:facetid:toc:\"db/journals/iacr/iacr2011.bht\"OK:facetid:toc:db/journals/iacr/iacr2011.bhtFarzaneh AbazariBabak SadeghianCryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT.IACR Cryptol. ePrint Arch.2011222011Informal and Other Publicationsopenjournals/iacr/AbazariS11http://eprint.iacr.org/2011/022https://dblp.org/rec/journals/iacr/AbazariS11URL#4758363Imran AbbasiMehreen AfzalA Compact S-Box Design for SMS4 Block Cipher.IACR Cryptol. ePrint Arch.20115222011Informal and Other Publicationsopenjournals/iacr/AbbasiA11http://eprint.iacr.org/2011/522https://dblp.org/rec/journals/iacr/AbbasiA11URL#4758364Mohamed Ahmed AbdelraheemCéline BlondeauMaría Naya-PlasenciaMarion VideauErik ZennerCryptanalysis of ARMADILLO2.IACR Cryptol. ePrint Arch.20111602011Informal and Other Publicationsopenjournals/iacr/AbdelraheemBNVZ11http://eprint.iacr.org/2011/160https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11URL#4758365Mohamed Ahmed AbdelraheemJulia BorghoffErik ZennerCryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version.IACR Cryptol. ePrint Arch.20112622011Informal and Other Publicationsopenjournals/iacr/AbdelraheemBZ11http://eprint.iacr.org/2011/262https://dblp.org/rec/journals/iacr/AbdelraheemBZ11URL#4758366Tolga AcarKristin E. LauterMichael NaehrigDaniel ShumowAffine Pairings on ARM.IACR Cryptol. ePrint Arch.20112432011Informal and Other Publicationsopenjournals/iacr/AcarLNS11http://eprint.iacr.org/2011/243https://dblp.org/rec/journals/iacr/AcarLNS11URL#4758367Shweta AgrawalXavier BoyenVinod VaikuntanathanPanagiotis VoulgarisHoeteck WeeFuzzy Identity Based Encryption from Lattices.IACR Cryptol. ePrint Arch.20114142011Informal and Other Publicationsopenjournals/iacr/AgrawalBVVW11http://eprint.iacr.org/2011/414https://dblp.org/rec/journals/iacr/AgrawalBVVW11URL#4758368Shweta AgrawalDavid Mandell FreemanVinod VaikuntanathanFunctional Encryption for Inner Product Predicates from Learning with Errors.IACR Cryptol. ePrint Arch.20114102011Informal and Other Publicationsopenjournals/iacr/AgrawalFV11http://eprint.iacr.org/2011/410https://dblp.org/rec/journals/iacr/AgrawalFV11URL#4758369Shashank AgrawalAbhinav MehtaKannan SrinathanSecure Message Transmission In Asynchronous Directed Networks.IACR Cryptol. ePrint Arch.2011132011Informal and Other Publicationsopenjournals/iacr/AgrawalMS11http://eprint.iacr.org/2011/013https://dblp.org/rec/journals/iacr/AgrawalMS11URL#4758370Shashank AgrawalAbhinav MehtaKannan SrinathanUnconditionally Reliable Message Transmission in Directed Neighbour Networks.IACR Cryptol. ePrint Arch.2011142011Informal and Other Publicationsopenjournals/iacr/AgrawalMS11ahttp://eprint.iacr.org/2011/014https://dblp.org/rec/journals/iacr/AgrawalMS11aURL#4758371Martin ÅgrenSome Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64.IACR Cryptol. ePrint Arch.20111402011Informal and Other Publicationsopenjournals/iacr/Agren11http://eprint.iacr.org/2011/140https://dblp.org/rec/journals/iacr/Agren11URL#4758372Martin ÅgrenThomas Johansson 0001Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere.IACR Cryptol. ePrint Arch.20114232011Informal and Other Publicationsopenjournals/iacr/AgrenJ11http://eprint.iacr.org/2011/423https://dblp.org/rec/journals/iacr/AgrenJ11URL#4758373Junaid Jameel AhmadShujun LiAhmad-Reza SadeghiThomas Schneider 0003CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.IACR Cryptol. ePrint Arch.20116792011Informal and Other Publicationsopenjournals/iacr/AhmadLSS11http://eprint.iacr.org/2011/679https://dblp.org/rec/journals/iacr/AhmadLSS11URL#4758374Omran AhmadiRobert GrangerOn isogeny classes of Edwards curves over finite fields.IACR Cryptol. ePrint Arch.20111352011Informal and Other Publicationsopenjournals/iacr/AhmadiG11http://eprint.iacr.org/2011/135https://dblp.org/rec/journals/iacr/AhmadiG11URL#4758375Omran AhmadiRobert GrangerAn efficient deterministic test for Kloosterman sum zeros.IACR Cryptol. ePrint Arch.20111992011Informal and Other Publicationsopenjournals/iacr/AhmadiG11ahttp://eprint.iacr.org/2011/199https://dblp.org/rec/journals/iacr/AhmadiG11aURL#4758376Hadi AhmadiReihaneh Safavi-NainiSecret Keys from Channel Noise.IACR Cryptol. ePrint Arch.2011632011Informal and Other Publicationsopenjournals/iacr/AhmadiS11http://eprint.iacr.org/2011/063https://dblp.org/rec/journals/iacr/AhmadiS11URL#4758377Hadi AhmadiReihaneh Safavi-NainiCommon Randomness and Secret Key Capacities of Two-way Channels.IACR Cryptol. ePrint Arch.20111062011Informal and Other Publicationsopenjournals/iacr/AhmadiS11ahttp://eprint.iacr.org/2011/106https://dblp.org/rec/journals/iacr/AhmadiS11aURL#4758378Naveed Ahmed 0005Christian Damsgaard JensenErik ZennerPrivate-key Symbolic Encryption.IACR Cryptol. ePrint Arch.20115642011Informal and Other Publicationsopenjournals/iacr/AhmedJZ11http://eprint.iacr.org/2011/564https://dblp.org/rec/journals/iacr/AhmedJZ11URL#4758379Jae Hyun AhnDan BonehJan CamenischSusan HohenbergerAbhi ShelatBrent WatersComputing on Authenticated Data.IACR Cryptol. ePrint Arch.2011962011Informal and Other Publicationsopenjournals/iacr/AhnBCHSW11http://eprint.iacr.org/2011/096https://dblp.org/rec/journals/iacr/AhnBCHSW11URL#4758380Laila El AimaniGeneric Constructions for Verifiable Signcryption.IACR Cryptol. ePrint Arch.20115922011Informal and Other Publicationsopenjournals/iacr/Aimani11http://eprint.iacr.org/2011/592https://dblp.org/rec/journals/iacr/Aimani11URL#4758381Joseph A. AkinyeleMatthew Green 0001Aviel D. RubinCharm: A framework for Rapidly Prototyping Cryptosystems.IACR Cryptol. ePrint Arch.20116172011Informal and Other Publicationsopenjournals/iacr/AkinyeleGR11http://eprint.iacr.org/2011/617https://dblp.org/rec/journals/iacr/AkinyeleGR11URL#4758382Saif Al-KuwariJames H. DavenportRussell J. BradfordCryptographic Hash Functions: Recent Design Trends and Security Notions.IACR Cryptol. ePrint Arch.20115652011Informal and Other Publicationsopenjournals/iacr/Al-KuwariDB11http://eprint.iacr.org/2011/565https://dblp.org/rec/journals/iacr/Al-KuwariDB11URL#4758383Martin R. AlbrechtCarlos CidCold Boot Key Recovery by Solving Polynomial Systems with Noise.IACR Cryptol. ePrint Arch.2011382011Informal and Other Publicationsopenjournals/iacr/AlbrechtC11http://eprint.iacr.org/2011/038https://dblp.org/rec/journals/iacr/AlbrechtC11URL#4758384Martin R. AlbrechtCarlos CidJean-Charles FaugèreLudovic PerretOn the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms.IACR Cryptol. ePrint Arch.20111642011Informal and Other Publicationsopenjournals/iacr/AlbrechtCFP11http://eprint.iacr.org/2011/164https://dblp.org/rec/journals/iacr/AlbrechtCFP11URL#4758385Martin R. AlbrechtPooya FarshimJean-Charles FaugèreLudovic PerretPolly Cracker, Revisited.IACR Cryptol. ePrint Arch.20112892011Informal and Other Publicationsopenjournals/iacr/AlbrechtFFP11http://eprint.iacr.org/2011/289https://dblp.org/rec/journals/iacr/AlbrechtFFP11URL#4758386Martin R. AlbrechtPooya FarshimKenneth G. PatersonGaven J. WatsonOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model.IACR Cryptol. ePrint Arch.20112132011Informal and Other Publicationsopenjournals/iacr/AlbrechtFPW11http://eprint.iacr.org/2011/213https://dblp.org/rec/journals/iacr/AlbrechtFPW11URL#4758387A. N. AlekseychukL. V. KovalchukTowards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis.IACR Cryptol. ePrint Arch.20114892011Informal and Other Publicationsopenjournals/iacr/AlekseychukK11http://eprint.iacr.org/2011/489https://dblp.org/rec/journals/iacr/AlekseychukK11URL#4758388Javad AlizadehAbdolrasoul MirghadriA New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions.IACR Cryptol. ePrint Arch.20115502011Informal and Other Publicationsopenjournals/iacr/AlizadehM11http://eprint.iacr.org/2011/550https://dblp.org/rec/journals/iacr/AlizadehM11URL#4758389Joël AlwenJonathan KatzUeli MaurerVassilis ZikasCollusion-Preserving Computation.IACR Cryptol. ePrint Arch.20114332011Informal and Other Publicationsopenjournals/iacr/AlwenKMZ11http://eprint.iacr.org/2011/433https://dblp.org/rec/journals/iacr/AlwenKMZ11URL#4758390Antoine AmarilliSascha Müller 0003David NaccacheDaniel PagePablo RauzyMichael TunstallCan Code Polymorphism Limit Information Leakage?IACR Cryptol. ePrint Arch.2011992011Informal and Other Publicationsopenjournals/iacr/AmarilliMNPRT11http://eprint.iacr.org/2011/099https://dblp.org/rec/journals/iacr/AmarilliMNPRT11URL#4758391Antoine AmarilliDavid NaccachePablo RauzyEmil SimionCan a Program Reverse-Engineer Itself?IACR Cryptol. ePrint Arch.20114972011Informal and Other Publicationsopenjournals/iacr/AmarilliNRS11http://eprint.iacr.org/2011/497https://dblp.org/rec/journals/iacr/AmarilliNRS11URL#4758392Elena Andreeva 0001Atul LuykxBart MenninkProvable Security of BLAKE with Non-Ideal Compression Function.IACR Cryptol. ePrint Arch.20116202011Informal and Other Publicationsopenjournals/iacr/AndreevaLM11http://eprint.iacr.org/2011/620https://dblp.org/rec/journals/iacr/AndreevaLM11URL#4758393Elena Andreeva 0001Bart MenninkBart PreneelThe Parazoa Family: Generalizing the Sponge Hash Functions.IACR Cryptol. ePrint Arch.2011282011Informal and Other Publicationsopenjournals/iacr/AndreevaMP11http://eprint.iacr.org/2011/028https://dblp.org/rec/journals/iacr/AndreevaMP11URL#4758394Rkia AouinatouMostafa BelkasmiIdentification Based Encryption with RSA-OAEP. Using SEM and Without.IACR Cryptol. ePrint Arch.20116842011Informal and Other Publicationsopenjournals/iacr/AouinatouB11http://eprint.iacr.org/2011/684https://dblp.org/rec/journals/iacr/AouinatouB11URL#4758395Benny ApplebaumAndrej BogdanovAlon RosenA Dichotomy for Local Small-Bias Generators.IACR Cryptol. ePrint Arch.20115122011Informal and Other Publicationsopenjournals/iacr/ApplebaumBR11http://eprint.iacr.org/2011/512https://dblp.org/rec/journals/iacr/ApplebaumBR11URL#4758396Muhammad Rezal Kamel AriffinM. A. AsbullahNor Azman AbuSecurity Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem.IACR Cryptol. ePrint Arch.20114672011Informal and Other Publicationsopenjournals/iacr/AriffinAA11http://eprint.iacr.org/2011/467https://dblp.org/rec/journals/iacr/AriffinAA11URL#4758397Seiko AritaA constant-round resettably-sound resettable zero-knowledge argument in the BPK model.IACR Cryptol. ePrint Arch.20114042011Informal and Other Publicationsopenjournals/iacr/Arita11http://eprint.iacr.org/2011/404https://dblp.org/rec/journals/iacr/Arita11URL#4758398Frederik ArmknechtDaniel AugotLudovic PerretAhmad-Reza SadeghiOn Constructing Homomorphic Encryption Schemes from Coding Theory.IACR Cryptol. ePrint Arch.20113092011Informal and Other Publicationsopenjournals/iacr/ArmknechtAPS11http://eprint.iacr.org/2011/309https://dblp.org/rec/journals/iacr/ArmknechtAPS11URL#4758399Gilad AsharovRan CanettiCarmit HazayTowards a Game Theoretic View of Secure Computation.IACR Cryptol. ePrint Arch.20111372011Informal and Other Publicationsopenjournals/iacr/AsharovCH11http://eprint.iacr.org/2011/137https://dblp.org/rec/journals/iacr/AsharovCH11URL#4758400Gilad AsharovAbhishek Jain 0002Daniel WichsMultiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.IACR Cryptol. ePrint Arch.20116132011Informal and Other Publicationsopenjournals/iacr/AsharovJW11http://eprint.iacr.org/2011/613https://dblp.org/rec/journals/iacr/AsharovJW11URL#4758401Gilad AsharovYehuda LindellA Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation.IACR Cryptol. ePrint Arch.20111362011Informal and Other Publicationsopenjournals/iacr/AsharovL11http://eprint.iacr.org/2011/136https://dblp.org/rec/journals/iacr/AsharovL11URL#4758402Gildas AvoineXavier CarpentYet Another Ultralightweight Authentication Protocol that is Broken.IACR Cryptol. ePrint Arch.20116912011Informal and Other Publicationsopenjournals/iacr/AvoineC11http://eprint.iacr.org/2011/691https://dblp.org/rec/journals/iacr/AvoineC11URL#4758403Srinath BabaSrinivas KotyadRaghu TejaA non-Abelian factorization problem and an associated cryptosystem.IACR Cryptol. ePrint Arch.2011482011Informal and Other Publicationsopenjournals/iacr/BabaKT11http://eprint.iacr.org/2011/048https://dblp.org/rec/journals/iacr/BabaKT11URL#4758404Michael Backes 0001Ian GoldbergAniket KateEsfandiar MohammadiProvably Secure and Practical Onion Routing.IACR Cryptol. ePrint Arch.20113082011Informal and Other Publicationsopenjournals/iacr/BackesGKM11http://eprint.iacr.org/2011/308https://dblp.org/rec/journals/iacr/BackesGKM11URL#4758405Michael Backes 0001Aniket KateArpita PatraComputational Verifiable Secret Sharing Revisited.IACR Cryptol. ePrint Arch.20112812011Informal and Other Publicationsopenjournals/iacr/BackesKP11http://eprint.iacr.org/2011/281https://dblp.org/rec/journals/iacr/BackesKP11URL#4758406Nasour BagheriMasoumeh SafkhaniMajid NaderiSomitra Kumar SanadhyaSecurity Analysis of LMAP++, an RFID Authentication Protocol.IACR Cryptol. ePrint Arch.20111932011Informal and Other Publicationsopenjournals/iacr/BagheriSNS11http://eprint.iacr.org/2011/193https://dblp.org/rec/journals/iacr/BagheriSNS11URL#4758407Dongxia BaiLeibo LiNew Impossible Differential Attacks on Camellia.IACR Cryptol. ePrint Arch.20116612011Informal and Other Publicationsopenjournals/iacr/BaiL11http://eprint.iacr.org/2011/661https://dblp.org/rec/journals/iacr/BaiL11URL#4758408Alex BainJohn C. MitchellRahul Sharma 0001Deian StefanJoe ZimmermanA Domain-Specific Language for Computing on Encrypted Data.IACR Cryptol. ePrint Arch.20115612011Informal and Other Publicationsopenjournals/iacr/BainMSSZ11http://eprint.iacr.org/2011/561https://dblp.org/rec/journals/iacr/BainMSSZ11URL#4758409Balasingham BalamohanACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS.IACR Cryptol. ePrint Arch.20115782011Informal and Other Publicationsopenjournals/iacr/Balamohan11http://eprint.iacr.org/2011/578https://dblp.org/rec/journals/iacr/Balamohan11URL#4758410Abhishek Banerjee 0001Chris PeikertAlon RosenPseudorandom Functions and Lattices.IACR Cryptol. ePrint Arch.20114012011Informal and Other Publicationsopenjournals/iacr/BanerjeePR11http://eprint.iacr.org/2011/401https://dblp.org/rec/journals/iacr/BanerjeePR11URL#4758411Boaz BarakYevgeniy DodisHugo KrawczykOlivier PereiraKrzysztof PietrzakFrançois-Xavier StandaertYu Yu 0001Leftover Hash Lemma, Revisited.IACR Cryptol. ePrint Arch.2011882011Informal and Other Publicationsopenjournals/iacr/BarakDKPPSY11http://eprint.iacr.org/2011/088https://dblp.org/rec/journals/iacr/BarakDKPPSY11URL#4758412Manuel BarbosaPooya FarshimDelegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.IACR Cryptol. ePrint Arch.20112152011Informal and Other Publicationsopenjournals/iacr/BarbosaF11http://eprint.iacr.org/2011/215https://dblp.org/rec/journals/iacr/BarbosaF11URL#4758413Alexander BargGrigory KabatianskyRobust parent-identifying codes and combinatorial arrays.IACR Cryptol. ePrint Arch.20112272011Informal and Other Publicationsopenjournals/iacr/BargK11http://eprint.iacr.org/2011/227https://dblp.org/rec/journals/iacr/BargK11URL#4758414Paulo S. L. M. BarretoRichard LindnerRafael MisoczkiMonoidic Codes in Cryptography.IACR Cryptol. ePrint Arch.20113712011Informal and Other Publicationsopenjournals/iacr/BarretoLM11http://eprint.iacr.org/2011/371https://dblp.org/rec/journals/iacr/BarretoLM11URL#4758415Ayad F. BarsoumM. Anwar HasanOn Verifying Dynamic Multiple Data Copies over Cloud Servers.IACR Cryptol. ePrint Arch.20114472011Informal and Other Publicationsopenjournals/iacr/BarsoumH11http://eprint.iacr.org/2011/447https://dblp.org/rec/journals/iacr/BarsoumH11URL#4758416Gilles BartheBoris KöpfInformation-theoretic Bounds for Differentially Private Mechanisms.IACR Cryptol. ePrint Arch.2011712011Informal and Other Publicationsopenjournals/iacr/BartheK11http://eprint.iacr.org/2011/071https://dblp.org/rec/journals/iacr/BartheK11URL#4758417Gilbert BaumslagNelly FazioAntonio NicolosiVladimir ShpilrainWilliam E. Skeith IIIGeneralized Learning Problems and Applications to Non-Commutative Cryptography.IACR Cryptol. ePrint Arch.20113572011Informal and Other Publicationsopenjournals/iacr/BaumslagFNSS11http://eprint.iacr.org/2011/357https://dblp.org/rec/journals/iacr/BaumslagFNSS11URL#4758418Anja Becker 0001Jean-Sébastien CoronAntoine JouxImproved Generic Algorithms for Hard Knapsacks.IACR Cryptol. ePrint Arch.20114742011Informal and Other Publicationsopenjournals/iacr/BeckerCJ11http://eprint.iacr.org/2011/474https://dblp.org/rec/journals/iacr/BeckerCJ11URL#4758419Mihir BellareDavid CashSriram KeelveedhiCiphers that Securely Encipher their own Keys.IACR Cryptol. ePrint Arch.20114322011Informal and Other Publicationsopenjournals/iacr/BellareCK11http://eprint.iacr.org/2011/432https://dblp.org/rec/journals/iacr/BellareCK11URL#4758420Mihir BellareDavid CashRachel MillerCryptography Secure Against Related-Key Attacks and Tampering.IACR Cryptol. ePrint Arch.20112522011Informal and Other Publicationsopenjournals/iacr/BellareCM11http://eprint.iacr.org/2011/252https://dblp.org/rec/journals/iacr/BellareCM11URL#4758421Mihir BellareRafael DowsleyBrent WatersScott YilekStandard Security Does Not Imply Security Against Selective-Opening.IACR Cryptol. ePrint Arch.20115812011Informal and Other Publicationsopenjournals/iacr/BellareDWY11http://eprint.iacr.org/2011/581https://dblp.org/rec/journals/iacr/BellareDWY11URL#4758422Mihir BellareSriram KeelveedhiAuthenticated and Misuse-Resistant Encryption of Key-Dependent Data.IACR Cryptol. ePrint Arch.20112692011Informal and Other Publicationsopenjournals/iacr/BellareK11http://eprint.iacr.org/2011/269https://dblp.org/rec/journals/iacr/BellareK11URL#4758423Mihir BellareEike KiltzChris PeikertBrent WatersIdentity-Based (Lossy) Trapdoor Functions and Applications.IACR Cryptol. ePrint Arch.20114792011Informal and Other Publicationsopenjournals/iacr/BellareKPW11http://eprint.iacr.org/2011/479https://dblp.org/rec/journals/iacr/BellareKPW11URL#4758424Eli Ben-SassonSerge FehrRafail OstrovskyNear-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority.IACR Cryptol. ePrint Arch.20116292011Informal and Other Publicationsopenjournals/iacr/Ben-SassonFO11http://eprint.iacr.org/2011/629https://dblp.org/rec/journals/iacr/Ben-SassonFO11URL#4758425Siavosh BenabbasRosario GennaroYevgeniy VahlisVerifiable Delegation of Computation over Large Datasets.IACR Cryptol. ePrint Arch.20111322011Informal and Other Publicationsopenjournals/iacr/BenabbasGV11http://eprint.iacr.org/2011/132https://dblp.org/rec/journals/iacr/BenabbasGV11URL#4758426Rikke BendlinJesper Buus NielsenPeter Sebastian NordholtClaudio OrlandiLower and Upper Bounds for Deniable Public-Key Encryption.IACR Cryptol. ePrint Arch.2011462011Informal and Other Publicationsopenjournals/iacr/BendlinNNO11http://eprint.iacr.org/2011/046https://dblp.org/rec/journals/iacr/BendlinNNO11URL#4758427David BernhardGeorg FuchsbauerEssam GhadafiNigel P. SmartBogdan WarinschiAnonymous attestation with user-controlled linkability.IACR Cryptol. ePrint Arch.20116582011Informal and Other Publicationsopenjournals/iacr/BernhardFGSW11http://eprint.iacr.org/2011/658https://dblp.org/rec/journals/iacr/BernhardFGSW11URL#4758428Daniel J. BernsteinNiels DuifTanja Lange 0001Peter SchwabeBo-Yin YangHigh-speed high-security signatures.IACR Cryptol. ePrint Arch.20113682011Informal and Other Publicationsopenjournals/iacr/BernsteinDLSY11http://eprint.iacr.org/2011/368https://dblp.org/rec/journals/iacr/BernsteinDLSY11URL#4758429Daniel J. BernsteinTanja Lange 0001Christiane PetersWild McEliece Incognito.IACR Cryptol. ePrint Arch.20115022011Informal and Other Publicationsopenjournals/iacr/BernsteinLP11http://eprint.iacr.org/2011/502https://dblp.org/rec/journals/iacr/BernsteinLP11URL#4758430Daniel J. BernsteinTanja Lange 0001Christiane PetersPeter SchwabeReally fast syndrome-based hashing.IACR Cryptol. ePrint Arch.2011742011Informal and Other Publicationsopenjournals/iacr/BernsteinLPS11http://eprint.iacr.org/2011/074https://dblp.org/rec/journals/iacr/BernsteinLPS11URL#4758431Daniel J. BernsteinTanja Lange 0001Christiane PetersPeter SchwabeFaster 2-regular information-set decoding.IACR Cryptol. ePrint Arch.20111202011Informal and Other Publicationsopenjournals/iacr/BernsteinLPS11ahttp://eprint.iacr.org/2011/120https://dblp.org/rec/journals/iacr/BernsteinLPS11aURL#4758432Daniel J. BernsteinTanja Lange 0001Peter SchwabeOn the correct use of the negation map in the Pollard rho method.IACR Cryptol. ePrint Arch.201132011Informal and Other Publicationsopenjournals/iacr/BernsteinLS11http://eprint.iacr.org/2011/003https://dblp.org/rec/journals/iacr/BernsteinLS11URL#4758433Daniel J. BernsteinTanja Lange 0001Peter SchwabeThe security impact of a new cryptographic library.IACR Cryptol. ePrint Arch.20116462011Informal and Other Publicationsopenjournals/iacr/BernsteinLS11ahttp://eprint.iacr.org/2011/646https://dblp.org/rec/journals/iacr/BernsteinLS11aURL#4758434Guido BertoniJoan DaemenMichaël PeetersGilles Van AsscheDuplexing the sponge: single-pass authenticated encryption and other applications.IACR Cryptol. ePrint Arch.20114992011Informal and Other Publicationsopenjournals/iacr/BertoniDPA11http://eprint.iacr.org/2011/499https://dblp.org/rec/journals/iacr/BertoniDPA11URL#4758435Luk BettaleJean-Charles FaugèreLudovic PerretCryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic.IACR Cryptol. ePrint Arch.20113992011Informal and Other Publicationsopenjournals/iacr/BettaleFP11http://eprint.iacr.org/2011/399https://dblp.org/rec/journals/iacr/BettaleFP11URL#4758436Jean-Luc BeuchatEiji OkamotoTeppei YamazakiA Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO.IACR Cryptol. ePrint Arch.2011782011Informal and Other Publicationsopenjournals/iacr/BeuchatOY11http://eprint.iacr.org/2011/078https://dblp.org/rec/journals/iacr/BeuchatOY11URL#4758437Michael BeyeThijs VeugenImproved Anonymity for Key-Trees.IACR Cryptol. ePrint Arch.20113952011Informal and Other Publicationsopenjournals/iacr/BeyeV11http://eprint.iacr.org/2011/395https://dblp.org/rec/journals/iacr/BeyeV11URL#4758438Raghav BhaskarAbhishek Bhowmick 0001Vipul GoyalSrivatsan LaxmanAbhradeep ThakurtaNoiseless Database Privacy.IACR Cryptol. ePrint Arch.20114872011Informal and Other Publicationsopenjournals/iacr/BhaskarBGLT11http://eprint.iacr.org/2011/487https://dblp.org/rec/journals/iacr/BhaskarBGLT11URL#4758439Sanjay BhattacherjeePalash Sarkar 0001Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis.IACR Cryptol. ePrint Arch.20114802011Informal and Other Publicationsopenjournals/iacr/BhattacherjeeS11http://eprint.iacr.org/2011/480https://dblp.org/rec/journals/iacr/BhattacherjeeS11URL#4758440Jingguo BiQi Cheng 0001Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices.IACR Cryptol. ePrint Arch.20111532011Informal and Other Publicationsopenjournals/iacr/BiC11http://eprint.iacr.org/2011/153https://dblp.org/rec/journals/iacr/BiC11URL#4758441Eli BihamOrr DunkelmanNathan KellerAdi ShamirNew Data-Efficient Attacks on Reduced-Round IDEA.IACR Cryptol. ePrint Arch.20114172011Informal and Other Publicationsopenjournals/iacr/BihamDKS11http://eprint.iacr.org/2011/417https://dblp.org/rec/journals/iacr/BihamDKS11URL#4758442Peter BirknerPatrick LongaFrancesco Sica 0001Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication.IACR Cryptol. ePrint Arch.20116082011Informal and Other Publicationsopenjournals/iacr/BirknerLS11http://eprint.iacr.org/2011/608https://dblp.org/rec/journals/iacr/BirknerLS11URL#4758443Alex BiryukovJohann GroßschädlCryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware.IACR Cryptol. ePrint Arch.20117102011Informal and Other Publicationsopenjournals/iacr/BiryukovG11http://eprint.iacr.org/2011/710https://dblp.org/rec/journals/iacr/BiryukovG11URL#4758444Alex BiryukovIlya KizhvatovBin Zhang 0003Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.IACR Cryptol. ePrint Arch.20117072011Informal and Other Publicationsopenjournals/iacr/BiryukovKZ11http://eprint.iacr.org/2011/707https://dblp.org/rec/journals/iacr/BiryukovKZ11URL#4758445Gaetan BissonComputing endomorphism rings of elliptic curves under the GRH.IACR Cryptol. ePrint Arch.2011422011Informal and Other Publicationsopenjournals/iacr/Bisson11http://eprint.iacr.org/2011/042https://dblp.org/rec/journals/iacr/Bisson11URL#4758446Gaetan BissonAndrew V. SutherlandA low-memory algorithm for finding short product representations in finite groups.IACR Cryptol. ePrint Arch.201142011Informal and Other Publicationsopenjournals/iacr/BissonS11http://eprint.iacr.org/2011/004https://dblp.org/rec/journals/iacr/BissonS11URL#4758447Nir BitanskyRan CanettiAlessandro ChiesaEran TromerFrom Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again.IACR Cryptol. ePrint Arch.20114432011Informal and Other Publicationsopenjournals/iacr/BitanskyCCT11http://eprint.iacr.org/2011/443https://dblp.org/rec/journals/iacr/BitanskyCCT11URL#4758448Nir BitanskyRan CanettiShafi GoldwasserShai HaleviYael Tauman KalaiGuy N. RothblumProgram Obfuscation with Leaky Hardware.IACR Cryptol. ePrint Arch.20116602011Informal and Other Publicationsopenjournals/iacr/BitanskyCGHKR11http://eprint.iacr.org/2011/660https://dblp.org/rec/journals/iacr/BitanskyCGHKR11URL#4758449Nir BitanskyRan CanettiShai HaleviLeakage Tolerant Interactive Protocols.IACR Cryptol. ePrint Arch.20112042011Informal and Other Publicationsopenjournals/iacr/BitanskyCH11http://eprint.iacr.org/2011/204https://dblp.org/rec/journals/iacr/BitanskyCH11URL#4758450Nir BitanskyOmer PanethFrom Point Obfuscation To 3-round Zero-Knowledge.IACR Cryptol. ePrint Arch.20114932011Informal and Other Publicationsopenjournals/iacr/BitanskyP11http://eprint.iacr.org/2011/493https://dblp.org/rec/journals/iacr/BitanskyP11URL#4758451Simon R. BlackburnCarlos CidCiaran MullanCryptanalysis of three matrix-based key establishment protocols.IACR Cryptol. ePrint Arch.2011732011Informal and Other Publicationsopenjournals/iacr/BlackburnCM11http://eprint.iacr.org/2011/073https://dblp.org/rec/journals/iacr/BlackburnCM11URL#4758452Simon R. BlackburnAlina OstafeIgor E. ShparlinskiOn the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves.IACR Cryptol. ePrint Arch.2011672011Informal and Other Publicationsopenjournals/iacr/BlackburnOS11http://eprint.iacr.org/2011/067https://dblp.org/rec/journals/iacr/BlackburnOS11URL#4758453Marina BlantonMehrdad AliasgariSecure Outsourced Computation of Iris Matching.IACR Cryptol. ePrint Arch.20114622011Informal and Other Publicationsopenjournals/iacr/BlantonA11http://eprint.iacr.org/2011/462https://dblp.org/rec/journals/iacr/BlantonA11URL#4758454Marina BlantonEveraldo AguiarPrivate and Oblivious Set and Multiset Operations.IACR Cryptol. ePrint Arch.20114642011Informal and Other Publicationsopenjournals/iacr/BlantonA11ahttp://eprint.iacr.org/2011/464https://dblp.org/rec/journals/iacr/BlantonA11aURL#4758455Erik-Oliver BlassRoberto Di PietroRefik MolvaMelek ÖnenPRISM - Privacy-Preserving Search in MapReduce.IACR Cryptol. ePrint Arch.20112442011Informal and Other Publicationsopenjournals/iacr/BlassPMO11http://eprint.iacr.org/2011/244https://dblp.org/rec/journals/iacr/BlassPMO11URL#4758456Johannes BlömerPeter Günther 0001Gennadij LiskeImproved Side Channel Attacks on Pairing Based Cryptography.IACR Cryptol. ePrint Arch.20117062011Informal and Other Publicationsopenjournals/iacr/BlomerGL11http://eprint.iacr.org/2011/706https://dblp.org/rec/journals/iacr/BlomerGL11URL#4758457Céline BlondeauBenoît GérardMultiple Differential Cryptanalysis: Theory and Practice (Corrected).IACR Cryptol. ePrint Arch.20111152011Informal and Other Publicationsopenjournals/iacr/BlondeauG11http://eprint.iacr.org/2011/115https://dblp.org/rec/journals/iacr/BlondeauG11URL#4758458Andrey BogdanovMiroslav KnezevicGregor LeanderDeniz TozKerem VariciIngrid VerbauwhedeSPONGENT: The Design Space of Lightweight Cryptographic Hashing.IACR Cryptol. ePrint Arch.20116972011Informal and Other Publicationsopenjournals/iacr/BogdanovKLTVV11http://eprint.iacr.org/2011/697https://dblp.org/rec/journals/iacr/BogdanovKLTVV11URL#4758459Andrey BogdanovDmitry KhovratovichChristian RechbergerBiclique Cryptanalysis of the Full AES.IACR Cryptol. ePrint Arch.20114492011Informal and Other Publicationsopenjournals/iacr/BogdanovKR11http://eprint.iacr.org/2011/449https://dblp.org/rec/journals/iacr/BogdanovKR11URL#4758460Andrej BogdanovChin Ho LeeHomomorphic encryption from codes.IACR Cryptol. ePrint Arch.20116222011Informal and Other Publicationsopenjournals/iacr/BogdanovL11http://eprint.iacr.org/2011/622https://dblp.org/rec/journals/iacr/BogdanovL11URL#4758461Andrey BogdanovVincent RijmenZero-Correlation Linear Cryptanalysis of Block Ciphers.IACR Cryptol. ePrint Arch.20111232011Informal and Other Publicationsopenjournals/iacr/BogdanovR11http://eprint.iacr.org/2011/123https://dblp.org/rec/journals/iacr/BogdanovR11URL#4758462Dan BogdanovRiivo TalvisteJan WillemsonDeploying secure multi-party computation for financial data analysis.IACR Cryptol. ePrint Arch.20116622011Informal and Other Publicationsopenjournals/iacr/BogdanovTW11http://eprint.iacr.org/2011/662https://dblp.org/rec/journals/iacr/BogdanovTW11URL#4758463Florian BöhlDennis HofheinzDaniel KraschewskiOn definitions of selective opening security.IACR Cryptol. ePrint Arch.20116782011Informal and Other Publicationsopenjournals/iacr/BohlHK11http://eprint.iacr.org/2011/678https://dblp.org/rec/journals/iacr/BohlHK11URL#4758464Dan BonehDavid Mandell FreemanHomomorphic Signatures for Polynomial Functions.IACR Cryptol. ePrint Arch.2011182011Informal and Other Publicationsopenjournals/iacr/BonehF11http://eprint.iacr.org/2011/018https://dblp.org/rec/journals/iacr/BonehF11URL#4758465Dan BonehGil Segev 0001Brent WatersTargeted Malleability: Homomorphic Encryption for Restricted Computations.IACR Cryptol. ePrint Arch.20113112011Informal and Other Publicationsopenjournals/iacr/BonehSW11http://eprint.iacr.org/2011/311https://dblp.org/rec/journals/iacr/BonehSW11URL#4758466Annalisa De BonisGiovanni Di CrescenzoA Group Testing Approach to Improved Corruption Localizing Hashing.IACR Cryptol. ePrint Arch.20115622011Informal and Other Publicationsopenjournals/iacr/BonisC11http://eprint.iacr.org/2011/562https://dblp.org/rec/journals/iacr/BonisC11URL#4758467Carl BosleyKristiyan HaralambievAntonio NicolosiHBN: An HB-like protocol secure against man-in-the-middle attacks.IACR Cryptol. ePrint Arch.20113502011Informal and Other Publicationsopenjournals/iacr/BosleyHN11http://eprint.iacr.org/2011/350https://dblp.org/rec/journals/iacr/BosleyHN11URL#4758468Charles BouillaguetPierre-Alain FouqueGilles Macario-RatPractical Key-recovery For All Possible Parameters of SFLASH.IACR Cryptol. ePrint Arch.20112712011Informal and Other Publicationsopenjournals/iacr/BouillaguetFM11http://eprint.iacr.org/2011/271https://dblp.org/rec/journals/iacr/BouillaguetFM11URL#4758469Niek J. BoumanSerge FehrSecure Authentication from a Weak Key, Without Leaking Information.IACR Cryptol. ePrint Arch.2011342011Informal and Other Publicationsopenjournals/iacr/BoumanF11http://eprint.iacr.org/2011/034https://dblp.org/rec/journals/iacr/BoumanF11URL#4758470Christina BouraAnne CanteautOn the influence of the algebraic degree of F-1 on the algebraic degree of G circ F.IACR Cryptol. ePrint Arch.20115032011Informal and Other Publicationsopenjournals/iacr/BouraC11http://eprint.iacr.org/2011/503https://dblp.org/rec/journals/iacr/BouraC11URL#4758471Joan BoyarRené Peralta 0001A depth-16 circuit for the AES S-box.IACR Cryptol. ePrint Arch.20113322011Informal and Other Publicationsopenjournals/iacr/BoyarP11http://eprint.iacr.org/2011/332https://dblp.org/rec/journals/iacr/BoyarP11URL#4758472Elette BoyleShafi GoldwasserYael Tauman KalaiLeakage-Resilient Coin Tossing.IACR Cryptol. ePrint Arch.20112912011Informal and Other Publicationsopenjournals/iacr/BoyleGK11http://eprint.iacr.org/2011/291https://dblp.org/rec/journals/iacr/BoyleGK11URL#4758473Zvika BrakerskiCraig GentryVinod VaikuntanathanFully Homomorphic Encryption without Bootstrapping.IACR Cryptol. ePrint Arch.20112772011Informal and Other Publicationsopenjournals/iacr/BrakerskiGV11http://eprint.iacr.org/2011/277https://dblp.org/rec/journals/iacr/BrakerskiGV11URL#4758474Zvika BrakerskiYael Tauman KalaiA Parallel Repetition Theorem for Leakage Resilience.IACR Cryptol. ePrint Arch.20112502011Informal and Other Publicationsopenjournals/iacr/BrakerskiK11http://eprint.iacr.org/2011/250https://dblp.org/rec/journals/iacr/BrakerskiK11URL#4758475Zvika BrakerskiGil Segev 0001Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.IACR Cryptol. ePrint Arch.20112092011Informal and Other Publicationsopenjournals/iacr/BrakerskiS11http://eprint.iacr.org/2011/209https://dblp.org/rec/journals/iacr/BrakerskiS11URL#4758476Zvika BrakerskiVinod VaikuntanathanEfficient Fully Homomorphic Encryption from (Standard) LWE.IACR Cryptol. ePrint Arch.20113442011Informal and Other Publicationsopenjournals/iacr/BrakerskiV11http://eprint.iacr.org/2011/344https://dblp.org/rec/journals/iacr/BrakerskiV11URL#4758477Eric BrierDavid NaccachePhong Q. NguyenMehdi TibouchiModulus Fault Attacks Against RSA-CRT Signatures.IACR Cryptol. ePrint Arch.20113882011Informal and Other Publicationsopenjournals/iacr/BrierNNT11http://eprint.iacr.org/2011/388https://dblp.org/rec/journals/iacr/BrierNNT11URL#4758478Julien BringerAlain PateyBackward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check.IACR Cryptol. ePrint Arch.20113762011Informal and Other Publicationsopenjournals/iacr/BringerP11http://eprint.iacr.org/2011/376https://dblp.org/rec/journals/iacr/BringerP11URL#4758479Kyle BrogleSharon GoldbergLeonid ReyzinSequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations.IACR Cryptol. ePrint Arch.20112222011Informal and Other Publicationsopenjournals/iacr/BrogleGR11http://eprint.iacr.org/2011/222https://dblp.org/rec/journals/iacr/BrogleGR11URL#4758480Daniel R. L. BrownIdentity-Based Decryption.IACR Cryptol. ePrint Arch.20112662011Informal and Other Publicationsopenjournals/iacr/Brown11http://eprint.iacr.org/2011/266https://dblp.org/rec/journals/iacr/Brown11URL#4758481Daniel R. L. BrownFormally Assessing Cryptographic Entropy.IACR Cryptol. ePrint Arch.20116592011Informal and Other Publicationsopenjournals/iacr/Brown11ahttp://eprint.iacr.org/2011/659https://dblp.org/rec/journals/iacr/Brown11aURL#4758482Billy Bob BrumleyManuel BarbosaDan PageFrederik VercauterenPractical realisation and elimination of an ECC-related software bug attack.IACR Cryptol. ePrint Arch.20116332011Informal and Other Publicationsopenjournals/iacr/BrumleyBPV11http://eprint.iacr.org/2011/633https://dblp.org/rec/journals/iacr/BrumleyBPV11URL#4758483Billy Bob BrumleyNicola TuveriRemote Timing Attacks are Still Practical.IACR Cryptol. ePrint Arch.20112322011Informal and Other Publicationsopenjournals/iacr/BrumleyT11http://eprint.iacr.org/2011/232https://dblp.org/rec/journals/iacr/BrumleyT11URL#4758484Christina BrzuskaMarc FischlinHeike SchröderStefan Katzenbeisser 0001Physically Uncloneable Functions in the Universal Composition Framework.IACR Cryptol. ePrint Arch.20116812011Informal and Other Publicationsopenjournals/iacr/BrzuskaFSK11http://eprint.iacr.org/2011/681https://dblp.org/rec/journals/iacr/BrzuskaFSK11URL#4758485Johannes Buchmann 0001Erik DahmenSarah ErethAndreas HülsingMarkus RückertOn the Security of the Winternitz One-Time Signature Scheme.IACR Cryptol. ePrint Arch.20111912011Informal and Other Publicationsopenjournals/iacr/BuchmannDEHR11http://eprint.iacr.org/2011/191https://dblp.org/rec/journals/iacr/BuchmannDEHR11URL#4758486Johannes Buchmann 0001Erik DahmenAndreas HülsingXMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.IACR Cryptol. ePrint Arch.20114842011Informal and Other Publicationsopenjournals/iacr/BuchmannDH11http://eprint.iacr.org/2011/484https://dblp.org/rec/journals/iacr/BuchmannDH11URL#4758487Stanislav BulyginAlgebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.IACR Cryptol. ePrint Arch.20112872011Informal and Other Publicationsopenjournals/iacr/Bulygin11http://eprint.iacr.org/2011/287https://dblp.org/rec/journals/iacr/Bulygin11URL#4758488Cai-Sen ChenTao WangXiaocen ChenPing ZhouAn Improved Trace Driven Instruction Cache Timing Attack on RSA.IACR Cryptol. ePrint Arch.20115572011Informal and Other Publicationsopenjournals/iacr/Cai-SenTXP11http://eprint.iacr.org/2011/557https://dblp.org/rec/journals/iacr/Cai-SenTXP11URL#4758489Philippe CamachoOptimal Data Authentication from Directed Transitive Signatures.IACR Cryptol. ePrint Arch.20114392011Informal and Other Publicationsopenjournals/iacr/Camacho11http://eprint.iacr.org/2011/439https://dblp.org/rec/journals/iacr/Camacho11URL#4758490Philippe CamachoAlejandro HeviaShort Transitive Signatures for Directed Trees.IACR Cryptol. ePrint Arch.20114382011Informal and Other Publicationsopenjournals/iacr/CamachoH11http://eprint.iacr.org/2011/438https://dblp.org/rec/journals/iacr/CamachoH11URL#4758491Jan CamenischKristiyan HaralambievMarkulf KohlweissJorn LaponVincent NaessensStructure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.IACR Cryptol. ePrint Arch.20113192011Informal and Other Publicationsopenjournals/iacr/CamenischHKLN11http://eprint.iacr.org/2011/319https://dblp.org/rec/journals/iacr/CamenischHKLN11URL#4758492Jan CamenischStephan KrennVictor ShoupA Framework for Practical Universally Composable Zero-Knowledge Protocols.IACR Cryptol. ePrint Arch.20112282011Informal and Other Publicationsopenjournals/iacr/CamenischKS11http://eprint.iacr.org/2011/228https://dblp.org/rec/journals/iacr/CamenischKS11URL#4758493Ran CanettiBen RivaGuy N. RothblumTwo 1-Round Protocols for Delegation of Computation.IACR Cryptol. ePrint Arch.20115182011Informal and Other Publicationsopenjournals/iacr/CanettiRR11http://eprint.iacr.org/2011/518https://dblp.org/rec/journals/iacr/CanettiRR11URL#4758494Zhenfu CaoZongyang ZhangYunlei ZhaoAdaptive Security of Concurrent Non-Malleable Zero-Knowledge.IACR Cryptol. ePrint Arch.20116212011Informal and Other Publicationsopenjournals/iacr/CaoZZ11http://eprint.iacr.org/2011/621https://dblp.org/rec/journals/iacr/CaoZZ11URL#4758495Angelo De CaroVincenzo IovinoGiuseppe PersianoHidden Vector Encryption Fully Secure Against Unrestricted Queries.IACR Cryptol. ePrint Arch.20115462011Informal and Other Publicationsopenjournals/iacr/CaroIP11http://eprint.iacr.org/2011/546https://dblp.org/rec/journals/iacr/CaroIP11URL#4758496Dario CatalanoDario Fiore 0001Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases.IACR Cryptol. ePrint Arch.20114952011Informal and Other Publicationsopenjournals/iacr/CatalanoF11http://eprint.iacr.org/2011/495https://dblp.org/rec/journals/iacr/CatalanoF11URL#4758497Dario CatalanoDario Fiore 0001Bogdan WarinschiAdaptive Pseudo-Free Groups and Applications.IACR Cryptol. ePrint Arch.2011532011Informal and Other Publicationsopenjournals/iacr/CatalanoFW11http://eprint.iacr.org/2011/053https://dblp.org/rec/journals/iacr/CatalanoFW11URL#4758498Dario CatalanoDario Fiore 0001Bogdan WarinschiEfficient Network Coding Signatures in the Standard Model.IACR Cryptol. ePrint Arch.20116962011Informal and Other Publicationsopenjournals/iacr/CatalanoFW11ahttp://eprint.iacr.org/2011/696https://dblp.org/rec/journals/iacr/CatalanoFW11aURL#4758499Qi ChaiXinxin FanGuang GongAn Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2.IACR Cryptol. ePrint Arch.20112472011Informal and Other Publicationsopenjournals/iacr/ChaiFG11http://eprint.iacr.org/2011/247https://dblp.org/rec/journals/iacr/ChaiFG11URL#4758500Debrup ChakrabortyCuauhtemoc Mancillas-LópezFrancisco Rodríguez-HenríquezPalash Sarkar 0001Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes.IACR Cryptol. ePrint Arch.20111612011Informal and Other Publicationsopenjournals/iacr/ChakrabortyMRS11http://eprint.iacr.org/2011/161https://dblp.org/rec/journals/iacr/ChakrabortyMRS11URL#4758501T.-H. Hubert ChanElaine ShiDawn SongPrivacy-Preserving Stream Aggregation with Fault Tolerance.IACR Cryptol. ePrint Arch.20116552011Informal and Other Publicationsopenjournals/iacr/ChanSS11http://eprint.iacr.org/2011/655https://dblp.org/rec/journals/iacr/ChanSS11URL#4758502Nishanth ChandranMelissa ChaseVinod VaikuntanathanCollusion Resistant Obfuscation and Functional Re-encryption.IACR Cryptol. ePrint Arch.20113372011Informal and Other Publicationsopenjournals/iacr/ChandranCV11http://eprint.iacr.org/2011/337https://dblp.org/rec/journals/iacr/ChandranCV11URL#4758503Donghoon ChangMridul NandiMoti YungIndifferentiability of the Hash Algorithm BLAKE.IACR Cryptol. ePrint Arch.20116232011Informal and Other Publicationsopenjournals/iacr/ChangNY11http://eprint.iacr.org/2011/623https://dblp.org/rec/journals/iacr/ChangNY11URL#4758504Suresh ChariCharanjit S. JutlaArnab Roy 0001Universally Composable Security Analysis of OAuth v2.0.IACR Cryptol. ePrint Arch.20115262011Informal and Other Publicationsopenjournals/iacr/ChariJR11http://eprint.iacr.org/2011/526https://dblp.org/rec/journals/iacr/ChariJR11URL#4758505Melissa ChaseSeny KamaraStructured Encryption and Controlled Disclosure.IACR Cryptol. ePrint Arch.2011102011Informal and Other Publicationsopenjournals/iacr/ChaseK11http://eprint.iacr.org/2011/010https://dblp.org/rec/journals/iacr/ChaseK11URL#4758506Melissa ChaseMarkulf KohlweissA Domain Transformation for Structure-Preserving Signatures on Group Elements.IACR Cryptol. ePrint Arch.20113422011Informal and Other Publicationsopenjournals/iacr/ChaseK11ahttp://eprint.iacr.org/2011/342https://dblp.org/rec/journals/iacr/ChaseK11aURL#4758507Melissa ChaseKristin E. LauterAn Anonymous Health Care System.IACR Cryptol. ePrint Arch.2011162011Informal and Other Publicationsopenjournals/iacr/ChaseL11http://eprint.iacr.org/2011/016https://dblp.org/rec/journals/iacr/ChaseL11URL#4758508Sanjit ChatterjeeAlfred MenezesPalash Sarkar 0001Another Look at Tightness.IACR Cryptol. ePrint Arch.20114422011Informal and Other Publicationsopenjournals/iacr/ChatterjeeMS11http://eprint.iacr.org/2011/442https://dblp.org/rec/journals/iacr/ChatterjeeMS11URL#4758509Keke ChenOn Security of the Utility Preserving RASP Encryption.IACR Cryptol. ePrint Arch.20116142011Informal and Other Publicationsopenjournals/iacr/Chen11http://eprint.iacr.org/2011/614https://dblp.org/rec/journals/iacr/Chen11URL#4758510Yitao ChenComments of an efficient and secure multi-server authentication scheme with key agreement.IACR Cryptol. ePrint Arch.20117022011Informal and Other Publicationsopenjournals/iacr/Chen11ahttp://eprint.iacr.org/2011/702https://dblp.org/rec/journals/iacr/Chen11aURL#4758511Liqun Chen 0002Yu Chen 0003The n-Diffie-Hellman Problem and its Applications.IACR Cryptol. ePrint Arch.20113972011Informal and Other Publicationsopenjournals/iacr/ChenC11http://eprint.iacr.org/2011/397https://dblp.org/rec/journals/iacr/ChenC11URL#4758512Yu Chen 0003Liqun Chen 0002Zhong Chen 0001Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.IACR Cryptol. ePrint Arch.2011902011Informal and Other Publicationsopenjournals/iacr/ChenCC11http://eprint.iacr.org/2011/090https://dblp.org/rec/journals/iacr/ChenCC11URL#4758513Yalin ChenJue-Sam ChouChi-Fong LinCheng-Lun WuA Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem.IACR Cryptol. ePrint Arch.20113812011Informal and Other Publicationsopenjournals/iacr/ChenCLW11http://eprint.iacr.org/2011/381https://dblp.org/rec/journals/iacr/ChenCLW11URL#4758514Yalin ChenJue-Sam ChouCheng-Lun WuChi-Fong LinIdentifying Large-Scale RFID Tags Using Non-Cryptographic Approach.IACR Cryptol. ePrint Arch.20111672011Informal and Other Publicationsopenjournals/iacr/ChenCWL11http://eprint.iacr.org/2011/167https://dblp.org/rec/journals/iacr/ChenCWL11URL#4758515Yu Chen 0003Liqun Chen 0002Zongyang ZhangCCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.IACR Cryptol. ePrint Arch.20115932011Informal and Other Publicationsopenjournals/iacr/ChenCZ11http://eprint.iacr.org/2011/593https://dblp.org/rec/journals/iacr/ChenCZ11URL#4758516Liqun Chen 0002Kurt DietrichHans LöhrAhmad-Reza SadeghiChristian WachsmannJohannes WinterLightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.IACR Cryptol. ePrint Arch.20111012011Informal and Other Publicationsopenjournals/iacr/ChenDLSWW11http://eprint.iacr.org/2011/101https://dblp.org/rec/journals/iacr/ChenDLSWW11URL#4758517Yu-Chi ChenGwoboa HorngOn the security models for certificateless signature schemes achieving level 3 security.IACR Cryptol. ePrint Arch.20115542011Informal and Other Publicationsopenjournals/iacr/ChenH11http://eprint.iacr.org/2011/554https://dblp.org/rec/journals/iacr/ChenH11URL#4758518Jiazhe ChenKeting JiaHongbo YuXiaoyun Wang 0001New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.IACR Cryptol. ePrint Arch.2011172011Informal and Other Publicationsopenjournals/iacr/ChenJYW11http://eprint.iacr.org/2011/017https://dblp.org/rec/journals/iacr/ChenJYW11URL#4758519Jie Chen 0021Hoon Wei LimSan LingHuaxiong WangThe Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption.IACR Cryptol. ePrint Arch.20114552011Informal and Other Publicationsopenjournals/iacr/ChenLLW11http://eprint.iacr.org/2011/455https://dblp.org/rec/journals/iacr/ChenLLW11URL#4758520Jie Chen 0021Hoon Wei LimSan LingHuaxiong WangFully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.IACR Cryptol. ePrint Arch.20116502011Informal and Other Publicationsopenjournals/iacr/ChenLLW11ahttp://eprint.iacr.org/2011/650https://dblp.org/rec/journals/iacr/ChenLLW11aURL#4758521Jie Chen 0021Hoon Wei LimSan LingHuaxiong WangKhoa Nguyen 0002Revocable Identity-Based Encryption from Lattices.IACR Cryptol. ePrint Arch.20115832011Informal and Other Publicationsopenjournals/iacr/ChenLLWN11http://eprint.iacr.org/2011/583https://dblp.org/rec/journals/iacr/ChenLLWN11URL#4758522Yuanmi ChenPhong Q. NguyenFaster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers.IACR Cryptol. ePrint Arch.20114362011Informal and Other Publicationsopenjournals/iacr/ChenN11http://eprint.iacr.org/2011/436https://dblp.org/rec/journals/iacr/ChenN11URL#4758523Yu-Chi ChenDu-shiau TsaiGwoboa HorngOn the Security of a Cheating Immune Visual Secret Sharing Scheme.IACR Cryptol. ePrint Arch.20116312011Informal and Other Publicationsopenjournals/iacr/ChenTH11http://eprint.iacr.org/2011/631https://dblp.org/rec/journals/iacr/ChenTH11URL#4758524Jiazhe ChenMeiqin WangBart PreneelImpossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT.IACR Cryptol. ePrint Arch.20116162011Informal and Other Publicationsopenjournals/iacr/ChenWP11http://eprint.iacr.org/2011/616https://dblp.org/rec/journals/iacr/ChenWP11URL#4758525Cheng ChenZhenfeng ZhangDengguo FengFully Secure (Doubly-)Spatial Encryption under Simpler Assumptions.IACR Cryptol. ePrint Arch.20116922011Informal and Other Publicationsopenjournals/iacr/ChenZF11http://eprint.iacr.org/2011/692https://dblp.org/rec/journals/iacr/ChenZF11URL#4758526Kai-Yuen CheongA Survey of Cryptography Based on Physically Unclonable Objects.IACR Cryptol. ePrint Arch.20114882011Informal and Other Publicationsopenjournals/iacr/Cheong11http://eprint.iacr.org/2011/488https://dblp.org/rec/journals/iacr/Cheong11URL#4758527Alexey A. ChilikovEvgeny K. AlekseevSome Words About Cryptographic Key Recognition In Data Streams.IACR Cryptol. ePrint Arch.20116432011Informal and Other Publicationsopenjournals/iacr/ChilikovA11http://eprint.iacr.org/2011/643https://dblp.org/rec/journals/iacr/ChilikovA11URL#4758528Seung Geol ChoiKyung-Wook HwangJonathan KatzTal MalkinDan RubensteinSecure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.IACR Cryptol. ePrint Arch.20112572011Informal and Other Publicationsopenjournals/iacr/ChoiHKMR11http://eprint.iacr.org/2011/257https://dblp.org/rec/journals/iacr/ChoiHKMR11URL#4758529Seung Geol ChoiJonathan KatzRanjit KumaresanHong-Sheng ZhouOn the Security of the Free-XOR Technique.IACR Cryptol. ePrint Arch.20115102011Informal and Other Publicationsopenjournals/iacr/ChoiKKZ11http://eprint.iacr.org/2011/510https://dblp.org/rec/journals/iacr/ChoiKKZ11URL#4758530Jue-Sam ChouYalin ChenCheng-Lun WuChi-Fong LinAn efficient RFID mutual authentication scheme based on ECC.IACR Cryptol. ePrint Arch.20114182011Informal and Other Publicationsopenjournals/iacr/ChouCWL11http://eprint.iacr.org/2011/418https://dblp.org/rec/journals/iacr/ChouCWL11URL#4758531Jue-Sam ChouShih-Che HungYalin ChenAn Efficient Secure Anonymous Proxy Signature Scheme.IACR Cryptol. ePrint Arch.20114982011Informal and Other Publicationsopenjournals/iacr/ChouHC11http://eprint.iacr.org/2011/498https://dblp.org/rec/journals/iacr/ChouHC11URL#4758532Jue-Sam ChouCheng-Lun WuYalin ChenA Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing.IACR Cryptol. ePrint Arch.20111502011Informal and Other Publicationsopenjournals/iacr/ChouWC11http://eprint.iacr.org/2011/150https://dblp.org/rec/journals/iacr/ChouWC11URL#4758533Ashish ChoudhurySimple and Asymptotically Optimal t-Cheater Identifiable Secret Sharing Scheme.IACR Cryptol. ePrint Arch.20113302011Informal and Other Publicationsopenjournals/iacr/Choudhury11http://eprint.iacr.org/2011/330https://dblp.org/rec/journals/iacr/Choudhury11URL#4758534Ashish ChoudhuryKaoru KurosawaArpita PatraSimple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.IACR Cryptol. ePrint Arch.2011272011Informal and Other Publicationsopenjournals/iacr/ChoudhuryKP11http://eprint.iacr.org/2011/027https://dblp.org/rec/journals/iacr/ChoudhuryKP11URL#4758535Ashish ChoudhuryArpita PatraStatistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme.IACR Cryptol. ePrint Arch.2011312011Informal and Other Publicationsopenjournals/iacr/ChoudhuryP11http://eprint.iacr.org/2011/031https://dblp.org/rec/journals/iacr/ChoudhuryP11URL#4758536Ashish ChoudhuryArpita PatraOn the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.IACR Cryptol. ePrint Arch.20112882011Informal and Other Publicationsopenjournals/iacr/ChoudhuryP11ahttp://eprint.iacr.org/2011/288https://dblp.org/rec/journals/iacr/ChoudhuryP11aURL#4758537Jiali ChoyAileen ZhangKhoongming KhooMatt HenricksenAxel PoschmannAES Variants Secure Against Related-Key Differential and Boomerang Attacks.IACR Cryptol. ePrint Arch.2011722011Informal and Other Publicationsopenjournals/iacr/ChoyZKHP11http://eprint.iacr.org/2011/072https://dblp.org/rec/journals/iacr/ChoyZKHP11URL#4758538Kai-Min ChungYael Tauman KalaiFeng-Hao LiuRan RazMemory Delegation.IACR Cryptol. ePrint Arch.20112732011Informal and Other Publicationsopenjournals/iacr/ChungKLR11http://eprint.iacr.org/2011/273https://dblp.org/rec/journals/iacr/ChungKLR11URL#4758539Chunsheng GuFully Homomorphic Encryption, Approximate Lattice Problem and LWE.IACR Cryptol. ePrint Arch.20111142011Informal and Other Publicationsopenjournals/iacr/Chunsheng11ahttp://eprint.iacr.org/2011/114https://dblp.org/rec/journals/iacr/Chunsheng11aURL#4758540Chunsheng GuCryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption.IACR Cryptol. ePrint Arch.20113282011Informal and Other Publicationsopenjournals/iacr/Chunsheng11bhttp://eprint.iacr.org/2011/328https://dblp.org/rec/journals/iacr/Chunsheng11bURL#4758541Oana CiobotaruComparing UC Security Variants.IACR Cryptol. ePrint Arch.20113552011Informal and Other Publicationsopenjournals/iacr/Ciobotaru11http://eprint.iacr.org/2011/355https://dblp.org/rec/journals/iacr/Ciobotaru11URL#4758542Abdoul Aziz CissDjiby SowOn a new generalization of Huff curves.IACR Cryptol. ePrint Arch.20115802011Informal and Other Publicationsopenjournals/iacr/CissS11http://eprint.iacr.org/2011/580https://dblp.org/rec/journals/iacr/CissS11URL#4758543Abdoul Aziz CissDjiby SowRandomness Extraction in finite fields Fpn.IACR Cryptol. ePrint Arch.20115822011Informal and Other Publicationsopenjournals/iacr/CissS11ahttp://eprint.iacr.org/2011/582https://dblp.org/rec/journals/iacr/CissS11aURL#4758544Jeremy ClarkAleksander EssexCommitCoin: Carbon Dating Commitments with Bitcoin.IACR Cryptol. ePrint Arch.20116772011Informal and Other Publicationsopenjournals/iacr/ClarkE11http://eprint.iacr.org/2011/677https://dblp.org/rec/journals/iacr/ClarkE11URL#4758545Jeremy ClarkUrs HengartnerSelections: Internet Voting with Over-the-Shoulder Coercion-Resistance.IACR Cryptol. ePrint Arch.20111662011Informal and Other Publicationsopenjournals/iacr/ClarkH11http://eprint.iacr.org/2011/166https://dblp.org/rec/journals/iacr/ClarkH11URL#4758546Gérard D. CohenJean-Pierre FloriOn a generalized combinatorial conjecture involving addition mod 2k-1.IACR Cryptol. ePrint Arch.20114002011Informal and Other Publicationsopenjournals/iacr/CohenF11http://eprint.iacr.org/2011/400https://dblp.org/rec/journals/iacr/CohenF11URL#4758547Henry CohnNadia HeningerApproximate common divisors via lattices.IACR Cryptol. ePrint Arch.20114372011Informal and Other Publicationsopenjournals/iacr/CohnH11http://eprint.iacr.org/2011/437https://dblp.org/rec/journals/iacr/CohnH11URL#4758548Jean-Sébastien CoronAline GougetThomas IcartPascal PaillierSupplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping.IACR Cryptol. ePrint Arch.2011582011Informal and Other Publicationsopenjournals/iacr/CoronGIP11http://eprint.iacr.org/2011/058https://dblp.org/rec/journals/iacr/CoronGIP11URL#4758549Jean-Sébastien CoronAvradip MandalDavid NaccacheMehdi TibouchiFully Homomorphic Encryption over the Integers with Shorter Public Keys.IACR Cryptol. ePrint Arch.20114412011Informal and Other Publicationsopenjournals/iacr/CoronMNT11http://eprint.iacr.org/2011/441https://dblp.org/rec/journals/iacr/CoronMNT11URL#4758550Jean-Sébastien CoronDavid NaccacheMehdi TibouchiAnother Look at RSA Signatures With Affine Padding.IACR Cryptol. ePrint Arch.2011572011Informal and Other Publicationsopenjournals/iacr/CoronNT11http://eprint.iacr.org/2011/057https://dblp.org/rec/journals/iacr/CoronNT11URL#4758551Jean-Sébastien CoronDavid NaccacheMehdi TibouchiOptimization of Fully Homomorphic Encryption.IACR Cryptol. ePrint Arch.20114402011Informal and Other Publicationsopenjournals/iacr/CoronNT11ahttp://eprint.iacr.org/2011/440https://dblp.org/rec/journals/iacr/CoronNT11aURL#4758552Romain CossetDamien Robert 0001Computing (l, l)-isogenies in polynomial time on Jacobians of genus 2 curves.IACR Cryptol. ePrint Arch.20111432011Informal and Other Publicationsopenjournals/iacr/CossetR11http://eprint.iacr.org/2011/143https://dblp.org/rec/journals/iacr/CossetR11URL#4758553Craig CostelloKristin E. LauterGroup Law Computations on Jacobians of Hyperelliptic Curves.IACR Cryptol. ePrint Arch.20113062011Informal and Other Publicationsopenjournals/iacr/CostelloL11http://eprint.iacr.org/2011/306https://dblp.org/rec/journals/iacr/CostelloL11URL#4758554Craig CostelloKristin E. LauterMichael NaehrigAttractive Subfamilies of BLS Curves for Implementing High-Security Pairings.IACR Cryptol. ePrint Arch.20114652011Informal and Other Publicationsopenjournals/iacr/CostelloLN11http://eprint.iacr.org/2011/465https://dblp.org/rec/journals/iacr/CostelloLN11URL#4758555Nicolas T. CourtoisSecurity Evaluation of GOST 28147-89 In View Of International Standardisation.IACR Cryptol. ePrint Arch.20112112011Informal and Other Publicationsopenjournals/iacr/Courtois11http://eprint.iacr.org/2011/211https://dblp.org/rec/journals/iacr/Courtois11URL#4758556Nicolas T. CourtoisAlgebraic Complexity Reduction and Cryptanalysis of GOST.IACR Cryptol. ePrint Arch.20116262011Informal and Other Publicationsopenjournals/iacr/Courtois11ahttp://eprint.iacr.org/2011/626https://dblp.org/rec/journals/iacr/Courtois11aURL#4758557Nicolas T. CourtoisDaniel HulmeTheodosis MourouzisSolving Circuit Optimisation Problems in Cryptography and Cryptanalysis.IACR Cryptol. ePrint Arch.20114752011Informal and Other Publicationsopenjournals/iacr/CourtoisHM11http://eprint.iacr.org/2011/475https://dblp.org/rec/journals/iacr/CourtoisHM11URL#4758558Nicolas T. CourtoisMichal MisztalDifferential Cryptanalysis of GOST.IACR Cryptol. ePrint Arch.20113122011Informal and Other Publicationsopenjournals/iacr/CourtoisM11http://eprint.iacr.org/2011/312https://dblp.org/rec/journals/iacr/CourtoisM11URL#4758559Jean Marc CouveignesJean-Gabriel KammererThe Geometry of Flex Tangents to a Cubic Curve and its Parameterizations.IACR Cryptol. ePrint Arch.2011332011Informal and Other Publicationsopenjournals/iacr/CouveignesK11http://eprint.iacr.org/2011/033https://dblp.org/rec/journals/iacr/CouveignesK11URL#4758560Ronald CramerIvan DamgårdEike KiltzSarah ZakariasAngela ZottarelDDH-like Assumptions Based on Extension Rings.IACR Cryptol. ePrint Arch.20112802011Informal and Other Publicationsopenjournals/iacr/CramerDKZZ11http://eprint.iacr.org/2011/280https://dblp.org/rec/journals/iacr/CramerDKZZ11URL#4758561Ronald CramerIvan DamgårdValerio PastroOn the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations.IACR Cryptol. ePrint Arch.20113012011Informal and Other Publicationsopenjournals/iacr/CramerDP11http://eprint.iacr.org/2011/301https://dblp.org/rec/journals/iacr/CramerDP11URL#4758562Cas CremersMichèle FeltzOne-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability.IACR Cryptol. ePrint Arch.20113002011Informal and Other Publicationsopenjournals/iacr/CremersF11http://eprint.iacr.org/2011/300https://dblp.org/rec/journals/iacr/CremersF11URL#4758563Cas CremersKasper Bonne RasmussenSrdjan CapkunDistance Hijacking Attacks on Distance Bounding Protocols.IACR Cryptol. ePrint Arch.20111292011Informal and Other Publicationsopenjournals/iacr/CremersRC11http://eprint.iacr.org/2011/129https://dblp.org/rec/journals/iacr/CremersRC11URL#4758564Emiliano De CristofaroAnthony DurusselImad AadReclaiming Privacy for Smartphone Applications.IACR Cryptol. ePrint Arch.2011412011Informal and Other Publicationsopenjournals/iacr/CristofaroDA11http://eprint.iacr.org/2011/041https://dblp.org/rec/journals/iacr/CristofaroDA11URL#4758565Emiliano De CristofaroPaolo GastiGene TsudikFast and Private Computation of Set Intersection Cardinality.IACR Cryptol. ePrint Arch.20111412011Informal and Other Publicationsopenjournals/iacr/CristofaroGT11http://eprint.iacr.org/2011/141https://dblp.org/rec/journals/iacr/CristofaroGT11URL#4758566Emiliano De CristofaroYanbin LuGene TsudikEfficient Techniques for Privacy-Preserving Sharing of Sensitive Information.IACR Cryptol. ePrint Arch.20111132011Informal and Other Publicationsopenjournals/iacr/CristofaroLT11http://eprint.iacr.org/2011/113https://dblp.org/rec/journals/iacr/CristofaroLT11URL#4758567Emiliano De CristofaroMark ManulisBertram PoetteringPrivate Discovery of Common Social Contacts.IACR Cryptol. ePrint Arch.2011262011Informal and Other Publicationsopenjournals/iacr/CristofaroMP11http://eprint.iacr.org/2011/026https://dblp.org/rec/journals/iacr/CristofaroMP11URL#4758568Emiliano De CristofaroClaudio SorienteGene TsudikAndrew Williams 0003Hummingbird: Privacy at the time of Twitter.IACR Cryptol. ePrint Arch.20116402011Informal and Other Publicationsopenjournals/iacr/CristofaroSTW11http://eprint.iacr.org/2011/640https://dblp.org/rec/journals/iacr/CristofaroSTW11URL#4758569László CsirmazComplexity of universal access structures.IACR Cryptol. ePrint Arch.20113752011Informal and Other Publicationsopenjournals/iacr/Csirmaz11http://eprint.iacr.org/2011/375https://dblp.org/rec/journals/iacr/Csirmaz11URL#4758570László CsirmazHow to share secrets simultaneously.IACR Cryptol. ePrint Arch.20113862011Informal and Other Publicationsopenjournals/iacr/Csirmaz11ahttp://eprint.iacr.org/2011/386https://dblp.org/rec/journals/iacr/Csirmaz11aURL#4758571László CsirmazGábor TardosOn-line secret sharing.IACR Cryptol. ePrint Arch.20111742011Informal and Other Publicationsopenjournals/iacr/CsirmazT11http://eprint.iacr.org/2011/174https://dblp.org/rec/journals/iacr/CsirmazT11URL#4758572Dana Dachman-SoledRosario GennaroHugo KrawczykTal MalkinComputational Extractors and Pseudorandomness.IACR Cryptol. ePrint Arch.20117082011Informal and Other Publicationsopenjournals/iacr/Dachman-SoledGKM11http://eprint.iacr.org/2011/708https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11URL#4758573Dana Dachman-SoledTal MalkinMariana Raykova 0001Muthuramakrishnan VenkitasubramaniamAdaptive and Concurrent Secure Computation from New Notions of Non-Malleability.IACR Cryptol. ePrint Arch.20116112011Informal and Other Publicationsopenjournals/iacr/Dachman-SoledMRV11http://eprint.iacr.org/2011/611https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11URL#4758574Joan DaemenTony DusengeGilles Van AsscheSufficient conditions for sound hashing using a truncated permutation.IACR Cryptol. ePrint Arch.20114592011Informal and Other Publicationsopenjournals/iacr/DaemenDA11http://eprint.iacr.org/2011/459https://dblp.org/rec/journals/iacr/DaemenDA11URL#4758575Zhaopeng DaiZhuojun LiuThe Single Cycle T-functions.IACR Cryptol. ePrint Arch.20115472011Informal and Other Publicationsopenjournals/iacr/DaiL11http://eprint.iacr.org/2011/547https://dblp.org/rec/journals/iacr/DaiL11URL#4758576Ivan DamgårdSebastian FaustCarmit HazaySecure Two-Party Computation with Low Communication.IACR Cryptol. ePrint Arch.20115082011Informal and Other Publicationsopenjournals/iacr/DamgardFH11http://eprint.iacr.org/2011/508https://dblp.org/rec/journals/iacr/DamgardFH11URL#4758577Ivan DamgårdJakob FunderJesper Buus NielsenLouis SalvailSuperposition Attacks on Cryptographic Protocols}.IACR Cryptol. ePrint Arch.20114212011Informal and Other Publicationsopenjournals/iacr/DamgardFNS11http://eprint.iacr.org/2011/421https://dblp.org/rec/journals/iacr/DamgardFNS11URL#4758578Ivan DamgårdValerio PastroNigel P. SmartSarah ZakariasMultiparty Computation from Somewhat Homomorphic Encryption.IACR Cryptol. ePrint Arch.20115352011Informal and Other Publicationsopenjournals/iacr/DamgardPSZ11http://eprint.iacr.org/2011/535https://dblp.org/rec/journals/iacr/DamgardPSZ11URL#4758579George DanezisMarkulf KohlweissAlfredo RialDifferentially Private Billing with Rebates.IACR Cryptol. ePrint Arch.20111342011Informal and Other Publicationsopenjournals/iacr/DanezisKR11http://eprint.iacr.org/2011/134https://dblp.org/rec/journals/iacr/DanezisKR11URL#4758580Bernardo Machado DavidAnderson C. A. NascimentoRafael TonicelliA Framework for Secure Single Sign-On.IACR Cryptol. ePrint Arch.20112462011Informal and Other Publicationsopenjournals/iacr/DavidNT11http://eprint.iacr.org/2011/246https://dblp.org/rec/journals/iacr/DavidNT11URL#4758581Jean Paul DegabrieleAnja LehmannKenneth G. PatersonNigel P. SmartMario StreflerOn the Joint Security of Encryption and Signature in EMV.IACR Cryptol. ePrint Arch.20116152011Informal and Other Publicationsopenjournals/iacr/DegabrieleLPSS11http://eprint.iacr.org/2011/615https://dblp.org/rec/journals/iacr/DegabrieleLPSS11URL#4758582Amine DehbaouiSébastien TiranPhilippe MaurineFrançois-Xavier StandaertNicolas Veyrat-CharvillonSpectral Coherence Analysis - First Experimental Results -.IACR Cryptol. ePrint Arch.2011562011Informal and Other Publicationsopenjournals/iacr/DehbaouiTMSV11http://eprint.iacr.org/2011/056https://dblp.org/rec/journals/iacr/DehbaouiTMSV11URL#4758583Yi Deng 0002Dengguo FengVipul GoyalDongdai LinAmit SahaiMoti YungResettable Cryptography in Constant Rounds - the Case of Zero Knowledge.IACR Cryptol. ePrint Arch.20114082011Informal and Other Publicationsopenjournals/iacr/DengFGLSY11http://eprint.iacr.org/2011/408https://dblp.org/rec/journals/iacr/DengFGLSY11URL#4758584Jintai DingInverting the Square systems is exponential.IACR Cryptol. ePrint Arch.20112752011Informal and Other Publicationsopenjournals/iacr/Ding11http://eprint.iacr.org/2011/275https://dblp.org/rec/journals/iacr/Ding11URL#4758585Jintai DingThorsten KleinjungDegree of regularity for HFE-.IACR Cryptol. ePrint Arch.20115702011Informal and Other Publicationsopenjournals/iacr/DingK11http://eprint.iacr.org/2011/570https://dblp.org/rec/journals/iacr/DingK11URL#4758586Itai DinurOrr DunkelmanAdi ShamirImproved Attacks on Full GOST.IACR Cryptol. ePrint Arch.20115582011Informal and Other Publicationsopenjournals/iacr/DinurDS11http://eprint.iacr.org/2011/558https://dblp.org/rec/journals/iacr/DinurDS11URL#4758587Itai DinurOrr DunkelmanAdi ShamirNew attacks on Keccak-224 and Keccak-256.IACR Cryptol. ePrint Arch.20116242011Informal and Other Publicationsopenjournals/iacr/DinurDS11ahttp://eprint.iacr.org/2011/624https://dblp.org/rec/journals/iacr/DinurDS11aURL#4758588Itai DinurTim GüneysuChristof PaarAdi ShamirRalf Zimmermann 0001An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.IACR Cryptol. ePrint Arch.20112822011Informal and Other Publicationsopenjournals/iacr/DinurGPSZ11http://eprint.iacr.org/2011/282https://dblp.org/rec/journals/iacr/DinurGPSZ11URL#4758589Yevgeniy DodisIftach HaitnerAris TentesOn the (In)Security of RSA Signatures.IACR Cryptol. ePrint Arch.2011872011Informal and Other Publicationsopenjournals/iacr/DodisHT11http://eprint.iacr.org/2011/087https://dblp.org/rec/journals/iacr/DodisHT11URL#4758590Yevgeniy DodisAllison B. LewkoBrent WatersDaniel WichsStoring Secrets on Continually Leaky Devices.IACR Cryptol. ePrint Arch.20113692011Informal and Other Publicationsopenjournals/iacr/DodisLWW11http://eprint.iacr.org/2011/369https://dblp.org/rec/journals/iacr/DodisLWW11URL#4758591Julien DogetGuillaume DabosvilleEmmanuel ProuffDefeat Masking With a (Very) Few Knowledge About the Leakage.IACR Cryptol. ePrint Arch.20115052011Informal and Other Publicationsopenjournals/iacr/DogetDP11http://eprint.iacr.org/2011/505https://dblp.org/rec/journals/iacr/DogetDP11URL#4758592Julien DogetEmmanuel ProuffMatthieu RivainFrançois-Xavier StandaertUnivariate Side Channel Attacks and Leakage Modeling.IACR Cryptol. ePrint Arch.20113022011Informal and Other Publicationsopenjournals/iacr/DogetPRS11http://eprint.iacr.org/2011/302https://dblp.org/rec/journals/iacr/DogetPRS11URL#4758593Leo DorrendorfProtecting Drive Encryption Systems Against Memory Attacks.IACR Cryptol. ePrint Arch.20112212011Informal and Other Publicationsopenjournals/iacr/Dorrendorf11http://eprint.iacr.org/2011/221https://dblp.org/rec/journals/iacr/Dorrendorf11URL#4758594Nico DöttlingThilo MieJörn Müller-QuadeTobias NilgesBasing Obfuscation on Simple Tamper-Proof Hardware Assumptions.IACR Cryptol. ePrint Arch.20116752011Informal and Other Publicationsopenjournals/iacr/DottlingMMN11http://eprint.iacr.org/2011/675https://dblp.org/rec/journals/iacr/DottlingMMN11URL#4758595Mohammad Sadeq DoustiRasool JaliliMilder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols.IACR Cryptol. ePrint Arch.20115142011Informal and Other Publicationsopenjournals/iacr/DoustiJ11http://eprint.iacr.org/2011/514https://dblp.org/rec/journals/iacr/DoustiJ11URL#4758596Jannik DreierFlorian KerschbaumPractical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation.IACR Cryptol. ePrint Arch.20111082011Informal and Other Publicationsopenjournals/iacr/DreierK11http://eprint.iacr.org/2011/108https://dblp.org/rec/journals/iacr/DreierK11URL#4758597Vladimir O. DrelikhovGrigory B. MarshalkoAlexey V. PokrovskiyOn the security of MQ_DRBG.IACR Cryptol. ePrint Arch.20115482011Informal and Other Publicationsopenjournals/iacr/DrelikhovMP11http://eprint.iacr.org/2011/548https://dblp.org/rec/journals/iacr/DrelikhovMP11URL#4758598Ming DuanXuejia LaiImproved zero-sum distinguisher for full round Keccak-f permutation.IACR Cryptol. ePrint Arch.2011232011Informal and Other Publicationsopenjournals/iacr/DuanL11http://eprint.iacr.org/2011/023https://dblp.org/rec/journals/iacr/DuanL11URL#4758599Elena DubrovaA Scalable Method for Constructing Galois NLFSRs with Period 2n-1 using Cross-Join Pairs.IACR Cryptol. ePrint Arch.20116322011Informal and Other Publicationsopenjournals/iacr/Dubrova11http://eprint.iacr.org/2011/632https://dblp.org/rec/journals/iacr/Dubrova11URL#4758600Alexandre DucJian Guo 0001Thomas PeyrinLei Wei 0001Unaligned Rebound Attack - Application to Keccak.IACR Cryptol. ePrint Arch.20114202011Informal and Other Publicationsopenjournals/iacr/DucGPW11http://eprint.iacr.org/2011/420https://dblp.org/rec/journals/iacr/DucGPW11URL#4758601Alexandre DucDimitar JetchevHardness of Computing Individual Bits for Pairing-based One-way Functions.IACR Cryptol. ePrint Arch.20113292011Informal and Other Publicationsopenjournals/iacr/DucJ11http://eprint.iacr.org/2011/329https://dblp.org/rec/journals/iacr/DucJ11URL#4758602Orr DunkelmanNathan KellerAdi ShamirALRED Blues: New Attacks on AES-Based MAC's.IACR Cryptol. ePrint Arch.2011952011Informal and Other Publicationsopenjournals/iacr/DunkelmanKS11http://eprint.iacr.org/2011/095https://dblp.org/rec/journals/iacr/DunkelmanKS11URL#4758603Orr DunkelmanNathan KellerAdi ShamirMinimalism in Cryptography: The Even-Mansour Scheme Revisited.IACR Cryptol. ePrint Arch.20115412011Informal and Other Publicationsopenjournals/iacr/DunkelmanKS11ahttp://eprint.iacr.org/2011/541https://dblp.org/rec/journals/iacr/DunkelmanKS11aURL#4758604Sylvain DuquesneNicolas GuillerminA FPGA pairing implementation using the Residue Number System.IACR Cryptol. ePrint Arch.20111762011Informal and Other Publicationsopenjournals/iacr/DuquesneG11http://eprint.iacr.org/2011/176https://dblp.org/rec/journals/iacr/DuquesneG11URL#4758605Ulrich DürholzMarc FischlinMichael KasperCristina OneteA Formal Approach to Distance-Bounding RFID Protocols.IACR Cryptol. ePrint Arch.20113212011Informal and Other Publicationsopenjournals/iacr/DurholzFKO11http://eprint.iacr.org/2011/321https://dblp.org/rec/journals/iacr/DurholzFKO11URL#4758606Markus DürmuthDavid Mandell FreemanDeniable Encryption with Negligible Detection Probability: An Interactive Construction.IACR Cryptol. ePrint Arch.2011662011Informal and Other Publicationsopenjournals/iacr/DurmuthF11http://eprint.iacr.org/2011/066https://dblp.org/rec/journals/iacr/DurmuthF11URL#4758607Stefan DziembowskiSebastian FaustLeakage-Resilient Cryptography From the Inner-Product Extractor.IACR Cryptol. ePrint Arch.20115192011Informal and Other Publicationsopenjournals/iacr/DziembowskiF11http://eprint.iacr.org/2011/519https://dblp.org/rec/journals/iacr/DziembowskiF11URL#4758608Stefan DziembowskiTomasz KazanaDaniel WichsKey-Evolution Schemes Resilient to Space-Bounded Leakage.IACR Cryptol. ePrint Arch.20115302011Informal and Other Publicationsopenjournals/iacr/DziembowskiKW11http://eprint.iacr.org/2011/530https://dblp.org/rec/journals/iacr/DziembowskiKW11URL#4758609Kaoutar ElkhiyaouiErik-Oliver BlassRefik MolvaCHECKER: On-site checking in RFID-based supply chains.IACR Cryptol. ePrint Arch.20116512011Informal and Other Publicationsopenjournals/iacr/ElkhiyaouiBM11http://eprint.iacr.org/2011/651https://dblp.org/rec/journals/iacr/ElkhiyaouiBM11URL#4758610Daniel W. EngelsMarkku-Juhani O. SaarinenPeter SchweitzerEric M. SmithThe Hummingbird-2 Lightweight Authenticated Encryption Algorithm.IACR Cryptol. ePrint Arch.20111262011Informal and Other Publicationsopenjournals/iacr/EngelsSSS11http://eprint.iacr.org/2011/126https://dblp.org/rec/journals/iacr/EngelsSSS11URL#4758611Stefan EricksonMichael J. Jacobson Jr.Andreas SteinExplicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation.IACR Cryptol. ePrint Arch.20111052011Informal and Other Publicationsopenjournals/iacr/EricksonJS11http://eprint.iacr.org/2011/105https://dblp.org/rec/journals/iacr/EricksonJS11URL#4758612Alex EscalaJavier HerranzPaz MorilloRevocable Attribute-Based Signatures with Adaptive Security in the Standard Model.IACR Cryptol. ePrint Arch.2011522011Informal and Other Publicationsopenjournals/iacr/EscalaHM11http://eprint.iacr.org/2011/052https://dblp.org/rec/journals/iacr/EscalaHM11URL#4758613Ziba EslamiNasrollah PakniatCertificateless Aggregate Signcryption Schemes.IACR Cryptol. ePrint Arch.20113602011Informal and Other Publicationsopenjournals/iacr/EslamiP11http://eprint.iacr.org/2011/360https://dblp.org/rec/journals/iacr/EslamiP11URL#4758614Aleksander EssexChristian HenrichUrs HengartnerSingle Layer Optical-scan Voting with Fully Distributed Trust.IACR Cryptol. ePrint Arch.20115682011Informal and Other Publicationsopenjournals/iacr/EssexHH11http://eprint.iacr.org/2011/568https://dblp.org/rec/journals/iacr/EssexHH11URL#4758615Mohammad Sabzinejad FarashMahmoud Ahmadian-AttariMajid BayatSecurity of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol.IACR Cryptol. ePrint Arch.20116342011Informal and Other Publicationsopenjournals/iacr/FarashAB11http://eprint.iacr.org/2011/634https://dblp.org/rec/journals/iacr/FarashAB11URL#4758616Reza Rezaeian FarashahiDustin MoodyHongfeng WuIsomorphism classes of Edwards curves over finite fields.IACR Cryptol. ePrint Arch.20112062011Informal and Other Publicationsopenjournals/iacr/FarashahiMW11http://eprint.iacr.org/2011/206https://dblp.org/rec/journals/iacr/FarashahiMW11URL#4758617Farshid FarhatSomayeh SalimiAhmad SalahiPrivate Identification, Authentication and Key Agreement Protocol with Security Mode Setup.IACR Cryptol. ePrint Arch.2011452011Informal and Other Publicationsopenjournals/iacr/FarhatSS11http://eprint.iacr.org/2011/045https://dblp.org/rec/journals/iacr/FarhatSS11URL#4758618Jean-Charles FaugèreLudovic PerretChristophe Petit 0001Guénaël RenaultNew Subexponential Algorithms for Factoring in SL(2, fq).IACR Cryptol. ePrint Arch.20115982011Informal and Other Publicationsopenjournals/iacr/FaugerePPR11http://eprint.iacr.org/2011/598https://dblp.org/rec/journals/iacr/FaugerePPR11URL#4758619Sebastian FaustKrzysztof PietrzakDaniele Venturi 0001Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience.IACR Cryptol. ePrint Arch.20113142011Informal and Other Publicationsopenjournals/iacr/FaustPV11http://eprint.iacr.org/2011/314https://dblp.org/rec/journals/iacr/FaustPV11URL#4758620Nelly FazioKevin IgaAntonio NicolosiLudovic PerretWilliam E. Skeith IIIRandom Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.IACR Cryptol. ePrint Arch.20113982011Informal and Other Publicationsopenjournals/iacr/FazioINPS11http://eprint.iacr.org/2011/398https://dblp.org/rec/journals/iacr/FazioINPS11URL#4758621Nathaniel Wesley FilardoGiuseppe AtenieseHigh-Entropy Visual Identification for Touch Screen Devices.IACR Cryptol. ePrint Arch.20113592011Informal and Other Publicationsopenjournals/iacr/FilardoA11http://eprint.iacr.org/2011/359https://dblp.org/rec/journals/iacr/FilardoA11URL#4758622Marc FischlinAnja LehmannDominique SchröderHistory-Free Sequential Aggregate Signatures.IACR Cryptol. ePrint Arch.20112312011Informal and Other Publicationsopenjournals/iacr/FischlinLS11http://eprint.iacr.org/2011/231https://dblp.org/rec/journals/iacr/FischlinLS11URL#4758623Nils FleischhackerFelix Günther 0001Franziskus KieferMark ManulisBertram PoetteringPseudorandom Signatures.IACR Cryptol. ePrint Arch.20116732011Informal and Other Publicationsopenjournals/iacr/FleischhackerGKMP11http://eprint.iacr.org/2011/673https://dblp.org/rec/journals/iacr/FleischhackerGKMP11URL#4758624Ewan FleischmannChristian ForlerStefan LucksJakob Wenzel 0001McOE: A Foolproof On-Line Authenticated Encryption Scheme.IACR Cryptol. ePrint Arch.20116442011Informal and Other Publicationsopenjournals/iacr/FleischmannFL11http://eprint.iacr.org/2011/644https://dblp.org/rec/journals/iacr/FleischmannFL11URL#4758625Jean-Pierre FloriSihem MesnagerAn efficient characterization of a family of hyperbent functions with multiple trace terms.IACR Cryptol. ePrint Arch.20113732011Informal and Other Publicationsopenjournals/iacr/FloriM11http://eprint.iacr.org/2011/373https://dblp.org/rec/journals/iacr/FloriM11URL#4758626Jean-Pierre FloriSihem MesnagerGérard D. CohenThe Value 4 of Binary Kloosterman Sums.IACR Cryptol. ePrint Arch.20113642011Informal and Other Publicationsopenjournals/iacr/FloriMC11http://eprint.iacr.org/2011/364https://dblp.org/rec/journals/iacr/FloriMC11URL#4758627Jean-Pierre FloriHugues RandriamOn the Number of Carries Occuring in an Addition mod 2k-1.IACR Cryptol. ePrint Arch.20112452011Informal and Other Publicationsopenjournals/iacr/FloriR11http://eprint.iacr.org/2011/245https://dblp.org/rec/journals/iacr/FloriR11URL#4758628Pierre-Alain FouqueMehdi TibouchiClose to Uniform Prime Number Generation With Fewer Random Bits.IACR Cryptol. ePrint Arch.20114812011Informal and Other Publicationsopenjournals/iacr/FouqueT11http://eprint.iacr.org/2011/481https://dblp.org/rec/journals/iacr/FouqueT11URL#4758629Lishoy FrancisGerhard P. Hancke 0002Keith MayesKonstantinos MarkantonakisPractical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.IACR Cryptol. ePrint Arch.20116182011Informal and Other Publicationsopenjournals/iacr/FrancisHMM11http://eprint.iacr.org/2011/618https://dblp.org/rec/journals/iacr/FrancisHMM11URL#4758630Manish GargSugata GangopadhyayOn lower bounds on second-order nonliearities of bent functions obtained by using Niho power functions.IACR Cryptol. ePrint Arch.20111712011Informal and Other Publicationsopenjournals/iacr/GargG11http://eprint.iacr.org/2011/171https://dblp.org/rec/journals/iacr/GargG11URL#4758631Manish GargSugata GangopadhyayThe Good lower bound of Second-order nonlinearity of a class of Boolean function.IACR Cryptol. ePrint Arch.20114522011Informal and Other Publicationsopenjournals/iacr/GargG11ahttp://eprint.iacr.org/2011/452https://dblp.org/rec/journals/iacr/GargG11aURL#4758632Sanjam GargVipul GoyalAbhishek Jain 0002Amit SahaiConcurrently Secure Computation in Constant Rounds.IACR Cryptol. ePrint Arch.20112512011Informal and Other Publicationsopenjournals/iacr/GargGJS11http://eprint.iacr.org/2011/251https://dblp.org/rec/journals/iacr/GargGJS11URL#4758633Sanjam GargRafail OstrovskyIvan ViscontiAkshay WadiaResettable Statistical Zero Knowledge.IACR Cryptol. ePrint Arch.20114572011Informal and Other Publicationsopenjournals/iacr/GargOVW11http://eprint.iacr.org/2011/457https://dblp.org/rec/journals/iacr/GargOVW11URL#4758634Pierrick GaudryDavid R. KohelBenjamin A. SmithCounting Points on Genus 2 Curves with Real Multiplication.IACR Cryptol. ePrint Arch.20112952011Informal and Other Publicationsopenjournals/iacr/GaudryKS11http://eprint.iacr.org/2011/295https://dblp.org/rec/journals/iacr/GaudryKS11URL#4758635Laurie GenelleEmmanuel ProuffMichaël QuisquaterThwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings.IACR Cryptol. ePrint Arch.20114252011Informal and Other Publicationsopenjournals/iacr/GenellePQ11http://eprint.iacr.org/2011/425https://dblp.org/rec/journals/iacr/GenellePQ11URL#4758636Craig GentryShai HaleviFully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits.IACR Cryptol. ePrint Arch.20112792011Informal and Other Publicationsopenjournals/iacr/GentryH11http://eprint.iacr.org/2011/279https://dblp.org/rec/journals/iacr/GentryH11URL#4758637Craig GentryShai HaleviNigel P. SmartFully Homomorphic Encryption with Polylog Overhead.IACR Cryptol. ePrint Arch.20115662011Informal and Other Publicationsopenjournals/iacr/GentryHS11http://eprint.iacr.org/2011/566https://dblp.org/rec/journals/iacr/GentryHS11URL#4758638Craig GentryShai HaleviNigel P. SmartBetter Bootstrapping in Fully Homomorphic Encryption.IACR Cryptol. ePrint Arch.20116802011Informal and Other Publicationsopenjournals/iacr/GentryHS11ahttp://eprint.iacr.org/2011/680https://dblp.org/rec/journals/iacr/GentryHS11aURL#4758639Essam GhadafiFormalizing Group Blind Signatures and Practical Constructions without Random Oracles.IACR Cryptol. ePrint Arch.20114022011Informal and Other Publicationsopenjournals/iacr/Ghadafi11ahttp://eprint.iacr.org/2011/402https://dblp.org/rec/journals/iacr/Ghadafi11aURL#4758640Santosh GhoshDebdeep MukhopadhyayDipanwita Roy ChowdhurySecurity of Prime Field Pairing Cryptoprocessor Against Differential Power Attack.IACR Cryptol. ePrint Arch.20111812011Informal and Other Publicationsopenjournals/iacr/GhoshMC11http://eprint.iacr.org/2011/181https://dblp.org/rec/journals/iacr/GhoshMC11URL#4758641Benjamin GittinsOutline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs.IACR Cryptol. ePrint Arch.2011292011Informal and Other Publicationsopenjournals/iacr/Gittins11http://eprint.iacr.org/2011/029https://dblp.org/rec/journals/iacr/Gittins11URL#4758642Danilo GligoroskiRune Steinsmo ØdegårdRune Erlend JensenOBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak.IACR Cryptol. ePrint Arch.20112612011Informal and Other Publicationsopenjournals/iacr/GligoroskiOJ11http://eprint.iacr.org/2011/261https://dblp.org/rec/journals/iacr/GligoroskiOJ11URL#4758643Shafi GoldwasserHuijia LinAviad RubinsteinDelegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.IACR Cryptol. ePrint Arch.20114562011Informal and Other Publicationsopenjournals/iacr/GoldwasserLR11http://eprint.iacr.org/2011/456https://dblp.org/rec/journals/iacr/GoldwasserLR11URL#4758644S. Dov GordonJonathan KatzVladimir KolesnikovTal MalkinMariana Raykova 0001Yevgeniy VahlisSecure Computation with Sublinear Amortized Work.IACR Cryptol. ePrint Arch.20114822011Informal and Other Publicationsopenjournals/iacr/GordonKKMRV11http://eprint.iacr.org/2011/482https://dblp.org/rec/journals/iacr/GordonKKMRV11URL#4758645S. Dov GordonJonathan KatzVinod VaikuntanathanA Group Signature Scheme from Lattice Assumptions.IACR Cryptol. ePrint Arch.2011602011Informal and Other Publicationsopenjournals/iacr/GordonKV11http://eprint.iacr.org/2011/060https://dblp.org/rec/journals/iacr/GordonKV11URL#4758646Eyal Z. GorenKristin E. LauterA Gross-Zagier formula for quaternion algebras over totally real fields.IACR Cryptol. ePrint Arch.20116662011Informal and Other Publicationsopenjournals/iacr/GorenL11http://eprint.iacr.org/2011/666https://dblp.org/rec/journals/iacr/GorenL11URL#4758647Masahito GotaishiShigeo TsujiiHidden Pair of Bijection Signature Scheme.IACR Cryptol. ePrint Arch.20113532011Informal and Other Publicationsopenjournals/iacr/GotaishiT11http://eprint.iacr.org/2011/353https://dblp.org/rec/journals/iacr/GotaishiT11URL#4758648Louis GoubinAnge MartinelliProtecting AES with Shamir's Secret Sharing Scheme.IACR Cryptol. ePrint Arch.20115162011Informal and Other Publicationsopenjournals/iacr/GoubinM11http://eprint.iacr.org/2011/516https://dblp.org/rec/journals/iacr/GoubinM11URL#4758649Vipul GoyalPositive Results for Concurrently Secure Computation in the Plain Model.IACR Cryptol. ePrint Arch.20116022011Informal and Other Publicationsopenjournals/iacr/Goyal11http://eprint.iacr.org/2011/602https://dblp.org/rec/journals/iacr/Goyal11URL#4758650Vipul GoyalAdam O'NeillVanishree RaoCorrelated-Input Secure Hash Functions.IACR Cryptol. ePrint Arch.20112332011Informal and Other Publicationsopenjournals/iacr/GoyalOR11http://eprint.iacr.org/2011/233https://dblp.org/rec/journals/iacr/GoyalOR11URL#4758651Robert GrangerAndrew MossGeneralised Mersenne Numbers Revisited.IACR Cryptol. ePrint Arch.20114442011Informal and Other Publicationsopenjournals/iacr/GrangerM11http://eprint.iacr.org/2011/444https://dblp.org/rec/journals/iacr/GrangerM11URL#4758652Evgeny A. GrechnikovAndrew V. AdinetzCollision for 75-step SHA-1: Intensive Parallelization with GPU.IACR Cryptol. ePrint Arch.20116412011Informal and Other Publicationsopenjournals/iacr/GrechnikovA11http://eprint.iacr.org/2011/641https://dblp.org/rec/journals/iacr/GrechnikovA11URL#4758653Matthew Green 0001Secure Blind Decryption.IACR Cryptol. ePrint Arch.20111092011Informal and Other Publicationsopenjournals/iacr/Green11http://eprint.iacr.org/2011/109https://dblp.org/rec/journals/iacr/Green11URL#4758654Adam GroceJonathan KatzFair Computation with Rational Players.IACR Cryptol. ePrint Arch.20113962011Informal and Other Publicationsopenjournals/iacr/GroceK11http://eprint.iacr.org/2011/396https://dblp.org/rec/journals/iacr/GroceK11URL#4758655Johann GroßschädlDan PageEfficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.IACR Cryptol. ePrint Arch.20117122011Informal and Other Publicationsopenjournals/iacr/GrossschadlP11http://eprint.iacr.org/2011/712https://dblp.org/rec/journals/iacr/GrossschadlP11URL#4758656Jens GrothMinimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption.IACR Cryptol. ePrint Arch.2011122011Informal and Other Publicationsopenjournals/iacr/Groth11http://eprint.iacr.org/2011/012https://dblp.org/rec/journals/iacr/Groth11URL#4758657Chunsheng GuNew Fully Homomorphic Encryption over the Integers.IACR Cryptol. ePrint Arch.20111182011Informal and Other Publicationsopenjournals/iacr/Gu11http://eprint.iacr.org/2011/118https://dblp.org/rec/journals/iacr/Gu11URL#4758658Chunsheng GuMore Practical Fully Homomorphic Encryption.IACR Cryptol. ePrint Arch.20111212011Informal and Other Publicationsopenjournals/iacr/Gu11bhttp://eprint.iacr.org/2011/121https://dblp.org/rec/journals/iacr/Gu11bURL#4758659Chunsheng GuNew Fully Homomorphic Encryption without Bootstrapping.IACR Cryptol. ePrint Arch.20116452011Informal and Other Publicationsopenjournals/iacr/Gu11chttp://eprint.iacr.org/2011/645https://dblp.org/rec/journals/iacr/Gu11cURL#4758660Shay GueronEfficient Software Implementations of Modular Exponentiation.IACR Cryptol. ePrint Arch.20112392011Informal and Other Publicationsopenjournals/iacr/Gueron11http://eprint.iacr.org/2011/239https://dblp.org/rec/journals/iacr/Gueron11URL#4758661Shay GueronMichael E. KounavisSecurity Enhancement of the Vortex Family of Hash Functions.IACR Cryptol. ePrint Arch.20116522011Informal and Other Publicationsopenjournals/iacr/GueronK11http://eprint.iacr.org/2011/652https://dblp.org/rec/journals/iacr/GueronK11URL#4758662Nicolas GuillerminA coprocessor for secure and high speed modular arithmetic.IACR Cryptol. ePrint Arch.20113542011Informal and Other Publicationsopenjournals/iacr/Guillermin11http://eprint.iacr.org/2011/354https://dblp.org/rec/journals/iacr/Guillermin11URL#4758663Aurore GuillevicDamien VergnaudGenus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions.IACR Cryptol. ePrint Arch.20116042011Informal and Other Publicationsopenjournals/iacr/GuillevicV11http://eprint.iacr.org/2011/604https://dblp.org/rec/journals/iacr/GuillevicV11URL#4758664Felix Günther 0001Mark ManulisThorsten StrufeCryptographic Treatment of Private User Profiles.IACR Cryptol. ePrint Arch.2011642011Informal and Other Publicationsopenjournals/iacr/GuntherMS11http://eprint.iacr.org/2011/064https://dblp.org/rec/journals/iacr/GuntherMS11URL#4758665Jian Guo 0001Thomas PeyrinAxel PoschmannThe PHOTON Family of Lightweight Hash Functions.IACR Cryptol. ePrint Arch.20116092011Informal and Other Publicationsopenjournals/iacr/GuoPP11http://eprint.iacr.org/2011/609https://dblp.org/rec/journals/iacr/GuoPP11URL#4758666Raja Zeshan HaiderBirthday Forgery Attack on 128-EIA3 Version 1.5.IACR Cryptol. ePrint Arch.20112682011Informal and Other Publicationsopenjournals/iacr/Haider11http://eprint.iacr.org/2011/268https://dblp.org/rec/journals/iacr/Haider11URL#4758667Iftach HaitnerItay BermanFrom Non-Adaptive to Adaptive Pseudorandom Functions.IACR Cryptol. ePrint Arch.20115042011Informal and Other Publicationsopenjournals/iacr/HaitnerB11http://eprint.iacr.org/2011/504https://dblp.org/rec/journals/iacr/HaitnerB11URL#4758668Shai HaleviDanny HarnikBenny PinkasAlexandra Shulman-PelegProofs of Ownership in Remote Storage Systems.IACR Cryptol. ePrint Arch.20112072011Informal and Other Publicationsopenjournals/iacr/HaleviHPS11http://eprint.iacr.org/2011/207https://dblp.org/rec/journals/iacr/HaleviHPS11URL#4758669Shai HaleviHuijia LinAfter-the-Fact Leakage in Public-Key Encryption.IACR Cryptol. ePrint Arch.2011112011Informal and Other Publicationsopenjournals/iacr/HaleviL11http://eprint.iacr.org/2011/011https://dblp.org/rec/journals/iacr/HaleviL11URL#4758670Shai HaleviYehuda LindellBenny PinkasSecure Computation on the Web: Computing without Simultaneous Interaction.IACR Cryptol. ePrint Arch.20111572011Informal and Other Publicationsopenjournals/iacr/HaleviLP11http://eprint.iacr.org/2011/157https://dblp.org/rec/journals/iacr/HaleviLP11URL#4758671Mike HamburgSpatial Encryption.IACR Cryptol. ePrint Arch.20113892011Informal and Other Publicationsopenjournals/iacr/Hamburg11http://eprint.iacr.org/2011/389https://dblp.org/rec/journals/iacr/Hamburg11URL#4758672Neil HanleyMichael TunstallWilliam P. MarnaneUsing Templates to Distinguish Multiplications from Squaring Operations.IACR Cryptol. ePrint Arch.20112362011Informal and Other Publicationsopenjournals/iacr/HanleyTM11http://eprint.iacr.org/2011/236https://dblp.org/rec/journals/iacr/HanleyTM11URL#4758673Guillaume HanrotXavier PujolDamien StehléTerminating BKZ.IACR Cryptol. ePrint Arch.20111982011Informal and Other Publicationsopenjournals/iacr/HanrotPS11http://eprint.iacr.org/2011/198https://dblp.org/rec/journals/iacr/HanrotPS11URL#4758674Laszlo HarsRandom Number Generation Based on Oscillatory Metastability in Ring Circuits.IACR Cryptol. ePrint Arch.20116372011Informal and Other Publicationsopenjournals/iacr/Hars11http://eprint.iacr.org/2011/637https://dblp.org/rec/journals/iacr/Hars11URL#4758675Laurie HaustenneQuentin De NeyerOlivier PereiraElliptic Curve Cryptography in JavaScript.IACR Cryptol. ePrint Arch.20116542011Informal and Other Publicationsopenjournals/iacr/HaustenneNP11http://eprint.iacr.org/2011/654https://dblp.org/rec/journals/iacr/HaustenneNP11URL#4758676Carmit HazayGert Læssøe MikkelsenTal RabinTomas ToftEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.IACR Cryptol. ePrint Arch.20114942011Informal and Other Publicationsopenjournals/iacr/HazayMRT11http://eprint.iacr.org/2011/494https://dblp.org/rec/journals/iacr/HazayMRT11URL#4758677Debiao HeComments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.IACR Cryptol. ePrint Arch.20112342011Informal and Other Publicationsopenjournals/iacr/He11http://eprint.iacr.org/2011/234https://dblp.org/rec/journals/iacr/He11URL#4758678Debiao HeCryptanalysis of a key agreement protocol based on chaotic Hash.IACR Cryptol. ePrint Arch.20113332011Informal and Other Publicationsopenjournals/iacr/He11ahttp://eprint.iacr.org/2011/333https://dblp.org/rec/journals/iacr/He11aURL#4758679Debiao HeSecurity flaws in a biometrics-based multi-server authentication with key agreement scheme.IACR Cryptol. ePrint Arch.20113652011Informal and Other Publicationsopenjournals/iacr/He11dhttp://eprint.iacr.org/2011/365https://dblp.org/rec/journals/iacr/He11dURL#4758680Debiao HeComments on a password authentication and update scheme based on elliptic curve cryptography.IACR Cryptol. ePrint Arch.20114112011Informal and Other Publicationsopenjournals/iacr/He11ehttp://eprint.iacr.org/2011/411https://dblp.org/rec/journals/iacr/He11eURL#4758681Debiao HeJianhua Chen 0002Jin Hu 0001Identity-based Digital Signature Scheme Without Bilinear Pairings.IACR Cryptol. ePrint Arch.2011792011Informal and Other Publicationsopenjournals/iacr/HeCH11http://eprint.iacr.org/2011/079https://dblp.org/rec/journals/iacr/HeCH11URL#4758682Debiao HeJin Hu 0001An efficient certificateless two-party authenticated key agreement scheme from pairings.IACR Cryptol. ePrint Arch.20111122011Informal and Other Publicationsopenjournals/iacr/HeH11http://eprint.iacr.org/2011/112https://dblp.org/rec/journals/iacr/HeH11URL#4758683Debiao HeSahadeo PadhyeA Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model.IACR Cryptol. ePrint Arch.20114782011Informal and Other Publicationsopenjournals/iacr/HeP11http://eprint.iacr.org/2011/478https://dblp.org/rec/journals/iacr/HeP11URL#4758684Ethan HeilmanRestoring the Differential Resistance of MD6.IACR Cryptol. ePrint Arch.20113742011Informal and Other Publicationsopenjournals/iacr/Heilman11http://eprint.iacr.org/2011/374https://dblp.org/rec/journals/iacr/Heilman11URL#4758685Miia HermelinKaisa NybergLinear Cryptanalysis Using Multiple Linear Approximations.IACR Cryptol. ePrint Arch.2011932011Informal and Other Publicationsopenjournals/iacr/HermelinN11http://eprint.iacr.org/2011/093https://dblp.org/rec/journals/iacr/HermelinN11URL#4758686Martin HirtChristoph LucasUeli MaurerDominik RaubGraceful Degradation in Multi-Party Computation.IACR Cryptol. ePrint Arch.2011942011Informal and Other Publicationsopenjournals/iacr/HirtLMR11http://eprint.iacr.org/2011/094https://dblp.org/rec/journals/iacr/HirtLMR11URL#4758687Dennis HofheinzAll-But-Many Lossy Trapdoor Functions.IACR Cryptol. ePrint Arch.20112302011Informal and Other Publicationsopenjournals/iacr/Hofheinz11http://eprint.iacr.org/2011/230https://dblp.org/rec/journals/iacr/Hofheinz11URL#4758688Dennis HofheinzTibor JagerWaters Signatures with Optimal Security Reduction.IACR Cryptol. ePrint Arch.20117032011Informal and Other Publicationsopenjournals/iacr/HofheinzJ11http://eprint.iacr.org/2011/703https://dblp.org/rec/journals/iacr/HofheinzJ11URL#4758689Dennis HofheinzTibor JagerEike KiltzShort Signatures From Weaker Assumptions.IACR Cryptol. ePrint Arch.20112962011Informal and Other Publicationsopenjournals/iacr/HofheinzJK11http://eprint.iacr.org/2011/296https://dblp.org/rec/journals/iacr/HofheinzJK11URL#4758690Dennis HofheinzEike KiltzProgrammable Hash Functions and Their Applications.IACR Cryptol. ePrint Arch.20112702011Informal and Other Publicationsopenjournals/iacr/HofheinzK11http://eprint.iacr.org/2011/270https://dblp.org/rec/journals/iacr/HofheinzK11URL#4758691Dennis HofheinzVictor ShoupGNUC: A New Universal Composability Framework.IACR Cryptol. ePrint Arch.20113032011Informal and Other Publicationsopenjournals/iacr/HofheinzS11http://eprint.iacr.org/2011/303https://dblp.org/rec/journals/iacr/HofheinzS11URL#4758692Jeongdae HongJung Woo KimJihye KimKunsoo ParkJung Hee CheonConstant-Round Privacy Preserving Multiset Union.IACR Cryptol. ePrint Arch.20111382011Informal and Other Publicationsopenjournals/iacr/HongKKPC11http://eprint.iacr.org/2011/138https://dblp.org/rec/journals/iacr/HongKKPC11URL#4758693Hoon HongEunjeong LeeHyang-Sook LeeCheol-Min ParkSimple and Exact Formula for Minimum Loop Length in Atei Pairing based on Brezing-Weng Curves.IACR Cryptol. ePrint Arch.2011402011Informal and Other Publicationsopenjournals/iacr/HongLLP11http://eprint.iacr.org/2011/040https://dblp.org/rec/journals/iacr/HongLLP11URL#4758694Jin Hong 0001Ga Won Lee 0003Daegun MaAnalysis of the Parallel Distinguished Point Tradeoff.IACR Cryptol. ePrint Arch.20113872011Informal and Other Publicationsopenjournals/iacr/HongLM11http://eprint.iacr.org/2011/387https://dblp.org/rec/journals/iacr/HongLM11URL#4758695Zhi HuPatrick LongaMaozhi XuImplementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0.IACR Cryptol. ePrint Arch.20113152011Informal and Other Publicationsopenjournals/iacr/HuLX11http://eprint.iacr.org/2011/315https://dblp.org/rec/journals/iacr/HuLX11URL#4758696Hai HuangStrongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security.IACR Cryptol. ePrint Arch.20113462011Informal and Other Publicationsopenjournals/iacr/Huang11http://eprint.iacr.org/2011/346https://dblp.org/rec/journals/iacr/Huang11URL#4758697Mihaela IonGiovanni RusselloBruno CrispoSupporting Publication and Subscription Confidentiality in Pub/Sub Networks.IACR Cryptol. ePrint Arch.2011252011Informal and Other Publicationsopenjournals/iacr/IonRC11http://eprint.iacr.org/2011/025https://dblp.org/rec/journals/iacr/IonRC11URL#4758698Tibor JagerFlorian KohlarSven SchägeJörg SchwenkA Standard-Model Security Analysis of TLS-DHE.IACR Cryptol. ePrint Arch.20112192011Informal and Other Publicationsopenjournals/iacr/JagerKSS11http://eprint.iacr.org/2011/219https://dblp.org/rec/journals/iacr/JagerKSS11URL#4758699Abhishek Jain 0002Omkant PandeyNon-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships.IACR Cryptol. ePrint Arch.20115132011Informal and Other Publicationsopenjournals/iacr/JainP11http://eprint.iacr.org/2011/513https://dblp.org/rec/journals/iacr/JainP11URL#4758700David JaoLuca De FeoTowards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.IACR Cryptol. ePrint Arch.20115062011Informal and Other Publicationsopenjournals/iacr/JaoF11http://eprint.iacr.org/2011/506https://dblp.org/rec/journals/iacr/JaoF11URL#4758701Jérémy JeanMaría Naya-PlasenciaMartin SchläfferImproved Analysis of ECHO-256.IACR Cryptol. ePrint Arch.20114222011Informal and Other Publicationsopenjournals/iacr/JeanNS11http://eprint.iacr.org/2011/422https://dblp.org/rec/journals/iacr/JeanNS11URL#4758702Keting JiaHongbo YuXiaoyun Wang 0001A Meet-in-the-Middle Attack on the Full KASUMI.IACR Cryptol. ePrint Arch.20114662011Informal and Other Publicationsopenjournals/iacr/JiaYW11http://eprint.iacr.org/2011/466https://dblp.org/rec/journals/iacr/JiaYW11URL#4758703Qingfang JinZhuojun LiuBaofeng Wu1-Resilient Boolean Function with Optimal Algebraic Immunity.IACR Cryptol. ePrint Arch.20115492011Informal and Other Publicationsopenjournals/iacr/JinLW11http://eprint.iacr.org/2011/549https://dblp.org/rec/journals/iacr/JinLW11URL#4758704Qingfang JinZhuojun LiuBaofeng WuXiaoming ZhangA general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity.IACR Cryptol. ePrint Arch.20115152011Informal and Other Publicationsopenjournals/iacr/JinLWZ11http://eprint.iacr.org/2011/515https://dblp.org/rec/journals/iacr/JinLWZ11URL#4758705Aram JivanyanGurgen KhachatryanNew Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm.IACR Cryptol. ePrint Arch.20113252011Informal and Other Publicationsopenjournals/iacr/JivanyanK11http://eprint.iacr.org/2011/325https://dblp.org/rec/journals/iacr/JivanyanK11URL#4758706Kristján Valur JónssonGunnar KreitzMisbah UddinSecure Multi-Party Sorting and Applications.IACR Cryptol. ePrint Arch.20111222011Informal and Other Publicationsopenjournals/iacr/JonssonKU11http://eprint.iacr.org/2011/122https://dblp.org/rec/journals/iacr/JonssonKU11URL#4758707Antoine JouxVanessa VitseCover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over Fp6.IACR Cryptol. ePrint Arch.2011202011Informal and Other Publicationsopenjournals/iacr/JouxV11http://eprint.iacr.org/2011/020https://dblp.org/rec/journals/iacr/JouxV11URL#4758708Charanjit S. JutlaArnab Roy 0001Relatively-Sound NIZKs and Password-Based Key-Exchange.IACR Cryptol. ePrint Arch.20115072011Informal and Other Publicationsopenjournals/iacr/JutlaR11http://eprint.iacr.org/2011/507https://dblp.org/rec/journals/iacr/JutlaR11URL#4758709Seny KamaraPayman MohasselMariana Raykova 0001Outsourcing Multi-Party Computation.IACR Cryptol. ePrint Arch.20112722011Informal and Other Publicationsopenjournals/iacr/KamaraMR11http://eprint.iacr.org/2011/272https://dblp.org/rec/journals/iacr/KamaraMR11URL#4758710Seny KamaraMariana Raykova 0001Parallel Homomorphic Encryption.IACR Cryptol. ePrint Arch.20115962011Informal and Other Publicationsopenjournals/iacr/KamaraR11http://eprint.iacr.org/2011/596https://dblp.org/rec/journals/iacr/KamaraR11URL#4758711Md. Golam KaosarRouting Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network.IACR Cryptol. ePrint Arch.20112292011Informal and Other Publicationsopenjournals/iacr/Kaosar11http://eprint.iacr.org/2011/229https://dblp.org/rec/journals/iacr/Kaosar11URL#4758712Jayaprakash KarProxy Blind Multi-signature Scheme using ECC for handheld devices.IACR Cryptol. ePrint Arch.2011432011Informal and Other Publicationsopenjournals/iacr/Kar11http://eprint.iacr.org/2011/043https://dblp.org/rec/journals/iacr/Kar11URL#4758713Masao KasaharaA New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I).IACR Cryptol. ePrint Arch.20111242011Informal and Other Publicationsopenjournals/iacr/Kasahara11http://eprint.iacr.org/2011/124https://dblp.org/rec/journals/iacr/Kasahara11URL#4758714Masao KasaharaA Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma PKC.IACR Cryptol. ePrint Arch.20111252011Informal and Other Publicationsopenjournals/iacr/Kasahara11ahttp://eprint.iacr.org/2011/125https://dblp.org/rec/journals/iacr/Kasahara11aURL#4758715Masao KasaharaPublic Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0.IACR Cryptol. ePrint Arch.20115452011Informal and Other Publicationsopenjournals/iacr/Kasahara11bhttp://eprint.iacr.org/2011/545https://dblp.org/rec/journals/iacr/Kasahara11bURL#4758716Masao KasaharaA New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0.IACR Cryptol. ePrint Arch.20115732011Informal and Other Publicationsopenjournals/iacr/Kasahara11chttp://eprint.iacr.org/2011/573https://dblp.org/rec/journals/iacr/Kasahara11cURL#4758717Masao KasaharaA New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation.IACR Cryptol. ePrint Arch.20116902011Informal and Other Publicationsopenjournals/iacr/Kasahara11dhttp://eprint.iacr.org/2011/690https://dblp.org/rec/journals/iacr/Kasahara11dURL#4758718Yosuke KatohYun-Ju HuangChen-Mou ChengTsuyoshi TakagiEfficient Implementation of the etaT Pairing on GPU.IACR Cryptol. ePrint Arch.20115402011Informal and Other Publicationsopenjournals/iacr/KatohHCT11http://eprint.iacr.org/2011/540https://dblp.org/rec/journals/iacr/KatohHCT11URL#4758719Jonathan KatzUeli MaurerBjörn TackmannVassilis ZikasUniversally Composable Synchronous Computation.IACR Cryptol. ePrint Arch.20113102011Informal and Other Publicationsopenjournals/iacr/KatzMTZ11http://eprint.iacr.org/2011/310https://dblp.org/rec/journals/iacr/KatzMTZ11URL#4758720Stefan Katzenbeisser 0001Ünal KoçabasVincent van der LeestAhmad-Reza SadeghiGeert Jan SchrijenHeike SchröderChristian WachsmannRecyclable PUFs: Logically Reconfigurable PUFs.IACR Cryptol. ePrint Arch.20115522011Informal and Other Publicationsopenjournals/iacr/KatzenbeisserKLSSSW11http://eprint.iacr.org/2011/552https://dblp.org/rec/journals/iacr/KatzenbeisserKLSSSW11URL#4758721Akinori KawachiChristopher PortmannKeisuke TanakaCharacterization of the relations between information-theoretic non-malleability, secrecy, and authenticity.IACR Cryptol. ePrint Arch.2011922011Informal and Other Publicationsopenjournals/iacr/KawachiPT11http://eprint.iacr.org/2011/092https://dblp.org/rec/journals/iacr/KawachiPT11URL#4758722Michelle KendallKeith M. MartinOn the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.IACR Cryptol. ePrint Arch.20115552011Informal and Other Publicationsopenjournals/iacr/KendallM11http://eprint.iacr.org/2011/555https://dblp.org/rec/journals/iacr/KendallM11URL#4758723Dalia KhaderPeter Y. A. RyanReceipt Freeness of Prêt à Voter Provably Secure.IACR Cryptol. ePrint Arch.20115942011Informal and Other Publicationsopenjournals/iacr/KhaderR11http://eprint.iacr.org/2011/594https://dblp.org/rec/journals/iacr/KhaderR11URL#4758724Azhar Ali KhanGhulam MurtazaEfficient Implementation of Grand Cru with TI C6x+ Processor.IACR Cryptol. ePrint Arch.20113852011Informal and Other Publicationsopenjournals/iacr/KhanM11http://eprint.iacr.org/2011/385https://dblp.org/rec/journals/iacr/KhanM11URL#4758725Dmitry KhovratovichChristian RechbergerAlexandra SavelievaBicliques for Preimages: Attacks on Skein-512 and the SHA-2 family.IACR Cryptol. ePrint Arch.20112862011Informal and Other Publicationsopenjournals/iacr/KhovratovichRS11http://eprint.iacr.org/2011/286https://dblp.org/rec/journals/iacr/KhovratovichRS11URL#4758726Eike KiltzAdam O'NeillAdam D. SmithInstantiability of RSA-OAEP under Chosen-Plaintext Attack.IACR Cryptol. ePrint Arch.20115592011Informal and Other Publicationsopenjournals/iacr/KiltzOS11http://eprint.iacr.org/2011/559https://dblp.org/rec/journals/iacr/KiltzOS11URL#4758727Chong Hee KimDifferential Fault Analysis of AES: Toward Reducing Number of Faults.IACR Cryptol. ePrint Arch.20111782011Informal and Other Publicationsopenjournals/iacr/Kim11http://eprint.iacr.org/2011/178https://dblp.org/rec/journals/iacr/Kim11URL#4758728Chong Hee KimEfficient Methods for Exploiting Faults Induced at AES Middle Rounds.IACR Cryptol. ePrint Arch.20113492011Informal and Other Publicationsopenjournals/iacr/Kim11ahttp://eprint.iacr.org/2011/349https://dblp.org/rec/journals/iacr/Kim11aURL#4758729ChangKyun KimEun-Gu JungDong Hoon Lee 0002Chang-Ho JungDaewan HanCryptanalysis of INCrypt32 in HID's iCLASS Systems.IACR Cryptol. ePrint Arch.20114692011Informal and Other Publicationsopenjournals/iacr/KimJLJH11http://eprint.iacr.org/2011/469https://dblp.org/rec/journals/iacr/KimJLJH11URL#4758730Hakhyun KimWoongryul JeonYunho LeeDongho WonCryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme.IACR Cryptol. ePrint Arch.20114512011Informal and Other Publicationsopenjournals/iacr/KimJLW11http://eprint.iacr.org/2011/451https://dblp.org/rec/journals/iacr/KimJLW11URL#4758731Myungsun KimHyung Tae LeeJung Hee CheonMutual Private Set Intersection with Linear Complexity.IACR Cryptol. ePrint Arch.20112672011Informal and Other Publicationsopenjournals/iacr/KimLC11http://eprint.iacr.org/2011/267https://dblp.org/rec/journals/iacr/KimLC11URL#4758732Paul KirchnerImproved Generalized Birthday Attack.IACR Cryptol. ePrint Arch.20113772011Informal and Other Publicationsopenjournals/iacr/Kirchner11http://eprint.iacr.org/2011/377https://dblp.org/rec/journals/iacr/Kirchner11URL#4758733Thorsten KleinjungArjen K. LenstraDan PageNigel P. SmartUsing the Cloud to Determine Key Strengths.IACR Cryptol. ePrint Arch.20112542011Informal and Other Publicationsopenjournals/iacr/KleinjungLPS11http://eprint.iacr.org/2011/254https://dblp.org/rec/journals/iacr/KleinjungLPS11URL#4758734Neal KoblitzAnother Look at Automated Theorem-Proving. II.IACR Cryptol. ePrint Arch.20114852011Informal and Other Publicationsopenjournals/iacr/Koblitz11http://eprint.iacr.org/2011/485https://dblp.org/rec/journals/iacr/Koblitz11URL#4758735Neal KoblitzAlfred MenezesAnother Look at Security Definitions.IACR Cryptol. ePrint Arch.20113432011Informal and Other Publicationsopenjournals/iacr/KoblitzM11http://eprint.iacr.org/2011/343https://dblp.org/rec/journals/iacr/KoblitzM11URL#4758736Vladimir KolesnikovGanapathy S. SundaramIBAKE: Identity-Based Authenticated Key Exchange Protocol.IACR Cryptol. ePrint Arch.20116122011Informal and Other Publicationsopenjournals/iacr/KolesnikovS11http://eprint.iacr.org/2011/612https://dblp.org/rec/journals/iacr/KolesnikovS11URL#4758737Nicholas KolokotronisKonstantinos LimniotisMaiorana-McFarland Functions with High Second-Order Nonlinearity.IACR Cryptol. ePrint Arch.20112122011Informal and Other Publicationsopenjournals/iacr/KolokotronisL11http://eprint.iacr.org/2011/212https://dblp.org/rec/journals/iacr/KolokotronisL11URL#4758738Jiejun KongDapeng Wu 0001Xiaoyan HongMario GerlaTowards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks.IACR Cryptol. ePrint Arch.20116392011Informal and Other Publicationsopenjournals/iacr/KongWHG11http://eprint.iacr.org/2011/639https://dblp.org/rec/journals/iacr/KongWHG11URL#4758739Namhun KooGooc Hwa JoSoonhak KwonOn Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve.IACR Cryptol. ePrint Arch.20112922011Informal and Other Publicationsopenjournals/iacr/KooJK11http://eprint.iacr.org/2011/292https://dblp.org/rec/journals/iacr/KooJK11URL#4758740Simon Kramer 0001Rajeev GoréEiji OkamotoComputer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications.IACR Cryptol. ePrint Arch.20112352011Informal and Other Publicationsopenjournals/iacr/KramerGO11http://eprint.iacr.org/2011/235https://dblp.org/rec/journals/iacr/KramerGO11URL#4758741Matthias Krause 0001Matthias HamannThe Cryptographic Power of Random Selection.IACR Cryptol. ePrint Arch.20115112011Informal and Other Publicationsopenjournals/iacr/KrauseH11http://eprint.iacr.org/2011/511https://dblp.org/rec/journals/iacr/KrauseH11URL#4758742Gunnar KreitzA Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version).IACR Cryptol. ePrint Arch.201122011Informal and Other Publicationsopenjournals/iacr/Kreitz11http://eprint.iacr.org/2011/002https://dblp.org/rec/journals/iacr/Kreitz11URL#4758743Noboru KunihiroNaoyuki ShinoharaTetsuya IzuA Unified Framework for Small Secret Exponent Attack on RSA.IACR Cryptol. ePrint Arch.20115912011Informal and Other Publicationsopenjournals/iacr/KunihiroSI11http://eprint.iacr.org/2011/591https://dblp.org/rec/journals/iacr/KunihiroSI11URL#4758744Kaoru KurosawaRyo NojimaLe Trieu PhongGeneric Fully Simulatable Adaptive Oblivious Transfer.IACR Cryptol. ePrint Arch.20113822011Informal and Other Publicationsopenjournals/iacr/KurosawaNP11http://eprint.iacr.org/2011/382https://dblp.org/rec/journals/iacr/KurosawaNP11URL#4758745Kaoru KurosawaLe Trieu PhongMaximum Leakage Resilient IBE and IPE.IACR Cryptol. ePrint Arch.20116282011Informal and Other Publicationsopenjournals/iacr/KurosawaP11http://eprint.iacr.org/2011/628https://dblp.org/rec/journals/iacr/KurosawaP11URL#4758746Eyal KushilevitzSteve Lu 0001Rafail OstrovskyOn the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme.IACR Cryptol. ePrint Arch.20113272011Informal and Other Publicationsopenjournals/iacr/KushilevitzLO11http://eprint.iacr.org/2011/327https://dblp.org/rec/journals/iacr/KushilevitzLO11URL#4758747Prashant KushwahSunder LalIdentity based signcryption schemes without random oracles.IACR Cryptol. ePrint Arch.20113722011Informal and Other Publicationsopenjournals/iacr/KushwahL11http://eprint.iacr.org/2011/372https://dblp.org/rec/journals/iacr/KushwahL11URL#4758748Ralf KüstersMax TuengerthalComposition Theorems Without Pre-Established Session Identifiers.IACR Cryptol. ePrint Arch.20114062011Informal and Other Publicationsopenjournals/iacr/KustersT11http://eprint.iacr.org/2011/406https://dblp.org/rec/journals/iacr/KustersT11URL#4758749Ralf KüstersTomasz TruderungAndreas Vogt 0001Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study.IACR Cryptol. ePrint Arch.20115172011Informal and Other Publicationsopenjournals/iacr/KustersTV11http://eprint.iacr.org/2011/517https://dblp.org/rec/journals/iacr/KustersTV11URL#4758750Mario LambergerFlorian MendelHigher-Order Differential Attack on Reduced SHA-256.IACR Cryptol. ePrint Arch.2011372011Informal and Other Publicationsopenjournals/iacr/LambergerM11http://eprint.iacr.org/2011/037https://dblp.org/rec/journals/iacr/LambergerM11URL#4758751Rodolphe LampeJacques PatarinAnalysis of some natural variants of the PKP Algorithm.IACR Cryptol. ePrint Arch.20116862011Informal and Other Publicationsopenjournals/iacr/LampeP11http://eprint.iacr.org/2011/686https://dblp.org/rec/journals/iacr/LampeP11URL#4758752T. V. LaptyevaSergej FlachK. KladkoThe weak password problem: chaos, criticality, and encrypted p-CAPTCHAs.IACR Cryptol. ePrint Arch.20111722011Informal and Other Publicationsopenjournals/iacr/LaptyevaFK11http://eprint.iacr.org/2011/172https://dblp.org/rec/journals/iacr/LaptyevaFK11URL#4758753Sven LaurJan WillemsonBingsheng ZhangRound-efficient Oblivious Database Manipulation.IACR Cryptol. ePrint Arch.20114292011Informal and Other Publicationsopenjournals/iacr/LaurWZ11http://eprint.iacr.org/2011/429https://dblp.org/rec/journals/iacr/LaurWZ11URL#4758754Kristin E. LauterMichael NaehrigVinod VaikuntanathanCan Homomorphic Encryption be Practical?IACR Cryptol. ePrint Arch.20114052011Informal and Other Publicationsopenjournals/iacr/LauterNV11http://eprint.iacr.org/2011/405https://dblp.org/rec/journals/iacr/LauterNV11URL#4758755Duc-Phong LeFast Quadrupling of a Point in Elliptic Curve Cryptography.IACR Cryptol. ePrint Arch.2011392011Informal and Other Publicationsopenjournals/iacr/Le11http://eprint.iacr.org/2011/039https://dblp.org/rec/journals/iacr/Le11URL#4758756Moon Sung LeeOn the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption.IACR Cryptol. ePrint Arch.20115672011Informal and Other Publicationsopenjournals/iacr/Lee11http://eprint.iacr.org/2011/567https://dblp.org/rec/journals/iacr/Lee11URL#4758757Hyung Tae LeeJung Hee CheonJin Hong 0001Analysis of Discrete Logarithm Algorithm using Pre-computation.IACR Cryptol. ePrint Arch.20111872011Informal and Other Publicationsopenjournals/iacr/LeeCH11http://eprint.iacr.org/2011/187https://dblp.org/rec/journals/iacr/LeeCH11URL#4758758Jooyoung LeeDeukjo HongCollision Resistance of the JH Hash Function.IACR Cryptol. ePrint Arch.2011192011Informal and Other Publicationsopenjournals/iacr/LeeH11http://eprint.iacr.org/2011/019https://dblp.org/rec/journals/iacr/LeeH11URL#4758759Jooyoung Lee 0001Martijn StamJohn P. SteinbergerThe preimage security of double-block-length compression functions.IACR Cryptol. ePrint Arch.20112102011Informal and Other Publicationsopenjournals/iacr/LeeSS11http://eprint.iacr.org/2011/210https://dblp.org/rec/journals/iacr/LeeSS11URL#4758760Allison B. LewkoTools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting.IACR Cryptol. ePrint Arch.20114902011Informal and Other Publicationsopenjournals/iacr/Lewko11http://eprint.iacr.org/2011/490https://dblp.org/rec/journals/iacr/Lewko11URL#4758761Allison B. LewkoBrent WatersUnbounded HIBE and Attribute-Based Encryption.IACR Cryptol. ePrint Arch.2011492011Informal and Other Publicationsopenjournals/iacr/LewkoW11http://eprint.iacr.org/2011/049https://dblp.org/rec/journals/iacr/LewkoW11URL#4758762Leibo LiJiazhe ChenXiaoyun Wang 0001Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia.IACR Cryptol. ePrint Arch.20115242011Informal and Other Publicationsopenjournals/iacr/LiCW11http://eprint.iacr.org/2011/524https://dblp.org/rec/journals/iacr/LiCW11URL#4758763Hongwei Li 0001Yuanshun DaiBo Yang 0011Identity-Based Cryptography for Cloud Security.IACR Cryptol. ePrint Arch.20111692011Informal and Other Publicationsopenjournals/iacr/LiDY11http://eprint.iacr.org/2011/169https://dblp.org/rec/journals/iacr/LiDY11URL#4758764Ming LiAli MiriDaming ZhuAnalysis of the Hamming Weight of the Extended wmbNAF.IACR Cryptol. ePrint Arch.20115692011Informal and Other Publicationsopenjournals/iacr/LiMZ11http://eprint.iacr.org/2011/569https://dblp.org/rec/journals/iacr/LiMZ11URL#4758765Yang Li 0001Daisuke NakatsuQi LiKazuo OhtaKazuo SakiyamaClockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements.IACR Cryptol. ePrint Arch.20115792011Informal and Other Publicationsopenjournals/iacr/LiNLOS11http://eprint.iacr.org/2011/579https://dblp.org/rec/journals/iacr/LiNLOS11URL#4758766Jianwei LiYanbin PanMingjie LiuGuizhen ZhuAn Efficient Broadcast Attack against NTRU.IACR Cryptol. ePrint Arch.20115902011Informal and Other Publicationsopenjournals/iacr/LiPLZ11http://eprint.iacr.org/2011/590https://dblp.org/rec/journals/iacr/LiPLZ11URL#4758767Yongqiang Li 0001Mingsheng WangConstructing differentially 4-uniform permutations over 22m from quadratic APN permutations over 22m+1.IACR Cryptol. ePrint Arch.20116422011Informal and Other Publicationsopenjournals/iacr/LiW11http://eprint.iacr.org/2011/642https://dblp.org/rec/journals/iacr/LiW11URL#4758768Lei LiSiman YangOn the Access Structures of Hyperelliptic Secret Sharing.IACR Cryptol. ePrint Arch.20114152011Informal and Other Publicationsopenjournals/iacr/LiY11http://eprint.iacr.org/2011/415https://dblp.org/rec/journals/iacr/LiY11URL#4758769Benoît LibertKenneth G. PatersonElizabeth A. QuagliaAnonymous Broadcast Encryption.IACR Cryptol. ePrint Arch.20114762011Informal and Other Publicationsopenjournals/iacr/LibertPQ11http://eprint.iacr.org/2011/476https://dblp.org/rec/journals/iacr/LibertPQ11URL#4758770Dongdai LinJean-Charles FaugèreLudovic PerretTianze WangOn Enumeration of Polynomial Equivalence Classes and Their Application to MPKC.IACR Cryptol. ePrint Arch.2011552011Informal and Other Publicationsopenjournals/iacr/LinFPW11http://eprint.iacr.org/2011/055https://dblp.org/rec/journals/iacr/LinFPW11URL#4758771Zhiqiang LinDingyi PeiConstructing a Diversified FCSR with a Given Connection Integer.IACR Cryptol. ePrint Arch.20113582011Informal and Other Publicationsopenjournals/iacr/LinP11http://eprint.iacr.org/2011/358https://dblp.org/rec/journals/iacr/LinP11URL#4758772Dongdai LinTao ShiZifeng YangErgodic Theory Over F2[[T]].IACR Cryptol. ePrint Arch.20111302011Informal and Other Publicationsopenjournals/iacr/LinSY11http://eprint.iacr.org/2011/130https://dblp.org/rec/journals/iacr/LinSY11URL#4758773Yehuda LindellHighly-Efficient Universally-Composable Commitments based on the DDH Assumption.IACR Cryptol. ePrint Arch.20111802011Informal and Other Publicationsopenjournals/iacr/Lindell11http://eprint.iacr.org/2011/180https://dblp.org/rec/journals/iacr/Lindell11URL#4758774Yehuda LindellEran OmriA Practical Application of Differential Privacy to Personalized Online Advertising.IACR Cryptol. ePrint Arch.20111522011Informal and Other Publicationsopenjournals/iacr/LindellO11http://eprint.iacr.org/2011/152https://dblp.org/rec/journals/iacr/LindellO11URL#4758775Yehuda LindellBenny PinkasEli OxmanThe IPS Compiler: Optimizations, Variants and Concrete Efficiency.IACR Cryptol. ePrint Arch.20114352011Informal and Other Publicationsopenjournals/iacr/LindellPO11http://eprint.iacr.org/2011/435https://dblp.org/rec/journals/iacr/LindellPO11URL#4758776Helger LipmaaProgression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments.IACR Cryptol. ePrint Arch.201192011Informal and Other Publicationsopenjournals/iacr/Lipmaa11http://eprint.iacr.org/2011/009https://dblp.org/rec/journals/iacr/Lipmaa11URL#4758777Helger LipmaaTwo Simple Code-Verification Voting Protocols.IACR Cryptol. ePrint Arch.20113172011Informal and Other Publicationsopenjournals/iacr/Lipmaa11ahttp://eprint.iacr.org/2011/317https://dblp.org/rec/journals/iacr/Lipmaa11aURL#4758778Helger LipmaaBingsheng ZhangA More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument.IACR Cryptol. ePrint Arch.20113942011Informal and Other Publicationsopenjournals/iacr/LipmaaZ11http://eprint.iacr.org/2011/394https://dblp.org/rec/journals/iacr/LipmaaZ11URL#4758779Joseph K. LiuFeng Bao 0001Jianying Zhou 0001Short and Efficient Certificate-Based Signature.IACR Cryptol. ePrint Arch.20111922011Informal and Other Publicationsopenjournals/iacr/LiuBZ11http://eprint.iacr.org/2011/192https://dblp.org/rec/journals/iacr/LiuBZ11URL#4758780Ya Liu 0001Dawu GuZhiqiang Liu 0001Wei Li 0013Ying ManImproved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.IACR Cryptol. ePrint Arch.20116712011Informal and Other Publicationsopenjournals/iacr/LiuGLLM11http://eprint.iacr.org/2011/671https://dblp.org/rec/journals/iacr/LiuGLLM11URL#4758781Jing LiuQiong Huang 0001Bo Yang 0003Efficient Multicast Key Distribution Using HOWF-based Access Control Structures.IACR Cryptol. ePrint Arch.20115762011Informal and Other Publicationsopenjournals/iacr/LiuHY11http://eprint.iacr.org/2011/576https://dblp.org/rec/journals/iacr/LiuHY11URL#4758782Feng Liu 0001Peng LiChuan Kun WuEncrypting More Information in Visual Cryptography Scheme.IACR Cryptol. ePrint Arch.20113402011Informal and Other Publicationsopenjournals/iacr/LiuLW11http://eprint.iacr.org/2011/340https://dblp.org/rec/journals/iacr/LiuLW11URL#4758783Fanbao LiuYi LiuTao XieYumeng FengFast Password Recovery Attack: Application to APOP.IACR Cryptol. ePrint Arch.20112482011Informal and Other Publicationsopenjournals/iacr/LiuLXF11http://eprint.iacr.org/2011/248https://dblp.org/rec/journals/iacr/LiuLXF11URL#4758784Fanbao LiuChangxiang ShenTao XieDengguo FengOn the Security of NMAC and Its Variants.IACR Cryptol. ePrint Arch.20116492011Informal and Other Publicationsopenjournals/iacr/LiuSXF11http://eprint.iacr.org/2011/649https://dblp.org/rec/journals/iacr/LiuSXF11URL#4758785Jing LiuChangji WangExclusive Key-Based Group Rekeying.IACR Cryptol. ePrint Arch.20115752011Informal and Other Publicationsopenjournals/iacr/LiuW11http://eprint.iacr.org/2011/575https://dblp.org/rec/journals/iacr/LiuW11URL#4758786Shusheng LiuLibin WangZheng GongImproved Related-Key Boomerang Distinguishing Attack of Threefish-256.IACR Cryptol. ePrint Arch.20113232011Informal and Other Publicationsopenjournals/iacr/LiuWG11http://eprint.iacr.org/2011/323https://dblp.org/rec/journals/iacr/LiuWG11URL#4758787Mingjie LiuXiaoyun Wang 0001Guangwu XuXuexin ZhengShortest Lattice Vectors in the Presence of Gaps.IACR Cryptol. ePrint Arch.20111392011Informal and Other Publicationsopenjournals/iacr/LiuWXZ11http://eprint.iacr.org/2011/139https://dblp.org/rec/journals/iacr/LiuWXZ11URL#4758788Fanbao LiuTao XieChangxiang ShenBreaking H2-MAC Using Birthday Paradox.IACR Cryptol. ePrint Arch.20116472011Informal and Other Publicationsopenjournals/iacr/LiuXS11http://eprint.iacr.org/2011/647https://dblp.org/rec/journals/iacr/LiuXS11URL#4758789Joseph K. LiuTsz Hon YuenJianying Zhou 0001Forward Secure Ring Signature without Random Oracles.IACR Cryptol. ePrint Arch.20114722011Informal and Other Publicationsopenjournals/iacr/LiuYZ11http://eprint.iacr.org/2011/472https://dblp.org/rec/journals/iacr/LiuYZ11URL#4758790Jiye LiuYongbin ZhouShuguo YangDengguo FengGeneric Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation.IACR Cryptol. ePrint Arch.20116942011Informal and Other Publicationsopenjournals/iacr/LiuZYF11http://eprint.iacr.org/2011/694https://dblp.org/rec/journals/iacr/LiuZYF11URL#4758791Adriana López-AltEran TromerVinod VaikuntanathanCloud-Assisted Multiparty Computation from Fully Homomorphic Encryption.IACR Cryptol. ePrint Arch.20116632011Informal and Other Publicationsopenjournals/iacr/Lopez-AltTV11http://eprint.iacr.org/2011/663https://dblp.org/rec/journals/iacr/Lopez-AltTV11URL#4758792Philippe Loubet-MoundiDavid VigilantFrancis OlivierStatic Fault Attacks on Hardware DES Registers.IACR Cryptol. ePrint Arch.20115312011Informal and Other Publicationsopenjournals/iacr/Loubet-MoundiVO11http://eprint.iacr.org/2011/531https://dblp.org/rec/journals/iacr/Loubet-MoundiVO11URL#4758793Yang Lu 0001Jiguo Li 0001Certificate-Based Signcryption: Security Model and Efficient Construction.IACR Cryptol. ePrint Arch.20115422011Informal and Other Publicationsopenjournals/iacr/LuL11http://eprint.iacr.org/2011/542https://dblp.org/rec/journals/iacr/LuL11URL#4758794Steve Lu 0001Rafail OstrovskyMulti-Server Oblivious RAM.IACR Cryptol. ePrint Arch.20113842011Informal and Other Publicationsopenjournals/iacr/LuO11http://eprint.iacr.org/2011/384https://dblp.org/rec/journals/iacr/LuO11URL#4758795Jian-Zhu LuHong-Qing RenJipeng ZhouEfficient Delegation-Based Authentication Protocol with Strong Mobile Privacy.IACR Cryptol. ePrint Arch.20115282011Informal and Other Publicationsopenjournals/iacr/LuRZ11http://eprint.iacr.org/2011/528https://dblp.org/rec/journals/iacr/LuRZ11URL#4758796Yanbin LuGene TsudikEnhancing Data Privacy in the Cloud.IACR Cryptol. ePrint Arch.20111582011Informal and Other Publicationsopenjournals/iacr/LuT11http://eprint.iacr.org/2011/158https://dblp.org/rec/journals/iacr/LuT11URL#4758797Jian-Zhu LuShaoyuan ZhangShijie QieEnhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards.IACR Cryptol. ePrint Arch.20116762011Informal and Other Publicationsopenjournals/iacr/LuZQ11http://eprint.iacr.org/2011/676https://dblp.org/rec/journals/iacr/LuZQ11URL#4758798Carolin LunemannJesper Buus NielsenFully Simulatable Quantum-Secure Coin-Flipping and Applications.IACR Cryptol. ePrint Arch.2011652011Informal and Other Publicationsopenjournals/iacr/LunemannN11http://eprint.iacr.org/2011/065https://dblp.org/rec/journals/iacr/LunemannN11URL#4758799Yiyuan LuoXuejia LaiAttacks On a Double Length Blockcipher-based Hash Proposal.IACR Cryptol. ePrint Arch.20112382011Informal and Other Publicationsopenjournals/iacr/LuoL11http://eprint.iacr.org/2011/238https://dblp.org/rec/journals/iacr/LuoL11URL#4758800Vadim LyubashevskyLattice Signatures Without Trapdoors.IACR Cryptol. ePrint Arch.20115372011Informal and Other Publicationsopenjournals/iacr/Lyubashevsky11http://eprint.iacr.org/2011/537https://dblp.org/rec/journals/iacr/Lyubashevsky11URL#4758801Xiao MaTurbo Codes Can Be Asymptotically Information-Theoretically Secure.IACR Cryptol. ePrint Arch.2011802011Informal and Other Publicationsopenjournals/iacr/Ma11http://eprint.iacr.org/2011/080https://dblp.org/rec/journals/iacr/Ma11URL#4758802Chunbo MaJun AoGroup-oriented ring signature.IACR Cryptol. ePrint Arch.20112052011Informal and Other Publicationsopenjournals/iacr/MaA11http://eprint.iacr.org/2011/205https://dblp.org/rec/journals/iacr/MaA11URL#4758803Houssem MaghrebiSylvain GuilleyClaude CarletJean-Luc DangerClassification of High-Order Boolean Masking Schemes and Improvements of their Efficiency.IACR Cryptol. ePrint Arch.20115202011Informal and Other Publicationsopenjournals/iacr/MaghebiGCD11http://eprint.iacr.org/2011/520https://dblp.org/rec/journals/iacr/MaghebiGCD11URL#4758804Ayan MahalanobisThe ElGamal cryptosystem over circulant matrices.IACR Cryptol. ePrint Arch.20115722011Informal and Other Publicationsopenjournals/iacr/Mahalanobis11http://eprint.iacr.org/2011/572https://dblp.org/rec/journals/iacr/Mahalanobis11URL#4758805Mohammad MahmoodyTal MoranSalil P. VadhanNon-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model.IACR Cryptol. ePrint Arch.20115532011Informal and Other Publicationsopenjournals/iacr/MahmoodyMV11http://eprint.iacr.org/2011/553https://dblp.org/rec/journals/iacr/MahmoodyMV11URL#4758806Abhranil MaitiVikash GunreddyPatrick SchaumontA Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions.IACR Cryptol. ePrint Arch.20116572011Informal and Other Publicationsopenjournals/iacr/MaitiGS11http://eprint.iacr.org/2011/657https://dblp.org/rec/journals/iacr/MaitiGS11URL#4758807Arpita MaitraGoutam Paul 0001A Note on Four-State BB84 Protocol.IACR Cryptol. ePrint Arch.20115882011Informal and Other Publicationsopenjournals/iacr/MaitraP11http://eprint.iacr.org/2011/588https://dblp.org/rec/journals/iacr/MaitraP11URL#4758808Hemanta K. MajiPichayoot OuppaphanManoj PrabhakaranMike RosulekExploring the Limits of Common Coins Using Frontier Analysis of Protocols.IACR Cryptol. ePrint Arch.201162011Informal and Other Publicationsopenjournals/iacr/MajiOPR11http://eprint.iacr.org/2011/006https://dblp.org/rec/journals/iacr/MajiOPR11URL#4758809Hamid MalaBiclique Cryptanalysis of the Block Cipher SQUARE.IACR Cryptol. ePrint Arch.20115002011Informal and Other Publicationsopenjournals/iacr/Mala11http://eprint.iacr.org/2011/500https://dblp.org/rec/journals/iacr/Mala11URL#4758810Muhammad Yasir MalikJong-Seon NoDynamic MDS Matrices for Substantial Cryptographic Strength.IACR Cryptol. ePrint Arch.20111772011Informal and Other Publicationsopenjournals/iacr/MalikN11http://eprint.iacr.org/2011/177https://dblp.org/rec/journals/iacr/MalikN11URL#4758811Avradip MandalJacques PatarinYannick SeurinOn the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction.IACR Cryptol. ePrint Arch.20114962011Informal and Other Publicationsopenjournals/iacr/MandalPS11http://eprint.iacr.org/2011/496https://dblp.org/rec/journals/iacr/MandalPS11URL#4758812Stefan MaubachA representation of the p-sylow subgroup of Perm(Fpn) and a cryptographic application.IACR Cryptol. ePrint Arch.20113832011Informal and Other Publicationsopenjournals/iacr/Maubach11http://eprint.iacr.org/2011/383https://dblp.org/rec/journals/iacr/Maubach11URL#4758813Marcel MedwedFrançois-Xavier StandaertExtractors Against Side-Channel Attacks: Weak or Strong?IACR Cryptol. ePrint Arch.20113482011Informal and Other Publicationsopenjournals/iacr/MedwedS11http://eprint.iacr.org/2011/348https://dblp.org/rec/journals/iacr/MedwedS11URL#4758814Carlos Aguilar MelchorSlim BettaiebPhilippe GaboritJavier HerranzImproving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}.IACR Cryptol. ePrint Arch.20116072011Informal and Other Publicationsopenjournals/iacr/MelchorBGH11http://eprint.iacr.org/2011/607https://dblp.org/rec/journals/iacr/MelchorBGH11URL#4758815Bart MenninkBart PreneelHash Functions Based on Three Permutations: A Generic Security Analysis.IACR Cryptol. ePrint Arch.20115322011Informal and Other Publicationsopenjournals/iacr/MenninkP11http://eprint.iacr.org/2011/532https://dblp.org/rec/journals/iacr/MenninkP11URL#4758816Sihem MesnagerA note on semi-bent functions with multiple trace terms and hyperelliptic curves.IACR Cryptol. ePrint Arch.20116272011Informal and Other Publicationsopenjournals/iacr/Mesnager11http://eprint.iacr.org/2011/627https://dblp.org/rec/journals/iacr/Mesnager11URL#4758817Daniele MicciancioPetros MolPseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.IACR Cryptol. ePrint Arch.20115212011Informal and Other Publicationsopenjournals/iacr/MicciancioM11http://eprint.iacr.org/2011/521https://dblp.org/rec/journals/iacr/MicciancioM11URL#4758818Daniele MicciancioChris PeikertTrapdoors for Lattices: Simpler, Tighter, Faster, Smaller.IACR Cryptol. ePrint Arch.20115012011Informal and Other Publicationsopenjournals/iacr/MicciancioP11http://eprint.iacr.org/2011/501https://dblp.org/rec/journals/iacr/MicciancioP11URL#4758819Eric MilesEmanuele ViolaThe Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs.IACR Cryptol. ePrint Arch.20112262011Informal and Other Publicationsopenjournals/iacr/MilesV11http://eprint.iacr.org/2011/226https://dblp.org/rec/journals/iacr/MilesV11URL#4758820Marine MinierMaría Naya-PlasenciaThomas PeyrinAnalysis of reduced-SHAvite-3-256 v2.IACR Cryptol. ePrint Arch.20111752011Informal and Other Publicationsopenjournals/iacr/MinierNP11http://eprint.iacr.org/2011/175https://dblp.org/rec/journals/iacr/MinierNP11URL#4758821Payman MohasselEfficient and Secure Delegation of Linear Algebra.IACR Cryptol. ePrint Arch.20116052011Informal and Other Publicationsopenjournals/iacr/Mohassel11http://eprint.iacr.org/2011/605https://dblp.org/rec/journals/iacr/Mohassel11URL#4758822Payman MohasselSalman NiksefatSeyed Saeed SadeghianBabak SadeghiyanA New Protocol for Oblivious DFA Evaluation and Applications.IACR Cryptol. ePrint Arch.20114342011Informal and Other Publicationsopenjournals/iacr/MohasselNSS11http://eprint.iacr.org/2011/434https://dblp.org/rec/journals/iacr/MohasselNSS11URL#4758823Andres Molina-MarkhamGeorge DanezisKevin FuPrashant J. ShenoyDavid E. Irwin 0001Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers.IACR Cryptol. ePrint Arch.20115442011Informal and Other Publicationsopenjournals/iacr/Molina-MarkhamDFSI11http://eprint.iacr.org/2011/544https://dblp.org/rec/journals/iacr/Molina-MarkhamDFSI11URL#4758824Mainack MondalAvik ChakrabortiNilanjan DattaDebdeep MukhopadhyayTweLEX: A Tweaked Version of the LEX Stream Cipher.IACR Cryptol. ePrint Arch.20115862011Informal and Other Publicationsopenjournals/iacr/MondalCDM11http://eprint.iacr.org/2011/586https://dblp.org/rec/journals/iacr/MondalCDM11URL#4758825Dustin MoodySouradyuti PaulDaniel Smith-ToneIndifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.IACR Cryptol. ePrint Arch.20116302011Informal and Other Publicationsopenjournals/iacr/MoodyPS11http://eprint.iacr.org/2011/630https://dblp.org/rec/journals/iacr/MoodyPS11URL#4758826Dustin MoodyDaniel ShumowAnalogues of Velu's formulas for Isogenies on Alternate Models of Elliptic Curves.IACR Cryptol. ePrint Arch.20114302011Informal and Other Publicationsopenjournals/iacr/MoodyS11http://eprint.iacr.org/2011/430https://dblp.org/rec/journals/iacr/MoodyS11URL#4758827Amir Moradi 0001Alessandro BarenghiTimo KasperChristof PaarOn the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs.IACR Cryptol. ePrint Arch.20113902011Informal and Other Publicationsopenjournals/iacr/MoradiBKP11http://eprint.iacr.org/2011/390https://dblp.org/rec/journals/iacr/MoradiBKP11URL#4758828Amir Moradi 0001Markus KasperChristof PaarOn the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism.IACR Cryptol. ePrint Arch.20113912011Informal and Other Publicationsopenjournals/iacr/MoradiKP11http://eprint.iacr.org/2011/391https://dblp.org/rec/journals/iacr/MoradiKP11URL#4758829Amir Moradi 0001Oliver MischkeChristof PaarCollision Timing Attack when Breaking 42 AES ASIC Cores.IACR Cryptol. ePrint Arch.20111622011Informal and Other Publicationsopenjournals/iacr/MoradiMP11http://eprint.iacr.org/2011/162https://dblp.org/rec/journals/iacr/MoradiMP11URL#4758830Seyyed Amir MortazaviA new attack on Jakobsson Hybrid Mix-Net.IACR Cryptol. ePrint Arch.20113052011Informal and Other Publicationsopenjournals/iacr/Mortazavi11http://eprint.iacr.org/2011/305https://dblp.org/rec/journals/iacr/Mortazavi11URL#4758831William K. Moses Jr.C. Pandu RanganRational Secret Sharing with Honest Players over an Asynchronous Channel.IACR Cryptol. ePrint Arch.2011682011Informal and Other Publicationsopenjournals/iacr/MosesR11http://eprint.iacr.org/2011/068https://dblp.org/rec/journals/iacr/MosesR11URL#4758832Andrew MossElisabeth OswaldDan PageMichael TunstallAutomatic Insertion of DPA Countermeasures.IACR Cryptol. ePrint Arch.20114122011Informal and Other Publicationsopenjournals/iacr/MossOPT11http://eprint.iacr.org/2011/412https://dblp.org/rec/journals/iacr/MossOPT11URL#4758833Nadia El MrabetFault Attack against Miller's algorithm.IACR Cryptol. ePrint Arch.20117092011Informal and Other Publicationsopenjournals/iacr/Mrabet11http://eprint.iacr.org/2011/709https://dblp.org/rec/journals/iacr/Mrabet11URL#4758834Piotr MroczkowskiJanusz SzmidtCorrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests.IACR Cryptol. ePrint Arch.2011322011Informal and Other Publicationsopenjournals/iacr/MroczkowskiS11http://eprint.iacr.org/2011/032https://dblp.org/rec/journals/iacr/MroczkowskiS11URL#4758835Sascha Müller 0003Stefan Katzenbeisser 0001Hiding the Policy in Cryptographic Access Control.IACR Cryptol. ePrint Arch.20112552011Informal and Other Publicationsopenjournals/iacr/MullerK11http://eprint.iacr.org/2011/255https://dblp.org/rec/journals/iacr/MullerK11URL#4758836Madeline González MuñizPeeter LaudStrong Forward Security in Identity-Based Signcryption.IACR Cryptol. ePrint Arch.20111562011Informal and Other Publicationsopenjournals/iacr/MunizL11http://eprint.iacr.org/2011/156https://dblp.org/rec/journals/iacr/MunizL11URL#4758837Ghulam MurtazaNassar IkramDirect Exponent and Scalar Multiplication Classes of an MDS Matrix.IACR Cryptol. ePrint Arch.20111512011Informal and Other Publicationsopenjournals/iacr/MurtazaI11http://eprint.iacr.org/2011/151https://dblp.org/rec/journals/iacr/MurtazaI11URL#4758838Ghulam MurtazaAzhar Ali KhanSyed Wasi AlamAqeel FarooqiFortification of AES with Dynamic Mix-Column Transformation.IACR Cryptol. ePrint Arch.20111842011Informal and Other Publicationsopenjournals/iacr/MurtazaKAF11http://eprint.iacr.org/2011/184https://dblp.org/rec/journals/iacr/MurtazaKAF11URL#4758839Steven A. MyersMona SergiAbhi ShelatThreshold Fully Homomorphic Encryption and Secure Computation.IACR Cryptol. ePrint Arch.20114542011Informal and Other Publicationsopenjournals/iacr/MyersSS11http://eprint.iacr.org/2011/454https://dblp.org/rec/journals/iacr/MyersSS11URL#4758840Valérie NachefEmmanuel VolteJacques PatarinDifferential Attacks on Generalized Feistel Schemes.IACR Cryptol. ePrint Arch.20117052011Informal and Other Publicationsopenjournals/iacr/NachefVP11http://eprint.iacr.org/2011/705https://dblp.org/rec/journals/iacr/NachefVP11URL#4758841Maxime NassarSylvain GuilleyJean-Luc DangerFormal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks.IACR Cryptol. ePrint Arch.20115342011Informal and Other Publicationsopenjournals/iacr/NassarGD11http://eprint.iacr.org/2011/534https://dblp.org/rec/journals/iacr/NassarGD11URL#4758842Manan NayakShashank AgrawalKannan SrinathanMinimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks.IACR Cryptol. ePrint Arch.20113202011Informal and Other Publicationsopenjournals/iacr/NayakAS11http://eprint.iacr.org/2011/320https://dblp.org/rec/journals/iacr/NayakAS11URL#4758843Georg NeugebauerUlrike MeyerSusanne WetzelFair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version).IACR Cryptol. ePrint Arch.20112002011Informal and Other Publicationsopenjournals/iacr/NeugebauerMW11http://eprint.iacr.org/2011/200https://dblp.org/rec/journals/iacr/NeugebauerMW11URL#4758844Long Hoang Nguyen 0001Rational authentication protocols.IACR Cryptol. ePrint Arch.2011702011Informal and Other Publicationsopenjournals/iacr/Nguyen11http://eprint.iacr.org/2011/070https://dblp.org/rec/journals/iacr/Nguyen11URL#4758845Long Hoang Nguyen 0001Rational distance-bounding protocols over noisy channels.IACR Cryptol. ePrint Arch.20114922011Informal and Other Publicationsopenjournals/iacr/Nguyen11ahttp://eprint.iacr.org/2011/492https://dblp.org/rec/journals/iacr/Nguyen11aURL#4758846Long Hoang Nguyen 0001Andrew William RoscoeOn the construction of digest functions for manual authentication protocols.IACR Cryptol. ePrint Arch.20111162011Informal and Other Publicationsopenjournals/iacr/NguyenR11http://eprint.iacr.org/2011/116https://dblp.org/rec/journals/iacr/NguyenR11URL#4758847Alice Nguyenova-StepanikovaTran Ngoc DuongThe block cipher NSABC (public domain).IACR Cryptol. ePrint Arch.20112372011Informal and Other Publicationsopenjournals/iacr/Nguyenova-StepanikovaD11http://eprint.iacr.org/2011/237https://dblp.org/rec/journals/iacr/Nguyenova-StepanikovaD11URL#4758848Jesper Buus NielsenPeter Sebastian NordholtClaudio OrlandiSai Sheshank BurraA New Approach to Practical Active-Secure Two-Party Computation.IACR Cryptol. ePrint Arch.2011912011Informal and Other Publicationsopenjournals/iacr/NielsenNOB11http://eprint.iacr.org/2011/091https://dblp.org/rec/journals/iacr/NielsenNOB11URL#4758849Chao NingQiuliang XuConstant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security.IACR Cryptol. ePrint Arch.2011692011Informal and Other Publicationsopenjournals/iacr/NingX11http://eprint.iacr.org/2011/069https://dblp.org/rec/journals/iacr/NingX11URL#4758850Abderrahmane NitajA new attack on the KMOVcryptosystem.IACR Cryptol. ePrint Arch.20114272011Informal and Other Publicationsopenjournals/iacr/Nitaj11http://eprint.iacr.org/2011/427https://dblp.org/rec/journals/iacr/Nitaj11URL#4758851Abderrahmane NitajCryptanalysis of NTRU with two public keys.IACR Cryptol. ePrint Arch.20114772011Informal and Other Publicationsopenjournals/iacr/Nitaj11ahttp://eprint.iacr.org/2011/477https://dblp.org/rec/journals/iacr/Nitaj11aURL#4758852Mehrdad NojoumianSocio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory.IACR Cryptol. ePrint Arch.20113702011Informal and Other Publicationsopenjournals/iacr/Nojoumian11http://eprint.iacr.org/2011/370https://dblp.org/rec/journals/iacr/Nojoumian11URL#4758853Adam O'NeillChris PeikertBrent WatersBi-Deniable Public-Key Encryption.IACR Cryptol. ePrint Arch.20113522011Informal and Other Publicationsopenjournals/iacr/ONeillPW11http://eprint.iacr.org/2011/352https://dblp.org/rec/journals/iacr/ONeillPW11URL#4758854Tatsuaki OkamotoKatsuyuki TakashimaAdaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.IACR Cryptol. ePrint Arch.20115432011Informal and Other Publicationsopenjournals/iacr/OkamotoT11http://eprint.iacr.org/2011/543https://dblp.org/rec/journals/iacr/OkamotoT11URL#4758855Tatsuaki OkamotoKatsuyuki TakashimaAchieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption.IACR Cryptol. ePrint Arch.20116482011Informal and Other Publicationsopenjournals/iacr/OkamotoT11ahttp://eprint.iacr.org/2011/648https://dblp.org/rec/journals/iacr/OkamotoT11aURL#4758856Tatsuaki OkamotoKatsuyuki TakashimaEfficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model.IACR Cryptol. ePrint Arch.20117002011Informal and Other Publicationsopenjournals/iacr/OkamotoT11bhttp://eprint.iacr.org/2011/700https://dblp.org/rec/journals/iacr/OkamotoT11bURL#4758857Tatsuaki OkamotoKatsuyuki TakashimaDecentralized Attribute-Based Signatures.IACR Cryptol. ePrint Arch.20117012011Informal and Other Publicationsopenjournals/iacr/OkamotoT11chttp://eprint.iacr.org/2011/701https://dblp.org/rec/journals/iacr/OkamotoT11cURL#4758858Roman OliynykovCryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function.IACR Cryptol. ePrint Arch.20116852011Informal and Other Publicationsopenjournals/iacr/Oliynykov11http://eprint.iacr.org/2011/685https://dblp.org/rec/journals/iacr/Oliynykov11URL#4758859Cristina OneteDaniele Venturi 0001Security & Indistinguishability in the Presence of Traffic Analysis.IACR Cryptol. ePrint Arch.20112602011Informal and Other Publicationsopenjournals/iacr/OneteV11http://eprint.iacr.org/2011/260https://dblp.org/rec/journals/iacr/OneteV11URL#4758860Mohammad Ali OrumiehchihaJosef PieprzykRon SteinfeldCryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption).IACR Cryptol. ePrint Arch.20116872011Informal and Other Publicationsopenjournals/iacr/OrumiehchihaPS11http://eprint.iacr.org/2011/687https://dblp.org/rec/journals/iacr/OrumiehchihaPS11URL#4758861Rafail OstrovskyVanishree RaoAlessandra ScafuroIvan ViscontiRevisiting Lower and Upper Bounds for Selective Decommitments.IACR Cryptol. ePrint Arch.20115362011Informal and Other Publicationsopenjournals/iacr/OstrovskyRSV11http://eprint.iacr.org/2011/536https://dblp.org/rec/journals/iacr/OstrovskyRSV11URL#4758862Ayoub OtmaniJean-Pierre TillichAn Efficient Attack on All Concrete KKS Proposals.IACR Cryptol. ePrint Arch.20113562011Informal and Other Publicationsopenjournals/iacr/OtmaniT11http://eprint.iacr.org/2011/356https://dblp.org/rec/journals/iacr/OtmaniT11URL#4758863Yanbin PanFeng ZhangA Note on the Density of the Multiple Subset Sum Problems.IACR Cryptol. ePrint Arch.20115252011Informal and Other Publicationsopenjournals/iacr/PanZ11http://eprint.iacr.org/2011/525https://dblp.org/rec/journals/iacr/PanZ11URL#4758864Charalampos PapamanthouElaine ShiRoberto TamassiaPublicly Verifiable Delegation of Computation.IACR Cryptol. ePrint Arch.20115872011Informal and Other Publicationsopenjournals/iacr/PapamanthouST11http://eprint.iacr.org/2011/587https://dblp.org/rec/journals/iacr/PapamanthouST11URL#4758865Charalampos PapamanthouRoberto TamassiaCryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking.IACR Cryptol. ePrint Arch.20111022011Informal and Other Publicationsopenjournals/iacr/PapamanthouT11http://eprint.iacr.org/2011/102https://dblp.org/rec/journals/iacr/PapamanthouT11URL#4758866Bryan ParnoMariana Raykova 0001Vinod VaikuntanathanHow to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption.IACR Cryptol. ePrint Arch.20115972011Informal and Other Publicationsopenjournals/iacr/ParnoRV11http://eprint.iacr.org/2011/597https://dblp.org/rec/journals/iacr/ParnoRV11URL#4758867Juha PartalaKey agreement based on homomorphisms of algebraic structures.IACR Cryptol. ePrint Arch.20112032011Informal and Other Publicationsopenjournals/iacr/Partala11http://eprint.iacr.org/2011/203https://dblp.org/rec/journals/iacr/Partala11URL#4758868Maura B. PatersonDouglas R. StinsonA Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks.IACR Cryptol. ePrint Arch.2011762011Informal and Other Publicationsopenjournals/iacr/PatersonS11http://eprint.iacr.org/2011/076https://dblp.org/rec/journals/iacr/PatersonS11URL#4758869Kenneth G. PatersonJacob C. N. SchuldtMartijn StamSusan Thomson 0001On the Joint Security of Encryption and Signature, Revisited.IACR Cryptol. ePrint Arch.20114862011Informal and Other Publicationsopenjournals/iacr/PatersonSST11http://eprint.iacr.org/2011/486https://dblp.org/rec/journals/iacr/PatersonSST11URL#4758870Arpita PatraError-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity.IACR Cryptol. ePrint Arch.20113132011Informal and Other Publicationsopenjournals/iacr/Patra11http://eprint.iacr.org/2011/313https://dblp.org/rec/journals/iacr/Patra11URL#4758871Edoardo PersichettiCompact McEliece keys based on Quasi-Dyadic Srivastava codes.IACR Cryptol. ePrint Arch.20111792011Informal and Other Publicationsopenjournals/iacr/Persichetti11http://eprint.iacr.org/2011/179https://dblp.org/rec/journals/iacr/Persichetti11URL#4758872Christophe Petit 0001Jean-Jacques QuisquaterRubik's for cryptographers.IACR Cryptol. ePrint Arch.20116382011Informal and Other Publicationsopenjournals/iacr/PetitQ11http://eprint.iacr.org/2011/638https://dblp.org/rec/journals/iacr/PetitQ11URL#4758873Albrecht PetzoldtEnrico ThomaeStanislav BulyginChristopher WolfSmall Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.IACR Cryptol. ePrint Arch.20112942011Informal and Other Publicationsopenjournals/iacr/PetzoldtTBW11http://eprint.iacr.org/2011/294https://dblp.org/rec/journals/iacr/PetzoldtTBW11URL#4758874Duong Hieu PhanDavid PointchevalMario StreflerAdaptively Secure Broadcast Encryption with Forward Secrecy.IACR Cryptol. ePrint Arch.20114632011Informal and Other Publicationsopenjournals/iacr/PhanPS11http://eprint.iacr.org/2011/463https://dblp.org/rec/journals/iacr/PhanPS11URL#4758875Ilya PopovyanEfficient Parallelization of Lanczos Type Algorithms.IACR Cryptol. ePrint Arch.20114162011Informal and Other Publicationsopenjournals/iacr/Popovyan11http://eprint.iacr.org/2011/416https://dblp.org/rec/journals/iacr/Popovyan11URL#4758876Emmanuel ProuffThomas RocheHigher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation.IACR Cryptol. ePrint Arch.20114132011Informal and Other Publicationsopenjournals/iacr/ProuffR11http://eprint.iacr.org/2011/413https://dblp.org/rec/journals/iacr/ProuffR11URL#4758877Shi PuPu DuanJyh-Charn LiuFastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture.IACR Cryptol. ePrint Arch.2011972011Informal and Other Publicationsopenjournals/iacr/PuDL11http://eprint.iacr.org/2011/097https://dblp.org/rec/journals/iacr/PuDL11URL#4758878G. N. PurohitAsmita Singh RawatFast Scalar Multiplication in ECC using The Multi base Number System.IACR Cryptol. ePrint Arch.2011442011Informal and Other Publicationsopenjournals/iacr/PurohitR11http://eprint.iacr.org/2011/044https://dblp.org/rec/journals/iacr/PurohitR11URL#4758879Charles RackoffOn "identities", "names", "NAMES", "ROLES" and Security: A Manifesto.IACR Cryptol. ePrint Arch.20112142011Informal and Other Publicationsopenjournals/iacr/Rackoff11http://eprint.iacr.org/2011/214https://dblp.org/rec/journals/iacr/Rackoff11URL#4758880Samuel RanellucciAlain TappSeverin WinklerJürg WullschlegerOn the Efficiency of Bit Commitment Reductions.IACR Cryptol. ePrint Arch.20113242011Informal and Other Publicationsopenjournals/iacr/RanellucciTWW11http://eprint.iacr.org/2011/324https://dblp.org/rec/journals/iacr/RanellucciTWW11URL#4758881Jothi RangasamyDouglas StebilaLakshmi KuppusamyColin BoydJuan Manuel González NietoEfficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection.IACR Cryptol. ePrint Arch.20116652011Informal and Other Publicationsopenjournals/iacr/RangasamySKBN11http://eprint.iacr.org/2011/665https://dblp.org/rec/journals/iacr/RangasamySKBN11URL#4758882Ulrich RührmairPhysical Turing Machines and the Formalization of Physical Cryptography.IACR Cryptol. ePrint Arch.20111882011Informal and Other Publicationsopenjournals/iacr/Rhrmair11http://eprint.iacr.org/2011/188https://dblp.org/rec/journals/iacr/Rhrmair11URL#4758883Ulrich RührmairSIMPL Systems as a Keyless Cryptographic and Security Primitive.IACR Cryptol. ePrint Arch.20111892011Informal and Other Publicationsopenjournals/iacr/Rhrmair11ahttp://eprint.iacr.org/2011/189https://dblp.org/rec/journals/iacr/Rhrmair11aURL#4758884Thomas RistenpartHovav ShachamThomas ShrimptonCareful with Composition: Limitations of Indifferentiability and Universal Composability.IACR Cryptol. ePrint Arch.20113392011Informal and Other Publicationsopenjournals/iacr/RistenpartSS11http://eprint.iacr.org/2011/339https://dblp.org/rec/journals/iacr/RistenpartSS11URL#4758885Matthieu RivainFast and Regular Algorithms for Scalar Multiplication over Elliptic Curves.IACR Cryptol. ePrint Arch.20113382011Informal and Other Publicationsopenjournals/iacr/Rivain11http://eprint.iacr.org/2011/338https://dblp.org/rec/journals/iacr/Rivain11URL#4758886Andrea RöckKaisa NybergExploiting Linear Hull in Matsui's Algorithm 1 (extended version).IACR Cryptol. ePrint Arch.20112852011Informal and Other Publicationsopenjournals/iacr/RockN11http://eprint.iacr.org/2011/285https://dblp.org/rec/journals/iacr/RockN11URL#4758887Marcin RogawskiKris GajGroestl Tweaks and their Effect on FPGA Results.IACR Cryptol. ePrint Arch.20116352011Informal and Other Publicationsopenjournals/iacr/RogawskiG11http://eprint.iacr.org/2011/635https://dblp.org/rec/journals/iacr/RogawskiG11URL#4758888Mario RomsyAdaption of Pollard's kangaroo algorithm to the FACTOR problem.IACR Cryptol. ePrint Arch.20114832011Informal and Other Publicationsopenjournals/iacr/Romsy11http://eprint.iacr.org/2011/483https://dblp.org/rec/journals/iacr/Romsy11URL#4758889Greg RoseKISS: A Bit Too Simple.IACR Cryptol. ePrint Arch.201172011Informal and Other Publicationsopenjournals/iacr/Rose11http://eprint.iacr.org/2011/007https://dblp.org/rec/journals/iacr/Rose11URL#4758890Alexander RostovtsevAlexey BogdanovMikhail MikhaylovSecure evaluation of polynomial using privacy ring homomorphisms.IACR Cryptol. ePrint Arch.2011242011Informal and Other Publicationsopenjournals/iacr/RostovtsevBM11http://eprint.iacr.org/2011/024https://dblp.org/rec/journals/iacr/RostovtsevBM11URL#4758891Mike RosulekUniversal Composability from Essentially Any Trusted Setup.IACR Cryptol. ePrint Arch.20112402011Informal and Other Publicationsopenjournals/iacr/Rosulek11http://eprint.iacr.org/2011/240https://dblp.org/rec/journals/iacr/Rosulek11URL#4758892Swapnoneel RoyAmlan K. DasYu LiCryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication.IACR Cryptol. ePrint Arch.2011622011Informal and Other Publicationsopenjournals/iacr/RoyDL11http://eprint.iacr.org/2011/062https://dblp.org/rec/journals/iacr/RoyDL11URL#4758893Sujoy Sinha RoyChester RebeiroDebdeep MukhopadhyayJunko TakahashiToshinori FukunagaScalar Multiplication on Koblitz Curves using tau2-NAF.IACR Cryptol. ePrint Arch.20113182011Informal and Other Publicationsopenjournals/iacr/RoyRMTF11http://eprint.iacr.org/2011/318https://dblp.org/rec/journals/iacr/RoyRMTF11URL#4758894Ou RuanCai FuGuohua CuiAn Efficient Protocol for the Commit-Prove-Fair-Open functionality.IACR Cryptol. ePrint Arch.20115772011Informal and Other Publicationsopenjournals/iacr/RuanFC11http://eprint.iacr.org/2011/577https://dblp.org/rec/journals/iacr/RuanFC11URL#4758895Markku-Juhani O. SaarinenGCM, GHASH and Weak Keys.IACR Cryptol. ePrint Arch.20112022011Informal and Other Publicationsopenjournals/iacr/Saarinen11http://eprint.iacr.org/2011/202https://dblp.org/rec/journals/iacr/Saarinen11URL#4758896Markku-Juhani O. SaarinenCryptographic Analysis of All 4 x 4 - Bit S-Boxes.IACR Cryptol. ePrint Arch.20112182011Informal and Other Publicationsopenjournals/iacr/Saarinen11ahttp://eprint.iacr.org/2011/218https://dblp.org/rec/journals/iacr/Saarinen11aURL#4758897Markku-Juhani O. SaarinenSGCM: The Sophie Germain Counter Mode.IACR Cryptol. ePrint Arch.20113262011Informal and Other Publicationsopenjournals/iacr/Saarinen11bhttp://eprint.iacr.org/2011/326https://dblp.org/rec/journals/iacr/Saarinen11bURL#4758898Masoumeh SafkhaniNasour BagheriMajid NaderiCryptanalysis of Chen et al.'s RFID Access Control Protocol.IACR Cryptol. ePrint Arch.20111942011Informal and Other Publicationsopenjournals/iacr/SafkhaniBN11http://eprint.iacr.org/2011/194https://dblp.org/rec/journals/iacr/SafkhaniBN11URL#4758899Masoumeh SafkhaniNasour BagheriMajid NaderiCryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol.IACR Cryptol. ePrint Arch.20114242011Informal and Other Publicationsopenjournals/iacr/SafkhaniBN11ahttp://eprint.iacr.org/2011/424https://dblp.org/rec/journals/iacr/SafkhaniBN11aURL#4758900Masoumeh SafkhaniNasour BagheriMajid NaderiOn the Security of RFID Anti Cloning Security Protocol(ACSP).IACR Cryptol. ePrint Arch.20115632011Informal and Other Publicationsopenjournals/iacr/SafkhaniBN11bhttp://eprint.iacr.org/2011/563https://dblp.org/rec/journals/iacr/SafkhaniBN11bURL#4758901Masoumeh SafkhaniNasour BagheriMajid NaderiSecurity Analysis of a PUF based RFID Authentication Protocol.IACR Cryptol. ePrint Arch.20117042011Informal and Other Publicationsopenjournals/iacr/SafkhaniBN11chttp://eprint.iacr.org/2011/704https://dblp.org/rec/journals/iacr/SafkhaniBN11cURL#4758902Masoumeh SafkhaniNasour BagheriSomitra Kumar SanadhyaMajid NaderiCryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.IACR Cryptol. ePrint Arch.20114262011Informal and Other Publicationsopenjournals/iacr/SafkhaniBSN11http://eprint.iacr.org/2011/426https://dblp.org/rec/journals/iacr/SafkhaniBSN11URL#4758903Masoumeh SafkhaniMajid NaderiNasour BagheriSomitra Kumar SanadhyaCryptanalysis of Some Protocols for RFID Systems.IACR Cryptol. ePrint Arch.2011612011Informal and Other Publicationsopenjournals/iacr/SafkhaniNBS11http://eprint.iacr.org/2011/061https://dblp.org/rec/journals/iacr/SafkhaniNBS11URL#4758904Masoumeh SafkhaniPedro Peris-LopezJulio César Hernández CastroNasour BagheriMajid NaderiCryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.IACR Cryptol. ePrint Arch.20113312011Informal and Other Publicationsopenjournals/iacr/SafkhaniPCBN11http://eprint.iacr.org/2011/331https://dblp.org/rec/journals/iacr/SafkhaniPCBN11URL#4758905Teruo SaitoA Single-Key Attack on 6-Round KASUMI.IACR Cryptol. ePrint Arch.20115842011Informal and Other Publicationsopenjournals/iacr/Saito11http://eprint.iacr.org/2011/584https://dblp.org/rec/journals/iacr/Saito11URL#4758906Gideon SamidInteger Arithmetic without Arithmetic Addition.IACR Cryptol. ePrint Arch.20111272011Informal and Other Publicationsopenjournals/iacr/Samid11http://eprint.iacr.org/2011/127https://dblp.org/rec/journals/iacr/Samid11URL#4758907Palash Sarkar 0001On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector.IACR Cryptol. ePrint Arch.20112992011Informal and Other Publicationsopenjournals/iacr/Sarkar11http://eprint.iacr.org/2011/299https://dblp.org/rec/journals/iacr/Sarkar11URL#4758908Michael Schneider 0002Sieving for Shortest Vectors in Ideal Lattices.IACR Cryptol. ePrint Arch.20114582011Informal and Other Publicationsopenjournals/iacr/Schneider11http://eprint.iacr.org/2011/458https://dblp.org/rec/journals/iacr/Schneider11URL#4758909Peter SchollNigel P. SmartImproved Key Generation For Gentry's Fully Homomorphic Encryption Scheme.IACR Cryptol. ePrint Arch.20114712011Informal and Other Publicationsopenjournals/iacr/SchollS11http://eprint.iacr.org/2011/471https://dblp.org/rec/journals/iacr/SchollS11URL#4758910Dominique SchröderDominique UnruhRound Optimal Blind Signatures.IACR Cryptol. ePrint Arch.20112642011Informal and Other Publicationsopenjournals/iacr/SchroderU11http://eprint.iacr.org/2011/264https://dblp.org/rec/journals/iacr/SchroderU11URL#4758911Dominique SchröderDominique UnruhSecurity of Blind Signatures Revisited.IACR Cryptol. ePrint Arch.20113162011Informal and Other Publicationsopenjournals/iacr/SchroderU11ahttp://eprint.iacr.org/2011/316https://dblp.org/rec/journals/iacr/SchroderU11aURL#4758912Peter SchwabeBo-Yin YangShang-Yi YangSHA-3 on ARM11 processors.IACR Cryptol. ePrint Arch.20116702011Informal and Other Publicationsopenjournals/iacr/SchwabeYY11http://eprint.iacr.org/2011/670https://dblp.org/rec/journals/iacr/SchwabeYY11URL#4758913Michael ScottOn the Efficient Implementation of Pairing-Based Protocols.IACR Cryptol. ePrint Arch.20113342011Informal and Other Publicationsopenjournals/iacr/Scott11http://eprint.iacr.org/2011/334https://dblp.org/rec/journals/iacr/Scott11URL#4758914S. Sharmila Deva SelviS. Sree VivekC. Pandu RanganIdentity Based Deterministic Signature Scheme Without Forking-Lemma.IACR Cryptol. ePrint Arch.20112172011Informal and Other Publicationsopenjournals/iacr/SelviVR11http://eprint.iacr.org/2011/217https://dblp.org/rec/journals/iacr/SelviVR11URL#4758915S. Sharmila Deva SelviS. Sree VivekC. Pandu RanganDeterministic Identity Based Signature Scheme and its Application for Aggregate Signatures.IACR Cryptol. ePrint Arch.20116952011Informal and Other Publicationsopenjournals/iacr/SelviVR11ahttp://eprint.iacr.org/2011/695https://dblp.org/rec/journals/iacr/SelviVR11aURL#4758916S. Sharmila Deva SelviS. Sree VivekDhinakaran VinayagamurthyC. Pandu RanganOn the Security of ID Based Signcryption Schemes.IACR Cryptol. ePrint Arch.20116642011Informal and Other Publicationsopenjournals/iacr/SelviVVR11http://eprint.iacr.org/2011/664https://dblp.org/rec/journals/iacr/SelviVVR11URL#4758917Igor A. SemaevLocal limit theorem for large deviations and statistical box-tests.IACR Cryptol. ePrint Arch.20112982011Informal and Other Publicationsopenjournals/iacr/Semaev11http://eprint.iacr.org/2011/298https://dblp.org/rec/journals/iacr/Semaev11URL#4758918Igor A. SemaevMehdi M. HassanzadehNew Statistical Box-Test and its Power.IACR Cryptol. ePrint Arch.20112972011Informal and Other Publicationsopenjournals/iacr/SemaevH11http://eprint.iacr.org/2011/297https://dblp.org/rec/journals/iacr/SemaevH11URL#4758919Nicolas SendrierDecoding One Out of Many.IACR Cryptol. ePrint Arch.20113672011Informal and Other Publicationsopenjournals/iacr/Sendrier11http://eprint.iacr.org/2011/367https://dblp.org/rec/journals/iacr/Sendrier11URL#4758920Sourav Sen GuptaSubhamoy MaitraGoutam Paul 0001Santanu Sarkar 0001RC4: (Non-)Random Words from (Non-)Random Permutations.IACR Cryptol. ePrint Arch.20114482011Informal and Other Publicationsopenjournals/iacr/SenguptaMPS11http://eprint.iacr.org/2011/448https://dblp.org/rec/journals/iacr/SenguptaMPS11URL#4758921Jae Hong SeoJung Hee CheonFully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.IACR Cryptol. ePrint Arch.2011212011Informal and Other Publicationsopenjournals/iacr/SeoC11http://eprint.iacr.org/2011/021https://dblp.org/rec/journals/iacr/SeoC11URL#4758922Idan SheetritAvishai WoolCryptanalysis of KeeLoq code-hopping using a Single FPGA.IACR Cryptol. ePrint Arch.20112422011Informal and Other Publicationsopenjournals/iacr/SheetritW11http://eprint.iacr.org/2011/242https://dblp.org/rec/journals/iacr/SheetritW11URL#4758923Abhi ShelatChih-Hao ShenTwo-Output Secure Computation with Malicious Adversaries.IACR Cryptol. ePrint Arch.20115332011Informal and Other Publicationsopenjournals/iacr/ShelatS11http://eprint.iacr.org/2011/533https://dblp.org/rec/journals/iacr/ShelatS11URL#4758924Elaine ShiT.-H. Hubert ChanEmil StefanovMingfei LiOblivious RAM with O((log N)3) Worst-Case Cost.IACR Cryptol. ePrint Arch.20114072011Informal and Other Publicationsopenjournals/iacr/ShiCSL11http://eprint.iacr.org/2011/407https://dblp.org/rec/journals/iacr/ShiCSL11URL#4758925Nigel P. SmartFrederik VercauterenFully Homomorphic SIMD Operations.IACR Cryptol. ePrint Arch.20111332011Informal and Other Publicationsopenjournals/iacr/SmartV11http://eprint.iacr.org/2011/133https://dblp.org/rec/journals/iacr/SmartV11URL#4758926Martin StanekExtending Baby-step Giant-step algorithm for FACTOR problem.IACR Cryptol. ePrint Arch.2011592011Informal and Other Publicationsopenjournals/iacr/Stanek11http://eprint.iacr.org/2011/059https://dblp.org/rec/journals/iacr/Stanek11URL#4758927Martin StanekThreshold Encryption into Multiple Ciphertexts.IACR Cryptol. ePrint Arch.20111072011Informal and Other Publicationsopenjournals/iacr/Stanek11ahttp://eprint.iacr.org/2011/107https://dblp.org/rec/journals/iacr/Stanek11aURL#4758928Pantelimon StanicaSugata GangopadhyayBrajesh Kumar SinghSome Results Concerning Generalized Bent Functions.IACR Cryptol. ePrint Arch.20112902011Informal and Other Publicationsopenjournals/iacr/StanicaGS11http://eprint.iacr.org/2011/290https://dblp.org/rec/journals/iacr/StanicaGS11URL#4758929Pantelimon StanicaThor MartinsenOctal Bent Generalized Boolean Functions.IACR Cryptol. ePrint Arch.2011892011Informal and Other Publicationsopenjournals/iacr/StanicaM11http://eprint.iacr.org/2011/089https://dblp.org/rec/journals/iacr/StanicaM11URL#4758930Emil StefanovMarten van DijkAlina OpreaAri JuelsIris: A Scalable Cloud File System with Efficient Integrity Checks.IACR Cryptol. ePrint Arch.20115852011Informal and Other Publicationsopenjournals/iacr/StefanovDOJ11http://eprint.iacr.org/2011/585https://dblp.org/rec/journals/iacr/StefanovDOJ11URL#4758931Emil StefanovElaine ShiDawn SongPolicy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.IACR Cryptol. ePrint Arch.20115092011Informal and Other Publicationsopenjournals/iacr/StefanovSS11http://eprint.iacr.org/2011/509https://dblp.org/rec/journals/iacr/StefanovSS11URL#4758932Douglas R. StinsonComments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski.IACR Cryptol. ePrint Arch.20112592011Informal and Other Publicationsopenjournals/iacr/Stinson11http://eprint.iacr.org/2011/259https://dblp.org/rec/journals/iacr/Stinson11URL#4758933Falko StrenzkeFast and Secure Root-Finding for Code-based Cryptosystems.IACR Cryptol. ePrint Arch.20116722011Informal and Other Publicationsopenjournals/iacr/Strenzke11http://eprint.iacr.org/2011/672https://dblp.org/rec/journals/iacr/Strenzke11URL#4758934Falko StrenzkeTiming Attacks against the Syndrome Inversionin Code-based Cryptosystems.IACR Cryptol. ePrint Arch.20116832011Informal and Other Publicationsopenjournals/iacr/Strenzke11ahttp://eprint.iacr.org/2011/683https://dblp.org/rec/journals/iacr/Strenzke11aURL#4758935Chen SuHaining FanImpact of Intel's New Instruction Sets on Software Implementation of GF(2)[x] Multiplication.IACR Cryptol. ePrint Arch.20115892011Informal and Other Publicationsopenjournals/iacr/SuF11http://eprint.iacr.org/2011/589https://dblp.org/rec/journals/iacr/SuF11URL#4758936Virendra SuleTrapdoor oneway functions associated with exponentiation.IACR Cryptol. ePrint Arch.20111312011Informal and Other Publicationsopenjournals/iacr/Sule11http://eprint.iacr.org/2011/131https://dblp.org/rec/journals/iacr/Sule11URL#4758937Vorapong SuppakitpaisarnMasato EdahiroHiroshi ImaiFast Elliptic Curve Cryptography Using Optimal Double-Base Chains.IACR Cryptol. ePrint Arch.2011302011Informal and Other Publicationsopenjournals/iacr/SuppakitpaisarnEI11http://eprint.iacr.org/2011/030https://dblp.org/rec/journals/iacr/SuppakitpaisarnEI11URL#4758938Colleen SwansonDouglas R. StinsonUnconditionally Secure Signature Schemes Revisited.IACR Cryptol. ePrint Arch.20111042011Informal and Other Publicationsopenjournals/iacr/SwansonS11http://eprint.iacr.org/2011/104https://dblp.org/rec/journals/iacr/SwansonS11URL#4758939Colleen SwansonDouglas R. StinsonExtended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval.IACR Cryptol. ePrint Arch.20116742011Informal and Other Publicationsopenjournals/iacr/SwansonS11ahttp://eprint.iacr.org/2011/674https://dblp.org/rec/journals/iacr/SwansonS11aURL#4758940Tatsuya TakehisaHiroki NogawaMasakatu MoriiAES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -.IACR Cryptol. ePrint Arch.20114282011Informal and Other Publicationsopenjournals/iacr/TakehisaNM11http://eprint.iacr.org/2011/428https://dblp.org/rec/journals/iacr/TakehisaNM11URL#4758941Amadou TallA generalization of the Lucas addition chains.IACR Cryptol. ePrint Arch.20113782011Informal and Other Publicationsopenjournals/iacr/Tall11http://eprint.iacr.org/2011/378https://dblp.org/rec/journals/iacr/Tall11URL#4758942Deng TangClaude CarletXiaohu TangHighly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks.IACR Cryptol. ePrint Arch.20113662011Informal and Other Publicationsopenjournals/iacr/TangCT11http://eprint.iacr.org/2011/366https://dblp.org/rec/journals/iacr/TangCT11URL#4758943Shaohua TangJintai DingYujun LiangA Simple and Efficient New Group Key Management Approach Based on Linear Geometry.IACR Cryptol. ePrint Arch.20112252011Informal and Other Publicationsopenjournals/iacr/TangDL11http://eprint.iacr.org/2011/225https://dblp.org/rec/journals/iacr/TangDL11URL#4758944Shaohua TangJintai DingZhiming YangSecure Group Key Management Approach Based upon N-dimensional Hyper-sphere.IACR Cryptol. ePrint Arch.20112162011Informal and Other Publicationsopenjournals/iacr/TangDY11http://eprint.iacr.org/2011/216https://dblp.org/rec/journals/iacr/TangDY11URL#4758945Chunming Tang 0003Shuhong GaoChengli ZhangThe Optimal Linear Secret Sharing Scheme for Any Given Access Structure.IACR Cryptol. ePrint Arch.20111472011Informal and Other Publicationsopenjournals/iacr/TangGZ11http://eprint.iacr.org/2011/147https://dblp.org/rec/journals/iacr/TangGZ11URL#4758946Ming Tang 0002Xiaorong WangZhenlong QiuSi GaoHuanguo ZhangQianhong WuDPA Leakage Evaluation and Countermeasure Plug-in.IACR Cryptol. ePrint Arch.2011772011Informal and Other Publicationsopenjournals/iacr/TangWQGZW11http://eprint.iacr.org/2011/077https://dblp.org/rec/journals/iacr/TangWQGZW11URL#4758947Jonathan TaverneArmando Faz-HernándezDiego F. AranhaFrancisco Rodríguez-HenríquezDarrel HankersonJulio César López-HernándezSoftware implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication.IACR Cryptol. ePrint Arch.20111702011Informal and Other Publicationsopenjournals/iacr/TaverneFARHL11http://eprint.iacr.org/2011/170https://dblp.org/rec/journals/iacr/TaverneFARHL11URL#4758948Enrico ThomaeChristopher WolfRoots of Square: Cryptanalysis of Double-Layer Square and Square+.IACR Cryptol. ePrint Arch.20114312011Informal and Other Publicationsopenjournals/iacr/ThomaeW11http://eprint.iacr.org/2011/431https://dblp.org/rec/journals/iacr/ThomaeW11URL#4758949Tomas ToftSecure Datastructures based on Multiparty Computation.IACR Cryptol. ePrint Arch.2011812011Informal and Other Publicationsopenjournals/iacr/Toft11http://eprint.iacr.org/2011/081https://dblp.org/rec/journals/iacr/Toft11URL#4758950Natalia N. TokarevaOn the number of bent functions: lower bounds and hypotheses.IACR Cryptol. ePrint Arch.2011832011Informal and Other Publicationsopenjournals/iacr/Tokareva11http://eprint.iacr.org/2011/083https://dblp.org/rec/journals/iacr/Tokareva11URL#4758951Natalia N. TokarevaGeneralizations of Bent Functions. A Survey.IACR Cryptol. ePrint Arch.20111112011Informal and Other Publicationsopenjournals/iacr/Tokareva11ahttp://eprint.iacr.org/2011/111https://dblp.org/rec/journals/iacr/Tokareva11aURL#4758952Michael TunstallPractical Complexity Differential Cryptanalysis and Fault Analysis of AES.IACR Cryptol. ePrint Arch.20114532011Informal and Other Publicationsopenjournals/iacr/Tunstall11http://eprint.iacr.org/2011/453https://dblp.org/rec/journals/iacr/Tunstall11URL#4758953Meltem Sönmez TuranEvolutionary Construction of de Bruijn Sequences.IACR Cryptol. ePrint Arch.20117112011Informal and Other Publicationsopenjournals/iacr/Turan11http://eprint.iacr.org/2011/711https://dblp.org/rec/journals/iacr/Turan11URL#4758954Piotr K. TysowskiM. Anwarul HasanRe-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds.IACR Cryptol. ePrint Arch.20116682011Informal and Other Publicationsopenjournals/iacr/TysowskiH11http://eprint.iacr.org/2011/668https://dblp.org/rec/journals/iacr/TysowskiH11URL#4758955István VajdaCryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA.IACR Cryptol. ePrint Arch.20111032011Informal and Other Publicationsopenjournals/iacr/Vajda11http://eprint.iacr.org/2011/103https://dblp.org/rec/journals/iacr/Vajda11URL#4758956István VajdaFramework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks.IACR Cryptol. ePrint Arch.20112202011Informal and Other Publicationsopenjournals/iacr/Vajda11ahttp://eprint.iacr.org/2011/220https://dblp.org/rec/journals/iacr/Vajda11aURL#4758957István VajdaNew look at impossibility result on Dolev-Yao models with hashes.IACR Cryptol. ePrint Arch.20113352011Informal and Other Publicationsopenjournals/iacr/Vajda11bhttp://eprint.iacr.org/2011/335https://dblp.org/rec/journals/iacr/Vajda11bURL#4758958István VajdaNon-malleable public key encryption in BRSIM/UC.IACR Cryptol. ePrint Arch.20114702011Informal and Other Publicationsopenjournals/iacr/Vajda11chttp://eprint.iacr.org/2011/470https://dblp.org/rec/journals/iacr/Vajda11cURL#4758959István VajdaUC framework for anonymous communication.IACR Cryptol. ePrint Arch.20116822011Informal and Other Publicationsopenjournals/iacr/Vajda11dhttp://eprint.iacr.org/2011/682https://dblp.org/rec/journals/iacr/Vajda11dURL#4758960Mark VelichkaMichael J. Jacobson Jr.Andreas SteinComputing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields.IACR Cryptol. ePrint Arch.2011982011Informal and Other Publicationsopenjournals/iacr/VelichkaJS11http://eprint.iacr.org/2011/098https://dblp.org/rec/journals/iacr/VelichkaJS11URL#4758961Nicolas Veyrat-CharvillonBenoît GérardMathieu RenauldFrançois-Xavier StandaertAn optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks.IACR Cryptol. ePrint Arch.20116102011Informal and Other Publicationsopenjournals/iacr/Veyrat-CharvillonGRS11http://eprint.iacr.org/2011/610https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGRS11URL#4758962Nicolas Veyrat-CharvillonFrançois-Xavier StandaertGeneric Side-Channel Distinguishers: Improvements and Limitations.IACR Cryptol. ePrint Arch.20111492011Informal and Other Publicationsopenjournals/iacr/Veyrat-CharvillonS11http://eprint.iacr.org/2011/149https://dblp.org/rec/journals/iacr/Veyrat-CharvillonS11URL#4758963S. Sree VivekS. Sharmila Deva SelviC. Pandu RanganCompact CCA-Secure Encryption with Ciphertext Verifiability.IACR Cryptol. ePrint Arch.20113612011Informal and Other Publicationsopenjournals/iacr/VivekSR11http://eprint.iacr.org/2011/361https://dblp.org/rec/journals/iacr/VivekSR11URL#4758964Xiuqun WangA Novel Adaptive Proactive Secret Sharing without a Trusted Party.IACR Cryptol. ePrint Arch.20112412011Informal and Other Publicationsopenjournals/iacr/Wang11http://eprint.iacr.org/2011/241https://dblp.org/rec/journals/iacr/Wang11URL#4758965Yongjia WangHaining FanGF(2n) redundant representation using matrix embedding.IACR Cryptol. ePrint Arch.20115562011Informal and Other Publicationsopenjournals/iacr/WangF11http://eprint.iacr.org/2011/556https://dblp.org/rec/journals/iacr/WangF11URL#4758966Baocheng WangChunming Tang 0001Yanfeng QiYixian YangA generalization of the class of hyper-bent Boolean functions in binomial forms.IACR Cryptol. ePrint Arch.20116982011Informal and Other Publicationsopenjournals/iacr/WangTQY11http://eprint.iacr.org/2011/698https://dblp.org/rec/journals/iacr/WangTQY11URL#4758967Baocheng WangChunming Tang 0001Yanfeng QiYixian YangMaozhi XuA New Class of Hyper-bent Boolean Functions with Multiple Trace Terms.IACR Cryptol. ePrint Arch.20116002011Informal and Other Publicationsopenjournals/iacr/WangTQYX11http://eprint.iacr.org/2011/600https://dblp.org/rec/journals/iacr/WangTQYX11URL#4758968Xu An Wang 0001Liqiang WuXiaoyuan Yang 0002Huaqun WangCryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.IACR Cryptol. ePrint Arch.20112242011Informal and Other Publicationsopenjournals/iacr/WangWYW11http://eprint.iacr.org/2011/224https://dblp.org/rec/journals/iacr/WangWYW11URL#4758969Mingqiang WangXiaoyun Wang 0001Tao ZhanAttack Cryptosystems Based on HCDLP.IACR Cryptol. ePrint Arch.20112532011Informal and Other Publicationsopenjournals/iacr/WangWZ11http://eprint.iacr.org/2011/253https://dblp.org/rec/journals/iacr/WangWZ11URL#4758970Mingqiang WangXiaoyun Wang 0001Tao ZhanThe Fault Attack ECDLP Revisited.IACR Cryptol. ePrint Arch.20112832011Informal and Other Publicationsopenjournals/iacr/WangWZ11ahttp://eprint.iacr.org/2011/283https://dblp.org/rec/journals/iacr/WangWZ11aURL#4758971Guilin WangFubiao XiaYunlei ZhaoDesignated Confirmer Signatures With Unified Verification.IACR Cryptol. ePrint Arch.20111822011Informal and Other Publicationsopenjournals/iacr/WangXZ11http://eprint.iacr.org/2011/182https://dblp.org/rec/journals/iacr/WangXZ11URL#4758972Ping Wang 0005Fangguo ZhangComputing Elliptic Curve Discrete Logarithms with the Negation Map.IACR Cryptol. ePrint Arch.201182011Informal and Other Publicationsopenjournals/iacr/WangZ11http://eprint.iacr.org/2011/008https://dblp.org/rec/journals/iacr/WangZ11URL#4758973Bin WangQing ZhaoA server-aided verification signature scheme without random oracles.IACR Cryptol. ePrint Arch.20117132011Informal and Other Publicationsopenjournals/iacr/WangZ11ahttp://eprint.iacr.org/2011/713https://dblp.org/rec/journals/iacr/WangZ11aURL#4758974Bin WangQing ZhaoKe DaiA non-interactive deniable authentication scheme in the standard model.IACR Cryptol. ePrint Arch.20116932011Informal and Other Publicationsopenjournals/iacr/WangZD11http://eprint.iacr.org/2011/693https://dblp.org/rec/journals/iacr/WangZD11URL#4758975Lei Wei 0004Scott E. CoullMichael K. ReiterBounded Vector Signatures and their Applications.IACR Cryptol. ePrint Arch.20111172011Informal and Other Publicationsopenjournals/iacr/WeiCR11http://eprint.iacr.org/2011/117https://dblp.org/rec/journals/iacr/WeiCR11URL#4758976Lei Wei 0001Christian RechbergerJian Guo 0001Hongjun Wu 0001Huaxiong WangSan LingImproved Meet-in-the-Middle Cryptanalysis of KTANTAN.IACR Cryptol. ePrint Arch.20112012011Informal and Other Publicationsopenjournals/iacr/WeiRGWWL11http://eprint.iacr.org/2011/201https://dblp.org/rec/journals/iacr/WeiRGWWL11URL#4758977Puwen WeiYuliang Zheng 0001Xiaoyun Wang 0001Public Key Encryption for the Forgetful.IACR Cryptol. ePrint Arch.20111972011Informal and Other Publicationsopenjournals/iacr/WeiZW11http://eprint.iacr.org/2011/197https://dblp.org/rec/journals/iacr/WeiZW11URL#4758978Jian Weng 0001Yunlei ZhaoDirect Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy.IACR Cryptol. ePrint Arch.20112082011Informal and Other Publicationsopenjournals/iacr/WengZ11http://eprint.iacr.org/2011/208https://dblp.org/rec/journals/iacr/WengZ11URL#4758979Carolyn WhitnallElisabeth OswaldA Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.IACR Cryptol. ePrint Arch.20113222011Informal and Other Publicationsopenjournals/iacr/WhitnallO11http://eprint.iacr.org/2011/322https://dblp.org/rec/journals/iacr/WhitnallO11URL#4758980Carolyn WhitnallElisabeth OswaldA Fair Evaluation Framework for Comparing Side-Channel Distinguishers.IACR Cryptol. ePrint Arch.20114032011Informal and Other Publicationsopenjournals/iacr/WhitnallO11ahttp://eprint.iacr.org/2011/403https://dblp.org/rec/journals/iacr/WhitnallO11aURL#4758981Carolyn WhitnallElisabeth OswaldLuke MatherAn Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis.IACR Cryptol. ePrint Arch.20113802011Informal and Other Publicationsopenjournals/iacr/WhitnallOM11http://eprint.iacr.org/2011/380https://dblp.org/rec/journals/iacr/WhitnallOM11URL#4758982Douglas WikströmA Commitment-Consistent Proof of a Shuffle.IACR Cryptol. ePrint Arch.20111682011Informal and Other Publicationsopenjournals/iacr/Wikstrom11http://eprint.iacr.org/2011/168https://dblp.org/rec/journals/iacr/Wikstrom11URL#4758983Stephen C. WilliamsAnalysis of the SSH Key Exchange Protocol.IACR Cryptol. ePrint Arch.20112762011Informal and Other Publicationsopenjournals/iacr/Williams11http://eprint.iacr.org/2011/276https://dblp.org/rec/journals/iacr/Williams11URL#4758984Christopher WolfEnrico ThomaeSmall Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields.IACR Cryptol. ePrint Arch.20116692011Informal and Other Publicationsopenjournals/iacr/WolfT11http://eprint.iacr.org/2011/669https://dblp.org/rec/journals/iacr/WolfT11URL#4758985Wenling WuLei Zhang 0012LBlock: A Lightweight Block Cipher.IACR Cryptol. ePrint Arch.20113452011Informal and Other Publicationsopenjournals/iacr/Wu011http://eprint.iacr.org/2011/345https://dblp.org/rec/journals/iacr/Wu011URL#4758986Shengbao WuMingsheng WangSecurity Evaluation against Differential Cryptanalysis for Block Cipher Structures.IACR Cryptol. ePrint Arch.20115512011Informal and Other Publicationsopenjournals/iacr/WuW11http://eprint.iacr.org/2011/551https://dblp.org/rec/journals/iacr/WuW11URL#4758987Hongfeng WuChangan ZhaoFaster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three.IACR Cryptol. ePrint Arch.20114682011Informal and Other Publicationsopenjournals/iacr/WuZ11http://eprint.iacr.org/2011/468https://dblp.org/rec/journals/iacr/WuZ11URL#4758988David XiaoIs privacy compatible with truthfulness?IACR Cryptol. ePrint Arch.201152011Informal and Other Publicationsopenjournals/iacr/Xiao11http://eprint.iacr.org/2011/005https://dblp.org/rec/journals/iacr/Xiao11URL#4758989Jia XuAuditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage.IACR Cryptol. ePrint Arch.20113042011Informal and Other Publicationsopenjournals/iacr/Xu11http://eprint.iacr.org/2011/304https://dblp.org/rec/journals/iacr/Xu11URL#4758990Jia XuPractically Efficient Verifiable Delegation of Polynomial and its Applications.IACR Cryptol. ePrint Arch.20114732011Informal and Other Publicationsopenjournals/iacr/Xu11ahttp://eprint.iacr.org/2011/473https://dblp.org/rec/journals/iacr/Xu11aURL#4758991Jia XuSecure Cloud Storage with Encrypted Data using File-Based Authentication.IACR Cryptol. ePrint Arch.20115382011Informal and Other Publicationsopenjournals/iacr/Xu11bhttp://eprint.iacr.org/2011/538https://dblp.org/rec/journals/iacr/Xu11bURL#4758992Jia Xu 0006Ee-Chien ChangPractically Efficient Proof of Retrievability in Cloud Storage.IACR Cryptol. ePrint Arch.20113622011Informal and Other Publicationsopenjournals/iacr/XuC11http://eprint.iacr.org/2011/362https://dblp.org/rec/journals/iacr/XuC11URL#4758993Jia Xu 0006Ee-Chien ChangTowards Efficient Provable Data Possession.IACR Cryptol. ePrint Arch.20115742011Informal and Other Publicationsopenjournals/iacr/XuC11ahttp://eprint.iacr.org/2011/574https://dblp.org/rec/journals/iacr/XuC11aURL#4758994Peng Xu 0003Hai Jin 0001SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS.IACR Cryptol. ePrint Arch.20111902011Informal and Other Publicationsopenjournals/iacr/XuJ11http://eprint.iacr.org/2011/190https://dblp.org/rec/journals/iacr/XuJ11URL#4758995Lei Xu 0012Dongdai LinJing ZouECDLP on GPU.IACR Cryptol. ePrint Arch.20111462011Informal and Other Publicationsopenjournals/iacr/XuLZ11http://eprint.iacr.org/2011/146https://dblp.org/rec/journals/iacr/XuLZ11URL#4758996ZiJie XuKe XuWays to restrict the differential path.IACR Cryptol. ePrint Arch.20113072011Informal and Other Publicationsopenjournals/iacr/XuX11http://eprint.iacr.org/2011/307https://dblp.org/rec/journals/iacr/XuX11URL#4758997ZiJie XuKe XuUse Data-depend Function Build Message Expansion Function.IACR Cryptol. ePrint Arch.20116562011Informal and Other Publicationsopenjournals/iacr/XuX11ahttp://eprint.iacr.org/2011/656https://dblp.org/rec/journals/iacr/XuX11aURL#4758998Qiushi YangYvo DesmedtEfficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol.IACR Cryptol. ePrint Arch.20112652011Informal and Other Publicationsopenjournals/iacr/YangD11http://eprint.iacr.org/2011/265https://dblp.org/rec/journals/iacr/YangD11URL#4758999Guomin YangShanshan DuanDuncan S. WongChik How TanHuaxiong WangAuthenticated Key Exchange under Bad Randomness.IACR Cryptol. ePrint Arch.20116882011Informal and Other Publicationsopenjournals/iacr/YangDWTW11http://eprint.iacr.org/2011/688https://dblp.org/rec/journals/iacr/YangDWTW11URL#4759000Guangdong YangShaohua TangLi YangA Novel Group Signature Scheme Based on MPKC.IACR Cryptol. ePrint Arch.20111002011Informal and Other Publicationsopenjournals/iacr/YangTY11http://eprint.iacr.org/2011/100https://dblp.org/rec/journals/iacr/YangTY11URL#4759001Gavin Xiaoxu YaoJunfeng FanRay C. C. CheungIngrid VerbauwhedeA High Speed Pairing Coprocessor Using RNS and Lazy Reduction.IACR Cryptol. ePrint Arch.20112582011Informal and Other Publicationsopenjournals/iacr/YaoFCV11http://eprint.iacr.org/2011/258https://dblp.org/rec/journals/iacr/YaoFCV11URL#4759002Andrew C. YaoYunlei ZhaoA New Family of Practical Non-Malleable Protocols.IACR Cryptol. ePrint Arch.2011352011Informal and Other Publicationsopenjournals/iacr/YaoZ11http://eprint.iacr.org/2011/035https://dblp.org/rec/journals/iacr/YaoZ11URL#4759003Ching-Hua YuSign Modules in Secure Arithmetic Circuits.IACR Cryptol. ePrint Arch.20115392011Informal and Other Publicationsopenjournals/iacr/Yu11http://eprint.iacr.org/2011/539https://dblp.org/rec/journals/iacr/Yu11URL#4759004Hongbo YuJiazhe ChenKeting JiaXiaoyun Wang 0001Near-Collision Attack on the Step-Reduced Compression Function of Skein-256.IACR Cryptol. ePrint Arch.20111482011Informal and Other Publicationsopenjournals/iacr/YuCJW11http://eprint.iacr.org/2011/148https://dblp.org/rec/journals/iacr/YuCJW11URL#4759005Yuyin YuMingsheng WangYongqiang Li 0001Constructing differential 4-uniform permutations from know ones.IACR Cryptol. ePrint Arch.2011472011Informal and Other Publicationsopenjournals/iacr/YuWL11http://eprint.iacr.org/2011/047https://dblp.org/rec/journals/iacr/YuWL11URL#4759006Ching-Hua YuBo-Yin YangRandomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation.IACR Cryptol. ePrint Arch.20115602011Informal and Other Publicationsopenjournals/iacr/YuY11http://eprint.iacr.org/2011/560https://dblp.org/rec/journals/iacr/YuY11URL#4759007Bing ZengLiang ChenXueming TangA Perfectly Binding Commitment Scheme Against Quantum Attacks.IACR Cryptol. ePrint Arch.20112232011Informal and Other Publicationsopenjournals/iacr/ZengCT11http://eprint.iacr.org/2011/223https://dblp.org/rec/journals/iacr/ZengCT11URL#4759008Bing ZengXueming TangPeng XuJiandu JingPractical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries.IACR Cryptol. ePrint Arch.201112011Informal and Other Publicationsopenjournals/iacr/ZengTXJ11http://eprint.iacr.org/2011/001https://dblp.org/rec/journals/iacr/ZengTXJ11URL#4759009Fangguo ZhangThe Computational Square-Root Exponent Problem- Revisited.IACR Cryptol. ePrint Arch.20112632011Informal and Other Publicationsopenjournals/iacr/Zhang11http://eprint.iacr.org/2011/263https://dblp.org/rec/journals/iacr/Zhang11URL#4759010Can ZhangComparing Different Definitions of Secure Session.IACR Cryptol. ePrint Arch.20112782011Informal and Other Publicationsopenjournals/iacr/Zhang11ahttp://eprint.iacr.org/2011/278https://dblp.org/rec/journals/iacr/Zhang11aURL#4759011Yun ZhangChristophe TartaryHuaxiong WangAn Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version).IACR Cryptol. ePrint Arch.20113922011Informal and Other Publicationsopenjournals/iacr/ZhangTW11http://eprint.iacr.org/2011/392https://dblp.org/rec/journals/iacr/ZhangTW11URL#4759012Fangguo ZhangPing Wang 0005Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving.IACR Cryptol. ePrint Arch.20114612011Informal and Other Publicationsopenjournals/iacr/ZhangW11http://eprint.iacr.org/2011/461https://dblp.org/rec/journals/iacr/ZhangW11URL#4759013Ye Zhang 0001Chun Jason XueDuncan S. WongNikos MamoulisSiu-Ming YiuAcceleration of Composite Order Bilinear Pairing on Graphics Hardware.IACR Cryptol. ePrint Arch.20111962011Informal and Other Publicationsopenjournals/iacr/ZhangXWMY11http://eprint.iacr.org/2011/196https://dblp.org/rec/journals/iacr/ZhangXWMY11URL#4759014Huajun ZhangZongyang ZhangZhenfu CaoPosition-Verification in Multi-Channel Models.IACR Cryptol. ePrint Arch.20117142011Informal and Other Publicationsopenjournals/iacr/ZhangZC11http://eprint.iacr.org/2011/714https://dblp.org/rec/journals/iacr/ZhangZC11URL#4759015Zijian Zhang 0001Liehuang ZhuLejian LiaoComputationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.IACR Cryptol. ePrint Arch.20114602011Informal and Other Publicationsopenjournals/iacr/ZhangZL11http://eprint.iacr.org/2011/460https://dblp.org/rec/journals/iacr/ZhangZL11URL#4759016Xin-jie Zhao 0001Tao Wang 0008Shize GuoFault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher.IACR Cryptol. ePrint Arch.2011862011Informal and Other Publicationsopenjournals/iacr/ZhaoWG11http://eprint.iacr.org/2011/086https://dblp.org/rec/journals/iacr/ZhaoWG11URL#4759017Xin-jie Zhao 0001Tao Wang 0008Shize GuoImproved Side Channel Cube Attacks on PRESENT.IACR Cryptol. ePrint Arch.20111652011Informal and Other Publicationsopenjournals/iacr/ZhaoWG11ahttp://eprint.iacr.org/2011/165https://dblp.org/rec/journals/iacr/ZhaoWG11aURL#4759018Xingwen ZhaoFangguo ZhangTraitor Tracing against Public Collaboration (Full Version).IACR Cryptol. ePrint Arch.2011842011Informal and Other Publicationsopenjournals/iacr/ZhaoZ11http://eprint.iacr.org/2011/084https://dblp.org/rec/journals/iacr/ZhaoZ11URL#4759019Qingji ZhengShouhuai XuSecure and Efficient Proof of Storage with Deduplication.IACR Cryptol. ePrint Arch.20115292011Informal and Other Publicationsopenjournals/iacr/ZhengX11http://eprint.iacr.org/2011/529https://dblp.org/rec/journals/iacr/ZhengX11URL#4759020Caixue ZhouA Multi-Receiver ID-Based Generalized Signcryption Scheme.IACR Cryptol. ePrint Arch.20116012011Informal and Other Publicationsopenjournals/iacr/Zhou11http://eprint.iacr.org/2011/601https://dblp.org/rec/journals/iacr/Zhou11URL#4759021Zhibin Zhou 0001Dijiang HuangEfficient and Secure Data Storage Operations for Mobile Cloud Computing.IACR Cryptol. ePrint Arch.20111852011Informal and Other Publicationsopenjournals/iacr/ZhouH11http://eprint.iacr.org/2011/185https://dblp.org/rec/journals/iacr/ZhouH11URL#4759022Bo Zhu 0007Guang GongGuess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers.IACR Cryptol. ePrint Arch.20116192011Informal and Other Publicationsopenjournals/iacr/ZhuG11http://eprint.iacr.org/2011/619https://dblp.org/rec/journals/iacr/ZhuG11URL#4759023Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA-beta-cryptosystem.IACR Cryptol. ePrint Arch.20111452011Withdrawn Itemswithdrawnjournals/iacr/AriffinA11http://eprint.iacr.org/2011/145https://dblp.org/rec/journals/iacr/AriffinA11URL#4759719Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey.IACR Cryptol. ePrint Arch.2011152011Withdrawn Itemswithdrawnjournals/iacr/Aumasson11http://eprint.iacr.org/2011/015https://dblp.org/rec/journals/iacr/Aumasson11URL#4759720(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens.IACR Cryptol. ePrint Arch.20116892011Withdrawn Itemswithdrawnjournals/iacr/ChoiKSYZ11http://eprint.iacr.org/2011/689https://dblp.org/rec/journals/iacr/ChoiKSYZ11URL#4759721Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary.IACR Cryptol. ePrint Arch.2011542011Withdrawn Itemswithdrawnjournals/iacr/ChoudhuryKP11ahttp://eprint.iacr.org/2011/054https://dblp.org/rec/journals/iacr/ChoudhuryKP11aURL#4759722Does Pseudo-basis Extend to General Adversary?IACR Cryptol. ePrint Arch.2011822011Withdrawn Itemswithdrawnjournals/iacr/ChoudhuryKP11bhttp://eprint.iacr.org/2011/082https://dblp.org/rec/journals/iacr/ChoudhuryKP11bURL#4759723Fully Homomorphic Encryption over the Binary Polynomials.IACR Cryptol. ePrint Arch.20111102011Withdrawn Itemswithdrawnjournals/iacr/Chunsheng11http://eprint.iacr.org/2011/110https://dblp.org/rec/journals/iacr/Chunsheng11URL#4759724Untangling RFID Privacy Models.IACR Cryptol. ePrint Arch.20116362011Withdrawn Itemswithdrawnjournals/iacr/CoiselM11http://eprint.iacr.org/2011/636https://dblp.org/rec/journals/iacr/CoiselM11URL#4759725Leakage Resilient Secure Two-Party Computation.IACR Cryptol. ePrint Arch.20112562011Withdrawn Itemswithdrawnjournals/iacr/DamgardHP11http://eprint.iacr.org/2011/256https://dblp.org/rec/journals/iacr/DamgardHP11URL#4759726Deniable Encryption from the McEliece Assumptions.IACR Cryptol. ePrint Arch.20111442011Withdrawn Itemswithdrawnjournals/iacr/DavidN11http://eprint.iacr.org/2011/144https://dblp.org/rec/journals/iacr/DavidN11URL#4759727R-hash : Hash Function Using Random Quadratic Polynomials Over GF(2).IACR Cryptol. ePrint Arch.20114502011Withdrawn Itemswithdrawnjournals/iacr/DeySG11http://eprint.iacr.org/2011/450https://dblp.org/rec/journals/iacr/DeySG11URL#4759728Efficient Password-Based Authenticated Key Exchange from Lattices.IACR Cryptol. ePrint Arch.20115992011Withdrawn Itemswithdrawnjournals/iacr/DingF11http://eprint.iacr.org/2011/599https://dblp.org/rec/journals/iacr/DingF11URL#4759729Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family.IACR Cryptol. ePrint Arch.20116032011Withdrawn Itemswithdrawnjournals/iacr/DongWWZ11http://eprint.iacr.org/2011/603https://dblp.org/rec/journals/iacr/DongWWZ11URL#4759730Dynamic Group Blind Signatures.IACR Cryptol. ePrint Arch.20113632011Withdrawn Itemswithdrawnjournals/iacr/Ghadafi11http://eprint.iacr.org/2011/363https://dblp.org/rec/journals/iacr/Ghadafi11URL#4759731Multiplicative Learning with Errors and Cryptosystems.IACR Cryptol. ePrint Arch.20111192011Withdrawn Itemswithdrawnjournals/iacr/Gu11ahttp://eprint.iacr.org/2011/119https://dblp.org/rec/journals/iacr/Gu11aURL#4759732Two RFID Privacy Models in Front of a Court.IACR Cryptol. ePrint Arch.20116252011Withdrawn Itemswithdrawnjournals/iacr/HabibiA11http://eprint.iacr.org/2011/625https://dblp.org/rec/journals/iacr/HabibiA11URL#4759733Co-induction and Computational Semantics for Public-key Encryption with Key Cycles.IACR Cryptol. ePrint Arch.2011852011Withdrawn Itemswithdrawnjournals/iacr/HajiabadiK11http://eprint.iacr.org/2011/085https://dblp.org/rec/journals/iacr/HajiabadiK11URL#4759734Breaking a certificateless key agreement protocol withour bilinear pairing.IACR Cryptol. ePrint Arch.20112492011Withdrawn Itemswithdrawnjournals/iacr/Han11http://eprint.iacr.org/2011/249https://dblp.org/rec/journals/iacr/Han11URL#4759735Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.IACR Cryptol. ePrint Arch.20112932011Withdrawn Itemswithdrawnjournals/iacr/Han11ahttp://eprint.iacr.org/2011/293https://dblp.org/rec/journals/iacr/Han11aURL#4759736Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications.IACR Cryptol. ePrint Arch.20113362011Withdrawn Itemswithdrawnjournals/iacr/He11bhttp://eprint.iacr.org/2011/336https://dblp.org/rec/journals/iacr/He11bURL#4759737An efficient certificateless authenticated key agreement protocol without bilinear pairings.IACR Cryptol. ePrint Arch.20113472011Withdrawn Itemswithdrawnjournals/iacr/He11chttp://eprint.iacr.org/2011/347https://dblp.org/rec/journals/iacr/He11cURL#4759738An efficient certificateless short signature scheme from pairings.IACR Cryptol. ePrint Arch.20111732011Withdrawn Itemswithdrawnjournals/iacr/HeC11http://eprint.iacr.org/2011/173https://dblp.org/rec/journals/iacr/HeC11URL#4759739An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.IACR Cryptol. ePrint Arch.20111952011Withdrawn Itemswithdrawnjournals/iacr/HeC11ahttp://eprint.iacr.org/2011/195https://dblp.org/rec/journals/iacr/HeC11aURL#4759740Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid.IACR Cryptol. ePrint Arch.20114912011Withdrawn Itemswithdrawnjournals/iacr/JiangMLL11http://eprint.iacr.org/2011/491https://dblp.org/rec/journals/iacr/JiangMLL11URL#4759741An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer.IACR Cryptol. ePrint Arch.20116672011Withdrawn Itemswithdrawnjournals/iacr/KardasACL11http://eprint.iacr.org/2011/667https://dblp.org/rec/journals/iacr/KardasACL11URL#4759742A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions.IACR Cryptol. ePrint Arch.2011752011Withdrawn Itemswithdrawnjournals/iacr/KardasKBD11http://eprint.iacr.org/2011/075https://dblp.org/rec/journals/iacr/KardasKBD11URL#4759743A Splice-and-Cut Cryptanalysis of the AES.IACR Cryptol. ePrint Arch.20112742011Withdrawn Itemswithdrawnjournals/iacr/KhovratovichR11http://eprint.iacr.org/2011/274https://dblp.org/rec/journals/iacr/KhovratovichR11URL#4759744An Improved Internet Voting Protocol.IACR Cryptol. ePrint Arch.20113412011Withdrawn Itemswithdrawnjournals/iacr/KirazKBB11http://eprint.iacr.org/2011/341https://dblp.org/rec/journals/iacr/KirazKBB11URL#4759745Analysis and Improvement of Thing's Time-Memory Trade-Off Attack.IACR Cryptol. ePrint Arch.20113932011Withdrawn Itemswithdrawnjournals/iacr/LiLW11http://eprint.iacr.org/2011/393https://dblp.org/rec/journals/iacr/LiLW11URL#4759746Improved Integral Attacks on Reduced Round Camellia.IACR Cryptol. ePrint Arch.20111632011Withdrawn Itemswithdrawnjournals/iacr/LiWZZ11http://eprint.iacr.org/2011/163https://dblp.org/rec/journals/iacr/LiWZZ11URL#4759747Privacy-Preserving Friend Search over Online Social Networks.IACR Cryptol. ePrint Arch.20114452011Withdrawn Itemswithdrawnjournals/iacr/LinCXFC11http://eprint.iacr.org/2011/445https://dblp.org/rec/journals/iacr/LinCXFC11URL#4759748Private Information Extraction over Online Social Networks.IACR Cryptol. ePrint Arch.20114462011Withdrawn Itemswithdrawnjournals/iacr/LinFC11http://eprint.iacr.org/2011/446https://dblp.org/rec/journals/iacr/LinFC11URL#4759749Efficient Multi-Query CPIR from Ring-LWE.IACR Cryptol. ePrint Arch.20115952011Withdrawn Itemswithdrawnjournals/iacr/Lipmaa11bhttp://eprint.iacr.org/2011/595https://dblp.org/rec/journals/iacr/Lipmaa11bURL#4759750On the Security of PPPoE Network.IACR Cryptol. ePrint Arch.20112842011Withdrawn Itemswithdrawnjournals/iacr/LiuFC11http://eprint.iacr.org/2011/284https://dblp.org/rec/journals/iacr/LiuFC11URL#4759751The Ligo Block Cipher.IACR Cryptol. ePrint Arch.20111282011Withdrawn Itemswithdrawnjournals/iacr/Makwakwa11http://eprint.iacr.org/2011/128https://dblp.org/rec/journals/iacr/Makwakwa11URL#4759752The Block Cipher Vuna.IACR Cryptol. ePrint Arch.20111542011Withdrawn Itemswithdrawnjournals/iacr/Makwakwa11ahttp://eprint.iacr.org/2011/154https://dblp.org/rec/journals/iacr/Makwakwa11aURL#4759753The Block Cipher Thuca.IACR Cryptol. ePrint Arch.20111592011Withdrawn Itemswithdrawnjournals/iacr/Makwakwa11bhttp://eprint.iacr.org/2011/159https://dblp.org/rec/journals/iacr/Makwakwa11bURL#4759754The Complexity Analysis of the MutantXL Family.IACR Cryptol. ePrint Arch.2011362011Withdrawn Itemswithdrawnjournals/iacr/MohamedDB11http://eprint.iacr.org/2011/036https://dblp.org/rec/journals/iacr/MohamedDB11URL#4759755Cryptanalysis of the AAbeta Cryptosystem based on Linear Diophantine Equation Discrete Log Problem.IACR Cryptol. ePrint Arch.20113512011Withdrawn Itemswithdrawnjournals/iacr/PanD11http://eprint.iacr.org/2011/351https://dblp.org/rec/journals/iacr/PanD11URL#4759756Elliptic Curve Point Multiplication Using MBNR and Point Halving.IACR Cryptol. ePrint Arch.20111832011Withdrawn Itemswithdrawnjournals/iacr/PurohitR11ahttp://eprint.iacr.org/2011/183https://dblp.org/rec/journals/iacr/PurohitR11aURL#4759757Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions.IACR Cryptol. ePrint Arch.20115712011Withdrawn Itemswithdrawnjournals/iacr/SinghG11http://eprint.iacr.org/2011/571https://dblp.org/rec/journals/iacr/SinghG11URL#4759758High-speed Hardware Implementation of Rainbow Signatures on FPGAs.IACR Cryptol. ePrint Arch.20111552011Withdrawn Itemswithdrawnjournals/iacr/TangYCCD11http://eprint.iacr.org/2011/155https://dblp.org/rec/journals/iacr/TangYCCD11URL#4759759On the security of a certificateless short signature scheme.IACR Cryptol. ePrint Arch.20114192011Withdrawn Itemswithdrawnjournals/iacr/TianHY11http://eprint.iacr.org/2011/419https://dblp.org/rec/journals/iacr/TianHY11URL#4759760Security analysis of a fuzzy identity-based encryption scheme.IACR Cryptol. ePrint Arch.20115232011Withdrawn Itemswithdrawnjournals/iacr/TianHY11ahttp://eprint.iacr.org/2011/523https://dblp.org/rec/journals/iacr/TianHY11aURL#4759761Cryptanalysis and improvement of a certificateless multi-proxy signature scheme.IACR Cryptol. ePrint Arch.20113792011Withdrawn Itemswithdrawnjournals/iacr/TianYH11http://eprint.iacr.org/2011/379https://dblp.org/rec/journals/iacr/TianYH11URL#4759762Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography.IACR Cryptol. ePrint Arch.20115272011Withdrawn Itemswithdrawnjournals/iacr/TooraniS11http://eprint.iacr.org/2011/527https://dblp.org/rec/journals/iacr/TooraniS11URL#4759763Some aspects of multi-variable secret sharing.IACR Cryptol. ePrint Arch.20111862011Withdrawn Itemswithdrawnjournals/iacr/UmadeviP11http://eprint.iacr.org/2011/186https://dblp.org/rec/journals/iacr/UmadeviP11URL#4759764GF(2n) Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials.IACR Cryptol. ePrint Arch.20116062011Withdrawn Itemswithdrawnjournals/iacr/XiongF11http://eprint.iacr.org/2011/606https://dblp.org/rec/journals/iacr/XiongF11URL#4759765Public-Key Encryption with Cluster-Chain-based Keyword Search.IACR Cryptol. ePrint Arch.20116992011Withdrawn Itemswithdrawnjournals/iacr/XuJWZ11http://eprint.iacr.org/2011/699https://dblp.org/rec/journals/iacr/XuJWZ11URL#4759766Authenticated Key Exchange with Synchronized States.IACR Cryptol. ePrint Arch.2011502011Withdrawn Itemswithdrawnjournals/iacr/Yang11http://eprint.iacr.org/2011/050https://dblp.org/rec/journals/iacr/Yang11URL#4759767Towards Strong Adaptive Corruption Security of Authenticated Key Exchange.IACR Cryptol. ePrint Arch.2011512011Withdrawn Itemswithdrawnjournals/iacr/Yang11ahttp://eprint.iacr.org/2011/051https://dblp.org/rec/journals/iacr/Yang11aURL#4759768Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.IACR Cryptol. ePrint Arch.20114092011Withdrawn Itemswithdrawnjournals/iacr/YangCW11http://eprint.iacr.org/2011/409https://dblp.org/rec/journals/iacr/YangCW11URL#4759769An Improved Certificateless Authenticated Key Agreement Protocol.IACR Cryptol. ePrint Arch.20116532011Withdrawn Itemswithdrawnjournals/iacr/YangZZ11http://eprint.iacr.org/2011/653https://dblp.org/rec/journals/iacr/YangZZ11URL#4759770A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2n).IACR Cryptol. ePrint Arch.20111422011Withdrawn Itemswithdrawnjournals/iacr/YiTCC11http://eprint.iacr.org/2011/142https://dblp.org/rec/journals/iacr/YiTCC11URL#4759771