Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2002.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AbdallaABN02,
  author       = {Michel Abdalla and
                  Jee Hea An and
                  Mihir Bellare and
                  Chanathip Namprempre},
  title        = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing
                  Assumptions for Security and Forward-Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaABN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-RiyamiP02,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  title        = {Tripartite Authenticated Key Agreement Protocols from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-RiyamiP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlgesheimerCS02,
  author       = {Joy Algesheimer and
                  Jan Camenisch and
                  Victor Shoup},
  title        = {Efficient Computation Modulo a Shared Secret with Application to the
                  Generation of Shared Safe-Prime Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlgesheimerCS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnDR02,
  author       = {Jee Hea An and
                  Yevgeniy Dodis and
                  Tal Rabin},
  title        = {On the Security of Joint Signature and Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnDR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Armknecht02,
  author       = {Frederik Armknecht},
  title        = {A Linearization Attack on the Bluetooth Key Stream Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Armknecht02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsokanNN02,
  author       = {N. Asokan and
                  Valtteri Niemi and
                  Kaisa Nyberg},
  title        = {Man-in-the-Middle in Tunnelled Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsokanNN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM02,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {Efficient Group Signatures without Trapdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumullerBHFS02,
  author       = {Christian Aum{\"{u}}ller and
                  Peter Bier and
                  Peter Hofreiter and
                  Wieland Fischer and
                  Jean{-}Pierre Seifert},
  title        = {Fault attacks on {RSA} with {CRT:} Concrete Results and Practical
                  Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumullerBHFS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Avanzi02,
  author       = {Roberto Maria Avanzi},
  title        = {On multi-exponentiation in cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Avanzi02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakL02,
  author       = {Boaz Barak and
                  Yehuda Lindell},
  title        = {Strict Polynomial-time in Simulation and Extraction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarkanB02,
  author       = {Elad Barkan and
                  Eli Biham},
  title        = {In How Many Ways Can You Write Rijndael?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarkanB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarkanB02a,
  author       = {Elad Barkan and
                  Eli Biham},
  title        = {The Book of Rijndaels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarkanB02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarnumCGST02,
  author       = {Howard Barnum and
                  Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith and
                  Alain Tapp},
  title        = {Authentication of Quantum Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarnumCGST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoKLS02,
  author       = {Paulo S. L. M. Barreto and
                  Hae Yong Kim and
                  Ben Lynn and
                  Michael Scott},
  title        = {Efficient Algorithms for Pairing-Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoKLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoLS02,
  author       = {Paulo S. L. M. Barreto and
                  Ben Lynn and
                  Michael Scott},
  title        = {Constructing Elliptic Curves with Prescribed Embedding Degrees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKN02,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  title        = {Breaking and Provably Repairing the {SSH} Authenticated Encryption
                  Scheme: {A} Case Study of the Encode-then-Encrypt-and-MAC Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareP02,
  author       = {Mihir Bellare and
                  Adriana Palacio},
  title        = {Protecting against Key Exposure: Strongly Key-Insulated Encryption
                  with Optimal Threshold},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {New Results on Boomerang and Rectangle Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilletJ02,
  author       = {Olivier Billet and
                  Marc Joye},
  title        = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilletJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackRS02,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions
                  from {PGV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackRS02a,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Encryption-Scheme Security in the Presence of Key-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackRS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blackburn02,
  author       = {Simon R. Blackburn},
  title        = {An Upper Bound on the Size of a Code with the k-Identifiable Parent
                  Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blackburn02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blaze02,
  author       = {Matt Blaze},
  title        = {Cryptology and Physical Security: Rights Amplification in Master-Keyed
                  Mechanical Locks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blaze02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerS02,
  author       = {Johannes Bl{\"{o}}mer and
                  Jean{-}Pierre Seifert},
  title        = {Fault based cryptanalysis of the Advanced Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BohliVMS02,
  author       = {Jens{-}Matthias Bohli and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Consuelo Mart{\'{\i}}nez and
                  Rainer Steinwandt},
  title        = {Weak Keys in {MST1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/070},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BohliVMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boldyreva02,
  author       = {Alexandra Boldyreva},
  title        = {Efficient threshold signature, multisignature and blind signature
                  schemes based on the Gap-Diffie-Hellman-group signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boldyreva02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGLS02,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Ben Lynn and
                  Hovav Shacham},
  title        = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehS02,
  author       = {Dan Boneh and
                  Alice Silverberg},
  title        = {Applications of Multilinear Forms to Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonCP02,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  title        = {Security Proofs for an Efficient Password-Based Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown02,
  author       = {Daniel R. L. Brown},
  title        = {Generic Groups, Collision Resistance, and {ECDSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinKLS02,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Anna Lysyanskaya and
                  Reto Strobl},
  title        = {Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinKLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischS02,
  author       = {Jan Camenisch and
                  Victor Shoup},
  title        = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiK02,
  author       = {Ran Canetti and
                  Hugo Krawczyk},
  title        = {Universally Composable Notions of Key Exchange and Secure Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiK02a,
  author       = {Ran Canetti and
                  Hugo Krawczyk},
  title        = {Security Analysis of IKE's Signature-based Key-Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiK02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiLOS02,
  author       = {Ran Canetti and
                  Yehuda Lindell and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Universally Composable Two-Party and Multi-Party Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiLOS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiR02,
  author       = {Ran Canetti and
                  Tal Rabin},
  title        = {Universal Composition with Joint State},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Castelluccia02,
  author       = {Claude Castelluccia},
  title        = {How to convert any ID-based Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Castelluccia02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaC02,
  author       = {Jae Choon Cha and
                  Jung Hee Cheon},
  title        = {An Identity-Based Signature from Gap Diffie-Hellman Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenK02,
  author       = {Liqun Chen and
                  Caroline Kudla},
  title        = {Identity Based Authenticated Key Agreement Protocols from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/184},
  timestamp    = {Tue, 26 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheng02,
  author       = {Qi Cheng},
  title        = {A New Class of Unsafe Primes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/109},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheng02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheon02,
  author       = {Jung Hee Cheon},
  title        = {A Universal Forgery of Hess's Second ID-based Signature against the
                  Known-message Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheon02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonL02,
  author       = {Jung Hee Cheon and
                  Dong Hoon Lee},
  title        = {Diffie-Hellman Problems and Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoieJL02,
  author       = {YoungJu Choie and
                  Eunkyung Jeong and
                  Eunjeong Lee},
  title        = {Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoieJL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Collins02,
  author       = {Michael J. Collins},
  title        = {A Note on Ideal Tripartite Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Collins02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoppersmithHJ02,
  author       = {Don Coppersmith and
                  Shai Halevi and
                  Charanjit S. Jutla},
  title        = {Cryptanalysis of stream ciphers with linear masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoppersmithHJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoppersmithJ02,
  author       = {Don Coppersmith and
                  Markus Jakobsson},
  title        = {Almost Optimal Hash Sequence Traversal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoppersmithJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJNP02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Marc Joye and
                  David Naccache and
                  Pascal Paillier},
  title        = {Universal Padding Schemes for {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois02,
  author       = {Nicolas T. Courtois},
  title        = {Higher Order Correlation Attacks, {XL} algorithm and Cryptanalysis
                  of Toyocrypt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois02a,
  author       = {Nicolas T. Courtois},
  title        = {About Filliol's Observations on DES, {AES} and Hash Functions (draft)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisDF02,
  author       = {Nicolas T. Courtois and
                  Magnus Daum and
                  Patrick Felke},
  title        = {On the Security of HFE, HFEv- and Quartz},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisDF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisP02,
  author       = {Nicolas T. Courtois and
                  Josef Pieprzyk},
  title        = {Cryptanalysis of Block Ciphers with Overdefined Systems of Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/044},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerF02,
  author       = {Ronald Cramer and
                  Serge Fehr},
  title        = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauS02,
  author       = {Claude Cr{\'{e}}peau and
                  Alain Slakmon},
  title        = {Simple backdoors to {RSA} key generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardK02,
  author       = {Ivan Damg{\aa}rd and
                  Maciej Koprowski},
  title        = {Generic Lower Bounds for Root Extraction and Signature Schemes in
                  General Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHPS02,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Carles Padr{\'{o}} and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {A Distributed and Computationally Secure Key Distribution Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHS02,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Some Applications of Threshold Signature Schemes to Distributed Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DedicRV02,
  author       = {Nenad Dedic and
                  Leonid Reyzin and
                  Salil P. Vadhan},
  title        = {An Improved Pseudorandom Generator Based on Hardness of Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DedicRV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DenefV02,
  author       = {Jan Denef and
                  Frederik Vercauteren},
  title        = {An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic
                  2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DenefV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent02,
  author       = {Alexander W. Dent},
  title        = {Adapting the weaknesses of the Random Oracle model to the Generic
                  Group model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent02a,
  author       = {Alexander W. Dent},
  title        = {A Designer's Guide to KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DesmedtW02,
  author       = {Yvo Desmedt and
                  Yongge Wang},
  title        = {Perfectly Secure Message Transmission Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DesmedtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dodis02,
  author       = {Yevgeniy Dodis},
  title        = {Efficient Construction of (Distributed) Verifiable Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dodis02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKXY02,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Key-Insulated Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKXY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisR02,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  title        = {On the Power of Claw-Free Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupontE02,
  author       = {R{\'{e}}gis Dupont and
                  Andreas Enge},
  title        = {Practical Non-Interactive Key Distribution Based on Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupontE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupontEM02,
  author       = {R{\'{e}}gis Dupont and
                  Andreas Enge and
                  Fran{\c{c}}ois Morain},
  title        = {Building curves with arbitrary small {MOV} degree over finite prime
                  fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupontEM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisentragerLM02,
  author       = {Kirsten Eisentr{\"{a}}ger and
                  Kristin E. Lauter and
                  Peter L. Montgomery},
  title        = {An Efficient Procedure to Double and Add Points on an Elliptic Curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EisentragerLM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkindS02,
  author       = {Edith Elkind and
                  Amit Sahai},
  title        = {A Unified Methodology For Constructing Public-Key Encryption Schemes
                  Secure Against Adaptive Chosen-Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkindS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Filiol02,
  author       = {Eric Filiol},
  title        = {A New Statistical Testing for Symmetric Ciphers and Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Filiol02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischerGKS02,
  author       = {Wieland Fischer and
                  Christophe Giraud and
                  Erik Woodward Knudsen and
                  Jean{-}Pierre Seifert},
  title        = {Parallel scalar multiplication on general elliptic curves over F\({}_{\mbox{p}}\)
                  hedged against Non-Differential Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/007},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischerGKS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fischlin02,
  author       = {Marc Fischlin},
  title        = {The Cramer-Shoup Strong-RSA Signature Scheme Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fischlin02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziG02,
  author       = {Matthias Fitzi and
                  Juan A. Garay},
  title        = {Efficient and Player-Optimal Strong Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziHHW02,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Thomas Holenstein and
                  J{\"{u}}rg Wullschleger},
  title        = {Extended Validity and Consistency in Byzantine Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziHHW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer02,
  author       = {Scott R. Fluhrer},
  title        = {Improved key recovery of level 1 of the Bluetooth Encryption System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerM02,
  author       = {Joanne Fuller and
                  William Millan},
  title        = {On Linear Redundancy in the {AES} S-Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FurukawaKT02,
  author       = {Eisaku Furukawa and
                  Mitsuru Kawazoe and
                  Tetsuya Takahashi},
  title        = {Counting Points for Hyperelliptic Curves of type y\({}^{\mbox{2}}\)x\({}^{\mbox{5}}\)+ax
                  over Finite Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/181},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FurukawaKT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHS02,
  author       = {Steven D. Galbraith and
                  Herbie J. Hopkins and
                  Igor E. Shparlinski},
  title        = {Secure Bilinear Diffie-Hellman Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {An efficient semantically secure elliptic curve cryptosystem based
                  on {KMOV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV02a,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {A semantically secure elliptic curve {RSA} scheme with small expansion
                  factor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarciaG02,
  author       = {Juan Manuel Garcia Garcia and
                  Rolando Menchaca Garcia},
  title        = {Parallel Algorithm for Multiplication on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarciaG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannMS02,
  author       = {Willi Geiselmann and
                  Willi Meier and
                  Rainer Steinwandt},
  title        = {An Attack on the Isomorphisms of Polynomials Problem with One Secret},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryS02,
  author       = {Craig Gentry and
                  Alice Silverberg},
  title        = {Hierarchical ID-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich02,
  author       = {Oded Goldreich},
  title        = {The {GGM} Construction does {NOT} yield Correlation Intractable Function
                  Ensembles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich02a,
  author       = {Oded Goldreich},
  title        = {Zero-Knowledge twenty years after its invention},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichLN02,
  author       = {Oded Goldreich and
                  Yoad Lustig and
                  Moni Naor},
  title        = {On Chosen Ciphertext Security of Multiple Encryptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichLN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserL02,
  author       = {Shafi Goldwasser and
                  Yehuda Lindell},
  title        = {Secure Computation Without Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Golic02,
  author       = {Jovan Dj. Golic},
  title        = {Multiplicative Masking and Power Analysis of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Golic02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Granboulan02,
  author       = {Louis Granboulan},
  title        = {How to repair {ESIGN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Granboulan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Granboulan02a,
  author       = {Louis Granboulan},
  title        = {{PECDSA.} How to build a DL-based digital signature scheme with the
                  best proven security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Granboulan02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Groth02,
  author       = {Jens Groth},
  title        = {Evaluating Security of Voting Schemes in the Universal Composability
                  Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Groth02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviCJ02,
  author       = {Shai Halevi and
                  Don Coppersmith and
                  Charanjit S. Jutla},
  title        = {Scream: a software-efficient stream cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviCJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HallJ02,
  author       = {William Eric Hall and
                  Charanjit S. Jutla},
  title        = {Parallelizable Authentication Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HallJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanHHK02,
  author       = {Daewan Han and
                  Jin Hong and
                  Jae Woo Han and
                  Daesung Kwon},
  title        = {Key recovery attacks on {NTRU} without ciphertext validation routine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanHHK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzS02,
  author       = {Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Fully Distributed Proxy Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herzberg02,
  author       = {Amir Herzberg},
  title        = {Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herzberg02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herzberg02a,
  author       = {Amir Herzberg},
  title        = {Folklore, Practice and Theory of Robust Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herzberg02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hess02,
  author       = {Florian Hess},
  title        = {Exponent Group Signature Schemes and Efficient Identity Based Signature
                  Schemes Based on Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hess02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HinekLT02,
  author       = {M. Jason Hinek and
                  Mo King Low and
                  Edlyn Teske},
  title        = {On some Attacks on Multi-prime {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HinekLT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HollmannLTT02,
  author       = {Henk D. L. Hollmann and
                  Jacobus H. van Lint and
                  Ludo M. G. M. Tolhuizen and
                  Pim Tuyls},
  title        = {An addition to the paper: {A} polarisation based visual crypto system
                  and its secret sharing schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HollmannLTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoltS02,
  author       = {Jason E. Holt and
                  Kent E. Seamons},
  title        = {Selective disclosure credential sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoltS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HopperLA02,
  author       = {Nicholas J. Hopper and
                  John Langford and
                  Luis von Ahn},
  title        = {Provably Secure Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HopperLA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItkisR02,
  author       = {Gene Itkis and
                  Leonid Reyzin},
  title        = {SiBIR: Signer-Base Intrusion-Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItkisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataK02,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {{OMAC:} One-Key {CBC} {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jakobsson02,
  author       = {Markus Jakobsson},
  title        = {Fractal Hash Sequence Representation and Traversal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jakobsson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonJR02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Ronald L. Rivest},
  title        = {Making Mix Nets Robust For Electronic Voting By Randomized Partial
                  Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobssonJR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jencusova02,
  author       = {Eva Jencusova},
  title        = {Security proofs of cryptographic protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jencusova02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangZ02,
  author       = {Shaoquan Jiang and
                  Yufeng Zhang},
  title        = {Partial Key Escrow Monitoring Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jonsson02,
  author       = {Jakob Jonsson},
  title        = {An {OAEP} Variant With a Tight Security Proof},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jonsson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsCJ02,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  title        = {Coercion-Resistant Electronic Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsS02,
  author       = {Ari Juels and
                  Madhu Sudan},
  title        = {A Fuzzy Vault Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/093},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jutla02,
  author       = {Charanjit S. Jutla},
  title        = {Tight Lower Bound on Linear Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jutla02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katz02,
  author       = {Jonathan Katz},
  title        = {Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katz02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katz02a,
  author       = {Jonathan Katz},
  title        = {A Forward-Secure Public-Key Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katz02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KholoshaT02,
  author       = {Alexander Kholosha and
                  Henk C. A. van Tilborg},
  title        = {Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic
                  Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KholoshaT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimPT02,
  author       = {Yongdae Kim and
                  Adrian Perrig and
                  Gene Tsudik},
  title        = {Tree-based Group Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlimaR02,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Tom{\'{a}}s Rosa},
  title        = {Strengthened Encryption in the {CBC} Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlimaR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlimaR02a,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Tom{\'{a}}s Rosa},
  title        = {Further Results and Considerations on Side Channel Attacks on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlimaR02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlimaR02b,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Tom{\'{a}}s Rosa},
  title        = {Attack on Private Signature Keys of the OpenPGP Format, {PGP(TM)}
                  Programs and Other Applications Compatible with OpenPGP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlimaR02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoCCL02,
  author       = {Ki Hyoung Ko and
                  Doo{-}Ho Choi and
                  Mi Sung Cho and
                  Jang{-}Won Lee},
  title        = {New Signature Scheme Using Conjugacy Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoCCL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobaraI02,
  author       = {Kazukuni Kobara and
                  Hideki Imai},
  title        = {{OAEP++} : {A} Very Simple Way to Apply {OAEP} to Deterministic {OW-CPA}
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobaraI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kohno02,
  author       = {Tadayoshi Kohno},
  title        = {Related-Key and Key-Collision Attacks Against {RMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kohno02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KozlovR02,
  author       = {Anton Kozlov and
                  Leonid Reyzin},
  title        = {Forward-Secure Signatures with Fast Key Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KozlovR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa02,
  author       = {Kaoru Kurosawa},
  title        = {Power of a Public Random Permutation and its Application to Authenticated-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaI02,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata},
  title        = {{TMAC:} Two-Key {CBC} {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaIY02,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Takayuki Yoshiwara},
  title        = {New covering radius of Reed-Muller codes for t-resilient functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaIY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaO02,
  author       = {Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {Bit-Slice Auction Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lange02,
  author       = {Tanja Lange},
  title        = {Efficient Arithmetic on Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lange02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lange02a,
  author       = {Tanja Lange},
  title        = {Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields
                  via Explicit Formulae},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lange02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lange02b,
  author       = {Tanja Lange},
  title        = {Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lange02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lange02c,
  author       = {Tanja Lange},
  title        = {Weighted Coordinates on Genus 2 Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lange02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeadbitterS02,
  author       = {Peter James Leadbitter and
                  Nigel P. Smart},
  title        = {Cryptanalysis of {MQV} with partially known nonces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeadbitterS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLL02,
  author       = {Ho{-}Kyu Lee and
                  Hyang{-}Sook Lee and
                  Young{-}Ran Lee},
  title        = {Multi-Party Authenticated Key Agreement Protocols from Multilinear
                  Forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LefrancN02,
  author       = {Serge Lefranc and
                  David Naccache},
  title        = {Cut and Paste Attacks with Java},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LefrancN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell02,
  author       = {Yehuda Lindell},
  title        = {A Simpler Construction of CCA2-Secure Public-Key Encryption Under
                  General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa02,
  author       = {Helger Lipmaa},
  title        = {On Optimal Hash Tree Traversal for Interval Time-Stamping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lloyd02,
  author       = {Jack Lloyd},
  title        = {An Analysis of {RMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lloyd02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lucks02,
  author       = {Stefan Lucks},
  title        = {A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon
                  Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lucks02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lynn02,
  author       = {Ben Lynn},
  title        = {Authenticated Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lynn02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Malone-Lee02,
  author       = {John Malone{-}Lee},
  title        = {Identity-Based Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Malone-Lee02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Marti-FarreP02,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {Secret sharing schemes with three or four minimal qualified subsets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Marti-FarreP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Marti-FarreP02a,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {Secret sharing schemes on access structures with intersection number
                  equal to one},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Marti-FarreP02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioP02,
  author       = {Daniele Micciancio and
                  Erez Petrank},
  title        = {Efficient and Concurrent Zero-Knowledge from any public coin {HVZK}
                  protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicciancioP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Miranovich02,
  author       = {Kanstantsin Miranovich},
  title        = {Spectral Analysis of Boolean Functions under Non-uniformity of Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Miranovich02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mironov02,
  author       = {Ilya Mironov},
  title        = {(Not So) Random Shuffles of {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mironov02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moller02,
  author       = {Bodo M{\"{o}}ller},
  title        = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian
                  Mixes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Moller02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakaharaPV02,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakaharaPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakaharaPV02a,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {A note on Weak Keys of PES, {IDEA} and some Extended Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakaharaPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Namprempre02,
  author       = {Chanathip Namprempre},
  title        = {Secure Channels based on Authenticated Encryption Schemes: {A} Simple
                  Characterization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Namprempre02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNPV02,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Applying General Access Structure to Metering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNPV02a,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Applying General Access Structure to Proactive Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OgataK02,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Oblivious Keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OgataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OoiV02,
  author       = {Kuan{-}San Ooi and
                  Brain Chin Vito},
  title        = {Cryptanalysis of {S-DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/045},
  timestamp    = {Mon, 05 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OoiV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Page02,
  author       = {Dan Page},
  title        = {Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Page02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paterson02,
  author       = {Kenneth G. Paterson},
  title        = {ID-based Signatures from Pairings on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paterson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrabhakaranS02,
  author       = {Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrabhakaranS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pudovkina02,
  author       = {Marina Pudovkina},
  title        = {Statistical weaknesses in the alleged {RC4} keystream generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pudovkina02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinR02,
  author       = {Leonid Reyzin and
                  Natan Reyzin},
  title        = {Better than BiBa: Short One-time Signatures with Fast Signing and
                  Verifying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogaway02,
  author       = {Phillip Rogaway},
  title        = {The {EMD} Mode of Operation {(A} Tweaked, Wide-Blocksize, Strong {PRP)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogaway02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rosa02,
  author       = {Tom{\'{a}}s Rosa},
  title        = {Key-collisions in {(EC)DSA:} Attacking Non-repudiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rosa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoseH02,
  author       = {Gregory G. Rose and
                  Philip Hawkes},
  title        = {On the Applicability of Distinguishing Attacks Against Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoseH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoseH02a,
  author       = {Gregory G. Rose and
                  Philip Hawkes},
  title        = {Turing, a fast stream cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoseH02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS02,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {The best and worst of supersingular abelian varieties in cryptology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ryabko02,
  author       = {Boris Ryabko},
  title        = {Adaptive chi-square test and its application to some cryptographic
                  problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ryabko02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SadeghiS02,
  author       = {Ahmad{-}Reza Sadeghi and
                  Michael Steiner},
  title        = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a
                  Real Difference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/126},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SadeghiS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar02,
  author       = {Palash Sarkar},
  title        = {Construction of {UOWHF:} Tree Hashing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarS02,
  author       = {Palash Sarkar and
                  Paul J. Schellenberg},
  title        = {A Parallelizable Design Principle for Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schmidt02,
  author       = {Dieter Schmidt},
  title        = {{ABC} - {A} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schmidt02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Scott02,
  author       = {Mike Scott},
  title        = {Authenticated ID-based Key Exchange and remote log-in with simple
                  token and {PIN} number},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Scott02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinL02,
  author       = {Jun{-}Bum Shin and
                  Kwang H. Lee},
  title        = {Bauer-Berson-Feiertag attack revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SibertDG02,
  author       = {Herv{\'{e}} Sibert and
                  Patrick Dehornoy and
                  Marc Girault},
  title        = {Entity Authentication Schemes Using Braid Word Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SibertDG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartW02,
  author       = {Nigel P. Smart and
                  E. J. Westwood},
  title        = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic
                  Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldBZ02,
  author       = {Ron Steinfeld and
                  Laurence Bull and
                  Yuliang Zheng},
  title        = {Content Extraction Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/016},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldBZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakenakaSK02,
  author       = {Masahiko Takenaka and
                  Takeshi Shimoyama and
                  Takeshi Koshiba},
  title        = {Theoretical Analysis of "Correlations in RC6"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakenakaSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuylsHLT02,
  author       = {Pim Tuyls and
                  Henk D. L. Hollmann and
                  Jacobus H. van Lint and
                  Ludo M. G. M. Tolhuizen},
  title        = {A polarisation based Visual Crypto System and its Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TuylsHLT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vadhan02,
  author       = {Salil P. Vadhan},
  title        = {On Constructing Locally Computable Extractors and Cryptosystems in
                  the Bounded Storage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vadhan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VascoMS02,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Consuelo Mart{\'{\i}}nez and
                  Rainer Steinwandt},
  title        = {Towards a Uniform Description of Several Group Based Cryptographic
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/048},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VascoMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VascoS02,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Rainer Steinwandt},
  title        = {Reaction Attacks on Public Key Cryptosystems Based on the Word Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/139},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VascoS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZD02,
  author       = {Guilin Wang and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeSI02,
  author       = {Yodai Watanabe and
                  Junji Shikata and
                  Hideki Imai},
  title        = {Equivalence between semantic security and indistinguishability against
                  chosen ciphertext attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuB02,
  author       = {Hongjun Wu and
                  Feng Bao},
  title        = {Cryptanalysis of Stream Cipher {COS} (2, 128) Mode {I}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/005},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiaoZ02,
  author       = {James Xiao and
                  Yongxin Zhou},
  title        = {Generating Large Non-Singular Matrices over an Arbitrary Field with
                  Blocks of Full Rank},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiaoZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yacobi02,
  author       = {Yacov Yacobi},
  title        = {A Note on the Bilinear Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yacobi02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoussefT02,
  author       = {Amr M. Youssef and
                  Stafford E. Tavares},
  title        = {On Some Algebraic Structures in the {AES} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoussefT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zenner02,
  author       = {Erik Zenner},
  title        = {On the efficiency of the Clock Control Guessing Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zenner02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK02,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Two New Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  title        = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol
                  with Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/122},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02a,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  title        = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/178},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLK02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWW02,
  author       = {Jianhong Zhang and
                  Jilin Wang and
                  Yumin Wang},
  title        = {two attacks on xia-you Group Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayJ02,
  title        = {Timed Release of Standard Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2002/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzPS02,
  title        = {A Distributed {RSA} Signature Scheme for General Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2002/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kanso02,
  title        = {The (a, b)-Shrinking Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2002/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kanso02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kanso02a,
  title        = {Clock-Controlled Alternating Step Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2002/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kanso02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouBD02,
  title        = {Validating Digital Signatures without Time-Stamping and Certificate
                  Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2002/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouBD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu02,
  title        = {A new public key encryption scheme provably secure against adaptive
                  chosen cipher-text attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2002},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2002/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics