Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2008.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AbdallaBN08,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Gregory Neven},
  title        = {Robust Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeKO08,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  title        = {Chosen Ciphertext Security with Optimal Ciphertext Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdidaN08,
  author       = {Ben Adida and
                  C. Andrew Neff},
  title        = {Efficient Receipt-Free Ballot Casting Resistant to Covert Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdidaN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdikariDI08,
  author       = {Jithra Adikari and
                  Vassil S. Dimitrov and
                  Laurent Imbert},
  title        = {Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic
                  Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdikariDI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdikariDM08,
  author       = {Jithra Adikari and
                  Vassil S. Dimitrov and
                  Pradeep Kumar Mishra},
  title        = {Fast Multiple Point Multiplication on Elliptic Curves over Prime and
                  Binary Fields using the Double-Base Number System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdikariDM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalM08,
  author       = {Divesh Aggarwal and
                  Ueli Maurer},
  title        = {Breaking {RSA} Generically is Equivalent to Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkKS08,
  author       = {Murat Ak and
                  Kamer Kaya and
                  Ali Aydin Sel{\c{c}}uk},
  title        = {Optimal Subset-Difference Broadcast Encryption with Free Riders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtC08,
  author       = {Martin R. Albrecht and
                  Carlos Cid},
  title        = {Algebraic Techniques in Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliH08,
  author       = {Kashif Ali and
                  Howard M. Heys},
  title        = {Results from a Search for the Best Linear Approximation of a Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AltmannJR08,
  author       = {Kristina Altmann and
                  Tibor Jager and
                  Andy Rupp},
  title        = {On Black-Box Ring Extraction and Integer Factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/156},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AltmannJR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenP08,
  author       = {Jo{\"{e}}l Alwen and
                  Chris Peikert},
  title        = {Generating Shorter Bases for Hard Random Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmirBO08,
  author       = {Yair Amir and
                  Paul Bunn and
                  Rafail Ostrovsky},
  title        = {Authenticated Adversarial Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmirBO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Anderson08,
  author       = {W. Erik Anderson},
  title        = {On the Secure Obfuscation of Deterministic Finite Automata},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Anderson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AraujoR08,
  author       = {Roberto Ara{\'{u}}jo and
                  Peter Y. A. Ryan},
  title        = {Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AraujoR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtS08,
  author       = {Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi},
  title        = {A New Approach for Algebraically Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtalayKK08,
  author       = {Adem Atalay and
                  Orhun Kara and
                  Ferhat Karako{\c{c}}},
  title        = {Improved Cryptanalysis of {SHAMATA-BC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtalayKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBH08,
  author       = {Giuseppe Ateniese and
                  Karyn Benson and
                  Susan Hohenberger},
  title        = {Key-Private Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AteniesePMT08,
  author       = {Giuseppe Ateniese and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Gene Tsudik},
  title        = {Scalable and Efficient Provable Data Possession},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AteniesePMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuSM08,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Yi Mu},
  title        = {Constant-Size Dynamic k-TAA},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonBMNP08,
  author       = {Jean{-}Philippe Aumasson and
                  Eric Brier and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Inside the Hypercube},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonBMNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonMM08,
  author       = {Jean{-}Philippe Aumasson and
                  Willi Meier and
                  Florian Mendel},
  title        = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziHP08,
  author       = {Roberto Maria Avanzi and
                  Clemens Heuberger and
                  Helmut Prodinger},
  title        = {Redundant tau-adic Expansions {I:} Non-Adjacent Digit Sets and their
                  Applications to Scalar Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineT08,
  author       = {Gildas Avoine and
                  Aslan Tchamkerten},
  title        = {An asymptotically optimal {RFID} protocol against relay attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvoineT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesK08,
  author       = {Michael Backes and
                  Boris K{\"{o}}pf},
  title        = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesU08,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {Computational soundness of symbolic zero-knowledge proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSLZ08,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Joseph K. Liu and
                  Jianying Zhou},
  title        = {A New Variant of the Cramer-Shoup {KEM} Secure against Chosen Ciphertext
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheriNS08,
  author       = {Nasour Bagheri and
                  Majid Naderi and
                  Babak Sadeghiyan},
  title        = {Cryptanalysis of {CRUSH} hash structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheriNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangerterCKS008,
  author       = {Endre Bangerter and
                  Jan Camenisch and
                  Stephan Krenn and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  title        = {Automatic Generation of Sound Zero-Knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BangerterCKS008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakM08,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Merkle Puzzles are Optimal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakM08a,
  author       = {Boaz Barak and
                  Mohammad Mahmoody{-}Ghidary},
  title        = {Lower Bounds on Signatures From Symmetric Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakM08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakW08,
  author       = {Boaz Barak and
                  Avi Wigderson},
  title        = {Public Key Cryptography from Different Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/335},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaCBS08,
  author       = {Manuel Barbosa and
                  St{\'{e}}phane Cauchie and
                  Thierry Brouard and
                  Sim{\~{a}}o Melo de Sousa},
  title        = {Secure Biometric Authentication With Improved Accuracy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaCBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaF08,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  title        = {Certificateless Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckT08,
  author       = {Martin Beck and
                  Erik Tews},
  title        = {Practical attacks against {WEP} and {WPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beerliova-TrubiniovaHN08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt and
                  Jesper Buus Nielsen},
  title        = {Almost-Asynchronous {MPC} with Faulty Minority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaHN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeldingBEL08,
  author       = {Juliana Belding and
                  Reinier Br{\"{o}}ker and
                  Andreas Enge and
                  Kristin E. Lauter},
  title        = {Computing Hilbert Class Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeldingBEL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Belenkiy08,
  author       = {Mira Belenkiy},
  title        = {Disjunctive Multi-Level Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Belenkiy08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelenkiyCCKLS08,
  author       = {Mira Belenkiy and
                  Jan Camenisch and
                  Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Hovav Shacham},
  title        = {Delegatable Anonymous Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelenkiyCCKLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareFOR08,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Adam O'Neill and
                  Thomas Ristenpart},
  title        = {Deterministic Encryption: Definitional Equivalences and Constructions
                  without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareFOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR08,
  author       = {Mihir Bellare and
                  Todor Ristov},
  title        = {A Characterization of Chameleon Hash Functions and New, Efficient
                  Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BengerCF08,
  author       = {Naomi Benger and
                  Manuel Charlemagne and
                  David Mandell Freeman},
  title        = {On the security of pairing-friendly Abelian varieties over non-prime
                  fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BengerCF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenjumeaCLY08,
  author       = {Vicente Benjumea and
                  Seung Geol Choi and
                  Javier L{\'{o}}pez and
                  Moti Yung},
  title        = {Fair Traceable Multi-Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenjumeaCLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerbainGS08,
  author       = {C{\^{o}}me Berbain and
                  Aline Gouget and
                  Herv{\'{e}} Sibert},
  title        = {Understanding Phase Shifting Equivalent Keys and Exhaustive Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerbainGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBJLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Marc Joye and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Twisted Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBJLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBLP08,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange and
                  Christiane Peters},
  title        = {{ECM} using Edwards curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCLY08,
  author       = {Daniel J. Bernstein and
                  Tien{-}Ren Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Bo{-}Yin Yang},
  title        = {{ECM} on Graphics Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLF08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Reza Rezaeian Farashahi},
  title        = {Binary Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Attacking and defending the McEliece cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinS08,
  author       = {Daniel J. Bernstein and
                  Peter Schwabe},
  title        = {New {AES} software speed records},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDOR08,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {A Comparison Between Hardware Accelerators for the Modified Tate Pairing
                  over F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\) and F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDOR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaskarCLMVY08,
  author       = {Raghav Bhaskar and
                  K. Chandrasekaran and
                  Satyanarayana V. Lokam and
                  Peter L. Montgomery and
                  Ramarathnam Venkatesan and
                  Yacov Yacobi},
  title        = {On The Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/525},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaskarCLMVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bicakci08,
  author       = {Kemal Bicakci},
  title        = {Optimal Discretization for High-Entropy Graphical Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bicakci08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Billings08,
  author       = {Christopher Billings},
  title        = {The Enigmatique Toolkit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Billings08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BissonS08,
  author       = {Gaetan Bisson and
                  Takakazu Satoh},
  title        = {More Discriminants with the Brezing-Weng Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BissonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blackburn08,
  author       = {Simon R. Blackburn},
  title        = {Cryptanalysing the Critical Group: Efficiently Solving Biggs's Discrete
                  Logarithm Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blackburn08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassKMNS08,
  author       = {Erik{-}Oliver Blass and
                  Anil Kurmus and
                  Refik Molva and
                  Guevara Noubir and
                  Abdullatif Shikfa},
  title        = {The F\({}_{\mbox{f}}\)-Family of Protocols for RFID-Privacy and Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassKMNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovERW08,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Andy Rupp and
                  Christopher Wolf},
  title        = {Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement
                  for Elliptic Curves?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/349},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovERW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovLW08,
  author       = {Dan Bogdanov and
                  Sven Laur and
                  Jan Willemson},
  title        = {Sharemind: a framework for fast privacy-preserving computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/289},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogetoftCDGJKNNNPST08,
  author       = {Peter Bogetoft and
                  Dan Lund Christensen and
                  Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Thomas P. Jakobsen and
                  Mikkel Kr{\o}igaard and
                  Janus Dam Nielsen and
                  Jesper Buus Nielsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Michael I. Schwartzbach and
                  Tomas Toft},
  title        = {Multiparty Computation Goes Live},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogetoftCDGJKNNNPST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaFO08,
  author       = {Alexandra Boldyreva and
                  Serge Fehr and
                  Adam O'Neill},
  title        = {On Notions of Security for Deterministic Encryption, and Efficient
                  Constructions without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaFO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehFKW08,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehFKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersJO08,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Alina Oprea},
  title        = {Proofs of Retrievability: Theory and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersJO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersJO08a,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Alina Oprea},
  title        = {{HAIL:} {A} High-Availability and Integrity Layer for Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersJO08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydCNP08,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  title        = {Efficient One-round Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrickellCL08,
  author       = {Ernie Brickell and
                  Liqun Chen and
                  Jiangtao Li},
  title        = {Simplified Security Notions of Direct Anonymous Attestation and a
                  Concrete Scheme from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/104},
  timestamp    = {Wed, 01 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrickellCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerC08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  title        = {Trusted-HB: a low-cost version of {HB+} secure against Man-in-The-Middle
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI08,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  title        = {Identification and Privacy: Zero-Knowledge is not Enough},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadbentT08,
  author       = {Anne Broadbent and
                  Alain Tapp},
  title        = {Information-Theoretically Secure Voting Without an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadbentT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrokerL08,
  author       = {Reinier Br{\"{o}}ker and
                  Kristin E. Lauter},
  title        = {Modular polynomials for genus 2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrokerL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown08,
  author       = {Daniel R. L. Brown},
  title        = {The Encrypted Elliptic Curve Hash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown08a,
  author       = {Daniel R. L. Brown},
  title        = {Toy Factoring by Newton's Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown08b,
  author       = {Daniel R. L. Brown},
  title        = {User-Sure-and-Safe Key Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown08c,
  author       = {Daniel R. L. Brown},
  title        = {One-Up Problem for {(EC)DSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruekersKKT08,
  author       = {Fons Bruekers and
                  Stefan Katzenbeisser and
                  Klaus Kursawe and
                  Pim Tuyls},
  title        = {Privacy-Preserving Matching of {DNA} Profiles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruekersKKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannL08,
  author       = {Johannes Buchmann and
                  Richard Lindner},
  title        = {Secure Parameters for {SWIFFT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/493},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannLR008,
  author       = {Johannes Buchmann and
                  Richard Lindner and
                  Markus R{\"{u}}ckert and
                  Michael Schneider},
  title        = {Explicit hard instances of the shortest vector problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/333},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannLR008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BulyginB08,
  author       = {Stanislav Bulygin and
                  Michael Brickenstein},
  title        = {Obtaining and solving systems of equations in key variables only for
                  the small variants of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BulyginB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterST08,
  author       = {Mike Burmester and
                  Reihaneh Safavi{-}Naini and
                  Gelareh Taban},
  title        = {Secure Random Key Pre-Distribution Against Semi-Honest Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCS08,
  author       = {Jan Camenisch and
                  Nishanth Chandran and
                  Victor Shoup},
  title        = {A public key encryption scheme secure against key dependent chosen
                  plaintext and adaptive chosen ciphertext attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS08,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Claudio Soriente},
  title        = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
                  Anonymous Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNS08,
  author       = {Jan Camenisch and
                  Gregory Neven and
                  Abhi Shelat},
  title        = {Simulatable Adaptive Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKLP08,
  author       = {Ran Canetti and
                  Ling Cheung and
                  Dilsun Kirli Kaynar and
                  Nancy A. Lynch and
                  Olivier Pereira},
  title        = {Modeling Computational Security in Long-Lived Systems, Version 2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCKLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiEGL08,
  author       = {Ran Canetti and
                  Dror Eiger and
                  Shafi Goldwasser and
                  Dah{-}Yoh Lim},
  title        = {How to Protect Yourself without Perfect Shredding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiEGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiV08,
  author       = {Ran Canetti and
                  Mayank Varia},
  title        = {Non-Malleable Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao08,
  author       = {Zhengjun Cao},
  title        = {How to Launch {A} Birthday Attack Against {DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletF08,
  author       = {Claude Carlet and
                  Keqin Feng},
  title        = {New balanced Boolean functions satisfying all the main cryptographic
                  criteria},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarrijoTIN08,
  author       = {Jos{\'{e}} Carrijo and
                  Rafael Tonicelli and
                  Hideki Imai and
                  Anderson C. A. Nascimento},
  title        = {A Novel Probabilistic Passive Attack on the Protocols {HB} and {HB+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarrijoTIN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKS08,
  author       = {David Cash and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {The Twin Diffie-Hellman Problem and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckGF08,
  author       = {Wouter Castryck and
                  Steven D. Galbraith and
                  Reza Rezaeian Farashahi},
  title        = {Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery
                  representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckGF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cesena08,
  author       = {Emanuele Cesena},
  title        = {Pairing with Supersingular Trace Zero Varieties Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cesena08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranOS08,
  author       = {Nishanth Chandran and
                  Rafail Ostrovsky and
                  William E. Skeith III},
  title        = {Public-Key Encryption with Efficient Amortized Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranOS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangHSL08,
  author       = {Donghoon Chang and
                  Seokhie Hong and
                  Jaechul Sung and
                  Sangjin Lee},
  title        = {Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications
                  based on the Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/460},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangHSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangN08,
  author       = {Donghoon Chang and
                  Mridul Nandi},
  title        = {A Short Proof of the {PRP/PRF} Switching Lemma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangSHL08,
  author       = {Donghoon Chang and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  title        = {Improved Cryptanalysis of {APOP-MD4} and {NMAC-MD4} using New Differential
                  Paths},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/048},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangSHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangSHL08a,
  author       = {Donghoon Chang and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  title        = {Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP,
                  chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/407},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangSHL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangX08,
  author       = {Ee{-}Chien Chang and
                  Jia Xu},
  title        = {Remote Integrity Check with Dishonest Storage Server},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChardinM08,
  author       = {Thomas Chardin and
                  Rapha{\"{e}}l Marinier},
  title        = {Cryptanalysis of the Improved Cellular Message Encryption Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChardinM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCCCDKLY08,
  author       = {Anna Inn{-}Tung Chen and
                  Ming{-}Shing Chen and
                  Tien{-}Ren Chen and
                  Chen{-}Mou Cheng and
                  Jintai Ding and
                  Eric Li{-}Hsiang Kuo and
                  Frost Li and
                  Bo{-}Yin Yang},
  title        = {Small Odd Prime Field Multivariate PKCs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCCCDKLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCDWY08,
  author       = {Chia{-}Hsin Owen Chen and
                  Ming{-}Shing Chen and
                  Jintai Ding and
                  Fabian Werner and
                  Bo{-}Yin Yang},
  title        = {Odd-Char Multivariate Hidden Field Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCDWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHC08,
  author       = {Yalin Chen and
                  Chun{-}Hui Huang and
                  Jue{-}Sam Chou},
  title        = {Comments on two multi-server authentication protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenM08,
  author       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Parsing ambiguities in authentication and key establishment protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/419},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMS08,
  author       = {Zhimin Chen and
                  Sergey Morozov and
                  Patrick Schaumont},
  title        = {A Hardware Interface for Hashing Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/529},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenSHC08,
  author       = {Yalin Chen and
                  Hung{-}Min Sun and
                  Chun{-}Hui Huang and
                  Jue{-}Sam Chou},
  title        = {Comments on two password based protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenSHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheongK08,
  author       = {Kai{-}Yuen Cheong and
                  Takeshi Koshiba},
  title        = {Reducing Complexity Assumptions for Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheongK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesNS08,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Jacques Stern},
  title        = {Linear Bandwidth Naccache-Stern Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowRR08,
  author       = {Sherman S. M. Chow and
                  Volker Roth and
                  Eleanor Gilbert Rieffel},
  title        = {General Certificateless Encryption and Timed-Release Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoyK08,
  author       = {Jiali Choy and
                  Khoongming Khoo},
  title        = {New Applications of Differential Bounds of the {SDS} Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoyK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CookYK08,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  title        = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CookYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronPS08,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Jacques Patarin and
                  Yannick Seurin},
  title        = {The Random Oracle Model and the Ideal Cipher Model are Equivalent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cortez-DuarteRBO08,
  author       = {Nidia Cortez{-}Duarte and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto},
  title        = {A Pipelined Karatsuba-Ofman Multiplier over GF(3\({}^{\mbox{97}}\))
                  Amenable for Pairing Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cortez-DuarteRBO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoullGH08,
  author       = {Scott E. Coull and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Access Controls for Oblivious and Anonymous Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoullGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisNO08,
  author       = {Nicolas T. Courtois and
                  Karsten Nohl and
                  Sean O'Neil},
  title        = {Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic
                  and Oyster Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/166},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisNO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDFPW08,
  author       = {Ronald Cramer and
                  Yevgeniy Dodis and
                  Serge Fehr and
                  Carles Padr{\'{o}} and
                  Daniel Wichs},
  title        = {Detection of Algebraic Manipulation with Applications to Robust Secret
                  Sharing and Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDFPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cremers08,
  author       = {Cas J. F. Cremers},
  title        = {Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking
                  the {NAXOS} Authenticated Key Exchange protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cremers08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DArcoS08,
  author       = {Paolo D'Arco and
                  Alfredo De Santis},
  title        = {From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight
                  {RFID} Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DArcoS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGK08,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  title        = {A correction to "Efficient and Secure Comparison for On-Line Auctions"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGKN08,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen},
  title        = {Asynchronous Multiparty Computation: Theory and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNO08,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  title        = {Essentially Optimal Universally Composable Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT08,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  title        = {Efficient Conversion of Secret-shared Values Between Different Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT08a,
  author       = {Ivan Damg{\aa}rd and
                  Nikos Triandopoulos},
  title        = {Supporting Non-membership Proofs with Bilinear-map Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisG08,
  author       = {George Danezis and
                  Ian Goldberg},
  title        = {Sphinx: {A} Compact and Provably Secure Mix Format},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHMR08,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Extended Access Structures and Their Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHS08,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Flaws in Some Self-Healing Key Distribution Schemes with Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Deng08,
  author       = {Yi Deng},
  title        = {Resettably-Sound Resettable Zero Knowledge Arguments for {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Deng08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeursenR08,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {Attacks on {RFID} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeursenR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeursenR08a,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  title        = {On a New Formal Proof Model for {RFID} Location Privacy (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeursenR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeusajuteB08,
  author       = {Alexandre M. Deusajute and
                  Paulo S. L. M. Barreto},
  title        = {The {SIP} Security Enhanced by Using Pairing-assisted Massey-Omura
                  Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeusajuteB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DichtlMS08,
  author       = {Markus Dichtl and
                  Bernd Meyer and
                  Hermann Seuschek},
  title        = {{SPICE} Simulation of a "Provably Secure" True Random Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DichtlMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiffieL08,
  author       = {Whitfield Diffie and
                  George Ledin},
  title        = {{SMS4} Encryption Algorithm for Wireless Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DiffieL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingYCCC08,
  author       = {Jintai Ding and
                  Bo{-}Yin Yang and
                  Chia{-}Hsin Owen Chen and
                  Ming{-}Shing Chen and
                  Chen{-}Mou Cheng},
  title        = {New Differential-Algebraic Attacks and Reparametrization of Rainbow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingYCCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurS08,
  author       = {Itai Dinur and
                  Adi Shamir},
  title        = {Cube Attacks on Tweakable Black Box Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DocheKS08,
  author       = {Christophe Doche and
                  David R. Kohel and
                  Francesco Sica},
  title        = {Double-Base Number System for Multi-Scalar Multiplications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/388},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DocheKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisW08,
  author       = {Yevgeniy Dodis and
                  Daniel Wichs},
  title        = {Non-Malleable Extractors and Symmetric Key Cryptography from Weak
                  Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyGMN08,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  title        = {Oblivious Transfer based on the McEliece Assumptions\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyGMN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyGMN08a,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  title        = {On the Composability of Statistically Secure Bit Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyGMN08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyMN08,
  author       = {Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  title        = {A {CCA2} Secure Public Key Encryption Scheme Based on the McEliece
                  Assumptions in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyMN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuW08,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Attack on Kang et al.'s Identity-Based Strong Designated Verifier
                  Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dujella08,
  author       = {Andrej Dujella},
  title        = {A variant of Wiener's attack on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dujella08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK08,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks
                  on Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaM08,
  author       = {Saurabh Dutta and
                  Jyotsna Kumar Mandal},
  title        = {An Approach to ensure Information Security through 252-Bit Integrated
                  Encryption System {(IES)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiP08,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak},
  title        = {Leakage-Resilient Cryptography in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EdelP08,
  author       = {Yves Edel and
                  Alexander Pott},
  title        = {A new almost perfect nonlinear function which is not quadratic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EdelP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisenbarthKMPSS08,
  author       = {Thomas Eisenbarth and
                  Timo Kasper and
                  Amir Moradi and
                  Christof Paar and
                  Mahmoud Salmasizadeh and
                  Mohammad T. Manzuri Shalmani},
  title        = {Physical Cryptanalysis of KeeLoq Code Hopping Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EisenbarthKMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/El-HadedyGK08,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {High Performance Implementation of a Public Key Block Cipher - MQQ,
                  for {FPGA} Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/339},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/El-HadedyGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkamchouchiA08,
  author       = {Hassan M. Elkamchouchi and
                  Yasmine Abouelseoud},
  title        = {A New Blind Identity-Based Signature Scheme with Message Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkamchouchiA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkamchouchiA08a,
  author       = {Hassan M. Elkamchouchi and
                  Yasmine Abouelseoud},
  title        = {A New Proxy Identity-Based Signcryption Scheme for Partial Delegation
                  of Signing Rights},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkamchouchiA08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErwayKPT08,
  author       = {C. Christopher Erway and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Charalampos Papamanthou and
                  Roberto Tamassia},
  title        = {Dynamic Provable Data Possession},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ErwayKPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Evain08,
  author       = {Laurent Evain},
  title        = {Knapsack cryptosystems built on NP-hard instances},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Evain08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FangC08,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  title        = {Information Leakage in Optimal Anonymized and Diversified Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FangWRXB08,
  author       = {Liming Fang and
                  Jiandong Wang and
                  Yongjun Ren and
                  Jinyue Xia and
                  Shizhu Bian},
  title        = {Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without
                  {ROM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FangWRXB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FangX08,
  author       = {Liming Fang and
                  Jinyue Xia},
  title        = {Full Security: Fuzzy Identity Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FangX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaugereP08,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  title        = {Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaugereP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fedyukovych08,
  author       = {Vadym Fedyukovych},
  title        = {A strategy for any {DAA} Issuer and an additional verification by
                  a Host},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fedyukovych08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fedyukovych08a,
  author       = {Vadym Fedyukovych},
  title        = {An argument for rank metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fedyukovych08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fedyukovych08b,
  author       = {Vadym Fedyukovych},
  title        = {Argument of knowledge of a bounded error},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fedyukovych08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fedyukovych08c,
  author       = {Vadym Fedyukovych},
  title        = {An argument for Hamiltonicity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fedyukovych08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FedyukovychS08,
  author       = {Vadym Fedyukovych and
                  Vitaliy Sharapov},
  title        = {A protocol for K-multiple substring matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FedyukovychS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerraraGHP08,
  author       = {Anna Lisa Ferrara and
                  Matthew Green and
                  Susan Hohenberger and
                  Michael {\O}stergaard Pedersen},
  title        = {Practical Short Signature Batch Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerraraGHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziN08,
  author       = {Matthias Fitzi and
                  Jesper Buus Nielsen},
  title        = {On the Number of Synchronous Rounds Required for Byzantine Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischmannFG08,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Michael Gorski},
  title        = {Classification of the {SHA-3} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischmannFG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischmannG08,
  author       = {Ewan Fleischmann and
                  Michael Gorski},
  title        = {Some Observations on {SHAMATA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischmannG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer08,
  author       = {Scott R. Fluhrer},
  title        = {Collision Attack on the Waterfall Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Freeman08,
  author       = {David Freeman},
  title        = {A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly
                  Ordinary Abelian Varieties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Freeman08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreemanSS08,
  author       = {David Mandell Freeman and
                  Peter Stevenhagen and
                  Marco Streng},
  title        = {Abelian varieties with prescribed embedding degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FreemanSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuLQL08,
  author       = {Shaojing Fu and
                  Chao Li and
                  Longjiang Qu and
                  Ping Li},
  title        = {Enumeration of Balanced Symmetric Functions over GF(p)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuLQL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKN08,
  author       = {Georg Fuchsbauer and
                  Jonathan Katz and
                  David Naccache},
  title        = {Efficient Rational Secret Sharing in Standard Communication Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerP08,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  title        = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group
                  and Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerP08a,
  author       = {Georg Fuchsbauer and
                  David Pointcheval},
  title        = {Encrypting Proofs on Pairings and Its Application to Anonymity for
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerP08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrP08,
  author       = {Thomas Fuhr and
                  Thomas Peyrin},
  title        = {Cryptanalysis of RadioGatun},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujitaTT08,
  author       = {Ryou Fujita and
                  Kohtaro Tadaki and
                  Shigeo Tsujii},
  title        = {Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security
                  of Multivariate Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujitaTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GajekMPSS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  Olivier Pereira and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  title        = {Universally Composable Security Analysis of {TLS} - Secure Sessions
                  with Handshake and Record Layer Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GajekMPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHM08,
  author       = {Steven D. Galbraith and
                  Michael Harrison and
                  David J. Mireles Morales},
  title        = {Efficient Hyperelliptic Arithmetic using Balanced Representation for
                  Divisors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithL08,
  author       = {Steven D. Galbraith and
                  Xibin Lin},
  title        = {Computing Pairings Using x-Coordinates Only},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithLM08,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  David J. Mireles Morales},
  title        = {Pairings on hyperelliptic curves with a real model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithLS08,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  Michael Scott},
  title        = {Endomorphisms for faster elliptic curve cryptography on a large class
                  of curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithS08,
  author       = {Steven D. Galbraith and
                  Michael Scott},
  title        = {Exponentiation in pairing-friendly groups using homomorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWXT08,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  title        = {Divisible On-line/Off-line Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/447},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWXT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKZ08,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {A Framework for the Sound Specification of Cryptographic Tasks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayWZ08,
  author       = {Juan A. Garay and
                  Daniel Wichs and
                  Hong{-}Sheng Zhou},
  title        = {Somewhat Non-Committing Encryption and Efficient Adaptively Secure
                  Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaudryL08,
  author       = {Pierrick Gaudry and
                  David Lubicz},
  title        = {The arithmetic of characteristic 2 Kummer surfaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaudryL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GebhardtIS08,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  title        = {Computing Almost Exact Probabilities of Differential Hash Collision
                  Paths by Applying Appropriate Stochastic Methods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GebhardtIS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GendrullisNR08,
  author       = {Timo Gendrullis and
                  Martin Novotn{\'{y}} and
                  Andy Rupp},
  title        = {A Real-World Attack Breaking {A5/1} within Hours},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/147},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GendrullisNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroHKR08,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Threshold {RSA} for Dynamic and Ad-Hoc Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroHKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroHKRRW08,
  author       = {Rosario Gennaro and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Tal Rabin and
                  Steffen Reidt and
                  Stephen D. Wolthusen},
  title        = {Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement
                  in MANETs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroHKRRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH08,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Hierarchical Identity Based Encryption with Polynomially Many Levels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryW08,
  author       = {Craig Gentry and
                  Brent Waters},
  title        = {Adaptive Security in Broadcast Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gheorghita08,
  author       = {Marius Oliver Gheorghita},
  title        = {{HENKOS} Cryptanalysis-Related keys attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gheorghita08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  title        = {HB{\#}: Increasing the Security and Efficiency of {HB+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiMK08,
  author       = {Danilo Gligoroski and
                  Smile Markovski and
                  Svein J. Knapskog},
  title        = {Public Key Block Cipher Based on Multivariate Quadratic Quasigroups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GolebiewskiMZZ08,
  author       = {Zbigniew Golebiewski and
                  Krzysztof Majcher and
                  Filip Zag{\'{o}}rski and
                  Marcin Zawada},
  title        = {Practical Attacks on {HB} and {HB+} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GolebiewskiMZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GolicM08,
  author       = {Jovan Dj. Golic and
                  Guglielmo Morgari},
  title        = {Iterative Probabilistic Reconstruction of {RC4} Internal States},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GolicM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Golle08,
  author       = {Philippe Golle},
  title        = {Machine Learning Attacks Against the {ASIRRA} {CAPTCHA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Golle08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonHKL08,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Jonathan Katz and
                  Yehuda Lindell},
  title        = {Complete Fairness in Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonHKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonK08,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Partial Fairness in Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonK08a,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Complete Fairness in Multi-Party Computation Without an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonK08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorskiL08,
  author       = {Michael Gorski and
                  Stefan Lucks},
  title        = {New Related-Key Boomerang Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorskiL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorskiLP08,
  author       = {Michael Gorski and
                  Stefan Lucks and
                  Thomas Peyrin},
  title        = {Slide Attacks on a Class of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorskiLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalS08,
  author       = {Vipul Goyal and
                  Amit Sahai},
  title        = {Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box
                  Simulation Strategy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrabherGP08,
  author       = {Philipp Grabher and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Dan Page},
  title        = {On Software Parallel Implementation of Cryptographic Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrabherGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrasslS08,
  author       = {Markus Grassl and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of an Authentication Scheme Using Truncated Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrasslS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenH08,
  author       = {Matthew Green and
                  Susan Hohenberger},
  title        = {Universally Composable Adaptive Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaGBS08,
  author       = {Anuj Gupta and
                  Prasant Gopal and
                  Piyush Bansal and
                  Kannan Srinathan},
  title        = {Authenticated Byzantine Generals in Dual Failure Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaGBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guttman08,
  author       = {Joshua D. Guttman},
  title        = {Cryptographic Protocol Composition via the Authentication Tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guttman08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerH08,
  author       = {Iftach Haitner and
                  Thomas Holenstein},
  title        = {On the (Im)Possibility of Key Dependent Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviR08,
  author       = {Shai Halevi and
                  Tal Rabin},
  title        = {Degradation and Amplification of Computational Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanGW08,
  author       = {Yiliang Han and
                  Xiaolin Gui and
                  Xu An Wang},
  title        = {Multi-Recipient Signcryption for Secure Wireless Group Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/253},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaK08,
  author       = {Goichiro Hanaoka and
                  Kaoru Kurosawa},
  title        = {Efficient Chosen Ciphertext Secure Public Key Encryption under the
                  Computational Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HankersonKM08,
  author       = {Darrel Hankerson and
                  Koray Karabina and
                  Alfred Menezes},
  title        = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for
                  Elliptic Curves over Binary Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HankersonKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Harris08,
  author       = {David G. Harris},
  title        = {Simultaneous field divisions: an extension of Montgomery's trick},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/199},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Harris08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Harris08a,
  author       = {Sandy Harris},
  title        = {Exploring Cipherspace: Combining stream ciphers and block ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Harris08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HashizumeMC08,
  author       = {Naoki Hashizume and
                  Fumiyuki Momose and
                  Jinhui Chao},
  title        = {On Implementation of {GHS} Attack against Elliptic Curve Cryptosystems
                  over Cubic Extension Fields of Odd Characteristics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HashizumeMC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeningerS08,
  author       = {Nadia Heninger and
                  Hovav Shacham},
  title        = {Reconstructing {RSA} Private Keys from Random Key Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeningerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herranz08,
  author       = {Javier Herranz},
  title        = {Restricted Adaptive Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herranz08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergS08,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  title        = {Robust Combiners for Software Hardening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/150},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergSSC08,
  author       = {Amir Herzberg and
                  Haya Schulmann and
                  Amitabh Saxena and
                  Bruno Crispo},
  title        = {Towards a Theory of White-Box Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/087},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergSSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hess08,
  author       = {Florian Hess},
  title        = {Pairing Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hess08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Heuberger08,
  author       = {Clemens Heuberger},
  title        = {Redundant tau-adic Expansions {II:} Non-Optimality and Chaotic Behaviour},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Heuberger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeubergerM08,
  author       = {Clemens Heuberger and
                  James A. Muir},
  title        = {Unbalanced Digit Sets and the Closest Choice Strategy for Minimal
                  Weight Integer Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeubergerM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HinekJSS08,
  author       = {M. Jason Hinek and
                  Shaoquan Jiang and
                  Reihaneh Safavi{-}Naini and
                  Siamak Fayyaz Shahandashti},
  title        = {Attribute-Based Encryption with Key Cloning Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HinekJSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HisilWCD08,
  author       = {H{\"{u}}seyin Hisil and
                  Kenneth Koon{-}Ho Wong and
                  Gary Carter and
                  Ed Dawson},
  title        = {Twisted Edwards Curves Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HisilWCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HochS08,
  author       = {Jonathan J. Hoch and
                  Adi Shamir},
  title        = {On the Strength of the Concatenated Hash Combiner when All the Hash
                  Functions are Weak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HochS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hofheinz08,
  author       = {Dennis Hofheinz},
  title        = {Possibility and impossibility results for selective decommitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hofheinz08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzW08,
  author       = {Dennis Hofheinz and
                  Enav Weinreb},
  title        = {Searchable encryption with decryption in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hong08,
  author       = {Jin Hong},
  title        = {The Cost of False Alarms in Hellman and Rainbow Tradeoffs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hong08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongJKLM08,
  author       = {Jin Hong and
                  Kyung Chul Jeong and
                  Eun Young Kwon and
                  In{-}Sok Lee and
                  Daegun Ma},
  title        = {Variants of the Distinguished Point Method for Cryptanalytic Time
                  Memory Trade-offs (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongJKLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hosseini-Khayat08,
  author       = {Saied Hosseini{-}Khayat},
  title        = {Using Commutative Encryption to Share a Secret},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hosseini-Khayat08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangC08,
  author       = {Hai Huang and
                  Zhenfu Cao},
  title        = {An ID-based Authenticated Key Exchange Protocol Based on Bilinear
                  Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangC08a,
  author       = {Hai Huang and
                  Zhenfu Cao},
  title        = {Strongly Secure Authenticated Key Exchange Protocol Based on Computational
                  Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangC08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IfteneCG08,
  author       = {Sorin Iftene and
                  {\c{S}}tefan Ciob{\^{a}}c{\u{a}} and
                  Manuela Grindei},
  title        = {Compartmented Threshold {RSA} Based on the Chinese Remainder Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IfteneCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IndesteegeMPR08,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {Collisions and other Non-Random Properties for Step-Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IndesteegeMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonicaJ08,
  author       = {Sorina Ionica and
                  Antoine Joux},
  title        = {Another approach to pairing computation in Edwards coordinates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonicaJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiPS08,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Secure Arithmetic Computation with No Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IvanovV08,
  author       = {P. Ivanov and
                  Jos{\'{e}} Felipe Voloch},
  title        = {Breaking the Akiyama-Goto cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IvanovV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IzbenkoKK08,
  author       = {Yuriy I. Izbenko and
                  Vladyslav Kovtun and
                  Alexandr Kuznetsov},
  title        = {The Design of Boolean Functions by Modified Hill Climbing Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IzbenkoKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerS08,
  author       = {Tibor Jager and
                  J{\"{o}}rg Schwenk},
  title        = {The Generic Hardness of Subset Membership Problems under the Factoring
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jaiyeola08,
  author       = {Temitope Gbolahan Jaiyeola},
  title        = {On Middle Universal Weak and Cross Inverse Property Loops with Equal
                  Lenght of Inveres Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jaiyeola08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jaiyeola08a,
  author       = {Temitope Gbolahan Jaiyeola},
  title        = {On Middle Universal m-Inverse Quasigroups and Their Applications to
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jaiyeola08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaiyeolaA08,
  author       = {Temitope Gbolahan Jaiyeola and
                  John Olushola Adeniran},
  title        = {On a Cryptographic Identity in Osborn Loops},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaiyeolaA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhanwarB08,
  author       = {Mahabir Prasad Jhanwar and
                  Rana Barua},
  title        = {A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/088},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JhanwarB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaWYX08,
  author       = {Keting Jia and
                  Xiaoyun Wang and
                  Zheng Yuan and
                  Guangwu Xu},
  title        = {Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaWYX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangCWWD08,
  author       = {Junjie Jiang and
                  Jing Chen and
                  Jian Wang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  title        = {High Performance Architecture for Elliptic Curve Scalar Multiplication
                  over GF(2\({}^{\mbox{m}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/066},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangCWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinWX08,
  author       = {Haimin Jin and
                  Duncan S. Wong and
                  Yinlong Xu},
  title        = {Complexity Analysis of a Fast Modular Multiexponentiation Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinZDW08,
  author       = {Zhengping Jin and
                  Huijuan Zuo and
                  Hongzhen Du and
                  Qiaoyan Wen},
  title        = {An Efficient and Provably-Secure Identity-based Signcryption Scheme
                  for Multiple PKGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinZDW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxLNT08,
  author       = {Antoine Joux and
                  Reynald Lercier and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  title        = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxLNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsPP08,
  author       = {Ari Juels and
                  Ravikanth Pappu and
                  Bryan Parno},
  title        = {Unidirectional Key Distribution Across Time and Space with Applications
                  to {RFID} Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JungK08,
  author       = {Bae Eun Jung and
                  Hee Jean Kim},
  title        = {On the Chikazawa-Inoue {ID} based key system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JungK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JunodKL08,
  author       = {Pascal Junod and
                  Alexandre Karlov and
                  Arjen K. Lenstra},
  title        = {Improving the Boneh-Franklin Traitor Tracing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JunodKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KanukurthiR08,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  title        = {An Improved Robust Fuzzy Extractor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KanukurthiR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KanukurthiR08a,
  author       = {Bhavana Kanukurthi and
                  Leonid Reyzin},
  title        = {Key Agreement from Close Secrets over Unsecured Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KanukurthiR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarglPS08,
  author       = {Anton Kargl and
                  Stefan Pyka and
                  Hermann Seuschek},
  title        = {Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarglPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaruturiGSC08,
  author       = {Naga Naresh Karuturi and
                  Ragavendran Gopalakrishnan and
                  Rahul Srinivasan and
                  C. Pandu Rangan},
  title        = {Foundations of Group Key Management - Framework, Security Model and
                  a Generic Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaruturiGSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KateZG08,
  author       = {Aniket Kate and
                  Gregory M. Zaverucha and
                  Ian Goldberg},
  title        = {Pairing-Based Onion Routing with Improved Forward Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KateZG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzL08,
  author       = {Jonathan Katz and
                  Yehuda Lindell},
  title        = {Collusion-Free Multiparty Computation in the Mediated Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawazoeT08,
  author       = {Mitsuru Kawazoe and
                  Tetsuya Takahashi},
  title        = {Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type
                  y\({}^{\mbox{2}}\)=x\({}^{\mbox{5}}\)+ax},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/026},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawazoeT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KayaS08,
  author       = {Kamer Kaya and
                  Ali Aydin Sel{\c{c}}uk},
  title        = {Sharing {DSS} by the Chinese Remainder Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KayaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ke08,
  author       = {Pinhui Ke},
  title        = {Improved lower bound on the number of balanced symmetric functions
                  over GF(p)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ke08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khader08,
  author       = {Dalia Khader},
  title        = {Authenticating with Attributes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khader08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhatirM08,
  author       = {Mehrdad Khatir and
                  Amir Moradi},
  title        = {Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhatirM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhazaeiM08,
  author       = {Shahram Khazaei and
                  Willi Meier},
  title        = {New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhazaeiM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhoatT08,
  author       = {Th{\^{a}}n Quang Kho{\'{a}}t and
                  Nguyen Hong Tan},
  title        = {Unique Shortest Vector Problem for max norm is NP-hard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhoatT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhovratovichN08,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic},
  title        = {Cryptanalysis of EnRUPT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhovratovichN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPSY08,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Martijn Stam and
                  Moti Yung},
  title        = {A New Randomness Extraction Paradigm for Hybrid Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzV08,
  author       = {Eike Kiltz and
                  Yevgeniy Vahlis},
  title        = {{CCA2} Secure {IBE:} Standard Model Efficiency through Authenticated
                  Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKHS08,
  author       = {Tae Hyun Kim and
                  Jongsung Kim and
                  Seokhie Hong and
                  Jaechul Sung},
  title        = {Linear and Differential Cryptanalysis of Reduced {SMS4} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimT08,
  author       = {Jihye Kim and
                  Gene Tsudik},
  title        = {Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirtaneR08,
  author       = {Varad Kirtane and
                  C. Pandu Rangan},
  title        = {{RSA-TBOS} Signcryption with Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirtaneR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirtaneR08a,
  author       = {Varad Kirtane and
                  C. Pandu Rangan},
  title        = {Side Channel Attack Resistant Implementation of Multi-Power {RSA}
                  using Hensel Lifting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirtaneR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Klima08,
  author       = {Vlastimil Kl{\'{\i}}ma},
  title        = {On Collisions of Hash Functions Turbo {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Klima08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzKM08,
  author       = {Ann Hibner Koblitz and
                  Neal Koblitz and
                  Alfred Menezes},
  title        = {Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovR08,
  author       = {Vladimir Kolesnikov and
                  Charles Rackoff},
  title        = {Password Mistyping in Two-Factor-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KounavisG08,
  author       = {Michael E. Kounavis and
                  Shay Gueron},
  title        = {Vortex: {A} New Family of One Way Hash Functions based on Rijndael
                  Rounds and Carry-less Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KounavisG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KovtunPK08,
  author       = {Vladyslav Kovtun and
                  Jan Pelzl and
                  Alexandr Kuznetsov},
  title        = {Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems
                  Over Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KovtunPK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KovtunW08,
  author       = {Vladyslav Kovtun and
                  Thomas J. Wollinger},
  title        = {Fast explicit formulae for genus 2 hyperelliptic curves using projective
                  coordinates (Updated)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KovtunW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kumar08,
  author       = {Manoj Kumar},
  title        = {A Secure Remote User Authentication Scheme with Smart Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kumar08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunzlerMR08,
  author       = {Robin K{\"{u}}nzler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominik Raub},
  title        = {Secure Computability of Functions in the {IT} setting with Dishonest
                  Majority and Applications to Long-Term Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunzlerMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KupcuL08,
  author       = {Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Anna Lysyanskaya},
  title        = {Usable Optimistic Fair Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KupcuL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaF08,
  author       = {Kaoru Kurosawa and
                  Jun Furukawa},
  title        = {Universally Composable Undeniable Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaS08,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  title        = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT08,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Joint State Theorems for Public-Key Encryption and Digital Signature
                  Functionalities with Local Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiZ08,
  author       = {Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  title        = {Scratch, Click {\&} Vote: {E2E} voting over the Internet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalK08,
  author       = {Sunder Lal and
                  Prashant Kushwah},
  title        = {Multi-PKG {ID} based signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalK08a,
  author       = {Sunder Lal and
                  Prashant Kushwah},
  title        = {{ID} based generalized signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalK08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalV08,
  author       = {Sunder Lal and
                  Vandani Verma},
  title        = {Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangerSB08,
  author       = {Lucie Langer and
                  Axel Schmidt and
                  Johannes Buchmann},
  title        = {Secure Online Elections in Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/157},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LangerSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudN08,
  author       = {Peeter Laud and
                  Long Ngo},
  title        = {Threshold Homomorphic Encryption in the Universally Composable Cryptographic
                  Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterS08,
  author       = {Kristin E. Lauter and
                  Katherine E. Stange},
  title        = {The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard
                  Problems for Elliptic Divisibility Sequences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Layouni08,
  author       = {Mohamed Layouni},
  title        = {Controlling access to personal data through Accredited Symmetrically
                  Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Layouni08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLP08,
  author       = {Eunjeong Lee and
                  Hyang{-}Sook Lee and
                  Cheol{-}Min Park},
  title        = {Efficient and Generalized Pairing Computation on Abelian Varieties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeP08,
  author       = {Jooyoung Lee and
                  Je Hong Park},
  title        = {Authenticated Key Exchange Secure under the Computational Diffie-Hellman
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeP08a,
  author       = {Jooyoung Lee and
                  Choon Sik Park},
  title        = {An Efficient Authenticated Key Exchange Protocol with a Tight Security
                  Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeP08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeY08,
  author       = {Jooyoung Lee and
                  Yongjin Yeom},
  title        = {Efficient {RFID} authentication protocols based on pseudorandom sequence
                  generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeungNW08,
  author       = {Bert W. Leung and
                  Felix Y. Ng and
                  Duncan S. Wong},
  title        = {On the Security of a Visual Cryptography Scheme for Color Images},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeungNW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentN08,
  author       = {Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  title        = {How Risky is the Random-Oracle Model?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Levin08,
  author       = {Ilya O. Levin},
  title        = {Zcipher Algorithm Specification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Levin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoSW08,
  author       = {Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Revocation Systems with Very Small Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiFLX08,
  author       = {HongDa Li and
                  Dengguo Feng and
                  Bao Li and
                  Haixia Xue},
  title        = {Round-Optimal Zero-Knowledge Proofs of Knowledge for {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/524},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiFLX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiHL08,
  author       = {Yunfeng Li and
                  Dake He and
                  Xianhui Lu},
  title        = {Accountability of Perfect Concurrent Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiK08,
  author       = {Jin Li and
                  Kwangjo Kim},
  title        = {Attribute-Based Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Analysis and Improvement of Authenticatable Ring Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSZL08,
  author       = {Ruilin Li and
                  Bing Sun and
                  Peng Zhang and
                  Chao Li},
  title        = {New Impossible Differential Cryptanalysis of {ARIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/227},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiXG08,
  author       = {Ji Li and
                  Liangyu Xu and
                  Xu Guan},
  title        = {Collision attack on NaSHA-512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/519},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiXG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiY08,
  author       = {Fagen Li and
                  Yong Yu},
  title        = {An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiaoW08,
  author       = {Xin Liao and
                  Qiao{-}Yan Wen},
  title        = {Embedding in Two Least Significant Bits with Wet Paper Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiaoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lifliand08,
  author       = {Michael Lifliand},
  title        = {Shared Key Encryption by the State Machine with Two-Dimensional Random
                  Look-up Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lifliand08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell08,
  author       = {Yehuda Lindell},
  title        = {Efficient Fully-Simulatable Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP08,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {An Efficient Protocol for Secure Two-Party Computation in the Presence
                  of Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP08a,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Multiparty Computation for Privacy-Preserving Data Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa08,
  author       = {Helger Lipmaa},
  title        = {Private Branching Programs: On Communication-Efficient Cryptocomputing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa08a,
  author       = {Helger Lipmaa},
  title        = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBSZ08,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  title        = {Certificate-Based Signature Schemes without Pairings or Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Loebenberger08,
  author       = {Daniel Loebenberger},
  title        = {A Simple Derivation for the Frobenius Pseudoprime Test},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Loebenberger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LogachevN08,
  author       = {Oleg A. Logachev and
                  D. S. Nazarova},
  title        = {Local Affinity Based Inversion of Filter Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LogachevN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Longa08,
  author       = {Patrick Longa},
  title        = {Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems
                  over Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Longa08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaG08,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  title        = {Setting Speed Records with the (Fractional) Multibase Non-Adjacent
                  Form Method for Efficient Elliptic Curve Scalar Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaG08a,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  title        = {Novel Precomputation Schemes for Elliptic Curve Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaG08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaM08,
  author       = {Patrick Longa and
                  Ali Miri},
  title        = {New Composite Operations and Precomputation Scheme for Elliptic Curve
                  Cryptosystems over Prime Fields (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaM08a,
  author       = {Patrick Longa and
                  Ali Miri},
  title        = {New Multibase Non-Adjacent Form Scalar Multiplication and its Application
                  to Elliptic Curve Cryptosystems (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaM08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuDKK08,
  author       = {Jiqiang Lu and
                  Orr Dunkelman and
                  Nathan Keller and
                  Jongsung Kim},
  title        = {New Impossible Differential Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuDKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLH08,
  author       = {Xianhui Lu and
                  Xuejia Lai and
                  Dake He},
  title        = {Improved efficiency of Kiltz07-KEM},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuQ08,
  author       = {Lu Zhao and
                  Qiao{-}Yan Wen},
  title        = {2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence
                  by Either Inserting or Deleting k Symbols within One Period},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/259},
  timestamp    = {Sat, 06 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL08,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lyubashevsky08,
  author       = {Vadim Lyubashevsky},
  title        = {The n\({}^{\mbox{c}}\)-Unique Shortest Vector Problem is Hard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lyubashevsky08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaA08,
  author       = {Chunbo Ma and
                  Jun Ao},
  title        = {Proxy Key Re-encapsulation Mechanism for Group Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaA08a,
  author       = {Chunbo Ma and
                  Jun Ao},
  title        = {Revisit of Group-based Unidirectional Proxy Re-encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaA08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaT08,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {{DISH:} Distributed Self-Healing in Unattended Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaT08a,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {A New Approach to Secure Logging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaceSQ08,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaceSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mahalanobis08,
  author       = {Ayan Mahalanobis},
  title        = {A simple generalization of the ElGamal cryptosystem to non-abelian
                  groups {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mahalanobis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraP08,
  author       = {Subhamoy Maitra and
                  Goutam Paul},
  title        = {Analysis of {RC4} and Proposal of Additional Layers for Better Security
                  Margin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraPR08,
  author       = {Subhamoy Maitra and
                  Goutam Paul and
                  Shashwat Raizada},
  title        = {Some Observations on {HC-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraS08,
  author       = {Subhamoy Maitra and
                  Santanu Sarkar},
  title        = {Revisiting Wiener's Attack - New Weak Keys in {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR08,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR08a,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Complexity of Multiparty Computation Problems: The Case of 2-Party
                  Symmetric Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MallZ08,
  author       = {Daniel Mall and
                  Qing Zhong},
  title        = {Open Source Is Not Enough. Attacking the EC-package of Bouncycastle
                  version 1.x{\_}132},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MallZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Manuel08,
  author       = {St{\'{e}}phane Manuel},
  title        = {Classification and Generation of Disturbance Vectors for Collision
                  Attacks against {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Manuel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisLKBQ08,
  author       = {Mark Manulis and
                  Damien Leroy and
                  Fran{\c{c}}ois Koeune and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  title        = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel
                  at Home},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisLKBQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinPS08,
  author       = {Keith M. Martin and
                  Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {Key Predistribution for Homogeneous Wireless Sensor Networks with
                  Group Deployment of Nodes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MashatanS08,
  author       = {Atefeh Mashatan and
                  Douglas R. Stinson},
  title        = {Recognition in Ad Hoc Pervasive Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MashatanS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MashatanS08a,
  author       = {Atefeh Mashatan and
                  Douglas R. Stinson},
  title        = {A New Message Recognition Protocol for Ad Hoc Pervasive Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MashatanS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MathuriaS08,
  author       = {Anish Mathuria and
                  G. Sriram},
  title        = {New attacks on {ISO} key establishment protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MathuriaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaximovK08,
  author       = {Alexander Maximov and
                  Dmitry Khovratovich},
  title        = {New State Recovery Attack on {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaximovK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MedwedO08,
  author       = {Marcel Medwed and
                  Elisabeth Oswald},
  title        = {Template Attacks on {ECDSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MedwedO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorGH08,
  author       = {Carlos Aguilar Melchor and
                  Philippe Gaborit and
                  Javier Herranz},
  title        = {Additively Homomorphic Encryption with d-Operand Multiplications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelchorGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelPRR08,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  title        = {Analysis of Step-Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelPRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelS08,
  author       = {Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Collisions for Round-Reduced {LAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mesnager08,
  author       = {Sihem Mesnager},
  title        = {A new class of Bent functions in Polynomial Forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mesnager08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MichielsGH08,
  author       = {Wil Michiels and
                  Paul Gorissen and
                  Henk D. L. Hollmann},
  title        = {Cryptanalysis of White-Box Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MichielsGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiltersenNT08,
  author       = {Peter Bro Miltersen and
                  Jesper Buus Nielsen and
                  Nikos Triandopoulos},
  title        = {Privacy-Enhancing First-Price Auctions Using Rational Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiltersenNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedDB08,
  author       = {Mohamed Saied Emam Mohamed and
                  Jintai Ding and
                  Johannes Buchmann},
  title        = {Algebraic Cryptanalysis of {MQQ} Public Key Cryptosystem by MutantXL},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/451},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moody08,
  author       = {Dustin Moody},
  title        = {The Diffie-Hellman problem and generalization of Verheul's theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Moody08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiEPRPSS08,
  author       = {Amir Moradi and
                  Thomas Eisenbarth and
                  Axel Poschmann and
                  Carsten Rolfes and
                  Christof Paar and
                  Mohammad T. Manzuri Shalmani and
                  Mahmoud Salmasizadeh},
  title        = {Information Leakage of Flip-Flops in DPA-Resistant Logic Styles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiEPRPSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiKSS08,
  author       = {Amir Moradi and
                  Mehrdad Khatir and
                  Mahmoud Salmasizadeh and
                  Mohammad T. Manzuri Shalmani},
  title        = {Investigating the DPA-Resistance Property of Charge Recovery Logics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiKSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Morales-Luna08,
  author       = {Guillermo Morales{-}Luna},
  title        = {On differences of quadratic residues},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Morales-Luna08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Morales08,
  author       = {David J. Mireles Morales},
  title        = {An analysis of the infrastructure in real function fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Morales08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Morales08a,
  author       = {David J. Mireles Morales},
  title        = {Cheon's algorithm, pairing inversion and the discrete logarithm problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Morales08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoranS08,
  author       = {Tal Moran and
                  Gil Segev},
  title        = {David and Goliath Commitments: {UC} Computation for Asymmetric Parties
                  Using Tamper-Proof Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoranS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorrisseySW08,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {A Modular Security Analysis of the {TLS} Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorrisseySW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MunillaP08,
  author       = {Jorge Munilla and
                  Alberto Peinado},
  title        = {Attacks on Singelee and Preneel's protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MunillaP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheS08,
  author       = {David Naccache and
                  Igor E. Shparlinski},
  title        = {Divisibility, Smoothness and Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakagamiTOKM08,
  author       = {Hidehiko Nakagami and
                  Ryoichi Teramura and
                  Toshihiro Ohigashi and
                  Hidenori Kuwakado and
                  Masakatu Morii},
  title        = {A Chosen {IV} Attack Using Phase Shifting Equivalent Keys against
                  {DECIM} v2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakagamiTOKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nam08,
  author       = {Junghyun Nam},
  title        = {Infringing and Improving Password Security of a Three-Party Key Exchange
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nam08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi08,
  author       = {Mridul Nandi},
  title        = {Improving upon {HCTR} and matching attacks for Hash-Counter-Hash approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi08a,
  author       = {Mridul Nandi},
  title        = {A Generic Method to Extend Message Space of a Strong Pseudorandom
                  Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi08b,
  author       = {Mridul Nandi},
  title        = {An Efficient SPRP-secure Construction based on Pseudo Random Involution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi08c,
  author       = {Mridul Nandi},
  title        = {Two New Efficient CCA-Secure Online Ciphers: {MHCBC} and {MCBC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorSW08,
  author       = {Moni Naor and
                  Gil Segev and
                  Udi Wieder},
  title        = {History-Independent Cuckoo Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Neven08,
  author       = {Gregory Neven},
  title        = {Efficient Sequential Aggregate Signed Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Neven08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenO08,
  author       = {Jesper Buus Nielsen and
                  Claudio Orlandi},
  title        = {{LEGO} for Two Party Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovV08,
  author       = {Ventzislav Nikov and
                  Marc Vauclair},
  title        = {Yet Another Secure Distance-Bounding Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NoackS08,
  author       = {Andreas Noack and
                  Stefan Spitz},
  title        = {Dynamic Threshold Cryptosystem without Group Manager},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NoackS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaFHKWOI08,
  author       = {Koji Nuida and
                  Satoshi Fujitsu and
                  Manabu Hagiwara and
                  Takashi Kitagawa and
                  Hajime Watanabe and
                  Kazuto Ogawa and
                  Hideki Imai},
  title        = {An improvement of discrete Tardos fingerprinting codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaFHKWOI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OConnor08,
  author       = {Luke O'Connor},
  title        = {Entropy Bounds for Traffic Confirmation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OConnor08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OConnorMNS08,
  author       = {Laura Hitt O'Connor and
                  Gary McGuire and
                  Michael Naehrig and
                  Marco Streng},
  title        = {A {CM} construction for curves of genus 2 with p-rank 1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OConnorMNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OguraU08,
  author       = {Naoki Ogura and
                  Shigenori Uchiyama},
  title        = {Remarks on the Attack of Fouque et al. against the lIC Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OguraU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OngPRV08,
  author       = {Shien Jin Ong and
                  David C. Parkes and
                  Alon Rosen and
                  Salil P. Vadhan},
  title        = {Fairness with an Honest Minority and a Rational Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OngPRV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OsinS08,
  author       = {Denis Osin and
                  Vladimir Shpilrain},
  title        = {Public key encryption and encryption emulation attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OsinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyPV08,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Ivan Visconti},
  title        = {Constant-Round Concurrent Non-Malleable Commitments and Decommitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanD08,
  author       = {Yanbin Pan and
                  Yingpu Deng},
  title        = {Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pandey08,
  author       = {Omkant Pandey},
  title        = {Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pandey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParakhK08,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {A Recursive Threshold Visual Cryptography Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParakhK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pasalic08,
  author       = {Enes Pasalic},
  title        = {Key differentiation attacks on stream ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pasalic08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin08,
  author       = {Jacques Patarin},
  title        = {Generic Attacks for the Xor of k random permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin08a,
  author       = {Jacques Patarin},
  title        = {A Proof of Security in O(2\({}^{\mbox{n}}\)) for the Xor of Two Random
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin08b,
  author       = {Jacques Patarin},
  title        = {Generic Attacks on Feistel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS08,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {Two attacks on a sensor network key distribution scheme of Cheng and
                  Agrawal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSW08,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Combinatorial batch codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCASR08,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  B. V. Ashwinkumar and
                  Kannan Srinathan and
                  C. Pandu Rangan},
  title        = {Perfectly Secure Message Transmission Tolerating Mixed Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCASR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCGR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Madhu Gayatri and
                  C. Pandu Rangan},
  title        = {Efficient Perfectly Reliable and Secure Communication Tolerating Mobile
                  Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCGR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Statistically Reliable and Secure Message Transmission in Directed
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08a,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Round Efficient Unconditionally Secure Multiparty Computation Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08b,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Efficient Asynchronous Byzantine Agreement with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08c,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan},
  title        = {Efficient Asynchronous Multiparty Computation with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR08d,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Unconditionally Secure Multiparty Set Intersection Re-Visited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR08d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCRR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Tal Rabin and
                  C. Pandu Rangan},
  title        = {The Round Complexity of Verifiable Secret Sharing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCRS08,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan and
                  Kannan Srinathan},
  title        = {Unconditionally Reliable and Secure Message Transmission in Undirected
                  Synchronous Networks: Possibility, Feasibility and Optimality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pautot08,
  author       = {Fabrice J. P. R. Pautot},
  title        = {Some Formal Solutions in Side-channel Cryptanalysis - An Introduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pautot08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Peikert08,
  author       = {Chris Peikert},
  title        = {Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Peikert08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitLQ08,
  author       = {Christophe Petit and
                  Kristin E. Lauter and
                  Jean{-}Jacques Quisquater},
  title        = {Full Cryptanalysis of {LPS} and Morgenstern Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/173},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitLQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongO08,
  author       = {Le Trieu Phong and
                  Wakaha Ogata},
  title        = {Blind {HIBE} and its Applications to Identity-Based Blind Signature
                  and Blind Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietroMSST08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Claudio Soriente and
                  Angelo Spognardi and
                  Gene Tsudik},
  title        = {Maximizing data survival in Unattended Wireless Sensor Networks against
                  a focused mobile adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietroMSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PopoveniucS08,
  author       = {Stefan Popoveniuc and
                  Jonathan Stanton},
  title        = {Buying random votes is as hard as buying no-votes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PopoveniucS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrabhakaranR08,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Homomorphic Encryption with {CCA} Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrabhakaranR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Priemuth-SchmidB08,
  author       = {Deike Priemuth{-}Schmid and
                  Alex Biryukov},
  title        = {Slid Pairs in Salsa20 and Trivium},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Priemuth-SchmidB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaiB08,
  author       = {Tapan Rai and
                  Stanislav Bulygin},
  title        = {Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext
                  security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaiB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ramkumar08,
  author       = {Mahalingam Ramkumar},
  title        = {Efficient Key Distribution Schemes for Large Scale Mobile Computing
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ramkumar08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj08,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex
                  Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj08a,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Non-Cyclic Subgroups of Jacobians of Genus Two Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj08b,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Generators of Jacobians of Genus Two Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RistenpartS08,
  author       = {Thomas Ristenpart and
                  Thomas Shrimpton},
  title        = {How to Build a Hash Function from any Collision-Resistant Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RistenpartS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivainDP08,
  author       = {Matthieu Rivain and
                  Emmanuelle Dottax and
                  Emmanuel Prouff},
  title        = {Block Ciphers Implementations Provably Secure Against Second Order
                  Side Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/021},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivainDP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rjasko08,
  author       = {Michal Rjasko},
  title        = {Properties of Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rjasko08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RosenS08,
  author       = {Alon Rosen and
                  Gil Segev},
  title        = {Chosen-Ciphertext Security via Correlated Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RosenS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RosenS08a,
  author       = {Alon Rosen and
                  Gil Segev},
  title        = {Efficient Lossy Trapdoor Functions based on the Composite Residuosity
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RosenS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rostovtsev08,
  author       = {Alexander Rostovtsev},
  title        = {Imaginary quadratic orders with given prime factor of class number},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rostovtsev08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rostovtsev08a,
  author       = {Alexander Rostovtsev},
  title        = {Linear equivalence between elliptic curves in Weierstrass and Hesse
                  form},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rostovtsev08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ruckert08,
  author       = {Markus R{\"{u}}ckert},
  title        = {Lattice-based Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ruckert08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/S08,
  author       = {Anoop M. S.},
  title        = {Security needs in embedded systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/S08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SKR08,
  author       = {Chandrasekar S. and
                  Ambika K. and
                  C. Pandu Rangan},
  title        = {Signcryption with Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sadeghi008,
  author       = {Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  title        = {Generalized Universal Circuits for Secure Evaluation of Private Functions
                  with Application to Data Classification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sadeghi008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid08,
  author       = {Gideon Samid},
  title        = {Encryption-On-Demand: Practical and Theoretical Considerations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS08,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {Attacking Reduced Round {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS08a,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {Non-Linear Reduced Round Attacks Against {SHA-2} Hash family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS08b,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {Searching for Low Weight Codewords in Linear Binary Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS08c,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {New Collision attacks Against Up To 24-step {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS08d,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {A Combinatorial Analysis of Recent Attacks on Step Reduced {SHA-2}
                  Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS08d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS08e,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {A New Hash Family Obtained by Modifying the {SHA-2} Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS08e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar08,
  author       = {Palash Sarkar},
  title        = {Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar08a,
  author       = {Palash Sarkar},
  title        = {A New Multi-Linear Universal Hash Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarMS08,
  author       = {Santanu Sarkar and
                  Subhamoy Maitra and
                  Sumanta Sarkar},
  title        = {{RSA} Cryptanalysis with Increased Bounds on the Secret Exponent using
                  Less Lattice Dimension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SatoOO08,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {Strongly Unforgeable ID-based Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SatoOO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Satoh08,
  author       = {Takakazu Satoh},
  title        = {Generating genus two hyperelliptic curves over large characteristic
                  finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Satoh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaWP08,
  author       = {Amitabh Saxena and
                  Brecht Wyseur and
                  Bart Preneel},
  title        = {White-Box Cryptography: Formal Notions and (Im)possibility Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaxenaWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ScottBCPK08,
  author       = {Michael Scott and
                  Naomi Benger and
                  Manuel Charlemagne and
                  Luis J. Dominguez Perez and
                  Ezekiel J. Kachisa},
  title        = {On the final exponentiation for calculating pairings on ordinary elliptic
                  curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ScottBCPK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ScottBCPK08a,
  author       = {Michael Scott and
                  Naomi Benger and
                  Manuel Charlemagne and
                  Luis J. Dominguez Perez and
                  Ezekiel J. Kachisa},
  title        = {Fast hashing to {G2} on pairing friendly curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ScottBCPK08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVGKR08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Ragavendran Gopalakrishnan and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan},
  title        = {Provably Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVGKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVGKR08a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Ragavendran Gopalakrishnan and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan},
  title        = {On the Provable Security of Multi-Receiver Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVGKR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVJC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Neha Jain and
                  C. Pandu Rangan},
  title        = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVJC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVKGC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Naga Naresh Karuturi and
                  Ragavendran Gopalakrishnan and
                  C. Pandu Rangan},
  title        = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption {(IBBSC)}
                  Scheme for Wireless Ad-hoc Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVKGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVSC08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Rahul Srinivasan and
                  C. Pandu Rangan},
  title        = {An Efficient Identity-Based Signcryption Scheme for Multiple Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Semaev08,
  author       = {Igor A. Semaev},
  title        = {New hash function designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Semaev08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeoHH08,
  author       = {Seog Chung Seo and
                  Dong{-}Guk Han and
                  Seokhie Hong},
  title        = {TinyECCK: Efficient Elliptic Curve Cryptography Implementation over
                  GF(2\({}^{\mbox{m}}\)) on 8-bit MICAz Mote},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeoHH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShachamW08,
  author       = {Hovav Shacham and
                  Brent Waters},
  title        = {Compact Proofs of Retrievability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShachamW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShahSB08,
  author       = {Mehul A. Shah and
                  Ram Swaminathan and
                  Mary Baker},
  title        = {Privacy-Preserving Audit and Extraction of Digital Contents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShahSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SharmaG08,
  author       = {Deepmala Sharma and
                  Sugata Gangopadhyay},
  title        = {On Kasami Bent Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SharmaG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenSW08,
  author       = {Emily Shen and
                  Elaine Shi and
                  Brent Waters},
  title        = {Predicate Privacy in Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiW08,
  author       = {Elaine Shi and
                  Brent Waters},
  title        = {Delegating Capabilities in Predicate Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinKI08,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Hideki Imai},
  title        = {A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinKI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShipseyS08,
  author       = {Rachel Shipsey and
                  Christine Swart},
  title        = {Elliptic divisibility sequences and the elliptic curve discrete logarithm
                  problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShipseyS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricOVS08,
  author       = {Boris Skoric and
                  Chibuzo Obi and
                  Evgeny A. Verbitskiy and
                  Berry Schoenmakers},
  title        = {Sharp lower bounds on the extractable randomness from non-uniform
                  sources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkoricOVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sotakova08,
  author       = {Miroslava Sot{\'{a}}kov{\'{a}}},
  title        = {Breaking One-Round Key-Agreement Protocols in the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sotakova08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrinathanPCR08,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Unconditionally Reliable Message Transmission in Directed Hypergraphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrinathanPCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrinathanPCR08a,
  author       = {Kannan Srinathan and
                  Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Unconditionally Secure Message Transmission in Arbitrary Directed
                  Synchronous Networks Tolerating Generalized Mixed Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrinathanPCR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stachowiak08,
  author       = {Grzegorz Stachowiak},
  title        = {Proofs of Knowledge with Several Challenge Values},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stachowiak08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stam08,
  author       = {Martijn Stam},
  title        = {Blockcipher Based Hashing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stam08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertBMV08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Philippe Bulens and
                  Giacomo de Meulenaer and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Improving the Rules of the {DPA} Contest},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertBMV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaUS08,
  author       = {Douglas Stebila and
                  Poornaprajna Udupi and
                  Sheueling Chang Shantz},
  title        = {Multi-Factor Password-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaUS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuLM08,
  author       = {Zhitu Su and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Polynomials for Ate Pairing and Ate\({}_{\mbox{i}}\) Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/202},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SuLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sullivan08,
  author       = {Nicholas T. Sullivan},
  title        = {Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sullivan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLCY08,
  author       = {Xun Sun and
                  Jianhua Li and
                  Gongliang Chen and
                  Shutang Yang},
  title        = {Identity-Based Directed Signature Scheme from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/305},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLCY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunTW08,
  author       = {Hung{-}Min Sun and
                  Wei{-}Chih Ting and
                  King{-}Hang Wang},
  title        = {On the Security of Chien's Ultralightweight {RFID} Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunWSGW08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Ron Steinfeld and
                  Jian Guo and
                  Huaxiong Wang},
  title        = {Cryptanalysis of Short Exponent {RSA} with Primes Sharing Least Significant
                  Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunWSGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunZ08,
  author       = {Yinxia Sun and
                  Futai Zhang},
  title        = {Secure Certificateless Public Key Encryption without Redundancy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangPLYW08,
  author       = {Chunming Tang and
                  Dingyi Pei and
                  Zhuojun Liu and
                  Zheng{-}an Yao and
                  Mingsheng Wang},
  title        = {Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way
                  Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/034},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangPLYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ThandraMB08,
  author       = {Prasanth Kumar Thandra and
                  S. A. V. Satya Murty and
                  R. Balasubramanian},
  title        = {Weaknesses in {HENKOS} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ThandraMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Thomsen08,
  author       = {S{\o}ren S. Thomsen},
  title        = {An improved preimage attack on {MD2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Thomsen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TianW08,
  author       = {Yuan Tian and
                  Ying Wang},
  title        = {GUC-Secure Set-Intersection Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TianW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsujiiTF08,
  author       = {Shigeo Tsujii and
                  Kohtaro Tadaki and
                  Ryou Fujita},
  title        = {Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate
                  Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsujiiTF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Varnovsky08,
  author       = {Nick Varnovsky},
  title        = {Provable Security of Digital Signatures in the Tamper-Proof Device
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Varnovsky08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VascoHS08,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Florian Hess and
                  Rainer Steinwandt},
  title        = {Combined (identity-based) public key schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/466},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VascoHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VasishtaGGBMPSK08,
  author       = {Pranav K. Vasishta and
                  Anuj Gupta and
                  Prasant Gopal and
                  Piyush Bansal and
                  Rishabh Mukherjee and
                  M. Poornima and
                  Kannan Srinathan and
                  Kishore Kothapalli},
  title        = {How Far Must You See To Hear Reliably},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VasishtaGGBMPSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vercauteren08,
  author       = {Frederik Vercauteren},
  title        = {Optimal Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vercauteren08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vercauteren08a,
  author       = {Frederik Vercauteren},
  title        = {The Hidden Root Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vercauteren08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Verma08,
  author       = {Girraj Kumar Verma},
  title        = {Blind Signature Scheme over Braid Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Verma08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Verma08a,
  author       = {Girraj Kumar Verma},
  title        = {New ID-based Fair Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Verma08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Verma08b,
  author       = {Girraj Kumar Verma},
  title        = {A Proxy Signature Scheme over Braid Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Verma08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vielhaber08,
  author       = {Michael Vielhaber},
  title        = {TRIVIUM's output partially autocancels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vielhaber08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang08,
  author       = {Bin Wang},
  title        = {A non-interactive deniable authentication scheme based on designated
                  verifier proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang08a,
  author       = {Shuhong Wang},
  title        = {The Multireceiver Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang08b,
  author       = {Bin Wang},
  title        = {A new identity based proxy signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang08d,
  author       = {Bin Wang},
  title        = {A non-delegatable identity-based strong designated verifier signature
                  scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang08d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCCW08,
  author       = {Shengbao Wang and
                  Zhenfu Cao and
                  Kim{-}Kwang Raymond Choo and
                  Lihua Wang},
  title        = {Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangFH08,
  author       = {Yongjuan Wang and
                  Shuqin Fan and
                  Wenbao Han},
  title        = {New construction of Boolean functions with maximun algebraic immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangFH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangFWZ08,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu and
                  Liting Zhang},
  title        = {On the Correctness of An Approach Against Side-channel attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangFWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangS08,
  author       = {Shuhong Wang and
                  Reihaneh Safavi{-}Naini},
  title        = {New Results on Unconditionally Secure Multireceiver Manual Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYH08,
  author       = {Xu An Wang and
                  Xiaoyuan Yang and
                  Yiliang Han},
  title        = {On Security Notions for Verifiable Encrypted Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/098},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYL08,
  author       = {Xu An Wang and
                  Xiaoyuan Yang and
                  Fagen Li},
  title        = {On the Role of {PKG} for Proxy Re-encryption in Identity Based Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/410},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ08,
  author       = {Fengjiao Wang and
                  Yuqing Zhang},
  title        = {Cryptanalysis of a client-to-client password-authenticated key agreement
                  protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters08,
  author       = {Brent Waters},
  title        = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient,
                  and Provably Secure Realization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengDLCLW08,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Shengli Liu and
                  Kefei Chen and
                  Junzuo Lai and
                  Xu An Wang},
  title        = {Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/509},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengDLCLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wooding08,
  author       = {Mark Wooding},
  title        = {New proofs for old modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wooding08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuD08,
  author       = {Yongdong Wu and
                  Robert H. Deng},
  title        = {On the Security of Fully Collusion Resistant Traitor Tracing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuFW08,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu},
  title        = {Cryptanalysis of the Hash Function {LUX-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/520},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuFW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuS08,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  title        = {On The Security of The ElGamal Encryption Scheme and Damgard's Variant},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuS08a,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  title        = {How To Ensure Forward and Backward Untraceability of {RFID} Identification
                  Schemes By Using {A} Robust {PRBG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wullschleger08,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Oblivious Transfer from Weak Noisy Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wullschleger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiaWFRB08,
  author       = {Jinyue Xia and
                  Jiandong Wang and
                  Liming Fang and
                  Yongjun Ren and
                  Shizhu Bian},
  title        = {Formal Proof of Relative Strengths of Security between {ECK2007} Model
                  and other Proof Models for Key Agreement Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiaWFRB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XieFL08,
  author       = {Tao Xie and
                  Dengguo Feng and
                  Fanbao Liu},
  title        = {A New Collision Differential For {MD5} With Its Full Differential
                  Path},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XieFL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XieLF08,
  author       = {Tao Xie and
                  Fanbao Liu and
                  Dengguo Feng},
  title        = {Could The 1-MSB Input Difference Be The Fastest Collision Attack For
                  {MD5} ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XieLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu08,
  author       = {ZiJie Xu},
  title        = {Dynamic {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuL08,
  author       = {Liangyu Xu and
                  Ji Li},
  title        = {Semi-free start collision attack on Blender},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yacobi08,
  author       = {Yacov Yacobi},
  title        = {On the economic payoff of forensic systems when used to trace Counterfeited
                  Software and content},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yacobi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangCD08,
  author       = {Piyi Yang and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Fuzzy Identity Based Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanJWW08,
  author       = {Zheng Yuan and
                  Keting Jia and
                  Wei Wang and
                  Xiaoyun Wang},
  title        = {Distinguishing and Forgery Attacks on Alred and Its AES-based Instance
                  Alpha-MAC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuanJWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zajac08,
  author       = {Pavol Zajac},
  title        = {Remarks on the {NFS} complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zajac08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaKW08,
  author       = {Zhengbang Zha and
                  Gohar M. M. Kyureghyan and
                  Xueli Wang},
  title        = {A New Family of Perfect Nonlinear Binomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang08,
  author       = {Fangguo Zhang},
  title        = {Twisted Ate Pairing on Hyperelliptic Curves and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang08a,
  author       = {Yu Zhang},
  title        = {The computational {SLR:} a logic for reasoning about computational
                  indistinguishability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoXZZC08,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Jingwei Zhang and
                  Binglong Chen},
  title        = {Computing Bilinear Pairings on Elliptic Curves with Automorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/209},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoXZZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoY08,
  author       = {Wei Zhao and
                  Dingfeng Ye},
  title        = {Modified Huang-Wang's Convertible Nominative Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {All Pairings Are in a Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZX08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Reducing the Complexity of the Weil Pairing Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengLMCL08,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Changshe Ma and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Democratic Group Signatures with Threshold Traceability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuZW08,
  author       = {Zhenchao Zhu and
                  Yuqing Zhang and
                  Fengjiao Wang},
  title        = {An Efficient Identity-based Ring Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuZZC08,
  author       = {Bo Zhu and
                  Yanfei Zheng and
                  Yaowei Zhou and
                  Kefei Chen},
  title        = {Cryptanalysis of {LU} Decomposition-based Key Pre-distribution Scheme
                  for Wireless Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuZZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/suLM08,
  author       = {Zhitu Su and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/008},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/suLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengL08,
  title        = {On Resettably-Sound Resttable Zero Knowledege Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengWW08,
  title        = {Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass
                  Form},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuLS08,
  title        = {Enumeration of Homogeneous Rotation Symmetric functions over GF(p)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuLS08a,
  title        = {Construction of Resilient Functions with Multiple Cryptographic Criteria},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuLS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongLC08,
  title        = {On the Design of Secure and Fast Double Block Length Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuZ08,
  title        = {An Efficient ID-based Ring Signature Scheme from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanHZCC08,
  title        = {A Tamper-Evident Voting Machine Resistant to Covert Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanHZCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HashimotoS08,
  title        = {On construction of signature schemes based on birational permutations
                  over noncommutative rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HashimotoS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongKKPC08,
  title        = {Privacy Preserving Multiset Union with ElGamal Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongKKPC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsmailR08,
  title        = {Elliptic Curves Scalar Multiplication Combining Multi-base Number
                  Representation with Point halving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsmailR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KasiviswanathanS08,
  title        = {A Note on Differential Privacy: Defining Resistance to Arbitrary Side
                  Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KasiviswanathanS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLH08a,
  title        = {Chosen ciphertext secure public key encryption under {DDH} assumption
                  with short ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLH08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Milleville08,
  title        = {Analysis and Details of the Random Cipher Output Mode Of Operation
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Milleville08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MondalMP08,
  title        = {A Framework for the Development Playfair Cipher Considering Probability
                  of Occurrence of Characters in English Literature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MondalMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCAR08,
  title        = {Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCAR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCSR08,
  title        = {On Communication Complexity of Perfectly Reliable and Secure Communication
                  in Directed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCSR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviV08,
  title        = {cryptanalysis and Improvement of a Recently Proposed Remote User Authentication
                  Scheme Using Smart Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoXC08,
  title        = {Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection,
                  and {CCA} Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoXC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLWLL08,
  title        = {Impossible Differential Cryptanalysis of {CLEFIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLWLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vijayarangan08,
  title        = {A New Hash Algorithm: Khichidi-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vijayarangan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang08c,
  title        = {On DDos Attack against Proxy in Re-encryption and Re-signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhyteHHPSH08,
  title        = {{IEEE} {P1363.1} Draft 10: Draft Standard for Public Key Cryptographic
                  Techniques Based on Hard Problems over Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhyteHHPSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XueF08,
  title        = {Injective Trapdoor Functions are Necessary and Sufficient for {CCA2}
                  Secure Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XueF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouH08,
  title        = {{BGKM:} An Efficient Secure Broadcasting Group Key Management Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL08,
  title        = {The Walsh Spectrum of a New Family of {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2008},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2008/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics