Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2002.bht:"
@article{DBLP:journals/iacr/AbdallaABN02, author = {Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre}, title = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2002}, url = {http://eprint.iacr.org/2002/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaABN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-RiyamiP02, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, title = {Tripartite Authenticated Key Agreement Protocols from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2002}, url = {http://eprint.iacr.org/2002/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-RiyamiP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlgesheimerCS02, author = {Joy Algesheimer and Jan Camenisch and Victor Shoup}, title = {Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2002}, url = {http://eprint.iacr.org/2002/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlgesheimerCS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnDR02, author = {Jee Hea An and Yevgeniy Dodis and Tal Rabin}, title = {On the Security of Joint Signature and Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2002}, url = {http://eprint.iacr.org/2002/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnDR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Armknecht02, author = {Frederik Armknecht}, title = {A Linearization Attack on the Bluetooth Key Stream Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2002}, url = {http://eprint.iacr.org/2002/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Armknecht02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsokanNN02, author = {N. Asokan and Valtteri Niemi and Kaisa Nyberg}, title = {Man-in-the-Middle in Tunnelled Authentication Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2002}, url = {http://eprint.iacr.org/2002/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsokanNN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseM02, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {Efficient Group Signatures without Trapdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2002}, url = {http://eprint.iacr.org/2002/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumullerBHFS02, author = {Christian Aum{\"{u}}ller and Peter Bier and Peter Hofreiter and Wieland Fischer and Jean{-}Pierre Seifert}, title = {Fault attacks on {RSA} with {CRT:} Concrete Results and Practical Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2002}, url = {http://eprint.iacr.org/2002/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumullerBHFS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Avanzi02, author = {Roberto Maria Avanzi}, title = {On multi-exponentiation in cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2002}, url = {http://eprint.iacr.org/2002/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Avanzi02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakL02, author = {Boaz Barak and Yehuda Lindell}, title = {Strict Polynomial-time in Simulation and Extraction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2002}, url = {http://eprint.iacr.org/2002/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarkanB02, author = {Elad Barkan and Eli Biham}, title = {In How Many Ways Can You Write Rijndael?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2002}, url = {http://eprint.iacr.org/2002/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarkanB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarkanB02a, author = {Elad Barkan and Eli Biham}, title = {The Book of Rijndaels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2002}, url = {http://eprint.iacr.org/2002/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarkanB02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarnumCGST02, author = {Howard Barnum and Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith and Alain Tapp}, title = {Authentication of Quantum Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2002}, url = {http://eprint.iacr.org/2002/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarnumCGST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoKLS02, author = {Paulo S. L. M. Barreto and Hae Yong Kim and Ben Lynn and Michael Scott}, title = {Efficient Algorithms for Pairing-Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2002}, url = {http://eprint.iacr.org/2002/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoKLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoLS02, author = {Paulo S. L. M. Barreto and Ben Lynn and Michael Scott}, title = {Constructing Elliptic Curves with Prescribed Embedding Degrees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2002}, url = {http://eprint.iacr.org/2002/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKN02, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {Breaking and Provably Repairing the {SSH} Authenticated Encryption Scheme: {A} Case Study of the Encode-then-Encrypt-and-MAC Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2002}, url = {http://eprint.iacr.org/2002/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareP02, author = {Mihir Bellare and Adriana Palacio}, title = {Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2002}, url = {http://eprint.iacr.org/2002/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {New Results on Boomerang and Rectangle Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2002}, url = {http://eprint.iacr.org/2002/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilletJ02, author = {Olivier Billet and Marc Joye}, title = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2002}, url = {http://eprint.iacr.org/2002/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilletJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackRS02, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, title = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from {PGV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2002}, url = {http://eprint.iacr.org/2002/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackRS02a, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2002}, url = {http://eprint.iacr.org/2002/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackRS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blackburn02, author = {Simon R. Blackburn}, title = {An Upper Bound on the Size of a Code with the k-Identifiable Parent Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2002}, url = {http://eprint.iacr.org/2002/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blackburn02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blaze02, author = {Matt Blaze}, title = {Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2002}, url = {http://eprint.iacr.org/2002/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blaze02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerS02, author = {Johannes Bl{\"{o}}mer and Jean{-}Pierre Seifert}, title = {Fault based cryptanalysis of the Advanced Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2002}, url = {http://eprint.iacr.org/2002/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BohliVMS02, author = {Jens{-}Matthias Bohli and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Consuelo Mart{\'{\i}}nez and Rainer Steinwandt}, title = {Weak Keys in {MST1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2002}, url = {http://eprint.iacr.org/2002/070}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BohliVMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boldyreva02, author = {Alexandra Boldyreva}, title = {Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2002}, url = {http://eprint.iacr.org/2002/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boldyreva02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGLS02, author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham}, title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2002}, url = {http://eprint.iacr.org/2002/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehS02, author = {Dan Boneh and Alice Silverberg}, title = {Applications of Multilinear Forms to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2002}, url = {http://eprint.iacr.org/2002/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BressonCP02, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, title = {Security Proofs for an Efficient Password-Based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2002}, url = {http://eprint.iacr.org/2002/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BressonCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown02, author = {Daniel R. L. Brown}, title = {Generic Groups, Collision Resistance, and {ECDSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2002}, url = {http://eprint.iacr.org/2002/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinKLS02, author = {Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl}, title = {Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2002}, url = {http://eprint.iacr.org/2002/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CachinKLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischS02, author = {Jan Camenisch and Victor Shoup}, title = {Practical Verifiable Encryption and Decryption of Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2002}, url = {http://eprint.iacr.org/2002/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiK02, author = {Ran Canetti and Hugo Krawczyk}, title = {Universally Composable Notions of Key Exchange and Secure Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2002}, url = {http://eprint.iacr.org/2002/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiK02a, author = {Ran Canetti and Hugo Krawczyk}, title = {Security Analysis of IKE's Signature-based Key-Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2002}, url = {http://eprint.iacr.org/2002/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiK02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiLOS02, author = {Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai}, title = {Universally Composable Two-Party and Multi-Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2002}, url = {http://eprint.iacr.org/2002/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiLOS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiR02, author = {Ran Canetti and Tal Rabin}, title = {Universal Composition with Joint State}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2002}, url = {http://eprint.iacr.org/2002/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Castelluccia02, author = {Claude Castelluccia}, title = {How to convert any ID-based Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2002}, url = {http://eprint.iacr.org/2002/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Castelluccia02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaC02, author = {Jae Choon Cha and Jung Hee Cheon}, title = {An Identity-Based Signature from Gap Diffie-Hellman Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2002}, url = {http://eprint.iacr.org/2002/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenK02, author = {Liqun Chen and Caroline Kudla}, title = {Identity Based Authenticated Key Agreement Protocols from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2002}, url = {http://eprint.iacr.org/2002/184}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheng02, author = {Qi Cheng}, title = {A New Class of Unsafe Primes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2002}, url = {http://eprint.iacr.org/2002/109}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheng02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheon02, author = {Jung Hee Cheon}, title = {A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2002}, url = {http://eprint.iacr.org/2002/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheon02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonL02, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Diffie-Hellman Problems and Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2002}, url = {http://eprint.iacr.org/2002/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoieJL02, author = {YoungJu Choie and Eunkyung Jeong and Eunjeong Lee}, title = {Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2002}, url = {http://eprint.iacr.org/2002/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoieJL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Collins02, author = {Michael J. Collins}, title = {A Note on Ideal Tripartite Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2002}, url = {http://eprint.iacr.org/2002/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Collins02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoppersmithHJ02, author = {Don Coppersmith and Shai Halevi and Charanjit S. Jutla}, title = {Cryptanalysis of stream ciphers with linear masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2002}, url = {http://eprint.iacr.org/2002/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoppersmithHJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoppersmithJ02, author = {Don Coppersmith and Markus Jakobsson}, title = {Almost Optimal Hash Sequence Traversal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2002}, url = {http://eprint.iacr.org/2002/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoppersmithJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2002}, url = {http://eprint.iacr.org/2002/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJNP02, author = {Jean{-}S{\'{e}}bastien Coron and Marc Joye and David Naccache and Pascal Paillier}, title = {Universal Padding Schemes for {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2002}, url = {http://eprint.iacr.org/2002/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJNP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois02, author = {Nicolas T. Courtois}, title = {Higher Order Correlation Attacks, {XL} algorithm and Cryptanalysis of Toyocrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2002}, url = {http://eprint.iacr.org/2002/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois02a, author = {Nicolas T. Courtois}, title = {About Filliol's Observations on DES, {AES} and Hash Functions (draft)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2002}, url = {http://eprint.iacr.org/2002/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisDF02, author = {Nicolas T. Courtois and Magnus Daum and Patrick Felke}, title = {On the Security of HFE, HFEv- and Quartz}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2002}, url = {http://eprint.iacr.org/2002/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisDF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisP02, author = {Nicolas T. Courtois and Josef Pieprzyk}, title = {Cryptanalysis of Block Ciphers with Overdefined Systems of Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2002}, url = {http://eprint.iacr.org/2002/044}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerF02, author = {Ronald Cramer and Serge Fehr}, title = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2002}, url = {http://eprint.iacr.org/2002/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauS02, author = {Claude Cr{\'{e}}peau and Alain Slakmon}, title = {Simple backdoors to {RSA} key generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2002}, url = {http://eprint.iacr.org/2002/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardK02, author = {Ivan Damg{\aa}rd and Maciej Koprowski}, title = {Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2002}, url = {http://eprint.iacr.org/2002/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHPS02, author = {Vanesa Daza and Javier Herranz and Carles Padr{\'{o}} and Germ{\'{a}}n S{\'{a}}ez}, title = {A Distributed and Computationally Secure Key Distribution Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2002}, url = {http://eprint.iacr.org/2002/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHS02, author = {Vanesa Daza and Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {Some Applications of Threshold Signature Schemes to Distributed Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2002}, url = {http://eprint.iacr.org/2002/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DedicRV02, author = {Nenad Dedic and Leonid Reyzin and Salil P. Vadhan}, title = {An Improved Pseudorandom Generator Based on Hardness of Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2002}, url = {http://eprint.iacr.org/2002/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DedicRV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DenefV02, author = {Jan Denef and Frederik Vercauteren}, title = {An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2002}, url = {http://eprint.iacr.org/2002/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DenefV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dent02, author = {Alexander W. Dent}, title = {Adapting the weaknesses of the Random Oracle model to the Generic Group model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2002}, url = {http://eprint.iacr.org/2002/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dent02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dent02a, author = {Alexander W. Dent}, title = {A Designer's Guide to KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2002}, url = {http://eprint.iacr.org/2002/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dent02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DesmedtW02, author = {Yvo Desmedt and Yongge Wang}, title = {Perfectly Secure Message Transmission Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2002}, url = {http://eprint.iacr.org/2002/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DesmedtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dodis02, author = {Yevgeniy Dodis}, title = {Efficient Construction of (Distributed) Verifiable Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2002}, url = {http://eprint.iacr.org/2002/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dodis02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKXY02, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, title = {Key-Insulated Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2002}, url = {http://eprint.iacr.org/2002/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKXY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisR02, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {On the Power of Claw-Free Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2002}, url = {http://eprint.iacr.org/2002/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupontE02, author = {R{\'{e}}gis Dupont and Andreas Enge}, title = {Practical Non-Interactive Key Distribution Based on Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2002}, url = {http://eprint.iacr.org/2002/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupontE02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupontEM02, author = {R{\'{e}}gis Dupont and Andreas Enge and Fran{\c{c}}ois Morain}, title = {Building curves with arbitrary small {MOV} degree over finite prime fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2002}, url = {http://eprint.iacr.org/2002/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupontEM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisentragerLM02, author = {Kirsten Eisentr{\"{a}}ger and Kristin E. Lauter and Peter L. Montgomery}, title = {An Efficient Procedure to Double and Add Points on an Elliptic Curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2002}, url = {http://eprint.iacr.org/2002/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EisentragerLM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkindS02, author = {Edith Elkind and Amit Sahai}, title = {A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2002}, url = {http://eprint.iacr.org/2002/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkindS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Filiol02, author = {Eric Filiol}, title = {A New Statistical Testing for Symmetric Ciphers and Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2002}, url = {http://eprint.iacr.org/2002/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Filiol02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischerGKS02, author = {Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and Jean{-}Pierre Seifert}, title = {Parallel scalar multiplication on general elliptic curves over F\({}_{\mbox{p}}\) hedged against Non-Differential Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2002}, url = {http://eprint.iacr.org/2002/007}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischerGKS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fischlin02, author = {Marc Fischlin}, title = {The Cramer-Shoup Strong-RSA Signature Scheme Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2002}, url = {http://eprint.iacr.org/2002/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fischlin02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziG02, author = {Matthias Fitzi and Juan A. Garay}, title = {Efficient and Player-Optimal Strong Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2002}, url = {http://eprint.iacr.org/2002/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziHHW02, author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and J{\"{u}}rg Wullschleger}, title = {Extended Validity and Consistency in Byzantine Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2002}, url = {http://eprint.iacr.org/2002/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziHHW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer02, author = {Scott R. Fluhrer}, title = {Improved key recovery of level 1 of the Bluetooth Encryption System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2002}, url = {http://eprint.iacr.org/2002/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerM02, author = {Joanne Fuller and William Millan}, title = {On Linear Redundancy in the {AES} S-Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2002}, url = {http://eprint.iacr.org/2002/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FurukawaKT02, author = {Eisaku Furukawa and Mitsuru Kawazoe and Tetsuya Takahashi}, title = {Counting Points for Hyperelliptic Curves of type y\({}^{\mbox{2}}\)x\({}^{\mbox{5}}\)+ax over Finite Prime Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2002}, url = {http://eprint.iacr.org/2002/181}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FurukawaKT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHS02, author = {Steven D. Galbraith and Herbie J. Hopkins and Igor E. Shparlinski}, title = {Secure Bilinear Diffie-Hellman Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2002}, url = {http://eprint.iacr.org/2002/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV02, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {An efficient semantically secure elliptic curve cryptosystem based on {KMOV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2002}, url = {http://eprint.iacr.org/2002/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV02a, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {A semantically secure elliptic curve {RSA} scheme with small expansion factor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2002}, url = {http://eprint.iacr.org/2002/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarciaG02, author = {Juan Manuel Garcia Garcia and Rolando Menchaca Garcia}, title = {Parallel Algorithm for Multiplication on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2002}, url = {http://eprint.iacr.org/2002/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarciaG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeiselmannMS02, author = {Willi Geiselmann and Willi Meier and Rainer Steinwandt}, title = {An Attack on the Isomorphisms of Polynomials Problem with One Secret}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2002}, url = {http://eprint.iacr.org/2002/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeiselmannMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryS02, author = {Craig Gentry and Alice Silverberg}, title = {Hierarchical ID-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2002}, url = {http://eprint.iacr.org/2002/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goldreich02, author = {Oded Goldreich}, title = {The {GGM} Construction does {NOT} yield Correlation Intractable Function Ensembles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2002}, url = {http://eprint.iacr.org/2002/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goldreich02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goldreich02a, author = {Oded Goldreich}, title = {Zero-Knowledge twenty years after its invention}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2002}, url = {http://eprint.iacr.org/2002/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goldreich02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichLN02, author = {Oded Goldreich and Yoad Lustig and Moni Naor}, title = {On Chosen Ciphertext Security of Multiple Encryptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2002}, url = {http://eprint.iacr.org/2002/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichLN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserL02, author = {Shafi Goldwasser and Yehuda Lindell}, title = {Secure Computation Without Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2002}, url = {http://eprint.iacr.org/2002/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Golic02, author = {Jovan Dj. Golic}, title = {Multiplicative Masking and Power Analysis of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2002}, url = {http://eprint.iacr.org/2002/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Golic02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Granboulan02, author = {Louis Granboulan}, title = {How to repair {ESIGN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2002}, url = {http://eprint.iacr.org/2002/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Granboulan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Granboulan02a, author = {Louis Granboulan}, title = {{PECDSA.} How to build a DL-based digital signature scheme with the best proven security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2002}, url = {http://eprint.iacr.org/2002/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Granboulan02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Groth02, author = {Jens Groth}, title = {Evaluating Security of Voting Schemes in the Universal Composability Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2002}, url = {http://eprint.iacr.org/2002/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Groth02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviCJ02, author = {Shai Halevi and Don Coppersmith and Charanjit S. Jutla}, title = {Scream: a software-efficient stream cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2002}, url = {http://eprint.iacr.org/2002/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviCJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HallJ02, author = {William Eric Hall and Charanjit S. Jutla}, title = {Parallelizable Authentication Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2002}, url = {http://eprint.iacr.org/2002/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HallJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanHHK02, author = {Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon}, title = {Key recovery attacks on {NTRU} without ciphertext validation routine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2002}, url = {http://eprint.iacr.org/2002/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanHHK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerranzS02, author = {Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {Fully Distributed Proxy Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2002}, url = {http://eprint.iacr.org/2002/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerranzS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herzberg02, author = {Amir Herzberg}, title = {Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2002}, url = {http://eprint.iacr.org/2002/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herzberg02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herzberg02a, author = {Amir Herzberg}, title = {Folklore, Practice and Theory of Robust Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2002}, url = {http://eprint.iacr.org/2002/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herzberg02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hess02, author = {Florian Hess}, title = {Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2002}, url = {http://eprint.iacr.org/2002/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hess02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HinekLT02, author = {M. Jason Hinek and Mo King Low and Edlyn Teske}, title = {On some Attacks on Multi-prime {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2002}, url = {http://eprint.iacr.org/2002/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HinekLT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HollmannLTT02, author = {Henk D. L. Hollmann and Jacobus H. van Lint and Ludo M. G. M. Tolhuizen and Pim Tuyls}, title = {An addition to the paper: {A} polarisation based visual crypto system and its secret sharing schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2002}, url = {http://eprint.iacr.org/2002/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HollmannLTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoltS02, author = {Jason E. Holt and Kent E. Seamons}, title = {Selective disclosure credential sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2002}, url = {http://eprint.iacr.org/2002/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoltS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HopperLA02, author = {Nicholas J. Hopper and John Langford and Luis von Ahn}, title = {Provably Secure Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2002}, url = {http://eprint.iacr.org/2002/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HopperLA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItkisR02, author = {Gene Itkis and Leonid Reyzin}, title = {SiBIR: Signer-Base Intrusion-Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2002}, url = {http://eprint.iacr.org/2002/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItkisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataK02, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {{OMAC:} One-Key {CBC} {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2002}, url = {http://eprint.iacr.org/2002/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jakobsson02, author = {Markus Jakobsson}, title = {Fractal Hash Sequence Representation and Traversal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2002}, url = {http://eprint.iacr.org/2002/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jakobsson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobssonJR02, author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, title = {Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2002}, url = {http://eprint.iacr.org/2002/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobssonJR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jencusova02, author = {Eva Jencusova}, title = {Security proofs of cryptographic protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2002}, url = {http://eprint.iacr.org/2002/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jencusova02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangZ02, author = {Shaoquan Jiang and Yufeng Zhang}, title = {Partial Key Escrow Monitoring Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2002}, url = {http://eprint.iacr.org/2002/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jonsson02, author = {Jakob Jonsson}, title = {An {OAEP} Variant With a Tight Security Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2002}, url = {http://eprint.iacr.org/2002/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jonsson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsCJ02, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, title = {Coercion-Resistant Electronic Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2002}, url = {http://eprint.iacr.org/2002/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsS02, author = {Ari Juels and Madhu Sudan}, title = {A Fuzzy Vault Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2002}, url = {http://eprint.iacr.org/2002/093}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jutla02, author = {Charanjit S. Jutla}, title = {Tight Lower Bound on Linear Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2002}, url = {http://eprint.iacr.org/2002/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jutla02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Katz02, author = {Jonathan Katz}, title = {Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2002}, url = {http://eprint.iacr.org/2002/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Katz02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Katz02a, author = {Jonathan Katz}, title = {A Forward-Secure Public-Key Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2002}, url = {http://eprint.iacr.org/2002/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Katz02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KholoshaT02, author = {Alexander Kholosha and Henk C. A. van Tilborg}, title = {Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2002}, url = {http://eprint.iacr.org/2002/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KholoshaT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimPT02, author = {Yongdae Kim and Adrian Perrig and Gene Tsudik}, title = {Tree-based Group Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2002}, url = {http://eprint.iacr.org/2002/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlimaR02, author = {Vlastimil Kl{\'{\i}}ma and Tom{\'{a}}s Rosa}, title = {Strengthened Encryption in the {CBC} Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2002}, url = {http://eprint.iacr.org/2002/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlimaR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlimaR02a, author = {Vlastimil Kl{\'{\i}}ma and Tom{\'{a}}s Rosa}, title = {Further Results and Considerations on Side Channel Attacks on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2002}, url = {http://eprint.iacr.org/2002/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlimaR02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlimaR02b, author = {Vlastimil Kl{\'{\i}}ma and Tom{\'{a}}s Rosa}, title = {Attack on Private Signature Keys of the OpenPGP Format, {PGP(TM)} Programs and Other Applications Compatible with OpenPGP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2002}, url = {http://eprint.iacr.org/2002/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlimaR02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoCCL02, author = {Ki Hyoung Ko and Doo{-}Ho Choi and Mi Sung Cho and Jang{-}Won Lee}, title = {New Signature Scheme Using Conjugacy Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2002}, url = {http://eprint.iacr.org/2002/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoCCL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobaraI02, author = {Kazukuni Kobara and Hideki Imai}, title = {{OAEP++} : {A} Very Simple Way to Apply {OAEP} to Deterministic {OW-CPA} Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2002}, url = {http://eprint.iacr.org/2002/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobaraI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kohno02, author = {Tadayoshi Kohno}, title = {Related-Key and Key-Collision Attacks Against {RMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2002}, url = {http://eprint.iacr.org/2002/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kohno02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KozlovR02, author = {Anton Kozlov and Leonid Reyzin}, title = {Forward-Secure Signatures with Fast Key Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2002}, url = {http://eprint.iacr.org/2002/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KozlovR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa02, author = {Kaoru Kurosawa}, title = {Power of a Public Random Permutation and its Application to Authenticated-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2002}, url = {http://eprint.iacr.org/2002/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaI02, author = {Kaoru Kurosawa and Tetsu Iwata}, title = {{TMAC:} Two-Key {CBC} {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2002}, url = {http://eprint.iacr.org/2002/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaIY02, author = {Kaoru Kurosawa and Tetsu Iwata and Takayuki Yoshiwara}, title = {New covering radius of Reed-Muller codes for t-resilient functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2002}, url = {http://eprint.iacr.org/2002/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaIY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaO02, author = {Kaoru Kurosawa and Wakaha Ogata}, title = {Bit-Slice Auction Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2002}, url = {http://eprint.iacr.org/2002/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lange02, author = {Tanja Lange}, title = {Efficient Arithmetic on Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2002}, url = {http://eprint.iacr.org/2002/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lange02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lange02a, author = {Tanja Lange}, title = {Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2002}, url = {http://eprint.iacr.org/2002/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lange02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lange02b, author = {Tanja Lange}, title = {Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2002}, url = {http://eprint.iacr.org/2002/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lange02b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lange02c, author = {Tanja Lange}, title = {Weighted Coordinates on Genus 2 Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2002}, url = {http://eprint.iacr.org/2002/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lange02c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeadbitterS02, author = {Peter James Leadbitter and Nigel P. Smart}, title = {Cryptanalysis of {MQV} with partially known nonces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2002}, url = {http://eprint.iacr.org/2002/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeadbitterS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLL02, author = {Ho{-}Kyu Lee and Hyang{-}Sook Lee and Young{-}Ran Lee}, title = {Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2002}, url = {http://eprint.iacr.org/2002/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LefrancN02, author = {Serge Lefranc and David Naccache}, title = {Cut and Paste Attacks with Java}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2002}, url = {http://eprint.iacr.org/2002/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LefrancN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell02, author = {Yehuda Lindell}, title = {A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2002}, url = {http://eprint.iacr.org/2002/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa02, author = {Helger Lipmaa}, title = {On Optimal Hash Tree Traversal for Interval Time-Stamping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2002}, url = {http://eprint.iacr.org/2002/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lloyd02, author = {Jack Lloyd}, title = {An Analysis of {RMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2002}, url = {http://eprint.iacr.org/2002/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lloyd02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lucks02, author = {Stefan Lucks}, title = {A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2002}, url = {http://eprint.iacr.org/2002/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lucks02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lynn02, author = {Ben Lynn}, title = {Authenticated Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2002}, url = {http://eprint.iacr.org/2002/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lynn02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Malone-Lee02, author = {John Malone{-}Lee}, title = {Identity-Based Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2002}, url = {http://eprint.iacr.org/2002/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Malone-Lee02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Marti-FarreP02, author = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, title = {Secret sharing schemes with three or four minimal qualified subsets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2002}, url = {http://eprint.iacr.org/2002/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Marti-FarreP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Marti-FarreP02a, author = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, title = {Secret sharing schemes on access structures with intersection number equal to one}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2002}, url = {http://eprint.iacr.org/2002/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Marti-FarreP02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioP02, author = {Daniele Micciancio and Erez Petrank}, title = {Efficient and Concurrent Zero-Knowledge from any public coin {HVZK} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2002}, url = {http://eprint.iacr.org/2002/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Miranovich02, author = {Kanstantsin Miranovich}, title = {Spectral Analysis of Boolean Functions under Non-uniformity of Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2002}, url = {http://eprint.iacr.org/2002/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Miranovich02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mironov02, author = {Ilya Mironov}, title = {(Not So) Random Shuffles of {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2002}, url = {http://eprint.iacr.org/2002/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mironov02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Moller02, author = {Bodo M{\"{o}}ller}, title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2002}, url = {http://eprint.iacr.org/2002/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Moller02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakaharaPV02, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, title = {Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2002}, url = {http://eprint.iacr.org/2002/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakaharaPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakaharaPV02a, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, title = {A note on Weak Keys of PES, {IDEA} and some Extended Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2002}, url = {http://eprint.iacr.org/2002/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakaharaPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Namprempre02, author = {Chanathip Namprempre}, title = {Secure Channels based on Authenticated Encryption Schemes: {A} Simple Characterization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2002}, url = {http://eprint.iacr.org/2002/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Namprempre02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNPV02, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Metering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2002}, url = {http://eprint.iacr.org/2002/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNPV02a, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Proactive Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2002}, url = {http://eprint.iacr.org/2002/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OgataK02, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Oblivious Keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2002}, url = {http://eprint.iacr.org/2002/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OgataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OoiV02, author = {Kuan{-}San Ooi and Brain Chin Vito}, title = {Cryptanalysis of {S-DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2002}, url = {http://eprint.iacr.org/2002/045}, timestamp = {Mon, 05 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OoiV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Page02, author = {Dan Page}, title = {Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2002}, url = {http://eprint.iacr.org/2002/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Page02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paterson02, author = {Kenneth G. Paterson}, title = {ID-based Signatures from Pairings on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2002}, url = {http://eprint.iacr.org/2002/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paterson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranS02, author = {Manoj Prabhakaran and Amit Sahai}, title = {Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2002}, url = {http://eprint.iacr.org/2002/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pudovkina02, author = {Marina Pudovkina}, title = {Statistical weaknesses in the alleged {RC4} keystream generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2002}, url = {http://eprint.iacr.org/2002/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pudovkina02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinR02, author = {Leonid Reyzin and Natan Reyzin}, title = {Better than BiBa: Short One-time Signatures with Fast Signing and Verifying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2002}, url = {http://eprint.iacr.org/2002/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rogaway02, author = {Phillip Rogaway}, title = {The {EMD} Mode of Operation {(A} Tweaked, Wide-Blocksize, Strong {PRP)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2002}, url = {http://eprint.iacr.org/2002/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rogaway02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rosa02, author = {Tom{\'{a}}s Rosa}, title = {Key-collisions in {(EC)DSA:} Attacking Non-repudiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2002}, url = {http://eprint.iacr.org/2002/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rosa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoseH02, author = {Gregory G. Rose and Philip Hawkes}, title = {On the Applicability of Distinguishing Attacks Against Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2002}, url = {http://eprint.iacr.org/2002/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoseH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoseH02a, author = {Gregory G. Rose and Philip Hawkes}, title = {Turing, a fast stream cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2002}, url = {http://eprint.iacr.org/2002/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoseH02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS02, author = {Karl Rubin and Alice Silverberg}, title = {The best and worst of supersingular abelian varieties in cryptology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2002}, url = {http://eprint.iacr.org/2002/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ryabko02, author = {Boris Ryabko}, title = {Adaptive chi-square test and its application to some cryptographic problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2002}, url = {http://eprint.iacr.org/2002/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ryabko02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SadeghiS02, author = {Ahmad{-}Reza Sadeghi and Michael Steiner}, title = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2002}, url = {http://eprint.iacr.org/2002/126}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SadeghiS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar02, author = {Palash Sarkar}, title = {Construction of {UOWHF:} Tree Hashing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2002}, url = {http://eprint.iacr.org/2002/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarS02, author = {Palash Sarkar and Paul J. Schellenberg}, title = {A Parallelizable Design Principle for Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2002}, url = {http://eprint.iacr.org/2002/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schmidt02, author = {Dieter Schmidt}, title = {{ABC} - {A} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2002}, url = {http://eprint.iacr.org/2002/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schmidt02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Scott02, author = {Mike Scott}, title = {Authenticated ID-based Key Exchange and remote log-in with simple token and {PIN} number}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2002}, url = {http://eprint.iacr.org/2002/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Scott02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinL02, author = {Jun{-}Bum Shin and Kwang H. Lee}, title = {Bauer-Berson-Feiertag attack revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2002}, url = {http://eprint.iacr.org/2002/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SibertDG02, author = {Herv{\'{e}} Sibert and Patrick Dehornoy and Marc Girault}, title = {Entity Authentication Schemes Using Braid Word Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2002}, url = {http://eprint.iacr.org/2002/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SibertDG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartW02, author = {Nigel P. Smart and E. J. Westwood}, title = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2002}, url = {http://eprint.iacr.org/2002/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinfeldBZ02, author = {Ron Steinfeld and Laurence Bull and Yuliang Zheng}, title = {Content Extraction Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2002}, url = {http://eprint.iacr.org/2002/016}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SteinfeldBZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakenakaSK02, author = {Masahiko Takenaka and Takeshi Shimoyama and Takeshi Koshiba}, title = {Theoretical Analysis of "Correlations in RC6"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2002}, url = {http://eprint.iacr.org/2002/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakenakaSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuylsHLT02, author = {Pim Tuyls and Henk D. L. Hollmann and Jacobus H. van Lint and Ludo M. G. M. Tolhuizen}, title = {A polarisation based Visual Crypto System and its Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2002}, url = {http://eprint.iacr.org/2002/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TuylsHLT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vadhan02, author = {Salil P. Vadhan}, title = {On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2002}, url = {http://eprint.iacr.org/2002/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vadhan02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VascoMS02, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Consuelo Mart{\'{\i}}nez and Rainer Steinwandt}, title = {Towards a Uniform Description of Several Group Based Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2002}, url = {http://eprint.iacr.org/2002/048}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VascoMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VascoS02, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Rainer Steinwandt}, title = {Reaction Attacks on Public Key Cryptosystems Based on the Word Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2002}, url = {http://eprint.iacr.org/2002/139}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VascoS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZD02, author = {Guilin Wang and Jianying Zhou and Robert H. Deng}, title = {Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2002}, url = {http://eprint.iacr.org/2002/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeSI02, author = {Yodai Watanabe and Junji Shikata and Hideki Imai}, title = {Equivalence between semantic security and indistinguishability against chosen ciphertext attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2002}, url = {http://eprint.iacr.org/2002/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuB02, author = {Hongjun Wu and Feng Bao}, title = {Cryptanalysis of Stream Cipher {COS} (2, 128) Mode {I}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2002}, url = {http://eprint.iacr.org/2002/005}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiaoZ02, author = {James Xiao and Yongxin Zhou}, title = {Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2002}, url = {http://eprint.iacr.org/2002/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiaoZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yacobi02, author = {Yacov Yacobi}, title = {A Note on the Bilinear Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2002}, url = {http://eprint.iacr.org/2002/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yacobi02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoussefT02, author = {Amr M. Youssef and Stafford E. Tavares}, title = {On Some Algebraic Structures in the {AES} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2002}, url = {http://eprint.iacr.org/2002/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoussefT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zenner02, author = {Erik Zenner}, title = {On the efficiency of the Clock Control Guessing Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2002}, url = {http://eprint.iacr.org/2002/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zenner02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangK02, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Two New Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2002}, url = {http://eprint.iacr.org/2002/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLK02, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, title = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2002}, url = {http://eprint.iacr.org/2002/122}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLK02a, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, title = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2002}, url = {http://eprint.iacr.org/2002/178}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLK02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangWW02, author = {Jianhong Zhang and Jilin Wang and Yumin Wang}, title = {two attacks on xia-you Group Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2002}, url = {http://eprint.iacr.org/2002/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayJ02, title = {Timed Release of Standard Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2002}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2002/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerranzPS02, title = {A Distributed {RSA} Signature Scheme for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2002}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2002/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerranzPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kanso02, title = {The (a, b)-Shrinking Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2002}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2002/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kanso02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kanso02a, title = {Clock-Controlled Alternating Step Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2002}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2002/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kanso02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouBD02, title = {Validating Digital Signatures without Time-Stamping and Certificate Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2002}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2002/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouBD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu02, title = {A new public key encryption scheme provably secure against adaptive chosen cipher-text attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2002}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2002/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.