bian}, title = {Formal Proof of Relative Strengths of Security between {ECK2007} Model and other Proof Models for Key Agreement Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2008}, url = {http://eprint.iacr.org/2008/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiaWFRB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XieFL08, author = {Tao Xie and Dengguo Feng and Fanbao Liu}, title = {A New Collision Differential For {MD5} With Its Full Differential Path}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2008}, url = {http://eprint.iacr.org/2008/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XieFL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XieLF08, author = {Tao Xie and Fanbao Liu and Dengguo Feng}, title = {Could The 1-MSB Input Difference Be The Fastest Collision Attack For {MD5} ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2008}, url = {http://eprint.iacr.org/2008/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XieLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu08, author = {ZiJie Xu}, title = {Dynamic {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2008}, url = {http://eprint.iacr.org/2008/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuL08, author = {Liangyu Xu and Ji Li}, title = {Semi-free start collision attack on Blender}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2008}, url = {http://eprint.iacr.org/2008/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yacobi08, author = {Yacov Yacobi}, title = {On the economic payoff of forensic systems when used to trace Counterfeited Software and content}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2008}, url = {http://eprint.iacr.org/2008/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yacobi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangCD08, author = {Piyi Yang and Zhenfu Cao and Xiaolei Dong}, title = {Fuzzy Identity Based Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2008}, url = {http://eprint.iacr.org/2008/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangCD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuanJWW08, author = {Zheng Yuan and Keting Jia and Wei Wang and Xiaoyun Wang}, title = {Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2008}, url = {http://eprint.iacr.org/2008/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanJWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zajac08, author = {Pavol Zajac}, title = {Remarks on the {NFS} complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2008}, url = {http://eprint.iacr.org/2008/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zajac08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaKW08, author = {Zhengbang Zha and Gohar M. M. Kyureghyan and Xueli Wang}, title = {A New Family of Perfect Nonlinear Binomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2008}, url = {http://eprint.iacr.org/2008/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang08, author = {Fangguo Zhang}, title = {Twisted Ate Pairing on Hyperelliptic Curves and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2008}, url = {http://eprint.iacr.org/2008/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang08a, author = {Yu Zhang}, title = {The computational {SLR:} a logic for reasoning about computational indistinguishability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2008}, url = {http://eprint.iacr.org/2008/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoXZZC08, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Binglong Chen}, title = {Computing Bilinear Pairings on Elliptic Curves with Automorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2008}, url = {http://eprint.iacr.org/2008/209}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoXZZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoY08, author = {Wei Zhao and Dingfeng Ye}, title = {Modified Huang-Wang's Convertible Nominative Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2008}, url = {http://eprint.iacr.org/2008/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {All Pairings Are in a Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2008}, url = {http://eprint.iacr.org/2008/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZX08, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Reducing the Complexity of the Weil Pairing Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2008}, url = {http://eprint.iacr.org/2008/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengLMCL08, author = {Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li}, title = {Democratic Group Signatures with Threshold Traceability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2008}, url = {http://eprint.iacr.org/2008/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuZW08, author = {Zhenchao Zhu and Yuqing Zhang and Fengjiao Wang}, title = {An Efficient Identity-based Ring Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2008}, url = {http://eprint.iacr.org/2008/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuZZC08, author = {Bo Zhu and Yanfei Zheng and Yaowei Zhou and Kefei Chen}, title = {Cryptanalysis of {LU} Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2008}, url = {http://eprint.iacr.org/2008/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuZZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/suLM08, author = {Zhitu Su and Hui Li and Jianfeng Ma}, title = {Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2008}, url = {http://eprint.iacr.org/2008/008}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/suLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengL08, title = {On Resettably-Sound Resttable Zero Knowledege Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengWW08, title = {Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuLS08, title = {Enumeration of Homogeneous Rotation Symmetric functions over GF(p)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuLS08a, title = {Construction of Resilient Functions with Multiple Cryptographic Criteria}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuLS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongLC08, title = {On the Design of Secure and Fast Double Block Length Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuZ08, title = {An Efficient ID-based Ring Signature Scheme from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanHZCC08, title = {A Tamper-Evident Voting Machine Resistant to Covert Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanHZCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HashimotoS08, title = {On construction of signature schemes based on birational permutations over noncommutative rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HashimotoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongKKPC08, title = {Privacy Preserving Multiset Union with ElGamal Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongKKPC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsmailR08, title = {Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsmailR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KasiviswanathanS08, title = {A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KasiviswanathanS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLH08a, title = {Chosen ciphertext secure public key encryption under {DDH} assumption with short ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLH08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Milleville08, title = {Analysis and Details of the Random Cipher Output Mode Of Operation Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Milleville08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MondalMP08, title = {A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MondalMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCAR08, title = {Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCAR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCSR08, title = {On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCSR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviV08, title = {cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoXC08, title = {Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and {CCA} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoXC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLWLL08, title = {Impossible Differential Cryptanalysis of {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunLWLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vijayarangan08, title = {A New Hash Algorithm: Khichidi-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vijayarangan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang08c, title = {On DDos Attack against Proxy in Re-encryption and Re-signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhyteHHPSH08, title = {{IEEE} {P1363.1} Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhyteHHPSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XueF08, title = {Injective Trapdoor Functions are Necessary and Sufficient for {CCA2} Secure Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XueF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouH08, title = {{BGKM:} An Efficient Secure Broadcasting Group Key Management Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL08, title = {The Walsh Spectrum of a New Family of {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2008}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2008/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.