Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2010.bht:"

 download as .bib file

@article{DBLP:journals/iacr/0001LRW10,
  author       = {Jian Guo and
                  San Ling and
                  Christian Rechberger and
                  Huaxiong Wang},
  title        = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full
                  Tiger, and Improved Results on {MD4} and {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeHO10,
  author       = {Masayuki Abe and
                  Kristiyan Haralambiev and
                  Miyako Ohkubo},
  title        = {Signing on Elements in Bilinear Groups for Modular Protocol Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Abyaneh10,
  author       = {Mohammad Reza Sohizadeh Abyaneh},
  title        = {On the Security of Non-Linear {HB} {(NLHB)} Protocol Against Passive
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Abyaneh10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Abyaneh10a,
  author       = {Mohammad Reza Sohizadeh Abyaneh},
  title        = {Passive Cryptanalysis of the UnConditionally Secure Authentication
                  Protocol for {RFID} Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Abyaneh10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcarBBC10,
  author       = {Tolga Acar and
                  Mira Belenkiy and
                  Mihir Bellare and
                  David Cash},
  title        = {Cryptographic Agility and its Relation to Circular Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcarBBC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  title        = {Preventing Pollution Attacks in Multi-Source Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKSR10,
  author       = {Shivank Agrawal and
                  Swarun Kumar and
                  Amjed Shareef and
                  C. Pandu Rangan},
  title        = {Sanitizable signatures with strong transparency in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnGH10,
  author       = {Jae Hyun Ahn and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Synchronized Aggregate Signatures: New Definitions, Constructions
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhnGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkinyeleLGPPR10,
  author       = {Joseph A. Akinyele and
                  Christoph U. Lehmann and
                  Matthew Green and
                  Matthew W. Pagano and
                  Zachary N. J. Peterson and
                  Aviel D. Rubin},
  title        = {Self-Protecting Electronic Medical Records Using Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkinyeleLGPPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP10,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson},
  title        = {Breaking An Identity-Based Encryption Scheme based on {DHIES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alekseychuk10,
  author       = {A. N. Alekseychuk},
  title        = {Lattice-theoretic Characterization of Secret Sharing Representable
                  Connected Matroids},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alekseychuk10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliM10,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay},
  title        = {Acceleration of Differential Fault Analysis of the Advanced Encryption
                  Standard Using Single Fault},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliMT10,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of {AES} using a Single Multiple-Byte
                  Fault},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmeidaBBKS010,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Endre Bangerter and
                  Manuel Barbosa and
                  Stephan Krenn and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  title        = {A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based
                  on Sigma-Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmeidaBBKS010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alquie10,
  author       = {Didier Alqui{\'{e}}},
  title        = {2-round Substitution-Permutation and 3-round Feistel Networks have
                  bad Algebraic Degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alquie10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alquie10a,
  author       = {Didier Alqui{\'{e}}},
  title        = {Approximating Addition by {XOR:} how to go all the way},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alquie10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaMP10,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {On the Indifferentiability of the Gr{\"{o}}stl Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaMP10a,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Security Reductions of the Second Round {SHA-3} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaMP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AngelM10,
  author       = {Jos{\'{e}} de Jes{\'{u}}s Angel Angel and
                  Guillermo Morales{-}Luna},
  title        = {Solinas primes of small weight for fixed sizes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AngelM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Applebaum10,
  author       = {Benny Applebaum},
  title        = {Key-Dependent Message Security: Generic Amplification and Completeness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Applebaum10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumHI10,
  author       = {Benny Applebaum and
                  Danny Harnik and
                  Yuval Ishai},
  title        = {Semantic Security Under Related-Key Attacks and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumHI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaBDE10,
  author       = {Diego F. Aranha and
                  Jean{-}Luc Beuchat and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals},
  title        = {Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaBDE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaKLGL10,
  author       = {Diego F. Aranha and
                  Koray Karabina and
                  Patrick Longa and
                  Catherine H. Gebotys and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  title        = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/526},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaKLGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aravamuthan10,
  author       = {Sarang Aravamuthan},
  title        = {Separable Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aravamuthan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtES10,
  author       = {Frederik Armknecht and
                  Carsten Elsner and
                  Martin Schmidt},
  title        = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic
                  Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtPK10,
  author       = {Frederik Armknecht and
                  Andreas Peter and
                  Stefan Katzenbeisser},
  title        = {A Cleaner View on {IND-CCA1} Secure Homomorphic Encryption using {SOAP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtPK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharLPW10,
  author       = {Hassan Jameel Asghar and
                  Shujun Li and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Cryptanalysis of the Convex Hull Click Human Identification Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharLPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharPW10,
  author       = {Hassan Jameel Asghar and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step
                  Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurD10,
  author       = {Tomer Ashur and
                  Orr Dunkelman},
  title        = {Linear Analysis of Reduced-Round CubeHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCT10,
  author       = {Giuseppe Ateniese and
                  Emiliano De Cristofaro and
                  Gene Tsudik},
  title        = {(If) Size Matters: Size-Hiding Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtighehchiEMR10,
  author       = {Kevin Atighehchi and
                  A. Enache and
                  Traian Muntean and
                  Gabriel Risterucci},
  title        = {An Efficient Parallel Algorithm for Skein Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtighehchiEMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson0KMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  title        = {Differential and invertibility properties of {BLAKE} (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson0KMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson10,
  author       = {Jean{-}Philippe Aumasson},
  title        = {Cryptanalysis of splay tree based encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonKKMOPS10,
  author       = {Jean{-}Philippe Aumasson and
                  Emilia K{\"{a}}sper and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer},
  title        = {Distinguishers for the Compression Function and Output Transformation
                  of Hamsi-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonKKMOPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziHP10,
  author       = {Roberto Avanzi and
                  Clemens Heuberger and
                  Helmut Prodinger},
  title        = {Arithmetic of Supersingular Koblitz Curves in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziHP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziHPT10,
  author       = {Roberto Maria Avanzi and
                  Simon Hoerder and
                  Daniel Page and
                  Michael Tunstall},
  title        = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziHPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvrahamBD10,
  author       = {Uri Avraham and
                  Eli Biham and
                  Orr Dunkelman},
  title        = {{ABC} - {A} New Framework for Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvrahamBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU10,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  title        = {Computationally Sound Verification of Source Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesW10,
  author       = {Werner Backes and
                  Susanne Wetzel},
  title        = {BoostReduce - {A} Framework For Strong Lattice Basis Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BajardDE10,
  author       = {Jean{-}Claude Bajard and
                  Sylvain Duquesne and
                  Milos D. Ercegovac},
  title        = {Combining leak-resistant arithmetic for elliptic curves defined over
                  F\({}_{\mbox{p}}\) and {RNS} representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BajardDE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldwinBLHHOM10,
  author       = {Brian Baldwin and
                  Andrew Byrne and
                  Liang Lu and
                  Mark Hamilton and
                  Neil Hanley and
                  M{\'{a}}ire O'Neill and
                  William P. Marnane},
  title        = {A Hardware Wrapper for the {SHA-3} Hash Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldwinBLHHOM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaHO10,
  author       = {Gergei Bana and
                  Koji Hasebe and
                  Mitsuhiro Okada},
  title        = {Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangerterGK10,
  author       = {Endre Bangerter and
                  David Gullasch and
                  Stephan Krenn},
  title        = {Cache Games - Bringing Access Based Cache Attacks on {AES} to Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BangerterGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarenghiBBPP10,
  author       = {Alessandro Barenghi and
                  Guido Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  title        = {Low Voltage Fault Attacks to {AES} and {RSA} on General Purpose Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarenghiBBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoLM10,
  author       = {Paulo S. L. M. Barreto and
                  Richard Lindner and
                  Rafael Misoczki},
  title        = {Decoding square-free Goppa codes over F\({}_{\mbox{p}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoM10,
  author       = {Paulo S. L. M. Barreto and
                  Rafael Misoczki},
  title        = {A new one-time signature scheme from syndrome decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauM10,
  author       = {Jason Bau and
                  John C. Mitchell},
  title        = {A Security Evaluation of {DNSSEC} with {NSEC3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauerCNTV10,
  author       = {Aur{\'{e}}lie Bauer and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi and
                  Damien Vergnaud},
  title        = {On The Broadcast and Validity-Checking Security of {PKCS} {\textbackslash}{\#}1
                  v1.5 Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauerCNTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelOO10,
  author       = {Amos Beimel and
                  Eran Omri and
                  Ilan Orlov},
  title        = {Secure Multiparty Computation with Partial Fairness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelOO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareC10,
  author       = {Mihir Bellare and
                  David Cash},
  title        = {Pseudorandom Functions and Permutations Provably Secure Against Related-Key
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareWY10,
  author       = {Mihir Bellare and
                  Brent Waters and
                  Scott Yilek},
  title        = {Identity-Based Encryption Secure against Selective Opening Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BendlinDOZ10,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Sarah Zakarias},
  title        = {Semi-Homomorphic Encryption and Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BendlinDOZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenoitP10,
  author       = {Olivier Beno{\^{\i}}t and
                  Thomas Peyrin},
  title        = {Side-channel Analysis of Six {SHA-3} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenoitP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBL10,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange},
  title        = {Starfish on Strike},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL10,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Type-II Optimal Polynomial Bases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL10a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Cryptanalysis of Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP10,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Wild McEliece},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP10a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Smaller decoding exponents: ball-collision decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerzatiCG10,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  title        = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerzatiCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatGMORT10,
  author       = {Jean{-}Luc Beuchat and
                  Jorge Enrique Gonz{\'{a}}lez{-}D{\'{\i}}az and
                  Shigeo Mitsunari and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Tadanori Teruya},
  title        = {High-Speed Software Implementation of the Optimal Ate Pairing over
                  Barreto-Naehrig Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatGMORT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatOY10,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {Compact Implementations of {BLAKE-32} and {BLAKE-64} on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatOY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatOY10a,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {A Compact {FPGA} Implementation of the {SHA-3} Candidate {ECHO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatOY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyyaM10,
  author       = {Rishiraj Bhattacharyya and
                  Avradip Mandal},
  title        = {On the Impossibility of Instantiating {PSS} in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyyaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirkettS10,
  author       = {James Birkett and
                  Douglas Stebila},
  title        = {Predicate-Based Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirkettS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovK10,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  title        = {Feasible Attack on the 13-round {AES-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovN10,
  author       = {Alex Biryukov and
                  Ivica Nikolic},
  title        = {Automatic Search for Related-Key Diff erential Characteristics in
                  Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad
                  and Others},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyC10,
  author       = {Nir Bitansky and
                  Ran Canetti},
  title        = {On Strong Simulation and Composable Point Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blackburn10,
  author       = {Simon R. Blackburn},
  title        = {The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin-Abu
                  cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blackburn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnSU10,
  author       = {Simon R. Blackburn and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {On the Complexity of the Herding Attack and Some Related Attacks on
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnSU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonG10,
  author       = {Marina Blanton and
                  Paolo Gasti},
  title        = {Secure and Efficient Protocols for Iris and Fingerprint Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassEM10,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Tracker: Security and Privacy for RFID-based Supply Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassEM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyFIJSV10,
  author       = {Olivier Blazy and
                  Georg Fuchsbauer and
                  Malika Izabach{\`{e}}ne and
                  Amandine Jambert and
                  Herv{\'{e}} Sibert and
                  Damien Vergnaud},
  title        = {Batch Groth-Sahai},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyFIJSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauG10,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  title        = {Links Between Theoretical and Effective Differential Probabilities:
                  Experiments on {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoIP10,
  author       = {Carlo Blundo and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  title        = {Predicate Encryption with Partial Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoIP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovK10,
  author       = {Andrey Bogdanov and
                  Ilya Kizhvatov},
  title        = {Beyond the Limits of {DPA:} Combined Side-Channel Collision Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {590},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/590},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovR10,
  author       = {Andrey Bogdanov and
                  Christian Rechberger},
  title        = {A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight
                  Block Cipher {KTANTAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehDFLSZ10,
  author       = {Dan Boneh and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Anja Lehmann and
                  Christian Schaffner and
                  Mark Zhandry},
  title        = {Random Oracles in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehDFLSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehF10,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  title        = {Linearly Homomorphic Signatures over Binary Fields and New Tools for
                  Lattice-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehMR10,
  author       = {Dan Boneh and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  title        = {Algebraic Pseudorandom Functions with Improved Efficiency from the
                  Augmented Cascade},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW10,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Functional Encryption: Definitions and Challenges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorghoffKLT10,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  S{\o}ren S. Thomsen},
  title        = {Cryptanalysis of PRESENT-like ciphers with secret S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorghoffKLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosKLM10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Peter L. Montgomery},
  title        = {Efficient {SIMD} arithmetic modulo a Mersenne number},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosKLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosKNS10,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung and
                  Ruben Niederhagen and
                  Peter Schwabe},
  title        = {{ECC2K-130} on Cell CPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosKNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosOS10,
  author       = {Joppe W. Bos and
                  Onur {\"{O}}zen and
                  Martijn Stam},
  title        = {Efficient Hashing using the {AES} Instruction Set},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/576},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoscherHT10,
  author       = {Arnaud Boscher and
                  Helena Handschuh and
                  Elena Trichina},
  title        = {Fault Resistant {RSA} Signatures: Chinese Remaindering in Both Directions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoscherHT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetCCNSY10,
  author       = {Charles Bouillaguet and
                  Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Adi Shamir and
                  Bo{-}Yin Yang},
  title        = {Fast Exhaustive Search for Polynomial Systems in F\({}_{\mbox{2}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetCCNSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDDKRF10,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Nathan Keller and
                  Vincent Rijmen and
                  Pierre{-}Alain Fouque},
  title        = {Low Data Complexity Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFFP10,
  author       = {Charles Bouillaguet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Alain Fouque and
                  Ludovic Perret},
  title        = {Practical Cryptanalysis of the Identification Scheme Based on the
                  Isomorphism of Polynomial with One Secret Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFL10,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  title        = {Security Analysis of {SIMD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCC10,
  author       = {Christina Boura and
                  Anne Canteaut and
                  Christophe De Canni{\`{e}}re},
  title        = {Higher-order differential properties of Keccak and Luffa},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/589},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDJOR10,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDJOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleSW10,
  author       = {Elette Boyle and
                  Gil Segev and
                  Daniel Wichs},
  title        = {Fully Leakage-Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiG10,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser},
  title        = {Circular and Leakage Resilient Public-Key Encryption Under Subgroup
                  Indistinguishability (or: Quadratic Residuosity Strikes Back)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiK10,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {A Framework for Efficient Signatures, Ring Signatures and Identity
                  Based Encryption in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiKKV10,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Jonathan Katz and
                  Vinod Vaikuntanathan},
  title        = {Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient
                  to Continual Memory Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiKKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrickellL10,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  title        = {A Pairing-Based {DAA} Scheme Further Reducing {TPM} Resources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrickellL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadbentJT10,
  author       = {Anne Broadbent and
                  Stacey Jeffery and
                  Alain Tapp},
  title        = {Exact, Efficient and Information-Theoretically Secure Voting with
                  an Arbitrary Number of Cheaters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadbentJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown10,
  author       = {Daniel R. L. Brown},
  title        = {Lower Bounds for Straight Line Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown10a,
  author       = {Daniel R. L. Brown},
  title        = {Stange's Elliptic Nets and Coxeter Group {F4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brumley10,
  author       = {Billy Bob Brumley},
  title        = {Secure and Fast Implementations of Two Involution Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brumley10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanH10a,
  author       = {Lilya Budaghyan and
                  Tor Helleseth},
  title        = {On isotopisms of commutative presemifields and CCZ-equivalence of
                  functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanH10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuhrmanCFGGOS10,
  author       = {Harry Buhrman and
                  Nishanth Chandran and
                  Serge Fehr and
                  Ran Gelles and
                  Vipul Goyal and
                  Rafail Ostrovsky and
                  Christian Schaffner},
  title        = {Position-Based Quantum Cryptography: Impossibility and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuhrmanCFGGOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BulyginPB10,
  author       = {Stanislav Bulygin and
                  Albrecht Petzoldt and
                  Johannes Buchmann},
  title        = {Towards provable security of the Unbalanced Oil and Vinegar signature
                  scheme under direct attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/420},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BulyginPB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunnO10,
  author       = {Paul Bunn and
                  Rafail Ostrovsky},
  title        = {Throughput-Optimal Routing in Unreliable Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunnO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CalikT10,
  author       = {{\c{C}}agdas {\c{C}}alik and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Message Recovery and Pseudo-Preimage Attacks on the Compression Function
                  of Hamsi-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CalikT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCGS10,
  author       = {Jan Camenisch and
                  Nathalie Casati and
                  Thomas Gross and
                  Victor Shoup},
  title        = {Credential Authenticated Identification and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischCGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischG10,
  author       = {Jan Camenisch and
                  Thomas Gro{\ss}},
  title        = {Efficient Attributes for Anonymous Credentials (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischGHH10,
  author       = {Jan Camenisch and
                  Thomas Gro{\ss} and
                  Peter Hladky and
                  Christian Hoertnagl},
  title        = {Privacy-friendly Incentives and their Application to Wikipedia (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischGHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardCEG10,
  author       = {S{\'{e}}bastien Canard and
                  Iwen Coisel and
                  Jonathan Etrog and
                  Marc Girault},
  title        = {Privacy-Preserving {RFID} Systems: Model and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardCEG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCHPRSV10,
  author       = {Ran Canetti and
                  Suresh Chari and
                  Shai Halevi and
                  Birgit Pfitzmann and
                  Arnab Roy and
                  Michael Steiner and
                  Wietse Z. Venema},
  title        = {Composable Security Analysis of {OS} Services},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/213},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCHPRSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiG10,
  author       = {Ran Canetti and
                  Sebastian Gajek},
  title        = {Universally Composable Symbolic Analysis of Diffie-Hellman based Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKVW10,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Mayank Varia and
                  Daniel Wichs},
  title        = {On Symmetric Encryption and Point Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao10,
  author       = {Xiwang Cao},
  title        = {On the order of the polynomial x\({}^{\mbox{p}}\)-x-a},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao10a,
  author       = {Zhengjun Cao},
  title        = {A Principle for Cryptographic Protocols Beyond Security, Less Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao10b,
  author       = {Zhengjun Cao},
  title        = {An Anonymous ID-based Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao10c,
  author       = {Zhengjun Cao},
  title        = {A Note On Gottesman-Chuang Quantum Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoH10,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {On Exponential Sums, Nowton identities and Dickson Polynomials over
                  Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM10,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {A {NOTE} {ON} {SEMI-BENT} {BOOLEAN} {FUNCTIONS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletM10a,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {{ON} DILLON'S {CLASS} {H} {OF} {BENT} FUNCTIONS, {NIHO} {BENT} {FUNCTIONS}
                  {AND} {O-POLYNOMIALS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletM10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaroIP10,
  author       = {Angelo De Caro and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  title        = {Fully Secure Anonymous {HIBE} and Secret-Key Anonymous {IBE} with
                  Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaroIP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaroIP10a,
  author       = {Angelo De Caro and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  title        = {Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions,
                  Disjunctions and k-CNF/DNF formulae},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaroIP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarrijoTN10,
  author       = {Jos{\'{e}} Carrijo and
                  Rafael Tonicelli and
                  Anderson C. A. Nascimento},
  title        = {A Fault Analytic Method against {HB+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarrijoTN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashHKP10,
  author       = {David Cash and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Chris Peikert},
  title        = {Bonsai Trees, or How to Delegate a Lattice Basis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashHKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaabouniV10,
  author       = {Rafik Chaabouni and
                  Serge Vaudenay},
  title        = {The Extended Access Control for Machine Readable Travel Documents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaabouniV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyM10,
  author       = {Debrup Chakraborty and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez},
  title        = {Double Ciphertext Mode : {A} Proposal for Secure Backup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChalkiasBHS10,
  author       = {Konstantinos Chalkias and
                  Foteini Baldimtsi and
                  Dimitrios Hristu{-}Varsakelis and
                  Spyros T. Halkidis and
                  George Stephanides},
  title        = {Attacks on the {AKACP} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChalkiasBHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanSS10,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Private and Continual Release of Statistics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNY10,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  title        = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeHM10,
  author       = {Sanjit Chatterjee and
                  Darrel Hankerson and
                  Alfred Menezes},
  title        = {On the Efficiency and Security of Pairing-Based Protocols in the Type
                  1 and Type 4 Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen10,
  author       = {Liqun Chen},
  title        = {A {DAA} Scheme Requiring Less {TPM} Resources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/008},
  timestamp    = {Sat, 21 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCH10,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Xian{-}Wu Hou},
  title        = {A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCH10a,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Chun{-}Hui Huang},
  title        = {Comments on five smart card based password authentication protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCH10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCH10b,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Chun{-}Hui Huang},
  title        = {Comment on four two-party authentication protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCH10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCL10,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Chi{-}Fong Lin},
  title        = {A Novel Non-interactive Deniable Authentication Protocol with Designated
                  Verifier on elliptic curve cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenS10,
  author       = {Zhimin Chen and
                  Patrick Schaumont},
  title        = {Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into
                  Software on Multicore},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/272},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenWT10,
  author       = {Cai{-}Sen Chen and
                  Tao Wang and
                  Jun{-}Jian Tian},
  title        = {An Improved Timing Attack with Error Detection on {RSA-CRT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenWT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengM10,
  author       = {Qingfeng Cheng and
                  Chuangui Ma},
  title        = {Security weakness of two authenticated key exchange protocols from
                  pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengMW10,
  author       = {Qingfeng Cheng and
                  Chuangui Ma and
                  Fushan Wei},
  title        = {A modified eCK model with stronger security for tripartite authenticated
                  key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonJS10,
  author       = {Jung Hee Cheon and
                  Stanislaw Jarecki and
                  Jae Hong Seo},
  title        = {Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear
                  Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKM10,
  author       = {Seung Geol Choi and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {BiTR: Built-in Tamper Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouC10,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen},
  title        = {A secure anonymous communication scheme in vehicular ad hoc networks
                  from pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCC10,
  author       = {Jue{-}Sam Chou and
                  Hsien{-}Ching Chen and
                  Chun{-}Yun Chen},
  title        = {Cryptanalysis and Improvement of {A} New Electronic Traveler's Check
                  Scheme Based on One-way Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCH10,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Chun{-}Hui Huang},
  title        = {A Privacy-Flexible Password Authentication Scheme for Multi-Server
                  Environment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Choudhury10,
  author       = {Ashish Choudhury},
  title        = {Protocols for Reliable and Secure Message Transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Choudhury10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryKP10,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  title        = {The Round Complexity of General {VSS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowLZ10,
  author       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Jianying Zhou},
  title        = {Identity-Based Online/Offline Key Encapsulation and Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuLZBD10,
  author       = {Cheng{-}Kang Chu and
                  Joseph K. Liu and
                  Jianying Zhou and
                  Feng Bao and
                  Robert H. Deng},
  title        = {Practical ID-based Encryption for Wireless Sensor Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuLZBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungKV10,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Salil P. Vadhan},
  title        = {Improved Delegation of Computation using Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClarkH10,
  author       = {Jeremy Clark and
                  Urs Hengartner},
  title        = {On the Use of Financial Data as a Random Beacon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClarkH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClavierFGRV10,
  author       = {Christophe Clavier and
                  Benoit Feix and
                  Georges Gagnerot and
                  Myl{\`{e}}ne Roussellet and
                  Vincent Verneuil},
  title        = {Horizontal Correlation Analysis on Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClavierFGRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ColbertDB10,
  author       = {Bernard D. Colbert and
                  Anthony H. Dekker and
                  Lynn Margaret Batten},
  title        = {Heraclitus: {A} LFSR-based Stream Cipher with Key Dependent Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ColbertDB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronJMNT10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronJMNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierS10,
  author       = {V{\'{e}}ronique Cortier and
                  Ben Smyth},
  title        = {Attacking and fixing Helios: An analysis of ballot secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloBNW10,
  author       = {Craig Costello and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  title        = {Avoiding Full Extension Field Arithmetic in Pairing Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloBNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloBNW10a,
  author       = {Craig Costello and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth Koon{-}Ho Wong},
  title        = {Delaying Mismatched Field Multiplications in Pairing Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloBNW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloS10,
  author       = {Craig Costello and
                  Douglas Stebila},
  title        = {Fixed Argument Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroKT10,
  author       = {Emiliano De Cristofaro and
                  Jihye Kim and
                  Gene Tsudik},
  title        = {Linear-Complexity Private Set Intersection Protocols Secure in Malicious
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CzapV10,
  author       = {L{\'{a}}szl{\'{o}} Czap and
                  Istv{\'{a}}n Vajda},
  title        = {Signatures for Multi-source Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/328},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CzapV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dagdelen010,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Michael Schneider},
  title        = {Parallel Enumeration of Shortest Lattice Vectors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dagdelen010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiWS10,
  author       = {Zhenli Dai and
                  Meiqin Wang and
                  Yue Sun},
  title        = {Effect of the Dependent Paths in Linear Hull},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardIK10,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard},
  title        = {Perfectly Secure Multiparty Computation and the Computational Overhead
                  of Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardIK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardMN10,
  author       = {Ivan Damg{\aa}rd and
                  Sigurd Meldgaard and
                  Jesper Buus Nielsen},
  title        = {Perfectly Secure Oblivious {RAM} Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardO10,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  title        = {Multiparty Computation for Dishonest Majority: from Passive to Active
                  Security at Low Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanilovP10,
  author       = {S. A. Danilov and
                  I. A. Popovyan},
  title        = {Factorization of {RSA-180}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanilovP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengLYYZ10,
  author       = {Robert H. Deng and
                  Yingjiu Li and
                  Andrew C. Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {A New Framework for {RFID} Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengLYYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DetreyGK10,
  author       = {J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Karim Khalfallah},
  title        = {A Low-Area yet Performant {FPGA} Implementation of Shabal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DetreyGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJ10,
  author       = {Marten van Dijk and
                  Ari Juels},
  title        = {On the Impossibility of Cryptography Alone for Privacy-Preserving
                  Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ding10,
  author       = {Jintai Ding},
  title        = {Solving {LWE} problem with bounded errors in polynomial time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ding10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ding10a,
  author       = {Jintai Ding},
  title        = {Fast Algorithm to solve a family of {SIS} problem with l\({}_{\mbox{infty}}\)
                  norm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ding10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurS10,
  author       = {Itai Dinur and
                  Adi Shamir},
  title        = {Breaking Grain-128 with Dynamic Cube Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurS10a,
  author       = {Itai Dinur and
                  Adi Shamir},
  title        = {An Improved Algebraic Attack on Hamsi-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHLW10,
  author       = {Yevgeniy Dodis and
                  Kristiyan Haralambiev and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  title        = {Efficient Public-Key Cryptography in the Presence of Key Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHLW10a,
  author       = {Yevgeniy Dodis and
                  Kristiyan Haralambiev and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  title        = {Cryptography Against Continuous Memory Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHLW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKKRS10,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoganaksoyEKS10,
  author       = {Ali Doganaksoy and
                  Baris Ege and
                  Onur Ko{\c{c}}ak and
                  Fatih Sulak},
  title        = {Cryptographic Randomness Testing of Block Ciphers and Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/564},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoganaksoyEKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoganaksoyEKS10a,
  author       = {Ali Doganaksoy and
                  Baris Ege and
                  Onur Ko{\c{c}}ak and
                  Fatih Sulak},
  title        = {Statistical Analysis of Reduced Round Compression Functions of {SHA-3}
                  Second Round Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoganaksoyEKS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dousti10,
  author       = {Mohammad Sadeq Dousti},
  title        = {Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction
                  Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dousti10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyGMN10,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  Davidson Marques and
                  Anderson C. A. Nascimento},
  title        = {A Two-Party Protocol with Trusted Initializer for Computing the Inner
                  Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyGMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanLMGL10,
  author       = {Pu Duan and
                  Sanmin Liu and
                  Weiqin Ma and
                  Guofei Gu and
                  Jyh{-}Charn Liu},
  title        = {Privacy-Preserving Matching Protocols for Attributes and Strings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanLMGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanLYSZ10,
  author       = {Ming Duan and
                  Xuejia Lai and
                  Mohan Yang and
                  Xiaorui Sun and
                  Bo Zhu},
  title        = {Distinguishing Properties of Higher Order Derivatives of Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/417},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanLYSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuboisK10,
  author       = {Vivien Dubois and
                  Jean{-}Gabriel Kammerer},
  title        = {Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuboisK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubovitskayaSV10,
  author       = {Maria Dubovitskaya and
                  Alessandra Scafuro and
                  Ivan Visconti},
  title        = {On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof
                  Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubovitskayaSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK10,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {The Effects of the Omission of Last Round's MixColumns on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS10,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {A Practical-Time Attack on the {A5/3} Cryptosystem Used in Third Generation
                  {GSM} Telephony},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS10a,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Improved Single-Key Attacks on 8-round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Duquesne10,
  author       = {Sylvain Duquesne},
  title        = {{RNS} arithmetic in F\({}_{\mbox{p\({}^{\mbox{k}}\)}}\) and application
                  to fast pairing computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Duquesne10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiKW10,
  author       = {Stefan Dziembowski and
                  Tomasz Kazana and
                  Daniel Wichs},
  title        = {One-time Computable and Uncomputable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/El-HadedyGK10,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {Single Core Implementation of Blue Midnight Wish Hash Function on
                  {VIRTEX} 5 Platform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/571},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/El-HadedyGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElaabidG10,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  title        = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware
                  Crypto-Accelerator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElaabidG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM10,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EngeS10,
  author       = {Andreas Enge and
                  Andrew V. Sutherland},
  title        = {Class Invariants by the {CRT} Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EngeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ErgulerA10,
  author       = {Imran Erguler and
                  Emin Anarim},
  title        = {Scalability and Security Conflict for {RFID} Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ErgulerA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Estibals10,
  author       = {Nicolas Estibals},
  title        = {Compact hardware for computing the Tate pairing over 128-bit-security
                  supersingular curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Estibals10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanHV10,
  author       = {Junfeng Fan and
                  Jens Hermans and
                  Frederik Vercauteren},
  title        = {On the claimed privacy of {EC-RAC} {III}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Farashahi10,
  author       = {Reza Rezaeian Farashahi},
  title        = {Hashing into Hessian Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Farashahi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashahiFSTV10,
  author       = {Reza Rezaeian Farashahi and
                  Pierre{-}Alain Fouque and
                  Igor E. Shparlinski and
                  Mehdi Tibouchi and
                  Jos{\'{e}} Felipe Voloch},
  title        = {Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashahiFSTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaugereGOPT10,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Val{\'{e}}rie Gauthier and
                  Ayoub Otmani and
                  Ludovic Perret and
                  Jean{-}Pierre Tillich},
  title        = {A Distinguisher for High Rate McEliece Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaugereGOPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengFZFW10,
  author       = {Dengguo Feng and
                  Xiutao Feng and
                  Wentao Zhang and
                  Xiubin Fan and
                  Chuankun Wu},
  title        = {Loiss: {A} Byte-Oriented Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengFZFW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengW10,
  author       = {Rongquan Feng and
                  Hongfeng Wu},
  title        = {Number of Jacobi quartic curves over finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengZW10,
  author       = {Xiutao Feng and
                  Chunfang Zhou and
                  Chuan Kun Wu},
  title        = {Linear Approximations of Addition Modulo 2\({}^{\mbox{n}}\)-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FergusonLM10,
  author       = {Niels Ferguson and
                  Stefan Lucks and
                  Kerry A. McKay},
  title        = {Symmetric States and their Structure: Improved Analysis of CubeHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FergusonLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreS10,
  author       = {Dario Fiore and
                  Dominique Schr{\"{o}}der},
  title        = {Uniqueness is a Different Story: Impossibility of Verifiable Random
                  Functions from Trapdoor Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/648},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischmannGL10,
  author       = {Ewan Fleischmann and
                  Michael Gorski and
                  Stefan Lucks},
  title        = {Some Observations on Indifferentiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischmannGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloissacL10,
  author       = {No{\'{e}}mie Floissac and
                  Yann L'Hyver},
  title        = {From {AES-128} to {AES-192} and AES-256, How to Adapt Differential
                  Fault Analysis Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloissacL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FlontaM10,
  author       = {Stelian Flonta and
                  Liviu Cristian Miclea},
  title        = {Ring signature with divided private key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FlontaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloriRCM10,
  author       = {Jean{-}Pierre Flori and
                  Hugues Randriam and
                  G{\'{e}}rard D. Cohen and
                  Sihem Mesnager},
  title        = {On a conjecture about binary strings distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloriRCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueT10,
  author       = {Pierre{-}Alain Fouque and
                  Mehdi Tibouchi},
  title        = {Estimating the Size of the Image of Deterministic Hash Functions to
                  Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueT10a,
  author       = {Pierre{-}Alain Fouque and
                  Mehdi Tibouchi},
  title        = {Deterministic Encoding and Hashing to Odd Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueT10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancillonDC10,
  author       = {Aur{\'{e}}lien Francillon and
                  Boris Danev and
                  Srdjan Capkun},
  title        = {Relay Attacks on Passive Keyless Entry and Start Systems in Modern
                  Cars},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancillonDC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancisHMM10,
  author       = {Lishoy Francis and
                  Gerhard P. Hancke and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Practical {NFC} Peer-to-Peer Relay Attack using Mobile Phones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancisHMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancqT10,
  author       = {Julien Francq and
                  C{\'{e}}line Thuillet},
  title        = {Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancqT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranzDHJKS10,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure Computations on Non-Integer Values},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranzDHJKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fuchsbauer10,
  author       = {Georg Fuchsbauer},
  title        = {Commuting Signatures and Verifiable Encryption and an Application
                  to Non-Interactively Delegatable Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fuchsbauer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerV10,
  author       = {Georg Fuchsbauer and
                  Damien Vergnaud},
  title        = {Fair Blind Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrGRV10,
  author       = {Thomas Fuhr and
                  Henri Gilbert and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FumaroliMPR10,
  author       = {Guillaume Fumaroli and
                  Ange Martinelli and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  title        = {Affine Masking against Higher-Order Side Channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FumaroliMPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FunkeK10,
  author       = {Daniel Funke and
                  Florian Kerschbaum},
  title        = {Privacy-Preserving Multi-Objective Evolutionary Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FunkeK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithH10,
  author       = {Steven D. Galbraith and
                  Mark Holmes},
  title        = {A non-uniform birthday problem with applications to discrete logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPR10,
  author       = {Steven D. Galbraith and
                  John M. Pollard and
                  Raminder S. Ruprai},
  title        = {Computing Discrete Logarithms in an Interval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithR10,
  author       = {Steven D. Galbraith and
                  Raminder S. Ruprai},
  title        = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm
                  Problem in a Short Interval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GallaisKT10,
  author       = {Jean{-}Fran{\c{c}}ois Gallais and
                  Ilya Kizhvatov and
                  Michael Tunstall},
  title        = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES}
                  Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GallaisKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gallant10,
  author       = {Robert P. Gallant},
  title        = {Finding discrete logarithms with a set orbit distinguisher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gallant10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayC10,
  author       = {Sugata Gangopadhyay and
                  Ankita Chaturvedi},
  title        = {A New Class of Bent-Negabent Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayS10,
  author       = {Sugata Gangopadhyay and
                  Brajesh Kumar Singh},
  title        = {On second-order nonlinearities of some D\({}_{\mbox{0}}\) type bent
                  functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoVW10,
  author       = {Shuhong Gao and
                  Frank Volny and
                  Mingsheng Wang},
  title        = {A new algorithm for computing Groebner bases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarciaRVS10,
  author       = {Flavio D. Garcia and
                  Peter van Rossum and
                  Roel Verdult and
                  Ronny Wichers Schreur},
  title        = {Dismantling SecureMemory, CryptoMemory and CryptoRF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarciaRVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroHS10,
  author       = {Rosario Gennaro and
                  Carmit Hazay and
                  Jeffrey S. Sorensen},
  title        = {Automata Evaluation and Text Search Protocols with Simulation Based
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroKR10,
  author       = {Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with
                  Minimal Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH10,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Implementing Gentry's Fully-Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHV10,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  title        = {i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHV10a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  title        = {A Simple BGN-type Cryptosystem from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryW10,
  author       = {Craig Gentry and
                  Daniel Wichs},
  title        = {Separating Succinct Non-Interactive Arguments From All Falsifiable
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeovandroSNB10,
  author       = {C. C. F. Pereira Geovandro and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Michael Naehrig and
                  Paulo S. L. M. Barreto},
  title        = {A Family of Implementation-Friendly {BN} Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeovandroSNB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhadafiS10,
  author       = {Essam Ghadafi and
                  Nigel P. Smart},
  title        = {Efficient Two-Move Blind Signatures in the Common Reference String
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/568},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhadafiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiraudT10,
  author       = {Christophe Giraud and
                  Adrian Thillard},
  title        = {Piret and Quisquater's {DFA} on {AES} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/440},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiraudT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjsteen10,
  author       = {Kristian Gj{\o}steen},
  title        = {Analysis of an internet voting protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjsteen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiK10,
  author       = {Danilo Gligoroski and
                  Vlastimil Kl{\'{\i}}ma},
  title        = {Practical consequences of the aberration of narrow-pipe hash designs
                  from ideal random functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiOJPFKM10,
  author       = {Danilo Gligoroski and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Rune Erlend Jensen and
                  Ludovic Perret and
                  Jean{-}Charles Faug{\`{e}}re and
                  Svein Johan Knapskog and
                  Smile Markovski},
  title        = {The Digital Signature Scheme {MQQ-SIG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiOJPFKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GodeG10,
  author       = {Ruchi Gode and
                  Sugata Gangopadhyay},
  title        = {On lower bounds of second-order nonlinearities of cubic bent functions
                  constructed by concatenating Gold functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GodeG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author       = {Shigeto Gomisawa and
                  Yang Li and
                  Junko Takahashi and
                  Toshinori Fukunaga and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Efficient Differential Fault Analysis for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN10,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {One Round Group Key Exchange with Forward Security in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaBN10a,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Attribute-based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaBN10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorenL10,
  author       = {Eyal Z. Goren and
                  Kristin E. Lauter},
  title        = {Genus 2 Curves with Complex Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorenL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gouicem10,
  author       = {Mourad Gouicem},
  title        = {Comparison of seven {SHA-3} candidates software implementations on
                  smart cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gouicem10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoundarJM10,
  author       = {Raveen R. Goundar and
                  Marc Joye and
                  Atsuko Miyaji},
  title        = {Co-Z Addition Formulae and Binary Ladders on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoundarJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal010,
  author       = {Vipul Goyal and
                  Abhishek Jain},
  title        = {On the Round Complexity of Covert Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/279},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal10,
  author       = {Vipul Goyal},
  title        = {Constant Round Non-Malleable Protocols using One Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalISVW10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Amit Sahai and
                  Ramarathnam Venkatesan and
                  Akshay Wadia},
  title        = {Founding Cryptography on Tamper-Proof Hardware Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalISVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GradwohlLR10,
  author       = {Ronen Gradwohl and
                  Noam Livne and
                  Alon Rosen},
  title        = {Sequential Rationality in Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GradwohlLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Granger10,
  author       = {Robert Granger},
  title        = {On the Static Diffie-Hellman Problem on Elliptic Curves over Extension
                  Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Granger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GratzerN10,
  author       = {Vanessa Gratzer and
                  David Naccache},
  title        = {How to Read a Signature?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GratzerN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Grechnikov10,
  author       = {Evgeny A. Grechnikov},
  title        = {Collisions for 72-step and 73-step {SHA-1:} Improvements in the Method
                  of Characteristics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Grechnikov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenH10,
  author       = {Matthew Green and
                  Susan Hohenberger},
  title        = {Practical Adaptive Oblivious Transfer from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenH10a,
  author       = {Matthew Green and
                  Susan Hohenberger},
  title        = {{CPA} and CCA-Secure Encryption Systems that are not 2-Circular Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenH10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrigorievS10,
  author       = {Dima Grigoriev and
                  Vladimir Shpilrain},
  title        = {Authentication schemes from actions on graphs, groups, or rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrigorievS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrigorievS10a,
  author       = {Dima Grigoriev and
                  Vladimir Shpilrain},
  title        = {No-leak authentication by the Sherlock Holmes method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrigorievS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GroceK10,
  author       = {Adam Groce and
                  Jonathan Katz},
  title        = {A New Framework for Password-Based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GroceK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuajardoM10,
  author       = {Jorge Guajardo and
                  Bart Mennink},
  title        = {Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt
                  Without Side-Channel Countermeasures?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuajardoM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronJW10,
  author       = {Shay Gueron and
                  Simon Johnson and
                  Jesse Walker},
  title        = {{SHA-512/256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronJW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoHNS10,
  author       = {Xu Guo and
                  Sinan Huang and
                  Leyla Nazhandali and
                  Patrick Schaumont},
  title        = {On The Impact of Target Technology in {SHA-3} Hardware Benchmark Rankings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/536},
  timestamp    = {Fri, 04 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoHNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerHRVW10,
  author       = {Iftach Haitner and
                  Thomas Holenstein and
                  Omer Reingold and
                  Salil P. Vadhan and
                  Hoeteck Wee},
  title        = {Universal One-Way Hash Functions via Inaccessible Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerHRVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerIKLP10,
  author       = {Iftach Haitner and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  title        = {Black-Box Constructions of Protocols for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerIKLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviK10,
  author       = {Shai Halevi and
                  Hugo Krawczyk},
  title        = {One-Pass {HMQV} and Asymmetric Key-Wrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS10,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Eavesdropping over Random Passwords via Keyboard Acoustic Emanations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaK10,
  author       = {Goichiro Hanaoka and
                  Kaoru Kurosawa},
  title        = {Between Hashed {DH} and Computational {DH:} Compact Encryption from
                  Weaker Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaW10,
  author       = {Goichiro Hanaoka and
                  Jian Weng},
  title        = {Generic Constructions of Parallel Key-Insulated Encryption: Stronger
                  Security Model and Novel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/468},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hao10,
  author       = {Feng Hao},
  title        = {On Robust Key Agreement Based on Public Key Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/136},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hao10a,
  author       = {Feng Hao},
  title        = {On Small Subgroup Non-confinement Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/149},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hao10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoK10,
  author       = {Feng Hao and
                  Matthew Nicolas Kreeger},
  title        = {Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic
                  Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/452},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoR10,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  title        = {{J-PAKE:} Authenticated Key Exchange Without {PKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/190},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaralambievJKS10,
  author       = {Kristiyan Haralambiev and
                  Tibor Jager and
                  Eike Kiltz and
                  Victor Shoup},
  title        = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman
                  in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaralambievJKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Harris10,
  author       = {Sandy Harris},
  title        = {The Eris hybrid cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Harris10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto10,
  author       = {Yasufumi Hashimoto},
  title        = {On small secret key attack against {RSA} with high bits known prime
                  factor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/657},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayashiSWMST10,
  author       = {Takuya Hayashi and
                  Naoyuki Shinohara and
                  Lihua Wang and
                  Shin'ichiro Matsuo and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Solving a 676-bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6n}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayashiSWMST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayL10,
  author       = {Carmit Hazay and
                  Yehuda Lindell},
  title        = {A Note on the Relation between the Definitions of Security for Semi-Honest
                  and Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayL10a,
  author       = {Carmit Hazay and
                  Yehuda Lindell},
  title        = {A Note on Zero-Knowledge Proofs of Knowledge and the {ZKPOK} Ideal
                  Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10a,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {A Random Number Generator Based on Isogenies Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10b,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Cryptanalysis of a DoS-resistant ID-based password authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10c,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Weaknesses of a dynamic ID-based remote user authentication scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10d,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key
                  Agreement Using Smart Card},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10e,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {On security of a remote user authentication scheme without using smart
                  cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10f,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Weaknesses of a dynamic ID-based remote user authentication scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10g,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Weakness of two ID-based remote mutual authentication with key agreement
                  protocols for mobile devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/606},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCHY10,
  author       = {Yi Jun He and
                  Tat Wing Chim and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination
                  Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCZ10,
  author       = {Debiao He and
                  Jianhua Chen and
                  Rui Zhang},
  title        = {Efficient and provably-secure certificateless signature scheme without
                  bilinear pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergLL10,
  author       = {Sven Heiberg and
                  Helger Lipmaa and
                  Filip van Laenen},
  title        = {On E-Vote Integrity in the Case of Malicious Voter Computers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayLO10,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Correlated Product Security From Any One-Way Function and the New
                  Notion of Decisional Correlated Product Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/100},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayLO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO10,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeneckaKS0W10,
  author       = {Wilko Henecka and
                  Stefan K{\"{o}}gl and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Immo Wehrenberg},
  title        = {{TASTY:} Tool for Automating Secure Two-partY computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeneckaKS0W10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergS10,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  title        = {Robust Combiner for Obfuscators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/202},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergS10a,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  title        = {Secure Guaranteed Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/449},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangR10,
  author       = {Viet Tung Hoang and
                  Phillip Rogaway},
  title        = {On generalized Feistel networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoerderWTP10,
  author       = {Simon Hoerder and
                  Marcin W{\'{o}}jcik and
                  Stefan Tillich and
                  Dan Page},
  title        = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor
                  Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoerderWTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW10,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Constructing Verifiable Random Functions with Large Input Spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HomsirikamolRG10,
  author       = {Ekawat Homsirikamol and
                  Marcin Rogawski and
                  Kris Gaj},
  title        = {Comparing Hardware Performance of Fourteen Round Two {SHA-3} Candidates
                  Using FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HomsirikamolRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongM10,
  author       = {Jin Hong and
                  Sunghwan Moon},
  title        = {A Comparison of Cryptanalytic Tradeoff Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Howgrave-GrahamJ10,
  author       = {Nick Howgrave{-}Graham and
                  Antoine Joux},
  title        = {New generic algorithms for hard knapsacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HsuC10,
  author       = {Ching{-}Fang Hsu and
                  Qi Cheng},
  title        = {On Representable Matroids and Ideal Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/232},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HsuC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IdeguchiTP10,
  author       = {Kota Ideguchi and
                  Elmar Tischhauser and
                  Bart Preneel},
  title        = {Improved Collision Attacks on the Reduced-Round Gr{\"{o}}stl
                  Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IdeguchiTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonicaJ10,
  author       = {Sorina Ionica and
                  Antoine Joux},
  title        = {Pairing computation on elliptic curves with efficiently computable
                  endomorphism and small embedding degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonicaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKKLP10,
  author       = {Yuval Ishai and
                  Jonathan Katz and
                  Eyal Kushilevitz and
                  Yehuda Lindell and
                  Erez Petrank},
  title        = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKKLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeS10,
  author       = {Takanori Isobe and
                  Taizo Shirai},
  title        = {Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on
                  Reduced Shabal-512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jacob10,
  author       = {St{\'{e}}phane Jacob},
  title        = {Cryptanalysis of a Fast Encryption Scheme for Databases and of its
                  Variant},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jacob10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacobsonSS10,
  author       = {Michael J. Jacobson Jr. and
                  Renate Scheidler and
                  Andreas Stein},
  title        = {Cryptographic Aspects of Real Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacobsonSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS10,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {Generic Compilers for Authenticated Key Exchange (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobsenMN10,
  author       = {Thomas P. Jakobsen and
                  Marc X. Makkes and
                  Janus Dam Nielsen},
  title        = {Efficient Implementation of the Orlandi Protocol Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobsenMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakubowskiVY10,
  author       = {Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan and
                  Yacov Yacobi},
  title        = {Quantifying Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakubowskiVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiBSL10,
  author       = {Stanislaw Jarecki and
                  Ali Bagherzandi and
                  Nitesh Saxena and
                  Yanbin Lu},
  title        = {Password-Protected Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiBSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JarvinenKS010,
  author       = {Kimmo J{\"{a}}rvinen and
                  Vladimir Kolesnikov and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  title        = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and
                  Evaluation of One-Time Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JarvinenKS010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanF10,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Pierre{-}Alain Fouque},
  title        = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256}
                  Compression Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeongLSH10,
  author       = {Kitae Jeong and
                  Yuseop Lee and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {A note on "Improved Fast Correlation Attacks on Stream Ciphers"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeongLSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jhanwar10,
  author       = {Mahabir Prasad Jhanwar},
  title        = {A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/495},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Jhanwar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiHZ10,
  author       = {Huifang Ji and
                  Wenbao Han and
                  Long Zhao},
  title        = {Certificateless generalized signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiHZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaCWW10,
  author       = {Keting Jia and
                  Jiazhe Chen and
                  Meiqin Wang and
                  Xiaoyun Wang},
  title        = {Practical-time Attack on the Full {MMB} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaCWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jiang10,
  author       = {Shaoquan Jiang},
  title        = {Timed Encryption and Its Application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {546},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/546},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jiang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinWZ10,
  author       = {Zhengping Jin and
                  Qiaoyan Wen and
                  Hua Zhang},
  title        = {A supplement to Liu et al.'s certificateless signcryption scheme in
                  the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Johnston10,
  author       = {Otto Johnston},
  title        = {A Discrete Logarithm Attack on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Johnston10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV10,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension
                  Fields. Application to the static Diffie-Hellman problem on E(F\({}_{\mbox{q\({}^{\mbox{5}}\)}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV10a,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {A variant of the {F4} algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeTV10,
  author       = {Marc Joye and
                  Mehdi Tibouchi and
                  Damien Vergnaud},
  title        = {Huff's Model for Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JumaV10,
  author       = {Ali Juma and
                  Yevgeniy Vahlis},
  title        = {On Protecting Cryptographic Keys Against Continual Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JumaV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JungkR10,
  author       = {Bernhard Jungk and
                  Steffen Reith},
  title        = {On FPGA-based implementations of Gr{\"{o}}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JungkR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kachisa10,
  author       = {Ezekiel J. Kachisa},
  title        = {Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kachisa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamalY10,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Applications of {SAT} Solvers to {AES} key Recovery from Decayed Key
                  Schedule Images},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamalY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaminsky10,
  author       = {Alan Kaminsky},
  title        = {Cube Test Analysis of the Statistical Behavior of CubeHash and Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaminsky10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarM10,
  author       = {Jayaprakash Kar and
                  Banshidhar Majhi},
  title        = {A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman
                  Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Karabina10,
  author       = {Koray Karabina},
  title        = {Torus-based compression by factor 4 and 6},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Karabina10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Karabina10a,
  author       = {Koray Karabina},
  title        = {Squaring in cyclotomic subgroups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Karabina10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara10,
  author       = {Masao Kasahara},
  title        = {A New Class of Public Key Cryptosystems Constructed Based on Perfect
                  Error-Correcting Codes Realizing Coding Rate of Exactly 1.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara10a,
  author       = {Masao Kasahara},
  title        = {A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting
                  Codes, Using {K(III)} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katta10,
  author       = {Sandeep Katta},
  title        = {Recursive Information Hiding in Visual Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzM10,
  author       = {Jonathan Katz and
                  Lior Malka},
  title        = {Constant-Round Private Function Evaluation with Linear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzV10,
  author       = {Jonathan Katz and
                  Vinod Vaikuntanathan},
  title        = {One-Round Password-Based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiNTX10,
  author       = {Akinori Kawachi and
                  Akira Numayama and
                  Keisuke Tanaka and
                  Keita Xagawa},
  title        = {Security of Encryption Schemes in Weakened Random Oracle Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiNTX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KayaS10,
  author       = {Kamer Kaya and
                  Ali Aydin Sel{\c{c}}uk},
  title        = {Secret Sharing Extensions based on the Chinese Remainder Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KayaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kazmi10,
  author       = {Raza Ali Kazmi},
  title        = {Isogenies and Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kazmi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhovratovichNR10,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic and
                  Christian Rechberger},
  title        = {Rotational Rebound Attacks on Reduced Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhovratovichNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimHPBDK10,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimN10,
  author       = {Kitae Kim and
                  Daehun Nyang},
  title        = {Security Analysis of a Threshold Proxy Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungAFLTBGKMORTZ10,
  author       = {Thorsten Kleinjung and
                  Kazumaro Aoki and
                  Jens Franke and
                  Arjen K. Lenstra and
                  Emmanuel Thom{\'{e}} and
                  Joppe W. Bos and
                  Pierrick Gaudry and
                  Alexander Kruppa and
                  Peter L. Montgomery and
                  Dag Arne Osvik and
                  Herman J. J. te Riele and
                  Andrey Timofeev and
                  Paul Zimmermann},
  title        = {Factorization of a 768-bit {RSA} modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungAFLTBGKMORTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlimaG10,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Danilo Gligoroski},
  title        = {Generic Collision Attacks on Narrow-pipe Hash Functions Faster than
                  Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and {SHA-3} Narrow-pipe
                  Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlimaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlincHJKR10,
  author       = {Demijan Klinc and
                  Carmit Hazay and
                  Ashish Jagmohan and
                  Hugo Krawczyk and
                  Tal Rabin},
  title        = {On Compression of Data Encrypted with Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlincHJKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobayashiIMSO10,
  author       = {Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Shin'ichiro Matsuo and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Evaluation of Hardware Performance for the {SHA-3} Candidates Using
                  {SASEBO-GII}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobayashiIMSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Koblitz10,
  author       = {Neal Koblitz},
  title        = {A Security Weakness in Composite-Order Pairing-Based Protocols with
                  Imbedding Degree k{\textgreater}2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Koblitz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM10,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Intractable Problems in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzMS10,
  author       = {Neal Koblitz and
                  Alfred Menezes and
                  Igor E. Shparlinski},
  title        = {Discrete Logarithms, Diffie-Hellman, and Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kolesnikov10,
  author       = {Vladimir Kolesnikov},
  title        = {A Security Enhancement and Proof for Authentication and Key Agreement
                  {(AKA)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kolesnikov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovS010,
  author       = {Vladimir Kolesnikov and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  title        = {From Dust to Dawn: Practically Efficient Two-Party Secure Function
                  Evaluation Protocols and their Modular Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovS010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KooYS10,
  author       = {Bonwook Koo and
                  Yongjin Yeom and
                  Jung Hwan Song},
  title        = {Related-Key Boomerang Attack on Block Cipher {SQUARE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KooYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KovtunS10,
  author       = {Vladyslav Kovtun and
                  Irina Sagir},
  title        = {Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic
                  Curves over Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KovtunS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KraschewskiM10,
  author       = {Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title        = {Completeness Theorems with Constructive Proofs for Finite Deterministic
                  2-Party Functions (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KraschewskiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrauseAF10,
  author       = {Matthias Krause and
                  Frederik Armknecht and
                  Ewan Fleischmann},
  title        = {Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing
                  Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/519},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrauseAF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krawczyk10,
  author       = {Hugo Krawczyk},
  title        = {Cryptographic Extraction and Key Derivation: The {HKDF} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krawczyk10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kumar10,
  author       = {Manoj Kumar},
  title        = {On the Security of a Novel Remote User Authentication Scheme using
                  Smart Card based on {ECDLP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kumar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarYK10,
  author       = {Manoj Kumar and
                  Pratibha Yadav and
                  Meena Kumari},
  title        = {Flaws in Differential Cryptanalysis of Reduced Round {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarYK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kunihiro10,
  author       = {Noboru Kunihiro},
  title        = {Solving Generalized Small Inverse Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kunihiro10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa10,
  author       = {Kaoru Kurosawa},
  title        = {Round-Efficient Perfectly Secure Message Transmission Scheme Against
                  General Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP10,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH}
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KushwahL10,
  author       = {Prashant Kushwah and
                  Sunder Lal},
  title        = {Efficient Generalized Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KushwahL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT10,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Ideal Key Derivation and Encryption in Simulation-based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV10,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Accountability: Definition and Relationship to Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV10a,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Proving Coercion-Resistance of Scantegrity {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerMRRS10,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Christian Rechberger and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerMRRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterMN10,
  author       = {Kristin E. Lauter and
                  Peter L. Montgomery and
                  Michael Naehrig},
  title        = {An Analysis of Affine Coordinates for Pairing Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterS10,
  author       = {Kristin E. Lauter and
                  Ning Shang},
  title        = {Generating Pairing-friendly Parameters for the {CM} Construction of
                  Genus 2 Curves over Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterY10,
  author       = {Kristin E. Lauter and
                  Tonghai Yang},
  title        = {Computing genus 2 curves from invariants on the Hilbert moduli space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leander10,
  author       = {Gregor Leander},
  title        = {Small Scale Variants Of The Block Cipher {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leander10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeS10,
  author       = {Jooyoung Lee and
                  John P. Steinberger},
  title        = {Multi-property-preserving Domain Extension Using Polynomial-based
                  Modes of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSS10,
  author       = {Jooyoung Lee and
                  Martijn Stam and
                  John P. Steinberger},
  title        = {The collision security of Tandem-DM in the ideal cipher model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSW10,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {The Fiat-Shamir Transform for Group and Ring Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeiXY10,
  author       = {Xinfeng Lei and
                  Rui Xue and
                  Ting Yu},
  title        = {Computational Soundness about Formal Encryption in the Presence of
                  Secret Shares and Key Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/467},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeiXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeiXY10a,
  author       = {Xinfeng Lei and
                  Rui Xue and
                  Ting Yu},
  title        = {A Timed Logic for Modeling and Reasoning about Security Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/645},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeiXY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent10,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Quantum Preimage and Collision Attacks on CubeHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoLW10,
  author       = {Allison B. Lewko and
                  Mark Lewko and
                  Brent Waters},
  title        = {How to Leak on Key Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoRW10,
  author       = {Allison B. Lewko and
                  Yannis Rouselakis and
                  Brent Waters},
  title        = {Achieving Leakage Resilience Through Dual System Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Decentralizing Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW10a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {On the Insecurity of Parallel Repetition for Leakage Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGSO10,
  author       = {Yang Li and
                  Shigeto Gomisawa and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {An Information Theoretic Perspective on the Differential Fault Analysis
                  against {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiHG10,
  author       = {Xuelian Li and
                  Yupu Hu and
                  Juntao Gao},
  title        = {The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiHG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSL10,
  author       = {Ruilin Li and
                  Bing Sun and
                  Chao Li},
  title        = {Impossible Differential Cryptanalysis of {SPN} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/307},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSL10a,
  author       = {Ruilin Li and
                  Bing Sun and
                  Chao Li},
  title        = {Some Observations on {MISTY} Structure with {SPN} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/661},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSL10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSLY10,
  author       = {Ruilin Li and
                  Bing Sun and
                  Chao Li and
                  Jianxiong You},
  title        = {Differential Fault Analysis on {SMS4} Using a Single Fault},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/063},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW10,
  author       = {Yun{-}qiang Li and
                  Ai{-}lan Wang},
  title        = {Near Collisions for the Compress Function of Hamsi-256 Found by Genetic
                  Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW10a,
  author       = {Yongqiang Li and
                  Mingsheng Wang},
  title        = {On permutation polynomials EA-equivalent to the inverse function over
                  GF(2\({}^{\mbox{n}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/573},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiY10,
  author       = {Lei Li and
                  Siman Yang},
  title        = {Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite
                  Field of Even Characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinP10,
  author       = {Huijia Lin and
                  Rafael Pass},
  title        = {Constant-round Non-Malleable Commitments from Any One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinZ10,
  author       = {Qiping Lin and
                  Fangguo Zhang},
  title        = {Halving on Binary Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell10,
  author       = {Yehuda Lindell},
  title        = {Constant-Round Zero-Knowledge Proofs of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellP10,
  author       = {Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindnerP10a,
  author       = {Richard Lindner and
                  Chris Peikert},
  title        = {Better Key Sizes (and Attacks) for LWE-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindnerP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liu10,
  author       = {Feng Liu},
  title        = {One-round and authenticated three-party multiple key exchange protocol
                  from parings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liu10a,
  author       = {Feng Liu},
  title        = {Two improved authenticated multiple key exchange protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liu10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZ10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou},
  title        = {Online/Offline Identity-Based Signcryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZYW10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou and
                  Yanjiang Yang and
                  Jun Wen Wong},
  title        = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor
                  Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBZYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuC10,
  author       = {Zhen Liu and
                  Zhenfu Cao},
  title        = {On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix
                  in Ciphertext-Policy Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW10,
  author       = {Feng Liu and
                  Chuankun Wu},
  title        = {Embedded Extended Visual Cryptography Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW10a,
  author       = {Feng Liu and
                  Chuan Kun Wu},
  title        = {Optimal {XOR} based (2, n)-Visual Cryptography Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuY10,
  author       = {Jing Liu and
                  Bo Yang},
  title        = {Homomorphic One-Way Function Trees and Application in Collusion-Free
                  Multicast Key Distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoftusMSV10,
  author       = {Jake Loftus and
                  Alexander May and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {On CCA-Secure Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LoftusMSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaG10,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  title        = {Efficient Techniques for High-Speed Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaG10a,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  title        = {Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography
                  on x86-64 based Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/335},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaG10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu10,
  author       = {Jiqiang Lu},
  title        = {New Methodologies for Differential-Linear Cryptanalysis and Its Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu10b,
  author       = {Jiqiang Lu},
  title        = {Differential Attack on Five Rounds of the {SC2000} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/593},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu10c,
  author       = {Yang Lu},
  title        = {Further Observations on Certificate-Base Encryption and its Generic
                  Construction from Certificateless Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/619},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuZ10,
  author       = {Jian{-}Zhu Lu and
                  Jipeng Zhou},
  title        = {On the Security of an Efficient Mobile Authentication Scheme for Wireless
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoHC10,
  author       = {Song Luo and
                  Jian{-}bin Hu and
                  Zhong Chen},
  title        = {New Construction of Identity-based Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL10,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {More Insights on Blockcipher-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LysyanskayaS10,
  author       = {Anna Lysyanskaya and
                  Aaron Segal},
  title        = {Rational Secret Sharing with Side Information in Point-to-Point Networks
                  via Time-Delayed Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LysyanskayaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaYS10,
  author       = {Wenping Ma and
                  Chen Yang and
                  Shaohui Sun},
  title        = {Golay Complementary Sequences Over the {QAM} Constellation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaYS10a,
  author       = {Wenping Ma and
                  Chen Yang and
                  Shaohui Sun},
  title        = {New Methods to Construct Golay Complementary Sequences Over the {QAM}
                  Constellation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaYS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR10,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {A Zero-One Law for Deterministic 2-Party Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/098},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR10a,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/595},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalaDS10,
  author       = {Hamid Mala and
                  Mohammad Dakhilalian and
                  Mohsen Shakiba},
  title        = {Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalaDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkaK10,
  author       = {Lior Malka and
                  Jonathan Katz},
  title        = {VMCrypt - Modular Software Architecture for Scalable Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/584},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkaK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinTVY10,
  author       = {Tal Malkin and
                  Isamu Teranishi and
                  Yevgeniy Vahlis and
                  Moti Yung},
  title        = {Signatures Resilient to Continual Leakage on Memory and Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinTVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisP10,
  author       = {Mark Manulis and
                  Bertram Poettering},
  title        = {Practical Affiliation-Hiding Authentication from Improved Polynomial
                  Interpolation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Matt10,
  author       = {Brian J. Matt},
  title        = {Identification of Multiple Invalid Pairing-based Signatures in Constrained
                  Batches},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Matt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McKayV10,
  author       = {Kerry A. McKay and
                  Poorvi L. Vora},
  title        = {Pseudo-Linear Approximations for {ARX} Ciphers: With Application to
                  Threefish},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McKayV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MehtaAS10,
  author       = {Abhinav Mehta and
                  Shashank Agrawal and
                  Kannan Srinathan},
  title        = {Interplay between (Im)perfectness, Synchrony and Connectivity: The
                  Case of Reliable Message Transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MehtaAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeiLLJ10,
  author       = {Qixiang Mei and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia},
  title        = {Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/172},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeiLLJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeiklejohnSF10,
  author       = {Sarah Meiklejohn and
                  Hovav Shacham and
                  David Mandell Freeman},
  title        = {Limitations on Transformations from Composite-Order to Prime-Order
                  Groups: The Case of Round-Optimal Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeiklejohnSF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MengkeJ10,
  author       = {H. U. Mengke and
                  G. A. O. Juntao},
  title        = {Key-Controlled Order-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MengkeJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerWI10,
  author       = {Ulrike Meyer and
                  Susanne Wetzel and
                  Sotiris Ioannidis},
  title        = {New Advances on Privacy-Preserving Policy Reconciliation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerWI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoloneyOL10,
  author       = {Richard Moloney and
                  Aidan O'Mahony and
                  Pierre Laurent},
  title        = {Efficient Implementation of Elliptic Curve Point Operations Using
                  Binary Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoloneyOL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moody10,
  author       = {Dustin Moody},
  title        = {Mean value formulas for twisted Edwards curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Moody10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moody10a,
  author       = {Dustin Moody},
  title        = {Divison Polynomials for Alternate Models of Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Moody10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiME10,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Thomas Eisenbarth},
  title        = {Correlation-Enhanced Power Analysis Collision Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiME10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorawieckiS10,
  author       = {Pawel Morawiecki and
                  Marian Srebrny},
  title        = {A SAT-based preimage analysis of reduced {KECCAK} hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorawieckiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MroczkowskiS10,
  author       = {Piotr Mroczkowski and
                  Janusz Szmidt},
  title        = {The Cube Attack on Stream Cipher Trivium and Quadraticity Tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MroczkowskiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaehrigNS10,
  author       = {Michael Naehrig and
                  Ruben Niederhagen and
                  Peter Schwabe},
  title        = {New software speed records for cryptographic pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaehrigNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nagao10,
  author       = {Koh{-}ichi Nagao},
  title        = {On the complexity of Decomposition Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nagao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naito10,
  author       = {Yusuke Naito},
  title        = {Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naito10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nam10,
  author       = {Junghyun Nam},
  title        = {A Security Weakness in a Generic Construction of a Group Key Exchange
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nam10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi10,
  author       = {Mridul Nandi},
  title        = {A Unified Method for Improving {PRF} Bounds for a Class of Blockcipher
                  based MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NandiP10,
  author       = {Mridul Nandi and
                  Souradyuti Paul},
  title        = {Speeding Up The Widepipe: Secure and Fast Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NandiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naya-Plasencia10,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {How to Improve Rebound Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naya-Plasencia10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenR10,
  author       = {Long Hoang Nguyen and
                  A. W. Roscoe},
  title        = {Authentication protocols based on low-bandwidth unspoofable channels:
                  a comparative survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/206},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiebuhrMBB10,
  author       = {Robert Niebuhr and
                  Mohammed Meziani and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {Selecting Parameters for Secure McEliece-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/271},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NiebuhrMBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Niitsoo10,
  author       = {Margus Niitsoo},
  title        = {Optimal Adversary Behavior for the Serial Model of Financial Attack
                  Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Niitsoo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingX10,
  author       = {Chao Ning and
                  Qiuliang Xu},
  title        = {Multiparty Computation for Modulo Reduction without Bit-Decomposition
                  and {A} Generalization to Bit-Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Novotney10,
  author       = {Peter Novotney},
  title        = {Distinguisher for Shabal's Permutation Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Novotney10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NowakZ10,
  author       = {David Nowak and
                  Yu Zhang},
  title        = {A calculus for game-based security proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NowakZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nuida10,
  author       = {Koji Nuida},
  title        = {Short collusion-secure fingerprint codes against three pirates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nuida10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaH10,
  author       = {Koji Nuida and
                  Goichiro Hanaoka},
  title        = {On the Security of Pseudorandomized Information-Theoretically Secure
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeill10a,
  author       = {Adam O'Neill},
  title        = {Definitional Issues in Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeill10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OguraKUO10,
  author       = {Naoki Ogura and
                  Naoki Kanayama and
                  Shigenori Uchiyama and
                  Eiji Okamoto},
  title        = {Cryptographic Pairings Based on Elliptic Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OguraKUO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OhkuboMHSO10,
  author       = {Miyako Ohkubo and
                  Shin'ichiro Matsuo and
                  Yoshikazu Hanatani and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Robust {RFID} Authentication Protocol with Formal Proof and Its Feasibility},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OhkuboMHSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT10,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Fully Secure Functional Encryption with General Relations from the
                  Decisional Linear Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliveiraL10,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  title        = {Improving the performance of Luffa Hash Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/457},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliveiraL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanD10,
  author       = {Yanbin Pan and
                  Yingpu Deng},
  title        = {A Broadcast Attack against {NTRU} Using Ding's Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/598},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanFZ10,
  author       = {Sen{-}Shan Pan and
                  Xiao{-}Tong Fu and
                  Wei{-}Guo Zhang},
  title        = {Construction of 1-Resilient Boolean Functions with Optimal Algebraic
                  Immunity and Good Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanFZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapamanthouTT10,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Optimal Verification of Operations on Dynamic Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapamanthouTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin10,
  author       = {Jacques Patarin},
  title        = {Transfinite Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin10a,
  author       = {Jacques Patarin},
  title        = {Introduction to Mirror Theory: Analysis of Systems of Linear Equalities
                  and Linear Non Equalities for Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin10b,
  author       = {Jacques Patarin},
  title        = {Security of balanced and unbalanced Feistel Schemes with Linear Non
                  Equalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonQ10,
  author       = {Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Time-Specific Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonW10,
  author       = {Kenneth G. Paterson and
                  Gaven J. Watson},
  title        = {Plaintext-Dependent Decryption: {A} Formal Security Treatment of {SSH-CTR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patra10,
  author       = {Arpita Patra},
  title        = {Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patra10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraCR10,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan},
  title        = {Communication Efficient Perfectly Secure {VSS} and {MPC} in Asynchronous
                  Networks with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulMR10,
  author       = {Goutam Paul and
                  Subhamoy Maitra and
                  Shashwat Raizada},
  title        = {A Combinatorial Analysis of {HC-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pavlov10,
  author       = {Andrey V. Pavlov},
  title        = {Bent functions at the minimal distance and algorithms of constructing
                  linear codes for {CDMA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pavlov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Peikert10,
  author       = {Chris Peikert},
  title        = {An Efficient and Parallel Gaussian Sampler for Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Peikert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeritoT10,
  author       = {Daniele Perito and
                  Gene Tsudik},
  title        = {Secure Code Update for Embedded Devices via Proofs of Secure Erasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeritoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetzoldtBB10,
  author       = {Albrecht Petzoldt and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {CyclicRainbow - {A} multivariate Signature Scheme with a Partially
                  Cyclic Public Key based on Rainbow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/424},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetzoldtBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetzoldtBB10a,
  author       = {Albrecht Petzoldt and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {Selecting Parameters for the Rainbow Signature Scheme - Extended Version
                  -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/437},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetzoldtBB10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Peyrin10,
  author       = {Thomas Peyrin},
  title        = {Improved Differential Attacks for {ECHO} and Grostl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Peyrin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PillaiBKC10,
  author       = {N. Rajesh Pillai and
                  S. S. Bedi and
                  Sanjay Kumar and
                  Roopika Chaudhary},
  title        = {Relation for Algebraic Attack on {E0} combiner},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PillaiBKC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasR10,
  author       = {Benny Pinkas and
                  Tzachy Reinman},
  title        = {Oblivious {RAM} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Plotnikov10,
  author       = {Anatoly D. Plotnikov},
  title        = {Logical cryptoanalysis on the example of the cryptosystem {DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Plotnikov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Popov10,
  author       = {M. A. Popov},
  title        = {Cubic groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Popov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffM10,
  author       = {Emmanuel Prouff and
                  Robert P. McEvoy},
  title        = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
                  - Extended Version -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffRB10,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain and
                  R{\'{e}}gis Bevan},
  title        = {Statistical Analysis of Second Order Differential Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffRB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrzydatekW10,
  author       = {Bartosz Przydatek and
                  Douglas Wikstr{\"{o}}m},
  title        = {Group Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrzydatekW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RahmanMAEMO10,
  author       = {Sk. Md. Mizanur Rahman and
                  Mehedi Masud and
                  Carlisle Adams and
                  Khalil El{-}Khatib and
                  Hussein T. Mouftah and
                  Eiji Okamoto},
  title        = {Pair-wise Cryptographic Models for Secure Data Exchange in {P2P} Database
                  Management Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RahmanMAEMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rckert10,
  author       = {Markus R{\"{u}}ckert},
  title        = {Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures
                  from Lattices without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rckert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RebeiroM10,
  author       = {Chester Rebeiro and
                  Debdeep Mukhopadhyay},
  title        = {Differential Cache Trace Attack Against {CLEFIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RebeiroM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyhanitabarSM10,
  author       = {Mohammad Reza Reyhanitabar and
                  Willy Susilo and
                  Yi Mu},
  title        = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions
                  and Relationships},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyhanitabarSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rijmen10,
  author       = {Vincent Rijmen},
  title        = {Practical-Titled Attack on {AES-128} Using Chosen-Text Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rijmen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivainP10,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff},
  title        = {Provably Secure Higher-Order Masking of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivainP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rjasko10,
  author       = {Michal Rjasko},
  title        = {Combining properties of cryptographic hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/524},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rjasko10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rjasko10a,
  author       = {Michal Rjasko},
  title        = {Black-box property of Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rjasko10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RjaskoS10,
  author       = {Michal Rjasko and
                  Martin Stanek},
  title        = {On Designated Verifier Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RjaskoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RjaskoS10a,
  author       = {Michal Rjasko and
                  Martin Stanek},
  title        = {Attacking M{\&}M Collective Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RjaskoS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ruckert010,
  author       = {Markus R{\"{u}}ckert and
                  Michael Schneider},
  title        = {Estimating the Security of Lattice-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ruckert010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ruckert0S10,
  author       = {Markus R{\"{u}}ckert and
                  Michael Schneider and
                  Dominique Schr{\"{o}}der},
  title        = {Generic Constructions for Verifiably Encrypted Signatures without
                  Random Oracles or NIZKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ruckert0S10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rudskoy10,
  author       = {Vladimir Rudskoy},
  title        = {On zero practical significance of "Key recovery attack on full {GOST}
                  block cipher with zero time and memory"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rudskoy10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuhrmairSSDDS10,
  author       = {Ulrich R{\"{u}}hrmair and
                  Frank Sehnke and
                  Jan S{\"{o}}lter and
                  Gideon Dror and
                  Srinivas Devadas and
                  J{\"{u}}rgen Schmidhuber},
  title        = {Modeling Attacks on Physical Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RuhrmairSSDDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen10,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {The {PASSERINE} Public Key Encryption and Authentication Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SagolsM10,
  author       = {Feliu Sagols and
                  Guillermo Morales{-}Luna},
  title        = {Two identification protocols based on Cayley graphs of Coxeter groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SagolsM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid10,
  author       = {Gideon Samid},
  title        = {Binomial Sieve Series - a Prospective Cryptographic Tool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanA10,
  author       = {Ismail San and
                  Nuray At},
  title        = {Enhanced {FPGA} Implementation of the Hummingbird Cryptographic Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM10,
  author       = {Santanu Sarkar and
                  Subhamoy Maitra},
  title        = {Some Applications of Lattice Based Root Finding Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM10a,
  author       = {Santanu Sarkar and
                  Subhamoy Maitra},
  title        = {Cryptanalysis of Dual {CRT-RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarM10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarSC10,
  author       = {Pinaki Sarkar and
                  Amrita Saha and
                  Morshed U. Chowdhury},
  title        = {Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st
                  Order Reed Muller Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarrEB10,
  author       = {Augustin P. Sarr and
                  Philippe Elbaz{-}Vincent and
                  Jean{-}Claude Bajard},
  title        = {A New Security Model for Authenticated Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarrEB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schelkunov10,
  author       = {Dmitry Schelkunov},
  title        = {White-Box Cryptography and {SPN} ciphers. {LRC} method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schelkunov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schlaffer10,
  author       = {Martin Schl{\"{a}}ffer},
  title        = {Subspace Distinguisher for 5/8 Rounds of the {ECHO-256} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schlaffer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schlaffer10a,
  author       = {Martin Schl{\"{a}}ffer},
  title        = {Improved Collisions for Reduced {ECHO-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schlaffer10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schmidt10,
  author       = {Dieter Schmidt},
  title        = {1024XKS - {A} High Security Software Oriented Block Cipher Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schmidt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchropferKM10,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchropferKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVNR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  S. Gopi Nath and
                  C. Pandu Rangan},
  title        = {Identity Based Self Delegated Signature - Self Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVPR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  S. Priti and
                  C. Pandu Rangan},
  title        = {On the Security of Identity Based Threshold Unsigncryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Security Weaknesses in Two Certificateless Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Online/Offline Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10b,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Public Verifiable Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10c,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Online/Offline Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10d,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {{CCA2} Secure Certificateless Encryption Schemes Based on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVSR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  J. Shriram and
                  C. Pandu Rangan},
  title        = {Identity Based Partial Aggregate Signature Scheme Without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVSR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Semaev10,
  author       = {Igor A. Semaev},
  title        = {Improved Agreeing-Gluing Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Semaev10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SertkayaD10,
  author       = {Isa Sertkaya and
                  Ali Doganaksoy},
  title        = {On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SertkayaD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shao10,
  author       = {Zuhua Shao},
  title        = {Strong designated verifier signature scheme: new definition and construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCL10,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Peng Liu},
  title        = {CCA-Secure {PRE} Scheme without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/112},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shareef10,
  author       = {Amjed Shareef},
  title        = {Rational Secret Sharing without Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shareef10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shareef10a,
  author       = {Amjed Shareef},
  title        = {Collusion Free Protocol for Rational Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shareef10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shareef10b,
  author       = {Amjed Shareef},
  title        = {Distributed Rational Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shareef10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShareefAR10,
  author       = {Amjed Shareef and
                  Akshay Agrawal and
                  C. Pandu Rangan},
  title        = {Collusion Free Protocol for Correlated Element Selection Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShareefAR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinKI10,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Hideki Imai},
  title        = {Security Proof of AugPAKE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinKI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shirase10,
  author       = {Masaaki Shirase},
  title        = {Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing
                  Pairing-Friendly Curves -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shirase10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoensPP10,
  author       = {Koen Simoens and
                  Roel Peeters and
                  Bart Preneel},
  title        = {Increased Resilience in Threshold Cryptography: Sharing a Secret with
                  Devices That Cannot Store Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimoensPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoneS10,
  author       = {Antonino Simone and
                  Boris Skoric},
  title        = {Accusation probabilities in Tardos codes: the Gaussian approximation
                  is better than we thought},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimoneS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyshlyaev10,
  author       = {Stanislav Smyshlyaev},
  title        = {Perfectly Balanced Boolean Functions and Golic Conjecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyshlyaev10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  title        = {The World is Not Enough: Another Look on Second-Order {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StebilaKRBN10,
  author       = {Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Jothi Rangasamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Stronger difficulty notions for client puzzles and denial-of-service-resistant
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StebilaKRBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StehleS10,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Faster Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StehleS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinwandtC10,
  author       = {Rainer Steinwandt and
                  Adriana Su{\'{a}}rez Corona},
  title        = {Attribute-based group key establishment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinwandtC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Strenzke10,
  author       = {Falko Strenzke},
  title        = {How to implement the public Key Operations in Code-based Cryptography
                  on Memory-constrained Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Strenzke10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWWD10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Shuang Wu and
                  Le Dong},
  title        = {Near-Collisions on the Reduced-Round Compression Functions of Skein
                  and {BLAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/355},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWZ10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Wentao Zhang},
  title        = {Differential Cryptanalysis of {SMS4} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  title        = {Some Observations on {TWIS} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuppakitpaisarnEI10,
  author       = {Vorapong Suppakitpaisarn and
                  Masato Edahiro and
                  Hiroshi Imai},
  title        = {Optimal Average Joint Hamming Weight and Minimal Weight Conversion
                  of d Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuppakitpaisarnEI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiF10,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Differential Fault Analysis on {AES} with 192 and 256-Bit Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakahashiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TanakaS10,
  author       = {Naoki Tanaka and
                  Taiichi Saito},
  title        = {On the q-Strong Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TanakaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tang10,
  author       = {Qiang Tang},
  title        = {A Reflection on the Security of Two-Party Key Establishment Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/174},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangMZGDSL10,
  author       = {Ming Tang and
                  Qingshu Meng and
                  Huanguo Zhang and
                  Si Gao and
                  Qin Dou and
                  Fei Shen and
                  Du Li},
  title        = {Evolutionary Cipher against Differential Power Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/167},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangMZGDSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangSLL10,
  author       = {Xuehai Tang and
                  Bing Sun and
                  Ruilin Li and
                  Chao Li},
  title        = {A Meet-in-the-Middle Attack on {ARIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/168},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangSLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangTZH10,
  author       = {Xiaohu Tang and
                  Deng Tang and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity
                  and Very High Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangTZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangZT10,
  author       = {Deng Tang and
                  WeiGuo Zhang and
                  Xiaohu Tang},
  title        = {Construction of Balanced Boolean Functions with High Nonlinearity
                  and Good Autocorrelation Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/362},
  timestamp    = {Sun, 19 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangZT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TantiD10,
  author       = {Bhavin Tanti and
                  Nishant Doshi},
  title        = {A secure email login system using virtual password},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TantiD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TeoSD10,
  author       = {Sui{-}Guan Teo and
                  Leonie Simpson and
                  Ed Dawson},
  title        = {Bias in the nonlinear filter generator output sequence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TeoSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TeoWSD10,
  author       = {Sui{-}Guan Teo and
                  Kenneth Koon{-}Ho Wong and
                  Leonie Simpson and
                  Ed Dawson},
  title        = {State convergence and keyspace reduction of the Mixer stream cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TeoWSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tezcan10,
  author       = {Cihangir Tezcan},
  title        = {The Improbable Differential Attack: Cryptanalysis of Reduced Round
                  {CLEFIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tezcan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ThomaeW10,
  author       = {Enrico Thomae and
                  Christopher Wolf},
  title        = {Unravel {XL} and its variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ThomaeW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tokareva10,
  author       = {Natalia N. Tokareva},
  title        = {Automorphism group of the set of all bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tokareva10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsujiiG10,
  author       = {Shigeo Tsujii and
                  Masahito Gotaishi},
  title        = {Enhanced {STS} using Check Equation -Extended Version of the Signature
                  scheme proposed in the PQCrypt2010-},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsujiiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsujiiGTF10,
  author       = {Shigeo Tsujii and
                  Masahito Gotaishi and
                  Kohtaro Tadaki and
                  Ryou Fujita},
  title        = {Proposal of a Signature Scheme based on {STS} Trapdoor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsujiiGTF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuD10,
  author       = {Ziran Tu and
                  Yingpu Deng},
  title        = {A Class of 1-Resilient Function with High Nonlinearity and Algebraic
                  Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TuD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuD10a,
  author       = {Ziran Tu and
                  Yingpu Deng},
  title        = {Boolean functions with all main cryptographic properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TuD10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh10,
  author       = {Dominique Unruh},
  title        = {Quantum Proofs of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh10a,
  author       = {Dominique Unruh},
  title        = {Concurrent composition in the bounded quantum storage model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh10b,
  author       = {Dominique Unruh},
  title        = {The impossibility of computationally sound {XOR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh10c,
  author       = {Dominique Unruh},
  title        = {Termination-Insensitive Computational Indistinguishability (and applications
                  to computational soundness)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vasef10,
  author       = {Mehdi Vasef},
  title        = {A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic
                  Problem and Quaternion Algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vasef10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WalkerL10,
  author       = {Jesse Walker and
                  Jiangtao Li},
  title        = {Key Exchange with Anonymous Authentication using {DAA-SIGMA} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WalkerL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang10,
  author       = {Yongge Wang},
  title        = {Insecure "Provably Secure Network Coding" and Homomorphic Authentication
                  Schemes for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang10a,
  author       = {Jin Wang},
  title        = {Ring Signature and Identity-Based Ring Signature from Lattice Basis
                  Delegation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangB10,
  author       = {Jin Wang and
                  Jingguo Bi},
  title        = {Lattice-based Identity-Based Broadcast Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangLTB10,
  author       = {Xiaoyun Wang and
                  Mingjie Liu and
                  Chengliang Tian and
                  Jingguo Bi},
  title        = {Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangLTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWZL10,
  author       = {Hong Wang and
                  Kunpeng Wang and
                  Lijun Zhang and
                  Bao Li},
  title        = {Pairing Computation on Elliptic Curves of Jacobi Quartic Form},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/475},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWZZ10,
  author       = {Mingqiang Wang and
                  Xiaoyun Wang and
                  Tao Zhan and
                  Yuliang Zheng},
  title        = {Skew-Frobenius map on twisted Edwards curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/005},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangY10,
  author       = {Xu An Wang and
                  Xiaoyuan Yang},
  title        = {Cryptanalysis of Two Efficient {HIBE} Schemes in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/113},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ10,
  author       = {Hou{-}Zhen Wang and
                  Huanguo Zhang},
  title        = {Hash-based Multivariate Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiLH10,
  author       = {Yongzhuang Wei and
                  Jiqiang Lu and
                  Yupu Hu},
  title        = {Meet-in-the-Middle Attack on 8 Rounds of the {AES} Block Cipher under
                  192 Key Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiZ10,
  author       = {Ruizhong Wei and
                  Z. Zeng},
  title        = {{KIST:} {A} new encryption algorithm based on splay},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengCYDCB10,
  author       = {Jian Weng and
                  Min{-}Rong Chen and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Kefei Chen and
                  Feng Bao},
  title        = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption
                  Model without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/265},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengCYDCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengZ10,
  author       = {Jian Weng and
                  Yunlei Zhao},
  title        = {On the Security of a Bidirectional Proxy Re-Encryption Scheme from
                  {PKC} 2010},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/319},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP10,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {MQ\({}^{\mbox{*}}\)-IP: An Identity-based Identification Scheme without
                  Number-theoretic Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WongB10,
  author       = {Kenneth Koon{-}Ho Wong and
                  Gregory V. Bard},
  title        = {Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph
                  Partitioning on Equation Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WongB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuF10,
  author       = {Hongfeng Wu and
                  Rongquan Feng},
  title        = {Elliptic curves in Huff 's model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuO10,
  author       = {Jiang Wu and
                  M{\'{a}}ire O'Neill},
  title        = {On Foundation and Construction of Physical Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuTF10,
  author       = {Hongfeng Wu and
                  Chunming Tang and
                  Rongquan Feng},
  title        = {A New Model of Binary Elliptic Curves with Fast Arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/608},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuTF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWY10,
  author       = {Shengbao Wu and
                  Mingsheng Wang and
                  Zheng Yuan},
  title        = {A Flaw in The Internal State Recovery Attack on {ALPHA-MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XU10,
  author       = {Jia Xu},
  title        = {Authenticating Aggregate Range Queries over Dynamic Multidimensional
                  Dataset},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XieF10,
  author       = {Tao Xie and
                  Dengguo Feng},
  title        = {Construct {MD5} Collisions Using Just {A} Single Block Of Message},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/643},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XieF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XieZ10,
  author       = {Wenjian Xie and
                  Zhang Zhang},
  title        = {Certificateless Signcryption without Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XieZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu10,
  author       = {Jia Xu},
  title        = {A New Joint Fingerprinting and Decryption Scheme based on a Lattice
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC10,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  title        = {Authenticating Aggregate Range Queries over Multidimensional Dataset},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuJ10,
  author       = {Peng Xu and
                  Hai Jin},
  title        = {Public-Key Encryption with Fuzzy Keyword Search: {A} Provably Secure
                  Scheme under Keyword Guessing Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/626},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yacobi10,
  author       = {Yacov Yacobi},
  title        = {Towards a Theory of Trust Based Collaborative Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yacobi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa10,
  author       = {Masahiro Yagisawa},
  title        = {A Digital Signature Using Multivariate Functions on Quaternion Ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa10a,
  author       = {Masahiro Yagisawa},
  title        = {Key Agreement Protocols Based on Multivariate Algebraic Equations
                  on Quaternion Ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa10b,
  author       = {Masahiro Yagisawa},
  title        = {Key Agreement Protocols Using Multivariate Equations on Non-commutative
                  Ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa10c,
  author       = {Masahiro Yagisawa},
  title        = {Key Agreement Protocols Based on Multivariate Polynomials over Fq},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yao10,
  author       = {Xigen Yao},
  title        = {{LAB} Form for Iterated Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yao10a,
  author       = {Xigen Yao},
  title        = {Active Domain Expansion for Normal Narrow-pipe Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yao10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoYZ10,
  author       = {Andrew C. Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Concurrent Knowledge Extraction in the Public-Key Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoYZ10a,
  author       = {Andrew C. Yao and
                  Moti Yung and
                  Yunlei Zhao},
  title        = {Adaptive Concurrent Non-Malleability with Bare Public-Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoYZ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YapKP10,
  author       = {Huihui Yap and
                  Khoongming Khoo and
                  Axel Poschmann},
  title        = {Parallelizing the Camellia and {SMS4} Block Ciphers - Extended version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YapKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yarrkov10,
  author       = {Elias Yarrkov},
  title        = {Cryptanalysis of {XXTEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yarrkov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yarrkov10a,
  author       = {Elias Yarrkov},
  title        = {Cryptanalysis of block EnRUPT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yarrkov10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YouLSL10,
  author       = {Jianxiong You and
                  Ruilin Li and
                  Bing Sun and
                  Chao Li},
  title        = {Improved Fault Attack on {FOX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/166},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YouLSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuW10,
  author       = {Hongbo Yu and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of the Compression Function of {SIMD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yuan10,
  author       = {Zheng Yuan},
  title        = {New Impossible Di{\textregistered}erential Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yuan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanR10,
  author       = {Zheng Yuan and
                  Jintao Liu and
                  Xiaoqiu Ren},
  title        = {Distinguishing Attacks on {MAC/HMAC} Based on {A} New Dedicated Compression
                  Function Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuanR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zanger10,
  author       = {Daniel Z. Zanger},
  title        = {Exponential Bounds for Information Leakage in Unknown-Message Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zanger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZaveruchaS10,
  author       = {Gregory M. Zaverucha and
                  Douglas R. Stinson},
  title        = {Short One-Time Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZaveruchaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengCSH10,
  author       = {Xiangyong Zeng and
                  Claude Carlet and
                  Jinyong Shan and
                  Lei Hu},
  title        = {Balanced Boolean Functions with Optimum Algebraic Immunity and High
                  Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengCSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengTH10,
  author       = {Bing Zeng and
                  Xueming Tang and
                  Ching{-}Fang Hsu},
  title        = {A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/199},
  timestamp    = {Wed, 05 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengTH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang10a,
  author       = {Zhifang Zhang},
  title        = {Unconditionally Secure Rational Secret Sharing in Standard Communication
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangC10,
  author       = {Yang Zhang and
                  Junliang Chen},
  title        = {Efficient Access Control of Sensitive Data Service in Outsourcing
                  Scenarios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLW10,
  author       = {Meiling Zhang and
                  Jingmei Liu and
                  Xinmei Wang},
  title        = {the upper bounds on differntial characteristics in block cipher {SMS4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWQD10,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Bo Qin and
                  Josep Domingo{-}Ferrer},
  title        = {Identity-Based Authenticated Asymmetric Group Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWQD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangX10,
  author       = {WeiGuo Zhang and
                  GuoZhen Xiao},
  title        = {Construction of Highly Nonlinear Resilient Boolean Functions Satisfying
                  Strict Avalanche Criterion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoFG10,
  author       = {Shang{-}Wei Zhao and
                  Ruyong Feng and
                  Xiao{-}Shan Gao},
  title        = {On Functional Decomposition of Multivariate Polynomials with Differentiation
                  and Homogenization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoGG10,
  author       = {Jianjie Zhao and
                  Dawu Gu and
                  M. Choudary Gorantla},
  title        = {Stronger Security Model of Group Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoW10,
  author       = {Xin{-}jie Zhao and
                  Tao Wang},
  title        = {Further Improved Differential Fault Analysis on Camellia by Exploring
                  Fault Width and Depth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoW10a,
  author       = {Xin{-}jie Zhao and
                  Tao Wang},
  title        = {Improved Cache Trace Attack on {AES} and {CLEFIA} by Considering Cache
                  Miss and S-box Misalignment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWG10,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Jing{-}zhe Gao},
  title        = {Multiple Bytes Differential Fault Analysis on {CLEFIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZX10,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Faster Computation of Self-pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengQ10,
  author       = {Qunxiong Zheng and
                  Wenfeng Qi},
  title        = {A new result on the distinctness of primitive sequences over Z(pq)
                  modulo 2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/622},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongL10,
  author       = {Jinmin Zhong and
                  Xuejia Lai},
  title        = {Improved Preimage Attack on One-block {MD4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouH10,
  author       = {Zhibin Zhou and
                  Dijiang Huang},
  title        = {On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/395},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuAHW10,
  author       = {Yan Zhu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Huaixi Wang},
  title        = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuAHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuHWHA10,
  author       = {Yan Zhu and
                  Zexing Hu and
                  Huaixi Wang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn},
  title        = {A Collaborative Framework for Privacy Protection in Online Social
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuHWHA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuWHAHY10,
  author       = {Yan Zhu and
                  Huaixi Wang and
                  Zexing Hu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Stephen S. Yau},
  title        = {Efficient provable data possession for hybrid clouds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuWHAHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuYW10,
  author       = {Bo Zhu and
                  Wenye Yu and
                  Tao Wang},
  title        = {A Practical Platform for Cube-Attack-like Cryptanalyses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuZR10,
  author       = {Benwen Zhu and
                  Bo Zhu and
                  Kui Ren},
  title        = {PEKSrand: Providing Predicate Privacy in Public-key Encryption with
                  Keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/466},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Awad10,
  title        = {A New Chaotic Image Encryption Algorithm using a New Way of Permutation
                  Methods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Awad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Awad10a,
  title        = {Efficient chaotic permutations for image encryption algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Awad10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Awad10b,
  title        = {A New Chaos-Based Cryptosystem for Secure Transmitted Images},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Awad10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanH10,
  title        = {On isotopisms of commutative presemifields and CCZ-equivalence of
                  functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao10d,
  title        = {Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen10a,
  title        = {CCA-Secure Cryptosystem from Lattice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen10b,
  title        = {A Reflection on the Security Proofs of Boneh-Franklin Identity-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen10c,
  title        = {Fully Secure Identity-Based Encryption Without Random Oracles: {A}
                  variant of Boneh-Boyen {HIBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenL10,
  title        = {Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive
                  Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroLT10,
  title        = {Privacy-preserving Sharing of Sensitive Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoZL10,
  title        = {Enumerating Results of Homogeneous Rotation over GF(p)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/639},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ge10,
  title        = {On Instantiation of the Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ge10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10,
  title        = {An enhanced ID-based remote mutual authentication with key agreement
                  protocol for mobile devices on elliptic curve cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH10h,
  title        = {Identity-based Digital Signature Scheme Without Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH10h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinCZZ10,
  title        = {How to Construct Space Efficient Revocable {IBE} from Non-monotonic
                  {ABE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinCZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindnerP10,
  title        = {Better Key Sizes (and Attacks) for LWE-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindnerP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu10a,
  title        = {Strongly Secure Certificate-Based Encryption Scheme with Low Communication
                  Bandwidth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalekM10,
  title        = {Adaptively Secure Broadcast Encryption with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalekM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Marinier10,
  title        = {Lattice Reduction and Polynomial Solving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Marinier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nam10a,
  title        = {Security Improvement on a Password-Authenticated Group Key Exchange
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nam10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeill10,
  title        = {Deterministic Public-Key Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeill10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapamanthouT10,
  title        = {Update-Optimal Authenticated Structures Based on Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapamanthouT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pu10,
  title        = {Weaknesses of {SIP} Authentication Scheme for Converged VoIP Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen10a,
  title        = {Cryptanalysis of Hummingbird-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/612},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelcukY10,
  title        = {Linear Secret Sharing for Hierarchical Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelcukY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR10e,
  title        = {A Suite of Identity Based Aggregate Signatures and a Multi-Signature
                  Scheme from {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR10e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoLW10,
  title        = {CCA-Secure {PRE} Scheme without Public Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiL10,
  title        = {Number formula and degree level of ergodic polynomial functions over
                  Z/2\({}^{\mbox{n}}\)Z and generalized result of linear equation on
                  ergodic power-series T-Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SrivastavaAM10,
  title        = {An Enhanced Remote User Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SrivastavaAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangF10,
  title        = {New Montgomery-based Semi-systolic Multiplier for Even-type {GNB}
                  of GF(2\({}^{\mbox{m}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiCM10,
  title        = {Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based
                  Authenticated Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiLLL10,
  title        = {Impossible Differential Cryptanalysis on {E2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiLLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wu10,
  title        = {The analytical property for zeta(s)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZZ10,
  title        = {On extended algebraic immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yacobi10a,
  title        = {Symmetric-key Searchable keyword Concealment {(SSC)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yacobi10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa10d,
  title        = {A Digital Signature Based on Multivariate Polynomials over Fq},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang10,
  title        = {Rational Secret Sharing {AS} Extensive Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangT10,
  title        = {An Efficient and Information Theoretically Secure Rational Secret
                  Sharing Scheme based on Symmetric Bivariate Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangTY10,
  title        = {On the Public Key Replacement and Universal Forgery Attacks of Short
                  Certificateless Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangTY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXS10,
  title        = {Two Attacks on Dutta's Dynamic Group Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2010},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2010/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics