Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2010.bht:"
@article{DBLP:journals/iacr/0001LRW10, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on {MD4} and {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2010}, url = {http://eprint.iacr.org/2010/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeHO10, author = {Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo}, title = {Signing on Elements in Bilinear Groups for Modular Protocol Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2010}, url = {http://eprint.iacr.org/2010/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Abyaneh10, author = {Mohammad Reza Sohizadeh Abyaneh}, title = {On the Security of Non-Linear {HB} {(NLHB)} Protocol Against Passive Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2010}, url = {http://eprint.iacr.org/2010/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Abyaneh10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Abyaneh10a, author = {Mohammad Reza Sohizadeh Abyaneh}, title = {Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for {RFID} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2010}, url = {http://eprint.iacr.org/2010/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Abyaneh10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcarBBC10, author = {Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash}, title = {Cryptographic Agility and its Relation to Circular Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2010}, url = {http://eprint.iacr.org/2010/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcarBBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, title = {Preventing Pollution Attacks in Multi-Source Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2010}, url = {http://eprint.iacr.org/2010/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKSR10, author = {Shivank Agrawal and Swarun Kumar and Amjed Shareef and C. Pandu Rangan}, title = {Sanitizable signatures with strong transparency in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2010}, url = {http://eprint.iacr.org/2010/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhnGH10, author = {Jae Hyun Ahn and Matthew Green and Susan Hohenberger}, title = {Synchronized Aggregate Signatures: New Definitions, Constructions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2010}, url = {http://eprint.iacr.org/2010/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhnGH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkinyeleLGPPR10, author = {Joseph A. Akinyele and Christoph U. Lehmann and Matthew Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin}, title = {Self-Protecting Electronic Medical Records Using Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2010}, url = {http://eprint.iacr.org/2010/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkinyeleLGPPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtP10, author = {Martin R. Albrecht and Kenneth G. Paterson}, title = {Breaking An Identity-Based Encryption Scheme based on {DHIES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2010}, url = {http://eprint.iacr.org/2010/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alekseychuk10, author = {A. N. Alekseychuk}, title = {Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2010}, url = {http://eprint.iacr.org/2010/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Alekseychuk10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliM10, author = {Subidh Ali and Debdeep Mukhopadhyay}, title = {Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2010}, url = {http://eprint.iacr.org/2010/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliMT10, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential Fault Analysis of {AES} using a Single Multiple-Byte Fault}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2010}, url = {http://eprint.iacr.org/2010/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmeidaBBKS010, author = {Jos{\'{e}} Bacelar Almeida and Endre Bangerter and Manuel Barbosa and Stephan Krenn and Ahmad{-}Reza Sadeghi and Thomas Schneider}, title = {A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2010}, url = {http://eprint.iacr.org/2010/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmeidaBBKS010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alquie10, author = {Didier Alqui{\'{e}}}, title = {2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2010}, url = {http://eprint.iacr.org/2010/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Alquie10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alquie10a, author = {Didier Alqui{\'{e}}}, title = {Approximating Addition by {XOR:} how to go all the way}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2010}, url = {http://eprint.iacr.org/2010/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Alquie10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaMP10, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {On the Indifferentiability of the Gr{\"{o}}stl Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2010}, url = {http://eprint.iacr.org/2010/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaMP10a, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Security Reductions of the Second Round {SHA-3} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2010}, url = {http://eprint.iacr.org/2010/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaMP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AngelM10, author = {Jos{\'{e}} de Jes{\'{u}}s Angel Angel and Guillermo Morales{-}Luna}, title = {Solinas primes of small weight for fixed sizes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2010}, url = {http://eprint.iacr.org/2010/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AngelM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Applebaum10, author = {Benny Applebaum}, title = {Key-Dependent Message Security: Generic Amplification and Completeness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2010}, url = {http://eprint.iacr.org/2010/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Applebaum10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumHI10, author = {Benny Applebaum and Danny Harnik and Yuval Ishai}, title = {Semantic Security Under Related-Key Attacks and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2010}, url = {http://eprint.iacr.org/2010/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumHI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaBDE10, author = {Diego F. Aranha and Jean{-}Luc Beuchat and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals}, title = {Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2010}, url = {http://eprint.iacr.org/2010/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaBDE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaKLGL10, author = {Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, title = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2010}, url = {http://eprint.iacr.org/2010/526}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaKLGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aravamuthan10, author = {Sarang Aravamuthan}, title = {Separable Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2010}, url = {http://eprint.iacr.org/2010/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aravamuthan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtES10, author = {Frederik Armknecht and Carsten Elsner and Martin Schmidt}, title = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2010}, url = {http://eprint.iacr.org/2010/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtPK10, author = {Frederik Armknecht and Andreas Peter and Stefan Katzenbeisser}, title = {A Cleaner View on {IND-CCA1} Secure Homomorphic Encryption using {SOAP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2010}, url = {http://eprint.iacr.org/2010/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtPK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharLPW10, author = {Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang}, title = {Cryptanalysis of the Convex Hull Click Human Identification Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2010}, url = {http://eprint.iacr.org/2010/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharLPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharPW10, author = {Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang}, title = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2010}, url = {http://eprint.iacr.org/2010/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurD10, author = {Tomer Ashur and Orr Dunkelman}, title = {Linear Analysis of Reduced-Round CubeHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2010}, url = {http://eprint.iacr.org/2010/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCT10, author = {Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik}, title = {(If) Size Matters: Size-Hiding Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2010}, url = {http://eprint.iacr.org/2010/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtighehchiEMR10, author = {Kevin Atighehchi and A. Enache and Traian Muntean and Gabriel Risterucci}, title = {An Efficient Parallel Algorithm for Skein Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2010}, url = {http://eprint.iacr.org/2010/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtighehchiEMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aumasson0KMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, title = {Differential and invertibility properties of {BLAKE} (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2010}, url = {http://eprint.iacr.org/2010/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aumasson0KMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aumasson10, author = {Jean{-}Philippe Aumasson}, title = {Cryptanalysis of splay tree based encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2010}, url = {http://eprint.iacr.org/2010/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aumasson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonKKMOPS10, author = {Jean{-}Philippe Aumasson and Emilia K{\"{a}}sper and Lars R. Knudsen and Krystian Matusiewicz and Rune Steinsmo {\O}deg{\aa}rd and Thomas Peyrin and Martin Schl{\"{a}}ffer}, title = {Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2010}, url = {http://eprint.iacr.org/2010/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonKKMOPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziHP10, author = {Roberto Avanzi and Clemens Heuberger and Helmut Prodinger}, title = {Arithmetic of Supersingular Koblitz Curves in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2010}, url = {http://eprint.iacr.org/2010/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziHP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziHPT10, author = {Roberto Maria Avanzi and Simon Hoerder and Daniel Page and Michael Tunstall}, title = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2010}, url = {http://eprint.iacr.org/2010/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziHPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvrahamBD10, author = {Uri Avraham and Eli Biham and Orr Dunkelman}, title = {{ABC} - {A} New Framework for Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2010}, url = {http://eprint.iacr.org/2010/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvrahamBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU10, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Computationally Sound Verification of Source Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2010}, url = {http://eprint.iacr.org/2010/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesW10, author = {Werner Backes and Susanne Wetzel}, title = {BoostReduce - {A} Framework For Strong Lattice Basis Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2010}, url = {http://eprint.iacr.org/2010/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BajardDE10, author = {Jean{-}Claude Bajard and Sylvain Duquesne and Milos D. Ercegovac}, title = {Combining leak-resistant arithmetic for elliptic curves defined over F\({}_{\mbox{p}}\) and {RNS} representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2010}, url = {http://eprint.iacr.org/2010/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BajardDE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldwinBLHHOM10, author = {Brian Baldwin and Andrew Byrne and Liang Lu and Mark Hamilton and Neil Hanley and M{\'{a}}ire O'Neill and William P. Marnane}, title = {A Hardware Wrapper for the {SHA-3} Hash Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2010}, url = {http://eprint.iacr.org/2010/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldwinBLHHOM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaHO10, author = {Gergei Bana and Koji Hasebe and Mitsuhiro Okada}, title = {Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2010}, url = {http://eprint.iacr.org/2010/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BangerterGK10, author = {Endre Bangerter and David Gullasch and Stephan Krenn}, title = {Cache Games - Bringing Access Based Cache Attacks on {AES} to Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2010}, url = {http://eprint.iacr.org/2010/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BangerterGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarenghiBBPP10, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, title = {Low Voltage Fault Attacks to {AES} and {RSA} on General Purpose Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2010}, url = {http://eprint.iacr.org/2010/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarenghiBBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoLM10, author = {Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki}, title = {Decoding square-free Goppa codes over F\({}_{\mbox{p}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2010}, url = {http://eprint.iacr.org/2010/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoM10, author = {Paulo S. L. M. Barreto and Rafael Misoczki}, title = {A new one-time signature scheme from syndrome decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2010}, url = {http://eprint.iacr.org/2010/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauM10, author = {Jason Bau and John C. Mitchell}, title = {A Security Evaluation of {DNSSEC} with {NSEC3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2010}, url = {http://eprint.iacr.org/2010/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauerCNTV10, author = {Aur{\'{e}}lie Bauer and Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud}, title = {On The Broadcast and Validity-Checking Security of {PKCS} {\textbackslash}{\#}1 v1.5 Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2010}, url = {http://eprint.iacr.org/2010/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauerCNTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelOO10, author = {Amos Beimel and Eran Omri and Ilan Orlov}, title = {Secure Multiparty Computation with Partial Fairness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2010}, url = {http://eprint.iacr.org/2010/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareC10, author = {Mihir Bellare and David Cash}, title = {Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2010}, url = {http://eprint.iacr.org/2010/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareWY10, author = {Mihir Bellare and Brent Waters and Scott Yilek}, title = {Identity-Based Encryption Secure against Selective Opening Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2010}, url = {http://eprint.iacr.org/2010/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BendlinDOZ10, author = {Rikke Bendlin and Ivan Damg{\aa}rd and Claudio Orlandi and Sarah Zakarias}, title = {Semi-Homomorphic Encryption and Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2010}, url = {http://eprint.iacr.org/2010/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BendlinDOZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenoitP10, author = {Olivier Beno{\^{\i}}t and Thomas Peyrin}, title = {Side-channel Analysis of Six {SHA-3} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2010}, url = {http://eprint.iacr.org/2010/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenoitP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBL10, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange}, title = {Starfish on Strike}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2010}, url = {http://eprint.iacr.org/2010/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL10, author = {Daniel J. Bernstein and Tanja Lange}, title = {Type-II Optimal Polynomial Bases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2010}, url = {http://eprint.iacr.org/2010/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL10a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2010}, url = {http://eprint.iacr.org/2010/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP10, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Wild McEliece}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2010}, url = {http://eprint.iacr.org/2010/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP10a, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Smaller decoding exponents: ball-collision decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2010}, url = {http://eprint.iacr.org/2010/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerzatiCG10, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, title = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2010}, url = {http://eprint.iacr.org/2010/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerzatiCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatGMORT10, author = {Jean{-}Luc Beuchat and Jorge Enrique Gonz{\'{a}}lez{-}D{\'{\i}}az and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Tadanori Teruya}, title = {High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2010}, url = {http://eprint.iacr.org/2010/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatGMORT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatOY10, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {Compact Implementations of {BLAKE-32} and {BLAKE-64} on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2010}, url = {http://eprint.iacr.org/2010/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatOY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatOY10a, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A Compact {FPGA} Implementation of the {SHA-3} Candidate {ECHO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2010}, url = {http://eprint.iacr.org/2010/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatOY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyyaM10, author = {Rishiraj Bhattacharyya and Avradip Mandal}, title = {On the Impossibility of Instantiating {PSS} in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2010}, url = {http://eprint.iacr.org/2010/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyyaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BirkettS10, author = {James Birkett and Douglas Stebila}, title = {Predicate-Based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2010}, url = {http://eprint.iacr.org/2010/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BirkettS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovK10, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Feasible Attack on the 13-round {AES-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2010}, url = {http://eprint.iacr.org/2010/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovN10, author = {Alex Biryukov and Ivica Nikolic}, title = {Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2010}, url = {http://eprint.iacr.org/2010/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyC10, author = {Nir Bitansky and Ran Canetti}, title = {On Strong Simulation and Composable Point Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2010}, url = {http://eprint.iacr.org/2010/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blackburn10, author = {Simon R. Blackburn}, title = {The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin-Abu cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2010}, url = {http://eprint.iacr.org/2010/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blackburn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnSU10, author = {Simon R. Blackburn and Douglas R. Stinson and Jalaj Upadhyay}, title = {On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2010}, url = {http://eprint.iacr.org/2010/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnSU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonG10, author = {Marina Blanton and Paolo Gasti}, title = {Secure and Efficient Protocols for Iris and Fingerprint Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2010}, url = {http://eprint.iacr.org/2010/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassEM10, author = {Erik{-}Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {Tracker: Security and Privacy for RFID-based Supply Chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2010}, url = {http://eprint.iacr.org/2010/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassEM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyFIJSV10, author = {Olivier Blazy and Georg Fuchsbauer and Malika Izabach{\`{e}}ne and Amandine Jambert and Herv{\'{e}} Sibert and Damien Vergnaud}, title = {Batch Groth-Sahai}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2010}, url = {http://eprint.iacr.org/2010/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyFIJSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauG10, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, title = {Links Between Theoretical and Effective Differential Probabilities: Experiments on {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2010}, url = {http://eprint.iacr.org/2010/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoIP10, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, title = {Predicate Encryption with Partial Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2010}, url = {http://eprint.iacr.org/2010/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoIP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovK10, author = {Andrey Bogdanov and Ilya Kizhvatov}, title = {Beyond the Limits of {DPA:} Combined Side-Channel Collision Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {590}, year = {2010}, url = {http://eprint.iacr.org/2010/590}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovR10, author = {Andrey Bogdanov and Christian Rechberger}, title = {A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher {KTANTAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2010}, url = {http://eprint.iacr.org/2010/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehDFLSZ10, author = {Dan Boneh and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry}, title = {Random Oracles in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2010}, url = {http://eprint.iacr.org/2010/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehDFLSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehF10, author = {Dan Boneh and David Mandell Freeman}, title = {Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2010}, url = {http://eprint.iacr.org/2010/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehMR10, author = {Dan Boneh and Hart William Montgomery and Ananth Raghunathan}, title = {Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2010}, url = {http://eprint.iacr.org/2010/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW10, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional Encryption: Definitions and Challenges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2010}, url = {http://eprint.iacr.org/2010/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorghoffKLT10, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and S{\o}ren S. Thomsen}, title = {Cryptanalysis of PRESENT-like ciphers with secret S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2010}, url = {http://eprint.iacr.org/2010/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorghoffKLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosKLM10, author = {Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {Efficient {SIMD} arithmetic modulo a Mersenne number}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2010}, url = {http://eprint.iacr.org/2010/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosKLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosKNS10, author = {Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe}, title = {{ECC2K-130} on Cell CPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2010}, url = {http://eprint.iacr.org/2010/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosKNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosOS10, author = {Joppe W. Bos and Onur {\"{O}}zen and Martijn Stam}, title = {Efficient Hashing using the {AES} Instruction Set}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2010}, url = {http://eprint.iacr.org/2010/576}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoscherHT10, author = {Arnaud Boscher and Helena Handschuh and Elena Trichina}, title = {Fault Resistant {RSA} Signatures: Chinese Remaindering in Both Directions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2010}, url = {http://eprint.iacr.org/2010/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoscherHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetCCNSY10, author = {Charles Bouillaguet and Chen{-}Mou Cheng and Tung Chou and Ruben Niederhagen and Adi Shamir and Bo{-}Yin Yang}, title = {Fast Exhaustive Search for Polynomial Systems in F\({}_{\mbox{2}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2010}, url = {http://eprint.iacr.org/2010/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetCCNSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDDKRF10, author = {Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre{-}Alain Fouque}, title = {Low Data Complexity Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2010}, url = {http://eprint.iacr.org/2010/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFFP10, author = {Charles Bouillaguet and Jean{-}Charles Faug{\`{e}}re and Pierre{-}Alain Fouque and Ludovic Perret}, title = {Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2010}, url = {http://eprint.iacr.org/2010/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFL10, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent}, title = {Security Analysis of {SIMD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2010}, url = {http://eprint.iacr.org/2010/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCC10, author = {Christina Boura and Anne Canteaut and Christophe De Canni{\`{e}}re}, title = {Higher-order differential properties of Keccak and Luffa}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2010}, url = {http://eprint.iacr.org/2010/589}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDJOR10, author = {Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2010}, url = {http://eprint.iacr.org/2010/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDJOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleSW10, author = {Elette Boyle and Gil Segev and Daniel Wichs}, title = {Fully Leakage-Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2010}, url = {http://eprint.iacr.org/2010/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiG10, author = {Zvika Brakerski and Shafi Goldwasser}, title = {Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2010}, url = {http://eprint.iacr.org/2010/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiK10, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2010}, url = {http://eprint.iacr.org/2010/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiKKV10, author = {Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan}, title = {Overcoming the Hole In The Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2010}, url = {http://eprint.iacr.org/2010/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiKKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrickellL10, author = {Ernie Brickell and Jiangtao Li}, title = {A Pairing-Based {DAA} Scheme Further Reducing {TPM} Resources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2010}, url = {http://eprint.iacr.org/2010/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrickellL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadbentJT10, author = {Anne Broadbent and Stacey Jeffery and Alain Tapp}, title = {Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2010}, url = {http://eprint.iacr.org/2010/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadbentJT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown10, author = {Daniel R. L. Brown}, title = {Lower Bounds for Straight Line Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2010}, url = {http://eprint.iacr.org/2010/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown10a, author = {Daniel R. L. Brown}, title = {Stange's Elliptic Nets and Coxeter Group {F4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2010}, url = {http://eprint.iacr.org/2010/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brumley10, author = {Billy Bob Brumley}, title = {Secure and Fast Implementations of Two Involution Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2010}, url = {http://eprint.iacr.org/2010/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brumley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanH10a, author = {Lilya Budaghyan and Tor Helleseth}, title = {On isotopisms of commutative presemifields and CCZ-equivalence of functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2010}, url = {http://eprint.iacr.org/2010/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanH10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuhrmanCFGGOS10, author = {Harry Buhrman and Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky and Christian Schaffner}, title = {Position-Based Quantum Cryptography: Impossibility and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2010}, url = {http://eprint.iacr.org/2010/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuhrmanCFGGOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BulyginPB10, author = {Stanislav Bulygin and Albrecht Petzoldt and Johannes Buchmann}, title = {Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2010}, url = {http://eprint.iacr.org/2010/420}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BulyginPB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunnO10, author = {Paul Bunn and Rafail Ostrovsky}, title = {Throughput-Optimal Routing in Unreliable Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2010}, url = {http://eprint.iacr.org/2010/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunnO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CalikT10, author = {{\c{C}}agdas {\c{C}}alik and Meltem S{\"{o}}nmez Turan}, title = {Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2010}, url = {http://eprint.iacr.org/2010/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CalikT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischCGS10, author = {Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup}, title = {Credential Authenticated Identification and Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2010}, url = {http://eprint.iacr.org/2010/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischCGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischG10, author = {Jan Camenisch and Thomas Gro{\ss}}, title = {Efficient Attributes for Anonymous Credentials (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2010}, url = {http://eprint.iacr.org/2010/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischGHH10, author = {Jan Camenisch and Thomas Gro{\ss} and Peter Hladky and Christian Hoertnagl}, title = {Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2010}, url = {http://eprint.iacr.org/2010/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischGHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardCEG10, author = {S{\'{e}}bastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault}, title = {Privacy-Preserving {RFID} Systems: Model and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2010}, url = {http://eprint.iacr.org/2010/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardCEG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCHPRSV10, author = {Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Z. Venema}, title = {Composable Security Analysis of {OS} Services}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2010}, url = {http://eprint.iacr.org/2010/213}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCHPRSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiG10, author = {Ran Canetti and Sebastian Gajek}, title = {Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2010}, url = {http://eprint.iacr.org/2010/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKVW10, author = {Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs}, title = {On Symmetric Encryption and Point Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2010}, url = {http://eprint.iacr.org/2010/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao10, author = {Xiwang Cao}, title = {On the order of the polynomial x\({}^{\mbox{p}}\)-x-a}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2010}, url = {http://eprint.iacr.org/2010/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao10a, author = {Zhengjun Cao}, title = {A Principle for Cryptographic Protocols Beyond Security, Less Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2010}, url = {http://eprint.iacr.org/2010/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao10b, author = {Zhengjun Cao}, title = {An Anonymous ID-based Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2010}, url = {http://eprint.iacr.org/2010/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao10c, author = {Zhengjun Cao}, title = {A Note On Gottesman-Chuang Quantum Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2010}, url = {http://eprint.iacr.org/2010/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoH10, author = {Xiwang Cao and Lei Hu}, title = {On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2010}, url = {http://eprint.iacr.org/2010/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM10, author = {Claude Carlet and Sihem Mesnager}, title = {A {NOTE} {ON} {SEMI-BENT} {BOOLEAN} {FUNCTIONS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2010}, url = {http://eprint.iacr.org/2010/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletM10a, author = {Claude Carlet and Sihem Mesnager}, title = {{ON} DILLON'S {CLASS} {H} {OF} {BENT} FUNCTIONS, {NIHO} {BENT} {FUNCTIONS} {AND} {O-POLYNOMIALS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2010}, url = {http://eprint.iacr.org/2010/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletM10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaroIP10, author = {Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano}, title = {Fully Secure Anonymous {HIBE} and Secret-Key Anonymous {IBE} with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2010}, url = {http://eprint.iacr.org/2010/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaroIP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaroIP10a, author = {Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano}, title = {Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2010}, url = {http://eprint.iacr.org/2010/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaroIP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarrijoTN10, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento}, title = {A Fault Analytic Method against {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2010}, url = {http://eprint.iacr.org/2010/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarrijoTN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashHKP10, author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2010}, url = {http://eprint.iacr.org/2010/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashHKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaabouniV10, author = {Rafik Chaabouni and Serge Vaudenay}, title = {The Extended Access Control for Machine Readable Travel Documents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2010}, url = {http://eprint.iacr.org/2010/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaabouniV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyM10, author = {Debrup Chakraborty and Cuauhtemoc Mancillas{-}L{\'{o}}pez}, title = {Double Ciphertext Mode : {A} Proposal for Secure Backup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2010}, url = {http://eprint.iacr.org/2010/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChalkiasBHS10, author = {Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu{-}Varsakelis and Spyros T. Halkidis and George Stephanides}, title = {Attacks on the {AKACP} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2010}, url = {http://eprint.iacr.org/2010/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChalkiasBHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanSS10, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Private and Continual Release of Statistics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2010}, url = {http://eprint.iacr.org/2010/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNY10, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2010}, url = {http://eprint.iacr.org/2010/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeHM10, author = {Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes}, title = {On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2010}, url = {http://eprint.iacr.org/2010/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen10, author = {Liqun Chen}, title = {A {DAA} Scheme Requiring Less {TPM} Resources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2010}, url = {http://eprint.iacr.org/2010/008}, timestamp = {Sat, 21 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCH10, author = {Yalin Chen and Jue{-}Sam Chou and Xian{-}Wu Hou}, title = {A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2010}, url = {http://eprint.iacr.org/2010/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCH10a, author = {Yalin Chen and Jue{-}Sam Chou and Chun{-}Hui Huang}, title = {Comments on five smart card based password authentication protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2010}, url = {http://eprint.iacr.org/2010/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCH10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCH10b, author = {Yalin Chen and Jue{-}Sam Chou and Chun{-}Hui Huang}, title = {Comment on four two-party authentication protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2010}, url = {http://eprint.iacr.org/2010/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCH10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCL10, author = {Yalin Chen and Jue{-}Sam Chou and Chi{-}Fong Lin}, title = {A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2010}, url = {http://eprint.iacr.org/2010/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenS10, author = {Zhimin Chen and Patrick Schaumont}, title = {Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2010}, url = {http://eprint.iacr.org/2010/272}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenWT10, author = {Cai{-}Sen Chen and Tao Wang and Jun{-}Jian Tian}, title = {An Improved Timing Attack with Error Detection on {RSA-CRT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2010}, url = {http://eprint.iacr.org/2010/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengM10, author = {Qingfeng Cheng and Chuangui Ma}, title = {Security weakness of two authenticated key exchange protocols from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2010}, url = {http://eprint.iacr.org/2010/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengMW10, author = {Qingfeng Cheng and Chuangui Ma and Fushan Wei}, title = {A modified eCK model with stronger security for tripartite authenticated key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2010}, url = {http://eprint.iacr.org/2010/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonJS10, author = {Jung Hee Cheon and Stanislaw Jarecki and Jae Hong Seo}, title = {Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2010}, url = {http://eprint.iacr.org/2010/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKM10, author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin}, title = {BiTR: Built-in Tamper Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2010}, url = {http://eprint.iacr.org/2010/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouC10, author = {Jue{-}Sam Chou and Yalin Chen}, title = {A secure anonymous communication scheme in vehicular ad hoc networks from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2010}, url = {http://eprint.iacr.org/2010/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouCC10, author = {Jue{-}Sam Chou and Hsien{-}Ching Chen and Chun{-}Yun Chen}, title = {Cryptanalysis and Improvement of {A} New Electronic Traveler's Check Scheme Based on One-way Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2010}, url = {http://eprint.iacr.org/2010/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouCH10, author = {Jue{-}Sam Chou and Yalin Chen and Chun{-}Hui Huang}, title = {A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2010}, url = {http://eprint.iacr.org/2010/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Choudhury10, author = {Ashish Choudhury}, title = {Protocols for Reliable and Secure Message Transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2010}, url = {http://eprint.iacr.org/2010/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Choudhury10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryKP10, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {The Round Complexity of General {VSS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2010}, url = {http://eprint.iacr.org/2010/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowLZ10, author = {Sherman S. M. Chow and Joseph K. Liu and Jianying Zhou}, title = {Identity-Based Online/Offline Key Encapsulation and Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2010}, url = {http://eprint.iacr.org/2010/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuLZBD10, author = {Cheng{-}Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng}, title = {Practical ID-based Encryption for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2010}, url = {http://eprint.iacr.org/2010/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuLZBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungKV10, author = {Kai{-}Min Chung and Yael Tauman Kalai and Salil P. Vadhan}, title = {Improved Delegation of Computation using Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2010}, url = {http://eprint.iacr.org/2010/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClarkH10, author = {Jeremy Clark and Urs Hengartner}, title = {On the Use of Financial Data as a Random Beacon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2010}, url = {http://eprint.iacr.org/2010/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClarkH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClavierFGRV10, author = {Christophe Clavier and Benoit Feix and Georges Gagnerot and Myl{\`{e}}ne Roussellet and Vincent Verneuil}, title = {Horizontal Correlation Analysis on Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2010}, url = {http://eprint.iacr.org/2010/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClavierFGRV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ColbertDB10, author = {Bernard D. Colbert and Anthony H. Dekker and Lynn Margaret Batten}, title = {Heraclitus: {A} LFSR-based Stream Cipher with Key Dependent Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2010}, url = {http://eprint.iacr.org/2010/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ColbertDB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronJMNT10, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2010}, url = {http://eprint.iacr.org/2010/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronJMNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierS10, author = {V{\'{e}}ronique Cortier and Ben Smyth}, title = {Attacking and fixing Helios: An analysis of ballot secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2010}, url = {http://eprint.iacr.org/2010/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloBNW10, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, title = {Avoiding Full Extension Field Arithmetic in Pairing Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2010}, url = {http://eprint.iacr.org/2010/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloBNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloBNW10a, author = {Craig Costello and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth Koon{-}Ho Wong}, title = {Delaying Mismatched Field Multiplications in Pairing Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2010}, url = {http://eprint.iacr.org/2010/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloBNW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloS10, author = {Craig Costello and Douglas Stebila}, title = {Fixed Argument Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2010}, url = {http://eprint.iacr.org/2010/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroKT10, author = {Emiliano De Cristofaro and Jihye Kim and Gene Tsudik}, title = {Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2010}, url = {http://eprint.iacr.org/2010/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CzapV10, author = {L{\'{a}}szl{\'{o}} Czap and Istv{\'{a}}n Vajda}, title = {Signatures for Multi-source Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2010}, url = {http://eprint.iacr.org/2010/328}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CzapV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dagdelen010, author = {{\"{O}}zg{\"{u}}r Dagdelen and Michael Schneider}, title = {Parallel Enumeration of Shortest Lattice Vectors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2010}, url = {http://eprint.iacr.org/2010/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dagdelen010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiWS10, author = {Zhenli Dai and Meiqin Wang and Yue Sun}, title = {Effect of the Dependent Paths in Linear Hull}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2010}, url = {http://eprint.iacr.org/2010/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardIK10, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2010}, url = {http://eprint.iacr.org/2010/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardMN10, author = {Ivan Damg{\aa}rd and Sigurd Meldgaard and Jesper Buus Nielsen}, title = {Perfectly Secure Oblivious {RAM} Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2010}, url = {http://eprint.iacr.org/2010/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardO10, author = {Ivan Damg{\aa}rd and Claudio Orlandi}, title = {Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2010}, url = {http://eprint.iacr.org/2010/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanilovP10, author = {S. A. Danilov and I. A. Popovyan}, title = {Factorization of {RSA-180}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2010}, url = {http://eprint.iacr.org/2010/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanilovP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengLYYZ10, author = {Robert H. Deng and Yingjiu Li and Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {A New Framework for {RFID} Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2010}, url = {http://eprint.iacr.org/2010/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengLYYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DetreyGK10, author = {J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Karim Khalfallah}, title = {A Low-Area yet Performant {FPGA} Implementation of Shabal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2010}, url = {http://eprint.iacr.org/2010/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DetreyGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJ10, author = {Marten van Dijk and Ari Juels}, title = {On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2010}, url = {http://eprint.iacr.org/2010/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ding10, author = {Jintai Ding}, title = {Solving {LWE} problem with bounded errors in polynomial time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2010}, url = {http://eprint.iacr.org/2010/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ding10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ding10a, author = {Jintai Ding}, title = {Fast Algorithm to solve a family of {SIS} problem with l\({}_{\mbox{infty}}\) norm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2010}, url = {http://eprint.iacr.org/2010/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ding10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurS10, author = {Itai Dinur and Adi Shamir}, title = {Breaking Grain-128 with Dynamic Cube Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2010}, url = {http://eprint.iacr.org/2010/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurS10a, author = {Itai Dinur and Adi Shamir}, title = {An Improved Algebraic Attack on Hamsi-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2010}, url = {http://eprint.iacr.org/2010/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHLW10, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, title = {Efficient Public-Key Cryptography in the Presence of Key Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2010}, url = {http://eprint.iacr.org/2010/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHLW10a, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, title = {Cryptography Against Continuous Memory Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2010}, url = {http://eprint.iacr.org/2010/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHLW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKKRS10, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2010}, url = {http://eprint.iacr.org/2010/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoganaksoyEKS10, author = {Ali Doganaksoy and Baris Ege and Onur Ko{\c{c}}ak and Fatih Sulak}, title = {Cryptographic Randomness Testing of Block Ciphers and Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2010}, url = {http://eprint.iacr.org/2010/564}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoganaksoyEKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoganaksoyEKS10a, author = {Ali Doganaksoy and Baris Ege and Onur Ko{\c{c}}ak and Fatih Sulak}, title = {Statistical Analysis of Reduced Round Compression Functions of {SHA-3} Second Round Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2010}, url = {http://eprint.iacr.org/2010/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoganaksoyEKS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dousti10, author = {Mohammad Sadeq Dousti}, title = {Black-Box Computational Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2010}, url = {http://eprint.iacr.org/2010/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dousti10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyGMN10, author = {Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento}, title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2010}, url = {http://eprint.iacr.org/2010/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuanLMGL10, author = {Pu Duan and Sanmin Liu and Weiqin Ma and Guofei Gu and Jyh{-}Charn Liu}, title = {Privacy-Preserving Matching Protocols for Attributes and Strings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2010}, url = {http://eprint.iacr.org/2010/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuanLMGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuanLYSZ10, author = {Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu}, title = {Distinguishing Properties of Higher Order Derivatives of Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2010}, url = {http://eprint.iacr.org/2010/417}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuanLYSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuboisK10, author = {Vivien Dubois and Jean{-}Gabriel Kammerer}, title = {Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2010}, url = {http://eprint.iacr.org/2010/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuboisK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubovitskayaSV10, author = {Maria Dubovitskaya and Alessandra Scafuro and Ivan Visconti}, title = {On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2010}, url = {http://eprint.iacr.org/2010/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubovitskayaSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanK10, author = {Orr Dunkelman and Nathan Keller}, title = {The Effects of the Omission of Last Round's MixColumns on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2010}, url = {http://eprint.iacr.org/2010/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS10, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {A Practical-Time Attack on the {A5/3} Cryptosystem Used in Third Generation {GSM} Telephony}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2010}, url = {http://eprint.iacr.org/2010/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS10a, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Improved Single-Key Attacks on 8-round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2010}, url = {http://eprint.iacr.org/2010/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Duquesne10, author = {Sylvain Duquesne}, title = {{RNS} arithmetic in F\({}_{\mbox{p\({}^{\mbox{k}}\)}}\) and application to fast pairing computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2010}, url = {http://eprint.iacr.org/2010/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Duquesne10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiKW10, author = {Stefan Dziembowski and Tomasz Kazana and Daniel Wichs}, title = {One-time Computable and Uncomputable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2010}, url = {http://eprint.iacr.org/2010/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/El-HadedyGK10, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein J. Knapskog}, title = {Single Core Implementation of Blue Midnight Wish Hash Function on {VIRTEX} 5 Platform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2010}, url = {http://eprint.iacr.org/2010/571}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/El-HadedyGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElaabidG10, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2010}, url = {http://eprint.iacr.org/2010/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElaabidG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiBM10, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, title = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2010}, url = {http://eprint.iacr.org/2010/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EngeS10, author = {Andreas Enge and Andrew V. Sutherland}, title = {Class Invariants by the {CRT} Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2010}, url = {http://eprint.iacr.org/2010/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EngeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ErgulerA10, author = {Imran Erguler and Emin Anarim}, title = {Scalability and Security Conflict for {RFID} Authentication Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2010}, url = {http://eprint.iacr.org/2010/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ErgulerA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Estibals10, author = {Nicolas Estibals}, title = {Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2010}, url = {http://eprint.iacr.org/2010/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Estibals10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanHV10, author = {Junfeng Fan and Jens Hermans and Frederik Vercauteren}, title = {On the claimed privacy of {EC-RAC} {III}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2010}, url = {http://eprint.iacr.org/2010/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Farashahi10, author = {Reza Rezaeian Farashahi}, title = {Hashing into Hessian Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2010}, url = {http://eprint.iacr.org/2010/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Farashahi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashahiFSTV10, author = {Reza Rezaeian Farashahi and Pierre{-}Alain Fouque and Igor E. Shparlinski and Mehdi Tibouchi and Jos{\'{e}} Felipe Voloch}, title = {Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2010}, url = {http://eprint.iacr.org/2010/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashahiFSTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaugereGOPT10, author = {Jean{-}Charles Faug{\`{e}}re and Val{\'{e}}rie Gauthier and Ayoub Otmani and Ludovic Perret and Jean{-}Pierre Tillich}, title = {A Distinguisher for High Rate McEliece Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2010}, url = {http://eprint.iacr.org/2010/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaugereGOPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengFZFW10, author = {Dengguo Feng and Xiutao Feng and Wentao Zhang and Xiubin Fan and Chuankun Wu}, title = {Loiss: {A} Byte-Oriented Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2010}, url = {http://eprint.iacr.org/2010/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengFZFW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengW10, author = {Rongquan Feng and Hongfeng Wu}, title = {Number of Jacobi quartic curves over finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2010}, url = {http://eprint.iacr.org/2010/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengZW10, author = {Xiutao Feng and Chunfang Zhou and Chuan Kun Wu}, title = {Linear Approximations of Addition Modulo 2\({}^{\mbox{n}}\)-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2010}, url = {http://eprint.iacr.org/2010/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FergusonLM10, author = {Niels Ferguson and Stefan Lucks and Kerry A. McKay}, title = {Symmetric States and their Structure: Improved Analysis of CubeHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2010}, url = {http://eprint.iacr.org/2010/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FergusonLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreS10, author = {Dario Fiore and Dominique Schr{\"{o}}der}, title = {Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2010}, url = {http://eprint.iacr.org/2010/648}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischmannGL10, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, title = {Some Observations on Indifferentiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2010}, url = {http://eprint.iacr.org/2010/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischmannGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloissacL10, author = {No{\'{e}}mie Floissac and Yann L'Hyver}, title = {From {AES-128} to {AES-192} and AES-256, How to Adapt Differential Fault Analysis Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2010}, url = {http://eprint.iacr.org/2010/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloissacL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FlontaM10, author = {Stelian Flonta and Liviu Cristian Miclea}, title = {Ring signature with divided private key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2010}, url = {http://eprint.iacr.org/2010/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FlontaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloriRCM10, author = {Jean{-}Pierre Flori and Hugues Randriam and G{\'{e}}rard D. Cohen and Sihem Mesnager}, title = {On a conjecture about binary strings distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2010}, url = {http://eprint.iacr.org/2010/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloriRCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueT10, author = {Pierre{-}Alain Fouque and Mehdi Tibouchi}, title = {Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2010}, url = {http://eprint.iacr.org/2010/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueT10a, author = {Pierre{-}Alain Fouque and Mehdi Tibouchi}, title = {Deterministic Encoding and Hashing to Odd Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2010}, url = {http://eprint.iacr.org/2010/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueT10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancillonDC10, author = {Aur{\'{e}}lien Francillon and Boris Danev and Srdjan Capkun}, title = {Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2010}, url = {http://eprint.iacr.org/2010/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancillonDC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancisHMM10, author = {Lishoy Francis and Gerhard P. Hancke and Keith Mayes and Konstantinos Markantonakis}, title = {Practical {NFC} Peer-to-Peer Relay Attack using Mobile Phones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2010}, url = {http://eprint.iacr.org/2010/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancisHMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancqT10, author = {Julien Francq and C{\'{e}}line Thuillet}, title = {Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2010}, url = {http://eprint.iacr.org/2010/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancqT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranzDHJKS10, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure Computations on Non-Integer Values}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2010}, url = {http://eprint.iacr.org/2010/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranzDHJKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fuchsbauer10, author = {Georg Fuchsbauer}, title = {Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2010}, url = {http://eprint.iacr.org/2010/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fuchsbauer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerV10, author = {Georg Fuchsbauer and Damien Vergnaud}, title = {Fair Blind Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2010}, url = {http://eprint.iacr.org/2010/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrGRV10, author = {Thomas Fuhr and Henri Gilbert and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Forgery Attack on the Candidate {LTE} Integrity Algorithm 128-EIA3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2010}, url = {http://eprint.iacr.org/2010/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrGRV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FumaroliMPR10, author = {Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain}, title = {Affine Masking against Higher-Order Side Channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2010}, url = {http://eprint.iacr.org/2010/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FumaroliMPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FunkeK10, author = {Daniel Funke and Florian Kerschbaum}, title = {Privacy-Preserving Multi-Objective Evolutionary Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2010}, url = {http://eprint.iacr.org/2010/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FunkeK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithH10, author = {Steven D. Galbraith and Mark Holmes}, title = {A non-uniform birthday problem with applications to discrete logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2010}, url = {http://eprint.iacr.org/2010/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPR10, author = {Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai}, title = {Computing Discrete Logarithms in an Interval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2010}, url = {http://eprint.iacr.org/2010/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithR10, author = {Steven D. Galbraith and Raminder S. Ruprai}, title = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2010}, url = {http://eprint.iacr.org/2010/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GallaisKT10, author = {Jean{-}Fran{\c{c}}ois Gallais and Ilya Kizhvatov and Michael Tunstall}, title = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2010}, url = {http://eprint.iacr.org/2010/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GallaisKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gallant10, author = {Robert P. Gallant}, title = {Finding discrete logarithms with a set orbit distinguisher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2010}, url = {http://eprint.iacr.org/2010/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gallant10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GangopadhyayC10, author = {Sugata Gangopadhyay and Ankita Chaturvedi}, title = {A New Class of Bent-Negabent Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2010}, url = {http://eprint.iacr.org/2010/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GangopadhyayC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GangopadhyayS10, author = {Sugata Gangopadhyay and Brajesh Kumar Singh}, title = {On second-order nonlinearities of some D\({}_{\mbox{0}}\) type bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2010}, url = {http://eprint.iacr.org/2010/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GangopadhyayS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoVW10, author = {Shuhong Gao and Frank Volny and Mingsheng Wang}, title = {A new algorithm for computing Groebner bases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2010}, url = {http://eprint.iacr.org/2010/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarciaRVS10, author = {Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur}, title = {Dismantling SecureMemory, CryptoMemory and CryptoRF}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2010}, url = {http://eprint.iacr.org/2010/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarciaRVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroHS10, author = {Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen}, title = {Automata Evaluation and Text Search Protocols with Simulation Based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2010}, url = {http://eprint.iacr.org/2010/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroKR10, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, title = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2010}, url = {http://eprint.iacr.org/2010/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH10, author = {Craig Gentry and Shai Halevi}, title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2010}, url = {http://eprint.iacr.org/2010/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHV10, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2010}, url = {http://eprint.iacr.org/2010/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHV10a, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {A Simple BGN-type Cryptosystem from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2010}, url = {http://eprint.iacr.org/2010/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryW10, author = {Craig Gentry and Daniel Wichs}, title = {Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2010}, url = {http://eprint.iacr.org/2010/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeovandroSNB10, author = {C. C. F. Pereira Geovandro and Marcos A. Simpl{\'{\i}}cio Jr. and Michael Naehrig and Paulo S. L. M. Barreto}, title = {A Family of Implementation-Friendly {BN} Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2010}, url = {http://eprint.iacr.org/2010/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeovandroSNB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhadafiS10, author = {Essam Ghadafi and Nigel P. Smart}, title = {Efficient Two-Move Blind Signatures in the Common Reference String Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2010}, url = {http://eprint.iacr.org/2010/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhadafiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiraudT10, author = {Christophe Giraud and Adrian Thillard}, title = {Piret and Quisquater's {DFA} on {AES} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2010}, url = {http://eprint.iacr.org/2010/440}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiraudT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjsteen10, author = {Kristian Gj{\o}steen}, title = {Analysis of an internet voting protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2010}, url = {http://eprint.iacr.org/2010/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjsteen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiK10, author = {Danilo Gligoroski and Vlastimil Kl{\'{\i}}ma}, title = {Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2010}, url = {http://eprint.iacr.org/2010/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiOJPFKM10, author = {Danilo Gligoroski and Rune Steinsmo {\O}deg{\aa}rd and Rune Erlend Jensen and Ludovic Perret and Jean{-}Charles Faug{\`{e}}re and Svein Johan Knapskog and Smile Markovski}, title = {The Digital Signature Scheme {MQQ-SIG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2010}, url = {http://eprint.iacr.org/2010/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiOJPFKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GodeG10, author = {Ruchi Gode and Sugata Gangopadhyay}, title = {On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2010}, url = {http://eprint.iacr.org/2010/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GodeG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GomisawaLTFSSO10, author = {Shigeto Gomisawa and Yang Li and Junko Takahashi and Toshinori Fukunaga and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, title = {Efficient Differential Fault Analysis for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2010}, url = {http://eprint.iacr.org/2010/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN10, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {One Round Group Key Exchange with Forward Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2010}, url = {http://eprint.iacr.org/2010/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorantlaBN10a, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Attribute-based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2010}, url = {http://eprint.iacr.org/2010/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorantlaBN10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorenL10, author = {Eyal Z. Goren and Kristin E. Lauter}, title = {Genus 2 Curves with Complex Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2010}, url = {http://eprint.iacr.org/2010/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorenL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gouicem10, author = {Mourad Gouicem}, title = {Comparison of seven {SHA-3} candidates software implementations on smart cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2010}, url = {http://eprint.iacr.org/2010/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gouicem10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoundarJM10, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji}, title = {Co-Z Addition Formulae and Binary Ladders on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2010}, url = {http://eprint.iacr.org/2010/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoundarJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal010, author = {Vipul Goyal and Abhishek Jain}, title = {On the Round Complexity of Covert Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2010}, url = {http://eprint.iacr.org/2010/279}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal10, author = {Vipul Goyal}, title = {Constant Round Non-Malleable Protocols using One Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2010}, url = {http://eprint.iacr.org/2010/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2010}, url = {http://eprint.iacr.org/2010/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalISVW10, author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia}, title = {Founding Cryptography on Tamper-Proof Hardware Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2010}, url = {http://eprint.iacr.org/2010/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalISVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GradwohlLR10, author = {Ronen Gradwohl and Noam Livne and Alon Rosen}, title = {Sequential Rationality in Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2010}, url = {http://eprint.iacr.org/2010/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GradwohlLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Granger10, author = {Robert Granger}, title = {On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2010}, url = {http://eprint.iacr.org/2010/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Granger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GratzerN10, author = {Vanessa Gratzer and David Naccache}, title = {How to Read a Signature?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2010}, url = {http://eprint.iacr.org/2010/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GratzerN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Grechnikov10, author = {Evgeny A. Grechnikov}, title = {Collisions for 72-step and 73-step {SHA-1:} Improvements in the Method of Characteristics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2010}, url = {http://eprint.iacr.org/2010/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Grechnikov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenH10, author = {Matthew Green and Susan Hohenberger}, title = {Practical Adaptive Oblivious Transfer from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2010}, url = {http://eprint.iacr.org/2010/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenH10a, author = {Matthew Green and Susan Hohenberger}, title = {{CPA} and CCA-Secure Encryption Systems that are not 2-Circular Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2010}, url = {http://eprint.iacr.org/2010/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenH10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrigorievS10, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Authentication schemes from actions on graphs, groups, or rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2010}, url = {http://eprint.iacr.org/2010/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrigorievS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrigorievS10a, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {No-leak authentication by the Sherlock Holmes method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2010}, url = {http://eprint.iacr.org/2010/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrigorievS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GroceK10, author = {Adam Groce and Jonathan Katz}, title = {A New Framework for Password-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2010}, url = {http://eprint.iacr.org/2010/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GroceK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuajardoM10, author = {Jorge Guajardo and Bart Mennink}, title = {Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2010}, url = {http://eprint.iacr.org/2010/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuajardoM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronJW10, author = {Shay Gueron and Simon Johnson and Jesse Walker}, title = {{SHA-512/256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2010}, url = {http://eprint.iacr.org/2010/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronJW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoHNS10, author = {Xu Guo and Sinan Huang and Leyla Nazhandali and Patrick Schaumont}, title = {On The Impact of Target Technology in {SHA-3} Hardware Benchmark Rankings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2010}, url = {http://eprint.iacr.org/2010/536}, timestamp = {Fri, 04 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoHNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerHRVW10, author = {Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil P. Vadhan and Hoeteck Wee}, title = {Universal One-Way Hash Functions via Inaccessible Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2010}, url = {http://eprint.iacr.org/2010/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerHRVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerIKLP10, author = {Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {Black-Box Constructions of Protocols for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2010}, url = {http://eprint.iacr.org/2010/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerIKLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviK10, author = {Shai Halevi and Hugo Krawczyk}, title = {One-Pass {HMQV} and Asymmetric Key-Wrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2010}, url = {http://eprint.iacr.org/2010/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviS10, author = {Tzipora Halevi and Nitesh Saxena}, title = {Eavesdropping over Random Passwords via Keyboard Acoustic Emanations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2010}, url = {http://eprint.iacr.org/2010/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaK10, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Between Hashed {DH} and Computational {DH:} Compact Encryption from Weaker Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2010}, url = {http://eprint.iacr.org/2010/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaW10, author = {Goichiro Hanaoka and Jian Weng}, title = {Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2010}, url = {http://eprint.iacr.org/2010/468}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hao10, author = {Feng Hao}, title = {On Robust Key Agreement Based on Public Key Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2010}, url = {http://eprint.iacr.org/2010/136}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hao10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hao10a, author = {Feng Hao}, title = {On Small Subgroup Non-confinement Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2010}, url = {http://eprint.iacr.org/2010/149}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hao10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoK10, author = {Feng Hao and Matthew Nicolas Kreeger}, title = {Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2010}, url = {http://eprint.iacr.org/2010/452}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoR10, author = {Feng Hao and Peter Y. A. Ryan}, title = {{J-PAKE:} Authenticated Key Exchange Without {PKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2010}, url = {http://eprint.iacr.org/2010/190}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaralambievJKS10, author = {Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup}, title = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2010}, url = {http://eprint.iacr.org/2010/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaralambievJKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Harris10, author = {Sandy Harris}, title = {The Eris hybrid cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2010}, url = {http://eprint.iacr.org/2010/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Harris10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto10, author = {Yasufumi Hashimoto}, title = {On small secret key attack against {RSA} with high bits known prime factor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2010}, url = {http://eprint.iacr.org/2010/657}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayashiSWMST10, author = {Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi}, title = {Solving a 676-bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6n}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2010}, url = {http://eprint.iacr.org/2010/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayashiSWMST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayL10, author = {Carmit Hazay and Yehuda Lindell}, title = {A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2010}, url = {http://eprint.iacr.org/2010/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayL10a, author = {Carmit Hazay and Yehuda Lindell}, title = {A Note on Zero-Knowledge Proofs of Knowledge and the {ZKPOK} Ideal Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2010}, url = {http://eprint.iacr.org/2010/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayL10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10a, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {A Random Number Generator Based on Isogenies Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2010}, url = {http://eprint.iacr.org/2010/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10b, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Cryptanalysis of a DoS-resistant ID-based password authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2010}, url = {http://eprint.iacr.org/2010/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10c, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Weaknesses of a dynamic ID-based remote user authentication scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2010}, url = {http://eprint.iacr.org/2010/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10d, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2010}, url = {http://eprint.iacr.org/2010/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10e, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {On security of a remote user authentication scheme without using smart cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2010}, url = {http://eprint.iacr.org/2010/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10f, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Weaknesses of a dynamic ID-based remote user authentication scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2010}, url = {http://eprint.iacr.org/2010/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10g, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2010}, url = {http://eprint.iacr.org/2010/606}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCHY10, author = {Yi Jun He and Tat Wing Chim and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2010}, url = {http://eprint.iacr.org/2010/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCZ10, author = {Debiao He and Jianhua Chen and Rui Zhang}, title = {Efficient and provably-secure certificateless signature scheme without bilinear pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2010}, url = {http://eprint.iacr.org/2010/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergLL10, author = {Sven Heiberg and Helger Lipmaa and Filip van Laenen}, title = {On E-Vote Integrity in the Case of Malicious Voter Computers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2010}, url = {http://eprint.iacr.org/2010/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayLO10, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky}, title = {Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2010}, url = {http://eprint.iacr.org/2010/100}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayLO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO10, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2010}, url = {http://eprint.iacr.org/2010/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeneckaKS0W10, author = {Wilko Henecka and Stefan K{\"{o}}gl and Ahmad{-}Reza Sadeghi and Thomas Schneider and Immo Wehrenberg}, title = {{TASTY:} Tool for Automating Secure Two-partY computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2010}, url = {http://eprint.iacr.org/2010/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeneckaKS0W10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerzbergS10, author = {Amir Herzberg and Haya Schulmann}, title = {Robust Combiner for Obfuscators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2010}, url = {http://eprint.iacr.org/2010/202}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerzbergS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerzbergS10a, author = {Amir Herzberg and Haya Schulmann}, title = {Secure Guaranteed Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2010}, url = {http://eprint.iacr.org/2010/449}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerzbergS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangR10, author = {Viet Tung Hoang and Phillip Rogaway}, title = {On generalized Feistel networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2010}, url = {http://eprint.iacr.org/2010/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoerderWTP10, author = {Simon Hoerder and Marcin W{\'{o}}jcik and Stefan Tillich and Dan Page}, title = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2010}, url = {http://eprint.iacr.org/2010/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoerderWTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW10, author = {Susan Hohenberger and Brent Waters}, title = {Constructing Verifiable Random Functions with Large Input Spaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2010}, url = {http://eprint.iacr.org/2010/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HomsirikamolRG10, author = {Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj}, title = {Comparing Hardware Performance of Fourteen Round Two {SHA-3} Candidates Using FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2010}, url = {http://eprint.iacr.org/2010/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HomsirikamolRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongM10, author = {Jin Hong and Sunghwan Moon}, title = {A Comparison of Cryptanalytic Tradeoff Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2010}, url = {http://eprint.iacr.org/2010/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Howgrave-GrahamJ10, author = {Nick Howgrave{-}Graham and Antoine Joux}, title = {New generic algorithms for hard knapsacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2010}, url = {http://eprint.iacr.org/2010/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HsuC10, author = {Ching{-}Fang Hsu and Qi Cheng}, title = {On Representable Matroids and Ideal Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2010}, url = {http://eprint.iacr.org/2010/232}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HsuC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IdeguchiTP10, author = {Kota Ideguchi and Elmar Tischhauser and Bart Preneel}, title = {Improved Collision Attacks on the Reduced-Round Gr{\"{o}}stl Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2010}, url = {http://eprint.iacr.org/2010/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IdeguchiTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonicaJ10, author = {Sorina Ionica and Antoine Joux}, title = {Pairing computation on elliptic curves with efficiently computable endomorphism and small embedding degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2010}, url = {http://eprint.iacr.org/2010/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonicaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKKLP10, author = {Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2010}, url = {http://eprint.iacr.org/2010/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKKLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeS10, author = {Takanori Isobe and Taizo Shirai}, title = {Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2010}, url = {http://eprint.iacr.org/2010/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jacob10, author = {St{\'{e}}phane Jacob}, title = {Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2010}, url = {http://eprint.iacr.org/2010/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jacob10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacobsonSS10, author = {Michael J. Jacobson Jr. and Renate Scheidler and Andreas Stein}, title = {Cryptographic Aspects of Real Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2010}, url = {http://eprint.iacr.org/2010/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacobsonSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKSS10, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {Generic Compilers for Authenticated Key Exchange (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2010}, url = {http://eprint.iacr.org/2010/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobsenMN10, author = {Thomas P. Jakobsen and Marc X. Makkes and Janus Dam Nielsen}, title = {Efficient Implementation of the Orlandi Protocol Extended Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2010}, url = {http://eprint.iacr.org/2010/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobsenMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakubowskiVY10, author = {Mariusz H. Jakubowski and Ramarathnam Venkatesan and Yacov Yacobi}, title = {Quantifying Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2010}, url = {http://eprint.iacr.org/2010/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakubowskiVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiBSL10, author = {Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu}, title = {Password-Protected Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2010}, url = {http://eprint.iacr.org/2010/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiBSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JarvinenKS010, author = {Kimmo J{\"{a}}rvinen and Vladimir Kolesnikov and Ahmad{-}Reza Sadeghi and Thomas Schneider}, title = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2010}, url = {http://eprint.iacr.org/2010/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JarvinenKS010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanF10, author = {J{\'{e}}r{\'{e}}my Jean and Pierre{-}Alain Fouque}, title = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256} Compression Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2010}, url = {http://eprint.iacr.org/2010/569}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeongLSH10, author = {Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong}, title = {A note on "Improved Fast Correlation Attacks on Stream Ciphers"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2010}, url = {http://eprint.iacr.org/2010/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeongLSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jhanwar10, author = {Mahabir Prasad Jhanwar}, title = {A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2010}, url = {http://eprint.iacr.org/2010/495}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Jhanwar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiHZ10, author = {Huifang Ji and Wenbao Han and Long Zhao}, title = {Certificateless generalized signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2010}, url = {http://eprint.iacr.org/2010/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaCWW10, author = {Keting Jia and Jiazhe Chen and Meiqin Wang and Xiaoyun Wang}, title = {Practical-time Attack on the Full {MMB} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2010}, url = {http://eprint.iacr.org/2010/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaCWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jiang10, author = {Shaoquan Jiang}, title = {Timed Encryption and Its Application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {546}, year = {2010}, url = {http://eprint.iacr.org/2010/546}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jiang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinWZ10, author = {Zhengping Jin and Qiaoyan Wen and Hua Zhang}, title = {A supplement to Liu et al.'s certificateless signcryption scheme in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2010}, url = {http://eprint.iacr.org/2010/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Johnston10, author = {Otto Johnston}, title = {A Discrete Logarithm Attack on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2010}, url = {http://eprint.iacr.org/2010/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Johnston10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV10, author = {Antoine Joux and Vanessa Vitse}, title = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on E(F\({}_{\mbox{q\({}^{\mbox{5}}\)}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2010}, url = {http://eprint.iacr.org/2010/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV10a, author = {Antoine Joux and Vanessa Vitse}, title = {A variant of the {F4} algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2010}, url = {http://eprint.iacr.org/2010/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeTV10, author = {Marc Joye and Mehdi Tibouchi and Damien Vergnaud}, title = {Huff's Model for Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2010}, url = {http://eprint.iacr.org/2010/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JumaV10, author = {Ali Juma and Yevgeniy Vahlis}, title = {On Protecting Cryptographic Keys Against Continual Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2010}, url = {http://eprint.iacr.org/2010/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JumaV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JungkR10, author = {Bernhard Jungk and Steffen Reith}, title = {On FPGA-based implementations of Gr{\"{o}}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2010}, url = {http://eprint.iacr.org/2010/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JungkR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kachisa10, author = {Ezekiel J. Kachisa}, title = {Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2010}, url = {http://eprint.iacr.org/2010/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kachisa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamalY10, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Applications of {SAT} Solvers to {AES} key Recovery from Decayed Key Schedule Images}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2010}, url = {http://eprint.iacr.org/2010/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamalY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kaminsky10, author = {Alan Kaminsky}, title = {Cube Test Analysis of the Statistical Behavior of CubeHash and Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2010}, url = {http://eprint.iacr.org/2010/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kaminsky10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarM10, author = {Jayaprakash Kar and Banshidhar Majhi}, title = {A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2010}, url = {http://eprint.iacr.org/2010/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Karabina10, author = {Koray Karabina}, title = {Torus-based compression by factor 4 and 6}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2010}, url = {http://eprint.iacr.org/2010/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Karabina10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Karabina10a, author = {Koray Karabina}, title = {Squaring in cyclotomic subgroups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2010}, url = {http://eprint.iacr.org/2010/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Karabina10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara10, author = {Masao Kasahara}, title = {A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2010}, url = {http://eprint.iacr.org/2010/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara10a, author = {Masao Kasahara}, title = {A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using {K(III)} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2010}, url = {http://eprint.iacr.org/2010/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Katta10, author = {Sandeep Katta}, title = {Recursive Information Hiding in Visual Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2010}, url = {http://eprint.iacr.org/2010/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Katta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzM10, author = {Jonathan Katz and Lior Malka}, title = {Constant-Round Private Function Evaluation with Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2010}, url = {http://eprint.iacr.org/2010/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzV10, author = {Jonathan Katz and Vinod Vaikuntanathan}, title = {One-Round Password-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2010}, url = {http://eprint.iacr.org/2010/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawachiNTX10, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2010}, url = {http://eprint.iacr.org/2010/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawachiNTX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KayaS10, author = {Kamer Kaya and Ali Aydin Sel{\c{c}}uk}, title = {Secret Sharing Extensions based on the Chinese Remainder Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2010}, url = {http://eprint.iacr.org/2010/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KayaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kazmi10, author = {Raza Ali Kazmi}, title = {Isogenies and Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2010}, url = {http://eprint.iacr.org/2010/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kazmi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhovratovichNR10, author = {Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger}, title = {Rotational Rebound Attacks on Reduced Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2010}, url = {http://eprint.iacr.org/2010/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhovratovichNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimHPBDK10, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2010}, url = {http://eprint.iacr.org/2010/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimN10, author = {Kitae Kim and Daehun Nyang}, title = {Security Analysis of a Threshold Proxy Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2010}, url = {http://eprint.iacr.org/2010/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungAFLTBGKMORTZ10, author = {Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen K. Lenstra and Emmanuel Thom{\'{e}} and Joppe W. Bos and Pierrick Gaudry and Alexander Kruppa and Peter L. Montgomery and Dag Arne Osvik and Herman J. J. te Riele and Andrey Timofeev and Paul Zimmermann}, title = {Factorization of a 768-bit {RSA} modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2010}, url = {http://eprint.iacr.org/2010/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungAFLTBGKMORTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlimaG10, author = {Vlastimil Kl{\'{\i}}ma and Danilo Gligoroski}, title = {Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and {SHA-3} Narrow-pipe Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2010}, url = {http://eprint.iacr.org/2010/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlimaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlincHJKR10, author = {Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and Tal Rabin}, title = {On Compression of Data Encrypted with Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2010}, url = {http://eprint.iacr.org/2010/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlincHJKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobayashiIMSO10, author = {Kazuyuki Kobayashi and Jun Ikegami and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, title = {Evaluation of Hardware Performance for the {SHA-3} Candidates Using {SASEBO-GII}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2010}, url = {http://eprint.iacr.org/2010/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobayashiIMSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Koblitz10, author = {Neal Koblitz}, title = {A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree k{\textgreater}2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2010}, url = {http://eprint.iacr.org/2010/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Koblitz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM10, author = {Neal Koblitz and Alfred Menezes}, title = {Intractable Problems in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2010}, url = {http://eprint.iacr.org/2010/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzMS10, author = {Neal Koblitz and Alfred Menezes and Igor E. Shparlinski}, title = {Discrete Logarithms, Diffie-Hellman, and Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2010}, url = {http://eprint.iacr.org/2010/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kolesnikov10, author = {Vladimir Kolesnikov}, title = {A Security Enhancement and Proof for Authentication and Key Agreement {(AKA)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2010}, url = {http://eprint.iacr.org/2010/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kolesnikov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovS010, author = {Vladimir Kolesnikov and Ahmad{-}Reza Sadeghi and Thomas Schneider}, title = {From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2010}, url = {http://eprint.iacr.org/2010/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovS010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KooYS10, author = {Bonwook Koo and Yongjin Yeom and Jung Hwan Song}, title = {Related-Key Boomerang Attack on Block Cipher {SQUARE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2010}, url = {http://eprint.iacr.org/2010/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KooYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KovtunS10, author = {Vladyslav Kovtun and Irina Sagir}, title = {Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2010}, url = {http://eprint.iacr.org/2010/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KovtunS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraschewskiM10, author = {Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, title = {Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2010}, url = {http://eprint.iacr.org/2010/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraschewskiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrauseAF10, author = {Matthias Krause and Frederik Armknecht and Ewan Fleischmann}, title = {Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2010}, url = {http://eprint.iacr.org/2010/519}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrauseAF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krawczyk10, author = {Hugo Krawczyk}, title = {Cryptographic Extraction and Key Derivation: The {HKDF} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2010}, url = {http://eprint.iacr.org/2010/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krawczyk10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kumar10, author = {Manoj Kumar}, title = {On the Security of a Novel Remote User Authentication Scheme using Smart Card based on {ECDLP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2010}, url = {http://eprint.iacr.org/2010/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kumar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarYK10, author = {Manoj Kumar and Pratibha Yadav and Meena Kumari}, title = {Flaws in Differential Cryptanalysis of Reduced Round {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2010}, url = {http://eprint.iacr.org/2010/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarYK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kunihiro10, author = {Noboru Kunihiro}, title = {Solving Generalized Small Inverse Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2010}, url = {http://eprint.iacr.org/2010/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kunihiro10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa10, author = {Kaoru Kurosawa}, title = {Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2010}, url = {http://eprint.iacr.org/2010/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP10, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2010}, url = {http://eprint.iacr.org/2010/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KushwahL10, author = {Prashant Kushwah and Sunder Lal}, title = {Efficient Generalized Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2010}, url = {http://eprint.iacr.org/2010/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KushwahL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT10, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Ideal Key Derivation and Encryption in Simulation-based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2010}, url = {http://eprint.iacr.org/2010/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV10, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Accountability: Definition and Relationship to Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2010}, url = {http://eprint.iacr.org/2010/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV10a, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Proving Coercion-Resistance of Scantegrity {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2010}, url = {http://eprint.iacr.org/2010/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LambergerMRRS10, author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2010}, url = {http://eprint.iacr.org/2010/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LambergerMRRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterMN10, author = {Kristin E. Lauter and Peter L. Montgomery and Michael Naehrig}, title = {An Analysis of Affine Coordinates for Pairing Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2010}, url = {http://eprint.iacr.org/2010/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterS10, author = {Kristin E. Lauter and Ning Shang}, title = {Generating Pairing-friendly Parameters for the {CM} Construction of Genus 2 Curves over Prime Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2010}, url = {http://eprint.iacr.org/2010/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterY10, author = {Kristin E. Lauter and Tonghai Yang}, title = {Computing genus 2 curves from invariants on the Hilbert moduli space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2010}, url = {http://eprint.iacr.org/2010/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leander10, author = {Gregor Leander}, title = {Small Scale Variants Of The Block Cipher {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2010}, url = {http://eprint.iacr.org/2010/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leander10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeS10, author = {Jooyoung Lee and John P. Steinberger}, title = {Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2010}, url = {http://eprint.iacr.org/2010/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSS10, author = {Jooyoung Lee and Martijn Stam and John P. Steinberger}, title = {The collision security of Tandem-DM in the ideal cipher model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2010}, url = {http://eprint.iacr.org/2010/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSW10, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi}, title = {The Fiat-Shamir Transform for Group and Ring Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2010}, url = {http://eprint.iacr.org/2010/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeiXY10, author = {Xinfeng Lei and Rui Xue and Ting Yu}, title = {Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2010}, url = {http://eprint.iacr.org/2010/467}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeiXY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeiXY10a, author = {Xinfeng Lei and Rui Xue and Ting Yu}, title = {A Timed Logic for Modeling and Reasoning about Security Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2010}, url = {http://eprint.iacr.org/2010/645}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeiXY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent10, author = {Ga{\"{e}}tan Leurent}, title = {Quantum Preimage and Collision Attacks on CubeHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2010}, url = {http://eprint.iacr.org/2010/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoLW10, author = {Allison B. Lewko and Mark Lewko and Brent Waters}, title = {How to Leak on Key Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2010}, url = {http://eprint.iacr.org/2010/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoRW10, author = {Allison B. Lewko and Yannis Rouselakis and Brent Waters}, title = {Achieving Leakage Resilience Through Dual System Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2010}, url = {http://eprint.iacr.org/2010/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW10, author = {Allison B. Lewko and Brent Waters}, title = {Decentralizing Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2010}, url = {http://eprint.iacr.org/2010/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW10a, author = {Allison B. Lewko and Brent Waters}, title = {On the Insecurity of Parallel Repetition for Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2010}, url = {http://eprint.iacr.org/2010/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGSO10, author = {Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta}, title = {An Information Theoretic Perspective on the Differential Fault Analysis against {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2010}, url = {http://eprint.iacr.org/2010/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiGSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiHG10, author = {Xuelian Li and Yupu Hu and Juntao Gao}, title = {The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2010}, url = {http://eprint.iacr.org/2010/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiHG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSL10, author = {Ruilin Li and Bing Sun and Chao Li}, title = {Impossible Differential Cryptanalysis of {SPN} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2010}, url = {http://eprint.iacr.org/2010/307}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSL10a, author = {Ruilin Li and Bing Sun and Chao Li}, title = {Some Observations on {MISTY} Structure with {SPN} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2010}, url = {http://eprint.iacr.org/2010/661}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiSL10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSLY10, author = {Ruilin Li and Bing Sun and Chao Li and Jianxiong You}, title = {Differential Fault Analysis on {SMS4} Using a Single Fault}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2010}, url = {http://eprint.iacr.org/2010/063}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiSLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW10, author = {Yun{-}qiang Li and Ai{-}lan Wang}, title = {Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2010}, url = {http://eprint.iacr.org/2010/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW10a, author = {Yongqiang Li and Mingsheng Wang}, title = {On permutation polynomials EA-equivalent to the inverse function over GF(2\({}^{\mbox{n}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2010}, url = {http://eprint.iacr.org/2010/573}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiY10, author = {Lei Li and Siman Yang}, title = {Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2010}, url = {http://eprint.iacr.org/2010/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinP10, author = {Huijia Lin and Rafael Pass}, title = {Constant-round Non-Malleable Commitments from Any One-Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2010}, url = {http://eprint.iacr.org/2010/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinZ10, author = {Qiping Lin and Fangguo Zhang}, title = {Halving on Binary Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2010}, url = {http://eprint.iacr.org/2010/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell10, author = {Yehuda Lindell}, title = {Constant-Round Zero-Knowledge Proofs of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2010}, url = {http://eprint.iacr.org/2010/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellP10, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2010}, url = {http://eprint.iacr.org/2010/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindnerP10a, author = {Richard Lindner and Chris Peikert}, title = {Better Key Sizes (and Attacks) for LWE-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2010}, url = {http://eprint.iacr.org/2010/613}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindnerP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liu10, author = {Feng Liu}, title = {One-round and authenticated three-party multiple key exchange protocol from parings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2010}, url = {http://eprint.iacr.org/2010/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liu10a, author = {Feng Liu}, title = {Two improved authenticated multiple key exchange protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2010}, url = {http://eprint.iacr.org/2010/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liu10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBZ10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou}, title = {Online/Offline Identity-Based Signcryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2010}, url = {http://eprint.iacr.org/2010/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBZYW10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong}, title = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2010}, url = {http://eprint.iacr.org/2010/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBZYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuC10, author = {Zhen Liu and Zhenfu Cao}, title = {On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2010}, url = {http://eprint.iacr.org/2010/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW10, author = {Feng Liu and Chuankun Wu}, title = {Embedded Extended Visual Cryptography Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2010}, url = {http://eprint.iacr.org/2010/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW10a, author = {Feng Liu and Chuan Kun Wu}, title = {Optimal {XOR} based (2, n)-Visual Cryptography Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2010}, url = {http://eprint.iacr.org/2010/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuY10, author = {Jing Liu and Bo Yang}, title = {Homomorphic One-Way Function Trees and Application in Collusion-Free Multicast Key Distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2010}, url = {http://eprint.iacr.org/2010/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LoftusMSV10, author = {Jake Loftus and Alexander May and Nigel P. Smart and Frederik Vercauteren}, title = {On CCA-Secure Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2010}, url = {http://eprint.iacr.org/2010/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LoftusMSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaG10, author = {Patrick Longa and Catherine H. Gebotys}, title = {Efficient Techniques for High-Speed Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2010}, url = {http://eprint.iacr.org/2010/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaG10a, author = {Patrick Longa and Catherine H. Gebotys}, title = {Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2010}, url = {http://eprint.iacr.org/2010/335}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaG10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu10, author = {Jiqiang Lu}, title = {New Methodologies for Differential-Linear Cryptanalysis and Its Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2010}, url = {http://eprint.iacr.org/2010/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu10b, author = {Jiqiang Lu}, title = {Differential Attack on Five Rounds of the {SC2000} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2010}, url = {http://eprint.iacr.org/2010/593}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu10c, author = {Yang Lu}, title = {Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2010}, url = {http://eprint.iacr.org/2010/619}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuZ10, author = {Jian{-}Zhu Lu and Jipeng Zhou}, title = {On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2010}, url = {http://eprint.iacr.org/2010/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoHC10, author = {Song Luo and Jian{-}bin Hu and Zhong Chen}, title = {New Construction of Identity-based Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2010}, url = {http://eprint.iacr.org/2010/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL10, author = {Yiyuan Luo and Xuejia Lai}, title = {More Insights on Blockcipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2010}, url = {http://eprint.iacr.org/2010/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LysyanskayaS10, author = {Anna Lysyanskaya and Aaron Segal}, title = {Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2010}, url = {http://eprint.iacr.org/2010/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LysyanskayaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaYS10, author = {Wenping Ma and Chen Yang and Shaohui Sun}, title = {Golay Complementary Sequences Over the {QAM} Constellation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2010}, url = {http://eprint.iacr.org/2010/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaYS10a, author = {Wenping Ma and Chen Yang and Shaohui Sun}, title = {New Methods to Construct Golay Complementary Sequences Over the {QAM} Constellation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2010}, url = {http://eprint.iacr.org/2010/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaYS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR10, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {A Zero-One Law for Deterministic 2-Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2010}, url = {http://eprint.iacr.org/2010/098}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR10a, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2010}, url = {http://eprint.iacr.org/2010/595}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalaDS10, author = {Hamid Mala and Mohammad Dakhilalian and Mohsen Shakiba}, title = {Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2010}, url = {http://eprint.iacr.org/2010/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalaDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkaK10, author = {Lior Malka and Jonathan Katz}, title = {VMCrypt - Modular Software Architecture for Scalable Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2010}, url = {http://eprint.iacr.org/2010/584}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinTVY10, author = {Tal Malkin and Isamu Teranishi and Yevgeniy Vahlis and Moti Yung}, title = {Signatures Resilient to Continual Leakage on Memory and Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2010}, url = {http://eprint.iacr.org/2010/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinTVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisP10, author = {Mark Manulis and Bertram Poettering}, title = {Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2010}, url = {http://eprint.iacr.org/2010/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Matt10, author = {Brian J. Matt}, title = {Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2010}, url = {http://eprint.iacr.org/2010/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Matt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McKayV10, author = {Kerry A. McKay and Poorvi L. Vora}, title = {Pseudo-Linear Approximations for {ARX} Ciphers: With Application to Threefish}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2010}, url = {http://eprint.iacr.org/2010/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McKayV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MehtaAS10, author = {Abhinav Mehta and Shashank Agrawal and Kannan Srinathan}, title = {Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2010}, url = {http://eprint.iacr.org/2010/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MehtaAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeiLLJ10, author = {Qixiang Mei and Bao Li and Xianhui Lu and Dingding Jia}, title = {Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2010}, url = {http://eprint.iacr.org/2010/172}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeiLLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeiklejohnSF10, author = {Sarah Meiklejohn and Hovav Shacham and David Mandell Freeman}, title = {Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2010}, url = {http://eprint.iacr.org/2010/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeiklejohnSF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MengkeJ10, author = {H. U. Mengke and G. A. O. Juntao}, title = {Key-Controlled Order-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2010}, url = {http://eprint.iacr.org/2010/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MengkeJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerWI10, author = {Ulrike Meyer and Susanne Wetzel and Sotiris Ioannidis}, title = {New Advances on Privacy-Preserving Policy Reconciliation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2010}, url = {http://eprint.iacr.org/2010/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerWI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoloneyOL10, author = {Richard Moloney and Aidan O'Mahony and Pierre Laurent}, title = {Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2010}, url = {http://eprint.iacr.org/2010/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoloneyOL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Moody10, author = {Dustin Moody}, title = {Mean value formulas for twisted Edwards curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2010}, url = {http://eprint.iacr.org/2010/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Moody10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Moody10a, author = {Dustin Moody}, title = {Divison Polynomials for Alternate Models of Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2010}, url = {http://eprint.iacr.org/2010/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Moody10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiME10, author = {Amir Moradi and Oliver Mischke and Thomas Eisenbarth}, title = {Correlation-Enhanced Power Analysis Collision Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2010}, url = {http://eprint.iacr.org/2010/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiME10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorawieckiS10, author = {Pawel Morawiecki and Marian Srebrny}, title = {A SAT-based preimage analysis of reduced {KECCAK} hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2010}, url = {http://eprint.iacr.org/2010/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorawieckiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MroczkowskiS10, author = {Piotr Mroczkowski and Janusz Szmidt}, title = {The Cube Attack on Stream Cipher Trivium and Quadraticity Tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2010}, url = {http://eprint.iacr.org/2010/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MroczkowskiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaehrigNS10, author = {Michael Naehrig and Ruben Niederhagen and Peter Schwabe}, title = {New software speed records for cryptographic pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2010}, url = {http://eprint.iacr.org/2010/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaehrigNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nagao10, author = {Koh{-}ichi Nagao}, title = {On the complexity of Decomposition Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2010}, url = {http://eprint.iacr.org/2010/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nagao10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naito10, author = {Yusuke Naito}, title = {Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2010}, url = {http://eprint.iacr.org/2010/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naito10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nam10, author = {Junghyun Nam}, title = {A Security Weakness in a Generic Construction of a Group Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2010}, url = {http://eprint.iacr.org/2010/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nam10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi10, author = {Mridul Nandi}, title = {A Unified Method for Improving {PRF} Bounds for a Class of Blockcipher based MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2010}, url = {http://eprint.iacr.org/2010/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NandiP10, author = {Mridul Nandi and Souradyuti Paul}, title = {Speeding Up The Widepipe: Secure and Fast Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2010}, url = {http://eprint.iacr.org/2010/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NandiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naya-Plasencia10, author = {Mar{\'{\i}}a Naya{-}Plasencia}, title = {How to Improve Rebound Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2010}, url = {http://eprint.iacr.org/2010/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naya-Plasencia10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenR10, author = {Long Hoang Nguyen and A. W. Roscoe}, title = {Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2010}, url = {http://eprint.iacr.org/2010/206}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiebuhrMBB10, author = {Robert Niebuhr and Mohammed Meziani and Stanislav Bulygin and Johannes Buchmann}, title = {Selecting Parameters for Secure McEliece-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2010}, url = {http://eprint.iacr.org/2010/271}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NiebuhrMBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Niitsoo10, author = {Margus Niitsoo}, title = {Optimal Adversary Behavior for the Serial Model of Financial Attack Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2010}, url = {http://eprint.iacr.org/2010/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Niitsoo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NingX10, author = {Chao Ning and Qiuliang Xu}, title = {Multiparty Computation for Modulo Reduction without Bit-Decomposition and {A} Generalization to Bit-Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2010}, url = {http://eprint.iacr.org/2010/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NingX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Novotney10, author = {Peter Novotney}, title = {Distinguisher for Shabal's Permutation Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2010}, url = {http://eprint.iacr.org/2010/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Novotney10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NowakZ10, author = {David Nowak and Yu Zhang}, title = {A calculus for game-based security proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2010}, url = {http://eprint.iacr.org/2010/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NowakZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nuida10, author = {Koji Nuida}, title = {Short collusion-secure fingerprint codes against three pirates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2010}, url = {http://eprint.iacr.org/2010/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nuida10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NuidaH10, author = {Koji Nuida and Goichiro Hanaoka}, title = {On the Security of Pseudorandomized Information-Theoretically Secure Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2010}, url = {http://eprint.iacr.org/2010/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NuidaH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ONeill10a, author = {Adam O'Neill}, title = {Definitional Issues in Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2010}, url = {http://eprint.iacr.org/2010/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ONeill10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OguraKUO10, author = {Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto}, title = {Cryptographic Pairings Based on Elliptic Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2010}, url = {http://eprint.iacr.org/2010/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OguraKUO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OhkuboMHSO10, author = {Miyako Ohkubo and Shin'ichiro Matsuo and Yoshikazu Hanatani and Kazuo Sakiyama and Kazuo Ohta}, title = {Robust {RFID} Authentication Protocol with Formal Proof and Its Feasibility}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2010}, url = {http://eprint.iacr.org/2010/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OhkuboMHSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT10, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2010}, url = {http://eprint.iacr.org/2010/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliveiraL10, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, title = {Improving the performance of Luffa Hash Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2010}, url = {http://eprint.iacr.org/2010/457}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliveiraL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanD10, author = {Yanbin Pan and Yingpu Deng}, title = {A Broadcast Attack against {NTRU} Using Ding's Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2010}, url = {http://eprint.iacr.org/2010/598}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanFZ10, author = {Sen{-}Shan Pan and Xiao{-}Tong Fu and Wei{-}Guo Zhang}, title = {Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2010}, url = {http://eprint.iacr.org/2010/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanFZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapamanthouTT10, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Optimal Verification of Operations on Dynamic Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2010}, url = {http://eprint.iacr.org/2010/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapamanthouTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin10, author = {Jacques Patarin}, title = {Transfinite Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2010}, url = {http://eprint.iacr.org/2010/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin10a, author = {Jacques Patarin}, title = {Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2010}, url = {http://eprint.iacr.org/2010/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin10b, author = {Jacques Patarin}, title = {Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2010}, url = {http://eprint.iacr.org/2010/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonQ10, author = {Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Time-Specific Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2010}, url = {http://eprint.iacr.org/2010/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonW10, author = {Kenneth G. Paterson and Gaven J. Watson}, title = {Plaintext-Dependent Decryption: {A} Formal Security Treatment of {SSH-CTR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2010}, url = {http://eprint.iacr.org/2010/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patra10, author = {Arpita Patra}, title = {Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2010}, url = {http://eprint.iacr.org/2010/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patra10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraCR10, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Communication Efficient Perfectly Secure {VSS} and {MPC} in Asynchronous Networks with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2010}, url = {http://eprint.iacr.org/2010/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulMR10, author = {Goutam Paul and Subhamoy Maitra and Shashwat Raizada}, title = {A Combinatorial Analysis of {HC-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2010}, url = {http://eprint.iacr.org/2010/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pavlov10, author = {Andrey V. Pavlov}, title = {Bent functions at the minimal distance and algorithms of constructing linear codes for {CDMA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2010}, url = {http://eprint.iacr.org/2010/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pavlov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Peikert10, author = {Chris Peikert}, title = {An Efficient and Parallel Gaussian Sampler for Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2010}, url = {http://eprint.iacr.org/2010/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Peikert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeritoT10, author = {Daniele Perito and Gene Tsudik}, title = {Secure Code Update for Embedded Devices via Proofs of Secure Erasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2010}, url = {http://eprint.iacr.org/2010/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeritoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetzoldtBB10, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, title = {CyclicRainbow - {A} multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2010}, url = {http://eprint.iacr.org/2010/424}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetzoldtBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetzoldtBB10a, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, title = {Selecting Parameters for the Rainbow Signature Scheme - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2010}, url = {http://eprint.iacr.org/2010/437}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetzoldtBB10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Peyrin10, author = {Thomas Peyrin}, title = {Improved Differential Attacks for {ECHO} and Grostl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2010}, url = {http://eprint.iacr.org/2010/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Peyrin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PillaiBKC10, author = {N. Rajesh Pillai and S. S. Bedi and Sanjay Kumar and Roopika Chaudhary}, title = {Relation for Algebraic Attack on {E0} combiner}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2010}, url = {http://eprint.iacr.org/2010/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PillaiBKC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasR10, author = {Benny Pinkas and Tzachy Reinman}, title = {Oblivious {RAM} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2010}, url = {http://eprint.iacr.org/2010/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Plotnikov10, author = {Anatoly D. Plotnikov}, title = {Logical cryptoanalysis on the example of the cryptosystem {DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2010}, url = {http://eprint.iacr.org/2010/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Plotnikov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Popov10, author = {M. A. Popov}, title = {Cubic groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2010}, url = {http://eprint.iacr.org/2010/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Popov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffM10, author = {Emmanuel Prouff and Robert P. McEvoy}, title = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2010}, url = {http://eprint.iacr.org/2010/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffRB10, author = {Emmanuel Prouff and Matthieu Rivain and R{\'{e}}gis Bevan}, title = {Statistical Analysis of Second Order Differential Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2010}, url = {http://eprint.iacr.org/2010/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffRB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrzydatekW10, author = {Bartosz Przydatek and Douglas Wikstr{\"{o}}m}, title = {Group Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2010}, url = {http://eprint.iacr.org/2010/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrzydatekW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RahmanMAEMO10, author = {Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El{-}Khatib and Hussein T. Mouftah and Eiji Okamoto}, title = {Pair-wise Cryptographic Models for Secure Data Exchange in {P2P} Database Management Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2010}, url = {http://eprint.iacr.org/2010/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RahmanMAEMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rckert10, author = {Markus R{\"{u}}ckert}, title = {Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2010}, url = {http://eprint.iacr.org/2010/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rckert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RebeiroM10, author = {Chester Rebeiro and Debdeep Mukhopadhyay}, title = {Differential Cache Trace Attack Against {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2010}, url = {http://eprint.iacr.org/2010/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RebeiroM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyhanitabarSM10, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, title = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2010}, url = {http://eprint.iacr.org/2010/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyhanitabarSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rijmen10, author = {Vincent Rijmen}, title = {Practical-Titled Attack on {AES-128} Using Chosen-Text Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2010}, url = {http://eprint.iacr.org/2010/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rijmen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivainP10, author = {Matthieu Rivain and Emmanuel Prouff}, title = {Provably Secure Higher-Order Masking of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2010}, url = {http://eprint.iacr.org/2010/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivainP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rjasko10, author = {Michal Rjasko}, title = {Combining properties of cryptographic hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2010}, url = {http://eprint.iacr.org/2010/524}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rjasko10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rjasko10a, author = {Michal Rjasko}, title = {Black-box property of Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2010}, url = {http://eprint.iacr.org/2010/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rjasko10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RjaskoS10, author = {Michal Rjasko and Martin Stanek}, title = {On Designated Verifier Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2010}, url = {http://eprint.iacr.org/2010/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RjaskoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RjaskoS10a, author = {Michal Rjasko and Martin Stanek}, title = {Attacking M{\&}M Collective Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2010}, url = {http://eprint.iacr.org/2010/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RjaskoS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ruckert010, author = {Markus R{\"{u}}ckert and Michael Schneider}, title = {Estimating the Security of Lattice-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2010}, url = {http://eprint.iacr.org/2010/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ruckert010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ruckert0S10, author = {Markus R{\"{u}}ckert and Michael Schneider and Dominique Schr{\"{o}}der}, title = {Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2010}, url = {http://eprint.iacr.org/2010/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ruckert0S10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rudskoy10, author = {Vladimir Rudskoy}, title = {On zero practical significance of "Key recovery attack on full {GOST} block cipher with zero time and memory"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2010}, url = {http://eprint.iacr.org/2010/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rudskoy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RuhrmairSSDDS10, author = {Ulrich R{\"{u}}hrmair and Frank Sehnke and Jan S{\"{o}}lter and Gideon Dror and Srinivas Devadas and J{\"{u}}rgen Schmidhuber}, title = {Modeling Attacks on Physical Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2010}, url = {http://eprint.iacr.org/2010/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RuhrmairSSDDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen10, author = {Markku{-}Juhani O. Saarinen}, title = {The {PASSERINE} Public Key Encryption and Authentication Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2010}, url = {http://eprint.iacr.org/2010/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SagolsM10, author = {Feliu Sagols and Guillermo Morales{-}Luna}, title = {Two identification protocols based on Cayley graphs of Coxeter groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2010}, url = {http://eprint.iacr.org/2010/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SagolsM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid10, author = {Gideon Samid}, title = {Binomial Sieve Series - a Prospective Cryptographic Tool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2010}, url = {http://eprint.iacr.org/2010/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanA10, author = {Ismail San and Nuray At}, title = {Enhanced {FPGA} Implementation of the Hummingbird Cryptographic Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2010}, url = {http://eprint.iacr.org/2010/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarM10, author = {Santanu Sarkar and Subhamoy Maitra}, title = {Some Applications of Lattice Based Root Finding Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2010}, url = {http://eprint.iacr.org/2010/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarM10a, author = {Santanu Sarkar and Subhamoy Maitra}, title = {Cryptanalysis of Dual {CRT-RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2010}, url = {http://eprint.iacr.org/2010/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarM10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarSC10, author = {Pinaki Sarkar and Amrita Saha and Morshed U. Chowdhury}, title = {Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2010}, url = {http://eprint.iacr.org/2010/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarrEB10, author = {Augustin P. Sarr and Philippe Elbaz{-}Vincent and Jean{-}Claude Bajard}, title = {A New Security Model for Authenticated Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2010}, url = {http://eprint.iacr.org/2010/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarrEB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schelkunov10, author = {Dmitry Schelkunov}, title = {White-Box Cryptography and {SPN} ciphers. {LRC} method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2010}, url = {http://eprint.iacr.org/2010/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schelkunov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schlaffer10, author = {Martin Schl{\"{a}}ffer}, title = {Subspace Distinguisher for 5/8 Rounds of the {ECHO-256} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2010}, url = {http://eprint.iacr.org/2010/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schlaffer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schlaffer10a, author = {Martin Schl{\"{a}}ffer}, title = {Improved Collisions for Reduced {ECHO-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2010}, url = {http://eprint.iacr.org/2010/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schlaffer10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schmidt10, author = {Dieter Schmidt}, title = {1024XKS - {A} High Security Software Oriented Block Cipher Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2010}, url = {http://eprint.iacr.org/2010/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schmidt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchropferKM10, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and G{\"{u}}nter M{\"{u}}ller}, title = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2010}, url = {http://eprint.iacr.org/2010/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchropferKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVNR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and S. Gopi Nath and C. Pandu Rangan}, title = {Identity Based Self Delegated Signature - Self Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2010}, url = {http://eprint.iacr.org/2010/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVPR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and S. Priti and C. Pandu Rangan}, title = {On the Security of Identity Based Threshold Unsigncryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2010}, url = {http://eprint.iacr.org/2010/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Security Weaknesses in Two Certificateless Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2010}, url = {http://eprint.iacr.org/2010/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Online/Offline Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2010}, url = {http://eprint.iacr.org/2010/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10b, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Public Verifiable Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2010}, url = {http://eprint.iacr.org/2010/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10c, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Online/Offline Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2010}, url = {http://eprint.iacr.org/2010/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10d, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {{CCA2} Secure Certificateless Encryption Schemes Based on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2010}, url = {http://eprint.iacr.org/2010/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVSR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and J. Shriram and C. Pandu Rangan}, title = {Identity Based Partial Aggregate Signature Scheme Without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2010}, url = {http://eprint.iacr.org/2010/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Semaev10, author = {Igor A. Semaev}, title = {Improved Agreeing-Gluing Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2010}, url = {http://eprint.iacr.org/2010/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Semaev10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SertkayaD10, author = {Isa Sertkaya and Ali Doganaksoy}, title = {On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2010}, url = {http://eprint.iacr.org/2010/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SertkayaD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shao10, author = {Zuhua Shao}, title = {Strong designated verifier signature scheme: new definition and construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2010}, url = {http://eprint.iacr.org/2010/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shao10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCL10, author = {Jun Shao and Zhenfu Cao and Peng Liu}, title = {CCA-Secure {PRE} Scheme without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2010}, url = {http://eprint.iacr.org/2010/112}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shareef10, author = {Amjed Shareef}, title = {Rational Secret Sharing without Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2010}, url = {http://eprint.iacr.org/2010/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shareef10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shareef10a, author = {Amjed Shareef}, title = {Collusion Free Protocol for Rational Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2010}, url = {http://eprint.iacr.org/2010/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shareef10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shareef10b, author = {Amjed Shareef}, title = {Distributed Rational Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2010}, url = {http://eprint.iacr.org/2010/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shareef10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShareefAR10, author = {Amjed Shareef and Akshay Agrawal and C. Pandu Rangan}, title = {Collusion Free Protocol for Correlated Element Selection Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2010}, url = {http://eprint.iacr.org/2010/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShareefAR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinKI10, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, title = {Security Proof of AugPAKE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2010}, url = {http://eprint.iacr.org/2010/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinKI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shirase10, author = {Masaaki Shirase}, title = {Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2010}, url = {http://eprint.iacr.org/2010/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shirase10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimoensPP10, author = {Koen Simoens and Roel Peeters and Bart Preneel}, title = {Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2010}, url = {http://eprint.iacr.org/2010/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimoensPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimoneS10, author = {Antonino Simone and Boris Skoric}, title = {Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2010}, url = {http://eprint.iacr.org/2010/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimoneS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyshlyaev10, author = {Stanislav Smyshlyaev}, title = {Perfectly Balanced Boolean Functions and Golic Conjecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2010}, url = {http://eprint.iacr.org/2010/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyshlyaev10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, title = {The World is Not Enough: Another Look on Second-Order {DPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2010}, url = {http://eprint.iacr.org/2010/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StebilaKRBN10, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2010}, url = {http://eprint.iacr.org/2010/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StebilaKRBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StehleS10, author = {Damien Stehl{\'{e}} and Ron Steinfeld}, title = {Faster Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2010}, url = {http://eprint.iacr.org/2010/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StehleS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinwandtC10, author = {Rainer Steinwandt and Adriana Su{\'{a}}rez Corona}, title = {Attribute-based group key establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2010}, url = {http://eprint.iacr.org/2010/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinwandtC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Strenzke10, author = {Falko Strenzke}, title = {How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2010}, url = {http://eprint.iacr.org/2010/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Strenzke10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWWD10, author = {Bozhan Su and Wenling Wu and Shuang Wu and Le Dong}, title = {Near-Collisions on the Reduced-Round Compression Functions of Skein and {BLAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2010}, url = {http://eprint.iacr.org/2010/355}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SuWWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWZ10, author = {Bozhan Su and Wenling Wu and Wentao Zhang}, title = {Differential Cryptanalysis of {SMS4} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2010}, url = {http://eprint.iacr.org/2010/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, title = {Some Observations on {TWIS} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2010}, url = {http://eprint.iacr.org/2010/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuppakitpaisarnEI10, author = {Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai}, title = {Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2010}, url = {http://eprint.iacr.org/2010/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuppakitpaisarnEI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakahashiF10, author = {Junko Takahashi and Toshinori Fukunaga}, title = {Differential Fault Analysis on {AES} with 192 and 256-Bit Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2010}, url = {http://eprint.iacr.org/2010/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakahashiF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TanakaS10, author = {Naoki Tanaka and Taiichi Saito}, title = {On the q-Strong Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2010}, url = {http://eprint.iacr.org/2010/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TanakaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tang10, author = {Qiang Tang}, title = {A Reflection on the Security of Two-Party Key Establishment Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2010}, url = {http://eprint.iacr.org/2010/174}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangMZGDSL10, author = {Ming Tang and Qingshu Meng and Huanguo Zhang and Si Gao and Qin Dou and Fei Shen and Du Li}, title = {Evolutionary Cipher against Differential Power Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2010}, url = {http://eprint.iacr.org/2010/167}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangMZGDSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangSLL10, author = {Xuehai Tang and Bing Sun and Ruilin Li and Chao Li}, title = {A Meet-in-the-Middle Attack on {ARIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2010}, url = {http://eprint.iacr.org/2010/168}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangSLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangTZH10, author = {Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu}, title = {Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2010}, url = {http://eprint.iacr.org/2010/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangTZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangZT10, author = {Deng Tang and WeiGuo Zhang and Xiaohu Tang}, title = {Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2010}, url = {http://eprint.iacr.org/2010/362}, timestamp = {Sun, 19 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangZT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TantiD10, author = {Bhavin Tanti and Nishant Doshi}, title = {A secure email login system using virtual password}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2010}, url = {http://eprint.iacr.org/2010/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TantiD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TeoSD10, author = {Sui{-}Guan Teo and Leonie Simpson and Ed Dawson}, title = {Bias in the nonlinear filter generator output sequence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2010}, url = {http://eprint.iacr.org/2010/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TeoSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TeoWSD10, author = {Sui{-}Guan Teo and Kenneth Koon{-}Ho Wong and Leonie Simpson and Ed Dawson}, title = {State convergence and keyspace reduction of the Mixer stream cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2010}, url = {http://eprint.iacr.org/2010/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TeoWSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tezcan10, author = {Cihangir Tezcan}, title = {The Improbable Differential Attack: Cryptanalysis of Reduced Round {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2010}, url = {http://eprint.iacr.org/2010/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tezcan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ThomaeW10, author = {Enrico Thomae and Christopher Wolf}, title = {Unravel {XL} and its variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2010}, url = {http://eprint.iacr.org/2010/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ThomaeW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tokareva10, author = {Natalia N. Tokareva}, title = {Automorphism group of the set of all bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2010}, url = {http://eprint.iacr.org/2010/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tokareva10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsujiiG10, author = {Shigeo Tsujii and Masahito Gotaishi}, title = {Enhanced {STS} using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2010}, url = {http://eprint.iacr.org/2010/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsujiiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsujiiGTF10, author = {Shigeo Tsujii and Masahito Gotaishi and Kohtaro Tadaki and Ryou Fujita}, title = {Proposal of a Signature Scheme based on {STS} Trapdoor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2010}, url = {http://eprint.iacr.org/2010/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsujiiGTF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuD10, author = {Ziran Tu and Yingpu Deng}, title = {A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2010}, url = {http://eprint.iacr.org/2010/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TuD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuD10a, author = {Ziran Tu and Yingpu Deng}, title = {Boolean functions with all main cryptographic properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2010}, url = {http://eprint.iacr.org/2010/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TuD10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh10, author = {Dominique Unruh}, title = {Quantum Proofs of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2010}, url = {http://eprint.iacr.org/2010/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh10a, author = {Dominique Unruh}, title = {Concurrent composition in the bounded quantum storage model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2010}, url = {http://eprint.iacr.org/2010/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh10b, author = {Dominique Unruh}, title = {The impossibility of computationally sound {XOR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2010}, url = {http://eprint.iacr.org/2010/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh10c, author = {Dominique Unruh}, title = {Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2010}, url = {http://eprint.iacr.org/2010/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vasef10, author = {Mehdi Vasef}, title = {A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2010}, url = {http://eprint.iacr.org/2010/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vasef10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WalkerL10, author = {Jesse Walker and Jiangtao Li}, title = {Key Exchange with Anonymous Authentication using {DAA-SIGMA} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2010}, url = {http://eprint.iacr.org/2010/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WalkerL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang10, author = {Yongge Wang}, title = {Insecure "Provably Secure Network Coding" and Homomorphic Authentication Schemes for Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2010}, url = {http://eprint.iacr.org/2010/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang10a, author = {Jin Wang}, title = {Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2010}, url = {http://eprint.iacr.org/2010/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangB10, author = {Jin Wang and Jingguo Bi}, title = {Lattice-based Identity-Based Broadcast Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2010}, url = {http://eprint.iacr.org/2010/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangLTB10, author = {Xiaoyun Wang and Mingjie Liu and Chengliang Tian and Jingguo Bi}, title = {Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2010}, url = {http://eprint.iacr.org/2010/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangLTB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWZL10, author = {Hong Wang and Kunpeng Wang and Lijun Zhang and Bao Li}, title = {Pairing Computation on Elliptic Curves of Jacobi Quartic Form}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2010}, url = {http://eprint.iacr.org/2010/475}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWZZ10, author = {Mingqiang Wang and Xiaoyun Wang and Tao Zhan and Yuliang Zheng}, title = {Skew-Frobenius map on twisted Edwards curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2010}, url = {http://eprint.iacr.org/2010/005}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangWZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangY10, author = {Xu An Wang and Xiaoyuan Yang}, title = {Cryptanalysis of Two Efficient {HIBE} Schemes in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2010}, url = {http://eprint.iacr.org/2010/113}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ10, author = {Hou{-}Zhen Wang and Huanguo Zhang}, title = {Hash-based Multivariate Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2010}, url = {http://eprint.iacr.org/2010/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiLH10, author = {Yongzhuang Wei and Jiqiang Lu and Yupu Hu}, title = {Meet-in-the-Middle Attack on 8 Rounds of the {AES} Block Cipher under 192 Key Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2010}, url = {http://eprint.iacr.org/2010/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiZ10, author = {Ruizhong Wei and Z. Zeng}, title = {{KIST:} {A} new encryption algorithm based on splay}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2010}, url = {http://eprint.iacr.org/2010/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengCYDCB10, author = {Jian Weng and Min{-}Rong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao}, title = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2010}, url = {http://eprint.iacr.org/2010/265}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengCYDCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengZ10, author = {Jian Weng and Yunlei Zhao}, title = {On the Security of a Bidirectional Proxy Re-Encryption Scheme from {PKC} 2010}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2010}, url = {http://eprint.iacr.org/2010/319}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP10, author = {Christopher Wolf and Bart Preneel}, title = {MQ\({}^{\mbox{*}}\)-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2010}, url = {http://eprint.iacr.org/2010/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WongB10, author = {Kenneth Koon{-}Ho Wong and Gregory V. Bard}, title = {Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2010}, url = {http://eprint.iacr.org/2010/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WongB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuF10, author = {Hongfeng Wu and Rongquan Feng}, title = {Elliptic curves in Huff 's model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2010}, url = {http://eprint.iacr.org/2010/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuO10, author = {Jiang Wu and M{\'{a}}ire O'Neill}, title = {On Foundation and Construction of Physical Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2010}, url = {http://eprint.iacr.org/2010/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuTF10, author = {Hongfeng Wu and Chunming Tang and Rongquan Feng}, title = {A New Model of Binary Elliptic Curves with Fast Arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2010}, url = {http://eprint.iacr.org/2010/608}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuTF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWY10, author = {Shengbao Wu and Mingsheng Wang and Zheng Yuan}, title = {A Flaw in The Internal State Recovery Attack on {ALPHA-MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2010}, url = {http://eprint.iacr.org/2010/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XU10, author = {Jia Xu}, title = {Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2010}, url = {http://eprint.iacr.org/2010/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XieF10, author = {Tao Xie and Dengguo Feng}, title = {Construct {MD5} Collisions Using Just {A} Single Block Of Message}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2010}, url = {http://eprint.iacr.org/2010/643}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XieF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XieZ10, author = {Wenjian Xie and Zhang Zhang}, title = {Certificateless Signcryption without Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2010}, url = {http://eprint.iacr.org/2010/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XieZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu10, author = {Jia Xu}, title = {A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2010}, url = {http://eprint.iacr.org/2010/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC10, author = {Jia Xu and Ee{-}Chien Chang}, title = {Authenticating Aggregate Range Queries over Multidimensional Dataset}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2010}, url = {http://eprint.iacr.org/2010/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuJ10, author = {Peng Xu and Hai Jin}, title = {Public-Key Encryption with Fuzzy Keyword Search: {A} Provably Secure Scheme under Keyword Guessing Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2010}, url = {http://eprint.iacr.org/2010/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yacobi10, author = {Yacov Yacobi}, title = {Towards a Theory of Trust Based Collaborative Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2010}, url = {http://eprint.iacr.org/2010/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yacobi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa10, author = {Masahiro Yagisawa}, title = {A Digital Signature Using Multivariate Functions on Quaternion Ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2010}, url = {http://eprint.iacr.org/2010/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa10a, author = {Masahiro Yagisawa}, title = {Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2010}, url = {http://eprint.iacr.org/2010/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa10b, author = {Masahiro Yagisawa}, title = {Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2010}, url = {http://eprint.iacr.org/2010/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa10c, author = {Masahiro Yagisawa}, title = {Key Agreement Protocols Based on Multivariate Polynomials over Fq}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2010}, url = {http://eprint.iacr.org/2010/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yao10, author = {Xigen Yao}, title = {{LAB} Form for Iterated Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2010}, url = {http://eprint.iacr.org/2010/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yao10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yao10a, author = {Xigen Yao}, title = {Active Domain Expansion for Normal Narrow-pipe Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2010}, url = {http://eprint.iacr.org/2010/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yao10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoYZ10, author = {Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {Concurrent Knowledge Extraction in the Public-Key Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2010}, url = {http://eprint.iacr.org/2010/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoYZ10a, author = {Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {Adaptive Concurrent Non-Malleability with Bare Public-Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2010}, url = {http://eprint.iacr.org/2010/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoYZ10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YapKP10, author = {Huihui Yap and Khoongming Khoo and Axel Poschmann}, title = {Parallelizing the Camellia and {SMS4} Block Ciphers - Extended version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2010}, url = {http://eprint.iacr.org/2010/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YapKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yarrkov10, author = {Elias Yarrkov}, title = {Cryptanalysis of {XXTEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2010}, url = {http://eprint.iacr.org/2010/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yarrkov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yarrkov10a, author = {Elias Yarrkov}, title = {Cryptanalysis of block EnRUPT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2010}, url = {http://eprint.iacr.org/2010/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yarrkov10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YouLSL10, author = {Jianxiong You and Ruilin Li and Bing Sun and Chao Li}, title = {Improved Fault Attack on {FOX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2010}, url = {http://eprint.iacr.org/2010/166}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YouLSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuW10, author = {Hongbo Yu and Xiaoyun Wang}, title = {Cryptanalysis of the Compression Function of {SIMD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2010}, url = {http://eprint.iacr.org/2010/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yuan10, author = {Zheng Yuan}, title = {New Impossible Di{\textregistered}erential Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2010}, url = {http://eprint.iacr.org/2010/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yuan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuanR10, author = {Zheng Yuan and Jintao Liu and Xiaoqiu Ren}, title = {Distinguishing Attacks on {MAC/HMAC} Based on {A} New Dedicated Compression Function Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2010}, url = {http://eprint.iacr.org/2010/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zanger10, author = {Daniel Z. Zanger}, title = {Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2010}, url = {http://eprint.iacr.org/2010/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zanger10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZaveruchaS10, author = {Gregory M. Zaverucha and Douglas R. Stinson}, title = {Short One-Time Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2010}, url = {http://eprint.iacr.org/2010/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZaveruchaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengCSH10, author = {Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu}, title = {Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2010}, url = {http://eprint.iacr.org/2010/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengCSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengTH10, author = {Bing Zeng and Xueming Tang and Ching{-}Fang Hsu}, title = {A Framework For Fully-Simulatable h-Out-Of-n Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2010}, url = {http://eprint.iacr.org/2010/199}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengTH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang10a, author = {Zhifang Zhang}, title = {Unconditionally Secure Rational Secret Sharing in Standard Communication Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2010}, url = {http://eprint.iacr.org/2010/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangC10, author = {Yang Zhang and Junliang Chen}, title = {Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2010}, url = {http://eprint.iacr.org/2010/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLW10, author = {Meiling Zhang and Jingmei Liu and Xinmei Wang}, title = {the upper bounds on differntial characteristics in block cipher {SMS4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2010}, url = {http://eprint.iacr.org/2010/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangWQD10, author = {Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo{-}Ferrer}, title = {Identity-Based Authenticated Asymmetric Group Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2010}, url = {http://eprint.iacr.org/2010/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangWQD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangX10, author = {WeiGuo Zhang and GuoZhen Xiao}, title = {Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2010}, url = {http://eprint.iacr.org/2010/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoFG10, author = {Shang{-}Wei Zhao and Ruyong Feng and Xiao{-}Shan Gao}, title = {On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2010}, url = {http://eprint.iacr.org/2010/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoGG10, author = {Jianjie Zhao and Dawu Gu and M. Choudary Gorantla}, title = {Stronger Security Model of Group Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2010}, url = {http://eprint.iacr.org/2010/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoGG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoW10, author = {Xin{-}jie Zhao and Tao Wang}, title = {Further Improved Differential Fault Analysis on Camellia by Exploring Fault Width and Depth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2010}, url = {http://eprint.iacr.org/2010/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoW10a, author = {Xin{-}jie Zhao and Tao Wang}, title = {Improved Cache Trace Attack on {AES} and {CLEFIA} by Considering Cache Miss and S-box Misalignment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2010}, url = {http://eprint.iacr.org/2010/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWG10, author = {Xin{-}jie Zhao and Tao Wang and Jing{-}zhe Gao}, title = {Multiple Bytes Differential Fault Analysis on {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2010}, url = {http://eprint.iacr.org/2010/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZX10, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Faster Computation of Self-pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2010}, url = {http://eprint.iacr.org/2010/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengQ10, author = {Qunxiong Zheng and Wenfeng Qi}, title = {A new result on the distinctness of primitive sequences over Z(pq) modulo 2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2010}, url = {http://eprint.iacr.org/2010/622}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhengQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhongL10, author = {Jinmin Zhong and Xuejia Lai}, title = {Improved Preimage Attack on One-block {MD4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2010}, url = {http://eprint.iacr.org/2010/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhongL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouH10, author = {Zhibin Zhou and Dijiang Huang}, title = {On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2010}, url = {http://eprint.iacr.org/2010/395}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuAHW10, author = {Yan Zhu and Gail{-}Joon Ahn and Hongxin Hu and Huaixi Wang}, title = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2010}, url = {http://eprint.iacr.org/2010/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuAHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuHWHA10, author = {Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail{-}Joon Ahn}, title = {A Collaborative Framework for Privacy Protection in Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2010}, url = {http://eprint.iacr.org/2010/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuHWHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuWHAHY10, author = {Yan Zhu and Huaixi Wang and Zexing Hu and Gail{-}Joon Ahn and Hongxin Hu and Stephen S. Yau}, title = {Efficient provable data possession for hybrid clouds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2010}, url = {http://eprint.iacr.org/2010/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuWHAHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuYW10, author = {Bo Zhu and Wenye Yu and Tao Wang}, title = {A Practical Platform for Cube-Attack-like Cryptanalyses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2010}, url = {http://eprint.iacr.org/2010/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuZR10, author = {Benwen Zhu and Bo Zhu and Kui Ren}, title = {PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2010}, url = {http://eprint.iacr.org/2010/466}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuZR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Awad10, title = {A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Awad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Awad10a, title = {Efficient chaotic permutations for image encryption algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Awad10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Awad10b, title = {A New Chaos-Based Cryptosystem for Secure Transmitted Images}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Awad10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanH10, title = {On isotopisms of commutative presemifields and CCZ-equivalence of functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao10d, title = {Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen10a, title = {CCA-Secure Cryptosystem from Lattice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen10b, title = {A Reflection on the Security Proofs of Boneh-Franklin Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen10c, title = {Fully Secure Identity-Based Encryption Without Random Oracles: {A} variant of Boneh-Boyen {HIBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen10c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenL10, title = {Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroLT10, title = {Privacy-preserving Sharing of Sensitive Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoZL10, title = {Enumerating Results of Homogeneous Rotation over GF(p)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/639}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ge10, title = {On Instantiation of the Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ge10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10, title = {An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH10h, title = {Identity-based Digital Signature Scheme Without Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH10h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinCZZ10, title = {How to Construct Space Efficient Revocable {IBE} from Non-monotonic {ABE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinCZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindnerP10, title = {Better Key Sizes (and Attacks) for LWE-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindnerP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu10a, title = {Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalekM10, title = {Adaptively Secure Broadcast Encryption with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalekM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Marinier10, title = {Lattice Reduction and Polynomial Solving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Marinier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nam10a, title = {Security Improvement on a Password-Authenticated Group Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nam10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ONeill10, title = {Deterministic Public-Key Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ONeill10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapamanthouT10, title = {Update-Optimal Authenticated Structures Based on Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapamanthouT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pu10, title = {Weaknesses of {SIP} Authentication Scheme for Converged VoIP Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen10a, title = {Cryptanalysis of Hummingbird-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/612}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelcukY10, title = {Linear Secret Sharing for Hierarchical Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelcukY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR10e, title = {A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR10e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoLW10, title = {CCA-Secure {PRE} Scheme without Public Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiL10, title = {Number formula and degree level of ergodic polynomial functions over Z/2\({}^{\mbox{n}}\)Z and generalized result of linear equation on ergodic power-series T-Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SrivastavaAM10, title = {An Enhanced Remote User Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SrivastavaAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangF10, title = {New Montgomery-based Semi-systolic Multiplier for Even-type {GNB} of GF(2\({}^{\mbox{m}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiCM10, title = {Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiLLL10, title = {Impossible Differential Cryptanalysis on {E2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiLLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wu10, title = {The analytical property for zeta(s)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZZ10, title = {On extended algebraic immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yacobi10a, title = {Symmetric-key Searchable keyword Concealment {(SSC)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yacobi10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa10d, title = {A Digital Signature Based on Multivariate Polynomials over Fq}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa10d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang10, title = {Rational Secret Sharing {AS} Extensive Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangT10, title = {An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangTY10, title = {On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangTY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXS10, title = {Two Attacks on Dutta's Dynamic Group Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2010}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2010/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.